Internet DRAFT - draft-lee-l3vpn-ipv6-vpn

draft-lee-l3vpn-ipv6-vpn



L3VPN Working Group                                   Bin. Lee, Huawei 
Internet Draft                                        HF. Chen, Huawei 
Expires: April 2006                                   October 17, 2005 
                                   
 
                       IPv6 VPN Based Address Format  
                      draft-lee-l3vpn-ipv6-vpn-00.txt 


Status of this Memo 

   By submitting this Internet-Draft, each author represents that       
   any applicable patent or other IPR claims of which he or she is       
   aware have been or will be disclosed, and any of which he or she       
   becomes aware will be disclosed, in accordance with Section 6 of       
   BCP 79. 

   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups.  Note that 
   other groups may also distribute working documents as Internet-Drafts. 

   Internet-Drafts are draft documents valid for a maximum of six months 
   and may be updated, replaced, or obsoleted by other documents at any 
   time.  It is inappropriate to use Internet-Drafts as reference 
   material or to cite them other than as "work in progress." 

   The list of current Internet-Drafts can be accessed at 
        http://www.ietf.org/ietf/1id-abstracts.txt 

   The list of Internet-Draft Shadow Directories can be accessed at 
        http://www.ietf.org/shadow.html 

   This Internet-Draft will expire on April 17, 2005. 

Copyright Notice 

      Copyright (C) The Internet Society (2005).  All Rights Reserved. 

                                         

Abstract 

   This text introduces a kind of method to carry out VPN based on IPv6 
   addresses, defines VPN unicast and multicast address structure and 
   the method to construct VPN topology, and depicts unicast and 
   multicast routing and forwarding process between VPN sites. Moreover, 
   this text discusses VPN security.  

 
 
 
Lee, Chen              Expires April 17, 2006                 [Page 1] 

Internet-Draft      IPv6 VPN based Address Format         October 2005 
    

Table of Contents 

    
   1. Introduction.................................................2 
   2. VPN Address..................................................4 
      2.1. VPN-Local Addresses.....................................4 
      2.2. Global VPN Addresses....................................5 
      2.3. Mapping between Global VPN Addresses and VPN-local Addresses
       ............................................................6 
   3. Allocating VPN Site ID.......................................7 
   4. VPN Topology.................................................7 
      4.1. VPN Topology Discovery Process..........................8 
      4.2. Establishing Site Route Table...........................9 
   5. VPN Packet Forward...........................................9 
      5.1. Forward within the Site.................................9 
      5.2. Forward on SE at the Ingress...........................10 
      5.3. Forward in the Public Network..........................10 
      5.4. Forward on SE at the Egress............................10 
   6. Internet Access.............................................11 
   7. Overriding Autonomous System................................11 
   8. Interconnecting with IPv4 Sites.............................11 
   9. Security Considerations.....................................13 
      9.1. Ingress Check..........................................13 
      9.2. Egress Check...........................................13 
   10. IANA Considerations........................................13 
   11. References.................................................14 
      11.1. Normative References..................................14 
      11.2. Informative References................................14 
   Author's Addresses.............................................15 
   Intellectual Property Statement................................15 
   Disclaimer of Validity.........................................16 
   Copyright Statement............................................16 
   Acknowledgment.................................................16 
    
1. Introduction 

    

   This text describes a kind of VPN based on the IPv6 address structure. 
   The Ipv6 address has been widely used for addressing in the site and 
   subnet. But it hasn't been used for addressing between sites in VPN 
   yet. There are enough bits available in IPv6 addresses to allow us to 
   embed a VPN site ID in the IPv6 address, so that no encapsulation 
   overhead is required to achieve isolation between VPNs. Meanwhile, 
   VPN site ID can serve as an aggregation route to a site. Between 
   sites in the same VPN, routes are reachable. Between sites in 

 
 
Lee, Chen              Expires April 17, 2006                 [Page 2] 

Internet-Draft      IPv6 VPN based Address Format         October 2005 
    

   different VPNs, routes are unreachable. In this way, VPNs may be 
   formed in a great variety of topologies.       

