Network Working Group L. Dunbar
Internet Draft Futurewei
Intended status: Informational A. Sajassi
Expires: June 3, 2025 Cisco
J. Drake
Independent
B. Najem
Bell Canada
S. Hares
April 7, 2026
BGP Usage for SD-WAN Overlay Networks
draft-ietf-bess-bgp-sdwan-usage-30
Abstract
This document explores the complexities involved in managing large
scale Software Defined WAN (SD-WAN) overlay networks, along with
various SD-WAN scenarios. Its objective is to illustrate how a
BGP-based control plane can effectively manage these overlay
networks by distributing edge service reachability information,
WAN port attributes, and underlay path details, thereby minimizing
manual provisioning.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current
Internet-Drafts is at
https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other
documents at any time. It is inappropriate to use Internet-Drafts
as reference material or to cite them other than as "work in
progress."
xxx, et al. [Page 1]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
Copyright Notice
Copyright (c) 2026 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described in
Section 4.e of the Trust Legal Provisions and are provided without
warranty as described in the Simplified BSD License.
Table of Contents
1. Introduction...................................................3
2. Conventions used in this document..............................4
3. SD-WAN Scenarios and Their Requirements........................6
3.1. SD-WAN Functional Overview................................6
3.1.1. Supporting SD-WAN Segmentation.......................6
3.1.2. Client Service Requirement...........................7
3.1.3. SD-WAN Traffic Segmentation..........................7
3.1.4. Zero Touch Provisioning..............................8
3.1.5. Constrained Propagation of SD-WAN Edge Properties....9
3.2. Scenario #1: Homogeneous Encrypted SD-WAN................10
3.3. Scenario #2: Differential Encrypted SD-WAN...............11
3.4. Scenario #3: Private VPN PE based SD-WAN.................13
4. Provisioning Model............................................14
4.1. Client Service Provisioning Model........................14
4.2. Policy Configuration.....................................15
4.3. IPsec Related Parameters Provisioning....................15
5. BGP Controlled SD-WAN.........................................16
5.1. Rationale for Using BGP as Control Plane for SD-WAN......16
5.2. BGP Scenario for Homogeneous Encrypted SD-WAN............17
5.3. BGP Scenario for Differential Encrypted SD-WAN...........18
5.4. BGP Scenario for Flow-Based Segmentation.................19
6. SD-WAN Forwarding Model.......................................21
6.1. Forwarding Model for Homogeneous Encrypted SD-WAN........21
6.1.1. Network and Service Startup Procedures..............21
6.1.2. Packet Walk-Through.................................21
6.2. Forwarding Model for Hybrid Underlay SD-WAN..............22
6.2.1. Network and Service Startup Procedures..............22
6.2.2. Packet Walk-Through.................................23
Dunbar, et al. [Page 2]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
6.3. Forwarding Model for PE based SD-WAN.....................24
6.3.1. Network and Service Startup Procedures..............24
6.3.2. Packet Walk-Through.................................24
7. Manageability Considerations..................................25
8. Security Considerations.......................................26
9. IANA Considerations...........................................28
10. References...................................................28
10.1. Normative References....................................28
10.2. Informative References..................................28
11. Acknowledgments..............................................31
1. Introduction
Software Defined Wide Area Network (SD-WAN), as described in
[MEF70.2], provides overlay connectivity services that optimize
the transport of IP packets across one or more underlay networks
by identifying traffic types and applying policies to determine
forwarding behavior. Key characteristics of SD-WAN networks
include:
- Transport Augmentation: an SD-WAN path can utilize different
types of underlay networks, including private networks (with
or without encryption) and public networks (requiring
encryption).
- Direct Internet Breakout: Traffic from remote branch offices
can directly access the internet, avoiding backhauling to
corporate headquarters for centralized policy control.
- Policy-Based Traffic Steering: Traffic can be directed over
specific overlay paths based on predefined conditions, such as
matching one or multiple fields in the IP header, rather than
solely relying on destination IP addresses [RFC9522]. For IPv6
[RFC8200], attributes like the Flow Label, source address,
specific extension header fields, or a combination of these
can be used. Additional details are available in Tables 8 and
9 of [MEF70.2].
- Performance-Based Forwarding: Traffic can be steered based on
performance metrics (e.g., packet delay, loss, jitter),
selecting the underlay path that meets or exceeds policy
requirements.
This document outlines SD-WAN use cases and the operational
challenges of managing large-scale SD-WAN overlay networks. While
[Net2Cloud-Problem] identifies general issues encountered when
Dunbar, et al. [Page 3]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
interconnecting networks to cloud environments, this document
focuses specifically on how a BGP-based control plane addresses
those challenges within SD-WAN deployments. Additional operational
drivers for standardized protocol behavior are summarized in
Section 6 of [MPLIFY-119].
It's important to distinguish the BGP instance as the control
plane for SD-WAN overlay from the BGP instances governing the
underlay networks. The document assumes a secure channel between
the SD-WAN controller and SD-WAN edges for exchanging control
plane information. In this document, references to "the Route
Reflector (RR)" denote the RR instance(s) designated by the SD-WAN
controller to distribute SD-WAN routing information. Deployments
may integrate the controller and RR or keep them as separate
components; the SD-WAN control plane is logically centralized but
may be physically realized by a set of distributed controller/RR
instances operating as a coordinated system for scalability,
resiliency, and geographic redundancy, with the RR remaining the
logical control point for SD-WAN route distribution and policy
enforcement as described in this document; the mechanisms for
coordination and state synchronization among multiple RR instances
are out of the scope of this document.
This document captures the SD-WAN scenarios, control-plane
behaviors, and forwarding considerations that motivate current and
future IETF work on SD-WAN. Publishing this material as an RFC
provides a stable, citable foundation for related protocol
specifications and ensures a shared understanding of the problem
space across the industry. Although BGP and IPsec are mature
technologies, applying them to SD-WAN introduces challenges such
as scalability, segmentation, and multi-homing. By documenting how
these mechanisms are used in SD-WAN deployments, this document
enables consistent interpretations and supports interoperability
without defining new protocols.
2. Conventions used in this document
Cloud DC: Third party data centers that host applications and
workloads owned by different organizations or tenants.
Controller: Used interchangeably with SD-WAN controller to denote
the logical system that manages the SD-WAN overlay
Dunbar, et al. [Page 4]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
network. In a BGP-controlled SD-WAN, the controller
may include a Route Reflector (RR) function for BGP
route propagation and policy-based distribution of SD-
WAN routing information. The RR function may be
collocated with, embedded in, or otherwise integrated
with the SD-WAN controller, but it represents only one
component of the overall controller.
Client service: A service (e.g., IP prefix or VLAN) attached to
the client-facing interface of an SD-WAN edge.
Client route: A BGP-advertised route originated by an SD-WAN edge
that represents the reachability of a client-facing
service (e.g., IP prefix or VLAN) and includes
associated path attributes used by the SD-WAN
Controller for policy enforcement and forwarding
decisions.
