Skip to main content

BGP UPDATE for SD-WAN Edge Discovery
draft-ietf-idr-sdwan-edge-discovery-27

Document Type Active Internet-Draft (idr WG)
Authors Linda Dunbar , Susan Hares , Kausik Majumdar , Robert Raszuk , Venkit Kasiviswanathan
Last updated 2026-04-08
Replaces draft-dunbar-idr-sdwan-edge-discovery
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Reviews
Additional resources Mailing list discussion
Stream WG state WG Consensus: Waiting for Write-Up
Document shepherd Keyur Patel
Shepherd write-up Show Last changed 2023-09-08
IESG IESG state I-D Exists
Consensus boilerplate Yes
Telechat date (None)
Responsible AD (None)
Send notices to keyur@arrcus.com
draft-ietf-idr-sdwan-edge-discovery-27
Network Working Group                                          L. Dunbar
Internet-Draft                                                 Futurewei
Intended status: Standards Track                                S. Hares
Expires: 10 October 2026                                          Huawei
                                                             K. Majumdar
                                                                  Oracle
                                                               R. Raszuk
                                                                  Arrcus
                                                      V. Kasiviswanathan
                                                                  Arista
                                                            8 April 2026

                  BGP UPDATE for SD-WAN Edge Discovery
                 draft-ietf-idr-sdwan-edge-discovery-27

Abstract

   The document describes the BGP mechanisms for SD-WAN (Software
   Defined Wide Area Network) edge node attribute discovery.  These
   mechanisms include a new tunnel type and sub-TLVs for the BGP Tunnel-
   Encapsulation Attribute (RFC9012) and set of NLRI (network layer
   reachability information) for SD-WAN underlay information.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119] [RFC8174]
   when, and only when, they appear in all capitals, as shown here.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 10 October 2026.

Dunbar, et al.           Expires 10 October 2026                [Page 1]
Internet-Draft            SD-WAN Edge Discovery               April 2026

Copyright Notice

   Copyright (c) 2026 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
     1.1.  Secure L3VPN Services over SD-WAN . . . . . . . . . . . .   4
     1.2.  SD-WAN Secure Links . . . . . . . . . . . . . . . . . . .   5
     1.3.  Conventions used in this document . . . . . . . . . . . .   5
   2.  BGP SD-WAN Mechanisms . . . . . . . . . . . . . . . . . . . .   6
     2.1.  SD-WAN Hybrid Tunnel TLV Encoding . . . . . . . . . . . .   7
       2.1.1.  Summary of Validation Procedure . . . . . . . . . . .   9
       2.1.2.  Processing Considerations for SD-Wan Hybrid Tunnel
               Encoding  . . . . . . . . . . . . . . . . . . . . . .   9
     2.2.  SD-WAN Underlay UPDATE  . . . . . . . . . . . . . . . . .  10
       2.2.1.  The NLRI for SD-WAN Underlay Tunnel Update  . . . . .  10
       2.2.2.  Validation of SD-WAN NLRI . . . . . . . . . . . . . .  12
       2.2.3.  BGP Path Attributes attached to SD-WAN NLRI . . . . .  12
     2.3.  IPsec SA Property Sub-TLVs  . . . . . . . . . . . . . . .  13
       2.3.1.  IPsec SA ID Sub-TLV . . . . . . . . . . . . . . . . .  13
       2.3.2.  IPsec SA Rekey Counter Sub-TLV  . . . . . . . . . . .  14
       2.3.3.  IPsec Public Key Sub-TLV  . . . . . . . . . . . . . .  16
       2.3.4.  IPsec SA Proposal Sub-TLV . . . . . . . . . . . . . .  17
       2.3.5.  Simplified IPsec SA Sub-TLV . . . . . . . . . . . . .  19
       2.3.6.  Extended Port Attribute Sub-TLV . . . . . . . . . . .  22
     2.4.  Procedure for Client Routes with SD-WAN Hybrid Tunnel . .  27
       2.4.1.  SD-WAN Hybrid Tunnel Type in Encapsulation Extended
               Community . . . . . . . . . . . . . . . . . . . . . .  28
       2.4.2.  SD-WAN Hybrid Type in Tunnel Attributes via Tunnel
               Encapsulation Attribute . . . . . . . . . . . . . . .  29
       2.4.3.  Client Routes Carried Over Multiple SD-WAN Hybrid
               Tunnels . . . . . . . . . . . . . . . . . . . . . . .  30
       2.4.4.  SD-WAN VPN ID in Control Plane  . . . . . . . . . . .  30
       2.4.5.  SD-WAN VPN ID in Data Plane . . . . . . . . . . . . .  31
     2.5.  Procedure for Underlay Routes with SD-WAN Hybrid Tunnel
           TLV . . . . . . . . . . . . . . . . . . . . . . . . . . .  31

Dunbar, et al.           Expires 10 October 2026                [Page 2]
Internet-Draft            SD-WAN Edge Discovery               April 2026

       2.5.1.  SD-WAN Hybrid NLRI without Encapsulation Extended
               Community . . . . . . . . . . . . . . . . . . . . . .  31
       2.5.2.  Underlay Route with a Tunnel Encapsulation
               Attribute . . . . . . . . . . . . . . . . . . . . . .  31
       2.5.3.  Underlay Routes with Port-Local-ID of Zero  . . . . .  32
       2.5.4.  Multiple Tunnels attached to One Underlay Route . . .  33
     2.6.  Error handling  . . . . . . . . . . . . . . . . . . . . .  33
       2.6.1.  Error handling for the Tunnel Encapsulation
               Signaling . . . . . . . . . . . . . . . . . . . . . .  33
       2.6.2.  Error Handling for NLRI . . . . . . . . . . . . . . .  34
       2.6.3.  SD-WAN NLRI and Tunnel Encapsulation Attribute  . . .  34
   3.  Operational Consistency and Tunnel Validation . . . . . . . .  35
     3.1.  Detecting Misaligned Tunnels  . . . . . . . . . . . . . .  35
     3.2.  IPsec Attributes Mismatch . . . . . . . . . . . . . . . .  35
       3.2.1.  Example creation of IPsec SA over SD-WAN Hybrid
               Tunnel  . . . . . . . . . . . . . . . . . . . . . . .  36
   4.  Manageability Considerations  . . . . . . . . . . . . . . . .  38
   5.  Security Considerations . . . . . . . . . . . . . . . . . . .  38
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  39
     6.1.  SD-WAN Overlay SAFI . . . . . . . . . . . . . . . . . . .  40
     6.2.  Tunnel Encapsulation Attribute Tunnel Type  . . . . . . .  40
     6.3.  Tunnel Encapsulation Attribute Sub-TLV Types  . . . . . .  40
     6.4.  SD-WAN Edge Discovery NLRI Route Types  . . . . . . . . .  40
     6.5.  SD-WAN Extended Port Encapsulation Types  . . . . . . . .  41
     6.6.  SD-WAN Extended Port Connection Types . . . . . . . . . .  41
     6.7.  SD-WAN Extended Port Physical Port Types  . . . . . . . .  41
   7.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  41
     7.1.  Normative References  . . . . . . . . . . . . . . . . . .  41
     7.2.  Informative References  . . . . . . . . . . . . . . . . .  43
   Appendix A.  Acknowledgments  . . . . . . . . . . . . . . . . . .  45
   Contributors  . . . . . . . . . . . . . . . . . . . . . . . . . .  45
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  45

1.  Introduction

   This document describes the BGP [RFC4271] signaling extensions that
   enable SD-WAN edge nodes to advertise client route reachability,
   underlay tunnel properties, and security related attributes required
   to establish and maintain SD-WAN overlay tunnels.  The SD-WAN Hybrid
   Tunnel forms a logical overlay between edge nodes across
   heterogeneous underlay networks (e.g., MPLS VPNs, direct Layer 2
   links, or public Internet).

   The mechanisms defined in this document apply to both:

      1) SD-WAN Secure L3VPN deployments, where L3VPN services are
      delivered over SD-WAN Hybrid tunnels, and

Dunbar, et al.           Expires 10 October 2026                [Page 3]
Internet-Draft            SD-WAN Edge Discovery               April 2026

      2) SD-WAN Secure Links deployments, where encrypted logical links
      are formed between SD-WAN edge nodes without using L3VPN address
      families.

   BGP [RFC4271] serves as the control plane for these SD-WAN
   deployments.  For SD-WAN implementations using BGP, the RR SHOULD
   establish a secure transport connection with each SD-WAN edge
   operating under the same BGP control plane instance.  This secure
   transport SHOULD support authentication and integrity, but MAY also
   support confidentiality.

   SD-WAN deployments SHOULD use TCP-AO [RFC5925] to provide
   authentication and integrity between the RR and each BGP Peer.  Other
   mechanisms that can provide authentiation, integrity, and
   confidentiality are in the process of being defined by the IETF.
   Examples of these mechanisms are: BGP over QUIC [draft-retana-idr-
   bgp-quic], BGP over TLS/TCP [draft-wirtgen-bgp-tls], or Securing
   BGPv4 using IPsec [draft-ward-bgp-ipsec].  SD-WAN deployments MAY use
   mechanisms that support authentication, integrity, and
   confidentiality.

   This document defines a new SD-WAN Hybrid Tunnel type and associated
   sub-TLVs for the BGP Tunnel Encapsulation Attribute [RFC9012], as
   well as new NLRIs for advertising SD-WAN underlay information.  These
   extensions enable SD-WAN edge nodes to exchange the information
   necessary to establish and update secure SD-WAN overlay tunnels, as
   described in [Net2Cloud].

   In the context of this document, BGP Route Reflector (RR) is the
   component of the SD-WAN Controller system that receives the BGP
   UPDATE from SD-WAN edges and in turn propagates the information to
   the intended peers that are authorized to communicate via the SD-WAN
   overlay network.

1.1.  Secure L3VPN Services over SD-WAN

   An SD-WAN network defined in [MEF70.1] and [MEF70.2] refers to a
   policy-driven network over multiple heterogeneous underlay networks
   tailored to get better WAN bandwidth management, visibility, and
   control.  In many deployments, L3VPN services are offered over SD-WAN
   overlays to provide site-to-site connectivity with traffic
   segmentation, security, and performance guarantees.  These L3VPN
   services leverage SD-WAN Secure Links, i.e. encrypted data plane
   tunnels established between SD-WAN edge nodes using mechanisms such
   as IPsec, to carry user traffic between endpoints.

Dunbar, et al.           Expires 10 October 2026                [Page 4]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   This document describes the BGP mechanisms used to support such L3VPN
   deployments by enabling SD-WAN edge nodes to advertise underlay
   attributes, tunnel characteristics, and security association related
   attributes.  These mechanisms enable dynamic tunnel selection,
   service-level steering, and secure endpoint discovery.

   The SD-WAN usage model, including its deployment scenarios and BGP
   requirements, is detailed in [SD-WAN-BGP-USAGE] and not repeated
   here.  This document focuses solely on the signaling extensions and
   encapsulation mechanisms required to support those scenarios in BGP.

1.2.  SD-WAN Secure Links

   [RFC9012] defines a BGP mechanism that links routes to a specific
   tunnels using a specific encapsulation.  The SD-WAN Secure Links
   Topology uses a single hybrid logical link on a SD-WAN Peer to
   represent multiple underlay topology links.  The SD-WAN peer
   distributes IPsec security association (IPsec SA) [RFC4301] related
   information regarding the hybrid link or individual underlay links.

   The traffic is routed via normal IPv4/IPv6 forwarding without any VPN
   addition.  The SD-WAN Secure Links provides some link security for
   some simple cases of the three scenarios from [SD-WAN-BGP-USAGE] that
   do not require L3VPN addresses (Route Distinguisher (RD), prefix).

1.3.  Conventions used in this document

   The following terms are used as defined in other documents:

   [MEF 70.1] [MEF 70.2]:  SD-WAN (Software-Defined Wide Area Network)

   [RFC4301]:  IPsec SA (IPsec Security Association)

   [RFC4760]:  MP_REACH_NLRI

   [RFC9012]:  Tunnel Enapsulation Attribute

   [SD-WAN-Usage]:  C-PE, Controller, and SD-WAN Edge

   For clarity, in this document the application of [SD-WAN-Usage] terms
   to this draft are:

   C-PE (Customer Premises Equipment):  A specific type of SD-WAN Edge
      deployed at the customer's edge.  In this document, the terms C-PE
      and SD-WAN Edge are used interchangeably when referring to SD-WAN
      nodes that handle client route advertisement and secure tunnel
      establishment.

