TOC 
Internet Engineering Task ForceF. Brockners
Internet-DraftS. Gundavelli
Intended status: Standards TrackCisco
Expires: April 29, 2010October 26, 2009


Gateway Initiated Dual-Stack Lite Deployment
draft-gundavelli-softwire-gateway-init-ds-lite-01

Status of this Memo

This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”

The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.

The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.

This Internet-Draft will expire on April 29, 2010.

Copyright Notice

Copyright (c) 2009 IETF Trust and the persons identified as the document authors. All rights reserved.

This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents in effect on the date of publication of this document (http://trustee.ietf.org/license-info). Please review these documents carefully, as they describe your rights and restrictions with respect to this document.

Abstract

Dual-Stack lite (DS-lite) has been proposed as an IPv4 to IPv6 transition technique. Dual-stack lite allows a service provider to migrate his network to IPv6, while still offering IPv4 services to the customer. The dual-stack lite solution uses an IPv4-over-IPv6 tunnel between a host (or access device) and a dual-stack lite Carrier Grade NAT (CGN). Several existing network architectures (e.g. 3GPP, WiMAX, or PPP based broadband networks) already specify dual-stack deployment and leverage tunneling schemes between the access device and an access gateway in the provider network. Applying the dual-stack lite concept to these networks will result in changes to the end-system and unnecessary tunneling overhead. This draft describes a modified implementation of dual-stack lite where existing access tunnels are extended beyond the access gateway to the dual-stack lite CGN using softwires. This evolved approach not only applies to IPv6 networks but also includes support for IPv4 networks.



Table of Contents

1.  Overview
2.  Conventions
3.  Gateway Initiated DS-Lite
    3.1.  Generic deployment scenario of GI-DS-lite
    3.2.  Considerations for the gateway
    3.3.  Considerations for the softwire tunnel
    3.4.  Considerations for the CGN
    3.5.  Connectivity establishment: Example call flow
4.  Example Deployment Scenarios
    4.1.  Mobile IP based access architectures
        4.1.1.  MIPv6 deployment overview for GI-DS-lite
        4.1.2.  MIPv6 deployment considerations for GI-DS-lite
    4.2.  Proxy Mobile IP based access architectures
        4.2.1.  PMIPv6 deployment overview for GI-DS-lite
        4.2.2.  PMIPv6 deployment considerations for GI-DS-lite
    4.3.  GTP based access architectures
        4.3.1.  GTP deployment overview for GI-DS-lite
        4.3.2.  GTP deployment considerations for GI-DS-lite
    4.4.  Fixed WiMAX access architecture
        4.4.1.  Fixed-WiMAX deployment overview for GI-DS-lite
        4.4.2.  Fixed-WiMAX deployment considerations for GI-DS-lite
    4.5.  Mobile WiMAX access architecture
        4.5.1.  Mobile-WiMAX deployment overview for GI-DS-lite
        4.5.2.  Mobile-WiMAX deployment considerations for GI-DS-lite
    4.6.  PPP-based access architectures
        4.6.1.  PPP deployment overview for GI-DS-lite
        4.6.2.  PPP deployment considerations for GI-DS-lite
    4.7.  Ethernet VLAN based access architectures
        4.7.1.  Ethernet access deployment overview for GI-DS-lite
        4.7.2.  Ethernet access deployment considerations for GI-DS-lite
5.  Acknowledgements
6.  IANA Considerations
7.  Security Considerations
8.  References
    8.1.  Normative References
    8.2.  Informative References
§  Authors' Addresses




 TOC 

1.  Overview

The dual-stack model is a method for transitioning from IPv4 to IPv6. Architecture specifications for fixed and mobile networks (e.g. 3GPP, 3GPP2, WiMAX Forum, or ETSI TISPAN) adopted support for dual stack. Dual-stack connectivity allows an end-system to choose the appropriate IP version for its application. The way dual-stack connectivity is provided to the end-system depends on the network architecture and the deployment model of the service provider. It can either be provided natively, in which case the operator network supports IPv4 and IPv6 in parallel, or through some form of tunneling.

