Re: [Idr] Tunnel-Encap Gaps for SD-WAN described in draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt
Robert Raszuk <robert@raszuk.net> Wed, 26 June 2019 18:32 UTC
Return-Path: <robert@raszuk.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C83341203E7 for <idr@ietfa.amsl.com>; Wed, 26 Jun 2019 11:32:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=raszuk.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TbDzzFmCcGWN for <idr@ietfa.amsl.com>; Wed, 26 Jun 2019 11:32:35 -0700 (PDT)
Received: from mail-qk1-x72d.google.com (mail-qk1-x72d.google.com [IPv6:2607:f8b0:4864:20::72d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D0CE7120306 for <idr@ietf.org>; Wed, 26 Jun 2019 11:32:34 -0700 (PDT)
Received: by mail-qk1-x72d.google.com with SMTP id a27so2530146qkk.5 for <idr@ietf.org>; Wed, 26 Jun 2019 11:32:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=raszuk.net; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=BOFr1JtL7ShnEuK3RLzE3l2BfB2dc1Zv9uJMziPU5yY=; b=btlSP2vd4hZAp8uDqgH75RcP0sIAzj/3OoOL1aoDRgxrwuQGuM0Uj2zvlXE3EfqNgw i1UsvI1SBlp6I2gxCD7KF82HLGymoleoRaqvglH4EE7cEHnD2e7qfQu+EkLFJ4Io8ObU W/9ees2M3D+LC5mbB316prepEaUq0Zl30Bc2G811M9Q0wld/4SayLc5gMciTCy0zxbgq dKnO6SRucsamaqjtajiunkn8lC7B/hAM2dLb7ikB/t1nwi7grDuXlX59WykppoL8TeNT TakRFiz7rfPbAsmXqUVAsjoY2a+/sjzKvdW90uSzqVDYoJWlfst5Ytq6ZhYwDp+4jRBZ Nxgg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=BOFr1JtL7ShnEuK3RLzE3l2BfB2dc1Zv9uJMziPU5yY=; b=XDQM8BqHQLYFEfxokJavasVyvEoBjoop5AAV57FdEz4xIandaAgzag1RVwXC6A0vf9 YGTMXI70ZWbevGaW5BbGqxj2cK0g3WIxyHJLJthKqHxjLDuM+zttt5ZC/prc7BSW27CI RieeG7CkUGvSk0pqnyOTfse09Xdw1NwEyjSOPPMv5hFZ27Z0Asi4rH4qJIxJni0vsfMk axcWd9NbS3KoVoECm2rjgrR8K3TVqt/Kl5uH5yKFvIlrlDBAyV/Q0IBLzG/DK5YNN60K FV1py1OAAir68k23TJc5nRchtSMeAZhgSfkAJc5nnBnp2mGrO7Q6ng88pZMLKIw/iajH b80w==
X-Gm-Message-State: APjAAAUgRPOADApTQYZIUgxEFu+igFUzU8D/TGAinv92M2esiLH4ju2F 6zXZK11DjA+A3iSDOhqST4Iir0b9x2pW81aMCtUkgg==
X-Google-Smtp-Source: APXvYqxLSHF1TGkTfZqY7HhhtB9Ce3SGMOvrbwSlVII8/jR+p3dNweNPXVQ33PqOhAqwIMX4fkDmzMEliSmYatCMcqo=
X-Received: by 2002:a05:620a:1285:: with SMTP id w5mr4907619qki.302.1561573953731; Wed, 26 Jun 2019 11:32:33 -0700 (PDT)
MIME-Version: 1.0
References: <MN2PR13MB358267E50BCEB2E7795046B785E50@MN2PR13MB3582.namprd13.prod.outlook.com> <BYAPR05MB5029672CA347E6EC1B94E476C7E40@BYAPR05MB5029.namprd05.prod.outlook.com> <MN2PR13MB358228DB2D7DD56204660F6985E40@MN2PR13MB3582.namprd13.prod.outlook.com> <BYAPR05MB502933857FE0AFBA3390734DC7E40@BYAPR05MB5029.namprd05.prod.outlook.com> <MN2PR13MB3582B880C792E0519A3A91C385E40@MN2PR13MB3582.namprd13.prod.outlook.com> <BYAPR05MB5029581D97C82FA968601CCDC7E70@BYAPR05MB5029.namprd05.prod.outlook.com> <MN2PR13MB35826741E00B40BBFE12616085E70@MN2PR13MB3582.namprd13.prod.outlook.com> <4F580631-0E2D-4311-9EDC-E25A4862DD84@juniper.net> <BYAPR05MB5029D7B984EB0506C7773E63C7E20@BYAPR05MB5029.namprd05.prod.outlook.com>
In-Reply-To: <BYAPR05MB5029D7B984EB0506C7773E63C7E20@BYAPR05MB5029.namprd05.prod.outlook.com>
From: Robert Raszuk <robert@raszuk.net>
Date: Wed, 26 Jun 2019 20:32:22 +0200
Message-ID: <CAOj+MMH-0qBkaroKJEdtjM1-7-ZjOY1mWBkS7hLo8FOC_5A+Og@mail.gmail.com>
To: John E Drake <jdrake=40juniper.net@dmarc.ietf.org>
Cc: John Scudder <jgs@juniper.net>, Linda Dunbar <linda.dunbar@futurewei.com>, "idr@ietf.org" <idr@ietf.org>, "rtgwg@ietf.org" <rtgwg@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000cda1ed058c3e4475"
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/FEOONMxFupbxopc600h-p4L3CdA>
Subject: Re: [Idr] Tunnel-Encap Gaps for SD-WAN described in draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Jun 2019 18:32:39 -0000
