PCP Working Group | M. Boucadair |
Internet-Draft | France Telecom |
Intended status: Standards Track | October 20, 2014 |
Expires: April 23, 2015 |
PCP as a Traffic Classifier Control Protocol
draft-boucadair-pcp-sfc-classifier-control-01
This document specifies how PCP (Port Control Protocol) can be used as a classifier control protocol.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119].
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
This Internet-Draft will expire on April 23, 2015.
Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
PCP (Port Control Protocol, [RFC6887]) has been specified to control an upstream function such as NATs or firewalls. PCP can be used to interact with both statefull and stateless functions.
PCP can be abstracted as a means to notify an upstream network with the flow characteristics that would trigger decisions on the appropriate policies to be applied on these flows at the network side. This document focuses on a typical function that is present in operational networks: Traffic Classifier Function. Two examples are listed below:
A traffic classifier (or classifier for short) is a function that is responsible for classifying flows based on (pre-defined) rules. Once the traffic is classified, it can be marked to bear its class of service (DSCP re-marking [RFC2474]), dropped, shaped, or any other action instructed by the matching rule. This document focuses on classification rules that manipulate L3/L4 fields of IP packets.
A Classifier can be seen as a statefull service function that applies a set of policies for packets and/or flows matching a set of criteria. This document specifies how PCP can be used as a classifier control protocol.
Note a classifier can be co-located with a CGN (Carrier Grade NAT, [RFC6888]), or a firewall. PCP can be used to install policies in all these functions.
This version of the document explains the motivations, basic assumptions, and identifies some missing features. Detailed specification of required extensions will be elaborated in future versions of the document.
This document focuses on the control of L2/L3/L4 Classifiers. Sophisticated classifiers based on heuristics (e.g., those involving DPI (Deep Packet Inspection) modules) are out of scope.
Below are listed some objectives for a classifier control means:
PCP fulfils most of the objectives listed in the previous section. Concretely, PCP allows for the following:
The reference architecture adopted in this document assumes that both the PCP client and server are managed by the same administrative entity (e.g., an operator).
Classification rules are not exposed outside an administrative domain. In particular, subscribers are not aware of these policies.
PCP requests received in the subscriber-faced interfaces are not allowed to manage policies enforced in the classifiers.
Some candidate extensions are listed below:
This section will be completed if the working group agrees with the problem to be solved.
To be completed.
Security considerations discussed in [RFC6887] MUST be taken into account.
TBC.
[RFC2119] | Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. |
[RFC6887] | Wing, D., Cheshire, S., Boucadair, M., Penno, R. and P. Selkirk, "Port Control Protocol (PCP)", RFC 6887, April 2013. |
[I-D.ietf-sfc-architecture] | Halpern, J. and C. Pignataro, "Service Function Chaining (SFC) Architecture", Internet-Draft draft-ietf-sfc-architecture-02, September 2014. |
[I-D.ietf-sfc-problem-statement] | Quinn, P. and T. Nadeau, "Service Function Chaining Problem Statement", Internet-Draft draft-ietf-sfc-problem-statement-10, August 2014. |
[I-D.ripke-pcp-tunnel-id-option] | Ripke, A., Dietz, T., Quittek, J. and R. Silva, "PCP Tunnel-ID Option", Internet-Draft draft-ripke-pcp-tunnel-id-option-01, July 2014. |
[I-D.wing-pcp-flowdata] | Wing, D., Penno, R. and T. Reddy, "PCP Flowdata Option", Internet-Draft draft-wing-pcp-flowdata-00, July 2013. |
[RFC2474] | Nichols, K., Blake, S., Baker, F. and D. Black, "Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers", RFC 2474, December 1998. |
[RFC2475] | Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z. and W. Weiss, "An Architecture for Differentiated Services", RFC 2475, December 1998. |
[RFC6888] | Perreault, S., Yamagata, I., Miyakawa, S., Nakagawa, A. and H. Ashida, "Common Requirements for Carrier-Grade NATs (CGNs)", BCP 127, RFC 6888, April 2013. |