Gs NFV-IFA032v030601p
Gs NFV-IFA032v030601p
Gs NFV-IFA032v030601p
1 (2022-01)
GROUP SPECIFICATION
Disclaimer
The present document has been produced and approved by the Network Functions Virtualisation (NFV) ETSI Industry
Specification Group (ISG) and represents the views of those members who participated in this ISG.
It does not necessarily represent the views of the entire ETSI membership.
2 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
Reference
RGS/NFV-IFA032ed361
Keywords
configuration, management, MANO, network, NFV,
virtualisation
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI
deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not
limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property
rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages
for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use
of or inability to use the software.
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and
microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2022.
All rights reserved.
ETSI
3 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
Contents
Intellectual Property Rights ..............................................................................................................................11
Foreword...........................................................................................................................................................11
Modal verbs terminology..................................................................................................................................11
1 Scope ......................................................................................................................................................12
2 References ..............................................................................................................................................12
2.1 Normative references ....................................................................................................................................... 12
2.2 Informative references ...................................................................................................................................... 12
3 Definition of terms, symbols and abbreviations .....................................................................................13
3.1 Terms................................................................................................................................................................ 13
3.2 Symbols ............................................................................................................................................................ 13
3.3 Abbreviations ................................................................................................................................................... 13
4 Overview of interfaces and information elements for multi-site connectivity services .........................14
4.1 Introduction ...................................................................................................................................................... 14
4.2 Concepts of multi-site connectivity management............................................................................................. 15
4.3 Multi-site connectivity network framework and resources .............................................................................. 15
4.4 Multi-site connectivity network framework and relationship to Network Service ........................................... 17
4.5 Relation to other NFV Group Specifications.................................................................................................... 17
5 Requirements ..........................................................................................................................................18
5.1 Introduction and conventions ........................................................................................................................... 18
5.1.1 Overview .................................................................................................................................................... 18
5.1.2 Conventions ................................................................................................................................................ 18
5.2 WIM interface requirements............................................................................................................................. 18
5.3 Interface requirements ...................................................................................................................................... 19
5.3.1 MSCS Management interface requirements ............................................................................................... 19
5.3.2 Capacity Management interface requirements ............................................................................................ 19
5.3.3 Fault Management interface requirements .................................................................................................. 20
5.3.4 Performance Management interface requirements...................................................................................... 20
6 Interfaces exposed by WIM ...................................................................................................................21
6.1 Introduction ...................................................................................................................................................... 21
6.2 MSCS Management Interface .......................................................................................................................... 21
6.2.1 Description.................................................................................................................................................. 21
6.2.2 Create MSCS operation .............................................................................................................................. 21
6.2.2.1 Description ............................................................................................................................................ 21
6.2.2.2 Input Parameters ................................................................................................................................... 22
6.2.2.3 Output Parameters ................................................................................................................................. 22
6.2.2.4 Operation results ................................................................................................................................... 22
6.2.3 Query MSCS operation............................................................................................................................... 22
6.2.3.1 Description ............................................................................................................................................ 22
6.2.3.2 Input Parameters ................................................................................................................................... 22
6.2.3.3 Output Parameters ................................................................................................................................. 23
6.2.3.4 Operation results ................................................................................................................................... 23
6.2.4 Update MSCS operation ............................................................................................................................. 23
6.2.4.1 Description ............................................................................................................................................ 23
6.2.4.2 Input Parameters ................................................................................................................................... 23
6.2.4.3 Output Parameters ................................................................................................................................. 24
6.2.4.4 Operation results ................................................................................................................................... 24
6.2.5 Terminate MSCS operation ........................................................................................................................ 24
6.2.5.1 Description ............................................................................................................................................ 24
6.2.5.2 Input Parameters ................................................................................................................................... 24
6.2.5.3 Output Parameters ................................................................................................................................. 25
6.2.5.4 Operation results ................................................................................................................................... 25
6.2.6 Subscribe operation..................................................................................................................................... 25
6.2.6.1 Description ............................................................................................................................................ 25
ETSI
4 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
ETSI
5 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
ETSI
6 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.5.1 Description.................................................................................................................................................. 45
6.5.2 Create PM Job operation............................................................................................................................. 46
6.5.2.1 Description ............................................................................................................................................ 46
6.5.2.2 Input parameters .................................................................................................................................... 46
6.5.2.3 Output parameters ................................................................................................................................. 47
6.5.2.4 Operation results ................................................................................................................................... 47
6.5.3 Delete PM Jobs operation ........................................................................................................................... 47
6.5.3.1 Description ............................................................................................................................................ 47
6.5.3.2 Input parameters .................................................................................................................................... 48
6.5.3.3 Output parameters ................................................................................................................................. 48
6.5.3.4 Operation results ................................................................................................................................... 48
6.5.4 Query PM Job operation ............................................................................................................................. 48
6.5.4.1 Description ............................................................................................................................................ 48
6.5.4.2 Input parameters .................................................................................................................................... 48
6.5.4.3 Output parameters ................................................................................................................................. 48
6.5.4.4 Operation results ................................................................................................................................... 49
6.5.5 Create Threshold operation ......................................................................................................................... 49
6.5.5.1 Description ............................................................................................................................................ 49
6.5.5.2 Input parameters .................................................................................................................................... 49
6.5.5.3 Output parameters ................................................................................................................................. 49
6.5.5.4 Operation results ................................................................................................................................... 49
6.5.6 Delete Thresholds operation ....................................................................................................................... 50
6.5.6.1 Description ............................................................................................................................................ 50
6.5.6.2 Input parameters .................................................................................................................................... 50
6.5.6.3 Output parameters ................................................................................................................................. 50
6.5.6.4 Operation results ................................................................................................................................... 50
6.5.7 Query Threshold operation ......................................................................................................................... 50
6.5.7.1 Description ............................................................................................................................................ 50
6.5.7.2 Input parameters .................................................................................................................................... 50
6.5.7.3 Output parameters ................................................................................................................................. 51
6.5.7.4 Operation results ................................................................................................................................... 51
6.5.8 Subscribe operation..................................................................................................................................... 51
6.5.8.1 Description ............................................................................................................................................ 51
6.5.8.2 Input parameters .................................................................................................................................... 51
6.5.8.3 Output parameters ................................................................................................................................. 51
6.5.8.4 Operation results ................................................................................................................................... 52
6.5.9 Notify operation .......................................................................................................................................... 52
6.5.9.1 Description ............................................................................................................................................ 52
6.5.10 Terminate Subscription operation ............................................................................................................... 52
6.5.10.1 Description ............................................................................................................................................ 52
6.5.10.2 Input parameters .................................................................................................................................... 52
6.5.10.3 Output parameters ................................................................................................................................. 52
6.5.10.4 Operation results ................................................................................................................................... 52
6.5.11 Query Subscription Info operation.............................................................................................................. 53
6.5.11.1 Description ............................................................................................................................................ 53
6.5.11.2 Input parameters .................................................................................................................................... 53
6.5.11.3 Output parameters ................................................................................................................................. 53
7 Interfaces consumed by WIM ................................................................................................................53
8 Information elements exchanged............................................................................................................53
8.1 Introduction ...................................................................................................................................................... 53
8.2 Information elements and notifications related to MSCS Management ........................................................... 53
8.2.1 Introduction................................................................................................................................................. 53
8.2.2 Information elements related to MSCS ....................................................................................................... 54
8.2.2.1 Introduction ........................................................................................................................................... 54
8.2.2.2 MscsData Information element ............................................................................................................. 54
8.2.2.2.1 Description ...................................................................................................................................... 54
8.2.2.2.2 Attributes ......................................................................................................................................... 54
8.2.2.3 MscsEndpointData information element ............................................................................................... 54
8.2.2.3.1 Description ...................................................................................................................................... 54
8.2.2.3.2 Attributes ......................................................................................................................................... 54
ETSI
7 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
ETSI
8 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
ETSI
9 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
ETSI
10 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
ETSI
11 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The declarations
pertaining to these essential IPRs, if any, are publicly available for ETSI members and non-members, and can be
found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to
ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the
ETSI Web server (https://ipr.etsi.org/).
Pursuant to the ETSI Directives including the ETSI IPR Policy, no investigation regarding the essentiality of IPRs,
including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not
referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become,
essential to the present document.
Trademarks
The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.
ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no
right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does
not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.
DECT™, PLUGTESTS™, UMTS™ and the ETSI logo are trademarks of ETSI registered for the benefit of its
Members. 3GPP™ and LTE™ are trademarks of ETSI registered for the benefit of its Members and of the 3GPP
Organizational Partners. oneM2M™ logo is a trademark of ETSI registered for the benefit of its Members and of the
oneM2M Partners. GSM® and the GSM logo are trademarks registered and owned by the GSM Association.