C-PE: SD-WAN edge, which can be Customer Premises Equipment
(CPE) for customer-managed SD-WAN, or Provider Edge
(PE) for provider-managed SD-WAN services.
Homogeneous Encrypted SD-WAN: An SD-WAN network in which all
traffic to/from the SD-WAN edges are carried by IPsec
tunnels regardless of underlying networks. I.e., the
client traffic is carried by IPsec tunnel even over
MPLS private networks.
NSP: Network Service Provider.
PE: Provider Edge
SD-WAN edge: A device, either physical or virtual, that
participates in the SD-WAN overlay network. These
nodes advertise client routes to the SD-WAN Controller
(e.g., BGP RR).
SD-WAN: An overlay connectivity service that optimizes the
transport of IP packets over one or more Underlay
connectivity services by recognizing applications and
determining forwarding behavior by applying policies
to them. [MEF-70.2].
Dunbar, et al. [Page 5]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
SD-WAN IPsec SA: IPsec Security Association [RFC4301] between two
WAN ports of the SD-WAN edges or between two SD-WAN
edges.
SD-WAN over Hybrid Underlay Networks: SD-WAN over Hybrid Underlay
Networks typically have edge nodes utilizing bandwidth
resources from different types of underlay networks,
some being private networks and others being public
Internet.
WAN Port: A Port or Interface facing a Network Service Provider
(NSP), with an address allocated by the NSP.
Private VPN: refers to a VPN that is supported wholly by a single
network service provider without using any elements of
the public Internet and without any traffic passing
out of the immediate control of that service provider.
Zero Touch Provisioning (ZTP): a network automation approach that
enables automatic provisioning and configuration of
SD-WAN devices, such as routers and switches, at
remote locations without manual intervention.
3. SD-WAN Scenarios and Their Requirements
This section outlines the core requirements for SD-WAN overlay
networks and introduces various SD-WAN scenarios. These scenarios
serve as examples that are further explored in subsequent sections
to illustrate how the BGP control plane is used to distribute
reachability and policy information within SD-WAN overlay
networks.
3.1. SD-WAN Functional Overview
3.1.1. Supporting SD-WAN Segmentation
"SD-WAN Segmentation" refers to policy-driven network
partitioning, a common approach in SD-WAN deployment. An SD-WAN
segment is essentially a virtual private network (SD-WAN VPN)
consisting of a set of edge nodes interconnected by tunnels, such
as IPsec tunnels and/or MPLS VPN tunnels.
Dunbar, et al. [Page 6]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
This document assumes that SD-WAN VPN configuration on PE devices
will, as with MPLS VPN, make use of VRFs [RFC4364] [RFC4659].
Notably, a single SD-WAN VPN can be mapped to one or multiple
virtual topologies governed by the SD-WAN controller's policies.
When BGP is used for SD-WAN, the client route UPDATE is the same
as MPLS VPN. The Route Target in the BGP Extended Community
[RFC4360] can differentiate the routes belonging to different SD-
WAN VPNs.
As SD-WAN is an overlay network arching over multiple types of
networks, MPLS L2VPN [RFC4761] [RFC4762]/L3VPN [RFC4364] [RFC4659]
or pure L2 underlay can continue using the VPN ID (Virtual Private
Network Identifier), VN-ID (Virtual Network Identifier), or VLAN
(Virtual LAN) in the data plane to differentiate packets belonging
to different SD-WAN VPNs. For packets transported through an IPsec
tunnel, additional encapsulation, such as GRE [RFC2784] or VxLAN
[RFC7348], is needed to embed the SD-WAN VPN identifier inside the
IPsec ESP header.
Section 3.1.3 further elaborates on traffic segmentation by
providing operational examples and detailing how segmentation
policies apply to individual flows; the two sections describe the
same concept at different levels of granularity.
3.1.2. Client Service Requirement
The client service requirements describe the SD-WAN edge's ports,
also known as SD-WAN client interfaces, which connect the client
network to the SD-WAN service.
The SD-WAN client interface should support IPv4 & IPv6 addresses
as well as Ethernet in accordance with the [IEEE802.3] standard.
In [MEF 70.2], the "SD-WAN client interface" is called SD-WAN UNI
(User Network Interface). Section 4 of [MEF 70.2] defines a
comprehensive set of attributes for the SD-WAN UNI, detailing the
expected behavior and requirements to enable seamless connectivity
to the client network.
The client service at the SD-WAN edge must support the SD-WAN UNI
service attributes outlined in Section 4 of [MEF 70.2].
3.1.3. SD-WAN Traffic Segmentation
SD-WAN Traffic Segmentation allows traffic to be separated based
on business priorities, security requirements, and operational
needs. This ensures that different user groups or services can
Dunbar, et al. [Page 7]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
operate within distinct topologies or follow tailored policies to
meet specific business and security objectives.
For example, in a retail environment, traffic from point-of-sales
(PoS) systems may require a different topology that is separate
from other traffic. The PoS traffic is routed exclusively to the
payment processing entity at a central hub site, while other types
of traffic can be routed among all branches or remote sites.
In the figure below, traffic from the PoS system follows a tree
topology (denoted as "----" in the figure below), whereas other
traffic can follow a multipoint-to-multipoint topology (denoted as
"===").
+--------+
Payment traffic |Payment |
+------+----+-+gateway +------+----+-----+
/ / | +----+---+ | \ \
/ / | | | \ \
+-+--+ +-+--+ +-+--+ | +-+--+ +-+--+ +-+--+
|Site| |Site| |Site| | |Site| |Site| |Site|
| 1 | | 2 | | 3 | | |4 | | 5 | | 6 |
+--+-+ +--+-+ +--|-+ | +--|-+ +--|-+ +--|-+
| | | | | | |
==+=======+=======+====+======+=======+=======+===
Figure 1 Differentiated Traffic Topologies
Another example is an enterprise that wants to isolate traffic by
departments, ensuring each department having its own unique
topology and policies. For instance, the HR department may need to
access specific systems or resources that are not accessible by
the engineering department. Similarly, contractors may have
limited access to the enterprise resources.
3.1.4. Zero Touch Provisioning
SD-WAN Zero-Touch Provisioning (ZTP) is a network automation
approach that enables the automatic provisioning and configuration
of SD-WAN devices, such as routers and switches, at remote
locations without requiring manual intervention. ZTP allows
devices to be shipped with factory default settings; upon
connection to the network, they automatically retrieve their
configurations. ZTP for a remote SD-WAN edge usually includes the
following steps:
Dunbar, et al. [Page 8]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
- The SD-WAN edge's customer information and unique device
identifier (e.g., serial number, MAC address, or factory-
assigned ID) are registered with a SD-WAN Device Onboarding
Server, a remote system such as an enterprise HQ platform or
cloud-based provisioning portal used for Zero-Touch
Provisioning.
