Network Working Group                                        L. Dunbar
Internet Draft                                               Futurewei
Intended status: Informational                              A. Sajassi
Expires: June 3, 2025                                         Cisco
                                                             J. Drake
                                                          Independent
                                                             B. Najem
                                                          Bell Canada
                                                             S. Hares
                                                         April 7, 2026


                  BGP Usage for SD-WAN Overlay Networks
                   draft-ietf-bess-bgp-sdwan-usage-30

Abstract
   This document explores the complexities involved in managing large
   scale Software Defined WAN (SD-WAN) overlay networks, along with
   various SD-WAN scenarios. Its objective is to illustrate how a
   BGP-based control plane can effectively manage these overlay
   networks by distributing edge service reachability information,
   WAN port attributes, and underlay path details, thereby minimizing
   manual provisioning.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current
   Internet-Drafts is at
   https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six
   months and may be updated, replaced, or obsoleted by other
   documents at any time.  It is inappropriate to use Internet-Drafts
   as reference material or to cite them other than as "work in
   progress."








xxx, et al.                                                   [Page 1]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

Copyright Notice

   Copyright (c) 2026 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with
   respect to this document. Code Components extracted from this
   document must include Simplified BSD License text as described in
   Section 4.e of the Trust Legal Provisions and are provided without
   warranty as described in the Simplified BSD License.

Table of Contents

   1. Introduction...................................................3
   2. Conventions used in this document..............................4
   3. SD-WAN Scenarios and Their Requirements........................6
      3.1. SD-WAN Functional Overview................................6
         3.1.1. Supporting SD-WAN Segmentation.......................6
         3.1.2. Client Service Requirement...........................7
         3.1.3. SD-WAN Traffic Segmentation..........................7
         3.1.4. Zero Touch Provisioning..............................8
         3.1.5. Constrained Propagation of SD-WAN Edge Properties....9
      3.2. Scenario #1: Homogeneous Encrypted SD-WAN................10
      3.3. Scenario #2: Differential Encrypted SD-WAN...............11
      3.4. Scenario #3: Private VPN PE based SD-WAN.................13
   4. Provisioning Model............................................14
      4.1. Client Service Provisioning Model........................14
      4.2. Policy Configuration.....................................15
      4.3. IPsec Related Parameters Provisioning....................15
   5. BGP Controlled SD-WAN.........................................16
      5.1. Rationale for Using BGP as Control Plane for SD-WAN......16
      5.2. BGP Scenario for Homogeneous Encrypted SD-WAN............17
      5.3. BGP Scenario for Differential Encrypted SD-WAN...........18
      5.4. BGP Scenario for Flow-Based Segmentation.................19
   6. SD-WAN Forwarding Model.......................................21
      6.1. Forwarding Model for Homogeneous Encrypted SD-WAN........21
         6.1.1. Network and Service Startup Procedures..............21
         6.1.2. Packet Walk-Through.................................21
      6.2. Forwarding Model for Hybrid Underlay SD-WAN..............22
         6.2.1. Network and Service Startup Procedures..............22
         6.2.2. Packet Walk-Through.................................23


Dunbar, et al.                                                [Page 2]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

      6.3. Forwarding Model for PE based SD-WAN.....................24
         6.3.1. Network and Service Startup Procedures..............24
         6.3.2. Packet Walk-Through.................................24
   7. Manageability Considerations..................................25
   8. Security Considerations.......................................26
   9. IANA Considerations...........................................28
   10. References...................................................28
      10.1. Normative References....................................28
      10.2. Informative References..................................28
   11. Acknowledgments..............................................31

1. Introduction

   Software Defined Wide Area Network (SD-WAN), as described in
   [MEF70.2], provides overlay connectivity services that optimize
   the transport of IP packets across one or more underlay networks
   by identifying traffic types and applying policies to determine
   forwarding behavior. Key characteristics of SD-WAN networks
   include:

     - Transport Augmentation: an SD-WAN path can utilize different
       types of underlay networks, including private networks (with
       or without encryption) and public networks (requiring
       encryption).
     - Direct Internet Breakout: Traffic from remote branch offices
       can directly access the internet, avoiding backhauling to
       corporate headquarters for centralized policy control.
     - Policy-Based Traffic Steering: Traffic can be directed over
       specific overlay paths based on predefined conditions, such as
       matching one or multiple fields in the IP header, rather than
       solely relying on destination IP addresses [RFC9522]. For IPv6
       [RFC8200], attributes like the Flow Label, source address,
       specific extension header fields, or a combination of these
       can be used. Additional details are available in Tables 8 and
       9 of [MEF70.2].
     - Performance-Based Forwarding: Traffic can be steered based on
       performance metrics (e.g., packet delay, loss, jitter),
       selecting the underlay path that meets or exceeds policy
       requirements.

   This document outlines SD-WAN use cases and the operational
   challenges of managing large-scale SD-WAN overlay networks. While
   [Net2Cloud-Problem] identifies general issues encountered when


Dunbar, et al.                                                [Page 3]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

   interconnecting networks to cloud environments, this document
   focuses specifically on how a BGP-based control plane addresses
   those challenges within SD-WAN deployments. Additional operational
   drivers for standardized protocol behavior are summarized in
   Section 6 of [MPLIFY-119].

   It's important to distinguish the BGP instance as the control
   plane for SD-WAN overlay from the BGP instances governing the
   underlay networks. The document assumes a secure channel between
   the SD-WAN controller and SD-WAN edges for exchanging control
   plane information. In this document, references to "the Route
   Reflector (RR)" denote the RR instance(s) designated by the SD-WAN
   controller to distribute SD-WAN routing information. Deployments
   may integrate the controller and RR or keep them as separate
   components; the SD-WAN control plane is logically centralized but
   may be physically realized by a set of distributed controller/RR
   instances operating as a coordinated system for scalability,
   resiliency, and geographic redundancy, with the RR remaining the
   logical control point for SD-WAN route distribution and policy
   enforcement as described in this document; the mechanisms for
   coordination and state synchronization among multiple RR instances
   are out of the scope of this document.

   This document captures the SD-WAN scenarios, control-plane
   behaviors, and forwarding considerations that motivate current and
   future IETF work on SD-WAN. Publishing this material as an RFC
   provides a stable, citable foundation for related protocol
   specifications and ensures a shared understanding of the problem
   space across the industry. Although BGP and IPsec are mature
   technologies, applying them to SD-WAN introduces challenges such
   as scalability, segmentation, and multi-homing. By documenting how
   these mechanisms are used in SD-WAN deployments, this document
   enables consistent interpretations and supports interoperability
   without defining new protocols.

2. Conventions used in this document

   Cloud DC:   Third party data centers that host applications and
               workloads owned by different organizations or tenants.

   Controller: Used interchangeably with SD-WAN controller to denote
               the logical system that manages the SD-WAN overlay


Dunbar, et al.                                                [Page 4]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

               network. In a BGP-controlled SD-WAN, the controller
               may include a Route Reflector (RR) function for BGP
               route propagation and policy-based distribution of SD-
               WAN routing information. The RR function may be
               collocated with, embedded in, or otherwise integrated
               with the SD-WAN controller, but it represents only one
               component of the overall controller.

   Client service: A service (e.g., IP prefix or VLAN) attached to
               the client-facing interface of an SD-WAN edge.

