Chris, Jeff, and Alia: We would like a 10-minutes slot at the RTGwg meeting in IETF97 to describe a new type of private network service: https://datatracker.ietf.org/doc/draft-dunbar-opsawg-private-networks-over-thin-cpe/
In a nutshell, this new type of private network service - is like SD-WAN in the way that IP tunnels are automatically established from a thin-CPE at customer site, - but different from SD-WAN because there are interactions with the underlay network (even though the interaction to underlay network is transparent to users), and there are gateways (for private networks) instantiated in the underlay network to establish secure connections between Thin-CPEs and the gateways, and guaranteed QoS from the underlay networks. The draft was submitted to opsawg. But after discussing with several IETF veterans of the draft, we have been told that the RTGwg is more suitable, as the new type of service described in the draft will need some protocol work. Some of the protocol work needed are documented in https://datatracker.ietf.org/doc/draft-templin-aerolink/, such as Interface Characteristics, Relay Behavior, Interface Forwarding Algorithm, Router Discovery, Prefix Delegation and Autoconfiguration, Interface Route Optimization, etc. (not to say the protocols described are 100% correct & applicable). Some items listed in "draft-kanugovi-intarea-mams-protocol-01" are applicable too, such as - Access technology agnostic interworking - Independent Access path selection for Uplink and Downlink - IP anchor selection independent of uplink and downlink access - Adaptive network path selection - Configuring network middleboxes based on negotiated protocols The draft describes a private network laid over multiple Thin CPEs (or Overlay VPN for easy of description). "Overlay VPN" is a type of private networks that interconnect thin CPEs at multiple client sites by IP tunnels, or more specifically, lay over multiple client sites' Thin CPEs via IP tunnels. Those private overlay networks not only interconnect those sites by secure IP tunnels but can also enforce the client specified policies to govern how applications or hosts within those sites communicate and how to access public internet. Thank you very much. Linda Dunbar
_______________________________________________ rtgwg mailing list [email protected] https://www.ietf.org/mailman/listinfo/rtgwg