   Addresses used for mutual access in VPN are named VPN addresses. 
   Their forms differ in VPN from those in Internet, who are named the 
   VPN-local address and the global VPN address respectively. Compared 
   with the internal VPN address, the global VPN address increases VPN 
   site ID and carries out address translation by site edge devices. 

   The VPN addresses defined in this text do not conflict with the 
   unique local IPv6 unicast addresses defined in [UNILOCAL]. As a 
   special local VPN address, the latter is not used for addressing in 
   the public network, while the global VPN address is used for 
   addressing in the public network. On site edge devices, unique local 
   IPv6 unicast addresses can also be translated to global VPN addresses. 

   For the sake of supporting multicast, assign specific multicast 
   addresses for VPN. Similar to VPN site ID, site edge devices embed 
   VPN group ID in VPN multicast addresses. 

   Routing and forwarding of packets in VPN is the same as that in the 
   site, and VPN hosts cannot tell the difference between mutual access 
   in the site and mutual access in VPN. Therefore, the defined unicast 
   and multicast address formats in VPN are the same as addresses in the 
   site. Thus, hosts do not need modification. While addressing between 
   sites or on Internet, the global VPN address is similar to the public 
   network address of Internet in both format and routing and forwarding 
   mode. Moreover, Internet addressing can be easily carried out on 
   devices.      

   For composing several sites into a VPN, this text defines VPN 
   topology discovery mechanism.  

   This kind of VPN has the following features: 

   1. VPN information is embedded in the IPv6 address, so there is no 
   additional cost in VPN packets encapsulation. 

   2. The forward process of VPN packets is consistent with that of the 
   average IP packets, so VPN traffic can be born on the pure IPv6 
   network. 

   3. Use VPN site ID as the valid global site identifier, as the 
   aggregation route to reach the site and as the basis on which VPN 
   topology forms. VPN site ID can be identical with global routing 
   prefix of this site. 

 
 
Lee, Chen              Expires April 17, 2006                 [Page 3] 

Internet-Draft      IPv6 VPN based Address Format         October 2005 
    

    

   4. Site edge routes take charge of updating VPN information and 
   ensuring the security of VPN information. 

   The reference model of this VPN is shown as follows. 

      ...........               ..................                ............ 
      .         .         .     .                .                .          . 
      .  VPN1   .   +-------+   .                .   +-------+    .  VPN2    . 
      .  Site1  .---|       |   .                .---|  SE2  |----.  Site2   . 
      ...........   |       |   .     Public     .   +-------+    ............ 
                    |  SE1  |---.      IPv6      .                             
      ...........   |       |   .     Network    .   +-------+    ............ 
      .         .---|       |   .                .---|  SE3  |----.          . 
      .  VPN2   .   +-------+   .                .   +-------+    .  VPN1    . 
      .  Site1  .               .                .                .  Site2   . 
      ...........               ..................                ............ 
    

   The device at the boundary between the VPN site and the public 
   network is named Site Edge router (SE). When SE belongs to operators, 
   this model becomes PE-based VPN. When SE belongs to clients, this 
   model becomes CE-based VPN. 

2. VPN Address 

   Two kinds of VPN addresses are defined to carry out VPN addressing 
   within VPN and on the public network. 

  2.1. VPN-Local Addresses 

   The VPN-local address is similar to the link-local address and the 
   site-local address. It's encapsulated by hosts. Valid only within VPN, 
   this address can help complete interconnection in VPN. 

   The unicast address structure is as follows. 

      |  10 bits |    38 bits   | 16 bits  |       64 bits          | 

      +----------+-------------------------+------------------------+ 

      |1111111011|   reserved   | subnet ID|     interface ID       | 

      +----------+-------------------------+------------------------+ 


 
 
Lee, Chen              Expires April 17, 2006                 [Page 4] 

Internet-Draft      IPv6 VPN based Address Format         October 2005 
    

   Through using the same type prefix (1111111011) of the site-local 
   address, the current hosts and routers can use the VPN-local address 
   without changing.  

   If sites have used unique local IPv6 unicast addresses that are 
   defined in [UNILOCAL], they can continue to use it. 

