A Policy Information Model for RFC2547-like IP VPNs



Similar documents
A "Policy-driven" approach of SLA Management

SEC , Cisco Systems, Inc. All rights reserved.

QAME Support for Policy-Based Management of Country-wide Networks

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

High Level Overview of IPSec and MPLS IPVPNs

Configuring MPLS Hub-and-Spoke Layer 3 VPNs

Case Study for Layer 3 Authentication and Encryption

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

Moonv6 Test Suite. MPLS Provider Edge Router (6PE) Interoperablility Test Suite. Technical Document. Revision 0.1

BUY ONLINE AT:

How Routers Forward Packets

Cisco Which VPN Solution is Right for You?

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Why Is MPLS VPN Security Important?

Lecture 17 - Network Security

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS Security Considerations

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

RFC 2547bis: BGP/MPLS VPN Fundamentals

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

For internal circulation of BSNLonly

Policy Based Network Management of a Differentiated Services domain using the Common Open Policy Service protocol

Network Working Group Request for Comments: March 1999

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.

Introduction to Security and PIX Firewall

A Multilevel Policy-Based Network Management System for Differentiated Services Network

Provisioning Cable Services

7750 SR OS System Management Guide

Quidway MPLS VPN Solution for Financial Networks

MPLS Implementation MPLS VPN

Enterprise Network Simulation Using MPLS- BGP

A Review Paper on MPLS VPN Architecture

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

A Management Architecture for Layer 1 VPN Services

Introduction Inter-AS L3VPN

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

FortiOS Handbook IPsec VPN for FortiOS 5.0

Configure ISDN Backup and VPN Connection

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

A Resilient Path Management for BGP/MPLS VPN

CISCO IOS NETWORK SECURITY (IINS)

MPLS VPN Implementation

Advanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems

MPLS-based Layer 3 VPNs

MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow

CCNA Security 1.1 Instructional Resource

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

MPLS VPN Security BRKSEC-2145

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

AMPLS - Advanced Implementing and Troubleshooting MPLS VPN Networks v4.0

MPLS VPN Security Best Practice Guidelines

DD2491 p MPLS/BGP VPNs. Olof Hagsand KTH CSC

IPv6 Fundamentals, Design, and Deployment

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

University of Murcia (Spain) Antonio F. Gómez Skarmeta University of Murcia SPAIN

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

Implementing Cisco MPLS

Agilent Technologies RouterTester Whitepaper

Group Encrypted Transport VPN

Rolling Out New SSL VPN Service

Transition to IPv6 in Service Providers

Multi Protocol Label Switching (MPLS) is a core networking technology that

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic

How To Protect Your Network From Attack

Implementing MPLS VPNs over IP Tunnels

Introduction to MPLS-based VPNs

Introducing Basic MPLS Concepts

Implementing VPN over MPLS

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

How To Make A Network Secure

NETASQ MIGRATING FROM V8 TO V9

Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN

Security of the MPLS Architecture

Network Virtualization Network Admission Control Deployment Guide

Table of Contents. Introduction

The BANDIT Products in Virtual Private Networks

Cisco Certified Security Professional (CCSP)

IMPLEMENTING CISCO MPLS V2.3 (MPLS)

MPLS L2VPN (VLL) Technology White Paper

VNS3 to Cisco ASA Instructions. ASDM 9.2 IPsec Configuration Guide

Building Trusted VPNs with Multi-VRF

Software. Quidview 56 CAMS 57. XLog NTAS 58

Securing Networks with Cisco Routers and Switches 1.0 (SECURE)

Private IP Overview. Feature Description Benefit to the Customer

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. Kapil.Kumar@relianceinfo.com

VPN Technologies A Comparison

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

Network Security. Lecture 3

IPv6 Security: How is the Client Secured?

