Re: [Teas] WG Last Call: draft-ietf-teas-enhanced-vpn-11 - isolation
Gyan Mishra <hayabusagsm@gmail.com> Thu, 12 January 2023 02:53 UTC
Return-Path: <hayabusagsm@gmail.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F27D9C14CEFF for <teas@ietfa.amsl.com>; Wed, 11 Jan 2023 18:53:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.084
X-Spam-Level:
X-Spam-Status: No, score=-2.084 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Uebw6p3NQzto for <teas@ietfa.amsl.com>; Wed, 11 Jan 2023 18:53:49 -0800 (PST)
Received: from mail-qv1-xf29.google.com (mail-qv1-xf29.google.com [IPv6:2607:f8b0:4864:20::f29]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4FB3DC14F744 for <teas@ietf.org>; Wed, 11 Jan 2023 18:53:49 -0800 (PST)
Received: by mail-qv1-xf29.google.com with SMTP id y8so11882912qvn.11 for <teas@ietf.org>; Wed, 11 Jan 2023 18:53:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=qiiAxkI8KNRx4GKmjQSywTaF5ZI1OXb8+0c72jkJyBs=; b=TNYKImiGfx/SqW04oiEERqLfJnTz0dKuPYJSLV0YqOXgYODqRE4TbKPXTZHwo9UWdy YUDzNAUwsJJ7G3yjW8eijmiflDakVse0prRF/KgVdH+FOr6n4yYUWRVHrVxznRolOJkR DSlGNgtNv2B44+RK+Gzwo7AeCFPe1MpEfUJyL+DcQzhBETdFV57MlBXNIKkE0FcOBF6S UrrsK2iTetc2DfmqaZs/K8Sri/+vfjByOHUa8YuHfPRmyOAyPOse6ymVuPRz0GQ2SS1X qVcU2hOLWDkUWElmRJ9DBL3EZbAq2Y/FWLmeQ4GfI2ZBlfRxHR/BRTf6dnOr7YyGWKRi XwTg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=qiiAxkI8KNRx4GKmjQSywTaF5ZI1OXb8+0c72jkJyBs=; b=Amrz5tGckInXCSg2sfKsa+94m0NLo4zUIvwF/Kdkbftat2BK93VGuKgJZyWJ7EHDH4 SqzmK1Xjycx3sQAaukJywzs5y1J1IWVjcxMGj/0JTCZrNcwKL47urpsSxsXhtBTz5IUZ XJT5aFigFtRm5RF0+W2kXLDByEWB3dULZCdA1byKuEH+Iy4gc9CIozgIrZANFHOiwEZ0 Mzpu2gKc5v6YPJ7ZsgTk5a+/EHQSP0pmtXdLXU31c1/y0r9gsMdO4BNOe7KmD68fckOZ 8prAQwOIqQG20ZNXRCtFDkNpmrYU/IZle4sesZ+ZyNUYg8x7PsYStly8YeJaLHRuM1N5 dxvA==
X-Gm-Message-State: AFqh2kqbFsVgEdVh+QDkqjZ3WmwCWwhiykoc9B7SjNsXmKfcpIY59GpD DNo5dVaB1J6FnqLjyBmwUsPmJ/kyZdqT6o5zg768a/Y+hL8=
X-Google-Smtp-Source: AMrXdXsinUAC6Rjamc6LwlS6YBIRqPJZclln6d3Ake0d1fuEVxIgl3kR0z3yzC71VdVVgIszrBk2ldo0kul/71Kj210=
X-Received: by 2002:a05:6214:3313:b0:531:c954:a557 with SMTP id mo19-20020a056214331300b00531c954a557mr1800413qvb.13.1673492027826; Wed, 11 Jan 2023 18:53:47 -0800 (PST)
MIME-Version: 1.0
References: <43b3a19a-c136-4afe-9c31-265bec3c3627@labn.net> <2996_1672998905_63B7EFF9_2996_448_11_ae1915abd9794f3086f7f5b164f60340@orange.com> <fec9dbc7b4ef460288023a6dd06b90e6@huawei.com> <e8f578af-be06-6cb7-0ba1-7aa743d6277a@joelhalpern.com> <520dc18282f34ce9a12dfea31af552da@huawei.com> <3fe798e2-787a-524d-2da4-bcf68af8dd9f@joelhalpern.com> <3d8e0159412c4878806523e983824514@huawei.com> <e0f8a0bf-6bb0-528a-6607-30c39b194ae0@joelhalpern.com> <078601d92527$376b2020$a6416060$@olddog.co.uk> <8b619ac3-dcd2-3a14-ae6f-e8513e94fd92@joelhalpern.com> <14886_1673424775_63BE6F87_14886_467_1_51e683f43a424d019834be1655105606@orange.com> <CABNhwV2XW03KtQQeMv329S=J3AUVLMR7yEA6sPsGLyX+RqFzqQ@mail.gmail.com>
In-Reply-To: <CABNhwV2XW03KtQQeMv329S=J3AUVLMR7yEA6sPsGLyX+RqFzqQ@mail.gmail.com>
From: Gyan Mishra <hayabusagsm@gmail.com>
Date: Wed, 11 Jan 2023 21:53:36 -0500
Message-ID: <CABNhwV3=bS+JkUdS+urWj0W0yqR1BxYeR5fDqaFKgR7kEJ822Q@mail.gmail.com>
To: mohamed.boucadair@orange.com
Cc: "Dongjie (Jimmy)" <jie.dong@huawei.com>, JACQUENET Christian INNOV/NET <christian.jacquenet@orange.com>, Joel Halpern <jmh@joelhalpern.com>, TEAS WG <teas@ietf.org>, "adrian@olddog.co.uk" <adrian@olddog.co.uk>
Content-Type: multipart/alternative; boundary="000000000000da681e05f2083951"
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/jg9nWOqM45KlZ9HzNWeXohWjQgU>
Subject: Re: [Teas] WG Last Call: draft-ietf-teas-enhanced-vpn-11 - isolation
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Jan 2023 02:53:54 -0000
All In that example of 3 link coloring of the transport Gold, Bronze, Silver using Flex Algo each color could limit the number of customer mapped to the slice coloring providing degrees of isolation. Gold - maximum 50 customers Silver - maximum 100 customers Bronze - maximum 200 customers Kind Regards Gyan On Wed, Jan 11, 2023 at 8:05 PM Gyan Mishra <hayabusagsm@gmail.com> wrote: > > All > > Another way to think of hard and soft isolation, is hard isolation is > dedicated transport where soft isolation is shared transport. > > So the sharing can be done using multi tenancy like DC NVO encapsulations > of IP VPN, client-net or net-net VPN access. When you think of soft > isolation there is an overlay and underlay and there is a many to 1 mapping > between the overlay and underlay which VXAN, L3 VPN, VLAN are