   Multicast address structure is as follows. 

       |   8    |  4 |  4 |            80            |        32        | 

       +--------+----+----+---------------------------------------------+ 

       |11111111|flgs|scop|         reserved         |    group ID      | 

       +--------+----+----+---------------------------------------------+ 

   The flgs field contains four bits. 

   +-+-+-+-+ 

   |V|R|P|T| 

   +-+-+-+-+ 

   V bit(the ninth bit)refers to the VPN multicast address. In VPN, it 
   is set as 0. For details about R bit and P bit, see [ADDR ARCH]. T 
   bit (the twelfth bit) implies that the multicast address is not 
   permanent, which is set as 1. The scop field (from the thirteen bit 
   to the sixteen bit) is set as 0101, which is the same as the valid 
   multicast address in the site. Thus, the current hosts and routers 
   can use the VPN-local multicast address without changing. 

         
  2.2. Global VPN Addresses 

   The global VPN address is used for destination addressing in VPN on 
   the public network. Routers on the public network only consider how 
   to reach a VPN site and which VPN site to reach, without considering 
   how to reach the destination within the VPN site. 

   Global VPN addresses are different from global public network 
   addresses. Routers must prevent global VPN addresses of different 
   VPNs from mutual access. 

   Unicast address structure is as follows:  

 
 
Lee, Chen              Expires April 17, 2006                 [Page 5] 

Internet-Draft      IPv6 VPN based Address Format         October 2005 
    

       | 3 |     45 bits         |  16 bits  |       64 bits              | 

       +---+---------------------+-----------+----------------------------+ 

       |010|    VPN site ID      | subnet ID |       interface ID         | 

       +---+---------------------+-----------+----------------------------+ 

       |Global VPN routing prefix| 

   Global VPN routing prefix contains a prefix 010 and a VPN site ID. 
   The former is separated from global public network addresses, and the 
   latter is used for addressing a VPN site in the public network. 
   Subnet ID and interface ID are only used to save internal VPN unicast 
   addresses. When addressing in the public network, they are neglected. 

   Multicast address structure is as follows. 

       |   8    |  4 |  4 |       48     |     32       |      32       | 

       +--------+----+----+--------------+--------------+---------------+ 

       |11111111|flgs|scop|    reserved  | VPN group ID |local group ID | 

       +--------+----+----+--------------+--------------+---------------+ 

   VPN group ID causes site edge devices (but I'm guessing here - please 
   let me know if I misunderstood) to transmit multicast packets between 
   sites of VPN. V bit in flgs field is set as 1, which refers to a VPN 
   multicast address. The scop field is set as 1110, which refers to a 
   valid global multicast address. The local group ID is used to save 
   internal VPN multicast addresses, which can be neglected when 
   addressing in the public network. Or combining with the VPN group ID, 
   it can be used for addressing in the public network.  

         
  2.3. Mapping between Global VPN Addresses and VPN-local Addresses 

   Mutual mapping can be carried out between Global VPN unicast 
   addresses and VPN-local unicast addresses. During the mapping, 
   interface ID and subnet ID do not change, but different prefixes will 
   be added and VPN site ID will be deleted or added to global addresses 
   or local addresses. 



 
 
Lee, Chen              Expires April 17, 2006                 [Page 6] 

Internet-Draft      IPv6 VPN based Address Format         October 2005 
    

   If unique local IPv6 unicast addresses are used, mutual translation 
   should be carried out between global ID and VPN site ID and different 
   prefixes should be added to them during the mapping. 

   Global VPN multicast addresses generate through the mapping from 
   local addresses. During the mapping, different flags and scop fields 
   are set and VPN group IDs are added or deleted for them. 

3. Allocating VPN Site ID 

   When the global routing prefix is assigned to a site, it can be used 
   as VPN site ID. Global VPN unicast addresses and global unicast 
   addresses are identical in format but different in prefix. The prefix 
   of the former is 010, while that of the latter is 001. VPN site ID 
   corresponds to global routing prefix. Therefore, a site can 
   distinguish Internet from VPN by using different prefixes while 
   accessing them.  