John, > Making the Remote Endpoint sub-TLV mandatory effectively associates the attribute with the remote endpoint. I am not sure why you draw such conclusion. Including remote endpoint address does not bind this sub-TLV to be advertised with the remote end point NLRI. Quite contrary this information is needed on a per NLRI basis. How could you not send endpoint address if the entire purpose of this extension is to signal the address where the encapsulation should be terminated at - no ? Thx, R. On Wed, Jun 26, 2019 at 8:27 PM John E Drake <jdrake= 40juniper.net@dmarc.ietf.org> wrote: > John, > > > > Oopsie, I missed that. Do we really want to have this behavior? Having > it optional would give us a lot more flexibility and I thought an attribute > was supposed to be associated with a route. Making the Remote Endpoint > sub-TLV mandatory effectively associates the attribute with the remote > endpoint. > > > > Yours Irrespectively, > > > > John > > > > > > Juniper Business Use Only > > *From:* John Scudder <jgs@juniper.net> > *Sent:* Wednesday, June 26, 2019 2:06 PM > *To:* Linda Dunbar <linda.dunbar@futurewei.com>; John E Drake < > jdrake@juniper.net> > *Cc:* rtgwg@ietf.org; idr@ietf.org > *Subject:* Re: [Idr] Tunnel-Encap Gaps for SD-WAN described in > draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt > > > > Linda, John, > > > > Your discussion is premised on the assumption that the remote endpoint > sub-TLV is optional. Consider this paragraph, from section 5: > > > > When the Tunnel Encapsulation attribute is carried in an UPDATE of > > one of the AFI/SAFIs specified in the previous paragraph, each TLV > > MUST have a Remote Endpoint sub-TLV. If a TLV that does not have a > > Remote Endpoint sub-TLV, that TLV should be treated as if it had a > > malformed Remote Endpoint sub-TLV (see Section 3..1 <https://tools.ietf.org/html/draft-ietf-idr-tunnel-encaps-12#section-3.1>). > > > > There’s both a MUST clause and directions to ignore the sub-TLV if the > remote endpoint is missing. To me this seems clear without any changes to > the draft. > > > > Regards, > > > > —John > > > > On Jun 21, 2019, at 8:25 AM, Linda Dunbar <linda.dunbar@futurewei.com> > wrote: > > > > John, > > > > I am with you hoping that the Tunnel-encap authors can clarify more. > > Based on the description of how the receivers of the Tunnel UPDATE msg add > the Encapsulation Headers to client routes described in the Tunnel-Encap > draft, it should be: > > - If the “Remote endpoint” sub-TLV was present and containing the same > address as the route itself, then the receivers of the Tunnel UPDATE would > construct the encapsulation header with the Outer Destination Address equal > to the “route itself” (which is carried in the Remote Endpoint sub-TLV). > > I think this can be a serious problem. > > > > - if the “Remote Endpoint” sub-TLV was not present, the receivers of > the Tunnel UPDATE would assume the UPDATE originator’s address as the > Tunnel Remote end point. > > > > If the processing behavior described above is NOT what the Tunnel-Encap > draft intended, then the Tunnel-Encap draft needs to add text to clarify > the description. > > > > Nevertheless, do you have objections of those gaps that Tunnel-Encap and > Secure-EVPN: > > > > - Doesn’t have the functionality that would help the C-PE to register its > WAN Port properties. Some WAN ports are facing public internet with ISP > assigned addresses that are in different address space than the SD-WAN > address space, some WAN ports are assigned with private addresses which > need to propagate NAT information to the trusted peers via Controllers, > such as the virtual C-PEs instantiated in public Cloud DCs, and some WAN > ports are facing the trusted MPLS network. > > > > - For the same Client route, e.g. 10.1.x.x, attached to a C-PE, need to be > encrypted when forwarding to the WAN ports facing untrusted network, and > can be forwarded without any encryption towards WAN ports facing trusted > network. > > > > > > Thank you very much for the discussion. I have updated the Gap analysis to > reflect what has been discussed in this email thread... > > > > Linda > > > > *From:* John E Drake <jdrake@juniper.net> > *Sent:* Friday, June 21, 2019 8:14 AM > *To:* Linda Dunbar <linda.dunbar@futurewei.com>; rtgwg@ietf.org; > idr@ietf.org > *Subject:* RE: Tunnel-Encap Gaps for SD-WAN described in > draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt > > > > Linda, > > > > It would be useful to get a clarification from the authors. I had always > thought that if the remote endpoint sub-TLV was either not present or > present and containing the same address as the route itself, then the > information in the tunnel encapsulation attribute pertains to the address > specified in the route. This is the assumption made in the Secure EVPN > draft that I mentioned earlier in this thread. > > > > Alternatively, the route could specify a loopback address of the C-PE and > the tunnel encapsulation attribute could contain the interface address and > characteristics of each of its WAN-facing ports; this is completely > compliant with your interpretation that the address specified in the route > is reachable through an address specified in the remote endpoint sub-TLV. > > > > [Linda] But there is no field to indicate the property of the WAN ports. > > > > Yours Irrespectively, > > > > John > > > > > > Juniper Internal > > *From:* Linda Dunbar <linda.dunbar@futurewei.com> > *Sent:* Thursday, June 20, 2019 7:08 PM > *To:* John E Drake <jdrake@juniper.net>; rtgwg@ietf.org; idr@ietf.org > *Subject:* RE: Tunnel-Encap Gaps for SD-WAN described in > draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt > > > > John, > > > > Those addresses stated in the quoted paragraphs are for Clients Routes, > i.e. the routes attached to the PE, not the PE’s lookback address, correct? > > The Loopback Address is specified in the “Remote Endpoint” SubTLV, so that > receivers of the UPDATE can establish the Encapsulation with the outer > destination address equal to the one specified by the “Remote endpoint” > SubTLV. > > > > That was discussed in the long email discussion thread last week. > > > > We can ask the Tunnel-Encap authors to confirm. > > > > Linda > > > > *From:* John E Drake <jdrake@juniper.net> > *Sent:* Thursday, June 20, 2019 5:50 PM > *To:* Linda Dunbar <linda.dunbar@futurewei.com>; rtgwg@ietf.org; > idr@ietf.org > *Subject:* RE: Tunnel-Encap Gaps for SD-WAN described in > draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt > > > > Linda, > > > > From section 5 on the Tunnel Encapsulation Attribute draft: > > > > “[RFC5512] specifies the use of the Tunnel Encapsulation attribute in > > BGP UPDATE messages of AFI/SAFI 1/7 and 2/7. That document restricts > > the use of this attribute to UPDATE messsages of those SAFIs. This > > document removes that restriction. > > > > The BGP Tunnel Encapsulation attribute MAY be carried in any BGP > > UPDATE message whose AFI/SAFI is 1/1 (IPv4 Unicast), 2/1 (IPv6 > > Unicast), 1/4 (IPv4 Labeled Unicast), 2/4 (IPv6 Labeled Unicast), > > 1/128 (VPN-IPv4 Labeled Unicast), 2/128 (VPN-IPv6 Labeled Unicast), > > or 25/70 (Ethernet VPN, usually known as EVPN)). Use of the Tunnel > > Encapsulation attribute in BGP UPDATE messages of other AFI/SAFIs is > > outside the scope of this document.” > > > > What this means is that the tunnel encapsulation draft can be use exactly > > as I described in my previous email to describe the characteristics of > > of an SD-WAN port. > > > > Yours Irrespectively, > > > > John > > > > > > Juniper Internal > > *From:* Linda Dunbar <linda.dunbar@futurewei.com> > *Sent:* Thursday, June 20, 2019 6:08 PM > *To:* John E Drake <jdrake@juniper.net>; rtgwg@ietf.org; idr@ietf.org > *Subject:* RE: Tunnel-Encap Gaps for SD-WAN described in > draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt > > > > John, > > > > Thank you very much for the feedback. > > Comments are inserted below: > > > > *From:* John E Drake <jdrake@juniper.net> > *<Snip> * > > > > ------------------------------------------- > > > > - [Tunnel-Encap] doesn’t