TTA °£Ç๰ - ICT Standard Weekly

Ȩ > Ç¥ÁØÈ­ Âü¿© > TTA°£Ç๰ > ICT Standard Weekly

±â¼úÇ¥ÁØÀ̽´

´Ù¿î·Îµå (2018-23È£)
Æ®À§ÅÍ ÆäÀ̽ººÏ ¹ÌÅõµ¥ÀÌ

[Á¦876È£] IETF I2NSF Ç¥ÁØÈ­ µ¿Çâ

New Template

1. ¸Ó¸®¸»

IETF(Internet Engineering Task Force)ÀÇ I2NSF(Interface to Network Security Functions) ¿öÅ·±×·ì(WG, Working Group)Àº ³×Æ®¿öÅ© ±â´É °¡»óÈ­(NFV, Network Functions Virtualization) ȯ°æ¿¡¼­ ´Ù¾çÇÑ º¸¾È º¥´õµéÀÇ ³×Æ®¿öÅ© º¸¾È ±â´É(NSFs, Network Security Functions)À» ¿¬°áÇϱâ À§ÇÑ ÇÁ·¹ÀÓ¿öÅ© ¹× ÀÎÅÍÆäÀ̽º¸¦ Ç¥ÁØÈ­Çϰí ÀÖ´Ù. I2NSF´Â YANGÀ̶ó´Â µ¥ÀÌÅÍ ¸ðµ¨ ¾ð¾î ±â¹ÝÀ¸·Î °ü¸®ÀÚ º¸¾È Á¤Ã¥À» NSF¿¡°Ô ¼³Á¤ÇÏ´Â °ÍÀ» ÀÚµ¿È­ÇÏ´Â µ¥¿¡ ¸ñÇ¥¸¦ µÎ°í ÀÖ´Ù. [±×¸² 1]Àº Ŭ¶ó¿ìµå ±â¹Ý º¸¾È ¼­ºñ½º¸¦ À§ÇÑ I2NSF ÇÁ·¹ÀÓ¿öÅ©¿Í ÁÖ¿ä I2NSF ÀÎÅÍÆäÀ̽º¸¦ º¸¿©ÁÖ°í ÀÖ´Ù. I2NSF ÇÁ·¹ÀÓ¿öÅ©¿¡¼­ I2NSF À¯Àú(User)°¡ °í¼öÁØ º¸¾È Á¤Ã¥(High-level Security Policy)À» Á¤ÀÇÇÏ¿© ³×Æ®¿öÅ©¿¡ Àû¿ëÀ» ¿äûÇϸé, NSF°¡ ÀÌÇØÇÒ ¼ö ÀÖ´Â Àú¼öÁØ º¸¾È Á¤Ã¥(Low-level Security Policy)¿¡ ´ëÇÑ ±ÔÄ¢(Rule)À¸·Î º¯È¯µÇ¾î ÇØ´ç NSF¿¡ º¸¾È ¼³Á¤µÈ´Ù. º»°í¿¡¼­´Â 2018³â 3¿ù 16ÀÏ~24ÀÏ, ¿µ±¹ ·±´ø¿¡¼­ °³ÃÖµÈ IETF 101Â÷ Á¤±âȸÀÇ¿¡¼­ÀÇ I2NSF Ç¥ÁØÈ­ ÁøÇà»óȲ¿¡ ´ëÇØ ±â¼úÇÑ´Ù.

 

 

[±×¸² 1] Ŭ¶ó¿ìµå ±â¹Ý º¸¾È ¼­ºñ½º¸¦ À§ÇÑ I2NSF ÇÁ·¹ÀÓ¿öÅ©

 

2. ȸÀÇ ÁÖ¿ä °á°ú

I2NSF WGÀº ÇöÀç±îÁö Problem Statement ¹× Use Case¸¦ Ç¥Áع®¼­ÀÎ RFC 8192·Î µî·ÏÇß°í, I2NSF Framework¸¦ RFC 8329·Î µî·ÏÇß´Ù. 2018³â 2¿ù, ¼º±Õ°ü´ëÀÇ NSF-Facing InterfaceÀÇ Data Model±â°í¼­¿Í Consumer-Facing InterfaceÀÇ Data Model ±â°í¼­ 2°ÇÀÌ I2NSF WG¹®¼­·Î äÅõǾú´Ù. ÇöÀç I2NSF WG¹®¼­·Î´Â ´ÙÀ½°ú °°´Ù.