Foreword
This Group Specification (GS) has been produced by ETSI Industry Specification Group (ISG) Network Functions
Virtualisation (NFV).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
ETSI
12 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
1 Scope
The present document specifies the interfaces for management of multi-site connectivity services. The services are
produced by a WAN Infrastructure Manager (WIM). The present document also describes the operations and the
information elements that are exchanged over these interfaces.
2 References
Referenced documents which are not found to be publicly available in the expected location might be found at
https://docbox.etsi.org/Reference/.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are necessary for the application of the present document.
[1] ETSI GS NFV-IFA 010: "Network Functions Virtualisation (NFV) Release 3; Management and
Orchestration; Functional requirements specification".
[2] ETSI GS NFV-SEC 012 (V3.1.1): "Network Functions Virtualisation (NFV) Release 3; Security;
System architecture specification for execution of sensitive NFV components".
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] ETSI GS NFV 003: "Network Functions Virtualisation (NFV); Terminology for Main Concepts in
NFV".
[i.2] ETSI GS NFV-MAN 001: "Network Functions Virtualisation (NFV); Management and
Orchestration".
[i.3] ETSI GR NFV-IFA 022: "Network Functions Virtualisation (NFV) Release 3; Management and
Orchestration; Report on Management and Connectivity for Multi-Site Services".
[i.4] IETF RFC 8453: "Framework for Abstraction and Control of TE Networks (ACTN)".
[i.5] IETF RFC 8454: "Information Model for Abstraction and Control of TE Networks (ACTN)".
ETSI
13 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
[i.6] ETSI GS NFV-SEC 006 (V1.1.1): "Network Functions Virtualisation (NFV); Security Guide;
Report on Security Aspects and Regulatory Concerns".
[i.7] ETSI GS NFV-SEC 014 (V3.1.1): "Network Functions Virtualisation (NFV) Release 3; NFV
Security; Security Specification for MANO Components and Reference Points".
[i.8] ETSI GS NFV-IFA 031 (V3.2.1): "Network Functions Virtualisation (NFV) Release 3;
Management and Orchestration; Requirements and interfaces specification for management of
NFV-MANO".
[i.9] ETSI GS NFV-IFA 005 (V3.2.1): "Network Functions Virtualisation (NFV) Release 3;
Management and Orchestration; Or-Vi reference point - Interface and Information Model
Specification".
3.1 Terms
For the purposes of the present document, the terms given in ETSI GS NFV 003 [i.1] and the following apply:
NOTE: A term defined in the present document takes precedence over the definition of the same term, if any, in
ETSI GS NFV 003 [i.1].
Multi-Site Connectivity Service (MSCS): connectivity service abstracting the details of information regarding the
connections between two or more NFVI-PoP (site) network endpoints
Multi-Site Network Connection (MSNC): provisioned multi-site network connectivity enabling the data forwarding
between two or more network edge points
NOTE: In the present document, the network edge points represent the ingress/egress ports of the network(s) in
between the NFVI-PoPs (sites).
Multi-Site Network Service (MSNS): network service whose constituent Network Functions/Network Services are
deployed in more than one site
site: NFVI Point of Presence (NFVI-PoP), as defined in ETSI GS NFV 003 [i.1]
3.2 Symbols
Void.
3.3 Abbreviations
For the purposes of the present document, the abbreviations given in ETSI GS NFV 003 [i.1] and the following apply:
NOTE: An abbreviation defined in the present document takes precedence over the definition of the same
abbreviation, if any, in ETSI GS NFV 003 [i.1].
ETSI
14 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
4.1 Introduction
This clause provides an overview of interfaces and information elements exposed or consumed by the WIM.
Clause 5.2 of ETSI GR NFV-IFA 022 [i.3] introduces the concept of multi-site service spanning a Wide Area Network
(WAN).
Figure 4.1-1 illustrates an example of such multi-site service, composed of 2 VNFs, each one located in a different
NFVI-PoP. The NS VL connecting those 2 VNFs is made of a virtual network in each NFVI-PoP and a Multi-Site
Connectivity Service (MSCS) provided by the WIM that enables connecting virtualised network resources in each
NFVI-PoP to create an overall multi-site Virtual Link.
As mentioned in ETSI GR NFV-IFA 022 [i.3], clause 5.4.3 of ETSI GS NFV-MAN 001 [i.2] introduces the concept of
WAN Infrastructure Manager (WIM) which is typically used to establish connectivity between endpoints in different
NFVI-PoPs. Clause 5.6 of ETSI GS NFV-MAN 001 [i.2] shows a "hybrid network environment example illustrating
the goal of NFV to have fully programmatic open interfaces for service and Resource Orchestration within and across
NFVI-PoPs". It further describes establishing an end-to-end connectivity across virtualised networks in the NFVI-PoPs
and the WAN, under the control of the NFVI-PoP's VIMs and WAN's WIMs.
The information elements exchanged via the interfaces above are part of the present document and are described in
subsequent clauses.
ETSI
15 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
For the establishment of the network connectivity, the WIM may rely on network controllers that handle the fulfilment
of the connectivity at a lower level, potentially making use of different network technologies and protocols. The WIM
offers to the consumers an abstraction of such network connectivity to ease the provisioning and monitoring of it.
Two types of managed objects are exposed by the WIM concerning network connectivity:
A MSNC represents the provisioned connectivity enabling the data forwarding between two or more network edge
points of the network(s) in between different NFVI-PoPs. MSNCs can be established via diverse network protocols and
at different network layers.
A MSCS abstracts the details of network connectivity that is realized by one or more MSNCs. At the same time, the
MSCS represents the service agreement in between the consumer and the producer (the WIM) for the required
connectivity to be established to connect a set of endpoints.
The following interactions are enabled via the specified interfaces in the present document (not an exhaustive list):
• A consumer can request the creation of a MSCS. The MSCS is fulfilled by the WIM via one or more MSNCs.
• A consumer can retrieve information about a MSCS and the MSNCs that fulfil such a MSCS.
• A consumer can retrieve information about the endpoints among which network connectivity can be provided.
• A consumer can request updating a MSCS, e.g. adding new MSCS endpoints, removing or updating existing
MSCS endpoints or modifying the MSCS profile.
• A consumer can monitor a MSCS and receive performance and fault monitoring information about the
MSNCs that have been provisioned as part of the MSCS.
The MSCS and MSNC are the managed objects by the WIM, which are referred otherwise as "virtualised network
resources" in the functional requirements for management of connectivity of Multi-Site services in clauses 6.18 and
11.2 of ETSI GS NFV-IFA 010 [1].
ETSI
16 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
1) Network node
These are the nodes (physical or virtual) enabling the forwarding of data. A node can be internal to the WAN or at the
edge of a WAN, exposing network edge points of connectivity for the NFVI-PoPs.
EXAMPLE 1: An example of an internal node is a "Provider" (P) router, and an example of edge node is
"Provider Edge" (PE) router.
2) Network link
The network links interconnect and represent the adjacency in between the network nodes of the WAN, and in between
the edge network nodes of the WAN and the endpoint nodes in the NFVI-PoP, such as the NFVI-PoP network gateway.
The network edge points represent the ingress/egress ports of the (WAN) network(s) in between the NFVI-PoPs (sites).
These ports are part of the network edge nodes.
The connectivity service endpoint is associated to a termination point of the NFVI-PoP (site), which in can be used as
an endpoint of the connectivity fulfilled by the MSCS.
The connectivity service endpoint also represents the User Network Interface (UNI) between the NFVI-PoP and the
external network that interconnects the multiple sites. In this sense, the connectivity service endpoint represents the
shared context information of the network edge link (a.k.a, access link) connecting the NFVI-PoP and the external
network (refer also to the VIM's managed object ConnectivityServiceEndpoint defined in clause 8.10.4 of ETSI
GS NFV-IFA 005 [i.9]).
5) Network topology
The network topology is a representation of interconnectivity of a particular set of network resources described in terms
of network nodes and network links, wherein the forwarding of data among the particular set of network resources is
enabled.
ETSI
17 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
A multi-site WAN network has a 1:N relationship with network topology, i.e. one or more network topologies can be
represented on top of the network node and link resources. Figure 4.3-1 illustrates an example with two network
topologies represented over the WAN.
Figure 4.4-1: Multi-site connectivity network framework and relationship to Network Service
In the example of figure 4.4-1, the two VNF instances, vCPE and vAPL, have corresponding CP instances to connect to
the NS Virtual Link. The CP instances are realized via network interface resources from the NFVI-PoP and attached to
the link ports exposed on virtual network resources also from the NFVI-PoP. The NS Virtual Link is realized with the
virtualised network resources from the NFVI-PoPs and the MSCS on the WAN. The MSCS is established in between
two connectivity service endpoints, each one associated to ports/interfaces on the corresponding NFVI-PoP network
gateways.