   Independent of global routing prefix, allocating VPN site ID can be 
   completed, as long as it is the unique one in the global.  

4. VPN Topology  

   <Text for this section> 

   VPN is composed of multiple sites. VPN topology refers to the 
   connection between each site. If some sites belong to the same VPN, 
   their routes are reachable. If not, their routes are unreachable. In 
   Global VPN addresses, site ID is used to identify sites. Moreover, 
   through site ID, there are several methods to learn which VPN a site 
   belongs to.  

   Method one: Use some fields in VPN site ID to identify VPN, that is, 
   VPN ID. If some sites belong to the same VPN, they have the same VPN 
   ID. 

   The format of VPN site ID is as follows.  

   |      29 bits   |     16 bits        | 

   +-------------------------------------+ 

   |      VPN ID    |     Site ID        | 

   +-------------------------------------+ 

    
 
 
Lee, Chen              Expires April 17, 2006                 [Page 7] 

Internet-Draft      IPv6 VPN based Address Format         October 2005 
    

   Method two: Append route attributes to VPN site ID so as to express 
   VPN topology. Route attributes can use the format of BGP extension 
   community attributes, that is, Route Target (RT) [EXT COMM]. 

   Method three: Through static configuration on SEs to determine 
   between which sites exists VPN relation. 

  4.1. VPN Topology Discovery Process 

   Using the first VPN site ID method:  

   While initializing, SE sets VPN site ID containing VPN ID. Based on 
   VPN site ID, SE generates an IPv6 aggregation route, that is, 010:VPN 
   site ID::/48, which is named the VPN site route. SE advertises it to 
   backbone router and other SEs. Destination SE matches with VPN ID of 
   locally configured VPN site ID, based on the information about VPN ID 
   of VPN site route. If they are identical, this route is installed. If 
   not, it is dropped. Thus, routes between sites in the same VPN are 
   reachable, while routes between sites in different VPNs are 
   unreachable.  

   Using the second VPN site ID method: 

   While initializing, SE sets VPN site containing VPN site ID, the 
   ingress RT list and the egress RT list. Based on such information, SE 
   generates an IPv6 aggregation route, that is, 010:VPN site ID::/48 
   and appends RT extension community attribute contained in the egress 
   RT list. SE advertises it to backbone router and other SEs. 
   Destination SE matches with the local ingress RT list, based on RTs 
   of the VPN route. If at least one RT is identical, this route is 
   installed. If not, it is dropped. Thus, based on RT matching 
   relationship, a wide variety of VPN topologies can be constructed, 
   such as, full mesh and hub-spoke as well as Intranet and Extranet. 

   Using the third VPN site ID method: 

   While initializing, SE sets the VPN site. SE generates an IPv6 
   aggregation route, that is, 010:VPN site ID::/48 and advertises it to 
   backbone router and other SEs. Destination SE judges which VPN it 
   belongs to and determines to install or drop this route, based on the 
   locally configured site list. 

   If using unique local IPv6 unicast addresses, sites need to advertise 
   the global ID to other SEs accompanies the above processes. 

   To support multicast in VPN, set VPN group ID on SE when the VPN site 
   is configured. Then, SE joins to this multicast group specified by 
 
 
Lee, Chen              Expires April 17, 2006                 [Page 8] 

Internet-Draft      IPv6 VPN based Address Format         October 2005 
    

   VPN group ID through multicast routing protocols. This group is used 
   to propagate internal VPN multicast packets in the public network, 
   including each local group. However, if no host joins to a local 
   group within a site, it's unnecessary that the SE connected to this 
   site still receives multicast packets from the SE connected to 
   multicast source. Optimization method is as follows: Through 
   multicast routing protocols, SE joins to the multicast group 
   specified by VPN group ID + local group ID. This method aims at some 
   specific local groups. For example, traffic in this local group is 
   large, or only a fraction of sites join to this local group.  

   No matter which method is used, each site has a VPN site list on SE. 
   The list contains ID of other sites who have VPN relation with the 
   site. If using unique local IPv6 unicast addresses, each site has an 
   additional global ID. Thus, a mapping table comes into being between 
   a VPN site ID and a global ID. 

