ImageVerifierCode 换一换
格式:PDF , 页数:29 ,大小:575.70KB ,
资源ID:541457      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-541457.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ATIS 1000046-2011 Data Border Functions and Requirements.pdf)为本站会员(boatfragile160)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ATIS 1000046-2011 Data Border Functions and Requirements.pdf

1、 ATIS-1000046 ATIS Standard on - DATA BORDER FUNCTIONS AND REQUIREMENTS ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry. More than 200 co

2、mpanies actively formulate standards in ATIS Committees, covering issues including: IPTV, Cloud Services, Energy Efficiency, IP-Based and Wireless Technologies, Quality of Service, Billing and Operational Support, Emergency Services, Architectural Platforms and Emerging Networks. In addition, numero

3、us Incubators, Focus and Exploratory Groups address evolving industry priorities including Smart Grid, Machine-to-Machine, Connected Vehicle, IP Downloadable Security, Policy Management and Network Optimization. ATIS is the North American Organizational Partner for the 3rd Generation Partnership Pro

4、ject (3GPP), a member and major U.S. contributor to the International Telecommunication Union (ITU) Radio and Telecommunications Sectors, and a member of the Inter-American Telecommunication Commission (CITEL). ATIS is accredited by the American National Standards Institute (ANSI). For more informat

5、ion, please visit . Notice of Disclaimer continue to support management functions; and remain available, operational, and functional. ATIS-1000046 9 The DBF shall support the ability to initiate Transmission Control Protocol (TCP) reset, or Internet Control Message Protocol (ICMP) unreachable packet

6、s. A DBE shall add less than a millisecond of latency regardless of policy, utilization, or packet profile. This time does not include any delays due to accessing external systems such a DNS. Unless dictated by security policies in place, the DBE shall maintain no packet loss, at line rate, and unde

7、r a variety of packet size profiles. 8.2 Performance This section describes the computing platform, availability, performance and physical implementation requirements for the DBF. If the DBF is implemented in more than one physical unit (DBE), these requirements apply to each physical unit (DBE). Ap

8、plicable performance specifications can be found in T1.TR.70-2001, A Reliability/Availability Framework for IP-Based Networks and Services, and ATIS-0100524.2004 (R2008), Reliability Related Metrics and Terminology for Network Elements in Evolving Communications Networks. “Availability” is the perce

9、ntage of time the system is capable of being used. It is calculated using the entire systems mean time between failures (MTBF) and the mean time to repair (MTTR): Availability = MTBF / (MTBF + MTTR). Availability can also be represented by the number of minutes a system is down per year excluding sc

10、heduled maintenance periods. The DBF shall be at least 99.99% available. This equates to less than 52 minutes of unscheduled downtime per year. This applies to all Fault-management, Configuration, Accounting, Performance, Security (FCAPS) functionality combined. As an objective, any individual DBE s

11、hould be at least 99.999% available. Each DBF shall be at least 99.99% available. This equates to less than 1 failure in 10,000 FCAPS tasks. As an objective, the DBE shall be at least 99.999% reliable. The DBF shall incorporate built-in mechanisms for process throttling for session management, memor

12、y allocation, and CPU utilization for state and sessions to mitigate the impact of contention and prevent exhaustion of resources for both dynamic and static processes within the device. The DBF shall support the option of using active/active high availability configuration with state transference,

13、or active/hot standby high availability configuration with state transference. The DBF shall support Fail OPEN forwarding after sudden device failure, within 50 milliseconds. The DBF shall support automatic IP packet re-route after link failure. The DBF should support the use of a M:N high availabil

14、ity. Overload conditions shall not cause the complete failure of the DBF. Overload shall only result in a graceful degradation of the system platform performance. The DBF shall discard packets in order to avoid a complete system failure. The DBF shall provide interface and session level statistics g

15、athering and display ability, with configurable resets. ATIS-1000046 10 8.3 Security Functions The DBF shall be capable of enforcing security policies. The DBF shall support the ability to enforce security policy that was in effect prior to any interruption in power subsequent to the power being res

16、tored. The DBF shall support automatic session termination when it determines that packets associated with that session are anomalous. The automatic session termination can be controlled by design or by configurable policy. The DBF shall treat all packets that it identifies as DoS/DDoS packets (inbo

17、und and outbound) according to network provider policy (e.g., drop packets, or direct packets to specific network security services). The DBF shall attempt to splice TCP sessions based on information obtained during the TCP handshake with the intention of validating that the initiator of the propose

18、d TCP conversation is offering a valid session. If it is deemed that it is not a valid session, the DBF shall drop the session and log the event. The DBF shall support stateful analysis and retention of state for IP flows through the DBF. Stateful analysis is important to identify security threats.

