Folks,
Please review and comment on this draft.
Ron
-----Original Message-----
From: [email protected] <[email protected]>
Sent: Monday, June 11, 2018 3:49 PM
To: Ron Bonica <[email protected]>; Eric Rosen <[email protected]>; Eric
Rosen <[email protected]>
Subject: New Version Notification for draft-rosen-bess-secure-l3vpn-00.txt
A new version of I-D, draft-rosen-bess-secure-l3vpn-00.txt
has been successfully submitted by Eric C. Rosen and posted to the IETF
repository.
Name: draft-rosen-bess-secure-l3vpn
Revision: 00
Title: Augmenting RFC 4364 Technology to Provide Secure Layer L3VPNs
over Public Infrastructure
Document date: 2018-06-11
Group: Individual Submission
Pages: 19
URL: https://tools.ietf.org/html/draft-rosen-bess-secure-l3vpn-00
Status: https://datatracker.ietf.org/doc/draft-rosen-bess-secure-l3vpn/
Htmlized: https://tools.ietf.org/html/draft-rosen-bess-secure-l3vpn-00
Htmlized: https://datatracker.ietf.org/doc/html/draft-rosen-bess-secure-l3vpn
Abstract:
The Layer 3 Virtual Private Network (VPN) technology described in RFC
4364 is focused on the scenario in which a network Service Provider
(SP) maintains a secure backbone network and offers VPN service over
that network to its customers. Customers access the SP's network by
attaching "Customer Edge" (CE) routers to "Provider Edge" (PE)
routers, and exchanging cleartext IP packets. PE routers generally
serve multiple customers, and prevent unauthorized communication
among customers. Customer data sent across the backbone (from one PE
to another) is encapsulated in MPLS, using an MPLS label to associate
a given packet with a given customer. The labeled packets are then
sent across the backbone network in the clear, using MPLS transport.
However, many customers want a VPN service that is secure enough to
run over the public Internet, and which does not require them to send
cleartext IP packets to a service provider. Often they want to
connect directly to edge nodes of the public Internet, which does not
provide MPLS support. Each customer may itself have multiple tenants
who are not allowed to intercommunicate with each other freely. In
this case, the customer many need to provide a VPN service for the
tenants. This document describes a way in which this can be achieved
using the technology of RFC 4364. The functionality assigned therein
to a PE router can be placed instead in Customer Premises Equipment.
This functionality can be augmented by transmitting MPLS packets
through IPsec Security Associations. The BGP control plane sessions
can also be protected by IPsec. This allows a customer to use RFC
4364 technology to provide VPN service to its internal departments,
while sending only IPsec-protected packets to the Internet or other
backbone network, and eliminating the need for MPLS transport in the
backbone.
Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.
The IETF Secretariat
_______________________________________________
BESS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/bess