Network Working Group L. Dunbar Internet Draft A. Malis Intended status: InformationalHuaweiFuturewei Expires:September 25,December 19, 2019 C. Jacquenet OrangeMarch 25,June 19, 2019 Gap Analysis ofInterconnecting Underlay withDynamic Networks to Hybrid CloudOverlay draft-ietf-rtgwg-net2cloud-gap-analysis-01DCs draft-ietf-rtgwg-net2cloud-gap-analysis-02 Abstract This document analyzes the technological gaps when using SD-WAN to dynamically interconnect workloads& appsand applications hosted in rd variouslocations, especially3 party cloud datacenters when the network service providers do not have or have limited physical infrastructure to reach the locations [Net2Cloud-problem].centers. Status of this Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html This Internet-Draft will expire onSeptember 25,December 19, 2019. Copyright Notice Copyright (c) 2019 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction...................................................2 2. Conventions used in this document..............................3 3. Gap Analysis of C-PEs WANPorts Registration...................4Port Registration....................4 4.Gap Analysis in aggregatingAggregating VPN paths and Internetpaths.......5paths.......................5 4.1.Gap analysisKey Control Plane Components of SD-WAN....................6 4.2. Using BGPfor SD-WAN......................6 4.2. Gaps in preventingTunnel-Encap....................................7 4.3. SECURE-L3VPN/EVPN.........................................9 4.4. Preventing attacks from Internet-facingports.....9ports............10 5.Gap analysis ofCPEs not directly connected to VPNPEs........10PEs........................10 5.1.Gap Analysis ofFloating PEs to connect to RemoteCPEs...12CPEs...................13 5.2. NATTraversal............................................12Traversal............................................13 5.3.ComplicationComplexity of using BGP between PEs and remote CPEs viaInternet......................................................12Internet......................................................13 5.4. Designated Forwarder to the remoteedges.................13edges.................14 5.5. Traffic PathManagement..................................14Management..................................15 6. ManageabilityConsiderations..................................14Considerations..................................15 7. SecurityConsiderations.......................................14Considerations.......................................15 8. IANAConsiderations...........................................15Considerations...........................................16 9.References....................................................15References....................................................16 9.1. NormativeReferences.....................................15References.....................................16 9.2. InformativeReferences...................................15References...................................16 10.Acknowledgments..............................................16Acknowledgments..............................................17 1. Introduction [Net2Cloud-Problem] describes the problems that enterprises face today in transitioning their IT infrastructure to support digital economy, such as connecting enterprises' branch offices to dynamic workloads in different Cloud DCs. This document analyzes the technological gaps to interconnect dynamic workloads & apps hosted invarious locations and in Cloud DCscloud data centers that the enterprise's VPN service provider may not own/operate or may be unable to provide the enterprise with the required connectivity to accessthesesuch locations. Whenenterprise'VPN service providers have insufficient bandwidth to reach a location, SD-WAN techniques can be used to aggregate bandwidth of multiple networks, such as MPLSVPNs,VPNs or the PublicInternet,Internet to achieve betterperformance and visibility.performance. This document primarily focuses on the technological gapsof SD-WAN.raised by using SD-WAN techniques to connect enterprise premises to cloud data centers operated by third parties. Foreasethe sake ofdescription,readability, a SD-WAN edge, a SD-WANend-point,endpoint, C-PE, or CPE are used interchangeably