 

 

IETF 101Â÷ Á¤±âȸÀÇ¿¡¼­ I2NSF WG´Â I2NSF Capability¿¡ ´ëÇÑ µ¥ÀÌÅÍ ¸ðµ¨ ±â°í¼­, Consumer-Facing Interface¿¡ ´ëÇÑ Á¤º¸ ¸ðµ¨ ±â°í¼­ ¹× µ¥ÀÌÅÍ ¸ðµ¨ ±â°í¼­, Registration Interface¿¡ ´ëÇÑ Á¤º¸ ¸ðµ¨ ±â°í¼­ ¹× µ¥ÀÌÅÍ ¸ðµ¨ ±â°í¼­¸¦ WG¹®¼­·Î äÅÃÇϱâ À§ÇÑ ³íÀǸ¦ ÇÏ¿´´Ù. I2NSF WGÀº Á¤º¸ ¸ðµ¨°ú µ¥ÀÌÅÍ ¸ðµ¨¿¡ ´ëÇÑ ·Îµå¸Ê¿¡ µû¶ó 2018³â¿¡ ÁÖ¿ä Á¤º¸ ¸ðµ¨ ¹× µ¥ÀÌÅÍ ¸ðµ¨¿¡ ´ëÇÑ ¹®¼­¸¦ RFC Ãâ°£À» À§ÇÑ IESG Á¦ÃâÀ» ¸ñÇ¥·Î Çϰí ÀÖ´Ù.
 
 

 

 

[±×¸² 2] IETF-101 I2NSF ÇØÄ¿Åæ ÇÁ·ÎÁ§Æ®


I2NSF WGÀº IETF 101Â÷ ÇØÄ¿Åæ(Hackathon)À» ÅëÇØ º¸¾È ¼­ºñ½º¸¦ NSF·Î ¸ÅÇÎÇÏ´Â Dynamic Configuration°ú Consumer-Facing Interface¸¦ Ãֽе¥ÀÌÅÍ ¸ðµ¨À» ±â¹ÝÀ¸·Î RESTCONF·Î ±¸ÇöÇÏ¿´´Ù. [±×¸² 2]¿Í °°ÀÌ User Group¿¡ µû¶ó Web Access Block º¸¾È ¼­ºñ½º¸¦ ½Ã¿¬ÇÏ¿´´Ù. Web Filter¸¦ À§ÇØ IDS/IPS ¿ÀÇ ¼Ò½ºÀÎ Suricata¸¦ ÀÌ¿ëÇÏ¿´´Ù. I2NSF¸¦ À§ÇØ Á¦¾ÈµÈ SFC(Service Function Chaining)-Enabled Traffic Steering ¾ÆÅ°ÅØÃ³¿¡ µû¶ó À¥ °ü·Ã ÆÐŶµéÀ» º¸¾È ¼­ºñ½º(¿¹, Firewall, Web Filter)¸¦ ¼öÇàÇÏ´Â SF(Service Function)ÀÎ NSFµéÀ» ÅëÇØ Æ÷¿öµùÇϱâ À§ÇØ SFF(Service Function Forwarder)°¡ ÀÌ¿ëµÉ ¼ö ÀÖ´Ù. º» ÇØÄ¿ÅæÀ» ÅëÇØ I2NSF ÇÁ·¹ÀÓ¿öÅ©¿Í µ¥ÀÌÅÍ ÁöÇâ(Data-Driven)ÀÇ ÀÎÅÍÆäÀ̽º¸¦ ÅëÇÑ È¿°úÀûÀÎ º¸¾È ¼­ºñ½º¿¡ ´ëÇÑ POC(Proof of Concept)¸¦ ¼öÇàÇÏ¿´´Ù.

