<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nh-sr-hsfc-usecases-requirements-02" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.0 -->
  <front>
    <title abbrev="SR hSFC Usecases">Problem Statement, Use Cases, and Requirements of Hierarchical SFC with Segment Routing</title>
    <seriesInfo name="Internet-Draft" value="draft-nh-sr-hsfc-usecases-requirements-02"/>
    <author initials="K." surname="Ni" fullname="Kangkang Ni" role="editor">
      <organization>China Mobile</organization>
      <address>
        <email>nikangkang@chinamobile.com</email>
      </address>
    </author>
    <author initials="H." surname="Huang" fullname="Hongyi Huang" role="editor">
      <organization>Huawei</organization>
      <address>
        <email>hongyi.huang@huawei.com</email>
      </address>
    </author>
    <author initials="Y." surname="Zhang" fullname="Yige Zhang">
      <organization>China Mobile</organization>
      <address>
        <email>zhangyige@chinamobile.com</email>
      </address>
    </author>
    <author initials="J." surname="Ye" fullname="Jiaming Ye" role="editor">
      <organization>China Mobile</organization>
      <address>
        <email>yejiaming@chinamobile.com</email>
      </address>
    </author>
    <date year="2024" month="August" day="27"/>
    <area>General</area>
    <workgroup>SPRING</workgroup>
    <keyword>keyword1</keyword>
    <keyword>keyword2</keyword>
    <keyword>keyword3</keyword>
    <abstract>
      <?line 54?>
<t>Hierarchical Service Function Chaining (hSFC) is a network service chaining method that utilizes a hierarchical structure to efficiently organize and manage service function chains, enhancing network performance and scalability. This document primarily describes the use case of hSFC, which is the security resource pool. It outlines the associated problem statement and requirements for the security resource pool. The document aims to assist in identifying candidate solution architectures and solutions.</t>
    </abstract>
  </front>
  <middle>
    <?line 57?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Service Function Chaining (SFC) <xref target="RFC7665"/> is a network service delivery and traffic processing technique that allows for the definition and execution of specific service chain routing policies, ensuring that data flows through a sequence of service functions in a predetermined order as it traverses the network. As network scales have grown, such as the decentralization of service resources and the diversification of tenants and vendors, it is difficult to administrate such a large network. A new network architecture known as Hierarchical Service Function Chaining (hSFC) <xref target="RFC8459"/> has emerged. hSFC enables an organization to decompose large-scale networks into multiple administrative domains. This means that it can provide better network design, simplified control, and support for different functional groups within the network, thereby enhancing overall efficiency and management.</t>
      <t>To enhance network service security and offer a wide range of protective services to users, network operators have centrally constructed numerous security resource pools. Within these pools, various security network devices, such as firewalls, Web Application Firewalls (WAFs), Intrusion Prevention Systems (IPS), and more, are deployed to deliver diverse value-added services (i.e Service Function). According to tenants' business requirements or their geographical location the user traffic is steered into the corresponding security resource pool, after arriving which a series of services in a certain order are provided based on security protection needs, network topology, and resource usage. The packets need to continue the remaining original forwardness when finishing the processes inside the resource pool. As per <xref target="RFC8459"/>, the original path information before entering security resource pool is expected to be stored somewhere, within the packets or in the gateway of resource pools, so that it can be restored later. Therefore, it is suitable to orchestrate with hSFC architecture. hSFC introduces a solution based on NSH (Network Service Header). This approach involves network configurations of each type of traffic and additional NSH header in packet headers, which is complicated and not conducive to expansive. However, in cases where SR (Segment Routing) networks are deployed, it only needs to issue the SR policy to define transmission path and update a new one to alter the path when physical topology or business requirements change. By contrast, the NSH solution may not be the preferred choice.</t>
      <t>This document describes a use case involving the deployment of multiple resource pools by network service provider. Every resource pool is designed to offer tenants a wide range of security protection services. The document also analyzes the challenges and issues associated with this use case, discussing the requirements,  seeking an SR-based hSFC solution.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>hSFC: Hierarchical Service Function Chaining</t>
        <t>NSH: Network Service Header</t>
        <t>PBR: Policy Based Routing</t>
        <t>SR: Segment Routing</t>
        <t>SFC: Service Function Chaining</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <t>To defend against network attacks, ensure the security of enterprise tenants' business applications against viruses, malware, and other security threats, and meet their customized security protection needs, network operators have established security resource pools in multiple regions. Typically, these security resource pools host various security network devices, including firewalls, Web Application Firewalls (WAF), Intrusion Prevention Systems (IPS), and more, to provide a variety of security-focused value-added services. In practical applications, the first step involves routing user traffic to the appropriate security resource pool based on user location, which typically utilizing SR in the existing Internet environment. Then, customized security protection services are provided to customers according to their specific requirements. For example, some tenants may require the use of a firewall followed by IPS services, while others may need to use IPS first and then utilize firewall services. After traversing through all SFs in a SFC, packets are returned to the gateway (i.e., security resource pool) and continue to be forwarded to devices outside of IDC. This necessitates hierarchical service chains to orchestrate SFs within security resource pool (lower-level sub-domain)and service nodes outside the IDC (upper-level domain) respectively and independently.</t>
      <t>SR is a novel network orchestration technology that guides packet paths by adding Segment Identifiers (Segment Routing) in the packet header. Each Segment Identifier corresponds to a node or service function within the network, creating an ordered path from source to destination, defining the packet's transmission route. SR service chain orchestration offers several advantages, including the flexibility to define and customize service chain paths based on specific application and business requirements, support for dynamic adjustment of service chain paths based on real-time application needs, and the ability to guide packets directly to the desired service functions, reducing unnecessary delays within the service chain. Furthermore, SR enables network administrators to manage service chains without altering the underlying network topology, simplifying network configuration.</t>