throughout this document. However, each term has some minor emphasis, especially when used in other related documents: . SD-WAN Edge: could include multiple devices (virtual or physical); . SD-WAN endpoint: to refer to a WAN port of SD-WAN devices or a single SD-WAN device; . C-PE: more for provider owned SD-WAN edge, e.g. for SECURE- EVPN's PE based VPN, when PE is the edge node of SD-WAN; . CPE: more for enterprise owned SD-WAN edge. 2. Conventions used in this document Cloud DC: Third party Data Centers that usually host applications and workload owned by different organizations or tenants. Controller: Used interchangeably with SD-WAN controller to manage SD-WAN overlay path creation/deletion and monitor the path conditions between sites. CPE-Based VPN: Virtual Private Network designed and deployed from CPEs. This is to differentiate from most commonly used PE-based VPNs a la RFC 4364. OnPrem: On Premises data centers and branch offices SD-WAN: Software Defined Wide Area Network,"SDWAN""SD-WAN" refers to the solutions of pooling WAN bandwidth from multiple underlay networks to get better WAN bandwidth management, visibility & control. When the underlay is a private network, trafficcan traversemay be forwarded without any additional encryption; when the underlay networks are public, such as the Internet, some traffic needs to be encrypted whentraversingpassing through (depending onuser-provideduser- provided policies). 3. Gap Analysis of C-PEs WANPortsPort RegistrationThe SD-WAN WG stemmed out from ONUG (Open Network User Group) in 2014 and was the placeholder to define SD-WAN as a means to aggregate multiple underlay networks between any two points.SD-WAN technology has emerged asan on-demand technologymeans to dynamically and securely interconnect the OnPrem branches with the workloads instantiated in Cloud DCs that do notconnecthave direct connectivity to BGP/MPLS VPN PEs or have very limited bandwidth. Some SD-WAN networks use the NHRP protocol [RFC2332] to register WAN ports of SD-WAN edges with a "Controller" (or NHRP server), which then has the ability to map a private VPN address to a public IP address of the destination node. DSVPN [DSVPN] or DMVPN [DMVPN] are used to establish tunnels between WAN ports of SD-WAN edge nodes. NHRP was originally intended for ATM address resolution, and as a result, it misses many attributes that are necessary for dynamic endpoint C-PE registration to the controller, such as: - Interworking with the MPLS VPN control plane. A SD-WAN edge can have some ports facing the MPLS VPN network over which packets can besent nativelyforwarded without any encryption and some ports facing the public Internet over which sensitive traffic needs to be encrypted before being sent. -Scalability.Scalability: NHRP/DSVPN/DMVPN works fine with small numbers of edge nodes. When a network has more than 100 nodes,the protocol doesthese protocols do notworkscale well. - NHRP does not have the IPsec attributes, which are needed for peers to build Security Associations over the public internet. - NHRP messages do not have any field to encode the C-PE supported encapsulation types, such as IPsec-GRE orIPsec-VxLAN,.IPsec-VxLAN. - NHRP messages do not have any field to encode C-PE Location identifiers, such as Site Identifier, System ID, and/or Port ID. - NHRP messages do not have any field to describe the gateway(s) to which the C-PE is attached. When a C-PE is instantiated in a Cloud DC,to establish connection to the C-PE,it isnecessary to know the Cloud DC operator's Gatewaydesirable for C-PE's owner towhichbe informed of how/where theCPEC-PE is attached. - NHRP messages do not have any field to describe C-PE's NAT properties if the C-PE is using private addresses, such as the NAT type, Private address, Public address, Private port, Public port, etc. [BGP-SDWAN-PORT] describes howto use BGP forSD-WAN edge nodes use BGP to register their WAN ports properties to the SD-WAN controller, which thendisseminatespropagates the information to other SD-WAN edge nodes that are authenticatedbefore the SD-WAN controllerandthe other SD-WAN edge nodes canauthorized to communicate with them. 4.Gap Analysis in aggregatingAggregating VPN paths and Internet paths Most likely, enterprises (especially the