Re: [Idr] Tunnel-Encap Gaps for SD-WAN described in draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt

"Ali Sajassi (sajassi)" <sajassi@cisco.com> Fri, 28 June 2019 00:27 UTC

Return-Path: <sajassi@cisco.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87418120122; Thu, 27 Jun 2019 17:27:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.399
X-Spam-Level:
X-Spam-Status: No, score=-14.399 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=SrvkOnIp; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=PVw/UW0D
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ec3cC98mt6mm; Thu, 27 Jun 2019 17:27:25 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 235DB120169; Thu, 27 Jun 2019 17:27:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=60845; q=dns/txt; s=iport; t=1561681645; x=1562891245; h=from:to:subject:date:message-id:mime-version; bh=nePHIycaDaXB4LoVjjvs7cwYt7VaxCYKmSWhZGq2aRs=; b=SrvkOnIp3c2u0BsBcHOlPFkHF8aooqFOnbUVFxCom8CaxnsVGvowCp+C Wn1qk/IFkO/jLsLaJNrEcH6CeMAJXLZqqydJxpSIHHyDxJzJcKV1/dYjb QuV1Omu0Wuk8bfl4tZeh9+XG+BFyJVzBC+vmiU3z69pCpyFBSMEVWphDx A=;
IronPort-PHdr: 9a23:I6tTAh+UWXgBuP9uRHGN82YQeigqvan1NQcJ650hzqhDabmn44+8ZB7E/fs4iljPUM2b8P9Ch+fM+4HYEW0bqdfk0jgZdYBUERoMiMEYhQslVdWMC0TgN//CZC0hF8MEX1hgrDm2
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0ClAACQXhVd/49dJa1mHgEGBwaBUwkLAYEULyQsA2oORyAECygKhA+DRwOOXEyBaiWXP4EuFIEQA1QJAQEBDAEBJAUEAgEBhEACF4JpIzQJDgEDAQEEAQECAQVtijcMhUoBAQUSCAkKEwEBLAwLBgEIEQMBAQEhAQYDAgQwFAkKBAESIoJ/AQGBHU0DHQECDJsRAoE4iGBxgTKCeQEBBYE2Ag5BgwcYghEJgTQBiEGDHReBf4EQAScME4IeLj6CYQEBAgEBFoEUARIBNgkGBgEJglQygiaMDw6CQYR7iFmNDWsJAoIXhlKNIxuCK2yGK44cigCDKYc4j2YCBAIEBQIOAQEFgVA4DVpxcBUaISoBgkEJghQkDAUSFIM6hRSFP3IBAQEBCAmBFItagSIBgSABAQ
X-IronPort-AV: E=Sophos;i="5.63,425,1557187200"; d="scan'208,217";a="497271748"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 28 Jun 2019 00:26:58 +0000
Received: from XCH-RCD-014.cisco.com (xch-rcd-014.cisco.com [173.37.102.24]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id x5S0QwhS008634 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 28 Jun 2019 00:26:58 GMT
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by XCH-RCD-014.cisco.com (173.37.102.24) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 27 Jun 2019 19:26:57 -0500
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 27 Jun 2019 19:26:57 -0500
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Thu, 27 Jun 2019 19:26:57 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=nePHIycaDaXB4LoVjjvs7cwYt7VaxCYKmSWhZGq2aRs=; b=PVw/UW0DzqRHJTA89niZH+/FvOaZFzJIyPN8o93Y+J5mpLLb8Hcw/gLfzdyxb1x+oSHozwX8p38q6etOMy0dnyyz39RuBoHJYIBuyKwJJdvCQjGeLfGyZ8LGugo0IEsRRzZOkwLTdO1FG+B970fPVo+uCmV8AB/FHd2hREdRNGQ=
Received: from BN8PR11MB3699.namprd11.prod.outlook.com (20.178.220.95) by BN8PR11MB3745.namprd11.prod.outlook.com (20.178.221.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2008.16; Fri, 28 Jun 2019 00:26:56 +0000
Received: from BN8PR11MB3699.namprd11.prod.outlook.com ([fe80::bd14:30eb:9d07:7d29]) by BN8PR11MB3699.namprd11.prod.outlook.com ([fe80::bd14:30eb:9d07:7d29%6]) with mapi id 15.20.2008.018; Fri, 28 Jun 2019 00:26:56 +0000
From: "Ali Sajassi (sajassi)" <sajassi@cisco.com>
To: John E Drake <jdrake=40juniper.net@dmarc.ietf.org>, Linda Dunbar <linda.dunbar@futurewei.com>, "rtgwg@ietf.org" <rtgwg@ietf.org>, "idr@ietf.org" <idr@ietf.org>