   Client route: A BGP-advertised route originated by an SD-WAN edge
               that represents the reachability of a client-facing
               service (e.g., IP prefix or VLAN) and includes
               associated path attributes used by the SD-WAN
               Controller for policy enforcement and forwarding
               decisions.

   C-PE:       SD-WAN edge, which can be Customer Premises Equipment
               (CPE) for customer-managed SD-WAN, or Provider Edge
               (PE) for provider-managed SD-WAN services.

   Homogeneous Encrypted SD-WAN: An SD-WAN network in which all
               traffic to/from the SD-WAN edges are carried by IPsec
               tunnels regardless of underlying networks. I.e., the
               client traffic is carried by IPsec tunnel even over
               MPLS private networks.

   NSP:        Network Service Provider.

   PE:         Provider Edge

   SD-WAN edge:   A device, either physical or virtual, that
               participates in the SD-WAN overlay network. These
               nodes advertise client routes to the SD-WAN Controller
               (e.g., BGP RR).

   SD-WAN:     An overlay connectivity service that optimizes the
               transport of IP packets over one or more Underlay
               connectivity services by recognizing applications and
               determining forwarding behavior by applying policies
               to them. [MEF-70.2].


Dunbar, et al.                                                [Page 5]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

   SD-WAN IPsec SA: IPsec Security Association [RFC4301] between two
               WAN ports of the SD-WAN edges or between two SD-WAN
               edges.

   SD-WAN over Hybrid Underlay Networks: SD-WAN over Hybrid Underlay
               Networks typically have edge nodes utilizing bandwidth
               resources from different types of underlay networks,
               some being private networks and others being public
               Internet.

   WAN Port:   A Port or Interface facing a Network Service Provider
               (NSP), with an address allocated by the NSP.

   Private VPN: refers to a VPN that is supported wholly by a single
               network service provider without using any elements of
               the public Internet and without any traffic passing
               out of the immediate control of that service provider.

   Zero Touch Provisioning (ZTP): a network automation approach that
               enables automatic provisioning and configuration of
               SD-WAN devices, such as routers and switches, at
               remote locations without manual intervention.


3. SD-WAN Scenarios and Their Requirements

   This section outlines the core requirements for SD-WAN overlay
   networks and introduces various SD-WAN scenarios. These scenarios
   serve as examples that are further explored in subsequent sections
   to illustrate how the BGP control plane is used to distribute
   reachability and policy information within SD-WAN overlay
   networks.

3.1. SD-WAN Functional Overview

3.1.1. Supporting SD-WAN Segmentation

   "SD-WAN Segmentation" refers to policy-driven network
   partitioning, a common approach in SD-WAN deployment. An SD-WAN
   segment is essentially a virtual private network (SD-WAN VPN)
   consisting of a set of edge nodes interconnected by tunnels, such
   as IPsec tunnels and/or MPLS VPN tunnels.




Dunbar, et al.                                                [Page 6]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

   This document assumes that SD-WAN VPN configuration on PE devices
   will, as with MPLS VPN, make use of VRFs [RFC4364] [RFC4659].
   Notably, a single SD-WAN VPN can be mapped to one or multiple
   virtual topologies governed by the SD-WAN controller's policies.

   When BGP is used for SD-WAN, the client route UPDATE is the same
   as MPLS VPN. The Route Target in the BGP Extended Community
   [RFC4360] can differentiate the routes belonging to different SD-
   WAN VPNs.

   As SD-WAN is an overlay network arching over multiple types of
   networks, MPLS L2VPN [RFC4761] [RFC4762]/L3VPN [RFC4364] [RFC4659]
   or pure L2 underlay can continue using the VPN ID (Virtual Private
   Network Identifier), VN-ID (Virtual Network Identifier), or VLAN
   (Virtual LAN) in the data plane to differentiate packets belonging
   to different SD-WAN VPNs. For packets transported through an IPsec
   tunnel, additional encapsulation, such as GRE [RFC2784] or VxLAN
   [RFC7348], is needed to embed the SD-WAN VPN identifier inside the
   IPsec ESP header.

   Section 3.1.3 further elaborates on traffic segmentation by
   providing operational examples and detailing how segmentation
   policies apply to individual flows; the two sections describe the
   same concept at different levels of granularity.

3.1.2. Client Service Requirement

   The client service requirements describe the SD-WAN edge's ports,
   also known as SD-WAN client interfaces, which connect the client
   network to the SD-WAN service.

   The SD-WAN client interface should support IPv4 & IPv6 addresses
   as well as Ethernet in accordance with the [IEEE802.3] standard.

   In [MEF 70.2], the "SD-WAN client interface" is called SD-WAN UNI
   (User Network Interface). Section 4 of [MEF 70.2] defines a
   comprehensive set of attributes for the SD-WAN UNI, detailing the
   expected behavior and requirements to enable seamless connectivity
   to the client network.

   The client service at the SD-WAN edge must support the SD-WAN UNI
   service attributes outlined in Section 4 of [MEF 70.2].

3.1.3. SD-WAN Traffic Segmentation

   SD-WAN Traffic Segmentation allows traffic to be separated based
   on business priorities, security requirements, and operational
   needs. This ensures that different user groups or services can


Dunbar, et al.                                                [Page 7]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

   operate within distinct topologies or follow tailored policies to
   meet specific business and security objectives.

   For example, in a retail environment, traffic from point-of-sales
   (PoS) systems may require a different topology that is separate
   from other traffic. The PoS traffic is routed exclusively to the
   payment processing entity at a central hub site, while other types
   of traffic can be routed among all branches or remote sites.

   In the figure below, traffic from the PoS system follows a tree
   topology (denoted as "----" in the figure below), whereas other
   traffic can follow a multipoint-to-multipoint topology (denoted as
   "===").

                              +--------+
              Payment traffic |Payment |
                +------+----+-+gateway +------+----+-----+
               /      /     | +----+---+      |     \     \
              /      /      |      |          |      \     \
           +-+--+  +-+--+  +-+--+  |   +-+--+  +-+--+  +-+--+
           |Site|  |Site|  |Site|  |   |Site|  |Site|  |Site|
           | 1  |  |  2 |  | 3  |  |   |4   |  |  5 |  | 6  |
           +--+-+  +--+-+  +--|-+  |   +--|-+  +--|-+  +--|-+
              |       |       |    |      |       |       |
            ==+=======+=======+====+======+=======+=======+===
         Figure 1 Differentiated Traffic Topologies

   Another example is an enterprise that wants to isolate traffic by
   departments, ensuring each department having its own unique
   topology and policies. For instance, the HR department may need to
   access specific systems or resources that are not accessible by
   the engineering department. Similarly, contractors may have
   limited access to the enterprise resources.

3.1.4. Zero Touch Provisioning

   SD-WAN Zero-Touch Provisioning (ZTP) is a network automation
   approach that enables the automatic provisioning and configuration
   of SD-WAN devices, such as routers and switches, at remote
   locations without requiring manual intervention. ZTP allows
   devices to be shipped with factory default settings; upon
   connection to the network, they automatically retrieve their
   configurations. ZTP for a remote SD-WAN edge usually includes the
   following steps:



Dunbar, et al.                                                [Page 8]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

     - The SD-WAN edge's customer information and unique device
     identifier (e.g., serial number, MAC address, or factory-
     assigned ID) are registered with a SD-WAN Device Onboarding
     Server, a remote system such as an enterprise HQ platform or
     cloud-based provisioning portal used for Zero-Touch
     Provisioning.

