<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.1) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsawg-ucl-acl-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="A Policy-based Network Access Control">A YANG Data Model and RADIUS Extension for Policy-based Network Access Control</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ucl-acl-05"/>
    <author fullname="Qiufang Ma" role="editor">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>101 Software Avenue, Yuhua District</street>
          <city>Jiangsu</city>
          <code>210012</code>
          <country>China</country>
        </postal>
        <email>maqiufang1@huawei.com</email>
      </address>
    </author>
    <author fullname="Qin Wu">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>101 Software Avenue, Yuhua District</street>
          <city>Jiangsu</city>
          <code>210012</code>
          <country>China</country>
        </postal>
        <email>bill.wu@huawei.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Daniel King">
      <organization>Lancaster University</organization>
      <address>
        <postal>
          <country>United Kingdom</country>
        </postal>
        <email>d.king@lancaster.ac.uk</email>
      </address>
    </author>
    <date year="2024" month="June" day="25"/>
    <area>Operations and Management</area>
    <workgroup>OPSAWG</workgroup>
    <keyword>ACL</keyword>
    <keyword>Policy-based</keyword>
    <keyword>BYOD</keyword>
    <keyword>Access control</keyword>
    <abstract>
      <?line 64?>

<t>This document defines a YANG data model for policy-based network access
   control, which provides consistent and efficient enforcement of
   network access control policies based on group identity.  Moreover, this document defines a mechanism to ease the maintenance
   of the mapping between a user group identifier and a set of IP/MAC addresses
   to enforce policy-based network access control.</t>
      <t>In addition, the document defines a Remote Authentication Dial-in
   User Service (RADIUS) attribute that is used to
   communicate the user group identifier as part of identification and
   authorization information.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Operations and Management Area Working Group Working Group mailing list (opsawg@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsawg/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/policy-based-network-acl"/>.</t>
    </note>
  </front>
  <middle>
    <?line 77?>

