Aijun,

The BGP described in this document is the iBGP instance that controls the 
SD-WAN overlay, not the underlay BGP sessions. In this model, the SD-WAN 
controller includes the Route Reflector function, distributing overlay routes 
and tunnel attributes to edge sites. While sites normally connect to a single 
SD-WAN controller, using BGP for the overlay still provides clear benefits in 
scalability, policy distribution, and interoperability that proprietary 
solutions cannot match.

Here are the responses to your other comments:

1)      The document focus on the "BGP Usage for SD-WAN Overlay Networks", 
then, can we remove the  section 6 of "SD-WAN Forwarding Model" which focuses 
mainly on the forwarding plane, not BGP usage?

      [Linda] Section 6 should remain because, while the draft focuses on BGP 
as the control plane, it is important to show how the attributes BGP 
distributes (such as tunnel parameters and colors) are actually applied in the 
SD-WAN forwarding plane. Many BGP RFCs include forwarding-plane context for 
clarity-for example, RFC 4271 (BGP-4) describes how NEXT_HOP affects 
forwarding, RFC 4364 (BGP/MPLS IP VPNs) explains how BGP routes map to MPLS 
label forwarding, and RFC 7432 (EVPN) details how BGP-distributed information 
drives Ethernet data-plane behavior. Removing Section 6 would make the usage 
description incomplete.

2)      Should the document introduce first the scenario, and requirements, and 
then the BGP controlled SD-WAN? That is to say, put the current section 3.1 
after the section 3.2/3.3/3.4?

      [Linda]  The reason Section 3.1 introduces the BGP-controlled SD-WAN 
framework first is to establish the control-plane context before diving into 
detailed scenarios and requirements. This ordering follows the style of many 
BGP-related RFCs, where the control-plane architecture is introduced early and 
then illustrated by scenarios and requirements. That said, we can certainly 
revisit the section ordering if the WG feels that leading with scenarios 
(Sections 3.2/3.3/3.4) and then returning to the BGP framework would improve 
readability.

3)      Should the authors review again the current "requirements" with the 
section 5, and evaluate again whether the section 5 meets the current 
"requirements"? for example, can the "Zero Touch Provisioning" is accomplished 
via the BGP protocol? If not, I suggest to remove such requirements.
      [Linda] We agree that requirements should be aligned with what BGP can 
realistically provide. While Zero Touch Provisioning (ZTP) is not delivered by 
BGP alone, our approach uses BGP to exchange the IPsec-related parameters, 
under the assumption that the Route Reflector already has a trusted 
relationship with the edge for basic configuration and route exchange. This 
allows the IKEv2 negotiation step to be eliminated, which in turn simplifies 
and accelerates the process of achieving ZTP for IPsec establishment.
      How about adding the following sentence at the end of Section 4.3  (IPsec 
Related Parameters Provisioning):
            "This mechanism supports the ZTP requirement outlined in Section 
3.1.4 by enabling IPsec tunnels to be provisioned without IKEv2 negotiation."

4)      As I known, current SD-WAN deployment is mainly implemented via the 
vendor's proprietary protocol, because the complex policy requirements. Can the 
authors explain more the benefits that depends on BGP, instead of the 
proprietary protocol to accomplish the similar aim? And, if we need still the 
controller, why don't use the proprietary protocol, instead of extending the 
BGP protocol?

      [Linda] The document already addresses this point in Section 5.1 
(Rationale for Using BGP as the Control Plane for SD-WAN). While proprietary 
protocols have been common in early SD-WAN deployments, BGP provides 
significant advantages: it is a well-understood, widely deployed standard, 
scales through mechanisms like route reflection, and enables interoperability 
across multi-vendor environments. The controller remains necessary for 
centralized policy distribution, but extending BGP allows us to achieve this 
using an open protocol rather than relying on proprietary mechanisms. We can 
make sure Section 5.1 is more clearly cross-referenced earlier in the draft, so 
readers do not miss this rationale.

Thank you,

Linda

From: Aijun Wang <[email protected]>
Sent: Monday, September 8, 2025 1:51 AM
To: 'Chongfeng Xie' <[email protected]>; 'Matthew Bocci (Nokia)' 
<[email protected]>; 'bess' <[email protected]>
Cc: [email protected]
Subject: RE: [bess] Re: WG Last Call for draft-ietf-bess-bgp-sdwan-usage

Hi, Chongfeng:

The standard BGP protocol can certainly unlock the customer to one specific 
SD-WAN service provider.
But given the scenario in this document depends on the SD-WAN controller, it is 
unrealistic that the different sites of one customer connect to different 
SD-WAN controllers.
Normally, these sites of the customer will connect one SD-WAN controller, then, 
the advantage of BGP protocol, when compared with the prosperity protocol, is 
not very convinced.

Best Regards

Aijun Wang
China Telecom

From: Chongfeng Xie [mailto:[email protected]]
Sent: Monday, September 8, 2025 1:35 PM
To: Aijun Wang <[email protected]<mailto:[email protected]>>; 
Matthew Bocci (Nokia) 
<[email protected]<mailto:[email protected]>>;
 bess <[email protected]<mailto:[email protected]>>
Cc: 
[email protected]<mailto:[email protected]>
Subject: Re: [bess] Re: WG Last Call for draft-ietf-bess-bgp-sdwan-usage



Hi Aijun,
For point 4 you raised, I think current proprietary protocol-based 
implementations have limited deployment scale, in addition, for users are bound 
to a specific service provider, it constrains users' choices. Therefore, It is 
necessary to propose new alternative solutions.

Best regards
Chongfeng


From: Aijun Wang<mailto:[email protected]>
Date: 2025-09-08 12:09
To: 'Matthew Bocci \(Nokia\)'<mailto:[email protected]>; 
'BESS'<mailto:[email protected]>
CC: 
draft-ietf-bess-bgp-sdwan-usage<mailto:[email protected]>
Subject: [bess] Re: WG Last Call for draft-ietf-bess-bgp-sdwan-usage
Hi, All:

I have reviewed roughly this document, and have the following comments before 
its publication:

1)    The document focus on the "BGP Usage for SD-WAN Overlay Networks", then, 
can we remove the  section 6 of "SD-WAN Forwarding Model" which focuses mainly 
on the forwarding plane, not BGP usage?
2)    Should the document introduce first the scenario, and requirements, and 
then the BGP controlled SD-WAN? That is to say, put the current section 3.1 
after the section 3.2/3.3/3.4?
3)    Should the authors review again the current "requirements" with the 
section 5, and evaluate again whether the section 5 meets the current 
"requirements"? for example, can the "Zero Touch Provisioning" is accomplished 
via the BGP protocol? If not, I suggest to remove such requirements.
4)    As I known, current SD-WAN deployment is mainly implemented via the 
vendor's proprietary protocol, because the complex policy requirements. Can the 
authors explain more the benefits that depends on BGP, instead of the 
proprietary protocol to accomplish the similar aim? And, if we need still the 
controller, why don't use the proprietary protocol, instead of extending the 
BGP protocol?

Answering the above questions, and make the above adjustment, can convince the 
reader better and make the document's motivation more clearly.


Best Regards

Aijun Wang
China Telecom
From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Matthew Bocci (Nokia)
Sent: Wednesday, August 27, 2025 7:05 PM
To: BESS <[email protected]<mailto:[email protected]>>
Cc: 
[email protected]<mailto:[email protected]>
Subject: [bess] WG Last Call for draft-ietf-bess-bgp-sdwan-usage

This email begins a working group last call for 
draft-ietf-bess-bgp-sdwan-usage-26 - BGP Usage for SD-WAN Overlay 
Networks<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-bess-bgp-sdwan-usage%2F&data=05%7C02%7Clinda.dunbar%40futurewei.com%7C802d0474791c42bcad3708ddeeb4e1ae%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638929182873283390%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=BULGfVgTS8K9OplS21MLrHQjT1Bo8a1wkR3MgIZXvBs%3D&reserved=0>

Please review the draft and send any comments to the BESS WG list, including 
whether (or not) you support publishing this draft as an informational RFC.

A bit of background: the draft was previously sent to the IESG but was returned 
to the working group after extensive review/discussion and due to some concerns 
that it was not in charter at the time. The BESS WG charter has recently been 
clarified.

This WG last call ends on Wednesday 10th September.

Matthew



_______________________________________________
BESS mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to