Dunbar, et al.           Expires 10 October 2026                [Page 5]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   Controller:  Refers to the SD-WAN Controller as defined in [SD-WAN-
      BGP-USAGE].

   SD-WAN Edge:  A network element that participates in the SD-WAN
      overlay as defined in [SD-WAN-BGP-USAGE].

   The following new terms are defined for this document:

   CPE-Based VPN:  Virtual Private Secure network formed among C-PEs.
      This is to differentiate such VPNs from most commonly used PE-
      based VPNs discussed in [RFC4364].

   CPN:  Customer Premises Network

   SD-WAN Hybrid Tunnel:  A single logical tunnel that combines several
      links of different encapsulation into a single tunnel.  This
      logical tunnel MAY exist as part of a SD-WAN Secure L3VPN or
      simply be a SD-WAN secure link for a flat network.

   Secure Transport Connection:  A transport layer security mechanism
      that provides authentication and integrity of routing updates over
      untrusted networks.

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 [RFC8174] when, and only when, they appear in all capitals, as
   shown here.

2.  BGP SD-WAN Mechanisms

   The BGP mechanisms defined in this document serve two functions:

   Advertise Client routes with SD-WAN Hybrid Tunnel:  A BGP speaker
      supporting SD-WAN re-advertises routes received from client
      routers with the Next_HOP address set to its own IP address (due
      to the SD-WAN feature configuration) and includes a BGP attribute
      indicating the SD-WAN Hybrid Tunnel.  Client routes MAY be
      advertised using the following AFI/SAFIs: Unicast IPv4/IPv6 (1/1,
      2/1) and L3VPN IPv4/IPv6 (1/128, 2/128).  The SD-WAN tunnel
      indication can be conveyed using either the Encapsulation Extended
      Community or the Tunnel Encapsulation Attribute.

   Advertise Underlay Routes (SD-WAN NLRIs) with SD-WAN Hybrid Tunnel
   Encapsulation Attribute:  A BGP speaker advertises SD-WAN NLRI for
      IPv4/IPv6 (AFI/SAFI 1/74 or 2/74) with the NEXT_HOP attribute set
      to the local address of the advertising speaker, and includes a
      BGP Tunnel Encapsulation Attribute with a SD-WAN Hybrid Tunnel

Dunbar, et al.           Expires 10 October 2026                [Page 6]
Internet-Draft            SD-WAN Edge Discovery               April 2026

      TLV.  The SD-WAN NLRI identifies the port (or ports) that an
      underlay tunnel (identified by SD-WAN Node ID) within the logical
      SD-WAN Hybrid Tunnel (identified by Tunnel Egress End point) for
      which the BGP speaker is advertising encapsulation or IPsec SA
      related information via the SD-WAN Hybrid Tunnel Encapsulation
      Attribute.  The SD-WAN Hybrid Tunnel Encapsulation Attribute
      contains IPsec SA and, optionally, NAT-related information.

   This section describes the SD-WAN Hybrid Tunnel, the SD-WAN NLRIs,
   the new sub-TLVs for SD-WAN Tunnel IPsec SA, sub-TLVs for Port
   attributes, the procedures for the client routes, the procedures for
   underlay routes, error handling, and considerations for managing SD-
   WAN technologies.

2.1.  SD-WAN Hybrid Tunnel TLV Encoding

   Name:  SD-WAN Hybrid Tunnel

   Code:  25 (IANA assigned)

   Description:  The SD-WAN Hybrid Tunnel identifies a virtual tunnel
      that overlays a path across a set of underlay links between two
      BGP peers.  These underlay links may use various technologies
      (e.g., MPLS, Layer 2 direct connections, or Layer 3 public
      Internet).  The term hybrid reflects that different types of
      underlay links can be used simultaneously.

   Encoding:  Per [RFC9012], the following two BGP attributes that MAY
      encode a Tunnel Encapsulation attribute information: the Tunnel
      Encapsulation Attribute, and the Encapsulation Extended Community
      as a "barebones" tunnel identification.  The encoding for the SD-
      WAN Hybrid Tunnel is described for both BGP attributes.

      SD-WAN Hybrid tunnel Encoded in Encapsulation Extended
      Community:  The SD-WAN encoding uses the Encapsulation Extended
         Community defined in [RFC9012] with the tunnel type set to 25
         (IANA assigned).  The NextHop Field in the BGP update indicates
         the tunnel egress endpoint and this field SHOULD be set to the
         BGP Peer Address for the SD-WAN Peer.

      SD-WAN Hybrid tunnel Encoded in Tunnel Encapsulation Attribute:
         The tunnel TLV has a type set to 25 (IANA assigned).  The valid
         Sub-TLVs for client routes are the Color Sub-TLV (defined in
         [RFC9012]), and the following Sub-TLVs defined in sections 2.2
         and 2.3 of this document: IPSec SEC ID, IPsec SA Rekey Cnt,
         IPsec Public Key, IPsec SA Proposal, and Simplified IPsec SA.
         The valid Sub-TLVs for underlay tunnels are the Tunnel Egress
         End Point defined in [RFC9012] and the following Sub-TLVs

Dunbar, et al.           Expires 10 October 2026                [Page 7]
Internet-Draft            SD-WAN Edge Discovery               April 2026

         defined in sections 2.2 and 2.3 of this document: IPSec SEC ID,
         IPsec SA Rekey Cnt, Extended Port Attr, Underlay Type, IPsec
         Public Key, IPsec SA Proposal, and Simplified IPsec SA.  If a
         Tunnel Egress End Point is not included in SD-WAN Hybrid Tunnel
         TLV, it is treated as if a Tunnel Egress End Point SubTLV is
         included with an address family identifer of 0.  Table 1
         summarizes this Sub-TLV support in a tabular format.

   Sub-TLV Support per NLRI type:  Summary table

                     Table 1

      Client Routes AFI/SAFI = 1/1, 2/1, 1/128, 2/128
      Underlay Routes AFI/SAFI = 1/74 and 2/74

      sub-TLV            Code  Client Routes  Underlay Routes
      ------            ----  -------------  ---------------
      Encapsulation        1   not valid     not valid
      Protocol             2   not valid     not valid
      Color                3   valid *1      not valid
      Load-Balancing Block 5   not valid     not valid
      Tunnel Egress EP     6   required *2   required *2
      DS Field             7   not valid     not valid
      UDP Dest. Port       8   not valid     not valid
      Embedded Label H.    9   not valid     not valid
      MPLS label Stack    10   not valid     not valid
      Prefix-SID          11   not valid     not valid
      Preference          12   not valid     not valid
      Binding SID         13   not valid     not valid
      ENLP                14   not valid     not valid
      Priority            15   not valid     not valid
      SPI/SI              16   not valid     not valid
      SRv6 Binding SID    20   not valid     not valid
      IPsec SA ID         64   valid         valid
      Extended Port Attr  65   not valid     valid
      Underlay Type       66   not valid     valid
      IPsec SA Rekey Cnt  67   valid         valid
      IPsec Public Key    68   valid         valid
      IPsec SA Proposal   69   valid         valid
      Simplified IPsec SA 70   valid         valid

      *1 - validation per [RFC9012]. Color Extended Community
      takes precedence over Color Sub-TLV.
      *2 - if a Tunnel Egress End Point (EP) Sub-TLV is not included,
      the SD-WAN Hybrid tunnel treats as if Tunnel egress End Point
      exists with AFI of 0.

Dunbar, et al.           Expires 10 October 2026                [Page 8]
Internet-Draft            SD-WAN Edge Discovery               April 2026

                            Figure 1: sub-TLV list

2.1.1.  Summary of Validation Procedure

   The validation procedure for the SD-WAN Hybrid tunnel TLV has the
   following steps

      1) Validate tunnel TLV encoding and Sub-TLV encoding (per
      [RFC9012] and sections 2.2 and 2.3 of this draft)

      2) Check that Sub-TLVs are valid for NLRI type in route (see above
      summarized in Table 1) and ignore invalid Sub-TLVs (per [RFC9012])

      3) Validate that the tunnel egress endpoint is a reachable IP
      address based on the BGP next-hop resolution rules.

      4) Check if both the Color Sub-TLV and Extended Community for
      Color exist, if so prefer the Extended Community for Color.

   After the SD-WAN Hybrid Tunnel TLV has been validated, the SD-WAN
   Peer processes based on the NLRI as (underlay route or client route)
   as described in sections 2.4 and 2.5.  Prior to installing a route
   with a SD-WAN tunnel as an active route, the BGP peer installing the
   route MUST also validate that the SD-WAN tunnel and underlay links
   are active.

2.1.2.  Processing Considerations for SD-Wan Hybrid Tunnel Encoding

   When Encapsulation Extended Community with a SD-WAN Hybrid Tunnel
   Type is attached to a client route, the detailed SD-WAN tunnel
   attributes are not included in the same BGP UPDATE message, but are
   advertised separately using the SD-WAN NLRI.  Section 2.2 and 2.3
   describe the processing.  The SD-WAN NLRI is originated using the
   loopback address of the C-PE.  The remote BGP speaker uses this
   loopback address to associate the client route with the corresponding
   logical SD-WAN Hybrid Tunnel, and the SD-WAN NLRI SD-WAN Node ID and
   port to the underlay tunnel within the logial SD-WAN Hybrid Tunnel.
   This separation allows for independent advertisement rates and avoids
   bloating BGP UPDATE messages with the large amount of data required
   for IPsec SA, cryptographic keys, and related parameters.

   When the Tunnel Encapsulation Attribute with SD-WAN Hybrid Tunnel TLV
   is attached to the client route, the detailed underlay tunnel
   attributes, such as IPsec-related parameters, are included directly
   in the same BGP UPDATE as the client route.  As a result, there is no
   need for a separate UPDATE message associated with the C-PE loopback
   address.  However, this approach means that any changes to underlay
   attributes (e.g., IPsec keys or cryptographic parameters) necessitate

Dunbar, et al.           Expires 10 October 2026                [Page 9]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   re-advertising the client route with an updated Tunnel Encapsulation
   Attribute, which can increase both the frequency and size of BGP
   UPDATE messages.

2.2.  SD-WAN Underlay UPDATE

   The Edge BGP Peer using BGP SD-WAN discovery sends the SD-WAN NLRI
   with a Tunnel Encapsulation Tunnel attribute with a SD-WAN Hybrid
   tunnel TLV to advertise the detailed properties associated with the
   public facing WAN ports and IPsec tunnels.  The Edge BGP Peer sends
   this information to its designated RR via a secure transport
   connection.  Each BGP UPDATE message with a SD-WAN Underlay NLRI MUST
   contains a Tunnel Encapsulation Attribute with a SD-WAN Hybrid Tunnel
   TLV.  If an SD-WAN Underlay NLRI is received without a Tunnel
   Encapsulation Attribute with a SD-WAN Hybrid tunnel TLV, the NLRI is
   treated as "Treat-as-withdraw".

   The SD-WAN Hybrid tunnel TLV within the Tunnel Encapsulation
   Attribute can include sub-TLVs for Extended Port attribute (see
   Section 2.3.6) or IPsec information (see Section 2.3).  The IPsec
   information sub-TLVs include: IPsec SA ID, IPsec SA Nonce, IPsec
   Public Key, IPsec SA Proposal, and Simplified IPsec SA.

2.2.1.  The NLRI for SD-WAN Underlay Tunnel Update

   A new NLRI SAFI (SD-WAN SAFI=74) is introduced within the
   MP_REACH_NLRI Path Attribute of [RFC4760] for advertising the
   detailed properties of the SD-WAN tunnels terminated at the edge
   node.  This is a "typed" NLRI (similar to other "typed" NLRIs as
   described in [RFC7606]).  The format is shown in figure 2.

