Re: [bess] Last Call: <draft-ietf-bess-bgp-sdwan-usage-19.txt> (BGP Usage for SD-WAN Overlay Networks) to Informational RFC

Adrian Farrel <adrian@olddog.co.uk> Thu, 08 February 2024 10:33 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E2174C1CAF69; Thu, 8 Feb 2024 02:33:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=olddog.co.uk
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RkYqQw0eIXX0; Thu, 8 Feb 2024 02:33:31 -0800 (PST)
Received: from mta5.iomartmail.com (mta5.iomartmail.com [62.128.193.155]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B32D1C1CAF60; Thu, 8 Feb 2024 02:33:27 -0800 (PST)
Received: from vs2.iomartmail.com (vs2.iomartmail.com [10.12.10.123]) by mta5.iomartmail.com (8.14.7/8.14.7) with ESMTP id 418AXLRF020054; Thu, 8 Feb 2024 10:33:21 GMT
Received: from vs2.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 2848D4604B; Thu, 8 Feb 2024 10:33:21 +0000 (GMT)
Received: from vs2.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 06B5946048; Thu, 8 Feb 2024 10:33:21 +0000 (GMT)
Received: from asmtp1.iomartmail.com (unknown [10.12.10.248]) by vs2.iomartmail.com (Postfix) with ESMTPS; Thu, 8 Feb 2024 10:33:20 +0000 (GMT)
Received: from LAPTOPK7AS653V ([148.252.129.168]) (authenticated bits=0) by asmtp1.iomartmail.com (8.14.7/8.14.7) with ESMTP id 418AXGXN012305 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 8 Feb 2024 10:33:18 GMT
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: 'Linda Dunbar' <linda.dunbar@futurewei.com>, last-call@ietf.org
Cc: andrew-ietf@liquid.tech, bess-chairs@ietf.org, bess@ietf.org, draft-ietf-bess-bgp-sdwan-usage@ietf.org, matthew.bocci@nokia.com
References: <170680668432.50397.9113184985065227684@ietfa.amsl.com> <00e701da56eb$827e4eb0$877aec10$@olddog.co.uk> <CO1PR13MB492037F0BDEFC4D284B8DD4685442@CO1PR13MB4920.namprd13.prod.outlook.com>
In-Reply-To: <CO1PR13MB492037F0BDEFC4D284B8DD4685442@CO1PR13MB4920.namprd13.prod.outlook.com>
Date: Thu, 08 Feb 2024 10:33:17 -0000
Organization: Old Dog Consulting
Message-ID: <056d01da5a7a$3c322480$b4966d80$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_056E_01DA5A7A.3C34E3A0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQIAE/Y0IQIUHaQCrPPCrSdpU5D2yAEzN56VAaf7D0WwneDEQA==
Content-Language: en-gb
X-Originating-IP: 148.252.129.168
X-Thinkmail-Auth: adrian@olddog.co.uk
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed; d=olddog.co.uk; h=reply-to :from:to:cc:references:in-reply-to:subject:date:message-id :mime-version:content-type; s=20221128; bh=0HdOmr3bNXor065Dj+h5T dPsUCtSJTXzDgL4iSfDtCc=; b=fU+YtTtwUkbZ1nDwi0zK8YrkTVVUTawYc7Jnq p6jtFOma5PF/R7yNSxzaifE5YMP5Di6bpU5OuPrNsC+4qBAKpsDnJhmFlxNUpf+V x+RSWyH5jkJVw4odj4xSFdXd+aOnWNXokcRLkbyXifmRyJCSV24/rCnRxLJjzSil FztxU0JcOEHEUaulK1bT5++1AUtCUaltG0gQChId20W66SBx4qKXq0LzcQWR2B7u xFqO/hwI3B1b6IkB509zEjLbM8ih2jdUxxSFhW2PvvZ6DqjoQ06ZjEcrhmjkDAsw QDovWhZkS3O3UwLGZI3KRFqo+phZmqJf7+cIGr246Y2cUx8BQ==
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.1.0.2090-9.0.0.1002-28178.004
X-TM-AS-Result: No--42.594-10.0-31-10
X-imss-scan-details: No--42.594-10.0-31-10
X-TMASE-Version: IMSVA-9.1.0.2090-9.0.1002-28178.004
X-TMASE-Result: 10--42.593600-10.000000
X-TMASE-MatchedRID: qjsJt1k45UI7iuZ/mdYYtjnwaKQvSvfvSCTsIGU3OALxu3Kbk0DahdVF NAHkCCVeSbMo2JpgK/SIf3m0sUfx59q1p6neH75UQ6Cj3EXWBE2Abtfp1PFC4XYeJ0NxJ0ndebE StOsB1eG53HCU1KRDOJVRzPxemJL0iRPU6vvejXJ3de2OoBqgwj/21AwfBazE8inPA0tedt72ub 4vZg2IrH3L4H7btrdPjrVn4cme+w6IhSIgo7Cbb7BxKHmTK1j5ESh6vmw7oCJF+l3+KzhDQSeFz EOPYH+afYgoHl6iERIMPOZL2X19ijM2xdYG8ZUGkfxGFJCYA5a0x0bNkCWz1ou9KKwecDOTJKmu ZCflJad68pmQb0Yujt+pUF0HsjxRNQO+lFC5/FVOaDdl7pggvZ3EYchBzOdXVDi//Lxc8Svizwa X0zXaF/mi+iQw41eA1owMHzBShCJYNp4hN5DvTLiGyWKij18YzU5YQkeXExg1rP+Fjls16f04L+ FEc9EEbBgnprrOG6YAPmNKDWsW0GmQExgOfwV4lJBOf2Mfu5qstoQvCgKRi0XhpLVGseXSNOW4c /7nm/laSb0pBpxm6G2+CcjCvpMwJpeSrBFLNiHkMnUVL5d0E+otixI0ws9lp9i9KYKGUbVsfFsS ozDU0TWnj7q3iDlORZfQN+FVqbBceVBIhfwO9f0erXqfTxYEuqydIVnrqj/93kA1ImA+YLzNPVE 3w1LkhjMsgDkfU2BH4a2iJdV4MbF2ZJo4JvPBvBi1vSDtjC3caWrYUiR/thZSPdGnlyLM3if2Bo RMxHsKm5kt79XbMZlQbjWLQqObiXPf/NTPc3KbKItl61J/yZUdXE/WGn0FfeZdJ1Xsorj72mXKg e0hl9934/rDAK3zGjFMngtLLWhJFQD69E10vA==
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/1gSyKv0yVT8LofQa78oz4mXTqJs>
Subject: Re: [bess] Last Call: <draft-ietf-bess-bgp-sdwan-usage-19.txt> (BGP Usage for SD-WAN Overlay Networks) to Informational RFC
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Feb 2024 10:33:36 -0000

