I might have put it like this if it wan't so similar to the way things are 
configured on Check Point gateways :-)

It makes sense to me, but I'm not sure it covers all the use cases. Imagine a 
topology that is entirely mesh, except for HTTP(S) traffic that is routed to a 
central site because they have some HTTP inspection gateway there. It's a 
requirement that came up a while ago. How does that fit the "either mesh or 
star" topology?

Also, a gateway that is part of more than one topologies (at Check Point we 
call them "communities") would have to have a different view of the network in 
these two contexts. As far as its peers in community A are concerned, it is 
protecting all the networks behind any gateways in community B, but for members 
on community B, it is protecting all the addresses behind gateways in community 
A.

On May 12, 2012, at 10:53 PM, Vishwas Manral wrote:

Hi Yaov,

If I udnerstand correctly, what you seem to be talking about is a 
Star-of-meshes or a mesh-of-star topology.

In my view this would be dealt with in 2 different iterations of the Mesh VPN 
topology. So there would be a Mesh VPN for the Star topology and a separate 
instance of the Mesh VPN for the mesh topology.

Let me know if that makes sense. I think we can state that the requirement 
should allow for such iterative use cases, however at one instance we only look 
at star or mesh topology. Do I make sense?

Thanks,
Vishwas

On Sat, May 12, 2012 at 11:34 AM, Yoav Nir 
<y...@checkpoint.com<mailto:y...@checkpoint.com>> wrote:
Hi.

I think it should be more complicated than this. The suggested solution has a 
dichotomy of either a full mesh or a start topology. The requirements should 
cover scenarios such as a mesh within an organization connecting to a hub to 
gateways outside the organization, or multiple hubs connected among themselves 
in either a star or a mesh, or even certain "routes" that are manually 
configured along with all the auto-discovery stuff.

Perhaps we can capture the needed complexity by talking about groups of nodes, 
where nodes that belong to a single group attempt to create a mesh among them, 
and packets can travel between nodes that do not belong to the same group 
through group intersection. I'm not sure if this level of detail is part of the 
problem statement, but it's more high level than a solution.

On May 12, 2012, at 1:11 AM, Vishwas Manral wrote:

> Hi,
>
> I would like to start off by trying to resolve the issue. The notes from the 
> IETF are attached below.
>
> Description:Some admins prefer a star topology so they can inspect traffic. 
> They may not want to use this technology.
>
> Detail arguments: My take is similar to what Yaron and Yaov seem to state. 
> There is no reason to exclude star topology at all from the Problem 
> statement/ requirements document. In fact both the proprietary solutions I 
> know of allow for such a topology. I however understand that some of the 
> functionality on the Hub (of the star) could be achieved by using PFP flags 
> in the SPD entry.
>
> Suggested Resolution: State in the document that Star topology is not 
> excluded from the solution. The problem of configuration is however mainly 
> limited to the Hub. For every spoke added/ deleted/ modified the 
> configuration on the Hub needs to be changed, which is not desirable. May be 
> update Section 3.2 with the same too.
>
> Thanks,
> Vishwas
> ===========================================================
> Notes from meeting minutes:
>
>                   # 219 Star topology as an admin choice
>                           People don't need to use this if they don't want to
>                           Say this in the security considerations
>                           Yoav Nir:
>                                   Has to be a requirement that any solution 
> can
>                                   implement different policies
>                           Yaron Sheffer:
>                                   Agrees with Yoav, maybe becomes a use case
>                                   Take this to the list
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org<mailto:IPsec@ietf.org>
> https://www.ietf.org/mailman/listinfo/ipsec



_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to