On (06/17/16 08:43), Linda Dunbar wrote:
>Sowmini,
>
>You said:
>"However, applying IPsec to specific flows (e.g., those defined by a src
>or dst port on which the service listens) is important."
>
>What is the current operation procedure for Overlay network to inform
I2NSF participants,
Based on the IETF96 preliminary agenda, I2NSF will be Thurs 16:20-18:20. If you
plan to present but have conflict, please let us know ASAP. Even though we
can't promise the change, we will try.
1620-1820 Afternoon Session II
Tiergarten ART core
Hey,
I am a novice in I2NSF IETF group and its capabilities but I am a regular
follower of the current activities of I2NSF. According to my understanding, the
term "abstraction layer" is used to specify that the end user/client need not
have the complete visibility of the working or
Dear all:
Maybe this I-D might be interesting and related with this discussion regarding
IPsec/IKE management. We hope to have an updated version soon and a
proof-of-concept implementation of some of the scenarios.
https://tools.ietf.org/html/draft-abad-sdnrg-sdn-ipsec-flow-protection-01
Best