[Docs] [txt|pdf] [Tracker] [Email] [Diff1] [Diff2] [Nits]
Versions: (draft-suryanarayanan-v6ops-zeroconf-reqs)
00
Internet Engineering Task Force J. Palet
Internet-Draft Consulintel
Expires: August 18, 2005 K. Nielsen
Ericsson
F. Parent
Hexago
A. Durand
Sun Microsystems, inc.
R. Suryanarayanan
Samsung India Software Operations
P. Savola
CSC/FUNET
February 14, 2005
Goals for Tunneling Configuration
draft-palet-v6tc-goals-tunneling-00.txt
Status of this Memo
This document is an Internet-Draft and is subject to all provisions
of Section 3 of RFC 3667. By submitting this Internet-Draft, each
author represents that any applicable patent or other IPR claims of
which he or she is aware have been or will be disclosed, and any of
which he or she become aware will be disclosed, in accordance with
RFC 3668.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as
Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on August 18, 2005.
Copyright Notice
Copyright (C) The Internet Society (2005).
Palet, et al. Expires August 18, 2005 [Page 1]
Internet-Draft Goals for Tunneling Configuration February 2005
Abstract
This memo describes the set of goals for a tunneling setup protocol
that could be used in several network cases to jumpstart its IPv6
offering to its customers by providing them IPv6 connectivity through
a simplistic tunneling mechanism.
The basic network cases, which may have different sets of goals, are
also introduced, including 3GPP and other Service Providers. Two
cases are analyzed in the Service Provider scenario, one which apply
to simplistic mechanism where the user is already authenticated by
other network existing means, and another which also takes care of
the user authentication.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 5
3. Assumptions and Prerequisites . . . . . . . . . . . . . . . . 6
4. Goals of the Tunneling Configuration Protocol . . . . . . . . 7
4.1 General . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.1.1 Simplicity . . . . . . . . . . . . . . . . . . . . . . 7
4.1.2 Easy to deploy and Easy to Phase-out . . . . . . . . . 7
4.2 Tunnel Set-up . . . . . . . . . . . . . . . . . . . . . . 8
4.2.1 Tunnel End-Point Auto-Discovery and tunnel
establishment . . . . . . . . . . . . . . . . . . . . 8
4.2.2 Tunnel End-Point Reachability Detection . . . . . . . 8
4.2.3 Scalability and Load-Balancing . . . . . . . . . . . . 9
4.2.4 Latency in Set-up Phases . . . . . . . . . . . . . . . 9
4.2.5 Tunnel Link Sustainability . . . . . . . . . . . . . . 9
4.2.6 NAT Traversal . . . . . . . . . . . . . . . . . . . . 10
4.2.7 Firewall Traversal . . . . . . . . . . . . . . . . . . 10
4.2.8 Use Native Connectivity when Available . . . . . . . . 10
4.3 IPv6 Configuration . . . . . . . . . . . . . . . . . . . . 10
4.3.1 IPv6 Address Assignment . . . . . . . . . . . . . . . 10
4.3.2 IPv6 Address Stability . . . . . . . . . . . . . . . . 11
4.3.3 IPv6 Prefix Delegation . . . . . . . . . . . . . . . . 11
4.3.4 IPv6 DNS . . . . . . . . . . . . . . . . . . . . . . . 11
4.4 Implementation Considerations . . . . . . . . . . . . . . 11
4.4.1 Private and Public IPv4 Addresses . . . . . . . . . . 11
4.4.2 Extensibility . . . . . . . . . . . . . . . . . . . . 11
4.4.3 Stateful or Stateless . . . . . . . . . . . . . . . . 12
4.5 Management and Security . . . . . . . . . . . . . . . . . 12
4.5.1 Security . . . . . . . . . . . . . . . . . . . . . . . 12
4.5.2 Traceability . . . . . . . . . . . . . . . . . . . . . 12
4.5.3 Registration . . . . . . . . . . . . . . . . . . . . . 12
4.5.4 Authentication . . . . . . . . . . . . . . . . . . . . 13
4.5.5 Confidentiality . . . . . . . . . . . . . . . . . . . 13
Palet, et al. Expires August 18, 2005 [Page 2]
Internet-Draft Goals for Tunneling Configuration February 2005
4.5.6 Accounting . . . . . . . . . . . . . . . . . . . . . . 13