largest ones) already have their CPEs interconnected by providers' VPNs, based upon VPN techniques such as EVPN, L2VPN, or L3VPN. The VPN can be PE-based or CPE-based. The commonly used PE-based VPNs have CPE directly attached to PEs, therefore the communication between CPEs&and PEs is considered as secure. MP-BGP is used to learn & distribute routes among CPEs, even though sometimes routes among CPEs are staticallyconfigured.configured on the CPEs. To aggregate paths over the Internet and paths over the VPN, the C- PEs need to have some WAN ports connected to the PEs of the VPNs and other WAN ports connected to the Internet. It is necessary for the CPEs to use a protocol so that they can register the WAN port properties with their SD-WAN Controller(s): this information conditions the establishment and the maintenance of IPsec SA associations among relevant C-PEs.IfWhen using NHRP for registration purposes, C-PEs need toparticipate inrun two separate control planes: EVPN&BGP for CPE-basedVPNsVPNs, and NHRP & DSVPN/DMVPN for ports connected to the Internet. Two separate control planes not only add complexity to C-PEs, but also increase operational cost. +---+ +--------------|RR |----------+ / Untrusted +-+-+ \ / \ / \ +----+ +---------+ packets encrypted over +------+ +----+ | TN3|--| A1-----+ Untrusted +------ B1 |--| TN1| +----+ | C-PE A2-\ | C-PE | +----+ +----+ | A A3--+--+ +---+---B2 B | +----+ | TN2|--| | |PE+--------------+PE |---B3 |--| TN3| +----+ +---------+ +--+ trusted +---+ +------+ +----+ | WAN | +----+ +---------+ +--+ packets +---+ +------+ +----+ | TN1|--| C1--|PE| go natively |PE |-- D1 |--| TN1| +----+ | C-PE C2--+--+ without encry+---+ | C-PE | +----+ | C | +--------------+ | D | | | | | +----+ | C3--| without encrypt over | | +----+ | TN2|--| C4--+---- Untrusted --+------D2 |--| TN2| +----+ +---------+ +------+ +----+ Figure 1: CPEs interconnected by VPN paths and Internet Paths 4.1.Gap analysisKey Control Plane Components ofUsing BGP forSD-WANThis section analyzes the gaps of using BGP to control SD-WAN.As described in [BGP-SDWAN-Usage], the SD-WAN Overlay Control Plane has three distinctaspects:properties: - SD-WAN node's WANPortsPort Property registration to the SD-WAN Controller. oIt is toTo inform the SD-WAN controller andpotentialauthorized peers of the WANports propertyport properties of the C-PE [SDWAN-Port]. When the WAN ports areusingassigned private addresses, this step can register the type of NAT thattranslatetranslates private addresses into public ones. - ControllerFacilitatedfacilitated IPsec SA management and NAT information distribution o It is for SD-WAN controller to facilitate or manage the IPsec configuration and peer authentication for all IPsec tunnels terminated at theSDWANSD-WAN nodes. - Establishing and Managing the topology and reachability for services attached to the client ports of SD-WAN nodes. o This is for the overlay layer's route distribution, so that a C-PE can populate its overlay routing table with entries that identify the next hop for reaching a specific route/service attached to remote nodes. [SECURE-EVPN] describes EVPN and other options. 4.2. Using BGP Tunnel-Encap RFC5512 and [Tunnel-Encap] describe methodsfor endpointsto construct BGP UPDATE messages that advertise endpoints' tunnelinformationencapsulation capability andtrigger tunnel establishment.the respective attached client routes, so that the peers that receive of the BGP UPDATE can establish appropriate tunnels with the endpoints for the aforementioined routes. RFC5512& [Tunnel-Encap] useuses the Endpoint AddressthatsubTLV, whereas [Tunnel-Encap] uses Remote Endpoint Address subTLV to indicates address of the tunnel endpoint which can be an IPv4 or an IPv6address, and theaddress. There are Tunnel Encapsulation attribute subTLVs to indicatedifferentthe supported encapsulationformats,types, such as L2TPv3, GRE, VxLAN, IP-in-IP, etc.There are sub-TLVs to describe the detailed tunnel information for each of the encapsulation types.