Can SD-WAN integrating with SR solve some of the problems discussed in draft-ietf-rtgwg-net2cloud-problem-statement?

Linda Dunbar <linda.dunbar@futurewei.com> Fri, 04 October 2019 16:28 UTC

Return-Path: <linda.dunbar@futurewei.com>
X-Original-To: rtgwg@ietfa.amsl.com
Delivered-To: rtgwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 80F6D120074; Fri, 4 Oct 2019 09:28:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HlBt0hKSdf4u; Fri, 4 Oct 2019 09:28:28 -0700 (PDT)
Received: from NAM05-CO1-obe.outbound.protection.outlook.com (mail-eopbgr720132.outbound.protection.outlook.com [40.107.72.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B83B7120048; Fri, 4 Oct 2019 09:28:25 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=b/mTtU3eaP5gGQG52mgAkowZ2fOhOZBxwiA64pJNSFxTRAJX8jNJVc5eYpBGCuHPzY7x9YTG9qWwDTFpN4TqgmvoE6h7fE+2fwl5VKbGymq+8uFsl/OW2k2gq+BiYcDPTqfKVdablLcCai438YK4ZBHtiwMyhnZ7gofSoyvF9DWlHk4tdPPuUIMMwbfD9DOU08d8CWasA30Vq3lxWcGspk7DvzOQKDSFxmo+7rElq6Dkh2y2eacB5bx6uB4m9VX61LMCl8qrG3qQlQYegCtxCfFil4eabW+3C8+q/hSglGT4u4PeOksJXpRW2/fXoZy3EYKw77fZSMQItcyirKWcBQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GGM+mkagCW51RhHvffK2zoLdzManqIQCuDzQ7jLuLFA=; b=C8xvvWM2ZKRy3J6QAfH5BoeYYLspxVIyZrA2vOvvG9el+rzPSwUi2XLzYF8nAVxUtt4+5HZvbT6xLoAq09PutsHKGHDeTEIE5Iwc4j9diE8pq027ZeB+mHctLBMatffM7sQdPS7KyBY1sSZ7yN0QwGHm6jaHMK/E4R9wh4TbWOC/xYj9K2fDHyfvA5M++7j3CVZdkGZ4jimuBMCLIZeP+kyN7TmPlyEHNTcrK0D4uFmCIEhiko/a9C/0NRnvJ4ZEYpeMLL3FN5XBAN/PRofuefl+m0xMtFSECy0SvUX/AlTXSWM746QXI4hZZ2GPXO+uvssL03xk0MzV5jKYcG7CtA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GGM+mkagCW51RhHvffK2zoLdzManqIQCuDzQ7jLuLFA=; b=KxCL5RkyPQe7xe+Av2hy6HZpRk1P8xL15ELiyFnMl/pFRDS7N9MCNfPjag8I7AAcvm5KsDXyNKxFa/QR2uy1kSkgiSIeJAw0CY1DVLmUx/mulOb/nZU0jvIX89x3koUJeBrw6Ltusqvh90gXeQuUB7ModYFkKNUu+/WS7inZqjc=
Received: from CH2PR13MB3574.namprd13.prod.outlook.com (52.132.244.33) by CH2PR13MB3461.namprd13.prod.outlook.com (52.132.246.84) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2305.10; Fri, 4 Oct 2019 16:28:22 +0000
Received: from CH2PR13MB3574.namprd13.prod.outlook.com ([fe80::ac29:b90e:4dbf:d714]) by CH2PR13MB3574.namprd13.prod.outlook.com ([fe80::ac29:b90e:4dbf:d714%7]) with mapi id 15.20.2327.023; Fri, 4 Oct 2019 16:28:22 +0000
From: Linda Dunbar <linda.dunbar@futurewei.com>
To: "draft-dukes-spring-sr-for-sdwan@ietf.org" <draft-dukes-spring-sr-for-sdwan@ietf.org>
CC: RTGWG <rtgwg@ietf.org>
Subject: Can SD-WAN integrating with SR solve some of the problems discussed in draft-ietf-rtgwg-net2cloud-problem-statement?
Thread-Topic: Can SD-WAN integrating with SR solve some of the problems discussed in draft-ietf-rtgwg-net2cloud-problem-statement?
Thread-Index: AdV60KwmLS47OavXQ4qC91xnHD0RXA==
Date: Fri, 04 Oct 2019 16:28:21 +0000
Message-ID: <CH2PR13MB357495DCB98A6A3CE0A58067859E0@CH2PR13MB3574.namprd13.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=linda.dunbar@futurewei.com;
x-originating-ip: [206.16.17.231]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 07fbc906-d524-42d4-9314-08d748e7df79
x-ms-traffictypediagnostic: CH2PR13MB3461:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <CH2PR13MB34616060403482B47C37C058859E0@CH2PR13MB3461.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 018093A9B5
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(376002)(346002)(396003)(366004)(136003)(39840400004)(199004)(189003)(606006)(44832011)(7696005)(5640700003)(64756008)(66476007)(6916009)(486006)(99286004)(66446008)(6506007)(26005)(102836004)(2351001)(71200400001)(476003)(2501003)(256004)(14444005)(5024004)(71190400001)(25786009)(55016002)(2906002)(450100002)(6436002)(66556008)(8936002)(8676002)(81166006)(3846002)(6116002)(6306002)(790700001)(9686003)(66574012)(14454004)(81156014)(478600001)(66066001)(7736002)(4326008)(76116006)(86362001)(52536014)(74316002)(236005)(5660300002)(966005)(54896002)(316002)(66946007)(186003)(33656002); DIR:OUT; SFP:1102; SCL:1; SRVR:CH2PR13MB3461; H:CH2PR13MB3574.namprd13.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: futurewei.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 4gygCTb8GuQAg47/bSYoDQE1VAYe79C8wBuOB498V9knhb9HCQ2/KREFGVjINswvCuOYjZykEPJ6YLdPlZ2DmxuFdKItqhWxeFxsTM/i/xR828VafW1r7C7LJQZV8uNuqg6SUqDpH94bajfcS7b2c1G6dDfOjsHnFsT+zBElkoYuPR4JjQt90sOpbCNsFYDlW8ymm1cr5x3nTLddGFHX3OFRIwpd8FBhfNrTUz1Zv2qkmgfc9qP94BLyvH5xI/rOLSi0pQED2bqE02qBP8NoRA1jd/pCjmg2boANb7Zx2fct5dvnPfXA2X44U1pii7+P11QRtgwwuFpi2TsEOtJI62/Dqm4sgz7DQW4Pag26x5n9icR43hCU2S+B2UBr6nbJkW0W4v8d+6cLhnUebc8DE2wpHH9tjXnQAXSTbhiz3833WKrMMQX6AOAWzdmA6PQpfv6wCNhZIMGbqLO4ruUKYg==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_CH2PR13MB357495DCB98A6A3CE0A58067859E0CH2PR13MB3574namp_"
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 07fbc906-d524-42d4-9314-08d748e7df79
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Oct 2019 16:28:21.8057 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: qXaNBMWSuDVyZKYaUDMHdLMPIbssDlJjeUEdwofkkvvjaPssTs0vMjX+avmViRQt47jxHvp6lB2Qer4baYoF9A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR13MB3461
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtgwg/X4i028WDndJmVfp_S8tK3D0PJtY>
X-BeenThere: rtgwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Area Working Group <rtgwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtgwg/>
List-Post: <mailto:rtgwg@ietf.org>
List-Help: <mailto:rtgwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Oct 2019 16:28:32 -0000