IPv6 Opportunity and challenge

21.4 Network Address Translation (NAT) NAT concept

UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS

Configuring a Basic MPLS VPN

Virtual Private Networks

CA Spectrum MPLS-VPN Manager

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Transcription:

A Policy Information Model for RFC2547-like IP VPNs Arnaud GONGUET / Olivier POUPEL ALCATEL Route de Nozay - 91460 Marcoussis - France Arnaud.Gonguet@alcatel.fr / Olivier.Poupel@alcatel.fr Tel.: +33 (0)1 69 63 42 17 / +33 (0)1 69 63 47 07 Fax: +33 (0)1 69 63 44 50 Abstract This article presents a Policy Information Model for RFC2547-like IP VPNs. Policy Information Models are the key component of Policy-based Management. They describe a set of service specific policy conditions or policy actions, that are used to formulate the policy rules that formalize the managed service in the network. In this article, the principles of Policy-based Management are reminded, and the role and usage of Policy Information Models is introduced. Then this article provides a description of the way an RFC2547-like IP VPN is provisioned in a network. Finally the authors propose a Policy Information Model for managing RFC2547-like IP VPNs in the context of network Policy-based Management. Introduction This article presents an IP Virtual Private Network (VPN) Policy Information Model. The targeted VPN service is based on an IP network where MPLS is used for forwarding packets over the core, and BGP is used for distributing routes over the core. Moreover, only the case of a network based (or PE-based) VPN is considered here. These kind of IP VPNs are described in RFC 2547 [1]. They will be called hereafter RFC2547-like IP VPNs. Policy information models are used in the context of Policy-based Management, which principles are defined in [2]. The IP VPN Policy Information Model presented hereafter defines a set of policy actions related to the management of RFC2547-like IP VPNs services, that will be used to implement policy rules that are the key components of Policy-based Management. In the first section, this article presents the principles of Policy-based Management, and the advantages of such a network management system. The second section underlines the role and usage of the Policy Information Models in the context of Policy-based Management. The third section explains the provisioning mechanisms of an RFC2547-like IP VPN service. The last section presents a Policy Information Model for RFC2547-like IP VPNs services. UTL/C/02/0038-1 - Article submitted to Net-Con'2002

The network Policy-based Management principles The legacy network management methodologies, that aim at translating service objectives directly into network device configuration commands, are showing some restrictions [3]: Telnet and CLI (Command Line Interface) are dependent of the underlying platform, have a complex syntax and nearly no semantics. The use of SNMP (Simple Network Management Protocol) to browse network elements MIBs (Management Information Base) and PIBs (Policy Information Base) is subject to frequent errors. Moreover, the existance of private MIBs and PIBs hampers interoperability. These restrictions have motivated standardization bodies like the DMTF (Distributed Management Task Force) and the IETF (Internet Engineering Task Force) to lay the foundations of Policy-based Management. The idea is to describe the service objectives with network level policy rules that are automatically disseminated and translated into network device configuration commands. Policy rules are written using an If <Condition> then <Do Actions> formalism. The details of the "conditions" and "actions" are described in the Policy Information Models, that define how to represent a rule, how to group elementary conditions to make a more complex condition, and the way conditions and actions are linked to the rule structure. Policy Manager LDAP, SQL, COPS, Policy Repository LDAP, SQL, PDP COPS, Telnet/CLI, SNMP, PEP PEP PEP PEP PEP PEP Figure 1: Architecture of network Policy-based Management The simplified architecture related to network policy-based management (Figure 1) is made of four elements [4]: The Policy Manager, for editing policy rules, managing the Policy Repository, and updating new policy rules to the Policy Decision Points. UTL/C/02/0038-2 - Article submitted to Net-Con'2002