19、The DBF shall support “application layer” awareness to the extent that it shall inspect and verify L4-L7 protocols for specific application use in accordance with the applicable IETF-Request for Comments (RFCs) for the protocol. Specific protocols to be supported shall include, but are not limited t

20、o: a. HTTP b. HTTPS c. SSH d. Diameter e. SMTP mail protocols outbound f. TFTP, FTP g. ICMP h. NTP i. SCP j. DNS k. SYSLOG l. IIOP m. SIP n. Parlay-x The DBF shall support the ability to drop packets with TTL=0/1. The DBF shall detect and report network footprint scans by design or policy. The DBF s

21、hall detect and report system finger print scans by design or policy. ATIS-1000046 11 The DBF shall support the use of thresholds for security events to minimize false positives and adjust for baseline conditions. The use of global rules shall be supported in the configuration of the firewall. The D

22、BF shall include the configurable ability to explicitly log application of the “implicit deny” rule associated with every policy. (Note: at the end of every list of allowed actions, there is an implicit rule to deny anything that is not explicitly allowed by the rules. When this “implicit deny” is u

23、sed to block traffic, it shall be possible to log this.) The DBF shall provide detection and policy enforcement functionality using vulnerability-based signatures. The DBF shall support performing deep packet inspection L4-L7 - based on policy - while inspecting packet payload for malicious traffic,

24、 and shall perform this with no packet loss and no increase in latency or jitter. Should packets containing malicious traffic be detected, they shall be treated according to the applicable security policy (e.g., dropped and a security log generated). The DBF shall provide policy enforcement function

25、ality for tunneled applications (unencrypted). The DBF shall support the detection of security threats encapsulated in another service or standard protocol (e.g., packets being carried through an unencrypted IPSec tunnel). The DBF shall support the detection and policy enforcement functionality usin

26、g a statistical protocol or application analysis engine that is preconfigured for common attacks and fully configurable for user defined attack type threshold detection settings. The DBF shall support attack detection based on signature pattern matching. The DBF shall support the capability of disab

27、ling the Intrusion Prevention System (IPS) capabilities of a single virtual instance through configuration parameters. It shall not be possible to change the configuration of the IPS capability for a DBF virtual instance “on the fly”, but shall require the instance to be shut down, re-configured, an

28、d brought back up in the new configuration. The DBF shall be able to report on intrusion detection results (successful, blocked, suspicion, etc.), and capture and analyze all information related to a potential intrusion - including packet logs. The DBF shall be capable of performing deep packet anal

29、ysis of at least the following protocols: a. HTTP b. HTTPS c. SSH d. Diameter e. SMTP mail protocols outbound f. TFTP, FTP g. ICMP h. NTP i. SCP j. DNS ATIS-1000046 12 k. SYSLOG l. IIOP m. SIP n. Parlay-x The DBE shall provide detection and policy enforcement functionality using defined signatures.

30、The DBF shall support the capability to receive updated signatures. It shall be possible to selectively configure each device, signature, policy, or filter for mitigation or monitor mode. The DBF shall have the ability to switch its Intrusion Detection capability from passive tap mode to active inli

31、ne protection mode within seconds, without physical intervention on a per port basis and with no increase in latency. The DBF shall support the application of local policy or filters based on IP options. 8.4 Authentication of Traffic Flows The DBF shall support authentication of sessions being estab

32、lished through the DBE. Authentication shall be configurable on each physical and logical interface on the “un-trusted” side of the DBF. For authentication of sessions being established through the DBF, the authentication mechanism for each session should be based on the assurance level needed for t