- Upon power-up, the SD-WAN edge can establish the transport
layer secure connection [RFC8446] to its Device Onboarding
Server, whose URL (or IP address) and credential for connection
request can be preconfigured on the edge device by the
manufacturer, external USB drive or secure Email given to the
installer. The external USB method involves providing the
installer with a pre-configured USB flash drive containing the
necessary configuration files and settings for the SD-WAN
device. The secure Email approach entails sending a secure email
containing the configuration details for the SD-WAN device.
- The SD-WAN Device Onboarding Server authenticates the ZTP
request from the remote SD-WAN edge with its configurations.
Once the authentication is successful, it can designate a SD-WAN
controller near the SD-WAN edge to pass down the initial
configurations via the secure channel. The SD-WAN controller
manages and monitors the communication policies for traffic
to/from the edge node.
3.1.5. Constrained Propagation of SD-WAN Edge Properties
For an IPsec tunnel to be established between two edges for data
exchange, both edges need to know each other's network properties,
such as the IP addresses of the WAN ports, the edges' loopback
addresses, the attached client routes, the supported encryption
methods, etc., which are learned via BGP UPDATEs exchanged through
the RR.
In many cases, an SD-WAN edge is authorized to communicate with
only a subset of other edge nodes. To maintain security and
privacy, the property of an SD-WAN edge must not be propagated to
unauthorized peers. However, when a remote SD-WAN edge powers up,
it may lack the policies to determine which peers are authorized
to communicate. Therefore, SD-WAN deployment needs to have a
central point to distribute the properties of an SD-WAN edge to
its authorized peers.
Dunbar, et al. [Page 9]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
BGP is well suited for this purpose. A Route-Reflector (RR)
[RFC4456], integrated into the SD-WAN controller, enforces
policies governing the communication among SD-WAN edges. The RR
ensures that BGP UPDATE messages from an SD-WAN edge are
propagated only to other edges within the same SD-WAN VPN.
An SD-WAN edge must use a secure channel, such as TLS [RFC5246]
[RFC8446] or IPsec, to its designated RR for exchanging BGP UPDATE
messages.
+---+
Authorized Peers G1 |RR | Authorized Peer G2
+======+====+=+ +======+====+=====+
/ / | +---+ | \ \
/ / | | \ \
+-+--+ +-+--+ +-+--+ +-+--+ +-+--+ +-+--+
|C-PE| |C-PE| |C-PE| |C-PE| |C-PE| |C-PE|
| 1 | | 2 | | 3 | |4 | | 5 | | 6 |
+----+ +----+ +----+ +----+ +----+ +----+
Tenant 1 Tenant 2
Figure 2: Authorized Peer Groups managed by RR
Tenant separation is achieved by the SD-WAN VPN identifiers
represented in the control plane and data plane, respectively.
3.2. Scenario #1: Homogeneous Encrypted SD-WAN
Homogeneous Encrypted SD-WAN refers to an SD-WAN network where
edge nodes encrypt all client traffic destined to other edge
nodes, regardless of whether the underlay is private or public.
Typical use cases for Homogeneous Encryption:
- A small branch office connecting to its headquarters via the
Internet. All traffic to and from this small branch office must be
encrypted, usually achieved by IPsec Tunnels [RFC4301].
- A retail store in a shopping mall may need to securely connect
to its services hosted in one or more Cloud DCs via the Internet.
Dunbar, et al. [Page 10]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
A common method involves establishing IPsec SAs with the Cloud DC
gateway to securely transport sensitive data to/from the store.
The granularity of the IPsec SAs for Homogeneous Encryption can be
per site, per subnet, per tenant, or per address. Once the IPsec
SA is established for a specific subnet/tenant/site, all traffic
to/from the subnet/tenant/site is encrypted.
+---+
+--------------|RR |------------+
/ trusted +-+-+ \
/ \
/ \
+----+ +---------+ +------+ +----+
| CN3|--| P1-----+ -------------+------ P1 |--| CN3|
+----+ | C-PE1 P2-----+ | | C-PE2| +----+
+----+ | P3-----+ Wide +------ P2 | +----+
| CN2|--| | | area +------ P3 |--| CN1|
+-+--+ +---------+ | network | +------+ +-+--+
\ | | /
\ +---------+ | all packets | +------+ /
+--| P1-----+ encrypted +------ P1 |-+
| C-PE3 P2-----+ by | | C-PE4|
+----+ | P3-----+ IPsec SAs +------ P2 | +----+
| CN1|--| P4-----+--------------+ | |--| CN2|
+----+ +---------+ +------+ +----+
CN: Client Networks, which is same as Tenant Networks used by NVo3
Figure 3: Homogeneous Encrypted SD-WAN
A Homogeneous Encrypted SD-WAN shares certain similarities with
traditional IPsec VPN. However, unlike IPsec VPNs, which are
typically deployed in a point-to-point fashion among a limited
number of nodes, SD-WAN networks can comprise a large number of
edge nodes, all centrally managed by a controller responsible for
configurations and policies across the network.
Existing private VPNs (e.g., MPLS based) can use Homogeneous
Encrypted SD-WAN to extend over the public network to remote sites
to which the VPN operator does not own or lease infrastructural
connectivity.
3.3. Scenario #2: Differential Encrypted SD-WAN
Differential Encrypted SD-WAN refers to an SD-WAN network that
utilizes hybrid underlays, combining private VPNs and the public
Internet. In this model, traffic traversing the private VPN is
forwarded natively without encryption, while traffic over the
Dunbar, et al. [Page 11]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
public Internet is encrypted for security. This approach balances
performance and security. Since IPsec encryption requires
significant processing power and traffic over the public Internet
typically lacks the premium SLA (Service Level Agreement) provided
by private VPNs-especially over long distances-current practice is
to forward traffic over private VPNs without encryption,
leveraging the inherent reliability and security of the private
network. Meanwhile, encryption is applied only to traffic routed
over the public Internet to ensure data confidentiality.
One C-PE might have the Internet-facing WAN ports managed by
different NSPs with the WAN ports' addresses assigned by the
corresponding NSPs. Clients may define specific policies to govern
how traffic flows across the network, such as:
1) Certain flows can only be forwarded over private VPNs.
2) Certain flows can be forwarded over either private VPNs or the
public Internet. When forwarded over the public Internet, the
packets are encrypted.
3) Some flows, especially Internet-bound browsing ones, can be
handed off to the Internet without further encryption.
For example, consider a flow traversing multiple segments, A<->B,
B<->C, C<->D, has Policy 2) above. This flow can cross different
underlays in different segments, such as over Private underlay
between A<->B without encryption or over the public Internet
between B<->C protected by an IPsec SA.
In the figure below, each C-PE has both Internet-facing and
private-VPN interfaces (e.g., A1, B2, C3, and D2 connect to the
Internet, while others connect to the private VPN). The WAN ports'
addresses can be allocated by the service providers or dynamically
assigned (e.g., by DHCP).