The Policy Repository, storing the policy rules in a database. The Policy Decision Point (PDP), checking the coherency of the policy rules, notifying the Policy Enforcement Points of the policy rules to be applied, and taking policy decisions that are distributed to the Policy Enforcement Points. The Policy Enforcement Points (PEP), applying the policy rules and decisions received from the PDP and notifying the results to the PDP. The protocols recommended by the IETF for network Policy-based Management are COPS (Common Open Policy Service) for the communications between the PDP and PEPs, and LDAP (Lightweight Directory Access Protocol) for the communication with the Policy Repository. Other protocols, like SNMP or SQL (Structured Query Language) that are widely used within the Internet can also be used for the communications between the components described above. Policy-based Management has several advantages: Network management is more scalable, as adding devices to the network does not change the service level policy rules. Operators are liberated from the complexity of translating service objectives into network device configuration commands, as this complexity is disseminated to the network management. Network management is eased by coherency checking that can be automatically performed with regard to resources availability, configurations conflicts, or fault recovering functionalities. Policy-based Management is currently mainly used for QoS provisioning, or for security management purpose. Network management can gain coherency and efficiency by using Policy-based Management for all kinds of services. To do so, the key element is to define the proper Policy Information Models to be able to modelize the device configuration. Introduction to the Policy Information Models Policy Information Models are the key elements of Policy-based Management. They provide the formalism for descibing a network service using policy rules. A Policy Information Model is a set of classes that enable to implement policy rules. As explained in the previous section, the policy rules that express the service objectives are described using policy conditions and policy actions. The basic policy rules, conditions and actions are formalized in Policy Core Information Model (PCIM) [2] and its extentions PCIMe [5], as a set of PolicyRule, PolicyCondition and PolicyAction classes, and a set of aggregation definitions. PCIM and PCIMe, defined at the IETF, themselves derive from the Common Information Model (CIM) [6] from the DMTF. More specific policy conditions and actions can be defined in other Policy Information Models, as the Policy QoS Information Model (QPIM) [7] from the IETF. They will be formalized as classes that inherit from the PCIMe PolicyAction or PolicyCondition classes. The RFC2547-like IP VPN Policy Information Model, defined in this article, is such an example, in which policy actions that are specific to RFC2547-like IP VPN provisioning are defined on top of the PCIMe legacy classes. UTL/C/02/0038-3 - Article submitted to Net-Con'2002

Some information are added to the network service objectives when they are translated into policy rules. A service objective is a high level view of a service, that makes an abstraction of the network complexity. For example it can describe that a VPN is needed between two given sites. The routers that will be involved are not known at this level. The policy rules that will describe this service will mention the interfaces to connect together, as well as the VPN routes distribution behavior. Thus the mapping from service objectives to policy rules is not direct, but adds complexity. The mapping from service objectives to policy rules is done by a functional block of service/network management, that has knowledge of both network service objectives and network management data. User Requirements SLS IP VPN Provisioning System IPVPN Policy Information Model Physical Network Topology IP VPN provisioning policy rules PDP PDP Device configuration commands Figure 2: Usage of the Policy Information Model In the example of Figure 2, the IP VPN service objectives are captured within an SLS (Service Level Specification). The IP VPN provisioning system will map those objectives into IP VPN provisioning policy rules. For that purpose it uses both the IP VPN Policy Information Model and some network management data. The Policy Information Model provides the policy rules formalism, while the network management data provides the necessary information for filling the policy condition and action parameters. The IP VPN provisioning system is the Policy Manager defined in the previous section (Figure 1). Policy rules will then be transfered to PDPs. The PDPs will translate the policy rules into device specific configuration commands. The RFC2547-like IP VPNs principles Provisioning an RFC2547-like IP VPN requires first to set up the IP VPN membership configuration, that is to provision routers with VPN membership information. Then it is required to set up the IP VPN connectivity, that is to manage the route distribution between UTL/C/02/0038-4- Article submitted to Net-Con'2002

