{"id":1113,"date":"2017-08-16T21:19:03","date_gmt":"2017-08-16T21:19:03","guid":{"rendered":"https:\/\/fir3netwp.gmsrrpobkbd.com\/2017\/08\/16\/interface-to-network-security-functions-i2nsf\/"},"modified":"2021-07-27T15:50:05","modified_gmt":"2021-07-27T15:50:05","slug":"interface-to-network-security-functions-i2nsf","status":"publish","type":"post","link":"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html","title":{"rendered":"Interface to Network Security Functions (I2NSF)"},"content":{"rendered":"

Interface to Network Security Functions (I2NSF)<\/strong> is a working group within the IETF formed to define a set of interfaces and data models for monitoring and managing network security functions hosted across multiple sites. I2NSF states,<\/p>\n

Network security functions (NSFs) are provided and consumed in increasingly diverse environments. Users of NSFs could consume network security services hosted by one or more providers, which may be their own enterprise, service providers, or a combination of both. Likewise, service providers of NSFs may offer their customers network security services that consist of multiple security products and\/or functions from different vendors. NSFs may be provided by physical and\/or virtualized infrastructure. Without standard interfaces to express, monitor, and control security policies that govern the behaviour of NSFs, it becomes virtually impossible for security service providers to automate their service offerings that utilize different security functions from multiple vendors.[1]<\/sup><\/p>\n

One point to mention here is around adoption. I2NSF was formed in 2014, and has yet to gather full momentum within the industry. A working group meeting is scheduled for December 2017 to either recharter or close the initiative. Even so, this initiative is still certainly once to watch. Further info around I2NSF can be found at https:\/\/datatracker.ietf.org\/wg\/i2nsf\/about\/<\/a>.<\/p>\n

References<\/h2>\n

[1] https:\/\/www.ietf.org\/mailman\/listinfo\/i2nsf<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