Dunbar, et al. [Page 12]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
+---+
+--------------|RR |----------+
/ +-+-+ \
/ \
/ \
+----+ +---------+ packets encrypted over +------+ +----+
| CN3|--| A1-----+ Untrusted +------ B1 |--| CN1|
+----+ | C-PE1 A2-\ | C-PE2| +----+
+----+ | A3--+--+ +---+---B2 | +----+
| CN2|--| | |PE+--------------+PE |---B3 |--| CN3|
+----+ +---------+ +--+ trusted +---+ +------+ +----+
| WAN |
+----+ +---------+ +--+ packets +---+ +------+ +----+
| CN1|--| C1--|PE| go natively |PE |-- D1 |--| CN1|
+----+ | C-PE3 C2--+--+ without encry+---+ | C-PE4| +----+
| | +--------------+ | |
| | | |
+----+ | | without encrypt over | | +----+
| CN2|--| C3--+---- Untrusted --+------D2 |--| CN2|
+----+ +---------+ +------+ +----+
CN: Client Network
Figure4: SD-WAN with Internet facing ports (A1,B2,C3,D2)
Services may not be congruent, i.e., the packets from A-> B may
traverse one underlay network, and the packets from B -> A may go
over a different underlay.
3.4. Scenario #3: Private VPN PE based SD-WAN
Private VPN PE-Based SD-WAN refers to extending an existing VPN
(e.g., EVPN [RFC7432] or IPVPN) by adding additional ports that
face the public Internet to address increased bandwidth
requirements between Provider Edge (PE) devices. This approach
allows VPN service providers to augment their networks without
immediately committing to building or leasing new infrastructure.
Key Characteristics of Private VPN PE-Based SD-WAN:
- For MPLS-based VPN, traffic between PEs uses MPLS
encapsulation within IPsec tunnels egressing the Internet
WAN ports, such as MPLS-in-IP or GRE-in-IPsec.
Dunbar, et al. [Page 13]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
- The BGP RR remains connected to the PEs via the same
trusted network as the original VPN, ensuring consistency
in routing policies and security.
The main use case for Private VPN PE-Based SD-WAN is Temporary
Bandwidth Expansion.
+---+
+======>|PE2|
// +---+
// ^
// || VPN
// VPN v
|PE1| <====> |RR| <=> |PE3|
+-+-+ +--+ +-+-+
| |
+--- Public Internet -- +
Offload
Figure 5: Additional Internet paths added to the VPN
For Ethernet-based client traffic, Private VPN PE based SD-WAN
should support VLAN-based service interfaces (EVPN Instances),
VLAN bundle service interfaces, or VLAN-Aware bundling service
interfaces. EVPN service requirement as described in Section 3.1
of [RFC8388] are applicable to the SD-WAN Ethernet-based Client
services. For IP-based client interfaces, L3VPN service
requirements are applicable.
4. Provisioning Model
This section defines the provisioning model, i.e., a conceptual
framework that scopes the roles (controller/RR and edges), the
artifacts (client-service constructs, policies, and IPsec
parameters), and their mapping to BGP attributes.
4.1. Client Service Provisioning Model
Provisioning of client services in an SD-WAN network can leverage
approaches similar to those used for VRFs (Virtual Routing and
Forwarding) in MPLS based VPNs [RFC4364] [RFC4659]. A client VPN
can define communication policies by specifying BGP Route Targets
for import and export. Alternatively, policy-based filtering using
Dunbar, et al. [Page 14]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
ACLs (Access Control List) can be employed to control which routes
are allowed or denied for a given client VPN.
In scenarios where an SD-WAN edge is dedicated to a single client
with a single virtual network, all services attached to the client
facing interface(s) on the edge node can be grouped into a single
VRF. The RR can manage the policies for import/export policies for
that VRF.
4.2. Policy Configuration
Policy configuration is a key characteristic of an SD-WAN service,
enabling packets to be forwarded over multiple types of underlays
based on predefined rules. Policies determines which underlay
paths are allowed to carry specific flows, as outlined in Section
8 of [MEF70.2]. A flow is a collection of packets between the same
source and destination pair that are subject to the same
forwarding and policy decisions at the ingress SD-WAN edge and are
identified by the settings of one or more fields in the packet
headers. For example, client-service-x can only be mapped to a
MPLS topology, ensuring traffic alignment with business or
security requirements.
4.3. IPsec Related Parameters Provisioning
IPsec-related parameter provision in an SD-WAN network involves
the negotiation and distribution of cryptographic parameters
required to establish IPsec tunnels among them. To streamline the
configuration process, SD-WAN edges can retrieve those parameters
directly from the SD-WAN controller, reducing manual intervention
and ensuring consistency.
In a BGP-controlled SD-WAN, BGP UPDATE messages can be extended to
propagate IPsec-related attributes for each SD-WAN edge. This
approach allows peers to receive and apply compatible
cryptographic parameters distributed over a secure channel between
the SD-WAN edge and its BGP RR, thereby simplifying IPsec tunnel
establishment and reducing reliance on traditional IKEv2
negotiation [RFC7296].
This mechanism supports the ZTP requirement outlined in Section
3.1.4 by enabling IPsec tunnels to be provisioned without IKEv2
negotiation.
Dunbar, et al. [Page 15]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
5. BGP Controlled SD-WAN
5.1. Rationale for Using BGP as Control Plane for SD-WAN
In small SD-WAN networks with a modest number of nodes,
traditional approaches such as the hub-and-spoke model, employing
Next Hop Resolution Protocol (NHRP)[RFC2332] or a centralized hub
managing edge nodes, including the mapping of local and public
addresses along with tunnel identifiers, has proven effective.
However, for larger SD-WAN networks, with more than 100 nodes and
encompassing diverse underlays, the conventional approach becomes
increasingly complex, error-prone, and difficult to manage.
BGP offers several key advantages when used as the control plane
for a large SD-WAN:
- Simplified peer authentication process:
With a secure channel established between each edge node and its
RR, the RR can perform peer authentication on behalf of the edge
node. The RR has policies on peer communication and the built-in
capability to constrain the propagation of the BGP UPDATE
messages to the authorized edge nodes only.
- Scalable IPsec tunnel management
In networks with multiple IPsec tunnels between SD-WAN edges,
BGP can simplify tunnel management by using the SD-WAN edge
discovery mechanism defined in [SD-WAN-Discovery] to advertise
WAN-port properties and IPsec-related parameters. These BGP
attributes allow peers to learn tunnel endpoints and associated
parameters via the control plane and to associate advertised
client routes with the appropriate IPsec SAs, thereby reducing
manual configuration and enabling scalable, consistent tunnel
establishment across the SD-WAN.
Unlike traditional IPsec VPN where IPsec tunnels between two
edge nodes are treated as independent parallel links requiring
duplicated control plane messages for load sharing, BGP in an
SD-WAN context can associate multiple service flows with shared
tunnel parameters, reducing repeated signaling.