   +------------------+
   |    Route Type    | 2 octets
   +------------------+
   |     Length       | 2 octets
   +------------------+
   |   Type Specific  |
   ~ Value (Variable) ~
   |                  |
   +------------------+

                       Figure 2: SD-WAN NLRI Encoding

   where:

   Route Type:  A 2-octet value that defines the encoding of the

Dunbar, et al.           Expires 10 October 2026               [Page 10]
Internet-Draft            SD-WAN Edge Discovery               April 2026

      reminder of the SD-WAN the NLRI.

   Length:  2 octets indicating the length of the value field in octets.

   This document defines the following SD-WAN Route type:

   Route-Type = 1 (SD-WAN Tunnel Endpoint NLRI):  For advertising the
      detailed properties of the SD-WAN tunnels terminated at the edge,
      where the transport network port can be uniquely identified by a
      tuple of three values (Port-Local-ID, SD-WAN-Color, SD-WAN Node
      ID).  The SD-WAN NLRI Route Type =1 has the following encoding:

           +------------------+
           |  Route-Type = 1  | 2 octets
           +------------------+
           |     Length       | 2 octets
           +------------------+
           |   Port-Local-ID  | 4 octets
           +------------------+
           |   SD-WAN-Color   | 4 octets
           +------------------+
           |  SD-WAN Node ID  | 4 or 16 octets
           +------------------+

                      Figure 3: SD-WAN NLRI Route Type 1

   Length:  The value of the Length field for Route-Type 1 MUST be
      either 12 octets (when the SD-WAN Node ID is an IPv4 address) or
      24 octets (when the SD-WAN Node ID is an IPv6 address).  Any other
      value is invalid, and the NLRI MUST be treated as malformed and
      discarded.

   Port-local-ID:  SD-WAN edge node Port identifier, which is locally
      significant.  If the SD-WAN NLRI applies to multiple WAN ports,
      this field is zero.

   SD-WAN-Color:  identifies a group of Hybrid SD-WAN tunnels that may

Dunbar, et al.           Expires 10 October 2026               [Page 11]
Internet-Draft            SD-WAN Edge Discovery               April 2026

      span multiple SD-WAN logical tunnels co-located at the same site.
      The BGP Peer supporting SD-WAN uses this SD-WAN-Color value to
      allow local policy to correlate client routes identified by the
      Color Extended Community to a specific group of Hybrid SD-WAN
      tunnels or a specific set of underlay tunnels within the Hybrid
      SD-WAN tunnel.  If the SD-WAN-Color represents all tunnels at a
      site, it effectively serves as a site-level identifier.  If no
      matching SD-WAN-Color is found, the client route is not be
      forwarded over any SD-WAN tunnels.  However, local configuration
      MAY remove this restriction.

   SD-WAN Node ID:  This field carries the IPv4 or IPv6 address of the
      SD-WAN edge node (C-PE).  For IPv4 SD-WAN NLRI (AFI/SAFI 1/74),
      this field contains a 4-octet IPv4 address representing a /32 host
      address.  For IPv6 SD-WAN NLRI (AFI/SAFI 2/74), this field
      contains a 16-octet IPv6 address representing a /128 host address.
      The SD-WAN Node ID identifies the IP address (usually the loopback
      address) used by the SD-WAN edge node to advertise its tunnel
      attributes of a tunnel underlay route within the logical SD-WAN
      Hybrid logical tunnel.

2.2.2.  Validation of SD-WAN NLRI

   Upon receiving an SD-WAN NLRI, the following validation steps are
   performed:

   - Route Type Validation:  The Route Type field MUST be equal to 1.
      Any other value is not supported and the NLRI MUST be ignored, but
      distributed to other BGP peers.

   - Length Field Validation:  The Length field MUST contain a value of
      either 12 or 24 octets, as defined in Section 2.2.1.  Any other
      value renders the NLRI malformed, and the NLRI MUST be discarded.

   - SD-WAN Node ID:  If Length = 12, the SD-WAN Node-ID field contains
      an IPv4 Unicast address.  If Length = 24, the SD-WAN Node-ID field
      contains an IPv6 Unicast address.  The SD-WAN Node-ID MUST be a
      valid unicast address.  Otherwise, the NLRI must be discarded.

2.2.3.  BGP Path Attributes attached to SD-WAN NLRI

   The Path Attributes attached to the SD-WAN NLRIs apply to the WAN-
   facing tunnel endpoints being advertised, not to client routes.
   These attributes describe properties of the WAN ports (e.g.,
   encapsulation, transport role, or color) that may be used in
   establishing SD-WAN underlay tunnels between edge nodes.  Client
   routes, which represent customer prefixes, are propagated using
   separate BGP NLRIs (e.g., IPv4/IPv6 unicast or L3VPN), with their own

Dunbar, et al.           Expires 10 October 2026               [Page 12]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   associated Path Attributes.  The SD-WAN NLRI and client route NLRI
   are independent but may be correlated by the receiving BGP speaker
   for tunnel selection and service mapping.

2.3.  IPsec SA Property Sub-TLVs

   The IPsec SA Property Sub-TLVs defined in this section are used to
   signal IPsec SA parameters for SD-WAN Hybrid Tunnels as defined in
   this document.  While these Sub-TLV formats could potentially be
   reused in other applications that require IPsec SA signaling over
   BGP, this document defines their semantics and behavior specifically
   within the SD-WAN Edge Discovery framework.

   If any sub-TLV is malformed, error handling MUST follow the procedure
   in Section 13 of [RFC9012].

   To support key rotation (e.g., updating IPsec keys or parameters),
   the SD-WAN NLRI (identified by Port-Local-ID, SD-WAN-Color, and SD-
   WAN Node ID) can be re-advertised via a BGP UPDATE message containing
   updated IPsec SA information.  This mechanism enables rapid
   distribution of new keys without requiring separate key negotiation
   protocols.

2.3.1.  IPsec SA ID Sub-TLV

   The IPsec SA ID Sub-TLV is used to reference one or more previously
   established IPsec SAs between SD-WAN nodes.  This Sub-TLV carries one
   or more 32-bit Security Parameter Index (SPI) values assigned at the
   receiving node (i.e., the inbound SPI).  When combined with the SD-
   WAN Node-ID (which identifies the underlay tunnel endpoint address),
   each SPI uniquely identifies an existing IPsec SA, consistent with
   the SA identification described in [RFC4301].

   Multiple SPIs MAY be included within the Sub-TLV to reference
   multiple pre-established IPsec SAs available for the SD-WAN overlay.
   This enables advertisement of SA updates, key rotations, or
   operational state changes without resending full SA parameter sets,
   thereby significantly reducing the size of BGP UPDATE messages and
   allowing pairwise IPsec rekeying to proceed independently for each
   SA.

   Sub-TLV Name:  IPsec SA ID

   Sub-TLV Code:  64 (IANA assigned)

   Sub-TLV Encoding:

       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

Dunbar, et al.           Expires 10 October 2026               [Page 13]
Internet-Draft            SD-WAN Edge Discovery               April 2026

      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |IPsec SA ID Sub|   Length      |  Reserved                     |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                      IPsec SA Identifier #1                   |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                      IPsec SA Identifier #2                   |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                                                               |
      ~                                                               ~
      |                                                               |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                      IPsec SA Identifier #n                   |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                        Figure 4: IPsec SA ID Sub-TLV

      where:

      *  IPsec SA ID (8 bits): 64(IANA Assigned).

      *  Length (8 bits): Specifies the total length in octets of the
         value field (not including the Type and Length fields).  For
         the IPsec SA ID Sub-Type, the Length field SHOULD be equal to 2
         + 4 *(number of IPsec SA Identifier fields).

      *  Reserved: The Reserved field SHOULD be set to zero and ignored
         upon receipt.  Received values MUST be propagated without
         change.

      *  A sequence of IPsec SA Identifier fields follows the reserved
         field.  Each IPsec SA Identifier field is 4 octets long, and
         identifies a pre-established IP security association.

   Sub-TLV Error Handling:  If the length value is invalid, (that is 2+
      4*number of IPsec SA IDs), then the IPsec SA ID SubTLV is
      Malformed.  Sub-TLV Error handling for Malformed Sub-TLVs adheres
      to [RFC9012].

2.3.2.  IPsec SA Rekey Counter Sub-TLV

   The IPsec SA Rekey Counter Sub-TLV provides the rekey counter for a
   security association (identified by IPsec SA Identifier).

   Sub-TLV Name:  IPsec SA Rekey Counter

   Sub-TLV Code:  67 (IANA assigned)

Dunbar, et al.           Expires 10 October 2026               [Page 14]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   Sub-TLV Encoding:

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |SA-RekeyCounter|   Length      |  Reserved                     |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |   ID Length   |       Nonce Length            |I|   Flags     |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                             Rekey                             |
       |                            Counter                            |
       +---------------------------------------------------------------+
       |                IPsec SA Identifier                            |
       +---------------------------------------------------------------+
       |                                                               |
       ~                          Nonce Data                           ~
       |                                                               |
       +---------------------------------------------------------------+

      where:

      *  IP SA-Rekey Counter (8 bits): 67 (IANA assigned)

      *  length (8 bits): Specifies the total length in octets of the
         value field of the SubTLV.  The total length is variable with
         the value equal to 18 plus Nonce Length.

      *  Reserved: Reserved for future use.  The Reserved field MUST be
         set to zero and MUST be ignored upon receipt.  Received values
         MUST be propagated without change.

      *  ID Length (8 bits): indicates the length in octets of IPsec SA
         Identifer.  This length SHOULD be 4 octets.

      *  Nonce Length (16 bits): indicates the length, in octets, of the
         Nonce Data.  The value MUST be a non-zero multiple of 4 (i.e.,
         the Nonce Data length MUST be a multiple of 32 bits)[RFC7296].

      *  I Flag: When set to 1, the I-flag indicates that the
         communication being established is new.  When set to 0, it
         signals that the communication is a continuation of an existing
         session.

      *  Flags (7 bits): Reserved for future use.  These bits MUST be
         set to zero and MUST be ignored upon receipt.  Received values
         MUST be propagated without change.

Dunbar, et al.           Expires 10 October 2026               [Page 15]
Internet-Draft            SD-WAN Edge Discovery               April 2026

      *  Rekey Counter (64 bits): the number of key updates or rekeys
         that have occurred.  Each time a key is rotated or replaced,
         the Rekey Counter is incremented.

      *  IPsec SA Identifier: Identifies the IPsec SA for a specific
         IPsec SA terminated at the SD-WAN edge node.  The length of
         this field is specified in ID Length.

      *  Nonce Data: a random or pseudo-random number for preventing
         replay attacks.

   Sub-TLV Error Handling:  The IPsec SA Rekey Counter Sub-TLV is
      considered malformed under any of the following conditions:

         The total Sub-TLV Length is less than the sum of ID Length,
         Nonce Length, and 4 octets for the Rekey Counter.

         The Nonce Length field is zero or not a multiple of 4.

      Malformed Sub-TLVs are handled according to [RFC9012].

         Contextual Note 1: The ID Length is set to 4 octets, but ID in
         [draft-ietf-bess-secure-evpn-02] under development in the IETF
         is defined as " Originator ID + (Tenant ID) + (Subnet ID) +
         (Tenant Address) in bytes.  To provide the future ability to
         allow the Secure EVPN functions to use this IPSec SA Rekey
         Counter Sub-TL the length has been defined as "SHOULD".

2.3.3.  IPsec Public Key Sub-TLV

   The IPsec Public Key Sub-TLV provides the Public Key exchange
   information and the life span for the Diffie-Hellman Key. The
   encoding is shown in the figure below:

        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |IPsec-PublicKey|   Length      |  Reserved                     |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |   Diffie-Hellman Group Num    |          Reserved             |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                                                               |
       ~                       Key Exchange Data                       ~
       |                                                               |
       +---------------------------------------------------------------+
       |                            Duration                           |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Dunbar, et al.           Expires 10 October 2026               [Page 16]
Internet-Draft            SD-WAN Edge Discovery               April 2026

            Figure 5: IPsec SA Public Key Sub-TLV diagram

   where:

      IPSec-PublicKey (8 bits): Type value for Sub-TLV is 68 (IANA
      assigned).

      length (8 bits): Specifies the total length in octets of SubTLV
      value field.  The total length is variable with the length being
      10 + the Key Exchange Data length.