Darren,  Clarence, Gaurav, Xiaohu, Daniel, Pablo, and Francois,

Since your draft-dukes-spring-sr-for-sdwan-02 describes on how SR enables underlay SLA to Software-Defined WAN (SDWAN), we want to get your feedback on the https://datatracker.ietf.org/doc/draft-ietf-rtgwg-net2cloud-problem-statement/ which discusses the problems associated with using SD-WAN to interconnect Hybrid Cloud DCs. The draft focuses on the network problems that many enterprises face when they have workloads & applications & data split among different data centers, especially for those enterprises with multiple sites that are already interconnected by VPNs (e.g., MPLS L2VPN/L3VPN,, and/or SR).
Want your feedback on whether SD-WAN integrating with SR can solve some of the problems discussed in the draft?
SD-WAN interconnection of branch offices is not as simple as it appears. For an enterprise with multiple sites, using SD-WAN overlay paths among sites requires each CPE to manage all the addresses that local hosts have the potential to reach, i.e., map internal VPN addresses to appropriate SD-WAN paths. This is similar to the complexity of Frame Relay based VPNs, where each CPE needed to maintain mesh routing for all destinations if they were to avoid an extra hop through a hub router. Even though SD-WAN CPEs can get assistance from a central controller (instead of running a routing protocol) to resolve the mapping between destinations and SD-WAN paths, SD-WAN CPEs are still responsible for routing table maintenance as remote destinations change their attachments, e.g., the dynamic workload in other DCs are de-commissioned or added.
Even though originally envisioned for interconnecting branch offices, SD-WAN offers a very attractive way for enterprises to connect to Cloud DCs.
The SD-WAN for interconnecting branch offices and the SD-WAN for interconnecting to Cloud DCs have some differences:

  *   SD-WAN for interconnecting branch offices usually have two end-points (e.g., CPEs) controlled by one entity (e.g., a controller or management system operated by the enterprise).
  *   SD-WAN for Cloud DC interconnects may consider CPEs owned or managed by the enterprise, while remote end-points are being managed or controlled by Cloud DCs (For the ease of description, let's call such CPEs asymmetrically-managed CPEs).
  *   Cloud DCs may have different entry points (or devices) with one entry point that terminates a private direct connection (based upon a leased line for example) and other entry points being devices terminating the IPsec tunnels, as shown in Figure 2.

Thank you very much.
Linda Dunbar