Hi again, Linda.

 

Here is the response to your second email. Again, comments in line, with
snipping of agreed points.

 

Best,

Adrian

 

From: Linda Dunbar <linda.dunbar@futurewei.com> 
Sent: 08 February 2024 01:58
To: adrian@olddog.co.uk; last-call@ietf.org
Cc: andrew-ietf@liquid.tech; bess-chairs@ietf.org; bess@ietf.org;
draft-ietf-bess-bgp-sdwan-usage@ietf.org; matthew.bocci@nokia.com
Subject: RE: Last Call: <draft-ietf-bess-bgp-sdwan-usage-19.txt> (BGP Usage
for SD-WAN Overlay Networks) to Informational RFC

 

Adrian, 

 

Please see below for the resolutions to your remaining comments. 

 

Thank you very much for the detailed comments. 

 

Linda

 

-----Original Message-----
From: Adrian Farrel <adrian@olddog.co.uk <mailto:adrian@olddog.co.uk> > 
Sent: Saturday, February 3, 2024 3:54 PM
To: last-call@ietf.org <mailto:last-call@ietf.org> 
Cc: andrew-ietf@liquid.tech <mailto:andrew-ietf@liquid.tech> ;
bess-chairs@ietf.org <mailto:bess-chairs@ietf.org> ; bess@ietf.org
<mailto:bess@ietf.org> ; draft-ietf-bess-bgp-sdwan-usage@ietf.org
<mailto:draft-ietf-bess-bgp-sdwan-usage@ietf.org> ; matthew.bocci@nokia.com
<mailto:matthew.bocci@nokia.com> 
Subject: RE: Last Call: <draft-ietf-bess-bgp-sdwan-usage-19.txt> (BGP Usage
for SD-WAN Overlay Networks) to Informational RFC

 

Hi,

 

I read this document again as part of its second Last Call. I have a few
comments that should ideally be fixed before passing the draft on to the RFC
Editor. (I ran out of steam around Section 6, sorry.)

 

Thanks,

Adrian

 

===

<snipped, see previous email for the resolutions>

---

 

3.1.2

 

I had a lot of trouble working out what this section is trying to say.

 

   The client service requirements describe the port interface

   requirement at the SD-WAN edge to connect the client network to

   the SD-WAN service.