     - Upon power-up, the SD-WAN edge can establish the transport
     layer secure connection [RFC8446] to its Device Onboarding
     Server, whose URL (or IP address) and credential for connection
     request can be preconfigured on the edge device by the
     manufacturer, external USB drive or secure Email given to the
     installer. The external USB method involves providing the
     installer with a pre-configured USB flash drive containing the
     necessary configuration files and settings for the SD-WAN
     device. The secure Email approach entails sending a secure email
     containing the configuration details for the SD-WAN device.

     - The SD-WAN Device Onboarding Server authenticates the ZTP
     request from the remote SD-WAN edge with its configurations.
     Once the authentication is successful, it can designate a SD-WAN
     controller near the SD-WAN edge to pass down the initial
     configurations via the secure channel. The SD-WAN controller
     manages and monitors the communication policies for traffic
     to/from the edge node.



3.1.5. Constrained Propagation of SD-WAN Edge Properties

   For an IPsec tunnel to be established between two edges for data
   exchange, both edges need to know each other's network properties,
   such as the IP addresses of the WAN ports, the edges' loopback
   addresses, the attached client routes, the supported encryption
   methods, etc., which are learned via BGP UPDATEs exchanged through
   the RR.

   In many cases, an SD-WAN edge is authorized to communicate with
   only a subset of other edge nodes. To maintain security and
   privacy, the property of an SD-WAN edge must not be propagated to
   unauthorized peers. However, when a remote SD-WAN edge powers up,
   it may lack the policies to determine which peers are authorized
   to communicate. Therefore, SD-WAN deployment needs to have a
   central point to distribute the properties of an SD-WAN edge to
   its authorized peers.



Dunbar, et al.                                                [Page 9]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026


   BGP is well suited for this purpose. A Route-Reflector (RR)
   [RFC4456], integrated into the SD-WAN controller, enforces
   policies governing the communication among SD-WAN edges. The RR
   ensures that BGP UPDATE messages from an SD-WAN edge are
   propagated only to other edges within the same SD-WAN VPN.

   An SD-WAN edge must use a secure channel, such as TLS [RFC5246]
   [RFC8446] or IPsec, to its designated RR for exchanging BGP UPDATE
   messages.



                              +---+
          Authorized Peers G1 |RR |   Authorized Peer G2
                +======+====+=+   +======+====+=====+
               /      /     | +---+      |     \     \
              /      /      |            |      \     \
           +-+--+  +-+--+  +-+--+      +-+--+  +-+--+  +-+--+
           |C-PE|  |C-PE|  |C-PE|      |C-PE|  |C-PE|  |C-PE|
           | 1  |  |  2 |  | 3  |      |4   |  |  5 |  | 6  |
           +----+  +----+  +----+      +----+  +----+  +----+
                Tenant 1                   Tenant 2
          Figure 2: Authorized Peer Groups managed by RR


   Tenant separation is achieved by the SD-WAN VPN identifiers
   represented in the control plane and data plane, respectively.



3.2. Scenario #1: Homogeneous Encrypted SD-WAN

   Homogeneous Encrypted SD-WAN refers to an SD-WAN network where
   edge nodes encrypt all client traffic destined to other edge
   nodes, regardless of whether the underlay is private or public.

   Typical use cases for Homogeneous Encryption:

   -  A small branch office connecting to its headquarters via the
   Internet. All traffic to and from this small branch office must be
   encrypted, usually achieved by IPsec Tunnels [RFC4301].

   -  A retail store in a shopping mall may need to securely connect
   to its services hosted in one or more Cloud DCs via the Internet.


Dunbar, et al.                                               [Page 10]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

   A common method involves establishing IPsec SAs with the Cloud DC
   gateway to securely transport sensitive data to/from the store.

   The granularity of the IPsec SAs for Homogeneous Encryption can be
   per site, per subnet, per tenant, or per address. Once the IPsec
   SA is established for a specific subnet/tenant/site, all traffic
   to/from the subnet/tenant/site is encrypted.


                                     +---+
                      +--------------|RR |------------+
                     /  trusted      +-+-+             \
                    /                                   \
                   /                                     \
     +----+  +---------+                             +------+  +----+
     | CN3|--|         P1-----+ -------------+------ P1     |--| CN3|
     +----+  | C-PE1   P2-----+              |       | C-PE2|  +----+
     +----+  |         P3-----+     Wide     +------ P2     |  +----+
     | CN2|--|         |      |     area     +------ P3     |--| CN1|
      +-+--+  +---------+      |   network    |       +------+  +-+--+
        \                     |              |                  /
         \   +---------+      | all packets  |       +------+  /
          +--|         P1-----+ encrypted    +------ P1     |-+
              | C-PE3   P2-----+     by       |       | C-PE4|
     +----+  |         P3-----+ IPsec SAs    +------ P2     |  +----+
      | CN1|--|         P4-----+--------------+       |      |--| CN2|
      +----+  +---------+                             +------+  +----+

   CN: Client Networks, which is same as Tenant Networks used by NVo3
                Figure 3: Homogeneous Encrypted SD-WAN

   A Homogeneous Encrypted SD-WAN shares certain similarities with
   traditional IPsec VPN. However, unlike IPsec VPNs, which are
   typically deployed in a point-to-point fashion among a limited
   number of nodes, SD-WAN networks can comprise a large number of
   edge nodes, all centrally managed by a controller responsible for
   configurations and policies across the network.

   Existing private VPNs (e.g., MPLS based) can use Homogeneous
   Encrypted SD-WAN to extend over the public network to remote sites
   to which the VPN operator does not own or lease infrastructural
   connectivity.

3.3. Scenario #2: Differential Encrypted SD-WAN

   Differential Encrypted SD-WAN refers to an SD-WAN network that
   utilizes hybrid underlays, combining private VPNs and the public
   Internet. In this model, traffic traversing the private VPN is
   forwarded natively without encryption, while traffic over the


Dunbar, et al.                                               [Page 11]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

   public Internet is encrypted for security. This approach balances
   performance and security. Since IPsec encryption requires
   significant processing power and traffic over the public Internet
   typically lacks the premium SLA (Service Level Agreement) provided
   by private VPNs-especially over long distances-current practice is
   to forward traffic over private VPNs without encryption,
   leveraging the inherent reliability and security of the private
   network. Meanwhile, encryption is applied only to traffic routed
   over the public Internet to ensure data confidentiality.

   One C-PE might have the Internet-facing WAN ports managed by
   different NSPs with the WAN ports' addresses assigned by the
   corresponding NSPs. Clients may define specific policies to govern
   how traffic flows across the network, such as:

   1) Certain flows can only be forwarded over private VPNs.
   2) Certain flows can be forwarded over either private VPNs or the
     public Internet. When forwarded over the public Internet, the
     packets are encrypted.
   3) Some flows, especially Internet-bound browsing ones, can be
     handed off to the Internet without further encryption.

   For example, consider a flow traversing multiple segments, A<->B,
   B<->C, C<->D, has Policy 2) above. This flow can cross different
   underlays in different segments, such as over Private underlay
   between A<->B without encryption or over the public Internet
   between B<->C protected by an IPsec SA.