  4.2. Establishing Site Route Table 

   Each site generates a route table on SE. The table contains the route 
   of this site as well as routes of all sites that have VPN relation 
   with this site. 

   Internal routes of a site can be obtained from the internal of sites 
   through static configuration or routing protocols. 

   Aggregation routes to other sites can be obtained during topology 
   discovery, as described in the above section. 

   Internal routes of other sites can be obtained from routing protocols 
   between SEs. When SE advertises VPN routes to other sites, it should 
   specify an attribute for these routes to indicate where they come 
   from, that is, VPN site ID. If multiple VPN routes are installed on 
   SE, VPN site ID can be used to distinguish different VPN routes to 
   ensure the uniqueness of routes. After the destination SE receives 
   this route, check which local site and this route belong to the same 
   VPN so that install it to a route table that is related to this site.  

5. VPN Packet Forward 

  5.1. Forward within the Site 

   When forwarding within the site, both source addresses and 
   destination addresses use the VPN-local address format without adding 
   VPN site ID or VPN group ID. Standard unicast or multicast forward 
   mechanism is also tolerable. 

 
 
Lee, Chen              Expires April 17, 2006                 [Page 9] 

Internet-Draft      IPv6 VPN based Address Format         October 2005 
    

  5.2. Forward on SE at the Ingress  

   First of all, use interface or sub interface or packet header to 
   judge which site the packets come from. After judgment, as for 
   unicast packets, add site ID, translate source addresses into global 
   VPN addresses, and search site route tables by destination addresses 
   for destination site ID. Translate destination addresses into global 
   VPN addresses and forward to the next hop based on the destination 
   site ID.  

   As for multicast packets, add source site ID, translate source 
   addresses into global VPN addresses, and add VPN group ID based on 
   VPN of the site. Then translate destination addresses into global VPN 
   multicast addresses based on VPN group ID, search multicast route 
   tables and forward them. 

  5.3. Forward in the Public Network 

   During VPN topology discovery, an aggregation route to the 
   destination site is obtained. Therefore, unicast packets use the 
   standard IPv6 routing and forwarding mechanism to reach SE at the 
   egress.  

   Multicast packets search the multicast route table based on VPN group 
   ID + local group ID in global VPN multicast addresses. If only the 
   route of VPN group ID exists in the route table, forward packets on 
   the basis of this aggregation route. If there is the route of VPN 
   group ID + local group ID, forward packets on the basis of this 
   precise route. Different from standard multicast forwarding process, 
   this multicast forwarding process is carried out through longest 
   matching method similar to unicast forwarding, which is named 
   multicast longest matching forwarding. 

  5.4. Forward on SE at the Egress 

   For unicast packets, locate the local site route table based on VPN 
   site ID in the destination address, translate source and destination 
   addresses into the VPN-local address, and search the site route table 
   and then forward packets into site. In this process, if the unique 
   local IPv6 unicast address is used, the VPN site ID of the source and 
   destination address is mapped to corresponding global ID. 

   For multicast packets, locate the local site based on VPN group ID in 
   the destination address, translate the source address into the VPN-
   local address, and translate the destination address into the VPN-
   local multicast address and then forward packets based on the local 
   group ID. 
 
 
Lee, Chen              Expires April 17, 2006                [Page 10] 

Internet-Draft      IPv6 VPN based Address Format         October 2005 
    

6. Internet Access 

   VPN sites can access Internet and other sites of VPN at the same time. 
   In the case of internet access, VPN-local addressed need to be 
   translated into global Internet addresses. 

   The format is shown as RFC3587. 

   | 3 |     45 bits         |  16 bits  |       64 bits              | 

   +---+---------------------+-----------+----------------------------+ 

   |001|global routing prefix| subnet ID |       interface ID         | 

   +---+---------------------+-----------+----------------------------+ 

   The global routing prefix can be identical with VPN site ID. 

   This translation should be completed by terminals. The global routing 
   Prefix can be obtained by automatic configuration mechanism defined 
   in RFC2462 from SE.  