5. Applicability of the Tunneling Configuration to Different
Network Cases . . . . . . . . . . . . . . . . . . . . . . . . 14
5.1 3GPP Access Networks . . . . . . . . . . . . . . . . . . . 14
5.1.1 Simplicity . . . . . . . . . . . . . . . . . . . . . . 15
5.1.2 Automated IPv6-in-IPv4 tunnel establishment . . . . . 15
5.1.3 IPv6 Address Assignment and Prefix Delegation . . . . 15
5.1.4 . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5.1.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5.1.6 . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
5.1.7 . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
5.2 Narrowband Access Networks . . . . . . . . . . . . . . . . 16
5.3 Broadband Access Networks . . . . . . . . . . . . . . . . 16
5.4 Unmanaged Networks . . . . . . . . . . . . . . . . . . . . 16
5.5 Enterprise Networks . . . . . . . . . . . . . . . . . . . 16
6. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 17
7. Security Considerations . . . . . . . . . . . . . . . . . . . 17
8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 17
9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 17
9.1 Normative References . . . . . . . . . . . . . . . . . . . 17
9.2 Informative References . . . . . . . . . . . . . . . . . . 17
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 18
Intellectual Property and Copyright Statements . . . . . . . . 21
Palet, et al. Expires August 18, 2005 [Page 3]
Internet-Draft Goals for Tunneling Configuration February 2005
1. Introduction
Regardless of which is the network that is involved in the transition
from IPv4 to IPv6, generally this could involve several phases, often
in different networks parts (i.e., core, access).
The transition of the core network usually can be done in a much more
easy way than the access network. This is the case even if the core
network is only connected via tunnels to other IPv6 networks. The
setup of those tunnels involves a small effort and is not a big
trouble, even in the case of a manual configuration.
However, this is not the case for the access network, which may
involve different types of layer two technologies. In all the cases,
in order to facilitate the transition of those access networks, which
will be impossible to do manually and efficiently, there is a need
for an automatic IPv6-in-IPv4 tunneling mechanism. The goal is to
provide bidirectional IPv6-in-IPv4 tunneled connectivity between
dual-stack end-nodes located at an IPv4-only access network and
dual-stack tunnel servers located at IPv6/IPv4 network boundaries.
This should be applicable to all kind of ISPs and access networks.
They could be regular ISPs, providing service through DSL, PSTN,
ISDN, cable, PLC or any other technologies, but could be also a
wireless ISP, or even an enterprise with its own service provider
infrastructure for the employees at remote locations.
In order to simplify the text, "customers" is used in the rest of
this document to refer to both Customers of Service Providers (3GPP,
other ISPs) and users (Enterprise, others).
In this document, the refereces to "Service Provider" is a general
one, meaning whatever network/technology is used for providing access
to IP connectivity.
In the case of an ISP starting its IPv6 offering to its customers,
without initially upgrading its access network to support IPv6, as
indicated in section 5.1 of [3], could use a "tunnel brokering
solution", as described in [5]. However the tunnel set-up protocol
has been identified as a missing piece.
Similarly, in an 3GPP, ISP or enterprise network, the provision of
the native IPv6 connectivity to the customers/users, can take a long
time and may be costly, while a tunneled infrastructure can be used
as a low cost transition path, which can be deployed easily and in a
short time, enabling progressive native IPv6 deployment when/where
justified.
