nanog mailing list archives
Re: SRv6
From: Mark Tinka <mark.tinka () seacom com>
Date: Thu, 17 Sep 2020 19:47:25 +0200
On 17/Sep/20 19:36, mark seery wrote:
Private line was a common term for leased lines. Leased lines were not encrypted by the operator, AFAIK. This terminology morphed to virtual private line, Ethernet Private Line, virtual private LAN service (VPLS), etc."In telecommunication, a private line is typically a telephone company service that uses a dedicated, usually unswitched point-to-point circuit, but it may involve private switchingarrangements, or predefined transmission physical or virtual paths.”https://en.wikipedia.org/wiki/Private_line <https://en.wikipedia.org/wiki/Private_line>https://www.business.att.com/products/dedicated-internet/#/ <https://www.business.att.com/products/dedicated-internet/#/>http://etler.com/docs/AT&T%20Pub/TR54077.pdf <http://etler.com/docs/AT&T%20Pub/TR54077.pdf>https://business.comcast.com/enterprise/products-services/data-networking/ethernet-virtual-private-line <https://business.comcast.com/enterprise/products-services/data-networking/ethernet-virtual-private-line>VPN is a terminology consistent with past practices. It is P in all the ways discussed on this thread, and historically consistent (at least from a marketing perspective). Whether it is P enough is a reasonable discussion, everyone in I(C)T is going to be facing a wave of voter concern about privacy, IMO.
It's six and half-a-dozen."Private Line" isn't the same thing as "Private Network". A small, but crucial distinction, particularly for folk on a list like this. Probably interchangeable to the ordinary wi-fi user. But then again, operators always choose words carefully, and if the contract said "Private Line" in lieu of "Private Network", or vice versa, that wasn't by mistake.
Torn between two lovers: Growing voter concern about privacy & longheld, and arguably increasing, desire to intercept criminal / terrorist communication. I’d actually be curious if any operators have received public sector pushback when they tried to implement encryption.
Sounds like you're making a/the case for MACSec :-).Anyone know how widely MACSec has been adopted? Or for that matter, large-scale encryption on the backbone side?
For me, MACSec is kind of like SyncE... great on paper and in the sales pitch, but anyone that truly wants to use those features is probably going to be architecting, deploying and managing them themselves, and not paying a 3rd party network operator for the priviledge.
As always, I could be wrong... Mark.
Current thread:
- Re: SRv6, (continued)
- Re: SRv6 Jeff Tantsura (Sep 15)
- RE: SRv6 aaron1 (Sep 15)
- Re: SRv6 Randy Bush (Sep 15)
- Re: SRv6 Mark Tinka (Sep 16)
- Re: SRv6 Anoop Ghanwani (Sep 16)
- Re: SRv6 Randy Bush (Sep 16)
- Re: SRv6 Mark Tinka (Sep 17)
- Re: SRv6 mark seery (Sep 17)
- Re: SRv6 Mark Tinka (Sep 17)
- Re: SRv6 mark seery (Sep 17)
- Re: SRv6 Mark Tinka (Sep 17)
- Re: SRv6 tim () pelican org (Sep 18)
- Re: SRv6 Mark Tinka (Sep 18)
- Re: SRv6 Wilco Baan Hofman (Sep 18)
- Re: SRv6 mark seery (Sep 18)
- Re: SRv6 Mark Tinka (Sep 19)
- Re: SRv6 Valdis Klētnieks (Sep 19)
- Re: SRv6 Mark Tinka (Sep 20)
- Re: SRv6 Łukasz Bromirski (Sep 21)
- Re: SRv6 Mark Tinka (Sep 16)
- Re: SRv6 James Bensley (Sep 16)