mpls-1----Page:7
1  2  3  4  5  6  7 

7
Next Steps

Plan to add a summarization section, to highlight the Security protocols/methods can be used in each MPLS/GMPLS technologies: LDP, REVP-TE, Inter-Provider Connection, PW, PCE, MPLS L2/L3 VPNs, etc.
One of the comments was the doc is very long, a table can provide a quick check list of best practice in MPLS/GMPLS
Looking for more feedbacks from MPLS and CCAMP WG meetings, mailing lists, etc.
Looking for feedback from Security directory.
Working with authors of some new draft of new improvement in specific area to co-ordinate the efforts
Prepare for last call after one of more revisions.


PPT Version