      Diffie-Hellman Group Num (16-bits): identifies the Diffie-Hellman
      group used to compute the Key Exchange Data.  Details on Diffie-
      Hellman group numbers can be found in Appendix B of IKEv2
      [RFC7296] and [RFC5114].

      The Key Exchange data: This refers to a copy of the sender's
      Diffie-Hellman public value.  The length of the Diffie-Hellman
      public value is defined for MODP groups in [RFC7296] and for ECP
      groups in [RFC5903].

      Duration (32 bits): a 4-octet value specifying the life span of
      the Diffie-Hellman key in seconds.

   An IPsec Public Key Sub-TLV is considered malformed if any of its
   fields do not conform to the encoding rules specified above.
   Malformed Sub-TLVs are handled according to [RFC9012].

2.3.4.  IPsec SA Proposal Sub-TLV

   The IPsec SA Proposal Sub-TLV is used to advertise a set of
   cryptographic parameters that define the proposal for establishing an
   IPsec SA.  A proposal consists of one or more transform types, where
   each transform specifies a particular cryptographic function (such as
   encryption or integrity) and the corresponding algorithm to be used.
   This structure follows the same model as IKEv2 Proposals defined in
   [RFC7296].

   Sub-TLV Name:  IPsec SA Proposal - Indicates IPsec Transform
      Attributes

   Sub-TLV Code:  69 (IANA assigned)

   Each transform includes:

   -  A Transform Type, which identifies the function being specified
      (e.g., encryption, integrity).

Dunbar, et al.           Expires 10 October 2026               [Page 17]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   -  A Transform ID, which specifies the algorithm for that function.

   -  Optional Transform Attributes, which provide additional algorithm-
      specific parameters when necessary.

   The encoding is shown below:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  SA Proposal  |   Length      |       Reserved (16 bits)      |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |    Transform Attr Length      |Transform Type |    Reserved-2 |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     Transform ID              |          Reserved-3           |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                                                               |
   ~                        Transform Attributes                   ~
   |                                                               |
   +---------------------------------------------------------------+

                Figure 6: IPsec SA Proposal Sub-TLV diagram

   where:

      IPsec SA Proposal Sub-Type (8 bits): 69 (IANA assigned)

      length (8 bits): Total length of the value field in octets (not
      including Type and Length fields).  This equals 10 + the Transform
      attribute length.

      Reserved (16 bits): reserved for future use.  These bits are
      ignored upon receipt and set to zero when transmitted.  Received
      values MUST be propagated without change.

      Transform Attr Length (16 bits): length of the Transform
      Attributes field in octets.

      Transform Type (8 bits): The function being specified.  Transform
      Type values are defined in [RFC7296] and IANA IKEv2 Transform Type
      registry.  Valid types include: ENCR (1), PRF (2), INTEG (3), DH
      (4), and ESN (5).

      Reserved-2 (8 bits): Reserved for future use.  MUST be set to zero
      when transmitted and ignored upon receipt.  Received values MUST
      be propagated without change.

Dunbar, et al.           Expires 10 October 2026               [Page 18]
Internet-Draft            SD-WAN Edge Discovery               April 2026

      Transform ID (16 bits): Identifies the algorithm for the
      corresponding Transform Type, as defined in [RFC7296].

      Reserved-3 (16 bits): Reserved for future use.  MUST be set to
      zero when transmitted and ignored upon receipt.  Received values
      MUST be propagated without change.

      Transform Attributes: This is a sequence of Transform attribute
      TLVs.  Each transform attribute TLV is encoded as defined in
      [RFC7296] Section 3.3.5.

   The Transform Attributes field may be omitted if no additional
   parameters are required for the selected algorithm.

   Multiple IPsec SA Proposal Sub-TLVs MAY be included to describe
   multiple transform types for the same SA proposal.  Collectively,
   these Sub-TLVs define the full proposal for an IPsec SA between SD-
   WAN edge nodes.

2.3.4.1.  Sub-TLV Error Handling:

   An IPsec SA Proposal Sub-TLV is considered malformed if:

   -  The Length field value does not match the actual length (Transform
      Attr Length + 10).

   -  The Transform Attr Length field does not total length of all
      Transform attributes parsed.

   -  Any Transform Attribute TLV whose type, length or value field
      falls outside its valid range as specified in [RFC7296].

   Malformed Sub-TLVs MUST be handled according to [RFC9012].
   Additional content checks for the IPsec SA Proposal Sub-TLV are
   described in Section 2.4 (for client routes) and Section 2.5 (for
   underlay routes).

2.3.5.  Simplified IPsec SA Sub-TLV

   The Simplified IPsec SA Sub-TLV provides a compact way to signal pre-
   configured IPsec SA parameters for deployments where full transform
   negotiation (e.g., via IKEv2) is not supported or not necessary.  In
   such deployments, SD-WAN edge nodes are provisioned (e.g., via SD-WAN
   controller or management system) with a common set of agreed security
   profiles, including allowed transforms and algorithms.  This Sub-TLV
   signals which profile entry is to be used for a given SA instance.

   Sub-TLV Name:  Simplified IPsec SA

Dunbar, et al.           Expires 10 October 2026               [Page 19]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   Sub-TLV Code:  70 (IANA assigned)

   Sub-TLV Encoding:

        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |Sub-TLV type   |    Length     |             Reserved          |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       | Transform     | IPsec Mode    | AH algorithms |ESP algorithms |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |         Rekey Counter                                         |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       | key1 length   |         Key 1                                 ~
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       | key2 length   |         Key 2                                 ~
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       | nonce-length  |         Nonce                                 ~
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |        Duration                                               |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

               Figure 7: Simplified IPsec SA Sub-TLV diagram

   where:

   Sub-TLV type (8 bits):  Simplified IPsec SA Sub-TLV type (70)[IANA
      assigned]

   Length (8 bits):  the length of Sub-TLV in octets (based on key
      length).  Length is variable, and calculated by 17 + key1 length +
      key2 length + nonce length.

   Reserved (16 bits):  Reserved for future use.  These bits SHOULD be
      set to zero on transmission and MUST be ignored on receipt.
      Received values MUST be propagated without change.

   Transform (8 bits):
      *  Transform = 1 means AH,

      *  Transform = 2 means ESP, or

      *  Transform = 3 means AH+ESP.

      All other transform values are invalid.

   IPsec Mode (8 bits):
      *  Mode = 1 indicates that the Tunnel mode is used.

Dunbar, et al.           Expires 10 October 2026               [Page 20]
Internet-Draft            SD-WAN Edge Discovery               April 2026

      *  Mode = 2 indicates that the Transport mode is used.

      Only Mode values 1 and 2 are valid.  All other modes are invalid.

   AH algorithms (8 bits):  Specifies the AH authentication algorithm to
      be used.  The values are defined in [RFC4835] and its updates
      (e.g., [RFC8221]).  While an SD-WAN edge node may be capable of
      supporting multiple AH algorithms, this field carries only a
      single algorithm value for the specific SA instance.  The
      selection of which algorithms are supported across peers is
      determined via SD-WAN controller provisioning or management
      policy.  No in-band negotiation of multiple algorithms is
      performed using this field.

   ESP algorithms (8 bits):  Specifies the ESP encryption algorithm, as
      defined in [RFC4835], [RFC8221], and their updates.  Like AH
      Algorithm, only a single algorithm value is carried per SA
      instance, with acceptable algorithms coordinated by provisioning
      or policy.

   Rekey Counter (4 octet):  indicates the count for rekeying.

   key1 length (8 bits):  indicates the IPsec public key 1 length.  The
      length has a valid range of 32 octets to 512 octets [RFC8247]

   Public Key 1:  IPsec public key 1

   key2 length (8 bits):  indicates the IPsec public key 2 length.  The
      length has a valid range of 32 octets to 512 octets [RFC8247]

   Public Key 2:  IPsec public key 2

   nonce-length (8 bits):  indicates the Nonce key length.  Per
      [RFC7296], the minimum length for nonce is 16 octets.  [RFC7296]
      doesn't specify the maximum length for nonce.  Therefore, the
      maxmimum length for nonce MUST be small enough so that the entire
      length of the BGP UPDATE is less than the BGP UPDATE maximum.

   Nonce:  IPsec Nonce

   Duration (32 bits):  specifying the security association (SA) life
      span in seconds.

   A Simplified IPsec SA Sub-TLV is considered MALFORMED if any of its
   fields are not properly encoded, do not conform to the specified
   value ranges above, or contain invalid field lengths.  Any MALFORMED
   Sub-TLV is processed according to [RFC9012].

Dunbar, et al.           Expires 10 October 2026               [Page 21]
Internet-Draft            SD-WAN Edge Discovery               April 2026

2.3.6.  Extended Port Attribute Sub-TLV

   The Extended Port Attribute Sub-TLV advertises NAT-related properties
   associated with a public Internet-facing WAN port on an SD-WAN edge
   node.  This information enables peer SD-WAN nodes to establish secure
   tunnels even when one or both peers are behind NAT devices.  An SD-
   WAN edge node may query a STUN server (Session Traversal Utilities
   for NAT [RFC8489]) to determine its NAT properties, including its
   public IP address and public port number.  These properties are then
   advertised to peer nodes using the Extended Port Attribute Sub-TLV.

   In SD-WAN deployments, NAT devices may exist at one or both ends of
   the tunnel path.  The possible deployment scenarios include:

   *  Only one SD-WAN edge node is located behind a NAT device, while
      its peer is directly reachable.

   *  Both SD-WAN edge nodes are behind NAT devices (symmetric or
      independent NATs).

   *  The external address and port assigned to an edge node may change
      dynamically, either due to ISP address allocation or when
      traversing NAT devices that use dynamic address pools.

   Because an SD-WAN edge node may have multiple WAN ports with
   independent NAT characteristics, the NAT properties are associated
   with individual WAN ports and are advertised independently for each
   port using this Sub-TLV.  This per-port advertisement allows remote
   peers to construct appropriate NAT traversal parameters for each
   potential tunnel endpoint.

   Unlike pairwise NAT traversal mechanisms such as IKEv2 [RFC7296],
   which require peers to dynamically discover NAT properties during
   tunnel setup, the BGP-controlled SD-WAN architecture enables each SD-
   WAN edge node to proactively advertise its NAT properties to all
   peers through BGP signaling.  This approach simplifies NAT traversal
   in large-scale SD-WAN deployments where each edge node may need to
   establish tunnels with many peers.

   Sub-TLV Name:  Extended Port Attribute

   Sub-TLV Code:  65 (IANA assigned)

   Sub-TLV Encoding:  The encoding is shown in the figure below:

Dunbar, et al.           Expires 10 October 2026               [Page 22]
Internet-Draft            SD-WAN Edge Discovery               April 2026

       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |Type (65)      | Length        |Flags          |I|O|R|R|R|R|R|R|
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      | NAT Type      |  Encap-Type   |Trans networkID|     RD ID     |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                  Local  IP Address                            |
      |        32-bits for IPv4, 128-bits for Ipv6                    |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                  Local  Port                                  |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                Public IP                                      |
      |        32-bits for IPv4, 128-bits for Ipv6                    |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                Public Port                                    |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |               Extended Sub-Sub-TLV                             |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                Figure 8: Extended Port Attribute Sub-TLV

   where:

   *  Length: the length of the value field in octets excluding the Type
      and the Length fields.  If IPv4, the length is 32 (8 header, 32
      address, 8 for 1 Sub-Sub-TLV).  If IPv6, the length is 64 (8
      header, 48 addresses, 8 for 1 subSubTLV).

   *  Flags (16 bits):

      -  Flags field starts with 8 bits which are reserved for future
         use.  MUST be set to 0, and ignored upon reception.

      -  I bit (C-PE port address or Inner address scheme):

         o  If set to 0, indicate the inner (private) address is IPv4.

         o  If set to 1, indicates the inner address is IPv6.

      -  O bit (Outer address scheme):

         o  If set to 0, indicate the inner (private) address is IPv4.

         o  If set to 1, indicates the inner address is IPv6.

      -  R bits: reserved for future use.  MUST be set to 0, and ignored
         upon reception.