- Simplified traffic selection configurations
BGP can simplify the configuration of IPsec tunnel associations
and related forwarding policies. By leveraging Route Targets to
identify SD-WAN VPN membership, administrators can apply
import/export policies that control the distribution of client
Dunbar, et al. [Page 16]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
routes. These route attributes, in turn, inform the local
configuration of IPsec traffic selectors at each SD-WAN edge.
- Centralized Management and Security
When the BGP RR is integrated with the SD-WAN controller, it
supports a centralized model for managing route distribution
policies. The RR ensures that BGP UPDATE messages are
distributed only to authorized SD-WAN edges based on
preconfigured policies, thereby reducing control-plane
complexity and limiting exposure compared to decentralized
architectures.
In summary, BGP combines scalability, robust policy enforcement,
interoperability, and centralized security, making it an ideal
choice for managing SD-WAN overlay networks, particularly as they
grow in size and complexity.
5.2. BGP Scenario for Homogeneous Encrypted SD-WAN
In a BGP-controlled Homogeneous Encrypted SD-WAN, an SD-WAN edge
(i.e., C-PE) can advertise both its attached client routes and
associated IPsec tunnel parameters using BGP UPDATE messages,
potentially within in a single message that includes the Tunnel
Encapsulation Attribute.
For example, in the figure below, the BGP UPDATE message from C-
PE2 to RR can include the client routes in the MP-NLRI Path
Attribute, and can use the Tunnel Encapsulation Attribute [SD-WAN-
Discovery] to convey the parameters needed to associate those
routes with the appropriate IPsec tunnel.
Dunbar, et al. [Page 17]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
+---+
+---------|RR |----------+
/ trusted +---+ \
/ \
/ \
+---------+ +---------+
--+ WAN Port ------------WAN Port ClientPort-
| | | C-PE2 |192.0.2.4/30
| C-PE1 | WAN Port +-|192.0.2.2|
--|192.0.2.1| | | ClientPort-
+---------+ | +---------+192.0.2.8/30
|
|
|
+---------+ |
--| WAN Port -------------+
| |
| C-PE3 |
--|192.0.2.3|
+---------+
Figure 6: Homogeneous Encrypted SD-WAN
In scenarios where C-PE2 does not have a policy specifying the
authorized peers for specific client routes, the RR takes the
responsibility for ensuring that BGP UPDATE for these client
routes are propagated only to other authorized SD-WAN edges.
5.3. BGP Scenario for Differential Encrypted SD-WAN
In this scenario, client services may have distinct forwarding
requirements based on business or network policies. Some client
services can be routed through any WAN ports of the edge node,
while others must be routed through specific WAN ports (such as
only MPLS VPN). To address these requirements, the BGP speaker
employs two distinct BGP UPDATE messages:
- Update 1: Client Route Advertisement. This UPDATE advertises the
prefixes of client services attached to the client-facing
interfaces of an SD-WAN edge. As described in Section 8 of
[RFC9012], recursive next-hop resolution can be used to
associate each client route with the appropriate WAN-facing
interface(s) of the advertising SD-WAN edge for the desired
underlay path. Figure 6 illustrates the relationship among the
client routes, the SD-WAN edge, and the RR.
Dunbar, et al. [Page 18]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
- Update 2: WAN-Facing Interface Advertisement. This UPDATE
advertises information about the WAN-facing interfaces of an SD-
WAN edge that connect to the underlay networks, including
attributes such as IPsec SA parameters, MPLS label stacks, and
other relevant underlay properties. These attributes are carried
in the BGP Tunnel Encapsulation Attribute, together with
associated Color values, allowing BGP receivers to associate the
advertised WAN-facing interfaces with the client routes
advertised in Update 1. Figure 6 also illustrates the SD-WAN
edge WAN ports that are the basis for this advertisement.
This dual-update approach provides flexibility and efficiency in
managing IPsec tunnels terminated at the WAN ports of SD-WAN
edges. By decoupling client route advertisements from IPsec tunnel
attributes, it accommodates the differing update frequencies
between these components-for example, client route changes may
occur independently of dynamic IPsec parameters such as key
values. Additionally, multiple client services can share a single
IPsec SA, optimizing resource usage and reducing control-plane
overhead.
BGP receivers associate the two UPDATE messages using the common
loopback address of the SD-WAN edge (e.g., C-PE2). UPDATE 1
advertises client routes with the next-hop set to C-PE2's loopback
address. UPDATE 2 advertises underlay WAN port information using
an NLRI that contains the same loopback address, along with the
Tunnel Encapsulation Attribute conveying IPsec parameters and WAN
port properties. BGP receivers use the common loopback address to
match the next-hop in UPDATE 1 with the NLRI in UPDATE 2. This
enables recursive resolution, as specified in [RFC9012], allowing
client traffic to be forwarded based on the underlay
characteristics defined in UPDATE 2.
5.4. BGP Scenario for Flow-Based Segmentation
In a flow-based segmentation scenario, as described in Section
3.1.3, a service flow is identified by specific fields in the
packet's IP header, such as source/destination IP addresses, port
numbers, or protocol types. Flow-based segmentation ensures that
traffic for a particular service flow is directed only to
authorized nodes or paths, meeting security and policy
requirements.
Dunbar, et al. [Page 19]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
This can be achieved by constraining the propagation of BGP UPDATE
messages to nodes that meet the criteria of the service flow. For
instance, to enforce communication exclusively between the Payment
Application in branch locations and the Payment Gateway, as
depicted in Figure 6, the following BGP UPDATE messages can be
advertised:
BGP UPDATE #1a: Originated by the SD-WAN edge attached to the
Payment Application and propagated only to the Payment Gateway
node for a point-to-point (P2P) topology between the Payment
Application and the Payment Gateway.
BGP UPDATE #1b: Originated by the same SD-WAN edge for other
prefixes and propagated to C-PE1 and C-PE3 for other prefixes that
can be reached by these edge nodes.
+-------+
|Payment|
+------->| GW |<----+
/ +-------+ \
/ Blue Tunnel \
/for Payment App:192.0.2.9/30\
/ \
+------+--+ +----+----+
--| | | |-192.0.2.9/30
| | Red Tunnels | |
--| C-PE1 |------------------------| |-192.0.2.4/30
|192.0.2.1| | C-PE2 |
--| |------------------------|192.0.2.2|-192.0.2.8/30
| ------+ +| | VLAN=25;
/ | |-192.0.2.10/30
+---------+ / +---------+
--| |--------------------+
| C-PE3 | /
|192.0.2.3| /
--| |-----------------+
+---------+
Figure 7: Flow Based SD-WAN Segmentation
In Figure 7, the "Blue Tunnel" denotes the tunnel used exclusively
for Payment Application traffic toward the Payment Gateway,
whereas the "Red Tunnels" denote tunnels used for other authorized
traffic among SD-WAN edge nodes.
