Last Call Review of draft-ietf-bess-dci-evpn-overlay-08
review-ietf-bess-dci-evpn-overlay-08-secdir-lc-kivinen-2018-02-08-00
Request | Review of | draft-ietf-bess-dci-evpn-overlay |
---|---|---|
Requested revision | No specific revision (document currently at 10) | |
Type | Last Call Review | |
Team | Security Area Directorate (secdir) | |
Deadline | 2018-02-09 | |
Requested | 2018-01-26 | |
Authors | Jorge Rabadan , Senthil Sathappan , Wim Henderickx , Ali Sajassi , John Drake | |
I-D last updated | 2018-02-08 | |
Completed reviews |
Rtgdir Telechat review of -08
by Sasha Vainshtein
(diff)
Opsdir Last Call review of -08 by Victor Kuarsingh (diff) Secdir Last Call review of -08 by Tero Kivinen (diff) Genart Last Call review of -08 by Vijay K. Gurbani (diff) |
|
Assignment | Reviewer | Tero Kivinen |
State | Completed | |
Request | Last Call review on draft-ietf-bess-dci-evpn-overlay by Security Area Directorate Assigned | |
Reviewed revision | 08 (document currently at 10) | |
Result | Ready | |
Completed | 2018-02-08 |
review-ietf-bess-dci-evpn-overlay-08-secdir-lc-kivinen-2018-02-08-00
I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. This document describes how Network Virtualization Overlays (NVO) can be connected to a Wide Area Network (WAN) in order to extend the layer-2 connectivity required for some tenants. The security considerations section refers to several other documents describing other technologies (RFC7432], [EVPN-Overlays], [RFC7623], [RFC4761] and [RFC4762]) and continues to describe that the "DCI using GWs" method covered by this document is more secure than the other method "DCI using ASBRs".