the VPN routers. It is finally possible to provision the VPN routers with some firewall, NAT or encryption information, to set up some particular behaviors of the VPN. Setting up the IP VPN membership configuration RFC 2547 [1] defines a way to implement large scale IP VPNs. Severe scalability problems will occur if each router in the core has to maintain routing information for all the VPNs. It is important therefore that the routing information about a particular VPN is only required to be present in edge routers (i.e. PE) related to that VPN. Therefore an RFC2547-like IP VPN is implemented by managing only the PEs. The security and the confidentiality of the transported packets are supposed to be guaranteed by the core management. RFC2547-like IP VPN membership configuration is physically assured at the PE access interfaces. A site that belong to the VPN is connected to a PE via a given interface. This interface is associated with a separate forwarding table in the PE, known as VPN Routing and Forwarding table (VRF). When a PE router receives a packet from a VPN site (via the appropriate CE), the interface through which the packet arrives determines the forwarding table used for processing that packet (Figure 3). The choice of a forwarding table is not determined by the user content of the packet. 3 CE 1 I VRF i PE 4 PE 2 1: packet from CE to PE 2: packet arrives at interface I 3: interface I implicates that VRF i is used 4: therefore the packet is sent to the right PE Figure 3: How the VRF is working To prevent a VPN to be accessed by a non member site, we decided that a VRF is associated with one and only one VPN, even if RFC 2547 [1] is not so restrictive. Different sites accessing the same VPN through the same PE can use the same VRF. In that case the VRF will be associated to more than one interface. Setting up the IP VPN membership configuration thus consists of creating VRFs on PE routers, that are associated to the sites connection interfaces. Setting up the IP VPN connectivity To connect a site to a VPN via a given PE, a VRF is created on the PE and associated with the interface that connects the site to the PE. Then BGP automatically populates the VRF with the addresses of the site, and BGP peers are defined for this VRF. The site addresses, that may not be unique in the VPN, are turned into VPN specific and unique IP addresses that are UTL/C/02/0038-5 - Article submitted to Net-Con'2002

composed of a Route Distinguisher and of the IP addresses. Those Route Distinguisher attributes and BGP peers management are performed independently from the service objectives mapping to policy rules, and are not modelized in the Policy Information Model. The IP connectivity between the VPN sites is determined by the BGP route distribution between VRFs. Each VRF is associated with one or more "Import Route Target" attributes, and one or more "Export Route Target" attributes. BGP associates a distribution label corresponding to the VRF "Export Route Target" to the VRF routes it distributes. BGP then populates the VRFs it encounters if the encountered VRF "Import Route Target" is equal to the BGP distribution label. In Figure 4, site 1 and site 2 belong to VPN A. The VPN connectivity allows site 1 to send packets to site 2, while site 2 cannot access site 1. The routes from site 2 must be distributed to the PE of site 1. The export Route Target from the PE of site 2 and the import Route Target from the PE of site 1 are set to A. Import RT : A Export RT : null Import RT : null Export RT : A Site 1 VPN A VRF PE Core VRF PE Site 2 VPN A Figure 4: VRF Route Target management example Setting up the IP VPN connectivity thus consists of providing the VRFs with coherent export and import Route Target attributes. An RFC2547-like IP VPN Policy Information Model IP VPN topology Model description The IP VPN topology model defined hereafter aims at providing a way to visualize the VPN service to be provisioned, in order to help its modelization using policy rules. When a policy rule refers to a topology element, the derived device configuration commands will refer to a network logical representation of this element. This does not mean that a reference is made to an object instantiation of this element. The IP VPN topology model could also be used for policy rules management, but as this article describes a Policy Information Model -and not the Policy Manager behavior- this is outside the scope of this article. UTL/C/02/0038-6 - Article submitted to Net-Con'2002

