LISP Virtual Private Networks (VPNs)
draft-lewis-lisp-vpns-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Darrel Lewis , Gregg Schudel | ||
Last updated | 2014-08-18 (Latest revision 2014-02-14) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document describes the use of the Locator/ID Separation Protocol (LISP) to create Virtual Private Networks (VPNs). LISP is used to provide segmentation in both the LISP data plane and control plane. These IP based VPNs can be created over the top of the Internet or other VPN protocols, and can be implemented by Enterprise or Service Provider type networks. The goal of these VPNs is to leverage the characteristics of LISP - routing scalability, simply expressed Ingress site TE Policy, IP Address Family traversal, and mobility, in ways that provide value to network operators.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)