excellent > examples of soft isolation. > > Hard isolation is isolating traffic to a dedicated path or transport “path > isolation” using SR or RSVP-TE dedicated LSP per VRF TE isolated path. So > here we have the overlay to underlay is a 1 to 1 mapping single customer > using the transport so here it’s a dedicated transport to that single > customer. > > Think of soft slicing or isolation as the overlay carving and slicing and > think of hard slicing or hard isolation is carving up the underlay > transport. > > Soft is logical or virtual and hard is physical. > > So when you think of network slicing or let’s say flex algo link coloring > which is a good example of how to instantiate the IETF network slice you > can have have all your customers VPNs many to 1 map to a single transport > which is soft isolation or you could take your top tier customers and give > each top tier customer their own dedicated transport so a 1-1 mapping VPN > overlay to underlay. > > That is quite expensive and makes hard isolation impractical. > > So this is where “degree of isolation” comes into play and flex algo link > coloring is a great example of degree of isolation. > > So let’s say now you only want gold bronze and silver class VPNs to share > this top tier VPN+ IETF network slice you would have 3 colors / Algo’s on > these continuous links overlaid onto the transport fabric versus carrying > 1000s of VPNs your traditional L3 VPN on shared evenly transport 1 to many > mapping. The Gold, Bronz, Silver classes would map to a minimal number of > VPNs for this top tier service offering. In this SP network example all > other BAU VPNs would use the traditional shared soft isolation transport > which could be a different shared flex algo. > > When you think of network slicing what are you doing ? > > You are creating a degree of sharability of the VPN overlay to underlay > underpinning from many to 1 to fewer to 1 so lesser sharing resulting in > improved SLO SLE markers and value add for SP. > > That degree of sharability is the degree of isolation. > > The degree of isolation goes against binary on or isolation, 100% > isolation or no isolation. > > Binary view of isolation is impractical and of course does not scale. If > you use binary terms you are in fact not doing network slicing. > > So any SP wanting to slice a pie and create larger pieces and not have > everyone share the pie - that is network slicing and that concept is degree > of isolation. > > So this gives a pictorial real world example of degree of network slicing. > > Hopefully that helps explain 3.2 and it’s importance. > > > > Kind Regards > > Gyan > On Wed, Jan 11, 2023 at 3:13 AM <mohamed.boucadair@orange.com> wrote: > >> Hi Joel, all, >> >> I suspect that the root of the disconnect here is that we are using the >> same term (isolation) to denote to distinct aspects of service provisioning >> (that we used to refer to with distinct terms, BTW). >> >> What is called "soft isolation" is what we used to call "traffic >> isolation" or "traffic and routing isolation" (see, e.g., RFC4176). >> Stronger forms can be requested as part of this isolation (L2/L3 encryption >> at the VPN network access, dedicated transport tunnels between PEs, etc.). >> Some sensitive sectors may request audits/certifications to attest that a >> network is reliably meeting this. >> >> What is called "hard isolation" in the draft is no more than protecting >> against service interference. A service will be perceived with the >> requested objectives independent of whether other services are soliciting >> the same shared resources, are encountering failures, are aggressively >> seeking to grab more resources, etc. The QoS/TE/Policy toolkit can be used >> here. A (very simple) implementation example to meet this objective for >> services that require global connectivity via proxies is to configure >> quotas per service on the proxy. A more costly approach would be to >> instantiate a dedicated proxy instance for this service. Modelling "hard >> isolation" as a Boolean wouldn't be sufficient here, but this is out of >> scope of this draft. >> >> The current text in the draft suggests that requesting "hard isolation" >> would imply that "soft isolation" is also ensured...which is not true. >> >> I tend to suggest abandoning the soft/hard thing but refer to these as >> two distinct service characteristics. >> >> Cheers, >> Med >> >> > -----Message d'origine----- >> > De : Teas <teas-bounces@ietf.org> De la part