   Internet cannot access internal VPN multicast addresses.  

7. Overriding Autonomous System 

   VPN uses the standard IPv6 routing and forwarding mechanism while 
   forwarding packets. Therefore, when overriding Autonomous System (AS), 
   VPN just needs to advertise VPN site and VPN group routes to the 
   neighboring AS to ensure routes are reachable between sites of the 
   same VPN. Then, internal site routes are advertised between SEs of 
   the same VPN.  

8. Interconnecting with IPv4 Sites 

   This technology is also used to interconnect multiple IPv4 networks 
   through IPv6 backbone networks or access VPN user who have used IPv4 
   addresses. 

   By now, SE still assigns VPN site ID for each IPv4 site and a VPN 
   group ID for multicast of this site. SE meanwhile maintains an IPv4 
   route table for this site. But this kind of IPv4 route carries a 
   route attribute, which contains VPN site ID. 

   After obtaining the IPv4 route within the site, SE appends a VPN site 
   ID attribute and advertises it to other SEs. Then destination SE 

 
 
Lee, Chen              Expires April 17, 2006                [Page 11] 

Internet-Draft      IPv6 VPN based Address Format         October 2005 
    

   checks whether this site and a local site belong to the same VPN. If 
   so, this route is installed. If not, it is dropped. 

   For the unicast packet entering SE, confirm which site it comes from 
   based on the inbound interface or sub-interface, search this site's 
   IPv4 route table, find the destination site ID and translate source 
   and destination IPv4 addresses into VPN IPv4-embedded IPv6 address. 
   The format is based IPv4-embedded IPv6 address defined by IP Version 
   6 Addressing Architecture, and add VPN site ID. It's shown as follows.  

   | 3 |           45 bits           |   32   | 16 |      32 bits        | 

   +---+-----------------------------+--------+--------------------------+ 

   |010|           VPN site ID       |reserved|FFFF|    IPv4 address     | 

   +---+-----------------------------+--------+----+---------------------+ 

   Then forward packets based on the destination site ID at this SE and 
   backbone routers. When packets reach SE at the egress, learn their 
   destination is an IPv4 site based on VPN site ID. Translate them into 
   IPv4 addresses and search the IPv4 route table of the site and then 
   forward packets into site. 

   For multicast packets entering SE, firstly detect which site they 
   come from based on the inbound interface or sub-interface, obtain the 
   VPN group ID of the site, and then translate the source address into 
   the VPN IPv4-embedded IPv6 address and translate the destination 
   address into the VPN ipv4-embedded IPv6 multicast address. The format 
   is shown as follows. 

   |   8    |  4 |  4 |      48      |     32       |      32       | 

   +--------+----+----+--------------+--------------+---------------+ 

   |11111111|1RP1|1110|    reserved  | VPN group ID | IPv4 Group    | 

   +--------+----+----+--------------+--------------+---------------+ 

   Based on this address, forward packets in the backbone network, When 
   packets reach the egress of SE, learn their destination is an IPv4 
   site based on the VPN group ID, and translate it into an IPv4 
   multicast address and then forward packets into site.  




 
 
Lee, Chen              Expires April 17, 2006                [Page 12] 

Internet-Draft      IPv6 VPN based Address Format         October 2005 
    

9. Security Considerations 

  9.1. Ingress Check 

   The global VPN source and destination address can only be generated 
   by SE. Prevent feigned VPN packets from entering the backbone network, 
   through only receiving those packets whose source and destination 
   addresses are VPN-local addresses, unique local IPv6 unicast 
   addresses or global Internet addresses at interfaces connecting VPN 
   sites on a SE. If source and destination addresses of packets are 
   unique local IPv6 unicast addresses, check whether the global ID in 
   the source address is legal. Other interfaces in the SE do not 
   receive such packets whose source and destination addresses are VPN-
   local addresses or unique local IPv6 unicast addresses, nor do 
   routers in backbone networks.  

  9.2. Egress Check 

   At the egress of SE, prevent the ingoing packets from being set 
   illegal source site ID. Separate VPN site ID from the source address 
   of VPN packets and check whether it and the site in the VPN 
   destination address belong to the same VPN. If not, drop this packet.  