Palet, et al. Expires August 18, 2005 [Page 4]
Internet-Draft Goals for Tunneling Configuration February 2005
Such tunneling infrastructure can connect the customers/users to the
IPv6 network using available production IPv6 address space, thus
facilitating the transition towards native IPv6 deployment, so the
roadmap may become:
o Tunneling infrastructure for early adopters.
o Native IPv6 to some customers/user groups once economically
justified.
o Native IPv6 to all customers/users.
"Tunneling Configuration" (TC) is used in this document to describe a
protocol which takes care of the setup and maintenance of the
bidirectional tunnel between a dual-stack end-node (or leaf network)
and a dual-stack tunnel server. The exchange of parameters needed
for the setup and maintenance of the tunnel (such as address, prefix,
routing, encapsulation, filtering, authentication, accounting, ...),
should be automated to avoid manual user/operator intervention.
The tunneling configuration protocol is envisaged to be deployed as
an initial and temporary mechanism to provide basic IPv6 connectivity
services only. This basic IPv6 connectivity may be limited, in the
sense than may be not 100% comparable to a native IPv6 service.
However this basic IPv6 connectivity should be enough while it allows
the communication through IPv6 during the transition phase, until the
native IPv6 service is available, and consequently is expected that
the tunneling will be phased out as soon as native IPv6 access
service is available.
This document analyzes the goals for a such tunnel setup protocol,
taking in consideration the different possible common network cases
for deploying IPv6.
2. Terminology
Tunneling-Configured Site (TCS): A logical network over which IPv6
connectivity is provided by means of Tunneling Configuration. At
least one dual-stack node is required in this logical network.
Tunnel End-Point (TEP): A dual-stack node performing IPv6-in-IPv4
tunnel encapsulation/decapsulation in accordance with Tunneling
Configuration. There will be always two TEPs in order to establish
the communication, the local one at the customer site (TCS) and the
remote one at the ISP site.
Tunnel Server (TS): A dual-stack server node with IPv6 connectivity
and which provides IPv6 connectivity to client nodes by performing
Palet, et al. Expires August 18, 2005 [Page 5]
Internet-Draft Goals for Tunneling Configuration February 2005
IPv6-in-IPv4 tunnel encapsulation/decapsulation to/from client nodes
in accordance with Tunneling Configuration. A Tunnel Server is
likely to be a dual-stack router, but could be also a node behaving
as a router. The TS is often the ISP TEP.
Tunnel Client (TCL): A dual-stack node that obtains IPv6 connectivity
by means of Tunneling Configuration. A tunnel client relies on
IPv6-in-IPv4 tunnel encapsulation/decapsulation to/from Tunnel
Servers for IPv6 communications to native IPv6 nodes. This is often
the customer TEP.
Direct Tunneling (DT): Direct tunnelling here refer to the case where
end-hosts located within different Tunneling-Configured Sites, in the
same ISP network, may circumvent the Tunnel Server and communicate
directly using the tunnel protocol.
CPE: Customer Premises Equipment.
3. Assumptions and Prerequisites
Tunneling Configuration may be applicable in different IPv6
transition network cases. The focus of this document is to define
the goals to apply this mechanism in the Service Provider context
making the following assumptions and prerequisites:
o The customer configuration may be diverse and not necessarily
predictable. Consequently the tunneling configuration protocol
must be able to adapt to different cases or combinations of:
* The TCS is a single node or leaf network.
* The TCL at the TCS has a global IPv4 address or is behind one
or more NATs.
* The TCL at the TCS has a static or dynamic IPv4 address.
* In case of NAT, the external IPv4 address is a static or
dynamic.
* In case of NAT, it can be customer or ISP owned.
o IPv4 multicast is not widely available, so the tunnel
configuration protocol should work in IPv4 network environments
where IPv4 multicast is not provided.
o The tunnel configuration protocol should be simple to implement
and easy to deploy. In particular, it should not depend on any
complex, yet to be designed, protocols or infrastructure pieces.
