{"draft":"draft-ietf-nvo3-overlay-problem-statement-04","doc_id":"RFC7364","title":"Problem Statement: Overlays for Network Virtualization","authors":["T. Narten, Ed.","E. Gray, Ed.","D. Black","L. Fang","L. Kreeger","M. Napierala"],"format":["ASCII","HTML"],"page_count":"23","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Network Virtualization Overlays","abstract":"This document describes issues associated with providing multi-tenancy in\r\nlarge data center networks and how these issues may be\r\naddressed using an overlay-based network virtualization approach. A\r\nkey multi-tenancy requirement is traffic isolation so that one\r\ntenant's traffic is not visible to any other tenant. Another\r\nrequirement is address space isolation so that different tenants can\r\nuse the same address space within different virtual networks.\r\nTraffic and address space isolation is achieved by assigning one or\r\nmore virtual networks to each tenant, where traffic within a virtual\r\nnetwork can only cross into another virtual network in a controlled\r\nfashion (e.g., via a configured router and\/or a security gateway).\r\nAdditional functionality is required to provision virtual networks,\r\nassociating a virtual machine's network interface(s) with the\r\nappropriate virtual network and maintaining that association as the\r\nvirtual machine is activated, migrated, and\/or deactivated. Use of\r\nan overlay-based approach enables scalable deployment on large\r\nnetwork infrastructures.","pub_date":"October 2014","keywords":[],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC7364","errata_url":null}