10. IANA Considerations 

   The IANA is requested to assigned the 4000::/3 prefix to global VPN 
   unicast address and add the following note and link it to this 
   address block. 

   4000::/3              VPN Global Unicast          [IPv6 VPN]       
















 
 
Lee, Chen              Expires April 17, 2006                [Page 13] 

Internet-Draft      IPv6 VPN based Address Format         October 2005 
    

11. References 

  11.1. Normative References 

   [ADDRARCH] Hinden, R. and S. Deering, "IP Version 6 Addressing 
              Architecture", Work In Progress. 
   [RFC 3587] R. Hinden S. Deering and E. Nordmark, "IPv6 Global 
             Unicast Address Format", RFC3587, August 2003 
   [UNILOCAL] R. Hinden and B. Haberman, Unique Local IPv6 Unicast 
             Addresses, Work In Progress. 
   [RFC 2462] S. Thomson, T. Narten , "IPv6 Stateless Address 
             Autoconfiguration", RFC2462, December 1998 
   [RFC 4110] R. Callon, M. Suzuki, "A Framework for Layer 3 Provider-
             Provisioned Virtual Private Networks (PPVPNs)", RFC4110, 
             July 2005 
   [EXT COMM] Ramachandra, Tappan, Rekhter, "BGP Extended Communities 
            Attribute", Work In Progress 
  11.2. Informative References 

    [BGPv6VPN] Jeremy De Clercq , Dirk Ooms, Marco Carugi and Francois 
             Le Faucheur , "BGP-MPLS IP VPN extension for IPv6 VPN", 
             Work In Progress 

    




















 
 
Lee, Chen              Expires April 17, 2006                [Page 14] 

Internet-Draft      IPv6 VPN based Address Format         October 2005 
    

Author's Addresses 

   Bin Lee 
   Huawei Technologies 
   Hua Wei Bld.,No.3 Xinxi Rd., 
   Shang-Di Information Industry Base 
   Hai-Dian District 
   Beijing P.R.China 
      
   Phone: +86 10 82882987 
   Email: l.b@huawei.com 
      
   Hongfei Chen 
   HUAWEI 
   Hua Wei Bld.,No.3 Xinxi Rd., 
   Shang-Di Information Industry Base 
   Hai-Dian District 
   Beijing P.R.China 
      
   Phone: +86 10 82882540 
   Email: chenhongfei@huawei.com 
    

Intellectual Property Statement 

   The IETF takes no position regarding the validity or scope of any 
   Intellectual Property Rights or other rights that might be claimed to 
   pertain to the implementation or use of the technology described in 
   this document or the extent to which any license under such rights 
   might or might not be available; nor does it represent that it has 
   made any independent effort to identify any such rights.  Information 
   on the procedures with respect to rights in RFC documents can be 
   found in BCP 78 and BCP 79. 

   Copies of IPR disclosures made to the IETF Secretariat and any 
   assurances of licenses to be made available, or the result of an 
   attempt made to obtain a general license or permission for the use of 
   such proprietary rights by implementers or users of this 
   specification can be obtained from the IETF on-line IPR repository at 
   http://www.ietf.org/ipr. 

   The IETF invites any interested party to bring to its attention any 
   copyrights, patents or patent applications, or other proprietary 
   rights that may cover technology that may be required to implement 
   this standard.  Please address the information to the IETF at 
   ietf-ipr@ietf.org 

 
 
Lee, Chen              Expires April 17, 2006                [Page 15] 

Internet-Draft      IPv6 VPN based Address Format         October 2005 
    

Disclaimer of Validity 

   This document and the information contained herein are provided on an 
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET 
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, 
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE 
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 

Copyright Statement 

   Copyright (C) The Internet Society (2005). 

   This document is subject to the rights, licenses and restrictions 
   contained in BCP 78, and except as set forth therein, the authors 
   retain all their rights. 

Acknowledgment 

   Funding for the RFC Editor function is currently provided by the 
   Internet Society. 
























 
 
Lee, Chen              Expires April 17, 2006                [Page 16]