The topology information model of the IP VPN (Figure 5) includes a description of the physical network that will support the service, and a description of the logical topology of the IP VPN. The physical network is only composed of edge nodes and edge node interfaces. The IP VPN is logically defined by a set of routing tables implemented on the edge nodes and a reference to the IP VPN service. Logical topology Physical topology LogicalNetwork (CIM) NetworkService (CIM) ProtocolEndPoint (CIM) Access InterfaceInVRF AccessInterfaceIn EdgeNode IPVPNDescription 1..1 1..* VPNRoutingAndForwarding 1..1 1..* AccessInterface EdgeNode (Traffic Model) VRFInVPN 1..* 1..1 1..1 1..1 1..* VirtualAccessInterface 1..* VirtualAccess InterfaceInVRF VirtualAccessInterfaceIn EdgeNode Figure 5: RFC2547-like IP VPN topology model The physical topology of the network is described with three classes: The EdgeNode class inherits from the ProtocolEndPoint CIM class. For an RFC2547-like IP VPN it represents a PE router. It has a set of access interfaces, that can be virtual access interfaces. The AccessInterface class inherits from the ProtocolEndPoint CIM class. It represents an interface that is aggregated to an edge node. When implementing an IP VPN service, it can be associated with one, and only one, VRF table (to conform with our choice explained in the previous section). The VirtualAccessInterface class inherits from the ProtocolEndPoint CIM. It represents a sub-interface that is aggregated to an edge node. When implementing an IP VPN service, it is associated with one, and only one, VRF table. The logical topology is described with two classes: The VPNRoutingAndForwarding class inherits from the NetworkService CIM class. It represents a PE router VRF that is associated with at least one VPN. It is associated with a set of access interfaces or virtual access interfaces of the same PE. The IPVPNDescription class inherits from the LogicalNetwork CIM. It represents the logical IP VPN. It is associated with a set of VPNRoutingAndForwarding that represents the PE routers connection to the IP VPN service. IP VPN Provisioning Actions UTL/C/02/0038-7 - Article submitted to Net-Con'2002

The provisioning of an RFC2547-like IP VPN is done in two steps (Figure 6). First the membership configuration is set up by creating on the PEs, for each site connected to a PE via a given interface, a VRF associated to the interface. Then the IP connectivity is set up by configuring Route Target attributes on the VRFs to manage the BGP route distribution. Additionally some firewall, encryption or NAT behaviors can be provisioned on the PEs. 1: Set up IP VPN membership configuration (VRF, interfaces...) Core Network Site A Site B CE PE PE CE 3: Configure IP VPN behavior (NAT, encryption, firewall...) 2: Set up IP connectivity Figure 6: Provisioning of the IP VPN service In a Policy Information Model, those actions are modelized as classes that are derived from the PCIMe PolicyAction class. Those classes are used to describe the "action" part of the policy rules that define the IP VPN service. These actions are listed below (Figure 7): ProvisionVRFPolicyAction: defines the membership configuration within an IP VPN. It specifies that a VRF must be created and attached to a set of interfaces of a PE. This enables to describe the VPN membership of a set of sites that are connected to this VPN via the given PE. ConfigureVRFPolicyAction: defines the IP VPN connectivity. It specifies that routes from the VRF connected to the distributionsource interface will be distributed to the VRFs connected to the distributiondestination interfaces. The set of such policy actions that will be defined enables to fully describe the IP VPN connectivity, that will be implemented through the Route Target attributes mechanism. NATAction: defines the NAT behavior for a given PE. FirewallAction: defines the firewall behavior for a given PE. EncryptionAction: defines the IPSec encryption behavior for a given PE. UTL/C/02/0038-8 - Article submitted to Net-Con'2002

PolicyRule (PCIMe) PolicyCondition (PCIM) PolicyAction (PCIM) ProvisionVRFPolicyAction NATAction FirewallAction +distributionsource 1..* +attachedinterface 1..* EncryptionAction ConfigureVRFPolicyAction +distributiondestination AccessInterface (Topology Model) 1..* +distributionmandatoryhops 0..* Figure 7: RFC2547-like IP VPNs Policy Information Model The action ProvisionVRFPolicyAction This action has to be understood as the representation of the membership of a site (or many sites connected to the same PE) to a VPN. It specifies a VRF to be created and attached to a set of interfaces, on a PE router. DERIVED FROM ABSTRACT PROPERTIES ProvisionVRFPolicyAction This class represents the memberhip of one or more sites to a VPN. The sites connected to a given PE implicate the creation of a VRF on the PE, attached to the interfaces that connect the sites to the PE. PolicyAction FALSE attachedinterface[ref AccessInterface[1..n]] The reference attachedinterface: This is a reference to one or several AccessInterface, defined in the topology model (Figure 5). The action ConfigureVRFPolicyAction This action has to be understood as the representation of the connectivity of a site within a VPN. It specifies the set of sites that are accessible through the VPN from the source site. It represents the routes distribution process of a VRF, that will be implemented by means of RouteTarget. ConfigureVRFPolicyAction The class for representing the connectivity of a site within a VPN. It supports point-to-point, hub and spoke, full mesh and partial mesh topology. DERIVED FROM PolicyAction ABSTRACT FALSE PROPERTIES distributionsource[ref AccessInterface[1..n]] UTL/C/02/0038-9 - Article submitted to Net-Con'2002

