Chris, Jeff, and Alia:

We would like a 10-minutes slot at the RTGwg meeting in IETF97 to describe a 
new type of private network service:  
https://datatracker.ietf.org/doc/draft-dunbar-opsawg-private-networks-over-thin-cpe/

In a nutshell, this new type of private network service
- is like SD-WAN in the way that IP tunnels are automatically established from 
a thin-CPE at customer site,
- but different from SD-WAN because there are interactions with the underlay 
network (even though the interaction to underlay network is transparent to 
users), and  there are gateways (for private networks) instantiated in the 
underlay network to establish secure connections between Thin-CPEs and the 
gateways, and guaranteed QoS from the underlay networks.

The draft was submitted to opsawg. But after discussing with several IETF 
veterans of the draft, we have been told that the RTGwg is more suitable, as 
the new type of service described in the draft will need some protocol work. 
Some of the protocol work needed are documented in 
https://datatracker.ietf.org/doc/draft-templin-aerolink/, such as Interface 
Characteristics, Relay Behavior, Interface Forwarding Algorithm, Router 
Discovery, Prefix Delegation and Autoconfiguration, Interface Route 
Optimization, etc. (not to say the protocols described are 100% correct & 
applicable).

Some items listed in "draft-kanugovi-intarea-mams-protocol-01" are applicable 
too, such as
- Access technology agnostic interworking
- Independent Access path selection for Uplink and Downlink
- IP anchor selection independent of uplink and downlink access
- Adaptive network path selection
- Configuring network middleboxes based on negotiated protocols

The draft describes a private network laid over multiple Thin CPEs   (or 
Overlay VPN for easy of description).
"Overlay VPN" is a type of private networks that interconnect thin CPEs at 
multiple client sites by IP tunnels, or more specifically, lay over multiple 
client sites' Thin CPEs via IP tunnels. Those private overlay networks not only 
interconnect those sites by secure IP tunnels but can also enforce the client 
specified policies to govern how applications or hosts within those sites 
communicate and how to access public internet.


Thank you very much.

Linda Dunbar



_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg

Reply via email to