[Tunnel-Encap] removed SAFI =7 (which was specified by RFC5512) for distributing encapsulation tunnel information. [Tunnel-Encap] requires that tunnels need to be associated with routes. There is also the Color sub-TLV to describe customer-specified information about the tunnels (which can be creatively used for SD- WAN). Here are some of the gaps using [Tunnel-Encap] to controlSD-WAN: - Lacking C-PE WAN Port Property Registration functionality - Lacking IPsec Tunnel typeSD-WAN Tunnels: - [Tunnel-Encap]has Remote Address SubTLV, but does notdoesn't haveany field to indicatetheTunnel originating interface, as defined in RFC5512.functionality that would help the C-PE to register its WAN Port properties. -The mechanisms described by [Tunnel-Encap] cannot be effectively used forA SD-WANoverlay network becausetunnel, e.g. IPsec-based, requires aSD-WAN Tunnel can be establishednegotiation betweenInternet-facing WAN ports of two C-Pes. Thisthe tunnel's end points for supported encryption algorithms and tunnelneeds to be establishedtypes beforedata arrival becauseit can be properly established, whereas [Tunnel-Encap] only allow the announcement of one endpoint's supported encapsulation capabilities for specific attached routes and no negotiation between tunnel end points is needed. The establishment of a SD-WAN tunnel can fail, e.g., in case the twoend-pointsendpoints support different encryption algorithms.- Client traffic can eitherThat is why a SD-WAN tunnel needs to beforwarded through the MPLS network natively without any encryption for better performance, or throughestablished and maintained independently from advertising client routes attached to theInternet-facing ports with IPsec encryption.edge node. - [Tunnel-Encap] requires all tunnels updates are associated with routes. There can be many client routes associated with the SD-WAN IPsec tunnel between twoC-PE's Internet-facingC-PEs' WANports, butports; the corresponding destination prefixes (as announced by the aforementioned routes)canmay also be reachedoverthrough the VPN underlaynativelywithout any encryption. A more realistic approach to separateIPsec SASD-WAN tunnel management from client routes association withIPsec.the SD-WAN tunnels. - When SD-WAN tunnel and clients routes are separate, the SD-WAN Tunnel establishment may not have routes associated. There is a suggestion on using a "Fake Route" for a SD-WAN node to use [Tunnel-Encap] to advertise its SD-WAN tunnel end-points properties. However, using "Fake Route" can raise some design complexity for large SD-WAN networks with many tunnels. For example, for a SD-WAN network with hundreds of nodes, with each node having many ports & manyend-pointsendpoints to establish SD-WAN tunnels with their corresponding peers, the node would need as many "fake addresses". For large SD-WAN networks (such as those comprised of more than 10000 nodes), each node might need 10's thousands of "fake addresses", which is very difficult to manage andneedsrequires lots of configuration tasks to get the nodesprovisioned.properly set up. -Does[Tunnel-Encap] does not have any field to carry detailed information about the remote C-PE, such as Site-ID, System-ID, Port-ID - [Tunnel-Encap] Does not have any field toexpresscarry IPsec attributes for the SD-WAN edge nodes to establish IPsec Security Associations with others.- DoesIt does not have any proper way for two peer CPEs to negotiate IPseckeys,keys either, based on the configuration sent by the Controller. -Does[Tunnel-Encap] does not have any field to indicate the UDP NAT private address <-> public address mapping - C-PEs tend to communicate with a subset of the other C-PEs, not all the C-PEs need toformbe connected through a meshconnections.topology. Without any BGP extension, many nodes can get dumped with too much information coming from other nodes that they never need to communicate with. 4.3. SECURE-L3VPN/EVPN [SECURE-L3VPN] describes how to extend theRFC4364BGP/MPLS VPN [RFC4364] capabilities to allow some PEs to connect to other PEs via public networks. [SECURE-L3VPN] introduces the concept of Red Interface & Black Interfaceon thoseused by PEs, where the RED interfaces are used to forward traffic into the VPN, and the Black Interfaces are used between WAN portsoverthrough which only IPsec-protected packets are forwarded to the Internet or to other backbone networkare sentthereby eliminating the need for MPLS transport in the backbone. [SECURE-L3VPN] assumes PEsterminate MPLS packets, and useusing MPLS over IPsec