Dunbar, et al.           Expires 10 October 2026               [Page 23]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   *  NAT Type (8 bits): an unsigned integer indicating the NAT behavior
      observed for this WAN port.  The values are derived from the
      legacy NAT classification model described in RFC 8489 Section 5.
      The assigned values are:

      -  1: without NAT ;

      -  2: 1-to-1 static NAT;

      -  3: Full Cone;

      -  4: Restricted Cone;

      -  5: Port Restricted Cone;

      -  6: Symmetric; or

      -  7: Unknown (e.g. no response from the STUN server).

      The NAT Type value is determined by the sender using NAT discovery
      procedures (e.g., STUN [RFC8489] with legacy tests [RFC8489]) or
      local administrative configuration.  The receiver is not required
      to verify NAT behavior but MUST validate that the received NAT
      Type field is within the range 1-7.  Values outside this range are
      considered invalid and result in the Sub-TLV being treated as
      malformed.

   *  Encap-Type (8 bits): An unsigned integer indicating the
      encapsulation type supported for this WAN port.  The Encap-Type
      identifies the encapsulation protocol used within the IPsec
      payload when IPsec SA Sub-TLVs (IPsec SA ID, IPsec SA Nonce, IPsec
      Public Key, IPsec SA Proposal, or Simplified IPsec SA) are present
      in the SD-WAN Hybrid Tunnel.  This field is distinct from the
      Tunnel Type field in the BGP Tunnel Encapsulation Attribute
      [RFC9012].  The encapsulation types are:

      -  Encap-Type=1: GRE;

      -  Encap-Type=2: VxLAN;

      Notes:

      -  Those are the only two valid values for this field.  The Encap-
         Type identifies the encapsulation protocol used within the
         IPsec payload when IPsec SA Sub-TLVs (IPsec SA ID, IPsec SA
         Nonce, IPsec Public Key, IPsec SA Proposal, or Simplified IPsec
         SA) are present in the SD-WAN Hybrid Tunnel.

Dunbar, et al.           Expires 10 October 2026               [Page 24]
Internet-Draft            SD-WAN Edge Discovery               April 2026

      -  The Extended Port Attribute Sub-TLV does not support NAT
         traversal scenarios involving IPv4/IPv6 translation (e.g.,
         NAT64 or 6to4).

   *  Trans NetworkID (Transport Network ID) (8 bits): An identifier
      assigned by the SD-WAN Controller to indicate the transport
      network that this WAN port belongs to.  All values from 0 to 255
      are valid.

   *  RD ID: The Routing Domain ID is a globally unique identifier
      assigned to the routing domain associated with this WAN port.  All
      values from 0 to 255 are valid.

      -  Some SD-WAN deployments may define multiple levels, zones, or
         regions that are represented as logical routing domains or
         transport networks.  Operational policies may govern whether
         SD-WAN Hybrid tunnels or underlay tunnels are allowed between
         nodes in different logical routing domains.  The definition,
         distribution, and enforcement of such policies are outside the
         scope of this document.

   *  Local IP: The local (or private) IP address of the WAN port.  If
      the Sub-TLV Length field is 32, the Local IP is a 32 bit IPv4
      address.  If the Sub-TLV Length field is 64, the Local IP is a 64
      bit IPv6 address.  This MUST be a valid IP address.

   *  Local Port: used by Remote SD-WAN edge node for establishing IPsec
      to this specific port.  Valid values: 0x00 - 0xFFFFFFFF.

   *  Public IP: The IP address after the NAT.  If NAT is not used, this
      field is set to all-zeros.  If not, this is a valid IP addres.  If
      the Sub-TLV Length field is 32, the Local IP is a 32 bit IPv4
      address.  If the Sub-TLV Length field is 64, the Local IP is a 64
      bit IPv6 address.

   *  Public Port: The Port after the NAT.  If NAT is not used, this
      field is set to all-zeros.  Otherwise, the value can be 0x01 to
      0xFFFFFFFF.

   *  If NAT is not used for the WAN port, both the Public IP and Public
      Port fields MUST be set to zero.  If one field is set to zero and
      the other is non-zero, the Sub-TLV is considered malformed.

   *  Extended Sub-Sub-TLV: Carries additional information about the
      underlay networks.

   Sub-TLV Error Handling:  If the Extended Port Attribute Sub-TLV is

Dunbar, et al.           Expires 10 October 2026               [Page 25]
Internet-Draft            SD-WAN Edge Discovery               April 2026

      malformed (e.g., incorrect length, invalid address format, or
      unrecognized NAT type), it MUST be ignored per the procedures
      described in [RFC9012].

   Multiple Sub-TLVs:  Multiple Extended Port Attribute Sub-TLVs are
      allowed.  If the informsation from multiple Extended Port
      Attribute Sub-TLVs is the same, the first one is processed, the
      rest is ignored.

2.3.6.1.  Extended Port Sub-Sub-TLV

   One Extended Sub-Sub-TLVs is specified in this document: Underlay
   Network Type Sub-Sub-TLV.

   The Underlay Network Type Sub-Sub-TLV is an optional Sub-Sub-TLV used
   to advertise additional transport characteristics for the WAN port,
   including connection type, physical port type, and port bandwidth
   (e.g., LTE, DSL, Ethernet, and others).  This information assists
   remote peers or controllers in selecting optimal underlay paths when
   multiple WAN ports are available.  The Underlay Network Type Sub-Sub-
   TLV is only valid for the Tunnel SD-WAN Hybrid Tunnel TLV within the
   Extended Port Attribute Sub-TLV.

   Underlay Network Type.

   66 (IANA Assigned).

   The encoding is shown in the figure below:

        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       | UnderlayType  |      Length   |      Reserved                 |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |Connection Type|   Port Type   |        Port Speed             |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                Figure 9: Underlay Network Type Sub-Sub-TLV

   Where:

   UnderlayType:  Underlay Network Type (66 assigned by IANA)

   Length:  always 6 bytes

   Reserved:  2-octet of reserved bits.  It SHOULD be set to zero on
      transmission and MUST be ignored on receipt.

Dunbar, et al.           Expires 10 October 2026               [Page 26]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   Connection Type:  An unsigned integer indicating the connection type
      for this WAN port.  Only a single value is carried per instance.
      The following values are defined:

      *  1 = Wired

      *  2 = WIFI

      *  3 = LTE

      *  4 = 5G

      *  Values outside the range 1-4 are invalid and render the Sub-TLV
         malformed.

   Port Type:  An unsigned integer indicating the physical port type of
      the WAN interface.  Only a single value is carried per instance.
      The following values are defined:

      *  1 = Ethernet

      *  2 = Fiber Cable

      *  3 = Coax Cable

      *  4 = Cellular

      *  Values outside the range 1-4 are invalid and render the Sub-TLV
         malformed.

   Port Speed:  An unsigned 16-bit integer representing the port speed
      in megabits per second (Mbps).  For example, a value of 1000
      represents a port speed of 1000 Mbps (1 Gbps).  The valid range is
      1-65535.  A Port Speed value of 0 is invalid and renders the Sub-
      TLV malformed.

   Underlay Network Type Sub-Sub-TLV is a MALFORMED Sub-Sub-TLV if the
   fields do not fit the limits specified above.  If a MALFORMED Sub-
   Sub-TLV is contained in the Extended Port Attribute Sub-TLV, then the
   Extended Port Attribute Sub-TLV is MALFORMED.  Per [RFC9012], a
   MALFORMED Sub-TLV is ignored.

2.4.  Procedure for Client Routes with SD-WAN Hybrid Tunnel

   Client routes with NLRI of AFI/SAFI IPv4 Unicast (1/1), IPv6 (2/1),
   L3VPN v4 Unicast (1/128), and IPv6 L3VPN (2/128) that use the SD-WAN
   Hybrid Tunnel Type can be advertised using one of two mechanisms:

Dunbar, et al.           Expires 10 October 2026               [Page 27]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   Encapsulation Extended Community with SD-WAN SAFI:  In this approach,
      the client route is advertised using Encapsulation Extended
      Community with the SD-WAN Hybrid tunnel type.  The detailed tunnel
      properties, such as IPsec SAs, WAN port attributes, NAT
      properties, and other parameters, are advertised separately via
      BGP UPDATE messages using the SD-WAN SAFI.  The SD-WAN Node ID,
      carried as the NextHop in client route advertisements and as the
      SD-WAN Node ID in SD-WAN SAFI underlay route advertisements,
      enables receiving BGP nodes to associate client routes with the
      correct underlay tunnels.

   Tunnel Encapsulation Attribute:  Alternatively, client routes UPDATEs
      can include all tunnel-related information directly in the same
      BGP UPDATE using the Tunnel Encapsulation Attribute.  The SD-WAN
      Hybrid Tunnel TLV specifies the outer tunnel through which the
      underlay tunnel identified by SD-WAN Node ID passes.  This outer
      tunnel is identified by the Tunnel Egress Endpoint Sub-TLV.
      Recall as stated earlier, if a Tunnel Egress Endpoint Sub-TLV does
      not exist, the SD-WAN Hybrid Tunnel processing treats it as a
      Tunnel Egress Endpoint Sub-TLV with AFI equal to zero.

   The Tunnel Encapsulation Attribute based approach, which includes all
   tunnel attributes within route advertisement, can simplify the
   processing at the receiving nodes.  However, it may lead to
   significant BGP attribute overhead, particularly when multiple IPsec
   SAs are eligible to carry the same client route.  In contrast, the
   Encapsulation Extended Community approach (the "barebones" method
   defined in [RFC9012]) combined with SD-WAN SAFI separates tunnel
   attributes from route Updates, allows tunnel properties to be reused
   across multiple client routes.

   The SD-WAN Secure Links topology is supported using unicast IPv4 and
   IPv6 routes.  L3VPN topologies, on the other hand, support the
   formation of Secure SD-WAN L3VPNs as described in [SD-WAN-BGP-USAGE]
   and MEF specifications [MEF 70.1] and [MEF 70.2].

2.4.1.  SD-WAN Hybrid Tunnel Type in Encapsulation Extended Community

   When client routes are advertised using the Encapsulation Extended
   Community with the SD-WAN Hybrid Tunnel Type, as specified in
   [RFC9012], the Encapsulation Extended Community identifies the tunnel
   type, and the NextHop field in the BGP UPDATE serves as the Tunnel
   Egress Endpoint.  Validation of the Tunnel Egress Endpoint follows
   the procedures defined in Sections 13 of [RFC9012], as applied to the
   NextHop.

Dunbar, et al.           Expires 10 October 2026               [Page 28]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   The Color Extended Community is used to associate a client route with
   its eligible underlay tunnels.  The Color value in the client route
   identifies the set of underlay tunnels, previously advertised with
   the same Color via SD-WAN SAFI, that may be used to transport the
   traffic.  This enables SD-WAN ingress nodes or controllers to apply
   path selection policies based on performance, cost, or service
   requirements.

2.4.2.  SD-WAN Hybrid Type in Tunnel Attributes via Tunnel Encapsulation
        Attribute

   When client routes are advertised using the Tunnel Encapsulation
   Attribute with the SD-WAN Hybrid Tunnel Type, the following
   procedures apply for validating the BGP UPDATE message:

   1.  Check for Well-formed SD-WAN Hybrid Tunnel TLV:  If the SD-WAN
      Hybrid Tunnel TLV does not have a Tunnel Egress Endpoint SubTLV,
      the tunnel validation process treats it as if a Tunnel Egress
      SubTLV exists with an AFI of 0(Per [RFC9012], a Tunnel Egress
      SubTLV exists with an AFI of 0 uses the packet Next Hop as the
      tunnel endpoint).  Also, per [RFC9012], MALFORMED Sub-TLVs are
      ignored and a Sub-TLV with an unknown type is ignored.  The SD-WAN
      Hybrid Tunnel TLV only processes the first instance of a Sub-TLV
      except for the IPsec SA ID Sub-TLV.  For the IPsec SA ID Sub-TLV,
      if the IPsec SA Identifiers are unique are multiple IPsec SA ID
      sub-TLVs are processed.  If all the IPsec SA Identifies are not
      unique, the second IPsec SA ID Sub-TLV is ignored and not
      propagated

   2.  Validate Tunnel Egress Endpoint:  Per [RFC9012] validation
      procedures for a Tunnel Egress Endpoint.  Note: The Tunnel Egress
      Endpoint represents the outer tunnel through which the underlay
      tunnels specified by the SD-WAN NLRI operate.  The tunnel link MAY
      be active or inactive.