Interface to Network Security Functions (I2NSF) is a working group within the IETF formed to define a set of interfaces and data models for monitoring and managing network security functions hosted across multiple sites. I2NSF states, Network security functions (NSFs) are provided and consumed in increasingly diverse environments. Users of NSFs could consume network security … Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":1112,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"yoast_head":"\nInterface to Network Security Functions (I2NSF) - Fir3net<\/title>\n<meta name=\"description\" content=\"Interface to Network Security Functions (I2NSF) is a working group within the IETF formed to define a set of interfaces and data models for monitoring and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Interface to Network Security Functions (I2NSF) - Fir3net\" \/>\n<meta property=\"og:description\" content=\"Interface to Network Security Functions (I2NSF) is a working group within the IETF formed to define a set of interfaces and data models for monitoring and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html\" \/>\n<meta property=\"og:site_name\" content=\"Fir3net\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-16T21:19:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-27T15:50:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.fir3net.com\/wp-content\/uploads\/2017\/08\/images_articles_1488170360_Viral_Marketing.png\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"128\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rick Donato\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rick Donato\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html\"},\"author\":{\"name\":\"Rick Donato\",\"@id\":\"https:\/\/www.fir3net.com\/#\/schema\/person\/ab35009601b7687ee1c5310be6038037\"},\"headline\":\"Interface to Network Security Functions (I2NSF)\",\"datePublished\":\"2017-08-16T21:19:03+00:00\",\"dateModified\":\"2021-07-27T15:50:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html\"},\"wordCount\":229,\"publisher\":{\"@id\":\"https:\/\/www.fir3net.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.fir3net.com\/wp-content\/uploads\/2017\/08\/images_articles_1488170360_Viral_Marketing.png\",\"articleSection\":[\"Networking Concepts\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html\",\"url\":\"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html\",\"name\":\"Interface to Network Security Functions (I2NSF) - Fir3net\",\"isPartOf\":{\"@id\":\"https:\/\/www.fir3net.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.fir3net.com\/wp-content\/uploads\/2017\/08\/images_articles_1488170360_Viral_Marketing.png\",\"datePublished\":\"2017-08-16T21:19:03+00:00\",\"dateModified\":\"2021-07-27T15:50:05+00:00\",\"description\":\"Interface to Network Security Functions (I2NSF) is a working group within the IETF formed to define a set of interfaces and data models for monitoring and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html#primaryimage\",\"url\":\"https:\/\/www.fir3net.com\/wp-content\/uploads\/2017\/08\/images_articles_1488170360_Viral_Marketing.png\",\"contentUrl\":\"https:\/\/www.fir3net.com\/wp-content\/uploads\/2017\/08\/images_articles_1488170360_Viral_Marketing.png\",\"width\":128,\"height\":128},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.fir3net.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Networking\",\"item\":\"https:\/\/www.fir3net.com\/networking\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Networking Concepts\",\"item\":\"https:\/\/www.fir3net.com\/networking\/concepts-networking\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Interface to Network Security Functions (I2NSF)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.fir3net.com\/#website\",\"url\":\"https:\/\/www.fir3net.com\/\",\"name\":\"Fir3net\",\"description\":\"Keeping you in the know\",\"publisher\":{\"@id\":\"https:\/\/www.fir3net.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.fir3net.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.fir3net.com\/#organization\",\"name\":\"Fir3net\",\"url\":\"https:\/\/www.fir3net.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fir3net.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.fir3net.com\/wp-content\/uploads\/Fir3net-Background-Logo-compressed.png\",\"contentUrl\":\"https:\/\/www.fir3net.com\/wp-content\/uploads\/Fir3net-Background-Logo-compressed.png\",\"width\":390,\"height\":88,\"caption\":\"Fir3net\"},\"image\":{\"@id\":\"https:\/\/www.fir3net.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.fir3net.com\/#\/schema\/person\/ab35009601b7687ee1c5310be6038037\",\"name\":\"Rick Donato\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fir3net.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d75d69a54c0ca3b32c24c3a9703b623c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d75d69a54c0ca3b32c24c3a9703b623c?s=96&d=mm&r=g\",\"caption\":\"Rick Donato\"},\"description\":\"Rick Donato is a Network Automation Architect\/Evangelist and the founder of Packet Coders.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Interface to Network Security Functions (I2NSF) - Fir3net","description":"Interface to Network Security Functions (I2NSF) is a working group within the IETF formed to define a set of interfaces and data models for monitoring and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html","og_locale":"en_US","og_type":"article","og_title":"Interface to Network Security Functions (I2NSF) - Fir3net","og_description":"Interface to Network Security Functions (I2NSF) is a working group within the IETF formed to define a set of interfaces and data models for monitoring and","og_url":"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html","og_site_name":"Fir3net","article_published_time":"2017-08-16T21:19:03+00:00","article_modified_time":"2021-07-27T15:50:05+00:00","og_image":[{"width":128,"height":128,"url":"https:\/\/www.fir3net.com\/wp-content\/uploads\/2017\/08\/images_articles_1488170360_Viral_Marketing.png","type":"image\/jpeg"}],"author":"Rick Donato","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rick Donato","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html#article","isPartOf":{"@id":"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html"},"author":{"name":"Rick Donato","@id":"https:\/\/www.fir3net.com\/#\/schema\/person\/ab35009601b7687ee1c5310be6038037"},"headline":"Interface to Network Security Functions (I2NSF)","datePublished":"2017-08-16T21:19:03+00:00","dateModified":"2021-07-27T15:50:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html"},"wordCount":229,"publisher":{"@id":"https:\/\/www.fir3net.com\/#organization"},"image":{"@id":"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html#primaryimage"},"thumbnailUrl":"https:\/\/www.fir3net.com\/wp-content\/uploads\/2017\/08\/images_articles_1488170360_Viral_Marketing.png","articleSection":["Networking Concepts"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html","url":"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html","name":"Interface to Network Security Functions (I2NSF) - Fir3net","isPartOf":{"@id":"https:\/\/www.fir3net.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html#primaryimage"},"image":{"@id":"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html#primaryimage"},"thumbnailUrl":"https:\/\/www.fir3net.com\/wp-content\/uploads\/2017\/08\/images_articles_1488170360_Viral_Marketing.png","datePublished":"2017-08-16T21:19:03+00:00","dateModified":"2021-07-27T15:50:05+00:00","description":"Interface to Network Security Functions (I2NSF) is a working group within the IETF formed to define a set of interfaces and data models for monitoring and","breadcrumb":{"@id":"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html#primaryimage","url":"https:\/\/www.fir3net.com\/wp-content\/uploads\/2017\/08\/images_articles_1488170360_Viral_Marketing.png","contentUrl":"https:\/\/www.fir3net.com\/wp-content\/uploads\/2017\/08\/images_articles_1488170360_Viral_Marketing.png","width":128,"height":128},{"@type":"BreadcrumbList","@id":"https:\/\/www.fir3net.com\/Networking\/Standards-and-Frameworks-Networking\/interface-to-network-security-functions-i2nsf.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fir3net.com\/"},{"@type":"ListItem","position":2,"name":"Networking","item":"https:\/\/www.fir3net.com\/networking"},{"@type":"ListItem","position":3,"name":"Networking Concepts","item":"https:\/\/www.fir3net.com\/networking\/concepts-networking"},{"@type":"ListItem","position":4,"name":"Interface to Network Security Functions (I2NSF)"}]},{"@type":"WebSite","@id":"https:\/\/www.fir3net.com\/#website","url":"https:\/\/www.fir3net.com\/","name":"Fir3net","description":"Keeping you in the know","publisher":{"@id":"https:\/\/www.fir3net.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fir3net.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.fir3net.com\/#organization","name":"Fir3net","url":"https:\/\/www.fir3net.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fir3net.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.fir3net.com\/wp-content\/uploads\/Fir3net-Background-Logo-compressed.png","contentUrl":"https:\/\/www.fir3net.com\/wp-content\/uploads\/Fir3net-Background-Logo-compressed.png","width":390,"height":88,"caption":"Fir3net"},"image":{"@id":"https:\/\/www.fir3net.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.fir3net.com\/#\/schema\/person\/ab35009601b7687ee1c5310be6038037","name":"Rick Donato","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fir3net.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d75d69a54c0ca3b32c24c3a9703b623c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d75d69a54c0ca3b32c24c3a9703b623c?s=96&d=mm&r=g","caption":"Rick Donato"},"description":"Rick Donato is a Network Automation Architect\/Evangelist and the founder of Packet Coders."}]}},"_links":{"self":[{"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/posts\/1113"}],"collection":[{"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/comments?post=1113"}],"version-history":[{"count":0,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/posts\/1113\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/media\/1112"}],"wp:attachment":[{"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/media?parent=1113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/categories?post=1113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/tags?post=1113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}