de Joel Halpern >> > Envoyé : mardi 10 janvier 2023 20:26 >> > À : adrian@olddog.co.uk; 'Dongjie (Jimmy)' <jie.dong@huawei.com> >> > Cc : 'TEAS WG' <teas@ietf.org> >> > Objet : Re: [Teas] WG Last Call: draft-ietf-teas-enhanced-vpn-11 - >> > isolation >> > >> > While I tend to wonder a bit some days, I do mostly see the value >> > in SLEs. (We can discuss examples over bevarage at some meeting >> > to see why some days I am skeptical, but I am not objecting to >> > the general premise of SLEs,.) >> > >> > If the Isolation were strictly about address isolation, I would >> > probably not object. (There is "don't delvier to others", there >> > is the VPN version, which is somewhat stronger.) >> > >> > But what the text says is that there is something called hard >> > isolation. And based on the YANG I have seen from the same >> > participants, there is a knob that one can turn. But, other than >> > meeting SLOs, I hav eno idea what a customer, implementor, or >> > operator would do differently if that knob were set at various >> > points. As such, I find the description confusing and >> > unimplementable as described. One can claim this is only a >> > framework, but I do not even know how I would evaluate a >> > realization to decide if it were offering soft, medium, hard, or >> > extra-firm isolation. >> > >> > Yours, >> > >> > Joel >> > >> > PS: I actually think the example of multicast may be a bad >> > example, as I am not at all sure there is a commitment not to >> > deliver the multicast to other places. VPNs do seem to have a >> > "only within the VPN" scoping that is closer to what you describe. >> > >> > On 1/10/2023 2:10 PM, Adrian Farrel wrote: >> > > May I offer an interjection as someone who provided some of the >> > wording for rehashing the VPN+ isolation text a while back? >> > > >> > > Let us consider a multicast service offered to a customer. In >> > this service, traffic is delivered from site A to sites B, C and D >> > (all belonging to the same customer). It is clearly up to the >> > operator how they choose to realise this multicast delivery within >> > their network. >> > > >> > > However, there is an obvious requirement from the customer that >> > the traffic is not also delivered to site E belonging to another >> > customer. Such requirements are so fundamental that we tend to not >> > talk about them, but you can be sure that they are there in the >> > small print of the customer agreement. >> > > >> > > This "non-delivery to other customers" requirement is a form of >> > isolation. But, most importantly, it is an SLE. The customer >> > cannot measure this. The customer has no good way of knowing >> > whether an extra copy of the traffic is being delivered to >> > somewhere it shouldn't go. >> > > >> > > There is, therefore, a contract that makes a promise, and a >> > customer who may, very probably, never know if the contract is >> > broken. If they do find out, by some means, they will get cross. >> > But until then, this is a matter of trust between the customer and >> > provider. >> > > >> > > (There is also, probably, a converse of this requirement where a >> > > customer does not want to be flooded with traffic that does not >> > belong >> > > to their service. That, too, is a form of isolation.) >> > > >> > > My argument, therefore, is that these SLEs are very real, and >> > express the expectations that the customer has, and the behaviors >> > that the operator will want to implement. >> > > >> > > Of course, for many of the aspects of isolation, it is enough >> > for the SLOs to be set carefully, and for the service to conform. >> > Who cares whether service B causes a degradation in the latency >> > being delivered to service A, if service A is still within the >> > bounds of the latency SLO set in the SLA? This point is, I >> > believe, made abundantly clear in the second paragraph of Section >> > 3.2. >> > > >> > > Furthermore, different isolation tools may only be available in >> > certain network technologies. For example, the concept of >> > dedicating switching resources to a particular service makes more >> > sense in a physically switched network (TDM, WDM, ...) than it >> > does in a fully multiplexed packet network. Nevertheless, there >> > are networks and their customers where whole ports/links are >> > dedicated for the use of traffic flows from one customer (with the >> > extreme case being that the operator builds a totally dedicated >> > network for the customer). This is