   3.  Check for Multiple SD-WAN Hybrid Tunnel TLVs  Multiple unique SD-
      WAN Hybrid Tunnel TLVs MAY be included in the Tunnel Encapsulation
      Attribute, but duplicate SD-WAN Hybrid Tunnel TLVs should be
      ignored silently.  Optionally, duplicate SD-WAN Hybrid Tunnel TLVs
      MAY be logged.

   4.  Validate each NLRI:  Local policy is run to validate routes.

   5.  Validate Next Hop:  The Next Hop MUST be be reachable via the
      tunnel.

Dunbar, et al.           Expires 10 October 2026               [Page 29]
Internet-Draft            SD-WAN Edge Discovery               April 2026

2.4.3.  Client Routes Carried Over Multiple SD-WAN Hybrid Tunnels

   When a client route is advertised with the Encapsulation Extended
   Community that identifies the SD-WAN Hybrid Tunnel Type, the route
   may also include a Color Extended Community (Color-EC).  This
   combination allows the route to be carried over multiple underlay
   tunnels that were previously advertised, each with the same Color
   value.

   The Color-EC serves as a correlation mechanism: all underlay tunnels
   that have been advertised (via SD-WAN SAFI) with the same Color value
   are considered eligible to carry the traffic for the client route.
   This approach supports flexible path selection and tunnel diversity
   while avoiding the need to enumerate each tunnel per route.

   This model is especially useful when:

   *  A site has multiple available IPsec tunnels or WAN links.

   *  A centralized controller or ingress SD-WAN edge node must select
      the optimal tunnel for forwarding based on performance, policy, or
      service constraints.

   The tunnel attributes, including IPsec parameters, NAT traversal
   info, and WAN port properties, are conveyed separately via SD-WAN
   SAFI updates.  This keeps client route updates minimal, allowing
   multiple routes to reference the same tunnel attributes by using the
   Color-EC.

2.4.4.  SD-WAN VPN ID in Control Plane

   In a BGP-controlled SD-WAN network, the VPN ID distinguishes client
   VPNs and ensures route separation.  It is conveyed in client route
   UPDATEs as follows:

   *  For IPv4/IPv6 Unicast (AFI/SAFI = 1/1 or 2/1), the Route Target
      Extended Community [RFC4360] SHOULD be included.  The Route Target
      value is interpreted as the VPN ID.  The Route Target is
      especially necessary when the SD-WAN edge node serves multiple
      VPNs on its client-facing interfaces.  If all client routes belong
      to a single VPN and the association is unambiguous, the Route
      Target MAY be omitted.

   *  For VPN-IPv4/VPN-IPv6 (AFI/SAFI = 1/128 or 2/128), the RD in the
      NLRI serves as the VPN ID.

Dunbar, et al.           Expires 10 October 2026               [Page 30]
Internet-Draft            SD-WAN Edge Discovery               April 2026

2.4.5.  SD-WAN VPN ID in Data Plane

   In the data plane, SD-WAN traffic can traverse either an MPLS or
   IPsec segment within a SD-WAN Hybrid Tunnel.  The method for
   conveying the VPN ID depends on the encapsulation:

   *  MPLS Segments: When the SD-WAN Hybrid Tunnel uses MPLS transport,
      the MPLS label stack is used to identify the VPN per [RFC8277].
      Security is assumed to be provided by the MPLS transport.

   *  IPsec Segments: When traversing a public network with IPsec
      encryption: For GRE encapsulation within IPsec, the GRE Key field
      can carry the SD-WAN VPN ID; For VXLAN network virtualization
      overlays within IPsec, the VNI (Virtual Network Identifier) field
      is used to carry the VPN ID.

2.5.  Procedure for Underlay Routes with SD-WAN Hybrid Tunnel TLV

   Underlay tunnel routes in a BGP-controlled SD-WAN network are
   advertised using the SD-WAN SAFI, with the Tunnel Encapsulation
   Attribute carrying a SD-WAN Hybrid Tunnel TLV.  The Tunnel Egress End
   Point Sub-TLV (assumed or sent) indicates the other tunnel through
   which these underlay tunnels operate.

   Remote nodes use the SD-WAN Node ID carried in the SD-WAN SAFI to
   correlate client routes whose NextHop address matches the SD-WAN Node
   ID.  This allows the receiving node to associate each client route
   with the appropriate set of tunnel attributes advertised by the
   corresponding SD-WAN edge node.

2.5.1.  SD-WAN Hybrid NLRI without Encapsulation Extended Community

   The SD-WAN Hybrid NLRI MUST be accompanied by the Tunnel
   Encapsulation Attribute, and MUST NOT be accompanied by an
   Encapsulation Extended Community.

2.5.2.  Underlay Route with a Tunnel Encapsulation Attribute

   The procedure for processing underlay routes follows the following
   steps:

   1.  Check for Well-Formed SD-WAN Hybrid Tunnel TLV:  A SD-WAN Hybrid
      Tunnel TLV is well-formed using only Sub-TLVs valid for
      association with the underlay Route (see section 2.1).  The IPsec
      SA ID sub-TLVs MAY have multiple instances of the sub-TLV if the
      IPsec SA Identifiers are unique, but if the IPsec SA Identifiers
      are not unique the second sub-TLV is ignored and not propagated.
      If multiple Extended Port Sub-TLVs exist, the TLVs must be

Dunbar, et al.           Expires 10 October 2026               [Page 31]
Internet-Draft            SD-WAN Edge Discovery               April 2026

      validated in step 4.  For all other valid Sub-TLVs (see section
      2.1), only the first instance of a Sub-TLV is processed;
      subsequent ones are ignored.

   3.  Validate Tunnel Egress Endpoint:  The Tunnel Egress Endpoint
      validation is done per [RFC9012] rules either on the Tunnel Egress
      Endpoint Sub-TLV received in the UPDATE or an "assumed" Tunnel
      Egress Endpoint if no Tunnel Egress Endpoint Sub-TLV exists in the
      TLV (see section 2.1).  Practically, the outer tunnel group either
      identifies a specific WAN interface or (in the case of the
      "assumed" Tunnel Egerss Endpoint) the remote SD-WAN edge node at
      which the outer SD-WAN Hybrid Tunnel terminates.

   4.  Validate Extended Port Attribute Sub-TLV(s):  As described in
      Section 2.3.6, each Extended Port Attribute sub-TLV describes the
      properties of a single WAN port.  Therefore, multiple Extended
      Port sub-TLVs may be present when the SD-WAN edge node has
      multiple WAN ports.  Each sub-TLV MUST be validated to ensure that
      the port information it contains is sufficient to support the
      establishment of a tunnel to the remote peer.  If any Extended
      Port Attribute Sub-TLV is determined to be invalid, the entire SD-
      WAN Hybrid Tunnel TLV MUST be considered invalid.

   5.  Validate each NLRI:  Each typed NLRI in the SD-WAN Underlay MUST
      be well-formed, meaning it conforms to the structure defined in
      Section 2.2.1, including correct field lengths and ordering.  A
      MALFORMED NLRI MUST be discarded; implementations MAY log an
      error.

   6.  Validate Next Hop:  The IP address specified in the Next Hop
      field MUST be reachable by the Tunnels.

2.5.3.  Underlay Routes with Port-Local-ID of Zero

   As specified in Section 2.2.1, a Route Type 1 NLRI includes the tuple
   (Port-Local-ID, SD-WAN-Color, SD-WAN Node ID).  The Port-Local-ID
   field MAY be set to zero to indicate that the NLRI applies to all WAN
   ports on the identified SD-WAN node, effectively representing tunnel
   attributes at the node level rather than a specific port.

   When Port-Local-ID = 0, the receiving BGP speaker SHOULD apply local
   policy to determine how to associate client routes with underlay
   tunnels.  This local policy may prefer tunnels from specific SD-WAN
   nodes, or choose among SD-WAN Colors based on administrative
   preference, link type, path performance, or service-level objectives.
   The exact selection logic is implementation-specific.

Dunbar, et al.           Expires 10 October 2026               [Page 32]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   It is valid for multiple such node-level NLRIs to be received, each
   advertising different SD-WAN Colors for the same node.  For example,
   the following three NLRIs may be received (within one or more UPDATE
   messages):

      Port-Local-ID (0), SD-WAN-Color (10), SD-WAN Node ID (2.2.2.2),

      Port-Local-ID (0), SD-WAN-Color (20), SD-WAN Node ID (2.2.2.2),
      and

      Port-Local-ID (0), SD-WAN-Color (30), SD-WAN Node ID (2.2.2.2).

   These indicate that node 2.2.2.2 supports multiple tunnel groups,
   each classified by a different SD-WAN Color.  For example, these
   Colors may correspond to service tiers such as gold, silver, and
   bronze.  The SD-WAN-Color field is used to correlate underlay tunnels
   with client routes that carry a matching Color Extended Community.
   If no match is found, the client route may not be forwarded over any
   SD-WAN tunnel.

2.5.4.  Multiple Tunnels attached to One Underlay Route

   An underlay tunnel passes through only one SD-WAN Hybrid Tunnel.
   Therefore, if there are more than one SD-WAN Hybrid Tunnel TLV within
   a single Tunnel Encapsulation Attribute, the first is processed and
   the subsequent SD-WAN Hybrid Tunnel TLVs are ignored.

2.6.  Error handling

   The Error handling for SD-WAN VPN support has two components: error
   handling for Tunnel Encapsulation signaling (Encapsulation Extended
   Community and Tunnel Encapsulation Attribute) and the SD-WAN NLRI.
   An SD-WAN NLRI, a Tunnel Encapsulation attribute MUST always
   accompany the SD-WAN NLRI.

   The previous sections (2.4 and 2.5) provide the procedures for
   handling client routes and undelay routes.

2.6.1.  Error handling for the Tunnel Encapsulation Signaling

   The error handling for the tunnel encapsulation signaling
   (Encapsulation Extended Community and Tunnel Encapsulation Attribute)
   in this document follows the procedures specified in Section 13 of
   [RFC9012].  Unless otherwise stated, malformed or unrecognized Sub-
   TLVs MUST be handled as specified in [RFC9012].  This document
   defines new Sub-TLVs for Tunnel Type 25 (SD-WAN-Hybrid), but does not
   alter the validation behavior established in RFC 9012.

Dunbar, et al.           Expires 10 October 2026               [Page 33]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   For SD-WAN client routes with a Tunnel Encapsulation Attribute with a
   SD-WAN Hybrid Tunnel type TLV, the IPsec Sub-TLVs (IPsec SA ID, IPsec
   nonce, IPsec Public Key, IPsec Proposal, and Simplified IPsec SA) are
   meaningful, but MAY be rarely sent.  Incorrect fields within any of
   these 5 TLVs.  Per [RFC9012], a malformed sub-TLV is treated as an
   unrecognized sub-TLV.

   If multiple instances of the IPsec nonce, IPsec Public Key, IPsec
   Proposal, and Simplified IPsec are received within a SD-WAN Hybrid
   Tunnel TLV , only the first is processed.  The second instance is
   ignored and not propagated.  The IPsec SA ID MAY have multiple
   copies, but the IPsec SA Identifiers sent in the second sub-TLV MUST
   be different than any in the first IPsec SA ID sub-TLV.

   If multiple instances of the Extended Port sub-TLV are received, the
   local policy MUST determine which is to be used.

2.6.2.  Error Handling for NLRI

   The SD-WAN NLRI [AFI 1/SAFI = 74] utilizes a route type field to
   describe the format of the NLRI.  This specification only allows an
   NLRI with a type value of 1.  An NLRI with a type of field of another
   value is ignored, but distributed to other peers.  The implementation
   MAY log an error upon the reception of a type value outside of Route
   Type 1.  Error handling for the SD-WAN NLRI also adheres to the BGP
   UPDATE error handling specified in [RFC7606].

   Local configuration and policy MUST carefully constrain the SD-WAN-
   NLRI, tunnels, and IPsec security associations to create a "walled
   garden".