      <t>As a result, SR represents a user-friendly service chain orchestration method suitable for complex network environments that need to meet diverse application requirements. Given the complexity of internet architecture, the widespread deployment of SR, and the dynamic updates of security devices within a security resource pool, it is recommended to use SR-based service chaining for traffic steering within the security resource pool. This enables dynamic adjustment of service chains and reduces traffic bypass.</t>
      <section anchor="background">
        <name>Problem Statement</name>
        <t>Due to the growth of network scales and the constraints of the existing orchestration method, security resource pools is facing some challenges of delivering value-added security protection services for different users. This section provides an overview of these challenges.</t>
        <section anchor="dispersion-of-service-resources">
          <name>Dispersion Of Service Resources</name>
          <t>Due to varying geographical locations of different tenants and for the purpose of minimizing latency, facilitating network management, and maintenance, the security resource pool is physically deployed in a distributed manner.</t>
        </section>
        <section anchor="multi-tenant">
          <name>Multi-tenant</name>
          <t>In the existing Internet environment, tenants' network service requirements have become diverse, with different tenants facing various threats and demands. In the security resource pool, On one hand, some tenants may only require basic access control functionality, in which case, tenants would only need firewall services. On the other hand, other tenants may necessitate more complex and comprehensive security services. For instance, certain tenants may require initial use of Web Application Firewall services to isolate potential malicious websites and code, followed by additional security checks using firewall services. Different tenants have different needs, and the security resource pool needs to provide tenant-level customized security protection capabilities. Additionally, the network security device needs to be differentiated between different tenants to provide them with distinct configuration.</t>
        </section>
        <section anchor="multi-vendor">
          <name>Multi-vendor</name>
          <t>In a security resource pool, security network devices are usually provided by different vendors,  they need to be orchestrated by unified external network communication. For example, in the security resource pool, firewalls are provided by Vendor A, and WAF is provided by Vendor B. If a customer subscribes to both firewall and WAF security value-added services, the traffic needs to pass through Vendor A's firewall first and then through Vendor B's WAF device. This implies that Vendor A's firewall needs to be aware of the next hop being Vendor B's WAF device, and there is an expectation for the traffic to flow directly from Vendor A's firewall device to Vendor B's WAF.</t>
        </section>
        <section anchor="dynamic-orchestration">
          <name>Dynamic Orchestration</name>
          <t>In a security resource pool, security network devices may encounter dynamic adjustments. For example, adding new security network devices to the pool may require existing service chains, such as NSH, to undergo state updates across multiple devices. The main issue in this situation is the presence of state (SPI, SI index tables) within the network devices. Therefore, when there are changes in business deployments, all network devices need to undergo state updates. This is unfavorable for flexible and agile deployments. In contrast, SR is friendly as it does not require the presence of specific states in the network.</t>
        </section>
      </section>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>[REQ-1] Tenant-level Service Orchestration</t>
      <t>Different tenants have varying security protection needs. specifically, the types and order of security protection they require are differently. Therefore, it is imperative to cater to multiple tenants and support tenant-level service chain orchestration.</t>
      <t>[REQ-2] Tenant Information Carriage</t>
      <t>As the security resource pool needs to meet service chaining at the tenant level, it is essential for the packets to support carrying tenant information.</t>
      <t>[REQ-3] Dynamic Allocation Of Service Resources (Scalability)</t>
      <t>The security resource pool is in a constant state of dynamic adjustment, and with the evolution of business needs, there may be additions or removals of certain security network devices. When there are updates to the security network devices within the resource pool, it is essential to support their dynamic orchestration into the service chain.</t>
      <t>[REQ-4] Independent Resource Pool Orchestration</t>
      <t>Service functions in different security resource pools support different protocols (i.e., some security network devices within certain resource pools do not support SR), and their suitable methods for service chaining may also vary. Achieving unified orchestration is challenging. Therefore, it is necessary for security resource pools to support independent orchestration, without interfering with each other.</t>
      <t>[REQ-5] Reliability Of Service Function</t>
      <t>During service chain orchestration, it is necessary to support the retrieval of device information, including device operational status, identification details, etc. In the event of network equipment issues, bypassing the problematic equipment to avoid traffic disruption should be enabled.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC8459">
          <front>
            <title>Hierarchical Service Function Chaining (hSFC)</title>
            <author fullname="D. Dolson" initials="D." surname="Dolson"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <date month="September" year="2018"/>
            <abstract>
              <t>Hierarchical Service Function Chaining (hSFC) is a network architecture allowing an organization to decompose a large-scale network into multiple domains of administration.</t>
              <t>The goals of hSFC are to make a large-scale network easier to design, simpler to control, and supportive of independent functional groups within large network operators.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8459"/>
          <seriesInfo name="DOI" value="10.17487/RFC8459"/>
        </reference>
      </references>
    </references>
    <?line 158?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
    </section>
    <section numbered="false" anchor="contributors">
      <name>Contributors</name>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