<section anchor="intro">
      <name>Introduction</name>
      <t>With the increased adoption of remote access technologies (e.g.,
   Virtual Private Networks (VPNs)) and Bring Your Own Device (BYOD)
   policies, enterprises adopted more flexibility related to how, where,
   and when employees work and collaborate.  However, more flexibility
   comes with increased risks.  Enabling office flexibility (e.g.,
   mobility across many access locations) introduces a set of challenges
   for large-scale enterprises compared to conventional network access management approaches.
   Examples of such challenges are listed below:</t>
      <ul spacing="normal">
        <li>
          <t>Endpoints do not have stable IP addresses.  For example, Wireless
LAN (WLAN) and VPN clients, as well as back-end Virtual Machine
(VM)-based servers, can move; their IP addresses could change as a
result.  This means that relying on IP/transport fields (e.g., the
5-tuple) is inadequate to ensure consistent and efficient security
policy enforcement.  IP address-based policies may not be flexible
enough to accommodate endpoints with volatile IP addresses.</t>
        </li>
        <li>
          <t>With the massive adoption of teleworking, there is a need to
apply different security policies to the same set of users under
different circumstances (e.g., prevent relaying attacks against a
local attachment point to the enterprise network).  For example,
network access might be granted based upon criteria such as users'
access location, source network reputation, users' role, time-of-
day, type of network device used (e.g., corporate issued device
versus personal device), device's security posture, etc.  This
means that the network needs to recognize the users' identity and their
current context, and map the users to their correct access
entitlement to the network.</t>
        </li>
      </ul>
      <t>This document defines a YANG data model (<xref target="sec-UCL"/>) for policy-based network access control,
   which extends the IETF Access Control Lists (ACLs) module defined in <xref target="RFC8519"/>.
   This module can be used to ensure consistent enforcement of ACL policies
   based on the group identity.</t>
      <t>The ACL concept has been generalized to be device-nonspecific, and can be
   defined at network/administrative domain level <xref target="I-D.ietf-netmod-acl-extensions"/>. To
   allow for all applications of ACLs, the YANG module for policy-based network
   ACL defined in <xref target="sec-UCL"/> does not limit how it can be used.</t>
      <t>This document also defines a mechanism to establish a mapping between (1) the
   user group identifier (ID) and (2) common IP packet header fields and other
   encapsulating packet data (e.g., MAC address) to execute the policy-based access control.</t>
      <t>Additionally, the document defines a Remote Authentication Dial-in
   User Service (RADIUS) <xref target="RFC2865"/> attribute that is used to
   communicate the user group identifier as part of identification and
   authorization information (<xref target="sec-radius"/>).</t>
      <t>Although the document cites MAC addresses as an example in some sections, the
   document does not make assumptions about which identifiers are used to trigger ACLs.
   These examples should not be considered as recommendations. Readers should be
   aware that MAC-based ACLs can be bypassed by flushing out the MAC address.
   Other implications related to the change of MAC addresses are discussed in
   <xref target="I-D.ietf-madinas-use-cases"/>.</t>
      <t>The document does not specify how to map the policy group identifiers
   to dedicated fields (e.g.,  Group Based Policy (GBP) discussed in <xref section="6.2.3" sectionFormat="of" target="I-D.ietf-nvo3-encap"/>).</t>
      <t>The YANG data model in this document conforms to the Network
   Management Datastore Architecture (NMDA) defined in <xref target="RFC8342"/>.</t>
      <section anchor="editorial-note-to-be-removed-by-rfc-editor">
        <name>Editorial Note (To be removed by RFC Editor)</name>
        <t>Note to the RFC Editor: This section is to be removed prior to publication.</t>
        <t>This document contains placeholder values that need to be replaced with finalized
   values at the time of publication.  This note summarizes all of the
   substitutions that are needed.  No other RFC Editor instructions are specified
   elsewhere in this document.</t>
        <t>Please apply the following replacements:</t>
        <ul spacing="normal">
          <li>
            <t>XXXX --&gt; the assigned RFC number for this document</t>
          </li>
          <li>
            <t>SSSS --&gt; the assigned RFC number for <xref target="I-D.ietf-netmod-schedule-yang"/></t>
          </li>
          <li>
            <t>2023-01-19 --&gt; the actual date of the publication of this document</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The meanings of the symbols in tree diagrams are defined in
   <xref target="RFC8340"/>.</t>
      <t>The document uses the following definition in <xref target="RFC3198"/>:</t>
      <ul spacing="normal">
        <li>
          <t>policy</t>
        </li>
      </ul>
      <t>The document uses the following definitions and acronyms defined in <xref target="RFC8519"/>:</t>
      <ul spacing="normal">
        <li>
          <t>Access Control Entry (ACE)</t>
        </li>
        <li>
          <t>Access Control List (ACL)</t>
        </li>
      </ul>
      <t>The following definitions and acronyms are used throughout this document:</t>
      <ul spacing="normal">
        <li>
          <dl>
            <dt>User group based Control List (UCL) model:</dt>
            <dd>
              <t>A YANG data model for policy-based network access
control that specifies an extension to the "ietf-access-control-list" model <xref target="RFC8519"/>.
It allows policy enforcement based on the group identity, which can be used
both at the network device level and at the network/administrative domain level.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Endpoint:</dt>
            <dd>
              <t>refers to an end-user, host device, or application that actually connects to a network.
An end-user is defined as a person. A host device provides compute, memory,
storage and networking capabilities and connects to the network without any user intervention. Host devices refer to servers, IoTs and other devices owned
by the enterprise. An application is a software program used for a specific service.</t>
            </dd>
          </dl>
        </li>
      </ul>
    </section>
    <section anchor="sample-usage">
      <name>Sample Usage</name>
      <t>Access to some networks (e.g., enterprise networks) requires to
   recognize the users’ identities no matter how, where, and when they
   connect to the network resources.  Then, the network maps the
   (connecting) users to their access authorization rights.  Such rights
   are defined following local policies.  As discussed in <xref target="intro"/>,
   because (1) there is a large number of users and (2) a user may have different
   source IP addresses in different network segments,
   deploying a network access control policy for each IP address or
   network segment is a heavy workload.  An alternate approach is to
   configure endpoint groups to classify users and enterprise devices
   and associate ACLs with endpoint groups so that endpoints in each
   group can share a group of ACL rules.  This approach greatly reduces
   the workload of the administrators and optimizes the ACL resources.</t>
      <t>The network ACLs can be provisioned on devices using specific
   mechanisms, such as <xref target="RFC8519"/> or <xref target="I-D.ietf-netmod-acl-extensions"/>.</t>
      <t>Different policies may need to be applied in different contextual situations.
   For example, companies may restrict (or grant) employees access to specific
   internal or external resources during work hours,
   while another policy is adopted during off-hours and weekends.  A
   network administrator may also require to enforce traffic shaping
   (<xref section="2.3.3.3" sectionFormat="of" target="RFC2475"/>) and policing (
   <xref section="2.3.3.4" sectionFormat="of" target="RFC2475"/>) during peak hours in order not to affect other data
   services.</t>
    </section>
    <section anchor="policy-based-network-access-control">
      <name>Policy-based Network Access Control</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>The architecture of a system that provides real-time and consistent
   enforcement of access control policies is shown in <xref target="arch"/>. This architecture
   includes the following functional entities and interfaces:</t>
        <ul spacing="normal">
          <li>
            <t>A service orchestrator which coordinates the overall service,
including security policies.  The service may be connectivity or
any other access to resources that can be hosted and offered by a network.</t>
          </li>
          <li>
            <t>A software-defined networking (SDN) <xref target="RFC7149"/> <xref target="RFC7426"/> controller which is
responsible for maintaining endpoint-group based ACLs and mapping the
endpoint-group to the associated attributes information (e.g., IP/MAC address).
An SDN controller also behaves as a Policy Decision Point (PDP) <xref target="RFC3198"/>
and pushes the required access control policies to relevant Policy
Enforcement Points (PEPs) <xref target="RFC3198"/>.  A PDP is also known as
"policy server" <xref target="RFC2753"/>.  </t>
            <t>
An SDN controller may interact with an Authentication,
Authorization and Accounting (AAA) <xref target="RFC3539"/> server or a Network Access Server (NAS) <xref target="RFC7542"/>.</t>
          </li>
          <li>
            <t>A Network Access Server (NAS) entity which handles authentication
requests.  The NAS interacts with an AAA server to complete user
authentication using protocols like RADIUS <xref target="RFC2865"/>. When access is granted, the AAA
server provides the group identifier (group ID) to which the user
belongs when the user first logs onto the network. A new RADIUS attribute
is defined in <xref target="sec-radius"/> for this purpose.</t>
          </li>
          <li>
            <t>The AAA server provides a collection of authentication, authorization,
and accounting functions. The AAA server is responsible for centralized user
information management. The AAA server is preconfigured with user
credentials (e.g., user name and password), possible group identities
and related user attributes (users may be divided into different
groups based on different user attributes).</t>
          </li>
          <li>
            <t>The Policy Enforcement Point (PEP) is the central entity
which is responsible for enforcing appropriate access control
policies. A first deployment scenario assumes that
the SDN controller maps the group ID to the related common packet
header and delivers IP/MAC address based ACL policies to the
required PEPs.  Another deployment scenario may require that PEPs map incoming packets to their
associated source and/or destination endpoint-group IDs, and acts upon
the endpoint-group ID based ACL policies (e.g., a group identifier may be carried in packet headers such as discussed in
<xref section="6.2.3" sectionFormat="of" target="I-D.ietf-nvo3-encap"/>). More details are provided in <xref target="implement-considerations"/>.  </t>
            <t>
Multiple PEPs may be involved in a network.  </t>
            <t>
A PEP exposes a NETCONF interface <xref target="RFC6241"/> to an SDN controller.</t>
          </li>
        </ul>
        <t><xref target="arch"/> provides the overall architecture and procedure for
   policy-based access control management.</t>
        <figure anchor="arch">
          <name>An Architecture for Group-based Policy Management</name>
          <artwork align="center"><![CDATA[
                                         .------------.
                                         |Orchestrator|
                                         '------+-----'
       Service                                  | (Step 1)
      --------------------------------------------------------
                                                |
       Network                                  |
                                 (Step 4)       |
       .-------.        .--------.     .--------+-----------.
       |User #1+--+     | AAA    |     |    SDN Controller  |
       '-------'  |     | Server +-----+        (PDP)       |
                  |     '----+---'     '--------+-----------'
                  |          |                  |
                  |          |           +------+--------+(Step 5)
        (Step 2)  |          |(Step 3)   |               |
                  |          |           |               |
                  |        .-+-----------+---------------+------------.
                  |        | .----------------------. .--------------.|
       .-------.  +--------+ | Network Access Server| |firewall, etc.||
       |User #2+-----------+ |       (NAS)          | '--------------'|
       '-------'           | '----------------------'                 |
                           |                     (PEP)                |
                           '------------------------------------------'
]]></artwork>
        </figure>
        <t>In reference to <xref target="arch"/>, the following typical flow is experienced:</t>
        <dl>
          <dt>Step 1:</dt>
          <dd>
            <t>Administrators (or a service orchestrator) configure an SDN
controller with network-level ACLs using the YANG module defined
in <xref target="sec-UCL"/>. An example is provided in <xref target="controller-ucl"/>.</t>
          </dd>
          <dt>Step 2:</dt>
          <dd>
            <t>When a user first logs onto the network, he/she is
required to be authenticated (e.g., using user name and password)
at the NAS.</t>
          </dd>
          <dt>Step 3:</dt>
          <dd>
            <t>The authentication request is then relayed to the AAA server
using a protocol such as RADIUS <xref target="RFC2865"/>. It is assumed that the
AAA server has been appropriately configured to store user credentials,
e.g., user name, password, group information, and other user attributes.
This document does not restrict what authentication method is used. Administrators
may refer to, e.g., <xref section="7.4" sectionFormat="of" target="I-D.ietf-radext-deprecating-radius"/>
for authentication method recommendations.
If the authentication request succeeds, the user is placed in a
user group the identity of which is returned to the network access server
as the authentication result (see <xref target="sec-radius"/>).
If the authentication fails, the user is not assigned any user
group, which also means that the user has no access; or the user
is assigned a special group with very limited access permissions
for the network (as a function of the local policy). ACLs are
enforced so that flows from that IP address are discarded
(or rate-limited) by the network.
In some implementations, AAA server can be integrated with an SDN controller.</t>
          </dd>
          <dt>Step 4:</dt>
          <dd>
            <t>Either the AAA server or the NAS notifies an SDN controller
of the mapping between the user group ID and related common packet
header attributes (e.g., IP/MAC address).</t>
          </dd>
          <dt>Step 5:</dt>
          <dd>
            <t>Either group or IP/MAC address based access control policies
are maintained on relevant PEPs under the SDN controller's management.
Whether the PEP enforces the group or IP/MAC address based ACL is
implementation specific. Both types of ACL policy may exist on
the PEP. <xref target="PEP-ucl"/> and <xref target="PEP-acl"/> elaborate on each case.</t>
          </dd>
        </dl>
      </section>
      <section anchor="endpoint-group">
        <name>Endpoint Group</name>
        <section anchor="user-group">
          <name>User Group</name>
          <t>The user group is determined by a set of predefined policy criteria
   (e.g., source IP address, geolocation data, time of day, or device certificate).
   It uses an identifier (user group ID) to represent the collective identity of
   a group of users. Users may be moved to different user-groups if their
   composite attributes, environment, and/or local enterprise policy change.</t>
          <t>A user is authenticated, and classified at the AAA server, and
   assigned to a user group.  A user's group membership may change as
   aspects of the user change.  For example, if the user group
   membership is determined solely by the source IP address, then a
   given user's group ID will change when the user moves to a new
   IP address that falls outside of the range of addresses of the
   previous user group.</t>
          <t>This document does not make any assumption about how user groups are
   defined.  Such considerations are deployment specific and are out of
   scope.  However, and for illustration purposes, <xref target="ug-example"/> shows
   an example of how user group definitions may be characterized. User
   groups may share several common criteria.  That is, user group
   criteria are not mutually exclusive.  For example, the policy
   criteria of user groups R&amp;D Regular and R&amp;D BYOD may share the same
   set of users that belong to the R&amp;D organization, and differ only in
   the type of clients (firm-issued clients vs. users' personal
   clients).  Likewise, the same user may be assigned to different user
   groups depending on the time of day or the type of day (e.g.,
   weekdays versus weekends), etc.</t>
          <table anchor="ug-example">
            <name>User Group Example</name>
            <thead>
              <tr>
                <th align="left">Group Name</th>
                <th align="left">Group ID</th>
                <th align="left">Group Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">R&amp;D</td>
                <td align="left">foo-10</td>
                <td align="left">R&amp;D employees</td>
              </tr>
              <tr>
                <td align="left">R&amp;D BYOD</td>
                <td align="left">foo-11</td>
                <td align="left">Personal devices of R&amp;D employees</td>
              </tr>
              <tr>
                <td align="left">Sales</td>
                <td align="left">foo-20</td>
                <td align="left">Sales employees</td>
              </tr>
              <tr>
                <td align="left">VIP</td>
                <td align="left">foo-30</td>
                <td align="left">VIP employees</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="device-group">
          <name>Device Group</name>
          <t>The device-group ID is an identifier that represents the collective
   identity of a group of enterprise end devices.  An enterprise device
   could be a server that hosts applications or software that deliver
   services to enterprise users.  It could also be an enterprise IoT
   device that serve a limited purpose, e.g., a printer that allows
   users to scan, print and send emails. <xref target="dg-example"/> shows an example
   of how device-group definitions may be characterized.</t>
          <table anchor="dg-example">
            <name>Device-Group Example</name>
            <thead>
              <tr>
                <th align="left">Group Name</th>
                <th align="left">Group ID</th>
                <th align="left">Group Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Workflow</td>
                <td align="left">bar-40</td>
                <td align="left">Workflow  resource servers</td>
              </tr>
              <tr>
                <td align="left">R&amp;D Resource</td>
                <td align="left">bar-50</td>
                <td align="left">R&amp;D resource servers</td>
              </tr>
              <tr>
                <td align="left">Printer Resource</td>
                <td align="left">bar-60</td>
                <td align="left">Printer resources</td>
              </tr>
            </tbody>
          </table>
          <t>Users accessing an enterprise device should be strictly controlled.
   Matching abstract device group ID instead of specified addresses in
   ACL polices helps shield the consequences of address change (e.g.,
   back-end VM-based server migration).</t>
        </section>
        <section anchor="application-group">
          <name>Application Group</name>
          <t>An application group is a collection of applications that share a common access control policies.
   A device may run multiple applications, and different policies might need to be
   applied to the applications and device. A single application may need to run on
   multiple devices/VMs/containers, the abstraction of application group eases the
   process of application migration. For example, the policy does not depend on the transport coordinates (i.e., 5-tuple).
   <xref target="ag-example"/> shows an example of how application-group definitions may be characterized.</t>
          <table anchor="ag-example">
            <name>Application-Group Example</name>
            <thead>
              <tr>
                <th align="left">Group Name</th>
                <th align="left">Group ID</th>
                <th align="left">Group Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Audio/Video Streaming</td>
                <td align="left">baz-70</td>
                <td align="left">Audio/Video conferecing application</td>
              </tr>
              <tr>
                <td align="left">Instant messaging</td>
                <td align="left">baz-80</td>
                <td align="left">Messaging application</td>
              </tr>
              <tr>
                <td align="left">document collaboration</td>
                <td align="left">baz-90</td>
                <td align="left">Real-time document editing application</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="modules-overview">
      <name>Modules Overview</name>
      <section anchor="the-ucl-extension-to-the-acl-model">
        <name>The UCL Extension to the ACL Model</name>
        <t>This module specifies an extension to the "ietf-access-control-list" module <xref target="RFC8519"/>. This extension adds
   endpoint groups so that an endpoint group identifier can be matched upon, and also
   enable access control policy activation based on date and time conditions.</t>
        <t><xref target="ucl-tree"/> provides the tree structure of the "ietf-ucl-acl" module.</t>
        <figure anchor="ucl-tree">
          <name>UCL Extension</name>
          <artwork align="center"><![CDATA[
module: ietf-ucl-acl