2.6.3.  SD-WAN NLRI and Tunnel Encapsulation Attribute

   The SD-WAN NLRI (AFI=1/SAFI=74) MUST be paired with Tunnel
   Encapsulation attribute with a SD-WAN Hybrid tunnel TLV, If the SD-
   WAN NLRI exist in an BGP UPDATE without a Tunnel Encapsulation
   Attribute with a SD-WAN Hybrid tunnel TLV, the NLRI is considered
   malformed and Treat-as-withdraw approach (per RFC7606).

   The SD-WAN NLRI SHOULD not be paired with an Encapsulation Extended
   Community.  If an SD-WAN NLRI is paried with an Encapsulation
   Extended Community rather than a Tunnel Encapsulation Attribute, the
   SD-WAN NLRI is considered malformed and the Treat-as-withdraw
   approach (per [RFC7606]) SHOULD be used.

Dunbar, et al.           Expires 10 October 2026               [Page 34]
Internet-Draft            SD-WAN Edge Discovery               April 2026

3.  Operational Consistency and Tunnel Validation

   Unlike MPLS VPN whose PE nodes are all controlled by the network
   operators, SD-WAN edge nodes can be installed anywhere, in shopping
   malls, in 3rd party Cloud DCs [Net2Cloud], etc.

   It is essential to ensure that advertisements from an SD-WAN edge
   node are legitimate.  The RR, which maintains policy information
   about which SD-WAN nodes are authorized to communicate, MUST verify
   that the advertising BGP speaker is permitted to originate SD-WAN
   Hybrid Tunnel information before reflecting such routes to other
   peers.

3.1.  Detecting Misaligned Tunnels

   It is critical that a SD-WAN Hybrid Tunnel forwards traffic in
   accordance with local policy, taking into account the client route
   attributes, tunnel ingress and egress endpoints, and the associated
   security parameters.

   To maintain correctness and security, both the RR and BGP speakers
   SHOULD validate that the client routes and associated tunnel
   information are consistent with expected configurations.  This
   includes verifying that:

   *  The NextHop in the client route update matches a known SD-WAN Node
      ID.

   *  The tunnel's egress endpoints are reachable and authorized.

   *  The advertised SD-WAN Color in the underlay NLRI matches the Color
      Extended Community attached to the client route.

3.2.  IPsec Attributes Mismatch

   Each SD-WAN node (e.g., a C-PE) can advertise its IPsec-related
   attributes to remote peers using Sub-TLVs within the Tunnel
   Encapsulation Attribute, in one of the following three forms, to
   support the establishment of IPsec SAs:

   *  Identifiers of a pre-established IPsec SA, carried in IPsec SA ID
      Sub-TLV.

   *  a simplified set of security parameters for setting up a IPsec SA,
      such as Transform type, IPsec Mode, AH/ESP Algorithms, rekey
      counter, 2 public keys, nonce, and duration, carried in the
      Simplified IPsec SA Sub-TLV.

Dunbar, et al.           Expires 10 October 2026               [Page 35]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   *  A flexible representation of IPsec parameters, where the Nonce,
      Public Key, and SA Proposal are individually specified and carried
      in the IPsec SA Rekey Counter Sub-TLV, IPsec Public Key Sub-TLV,
      and IPsec SA Proposal Sub-TLV, respectively.

   For existing IPsec SAs, an SD-WAN node that receives the
   advertisement can simply use one of the existing SAs to forward
   traffic for the associated client routes.  If multiple SAs are
   available for a given client route, local policy on the receiving SD-
   WAN node MAY determine which SA is selected.

   When a new IPsec SA is to be established using parameters carried in
   Sub-TLVs, such as the IPsec SA Rekey Counter Sub-TLV, IPsec Public
   Key Sub-TLV, and IPsec SA Proposal Sub-TLV, the receiving SD-WAN node
   MUST validate that the proposed IPsec transforms and algorithms are
   compatible with its local configuration.  These attributes, received
   via the Tunnel Encapsulation Attribute, define the parameters for
   establishing the IPsec tunnel between local and remote WAN ports.
   This compatibility check is performed at the IPsec layer, not by BGP.

   The C-PE devices do not attempt to negotiate IPsec SA parameters or
   transform sets with remote peers.  Instead, the configurations must
   match as advertised.  If there is a mismatch, either in the simple
   IPsec SA identifiers or in the detailed transform parameters, no
   tunnel is established.  Implementations MAY discard incompatible
   proposals or log them for operational visibility.

3.2.1.  Example creation of IPsec SA over SD-WAN Hybrid Tunnel

   This section provides an example illustrating how an IPsec SA is
   established over an SD-WAN Hybrid Tunnel.  Assume an IPsec tunnel is
   to be created between port P2 (198.51.100.10) on C-PE1 and port P2
   (192.0.2.1) on C-PE2.

   To establish this tunnel, C-PE1 must advertise the following
   attributes required for setting up the IPsec SA:

   *  NextHop: 198.51.100.10

   *  SD-WAN Node ID: 1.1.1.1

   *  SD-WAN-Site-ID: 1502

   *  Tunnel Encap Attr (Type = SD-WAN Hybrid Tunnel) -

      -  Extended Port Attribute Sub-TLV containing

         o  Transport Sub-Sub-TLV - with information on ISP.

Dunbar, et al.           Expires 10 October 2026               [Page 36]
Internet-Draft            SD-WAN Edge Discovery               April 2026

      -  IPsec information for detailed information about the ISP

      -  IPsec SA Rekey Counter Sub-TLV,

      -  IPsec SA Public Key Sub-TLV,

      -  Proposal Sub-TLV (type = ENCR, transform ID = 1)

         o  type: ENCR

         o  Transform ID: 1

         o  Tranform attributes = trans 1 [from RFC7296]

      -  No Tunnel Egress EndPoint Sub-TLV

         o  Without a Tunnel Egress EndPoint Sub-TLV, the SD-WAN Hybrid
            Tunnel processing treats this as though a Tunnel Egress
            EndPoint Sub-TLV with an AFI of 0 has been received.  Per
            [RFC9012] this assumes a tunnel egress endpoint of the
            NextHop value of 198.51.100.10.

   C-PE2 needs to advertise the following attributes for establishing
   the IPsec SA:

   Next Hop:  192.0.2.1

   SD-WAN Node ID:  2.2.2.2

   SD-WAN-Site-ID:  1500

   Tunnel Encap Attr (Type=SD-WAN)
      *  Extended Port Attribute Sub-TLV

         -  Transport Sub-Sub-TLV - with information on ISP.

      *  IPsec SA Rekey Counter Sub-TLV,

      *  IPsec SA Public Key Sub-TLV,

      *  IPSec Proposal Sub-TLV with

         -  transform type: ENCR

         -  Transform ID = 1

         -  Transform attributes = trans 2

Dunbar, et al.           Expires 10 October 2026               [Page 37]
Internet-Draft            SD-WAN Edge Discovery               April 2026

      *  No Tunnel Egress EndPoint Sub-TLV

         -  Without a Tunnel Egress EndPoint Sub-TLV, the SD-WAN Hybrid
            Tunnel processing treats this as though a Tunnel Egress
            EndPoint Sub-TLV with an AFI of 0 has been received.  Per
            [RFC9012] this assumes a tunnel egress endpoint of the
            NextHop value of 192.0.2.1.

   As there is no matching transform between the WAN ports P2 and P2 in
   C-PE1 and C-PE2, respectively, no IPsec Tunnel will be established.

4.  Manageability Considerations

   The BGP-based signaling mechanisms described in this document are
   primarily intended to enable SD-WAN edge nodes to advertise underlay
   transport and tunnel parameters to their RR.  These parameters, once
   received, can be monitored and validated using existing BGP
   monitoring tools such as BMP or route policy inspection frameworks.
   Operators SHOULD implement logging and alerting mechanisms for cases
   where inconsistent or malformed Sub-TLVs are received, as specified
   in Section 2.6.  Misaligned parameters, such as mismatched IPsec SA
   IDs or invalid NAT indicators, should trigger operational alerts to
   aid troubleshooting.

   No new MIB modules or YANG models are introduced in this document,
   but implementations are expected to expose relevant state (e.g.,
   tunnel type, advertised properties) via standard operational
   interfaces.  The use of secure transport connections (e.g., BGP over
   IPsec/TLS) is RECOMMENDED to ensure manageability in untrusted
   environments.

5.  Security Considerations

   This document defines BGP extensions for SD-WAN edge nodes to
   advertise their attributes for establishing IPsec SAs and underlay
   tunnel attributes, typically via a RR, which then propagates them to
   authorized SD-WAN peers.  These BGP UPDATEs may contain sensitive
   information such as public keys, IPsec proposals, and nonces.  In
   deployments where SD-WAN edge nodes communicate with the RR over
   public or untrusted networks, BGP SHOULD be run over TCP-AO secure
   transport that provides authentication and integrity for this data.

Dunbar, et al.           Expires 10 October 2026               [Page 38]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   Some network operators running SD-WAN edge over public or untrusted
   networks desire confidentiality as well as authentication and
   integrity.  In this case, network operators can consider running BGP
   over new IETF technologies (e.g. BGP over QUIC [draft-retana-idr-bgp-
   quic], BGP over TLS/TCP [draft-wirtgen-bgp-tls], or Securing BGPv4
   using IPsec [draft-ward-bgp-ipsec]) which provide authentication,
   confidentiality, and Integrity.

   These two sets of secure transport technologies for BGP provide
   different levels of protection against tampering or interception.
   These secure transport connections are needed to protect all fields,
   including cryptographic attributes, from tampering or interception.
   Without such protection, the system maybe vulnerable to spoofed
   tunnel attributes, unauthorized route injections, or replayed IPsec
   setup information.

   However, in closed or "walled garden" deployments, where SD-WAN edge
   nodes and the RR (SD-WAN controller) are within a trusted, secured
   environment (e.g., a private MPLS backbone or physically secured
   enterprise network), the risk of interception or tampering is
   significantly reduced.  In such cases, the use of secure transport is
   optional, and operators may choose to run BGP over standard TCP,
   based on their internal risk assessment.

   Regardless of the transport used, BGP policy enforcement remains
   critical.  The RR SHOULD apply strict filtering and policy controls
   to validate that only authorized SD-WAN edge nodes advertise specific
   Node IDs, Route Targets, or VPN identifiers.  While route origin
   validation via RPKI helps, it does not cover SD-WAN-specific fields
   like Tunnel attributes or SA proposals.  Local policies, when
   misconfigured, may introduce vulnerabilities; therefore, policy
   application points SHOULD be carefully audited.

   Many of the general BGP security risks discussed here are also
   covered in [RFC4271], [RFC4272], and [RFC9012].  This document
   inherits those considerations and introduces no new cryptographic
   requirements beyond what is described for securing BGP transport and
   validating the correctness of SD-WAN tunnel attribute exchanges.

   This specification does not define deployments across fully untrusted
   networks, but if such environments are used, strong transport
   security becomes a MUST, and additional validation mechanisms may be
   required to maintain SD-WAN tunnel and routing integrity.

6.  IANA Considerations

Dunbar, et al.           Expires 10 October 2026               [Page 39]
Internet-Draft            SD-WAN Edge Discovery               April 2026

6.1.  SD-WAN Overlay SAFI

   IANA has assigned SAFI = 74 as the SD-WAN SAFI.

6.2.  Tunnel Encapsulation Attribute Tunnel Type

   IANA is requested to assign a type from the BGP Tunnel Encapsulation
   Attribute Tunnel Types registry in the Border Gateway Protocol Tunnel
   Encapsulation Group as follows [RFC8126]:

    Value   Description    Reference
   -----   ------------   ---------
    25       SD-WAN-Hybrid   (this document)

6.3.  Tunnel Encapsulation Attribute Sub-TLV Types

   IANA is requested to assign the following sub-Types in the BGP Tunnel
   Encapsulation Attribute Sub-TLVs registry in the Border Gateway
   Protocol Tunnel Encapsulation Group:

      Value   Type Description            Reference     Section
      -----   -----------------------     ------------- -------
       64  IPsec SA ID                    This document  2.3.1
       65  Extended Port Attribute        This document  2.3.6
       66  Underlay Type                  This document  2.3.6.1
       67  IPsec SA Rekey Counter         This document  2.3.2
       68  IPsec Public Key               This document  2.3.3
       69  IPsec SA Proposal              This document  2.3.4
       70  Simplified IPsec               This document  2.3.5

6.4.  SD-WAN Edge Discovery NLRI Route Types

   IANA is requested to create a new registry titled "SD-WAN Edge
   Discovery NLRI Route Types" under the "Border Gateway Protocol (BGP)
   Parameters" group.  The allocation policy for this registry shall be
   IETF Review (as defined in RFC 8126):

    Value   Description                           Reference
   -----   ------------                           ---------
     1       SD-WAN Tunnel Endpoint NLRI Route Type   (this document)

     Values 2-255 are reserved for future assignments.

