One document matched: draft-hares-i2rs-info-model-policy-01.xml


<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [ 
<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC3060 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3060.xml">
<!ENTITY RFC3644 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3644.xml">
<!ENTITY RFC5394 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5394.xml">
<!ENTITY RFC5511 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5511.xml">
<!ENTITY I-D.ietf-i2rs-architecture SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-i2rs-architecture.xml">
<!ENTITY I-D.ietf-i2rs-rib-info-model SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-i2rs-rib-info-model.xml">
<!ENTITY I-D.atlas-i2rs-policy-framework SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.atlas-i2rs-policy-framework.xml">
<!ENTITY I-D.white-i2rs-use-case SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.white-i2rs-use-case.xml">
]>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
 <?rfc toc="yes" ?>
 <?rfc symrefs="yes" ?>
 <?rfc sortrefs="yes"?>
 <?rfc compact="yes" ?>
 <?rfc subcompact="no" ?>  
 <?rfc iprnotified="no" ?>
  <?rfc strict="no" ?>
<rfc category="std" docName="draft-hares-i2rs-info-model-policy-01" ipr="trust200902">
  <front>
    
<title abbrev="IM for policy">An Information Model for Network
    policy</title>

     <author fullname="Susan Hares" initials="S" surname="Hares">
      <organization>Hickory Hill Consulting</organization>
      <address>
        <postal>
          <street>7453 Hickory Hill</street>
          <!-- Reorder these if your country does things differently -->
          <city>Saline</city>
          <region>CA</region>
          <code>48176</code>
          <country>USA</country>
        </postal>
        <email>shares@ndzh.com</email>
        <!-- uri and facsimile elements may also be added -->
      </address>
    </author>

     <author fullname="Qin Wu" initials="Q." surname="Wu">
      
     <organization>Huawei</organization>
     <address>
         <postal>
          <street>101 Software Avenue, Yuhua District</street>
           <city>Nanjing</city>
           <region>Jiangsu</region>
          <code>210012</code>
           <country>China</country>
         </postal>
       <email>sunseawq@huawei.com</email>
      </address>
</author>
<date year="2014" />
   <area>Routing Area</area>
   <workgroup>I2RS working group</workgroup>
    <keyword>RFC</keyword>
     <keyword>Request for Comments</keyword>
     <keyword>I-D</keyword>
     <keyword>Internet-Draft</keyword>
     <keyword>I2RS</keyword>
<abstract>  
    <t>This document introduces an information model for network policies.
      This model operates as policy model that can be linked to other 
      information model such as the I2RS RIB information model. 
   </t>
   <t>
  Some applications that utilize the services of I2RS client
        may require specific set of data in response to network events
        or conditions based on pre-established rules. In order to
        reduce the data flow through the network, the I2RS client
       needs to signal the I2RS agent to filter some of the collected data
       or events prior to transmission, or group the data prior to transmission
      to the i2rs client. This functionality is necessary to meet the 
       requirements i2rs enabled services which include service-layer routing
       improvements, and control of traffic flows and exit points.  
    </t>
 
    <t>The information model is based on extensible information model for
       representing policies, for example, the Policy Core Information Model
       (PCIM) (RFC3060), and an extension to this model to address the need
	   for QoS management, called the Quality of Service (QoS) Policy Information
        Model (QPIM)(RFC3644).</t>
   
</abstract>
  
</front>

  
<middle>
    

<section anchor="intro" title="Introduction">
  
    <t>The Interface to the Routing System (I2RS) provides read
      and write access to the information and state within the
      routing process within routing elements. The I2RS client
      interacts with one or more I2RS agents to collect information
      from network routing systems.  </t>

      
    
    <t> Processing of collected information at the I2RS agent 
        may require the I2RS Agent to filter certain information
        or group pieces of information in order to reduce the data 
        flow through the network to the I2RS client.
       Some applications that that utilize the services of I2RS client
       may also wish to require specific data in response to network
       events or conditions based on pre-established rules. This functionality
       is necessary to meet the requirements of i2rs enabled services 
       which include service-layer routing improvements, and control of 
       traffic flows and exit points.  
   </t>