The "Dual-Stack lite" (DS-lite) architecture approach [I‑D.ietf‑softwire‑dual‑stack‑lite] (Durand, A., Droms, R., Haberman, B., Woodyatt, J., Lee, Y., and R. Bush, “Dual-stack lite broadband deployments post IPv4 exhaustion,” July 2009.)) aims at operators that look for a solution to public IPv4-address exhaustion and have migrated their network to solely support IPv6 but still desire to provide IPv4 service access to their customers (this scenario assumes that the CGN function is placed at the boundary to the IPv4-Internet - alternate approaches are discussed in [I‑D.boucadair‑dslite‑interco‑v4v6] (Boucadair, M., Jacquenet, C., Grimault, J., Kassi-Lahlou, M., Levis, P., Cheng, D., and Y. Lee, “Deploying Dual-Stack lite in IPv6-only Network,” October 2009.)). DS-lite allows for operational models where the IPv4 addresses assigned to the end-systems are non-unique with the service provider network. Network deployments without an IPv4 addressing infrastructure become feasible, because all end-systems could use the same IPv4 address (if so desired). DS-lite involves an IPv4-over-IPv6 tunnel between the end-system (i.e. host or access device, such as a mobile handset or broadband router) and the dual-stack lite CGN.

Several network architectures which support dual-stack end-systems already leverage some form of tunneling technology. Mobile architectures based on Mobile IPv6 [RFC3775] (Johnson, D., Perkins, C., and J. Arkko, “Mobility Support in IPv6,” June 2004.), Proxy Mobile IPv6 [RFC5213] (Gundavelli, S., Leung, K., Devarapalli, V., Chowdhury, K., and B. Patil, “Proxy Mobile IPv6,” August 2008.), or GTP [TS29060] (, “3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; General Packet Radio Service (GPRS); GPRS Tunnelling Protocol (GTP), V6.9.0,” 2006.) for example already leverage tunnels to connect the end-system or access device to a mobile gateway providing the mobility anchor point. These architectures use IPv4 over IPv6 tunneling between the mobility entities for carrying the mobile node's IPv4 packets in case of an IPv6 transport network. Additionally, these architectures also support IPv4 over IPv4 tunneling mode when using an IPv4 transport network between the network elements. Several broadband architectures deploy layer 2 tunnels (e.g. using Ethernet VLANs or PPP) between the end-system or access device and a network access server. The following can be observed when applying the DS-lite concept to architectures which support dual-stack end-systems and employ tunneling to offer IPv4 connectivity:

This draft defines a modified implementation of DS-lite: Gateway-initiated DS-lite (GI-DS-lite). GI-DS-lite leverages the tunneling architecture already in place between the end-system and the access gateway. GI-DS-lite leverages softwire IPv4-over-IPv6 tunnels only between the access gateway and the CGN. It complements existing tunnel-based access architectures by extending the access tunnels on the gateway terminating the access tunnels to the DS-lite CGN using softwires. The access gateway installs a unique softwire identifier for all the end-system flows and uses this softwire identifier to stitch the access tunnel and the softwire tunnel together. The benefits of gateway-initiated DS-lite include:



 TOC 

2.  Conventions

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] (Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” March 1997.).

The following abbreviations are used within this document:

AD: Access Device

CGN: Carrier Grade NAT (also known as "Large Scale NAT (LSN)" or "Dual-Stack lite Tunnel Concentrator")