33、he specific data application. For example: a. Username/Password b. Challenge/Response (e.g., HTTP MD5 Hash) c. Mutual Certificate authentication Authentication may be performed by the DBF itself, or the authentication request may be directed to an associated authentication server such as an Authenti

34、cation, Authorization, and Accounting (AAA) server. As a configurable option, the DBF shall be able to block traffic for any unauthorized data flow. 8.5 Packet Marking The DBF shall support DSCP Packet Marking for packets flowing from the trusted domain to the un-trusted domain based on policies con

35、figurable for each flow or based on a global default policy. ATIS-1000046 13 The DBF shall support inspection of DSCP packet marking on packets flowing from the un-trusted domain to the trusted domain, and shall have the capability of changing the marking based on policies configurable for each flow

36、 or based on a global default policy. 8.6 Device Operations, Administration, Management and Provisioning (OAM 2. Read only; and 3. Read-write. User Profiles: Each system component shall allow the configuration of different DBE user profiles (or groups) that define the functions a user is authorized

37、to perform, and allow these profiles to be assigned to users. There shall be no arbitrary limitation on the number of user profiles. User Profile Authorizations: Each system component shall enable the definition of user profiles with authorizations based on network resource information, including: 1

38、 Networks (all of the nodes and links contained by a network). ATIS-1000046 20 2. Nodes and the access links that terminate on them. 3. Ports. 4. Customer data, if any. User Profile Functional Authorizations: Each system component shall enable the definition of user profiles with authorizations bas

39、ed on function type (e.g., configuring nodes, provisioning services, viewing faults, and administering the network element server application). 8.7.5 Application Administrator Permissions The ability to administer each system component application shall be included in user profiles. Users authorized

40、 to perform this function are referred to as “Application Administrators” in this document. The DBF shall not allow any user without administrator privileges to execute programs on the DBF. “Root” Authorization: No system component shall require an Application Administrator to be a system administra

41、tor or “root” user at the operating system level of the server. Multiple User IDs for Administators: Each system component shall allow multiple user IDs to be authorized to perform application administrator functions. Minimum Administrator Authorization: Each system component shall ensure that at le

42、ast one user is authorized to perform application administrator functions. Administrator Functions: Each system component shall enable an application administrator (and only an application administrator) to: o Create, modify or delete DBE application user identifications. o Reset passwords. o Set pa

43、ssword expiries, inactivity timeouts and allowed password re-try attempts. o Create, display, modify, or delete DBE user profiles. o Assign user profiles to user IDs. User Termination: Each system component shall allow an application administrator to terminate any active user or system session. User

44、 Session Termination: When a user ID is deactivated by an application administrator, each system component shall automatically terminate any active sessions associated with that user ID in a timely fashion. “Raw” Capability Access: Access to the raw capabilities of the underlying System server opera

45、ting system (e.g., file system access and “shell” or command prompt access) shall be granted only to system component users that are specifically authorized to do so in their user profile or to users that use some other means besides the system component application (e.g., telnet) to access the plat

46、form. Note that the application need not enable any users to access the server operating system, but if it does, it shall only allow those specifically authorized to do so. 9 COMPOSITION OF DBF The DBF may be implemented as a single physical entity or the various functions may be implemented in sepa

47、rate physical devices. This results in a number of possible deployment scenarios for the DBF. ATIS-1000046 21 The following figures illustrate two possible alternative deployments. The first (Figure 2) shows the DBF providing all the border element functions in a single location, whereas Figure 3 il

48、lustrates a situation where the Authentication and Proxy functions are provided by an application server “in front” of the Firewall/IPS security functions. In this latter case, the Application Server itself is protected from the un-trusted domain by a firewall, and the interface between the Auth/Pro

49、xy functions and DBF is a secure connection, such as an IPSec tunnel or dedicated facility. The area between the un-trusted and trusted domain is considered to be “trusted but vulnerable” since it is has been authenticated, but does not have the full protection offered by the DBF. Figure 2: Data BE Providing all security functions ATIS-1000046 22 Figure 3: Authentication and Proxy services located separately from the Security functions ATIS-1000046 23 Appendix A A MAPPING TO ATIS NGN ARCHITECTURE The following diagram shows the ATIS high level NGN archit

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1