Dunbar, et al. [Page 20]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
6. SD-WAN Forwarding Model
This section describes how client traffic is forwarded in a BGP
Controlled SD-WAN for the use cases described in Section 3.
The forwarding procedures described in Section 6 of [RFC8388] are
applicable for the SD-WAN client traffic. Similar to the BGP-based
VPN/EVPN client routes UPDATE message, Route Targets can be used
to distinguish routes from different clients.
6.1. Forwarding Model for Homogeneous Encrypted SD-WAN
6.1.1. Network and Service Startup Procedures
In the Homogeneous Encrypted SD-WAN scenario, two IPsec SAs are
required to secure bidirectional traffic between two C-PE nodes
(or their client-facing interfaces), since each SA protects
traffic in only one direction.
For example, in the full mesh scenario in Figure 3 of Section 3.2,
where client CN2 is attached to C-PE1, C-PE3, and C-PE4, six uni-
directional IPsec SAs must be established: C-PE1 <-> C-PE3; C-PE1
<-> C-PE4; C-PE3 <-> C-PE4.
SD-WAN services to clients can be IP-based or Ethernet-based. For
IP-based services, an SD-WAN edge can learn client addresses from
the client-facing interfaces via OSPF [RFC2328] [RFC5340], RIP
[RFC1058] [RFC2453], BGP[RFC4271], or static configuration. For
Layer-2 services, the EVPN parameters, such as the ESI (Ethernet
Segment Identifier), EVI (Ethernet Virtual Instance), and CE-VID
(Customer Edge Virtual Instance Identifier) to EVI mapping, can be
configured as described in [RFC8388].
Instead of running IGP within each IPsec tunnel, as is common in
traditional IPsec VPN, the BGP RR can propagate the client route
UPDATE messages to authorized SD-WAN edges based on configured
policies. The SD-WAN edges use BGP attributes-such as the Tunnel
Encapsulation Attribute and associated Color values-to associate
received client routes with the appropriate IPsec Security
Associations (SAs), thereby eliminating the need for manual
configuration of tunnel endpoints and service policies on each
edge node.
6.1.2. Packet Walk-Through
For unicast packets forwarding:
Dunbar, et al. [Page 21]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
An IPsec SA terminated at a C-PE node can carry traffic for
multiple client services. Packets to and from these services are
encapsulated in an inner tunnel, such as GRE or VXLAN. Different
client traffic can be distinguished using a unique key or
identifier in the inner encapsulation header. This inner tunnel
is further encapsulated with an outer IP header, where the
source and destination addresses are the loopback addresses of
the C-PE nodes, and the protocol field is typically set to ESP
(50).
C-PE Node-based IPsec tunnel is inherently protected when the C-
PE has multiple WAN ports to different underlay paths. As shown
in Figure 2, when one of the underlay paths fails, the IPsec
tunnel can continue operating by rerouting traffic through an
alternate WAN port.
When a C-PE receives an IPsec encrypted packet from its WAN
ports, it decrypts the packet and forwards the inner packet to
the client facing interface based on the inner packet's
destination address.
For multicast packets forwarding:
IPsec was created to be a security protocol between two and only
two devices, so multicast service using IPsec is problematic. An
IPsec peer encrypts a packet so that only one other IPsec peer
can successfully perform the de-encryption. A straightforward
way to forward a multicast packet for the Homogeneous Encrypted
SD-WAN is to encapsulate the multicast packet in separate
unicast IPsec SA tunnels. More optimized forwarding multicast
packets for the Homogeneous Encrypted SD-WAN is out of the scope
of this document.
6.2. Forwarding Model for Hybrid Underlay SD-WAN
In this scenario, as shown in Figure 4 of Section 3.3, traffic
forwarded over the trusted VPN paths can be native (i.e.,
unencrypted). The traffic forwarded over untrusted networks need
to be protected by IPsec SA.
6.2.1. Network and Service Startup Procedures
Infrastructure setup: The proper MPLS infrastructure must be
configured among the edge nodes, i.e., the C-PE1/C-PE2/C-PE3/C-PE4
of Figure 3. The IPsec SA between WAN ports or nodes must be set
Dunbar, et al. [Page 22]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
up as well. IPsec SA related attributes on edge nodes can be
distributed by BGP UPDATE messages as described in Section 5.
There could be policies governing how flows can be forwarded, as
specified by [MEF70.2]. For example, "Private-only" indicates
that the flows can only traverse the MPLS VPN underlay paths.
6.2.2. Packet Walk-Through
Unicast packets forwarding:
When C-PE-a in Figure 7 receives a packet from a client facing
interface, the forwarding decision depends on the flow's routing
policy. If a packet belonging to a flow that must be forwarded
over the MPLS VPN, the forwarding processing is the same as the
MPLS VPN. Otherwise, C-PE-a can select the least cost path,
including the previously established MPLS paths and IPsec
Tunnels, to forward the packet. Packets forwarded over the
trusted MPLS VPN do not require additional encryption, while
those sent over untrusted networks must be encrypted by IPsec
SA.
For a C-PE with multiple WAN ports provided by different NSPs,
separate IPsec SAs can be established for the WAN ports. In this
case, the C-PE have multiple IPsec tunnels in addition to the
MPLS path to choose from to forward the packets from the client
facing interfaces.
If the IPsec SA is chosen, the packet is encapsulated by the
IPsec header and encrypted by the IPsec SA before forwarding it
to the WAN.
Packets received over MPLS paths are processed as in standard
MPLS VPNs. For packets encrypted with IPsec received from WAN
ports, the C-PE decrypts and decapsulates the inner payload
before forwarding it according to the local forwarding table. To
protect against potential attacks, traffic received through
Internet-facing WAN ports should be protected by appropriate
security mechanisms (e.g., anti-DDoS, ACLs, or rate-limiting);
the specifics of these pretections are beyond the scope of this
document. Additionally, the control plane must avoid learning
routes from Internet-facing WAN ports to ensure network
integrity.
+---+
Dunbar, et al. [Page 23]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
+--------------|RR |----------+
/ +-+-+ \
/ \
/ \
+----+ +---------+ packets encrypted over +---------+ +----+
| CN3|--| A1-----+ Untrusted +----- B1 |--| CN1|
+----+ | C-PE-a A2-----+ +------B2 C-PE-b | +----+
|192.0.2.1| |192.0.2.2|
+----+ | A3 |PE+--------------+PE |--B3 |--| CN3|
+----+ +---------+ +--+ trusted +---+ +---------+ +----+
| VPN |
+-----------+
Figure 7: Over hybrid SD-WAN
Multicast packets forwarding:
For multicast traffic, MPLS multicast [RFC6513], [RFC6514], or
[RFC7988] can be utilized to forward multicast traffic across
the network.
If IPsec tunnels are used for multicast traffic, the packet must
be encapsulated and encrypted separately for each destination,
creating multiple unicast IPsec tunnels to deliver the multicast
packet to all intended recipients.