Palet, et al. Expires August 18, 2005 [Page 6]
Internet-Draft Goals for Tunneling Configuration February 2005
o This tunneling configuration protocol is provided within a
restrictive timescale, in the sense that it should be phased out
as soon as native access can be provided.
o The tunneling configuration is a protocol to be used in the
transition phase, thus does not need to be perfect. As a matter
of fact, making it perfect would be counter productive, as it
would first delay its definition, then make its deployment more
cumbersome and, last but not least, diminish the incentives to
deploy native IPv6. Furhermore, should not rely in a complex set
of devices, which may not be readily available, and could even
mean a more expensive cost than the support of native IPv6 itself.
4. Goals of the Tunneling Configuration Protocol
As introduced above, there are different ISP types and different
access networks. This means that that there are different goals
related to different network cases and situations. For instance,
factors as presence of NAT or not, low/high bandwidth,
expensive/cheap, strong internal access control or not, etc.
Different access media or network cases brings up different sets of
goals. Obviously, once choice will be to create a protocol for each
specific case, but this is not optimal. Instead, the motivation of
this document is to combine all the goals and look for a common
solution, which can fit as much as possible and in the most optimal
way, in all the cases. Some of those goals could be conflictual and
that need to be resolved as well.
This section groups these different goals.
4.1 General
4.1.1 Simplicity
The Tunneling Configuration protocol should be easy to implement,
implying a lightweight protocol. The protocol should provide a
reasonable, even if limited, set of basic IPv6 connectivity features.
4.1.2 Easy to deploy and Easy to Phase-out
The Tunneling Configuration protocol should be easy to deploy into
the existing IPv4 and IPv6 network infrastructure.
The Tunneling Configuration protocol should have no major impact on
protocols and infrastructure nodes deployed in existing
infrastructures providing IPv4 and native IPv6 connectivity.
Palet, et al. Expires August 18, 2005 [Page 7]
Internet-Draft Goals for Tunneling Configuration February 2005
The Tunneling Configuration protocol should coexist and work
seamlessly together with any native IPv6 infrastructure that
gradually may be implemented in the network. The Tunneling
Configuration protocol should have no negative implications on how
such infrastructure is implemented.
The Tunneling Configuration protocol should be easy to take out of
service once native IPv6 is available.
4.2 Tunnel Set-up
4.2.1 Tunnel End-Point Auto-Discovery and tunnel establishment
The tunnel protocol should provide a mechanism for the automated
discovery of the Tunnel End-Point, by the virtue of which end-hosts
automatically and at run-time can determine the IPv4 addresses of
available Tunnel Servers.
The discovery mechanism should rely on intrinsic services, read
services already universally deployed, to the particular network
environment. It should not require the addition of additional IP
network infrastructure elements for this function only.
The mechanism should be fully dynamic in the sense that it must not
require IP address information such as the IPv4 address of a Tunnel
Server and/or the IPv6 address(es) to use for IPv6 connectivity to be
configured on the Tunnel Clients beforehand.
The analysis done in [11] may apply.
The Tunneling Configuration protocol should provide for the set of
IPv6-in-IPv4 tunnels, based on IPv6-in-IPv4 encapsulation as defined
in [10], from dual-stack nodes, attached to IPv4-only networks, to
Tunnel Servers.
The IPv6-in-IPv4 tunnels and the IPv6 connectivity should be
established in an automated manner, i.e., without requiring manual
intervention at any of the tunnel end-points at tunnel establishment
time. We can typically describe it as a "plug and play" protocol,
which can be triggered through the execution of a simple program.
4.2.2 Tunnel End-Point Reachability Detection
The Tunneling Configuration protocol should allow for means for one
tunnel end-point to verify the reachability of other tunnel
end-points towards which it intends to send packets in a method
similar to IPv6 NUD.
Palet, et al. Expires August 18, 2005 [Page 8]
Internet-Draft Goals for Tunneling Configuration February 2005
The unicast neighbor reachability discovery functions provided by
IPv6 Neighbor Discovery ([6]), i.e., unicast NS/NA exchanges, should
be supported on the tunnel link.