   In the figure below, each C-PE has both Internet-facing and
   private-VPN interfaces (e.g., A1, B2, C3, and D2 connect to the
   Internet, while others connect to the private VPN). The WAN ports'
   addresses can be allocated by the service providers or dynamically
   assigned (e.g., by DHCP).
















Dunbar, et al.                                               [Page 12]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026


                                       +---+
                        +--------------|RR |----------+
                       /               +-+-+           \
                      /                                 \
                     /                                   \
     +----+  +---------+  packets encrypted over     +------+  +----+
     | CN3|--|         A1-----+ Untrusted    +------ B1     |--| CN1|
     +----+  | C-PE1   A2-\                          | C-PE2|  +----+
     +----+  |         A3--+--+              +---+---B2     |  +----+
     | CN2|--|         |   |PE+--------------+PE |---B3     |--| CN3|
     +----+  +---------+   +--+   trusted    +---+   +------+  +----+
                              |      WAN     |
     +----+  +---------+   +--+   packets    +---+   +------+  +----+
     | CN1|--|         C1--|PE| go natively  |PE |-- D1     |--| CN1|
     +----+  | C-PE3   C2--+--+ without encry+---+   | C-PE4|  +----+
             |         |      +--------------+       |      |
             |         |                             |      |
     +----+  |         |      without encrypt over   |      |  +----+
     | CN2|--|         C3--+---- Untrusted  --+------D2     |--| CN2|
     +----+  +---------+                             +------+  +----+

     CN: Client Network
       Figure4: SD-WAN with Internet facing ports (A1,B2,C3,D2)



   Services may not be congruent, i.e., the packets from A-> B may
   traverse one underlay network, and the packets from B -> A may go
   over a different underlay.


3.4. Scenario #3: Private VPN PE based SD-WAN

   Private VPN PE-Based SD-WAN refers to extending an existing VPN
   (e.g., EVPN [RFC7432] or IPVPN) by adding additional ports that
   face the public Internet to address increased bandwidth
   requirements between Provider Edge (PE) devices. This approach
   allows VPN service providers to augment their networks without
   immediately committing to building or leasing new infrastructure.

   Key Characteristics of Private VPN PE-Based SD-WAN:

       - For MPLS-based VPN, traffic between PEs uses MPLS
          encapsulation within IPsec tunnels egressing the Internet
          WAN ports, such as MPLS-in-IP or GRE-in-IPsec.




Dunbar, et al.                                               [Page 13]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

       - The BGP RR remains connected to the PEs via the same
          trusted network as the original VPN, ensuring consistency
          in routing policies and security.

   The main use case for Private VPN PE-Based SD-WAN is Temporary
   Bandwidth Expansion.



                                   +---+
                           +======>|PE2|
                         //        +---+
                        //          ^
                       //           || VPN
                      //     VPN    v
                      |PE1| <====> |RR| <=>   |PE3|
                      +-+-+        +--+       +-+-+
                        |                       |
                        +--- Public Internet -- +
                                 Offload
          Figure 5: Additional Internet paths added to the VPN

     For Ethernet-based client traffic, Private VPN PE based SD-WAN
     should support VLAN-based service interfaces (EVPN Instances),
     VLAN bundle service interfaces, or VLAN-Aware bundling service
     interfaces. EVPN service requirement as described in Section 3.1
     of [RFC8388] are applicable to the SD-WAN Ethernet-based Client
     services. For IP-based client interfaces, L3VPN service
     requirements are applicable.


4. Provisioning Model

   This section defines the provisioning model, i.e., a conceptual
   framework that scopes the roles (controller/RR and edges), the
   artifacts (client-service constructs, policies, and IPsec
   parameters), and their mapping to BGP attributes.

4.1. Client Service Provisioning Model

   Provisioning of client services in an SD-WAN network can leverage
   approaches similar to those used for VRFs (Virtual Routing and
   Forwarding) in MPLS based VPNs [RFC4364] [RFC4659]. A client VPN
   can define communication policies by specifying BGP Route Targets
   for import and export. Alternatively, policy-based filtering using


Dunbar, et al.                                               [Page 14]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

   ACLs (Access Control List) can be employed to control which routes
   are allowed or denied for a given client VPN.

   In scenarios where an SD-WAN edge is dedicated to a single client
   with a single virtual network, all services attached to the client
   facing interface(s) on the edge node can be grouped into a single
   VRF. The RR can manage the policies for import/export policies for
   that VRF.

4.2. Policy Configuration

   Policy configuration is a key characteristic of an SD-WAN service,
   enabling packets to be forwarded over multiple types of underlays
   based on predefined rules. Policies determines which underlay
   paths are allowed to carry specific flows, as outlined in Section
   8 of [MEF70.2]. A flow is a collection of packets between the same
   source and destination pair that are subject to the same
   forwarding and policy decisions at the ingress SD-WAN edge and are
   identified by the settings of one or more fields in the packet
   headers. For example, client-service-x can only be mapped to a
   MPLS topology, ensuring traffic alignment with business or
   security requirements.

4.3. IPsec Related Parameters Provisioning

   IPsec-related parameter provision in an SD-WAN network involves
   the negotiation and distribution of cryptographic parameters
   required to establish IPsec tunnels among them. To streamline the
   configuration process, SD-WAN edges can retrieve those parameters
   directly from the SD-WAN controller, reducing manual intervention
   and ensuring consistency.

   In a BGP-controlled SD-WAN, BGP UPDATE messages can be extended to
   propagate IPsec-related attributes for each SD-WAN edge. This
   approach allows peers to receive and apply compatible
   cryptographic parameters distributed over a secure channel between
   the SD-WAN edge and its BGP RR, thereby simplifying IPsec tunnel
   establishment and reducing reliance on traditional IKEv2
   negotiation [RFC7296].

   This mechanism supports the ZTP requirement outlined in Section
   3.1.4 by enabling IPsec tunnels to be provisioned without IKEv2
   negotiation.





Dunbar, et al.                                               [Page 15]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

5. BGP Controlled SD-WAN

5.1. Rationale for Using BGP as Control Plane for SD-WAN

   In small SD-WAN networks with a modest number of nodes,
   traditional approaches such as the hub-and-spoke model, employing
   Next Hop Resolution Protocol (NHRP)[RFC2332] or a centralized hub
   managing edge nodes, including the mapping of local and public
   addresses along with tunnel identifiers, has proven effective.
   However, for larger SD-WAN networks, with more than 100 nodes and
   encompassing diverse underlays, the conventional approach becomes
   increasingly complex, error-prone, and difficult to manage.

   BGP offers several key advantages when used as the control plane
   for a large SD-WAN:

   -  Simplified peer authentication process:

     With a secure channel established between each edge node and its
     RR, the RR can perform peer authentication on behalf of the edge
     node. The RR has policies on peer communication and the built-in
     capability to constrain the propagation of the BGP UPDATE
     messages to the authorized edge nodes only.

   - Scalable IPsec tunnel management

     In networks with multiple IPsec tunnels between SD-WAN edges,
     BGP can simplify tunnel management by using the SD-WAN edge
     discovery mechanism defined in [SD-WAN-Discovery] to advertise
     WAN-port properties and IPsec-related parameters. These BGP
     attributes allow peers to learn tunnel endpoints and associated
     parameters via the control plane and to associate advertised
     client routes with the appropriate IPsec SAs, thereby reducing
     manual configuration and enabling scalable, consistent tunnel
     establishment across the SD-WAN.