  
   <t> This document introduces a basic information model for network policies. 
       This policy model can be linked with other information models such as
       the I2RS RIB informational model <xref target="I-D.ietf-i2rs-rib-info-model" /> 
       as a generic policy module. This basic policy model can be easily
       extended beyond the basic functions. The <xref target="I-D.ietf-i2rs-architecture" /> 
	   suggests that associated with the the i2RS RIB model there will be 
	   "Policy-based Routing (ACLs)" and RIB "policy controls".  These 
        basic policy functions can operate as part of this functional blocks
        providing the basic model for policy operators. This model can 
        also be considered as the substance of the policy templates.		
   </t>
    <t> The basic but extendable policy model is a product of the industry approach
        to I2RS. The initial I2RS work is focusing on the initial RIB module, 
       and basic functions to make the initial RIB model function within real networks. 
       Subsequent drafts will provide building blocks upon this policy model that 
       can be used to create network functions.  
    </t> 
   <t> This information model leverages previous work done on extensible
       information model for representing policies, for example, the
        Policy Core Information Model (PCIM) <xref target="RFC3060" /> [RFC3060], and an extension
       to this model to address the need for QoS management, called the
        Quality of Service (QoS) Policy Information Model (QPIM) <xref target="RFC3644" /> [RFC3644].
   </t> 
   <t> Most policy within routing and forwarding systems has become hierarchical
       with individual specific policies being grouped as a set policy. 
         The hierarchical policy rule definition

          enhances policy readability and reusability.
       Groups of network policies have labels to aid operational use. Named
       groups of policy are easily identified and reused as blocks. 
   </t>
   <t> 
       The information model contains the following three components:

    <list
 style="hanging">
          
    <t hangText="Policy Group"><vspace blankLines="1" />Policy is
          described by a set of policy rules that may be grouped into subsets.
          A Policy group is used to provide a hierarchical policy definition
         that provides the model context or scope for sub-rule actions. 
         The model context includes identity, scope, role,
          precedence, priority and security model. 
          In a policy group policy rules and policy groups can be nested
          within other policy rules. </t>
		  
     <t hangText="Network-Policy"><vspace blankLines="1" />contains a
          generic network policy model. It can be thought of as a coherent set
          of rules to administer, manage, and control access to network
          resources and defines a network policy at its most general level of
          abstraction. It models aspects such as actions and conditions that
          constitute a policy element relationship, as well as operators
          contained in the both condition and action that can either be used
          to overwrite an old value of the variable or imply match
          relationship. Policies vary in level of abstraction, for example
          policy at parent level or policy at child level. The model therefore
          allows to show relationships between policies, as well as
          dependencies between condition and action across policy. </t>
     <t hangText="Local Config"><vspace blankLines="1" />defines
          information kept that kept in policy database that is  
          leveraged by CLI, SNMP, NetConf.</t>
        
     </list>
     </t>
  
 <section title="Currently Out of Scope for I2RS">
   <t> An I2RS client may also interact with other elements of the 
       policy and provisioning system to retrieve policy to transmit
       to an I2RS agent to be use in processing collected information,
       or to pass to policy information bases (PIBs) within the routing
       system. How the I2RS client interacts with the policy and provision
        systems is currently outside the scope of I2RS. 
     </t>
     <t> I2RS architecture allows multiple I2RS Clients to communicate with the
         same agent I2RS agent, but requires that only one I2RS client has write
         control over one element. Specification on how the I2RS Clients handle
         multiple client interactions it out of scope at this time.  The i2rs-architecture
         document specifies in section x.x that I2RS clients should avoid writing the
         same element. In the future, the I2RS WG may decide to specify 
         these interactions.  Therefore, this document’s policy information
         allows for extensions that will allow multiple clients. 
      </t> 
</section> 
</section>