À̹ø I2NSF ¿öÅ·±×·ì ȸÀÇ¿¡¼­ ¼º±Õ°ü´ë´Â ´ÙÀ½ÀÇ 9°ÇÀÇ ±â°í¼­¸¦ ¹ßÇ¥ÇÏ¿´´Ù.

 

º» ȸÀÇ¿¡¼­ I2NSF Capability Á¤º¸ ¸ðµ¨¿¡ µ¿±âÈ­µÇ´Â µ¥ÀÌÅÍ ¸ðµ¨ Ç¥ÁØÈ­°¡ °­Á¶µÇ¾ú´Ù. µ¥ÀÌÅÍ ¸ðµ¨ ÀúÀÚµéÀº Á¤º¸ ¸ðµ¨ ÀúÀÚµéÀÇ Á¦¾È¿¡ µû¶ó °´Ã¼ÁöÇâÀûÀÎ µðÀÚÀÎ(Object-Oriented Design)À» ±â¹ÝÀ¸·Î I2NSF Capability µ¥ÀÌÅÍ ¸ðµ¨, NSF-Facing Interface µ¥ÀÌÅÍ ¸ðµ¨, Consumer-Facing Interface µ¥ÀÌÅÍ ¸ðµ¨, Registration Interface µ¥ÀÌÅÍ ¸ðµ¨ ¹®¼­µéÀ» ¼öÁ¤ÇÒ ¿¹Á¤ÀÌ´Ù. ½ºÆäÀÎ ÅÚ·¹Æ÷´ÏÄ«ÀÇ Diego Lopez´Â Á¤º¸ ¸ðµ¨°ú µ¥ÀÌÅÍ ¸ðµ¨À» ÇϳªÀÇ ¹®¼­·Î º´ÇÕÇÏÀÚ°í Á¦¾ÈÇßÀ¸³ª, ¼º±Õ°ü´ë Á¤ÀçÈÆ ±³¼ö´Â Á¤º¸ ¸ðµ¨Àº »ç¶÷µéÀÌ ¸ðµ¨À» ÀÌÇØÇϱ⿡ À¯¿ëÇϹǷΠÁ¤º¸ ¸ðµ¨°ú µ¥ÀÌÅÍ ¸ðµ¨ÀÌ ÀϰüµÇ°Ô ÀÛ¼ºµÈ´Ù¸é ºÐ¸®µÈ ¹®¼­·Î Ãâ°£ÇÏ´Â °ÍÀÌ ÁÁ´Ù°í ÀǰßÀ» ¹ßÇ¥Çß´Ù.

 

I2NSF Applicability ¹®¼­´Â SFC(Service Function Chaining)-Enabled Traffic Steering°ú NFV Use Case¸¦ Æ÷ÇÔÇÏ¿© °³Á¤ÀÛ¾÷À» ÇÏ¿© 6¿ù, WG Last Call(WGLC)À» °ÅÃÄ RFC ÃâÆÇÀ» À§ÇØ IESG¿¡ Á¦ÃâµÉ ¿¹Á¤ÀÌ´Ù. NSF-Facing Interface ¹®¼­´Â Capability Á¤º¸ ¸ðµ¨ ¹®¼­ÀÇ ÀúÀÚµéÀÇ ÀǰßÀ» ¹Ý¿µÇÏ¿© °³Á¤ÀÌ µÇ¾ú´Ù. IETF-101 ÇØÄ¿ÅæÀ» ÅëÇØ º» ¹®¼­ÀÇ µ¥ÀÌÅÍ ¸ðµ¨ÀÌ °ËÁõµÇ¾ú´Ù. º» ¹®¼­´Â °³Á¤ÀÛ¾÷ÇÏ¿© 10¿ù, WGLC¸¦ °ÅÃÄ RFC ÃâÆÇÀ» À§ÇØ IESG¿¡ Á¦ÃâµÉ ¿¹Á¤ÀÌ´Ù.