• Management and Orchestration - Report on Management and Connectivity for Multi-Site Services ETSI
GR NFV-IFA 022 [i.3]:
- ETSI GR NFV-IFA 022 [i.3] provides use cases and recommendations related to multi-site services over
WAN.
• Management and Orchestration - Functional requirements specification ETSI GS NFV-IFA 010 [1]:
- Interfaces exposed and consumed by the WIM are based on the functional requirements specified in
ETSI GS NFV-IFA 010 [1] for the WIM FB.
ETSI
18 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
5 Requirements
5.1.2 Conventions
The following notations, defined in ISO/IEC 9646-7 [i.10], are used for the qualifier column of interface information
elements:
• N/A not applicable - in the given context, it is impossible to use the capability.
• CM conditional mandatory - the capability is required to be supported and is conditional on the support of
some condition. This condition shall be specified in the Description column.
• CO conditional optional - the capability may be supported or not and is conditional on the support of some
condition. This condition shall be specified in the Description column.
The following notation is used for parameters that represent identifiers, and for attributes that represent identifiers in
information elements and notifications:
• If an object (information element or notification) contains an attribute that identifies the object, the type of that
attribute is "Identifier" and the description states that the attribute is the identifier of that particular notification
or information element.
EXAMPLE: Identifier "resourceId" of the "NetworkSubnet information element" has type "Identifier" and
description "Identifier of this NetworkSubnet information element".
ETSI
19 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
ETSI
20 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
ETSI
21 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.1 Introduction
Clause 5.8.2 of ETSI GS NFV-MAN 001 [i.2] introduces the producer-consumer paradigm, "Interfaces represent a
published contract offered by a producer functional block, exposing externally the functions produced. They can be
consumed by any other consumer functional block that is authenticated and authorized to access and consume the
functions offered".
For all the interfaces in this clause, the producer exposing the interfaces is the WIM.
• Create MSCS.
• Query MSCS.
• Update MSCS.
• Terminate MSCS.
• Subscribe.
• Notify.
• Terminate Subscription.
6.2.2.1 Description
This operation allows an authorized consumer to request the creation of a MSCS from the WIM.
Table 6.2.2.1-1 lists the information flow exchanged between the consumer and the WIM.
ETSI
22 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.2.3.1 Description
This operation allows querying information about instantiated MSCSs from the WIM.
Table 6.2.3.1-1 lists the information flow exchanged between the consumer and the WIM.
ETSI
23 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.2.4.1 Description
This operation allows updating the information of an instantiated MSCS, e.g. name and description, as well as
properties of the instantiated MSCS, such as adding/removing MSCS endpoints or changing the MSCS profile.
Table 6.2.4.1-1 lists the information flow exchanged between the consumer and the WIM.
ETSI
24 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
As part of the update, changes in the existing set of MSNC supporting the MSCS can be performed. For instance, a new
MSNC can be created to address changes in the MSCS connectivity profile, due to the addition/removal/update of
MSCS endpoints.
6.2.5.1 Description
This operation allows terminating one instantiated MSCS. Table 6.2.5.1-1 lists the information flow exchanged between
the consumer and the WIM.
ETSI
25 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.2.6.1 Description
This operation enables an authorized consumer to subscribe with a filter in order to receive notifications sent by the
WIM which are related to MSCS changes or MSCS reservation changes. Table 6.2.6.1-1 lists the information flow
exchanged between the consumer and the WIM.
ETSI
26 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.2.7.1 Description
This operation distributes notifications to subscribers. It is a one-way operation issued by the WIM that cannot be
invoked as an operation by the consumer. In order to receive notifications, the consumer shall have a subscription.
Table 6.2.7.1-1 lists the information flow exchanged between the consumer and the WIM.
6.2.8.1 Description
This operation enables the consumer to query information about subscriptions table 6.2.8.1-1 lists the information flow
exchanged between the consumer and the WIM.
ETSI
27 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.2.9.1 Description
This operation enables the consumer to terminate a particular subscription.
Table 6.2.9.1-1 lists the information flow exchanged between the consumer and the WIM.
6.2.10.1 Description
This operation allows an authorized consumer to request the reservation of MSCS from the WIM.
Table 6.2.10.1-1 lists the information flow exchanged between the consumer and the WIM.
ETSI
28 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
If the operation was not successful, the WIM shall return to the consumer appropriate error information.
6.2.11.1 Description
This operation allows querying information about reserved MSCS that the consumer has access to.
Table 6.2.11.1-1 lists the information flow exchanged between the consumer and the WIM.
ETSI
29 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.2.12.1 Description
This operation allows updating MSCS reservations, such as the timing schedule (start, end and expiry time),
adding/removing MSCS endpoints to the reserved set or changing the MSCS profile of the reserved MSCS.
Table 6.2.12.1-1 lists the information flow exchanged between the consumer and the WIM.
ETSI
30 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
If the operation was not successful, the WIM shall return to the consumer appropriate error information.
6.2.13.1 Description
This operation allows an authorized consumer to request the termination of MSCS reservations.
Table 6.2.13.1-1 lists the information flow exchanged between the consumer and the WIM.
ETSI
31 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
If the operation was not successful, the WIM shall return to the consumer appropriate error information.
The interface also provides the necessary operations to handle the management of subscriptions to notifications, and the
issuing of such notifications carrying information about changes in the capacity and/or topology.
The following operations are defined for this interface which will be consumed by the Consumer:
ETSI
32 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
• Subscribe operation.
• Notify operation.
6.3.2.1 Description
This operation enables a Consumer to retrieve information about the capacity of the network in between the
NFVI-PoPs. Such information can then be used for capacity and network connectivity planning.
The operation allows retrieval of information about the available, allocated, reserved and total capacity of the network
resources managed by the WIM.
Table 6.3.2.1-1 lists the information flow exchanged between the Consumer and the WIM.
ETSI
33 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.3.3.1 Description
This operation enables a Consumer to create a threshold and specify threshold levels on the capacity of the network
resources managed by the WIM. Notifications will be generated when crossed. Table 6.3.3.1-1 lists the information
flow exchange between the Consumer and the WIM.
ETSI
34 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.3.4.1 Description
This operation enables a Consumer to delete one or more existing threshold(s) managed by the WIM about capacity
management.
NOTE: It is up to the protocol design stage to determine whether this operation should be modelled as a "bulk"
operation that allows deleting multiple Thresholds in one request, or as a series of requests that delete one
Threshold at a time.
Table 6.3.4.1-1 lists the information flow exchange between the NFV-MANO functional entity and the Consumer.
ETSI
35 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.3.5.1 Description
This operation enables a Consumer to query the details of one or more existing capacity thresholds on the WIM.
Table 6.3.5.1-1 lists the information flow exchange between the Consumer and the WIM.
6.3.6.1 Description
This operation enables a Consumer to query information about the one or more topologies of the network in between
the NFVI-PoPs. Table 6.3.6.1-1 lists the information flow exchanged between the Consumer and the WIM.
ETSI
36 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.3.7.1 Description
This operation enables a Consumer to query information about a node participating in a topology of the network in
between the NFVI-PoPs. Table 6.3.7.1-1 lists the information flow exchanged between the Consumer and the WIM.
ETSI
37 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.3.8.1 Description
This operation enables a Consumer to query information about a link participating in a topology of the network in
between the NFVI-PoPs. Table 6.3.8.1-1 lists the information flow exchanged between the Consumer and the WIM.
ETSI
38 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.3.9.1 Description
This operation enables a Consumer to query information about network edge points of the network between the
NFVI-PoPs. Table 6.3.9.1-1 lists the information flow exchanged between the Consumer and the WIM.
Table 6.3.9.2-1: Query Network Edge Point Information operation input parameters
ETSI
39 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.3.10.1 Description
This operation enables the Consumer to subscribe with a filter for the notifications related to capacity and topology
changes sent by the WIM.
NOTE: Specification of the filtering mechanism is left for the protocol design stage.
Table 6.3.10.1-1 lists the information flow exchanged between the Consumer and the WIM.
6.3.11.1 Description
This operation distributes notifications to subscribers. It is a one-way operation issued by the WIM and cannot be
invoked as an operation by the Consumer.
Table 6.3.11.1-1 lists the information flow exchanged between the Consumer and the WIM.
ETSI
40 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.3.12.1 Description
This operation enables the Consumer to terminate a particular subscription. Table 6.3.12.1-1 lists the information flow
exchanged between the Consumer and the WIM.
6.3.13.1 Description
This operation enables the Consumer to query information about subscriptions. Table 6.3.13.1-1 lists the information
flow exchanged between the Consumer and the WIM.