<section title="Definitions and Acronyms">

      <t><list>
          <t>IGP: Interior Gateway Protocol</t>
          <t>Information Model: An abstract model of a conceptual domain,
          independent of a specific implementations or data representation</t>
          <t>CLI: Command Line Interface</t>
          <t>SNMP: The Simple Network Management Protocol</t>
          <t>NETCONF:The Network Configuration Protocol</t>
          <t>RBNF: Routing Backus-Naur Form</t>
        </list></t>
</section>

    

<section title="Network Policy Model Overview">
    
<t>I2RS needs its own implicit and explicit policy. This section
      provides an overview of the network policy model. The network policy
      model is defined by the following components, whose relationship is
      roughly depicted in the figure below.</t>
<figure>
        
<artwork>
      +-----------------------+
    
      |    Network-Policy     |

      +-----------+-----------+

                  ^

                 /|\

                  | "extends"

      +-----------^-------------+

      |       Policy Set        |

      +--+-------------------+--+

         ^                   ^

        /|\                 /|\

         | "extends"         | "extends"

+--------^-------+   +-------^-------+     +------------+

| Policy Group   |   | Policy Rule   |<----|Local Policy|

+----------------+   +---------------+     +------------+

                       :          :

                 ......:          :.....

                 :                     :

                 :                     :

       +---------V---------+         +-V-------------+
     
       |  Policy Condition |         | Policy Action |

       +-------------------+         +---------------+

           :     :    :                 :     :    :
  
      .....:     .    :.....       .....:     .    :.....

      :          :         :       :          :         :

 +----V---+  +---V----+ +--V---+ +-V------++--V-----++--V---+

 |  Match |  |Policy  | |Policy| |  Set   || Policy ||Policy|

 |Operator|  |Variable| |Value | |Operator||Variable|| Value|

 +--------+  +--------+ +------+ +--------++--------++------+


           Figure 1: Overall model structure
</artwork>
</figure>
<t>   The policy group component defines the basic network policy Group
      model. In addition, the Network-policy component defines the basic
      network policy rule model.</t>
   <t>PolicySet, is introduced to provide an abstraction for a set of
      rules. It is derived from Policy, and it is inserted into the
      inheritance hierarchy above both PolicyGroup and PolicyRule. This
      reflects the additional structural flexibility and semantic capability
      of both subclasses.</t>
      <t>Policy Rule is represented by semantics “If Condition then Action”,
      therefore condition and action comprise Policy Rule model. Condition
      models the elementary match operation “<variable> match
      <value>”. Action models the elementary set operation. "SET
      <variable> TO <value>". 
      In Condition model, the ‘Match’ operator is usually implied while in the action model,
      the ‘Set’ operator is explicitly used.</t>
	  
      <t>The Local Config Component contains a set of local policy state related to I2RS
      operation that the I2RS agent controls.  The local system's local 
	  policy state linked to a particular information base (E.g. I2RS RIB) 
	  may have a write scope that one or more clients may write. The same 
      write scope with that of one or more clients using an agent. An agent
      must check to determine if a local configuration state overlaps with
      existing installed state.</t>
    
</section>


<section title="Network Policy Information Model">
  <t>This section specifies the network policy information model in
      Routing Backus-Naur Form (RBNF, <xref target="RFC5511" />). It also provides diagrams of
      the main entities that the information model is comprised of.</t>
<section title="The Policy Group Component">
      <t>In order to provide hierarchical policy definition and associate
        policy rule with other constraint, the basic policy group model needs
        to be defined. The corresponding extensions are introduced in a
        component, whose structure is informally depicted in the following
        diagram.</t>
<figure>
<artwork>