Thread-Topic: [Idr] Tunnel-Encap Gaps for SD-WAN described in draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt
Thread-Index: AQHVLUgww+ZhUddTVEKaV1Z4fUm8pw==
Date: Fri, 28 Jun 2019 00:26:55 +0000
Message-ID: <6EC88C58-C276-4404-B0D0-141945957D1C@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.1a.0.190609
msip_labels: MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Enabled=True; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SiteId=bea78b3c-4cdb-4130-854a-1d193232e5f4; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Owner=jdrake@juniper.net; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SetDate=2019-06-20T19:11:03.7993880Z; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Name=Juniper Internal; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Application=Microsoft Azure Information Protection; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ActionId=02a3f884-fb1d-482b-98e6-b0a47699f04b; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Extended_MSFT_Method=Automatic
authentication-results: spf=none (sender IP is ) smtp.mailfrom=sajassi@cisco.com;
x-originating-ip: [128.107.241.164]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 04f6fd7c-429f-4141-87e1-08d6fb5f537d
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BN8PR11MB3745;
x-ms-traffictypediagnostic: BN8PR11MB3745:
x-ms-exchange-purlcount: 9
x-microsoft-antispam-prvs: <BN8PR11MB374512551963422E4227227FB0FC0@BN8PR11MB3745.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 00826B6158
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(376002)(39860400002)(366004)(396003)(346002)(199004)(189003)(13464003)(66946007)(7736002)(5024004)(14444005)(71200400001)(71190400001)(81156014)(8676002)(33656002)(68736007)(256004)(2501003)(64756008)(66556008)(66476007)(91956017)(73956011)(66066001)(66446008)(76116006)(81166006)(8936002)(36756003)(110136005)(2906002)(58126008)(478600001)(316002)(45080400002)(86362001)(2201001)(66574012)(486006)(6436002)(14454004)(5660300002)(606006)(6306002)(6486002)(2616005)(476003)(26005)(186003)(229853002)(6246003)(102836004)(25786009)(3846002)(53546011)(6116002)(6512007)(53946003)(236005)(99286004)(54896002)(966005)(53936002)(6506007); DIR:OUT; SFP:1101; SCL:1; SRVR:BN8PR11MB3745; H:BN8PR11MB3699.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: taGfKuBrsup7PV2EXJCpFSnm7v9UvKjqOVdYCNszsi6hXt78a517qfK095wtGa3Npf5eaT6/YB5FsUJNv9/LplGdkDXRQofnQlwFankXl90LmHjx3vHhXAnu8Y2LvmR0ExNMh0glhYG1LbEZTnfeEDKemz5Q4hKhqCaEWxl9x3phiThrrMvCXoNNkohk3qccaBhqz4W9NNQRZCZxBRzLGpWghQOJND+DeuUXKm2nyhx1ZsovJWaE3o94McrO47Zb3BNj88A3XMkfjf1guvK6E6KV7ELBscpJqvcKzWr2ZnhQnE2Iz0xxVfERJOIw+vUa0Rkz+zLWkRC4x6/X4QRkGCeyuZSyhvJVTwGYIEZF8qEkzBLakE2gS3vfXG8Ox9LTcIol1X4M1q+3JlxulkdqxjYV7kOFjLrHnMNIhwRJTiM=
Content-Type: multipart/alternative; boundary="_000_6EC88C58C2764404B0D0141945957D1Cciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 04f6fd7c-429f-4141-87e1-08d6fb5f537d
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Jun 2019 00:26:55.8655 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: sajassi@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR11MB3745
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.24, xch-rcd-014.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/V0Q76o4IC1d9f9No3B6yK6K-HcI>
Subject: Re: [Idr] Tunnel-Encap Gaps for SD-WAN described in draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Jun 2019 00:27:29 -0000