ETSI
41 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
• Subscribe operation: Subscription of consumers with the WIM for the notifications related to the alarms.
• Query Subscription Info operation: Querying subscription information from the WIM.
• Get alarm list operation: Accessing active alarms from the WIM.
6.4.2.1 Description
This operation enables the consumer to subscribe with a filter for the notifications related to MSCS alarms sent by the
WIM.
NOTE: Specification of the filtering mechanism is left for the protocol design stage.
Table 6.4.2.1-1 lists the information flow exchanged between the consumer and the WIM.
ETSI
42 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.4.3.1 Description
This operation distributes notifications to subscribers. It is a one-way operation issued by the WIM and cannot be
invoked as an operation by the consumer.
Table 6.4.3.1-1 lists the information flow exchanged between the consumer and the WIM.
ETSI
43 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.4.4.1 Description
This operation enables the consumer to terminate a particular subscription. Table 6.4.4.1-1 lists the information flow
exchanged between the consumer and the WIM.
6.4.5.1 Description
This operation enables the consumer to query information about subscriptions.
Table 6.4.5.1-1 lists the information flow exchanged between the consumer and the WIM.
ETSI
44 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.4.6.1 Description
This operation enables the consumers to query the active alarms from the WIM. Table 6.4.6.1-1 lists the information
flow exchanged between the consumer and the WIM.
ETSI
45 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.4.7.1 Description
This operation enables the consumer to acknowledge alarms at WIM. Table 6.4.7.1-1 lists the information flow
exchanged between the consumer and the WIM.
ETSI
46 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
When new performance information is available, the consumer is notified using the notification
PerformanceInformationAvailableNotification (see clause 8.5.8). The details of the performance measurements are
provided using the PerformanceReport information element (see clause 8.5.5). Delivery mechanism for the performance
reports is left for later specification.
The following operations are defined for this interface which will be consumed by the consumer:
• Subscribe operation.
• Notify operation.
6.5.2.1 Description
This operation creates a PM job, enabling a consumer to specify a MSCS/MSNC or set of MSCS/MSNCs, that the
WIM is managing, for which it wants to receive performance information. This allows the requesting consumer to
specify its performance information requirements with the WIM.
The consumer shall issue a Subscribe request for PerformanceInformationAvailable notifications in order to know when
new collected performance information is available.
Table 6.5.2.1-1 lists the information flow exchanged between the consumer and the WIM.
ETSI
47 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
The pmJobId shall only be returned when the operation has been successful.
6.5.3.1 Description
This operation deletes one or more PM job(s). Table 6.5.3.1-1 lists the information flow exchanged between the
consumer and the WIM.
ETSI
48 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.5.4.1 Description
This operation enables the consumer to solicit from the WIM the details of one or more PM job(s). This operation does
not return performance reports. Table 6.5.4.1-1 lists the information flow exchanged between the consumer and the
WIM.
ETSI
49 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.5.5.1 Description
This operation allows the consumer to create a threshold and specify threshold levels on specified performance metric
(for MSCS/MSNC(s)) for which notifications will be generated when crossed. Creating a threshold does not trigger
collection of metrics. In order for the threshold to be active, there needs to be a PM job collecting the needed metric for
the selected entities.
Table 6.5.5.1-1 lists the information flow exchanged between the consumer and the WIM.
ETSI
50 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.5.6.1 Description
This operation allows the consumer to delete one or more existing threshold(s). Table 6.5.6.1-1 lists the information
flow exchanged between the consumer and the WIM.
6.5.7.1 Description
This operation allows the consumer to query the details of an existing threshold. Table 6.5.7.1-1 lists the information
flow exchanged between the consumer and the WIM.
ETSI
51 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.5.8.1 Description
This operation enables the consumers to subscribe with a filter for the notifications related to performance information
with the WIM.
NOTE: Specification of the filtering mechanism is left for the protocol design stage.
Table 6.5.8.1-1 lists the information flow exchanged between the consumer and the WIM.
ETSI
52 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.5.9.1 Description
This operation distributes notifications to subscribers. It is a one-way operation issued by the WIM that cannot be
invoked as an operation by the consumer. In order to receive notifications, the consumer shall have a subscription.
Table 6.5.9.1-1 lists the information flow exchanged between the consumer and the WIM.
6.5.10.1 Description
This operation enables the consumer to terminate a particular subscription. Table 6.5.10.1-1 lists the information flow
exchanged between the consumer and the WIM.
ETSI
53 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
6.5.11.1 Description
This operation enables the consumer to query information about subscriptions. Table 6.5.11.1-1 lists the information
flow exchanged between the consumer and the WIM.
8.1 Introduction
This clause defines, or references, definitions of information elements used in the interfaces defined in the present
document.
ETSI
54 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.2.2.1 Introduction
The information elements in this group encapsulate information related to MSCS.
8.2.2.2.1 Description
The MscsData information element encapsulates information needed for creating or updating a MSCS.
8.2.2.2.2 Attributes
The MscsData information element shall follow the indications provided in table 8.2.2.2.2-1.
8.2.2.3.1 Description
The MscsEndpointData information element encapsulates information about the MSCS endpoint and the network
configuration necessary to setup the connectivity to/from MSCS endpoint to the multi-site (WAN) network edge point.
8.2.2.3.2 Attributes
The MscsEndpointData information element shall follow the indications provided in table 8.2.2.3.2-1.
ETSI
55 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.2.2.4.1 Description
The MscsProfile information element encapsulates information determining the connectivity constraints and
requirements for the MSCS.
8.2.2.4.2 Attributes
The MscsProfile information element shall follow the indications provided in table 8.2.2.4.2-1.
ETSI
56 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.2.2.5.1 Description
The Mscs information element encapsulates information about an established MSCS.
8.2.2.5.2 Attributes
The Mscs information element shall follow the indications provided in table 8.2.2.5.2-1.
8.2.2.6.1 Description
The Msnc information element encapsulates information about an established MSNC on the multi-site network, partly
or fully, realizing the MSCS.
8.2.2.6.2 Attributes
The MSNC information element shall follow the indications provided in table 8.2.2.6.2-1.
ETSI
57 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.2.2.7.1 Description
The MsncProfile information element encapsulates information about the connectivity constraints and requirements of a
particular MSNC realizing the MSCS.
8.2.2.7.2 Attributes
The MsncProfile information element shall follow the indications provided in table 8.2.2.7.2-1.
ETSI
58 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.2.2.8.1 Description
The MscsEndpointInfo information element encapsulates information about network configuration of the MSCS
endpoint of an MSCS. The MSCS Endpoint relates a connectivity service endpoint with the MSCS.
8.2.2.8.2 Attributes
The MscsEndpointInfo information element shall follow the indications provided in table 8.2.2.8.2-1.
ETSI
59 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.2.3.1 Introduction
The information elements in this group encapsulate information related to MSCS reservation.
8.2.3.2.1 Description
The MscsReservationData information element encapsulates information needed for creating a MSCS reservation.
8.2.3.2.2 Attributes
The attributes of the MscsReservationData information element shall follow the indications provided in
table 8.2.3.2.2-1.
8.2.3.3.1 Description
This clause describes the attributes for the ReservedMscs information element. A ReservedMscs provides information
about the properties of a reserved MSCS including references to the MSCS endpoints, profile, protocol layer
information, etc.
8.2.3.3.2 Attributes
The ReservedMscs information element shall follow the indications provided in table 8.2.3.3.2-1.
ETSI
60 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.2.4 MscsChangeNotification
8.2.4.1 Description
This notification informs the receiver of changes related to the MSCSs managed by the WIM. The support of the
notification is mandatory.
• Change of network path, e.g. to avoid network congestion or achieve load balance, etc.
• Operation and management of WAN resources, e.g. to share WAN connectivity resource, etc.
• Update the MSCS, e.g. adding new MSNCs, terminating or updating existing MSNCs, etc.
8.2.4.3 Attributes
The MscsChangeNotification shall follow the indications provided in table 8.2.4.3-1.
ETSI
61 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
EXAMPLE: An example when adding new MSCS Endpoint to an existing MSCS follows:
networkId: "wan-eu-de-zone1-nfvi-pops_1_2",
changedMscsProfile: "",
affectedComponent: [
{"addition", "mscs-endpoint-99", ""},
]
8.2.5 MscsReservationChangeNotification
8.2.5.1 Description
This notification informs the receiver of changes related to the MSCS reservations managed by the WIM. The support
of the notification is mandatory.
• A MSCS reservation changed due to changes in the underlying supporting resources that are part of this
reservation (e.g. this can include pre-reserved connections, network links, etc.).
8.2.5.3 Attributes
The MscsReservationChangeNotification shall follow the indications provided in table 8.2.5.3-1.