when sending traffic through the Black Interfaces. [SECURE-EVPN] describes a solution where point-to-multipoint BGP signaling is used in the control plane for SDWAN Scenario #1. It relies upon a BGP cluster design to facilitate the key and policy exchange among PE devices to create private pair-wise IPsec Security Associations without IKEv2 point-to-point signaling or any other direct peer-to-peer session establishment messages. Both [SECURE-L3VPN] and [SECURE-EVPN] are useful, however, they both miss the aspects of aggregating VPN and Internet underlays. In summary: - These documents do not address the scenario of C-PE having some ports facing VPN PEs and other ports facing the Internet. --The [SECURE-L3VPN] assumes that a CPE "registers" with the RR. However, it does not say how. It assumes that the remote CPEs are pre-configured with the IPsec SA manually. In SD-WAN, Zero Touch Provisioning is expected. Manual configuration is not an option,given the dimensioning figures but alsoas it contradicts thepurposeobjectives of SD-WAN to automate configuration tasks. - For RR communication withCPEs,C-PEs, this draft only mentions IPsec. Missing TLS/DTLS. - The draft assumes thatCPEsC-PEs and RR are connected with an IPsec tunnel. With zero touch provisioning, we need an automatic way to synchronize the IPsec SAs betweenCPEC-PEs and RR. The draft assumes: A CPE must also be provisioned with whatever additional information is needed in order to set up an IPsec SA with each of the red RRs - IPsec requires periodic refreshment of the keys. The draft does not provide any information about how to synchronize the refreshment among multiple nodes. - IPsec usually sends configuration parameters to two endpoints only and lets these endpoints negotiate the key. Let us assume that the RR is responsible for creating the key for all endpoints: When one endpoint is compromised, all other connections will be impacted.4.2. Gaps in preventing4.4. Preventing attacks from Internet-facing ports When C-PEs have Internet-facing ports, additional security risks are raised. To mitigate security risks, in addition to requiring Anti-DDoS features on C-PEs, it is necessary for CPEs to support means to determine whether traffic sent by remote peers is legitimate to prevent spoofing attacks. 5.Gap analysis ofCPEs not directly connected to VPN PEs Because of the ephemeral property of the selected Cloud DCs, an enterprise or its network service provider may not have direct connections to the Cloud DCs that are used for hosting the enterprise's specific workloads/Apps. Under those circumstances, SD- WAN is a very flexible choice to interconnect the enterprise on- premises data centers & branch offices to its desired Cloud DCs. However, SD-WAN paths established over the public Internet can have unpredictable performance, especially over long distances and across operators' domains. Therefore, it is highly desirable toplacesteer as much as possible the portion of SD-WAN paths over service provider VPN (e.g., enterprise's existing VPN) that have guaranteed SLA to minimize thedistance/segmentsdistance or the number of segments over the public Internet. MEF Cloud Service Architecture [MEF-Cloud] also describes a use case of network operators thatuseuses SD-WAN over LTE or the public Internet for last mile access where the VPN service providers cannot necessarily provide the required physical infrastructure. Under those scenarios, one or two of the SD-WAN endpoints may not be directly attached to the PEs of a VPN Domain. When using SD-WAN to connect the enterprise's existing sites with the workloads hosted in CloudDC,DCs, the corresponding CPEs have to be upgraded to support SD-WAN. If the workloads hosted in Cloud DCs need to be connected to many sites, the upgrade process can be very expensive. [Net2Cloud-Problem] describes a hybrid network approach that integrates SD-WAN with traditional MPLS-based VPNs, to extend the existing MPLS-based VPNs to the Cloud DC Workloads over the access paths that are not under the VPN provider's control. To make it work properly, a small number of the PEs of the MPLS VPN can be designated to connect to the remote workloads via SD-WAN secure IPsec tunnels. Those designated PEs are shown as fPE (floating PE or