Linda,
If you want to securely encrypt traffic between endpoints then you are going to
need to build point-point encrypted tunnels between these endpoints, this is
the main reason that SD-WAN implementations use either a full-mesh or
dynamic-mesh of point-point tunnels. If you rely on a
A new Request for Comments is now available in online RFC libraries.
RFC 8247
Title: Algorithm Implementation Requirements and Usage
Guidance for the Internet Key Exchange
Protocol Version 2 (IKEv2)
Author: Y.
Title: LS on ITU-T SG17 work on quantum-safe PKI
Submission Date: 2017-09-13
URL of the IETF Web page: https://datatracker.ietf.org/liaison/1541/
From: Jean-Paul Lemaire
To: David Waltermire ,Tero Kivinen
,Russ