ETSI
62 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.3.2.1 Description
The CapacityInfo information element encapsulates information about capacity of the network in between the
NFVI-PoPs (sites). Capacity information can be held on a variety of key performance indicators (KPI) such as
bandwidth, logical network identifiers (e.g. VNI), etc.
8.3.2.2 Attributes
The attributes of the CapacityInfo information element shall follow the indications provided in table 8.3.2.2-1.
ETSI
63 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.3.3.1 Description
The CapacityValueEntry information element encapsulates values about a capacity metric. Capacity values include
total, allocated, reserved and available capacity, which can be expressed via sub-counters.
8.3.3.2 Attributes
The attributes of the CapacityValueEntry information element shall follow the indications provided in table 8.3.3.2-1.
8.3.4.1 Description
The TimePeriodInformation information element specifies a time period for which capacity is queried.
8.3.4.2 Attributes
The attributes of the TimePeriodInformation information element shall follow the indications provided in
table 8.3.4.2-1.
ETSI
64 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.3.5.1 Description
The NetworkCapacityThreshold information element defines threshold for triggering capacity change notifications.
8.3.5.2 Attributes
The attributes of the NetworkCapacityThreshold information element shall follow the indications provided in
table 8.3.5.2-1.
8.3.6 NetworkCapacityChangeNotification
8.3.6.1 Description
This notification informs the receiver of changes in the capacity of the network in between the NFVI-PoPs managed by
the WIM. The object instances for this information element shall be networks, topologies, nodes and links.
• Addition/removal/upgrading of network nodes and links affecting the available and total capacity.
• Faults and repair of network infrastructure affecting the available and total capacity.
8.3.6.3 Attributes
The attributes of the NetworkCapacityChangeNotification shall follow the indications provided in table 8.3.6.3-1.
ETSI
65 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.3.7.1 Description
The NetworkInfo information element encapsulates information about a network in between the NFVI-PoPs (sites).
The relationship in between the information elements specified in the present clause is depicted in figure 8.3.7.1-1,
which illustrates the information model of network resources and topology for multi-site connectivity.
ETSI
66 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
Figure 8.3.7.1-1: Network resources and topology modelling for multi-site connectivity
8.3.7.2 Attributes
The attributes of the NetworkInfo information element shall follow the indications provided in table 8.3.7.2-1.
8.3.8.1 Description
The TopologyInfo information element encapsulates information about a topology of the network in between the
NFVI-PoPs (sites).
8.3.8.2 Attributes
The attributes of the TopologyInfo information element shall follow the indications provided in table 8.3.8.2-1.
ETSI
67 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.3.9.1 Description
The NodeInfo information element encapsulates information about a node of the network in between the NFVI-PoPs
(sites).
8.3.9.2 Attributes
The attributes of the NodeInfo information element shall follow the indications provided in table 8.3.9.2-1.
8.3.10.1 Description
The LinkInfo information element encapsulates information about a point to point link in between two nodes of the
network in between the NFVI-PoPs (sites), or a point to point link at the edge of the network enabling the connectivity
between the connectivity service endpoint of the NFVI-PoP and the WAN.
NOTE: The links in the network are assumed to be bidirectional, and therefore the set of network nodes and links
create an undirected graph.
ETSI
68 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.3.10.2 Attributes
The attributes of the LinkInfo information element shall follow the indications provided in table 8.3.10.2-1.
8.3.11.1 Description
The NetworkEdgePointInfo information element encapsulates information about a network edge point of the network in
between the NFVI-PoPs (sites). The network edge points represent the ingress/egress ports of the network in between
the NFVI-PoPs.
8.3.11.2 Attributes
The attributes of the NetworkEdgePointInfo information element shall follow the indications provided in
table 8.3.11.2-1.
8.3.12.1 Description
The ConnectivityServiceEndpointInfo information element encapsulates information about a connectivity service
endpoint of an NFVI-PoP on which a MSCS can be terminated. The WIM's managed object
ConnectivityServiceEndpointInfo relates one to one with the VIM's managed object ConnectivityServiceEndpoint (refer
to clause 8.10.4 of ETSI GS NFV-IFA 005 [i.9]).
ETSI
69 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
NOTE: The setup of a concrete instance of ConnectivityServiceEndpointInfo (e.g. its creation and maintenance)
is not specified in the present document.
8.3.12.2 Attributes
The attributes of the ConnectivityServiceEndpointInfo information element shall follow the indications provided in
table 8.3.12.2-1.
8.3.13 TopologyChangeNotification
8.3.13.1 Description
This notification informs the receiver of changes in the network in between the NFVI-PoPs managed by the WIM in
terms of topology, nodes, and/or links. The object instances for this information element shall be networks, topologies,
nodes and links.
• Making a new topology available, modifying an existing topology (e.g. addition or removing of referred
network nodes and network links), or removing a topology from the network.
8.3.13.3 Attributes
The attributes of the TopologyChangeNotification shall follow the indications provided in table 8.3.13.3-1.
ETSI
70 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
EXAMPLE 1: An example when adding new network nodes to an existing network follows:
networkId: "wan-eu-de-zone1",
changedInfo: [
{"addition", "node2-zone1", ""},
{"addition", "node3-zone1", ""},
{"removal", "node1-zone1", ""},
{"modification", "node0-zone1", [{sub-change1}, {sub-change2}]}
]
8.4.2.1 Description
The Alarm information element encapsulates information about an alarm.
8.4.2.2 Attributes
The attributes of the Alarm information element shall follow the indications provided in table 8.4.2.2-1.
ETSI
71 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
ETSI
72 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.4.3 AlarmNotification
8.4.3.1 Description
This notification informs the receiver of alarms related to the MSCSs managed by the WIM.
• An alarm has been updated, e.g. if the severity of the alarm has changed.
8.4.3.3 Attributes
The attributes of the AlarmNotification shall follow the indications provided in table 8.4.3.3-1.
8.4.4 AlarmClearedNotification
8.4.4.1 Description
This notification informs the receiver of the clearing of an alarm related to the MSCSs managed by the WIM. The
alarm's perceived severity shall be set to "cleared" since the corresponding fault has been solved.
8.4.4.3 Attributes
The attributes of the AlarmClearedNotification shall follow the indications provided in table 8.4.4.3-1.
ETSI
73 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.4.5 AlarmListRebuiltNotification
8.4.5.1 Description
This notification informs the receiver that the active alarm list has been rebuilt by the WIM. Upon receipt of this
notification, the receiver needs to use the "Get Alarm List" operation to synchronize its view on current active alarms
with that of the WIM.
• Active alarm list has been rebuilt by the WIM, e.g. if the WIM detects its storage holding the alarm list is
corrupted.
8.4.5.3 Attributes
The AlarmListRebuiltNotification does not contain any attributes.
8.5.2.1 Description
This information element allows specifying the MSCS or MSNC instances on which performance information will be
provided. The ObjectSelection is a pattern to select object instances. The pattern is used in multiple interfaces. In the
present interface, the ObjectSelection pattern is used to select MSCS or MSNC instances.
8.5.2.2 Attributes
The attributes of the ObjectSelection information element shall follow the indications provided in table 8.5.2.2-1.
ETSI
74 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.5.3.1 Description
This information element provides the details of the PM Job. The object instances for this information element shall be
MSCS or MSNC instances.
8.5.3.2 Attributes
The attributes of the PmJob information element shall follow the indications provided in table 8.5.3.2-1.
ETSI
75 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.5.4.1 Description
This information element provides the details of a threshold. The object instances for this information element shall be
MSCS or MSNC instances.
8.5.4.2 Attributes
The attributes of the Threshold information element shall follow the indications provided in table 8.5.4.2-1.
8.5.5.1 Description
This information element defines the format of a performance report provided by the producer to the consumer on a
specified object instance or a set of them. The object instances for this information element shall be MSCS or MSNC
instances.
8.5.5.2 Attributes
The attributes of the PerformanceReport information element shall follow the indications provided in table 8.5.5.2-1.
ETSI
76 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.5.6.1 Description
This information element defines a single performance report entry. The object instances for this information element
shall be MSCS or MSNC instances.
8.5.6.2 Attributes
The attributes of the PerformanceReportEntry information element shall follow the indications provided in
table 8.5.6.2-1.
8.5.7.1 Description
This information element defines a single performance value with its associated time stamp and measurement context
(see clause B.1).
8.5.7.2 Attributes
The attributes of the PerformanceValueEntry information element shall follow the indications provided in
table 8.5.7.2-1.
ETSI
77 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
8.5.8 PerformanceInformationAvailableNotification
8.5.8.1 Description
This notification informs the receiver that performance information is available. Delivery mechanism for the
performance reports is not specified in the present document. The object instances for this information element shall be
MSCS or MSNC instances.