  augment /acl:acls:
    +--rw endpoint-groups {uacl:group}?
       +--rw endpoint-group* [group-id]
          +--rw group-id      string
          +--rw group-type?   identityref
  augment /acl:acls/acl:acl/acl:aces/acl:ace/acl:matches:
    +--rw endpoint-group {uacl:match-on-group}?
       +--rw source-group-id?        group-id-reference
       +--rw destination-group-id?   group-id-reference
  augment /acl:acls/acl:acl/acl:aces/acl:ace:
    +--rw effective-schedule {uacl:schedule}?
       +--rw (schedule-type)?
          +--:(period)
          |  +--rw period-description?       string
          |  +--rw period-start              yang:date-and-time
          |  +--rw time-zone-identifier?     sys:timezone-name
          |  +--rw (period-type)?
          |     +--:(explicit)
          |     |  +--rw period-end?         yang:date-and-time
          |     +--:(duration)
          |        +--rw duration?           duration
          +--:(recurrence) {schedule:icalendar-recurrence-supported}?
             +--rw recurrence-first
             |  +--rw date-time-start?        yang:date-and-time
             |  +--rw duration?               duration
             |  +--rw time-zone-identifier?   sys:timezone-name
             +--rw (recurrence-bound)?
             |  +--:(until)
             |  |  +--rw until?              yang:date-and-time
             |  +--:(count)
             |     +--rw count?              uint32
             +--rw recurrence-description?   string
             +--rw frequency                 identityref
             +--rw interval?                 uint32
             +--rw period* [period-start]
             |  +--rw period-description?     string
             |  +--rw period-start            yang:date-and-time
             |  +--rw time-zone-identifier?   sys:timezone-name
             |  +--rw (period-type)?
             |     +--:(explicit)
             |     |  +--rw period-end?       yang:date-and-time
             |     +--:(duration)
             |        +--rw duration?         duration
             +--rw bysecond*                 uint32
             +--rw byminute*                 uint32
             +--rw byhour*                   uint32
             +--rw byday* [weekday]
             |  +--rw direction*   int32
             |  +--rw weekday      schedule:weekday
             +--rw bymonthday*               int32
             +--rw byyearday*                int32
             +--rw byyearweek*               int32
             +--rw byyearmonth*              uint32
             +--rw bysetpos*                 int32
             +--rw workweek-start?           schedule:weekday
             +--rw exception-dates*          yang:date-and-time
]]></artwork>
        </figure>
        <t>The first part of the data model augments the "acl" list in the
   "ietf-access-control-list" model <xref target="RFC8519"/> with a "endpoint-groups" container
   having a list of "endpoint group" inside, each entry has a "group-id" that uniquely
   identifies the endpoint group and a "group-type" parameter to specify the endpoint group type.</t>
        <ul empty="true">
          <li>
            <t>"group-id" is defined as a string rather than uint to accommodate deployments which require some identification hierarchy within a domain. Such a hierarchy is meant to ease coordination within an administrative domain. There might be cases where a domain needs to tag packets with the group they belong to. The tagging does not need to mirror exactly the "group id" used to populate the policy. How the "group-id" string is mapped to the tagging or field in the packet header in encapsulation scenario is outside the scope of this document. Augmentation may be considered in the future to cover encapsulation considerations.</t>
          </li>
        </ul>
        <t>The second part of the data model augments the "matches" container in the IETF
   ACL model <xref target="RFC8519"/> so that a source and/or destination endpoint group index
   can be referenced as the match criteria.</t>
        <t>The third part of the data model augments the "ace" list in the "ietf-access-control-list"
   model <xref target="RFC8519"/> with date and time specific parameters to allow ACE to be
   activated based on a date/time condition. Two types of time range are defined,
   which reuse "recurrence" and "period" groupings defined in the "ietf-schedule"
   YANG module in <xref target="I-D.ietf-netmod-schedule-yang"/>, respectively. Note that the data model augments the definition of
   "recurrence" grouping with a "duration" data node to specify the duration of
   time for each occurrence the policy activation is triggered.</t>
      </section>
    </section>
    <section anchor="yang-modules">
      <name>YANG Modules</name>
      <section anchor="sec-UCL">
        <name>The "ietf-ucl-acl" YANG Module</name>
        <t>This module imports types and groupings defined in the "ietf-schedule" module
   <xref target="I-D.ietf-netmod-schedule-yang"/>. It also augments the "ietf-access-control-list" module <xref target="RFC8519"/>.</t>
        <sourcecode markers="true" name="ietf-ucl-acl@2023-01-19.yang"><![CDATA[
module ietf-ucl-acl {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-ucl-acl";
  prefix uacl;

  import ietf-access-control-list {
    prefix acl;
    reference
      "RFC 8519: YANG Data Model for Network Access
                 Control Lists (ACLs)";
  }
  import ietf-schedule {
    prefix schedule;
    reference
      "RFC SSSS: A Common YANG Data Model for Scheduling";
  }

  organization
    "IETF OPSWG Working Group";
  contact
    "WG Web: <https://datatracker.ietf.org/wg/opsawg/>
     WG List: <mailto:opsawg@ietf.org>

     Editor:   Qiufang Ma
               <mailto:maqiufang1@huawei.com
     Author:   Qin Wu
               <mailto:bill.wu@huawei.com>
     Editor:   Mohamed Boucadair
               <mailto:mohamed.boucadair@orange.com>
     Author:   Daniel King
               <mailto:d.king@lancaster.ac.uk>";
  description
    "This YANG module augments the IETF access control lists (ACLs)
     module and is meant to ensure consistent enforcement of ACL
     policies based on the group identity.

     Copyright (c) 2024 IETF Trust and the persons identified
     as authors of the code. All rights reserved.