smart PE) in Figure 3. Once the secure IPsec tunnels are established, the workloads hosted in CloudDCDCs can be reached by the enterprise's VPN without upgrading all of the enterprise's existing CPEs. The only CPE that needs to support SD-WAN would be a virtualized CPE instantiated within the cloud DC. +--------+ +--------+ | Host-a +--+ +----| Host-b | | | | (') | | +--------+ | +-----------+ ( ) +--------+ | +-+--+ ++-+ ++-+ +--+-+ (_) | | CPE|--|PE| |PE+--+ CPE| | +--| | | | | | | |---+ +-+--+ ++-+ ++-+ +----+ / | | / | MPLS +-+---+ +--+-++--------+ +------+-+ | Network |fPE-1| |CPE || Host | | Host | | | |- --| || d | | c | +-----+ +-+---+ +--+-++--------+ +--------+ |fPE-2|-----+ +---+-+ (|) (|) (|) SD-WAN (|) (|) over any access +=\======+=========+ // \ | Cloud DC \\ // \ ++-----+ \\ +Remote| | CPE | +-+----+ ----+-------+-------+----- | | +---+----+ +---+----+ | Remote | | Remote | | App-1 | | App-2 | +--------+ +--------+ Figure 3: VPN Extension to Cloud DC In Figure 3, the optimal Cloud DC to host the workloads(due to(as a function of the proximity, capacity, pricing, or other criteria chosen by the enterprises) does not have a direct connection to the PEs of the MPLS VPN that interconnects the enterprise's existing sites. 5.1.Gap Analysis ofFloating PEs to connect to Remote CPEs To extend MPLS VPNs to remote CPEs, it is necessary to establish secure tunnels (such as IPsec tunnels) between the Floating PEs and the remote CPEs.Gap:Even though a set of PEs can be manually selected to act as the floating PEs for a specific cloud data center, there are no standard protocols for those PEs to interact with the remote CPEs (most likely virtualized) instantiated in the third party cloud data centers (such as exchanging performance or route information). When there is more than one fPE available for use (as there should be for resiliency purposes or the ability to support multiple cloud DCs geographically scattered), it is not straightforward to designate an egress fPE to remote CPEs based on applications. There is too much applications' traffic traversing PEs, and it is not feasible for PEs to recognize applications from the payload of packets. 5.2. NAT TraversalMost cloudCloud DCs that only assign private IPv4 addresses to the instantiatedworkloads. Therefore,workloads assume that traffic to/from the workload usually needs to traverse NATs. A SD-WAN edge node can solicit a STUN (Session Traversal of UDP Through Network Address Translation RFC 3489) Server to get the NAT property, the public IP address and the Public Port number so that such information can be communicated topass tothe relevant peers. 5.3.ComplicationComplexity of using BGP between PEs and remote CPEs via Internet Even though an EBGP (external BGP) Multi-hop design can be used to connect peers that are not directly connected to each other, there are still somecomplications/gapscomplications in extending BGP from MPLS VPN PEs to remote CPEs via any accesspathspath (e.g., Internet). The path between the remote CPEs and VPNPE canPEs that maintain VPN routes may very well traverse untrusted nodes. EBGP Multi-hop design requires static configuration on both peers. To use EBGP between a PE and remote CPEs, the PE has to be manually configured with the "next-hop" set to the IP address of the CPEs. When remote CPEs, especially remote virtualized CPEs are dynamically instantiated or removed, the configuration of Multi-Hop EBGP on the PE has to be changed accordingly.Gap:Egress peering engineering (EPE) is notenough.sufficient. Running BGP on virtualized CPEs in CloudDCDCs requires GRE tunnelsbeingto be established first, whichin turnrequires the remote CPEs to support address and key managementfor the remote CPEs.capabilities. RFC 7024 (Virtual Hub & Spoke) and Hierarchical VPNisdo notenough. Alsosupport the required properties. Also, there is a need for a mechanism to automatically trigger configuration changes on PEs when remote CPEs' are instantiated or moved (leading to an IP address change) or deleted. EBGP Multi-hop design does not include a security mechanism by default. The PE and remote CPEs need secure communication channels when connecting via the public Internet. Remote CPEs, if instantiated in Cloud DCs, might have to traverse NATs to reachPE.PEs. It is not clear how BGP can be used between devicesoutsidelocated beyond the NAT and theentitiesdevices located behind the NAT. It is not clear how to configure the Next Hop on the PEs to reach private IPv4 addresses. 