DS-lite: Dual-stack lite

GI-DS-lite: Gateway-initiated DS-lite

GW: Gateway

SID: Softwire Identifier

TID: Tunnel Identifier



 TOC 

3.  Gateway Initiated DS-Lite

Figure 1 (Gateway-initiated dual-stack lite reference architecture) outlines the generic deployment scenario for gateway-initiated dual-stack lite. This generic scenario can be mapped to multiple different access architectures, some of which are described in Section 4 (Example Deployment Scenarios). Access devices (e.g. AD-1, AD-2) connect to the gateway using some form of tunnel technology to carry IPv4, IPv6 or both. Tunnels can be identified by some form of tunnel identifier, here described as "tunnel identifier (TID)". Gateway and CGN are connected using a softwire tunnel to allow for IPv4 packet transport between Gateway and CGN over IPv6 or IPv4. Different from the original DS-lite approach, in GI-DS-lite, the gateway takes the role of the softwire initiator. The gateway associates access tunnels with the softwire tunnel to the CGN to facilitate IPv4 forwarding. Different from the original DS-lite approach, a single softwire with GRE [RFC2784] (Farinacci, D., Li, T., Hanks, S., Meyer, D., and P. Traina, “Generic Routing Encapsulation (GRE),” March 2000.) or L2TPv3 [RFC3931] (Lau, J., Townsley, M., and I. Goyret, “Layer Two Tunneling Protocol - Version 3 (L2TPv3),” March 2005.), [RFC5641] (McGill, N. and C. Pignataro, “Layer 2 Tunneling Protocol Version 3 (L2TPv3) Extended Circuit Status Values,” August 2009.) encapsulation is used to carry all IPv4 traffic destined for the CGN from all ADs. IPv4-over-GRE (or IPv4-over-L2TPv3) or IPv6-over-GRE (or IPv6-over-L2TPv3) encapsulation is used to differentiate flows from different access devices within the softwire tunnel.



 TOC 

3.1.  Generic deployment scenario of GI-DS-lite



                     Access Tunnel: TID-1
                     Softwire Id: SID-1
                                          NAT Mappings:
IPv4: a.b.c.d               +---+         (SID-1: a.b.c.d, TCP port1;
+------+    Tunnel (TID-1)  |   |                 e.f.g.h, TCP port2)
| AD-1 |====================| G |
+------+                    | A |                          +---+
                            | T |    Softwire tunnel       | C |
                            | E |==========================| G |
IPv4: a.b.c.d               | W |  IPv4-over-GRE/L2TPv3    | N |
+------+                    | A |   over IPv4 or IPv6      +---+
| AD-2 |====================| Y |
+------+    Tunnel (TID-2)  |   |         (SID-2: a.b.c.d, TCP port3;
                            |   |                 e.f.g.h, TCP port4)
                            +---+
                       Access Tunnel: TID-2
                       Softwire Id: SID-2

 Figure 1: Gateway-initiated dual-stack lite reference architecture 



 TOC 

3.2.  Considerations for the gateway

The gateway (GW) terminates access tunnels and associates them with a softwire tunnel connecting to the CGN.

Figure 2 (Example forwarding association at the gateway ) shows the binding entries maintained by the gateway linking the access tunnel and the softwire for the simple example shown above. It assumes a single tunnel per access device, identified by a tunnel identifier (TID), and a one to one mapping between access and softwire tunnels. In this case, the gateway simply stitches access tunnels to softwire tunnels.




+========+===================+=================+
|   AD   |   Softwire-Id     |    Tunnel ID    |
+========+===================+=================+
|  AD-1  |     SID-1         |      TID-1      |
|        |                   |                 |
|  AD-2  |     SID-2         |      TID-2      |
+----------------------------+-----------------+

 Figure 2: Example forwarding association at the gateway  



 TOC 

3.3.  Considerations for the softwire tunnel

GI-DS-lite requires GW and CGN to implement GRE encapsulation (see [RFC2784] (Farinacci, D., Li, T., Hanks, S., Meyer, D., and P. Traina, “Generic Routing Encapsulation (GRE),” March 2000.)) with GRE key and sequence number extensions (see [RFC2890] (Dommety, G., “Key and Sequence Number Extensions to GRE,” September 2000.)) over IPv6 or IPv4 (depending on the transport network between GW and CGN). The GRE key MUST be included for GRE encapsulation. AlAlternatively, L2TPv3 [RFC3931] (Lau, J., Townsley, M., and I. Goyret, “Layer Two Tunneling Protocol - Version 3 (L2TPv3),” March 2005.), [RFC5641] (McGill, N. and C. Pignataro, “Layer 2 Tunneling Protocol Version 3 (L2TPv3) Extended Circuit Status Values,” August 2009.) encapsulation can be used. The GRE key or L2TPv3 Session ID represents the unique SID which is used by the gateway and CGN to differentiate flows from and to different access devices. Figure 3 (Softwire tunnel encapsulation) shows the encapsulations for IPv4 and IPv6 transport. Service providers who deploy an IPv6 only transport network will leverage the IPv4-over-GRE-IPv6 (or IPv4-over-L2TPv3-IPv6) option, whereas IPv4-over-GRE-IPv4 (or IPv4-over-L2TPv3-IPv4) could for example be used by operators who desire to introduce IPv4-to-IPv4 NAT into their network (e.g. because of the exhaustion of their global IPv4 address space), but want to avoid the use of distinct private IPv4 addresses for the access devices.