     Redistribution and use in source and binary forms, with
     or without modification, is permitted pursuant to, and
     subject to the license terms contained in, the Revised
     BSD License set forth in Section 4.c of the IETF Trust's
     Legal Provisions Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC
     itself for full legal notices.";

  revision 2023-01-19 {
    description
      "Initial revision.";
    reference
      "RFC XXXX: A YANG Data Model and RADIUS Extension for
                 Policy-based Network Access Control";
  }

  feature schedule {
    description
      "Indicates support of schedule-based ACEs.";
  }

  feature match-on-group {
    description
      "Indicates support of matching on endpoint groups.";
  }
  
  feature group {
    if-feature "uacl:match-on-group";
    description
      "Indicates support of group-based ACLs.";
  }
  
  feature mixed-ipv4-group {
    if-feature "acl:match-on-ipv4 and uacl:match-on-group";
    description
      "IPv4 and group ACL combinations supported.";
  }
  
  feature mixed-ipv6-group {
    if-feature "acl:match-on-ipv6 and uacl:match-on-group";
    description
      "IPv6 and group ACL combinations supported.";
  }
  
  feature mixed-ipv4-ipv6-group {
    if-feature "acl:match-on-ipv4 and acl:match-on-ipv6 and "
             + "uacl:match-on-group";
    description
      "IPv4, IPv6, and group ACL combinations supported.";
  }
  
  feature mixed-eth-group {
    if-feature "acl:match-on-eth and uacl:match-on-group";
    description
      "Eth and group ACL combinations supported.";    
  }
  
  feature mixed-eth-ipv4-group {
    if-feature "acl:match-on-eth and acl:match-on-ipv4 and "
             + "uacl:match-on-group";
    description
      "Eth, IPv4, and group ACL combinations supported.";       
  }
  
  feature mixed-eth-ipv6-group {
    if-feature "acl:match-on-eth and acl:match-on-ipv6 and "
             + "uacl:match-on-group";
    description
      "Eth, IPv6, and group ACL combinations supported.";    
  }
  
  feature mixed-eth-ipv4-ipv6-group {
    if-feature "acl:match-on-eth and acl:match-on-ipv4 and "
             + "acl:match-on-ipv6 and uacl:match-on-group";
    description
      "Eth, IPv4, IPv6, and group ACL combinations supported.";   
  }

  identity group-acl-type {
    if-feature "group";
    base acl:acl-base;
    description
      "An Access Control List (ACL) that matches based on an endpoint
       group identity, which can represent the collective identity of
       a group of authenticated users, end devices, or applications.
       An endpoint group identity may be carried in the outer/inner 
       packet header (e.g., via NVO3 encapsulation), may also not 
       correspond to any field in the packet header. Matching on 
       Layer 4 header fields may also exist in the Access Control 
       Entries (ACEs).";
  }
  
  identity mixed-ipv4-group-type {
    if-feature "mixed-ipv4-group";
    base acl:ipv4-acl-type;
    base uacl:group-acl-type;
    description
      "An ACL that contains a mix of entries that match on fields
       in the IPv4 header and endpoint group identities, which can
       represent the collective identity of a group of authenticated
       users, end devices, or applications. Matching on Layer 4 
       header fields may also exist in the ACEs.";
  }
  
  identity mixed-ipv6-group-type {
    if-feature "mixed-ipv6-group";
    base acl:ipv6-acl-type;
    base uacl:group-acl-type;
    description
      "An ACL that contains a mix of entries that match on fields
       in the IPv6 header and endpoint group identities, which can
       represent the collective identity of a group of authenticated
       users, end devices, or applications. Matching on Layer 4 
       header fields may also exist in the ACEs.";
  }
  
  identity mixed-ipv4-ipv6-group-type {
    if-feature "mixed-ipv4-ipv6-group";
    base acl:ipv4-acl-type;
    base acl:ipv6-acl-type;
    base uacl:group-acl-type;
    description
      "An ACL that contains a mix of entries that match on fields
       in the IPv4 header, IPv6 header, and endpoint group identities,
       which can represent the collective identity of a group of
       authenticated users, end devices, or applications. Matching 
       on Layer 4 header fields may also exist in the ACEs.";
  }
  
  identity mixed-eth-group-type {
    if-feature "mixed-eth-group";
    base acl:eth-acl-type;
    base uacl:group-acl-type;
    description
      "An ACL that contains a mix of entries that match on fields
       in the Ethernet header and endpoint group identities,
       which can represent the collective identity of a group of
       authenticated users, end devices, or applications. Matching 
       on Layer 4 header fields may also exist in the ACEs.";
  }
  
  identity mixed-eth-ipv4-group-type {
    if-feature "mixed-eth-ipv4-group";
    base acl:eth-acl-type;
    base acl:ipv4-acl-type;
    base uacl:group-acl-type;
    description
      "An ACL that contains a mix of entries that match on fields
       in the Ethernet header, IPv4 header, and endpoint group 
       identities, which can represent the collective identity of a 
       group of authenticated users, end devices or applications. 
       Matching on Layer 4 header fields may also exist in the
       ACEs.";
  }  
  
  identity mixed-eth-ipv6-group-type {
    if-feature "mixed-eth-ipv6-group";
    base acl:eth-acl-type;
    base acl:ipv6-acl-type;
    base uacl:group-acl-type;
    description
      "An ACL that contains a mix of entries that match on fields
       in the Ethernet header, IPv6 header, and endpoint group 
       identities, which can represent the collective identity of 
       a group of authenticated users, end devices or applications. 
       Matching on Layer 4 header fields may also exist in the
       ACEs.";
  }  
  
  identity mixed-eth-ipv4-ipv6-group-type {
    if-feature "mixed-eth-ipv4-ipv6-group";
    base acl:eth-acl-type;
    base acl:ipv4-acl-type;    
    base acl:ipv6-acl-type;
    base uacl:group-acl-type;
    description
      "An ACL that contains a mix of entries that match on fields
       in the Ethernet header, IPv4 header, IPv6 header, and endpoint 
       group identities, which can represent the collective identity 
       of a group of authenticated users, end devices or 
       applications. Matching on Layer 4 header fields may also exist 
       in the ACEs.";
  }  
    
  identity endpoint-group-type {
    description
      "Identity for the type of endpoint group.";
  }
  
  identity user-group {
    base uacl:endpoint-group-type;
    description
      "Identity for the user endpoint group.";
  }
  
  identity device-group {
    base uacl:endpoint-group-type;
    description
      "Identity for the device endpoint group.";
  }
  
  identity application-group {
    base uacl:endpoint-group-type;
    description
      "Identity for the application endpoint group.";
  }
  
  typedef group-id-reference {
    type leafref {
      path "/acl:acls/uacl:endpoint-groups"
         + "/uacl:endpoint-group/uacl:group-id";
    }
    description
      "Defines a reference to a group identifier.";
  }

  augment "/acl:acls" {
    if-feature "uacl:group";
    description
      "Adds a container for endpoint group definition.";
    container endpoint-groups {
      description
        "Defines a container for the endpoint group list.";
      list endpoint-group {
        key "group-id";
        description
          "Definition of the endpoint group list.";
        leaf group-id {
          type string {
            length "1..64";
          }
          description
            "The endpoint group identifier that uniquely identifies
             an endpoint group.";
        }
        leaf group-type {
          type identityref {
            base endpoint-group-type;
          }
          description
            "Specifies the endpoint group type.";
        }
      }
    }
  }

  augment "/acl:acls/acl:acl/acl:aces/acl:ace/acl:matches" {
    if-feature "uacl:match-on-group";
    description
      "Specifies how a source and/or destination endpoint group 
       index can be referenced as the match criteria in the ACEs.";
    container endpoint-group {
      when "derived-from-or-self(/acl:acls/acl:acl/acl:type, "
         + "'uacl:group-acl-type')";
      description
        "Adds new match types.";
      leaf source-group-id {
        type group-id-reference;
        description
          "The matched source endpoint group ID.";
      }
      leaf destination-group-id {
        type group-id-reference;
        description
          "The matched destination endpoint group ID.";
      }
    }
  }

  augment "/acl:acls/acl:acl/acl:aces/acl:ace" {
    if-feature "uacl:schedule";
    description
      "Adds schedule parameters to allow the ACE to take effect  
       based on date and time.";
    container effective-schedule {
      description
        "Defines when the access control entry rules 
         are in effect based on date and time condition.

         If it is not configured, the access control entry
         is immediately and always in effect.";
      choice schedule-type {
        description
          "Choice based on the type of the time range.";
        case period {
          description
            "The ACE takes effect based on a precise period of 
             time.";        
            uses schedule:period-of-time;
        }
        case recurrence {
          if-feature "schedule:icalendar-recurrence-supported";
          description
            "The ACE takes effect based on a recurrence rule.";
          uses schedule:icalendar-recurrence;          
        }
      }
    }
  }
}