It is preferable that a Tunnel Server monitors the reachability of
the tunnel client towards which it is sending packets. Full
emulation of IPv6 NUD mechanism is however not an explicit goal.
4.2.3 Scalability and Load-Balancing
In order to ensure the scalability of the tunnel service, in terms of
not limiting the number of simultaneous connections to the service
and consequently limiting possible service denial situations, it
should be possible for a Service Provider to load-balance those
connections among several available Tunnel Servers.
Load balancing should be planned already during the early phases of
deployment. Given adequate planning it should be possible for an ISP
to seamlessly deploy additional Tunnel Servers in order to support an
increased amount of Tunnel Clients.
This may be achieved, for example, by using the load balancing
functions provided by the Tunnel Server End-point discovery mechanism
as detailed in [12].
4.2.4 Latency in Set-up Phases
In certain type of networks, keeping tunnels active all the time is
not possible. In such environments, the protocol must be able to
set-up tunnels on demand when the IPv6 connectivity either natively
or through tunneling is unavailable. The tunnel will be set-up only
once though for the tunnel client and not per session.
The Tunneling Configuration protocol must then have a low enough
latency to enable quasi-instant configuration. Latency is usually a
function of the number of packet exchanges required, so minimizing
this parameter is important.
4.2.5 Tunnel Link Sustainability
The tunnel link established in between a host deploying Tunneling
Configuration and an associated Tunnel Server should be expected to
remain in administrative active state for the lifetime of the IPv6
address provided to the host.
The Tunneling Configuration protocol should not mandate keep-alive
messages to be transmitted by the host simply in order to sustain
tunnel link connectivity. However, this may be required when a
Palet, et al. Expires August 18, 2005 [Page 9]
Internet-Draft Goals for Tunneling Configuration February 2005
tunnel has to cross a NAT box. In this case, the mapping established
by the NAT must be preserved as long as the tunnel is in use. This
is usually achieved by sending keep-alive messages across the tunnel.
Also, the same keep-alive messages can enable the ISP tunnel end
point to perform garbage collection of its resources when tunnels are
not in use anymore. To enable those two functionalities, the tunnel
set-up protocol must include the transmission of keep-alive messages.
A client may choose not to send those messages (for example on 3GPP
or ISDN type links). In this case, the client should be able to
handle a tunnel disconnect event and be able to restart the set-up
phase to re-establish the tunnel.
4.2.6 NAT Traversal
The Tunneling Configuration protocol should be able to detect the
presence of one or more NATs in its path.
The tunnel should be able to traverse NAT, if present, so it may be
necessary to choose among several tunnel encapsulation protocols for
the most optimal one.
4.2.7 Firewall Traversal
Even if no NAT is in the tunnel path, there may be a firewall which
prohibits proto-41. In such case, the tunnel encapsulation selection
based on NAT detection could select a tunnel that will not work.
To cope with this situation, the Tunnel Configuration protocol
implementation may allow a user to explicitly specify the desired
tunnel encapsulation, regardless of the NAT detection process.
4.2.8 Use Native Connectivity when Available
The node should not use the Tunneling Configuration protocol when
native IPv6 connectivity is available.
The fact that a node should not initiate the Tunneling Configuration
protocol when native IPv6 connectivity is available is not considered
to be a functional goal on the tunnel protocol per se. For example,
rather it is related to the activation and deactivation of the
protocol.
4.3 IPv6 Configuration
4.3.1 IPv6 Address Assignment
Assignment of at least one globally routable IPv6 unicast address
Palet, et al. Expires August 18, 2005 [Page 10]
Internet-Draft Goals for Tunneling Configuration February 2005
(/128) to the end-node should be supported.
No goals are defined as to how address configuration should be
performed. This may be done based on stateless or stateful IPv6
address configuration mechanisms or by some altogether different
mechanism particular to the Tunneling Configuration protocol.