IPv4 transport network:       IPv6 transport network:

+-----------------------+     +-----------------------+
| IPv4 transport header |     | IPv6 transport header |
+-----------------------+     +-----------------------+
|     GRE header        |     |     GRE header        |
|  (with key = SID )    |     |  (with key = SID )    |
+-----------------------+     +-----------------------+
| IPv4 header & payload |     | IPv4 header & payload |
+-----------------------+     +-----------------------+

 Figure 3: Softwire tunnel encapsulation 



 TOC 

3.4.  Considerations for the CGN

As specified in Section 4.7 of [I‑D.ietf‑softwire‑dual‑stack‑lite] (Durand, A., Droms, R., Haberman, B., Woodyatt, J., Lee, Y., and R. Bush, “Dual-stack lite broadband deployments post IPv4 exhaustion,” July 2009.), the CGN is a special IPv4 to IPv4 NAT deployed in the edge of the service provider network. For GI-DS-lite it is assumed to be reachable by the gateway through either an IPv4 or an IPv6 transport network. It exchanges user traffic with the gateway using IPv4 over IPv4 or IPv6 encapsulation, either with GRE or L2TPv3 encapsulation.

Figure 4 (Example translation table on the CGN) shows a simple translation table at the CGN for the example above. Both access devices are assigned the same IPv4 address, a.b.c.d. The SID (i.e., the GRE key) differentiates flows for the different accesses devices AD-1 and AD-2.




+============================+=========================+
| Softwire-Id/IPv4/Port      |    Public IPv4/Port     |
+============================+=========================+
|  SID-1/a.b.c.d/TCP port1   |    e.f.g.h/TCP port2    |
|                            |                         |
|  SID-2/a.b.c.d/TCP port3   |    e.f.g.h/TCP port4    |
+----------------------------+-------------------------+

 Figure 4: Example translation table on the CGN 



 TOC 

3.5.  Connectivity establishment: Example call flow

Figure 5 (Example call flow for session establishment) shows an example call flow - linking access tunnel establishment on the gateway with softwire tunneling to the CGN. This simple example assumes that traffic from the AD uses a single access tunnel and that the gateway will forward all traffic received over this access tunnel to the CGN.



 AD              GW            AAA/Policy       CGN
 |                |                 |            |
 |----(1)-------->|                 |            |
 |               (2)<-------------->|            |
 |               (3)                |            |
 |                |<------(4)------------------->|
 |               (5)                |            |
 |<---(6)-------->|                 |            |
 |                |                 |            |

 Figure 5: Example call flow for session establishment 

  1. Gateway (GW) receives a request to create an access tunnel endpoint.
  2. The GW authenticates and authorizes the access tunnel. Based on local policy or through interaction with the AAA/Policy system the gateway recognizes that IPv4 service should be provided using DS-lite.
  3. The GW creates an access tunnel endpoint. The access tunnel links AD and GW and is uniquely identified by Tunnel Identifier (TID) on the GW.
  4. (Optional): The GW and the CGN establish a control session between each other. This session is to for example exchange accounting or NAT-configuration information. Accounting information could be supplied to the GW, AAA/Policy, or other network entities which require information about the externally visible address/port pairs of a particular access device. The Diameter NAT Control Application (see [I‑D.draft‑ietf‑dime‑nat‑control] (Brockners, F., Bhandari, S., Singh, V., and V. Fajardo, “Diameter NAT Control Application,” August 2009.) could for example be used for this purpose.
  5. The GW allocates a unique SID and associates the access tunnel (identified by the TID) with the softwire linking GW and CGN. Local forwarding policy on the gateway defines that all traffic received on the access tunnel is forwarded onto the softwire tunnel facing the CGN - and vice versa.
  6. GW and AD complete the access tunnel establishment (could include assignment of a (dummy) IPv4 address using the procedures and mechanisms of the corresponding access network architecture).