 

I2NSF Consumer-Facing Interface Á¤º¸ ¸ðµ¨ ±â°í¼­¿Í µ¥ÀÌÅÍ ¸ðµ¨ ¹®¼­°¡ ¹ßÇ¥µÇ¾ú´Âµ¥, I2NSF Capability Á¤º¸ ¸ðµ¨À» ¹Ý¿µÇÏ°í ½ÇÁ¦ º¸¾È Á¤Ã¥À» °í¼öÁØ º¸¾È Á¤Ã¥À¸·Î Ç¥ÇöÇϱâ À§ÇØ Threat Analysis¸¦ À§ÇØ »ç¿ëµÇ´Â STIX(Structured Threat Information Expression) µ¥ÀÌÅÍ ¸ðµ¨À» Âü°íÇÏ¿© °³Á¤ÀÛ¾÷À» ÇÒ ¿¹Á¤ÀÌ´Ù. I2NSF WG ÀÇÀåÀÎ Linda Dunbar´Â Software- Defined Security Service WGÀÇ ¿£ÅÍÇÁ¶óÀÌÁî À¯½º ÄÉÀ̽º(Enterprise Use Case)¸¦ Âü°íÇÏ¿© Consumer-Facing Interface Á¤º¸ ¸ðµ¨À» º¸¿ÏÇÒ °ÍÀ» Á¦¾ÈÇß´Ù. º» ¹®¼­´Â °³Á¤ÀÛ¾÷ ÈÄ 10¿ù, WGLC¸¦ °ÅÃÄ RFC ÃâÆÇÀ» À§ÇØ IESG¿¡ Á¦ÃâµÉ ¿¹Á¤ÀÌ´Ù.

 

NSF Monitoring Data Model ¹®¼­´Â NSF Monitoring Information ModelÀÇ ÀúÀÚÀÎ Henk BirkholzÀÇ Á¦¾È¿¡ µû¶ó Àç»ç¿ë¼ºÀ» À§ÇÑ Identity¸¦ °®´Â ±¸Á¶¿Í Notification Feature¸¦ Æ÷ÇÔÇÏ°Ô °³Á¤µÇ¾ú´Ù. ÇöÀç Data ModelÀº NotificationÀÇ Á¤ÀÇ¿¡ µû¶ó Periodic Push¿Í On-change Push¸¦ Áö¿øÇÏ°Ô µÇ¾ú´Ù. Registration Interface Á¤º¸ ¸ðµ¨ ±â°í¼­¿Í µ¥ÀÌÅÍ ¸ðµ¨ ±â°í¼­´Â Registration Interface¿¡ ´ëÇØ Capability µî·Ï, Capability Äõ¸®, NSF Lifecycle °ü¸®¸¦ À§ÇÑ MANO(Management and Orchestration)¿ÍÀÇ InteractionÀ» Á¤ÀÇÇϰí ÀÖ´Ù. WG¿¡¼­´Â Registration Interface´Â Capability µî·Ï°ú Capability Äõ¸®¸¸À» ´Ù·ç°í MANO¿ÍÀÇ Interaction¿¡ ´ëÇÑ À̽´´Â ±¸Çö °í·Á»çÇ×À¸·Î ¾ð±ÞÇϱâ·Î Çß´Ù.
 