Linda,

I am catching up with this email thread. You are making a lot of incorrect assumption about [tunnel-encap]. We had a two-hour discussions at the last IETF meeting and I explained many of these points. I will provide further clarifications as I go through this email thread. Please refer to my comments inline marked w/ [AS].

From: Idr <idr-bounces@ietf.org> on behalf of John E Drake <jdrake=40juniper.net@dmarc.ietf.org>
Date: Thursday, June 20, 2019 at 12:13 PM
To: Linda Dunbar <linda.dunbar@futurewei.com>, "rtgwg@ietf.org" <rtgwg@ietf.org>, "idr@ietf.org" <idr@ietf.org>
Subject: Re: [Idr] Tunnel-Encap Gaps for SD-WAN described in draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt

Linda,

Comments inline.

Yours Irrespectively,

John



Juniper Internal
From: Idr <idr-bounces@ietf.org> On Behalf Of Linda Dunbar
Sent: Wednesday, June 19, 2019 4:09 PM
To: rtgwg@ietf.org; idr@ietf.org
Subject: [Idr] Tunnel-Encap Gaps for SD-WAN described in draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt

We updated the gap analysis on using Tunnel-Encap for SD-WAN tunnel after some confusions in interpreting the Tunnel-Encap draft are cleared by the IDR's a long thread of email discussion. Many thanks to the IDR Chair and the participants for the discussion.

Here is the highlight of the gaps. We would appreciate greatly to hear comments or objections for our gap analysis.

-------------------------------------------

-       [Tunnel-Encap] doesn’t have the functionality that would help the C-PE to register its WAN Port properties.

[AS] What functionality is that ???  [Tunel-Encap] provides lot of flexibility:

  *   You can attached the attribute to VPNv4 or VPNv6 routes
  *   You can attach the attribute to IPv4 or IPv6 routes

·         You can do recursive resolutions and inherit tunnel attribute via such recursion

·         You can do coloring of VPN routes (instead of sending the attribute) and inherit the attribute info via such coloring

-       A SD-WAN tunnel, e.g. IPsec-based, requires a negotiation between the tunnel’s end points for supported encryption algorithms and tunnel types before it can be properly established, whereas [Tunnel-Encap]  only allow the announcement of one endpoint’s supported encapsulation capabilities for specific attached routes and no negotiation between tunnel end points is needed.

[JD]  What you need to do is implement the model described in  the Secure EVPN draft (https://tools.ietf.org/html/draft-sajassi-bess-secure-evpn-01).  Viz, the SD-WAN C-PEs are attached to a route reflector and each uses the route reflector to advertise its security-related  information the other C-PEs.  As we discussed in Prague the tunnel encapsulation attribute is not associated with client routes.  Rather it is associated with the loopback or interface addresses of the advertising SD-WAN C-PE.  I.e., IPv4/IPv6 addresses rather than VPN IPv4/IPv6 addresses

[AS] Furthermore, secure-evpn draft discusses how you can inherit the tunnel attribute via route hierarchy and specifies different level of hiearchcy.

The establishment of a SD-WAN tunnel can fail, e.g., in case the two endpoints support different encryption algorithms. That is why a SD-WAN tunnel needs to be established and maintained independently from advertising client routes attached to the edge node.