6.3. Forwarding Model for PE based SD-WAN
6.3.1. Network and Service Startup Procedures
In this scenario, all PEs have secure interfaces facing the
clients and facing the MPLS backbone. Some PEs have additional
interfaces to the untrusted public Internet which are for
offloading low priority traffic when the MPLS paths get congested.
The PEs are already connected to their RRs, and the configurations
for the clients and policies are already established.
6.3.2. Packet Walk-Through
When offloading MPLS packets to the Internet path, each MPLS
packet is encapsulated by an outer IP header as MPLS-in-IP or
MPLS-in-GRE [RFC4023]. The outer IP address can be an interface
address or the PE's loopback address.
When IPsec Tunnel mode is used to protect an MPLS-in-IP packet,
the entire MPLS-in-IP packet is placed after the IPsec tunnel
header. In IPsec transport mode, the MPLS-in-IP packet's IP header
becomes the outer IP header of the IPsec packet, followed by an
Dunbar, et al. [Page 24]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
IPsec header, and then followed by the MPLS label stack. The IPsec
header must set the payload type to MPLS by using the IP protocol
number specified in section 3 of [RFC4023]. For the MPLS-in-GRE
packets protected by IPsec Transport Mode, the GRE header follows
the IPsec header.
The IPsec SA's endpoints should not be the client-facing interface
addresses unless the traffic to/from those clients always goes
through the IPsec SA even when the MPLS backbone has enough
capacity to transport the traffic.
When the PEs' Internet-facing ports are behind the NAT [RFC3715],
additional measures are necessary to support NAT traversal. In
this case, an outer UDP field is added to the encrypted payload
[RFC3948]. Three specific ports and protocols must remain open on
the PEs: UDP port 4500 (used for NAT traversal), UDP port 500
(used for IKE), and IP protocol 50 (ESP). The IPsec IKE (Internet
Key Exchange) sessions between PEs navigate NAT environment using
the mechanisms outlined in [RFC3947].
When a packet is received from a client facing interface, it is
initially processed according to the MPLS VPN forwarding rules. If
the MPLS backbone path to the destination is congested, the packet
is encapsulated as an MPLS-in-IP packet and encrypted using the
IPsec tunnel to the target PE. Conversely, when a packet is
received from an Internet-facing WAN port, it is decrypted, and
the inner MPLS payload is extracted and forwarded to the MPLS VPN
engine for further processing.
Same as Scenario #2, traffic received from Internet-facing WAN
ports should be protected by appropriate security mechanisms. In
addition, the control plane should not learn routes from the
Internet-facing WAN ports.
7. Manageability Considerations
A BGP-controlled SD-WAN uses RR to propagate client routes and
underlay tunnel properties among authorized SD-WAN edges. Since
the RR is configured with policies that identify authorized peers,
the peer-wise IPsec IKE (Internet Key Exchange) authentication
process is significantly simplified. Operators should ensure that
RR propagation policies, SD-WAN VPN membership rules, and tunnel-
attribute distribution are consistently configured, as
misconfiguration could expose edge properties or cause incorrect
binding of client routes to underlay tunnels. While centralizing
control in the RR simplifies management, it also means that errors
in RR policy or provisioning may have network-wide effects;
Dunbar, et al. [Page 25]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
therefore, careful monitoring, auditing, and validation of RR
configuration are essential.
In addition to route and tunnel dissemination, the manageability
of a BGP-controlled SD-WAN also encompasses the consistent
configuration of segmentation policies, WAN-port attributes, and
forwarding behaviors described throughout this document, all of
which rely on the RR as the central point for distributing and
validating operational state.
8. Security Considerations
In a BGP-controlled SD-WAN network, secure operation relies in
part on the correct configuration and behavior of the RR, which
acts as the central distribution point for BGP routing
information. The RR applies preconfigured routing policies to
control the propagation of BGP UPDATE messages to authorized SD-
WAN edges, minimizing the risk of unintended route exposure or
unauthorized communication.
SD-WAN operation relies on the existing security mechanisms
defined for BGP and IPsec. which therefore apply directly to the
control and tunnel planes described in this document. The primary
operational difference between SD-WAN deployments and traditional
BGP-based VPNs is that SD-WAN edge nodes often include Internet-
facing WAN ports, which introduce additional security, filtering,
and policy-enforcement requirements not present in classic MPLS-
based VPN environments. These untrusted interfaces increase
exposure to spoofed traffic, denial-of-service attacks, and
unintended route learning if misconfigured. As a result, operators
must apply strict validation of control-plane information received
from Internet-facing ports, ensure correct RR policy
configuration, and provide appropriate protection for both
control-plane and data-plane exchanges, consistent with the
security guidance in the referenced RFCs.
The security model for the SD-WAN described in this document is
based on the following principles:
1) Centralized Control: The RR governs all routing and policy
decisions. This centralized architecture simplifies security
management compared to distributed models, as it limits the
potential attack surface to a smaller, more controlled set of
components. However, this centralization also means that
misconfiguration of RR policies or controller logic can have
network-wide impact, potentially exposing edge properties to
Dunbar, et al. [Page 26]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
unauthorized peers, allowing incorrect route propagation, or
disrupting IPsec tunnel mappings across the entire SD-WAN
network.
2) Secure Channels: All communication between SD-WAN edges and the
RR must occur over a secure channel, such as TLS or IPsec, to
ensure the confidentiality and integrity of BGP UPDATE messages.
If a secure communication channel is not used, an attacker on
the path could observe or tamper with BGP UPDATEs, potentially
exposing edge properties or injecting unauthorized routes.
Deployments are therefore expected to enforce secure transport
(e.g., reject or disable sessions that are not established over
a protected channel).
3) Policy Enforcement: The RR is responsible for enforcing policies
that restrict the propagation of edge node properties and
routing updates to only authorized peers. This prevents
sensitive information from being exposed to unauthorized nodes.
Misconfigured RR policies could inadvertently expose edge
properties or client routes to unauthorized peers, or conversely
block required updates, leading to traffic disruption or
unintended connectivity; these risks highlight the importance of
correct and audited policy configuration.
4) Mitigation of Internet-Facing Risks: In scenarios where SD-WAN
edges include Internet-facing WAN ports, additional measures
must be taken to mitigate security risks:
- Anti-DDoS mechanisms must be enabled to protect against
potential attacks on Internet-facing ports. For example,
rate-limiting, basic anomaly detection, or upstream
filtering can reduce exposure to volumetric attacks;
without such protections, Internet-facing WAN ports may be
vulnerable to flooding that can disrupt both data and
control-plane reachability.
- The control plane must avoid learning routes from Internet-
facing WAN ports to prevent unauthorized traffic from being
injected into the SD-WAN. If this control-plane filtering
is misconfigured, an SD-WAN edge may inadvertently learn
and propagate untrusted Internet routes, enabling route
injection attacks or unauthorized reachability into the SD-
WAN overlay.