     Unlike traditional IPsec VPN where IPsec tunnels between two
     edge nodes are treated as independent parallel links requiring
     duplicated control plane messages for load sharing, BGP in an
     SD-WAN context can associate multiple service flows with shared
     tunnel parameters, reducing repeated signaling.

   - Simplified traffic selection configurations

     BGP can simplify the configuration of IPsec tunnel associations
     and related forwarding policies. By leveraging Route Targets to
     identify SD-WAN VPN membership, administrators can apply
     import/export policies that control the distribution of client


Dunbar, et al.                                               [Page 16]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

     routes. These route attributes, in turn, inform the local
     configuration of IPsec traffic selectors at each SD-WAN edge.

  - Centralized Management and Security
     When the BGP RR is integrated with the SD-WAN controller, it
     supports a centralized model for managing route distribution
     policies. The RR ensures that BGP UPDATE messages are
     distributed only to authorized SD-WAN edges based on
     preconfigured policies, thereby reducing control-plane
     complexity and limiting exposure compared to decentralized
     architectures.

   In summary, BGP combines scalability, robust policy enforcement,
   interoperability, and centralized security, making it an ideal
   choice for managing SD-WAN overlay networks, particularly as they
   grow in size and complexity.


5.2. BGP Scenario for Homogeneous Encrypted SD-WAN

   In a BGP-controlled Homogeneous Encrypted SD-WAN, an SD-WAN edge
   (i.e., C-PE) can advertise both its attached client routes and
   associated IPsec tunnel parameters using BGP UPDATE messages,
   potentially within in a single message that includes the Tunnel
   Encapsulation Attribute.

   For example, in the figure below, the BGP UPDATE message from C-
   PE2 to RR can include the client routes in the MP-NLRI Path
   Attribute, and can use the Tunnel Encapsulation Attribute [SD-WAN-
   Discovery] to convey the parameters needed to associate those
   routes with the appropriate IPsec tunnel.

















Dunbar, et al.                                               [Page 17]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

                                  +---+
                        +---------|RR |----------+
                       / trusted  +---+           \
                      /                            \
                     /                              \
             +---------+                       +---------+
           --+     WAN Port ------------WAN Port       ClientPort-
             |         |                       | C-PE2   |192.0.2.4/30
             | C-PE1   |            WAN Port +-|192.0.2.2|
           --|192.0.2.1|                     | |       ClientPort-
             +---------+                     | +---------+192.0.2.8/30
                                             |
                                             |
                                             |
             +---------+                     |
           --|         WAN Port -------------+
             |         |
             | C-PE3   |
           --|192.0.2.3|
             +---------+
                Figure 6: Homogeneous Encrypted SD-WAN


   In scenarios where C-PE2 does not have a policy specifying the
   authorized peers for specific client routes, the RR takes the
   responsibility for ensuring that BGP UPDATE for these client
   routes are propagated only to other authorized SD-WAN edges.


5.3. BGP Scenario for Differential Encrypted SD-WAN

   In this scenario, client services may have distinct forwarding
   requirements based on business or network policies. Some client
   services can be routed through any WAN ports of the edge node,
   while others must be routed through specific WAN ports (such as
   only MPLS VPN). To address these requirements, the BGP speaker
   employs two distinct BGP UPDATE messages:

  - Update 1: Client Route Advertisement. This UPDATE advertises the
     prefixes of client services attached to the client-facing
     interfaces of an SD-WAN edge. As described in Section 8 of
     [RFC9012], recursive next-hop resolution can be used to
     associate each client route with the appropriate WAN-facing
     interface(s) of the advertising SD-WAN edge for the desired
     underlay path. Figure 6 illustrates the relationship among the
     client routes, the SD-WAN edge, and the RR.




Dunbar, et al.                                               [Page 18]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

  - Update 2: WAN-Facing Interface Advertisement. This UPDATE
     advertises information about the WAN-facing interfaces of an SD-
     WAN edge that connect to the underlay networks, including
     attributes such as IPsec SA parameters, MPLS label stacks, and
     other relevant underlay properties. These attributes are carried
     in the BGP Tunnel Encapsulation Attribute, together with
     associated Color values, allowing BGP receivers to associate the
     advertised WAN-facing interfaces with the client routes
     advertised in Update 1. Figure 6 also illustrates the SD-WAN
     edge WAN ports that are the basis for this advertisement.

   This dual-update approach provides flexibility and efficiency in
   managing IPsec tunnels terminated at the WAN ports of SD-WAN
   edges. By decoupling client route advertisements from IPsec tunnel
   attributes, it accommodates the differing update frequencies
   between these components-for example, client route changes may
   occur independently of dynamic IPsec parameters such as key
   values. Additionally, multiple client services can share a single
   IPsec SA, optimizing resource usage and reducing control-plane
   overhead.

   BGP receivers associate the two UPDATE messages using the common
   loopback address of the SD-WAN edge (e.g., C-PE2). UPDATE 1
   advertises client routes with the next-hop set to C-PE2's loopback
   address. UPDATE 2 advertises underlay WAN port information using
   an NLRI that contains the same loopback address, along with the
   Tunnel Encapsulation Attribute conveying IPsec parameters and WAN
   port properties. BGP receivers use the common loopback address to
   match the next-hop in UPDATE 1 with the NLRI in UPDATE 2. This
   enables recursive resolution, as specified in [RFC9012], allowing
   client traffic to be forwarded based on the underlay
   characteristics defined in UPDATE 2.



5.4. BGP Scenario for Flow-Based Segmentation

   In a flow-based segmentation scenario, as described in Section
   3.1.3, a service flow is identified by specific fields in the
   packet's IP header, such as source/destination IP addresses, port
   numbers, or protocol types. Flow-based segmentation ensures that
   traffic for a particular service flow is directed only to
   authorized nodes or paths, meeting security and policy
   requirements.




Dunbar, et al.                                               [Page 19]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

   This can be achieved by constraining the propagation of BGP UPDATE
   messages to nodes that meet the criteria of the service flow. For
   instance, to enforce communication exclusively between the Payment
   Application in branch locations and the Payment Gateway, as
   depicted in Figure 6, the following BGP UPDATE messages can be
   advertised:

   BGP UPDATE #1a: Originated by the SD-WAN edge attached to the
   Payment Application and propagated only to the Payment Gateway
   node for a point-to-point (P2P) topology between the Payment
   Application and the Payment Gateway.

   BGP UPDATE #1b: Originated by the same SD-WAN edge for other
   prefixes and propagated to C-PE1 and C-PE3 for other prefixes that
   can be reached by these edge nodes.

                                +-------+
                                |Payment|
                       +------->|  GW   |<----+
                      /         +-------+      \
                     /        Blue Tunnel       \
                    /for Payment App:192.0.2.9/30\
                   /                              \
           +------+--+                        +----+----+
         --|         |                        |         |-192.0.2.9/30
           |         |     Red Tunnels        |         |
         --| C-PE1   |------------------------|         |-192.0.2.4/30
           |192.0.2.1|                        |  C-PE2  |
         --|         |------------------------|192.0.2.2|-192.0.2.8/30
           |   ------+                       +|         |   VLAN=25;
                                            / |         |-192.0.2.10/30
           +---------+                     /  +---------+
         --|         |--------------------+
           | C-PE3   |                   /
           |192.0.2.3|                  /
         --|         |-----------------+
           +---------+
         Figure 7: Flow Based SD-WAN Segmentation


   In Figure 7, the "Blue Tunnel" denotes the tunnel used exclusively
   for Payment Application traffic toward the Payment Gateway,
   whereas the "Red Tunnels" denote tunnels used for other authorized
   traffic among SD-WAN edge nodes.