done because the customer is >> > willing to pay. Sometimes they are paying for a set of extremely >> > stringent SLOs. Sometimes they are paying for their service levels >> > to be "no worse than" those of their competitors. >> > > >> > > So I am trying to understand whether the push-back on the >> > isolation text is philosophical ("I don't see the need to talk >> > about isolation"), technical ("I don't see how this would map to >> > implementation/deployment in the operator's network"), or textual >> > ("I read the text, but it doesn't convey any meaning to me"). I >> > would answer: >> > > 1. Some people see the need, so that's where we are. >> > > 2. I think that this document is supposed to provide an overview >> > of relevant technologies, so it could include additional guidance >> > if what is there is not enough. >> > > 3. This is hard to resolve, but is best done by asking questions >> > about isolation, and then having the answers incorporated into the >> > text. >> > > >> > > I hope this helps reach a solution rather than just muddying the >> > waters. >> > > >> > > Best, >> > > Adrian >> > > >> > > -----Original Message----- >> > > From: Teas <teas-bounces@ietf.org> On Behalf Of Joel Halpern >> > > Sent: 10 January 2023 14:50 >> > > To: Dongjie (Jimmy) <jie.dong@huawei.com>; TEAS WG >> > <teas@ietf.org> >> > > Subject: Re: [Teas] WG Last Call: draft-ietf-teas-enhanced-vpn- >> > 11 - >> > > isolation >> > > >> > > I understand that isolation as a concept is in the Framework >> > draft and >> > > in the 3GPP documents. The 3GPP documents as I understand it >> > are very >> > > general about what it means (although I have seen come clear >> > > interpretations as they apply to cellular radio interfaces). >> > Our >> > > slicing framework is of course not specific as to the meaning. >> > While >> > > I was tempted to ask to remove it there, I concluded that as an >> > > example of something that could be an SLE, it is workable. >> > > >> > > However, this document is about a more specific realization. It >> > > refers to degrees of isolation. I have no idea what I as an >> > > implementor or operator would do differently based on the >> > degrees of >> > > isolation. So I have a real problem with understanding the >> > text. >> > > (Note, this also applies to the YANG model, where we have a >> > field >> > > defined without a clear >> > > meaning.) >> > > >> > > I can not even tell what purpose the section in the VPN+ >> > framework >> > > serves. As such, I can not begin to suggest clarifications. >> > > >> > > Yours, >> > > >> > > Joel >> > > >> > > On 1/10/2023 4:01 AM, Dongjie (Jimmy) wrote: >> > >> Hi Joel, >> > >> >> > >> It seems my point was not interpreted clearly. So let me try >> > again: >> > >> >> > >> 1. Isolation is formally defined as one SLE in the IETF network >> > slice framework, and also one of the service requirements >> > specified in 3GPP TS 28.530. I think we don't need to spend >> > further time on whether isolation should be mentioned or not. >> > >> >> > >> 2. Isolation can be described as part of the service >> > requirements of the VPN+ customer. The requirements on the degrees >> > of isolation could be mapped to appropriate mechanisms in the >> > network for VPN+ realization. This draft also gives examples of >> > the resource partitioning mechanisms used to achieve isolation. >> > >> >> > >> 3. This framework document describes the architecture and the >> > candidate technologies for realizing VPN+. Operators can define >> > the specific types of services (including the degrees of >> > isolation) they would like to provide, and the corresponding >> > mechanisms they would use in the network for service delivery. >> > >> >> > >> In summary, the isolation text in this document aligns with the >> > definition and description in other documents, and provides useful >> > information to this framework document. If you still have specific >> > concerns, proposing text would be welcome. >> > >> >> > >> Best regards, >> > >> Jie >> > >> >> > >>> -----Original Message----- >> > >>> From: Joel Halpern [mailto:jmh@joelhalpern.com] >> > >>> Sent: Tuesday, January 10, 2023 12:19 AM >> > >>> To: Dongjie (Jimmy) <jie.dong@huawei.com>; TEAS WG >> > <teas@ietf.org> >> > >>> Subject: Re: [Teas] WG Last Call: draft-ietf-teas-enhanced- >> > vpn-11 - >> > >>> isolation >> > >>> >> > >>> Not sure I understand all of your reply. I think what you are >> > >>> saying implies that with regard to isolation the