       +------------------------------------+
       |           Policy Group             |....
       +------------------------------------+   :
         *      *          *     *     *   ^    :
         |      |          |     |     |   :....:
         |      |          |     |     |
         |      |          |     |     |
         |      |          |     |     |
 +--------+ +--------+ +--------+|   +-----------+

 |Identity| | Role   | |Priority||   |Policy Rule|

 +--------+ +--------+ +--------+|   +-----------+
            *      *             |    *      *  *
            |      |             |     |     |  |

         +---      |             |  +---+---+ | ++----+

         |         |             |  |Enabled| | |Usage|

         |         |             |  +-------+ | +-----+

    +-----+----+ +------+        |            |

    | Resource | |Scope |        |            |

    +----------+ +------+        |            |

                 *    *          |         +--+------+

                 |    |     +----+------+  |Mandatory|

                 |    |     | Precedence|  +---------+

                 |    |     +-----------+

                 |    |

              +-----++-----+

              | Read||Write|

              |Scope||Scope|

              +-----++-----+

</artwork>
 </figure>
       <t> </t> 
     <t>The basic information model works as follows: Within the policy
       group information model, hierarchy is used to model context or scope
         for the sub-rule actions. A policy group contains Identity, scope,
        priority,precedence, policy rule and policy group. Policy rule or
        policy group can be nested into policy group. Policy rule can inherit
        context from policy group as properties and also policy rule can have
        its own properties, eg., enabled, mandatory, usage properties. </t>
   <t>A more formal depiction in RBNF format follows below:</t>
   <t> </t> 
<figure>
<artwork>
 
   <Policy-Group> ::= <Identity>
                      <Role>
                      <priority>
                      <precedence>
                      <Policy-Rule>
                      [<Supporting-Policy-Group>]
                      [<Policy-Group-Extension>]
 
   <Scope> ::= <Read-Scope> |<Write-Scope>

   <Role> ::= <Resource> | <Scope>

   <Policy-Group-Extension> ::= <>
    ...                                 
 </artwork>    
 </figure>

  <t>The elements of the Policy Group information model are as follows:

    <list style="symbols">
     <t>Each policy group is captured in its own list, distinguished
        via a identity, role, priority, precedence.</t>
     <t>A policy group has a certain role, such as resource or scope. A
        policy group can even have multiple roles simultaneously. The
        role, are captured in the list of "role" component. </t>
     <t>A policy role has a certain Scope, such as read scope or write
         scope. A policy group can even have multiple scope simultaneously.
         The scope, or scopes, are captured in the list of "scope"
            components. </t>
      <t>A policy has a certain priority, such as priority 0-255. A
            policy can only have one priority. The priority is captured in the
            list of "priority" component.</t>
       <t>A policy rule can inherit properties (e.g.,
            identity,role,priority, precedence) 
             from policy group. A policy rule also can have its own properties, e.g., enabled, mandatory,
            usage.</t>
       <t>The policy, policy group elements can be extended with
            policy-specific components (policy-extensions,
			policy-group-extension respectively).</t>
  </list></t>
 </section>
<section title="The Network-Policy Rule Component"> 
 <t>The following diagram contains an informal graphical depiction of
    the main elements of the information model:</t>
<figure>
<artwork>

            +----------------+
            |   Policy Rule  |<...
            +----------------+   :
              *           *  :   :
              |           |  :...:
              |           |
     +---------+        +--------+
 ...>|Condition|<.......| Action |<...

 :   +---------+<.......+--------+   :
 :    :   *                *    :    :
 :.....   |                :    :... :
          |                :
     +--------+...........:

     |Operator|

     +--------+
</artwork>
</figure>
<t></t>  
	<t>Roughly speaking, the basic information model works as follows: 
	 A policy rule contains conditions and actions. Each condition or each
     action in turn contains operator. A operator connects variable and
     value in the action or condition. Condition can map onto and be
     supported by other condition, while action can map onto and be
     supported by other actions. Policy rule can map onto other, policy
     rules.</t>
     <t>The information model for the Network-policy component is more
        formally shown in the following diagram.</t> 
<figure>
<artwork>
  <network-policy-rule> ::= (<policy-rule>...)

