Information Technology Reference
In-Depth Information
that is the integrated UMU-jCOPS implementation, performs communication with the
PDP and obtains its Routing Policy.
PEP Monitor checks the current policy's validity. If policy is valid (TimePeriod
Checker is the component to do it), then PEP Monitor launches the suitable PEP
Transformer that it has to convert it to the specific configuration format used by the
device that it is controlling. (CISCO Routing or Quagga Routing implementation
[13]). PEP Transformer uses a set of XSL Transformation which has been developed
to do the XML transformation to suitable configuration files. In this manner, every
XSL (Extensible Stylesheet Language) contains a particular technology
transformation for particular operating system architectures.
So far, we have created XSLT transformations for CISCO IOS Routers [14],
Quagga BGP-4 protocol and Quagga Route Server model. Quagga implementation
has been tested in PC Routers with Linux 2.6.x operating system and FreeBSD 5.x.
Quagga is a routing software suite, providing implementations of OSPFv2,
OSPFv3, RIPv1, RIPv2, RIPv3 and BGPv4 [15][16] for Unix platforms, particularly
FreeBSD, Linux, Solaris and NetBSD Routing Software Suite. The release tested is
0.98.0, although the latest releases can also be used.
If the PEP is not integrated inside the Router element (as it is the case of the
CISCO Router) then Router Agent module takes care of communication with router
using SSHv2 protocol (if router supports it) or through a telnet session.
7 Conclusions and Future Work
Policy-based network management (PBNM) is an emerging technology addressing
open issues that are crucial for the deployment and evolution of network services and
applications. For this the definition of common models indicating the semantics that a
policy specification or language should implement regarding a network service is
quite relevant. In the case of IPsec or QoS, for example, this issue has been mostly
addressed during the last years, but in the case of routing policies just a few models
have been defined. This paper provides a modelling for routing policies based on the
CIM information model as well as the details of how it has been applied in a
particular PBNM architecture.
Acknowledgements
This work has been partially funded by the EU Euro6IX (European IPv6 Internet
Exchanges Backbone, IST-2001-32161) IST project and EU POSITIF (Policy-based
Security Tools and Framework, IST-2002-002314) IST project.
References
1. Jason, J., Rafalow, L., Vyncke, E.: IPsec Configuration Policy Information Model, RFC
3585 (2003)
2. Snir, Y., Ramberg, Y., Strassner, J., Cohen, R., Moore, B.: Policy Quality of Service
(QoS) Information Model, RFC 3644 (2003)
Search WWH ::




Custom Search