Dunbar, et al.           Expires 10 October 2026               [Page 40]
Internet-Draft            SD-WAN Edge Discovery               April 2026

6.5.  SD-WAN Extended Port Encapsulation Types

   IANA is requested to create a new registry titled "SD-WAN Extended
   Port Encapsulation Types" under the BGP Tunnel Encapsulation Group.

      Value   Type Description            Reference
      -----   -----------------------     -------------
       0      Reserved                    This document
       1      GRE                         This document
       2      VXLAN                       This document
       3~255  Reserved for future

6.6.  SD-WAN Extended Port Connection Types

   IANA is requested to create a new registry titled "SD-WAN Extended
   Port Connection Types" under the BGP Tunnel Encapsulation Group.

      Value   Type Description            Reference
      -----   -----------------------     -------------
       0      Reserved                    This document
       1      Wired                       This document
       2      WIFI                        This document
       3      LTE                         This document
       4      5G                          This document
       5~255  Unassigned
           255    Reserved for Experimental Use

6.7.  SD-WAN Extended Port Physical Port Types

   IANA is requested to create a new registry titled "SD-WAN Extended
   Port Physical Port Types" under the BGP Tunnel Encapsulation group.

      Value   Type Description            Reference
      -----   -----------------------     -------------
       0      Reserved                    This document
       1      Ethernet                    This document
       2      Fiber Cable                 This document
       3      Coax Cable                  This document
       4      Cellular                    This document
       5~255  Unassigned
       255    Reserved for Experimental Use

7.  References

7.1.  Normative References

Dunbar, et al.           Expires 10 October 2026               [Page 41]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   [MEF70.1]  MEF, "SD-WAN Service Attributes and Service Framework",
              November 2021, <https://www.mef.net/resources/mef-70-1-sd-
              wan-service-attributes-and-service-framework/>.

   [MEF70.2]  MEF, "SD-WAN Service Attributes and Service Framework",
              October 2023, <https://www.mef.net/resources/mef-70-2-sd-
              wan-service-attributes-and-service-framework/>.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC4271]  Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A
              Border Gateway Protocol 4 (BGP-4)", RFC 4271,
              DOI 10.17487/RFC4271, January 2006,
              <https://www.rfc-editor.org/info/rfc4271>.

   [RFC4301]  Kent, S. and K. Seo, "Security Architecture for the
              Internet Protocol", RFC 4301, DOI 10.17487/RFC4301,
              December 2005, <https://www.rfc-editor.org/info/rfc4301>.

   [RFC4360]  Sangli, S., Tappan, D., and Y. Rekhter, "BGP Extended
              Communities Attribute", RFC 4360, DOI 10.17487/RFC4360,
              February 2006, <https://www.rfc-editor.org/info/rfc4360>.

   [RFC4456]  Bates, T., Chen, E., and R. Chandra, "BGP Route
              Reflection: An Alternative to Full Mesh Internal BGP
              (IBGP)", RFC 4456, DOI 10.17487/RFC4456, April 2006,
              <https://www.rfc-editor.org/info/rfc4456>.

   [RFC4760]  Bates, T., Chandra, R., Katz, D., and Y. Rekhter,
              "Multiprotocol Extensions for BGP-4", RFC 4760,
              DOI 10.17487/RFC4760, January 2007,
              <https://www.rfc-editor.org/info/rfc4760>.

   [RFC7296]  Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., and T.
              Kivinen, "Internet Key Exchange Protocol Version 2
              (IKEv2)", STD 79, RFC 7296, DOI 10.17487/RFC7296, October
              2014, <https://www.rfc-editor.org/info/rfc7296>.

   [RFC7606]  Chen, E., Ed., Scudder, J., Ed., Mohapatra, P., and K.
              Patel, "Revised Error Handling for BGP UPDATE Messages",
              RFC 7606, DOI 10.17487/RFC7606, August 2015,
              <https://www.rfc-editor.org/info/rfc7606>.

Dunbar, et al.           Expires 10 October 2026               [Page 42]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   [RFC8126]  Cotton, M., Leiba, B., and T. Narten, "Guidelines for
              Writing an IANA Considerations Section in RFCs", BCP 26,
              RFC 8126, DOI 10.17487/RFC8126, June 2017,
              <https://www.rfc-editor.org/info/rfc8126>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

   [RFC8277]  Rosen, E., "Using BGP to Bind MPLS Labels to Address
              Prefixes", RFC 8277, DOI 10.17487/RFC8277, October 2017,
              <https://www.rfc-editor.org/info/rfc8277>.

   [RFC8489]  Petit-Huguenin, M., Salgueiro, G., Rosenberg, J., Wing,
              D., Mahy, R., and P. Matthews, "Session Traversal
              Utilities for NAT (STUN)", RFC 8489, DOI 10.17487/RFC8489,
              February 2020, <https://www.rfc-editor.org/info/rfc8489>.

   [RFC9012]  Patel, K., Van de Velde, G., Sangli, S., and J. Scudder,
              "The BGP Tunnel Encapsulation Attribute", RFC 9012,
              DOI 10.17487/RFC9012, April 2021,
              <https://www.rfc-editor.org/info/rfc9012>.

7.2.  Informative References

   [Net2Cloud]
              L. Dunbar, A Malis, C. Jacquenet, M. Toy and K. Majumdar,
              "Dynamic Networks to Hybrid Cloud DCs: Problem Statement
              and Mitigation Practice", September 2023,
              <https://datatracker.ietf.org/doc/draft-ietf-rtgwg-
              net2cloud-problem-statement/>.

   [RFC1997]  Chandra, R., Traina, P., and T. Li, "BGP Communities
              Attribute", RFC 1997, DOI 10.17487/RFC1997, August 1996,
              <https://www.rfc-editor.org/info/rfc1997>.

   [RFC4272]  Murphy, S., "BGP Security Vulnerabilities Analysis",
              RFC 4272, DOI 10.17487/RFC4272, January 2006,
              <https://www.rfc-editor.org/info/rfc4272>.

   [RFC4364]  Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private
              Networks (VPNs)", RFC 4364, DOI 10.17487/RFC4364, February
              2006, <https://www.rfc-editor.org/info/rfc4364>.

   [RFC4659]  De Clercq, J., Ooms, D., Carugi, M., and F. Le Faucheur,
              "BGP-MPLS IP Virtual Private Network (VPN) Extension for
              IPv6 VPN", RFC 4659, DOI 10.17487/RFC4659, September 2006,
              <https://www.rfc-editor.org/info/rfc4659>.

Dunbar, et al.           Expires 10 October 2026               [Page 43]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   [RFC4761]  Kompella, K., Ed. and Y. Rekhter, Ed., "Virtual Private
              LAN Service (VPLS) Using BGP for Auto-Discovery and
              Signaling", RFC 4761, DOI 10.17487/RFC4761, January 2007,
              <https://www.rfc-editor.org/info/rfc4761>.

   [RFC4762]  Lasserre, M., Ed. and V. Kompella, Ed., "Virtual Private
              LAN Service (VPLS) Using Label Distribution Protocol (LDP)
              Signaling", RFC 4762, DOI 10.17487/RFC4762, January 2007,
              <https://www.rfc-editor.org/info/rfc4762>.

   [RFC4835]  Manral, V., "Cryptographic Algorithm Implementation
              Requirements for Encapsulating Security Payload (ESP) and
              Authentication Header (AH)", RFC 4835,
              DOI 10.17487/RFC4835, April 2007,
              <https://www.rfc-editor.org/info/rfc4835>.

   [RFC5114]  Lepinski, M. and S. Kent, "Additional Diffie-Hellman
              Groups for Use with IETF Standards", RFC 5114,
              DOI 10.17487/RFC5114, January 2008,
              <https://www.rfc-editor.org/info/rfc5114>.

   [RFC5701]  Rekhter, Y., "IPv6 Address Specific BGP Extended Community
              Attribute", RFC 5701, DOI 10.17487/RFC5701, November 2009,
              <https://www.rfc-editor.org/info/rfc5701>.

   [RFC5903]  Fu, D. and J. Solinas, "Elliptic Curve Groups modulo a
              Prime (ECP Groups) for IKE and IKEv2", RFC 5903,
              DOI 10.17487/RFC5903, June 2010,
              <https://www.rfc-editor.org/info/rfc5903>.

   [RFC6793]  Vohra, Q. and E. Chen, "BGP Support for Four-Octet
              Autonomous System (AS) Number Space", RFC 6793,
              DOI 10.17487/RFC6793, December 2012,
              <https://www.rfc-editor.org/info/rfc6793>.

   [RFC7018]  Manral, V. and S. Hanna, "Auto-Discovery VPN Problem
              Statement and Requirements", RFC 7018,
              DOI 10.17487/RFC7018, September 2013,
              <https://www.rfc-editor.org/info/rfc7018>.

   [RFC8092]  Heitz, J., Ed., Snijders, J., Ed., Patel, K., Bagdonas,
              I., and N. Hilliard, "BGP Large Communities Attribute",
              RFC 8092, DOI 10.17487/RFC8092, February 2017,
              <https://www.rfc-editor.org/info/rfc8092>.

   [RFC8221]  Wouters, P., Migault, D., Mattsson, J., Nir, Y., and T.
              Kivinen, "Cryptographic Algorithm Implementation
              Requirements and Usage Guidance for Encapsulating Security

Dunbar, et al.           Expires 10 October 2026               [Page 44]
Internet-Draft            SD-WAN Edge Discovery               April 2026

              Payload (ESP) and Authentication Header (AH)", RFC 8221,
              DOI 10.17487/RFC8221, October 2017,
              <https://www.rfc-editor.org/info/rfc8221>.

   [SD-WAN-BGP-USAGE]
              L. Dunbar, A Sajassi, J Drake, and B. Najem, "BGP Usage
              for SD-WAN Overlay Networks", September 2023,
              <https://datatracker.ietf.org/doc/draft-ietf-bess-bgp-
              sdwan-usage/>.

   [Secure-EVPN]
              A Sajassi, A. Banerjee, S. Thoria, D. Carrell, B. Weis, J.
              Drake, "Secure EVPN", November 2024,
              <https://datatracker.ietf.org/doc/draft-ietf-bess-secure-
              evpn/>.

Appendix A.  Acknowledgments

   Acknowledgements to Wang Haibo, Shunwan Zhuang, Hao Weiguo, and
   ShengCheng for implementation contribution.  Many thanks to Yoav Nir,
   Graham Bartlett, Jim Guichard, John Scudder, and Donald Eastlake for
   their review and suggestions.

Contributors

   Below is a list of other contributing authors:

   *  Gyan Mishra,

   *  Shunwan Zhuang,

   *  Sheng Cheng, and

   *  Donald Eastlake.

Authors' Addresses

   Linda Dunbar
   Futurewei
   Dallas, TX,
   United States of America
   Email: ldunbar@futurewei.com

   Susan Hares
   Huawei
   United States of America
   Email: shares@ndzh.com

Dunbar, et al.           Expires 10 October 2026               [Page 45]
Internet-Draft            SD-WAN Edge Discovery               April 2026

   Kausik Majumdar
   Oracle
   California,
   United States of America
   Email: kausik.majumdar@oracle.com

   Robert Raszuk
   Arrcus
   United States of America
   Email: robert@raszuk.net

   Venkit Kasiviswanathan
   Arista
   United States of America
   Email: venkit@arista.com

Dunbar, et al.           Expires 10 October 2026               [Page 46]