have the functionality that would help the > C-PE to register its WAN Port properties. > > > > - A SD-WAN tunnel, e.g. IPsec-based, requires a negotiation between > the tunnel’s end points for supported encryption algorithms and tunnel > types before it can be properly established, whereas [Tunnel-Encap] only > allow the announcement of one endpoint’s supported encapsulation > capabilities for specific attached routes and no negotiation between tunnel > end points is needed. > > > > *[JD] What you need to do is implement the model described in the Secure > EVPN draft (https://tools.ietf.org/html/draft-sajassi-bess-secure-evpn-01 > <https://nam03.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.proofpoint...com%2Fv2%2Furl%3Fu%3Dhttps-3A__nam03.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Ftools.ietf.org-252Fhtml-252Fdraft-2Dsajassi-2Dbess-2Dsecure-2Devpn-2D01-26data-3D02-257C01-257Clinda.dunbar-2540futurewei.com-257C28557a27c1c64de4997708d6f5b30f7f-257C0fee8ff2a3b240189c753a1d5591fedc-257C1-257C1-257C636966546754208641-26sdata-3DqLd2LVx5Lng7QccAIB0weIfpXE3IBOQfq0kiLUJqFMs-253D-26reserved-3D0%26d%3DDwMFAg%26c%3DHAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI%26r%3DCRB2tJiQePk0cT-h5LGhEWH-s_xXXup3HzvBSMRj5VE%26m%3Dv-ZrS-NTEa3rPqhwNaoM5gNU8iL1zGd7DutDZaH0C4w%26s%3DnivOMac2lUDvbaJX-GTBeiLAWMqfyKOsTpqvG3AB27A%26e%3D&data=02%7C01%7Clinda.dunbar%40futurewei..com%7C84c6ed1f7cb342efda1208d6f64a6827%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C636967196777678003&sdata=3wnRuxLXyDo9qPVXcIfbGNWZMNC37wef0hd4kBJlEWQ%3D&reserved=0>). > Viz, the SD-WAN C-PEs are attached to a route reflector and each uses the > route reflector to advertise its security-related information the other > C-PEs. As we discussed in Prague the tunnel encapsulation attribute is not > associated with client routes. Rather it is associated with the loopback > or interface addresses of the advertising SD-WAN C-PE. I.e., IPv4/IPv6 > addresses rather than VPN IPv4/IPv6 addresses* > > > > *[Linda]Yes, using Loopback address would be a good way for tunnel, but > that is not what Tunnel-Encap specified. The draft Tunnel-Encap is to > advertise supported Encap capabilities for specified routes.* > > *I have another section (4.3) on the gap analysis for SECURE-EVPN, > specifically, Secure-EVPN does not address the scenario of C-PE having some > ports facing trusted MPLS VPN and other ports facing the untrusted public > Internet. The document assumes that a client route is either forwarded all > encrypted through one tunnel, or not encrypted at all through a different > tunnel. In SD-WAN, one client route can be forwarded encrypted at one time > through the untrusted network and be forwarded unencrypted at different > time through MPLS VPN.* > > *If you think the secure-evpn has addressed those scenarios, can you > please indicate which section? Thank you.* > > > > > > The establishment of a SD-WAN tunnel can fail, e.g., in case the two > endpoints support different encryption algorithms. That is why a SD-WAN > tunnel needs to be established and maintained independently from > advertising client routes attached to the edge node. > > > > *[JD] See above * > > > > - [Tunnel-Encap] requires all tunnels updates are associated with > routes. There can be many client routes associated with the SD-WAN IPsec > tunnel between two C-PEs’ WAN ports; the corresponding destination prefixes > (as announced by the aforementioned routes) may also be reached through the > VPN underlay without any encryption.. A more realistic approach to separate > SD-WAN tunnel management from client routes association with the SD-WAN > tunnels. > > > > *[JD] See above * > > > > - When SD-WAN tunnel and clients routes are separate, the SD-WAN > Tunnel establishment may not have routes associated. > > There is a suggestion on using a “Fake Route” for a SD-WAN node to