3. ¸ÎÀ½¸»

Â÷¼¼´ë ÀÎÅͳÝÀº 5G ¸ð¹ÙÀÏ ³×Æ®¿öÅ©¿Í »ç¹°ÀÎÅͳÝ(IoT) Áß½ÉÀ¸·Î ³×Æ®¿öÅ© ¼­ºñ½º¸¦ À§ÇØ SDN/NFV Áß½ÉÀ¸·Î °³ÆíµÉ ¿¹Á¤ÀÌ´Ù. ÀÌ·¯ÇÑ È¯°æ¿¡¼­ ±¹¹Î, ±â¾÷, ±¹°¡±â°üÀÇ ¾ÈÀüÀ» À§ÇØ º¸¾È ¹× ÇÁ¶óÀ̹ö½ÃÀÇ Á߿伺Àº ´õ¿í ºÎ°¢µÉ Àü¸ÁÀÌ´Ù. SDN/NFV ȯ°æ¿¡¼­ ´Ù¾çÇÑ º¸¾È ¼­ºñ½º º¥´õÀÇ ¼Ö·ç¼ÇÀ» È¿°úÀûÀ¸·Î »ç¿ëÇϴ Ŭ¶ó¿ìµå ±â¹ÝÀÇ º¸¾È ¼­ºñ½º°¡ º¸ÆíÈ­µÉ ¿¹Á¤Àε¥, IETF I2NSF´Â ÀÌ·¯ÇÑ Å¬¶ó¿ìµå ±â¹Ý º¸¾È ¼­ºñ½º¸¦ À§ÇÑ ÃÖÀûÈ­µÈ ÇÁ·¹ÀÓ¿öÅ© ¹× Ç¥ÁØ ÀÎÅÍÆäÀ̽º¸¦ Á¦¾ÈÇϰí ÀÖ´Ù. µû¶ó¼­ ÀÌ·¯ÇÑ Ãß¼¼¿¡ ¸ÂÃß¾î ±¹³» º¸¾È ¼ÒÇÁÆ®¿þ¾î ±â¾÷µé ¹× ISP´Â I2NSF Ç¥Áرâ¼úÀ» Á¶±â¿¡ µµÀÔÇÏ¿© ½ÇÁ¦ ³×Æ®¿öÅ©¿¡ ±¸Çö ¹× ¿î¿µÇÔÀ¸·Î½á ÇâÈÄ ³×Æ®¿öÅ© º¸¾È ½ÃÀå¿¡¼­ Å« °æÀï·ÂÀ» °®Ãâ ¼ö ÀÖÀ» °ÍÀÌ´Ù. ¼º±Õ°ü´ë, KT ¹× ETRI´Â °è¼Ó Çù·ÂÇÏ¿© I2NSF ±â¹Ý Ŭ¶ó¿ìµå º¸¾È ¼­ºñ½º ½Ã½ºÅÛ °ü·Ã Ç¥ÁØÈ­¸¦ ÁÖµµÇϰí, ½Å±Ô Ç¥ÁØÈ­ ¾ÆÀÌÅÛÀ» ¹ß±¼ÇÒ ¿¹Á¤ÀÌ´Ù. ¶ÇÇÑ ÀÌµé ±â°üÀº È¿°úÀûÀÎ I2NSF Ç¥ÁØÈ­¸¦ À§ÇØ ¿ÀǽºÅÃ(OpenStack) ±â¹ÝÀ¸·Î NFV ½Ã½ºÅÛÀ» ±¸ÃàÇϰí, À̸¦ ¹ÙÅÁÀ¸·Î I2NSF Framework°ú InterfaceµéÀ» °³¹ß ¹× °ËÁõÇÏ¿© I2NSF Ç¥ÁØÈ­ ¼±µµ¸¦ ÇÒ ¿¹Á¤ÀÌ´Ù.

Á¤ÀçÈÆ (¼º±Õ°ü´ëÇб³ ¼ÒÇÁÆ®¿þ¾î´ëÇÐ Á¶±³¼ö, pauljeong@skku.edu)

* º» ±ÛÀº ÀúÀÚÀÇ ÀǰßÀÏ »Ó TTA ±â°üÀÇ ÀÔÀå°ú´Â ¹«°üÇÕ´Ï´Ù.