[JD]  See above

[AS] Tunnel is setup point-to-point whereas the signaling is done P2MP. I think this point is being missed.

-       [Tunnel-Encap] requires all tunnels updates are associated with routes. There can be many client routes associated with the SD-WAN IPsec tunnel between two C-PEs’ WAN ports; the corresponding destination prefixes (as announced by the aforementioned routes) may also be reached through the VPN underlay without any encryption.. A more realistic approach to separate SD-WAN tunnel management from client routes association with the SD-WAN tunnels.

[JD]  See above

[AS] That is incorrect. [Tunnel-Encap] does not require all VPN routes be sent with tunnel attribute. That’s why they have the notion of recursive route resolution and coloring exist in that draft. Furthermore, you can have multiple tunnels for the same pair of end-point tunnel addresses.

-       When SD-WAN tunnel and clients routes are separate, the SD-WAN Tunnel establishment may not have routes associated.
There is a suggestion on using a “Fake Route” for a SD-WAN node to use [Tunnel-Encap] to advertise its SD-WAN tunnel end-points properties. However, using “Fake Route” can raise some design complexity for large SD-WAN networks with many tunnels. For example, for a SD-WAN network with hundreds of nodes, with each node having many ports & many endpoints to establish SD-WAN tunnels with their corresponding peers, the node would need as many “fake addresses”. For large SD-WAN networks (such as those comprised of more than 10000 nodes), each node might need 10’s thousands of “fake addresses”, which is very difficult to manage and requires lots of configuration tasks to get the nodes properly set up.

[JD]  There is no need for a ‘Fake Route’.  We advertise a tunnel encapsulation attribute with security-related information for a specific SD-WAN port on the C-PE as identified by its IPv4/IPv6 interface address.  If a set of SD-WAN ports have common security-related information a tunnel encapsulation attribute can be advertised with a C-PE’s loopback address.

[AS] Linda, [Tunnel-Encap] doesn’t require fake routes as the attribute can be attached to any updates – i.e., it can be attached to a WAN-port that is identified by IPv4 or IPv6 AFI/SAFI which is different from VPNv4  or VPNv6 routes.

Cheers,
Ali

-----------------
More are in the document: https://datatracker.ietf.org/doc/draft-ietf-rtgwg-net2cloud-gap-analysis/<https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dietf-2Drtgwg-2Dnet2cloud-2Dgap-2Danalysis_&d=DwMFAg&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=CRB2tJiQePk0cT-h5LGhEWH-s_xXXup3HzvBSMRj5VE&m=svEApaK250yroEYlWy7i4KW3lGckXW5jGBoYG61yxjk&s=2rIUQFCJoAFnuwwnL1FIll46MZ2jNT4KwtrUUUbtLes&e=>

We look forward to comments, suggestions and objections.

Thank you very much.

Linda

-----Original Message-----
From: rtgwg <rtgwg-bounces@ietf.org<mailto:rtgwg-bounces@ietf.org>> On Behalf Of internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>
Sent: Wednesday, June 19, 2019 2:57 PM
To: i-d-announce@ietf.org<mailto:i-d-announce@ietf.org>
Cc: rtgwg@ietf.org<mailto:rtgwg@ietf.org>
Subject: I-D Action: draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt


A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Routing Area Working Group WG of the IETF.

        Title           : Gap Analysis of Dynamic Networks to Hybrid Cloud DCs
        Authors         : Linda Dunbar
                          Andrew G. Malis
                          Christian Jacquenet
        Filename        : draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt
        Pages           : 18
        Date            : 2019-06-19

Abstract:
   This document analyzes the technological gaps when using SD-WAN to
   dynamically interconnect workloads and applications hosted in
           rd        various 3  party cloud data centers.