 

[Linda] The client service requirements describe the SD-WAN edge's ports,
also known as SD-WAN client interface, which connect the client network to
the SD-WAN service.

 

 [AF] OK. Probably Do you intend that "the interface is the set of ports" or
"each port is an interface"? Depending on this you have:

s/known as SD-WAN/collectively known as the SD-WAN/

Or

s/interface/interfaces/ 

 

The requirements describe the requirement?

And what are those requirements?

 

[Linda] those requirements are:

*	The SD-WAN client interface should support IPv4 & IPv6 address
prefixes and Ethernet (as described in [IEEE802.3] standard). 
*	The client service should support the SD-WAN UNI service attributes
at the SD-WAN edge as described in MEF 70.1, Section 11.

[AF] OK. Clear if stated like this. 

 

   The client interface ports can support IPv4 & IPv6 address

   prefixes and Ethernet (as described in [IEEE802.3] standard).

 

How does a port support an address prefix? 

[Linda] The interface should support IPv4/IPv6. 

 

   It is worth noting that this "interface"

 

Which interface?

[Linda] SD-WAN client interface.

 

   is called SD-WAN UNI in

   [MEF 70.1] with a set of attributes (described in Section 11 in

   MEF 70.1); these attributes (in MEF 70.1) describe the expected

   behavior and requirements to support the connectivity to the

   client network.

 

I presume that this is focused on the case that the SD-WAN edge is a PE not
a CPE?

 

[Linda] when provider managed SD-WAN, the SD-WAN edge is PE. For SD-WAN
provided to enterprises, the SD-WAN is CPE.

 

[AF] The thing that "confused" me is when you say that the UNI supports the
connectivity to the client network. In the CPE case, isn't the CPE part of
the client network? Where is the UNI?

 

   The client service should support the SD-WAN UNI service

   attributes at the SD-WAN edge as described in MEF 70.1, Section

   11.

 

What is the "client service"?

[Linda] client service interface.

 

What does "should" mean here? 

 

[AF] I think you haven't answered this, and you have reproduced it in your
new text, above. Does "should" mean "must" or are there acceptable
exceptions (if so, what?)?

 

Isn't it the case that the attributes in MEF 70.1/11 apply at an interface
not at a node?

[Linda] Yes

 

Do these attributes apply to the configuration/management of the client
service interface, or to the marking of packets on the interface, or to the
handling of packets on the interface?

 

[Linda] described in detail in MEF70.1. The MEF people insisted adding the
statement. Too long to reiterate in this draft.

 

[AF] I can accept that if you make the MEF document a normative reference.

 

---

 

3.1.3

 

   For example, a retail business requires the point-of-sales (PoS)

   application to be on a different topology from other applications.

   The PoS application is routed only to the payment processing

   entity at a hub site; other applications can be routed to all

   other sites.

 

The second sentence is true, but does not justify the asserted requirement
in the first sentence.

[Linda] ? The first sentence only says the example of PoS being on a
different topology. Why need justification?

 

[AF] in the first sentence, notwithstanding that it is an example, you have
said that "a retail business requires the point-of-sales (PoS) application
to be on a different topology from other applications." This is a strong
assertion.

Is it possible that you mean "For example, if a retail." and for the second
sentence, "In this case, the PoS." ?

 

---

 

3.1.3

 

The figure in this section needs to be tidied up, should be labeled, and
should be referred to by number in the text. Subsequent figures in the
document will need to be renumbered.

[Linda] Added the sentence that the "===" for non payment traffic, "---" for
the payment traffic. 

The traffic from the PoS application follows a tree topology (denoted as
"----" in the figure below), whereas other traffic can follow a
multipoint-to-multipoint topology (denoted as "===").

 

The figure doesn't really make clear the differences in the topologies.

For example, in the figure, and considering the "tree topology" it looks
like Site 1 and Site 2 could be connected.

 

Part of the problem here may be that the "topology" relates to the underlay
(which is not the business of the SD-WAN service or customer), while what
you probably want to describe is the connectivity services in the two cases
(which are multipoint-to-point, and any-to-any).

 

Maybe "connectivity matrix" is the term you need in place of "topology".

 

The final paragraph of the section seems to be talking about both different
connectivity requirements for different traffic flows, as well as different
service demands for those flows.

 

[Linda] just another example. 

 

[AF] Forgive me, but I am still struggling with "topology" in this context
especially when I see, in your figure that Site 1 appears to be connected to
Site 2 using ---

To reiterate. 

In the overlay (i.e., the SD-WAN) the connectivity service is Site(n)
to/from Gateway for payment traffic, and any-to-any for non-payment traffic.
That is the *service*.

