HIP-based Virtual Private LAN Service (HIPLS)
draft-henderson-hip-vpls-08

 
Document Type Expired Internet-Draft (individual)
Last updated 2015-05-16 (latest revision 2014-11-12)
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html
Stream Stream state (No stream defined)
Document shepherd No shepherd assigned
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-henderson-hip-vpls-08.txt

Abstract

The Host Identity Protocol (HIP) and architecture adds a cryptographic name space to name Internet hosts. This draft describes a use case of the HIP architecture, which is to provide a HIP-enabled virtual private LAN service (VPLS) over an untrusted network. In this case, HIP is used to secure tunnels between the provider edge (PE) equipment.

Authors

Thomas Henderson (tomhend@u.washington.edu)
Steven Venema (steven.c.venema@boeing.com)
David Mattes (d.mattes@temperednetworks.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)