]]></sourcecode>
      </section>
    </section>
    <section anchor="sec-radius">
      <name>User Access Control Group ID RADIUS Attribute</name>
      <t>The User-Access-Group-ID RADIUS attribute is
defined with a globally unique name. The definition of the attribute
follows the guidelines in <xref section="2.7.1" sectionFormat="of" target="RFC6929"/>.  This attribute
is used to indicate the user group ID to be used by the NAS.  When
the User-Access-Group-ID RADIUS attribute is present in the RADIUS
Access-Accept, the system applies the related access control to the
users after it authenticates.</t>
      <t>The User-Access-Group-ID Attribute is of type "string" as defined in
<xref section="3.5" sectionFormat="of" target="RFC8044"/>.</t>
      <t>The User-Access-Group-ID Attribute <bcp14>MAY</bcp14> appear in a RADIUS
Access-Accept packet.  It <bcp14>MAY</bcp14> also appear in a RADIUS Access-Request packet
as a hint to the RADIUS server to indicate a preference.  However,
the server is not required to honor such a preference. If more than
one instance of the User-Access-Group-ID Attribute appears in a RADIUS
Access-Accept packet, this means that the user is a member of many groups.</t>
      <t>The User-Access-Group-ID Attribute <bcp14>MAY</bcp14> appear in a RADIUS CoA-Request
packet.</t>
      <t>The User-Access-Group-ID Attribute <bcp14>MAY</bcp14> appear in a RADIUS Accounting-Request
packet. Specifically, this may be used by a NAS to acknowledge that the attribute
was received in the RADIUS Access-Request and the NAS is enforcing that policy.</t>
      <t>The User-Access-Group-ID Attribute <bcp14>MUST NOT</bcp14> appear in any other
RADIUS packet.</t>
      <t>The User-Access-Group-ID Attribute is structured as follows:</t>
      <dl newline="true">
        <dt>Type</dt>
        <dd>
          <t>TBA1</t>
        </dd>
        <dt>Length</dt>
        <dd>
          <t>This field indicates the total length, in octets, of all fields of
   this attribute, including the Type, Length, Extended-Type, and the
   "Value".</t>
        </dd>
        <dt/>
        <dd>
          <t>The Length <bcp14>MUST</bcp14> be at most 67 octets.</t>
        </dd>
        <dt>Data Type</dt>
        <dd>
          <t>string (<xref section="3.5" sectionFormat="of" target="RFC8044"/>)</t>
        </dd>
        <dt>Value</dt>
        <dd>
          <t>This field contains the user group ID.</t>
        </dd>
      </dl>
    </section>
    <section anchor="radius-attributes">
      <name>RADIUS Attributes</name>
      <t><xref target="rad-att"/> provides a guide as what type of RADIUS packets
   that may contain User-Access-Group-ID Attribute, and in what
   quantity.</t>
      <table anchor="rad-att">
        <name>Table of Attributes</name>
        <thead>
          <tr>
            <th align="left">Access-Request</th>
            <th align="left">Access-Accept</th>
            <th align="left">Access-Reject</th>
            <th align="left">Challenge</th>
            <th align="left">Attribute</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0+</td>
            <td align="left">0+</td>
            <td align="left">0</td>
            <td align="left">0</td>
            <td align="left">User-Access-Group-ID</td>
          </tr>
          <tr>
            <td align="left">Accounting-Request</td>
            <td align="left">CoA-Request</td>
            <td align="left">CoA-ACK</td>
            <td align="left">CoA-NACK</td>
            <td align="left">Attribute</td>
          </tr>
          <tr>
            <td align="left">0+</td>
            <td align="left">0+</td>
            <td align="left">0</td>
            <td align="left">0</td>
            <td align="left">User-Access-Group-ID</td>
          </tr>
        </tbody>
      </table>
      <t>Notation for <xref target="rad-att"/>:</t>
      <dl>
        <dt>0</dt>
        <dd>
          <t>This attribute <bcp14>MUST NOT</bcp14> be present in packet.</t>
        </dd>
        <dt>0+</dt>
        <dd>
          <t>Zero or more instances of this attribute <bcp14>MAY</bcp14> be present in packet.</t>
        </dd>
      </dl>
    </section>
    <section anchor="implement-considerations">
      <name>Implementation Considerations</name>
      <t>The UCL model can be implemented in different ways.</t>
      <t>In some cases, the UCL model is implemented at the network/administrative domain
   level with an SDN controller maintaining the dynamical mapping from endpoint
   group ID to IP/transport fields (e.g., the 5-tuple) and programing the PEPs with
   IP address/5-tuple based ACLs. In such cases, PEPs do not require to implement
   specific logic (including hardware) compared to the enforcement of conventional ACLs.</t>
      <t>It is possible for the UCL model to be implemented at the network device level.
   While it eliminates the need for an SDN controller to interact frequently
   with the PEPs for reasons like the user's context of network connection change
   or VM/application migration, dedicated hardware/software support might be needed
   for PEPs to understand the endpoint group identifier. In scenrios where the NAS
   behaves as the PEP which acquires the source and/or destination endpoint group
   ID from the AAA server, ACL policy enforcement based on the group identity without
   being encapsulated into packet headers might affect the forwarding performance.
   Implementations need to evaluate the operational tradeoff (flexibility brought
   to the network vs. the complexity of implementation) carefully. Such assessment
   is out of scope of this document.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="yang">
        <name>YANG</name>
        <t>This section uses the template described in <xref section="3.7" sectionFormat="of" target="I-D.ietf-netmod-rfc8407bis"/>.</t>
        <t>The YANG modules specified in this document defines schema for data
   that is designed to be accessed via network management protocols such
   as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>.  The lowest NETCONF layer
   is the secure transport layer, and the mandatory-to-implement secure
   transport is Secure Shell (SSH) <xref target="RFC6242"/>.  The lowest RESTCONF layer
   is HTTPS, and the mandatory-to-implement secure transport is TLS
   <xref target="RFC8446"/>.</t>
        <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/>
   provides the means to restrict access for particular NETCONF or
   RESTCONF users to a preconfigured subset of all available NETCONF or
   RESTCONF protocol operations and content.</t>
        <t>There are a number of data nodes defined in the "ietf-ucl-acl" YANG module that are
   writable, creatable, and deletable (i.e., config true, which is the
   default).  These data nodes may be considered sensitive or vulnerable
   in some network environments. Write operations (e.g., edit-config) and delete
   operations to these data nodes without proper protection or authentication can
   have a negative effect on network operations. Specifically,
   the following subtrees and data nodes have particular sensitivities/vulnerabilities:</t>
        <ul spacing="normal">
          <li>
            <dl>
              <dt>/acl:acls/uacl:endpoint-groups/uacl:endpoint-group:</dt>
              <dd>
                <t>This list specifies all the endpoint group entries. Unauthorized write access to this
list can allow intruders to modify the entries so as to forge an endpoint
group that does not exist or maliciously delete an existing endpoint group,
which could be used to craft an attack.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>/acl:acls/acl:acl/acl:aces/acl:ace/acl:matches/uacl:endpoint-group:</dt>
              <dd>
                <t>This subtree specifies a source and/or endpoint group index as match criteria in the
ACEs. Unauthorized write access to this data node may allow intruders to
modify the group identity so as to permit access that should not be
permitted, or deny access that should be permitted.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <t>Some of the readable data nodes in the "ietf-ucl-acl" YANG module may
  be considered sensitive or vulnerable in some network environments. It
  is thus important to control read access (e.g., via get, get-config,
  or notification) to these data nodes.  Specifically,
  the following subtrees and data nodes have particular sensitivities/vulnerabilities:</t>
        <ul spacing="normal">
          <li>
            <dl>
              <dt>/acl:acls/acl:acl/acl:aces/acl:ace/uacl:time-range:</dt>
              <dd>
                <t>This subtree specifies when the access control entry rules are in effect. An
unauthorized read access of the list will allow the attacker to determine
which rules are in effect, to better craft an attack.</t>
              </dd>
            </dl>
          </li>
        </ul>
      </section>
      <section anchor="radius">
        <name>RADIUS</name>
        <t>RADIUS-related security considerations are discussed in <xref target="RFC2865"/>.</t>
        <t>This document targets deployments where a trusted relationship is in
   place between the RADIUS client and server with communication
   optionally secured by IPsec or Transport Layer Security (TLS)
   <xref target="RFC6614"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="yang-1">
        <name>YANG</name>
        <t>This document registers the following URIs in the "IETF XML Registry" <xref target="RFC3688"/>.</t>
        <artwork><![CDATA[
        URI: urn:ietf:params:xml:ns:yang:ietf-ucl-acl
        Registrant Contact: The IESG.
        XML: N/A, the requested URI is an XML namespace.
]]></artwork>
        <t>This document registers the following YANG modules in the "YANG Module Names"
   registry <xref target="RFC6020"/>.</t>
        <artwork><![CDATA[
        name:               ietf-ucl-acl
        prefix:             uacl
        namespace:          urn:ietf:params:xml:ns:yang:ietf-ucl-acl
        maintained by IANA? N
        reference:          RFC XXXX
]]></artwork>
      </section>
      <section anchor="radius-1">
        <name>RADIUS</name>
        <t>This document requests IANA to assign a new RADIUS attribute type from the IANA
   registry "Radius Attribute Types" <xref target="RADIUS-Types"/>:</t>
        <table anchor="rad-reg">
          <name>RADIUS Attribute</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Description</th>
              <th align="left">Data Type</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBA1</td>
              <td align="left">User-Access-Group-ID</td>
              <td align="left">string</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8519">
          <front>
            <title>YANG Data Model for Network Access Control Lists (ACLs)</title>
            <author fullname="M. Jethanandani" initials="M." surname="Jethanandani"/>
            <author fullname="S. Agarwal" initials="S." surname="Agarwal"/>
            <author fullname="L. Huang" initials="L." surname="Huang"/>
            <author fullname="D. Blair" initials="D." surname="Blair"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document defines a data model for Access Control Lists (ACLs). An ACL is a user-ordered set of rules used to configure the forwarding behavior in a device. Each rule is used to find a match on a packet and define actions that will be performed on the packet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8519"/>
          <seriesInfo name="DOI" value="10.17487/RFC8519"/>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-schedule-yang">
          <front>
            <title>A Common YANG Data Model for Scheduling</title>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <date day="25" month="June" year="2024"/>
            <abstract>
              <t>   This document defines a common schedule YANG module which is designed
   to be applicable for scheduling purposes such as event, policy,
   services, or resources based on date and time.  For the sake of
   better modularity, the module includes basic, intermediate, and
   advanced versions of recurrence related groupings.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-schedule-yang-02"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6929">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS) Protocol Extensions</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <author fullname="A. Lior" initials="A." surname="Lior"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Remote Authentication Dial-In User Service (RADIUS) protocol is nearing exhaustion of its current 8-bit Attribute Type space. In addition, experience shows a growing need for complex grouping, along with attributes that can carry more than 253 octets of data. This document defines changes to RADIUS that address all of the above problems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6929"/>
          <seriesInfo name="DOI" value="10.17487/RFC6929"/>
        </reference>
        <reference anchor="RFC8044">
          <front>
            <title>Data Types in RADIUS</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>RADIUS specifications have used data types for two decades without defining them as managed entities. During this time, RADIUS implementations have named the data types and have used them in attribute definitions. This document updates the specifications to better follow established practice. We do this by naming the data types defined in RFC 6158, which have been used since at least the publication of RFC 2865. We provide an IANA registry for the data types and update the "RADIUS Attribute Types" registry to include a Data Type field for each attribute. Finally, we recommend that authors of RADIUS specifications use these types in preference to existing practice. This document updates RFCs 2865, 3162, 4072, 6158, 6572, and 7268.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8044"/>
          <seriesInfo name="DOI" value="10.17487/RFC8044"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RADIUS-Types" target="http://www.iana.org/assignments/radius-types">
          <front>
            <title>RADIUS Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-netmod-acl-extensions">
          <front>
            <title>Extensions to the Access Control Lists (ACLs) YANG Model</title>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="29" month="May" year="2024"/>
            <abstract>
              <t>   RFC 8519 defines a YANG data model for Access Control Lists (ACLs).
   This document discusses a set of extensions that fix many of the
   limitations of the ACL model as initially defined in RFC 8519.