 TOC 

4.  Example Deployment Scenarios



 TOC 

4.1.  Mobile IP based access architectures

The Mobile IPv6 protocol with the extensions specified in [RFC5555] (Soliman, H., “Mobile IPv6 Support for Dual Stack Hosts and Routers,” June 2009.) allow support dual stack mobile nodes. In the MIPv6 scenario, the Mobile IPv6 home agent will implement the gateway function along with the dual-stack Mobile IPv6 functionality.



 TOC 

4.1.1.  MIPv6 deployment overview for GI-DS-lite



                            +---+
                            |   |
+------+  DSMIP Tunnel      | H |
| MN-1 |====================| O |
+------+                    | M |                        +---+
                            | E |    DS-Lite Tunnel      | C |
                            |   |========================| G |
                            | A |  IPv4-over-GRE-IPv6/4  | N |
+------+                    | G |                        +---+
| MN-2 |====================| E |
+------+  DSMIP Tunnel      | N |
                            | T |
                            +---+
 Figure 6: Home Agent Initiated Dual-stack lite Mode 



 TOC 

4.1.2.  MIPv6 deployment considerations for GI-DS-lite



 TOC 

4.2.  Proxy Mobile IP based access architectures

In this scenario the local mobility anchor (LMA) will implement the gateway function along with the PMIPv6 IPv4 support functionality.



 TOC 

4.2.1.  PMIPv6 deployment overview for GI-DS-lite



+------+
| MN-1 |
+------+
   |
+------+                 +-----+                          +---+
|  M   |  PMIPv6 Tunnel  |  L  |  Dual-stack Lite Tunnel  | C |
|  A   |=================|  M  |==========================| G |
|  G   |                 |  A  |   IPv4-over-GRE-IPv6/4   | N |
+------+                 +-----+                          +---+
   |
+------+
| MN-2 |
+------+
 Figure 7: Local Mobility Anchor Initiated Dual-stack lite Mode 



 TOC 

4.2.2.  PMIPv6 deployment considerations for GI-DS-lite



 TOC 

4.3.  GTP based access architectures

3GPP TS 23.401 [TS23401] (, “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access.,” 2009.) defines a mobile access architecture using GTP. For GI-DS-lite, the PDN-gateway will also assume the GW function. The approach of registering of MN specific softwire-id with the CGN is identical.



 TOC 

4.3.1.  GTP deployment overview for GI-DS-lite



+------+
| MN-1 |
+------+
   |
+------+                 +-----+                          +---+
|  S   |    GTP Tunnel   |  P  |  Dual-stack Lite Tunnel  | C |
|  G   |=================|  G  |==========================| G |
|  W   |                 |  W  |   IPv4-over-GRE-IPv6/4   | N |
+------+                 +-----+                          +---+
   |
+------+
| MN-2 |
+------+
 Figure 8: 3GPP PDN Gateway Initiated Dual-stack lite Mode (GTP) 



 TOC 

4.3.2.  GTP deployment considerations for GI-DS-lite



 TOC 

4.4.  Fixed WiMAX access architecture

In this scenario the ASN-gateway will implement the gateway function.



 TOC 

4.4.1.  Fixed-WiMAX deployment overview for GI-DS-lite



                            +---+
                            |   |
+------+        R1          |   |
| MS-1 |--------------------| A |
+------+                    | S |                        +---+
                            | N |    DS-Lite Tunnel      | C |
                            |   |========================| G |
                            | G |  IPv4-over-GRE-IPv6/4  | N |
+------+                    | W |                        +---+
| MS-2 |--------------------|   |
+------+        R1          |   |
                            |   |
                            +---+
 Figure 9: Fixed-WiMAX Gateway Initiated Dual-stack lite Mode 



 TOC 

4.4.2.  Fixed-WiMAX deployment considerations for GI-DS-lite



 TOC 

4.5.  Mobile WiMAX access architecture

In this scenario the home agent will implement the gateway function.