8.5.8.3 Attributes
The attributes of the PerformanceInformationAvailableNotification shall follow the indications provided in
table 8.5.8.3-1.
8.5.9 ThresholdCrossedNotification
8.5.9.1 Description
This notification informs the receiver that a threshold value has been crossed. The object instances for this information
element shall be MSCS or MSNC instances.
• A Threshold has been crossed. Depending on threshold type, there might be a single or multiple crossing
values.
8.5.9.3 Attributes
The attributes of the ThresholdCrossedNotification shall follow the indications provided in table 8.5.9.3-1.
ETSI
78 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
ETSI
79 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
Annex A (informative):
Terminology mapping
A.1 Introduction
The present annex provides a translation of the concepts of the present document to an industry understandable
terminology used in multi-site connectivity as defined in external organizations.
A.2.1 Introduction
The present clause provides a translation of the concepts of the present document to terminology used in IETF (Internet
Engineering Task Force). IETF RFC 8453 [i.4] outlines the Framework for ACTN; the IETF RFC 8454 [i.5] outlines
the information model for ACTN. When IETF ACTN (Abstraction and Control of TE Networks) is used, the following
terminology is applicable.
Table A.2.2.1-1: Terminology mapping between the present document specification and IETF ACTN
ETSI
80 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
An AP is a logical identifier shared between the customer and the operator used to identify an access link. The AP is
used by the customer when requesting a Virtual Network Service (VNS). Note that the term "TE Link Termination
Point" describes the endpoints of links, while an AP is a common identifier for the link itself.
The usage of the AP provides also a degree of confidentiality between the customer and the operator, which do not
share information about the CE and PE nodes but just identifiers of the points where it is possible to access the network.
The customer and the provider will have different views of how their resources can be connected to the APs. It is also
possible to define parameters against the AP such as reservable bandwidth and physical bandwidth.
Customer Node:
Node on the Customer network (e.g. nodes serving fixed residential users, mobile users, and small enterprises).
Domain:
A domain is "any collection of network elements within a common sphere of address management or path computation
responsibility". Domain is part of an operator's network that is under common management (i.e. under shared
operational management using the same instances of a tool and the same policies). Network elements are often grouped
into domains based on technology types, vendor profiles, and geographic proximity.
Inter-domain link:
Link:
A link is an edge on the graph representation of a TE topology. Two nodes connected by a link are said to be "adjacent"
in the TE topology. In a physical network topology, a link corresponds to a physical connection. In an abstract network
topology, a link (sometimes called an "abstract link") is a representation of the potential to connect a pair of points with
certain TE parameters. Network abstraction may be applied recursively, so a link in one topology may be created by
applying abstraction to the links in the underlying topology.
Node:
A node is a vertex on the graph representation of a TE topology. In a physical network topology, a node corresponds to
a physical Network Element (NE) such as a router. In an abstract network topology, a node (sometimes called an
"abstract node") is a representation as a single vertex of one or more physical NEs and their connecting physical
connections. The concept of a node represents the ability to connect from any access to the node (a link end) to any
other access to that node, although "limited cross-connect capabilities" may also be defined to restrict this functionality.
Network abstraction may be applied recursively, so a node in one topology may be created by applying abstraction to
the nodes in the underlying topology.
Operator Node:
Node in Operator network (e.g. transport network nodes and edge points connecting Customer nodes).
TE:
Traffic Engineering (TE) encompasses application of technology and scientific principles to achieve performance
objectives of operational networks.
ETSI
81 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
A VN is a network provided by a service provider to a customer for the customer to use in any way it wants as though it
was a physical network. Virtual Networks are built from abstractions of the underlying TE networks. There are two
views of a VN as follows:
The VN can be abstracted as a set of edge-to-edge links (a Type 1 VN). Each link is referred as a "VN member" and is
formed as an end-to-end tunnel across the underlying networks. Such tunnels may be constructed by recursive slicing or
abstraction of paths in the underlying networks and can encompass edge points of the customer's network, access links,
intra-domain paths, and inter-domain links.
The VN can also be abstracted as a topology of virtual nodes and virtual links (a Type 2 VN). The operator needs to
map the VN to actual resource assignment, which is known as "virtual network embedding". The nodes in this case
include physical endpoints, border nodes, and internal nodes as well as abstracted nodes. Similarly, the links include
physical access links, inter-domain links, and intra-domain links as well as abstract links.
The key advantage of VN concept is, the operator does not have to deal with issues related to the management and
control of multiple domains.
An underlay connectivity between two remote nodes (i.e. belonging to different Autonomous Systems (AS)) is
composed by a number of intra-domain tunnels, plus inter domain links, plus configuration mechanisms to handover the
traffic form one AS to another AS (e.g. Inter AS option A, B or C). This complexity is hidden by the VN, which
represent the result of the stitching of all these items into an end to end connection.
A VN can be P2P (point-to-point) or MP2MP (multipoint-to-multipoint) and each branch of the VN is called
VN member.
A Virtual Network Access Point (VNAP) is the binding between an AP and a VN. It is used to allow different VNs to
start from the same AP. It also allows for traffic engineering on the access and/or inter-domain links (e.g. keeping track
of bandwidth allocation). A different VNAP is created on an AP for each VN.
VNS:
A Virtual Network Service (VNS) is the service agreement between a customer and operator to provide a VN.
ETSI
82 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
Annex B (normative):
Performance and capacity metrics and measurements
B.1.1 Introduction
The performance monitoring of MSCS and MSNC is supported by the Performance Management interface. The
interface supports the handling of PM jobs, performance Thresholds, and the issue of notifications about the availability
of the performance information. There are two types of information relevant to the performance management:
Clause B.1.2 defines the measured object types for the performance measurements specified in the present document.
Clause B.1.3 specifies the performance measurements.
The WIM shall generate the measurement value(s) according to the "Collection Method" and "Trigger" defined in each
respective performance measurement.
The objectType, when used in PM job or performance report, shall be equal to "Mscs".
The objectInstanceId, when used in PM job or performance report, shall be equal to the mscsId of the
measured MSCS instance (see clause 8.2.2.5).
The objectType, when used in PM job or performance report, shall be equal to "Msnc".
The objectInstanceId, when used in PM job or performance report, shall be equal to the msncId of the
measured MSNC instance (see clause 8.2.2.6).
ETSI
83 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
c) Trigger: The WIM counts the number of incoming packets for each one of the MSCS endpoints. The WIM
generates the measurement for the subject Mscs by assigning the value of the collected number of incoming
packets measurement(s) to the sub-counters per MSCS endpoint.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
c) Trigger: The WIM counts the number of outgoing packets for each one of the MSCS endpoints. The WIM
generates the measurement for the subject Mscs by assigning the value of the collected number of outgoing
packets measurement(s) to the sub-counters per MSCS endpoint.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
c) Trigger: The WIM counts the number of incoming bytes for each one of the MSCS endpoints. The WIM
generates the measurement for the subject Mscs by assigning the value of the collected number of incoming
bytes measurement(s) to the sub-counters per MSCS endpoint.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
ETSI
84 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
c) Trigger: The WIM counts the number of outgoing bytes for each one of the MSCS endpoints. The WIM
generates the measurement for the subject Mscs by assigning the value of the collected number of outgoing
bytes measurement(s) to the sub-counters per MSCS endpoint.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
c) Trigger: The WIM selects the maximum value of the one-way delay measured among all the pairs of MSCS
endpoints.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
- EndpointPair: the information about the MSCS endpoints in between the maximum one-way delay has
been observed. Format: Source:SourceMscsEndpointId.Dest:DestMscsEndpointId, where
MscsEndpointId is equal to mscsEndpointId, the identifier of the source MSCS endpoint, and
DestMscsEndpointId is equal to mscsEndpointId, the identifier of the destination MSCS endpoint
(see clause 8.2.2.8).
c) Trigger: The WIM selects the minimum value of the one-way delay measured among all the pairs of MSCS
endpoints.
ETSI
85 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
- EndpointPair: the information about the MSCS endpoints in between the minimum one-way delay has
been observed. Format: Source:SourceMscsEndpointId.Dest:DestMscsEndpointId, where
MscsEndpointId is equal to mscsEndpointId, the identifier of the source MSCS endpoint, and
DestMscsEndpointId is equal to mscsEndpointId, the identifier of the destination MSCS endpoint
(see clause 8.2.2.8).
c) Trigger: The WIM takes the arithmetic mean of all the collected one-way delay measurements among all the
pairs of MSCS endpoints in the collection period.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
c) Trigger: The WIM selects the maximum value of the one-way delay variation measured among all the pairs of
MSCS endpoints.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
- EndpointPair: the information about the MSCS endpoints in between the maximum one-way delay
variation has been observed. Format: Source:SourceMscsEndpointId.Dest:DestMscsEndpointId, where
MscsEndpointId is equal to mscsEndpointId, the identifier of the source MSCS endpoint, and
DestMscsEndpointId is equal to mscsEndpointId, the identifier of the destination MSCS endpoint
(see clause 8.2.2.8).