Dunbar, et al.                                               [Page 20]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

6. SD-WAN Forwarding Model

   This section describes how client traffic is forwarded in a BGP
   Controlled SD-WAN for the use cases described in Section 3.

   The forwarding procedures described in Section 6 of [RFC8388] are
   applicable for the SD-WAN client traffic. Similar to the BGP-based
   VPN/EVPN client routes UPDATE message, Route Targets can be used
   to distinguish routes from different clients.

6.1. Forwarding Model for Homogeneous Encrypted SD-WAN

6.1.1. Network and Service Startup Procedures

   In the Homogeneous Encrypted SD-WAN scenario, two IPsec SAs are
   required to secure bidirectional traffic between two C-PE nodes
   (or their client-facing interfaces), since each SA protects
   traffic in only one direction.

   For example, in the full mesh scenario in Figure 3 of Section 3.2,
   where client CN2 is attached to C-PE1, C-PE3, and C-PE4, six uni-
   directional IPsec SAs must be established: C-PE1 <-> C-PE3; C-PE1
   <-> C-PE4; C-PE3 <-> C-PE4.

   SD-WAN services to clients can be IP-based or Ethernet-based. For
   IP-based services, an SD-WAN edge can learn client addresses from
   the client-facing interfaces via OSPF [RFC2328] [RFC5340], RIP
   [RFC1058] [RFC2453], BGP[RFC4271], or static configuration. For
   Layer-2 services, the EVPN parameters, such as the ESI (Ethernet
   Segment Identifier), EVI (Ethernet Virtual Instance), and CE-VID
   (Customer Edge Virtual Instance Identifier) to EVI mapping, can be
   configured as described in [RFC8388].

   Instead of running IGP within each IPsec tunnel, as is common in
   traditional IPsec VPN, the BGP RR can propagate the client route
   UPDATE messages to authorized SD-WAN edges based on configured
   policies. The SD-WAN edges use BGP attributes-such as the Tunnel
   Encapsulation Attribute and associated Color values-to associate
   received client routes with the appropriate IPsec Security
   Associations (SAs), thereby eliminating the need for manual
   configuration of tunnel endpoints and service policies on each
   edge node.

6.1.2. Packet Walk-Through

   For unicast packets forwarding:




Dunbar, et al.                                               [Page 21]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

     An IPsec SA terminated at a C-PE node can carry traffic for
     multiple client services. Packets to and from these services are
     encapsulated in an inner tunnel, such as GRE or VXLAN. Different
     client traffic can be distinguished using a unique key or
     identifier in the inner encapsulation header. This inner tunnel
     is further encapsulated with an outer IP header, where the
     source and destination addresses are the loopback addresses of
     the C-PE nodes, and the protocol field is typically set to ESP
     (50).

     C-PE Node-based IPsec tunnel is inherently protected when the C-
     PE has multiple WAN ports to different underlay paths. As shown
     in Figure 2, when one of the underlay paths fails, the IPsec
     tunnel can continue operating by rerouting traffic through an
     alternate WAN port.

     When a C-PE receives an IPsec encrypted packet from its WAN
     ports, it decrypts the packet and forwards the inner packet to
     the client facing interface based on the inner packet's
     destination address.

   For multicast packets forwarding:

     IPsec was created to be a security protocol between two and only
     two devices, so multicast service using IPsec is problematic. An
     IPsec peer encrypts a packet so that only one other IPsec peer
     can successfully perform the de-encryption. A straightforward
     way to forward a multicast packet for the Homogeneous Encrypted
     SD-WAN is to encapsulate the multicast packet in separate
     unicast IPsec SA tunnels. More optimized forwarding multicast
     packets for the Homogeneous Encrypted SD-WAN is out of the scope
     of this document.


6.2. Forwarding Model for Hybrid Underlay SD-WAN

   In this scenario, as shown in Figure 4 of Section 3.3, traffic
   forwarded over the trusted VPN paths can be native (i.e.,
   unencrypted). The traffic forwarded over untrusted networks need
   to be protected by IPsec SA.

6.2.1. Network and Service Startup Procedures

   Infrastructure setup: The proper MPLS infrastructure must be
   configured among the edge nodes, i.e., the C-PE1/C-PE2/C-PE3/C-PE4
   of Figure 3. The IPsec SA between WAN ports or nodes must be set




Dunbar, et al.                                               [Page 22]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

   up as well. IPsec SA related attributes on edge nodes can be
   distributed by BGP UPDATE messages as described in Section 5.

   There could be policies governing how flows can be forwarded, as
   specified by [MEF70.2].  For example, "Private-only" indicates
   that the flows can only traverse the MPLS VPN underlay paths.

6.2.2. Packet Walk-Through

   Unicast packets forwarding:

     When C-PE-a in Figure 7 receives a packet from a client facing
     interface, the forwarding decision depends on the flow's routing
     policy. If a packet belonging to a flow that must be forwarded
     over the MPLS VPN, the forwarding processing is the same as the
     MPLS VPN. Otherwise, C-PE-a can select the least cost path,
     including the previously established MPLS paths and IPsec
     Tunnels, to forward the packet. Packets forwarded over the
     trusted MPLS VPN do not require additional encryption, while
     those sent over untrusted networks must be encrypted by IPsec
     SA.

     For a C-PE with multiple WAN ports provided by different NSPs,
     separate IPsec SAs can be established for the WAN ports. In this
     case, the C-PE have multiple IPsec tunnels in addition to the
     MPLS path to choose from to forward the packets from the client
     facing interfaces.

     If the IPsec SA is chosen, the packet is encapsulated by the
     IPsec header and encrypted by the IPsec SA before forwarding it
     to the WAN.

     Packets received over MPLS paths are processed as in standard
     MPLS VPNs. For packets encrypted with IPsec received from WAN
     ports, the C-PE decrypts and decapsulates the inner payload
     before forwarding it according to the local forwarding table. To
     protect against potential attacks, traffic received through
     Internet-facing WAN ports should be protected by appropriate
     security mechanisms (e.g., anti-DDoS, ACLs, or rate-limiting);
     the specifics of these pretections are beyond the scope of this
     document. Additionally, the control plane must avoid learning
     routes from Internet-facing WAN ports to ensure network
     integrity.

                                       +---+





Dunbar, et al.                                               [Page 23]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

                        +--------------|RR |----------+
                       /               +-+-+           \
                      /                                 \
                     /                                   \
     +----+  +---------+  packets encrypted over    +---------+  +----+
     | CN3|--|         A1-----+ Untrusted    +----- B1        |--| CN1|
     +----+  | C-PE-a  A2-----+              +------B2 C-PE-b |  +----+
             |192.0.2.1|                            |192.0.2.2|
     +----+  |         A3  |PE+--------------+PE |--B3        |--| CN3|
     +----+  +---------+   +--+   trusted    +---+  +---------+  +----+
                              |     VPN      |
                          +-----------+
                      Figure 7: Over hybrid SD-WAN

   Multicast packets forwarding:

     For multicast traffic, MPLS multicast [RFC6513], [RFC6514], or
     [RFC7988] can be utilized to forward multicast traffic across
     the network.