4.3.2 IPv6 Address Stability
The IPv6 address is "transient" and may change, but the protocol
should offer a mechanism to provide IPv6 address stability (for
example, a cookie mechanism). The implementation of this mechanism
should allow this feature to be turned off.
It is preferable that the address assignment provides a stable
address, that is, an address that can be used for IPv6 connectivity
for a certain amount of time rather than solely one address per
higher layer session initiation.
4.3.3 IPv6 Prefix Delegation
Prefix Delegation support may depend on the different deployment
cases. It is not however required that a Tunneling Configuration
protocol supporting only basic requirements provides support for
prefix delegation.
4.3.4 IPv6 DNS
Dual-stack nodes could use both IPv4 and IPv6 DNS discovery
mechanisms and both, IPv4 and IPv6 transport for DNS services.
Consequently IPv6 DNS discovery and IPv6 transport for DNS services
should not be a goal of the Tunneling Configuration protocol.
4.4 Implementation Considerations
4.4.1 Private and Public IPv4 Addresses
The Tunneling Configuration protocol should work over IPv4 sites
deploying both private and public IPv4 addresses.
Furthermore, the Tunneling Configuration protocol should work with
both dynamic and static IPv4 address allocation.
4.4.2 Extensibility
The Tunneling Configuration protocol should be extensible to support
tunnel encapsulation other than IPv6 in IPv4 and IPv6 in transport in
Palet, et al. Expires August 18, 2005 [Page 11]
Internet-Draft Goals for Tunneling Configuration February 2005
IPv4. In particular, encapsulation of IPv4 in IPv6 or IPv6 in IPv6
could be defined.
4.4.3 Stateful or Stateless
By a stateful mechanism we mean a mechanism that require the Tunnel
Server to maintain tunnel state per client it serves.
Tunnel state here is considered to be any parameter kept by the
server per client and without which the server is unable to serve the
client (receive packets from/send packets to).
Tunnel state must be distinguished from state used to optimize the
packet delivery function of the tunnel server and which is kept in a
fixed or upper limited amount of memory space, such as, e.g.,
reachability information.
It should be emphasized that this document makes no deliberate
assumptions on whether a Tunneling Configuration protocol should be
based on a stateful or stateless Tunnel Server mechanism. Indeed it
is anticipated that the goals of Tunneling Configuration as put
forward here could be served both by a stateless as well as by a
stateful mechanism.
4.5 Management and Security
4.5.1 Security
The Tunneling Configuration protocol should not impose any new
vulnerability to the existing network infrastructure.
The Tunneling Configuration protocol should not impose any new
vulnerability to the nodes implementing it than what is already
present in existing multi-access IPv6 networks, where multiple hosts
are served by the same router or possibly multiple routers.
4.5.2 Traceability
In some environments, traceability is an important consideration.
The Tunneling Configuration protocol should be instrumentable to
enable the collection of usage data which can be used, for example,
for capacity planning.
4.5.3 Registration
The registration of credentials should be external to the Tunneling
Configuration protocol. The user may require registration prior to
using this service (through some web based service or other means).
Palet, et al. Expires August 18, 2005 [Page 12]
Internet-Draft Goals for Tunneling Configuration February 2005
Alternatively, the service provider may use an existing
authentication database to pre-register its users, or even not
require registration at all, depending on the network configuration.
In order to allow a service provider to use its existing
authentication database, an implementation may provide hooks to
facilitate integration with the ISP management infrastructure (e.g.
RADIUS for AAA, billing).
The protocol may send information about registration procedure when a
non-registered client requests access to a registered mode (e.g. URL
to provider registration web page).
4.5.4 Authentication
Authentication can be used to control that the user has access to the
IPv6 services.
The authentication mechanism supported should be compatible with
standardized methods that are generally deployed. In order to assure
interoperability, at least one common authentication method should be
supported. Other authentication may be supported and should be
negotiated between the client and server (e.g., SASL [13]).
