Uploaded image for project: 'Security Subcommitee'
  1. Security Subcommitee
  2. SECCOM-119

Review ONAP security req [general-7]

XMLWordPrintable

    • Icon: Story Story
    • Resolution: Unresolved
    • Icon: Medium Medium
    • None
    • None

      Original:
      ONAP MUST support network segregation on ONAP external network interfaces: separation of O&M traffic from other traffic.

      Also the possibility for further separation (like: DB traffic, traffic between VNFs and ONAP) SHOULD be supported.

      The separation is realized in the infra using technologies like VLAN, VXLAN, VPN.

      Modified:
      Traffic of the ONAP internal APIs MUST be possible to be isolated from traffic of the ONAP external APIs as.

      Network isolation capability between the traffic of different ONAP external APIs MUST be supported. The capability to isolate ONAP NBI traffic from all other external traffic MUST be supported. 

      All the ONAP network isolation mechanisms MUST be operator configurable.

      For example following components expose APIs to external network: Portal, Policy, DCAE VES collector.

      Info: The network segregation is implemented in the infra, using technologies like VLAN, VXLAN, VPN.

       

            Unassigned Unassigned
            samuli.kuusela samuli.kuusela
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

              Created:
              Updated:
              Resolved: