A little. Also like GET-VPN and AC-VPN and Provider-1 (apologies to all
the vendors I've missed)

Those are some of the incompatible solutions by individual vendors.

Yoav

On 10/14/11 8:18 AM, "Dan Harkins" <dhark...@lounge.org> wrote:

>
>  Sounds like TED:
>
>http://www.cisco.com/en/US/docs/ios/12_0t/12_0t5/feature/guide/ted.html
>
>  Dan.
>
>On Thu, October 13, 2011 10:23 pm, Yoav Nir wrote:
>> Hi all
>>
>> For years, one of the barriers to the adoption of IPsec was that
>> configuration didn't scale. With thousands of peers, the PAD and SPD
>>would
>> become unwieldy, so even where IPsec was deployed it was often built in
>> hub-and-spoke configurations, not because policy demanded this, but
>> because it was more convenient to configure. Individual vendors have
>> incompatible solutions for this, but they only work with that vendor's
>> products, and within the same administrative domain.
>>
>> In this draft, we are proposing that the IPsecME working group take on a
>> working item to first define the problem, and then offer solutions that
>> will make IPsec scale better and in an inter-operable way.
>>
>> We plan to hold a side meeting in Taipei, and we welcome comments both
>> before and at that meeting.
>>
>> Yoav
>>
>> http://www.ietf.org/id/draft-nir-ipsecme-p2p-00.txt
>> http://tools.ietf.org/html/draft-nir-ipsecme-p2p-00
>>
>> _______________________________________________
>> IPsec mailing list
>> IPsec@ietf.org
>> https://www.ietf.org/mailman/listinfo/ipsec
>>
>
>
>
>Scanned by Check Point Total Security Gateway.

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to