  <policy-rule> ::= <Identity>
                    <priority>
                    <precedence>
                    <Role>     
                    (<Condition>
                    (<Action>...)
                    <Security-Model>
                    [<policy-rule-extension>]
  
  <Scope> ::= (<Read> [<read-scope>]) |
              (<Write> [<write-scope>])

  <Role> ::= <Resource> | <Scope>
  
  <Security-Model> ::= <First-Matching>|<All-Matching>
  
  <policy-rule-extension> ::= <i2rs-policy-extension> |
                              ...

   <condition> ::= <variable>        
                   (<value>...)
                   [<Match-Operator>]
                   [<condition-extension>]

   <Match-Operator> ::= <IS-SET-MEMBER'>
                       |<IN-INTEGER-RANGE>
                       |<IP-ADDRESS-AS-RESOLVED-BY-DNS>
                       |<Match-Operator-extension>

   <condition-extension> ::= <i2rs-condition-extension> | 
                              ...
								   
   <action> ::= <variable>      
                <value>
                <Set-Operator>
                [<action-extension> ]

   <action-extension> ::= <i2rs-action-extension> |                    
                           ...
</artwork>
</figure>

        <t>The elements of the Network-Policy Rule information model are as
        follows: 
      <list style="symbols">

      <t>A policy can in turn be part of a hierarchy of policies,
         building on top of other policies. Each policy is captured in its
         own level, distinguished via a policy-identity. </t>

      <t>Policy rule inherit scope from policy group. A policy role has
            a certain Scope, such as read scope or write scope. A policy rule
            can even have multiple scope simultaneously. The scope, or scopes,
            are captured in the list of "scope" components. </t>
			
       <t>Furthermore, a policy rule contains conditions and actions,
            each captured in their own list. </t>
        <t>A condition contains a variable and a value and use a match
            operator, to connect variable with value. An examples of an
            operator might be a” IP ADDRESS AS RESOLVED BYDNS” or “Set to a
            member”. Also, a condition can in turn map onto other condition in
            an underlay policy. This is captured in list"supporting-condition".</t>
         <t>An action contains a variable and a value. An action uses Set
            operator to connect variable with value. Analogous to a node, an
            action can in turn map onto other actions in an underlay policy.
            This is captured in list "supporting-action".</t>
         <t>The policy, condition, action and operator elements can be
            extended with policy-specific components (policy-extensions,
            condition-extension, action-extension and operator-extension
            respectively).</t>
          </list></t>
</section>

 <section title="The Local Config Component">

      <t>The Local Config Component is the information 
      links to the policy functions associated with a information
      model it is linked to. This component defines
      a set of groupings with auxiliary information required and shared by
       those other components.</t>
      <t> Since the I2RS RIB  model is the only
      currently agreed upon model, an example from this model may be helpful.
      The I2RS RIB model contains a RIB definition of routing instance
      that has 0-N interfaces and 1-N RIBs. Each RIB contains a set of routes. 
      This policy operates on the elements of I2RS RIB model by combining 
      one of the elements defined in the I2RS RIB model (Routing instance 1,
      RIB 1, route-attribute) within the context of a policy rule.  
	  The <xref target="I-D.ietf-i2rs-architecture" />  shows this 
	  as the RIB Policy Controls that impact the policy routing. 
	  The I2RS agent may only collect information on this RIB.
	  On Write, the RIB Policy Rules may determine what portion of the 
	  Policy-Based RIBs are altered to provide the early exit or
	  service routing features needed by the I2RS client. 
	  </t>
      <t>
	  The key benefit of this Policy Information Model is that it provides a common
	  model of interactions of policy which can be saved as templates, and then
	  enacted for specific functions associated with another model. 
      The policy element  an identity, scope, role, and security model.
	  This allows the specific element to be easily tailor to identified by
	  operations, enable for specific operations (via scope and role), and 
	  at a correct security level.  As the example demonstrates, this
	  blends with the I2RS RIB model to set conditions and actions.
	  Additional drafts will show that it provides other service routing. 
	  </t>
<figure>
<artwork>
   <local-policy-rule> ::= (<local-policy-rule>...)
   <local-policy-rule> ::= <Identity>
                           <priority>
                           <precedence>
                           <Role>
                           (<Condition>)
                           (<Action>...)
                           <Security-Model>