Dunbar, et al. [Page 27]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
By concentrating the security within the RR and using secure
channels, the SD-WAN network achieves consistent enforcement of
security policies and reduces the likelihood of misconfigurations
at individual edge nodes. However, the robustness of this security
model depends critically on the proper configuration and ongoing
maintenance of the RR. Operators must ensure that the RR itself is
adequately protected against compromise or misconfiguration, as
its failure or exploitation could impact the entire network.
This model emphasizes simplicity and efficiency, leveraging
centralized governance to mitigate risks while ensuring
scalability and interoperability of the SD-WAN.
9. IANA Considerations
No Action is needed.
10. References
10.1. Normative References
[BCP195] Consists of RFC8996 and RFC9325.
10.2. Informative References
[RFC2332] J. Luciani, et al, "NBMA Next Hop Resolution Protocol
(NHRP)", RFC2332, April 1998.
[RFC2784] D. Farinacci, et al, "Generic Routing Encapsulation
(GRE)" RFC2784, March 2000.
[RFC3715] B. Aboba, W. Dixon, "IPsec-Network Address Translation
(NAT) Compatibility Requirements", March 2004.
[RFC3947] T. Kivinen, et al, "Negotiation of NAT Traversal in the
IKE", Jan. 2005.
[RFC3948] A. Huttunen, et al, "UDP Encapsulation of IPsec ESP
Packets", Jan 2005.
Dunbar, et al. [Page 28]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
[RFC4023] T. Worster, Y. Rekhter, E. Rosen, "Encapsulating MPLS in
IP or Generic Routing Encapsulation (GRE)", March 2005.
[RFC4301] S. Kent and K. Seo, "Security Architecture for the
Internet Protocol", RFC4301, Dec. 2005.
[RFC4360] S. Sangli, et al, "BGP Extended Communities Attribute",
RFC4360, Feb. 2006.
[RFC4364] E. Rosen, Y. Rekhter, "BGP/MPLS IP Virtual Private
networks (VPNs)", Feb 2006.
[RFC4456] T. Bates, E. Chen, R. Chandra, "BGP Route Reflection: An
Alternative to Full Mesh Internal BGP (IBGP)", April
2006.
[RFC4659] J. De clercq, et al, "BGP-MPLS IP Virtual Private
Network (VPN) Extension for IPv6 VPN", RFC4659, Sept
2006.
[RFC4761] K. Kompella and Y. Rekhter, "Virtual Private LAN Service
(VPLS) Using BGP for Auto-Discovery and Signaling",
RFC4761, Jan. 2007.
[RFC4762] M. Lasserre and V. Kompella, "Virtual Private LAN
Service (VPLS) Using Label Distribution Protocol (LDP)
Signaling", RFC4762, Jan. 2007.
[RFC5246] E. Roscorla, "The Transport Layer Security (TLS)
Protocol Version 1.3", RFC5246, Sept 2025
[RFC6071] S. Frankel, S. Krishan, "IP Security (IPsec) and
Internet Key Exchange (IKE) Document Roadmap", Feb 2011.
[RFC6513] E. Rosen and R. Aggarwal, "Multicast in MPLS/BGP IP
VPNs", RFC6513, Feb, 2012.
[RFC6514] R. Aggarwal, et al, "BGP Encodings and Procedures for
Multicast in MPLS/BGP IP VPNs", RFC6514, Feb, 2012.
[RFC7296] C. Kaufman, et al, "Internet Key Exchange Protocol
Version 2 (IKEv2)", Oct 2014.
Dunbar, et al. [Page 29]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
[RFC7348] M. Mahalingam, et al, "Virtual eXtensible Local Area
Network (VXLAN): A Framework for Overlaying Virtualized
Layer 2 Networks over Layer 3 Networks", RFC7348, Aug
2014.
[RFC7432] A. Sajassi, et al, "BGP MPLS-Based Ethernet VPN",
RFC7432, Feb 2015.
[RFC7988] E. Rosen, et al, "Ingress Replication Tunnels in
Multicast VPN", RFC7988, Oct. 2016.
[RFC8200] S. Deering and R. Hinden, "Internet Protocol, Version 6
(IPv6) Specification". July 2017.
[RFC8365] A. Sajassi, et al, "A Network Virtualization Overlay
Solution Using Ethernet VPN (EVPN)", March 2018.
[RFC8388] J. Rabadan, et al, "Usage and Applicability of BGP MPLS-
Based Ethernet VPN", RFC8388, May 2018.
[RFC8446] E. Roscorla, "The Transport Layer Security (TLS)
Protocol Version 1.3", RFC8446, Sept 2025.
[RFC9012] K.Patel, et al "The BGP Tunnel Encapsulation Attribute",
RFC9012, April 2021.
[RFC9522] A. Farrel, "Overview and Principles of Internet Traffic
Engineering", RFC9522, Jan. 2024.
[SD-WAN-Discovery] L. Dunbar, et al "BGP UPDATE for SD-WAN Edge
Discovery", draft-ietf-idr-sdwan-edge-discovery-25, July
2025.
[Net2Cloud-Problem] L. Dunbar and A. Malis, "Dynamic Networks to
Hybrid Cloud DCs: Problems and Mitigation Practices",
draft-ietf-rtgwg-net2cloud-problem-statement-41, April.
2024.
[IEEE802.3] "IEEE Standard for Ethernet" by The Institute of
Electrical and Electronics Engineers (IEEE) 802.3.
Dunbar, et al. [Page 30]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
[MPLIFY-119] SD-WAN Service Attributes and Service Framework,
https://www.mplify.net/resources/mplify-119-universal-
sd-wan-edge-implementation-agreement/. June 2025.
[MEF70.2] "SD-WAN Service Attributes and Service Framework" by
MEF, https://www.mef.net/resources/mef-70-2-sd-wan-
service-attributes-and-service-framework/. Oct 2023.
11. Acknowledgments
Acknowledgements to Gunter van de Velde, Andrew Alston, Adrian
Farrel, Jim Guichard, Joel Halpern, John Scudder, Darren Dukes,
Andy Malis, Donald Eastlake, Stephen Farrell, and Victo Sheng for
their review and contributions.
This document was prepared using 2-Word-v2.0.template.dot.
Dunbar, et al. [Page 31]
Internet-Draft BGP Usage for SD-WAN April 7, 2026
Authors' Addresses
Linda Dunbar
Futurewei
Email: ldunbar@futurewei.com
Ali Sajassi
Cisco
Email: sajassi@cisco.com
John Drake
Independent
Email: je_drake@yahoo.com
Basil Najem
Bell Canada
Email: basil.najem@bell.ca
Sue Hares
Email: shares@ndzh.com
Contributor's Addresses
David Carrel
Graphiant
Email: carrel@graphiant.com
Ayan Banerjee
Cisco
Email: ayabaner@cisco.com
Dunbar, et al. [Page 32]