use > [Tunnel-Encap] to advertise its SD-WAN tunnel end-points properties. > However, using “Fake Route” can raise some design complexity for large > SD-WAN networks with many tunnels. For example, for a SD-WAN network with > hundreds of nodes, with each node having many ports & many endpoints to > establish SD-WAN tunnels with their corresponding peers, the node would > need as many “fake addresses”. For large SD-WAN networks (such as those > comprised of more than 10000 nodes), each node might need 10’s thousands of > “fake addresses”, which is very difficult to manage and requires lots of > configuration tasks to get the nodes properly set up. > > > > *[JD] There is no need for a ‘Fake Route’. We advertise a tunnel > encapsulation attribute with security-related information for a specific > SD-WAN port on the C-PE as identified by its IPv4/IPv6 interface address. > If a set of SD-WAN ports have common security-related information a tunnel > encapsulation attribute can be advertised with a C-PE’s loopback address.* > > > > *[Linda] this section is for Tunnel-Encap, which doesn’t allow Loopback > address to be associated with the tunnel. If you think it does, can you > please indicate which section? Thank you.* > > > > *Linda* > > > > _______________________________________________ > Idr mailing list > Idr@ietf.org > > https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_idr&d=DwICAg&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=hLt5iDJpw7ukqICc0hoT7A&m=iOdQsUCt3t0401DmUlaGf2LNe6GNFoppcHL9UmnRFs0&s=oVYZHedRWOsvb3oxa8GsufcZaZuDs9SgOtCSaMCwEmM&e= > > > > _______________________________________________ > Idr mailing list > Idr@ietf.org > https://www.ietf.org/mailman/listinfo/idr >
- [Idr] Tunnel-Encap Gaps for SD-WAN described in d… Linda Dunbar
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … John E Drake
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Linda Dunbar
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … John E Drake
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Linda Dunbar
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … John E Drake
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Linda Dunbar
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … John Scudder
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … John E Drake
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Robert Raszuk
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … John E Drake
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Robert Raszuk
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Linda Dunbar
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Robert Raszuk
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … John Scudder
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … John Scudder
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Linda Dunbar
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Robert Raszuk
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Linda Dunbar
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Linda Dunbar
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … John Scudder
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Robert Raszuk
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … John Scudder
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … John Scudder
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Ali Sajassi (sajassi)
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Ali Sajassi (sajassi)
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Ali Sajassi (sajassi)
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Ali Sajassi (sajassi)
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Ali Sajassi (sajassi)
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Ali Sajassi (sajassi)
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … John Scudder
- Re: [Idr] Tunnel-Encap Gaps for SD-WAN described … Linda Dunbar