The IETF datatracker status page for this draft is:
https://nam03.safelinks.protection.outlook..com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-rtgwg-net2cloud-gap-analysis%2F&amp;data=02%7C01%7Clinda.dunbar%40futurewei.com%7C702c4feeabf74674d3a608d6f4f0601b%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C636965710579388472&amp;sdata=PxMtUZdFrkeIb5gh%2BBSXO5y3aOJ9GkTGIj5OHcKbzjk%3D&amp;reserved=0<https://urldefense.proofpoint.com/v2/url?u=https-3A__nam03.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fdatatracker.ietf.org-252Fdoc-252Fdraft-2Dietf-2Drtgwg-2Dnet2cloud-2Dgap-2Danalysis-252F-26amp-3Bdata-3D02-257C01-257Clinda.dunbar-2540futurewei.com-257C702c4feeabf74674d3a608d6f4f0601b-257C0fee8ff2a3b240189c753a1d5591fedc-257C1-257C0-257C636965710579388472-26amp-3Bsdata-3DPxMtUZdFrkeIb5gh-252BBSXO5y3aOJ9GkTGIj5OHcKbzjk-253D-26amp-3Breserved-3D0&d=DwMFAg&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=CRB2tJiQePk0cT-h5LGhEWH-s_xXXup3HzvBSMRj5VE&m=svEApaK250yroEYlWy7i4KW3lGckXW5jGBoYG61yxjk&s=TGSymHjjXxA_8Th-ecvreJ9bUSXRs5pTOjleBMame34&e=>

There are also htmlized versions available at:
https://nam03.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-ietf-rtgwg-net2cloud-gap-analysis-02&amp;data=02%7C01%7Clinda.dunbar%40futurewei.com%7C702c4feeabf74674d3a608d6f4f0601b%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C636965710579388472&amp;sdata=jJrKoSyeI%2FYl%2FVxwnC%2FWt2VrUs3z2cPyzEtJ2iv619M%3D&amp;reserved=0<https://urldefense.proofpoint.com/v2/url?u=https-3A__nam03.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Ftools.ietf.org-252Fhtml-252Fdraft-2Dietf-2Drtgwg-2Dnet2cloud-2Dgap-2Danalysis-2D02-26amp-3Bdata-3D02-257C01-257Clinda.dunbar-2540futurewei.com-257C702c4feeabf74674d3a608d6f4f0601b-257C0fee8ff2a3b240189c753a1d5591fedc-257C1-257C0-257C636965710579388472-26amp-3Bsdata-3DjJrKoSyeI-252FYl-252FVxwnC-252FWt2VrUs3z2cPyzEtJ2iv619M-253D-26amp-3Breserved-3D0&d=DwMFAg&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=CRB2tJiQePk0cT-h5LGhEWH-s_xXXup3HzvBSMRj5VE&m=svEApaK250yroEYlWy7i4KW3lGckXW5jGBoYG61yxjk&s=nLzFbFuVnwaHhij5epTjrbhqItQ-GBgJC9-i8CMMh_w&e=>
https://nam03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-rtgwg-net2cloud-gap-analysis-02&amp;data=02%7C01%7Clinda.dunbar%40futurewei.com%7C702c4feeabf74674d3a608d6f4f0601b%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C636965710579388472&amp;sdata=p1tOJDeZAfig110sJF5748r7w%2BuAxw2Id9XQyg4NUQY%3D&amp;reserved=0<https://urldefense.proofpoint.com/v2/url?u=https-3A__nam03.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fdatatracker.ietf.org-252Fdoc-252Fhtml-252Fdraft-2Dietf-2Drtgwg-2Dnet2cloud-2Dgap-2Danalysis-2D02-26amp-3Bdata-3D02-257C01-257Clinda.dunbar-2540futurewei.com-257C702c4feeabf74674d3a608d6f4f0601b-257C0fee8ff2a3b240189c753a1d5591fedc-257C1-257C0-257C636965710579388472-26amp-3Bsdata-3Dp1tOJDeZAfig110sJF5748r7w-252BuAxw2Id9XQyg4NUQY-253D-26amp-3Breserved-3D0&d=DwMFAg&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=CRB2tJiQePk0cT-h5LGhEWH-s_xXXup3HzvBSMRj5VE&m=svEApaK250yroEYlWy7i4KW3lGckXW5jGBoYG61yxjk&s=4uVaaPMwkhndws3rOU4mHn1xbtbBJbRoIJ9jIrBPW14&e=>