5.4. Designated Forwarder to the remote edges Among the multiple floating PEs that areavailable forreachable from a remote CPE, multicast traffic sent by the remote CPE towards the MPLS VPN can be forwarded back to the remote CPE due to the PE receiving the multicastdata framepackets forwarding the multicast/broadcast frame to other PEs that in turn send to all attached CPEs. This process may cause traffic loops. Therefore, it is necessary to designate one floating PE as the CPE's Designated Forwarder, similar to TRILL's Appointed Forwarders [RFC6325].Gap: theMPLSVPN doesVPNs do not have features like TRILL's Appointed Forwarders. 5.5. Traffic Path Management When there are multiple floating PEs that have established IPsec tunnels with the remote CPE, the remote CPE can forward outbound traffic to the Designated Forwarder PE, which in turn forwards traffic to egress PEs and then to the final destinations. However, it is not straightforward for the egress PE to send back the return traffic to the Designated Forwarder PE. Example of Return Path management using Figure 3 above. - fPE-1 is DF for communication between App-1 <-> Host-a due to latency, pricing or other criteria. - fPE-2 is DF for communication between App-1 <-> Host-b. 6. Manageability Considerations Zero touch provisioning of SD-WAN edge nodesis expected inshould be a major feature of SD-WANdeployment.deployments. It is necessary for a newly powered up SD-WAN edge node to establish a secure connection (by means of TLS, DTLS, etc.) with its controller. 7. Security Considerations The intention of this draft is to identify the gaps in current and proposed SD-WAN approaches that can address requirements identified in [Net2Cloud-problem]. Several of these approaches have gaps in meeting enterprise security requirements when tunneling their traffic over the Internet, since this is the purpose of SD-WAN. See the individual sections above for further discussion of these security gaps. 8. IANA Considerations This document requires no IANA actions. RFC Editor: Please remove this section before publication. 9. References 9.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. 9.2. Informative References [RFC8192] S. Hares, et al, "Interface to Network Security Functions (I2NSF) Problem Statement and Use Cases", July 2017 [RFC5521] P. Mohapatra, E. Rosen, "The BGP Encapsulation Subsequent Address Family Identifier (SAFI) and the BGP Tunnel Encapsulation Attribute", April 2009. [BGP-SDWAN-PORT]L. Dunbar, et al, "Subsequent Address Family Indicator for SDWAN Ports", draft-dunbar-idr-sdwan-port- safi-00, Work-in-progress, March 2019. [BGP-SDWAN-Usage] L. Dunbar, et al, "Framework of Using BGP for SDWAN Overlay Networks", draft-dunbar-idr-sdwan-framework- 00, work-in-progress, Feb 2019. [Tunnel-Encap]E. Rosen, et al, "The BGP Tunnel Encapsulation Attribute", draft-ietf-idr-tunnel-encaps-10, July 2018. [SECURE-EVPN A. Sajassi, et al, draft-sajassi-bess-secure-evpn-01, work in progress, March 2019. [SECURE-L3VPN] E. Rosen, "Provide Secure Layer L3VPNs over Public Infrastructure", draft-rosen-bess-secure-l3vpn-00, work- in-progress, July 2018 [DMVPN] Dynamic Multi-point VPN: https://www.cisco.com/c/en/us/products/security/dynamic- multipoint-vpn-dmvpn/index.html [DSVPN] Dynamic Smart VPN: http://forum.huawei.com/enterprise/en/thread-390771-1- 1.html [ITU-T-X1036] ITU-T Recommendation X.1036, "Framework for creation, storage, distribution and enforcement of policies for network security", Nov 2007. [Net2Cloud-Problem] L. Dunbar and A. Malis, "Seamless Interconnect Underlay to Cloud Overlay Problem Statement", draft-dm- net2cloud-problem-statement-02, June 2018 10. Acknowledgments Acknowledgements to xxx for his review and contributions. This document was prepared using 2-Word-v2.0.template.dot. Authors' Addresses Linda DunbarHuaweiFuturewei Email:Linda.Dunbar@huawei.comldunbar@futurewei.com Andrew G. MalisHuaweiFuturewei Email: agmalis@gmail.com Christian Jacquenet Orange Rennes, 35000 France Email: Christian.jacquenet@orange.com