distributiondestination[ref AccessInterface [1..n]] distributionmandatoryhops[ref AccessInterface [0..n]] The reference distributionsource: This is a reference to one or more AccessInterface, defined in the topology model (Figure 5). The reference distributiondestination: This is a reference to one or more AccessInterface, defined in the topology model (Figure 5). The reference distributionmandatoryhops: This is a reference to zero or more AccessInterface, defined in the topology model (Figure 5). They represent mandatory hops to be used for the traffic flowing from the distributionsource to the distributiondestination. The action NATAction This class specifies which private address(es) need to be translated and what should be the results of this translation. DERIVED FROM ABSTRACT PROPERTIES NATAction The class that represents the network address translation action of the "If Condition then Action" semantics associated with a policy rule. PolicyAction FALSE translatefromipv4address translatetoipv4address The property translatefromipv4address: Specifies the original set of IPv4 addresses that needs to be translated. TranslateFromIPv4Address The original IPv4 address that needs to be translated. PolicyIPv4AddrValue The property translatetoipv4address: Specifies the final set of IPv4 addresses that needs to be translated to. TranslateToIPv4Address The final IPv4 address that needs to be translated to. PolicyIPv4AddrValue The action FirewallAction Specifies the firewall action to be enforced such as "allow", "deny", "log", "alarm", etc. The list of possible actions is limited by the attributes in the action object. DERIVED FROM ABSTRACT PROPERTIES FirewallAction The class for representing the firewall action of the "If Condition then Action" semantics associated with a policy rule. PolicyAction FALSE firewallaction UTL/C/02/0038-10 - Article submitted to Net- Con'2002

The property firewallaction: The action defines the type of firewall action to be enforced. VALUES firewallaction The firewall action to be enforced INTEGER The action can take the following values 0 Allow 1 Allow & Log 2 Allow and Alarm 3 Deny 4 Deny & Log 5 Deny and Alarm The action EncryptionAction: The encryption standard is assumed to be IPSec [8]. This class provides the IPSec parameters that will be used to set up the security association required to handle the encryption and decryption of packets. DERIVED FROM ABSTRACT PROPERTIES EncryptionAction The class for representing the encryption action of the "If Condition then Action" semantics associated with a policy rule. PolicyAction TRUE ikeauthentication ikeencryption ikedhgroup iketimeout iketrafficbasedexpiry ipsecauthentication ipsecencryption ipsecdhgroup ipsectimeout ipsectrafficbasedexpiry ikepeerauthenticationmethod The property ikeauthentication: This property specifies the authentication algorithm to be used. The ikeauthentication parameters can be used to generate the corresponding ISAKMP (ISA Key Management Protocol) parameters in cases where ISAKMP is still being used. This document does not describe a separate set of parameters for ISAKMP. It is left to the policy servers generating the configuration to handle the corresponding translation. ikeauthentication The property that specifies the authentication algorithm. String The property ikeencryption: This property specifies the encryption algorithm to be used. ikeencryption The property that specifies the encryption algorithm. String UTL/C/02/0038-11 - Article submitted to Net- Con'2002