In the underlay (i.e., the provider's network) the connectivity service may
be delivered on any topology that the provider chooses.

 

If "topology" is a term of art used in the SD-WAN world to refer to the
connectivity service, then this is OK, but I think the term needs to be
explained in the terminology section to disambiguate it from what the reader
might assume.

 

[snip]

 

---

 

I feel that the references to [SECURE-EVPN] are (or are very close to

being) Normative.

 

[AF] Answer?

 

[snip] 

 

---

 

3.3

 

   Since IPsec requires additional

   processing power and the encrypted traffic over the Internet does

   not have the premium SLA commonly offered by Private VPNs,

   especially over a long distance, it is more desirable for traffic

   over a private VPN to be forwarded without encryption.

 

This seems to be putting it too strongly!

[Linda] I have to disagree on this one.  All nodes, and Cloud services,
have upper limits on the IPsec traffic bandwidth. 

 

s/is more desirable/may be acceptable/

[Linda] 

Actually, the SLA of traffic over the Internet has nothing to do with how
traffic is handled on the Private VPN. What you are possibly  saying is that
the high performance SLAs commonly offered by Private VPNs mean that it may
not be possible to deliver traffic that both meets the SLA and is subject to
edge-to-edge encryption.

[Linda] all nodes have limitation on the amount of traffic to be
encrypted/decrypted. When Private VPN is available, the current practice is
utilizing the private VPN first. 

 

[AF] Here is the core of it! s/is more desirable/is current practice/

For what it is worth, I think there is hardware that can encrypt/decrypt at
line rate on its interfaces.

 

And what you are actually saying is, "If it is necessary to send some
traffic without encryption, then current practice is to select traffic that
will be sent over the Private VPN because that underlay is likely to be more
secure." 

 

By the way, the term "private VPN" (used in various places in the

document) is a little odd. "Private Virtual Private Network"?

 

[Linda] Private VPN also include private TDM network, like wavelength, T3,
or OC-n. 

 

[AF] OK. So (per suggestion below) you need to add this to the terminology
section.

 

I suspect that a "private VPN" may be a VPN that is supported wholly by a
single network service provider without using any elements of the public
Internet and without any traffic passing out of the immediate control of
that service provider. Perhaps you could add the term to Section 2.

 

---

 

3.3

 

   3) Some flows, especially Internet-bound browsing ones, can be

     handed off to the Internet without any encryption.

 

That is probably "without any further encryption" because such flows are
probably already encrypted.

[Linda] depending on the website. Some are encrypted, some are not. 

 

[AF] Right. We agree about the facts, just not about the wording!

Your words say that those flows that would normally be encrypted can be
handed off to the Internet without any encryption. That is not what you
mean.

Hence, insert the word "further"

 

[snip] 

 

---

 

4.3

 

   SD-WAN edge nodes must negotiate various cryptographic parameters

   to establish IPsec tunnels between them.

 

Except, of course, those that don't use IPsec tunnels.

[Linda] Yes. Only need to negotiate to establish IPsec tunnels. 

 

[AF] So, 

 

   SD-WAN edge nodes must negotiate various cryptographic parameters

   to establish any IPsec tunnels between them.

 

[snip]

 

---

 

5.1

 

     In a traditional IPsec

     VPN, separate routing protocols must run in parallel in each

     IPsec Tunnel

 

Surely not separate routing protocols.

Probably not even separate routing protocol instances.

Perhaps, separate routing protocol adjacencies?

[Linda] changed to "In an IPsec VPN, separate routing instances need to run
in parallel in each IPsec Tunnel if the client routes need be load shared
among the IPsec tunnels"

 

[AF] So you are sure you mean "separate routing instances"? In a separate
routing instance, there are separate routing tables, interfaces, and routing
protocol parameters. Are you really sure you don't mean "separate routing
adjacencies" or even, "the separate IPsec Tunnels are treated as parallel
links"?

 

---

 

5.2

 

I think RFC 9012 calls it the "Tunnel Encapsulation attribute" not
"Tunnel-Encap Path Attributes"

[Linda] Tunnel Encapsulation Attribute is a BGP Path Attribute.

 

[AF] To reiterate, RFC 9012 calls it the "Tunnel Encapsulation attribute"

 

[snip]

 

---

 

5.2

 

     - Suppose that a given packet "C" destined towards the client

       addresses attached to C-PE2 (e.g., prefix 192.0.2.4/30) can be

       carried by any IPsec tunnels terminated at C-PE2.