A diff from the previous version is available at:
https://nam03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Frfcdiff%3Furl2%3Ddraft-ietf-rtgwg-net2cloud-gap-analysis-02&amp;data=02%7C01%7Clinda.dunbar%40futurewei.com%7C702c4feeabf74674d3a608d6f4f0601b%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C636965710579388472&amp;sdata=rZyP0RdcQHkZvf1y0e8ZqCcuiHKlDSdfx4WlbYUfZeI%3D&amp;reserved=0<https://urldefense.proofpoint.com/v2/url?u=https-3A__nam03.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fwww.ietf.org-252Frfcdiff-253Furl2-253Ddraft-2Dietf-2Drtgwg-2Dnet2cloud-2Dgap-2Danalysis-2D02-26amp-3Bdata-3D02-257C01-257Clinda.dunbar-2540futurewei.com-257C702c4feeabf74674d3a608d6f4f0601b-257C0fee8ff2a3b240189c753a1d5591fedc-257C1-257C0-257C636965710579388472-26amp-3Bsdata-3DrZyP0RdcQHkZvf1y0e8ZqCcuiHKlDSdfx4WlbYUfZeI-253D-26amp-3Breserved-3D0&d=DwMFAg&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=CRB2tJiQePk0cT-h5LGhEWH-s_xXXup3HzvBSMRj5VE&m=svEApaK250yroEYlWy7i4KW3lGckXW5jGBoYG61yxjk&s=9bc5wSdhJ_EpKMK4bzuSoIi_syNoQzq4R00pTiDM4ow&e=>


Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/<https://urldefense.proofpoint.com/v2/url?u=ftp-3A__ftp.ietf.org_internet-2Ddrafts_&d=DwMFAg&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=CRB2tJiQePk0cT-h5LGhEWH-s_xXXup3HzvBSMRj5VE&m=svEApaK250yroEYlWy7i4KW3lGckXW5jGBoYG61yxjk&s=qRWZ3qZdW0201EhLZzTqlvnUFWSJCPmtuIbcQP7NaXc&e=>

_______________________________________________
rtgwg mailing list
rtgwg@ietf.org<mailto:rtgwg@ietf.org>
https://nam03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Frtgwg&amp;data=02%7C01%7Clinda.dunbar%40futurewei.com%7C702c4feeabf74674d3a608d6f4f0601b%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C636965710579388472&amp;sdata=TXSGr8jvjQrSgaM9H6LDEudl9ZXk0%2BY1YTbZ%2BSvqZEk%3D&amp;reserved=0<https://urldefense.proofpoint.com/v2/url?u=https-3A__nam03.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fwww.ietf.org-252Fmailman-252Flistinfo-252Frtgwg-26amp-3Bdata-3D02-257C01-257Clinda.dunbar-2540futurewei.com-257C702c4feeabf74674d3a608d6f4f0601b-257C0fee8ff2a3b240189c753a1d5591fedc-257C1-257C0-257C636965710579388472-26amp-3Bsdata-3DTXSGr8jvjQrSgaM9H6LDEudl9ZXk0-252BY1YTbZ-252BSvqZEk-253D-26amp-3Breserved-3D0&d=DwMFAg&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=CRB2tJiQePk0cT-h5LGhEWH-s_xXXup3HzvBSMRj5VE&m=svEApaK250yroEYlWy7i4KW3lGckXW5jGBoYG61yxjk&s=KJL3raMv7Z5jRY7_dfcBiwO8H-3m-wRiD-X4XFzV-cs&e=>