ATIS 1000046-2011 Data Border Functions and Requirements.pdf
《ATIS 1000046-2011 Data Border Functions and Requirements.pdf》由会员分享,可在线阅读,更多相关《ATIS 1000046-2011 Data Border Functions and Requirements.pdf(29页珍藏版)》请在麦多课文档分享上搜索。
1、 ATIS-1000046 ATIS Standard on - DATA BORDER FUNCTIONS AND REQUIREMENTS ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry. More than 200 co
2、mpanies actively formulate standards in ATIS Committees, covering issues including: IPTV, Cloud Services, Energy Efficiency, IP-Based and Wireless Technologies, Quality of Service, Billing and Operational Support, Emergency Services, Architectural Platforms and Emerging Networks. In addition, numero
3、us Incubators, Focus and Exploratory Groups address evolving industry priorities including Smart Grid, Machine-to-Machine, Connected Vehicle, IP Downloadable Security, Policy Management and Network Optimization. ATIS is the North American Organizational Partner for the 3rd Generation Partnership Pro
4、ject (3GPP), a member and major U.S. contributor to the International Telecommunication Union (ITU) Radio and Telecommunications Sectors, and a member of the Inter-American Telecommunication Commission (CITEL). ATIS is accredited by the American National Standards Institute (ANSI). For more informat
5、ion, please visit . Notice of Disclaimer continue to support management functions; and remain available, operational, and functional. ATIS-1000046 9 The DBF shall support the ability to initiate Transmission Control Protocol (TCP) reset, or Internet Control Message Protocol (ICMP) unreachable packet
6、s. A DBE shall add less than a millisecond of latency regardless of policy, utilization, or packet profile. This time does not include any delays due to accessing external systems such a DNS. Unless dictated by security policies in place, the DBE shall maintain no packet loss, at line rate, and unde
7、r a variety of packet size profiles. 8.2 Performance This section describes the computing platform, availability, performance and physical implementation requirements for the DBF. If the DBF is implemented in more than one physical unit (DBE), these requirements apply to each physical unit (DBE). Ap
8、plicable performance specifications can be found in T1.TR.70-2001, A Reliability/Availability Framework for IP-Based Networks and Services, and ATIS-0100524.2004 (R2008), Reliability Related Metrics and Terminology for Network Elements in Evolving Communications Networks. “Availability” is the perce
9、ntage of time the system is capable of being used. It is calculated using the entire systems mean time between failures (MTBF) and the mean time to repair (MTTR): Availability = MTBF / (MTBF + MTTR). Availability can also be represented by the number of minutes a system is down per year excluding sc
10、heduled maintenance periods. The DBF shall be at least 99.99% available. This equates to less than 52 minutes of unscheduled downtime per year. This applies to all Fault-management, Configuration, Accounting, Performance, Security (FCAPS) functionality combined. As an objective, any individual DBE s
11、hould be at least 99.999% available. Each DBF shall be at least 99.99% available. This equates to less than 1 failure in 10,000 FCAPS tasks. As an objective, the DBE shall be at least 99.999% reliable. The DBF shall incorporate built-in mechanisms for process throttling for session management, memor
12、y allocation, and CPU utilization for state and sessions to mitigate the impact of contention and prevent exhaustion of resources for both dynamic and static processes within the device. The DBF shall support the option of using active/active high availability configuration with state transference,
13、or active/hot standby high availability configuration with state transference. The DBF shall support Fail OPEN forwarding after sudden device failure, within 50 milliseconds. The DBF shall support automatic IP packet re-route after link failure. The DBF should support the use of a M:N high availabil
14、ity. Overload conditions shall not cause the complete failure of the DBF. Overload shall only result in a graceful degradation of the system platform performance. The DBF shall discard packets in order to avoid a complete system failure. The DBF shall provide interface and session level statistics g
15、athering and display ability, with configurable resets. ATIS-1000046 10 8.3 Security Functions The DBF shall be capable of enforcing security policies. The DBF shall support the ability to enforce security policy that was in effect prior to any interruption in power subsequent to the power being res
16、tored. The DBF shall support automatic session termination when it determines that packets associated with that session are anomalous. The automatic session termination can be controlled by design or by configurable policy. The DBF shall treat all packets that it identifies as DoS/DDoS packets (inbo
17、und and outbound) according to network provider policy (e.g., drop packets, or direct packets to specific network security services). The DBF shall attempt to splice TCP sessions based on information obtained during the TCP handshake with the intention of validating that the initiator of the propose
18、d TCP conversation is offering a valid session. If it is deemed that it is not a valid session, the DBF shall drop the session and log the event. The DBF shall support stateful analysis and retention of state for IP flows through the DBF. Stateful analysis is important to identify security threats.
19、The DBF shall support “application layer” awareness to the extent that it shall inspect and verify L4-L7 protocols for specific application use in accordance with the applicable IETF-Request for Comments (RFCs) for the protocol. Specific protocols to be supported shall include, but are not limited t
20、o: a. HTTP b. HTTPS c. SSH d. Diameter e. SMTP mail protocols outbound f. TFTP, FTP g. ICMP h. NTP i. SCP j. DNS k. SYSLOG l. IIOP m. SIP n. Parlay-x The DBF shall support the ability to drop packets with TTL=0/1. The DBF shall detect and report network footprint scans by design or policy. The DBF s
21、hall detect and report system finger print scans by design or policy. ATIS-1000046 11 The DBF shall support the use of thresholds for security events to minimize false positives and adjust for baseline conditions. The use of global rules shall be supported in the configuration of the firewall. The D
22、BF shall include the configurable ability to explicitly log application of the “implicit deny” rule associated with every policy. (Note: at the end of every list of allowed actions, there is an implicit rule to deny anything that is not explicitly allowed by the rules. When this “implicit deny” is u
23、sed to block traffic, it shall be possible to log this.) The DBF shall provide detection and policy enforcement functionality using vulnerability-based signatures. The DBF shall support performing deep packet inspection L4-L7 - based on policy - while inspecting packet payload for malicious traffic,
24、 and shall perform this with no packet loss and no increase in latency or jitter. Should packets containing malicious traffic be detected, they shall be treated according to the applicable security policy (e.g., dropped and a security log generated). The DBF shall provide policy enforcement function
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATIS10000462011DATABORDERFUNCTIONSANDREQUIREMENTSPDF

链接地址:http://www.mydoc123.com/p-541457.html