 TOC 

4.5.1.  Mobile-WiMAX deployment overview for GI-DS-lite



   +------+
   | MN-1 |
   +------+
      |
      |
   +------+
   |      |
   |  A   |                 +-----+                          +---+
   |  S   |  R3             |     |   DS Lite Tunnel         | C |
   |  N   |=================|  H  |==========================| G |
   |      |                 |  A  |   IPv4-over-GRE-IPv6/4   | N |
   |  G   |                 |     |                          +---+
   |  W   |                 +-----+
   |      |
   +------+
      |
      |
   +------+
   | MN-2 |
   +------+
 Figure 10: Fixed-WiMAX Gateway Initiated Dual-stack lite Mode (PMIPv6) 



 TOC 

4.5.2.  Mobile-WiMAX deployment considerations for GI-DS-lite



 TOC 

4.6.  PPP-based access architectures

The technical report TR-059 of the Broadband Forum (BBF) (see [TR59] (Broadband Forum, “TR-059: DSL Evolution - Architecture Requirements for the Support of QoS-Enabled IP Services,” September 2003.) outlines a broadband access architecture which leverages the Point-to-Protocol PPP. TR-059 has been evolved to include Ethernet-based access and aggregation networks in TR-101 (see ) (Broadband Forum, “TR-101: Migration to Ethernet-Based DSL Aggregation,” April 2006.) [TR101]). PPP is used to establish a point to point connection between the end-system (a.k.a., routing gateway, "RG") and the access gateway (a.k.a. broadband remote access server, "BRAS"; or broadband network gateway, "BNG"). This means that for PPP-based access architectures, the device which terminates the PPP-session (e.g. the Broadband Remote Access Server, BRAS) assumes the role of the gateway. The PPP connection represents the access tunnel. The PPP connection can either be identified through the virtual interface created on the BRAS/BNG or (in case of PPPoE), through the PPPoE Session-Identifier. Deployment dependent, the operator will choose to either use a single PPP connection to provide connectivity for both, IPv4 and IPv6, or the operator deploys a PPP connection per IP protocol version. The later option results in the establishment of two PPP connections per AD. An alternate approach for NAT44 deployment in PPP-based access architectures, which places the NAT44 function into the gateway, can be found in [I‑D.miles‑behave‑l2nat] (Miles, D. and M. Townsley, “Layer2-Aware NAT,” March 2009.).



 TOC 

4.6.1.  PPP deployment overview for GI-DS-lite



+------+  PPP connection    +---+
| RG-1 |====================|   |
+------+                    |   |                        +---+
                            | B |   DS-Lite Tunnel       | C |
                            | R |========================| G |
                            | A |  IPv4-over-GRE-IPv6/4  | N |
+------+                    | S |                        +---+
| RG-2 |====================|   |
+------+  PPP connection    +---+
 Figure 11: PPP Broadband Access 



 TOC 

4.6.2.  PPP deployment considerations for GI-DS-lite



 TOC 

4.7.  Ethernet VLAN based access architectures

The TR-101 technical report of the Broadband Forum (BBF)[TR101] (Broadband Forum, “TR-101: Migration to Ethernet-Based DSL Aggregation,” April 2006.) outlines multiple architecture options for Ethernet-based DSL aggregation networks. Figure 12 (Ethernet Broadband Access, P2P VLANs) shows an example: End-systems (a.k.a. routing gateway, "RG") are connected through access nodes ("AN") to the gateways (a.k.a. broadband network gateway, "BNG"). One architectural option uses point to point VLANs between the AD (typically referred to as RG - routing gateway - in BBF terms) and the GW (typically referred to as BNG - broadband network gateway - in BBF terms). The point to point VLAN assumes the role of the generic, per end-system access tunnel. The combination of S-VLAN and C-VLAN uniquely identify the connection between AD and GW on the gateway.