ETSI
86 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
c) Trigger: The WIM selects the minimum value of the one-way delay variation measured among all the pairs of
MSCS endpoints.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
- EndpointPair: the information about the MSCS endpoints in between the minimum one-way delay
variation has been observed. Format: Source:SourceMscsEndpointId.Dest:DestMscsEndpointId, where
MscsEndpointId is equal to mscsEndpointId, the identifier of the source MSCS endpoint, and
DestMscsEndpointId is equal to mscsEndpointId, the identifier of the destination MSCS endpoint
(see clause 8.2.2.8).
c) Trigger: The WIM takes the arithmetic mean of all the measured one-way delay variation measurements
among all the pairs of MSCS endpoints in the collection period.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
c) Trigger: The WIM computes the percentage as ((num_packets_lost / num_total_packets)×100), where the
num_total_packets represents the number of packets that should have been forwarded by the MSCS.
ETSI
87 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
c) Trigger: The WIM counts the number of incoming broadcast packets for each one of the MSCS endpoints.
The WIM generates the measurement for the subject Mscs by assigning the value of the collected number of
incoming broadcast packets measurement(s) to the sub-counters per MSCS endpoint.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
c) Trigger: The WIM counts the number of outgoing broadcast packets for each one of the MSCS endpoints.
The WIM generates the measurement for the subject Mscs by assigning the value of the collected number of
outgoing broadcast packets measurement(s) to the sub-counters per MSCS endpoint.
ETSI
88 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
c) Trigger: The WIM counts the number of incoming packets for each one of the MSNC endpoints. The WIM
generates the measurement for the subject Msnc by assigning the value of the collected number of incoming
packets measurement(s) to the sub-counters per MSNC endpoint.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
c) Trigger: The WIM counts the number of outgoing packets for each one of the MSNC endpoints. The WIM
generates the measurement for the subject Msnc by assigning the value of the collected number of outgoing
packets measurement(s) to the sub-counters per MSNC endpoint.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
ETSI
89 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
c) Trigger: The WIM counts the number of incoming bytes for each one of the MSNC endpoints. The WIM
generates the measurement for the subject Msnc by assigning the value of the collected number of incoming
bytes measurement(s) to the sub-counters per MSNC endpoint.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
c) Trigger: The WIM counts the number of outgoing bytes for each one of the MSNC endpoints. The WIM
generates the measurement for the subject Msnc by assigning the value of the collected number of outgoing
bytes measurement(s) to the sub-counters per MSNC endpoint.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
c) Trigger: The WIM selects the maximum value of the one-way delay measured among all the pairs of MSNC
endpoints.
ETSI
90 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
- EndpointPair: the information about the MSNC endpoints in between the maximum one-way delay has
been observed. Format: Source:SourceMsncEndpointId.Dest:DestMsncEndpointId, where
MsncEndpointId is equal to msncEndpointId, the identifier of the source MSNC endpoint, and
DestMsncEndpointId is equal to msncEndpointId, the identifier of the destination MSNC endpoint
(see clause 8.2.2.6).
c) Trigger: The WIM selects the minimum value of the one-way delay measured among all the pairs of MSNC
endpoints.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
- EndpointPair: the information about the MSNC endpoints in between the minimum one-way delay has
been observed. Format: Source:SourceMsncEndpointId.Dest:DestMsncEndpointId, where
MsncEndpointId is equal to msncEndpointId, the identifier of the source MSNC endpoint, and
DestMsncEndpointId is equal to msncEndpointId, the identifier of the destination MSNC endpoint
(see clause 8.2.2.6).
c) Trigger: The WIM takes the arithmetic mean of all the collected one-way delay measurements among all the
pairs of MSNC endpoints in the collection period.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
ETSI
91 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
c) Trigger: The WIM selects the maximum value of the one-way delay variation measured among all the pairs of
MSNC endpoints.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
- EndpointPair: the information about the MSNC endpoints in between the maximum one-way delay
variation has been observed. Format: Source:SourceMsncEndpointId.Dest:DestMsncEndpointId, where
MsncEndpointId is equal to msncEndpointId, the identifier of the source MSNC endpoint, and
DestMsncEndpointId is equal to msncEndpointId, the identifier of the destination MSNC endpoint
(see clause 8.2.2.6).
c) Trigger: The WIM selects the minimum value of the one-way delay variation measured among all the pairs of
MSNC endpoints.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
- EndpointPair: the information about the MSNC endpoints in between the minimum one-way delay
variation has been observed. Format: Source:SourceMsncEndpointId.Dest:DestMsncEndpointId, where
MsncEndpointId is equal to msncEndpointId, the identifier of the source MSNC endpoint, and
DestMsncEndpointId is equal to msncEndpointId, the identifier of the destination MSNC endpoint
(see clause 8.2.2.6).
c) Trigger: The WIM takes the arithmetic mean of all the measured one-way delay variation measurements
among all the pairs of MSNC endpoints in the collection period.
ETSI
92 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
c) Trigger: The WIM computes the percentage as ((num_packets_lost / num_total_packets)×100), where the
num_total_packets represents the number of packets that should have been forwarded by the MSNC.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
c) Trigger: The WIM counts the number of incoming broadcast packets for each one of the MSNC endpoints.
The WIM generates the measurement for the subject Msnc by assigning the value of the collected number of
incoming broadcast packets measurement(s) to the sub-counters per MSNC endpoint.
ETSI
93 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
c) Trigger: The WIM counts the number of outgoing broadcast packets for each one of the MSNC endpoints.
The WIM generates the measurement for the subject Msnc by assigning the value of the collected number of
outgoing broadcast packets measurement(s) to the sub-counters per MSNC endpoint.
h) Measurement Context:
- MeasurementInterval: the duration of the observation by the measurement system to assess the metric.
B.2.1 Introduction
The capacity monitoring of multi-site network connectivity is supported by the Capacity Management interface. The
interface supports querying capacity data, as well as handling capacity Thresholds, and the issue of notifications about
capacity changes. There are two types of information relevant to the capacity management:
• the type of measured objects, according to the capacity and topology information objects; and
Clause B.2.2 defines the measured object types for the capacity measurements specified in the present document.
Clause B.2.3 specifies the capacity measurements.
The WIM shall generate the measurement value(s) according to the "Trigger" defined in each respective capacity
measurement.
The objectType, when used in querying capacity information, shall be equal to "NETWORK".
ETSI
94 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
The objectInstanceId, when used in querying capacity information or notifying about capacity changes, shall be
equal to the networkId of the measured network (see clause 8.3.7).
The objectType, when used in querying capacity information, shall be equal to "TOPOLOGY".
The objectInstanceId, when used in querying capacity information or notifying about capacity changes, shall be
equal to the topologyId of the measured topology (see clause 8.3.8).
The objectType, when used in querying capacity information, shall be equal to "NODE".
The objectInstanceId, when used in querying capacity information or notifying about capacity changes, shall be
equal to the nodeId of the measured network node (see clause 8.3.9).
The objectType, when used in querying capacity information, shall be equal to "LINK".
The objectInstanceId, when used in querying capacity information or notifying about capacity changes, shall be
equal to the linkId of the measured network link (see clause 8.3.10).
B.2.3.1.1 Bandwidth
a) Description: This measurement provides capacity values related to bandwidth over the total set of links in the
network. This measurement is split into sub-counters per capacity value type.
b) Trigger: For the allocated, reserved and available capacity values, the WIM computes the average bandwidth
considering the total n set of links i in the network as the "sum of bandwidth per link divided by the number of
links in the network ((∑ )/)", wherein bwi is the corresponding percentage of bandwidth on link i,
whether allocated, available or reserved over the total link throughput. For the total capacity value, the WIM
computes the average total bandwidth capacity considering the total n set of links I in the network as the "sum
of bandwidth throughput per link divided by the number of links in the network".
c) Measurement Unit: Each measurement of allocated, reserved and available capacity is a real value (unit: %).
The sub-counter value of total capacity is an integer (unit: Mbps).
e) Measurement Name: NetBw.[total | allocated | reserved | available ], where total, allocated, reserved and
available are sub-counters of the respective capacity.
ETSI
95 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
b) Trigger: The WIM counts the available number of logical networks in the network. The total capacity value
equals to the maximum number of supported logical network.
b) Trigger: The WIM counts the number of circuits in the topology. The total capacity value equals to the
maximum number of supported circuits.
b) Trigger: The WIM counts number of routing areas in the topology. The total capacity value equals to the
maximum number of supported routing areas.
b) Trigger: The WIM counts the number of routing peers in the topology. The total capacity value equals to the
maximum number of supported routing peers.