framework is >> > >>> significatnly incomplete and needs more work before we can >> > send it >> > >>> to the IETF. Currently, as far as I can tell the document >> > implies >> > >>> that technologies realizing vpn+ need to meet isolation goals, >> > but >> > >>> gives no hint as to what thosse goals are or how they could be >> > met. >> > >>> I have no idea how I would evaluate a realization as to >> > whether it >> > >>> was doing enough, too much, or not enough, to meet the >> > framework requirements. >> > >>> >> > >>> Yours, >> > >>> >> > >>> Joel >> > >>> >> > >>> On 1/9/2023 11:03 AM, Dongjie (Jimmy) wrote: >> > >>>> Hi Joel, >> > >>>> >> > >>>> Thanks for your review and comments. >> > >>>> >> > >>>> Since isolation is considered as one of the SLEs in the IETF >> > >>>> network slice >> > >>> framework, and has been mentioned as one of the network slice >> > >>> service requirements in the wireless community, it is >> > considered >> > >>> useful to also have it described in this document. The text >> > could >> > >>> always be polished based on discussion and suggestion. >> > >>>> As mentioned in my reply to Greg, a customer's requirement on >> > >>>> isolation is >> > >>> not the same as the requirement on a specific set of SLOs. In >> > some >> > >>> cases, meeting a set of SLOs could be considered as one way to >> > >>> indicate that the isolation requirement is also met, it is not >> > the >> > >>> only way. And in some cases not meeting the SLOs does not mean >> > the isolation requirement is not met. >> > >>> The SLO violation could be due to some other reasons. Thus it >> > is >> > >>> better to have both the isolation and the set of SLOs >> > described as parts of the SLA. >> > >>>> As described in the draft, there is distinction between how >> > >>>> isolation is >> > >>> requested by customer, and how it is delivered by the service >> > provider. >> > >>> Customers from different industries could have different >> > >>> requirements on isolation, accordingly operator may design >> > their >> > >>> services to match those requirements. Then in the underlay >> > network, >> > >>> specific resource partitioning and reservation mechanisms >> > could be >> > >>> chosen to realize the VPN+ service. As a framework document, >> > it >> > >>> would be helpful to cover different customer's requirements, >> > different service design and realization of the operator. >> > >>>> Best regards, >> > >>>> Jie >> > >>>> >> > >>>>> -----Original Message----- >> > >>>>> From: Teas <teas-bounces@ietf.org> On Behalf Of Joel Halpern >> > >>>>> Sent: Saturday, January 7, 2023 12:38 AM >> > >>>>> To: TEAS WG <teas@ietf.org> >> > >>>>> Subject: Re: [Teas] WG Last Call: draft-ietf-teas-enhanced- >> > vpn-11 >> > >>>>> - isolation >> > >>>>> >> > >>>>> I have reread section 3.2 multiple times. And I am left >> > somewhat >> > >>>>> confused. I presume I am missing something. Axs far as I >> > can >> > >>>>> tell, the section is either over-speciying something, or >> > under-specifying it. >> > >>>>> >> > >>>>> On the one hand, the document seems to be quite useful >> > without the >> > >>>>> section. And the section itself says that the isolation can >> > be >> > >>>>> delivered by meeting the SLOs. So why do we need a section >> > about >> > >>> isolation? >> > >>>>> On the other hand, the section implies that one could want >> > to do >> > >>>>> something more than just meet the SLOs, and that somehow the >> > >>> customer >> > >>>>> could ask for that. Except that at that point I have no >> > >>>>> information from the draft as to what would or would not >> > >>>>> constitute such stronger isolation, since it would not be >> > subject >> > >>>>> to observations (not be an SLO). So if there really is >> > something >> > >>>>> more that enhanced VPN wants to deliver in this regard, I >> > think it >> > >>>>> needs to be described, so we can decide >> > >>> if we agree that it is part of the framework? >> > >>>>> Yours, >> > >>>>> >> > >>>>> Joel >> > >>>>> >> > >>>>> _______________________________________________ >> > >>>>> Teas mailing list >> > >>>>> Teas@ietf.org >> > >>>>> https://www.ietf.org/mailman/listinfo/teas >> > > _______________________________________________ >> > > Teas mailing list >> > > Teas@ietf.org >> > > https://www.ietf.org/mailman/listinfo/teas >> > > >> > >> > _______________________________________________ >> > Teas mailing list >> > Teas@ietf.org >> > https://www.ietf.org/mailman/listinfo/teas >> >> >> _________________________________________________________________________________________________________________________ >> >> Ce message et ses pieces jointes peuvent contenir des informations >> confidentielles ou privilegiees et ne doivent donc >> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez >> recu ce message par erreur, veuillez le signaler >> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages >> electroniques etant susceptibles d'alteration, >> Orange decline toute responsabilite si ce message a ete altere, deforme >> ou falsifie. Merci. >> >> This message and its attachments may contain confidential or privileged >> information that may be protected by law; >> they should not be distributed, used or copied without authorisation. >> If you have received this email in error, please notify the sender and >> delete this message and its attachments. >> As emails may be altered, Orange is not liable for messages that have >> been modified, changed or falsified. >> Thank you. >> >> _______________________________________________ >> Teas mailing list >> Teas@ietf.org >> https://www.ietf.org/mailman/listinfo/teas >> > -- > > <http://www.verizon.com/> > > *Gyan Mishra* > > *Network Solutions A**rchitect * > > *Email gyan.s.mishra@verizon.com <gyan.s.mishra@verizon.com>* > > > > *M 301 502-1347* > > -- <http://www.verizon.com/> *Gyan Mishra* *Network Solutions A**rchitect * *Email gyan.s.mishra@verizon.com <gyan.s.mishra@verizon.com>* *M 301 502-1347*
- [Teas] WG Last Call: draft-ietf-teas-enhanced-vpn… Lou Berger
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… li_zhenqiang@hotmail.com
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Greg Mirsky
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Chongfeng Xie
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Wubo (lana)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Joel Halpern
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Greg Mirsky
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Greg Mirsky
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Adrian Farrel
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… duzongpeng@foxmail.com
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Takuya Miyasaka
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dhruv Dhody
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… mohamed.boucadair
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Joel Halpern
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Greg Mirsky
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… mohamed.boucadair
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Yingzhen Qu
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- [Teas] 答复: WG Last Call: draft-ietf-teas-enhanced… qinfengwei
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Joel Halpern
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Gyan Mishra
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Joel Halpern
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Adrian Farrel
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Joel Halpern
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Adrian Farrel
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… mohamed.boucadair
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Gengxuesong (Geng Xuesong)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Lizhenbin
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… 庞冉(联通集团中国联通研究院-本 部)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Greg Mirsky
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Gyan Mishra
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Gyan Mishra
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Joel Halpern
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Haoyu Song
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Liyan Gong
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… mohamed.boucadair
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Joel Halpern
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Huaimo Chen
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Shunsuke Homma
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Gyan Mishra
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Lou Berger
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… mohamed.boucadair
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Gyan Mishra
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Chongfeng Xie
- Re: [Teas] WG Last Call: draft-ietf-teas-enhanced… Dongjie (Jimmy)