 TOC 

4.7.1.  Ethernet access deployment overview for GI-DS-lite



+------+ C-VLAN +---+ C-VLAN/S-VLAN +---+
| RG-1 |========|   |===============|   |
+------+        |   |               |   |                  +---+
                | A |               | B | DS-Lite Tunnel   | C |
                | N |               | N |==================| G |
                |   |               | G |IPv4-o-GRE-IPv6/4 | N |
+------+        |   |               |   |                  +---+
| RG-2 |========|   |===============|   |
+------+ C-VLAN +---+ C-VLAN/S-VLAN +---+
 Figure 12: Ethernet Broadband Access, P2P VLANs 



 TOC 

4.7.2.  Ethernet access deployment considerations for GI-DS-lite



 TOC 

5.  Acknowledgements

The authors would like to acknowledge the discussions on this topic with Mark Grayson, Jay Iyer, Kent Leung, Vojislav Vucetic, Flemming Andreasen, Eric Voit, and Mohamed Boucadair.



 TOC 

6.  IANA Considerations

This memo includes no request to IANA.

All drafts are required to have an IANA considerations section (see the update of RFC 2434 (Narten, T. and H. Alvestrand, “Guidelines for Writing an IANA Considerations Section in RFCs,” May 2008.) [RFC5226] for a guide). If the draft does not require IANA to do anything, the section contains an explicit statement that this is the case (as above). If there are no requirements for IANA, the section will be removed during conversion into an RFC by the RFC Editor.



 TOC 

7.  Security Considerations

All the security considerations from the Mobile IPv6 [RFC3775] (Johnson, D., Perkins, C., and J. Arkko, “Mobility Support in IPv6,” June 2004.), Proxy Mobile IPv6 [RFC5213] (Gundavelli, S., Leung, K., Devarapalli, V., Chowdhury, K., and B. Patil, “Proxy Mobile IPv6,” August 2008.), and Dual-Stack lite [I‑D.ietf‑softwire‑dual‑stack‑lite] (Durand, A., Droms, R., Haberman, B., Woodyatt, J., Lee, Y., and R. Bush, “Dual-stack lite broadband deployments post IPv4 exhaustion,” July 2009.) apply to this specification as well.



 TOC 

8.  References



 TOC 

8.1. Normative References

[I-D.ietf-softwire-dual-stack-lite] Durand, A., Droms, R., Haberman, B., Woodyatt, J., Lee, Y., and R. Bush, “Dual-stack lite broadband deployments post IPv4 exhaustion,” draft-ietf-softwire-dual-stack-lite-01 (work in progress), July 2009 (TXT).
[RFC1918] Rekhter, Y., Moskowitz, R., Karrenberg, D., Groot, G., and E. Lear, “Address Allocation for Private Internets,” BCP 5, RFC 1918, February 1996 (TXT).
[RFC2119] Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” BCP 14, RFC 2119, March 1997 (TXT, HTML, XML).
[RFC2784] Farinacci, D., Li, T., Hanks, S., Meyer, D., and P. Traina, “Generic Routing Encapsulation (GRE),” RFC 2784, March 2000 (TXT).
[RFC2890] Dommety, G., “Key and Sequence Number Extensions to GRE,” RFC 2890, September 2000 (TXT).
[RFC3775] Johnson, D., Perkins, C., and J. Arkko, “Mobility Support in IPv6,” RFC 3775, June 2004 (TXT).
[RFC3931] Lau, J., Townsley, M., and I. Goyret, “Layer Two Tunneling Protocol - Version 3 (L2TPv3),” RFC 3931, March 2005 (TXT).
[RFC5213] Gundavelli, S., Leung, K., Devarapalli, V., Chowdhury, K., and B. Patil, “Proxy Mobile IPv6,” RFC 5213, August 2008 (TXT).
[RFC5555] Soliman, H., “Mobile IPv6 Support for Dual Stack Hosts and Routers,” RFC 5555, June 2009 (TXT).
[RFC5641] McGill, N. and C. Pignataro, “Layer 2 Tunneling Protocol Version 3 (L2TPv3) Extended Circuit Status Values,” RFC 5641, August 2009 (TXT).


