Hi,
My impression from reading the document and according to figure 1 was that
all end host communication was done in a UDP tunnel. So what is the relation
of the TCP connection to BTMM.
Roni Even
From: Lixia Zhang [mailto:li...@cs.ucla.edu]
Sent: Sunday, March 06, 2011 7:52 AM
To: Roni
Thanks for the review.
We plan to briefly mention link layer and application layer mobility
approaches. However, security and how they deal with NAT and firewalls are
separate issues, as this document focuses on how the protocols handle the
mobility.
For S5.3, we agree that it is political
On 7 Mar 2011, at 3:08 AM, Roni Even wrote:
Hi,
My impression from reading the document and according to figure 1
was that all end host communication was done in a UDP tunnel. So
what is the relation of the TCP connection to BTMM.
Roni Even
Question: When you use IPSEC VPN, what are the
I am the assigned Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at
http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.
Please resolve these comments along with any other Last Call comments
you may receive.
Document: draft-ietf-xcon-examples-08.txt
I am the assigned Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at
http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.
Please resolve these comments along with any other Last Call comments
you may receive.
Document:
Zhenkai,
Thanks for following up. With regard to security/NATs: These could be relevant
in your comparison, since I would think that different proposals would have
different properties along these lines. For example, it seems like the degree
of trust placed in the HA/rendezvous function
On Mar 7, 2011, at 12:22 PM, Richard L. Barnes wrote:
Zhenkai,
Thanks for following up. With regard to security/NATs: These could be
relevant in your comparison, since I would think that different proposals
would have different properties along these lines. For example, it seems
like
That's fine, just thought it would be an interesting area to discuss.
--Richard
On Mar 7, 2011, at 3:36 PM, Lixia Zhang wrote:
On Mar 7, 2011, at 12:22 PM, Richard L. Barnes wrote:
Zhenkai,
Thanks for following up. With regard to security/NATs: These could be
relevant in your
Hi Jari,
We are doing revision according to the comments we received. What do you
suggest as our next step?
Thanks!
Zhenkai
On Mar 7, 2011, at 1:48 PM, Richard L. Barnes wrote:
That's fine, just thought it would be an interesting area to discuss.
--Richard
On Mar 7, 2011, at 3:36 PM,