ETSI
96 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
b) Trigger: The WIM counts the number of edge nodes per routing area in the topology. The total capacity value
equals to the maximum number of supported edge nodes.
b) Trigger: The WIM counts the number of logical forwarding entries in the network node. The total capacity
value equals to the maximum number of supported logical forwarding entries.
b) Trigger: The WIM counts the total number of routing peers associated to the network node. The total capacity
value equals to the maximum number of supported routing peers of a node.
b) Trigger: The WIM counts the number of bidirectional forwarding detection sessions of the network node. The
total capacity value equals to the maximum number of supported bidirectional forwarding detection sessions.
ETSI
97 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
b) Trigger: The WIM counts the number of link aggregation group members of the network node. The total
capacity value equals to the maximum number of supported link aggregation group members.
b) Trigger: The WIM computes the forwarding load of the network node. The total capacity value equals to the
maximum supported forwarding load.
c) Measurement Unit: Each measurement of allocated and available capacity is a real value (unit: %). The
measurement of total capacity is an integer (unit: frames/packets per second).
b) Trigger: The WIM counts the total (maximum supported) and allocated (in use) CPU load of the network
node. The total capacity value equals to the maximum supported CPU capacity.
c) Measurement Unit: Each measurement of allocated is a real value (unit: %). The measurement of total
capacity is an integer (unit: MHz).
e) Measurement Name: NodeCpuLoad.[total | allocated], where total, and allocated are sub-counters of the
respective capacity.
b) Trigger: The WIM counts the total (maximum supported) and allocated (in use) memory load of the network
node. The total capacity value equals to the maximum supported memory capacity.
c) Measurement Unit: Each measurement of allocated is a real value (unit: %). The measurement of total
capacity is an integer (unit: Mbyte).
ETSI
98 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
e) Measurement Name: NodeMemLoad.[total | allocated ], where total and allocated are sub-counters of the
respective capacity.
B.2.3.4.1 Bandwidth
a) Description: This measurement provides capacity values related to bandwidth on a network link. This
measurement is split into sub-counters per capacity value type.
b) Trigger: The WIM counts the total (maximum supported), allocated, and available throughput load of the
network link. For the total capacity value, the WIM retrieves the nominal link throughput.
c) Measurement Unit: Each measurement of allocated, reserved and available capacity is a real value (unit: %).
The measurement of total capacity is an integer (unit: Mbps).
e) Measurement Name: LinkBw.[total | allocated | reserved | available ], where total, allocated, reserved and
available are sub-counters of the respective capacity.
ETSI
99 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
Annex C (normative):
Security and Regulatory Concerns
A Security Environment
a.1 Assumptions
a.1.1 A set of management networks providing connectivity for management
purposes among the existing NFV-MANO functional entities (NFVO,
VNFM and VIM) and the WIM, whose produced interfaces are specified in
the present document.
a.1.2 Internal attackers have access to the management network. See a.1.1 in Table 1 of ETSI
GS NFV-SEC 014 [i.7].
a.1.3 Internal attackers are attached to the management network. See a.1.7 in Table 1 of ETSI
GS NFV-SEC 014 [i.7].
a.1.4 Internal attackers have access to the NFV-MANO functional entities. Specialized from a.1.3, and
a.1.5 in Table 1 of ETSI
GS NFV-SEC 014 [i.7].
a.2 Assets
a.2.1 Existing NFV-MANO functional entities: these are the NFVO, VNFM and See clause 4.1 of ETSI
VIM. These assets offer interfaces for consuming NFV-MANO services as GS NFV-IFA 031 [i.8].
well as are responsible for storing relevant NFV-MANO information and
artefacts (e.g. VNF Packages, NSD, VNFD, images, etc.). The NFVO can
act as a consumer of the interfaces produced by the WIM.
a.2.2 WIM: it is responsible for assisting in the management of connectivity over
the WAN infrastructure.
a.2.3 NFVI-PoP: N-PoP where a Network Function is or could be deployed as
Virtual Network Function (VNF).
a.2.4 Interfaces produced by the WIM for the management of WAN resources See clause 5.2.
and connectivity across multiple NFVI-PoPs.
a.2.5 Fault alarm: fault information reported to a consumer including information See clause 8.4.2.
to identify the object on which the fault occurred, the type of fault that was
identified, the cause of the fault, the timestamp information about when
the event causing the fault was observed, as well as timing information
about the alarm that is raised.
a.2.6 Performance and capacity metrics: performance and capacity information See annex B.
that need to be reported/acquired.
a.2.7 The credentials of authorized administrators with legitimate access to the Specialized from a.2.2 in
NFV-MANO functional entities and the WIM. Table 1 of ETSI
GS NFV-SEC 014 [i.7].
a.2.8 WAN resources, such as network nodes and links, which are used for the See clauses 4.3, 8.3.7, 8.3.8,
establishment of Multi-Site Connectivity Service (MSCS) by using one or 8.3.9 and 8.3.10.
more Multi-Site Network Connections (MSNCs).
a.3 Threat agents
a.3.1 Unauthorized user of assets.
a.3.1.1 Agent can be human, e.g. an administrator with access to the assets.
a.3.1.2 Agent can be a piece of software, e.g. a malicious computer program
installed during an earlier access and programmed to run later.
a.3.2 (Industrial) espionage agent.
a.3.3 Sabotage agent.
a.3.4 Internal threat agent, e.g. corrupt employee.
a.4 Threats
a.4.1 Unauthorized read (viewing/copying/consuming of data and interfaces). Refer to threat agents a.3.1,
a.3.2 and a.3.4.
Refer to all assets in a.2.
a.4.2 Unauthorized write action (masquerade ("spoofing"), forgery, loss or Refer to threat agents a.3.3
corruption of information). and a.3.4.
Refer to all assets in a.2.
ETSI
100 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
A Security Environment
a.4.3 Unauthorized access. Refer to threat agents a.3.1,
a.3.2, a.3.3. Refer to all
assets in a.2.
a.4.4 Repudiation (endpoint and threat agents). Refer to threat agent a.3.4.
Refer to assets a.2.4, a.2.5,
a.2.6 and a.2.7.
a.4.5 Denial of service. Refer to threat agents a.3.3
and a.3.4.
Refer to assets in a.2.1,
a.2.2, a.2.3, a.2.4, and a.2.8.
B Security Objectives
b.1 Requirements for the assets relevant to the present document's scope
b.1.1 The WIM shall ensure that only authorized and authenticated entities can
access (read or write) the provided interfaces and that data is exchanged
in a confidential manner following the requirements for access controls
and communications security (see clauses 8.5 and 8.6 in ETSI
GS NFV-SEC 012 [2]).
b.1.2 The WIM shall ensure the authenticity and integrity of all data exchanged
on the interfaces following the requirements for authentication control (see
clause 8.4 in ETSI GS NFV-SEC 012 [2]).
b.1.3 The WIM shall ensure that data provenance is logged.
b.1.4 The WIM shall ensure that collected data is authentic. Collected data includes fault,
connectivity information,
timestamps, etc.
b.1.5 The WIM shall provide means to detect and mitigate denial of service
attacks.
b.1.6 The WIM shall ensure the authenticity of the WAN resources.
b.1.7 The WIM shall prevent replay of any data following requirements for
authentications control (see clause 8.4 in ETSI GS NFV-SEC 012 [2]).
ETSI
101 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
Annex D (informative):
Change History
Date Version Information about changes
May 2019 V3.2.2 Base line version for ed331 created from published version 3.2.1
Oct 2019 V3.3.2 Base-line version for ed341 created from published version ETSI GS NFV-IFA 032 v3.3.1
April 2020 V3.3.3 Implements the following CRs:
• NFVIFA(20)000154r1 - IFA032ed341 Rename CapacityThreshold IE and
CapacityChangeNotification
• NFVIFA(20)000286r2 - IFA032ed341 - Fixing issues in CapacityThreshold and
CapacityChangeNotification IEs
• NFVIFA(20)000307r1 - IFA032ed341 - Including measurementContext attribute to
ThresholdCrossedNotification IE
• NFVIFA(20)000311 - IFA032ed341 - Fixing Cardinality of the attribute faultType for
Alarm IE
March 2021 V3.4.2 Base-line version for ed351 created from published version ETSI GS NFV-IFA 032 v3.4.1
Implements the following CRs:
• NFVIFA(21)000128 - IFA032ed351 Miscellaneous maintenance
September V3.5.2 Base-line version for ed361 created from published version ETSI GS NFV-IFA 032 v3.5.1
2021
ETSI
102 ETSI GS NFV-IFA 032 V3.6.1 (2022-01)
History
Document history
V3.2.1 April 2019 Publication
ETSI