Linda: You have resolved all my issues. Please consider the document “ready to publish”.
The following text in section 4.3 is clearer than the original text. When the MPLS VPN network can’t reach the desired Cloud DCs, IPsec tunnels can be used to dynamically connect the MPLS PEs with the desired Cloud DCs GWs. As MPLS VPNs provide more secure and higher quality services, choosing a PE closest to the Cloud GW for the IPsec tunnel is desirable to minimize the IPsec tunnel distance over the public Internet. Cheerily, Sue From: Linda Dunbar <[email protected]> Sent: Wednesday, April 12, 2023 2:41 PM To: Susan Hares <[email protected]>; [email protected] Cc: [email protected]; [email protected] Subject: RE: Opsdir early review of draft-ietf-rtgwg-net2cloud-problem-statement-22 Sue, Thank you very much for the valuable review. Please see below for the resolutions to your comments. Linda External ([email protected]<mailto:[email protected]>) Report This Email<https://protection.inkyphishfence.com/report?id=bmV0b3JnMTA1ODY5MTIvc2hhcmVzQG5kemguY29tLzZjMjUwNWM0ZmI3YTI2NmM0ODFiMzZjOWQyYmJlMjFmLzE2ODEzMjQ4NzguODY=#key=ef66669acd21cd2580aaacbe4f7d30b2> FAQ<https://www.godaddy.com/help/report-email-with-advanced-email-security-40813> GoDaddy Advanced Email Security, Powered by INKY<https://www.inky.com/protection-by-inky> Sue, Thank you very much for the valuable review. Please see below for the resolutions to your comments. Linda -----Original Message----- From: Susan Hares via Datatracker <[email protected]<mailto:[email protected]>> Sent: Monday, April 10, 2023 4:20 PM To: [email protected]<mailto:[email protected]> Cc: [email protected]<mailto:[email protected]>; [email protected]<mailto:[email protected]> Subject: Opsdir early review of draft-ietf-rtgwg-net2cloud-problem-statement-22 Reviewer: Susan Hares Review result: Has Issues I have read this document, sec-dir early review, rtg-dir, and tsv-dir early review. I am not a Cloud or Inter-Cloud expert. I am familiar with BGP and MPLS technology. I have marked this has issues just as the rtg-dir review (Ines Robles) has marked this "has issues" due to missing references. These reviews deal with editorial issues and not substantial technical issues. Technical issues: 1) I think the security issues listed in section 7 should include a reference to section 5 on the scaling. 2) Security issues in section 3 seem to be limited to 3.5 3) operational issues are covered in the remainder of section 3.0 [Linda] changed the reference to 3.5 and 5.1. Editorial issues: The textual issues that the rtg-dir (Ines Robles_ mentioned seem to be mostly editorial issues. My unique editorial comments [hares-comments] are included with the comments from rtg-dir I agree withy: [rtg-dir] Abstract: "today" --> "at the moment of writing this specification" ? [Linda] Changed. [hares] Abstract: /old text: Here are some examples of cloud network functions: Virtual Firewall services, Virtual Private network services, Virtual PBX services including voice and video conferences, etc./ /new text: Examples of cloud network functions are: Virtual Firewall services, Virtual Private network services, or Virtual PBX services including voice and video conferences./ [Linda] Changed. [rtg-dir] Section 1: The abstract mentions that the problems are related to MPLS, but the introduction does not mention it. Furthermore, it would be nice to explain why these 8 problems (Section 3) were selected in relation with MPLS. [Linda] The document is to address problems enterprises face to leverage their existing traditional VPN services for interconnecting to Clouds, not specifically MPLS. changed the "MPLS services" to "VPN services" [rtg-dir] Section 2, VPC: "... Most Cloud operators' VPCs only support...." --> "at the moment of writing this specification, most Cloud operators' VPCs only support...." ? - Section 3: [rtg-dir] * " There are many problems associated with connecting to hybrid Cloud" --> "... connecting to Cloud DCs" ? In this way, it is aligned with the title. [Linda] changed. - Section 3.1: [rtg-dir] * "it MUST ignore..." --> it must ignore ... ? [Linda] changed. [rtg-dir] * "BGP session MUST NOT ..." --> BGP session must not ...? [Hares] Old Text:/ All of these can contribute to increased BGP peering errors, such as capability mismatch, BGP ceasing notification, unwanted route leaks, missed Keepalives, etc. / New Text :/ All of these can contribute to increased BGP peer errors such as capability mismatch, unwanted route leaks, missed Keepalives, and errors causing BGP ceases./ [Linda] changed. - Section 3.2: [rtg-dir]* "BFD" --> Bidirectional Forwarding Detection (BFD) ? [Linda] changed. [rtg-dir]* What means a site capacity goes dark? [hares replacement] old text/dark/ New text/dark (capacity goes to zero)/ [hares edit] Old text/ Site failures include, but not limited to, a site capacity degradation or entire site going down caused by a variety of reasons, such as fiber cut connecting to the site or among pods within the site, cooling failures, insufficient backup power, cyber threat attacks, too many changes outside of the maintenance window, etc. / New text/ Site failures can include (but are not limited to) a site capacity degradation or entire site going down. The reasons for these capacity degradations or failures can include: a) fiber cuts for links connecting to the site or among pods within the site, b) cooling failures, c) insufficient backup power, d) cyber threat attacks, e) too many changes outside of the maintenance window, or other errors. / [Linda] changed. - Section 3.4: [rtg-dir] * It would be nice to add a reference to 5G, specially when mentions the 5G core functions [Linda] Add the reference to 3GPP TS 23.548 (5G System Enhancements for Edge Computing) [rtg-dir] * Does the mentioned problems and mitigations applies for 5G Standalone and Non-Standalone deployments options? [Linda] The 3GPP’s Edge Computing is for 5G only. [hares]old text/The 5G Core functions include Radio Control Functions, Session Management Functions (SMF), Access Mobility Functions (AMF), User Plane Functions (UPF), etc./ New text/The 5G Core functions include Radio Control Functions, Session Management Functions (SMF), Access Mobility Functions (AMF), User Plane Functions (UPF), and others./ [Linda] changed. - Section 3.5: [hares] Old text/ cloud edge resources. [tab]To mitigate such security risk, it is necessary for the ports facing the internet to enable Anti-DDos features. / New text/ cloud edge resources. To mitigate such security risk, it is necessary for the ports facing the internet to enable Anti-DDos features. / [Linda] changed. [rtg-dir][hares] Old text/More diligent security procedures need to be considered to mitigate all those security issues/ New text/Additional Internet security procedures need to be designed that are able to to mitigate all these issues./ [Linda] changed. - Section 3.7: [rtg-dir][hares] suggestion to add the URL as a reference rather than a inline comment: (https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.aws.amazon.com%2FAmazonVPC%2Flatest%2FUserGuide%2Fvpc-&data=05%7C01%7Clinda.dunbar%40futurewei.com%7C8cb15a8129cc4ab15b6808db3a094c12%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638167583844802823%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=0kI3G%2BvqIzXPvFI4E2J06Sx7kJh6eW3MXC559jv%2FJBw%3D&reserved=0<https://shared.outlook.inky.com/link?domain=docs.aws.amazon.com&t=h.eJxVzLsOgjAYBeBXIZ2V0gKlMGEcXF107-VHiFBIL5JgfHctm8NJTk5OvjcKdkRNgnrvF9dgrGflUrH-MoltNqmaJ3za6_16xqPw4Dy-ObCXMGjAr0Ud0SFBz2gY8LN9kKzkrCYUu15YcK3RW78zTNEyK1XRyUpQxlTBicyZqjWVEijpMGGc5LTgFU85iypEdRyMFqkORgrbdsEHCysMUYwXHS__6-cLuBJDWQ.MEQCIBvoUzcymu0emjBNyYrByyXknguiBEB7zLtohv2ONBYXAiAUmVAmq0tTshaLcVMv2l0PgLm-y8ylZLKFVdg5dLf63g> nat-gateway.html#nat-gateway-other-services) [Linda] Changed. [hares] It might also be good to provide references to Google's Cloud NAT, Goggle /cold virtual machine (VM), and Google Kubernetes Engine (GKE). [Linda] Added. Also added Azure NAT reference. - Section 4.1 [hares] it might be useful to provide references to the services referenced for Amazon, Microsoft, and Google. [Linda] Added AWS, Azure, and Google’s Cloud access references Positive: The diagram helps this text. section 4.2 page 13, please check the spacing after a), b), and c). It appears in my printout that there are extra spaces. section 4.3 [hares] in this text, the last phrase is confusing: text/ As MPLS VPNs provide more secure and higher quality services, it is desirable to locate the PEs with the least cost (including routing distance and capacity cost) for the dynamic IPsec tunnels to the Cloud DC GW./ Do you mean that these dynamic IPsec tunnels should be on the Cloud DC GW? [Linda] The intension is to say: When the MPLS VPN network can’t reach the desired Cloud DCs, IPsec tunnels can be used to dynamically connect the MPLS PEs with the desired Cloud DCs GWs. As MPLS VPNs provide more secure and higher quality services, choosing a PE closest to the Cloud GW for the IPsec tunnel is desirable to minimize the IPsec tunnel distance over the public Internet. Is the text more clear? Section 5.1 [hares] old text/ To scale the IPsec key management, a solution like group encryption where a single IPsec SA is necessary at the GW can be considered. But the drawback is key distribution and maintenance of a key server, etc./ New text/ To scale the IPsec key management, a solution like group encryption where a single IPsec SA is necessary at the GW can be considered. The drawback of group encryption solutions is the key distribution for group encryption which requires protocols and a maintenance of a key server. Other mechanisms, might be operationally better this situation/ [Linda] changed. Section 5.2 Old Text/ When large number of IPSec encap & decap are needed, the performance is degraded. / New text/ When large numbers of IPSec encapsulation and decapsulation sequences are needed, the performance is degraded./ [Linda] Changed to the following: IPSec encap & decap are very processing intensive, which can degrade router performance. NAT also adds to the performance burden. Thank you very much for all those wonderful and insightful comments. Linda
_______________________________________________ rtgwg mailing list [email protected] https://www.ietf.org/mailman/listinfo/rtgwg
