Internet-Draft | SDWAN Edge Discovery | January 2025 |
Dunbar, et al. | Expires 6 July 2025 | [Page] |
The document describes the BGP mechanisms for SD-WAN edge node property discovery. These mechanisms include a new tunnel type and subTLVs for the BGP Tunnel-Encapsulation Attribute [RFC9012] and set of NLRI for SD-WAN underlay information.¶
In the context of this document, BGP Route Reflector (RR) is the component of the SD-WAN Controller that receives the BGP UPDATE from SD-WAN edges and in turns propagates the information to the intended peers that are authorized to communicate via the SD-WAN overlay network.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 6 July 2025.¶
Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
BGP [RFC4271] can be used as a control plane for a Software Defined Wide Area Network (SD-WAN) to support Secure VPNs or simply to support a set of Secure links in a network. A brief definition of these two use cases is given in this section. Section 2 describes the BGP framework in terms of NLRIs supported, example topologies, and objectives for the BGP mechanisms. Section 3 describes the BGP mechanisms, and section 4 describes error handling for this mechanism.¶
The BGP mechanisms for SD-WAN support requires a route reflector (RR) to have a secure connection to each BGP Peer participating in the BGP infrastructure support the SD-WAN. The establishiment of a secure connection between each BGP Peer and the RR is outside the scope of this specification.¶
This document describes the BGP mechanisms for an SD-WAN edge nodes to established a BGP peering with other SD-WAN edge nodes, and pass information in order to establish and update secure overlay tunnels [Net2Cloud]. These mechanisms include a new tunnel type and subTLVs for the BGP Tunnel-Encapsulation Attribute [RFC9012] and a set NLRIs for SD-WAN underlay information.¶
A SD-WAN network defined in [MEF70.1] and [MEF70.2], refers to a policy-driven network over multiple heterogeneous underlay networks to get better WAN bandwidth management, visibility, and control. This document refers to this network as a SD-WAN Secure L3VPNs. [SD-WAN-BGP-USAGE] the defines the five requirements for BGP usage in an SD-WAN Secure L3VPN networks and 3 scenarios for deployment. The five requirements defined are the following:¶
Support for SD-WAN segmentation - that allows edge noded connected over tunnels to support VPNs.¶
Support for Client Services interfacs on edge nodes (e.g. SD-WAN UNI [MEF70.1]),¶
WD-WAN Traffic Segmentation,¶
Zero Touch Provisioning, and¶
Constrained Propagation of SD-WAN Edge Properities by BGP infrastructure using a Route Reflector.¶
[SD-WAN-BGP-USAGE] describes the three scenarios for SD-WAN networks comprised of a mixture of tunnels over private and public networks:¶
Homogeneous Encripted SD-WAN - where edge nodes encrypt data prior to entering the SD-WAN,¶
Differential Encrypted SD-WAN - where edge nodes encrypt traffic traversing public networks, but do not encrypt traffic over private secure networks,¶
Private VPN PE based SD-WAN - where an existing private VPN is expanded by adding extra ports over the public internet.¶
[SD-WAN-BGP-USAGE] provides descriptions on the the use of SD-WAN technology for L3VPNS, the provisioning of SD-WAN nodes, and example BGP topologie and SD-WAN forwarding mechanisms. This document assumes the reader is familar with SD-WAN use case described in [SD-WAN-BGP-USAGE].¶
[RFC9012] defines a BGP mechanisms that links routes (prefix and Next Hop) to a specific tunnels using a specific encapsulation. The SD-WAN Secure Links Topology uses a single Hybrid logical link on a SD-WAN Peer to represent multiple underlay topology links. The SD-WAN peer distributes IPsec security association (IPsec-SA) related information regarding the hybrid link or individual underlay links.¶
The traffic is routed via normal IP v4/v6 forwarding without any VPN addition. The SD-WAN Secure Links provides some link security for some simple cases of the three scenarios from [SD-WAN-BGP-USAGE] that do not require L3VPN addresses (RD, prefix).¶
The following acronyms and terms are used in this document:¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
This section provides a framework to describe the overall solution parts based on the a reference diagram shown in Figure 1. The framework covers the following: client routes supported, example Topologies, objectives of the SD-WAN Edge discovery, comparison of SD-WAN Secure VPNs with Pure IPsec VPNS, and what SD-WAN segmentation means in this SD-WAN context.¶
Tunnel Encapsulation may be attached to the prefixes from the Unicast v4 and v6 ((AFI/SAFI 1/1 and 2/1), and L3VPNs for v4 and v6 (AFI/SAFI 1/128 and 2/128) (per [RFC4364], [RFC4659]).¶
The document defines SD-WAN Secure L3VPN as the SD-WAN Secure VPN defined in [SD-WAN-BGP-USAGE], [MEF-70.1], and [MEF70.2]. The SD-WAN Secure L3VPN requires the L3VPN for IPv4 [RFC4364] and IPv6 [RFC4659] be expanded to support SD-WAN Hybrid Tunnels and the passages of IPsec-SA information for the underlay tunnels that support SD-WAN Secure L3VPN.¶
This document defines the SD-WAN Secure Links as links in network that uses SD-WAN tunnels to create secure Hybrid SD-WAN tunnels between SD-WAN End Nodes. The SD-WAN Secure Links application does not support identification of a VPN via L3VPN NLRI. The SD-WAN end node uses BGP to pass Unicast v4/v6 prefixes ((AFI/SAFI 1/1 and 2/1) routes with TEA with a SD-WAN Hybrid tunnel TLV. The SD-WAN secure links application also passes the IPSec-SA information for the underlay tunnels in BGP.¶
This document specifies the BGP mechanism for SD-WAN Secure L3VPN and SD-WAN Secure Links.¶
This section describes how the topologies for SD-WAN Secure L3VPN and SD-WAN Secure Links can be served by the BGP SD-WAN logical Tunnel links.¶
This section summarizes the BGP requirements from the following three scenarios from [SD-WAN-BGP-USAGE] can be handled by a BGP control plane using BGP Tunnel-Encapsulation attribute [RFC9012]:¶
Based on [SD-WAN-BGP-USAGE], it is easy to see how Figure 1 matches scenario 1 (Homogeneneous Encrypted SD-WAN) and scenario 2 (Differential Encrypted SD-WAN). Recasting Figure 1 as a logical BGP peering topology results in a BGP topology between PEs and CN (CE at customer site) results in Figure 2. Scenario 3 (Private VPNs based on SD-WAN) from [SD-WAN-BGP-USAGE] aligns with the Figure 2.¶
Hybrid SD-WAN tunnel infrastructure requires that the PEs (C-PE1, C-PE2, C-PE3, and C-PE4) have an existing topology that the Hybrid SD-WAN tunnel overlays. These PEs use local policy to sending the approprite traffic across the appropriate network based on local policy.¶
Sample Topology¶
Logical BGP Topology for SD-WAN¶
Note that the Figure 1 SD-WAN node BGP peers (C-PE) are connected in the underlay by both trusted VPNs and untrusted public networks. For trusted VPNs, IPsec Security associations may not be set-up. In some circumstances, some SD-WAN node peers may be connected only by untrusted public networks. For the traffic over untrusted networks, IPsec Security Associations (IPsec SA) must be established and maintained. If an edge node has network ports behind a NAT, the NAT properties need to be discovered by the authorized SD-WAN peers.¶
Suppose the SD-WAN network topology from Figure 1 removes the L3VPN links. Instead the links are simply a combination of L3 WAN Networks (unsecured) and physically secure direct L2 and L3 links. The topology in Figure 1 becomes the underlay physical topology in Figure 3. The unsecured links need IPSec encryptions so the IPsec links must be configured. An SD-WAN Hybrid tunnel allows connections between the C-PEs (C-PE1, C-PE2, C-PE3, and C-PE) to be a single logical link.¶
Therefore, the logical topology in Figure 3, reduces to the SD-WAN logical topology shown in Figure 2.¶
Sample Topology¶
For both the SD-WAN Secure L3VPN network and the SD-WAN Secure Links, the BGP Peers are assumed to be connected to a Route Reflector via secure link. For an SD-WAN deployment with multiple RRs, it is assumed that there are secure connections among those RRs.¶
How secure connections are established between the BGP Peer and the RR, or between the multiple RRs is out of the scope of this document. The existing BGP UPDATE propagation mechanisms control the edge properties propagation among the RRs.¶
For some environments where the communication to RR is highly secured, [RFC9016] IKE-less can be deployed to simplify IPsec SA establishment among edge nodes.¶
The objectives of SD-WAN edge discovery for an SD-WAN edge node are to discover its authorized BGP peers and each peer's associated properties in order to establish secure overlay tunnels [Net2Cloud]. The attributes to be propagated for the SD-WAN Secure L3VPN case are:¶
the SD-WAN (client) VPN information,¶
the attached client routes per VPN, and¶
the properties of the underlay networks over which the client routes can be carried.¶
Like any VPN networks, the attached client routes belonging to specific SD-WAN VPNs can only be exchanged with the SD-WAN peer nodes authorized to communicate.¶
The attributes to be propagated for the SD-WAN Secure L3 Links are:¶
the attached client routes and¶
the properties of the underlay networks over which the client routes can be carried.¶
The properities of the underlay network may include the following: IPsec-SA information, information needed for NAT transversal with IPsec, and link speeds.¶
Some SD-WAN peers are connected by both trusted VPNs and untrusted public networks. Some SD-WAN peers are connected only by untrusted public networks. For the traffic over untrusted networks, IPsec Security Associations (IPsec SA) must be established and maintained. For the trusted VPNs, IPsec Security associations may not be set-up. If an edge node has network ports behind a NAT, the NAT properties need to be discovered by the authorized SD-WAN peers.¶
Like any VPN networks, the attached client routes belonging to specific SD-WAN VPNs can only be exchanged with the SD-WAN peer nodes authorized to communicate.¶
Suppose the environment is Figure 1 with the logical SD-WAN Hybrid link topology of Figure 2. These topologies are set-up via configuration with IPsec-SA pre-configured. Suppose that C-PE1 and C-PE2 have 10 pre-shared keys to use on IPsec links. Currently P3 is using IPSec-SA ID-1. C-PE1 wants to receive traffic flowing from C-PE2 over the Hybrid SD-WAN links.¶
Refering to the Figure 2, the C-PE1 routers send customer routes (L3VPN v4 route) to the RR with¶
Suppose for some reason the L2 link between C-PE1 and C-PE2 has encounter attacks, and the IPsec encryption must now run on links P3 and P4. C-PE1 detects the problem and to change the encryption on P3 and add encryption on P4. C-PE1 and C-PE2 must agree upon the next encryption on the list, and will send the IPsec-SA information in-band via BGP.¶
This simple examples show the value of rotating the pre-shared keys. Future IPsec SA can also be set-up, negotiated, or rekeyed in the same manner.¶
The following question may occur to the observant reader:¶
Why is IPsec related information passed on a different AFI/SAFI?¶
Why do you do to support IPsec combined with NATs?¶
Is this the best way to support NATs?¶
The BGP SD-WAN Nodes can attach the TEA with a Hybrid SD-WAN TLV attached to the client routes (AFI/SAFI 1/1, 2/1, 1/128, 2/128) or attached to the SD-WAN NLRI (AFI/SAFI 1/74 or 2/74). The SD-WAN NLRI allows the passing of IPsec information on a unique AFI/SAFI. How implementation prioritize the processing of client routes versus underlay routes (SD-WAN NLRI) is an implementation matter, and out of scope for this document.¶
For NATs, the Extended Port Sub-TLV (see section 3.4) represents the information the first deployment thought it needed to identify the NAT port for a IPsec Security Association. The deployments of this SD-WAN technology found the amount of data gave enough information, but suggested future work might be able to send less information. However, those revisions are outside the scope of this document.¶
This section describes why this document chose to pass IPSec-SA information via a new BGP AFI/SAFI with a TEA [RFC9012] instead of using traditional IPsec mechanisms.¶
A pure IPsec VPN has IPsec tunnels connecting all edge nodes over public networks. Therefore, it requires stringent authentication and authorization (i.e., IKE Phase 1 [RFC7296]) before other properties of IPsec SA can be exchanged. The IPsec Security Association (SA) between two untrusted nodes typically requires the following configurations and message exchanges:¶
Establishing the IPsec SA requires the following set-up¶
In a BGP-controlled SD-WAN network over hybrid MPLS VPN and public internet underlay networks, all edge nodes and RRs are already connected by private secure paths. The RRs have the policies to manage the authentication of all peer nodes. More importantly, when an edge node needs to establish multiple IPsec tunnels to many edge nodes, all the management information can be multiplexed into the secure management tunnel between RR and the edge node operating as a BGP peer. Therefore, the amount of authentication in a BGP-Controlled SD-WAN network can be significantly reduced.¶
Client VPNs are configured via VRFs, just like the configuration of the existing MPLS VPN. The IPsec equivalent traffic selectors for local and remote routes are achieved by importing/exporting VPN Route Targets. The binding of client routes to IPsec SA is dictated by policies. As a result, the IPsec configuration for a BGP controlled SD-WAN (with mixed MPLS VPN) can be simplified in the following manner:¶
The SD-WAN controller has the authority to authenticate edges and peers so the Remote Peer association is controlled by the SD-WAN Controller (RR).¶
The IKEv2 proposals (including the IPsec Transform set) can be sent directly to peers, or incorporated in a BGP UPDATE.¶
The BGP UPDATE announces the client route reachability through the SDWAN hybrid tunnels. A SDWAN hybrid tunnel combines several other tunnels into a single logical tunnel. The SD-WAN Hybrid tunnel implementations insure that all tunnels within are either running over secure network links or secured by IPsec.¶
Importing/exporting Route Targets under each client VPN (VRF) achieves the traffic selection (or permission) among clients' routes attached to multiple edge nodes.¶
Note: The web of SDWAN hybrid tunnels in a network is denoted in this document as an SD-WAN underlay. BGP passes information about the SDWAN hybrid tunnels between BGP peers by passing an SD-WAN Underlay NLRI paired with the tunnel encapsulation attribute (TEA) with an SDWAN tunnel type SD-WAN-Hybrid TLV.¶
Also, note that with this method there is no need to run multiple routing protocols in each IPsec tunnel.¶
In SD-WAN Secure L3VPN deployments, SD-WAN Segmentation is a frequently used term which refers to partitioning a network into multiple subnetworks, just like MPLS VPNs. SD-WAN Segmentation is achieved by creating SD-WAN virtual topologies and SD-WAN VPNs.¶
An SD-WAN virtual topology consists of a set of edge nodes and the tunnels (a.k.a. underlay paths) interconnecting those edge nodes. These tunnels forming the underlay paths can be IPsec tunnels, or MPLS VPN tunnels, or other tunnels. Figure 4 (top) illustrates an SD-WAN L3VPN underlay topology and Figure 4 (bottomn) show the same topology as a the virtual topology based on SD-WAN Links.¶
An SD-WAN VPN is configured in the same way as the VRFs of an MPLS VPN. One SD-WAN client VPN can be mapped to multiple SD-WAN virtual topologies. A Route Target is used to differentiate between the SD-WAN VPNs. For example, in the picture below, the Payment-Flow on C-PE2 is only mapped to the virtual topology of C-PEs to/from Payment Gateway, whereas other flows can be mapped to a multipoint-to-multipoint virtual topology.¶
SD-WAN Controller for the SD-WAN Secure L3VPN governs the policies of mapping a client VPN to SD-WAN virtual topologies.¶
Each SD-WAN edge node may need to support multiple VPNs. Route Target is used to differentiate the SD-WAN VPNs. For example, in the picture below, the Payment-Flow on C-PE2 is only mapped to the virtual topology of C-PEs to/from Payment Gateway, whereas other flows can be mapped to a multipoint-to-multipoint virtual topology.¶
The BGP mechanisms have two functions:¶
This section describes the Hybrid SD-WAN tunnel, the SD-WAN NLRIs, the new subTLVs for SD-WAN Tunnel IPSec-SA, subTLVs for Port attributes, the procedures for the client routes, the procedures for underlay routes, error handling, and considerations for managing SD-WAN technologies.¶
Per [RFC9012], the following two BGP attributes that may encode a Tunnel Encapsulation attribute information: the Tunnel Encapsulation Attribute, and the Encapsulation Extended Community (Encaps-Ec) as a "barebones" tunnel identification. The encoding for the SD-WAN Hybrid tunnel is described for both BGP attributes.¶
The NextHop Field in the BGP update is the tunnel egress Endpoint, and this should be set to the BGP Peer Address for the SD-WAN Peer.¶
The validation procedure for the SD-WAN tunnel TLV has the following components:¶
Prior to installing a route with a SD-WAN tunnel as an active route, the BGP peer installing the route MUST also validate that the SD-WAN tunnel and underlay links are active.¶
Notes¶
*1 - For client traffic, the validation procedures for the Color subTLV follows the validation procedures of [RFC9012]. Precdence between Color Extended Community (Color-EC) and Color SubTLV is first Color-EC, and then Color SubTLV.¶
*2 - In the future, the SD-WAN TEA could specify more details on Underlay links beyond protocol. However, those future extensions are outside the scope of this document.¶
*3 - Encodings and validation of syntax are defined in section 3.3. Section 3.5 provides content processing and validation procedures for client routes, and section 3.6 provides content processing and validation procedures for underlay routes¶
*4 - Encoding and mechanisms are defined 3.3.6. Section 3.6 provides content processing and validation procedures.¶
The hybrid SD-WAN underlay tunnel UPDATE is to advertise the detailed properties associated with the public facing WAN ports and IPsec tunnels. The Edge BGP Peer will advertise the SD-WAN properties to its designated RR via the secure connection. Each BGP Update message with a the SD-WAN Underlay NLRI MUST contain a Tunnel Encapsulation Attribute (TEA) for a Hybrid Tunnel type. The TEA can include with SubTLVs for Extended Port attribute (see section 7) or IP Sec information (see section 8). The IPsec information subTLVs include: IPsec-SA-ID, IPsec SA Nonce, IPsec Public Key, IPsec SA Proposal, and Simplified IPsec SA.¶
A new NLRI SAFI (SD-WAN SAFI=74) is introduced within the MP_REACH_NLRI Path Attribute of [RFC4760] for advertising the detailed properties of the SD-WAN tunnels terminated at the edge node:¶
where:¶
This document defines the following SD-WAN Route type:¶
For advertising the detailed properties of the SD-WAN tunnels terminated at the edge, where the transport network port can be uniquely identified by a tuple of three values (Port-Local-ID, SD-WAN-Color, SD-WAN-Node-ID). The SD-WAN NLRI Route-Type =1 has the following encoding:¶
Route Type values outside of 1 are out of scope for this document.¶
(editor) Need some input on whether Egress End Point should match SD-WAN node-ID or if these can be different. If they can be different, how are we validating the tunnel Egress end point.¶
This section describes the SubTLVs that pass data regarding IPsec parameters for the Hybrid SD-WAN tunnel. During set-up of the Hybrid SD-WAN tunnels, the IPsec parameters need to be securely passed to set-up secure association. For hybrid SD-WAN tunnels, the IPsec security association for IPsec links may change to different security associations over time.¶
The subTLVs related to IPsec supported by the TEA TLV for the SD-WAN Hybrid Tunnel type are: IPSec-SA-ID, IPsec SA Nounce, IPsec Public Key, IPsec Proposal, and Simplified IPSec SA. The IPSec-SA-ID SubTLV provides a way to indicate the IPsec SA Identifiers (section 3.3.1) for pre-configured security association. The other four SubTLVs provide different ways to pass details regarding IPsec security associations. The IPsec SA Nounce passes Nounce and rekey counters for a Secure Association identified by IPsec SA Identifier (see section 3.3.2). The IPSec Public Key SubTLV passes IPsec Public Key data with a time duration (see section 3.3.3). The IPsec Proposal SubTLV provides Transform attributes and Transform IDs (see section 3.3.4). The Simplified IP SEC SA passes the information that identifies configuration for 2 keys (see section 3.3.5). The NAT-related portion infromation is carried in the Extended Port SubTLV (see section 3.3.6)¶
If any SubTLV is MALFORMED, the implementation MUST follow the procedure in [RFC9012] in section 13.¶
For a quick rotation between security associations, the SDWAN NLRI (port-id, color, node) can quickly distribute a switch to a set of new security association using the BGP Update message. In this case, the BGP UPDATE message would like Figure 10¶
where:¶
IPSec-SA-ID Sub-Type (8 bits): 64(IANA Assigned).¶
length (8 bits): Specifies the total length in octets of the value field (not including the Type and Length fields). For the IPSec-SA-ID Sub-Type, the length should be the 2 + 4 *(number of IPsec SA IDs) .¶
Reserved: Reserved for future use. In this version of the document, the Reserved field MUST be set to zero and MUST be ignored upon receipt. Received values MUST be propagated without change.¶
Value field: The value field consists of a sequence of IPsec SA Identifiers, each 4 octets long. As shown in figure above, n IPsec SAs are attached in the IPsec-SA-ID Sub-TLV:¶
The encoding iss shown in the figure below:¶
where:¶
A IPsec SA Rekey Counter Sub-TLV s a MALFORMED if the fields do not fit the limits specified above. Per [RFC9012] a MALFORMED SubTLV is ignored. The procedures for content checks for this Sub-tLV are specified in section 3.4 for client routes, and section 3.5 for underlay routes. Please note that:¶
The encoding iss shown in the figure below:¶
where:¶
The encoding iss shown in the figure below:¶
where:¶
The encoding is shown in the figure below:¶
where:¶
All other transform values are outside the scope of this document.¶
Mode = 1 indicates that the Tunnel Mode is used.¶
Mode = 2 indicates that the Transport mode is used.¶
All mode values besides 1 and 2 are outside the scope of this document.¶
the ESP algorithms supported. Its values are specified by [IANA-ESP]. One SD-WAN edge node can support multiple ESP algorithms and send them to its peers to negotiate the strongest one. The default algorithm is AES-256.¶
The Extended Port Attribute Sub-TLV advertises the properties associated with a public Internet-facing WAN port that might be behind NAT. A SD-WAN edge node can query a STUN Server (Session Traversal of UDP through Network address translation [RFC8489]) to get the NAT properties, including the public IP address and the Public Port number, to pass to its peers.¶
The location of a NAT device can be:¶
The encoding is shown in the figure below:¶
where:¶
Extended Port Attribute Type (=65): indicating it is the Extended Port Attribute SubTLV¶
ExtPort Length: the length of the subTLV in octets (variable).¶
Flags:¶
NAT Type: the NAT type can be one of the following values:¶
1: without NAT ;¶
2: 1-to-1 static NAT;¶
3: Full Cone;¶
4: Restricted Cone;¶
5: Port Restricted Cone;¶
6: Symmetric; or¶
7: Unknown (i.e. no response from the STUN server).¶
NAT type values outside of 1-7 are invalid for this SubTLV.¶
Encap-Type: the supported encapsulation types for the port.¶
Notes:¶
The Encap-Type inside the Extended Port Attribute Sub-TLV is different from the RFC9012's BGP-Tunnel-Encapsulation type. The port can indicate the specific encapsulations, such as:¶
If the IPsec-SA-ID subTLV or the IPsec SA detailed subTLVs (Nonce/publicKey/Proposal) are included in the SD-WAN-Hybrid tunnel, the Encap-Type indicates the encapsulation type within the IPsec payload.¶
If the IPsec SA subTLVs are not included in the SD-WAN-Hybrid Tunnel, the Encap-Type indicates the encapsulation of the payload without IPsec encryption.¶
Encapsulation types outside of GRE and VxLAN are outside of the scope of this specification.¶
Transport Network ID: Central Controller assigns a global unique ID to each transport network. Any value in this octet is valid¶
RD ID: Routing Domain ID, need to be globally unique. Any value in this octet is valid.¶
Some SD-WAN deployment might have multiple levels, zones, or regions that are represented as logical domains. Policies can govern if tunnels can be established across domains. For example, a hub node can establish tunnels with different logical domains but the spoke nodes cannot establish tunnels with nodes in different domains.¶
Local IP: The local (or private) IP address of the WAN port.¶
Local Port: used by Remote SD-WAN edge node for establishing IPsec to this specific port.¶
Public IP: The IP address after the NAT. If NAT is not used, this field is set to all-zeros¶
Public Port: The Port after the NAT. If NAT is not used, this field is set to all-zeros.¶
Extended SubSub-TLV: for carrying additional information about the underlay networks.¶
One Extended SubSub-TLVs is specified in this document: Underlay Network Transport SubSub-TLV.¶
The encoding is shown in the figure below:¶
Where:¶
are listed below as:¶
Port type define as follows:¶
The connection types of equipment and port types will continue to grow with technology change. Future specifications may specify additional connection types or port types.¶
The Tunnel Encapsulation Attribute for the SD-WAN Hybrid Tunnel Type may be associated with BGP UPDATE messages with NLRI with AFI/SAFI IPv4 Unicast (1/1), IPv6 (2/1), L3VPN v4 Unicast (1/128), and IPv6 L3VPN (2/128).¶
The SD-WAN Secure Links topology is supported by the Unicast IPv4/IPv6 prefixes. The L3VPN topologies support forming the SD-WAN Secure L3VPN described in [SD-WAN-BGP-USAGE] and MEF ([MEF 70.1][MEF70.2]).¶
Based on [RFC9012], there are two forms a Tunnel Encapsulation Attribute (TEA) can take: "Barebones" using the Encapsulation Extended Community (Encaps-EC) and a normal Tunnel Encapsulation form.¶
The SD-WAN Client routes are sent with a the Encapsulation Extended Community (Encap-EC) BGP attribute that identifies the the Hybrid SD-WAN tunnel type. Per [RFC9012], the Encapsulation Extended Community uses the NextHop Field in the BGP UPDATE as the Tunnel Egress EndPoint. The validation for the Tunnel Egress Endpoint uses the validation in section 6, 8, and 13 applied to the NextHop.¶
A Color Extended Community (Color-EC) or local policy applied to the client route directs the traffic for the client route to across appropriate interface within the Hybrid SD-WAN Tunnel to the Tunnel Egress Endpoint.¶
The procedures for validating a client route with a TEA does the following:¶
It MAY also have any of the following SubTLVs:¶
A single SD-WAN client route may be attached to multiple SD-WAN Hybrid tunnels. An Update with an SD-WAN client route may express these tunnels as an Encap-EC or a TEA. Each of these tunnel descriptions is treated as a unique Hybrid SD-WAN tunnel with a unique Egress Endpoint. Local Policy on the BGP Peer determines which tunnel the client data traffic will use.¶
An SD-WAN VPN ID is the same as a client VPN in a BGP controlled SD-WAN network. The Route Target Extended Community should be included in a Client Route UPDATE message to differentiate the client routes from routes belonging to other VPNs. Route Target value is taken as the VPN ID (for 1/1 and 2/1). For 1/128 and 2/128, the RD from the NLRI identifies the VPN ID. For EVPN, picking up the VPN-ID from EVPN SAFI.¶
SD-WAN edge node can be reached by either an MPLS path or an IPsec path within the hybrid SD-WAN tunnel. If client packets are sent via a secure MPLS network within the Hybrid SD-WAN tunnel, then the data packets will have MPLS headers with the MPLS Labels based on the scheme specified by [RFC8277]. It is assumed the secure MPLS network assures the security outer MPLS Label header.¶
If the packets are sent via a link with IPsec outer encryption across a public network, the payload is still encrypted with GRE or VXLAN encryption. For GRE Encapsulation within an IPsec tunnel, the GRE key field can be used to carry the SD-WAN VPN ID. For network virtual overlay (VxLAN, GENEVE, etc.) encapsulation within the IPsec tunnel, the Virtual Network Identifier (VNI) field is used to carry the SD-WAN VPN ID.¶
The Hybrid SD-WAN NLRI MUST be accompanied with the TEA, and MUST NOT be accompanied by an Encapsulation Extended Community.¶
An underlay routes contains Hybrid SD-WAN NLRIs with TEA attached. The procedures for processing underlay routes follows the following steps:¶
An Hybrid SD-WAN Tunnel TLV is well-formed using only SubTLVs valid for association with the underlay Route.¶
Section 3.2.1 specifies that Route Type 1 has a tuple of (Port-Local-ID, SD-WAN-Color, SD-WAN-Node-ID). Port-Local-ID may be zero if the NLRI applies to multiple ports. The BGP Peer receiving the NLRI must have pre-configured inbound filters to set the preference for the SD-WAN NLRI tuple.¶
Since a Port-Local-ID value of zero indicates the NLRI applies to multiple ports, it is possible to have the following NLRI within a packet (or received in multiple packets):¶
Port-Local-ID (0), SD-WAN-Color (10), SD-WAN-Node-ID (2.2.2.2),¶
Port-Local-ID (0), SD-WAN-Color (20), SD-WAN-Node-ID (2.2.2.2), and¶
Port-Local-ID (0), SD-WAN-Color (30), SD-WAN-Node-ID (2.2.2.2).¶
These NLRI may simply indicate that there are three groups of tunnels for SD-WAN-Node-ID (2.2.2.2) assigned three colors. For example, these tunnels could represent three types of gold, silver and bronze network service.¶
An underlay route (SD-WAN NLRI) may only attach to one Hybrid SD-WAN Tunnel. If there are more than one Hybrid SD-WAN Tunnel TLV within a single TEA, the first is processed and the subsequent Hybrid SD-WAN Tunnel TLVs are ignored.¶
The Error handling for SD-WAN VPN support has two components: error handling for Tunnel Encapsulation signaling (Encaps-EC and TEA) and the SD-WAN NLRI. An SD-WAN NLRI, a Tunnel Encapsulation attribute MUST always accompany the SD-WAN NLRI.¶
The previous sections (3.4 and 3.5) provide the normal procedures for handling client routes and undelay routes.¶
The error handling for the tunnel encapsulation signaling (Encaps-EC and TEA) adheres to the error handling and validation specified by [RFC9012].¶
The Tunnel encapsulation signaled with the client routes indicates the Egress endpoint via Next Hop in the Encaps-EC or the TEA SubTLV for Tunnel Egress Endpoints. As indicated in the procedure in sections 3.4.2 and 3.5.2, the SD-WAN Hybrid tunnel follows the validation section 6, 8, and 13 from [RFC9012].¶
The SD-WAN client routes associates some of the NLRIs that [RFC9012] associates with the Encaps-EC and the TEA using the validation specified in [RFC9012] in sections 6, 8, and 13. When the SD-WAN Hybrid Tunnel is associated with the SD-WAN NLRI, and all RFC9012 validation rules in section 6, 8, and 13 are extended to apply to the SD-WAN NLRI.¶
[RFC9012] contains the necessary detail to specify validation for the new SubTLVs present for the SD-WAN Tunnel type. However, to aid users of this document the following recap of validation of [RFC9012] is provided below. The validation from section 13 of [RFC9012] includes:¶
Invalid tunnel type must be treat if the TLV was not present.¶
A malformed subTLVs must be treated as an unrecognized subTLV except for Tunnel Egress Endpoint. If Tunnel Egress Endpoint is malformed, the entire TLV must be ignored.¶
Multiple incidents of Tunnel Egress Endpoint SubTLV cause the first incident of these subTLVs to be utilized. Subsequent TLVs after the first one per type are ignored (per RFC9012), but propogated.¶
If a subTLV is meaningless for a tunnel type, the subTLV is ignored, but the subTLV is not considered malformed or removed from the Tunnel Attribute propagated with the NLRI.¶
For SD-WAN client routes with a TEA with a SD-WAN Hybrid Tunnel type TLV, the IPSec SubTLVs (IPsec SA-ID, IPSec nonce, IPSec Public Key, IPsec Proposal, and Simplified IPsec SA) are meaningful, but may be rarely sent. Incorrect fields within any of these 5 TLVs. Per [RFC9012], a malformed subTLV is treated as an unrecognized subTLV.¶
For SD-WAN NLRI underlay routes, the the Extended Port subTLV and the IPSec SubTLVs (IPsec SA-ID, IPSec nonce, IPSec Public Key, IPsec Proposal, and Simplified IPsec SA) are valid and meaningful. Incorrect fields within any of these 6 TLVs or subSubTLVs within the TLVs should cause the subTLV to be treated as malformed SubTLV. Per [RFC9012], a malformed subTLV is treated as an unrecognized subTLV.¶
If multiple instancs of the IPsec nonce, IPsec Public Key, IPsec Proposal, and Simplified IPsec are received within a SD-WAN Tunnel TLV , only the first is processed. The second instance is ignored and not propagated. The IPsec SA-ID may have multiple copies, but the IPsec SA Identifiers sent in the second SubTLV must be different than any in the first IPsec-SA ID SubTLV.¶
If multiple instances of the Extended Port subTLV are received, the local policy must determine which is to be used.¶
The SD-WAN NLRI [AFI 1/SAFI = 74] utilizes a route type field to describe the format of the NLRI. This specification only allows an NLRI with a type value of 1. An NLRI with a type of field of another value is ignored and not processed. The implementation MAY log an error upon a reception of an type value outside of Route Type 1. Error handling for the SD-WAN NLRI also adheres to the BGP Update error handling specified in [RFC7606].¶
The local policy configuration in the BGP peer receiving this NLRI must determine the validity of the route based on policy. Local configuration and policy must be carefully constrain the SD-WAN-NLRI, tunnels, and IPsec security associations in to create a "walled garden".¶
In the future, other proposals for a SD-WAN NLRI may specify a different route type. Those proposals must specify the following:¶
The SD-WAN NLRI (AFI=1/SAFI=74) must be paired with Tunnel Encapsulation attribute with a tunnel TLV for tunnel type SD-WAN-Hybrid. If the SD-WAN NLRI exist in an BGP UPDATE without a Tunnel Encapsulation Attribute (TEA) with a tunnel TLV for tunnel type SD-WAN-Hybrid, the NLRI is considered malformed and Treat-as-withdraw approach (per RFC7606).¶
The SD-WAN NLRI should not be paired with Encapsulation Extended Community. If an SD-WAN NLRI is paried Encapsulation Extended Community rather than a Tunnel Encapsulation Attribute, the SD-WAN NLRI is considered malformed and Treat-as-withdraw approach (per [RFC7606]) should be used.¶
Unlike MPLS VPN whose PE nodes are all controlled by the network operators, SD-WAN edge nodes can be installed anywhere, in shopping malls, in 3rd party Cloud DCs, etc.¶
It is very important to ensure that client routes advertisement from an SD-WAN edge node are legitimate. The RR needs to ensure the SD-WAN Hybrid Tunnels and routes run over the appropriate Security associations.¶
It is critical that the Hybrid SD-WAN Tunnel have correctly forward traffic based on the local policy on the client routes, the tunnel egress and tunnel ingress, and the security association. The RR reflector and the BGP peer must check that the client routes, tunnel egress, tunnel ingress, and security associations align with expected values for a tunnel.¶
Each BGP peer (e.g. a C-PE) advertises a SD-WAN SAFI Underlay NLRI to the other BGP peers via a BGP Route Reflector to establish pairwise IPsec Security Associations (SA) between itself and other remote BGP Peers. During the SD-WAN SAFI NLRI advertisement, the BGP Peer originating may pass information about security association in one of three forms:¶
an identifier for a pre-configured and established IPsec Security Association,¶
a simplified set of security parameters for setting up a IPsec Security association (Transform, IPsec Mode, AH and ESP Algorithms, rekey counter, 2 public keys, nonce, and duration of security association), or¶
a flexible set of security parameters where Nonce, Public Key, and SA Proposal are uniquely specified.¶
For existing IPsec Security associations, the receiving BGP peer can simply utilize one of these existing security associations to pass data. If multiple IPsec associations are pre-configured, the local policy on the SD-WAN Edge Node may help select which security association is chosen for the SD-WAN Hybrid Tunnel.¶
If the receiving and originating BGP peer engage in a set-up for the IPsec security associations for the link within the SD-WAN Hybrid tunnel, IPsec mechansims require that there are matching IPsec transforms. Without common IPsec transforms, the IPsec set-up process cannot operate.¶
The TEA passes in the Tunnel TLV for the SD-WAN Hybrid Tunnel these three sets of information in the following subTLVs:¶
The BGP Peer's need to send the IPSec SA attributes received on the SD-WAN NLRI in the TEA between the local and remote WAN ports. If there is a match on the SA Attributes between the two ports, the IPSec Tunnel is established. If there is a mismtach on the SA Attributes, no IPsec Tunnel is established.¶
The C-PE devices do not try to negotiate the base IPSec-SA parameters between the local and the remote ports in the case of simple IPSec SA exchange or the Transform sets between local and remote ports. If there is a mismatch in the IPsec SA, then no IPsec Tunnel is created. If there is a mismatch on the Transform sets in the case of full-set of IPSec SA Sub-TLVs, no tunnel is created.¶
This section provides one example of how IPsec Security associations are created over the SD-WAN Hybrid tunnel. Figure 1 in Section 3 shows an establish an IPsec Tunnel being created between C-PE1 and C-PE2 WAN Ports A2 and B2 (A2: 192.10.0.10 - B2:192.0.0.1).¶
To create this tunnel C-PE1 needs to advertise the following attributes for establishing the IPsec SA:¶
NextHop: 192.10.0.10¶
SD-WAN Node ID: 1.1.1.1¶
SD-WAN-Site-ID: 15.0.0.2¶
Tunnel Encap Attr (Type=SD-WAN) -¶
C-PE2 needs to advertise the following attributes for establishing IPsec SA:¶
As there is no matching transform between the WAN ports A2 and B2 in C-PE1 and C-PE2, respectively, no IPsec Tunnel will be established.¶
The document describes the encoding for SD-WAN edge nodes to advertise its properties to their peers to its RR, which propagates to the intended peers via a secure link across an untrusted network.¶
The secure propagation is achieved by secure channels, such as TLS, SSL, or IPsec, between the SD-WAN edge nodes and the local controller RR.¶
SD-WAN edge nodes MUST have a secure transport connection to the RR. This secure section can be BGP over BGP connection can be established as TCP over IPsec, SSL or TLS.¶
In a walled garden SD-WAN deployment where all SD-WAN edges and the central controller are under one administrative control and the network operates within a closed environment, the threat model is primarily on internal threats, misconfigurations, and localized physical risks. Unauthorized physical access to SD-WAN edge devices in remote locations is a concern. Such access might allow attackers to compromise the edge devices and potentially manipulate the advertised Client prefixes with VPN IDs (or Route Targets) that do not belong to them. This can lead to unauthorized data interception and traffic redirection.¶
Ensuring secure communication between SD-WAN edge nodes and the central controller within a walled garden deployment is crucial. It is essential to utilize secure communication channels such as TLS, SSL or TCP over IPsec for all communications between edge nodes and the controller.¶
Therefore, it is necessary to ensure physical security controls are in place at remote locations, including locks, surveillance, and access controls. Additionally, the RR needs to verify the BGP advertisements from each SD-WAN edge to ensure in the SD-WAN Secure L3VPN that their advertised VPN IDs (and Route Targets) are truly theirs. In addition, local BGP policy should careful set-up access lists for the routes received and propagated. These verifications help prevent unauthorized advertisement of prefixes and ensures the integrity of the routing information within the SD-WAN environment.¶
IANA has assigned SAFI = 74 as the Hybrid (SD-WAN) SAFI.¶
IANA is requested to assign a type from the BGP Tunnel Encapsulation Attribute Tunnel Types as follows [RFC8126]:¶
Value Description Reference ----- ------------ --------- 25 SD-WAN-Hybrid (this document)¶
IANA is requested to assign the following sub-Types in the BGP Tunnel Encapsulation Attribute Sub-TLVs registry:¶
Value Type Description Reference Section ----- ----------------------- ------------- ------- 64 IPSEC-SA-ID Sub-TLV This document 3.3.1 65 Extended Port Property Sub-TLV This document 3.3.6 66 Underlay Transport Sub-TLV This document 3.3.6.1 67 IPsec SA Rekey Counter Sub-TLV This document 3.3.2 68 IPsec Public Key Sub-TLV This document 3.3.3 69 IPsec SA Proposal Sub-TLV This document 3.3.4 70 Simplified IPsec SA sub-TLV This document 3.3.5¶
IANA is requested to assign a type from the BGP Tunnel Encapsulation Attribute Tunnel Types as follows [RFC8126]:¶
Value Description Reference ----- ------------ --------- 25 SD-WAN-Hybrid (this document)¶
Acknowledgements to Wang Haibo, Shunwan Zhuang, Hao Weiguo, and ShengCheng for implementation contribution. Many thanks to Yoav Nir, Graham Bartlett, Jim Guichard, John Scudder, and Donald Eastlake for their review and suggestions.¶
Below is a list of other contributing authors:¶