   The document also defines IANA-maintained modules for ICMP types and
   IPv6 extension headers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-acl-extensions-10"/>
        </reference>
        <reference anchor="I-D.ietf-madinas-use-cases">
          <front>
            <title>Randomized and Changing MAC Address Use Cases</title>
            <author fullname="Jerome Henry" initials="J." surname="Henry">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Yiu Lee" initials="Y." surname="Lee">
              <organization>Comcast</organization>
            </author>
            <date day="23" month="June" year="2024"/>
            <abstract>
              <t>   To limit the privacy issues created by the association between a
   device, its traffic, its location and its user, client and client OS
   vendors have started implementing MAC address rotation.  When such a
   rotation happens, some in-network states may break, which may affect
   network connectivity and user experience.  At the same time, devices
   may continue using other stable identifiers, defeating the MAC
   rotation purposes.  This document lists various network environments
   and a set of network services that may be affected by such rotation.
   This document then examines settings where the user experience may be
   affected by in-network state disruption.  Last, this document
   examines solutions to maintain user privacy while preserving user
   quality of experience and network operation efficiency.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-madinas-use-cases-10"/>
        </reference>
        <reference anchor="I-D.ietf-nvo3-encap">
          <front>
            <title>Network Virtualization Overlays (NVO3) Encapsulation Considerations</title>
            <author fullname="Sami Boutros" initials="S." surname="Boutros">
              <organization>Ciena Corporation</organization>
            </author>
            <author fullname="Donald E. Eastlake 3rd" initials="D. E." surname="Eastlake">
              <organization>Futurewei Technologies</organization>
            </author>
            <date day="19" month="February" year="2024"/>
            <abstract>
              <t>   The IETF Network Virtualization Overlays (NVO3) Working Group
   developed considerations for a common encapsulation that addresses
   various network virtualization overlay technical concerns.  This
   document provides a record, for the benefit of the IETF community, of
   the considerations arrived at starting from the output of an NVO3
   encapsulation design team.  These considerations may be helpful with
   future deliberations by working groups over the choice of
   encapsulation formats.

   There are implications of having different encapsulations in real
   environments consisting of both software and hardware implementations
   and within and spanning multiple data centers.  For example, OAM
   functions such as path MTU discovery become challenging with multiple
   encapsulations along the data path.

   Based on these considerations, the Working Group determined that
   Geneve with a few modifications as the common encapsulation.  This
   document provides more details, particularly in Section 7.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nvo3-encap-12"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC3198">
          <front>
            <title>Terminology for Policy-Based Management</title>
            <author fullname="A. Westerinen" initials="A." surname="Westerinen"/>
            <author fullname="J. Schnizlein" initials="J." surname="Schnizlein"/>
            <author fullname="J. Strassner" initials="J." surname="Strassner"/>
            <author fullname="M. Scherling" initials="M." surname="Scherling"/>
            <author fullname="B. Quinn" initials="B." surname="Quinn"/>
            <author fullname="S. Herzog" initials="S." surname="Herzog"/>
            <author fullname="A. Huynh" initials="A." surname="Huynh"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="J. Perry" initials="J." surname="Perry"/>
            <author fullname="S. Waldbusser" initials="S." surname="Waldbusser"/>
            <date month="November" year="2001"/>
            <abstract>
              <t>This document is a glossary of policy-related terms. It provides abbreviations, explanations, and recommendations for use of these terms. The intent is to improve the comprehensibility and consistency of writing that deals with network policy, particularly Internet Standards documents (ISDs). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3198"/>
          <seriesInfo name="DOI" value="10.17487/RFC3198"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
        <reference anchor="RFC7149">
          <front>
            <title>Software-Defined Networking: A Perspective from within a Service Provider Environment</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="C. Jacquenet" initials="C." surname="Jacquenet"/>
            <date month="March" year="2014"/>
            <abstract>
              <t>Software-Defined Networking (SDN) has been one of the major buzz words of the networking industry for the past couple of years. And yet, no clear definition of what SDN actually covers has been broadly admitted so far. This document aims to clarify the SDN landscape by providing a perspective on requirements, issues, and other considerations about SDN, as seen from within a service provider environment.</t>
              <t>It is not meant to endlessly discuss what SDN truly means but rather to suggest a functional taxonomy of the techniques that can be used under an SDN umbrella and to elaborate on the various pending issues the combined activation of such techniques inevitably raises. As such, a definition of SDN is only mentioned for the sake of clarification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7149"/>
          <seriesInfo name="DOI" value="10.17487/RFC7149"/>
        </reference>
        <reference anchor="RFC7426">
          <front>
            <title>Software-Defined Networking (SDN): Layers and Architecture Terminology</title>
            <author fullname="E. Haleplidis" initials="E." role="editor" surname="Haleplidis"/>
            <author fullname="K. Pentikousis" initials="K." role="editor" surname="Pentikousis"/>
            <author fullname="S. Denazis" initials="S." surname="Denazis"/>
            <author fullname="J. Hadi Salim" initials="J." surname="Hadi Salim"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <author fullname="O. Koufopavlou" initials="O." surname="Koufopavlou"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>Software-Defined Networking (SDN) refers to a new approach for network programmability, that is, the capacity to initialize, control, change, and manage network behavior dynamically via open interfaces. SDN emphasizes the role of software in running networks through the introduction of an abstraction for the data forwarding plane and, by doing so, separates it from the control plane. This separation allows faster innovation cycles at both planes as experience has already shown. However, there is increasing confusion as to what exactly SDN is, what the layer structure is in an SDN architecture, and how layers interface with each other. This document, a product of the IRTF Software-Defined Networking Research Group (SDNRG), addresses these questions and provides a concise reference for the SDN research community based on relevant peer-reviewed literature, the RFC series, and relevant documents by other standards organizations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7426"/>
          <seriesInfo name="DOI" value="10.17487/RFC7426"/>
        </reference>
        <reference anchor="RFC2753">
          <front>
            <title>A Framework for Policy-based Admission Control</title>
            <author fullname="R. Yavatkar" initials="R." surname="Yavatkar"/>
            <author fullname="D. Pendarakis" initials="D." surname="Pendarakis"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="January" year="2000"/>
            <abstract>
              <t>This document is concerned with specifying a framework for providing policy-based control over admission control decisions. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2753"/>
          <seriesInfo name="DOI" value="10.17487/RFC2753"/>
        </reference>
        <reference anchor="RFC3539">
          <front>
            <title>Authentication, Authorization and Accounting (AAA) Transport Profile</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Wood" initials="J." surname="Wood"/>
            <date month="June" year="2003"/>
            <abstract>
              <t>This document discusses transport issues that arise within protocols for Authentication, Authorization and Accounting (AAA). It also provides recommendations on the use of transport by AAA protocols. This includes usage of standards-track RFCs as well as experimental proposals. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3539"/>
          <seriesInfo name="DOI" value="10.17487/RFC3539"/>
        </reference>
        <reference anchor="RFC7542">
          <front>
            <title>The Network Access Identifier</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>In order to provide inter-domain authentication services, it is necessary to have a standardized method that domains can use to identify each other's users. This document defines the syntax for the Network Access Identifier (NAI), the user identifier submitted by the client prior to accessing resources. This document is a revised version of RFC 4282. It addresses issues with international character sets and makes a number of other corrections to RFC 4282.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7542"/>
          <seriesInfo name="DOI" value="10.17487/RFC7542"/>
        </reference>
        <reference anchor="I-D.ietf-radext-deprecating-radius">
          <front>
            <title>Deprecating Insecure Practices in RADIUS</title>
            <author fullname="Alan DeKok" initials="A." surname="DeKok">
              <organization>FreeRADIUS</organization>
            </author>
            <date day="29" month="April" year="2024"/>
            <abstract>
              <t>   RADIUS crypto-agility was first mandated as future work by RFC 6421.
   The outcome of that work was the publication of RADIUS over TLS (RFC
   6614) and RADIUS over DTLS (RFC 7360) as experimental documents.
   Those transport protocols have been in wide-spread use for many years
   in a wide range of networks.  They have proven their utility as
   replacements for the previous UDP (RFC 2865) and TCP (RFC 6613)
   transports.  With that knowledge, the continued use of insecure
   transports for RADIUS has serious and negative implications for
   privacy and security.

