%% You should probably cite rfc7364 instead of this I-D. @techreport{ietf-nvo3-overlay-problem-statement-04, number = {draft-ietf-nvo3-overlay-problem-statement-04}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-nvo3-overlay-problem-statement/04/}, author = {Dr. Thomas Narten and Eric Gray and David L. Black and Luyuan Fang and Larry Kreeger and Maria Napierala}, title = {{Problem Statement: Overlays for Network Virtualization}}, pagetotal = 23, year = 2013, month = jul, day = 31, abstract = {This document describes issues associated with providing multi-tenancy in large data center networks and how these issues may be addressed using an overlay-based network virtualization approach. A key multi-tenancy requirement is traffic isolation so that one tenant's traffic is not visible to any other tenant. Another requirement is address space isolation so that different tenants can use the same address space within different virtual networks. Traffic and address space isolation is achieved by assigning one or more virtual networks to each tenant, where traffic within a virtual network can only cross into another virtual network in a controlled fashion (e.g., via a configured router and/or a security gateway). Additional functionality is required to provision virtual networks, associating a virtual machine's network interface(s) with the appropriate virtual network and maintaining that association as the virtual machine is activated, migrated, and/or deactivated. Use of an overlay-based approach enables scalable deployment on large network infrastructures.}, }