     If IPsec tunnels are used for multicast traffic, the packet must
     be encapsulated and encrypted separately for each destination,
     creating multiple unicast IPsec tunnels to deliver the multicast
     packet to all intended recipients.

6.3. Forwarding Model for PE based SD-WAN

6.3.1. Network and Service Startup Procedures

   In this scenario, all PEs have secure interfaces facing the
   clients and facing the MPLS backbone. Some PEs have additional
   interfaces to the untrusted public Internet which are for
   offloading low priority traffic when the MPLS paths get congested.
   The PEs are already connected to their RRs, and the configurations
   for the clients and policies are already established.

6.3.2. Packet Walk-Through

   When offloading MPLS packets to the Internet path, each MPLS
   packet is encapsulated by an outer IP header as MPLS-in-IP or
   MPLS-in-GRE [RFC4023]. The outer IP address can be an interface
   address or the PE's loopback address.

   When IPsec Tunnel mode is used to protect an MPLS-in-IP packet,
   the entire MPLS-in-IP packet is placed after the IPsec tunnel
   header. In IPsec transport mode, the MPLS-in-IP packet's IP header
   becomes the outer IP header of the IPsec packet, followed by an



Dunbar, et al.                                               [Page 24]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

   IPsec header, and then followed by the MPLS label stack. The IPsec
   header must set the payload type to MPLS by using the IP protocol
   number specified in section 3 of [RFC4023]. For the MPLS-in-GRE
   packets protected by IPsec Transport Mode, the GRE header follows
   the IPsec header.

   The IPsec SA's endpoints should not be the client-facing interface
   addresses unless the traffic to/from those clients always goes
   through the IPsec SA even when the MPLS backbone has enough
   capacity to transport the traffic.

   When the PEs' Internet-facing ports are behind the NAT [RFC3715],
   additional measures are necessary to support NAT traversal. In
   this case, an outer UDP field is added to the encrypted payload
   [RFC3948]. Three specific ports and protocols must remain open on
   the PEs: UDP port 4500 (used for NAT traversal), UDP port 500
   (used for IKE), and IP protocol 50 (ESP). The IPsec IKE (Internet
   Key Exchange) sessions between PEs navigate NAT environment using
   the mechanisms outlined in [RFC3947].

   When a packet is received from a client facing interface, it is
   initially processed according to the MPLS VPN forwarding rules. If
   the MPLS backbone path to the destination is congested, the packet
   is encapsulated as an MPLS-in-IP packet and encrypted using the
   IPsec tunnel to the target PE. Conversely, when a packet is
   received from an Internet-facing WAN port, it is decrypted, and
   the inner MPLS payload is extracted and forwarded to the MPLS VPN
   engine for further processing.

   Same as Scenario #2, traffic received from Internet-facing WAN
   ports should be protected by appropriate security mechanisms. In
   addition, the control plane should not learn routes from the
   Internet-facing WAN ports.

7. Manageability Considerations

   A BGP-controlled SD-WAN uses RR to propagate client routes and
   underlay tunnel properties among authorized SD-WAN edges. Since
   the RR is configured with policies that identify authorized peers,
   the peer-wise IPsec IKE (Internet Key Exchange) authentication
   process is significantly simplified. Operators should ensure that
   RR propagation policies, SD-WAN VPN membership rules, and tunnel-
   attribute distribution are consistently configured, as
   misconfiguration could expose edge properties or cause incorrect
   binding of client routes to underlay tunnels. While centralizing
   control in the RR simplifies management, it also means that errors
   in RR policy or provisioning may have network-wide effects;


Dunbar, et al.                                               [Page 25]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

   therefore, careful monitoring, auditing, and validation of RR
   configuration are essential.

   In addition to route and tunnel dissemination, the manageability
   of a BGP-controlled SD-WAN also encompasses the consistent
   configuration of segmentation policies, WAN-port attributes, and
   forwarding behaviors described throughout this document, all of
   which rely on the RR as the central point for distributing and
   validating operational state.

8. Security Considerations

   In a BGP-controlled SD-WAN network, secure operation relies in
   part on the correct configuration and behavior of the RR, which
   acts as the central distribution point for BGP routing
   information. The RR applies preconfigured routing policies to
   control the propagation of BGP UPDATE messages to authorized SD-
   WAN edges, minimizing the risk of unintended route exposure or
   unauthorized communication.

   SD-WAN operation relies on the existing security mechanisms
   defined for BGP and IPsec. which therefore apply directly to the
   control and tunnel planes described in this document. The primary
   operational difference between SD-WAN deployments and traditional
   BGP-based VPNs is that SD-WAN edge nodes often include Internet-
   facing WAN ports, which introduce additional security, filtering,
   and policy-enforcement requirements not present in classic MPLS-
   based VPN environments. These untrusted interfaces increase
   exposure to spoofed traffic, denial-of-service attacks, and
   unintended route learning if misconfigured. As a result, operators
   must apply strict validation of control-plane information received
   from Internet-facing ports, ensure correct RR policy
   configuration, and provide appropriate protection for both
   control-plane and data-plane exchanges, consistent with the
   security guidance in the referenced RFCs.

   The security model for the SD-WAN described in this document is
   based on the following principles:

   1) Centralized Control: The RR governs all routing and policy
     decisions. This centralized architecture simplifies security
     management compared to distributed models, as it limits the
     potential attack surface to a smaller, more controlled set of
     components. However, this centralization also means that
     misconfiguration of RR policies or controller logic can have
     network-wide impact, potentially exposing edge properties to



Dunbar, et al.                                               [Page 26]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

     unauthorized peers, allowing incorrect route propagation, or
     disrupting IPsec tunnel mappings across the entire SD-WAN
     network.
   2) Secure Channels: All communication between SD-WAN edges and the
     RR must occur over a secure channel, such as TLS or IPsec, to
     ensure the confidentiality and integrity of BGP UPDATE messages.
     If a secure communication channel is not used, an attacker on
     the path could observe or tamper with BGP UPDATEs, potentially
     exposing edge properties or injecting unauthorized routes.
     Deployments are therefore expected to enforce secure transport
     (e.g., reject or disable sessions that are not established over
     a protected channel).
   3) Policy Enforcement: The RR is responsible for enforcing policies
     that restrict the propagation of edge node properties and
     routing updates to only authorized peers. This prevents
     sensitive information from being exposed to unauthorized nodes.
     Misconfigured RR policies could inadvertently expose edge
     properties or client routes to unauthorized peers, or conversely
     block required updates, leading to traffic disruption or
     unintended connectivity; these risks highlight the importance of
     correct and audited policy configuration.
   4) Mitigation of Internet-Facing Risks: In scenarios where SD-WAN
     edges include Internet-facing WAN ports, additional measures
     must be taken to mitigate security risks:
       - Anti-DDoS mechanisms must be enabled to protect against
          potential attacks on Internet-facing ports. For example,
          rate-limiting, basic anomaly detection, or upstream
          filtering can reduce exposure to volumetric attacks;
          without such protections, Internet-facing WAN ports may be
          vulnerable to flooding that can disrupt both data and
          control-plane reachability.
       - The control plane must avoid learning routes from Internet-
          facing WAN ports to prevent unauthorized traffic from being
          injected into the SD-WAN. If this control-plane filtering
          is misconfigured, an SD-WAN edge may inadvertently learn
          and propagate untrusted Internet routes, enabling route
          injection attacks or unauthorized reachability into the SD-
          WAN overlay.