   It is no longer acceptable for RADIUS to rely on MD5 for security.
   It is no longer acceptable to send device or location information in
   clear text across the wider Internet.  This document therefore
   deprecates insecure uses of RADIUS, and mandates the use of secure
   TLS-based transport layers.  We also discuss related security issues
   with RADIUS, and give many recommendations for practices which
   increase security and privacy.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-radext-deprecating-radius-01"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-rfc8407bis">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="21" month="June" year="2024"/>
            <abstract>
              <t>   This memo provides guidelines for authors and reviewers of
   specifications containing YANG modules, including IANA-maintained
   modules.  Recommendations and procedures are defined, which are
   intended to increase interoperability and usability of Network
   Configuration Protocol (NETCONF) and RESTCONF protocol
   implementations that utilize YANG modules.  This document obsoletes
   RFC 8407.

   Also, this document updates RFC 8126 by providing additional
   guidelines for writing the IANA considerations for RFCs that specify
   IANA-maintained modules.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-rfc8407bis-12"/>
        </reference>
        <reference anchor="RFC6614">
          <front>
            <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <author fullname="S. Venaas" initials="S." surname="Venaas"/>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6614"/>
          <seriesInfo name="DOI" value="10.17487/RFC6614"/>
        </reference>
        <reference anchor="I-D.smith-vxlan-group-policy">
          <front>
            <title>VXLAN Group Policy Option</title>
            <author fullname="Michael Smith" initials="M." surname="Smith">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Larry Kreeger" initials="L." surname="Kreeger">
              <organization>Arrcus, Inc.</organization>
            </author>
            <date day="22" month="October" year="2018"/>
            <abstract>
              <t>   This document defines a backward compatible extension to Virtual
   eXtensible Local Area Network (VXLAN) that allows a Tenant System
   Interface (TSI) Group Identifier to be carried for the purposes of
   policy enforcement.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-smith-vxlan-group-policy-05"/>
        </reference>
        <reference anchor="I-D.you-i2nsf-user-group-based-policy">
          <front>
            <title>User-group-based Security Policy for Service Layer</title>
            <author fullname="Jianjie You" initials="J." surname="You">
              <organization>Huawei</organization>
            </author>
            <author fullname="Myo Zarny" initials="M." surname="Zarny">
              <organization>Goldman Sachs</organization>
            </author>
            <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
              <organization>France Telecom</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>France Telecom</organization>
            </author>
            <author fullname="Yizhou Li" initials="Y." surname="Li">
              <organization>Huawei</organization>
            </author>
            <author fullname="John Strassner" initials="J." surname="Strassner">
              <organization>Huawei</organization>
            </author>
            <author fullname="Sumandra Majee" initials="S." surname="Majee">
              <organization>F5 Networks</organization>
            </author>
            <date day="8" month="July" year="2016"/>
            <abstract>
              <t>   This draft defines the User-group Aware Policy Control (UAPC)
   framework, which facilitates consistent enforcement of security
   policies based on user group identity.  Policies are used to control
   security policy enforcement using a policy server and a security
   controller.  Northbound APIs are also discussed.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-you-i2nsf-user-group-based-policy-02"/>
        </reference>
        <reference anchor="I-D.yizhou-anima-ip-to-access-control-groups">
          <front>
            <title>Autonomic IP Address To Access Control Group ID Mapping</title>
            <author fullname="Yizhou Li" initials="Y." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Shen" initials="L." surname="Shen">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Yujing Zhou" initials="Y." surname="Zhou">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="15" month="November" year="2021"/>
            <abstract>
              <t>   This document defines the autonomic technical Objectives for IP
   address/prefix to access control group IDs mapping information.  The
   Objectives defined can be used in Generic Autonomic Signaling
   Protocol (GRASP) to make the policy enforcement point receive IP
   address and its tied access control groups information directly from
   the access authentication points and facilitate the group based
   policy enforcement.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-yizhou-anima-ip-to-access-control-groups-02"/>
        </reference>
      </references>
    </references>
    <?line 1063?>

<section anchor="examples-usage">
      <name>Examples Usage</name>
      <section anchor="controller-ucl">
        <name>Configuring the Controller Using Group based ACL</name>
        <t>Let's consider an organization that would like to restrict the access of R&amp;D
   employees that bring personally owned devices (BYOD) into the workplace.</t>
        <t>The access requirements are as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Permit traffic from R&amp;D BYOD of employees, destined to R&amp;D employees'
devices every work day from 8:00:00 to 18:00:00 UTC, starting in January 1st, 2025.</t>
          </li>
          <li>
            <t>Deny traffic from R&amp;D BYOD of employees, destined to finance servers
located in the enterprise DC network starting at 8:30:00 of January 20,
2025 with an offset of -08:00 from UTC (Pacific Standard Time) and ending
at 18:00:00 in Pacific Standard Time on December 31, 2025.</t>
          </li>
        </ul>
        <t>The example shown in <xref target="ex-controller-ucl"/> illustrates the configuration of an SDN controller
   using the group-based ACL:</t>
        <figure anchor="ex-controller-ucl">
          <name>Example of UCL Configuration</name>
          <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

<?xml version="1.0" encoding="utf-8"?>

<acls xmlns="urn:ietf:params:xml:ns:yang:ietf-access-control-list"
      xmlns:uacl="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
    <endpoint-groups
      xmlns="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
      <endpoint-group>
        <group-id>R&amp;D</group-id>
        <group-type>user-group</group-type>
      </endpoint-group>
      <endpoint-group>
        <group-id>R&amp;D BYOD</group-id>
        <group-type>user-group</group-type>
      </endpoint-group>
      <endpoint-group>
        <group-id>finance server</group-id>
        <group-type>device-group</group-type>          
      </endpoint-group>
    </endpoint-groups>
    <acl>
    <name>sample-group-acl</name>
    <type>uacl:group-acl-type</type>
    <aces>
      <ace>
        <name>rule1</name>
        <matches>
          <endpoint-group
            xmlns="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
            <source-group-id>R&amp;D BYOD</source-group-id>
            <destination-group-id>R&amp;D</destination-group-id>
          </endpoint-group>
        </matches>
        <actions>
          <forwarding>accept</forwarding>
        </actions>
        <effective-schedule xmlns="urn:ietf:params:xml:ns:yang:ietf-\
                                                             ucl-acl"
          xmlns:schedule="urn:ietf:params:xml:ns:yang:ietf-schedule">
          <recurrence-first>
            <date-time-start>2025-01-01T08:00:00Z</date-time-start>
            <duration>PT10:00:00</duration>
          </recurrence-first>
          <frequency>schedule:daily</frequency>
          <byday>
            <weekday>monday</weekday>
          </byday>
          <byday>
            <weekday>tuesday</weekday>
          </byday>
          <byday>
            <weekday>wednesday</weekday>
          </byday>
          <byday>
            <weekday>thursday</weekday>
          </byday>
          <byday>
            <weekday>friday</weekday>
          </byday>
        </effective-schedule>
      </ace>
      <ace>
        <name>rule2</name>
        <matches>
          <endpoint-group
            xmlns="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
            <source-group-id>R&amp;D BYOD</source-group-id>
            <destination-group-id>finance server</destination-group-\
                                                                  id>
          </endpoint-group>
        </matches>
        <actions>
          <forwarding>reject</forwarding>
        </actions>
        <effective-schedule xmlns="urn:ietf:params:xml:ns:yang:ietf-\
                                                            ucl-acl">
          <period-start>2025-01-20T08:30:00-08:00</period-start>
          <period-end>2025-12-31T18:00:00-08:00</period-end>
        </effective-schedule>
      </ace>
    </aces>
  </acl>
</acls>