   <Scope> ::= (<Read> [<read-scope>]) |
                     (<Write> [<write-scope>])

   <Role> ::= <Resource> | 
                 <Scope>

   <Security-Model> ::= <First-Matching>|
                       <All-Matching>
                         ...
						 
   <condition> ::= <variable>
                    (<value>...)
                    [<Match-Operator>]
                    [<condition-extension>]

   <Match-Operator> ::= <IS-SET-MEMBER'>
                         |<IN-INTEGER-RANGE>
                         |<IP-ADDRESS-AS-RESOLVED-BY-DNS>
                         |<Match-Operator-extension>
						 
   <condition-extension> ::= <i2rs-condition-extension> |
                             ...
						   
   <action> ::= <variable>         
                <value>
                <Set-Operator>
                [<action-extension>]
			 
   <action-extension> ::= <i2rs-action-extension> |
                        ...
</artwork>
</figure>

 <t>The model extends the original network-policy model as
 follows: 
    <list style="symbols">
       <t>A local policy rule can in turn be part of a hierarchy of
            policies, building on top of other policies. Each local
            configuration policy is captured in its own level, distinguished
            via a policy identity. </t>

       <t>A local policy rule inherit scope from policy group. A local
             policy rule has a certain Scope, such as read scope or write
            scope. A local policy rule can even have multiple scope
            simultaneously. The scope, or scopes, are captured in the list of
            "scope" components. </t>

        <t>Furthermore, a local policy contains conditions and actions,
            each captured in their own list.</t>

        <t>A condition contains a variable and a value and use a match
            operator, to connect variable with value. An examples of an
            operator might be a” IP ADDRESS AS RESOLVED BYDNS” or
           “Set to a member”. Also, a condition can in turn map onto
            other condition in an underlay policy. This is captured in list
            "supporting-condition".</t>

        <t>An action contains a variable and a value. An action uses Set
            operator to connect variable with value. Analogous to a node, an
            action can in turn map onto other actions in an underlay policy.
            This is captured in list "supporting-action".</t>

         <t>The local policy, condition, action and operator elements can
            be extended with policy-specific components (condition-extension,
            action-extension and operator-extension respectively).</t>
   </list></t>

     <t> Drafts that specify examples for this blended I2RS model are:
	<list style="symbols">
        <t> An Traffic balancing using the I2RS RIB Model [draft-hares-i2rs-TE-exit-balance] </t> 
	    <t> Utilizing BGP Information regarding Service Chaining [draft-hares-i2rs-bgp-chains] </t>
        <t> Information model for service topology [draft-hares-i2rs-info-model-service-topo] </t> 
        </list>  
    <list style="symbols">
		<t>
      In future revision of I2rs, this may link to other I2RS information
      models or linked through the I2RS agent to things configured by the
      CLI, SNMP, or via the NETCONF interface.
      </t>
   </list>
</t>
</section>
</section>
    <section anchor="IANA" title="IANA Considerations">
      <t>This draft includes no request to IANA.</t>
    </section>

 <section title="Security Considerations">
      <t>TBD.</t>
</section>
</middle>

  
<back>
    
<references title="Informative References">
   &RFC2119;
   &RFC3060;
   &RFC3644;
   &RFC5394;
   &RFC5511;
   &I-D.ietf-i2rs-architecture;
   &I-D.ietf-i2rs-rib-info-model; 
   &I-D.atlas-i2rs-policy-framework;
   &I-D.white-i2rs-use-case;
   </references>
</back>
</rfc>


PAFTECH AB 2003-20262026-04-24 04:11:02