Dunbar, et al.                                               [Page 27]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

   By concentrating the security within the RR and using secure
   channels, the SD-WAN network achieves consistent enforcement of
   security policies and reduces the likelihood of misconfigurations
   at individual edge nodes. However, the robustness of this security
   model depends critically on the proper configuration and ongoing
   maintenance of the RR. Operators must ensure that the RR itself is
   adequately protected against compromise or misconfiguration, as
   its failure or exploitation could impact the entire network.

   This model emphasizes simplicity and efficiency, leveraging
   centralized governance to mitigate risks while ensuring
   scalability and interoperability of the SD-WAN.

9. IANA Considerations

       No Action is needed.

10. References


10.1. Normative References

   [BCP195]  Consists of RFC8996 and RFC9325.


10.2. Informative References

   [RFC2332] J. Luciani, et al, "NBMA Next Hop Resolution Protocol
             (NHRP)", RFC2332, April 1998.

   [RFC2784] D. Farinacci, et al, "Generic Routing Encapsulation
             (GRE)" RFC2784, March 2000.

   [RFC3715] B. Aboba, W. Dixon, "IPsec-Network Address Translation
             (NAT) Compatibility Requirements", March 2004.

   [RFC3947] T. Kivinen, et al, "Negotiation of NAT Traversal in the
             IKE", Jan. 2005.

   [RFC3948] A. Huttunen, et al, "UDP Encapsulation of IPsec ESP
             Packets", Jan 2005.




Dunbar, et al.                                               [Page 28]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

   [RFC4023] T. Worster, Y. Rekhter, E. Rosen, "Encapsulating MPLS in
             IP or Generic Routing Encapsulation (GRE)", March 2005.

   [RFC4301] S. Kent and K. Seo, "Security Architecture for the
             Internet Protocol", RFC4301, Dec. 2005.

   [RFC4360] S. Sangli, et al, "BGP Extended Communities Attribute",
             RFC4360, Feb. 2006.

   [RFC4364] E. Rosen, Y. Rekhter, "BGP/MPLS IP Virtual Private
             networks (VPNs)", Feb 2006.

   [RFC4456] T. Bates, E. Chen, R. Chandra, "BGP Route Reflection: An
             Alternative to Full Mesh Internal BGP (IBGP)", April
             2006.

   [RFC4659] J. De clercq, et al, "BGP-MPLS IP Virtual Private
             Network (VPN) Extension for IPv6 VPN", RFC4659, Sept
             2006.

   [RFC4761] K. Kompella and Y. Rekhter, "Virtual Private LAN Service
             (VPLS) Using BGP for Auto-Discovery and Signaling",
             RFC4761, Jan. 2007.

   [RFC4762] M. Lasserre and V. Kompella, "Virtual Private LAN
             Service (VPLS) Using Label Distribution Protocol (LDP)
             Signaling", RFC4762, Jan. 2007.

   [RFC5246] E. Roscorla, "The Transport Layer Security (TLS)
             Protocol Version 1.3", RFC5246, Sept 2025

   [RFC6071] S. Frankel, S. Krishan, "IP Security (IPsec) and
             Internet Key Exchange (IKE) Document Roadmap", Feb 2011.

   [RFC6513] E. Rosen and R. Aggarwal, "Multicast in MPLS/BGP IP
             VPNs", RFC6513, Feb, 2012.

   [RFC6514] R. Aggarwal, et al, "BGP Encodings and Procedures for
             Multicast in MPLS/BGP IP VPNs", RFC6514, Feb, 2012.

   [RFC7296] C. Kaufman, et al, "Internet Key Exchange Protocol
             Version 2 (IKEv2)", Oct 2014.


Dunbar, et al.                                               [Page 29]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

   [RFC7348] M. Mahalingam, et al, "Virtual eXtensible Local Area
             Network (VXLAN): A Framework for Overlaying Virtualized
             Layer 2 Networks over Layer 3 Networks", RFC7348, Aug
             2014.

   [RFC7432] A. Sajassi, et al, "BGP MPLS-Based Ethernet VPN",
             RFC7432, Feb 2015.

   [RFC7988] E. Rosen, et al, "Ingress Replication Tunnels in
             Multicast VPN", RFC7988, Oct. 2016.

   [RFC8200] S. Deering and R. Hinden, "Internet Protocol, Version 6
             (IPv6) Specification". July 2017.

   [RFC8365] A. Sajassi, et al, "A Network Virtualization Overlay
             Solution Using Ethernet VPN (EVPN)", March 2018.

   [RFC8388] J. Rabadan, et al, "Usage and Applicability of BGP MPLS-
             Based Ethernet VPN", RFC8388, May 2018.

   [RFC8446] E. Roscorla, "The Transport Layer Security (TLS)
             Protocol Version 1.3", RFC8446, Sept 2025.

   [RFC9012] K.Patel, et al "The BGP Tunnel Encapsulation Attribute",
             RFC9012, April 2021.

   [RFC9522] A. Farrel, "Overview and Principles of Internet Traffic
             Engineering", RFC9522, Jan. 2024.



   [SD-WAN-Discovery] L. Dunbar, et al "BGP UPDATE for SD-WAN Edge
             Discovery", draft-ietf-idr-sdwan-edge-discovery-25, July
             2025.

   [Net2Cloud-Problem] L. Dunbar and A. Malis, "Dynamic Networks to
             Hybrid Cloud DCs: Problems and Mitigation Practices",
             draft-ietf-rtgwg-net2cloud-problem-statement-41, April.
             2024.

   [IEEE802.3] "IEEE Standard for Ethernet" by The Institute of
             Electrical and Electronics Engineers (IEEE) 802.3.


Dunbar, et al.                                               [Page 30]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026



   [MPLIFY-119] SD-WAN Service Attributes and Service Framework,
             https://www.mplify.net/resources/mplify-119-universal-
             sd-wan-edge-implementation-agreement/. June 2025.

   [MEF70.2] "SD-WAN Service Attributes and Service Framework" by
             MEF, https://www.mef.net/resources/mef-70-2-sd-wan-
             service-attributes-and-service-framework/. Oct 2023.

11. Acknowledgments

   Acknowledgements to Gunter van de Velde, Andrew Alston, Adrian
   Farrel, Jim Guichard, Joel Halpern, John Scudder, Darren Dukes,
   Andy Malis, Donald Eastlake, Stephen Farrell, and Victo Sheng for
   their review and contributions.

   This document was prepared using 2-Word-v2.0.template.dot.





























Dunbar, et al.                                               [Page 31]


Internet-Draft           BGP Usage for SD-WAN           April 7, 2026

Authors' Addresses


   Linda Dunbar
   Futurewei
   Email: ldunbar@futurewei.com

   Ali Sajassi
   Cisco
   Email: sajassi@cisco.com

   John Drake
   Independent
   Email: je_drake@yahoo.com

   Basil Najem
   Bell Canada
   Email: basil.najem@bell.ca

   Sue Hares
   Email: shares@ndzh.com


Contributor's Addresses


   David Carrel
   Graphiant
   Email: carrel@graphiant.com

   Ayan Banerjee
   Cisco
   Email: ayabaner@cisco.com













Dunbar, et al.                                               [Page 32]