The property ikedhgroup: This property specifies the DHGroup to be used during IKE negotiations. ikedhgroup The property that specifies the DHGroup to be used during IKE negotiations. String The property iketimeout: This property specifies the IKE Timeout to be used. iketimeout The property that specifies the IKE timeout. Integer The property iketrafficbasedexpiry: This property specifies the IKE Traffic based expiry to be used. iketrafficbasedexpiry The property that specifies the IKE traffic based expiry to be used. Integer The property ipsecauthentication: This property specifies the authentication algorithm to be used. ipsecauthentication The property that specifies the authentication algorithm. String The property ipsecencryption: This property specifies the encryption algorithm to be used. ipsecencryption The property that specifies the encryption algorithm. String The property ipsecdhgroup: This property specifies the DHGroup to be used during IPSec negotiations. ipsecdhgroup The property that specifies the DHGroup to be used during the IKE Phase II negotiations. String The property ipsectimeout: The property specifies the IPSEC Key Timeout to be used. ipsectimeout The property that specifies the IPSEC Key timeout. Integer The property ipsectrafficbasedexpiry: UTL/C/02/0038-12 - Article submitted to Net- Con'2002

This property specifies the IPSEC Traffic based Key expiry to be used. ipsectrafficbasedexpiry The property that specifies the IPSec traffic based Key expiry to be used. Integer The property ikepeerauthenticationmethod: The IKE peers are the IKE processes that are at the two ends of a control channel related to encryption of traffic at the data layer. The method used by the peers to authenticate each other. The IKE peers are running on the IP VPN nodes. VALUE ikepeerauthenticationmethod The property that specifies the method used by the IKE peers to authenticate each other. unsigned 16-bit integer The possible values are listed below. 0 ProposalList is to be used 1 Pre-shared key 2 DSS (D S S) signatures 3 RSA (R S A) signatures 4 Encryption with RSA 5 Revised encryption with RSA 6 Kerberos Conclusion This article presents the basis of Policy-based Management, and particularly the role and usage of Policy Information Models. Then a Policy Information Model is proposed for the provisioning of RFC2547-like IP VPNs. This work is proposed at the IETF [9]. Policy Information Models are a key element for Policy-based Management, and a lot of efficiency and coherency could be gained in network management from using Policy-based Management not only for QoS or security purposes, but also for all kinds of services management. By leading research activities in Policy-based Management, Alcatel actively contributes to develop tomorrow tools which will allow to gain efficiency and coherency to manage next generation networks. References [1] IETF-draft, "BGP/MPLS VPNs", draft-ietf-ppvpn-rfc2547bis-01.txt, E. C. Rosen, Y. Rekhter, S. J. Brannon, C. J. Chase, J. De Clercq, P. Hitchen, D. Marshall, M. J. Morrow, A. Vedrenne, January 2002, work in progress, expire in July 2002 UTL/C/02/0038-13 - Article submitted to Net- Con'2002

[2] IETF-RFC 3060, "Policy Core Information Model -- Version 1 Specification", B. Moore, E. Ellesson, J. Strassner, A. Westerinen, February 2001 [3] GRES'01, "A "Policy-driven" approach of SLA Management", O. Poupel, A. Gonguet, December 2001 [4] IETF-RFC 2753, "A Framework for Policy-based Admission Control", R. Yavatkar, D. Pendarakis, R. Guerin, January 2000 [5] IETF-draft, "Policy Core Information Model Extensions", draft-ietf-policy-pcim-ext- 07.txt, B. Moore, L. Rafalow, Y. Ramberg, Y. Snir, A. Westerinen, R. Chadha, M. Brunner, R. Cohen, J. Strassner, February 2002, work in progress, expire in August 2002 [6] DMTF, "Common Information Model (CIM) Specification", version 2.2, June 1999, http://www.dmtf.org/spec/cims.html [7] IETF-draft, "Policy QoS Information Model", draft-ietf-policy-qos-info-model-04.txt, Y. Snir, Y. Ramberg, J. Strassner, R. Cohen, B. Moore, November 2001, work in progress, expire in May 2002 [8] IETF-RFC 2401, "Security Architecture for the Internet Protocol", S. Kent, R. Atkinson, November 1998 [9] IETF-draft, "IPVPN Policy Information Model", M. Iyer, A. Gonguet, C. Jacquenet, P. Lago, R. Scandarioto, February 2002, work in progress, expire in August 2002 UTL/C/02/0038-14 - Article submitted to Net- Con'2002