]]></artwork>
        </figure>
      </section>
      <section anchor="PEP-ucl">
        <name>Configuring a PEP Using Group-based ACL</name>
        <t>This section illustrates an example to configure a PEP  using
   the group-based ACL.</t>
        <t>The PEP which enforces group-based ACL may acquire group identities
   from the AAA server if working as a NAS authenticating both the
   source endpoint and the destination endpoint users. Another case for
   a PEP enforcing a group-based ACL is to obtain the group identity of
   the source endpoint directly from the packet field
   <xref target="I-D.smith-vxlan-group-policy"/>. This example does not intend to be exhaustive.</t>
        <t>Assume the mapping between device group ID and IP addresses is
   predefined or acquired via device authentication. <xref target="ex-PEP-ucl"/>
   shows the ACL configuration delivered from the controller to the PEP. This
   example is consistent with the example presented in <xref target="controller-ucl"/>.</t>
        <figure anchor="ex-PEP-ucl">
          <name>Example of PEP Configuration</name>
          <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

<?xml version="1.0" encoding="utf-8"?>

<acls xmlns="urn:ietf:params:xml:ns:yang:ietf-access-control-list"
      xmlns:uacl="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
  <endpoint-groups
      xmlns="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
    <endpoint-group>
      <group-id>R&amp;D</group-id>
      <group-type>user-group</group-type>
    </endpoint-group>
    <endpoint-group>
      <group-id>R&amp;D BYOD</group-id>
      <group-type>user-group</group-type>
    </endpoint-group>
  </endpoint-groups>
  <acl>
    <name>sample-group-acl</name>
    <type>uacl:mixed-ipv4-group-type</type>
    <aces>
      <ace>
        <name>rule1</name>
        <matches>
          <endpoint-group
            xmlns="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
            <source-group-id>R&amp;D BYOD</source-group-id>
            <destination-group-id>R&amp;D</destination-group-id>
          </endpoint-group>
        </matches>
        <actions>
          <forwarding>accept</forwarding>
        </actions>
        <effective-schedule xmlns="urn:ietf:params:xml:ns:yang:ietf-\
                                                             ucl-acl"
          xmlns:schedule="urn:ietf:params:xml:ns:yang:ietf-schedule">
          <recurrence-first>
            <date-time-start>2025-01-01T08:00:00Z</date-time-start>
            <duration>PT10:00:00</duration>
          </recurrence-first>
          <frequency>schedule:daily</frequency>
          <byday>
            <weekday>monday</weekday>
          </byday>
          <byday>
            <weekday>tuesday</weekday>
          </byday>
          <byday>
            <weekday>wednesday</weekday>
          </byday>
          <byday>
            <weekday>thursday</weekday>
          </byday>
          <byday>
            <weekday>friday</weekday>
          </byday>
        </effective-schedule>
      </ace>
      <ace>
        <name>rule2</name>
        <matches>
          <endpoint-group
            xmlns="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
            <source-group-id>R&amp;D BYOD</source-group-id>
          </endpoint-group>
          <ipv4>
            <destination-ipv4-network>203.0.113.1/24</destination-\
                                                        ipv4-network>
          </ipv4>
        </matches>
        <actions>
          <forwarding>reject</forwarding>
        </actions>
        <effective-schedule xmlns="urn:ietf:params:xml:ns:yang:ietf-\
                                                            ucl-acl">
          <period-start>2025-01-20T08:30:00-08:00</period-start>
          <period-end>2025-12-31T18:00:00-08:00</period-end>
        </effective-schedule>
      </ace>
    </aces>
  </acl>
</acls>

]]></artwork>
        </figure>
      </section>
      <section anchor="PEP-acl">
        <name>Configuring PEPs Using Address-based ACLs</name>
        <t>The section describes an example of configuring a PEP using
   IP address based ACL. IP address based access control policies could
   be applied to the PEP that may not understand the group information,
   e.g., firewall.</t>
        <t>Assume an employee in the R&amp;D department accesses the network
   wirelessly from a non-corporate laptop using IP address 192.0.2.10.
   The SDN controller associates the user group to which the employee
   belongs with the user address according to step 1 to 4 in <xref target="overview"/>.</t>
        <t>Assume the mapping between device group ID and IP addresses is
   predefined or acquired via device authentication. <xref target="ex-PEP-acl"/>
   shows an IPv4 address based ACL configuration delivered from
   the controller to the PEP. This example is consistent with the example
   presented in <xref target="controller-ucl"/>.</t>
        <figure anchor="ex-PEP-acl">
          <name>Example of PEP Configuration</name>
          <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

<?xml version="1.0" encoding="utf-8"?>

<acls xmlns="urn:ietf:params:xml:ns:yang:ietf-access-control-list">
  <acl>
    <name>sample-group-acl</name>
    <type>ipv4-acl-type</type>
    <aces>
      <ace>
        <name>rule1</name>
        <matches>
          <ipv4>
            <destination-ipv4-network>192.168.2.1/24</destination-\
                                                        ipv4-network>
            <source-ipv4-network>192.168.1.1/24</source-ipv4-network>
          </ipv4>
        </matches>
        <actions>
          <forwarding>accept</forwarding>
        </actions>
        <effective-schedule xmlns="urn:ietf:params:xml:ns:yang:ietf-\
                                                             ucl-acl"
          xmlns:schedule="urn:ietf:params:xml:ns:yang:ietf-schedule">
          <recurrence-first>
            <date-time-start>2025-01-01T08:00:00Z</date-time-start>
            <duration>PT10:00:00</duration>
          </recurrence-first>
          <frequency>schedule:daily</frequency>
          <byday>
            <weekday>monday</weekday>
          </byday>
          <byday>
            <weekday>tuesday</weekday>
          </byday>
          <byday>
            <weekday>wednesday</weekday>
          </byday>
          <byday>
            <weekday>thursday</weekday>
          </byday>
          <byday>
            <weekday>friday</weekday>
          </byday>
        </effective-schedule>        
      </ace>
      <ace>
        <name>rule2</name>
        <matches>
          <ipv4>
            <destination-ipv4-network>203.0.113.1/24</destination-\
                                                        ipv4-network>
            <source-ipv4-network>192.168.1.1/24</source-ipv4-network>
          </ipv4>
        </matches>
        <actions>
          <forwarding>reject</forwarding>
        </actions>
        <effective-schedule xmlns="urn:ietf:params:xml:ns:yang:ietf-\
                                                            ucl-acl">
          <period-start>2025-01-20T08:30:00-08:00</period-start>
          <period-end>2025-12-31T18:00:00-08:00</period-end>
        </effective-schedule>      
      </ace>
    </aces>
  </acl>
</acls>
]]></artwork>
        </figure>
        <t><xref target="ex-PEP-acl-ipv6"/> shows an example of the same policy but with a destination IPv6 prefix.</t>
        <figure anchor="ex-PEP-acl-ipv6">
          <name>Example of PEP Configuration (IPv6)</name>
          <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

<?xml version="1.0" encoding="utf-8"?>
<acls xmlns="urn:ietf:params:xml:ns:yang:ietf-access-control-list">
  <acl>
    <name>another-sample-but-with-ipv6</name>
    <type>ipv6-acl-type</type>
    <aces>
      <ace>
        <name>rule1</name>
        <matches>
          <ipv6>
            <destination-ipv6-network>2001:db8::/64</destination-\
                                                        ipv6-network>
          </ipv6>
        </matches>
        <actions>
          <forwarding>accept</forwarding>
        </actions>
        <effective-schedule xmlns="urn:ietf:params:xml:ns:yang:ietf-\
                                                             ucl-acl"
          xmlns:schedule="urn:ietf:params:xml:ns:yang:ietf-schedule">
          <recurrence-first>
            <date-time-start>2025-01-01T08:00:00Z</date-time-start>
            <duration>PT10:00:00</duration>
          </recurrence-first>
          <frequency>schedule:daily</frequency>
          <byday>
            <weekday>monday</weekday>
          </byday>
          <byday>
            <weekday>tuesday</weekday>
          </byday>
          <byday>
            <weekday>wednesday</weekday>
          </byday>
          <byday>
            <weekday>thursday</weekday>
          </byday>
          <byday>
            <weekday>friday</weekday>
          </byday>
        </effective-schedule>
      </ace>
    </aces>
  </acl>
</acls>

]]></artwork>
        </figure>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This work has benefited from the discussions of User-group-based
   Security Policy over the years.  In particular, <xref target="I-D.you-i2nsf-user-group-based-policy"/>
   and <xref target="I-D.yizhou-anima-ip-to-access-control-groups"/> provide mechanisms to
   establish a mapping between the IP address/prefix of users and access
   control group IDs.</t>
      <t>Jianjie You, Myo Zarny, Christian Jacquenet, Mohamed Boucadair, and
   Yizhou Li contributed to an earlier version of <xref target="I-D.you-i2nsf-user-group-based-policy"/>.
   We would like to thank the authors of that draft on modern network access
   control mechanisms for material that assisted in thinking about this document.</t>
      <t>The authors would like to thank Joe Clarke, Bill Fenner, Benoit
   Claise, Rob Wilton, David Somers-Harris, Alan Dekok, and Heikki Vatiainen for their valuable comments
   and great input to this work.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