 TOC 

8.2. Informative References

[I-D.boucadair-dslite-interco-v4v6] Boucadair, M., Jacquenet, C., Grimault, J., Kassi-Lahlou, M., Levis, P., Cheng, D., and Y. Lee, “Deploying Dual-Stack lite in IPv6-only Network,” draft-boucadair-dslite-interco-v4v6-02 (work in progress), October 2009 (TXT).
[I-D.draft-ietf-dime-nat-control] Brockners, F., Bhandari, S., Singh, V., and V. Fajardo, “Diameter NAT Control Application,” August 2009.
[I-D.ietf-behave-address-format] Huitema, C., Bao, C., Bagnulo, M., Boucadair, M., and X. Li, “IPv6 Addressing of IPv4/IPv6 Translators,” draft-ietf-behave-address-format-00 (work in progress), August 2009 (TXT).
[I-D.ietf-behave-v6v4-framework] Baker, F., Li, X., Bao, C., and K. Yin, “Framework for IPv4/IPv6 Translation,” draft-ietf-behave-v6v4-framework-03 (work in progress), October 2009 (TXT).
[I-D.ietf-behave-v6v4-xlate] Li, X., Bao, C., and F. Baker, “IP/ICMP Translation Algorithm,” draft-ietf-behave-v6v4-xlate-03 (work in progress), October 2009 (TXT).
[I-D.ietf-behave-v6v4-xlate-stateful] Bagnulo, M., Matthews, P., and I. Beijnum, “NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers,” draft-ietf-behave-v6v4-xlate-stateful-02 (work in progress), October 2009 (TXT).
[I-D.ietf-netlmm-grekey-option] Muhanna, A., Khalil, M., Gundavelli, S., and K. Leung, “GRE Key Option for Proxy Mobile IPv6,” draft-ietf-netlmm-grekey-option-09 (work in progress), May 2009 (TXT).
[I-D.ietf-netlmm-pmip6-ipv4-support] Wakikawa, R. and S. Gundavelli, “IPv4 Support for Proxy Mobile IPv6,” draft-ietf-netlmm-pmip6-ipv4-support-17 (work in progress), September 2009 (TXT).
[I-D.miles-behave-l2nat] Miles, D. and M. Townsley, “Layer2-Aware NAT,” draft-miles-behave-l2nat-00 (work in progress), March 2009 (TXT).
[RFC2473] Conta, A. and S. Deering, “Generic Packet Tunneling in IPv6 Specification,” RFC 2473, December 1998 (TXT, HTML, XML).
[RFC3022] Srisuresh, P. and K. Egevang, “Traditional IP Network Address Translator (Traditional NAT),” RFC 3022, January 2001 (TXT).
[RFC5226] Narten, T. and H. Alvestrand, “Guidelines for Writing an IANA Considerations Section in RFCs,” BCP 26, RFC 5226, May 2008 (TXT).
[RFC5565] Wu, J., Cui, Y., Metz, C., and E. Rosen, “Softwire Mesh Framework,” RFC 5565, June 2009 (TXT).
[TR101] Broadband Forum, “TR-101: Migration to Ethernet-Based DSL Aggregation,” April 2006.
[TR59] Broadband Forum, “TR-059: DSL Evolution - Architecture Requirements for the Support of QoS-Enabled IP Services,” September 2003.
[TS23401] “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access.,” 2009.
[TS29060] “3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; General Packet Radio Service (GPRS); GPRS Tunnelling Protocol (GTP), V6.9.0,” 2006.


 TOC 

Authors' Addresses

  Frank Brockners
  Cisco
  Hansaallee 249, 3rd Floor
  DUESSELDORF, NORDRHEIN-WESTFALEN 40549
  Germany
Email:  fbrockne@cisco.com
  
  Sri Gundavelli
  Cisco
  170 West Tasman Drive
  San Jose, CA 95134
  USA
Email:  sgundave@cisco.com