 

It doesn't matter, but any reason why the packet is called "C"?

 

s/tunnels/tunnel (since the packet can ultimately only be carried by one

tunnel)

 

[AF] Answer?

 

[snip]

 

---

 

In 5.2, 5.3, and 5.4 you have lines such as:

 

   Encapsulation Extended Community: TYPE = IPsec

 

But I think this should be:

 

   BGP Tunnel Encapsulation Attribute Tunnel Type = IPsec

 

[Linda] Client route are advertised by the "Encapsulation Extended
Community". The IPsec tunnel terminated at the WAN port is advertised by
"Tunnel Encapsulation Path Attribute". 

For client routes that can be carried by either MPLS or IPsec, the
Encapsulation Extended Community = SD-WAN-Hybrid. For client routes that are
carried by IPsec only, the Encapsulation Extended Community = IPsec. 

 

 

That said,
https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.iana.o
rg%2Fassignments%2Fbgp-tunnel-encapsulation%2F
<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.iana.
org%2Fassignments%2Fbgp-tunnel-encapsulation%2F&data=05%7C02%7Clinda.dunbar%
40futurewei.com%7C16410e6ba9194144d6e908dc2502b313%7C0fee8ff2a3b240189c753a1
d5591fedc%7C1%7C0%7C638425940755803339%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wL
jAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=mSt
ZDjKr4QlIqZ4xCFRJq1VMje4TBHt4KZR%2Bvl108H8%3D&reserved=0>
&data=05%7C02%7Clinda.dunbar%40futurewei.com%7C16410e6ba9194144d6e908dc2502b
313%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638425940755803339%7CUnknow
n%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6
Mn0%3D%7C0%7C%7C%7C&sdata=mStZDjKr4QlIqZ4xCFRJq1VMje4TBHt4KZR%2Bvl108H8%3D&r
eserved=0

shows IPsec to be deprecated by RFC 9012. This seems to leave you with a bit
of a problem!

 

Skimming draft-ietf-idr-sdwan-edge-discovery, it looks like it handles IPsec
by offering sub-TLVs to the SDWAN-Hybrid Tunnel Encapsulation Attribute.
Perhaps you just need to rewrite around this?

 

[AF] OK for your first answer, but 9012 says that the Tunnel Type in the
Encapsulation Extended Community and that its semantics are the same as
semantics of a Tunnel TLV in a Tunnel Encapsulation attribute.

9012 also says of the Tunnel Encapsulation attribute Tunnel Type that the
field contains values from the IANA registry "BGP Tunnel Encapsulation
Attribute Tunnel Types" [IANA-BGP-TUNNEL-ENCAP].

And, finally, in 14.2 of 9012, "IPsec in Tunnel-mode (DEPRECATED)".

When I look at the tunnel type registry (above) I don't see any
non-deprecated way of indicating IPsec.

 

So this takes us to the solution potentially offered by
draft-ietf-idr-sdwan-edge-discovery and my request that the examples in
these sections lean on that draft more clearly.

 

 ---

 

Looks like you have used [SD-WAN-EDGE-Discovery] in a normative way.

That is, you can't do the things suggested in this document until that draft
is an RFC.

 

[Linda] this is an informational draft. here only illustrate as an example. 

 

[AF] I disagree. You are telling us how to use BGP to manage IPsec tunnels
in support of SD-WAN. You do so by telling us which component protocols to
use. The specifications of those protocols are normative references.

 

On the other hand, I did wonder what is the difference between

25      SDWAN-Hybrid

[Linda] over MPLS or IPsec

 

and

20      Any-Encapsulation

[Linda] Specific type. 

 

While draft-ietf-bess-bgp-multicast-controller that defines
Any-Encapsulation seems to be about multicast, I think that the
encapsulation type is defined to support multicast or unicast.

[Linda] they are different. 

 

[AF] They are different because 20 allows any specific type while 25 allows
only two specific types? So you could do MPLS or IPsec using 20?

 

It could be that the answer is how you handle IPsec. Depends on the answer
to the previous point.

 

---

 

6.

 

   The procedures described in Section 6 of RFC8388 are applicable

   for the SD-WAN client traffic.

 

This is true, but surely it only applies to Ethernet-based client services.
What about IP services?

 

[AF] Answer?

 

[snip]

 

---

 

10.1

 

The reference text of BCP 195 is unusual

[Linda] BCP 195 consists of RFC8996 and RFC9325

 

[AF] I know that. Have you looked at your text? It says.

 

   [BCP195]  RFC8996, RFC9325.

 

That is not a properly formed reference.

 

[snip]