2018
DOI: 10.17487/rfc8402
|View full text |Cite
|
Sign up to set email alerts
|

Segment Routing Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 171 publications
(17 citation statements)
references
References 1 publication
0
12
0
Order By: Relevance
“…• Segment Routing [5] • Data Center Network Virtualization Overlay (NVO3) Networks [6] • Generic Network Virtualization Encapsulation (GENEVE) [7] • Smart Grid [8] • Constrained Application Protocol (CoAP)…”
Section: As Of the Date Of Publication And Following Call(s) For The mentioning
confidence: 99%
See 2 more Smart Citations
“…• Segment Routing [5] • Data Center Network Virtualization Overlay (NVO3) Networks [6] • Generic Network Virtualization Encapsulation (GENEVE) [7] • Smart Grid [8] • Constrained Application Protocol (CoAP)…”
Section: As Of the Date Of Publication And Following Call(s) For The mentioning
confidence: 99%
“…This provides administrators an opportunity to evaluate the impact of the IPsec solution and resolve issues prior to enterprise-wide deployment. 5. Manage the Solution -Maintain the IPsec components and resolve operational issues; repeat the planning and implementation process when significant changes need to be incorporated into the solution.…”
Section: As Of the Date Of Publication And Following Call(s) For The mentioning
confidence: 99%
See 1 more Smart Citation
“…In 183 practice, the terms "IPsec VPN," "IKEv2 VPN," "Cisco IPsec," "IPsec XAUTH," and 184 "L2TP/IPsec" all refer to IPsec-based VPN connections. Some examples of technologies and 185 protocols that use IKE and/or IPsec are: 186 • Ethernet VPN (EVPN) and Virtual eXtensible Local Area Network (VXLAN) [4] • Software-Defined Networking (SDN) and Software-Defined Wide Area Network (SDWAN) • Segment Routing [5] • Data Center Network Virtualization Overlay (NVO3) Networks [6] • Generic Network Virtualization Encapsulation (GENEVE) [7] • Smart Grid [8] • Constrained Application Protocol (CoAP) • Low-Power Wireless Personal Area Network (6LowPAN) [9] • Routing protocol protection [10] such as Border Gateway Protocol (BGP)/BGP Monitoring Protocol (BMP) [11] and Open Shortest Path First (OSPFv3) [12] VPNs protect communications carried over public networks such as the Internet as well as private networks such as fiber networks or Multi-Protocol Label Switching (MPLS) networks. A VPN can provide several types of data protection, including confidentiality, integrity, data origin authentication, replay protection, and access control.…”
Section: Executive Summarymentioning
confidence: 99%
“…Chaining (AES-XCBC), 5 AES-Cipher-Based Message Authentication Code (AES-CMAC) [27], and AES-Galois Message Authentication Code (AES-GMAC) [28] 2.…”
Section: Integritymentioning
confidence: 99%