4.5.5 Confidentiality
Tunneling Configuration can be used across networks which are not
under the service provider control (e.g., roaming users). The
Tunneling Configuration protocol should allow protection of the
authentication data. This can be achieve by selecting an
authentication mechanism that protects the credentials (e.g.,
digest-md5).
Protecting the tunneled data (IPv6 in this case) should be possible,
for instance by means of using IPsec tunneling.
4.5.6 Accounting
The Tunneling Configuration should include tools for managing and
monitoring the provided service. Such information can be used to
plan service capacity (traffic load) or billing information.
Some useful accounting data are (not exhaustive list):
o Tunnel counters (traffic in/out).
o User utilization (tunnel uptime).
Palet, et al. Expires August 18, 2005 [Page 13]
Internet-Draft Goals for Tunneling Configuration February 2005
o System logging (authentication failures, resource exhaustion,
etc.).
The interface used to provide such information can be through SNMP or
an AAA protocol (e.g., RADIUS accounting).
5. Applicability of the Tunneling Configuration to Different Network
Cases
Note: Section to be completed in a new version.
The goals enumerated in the precedent section are not all necessarily
applicable and not in the same degree to different network cases.
However seems feasible to build a common ground to these different
network cases in order to define a single Tunneling Configuration
protocol, which can accommodate to the different combinations of
those goals and network cases.
The v6ops working group has identified and analyzed several
deployment scenarios for IPv4/IPv6 transition mechanisms in various
stages of the IPv6 deployment and its coexistence with IPv4.
This work has been carried out for a number of different network
environments each with their particular characteristics including
3GPP [1], Unmanaged [2], ISP [3] and Enterprise networks [4].
The following sub-sections basically look into those different
network environments to provide an analysis of the common and
uncommon goals.
5.1 3GPP Access Networks
IPv6-in-IPv4 tunneling is envisaged to be deployed in 3GPP networks
as an initial and temporary mechanism to provide limited and basic
IPv6 connectivity services only. The IPv6-in-IPv4 tunneling
mechanism demanded by the 3GPP environment falls within the realm of
Tunneling Configuration.
Native IPv6-like 3GPP connectivity services, e.g. services including
flexible charging and quality of service on demand, will be feasible,
in 3GPP environments by virtue of true native IPv6 only. This is due
to the interrelation between the native IPv6 3GPP service and various
3GPP signaling interfaces. The latter which is not envisaged
upgraded to support the IPv6-in-IPv4 tunneling situation.
It is important to note that the IPv6 connectivity provided by 3GPP
Tunneling Configuration IPv6-in-IPv4 tunneling does not compare with
the native IPv6 3GPP connectivity in terms of the services offered.
Palet, et al. Expires August 18, 2005 [Page 14]
Internet-Draft Goals for Tunneling Configuration February 2005
This differentiates the 3GPP IPv6-in-IPv4 tunneling transition case
somewhat from some of the other transition scenarios considered in
the IETF v6ops WG and unlike some of these scenarios, the 3GPP
IPv6-in-IPv4 tunneling deployment case is not a case of progressive
and gradual roll out of native IPv6-like services. Rather, Tunneling
Configuration will in the 3GPP environment be deployed for the
following purposes:
o To provide temporary provisioning of basic IPv6 services, which
users may deploy for the simplest IPv6 services only.
o To allow an Operator, possibly a native IPv6 enabled Operator, to
provide basic IPv6 services to users roaming into foreign networks
which supports IPv4 bearer connectivity only.
The scope of Tunneling Configuration in the 3GPP network environment
is restricted to an absolute minimal set of functions required to
provide automatic IPv6 connectivity establishment to dual stack nodes
by means of IPv6-in-IPv4 encapsulation as defined in [10] to Tunnel
Servers.
Tunneling Configuration in the 3GPP network environment does not
attempt to provide emulation of the full set of native IPv6
connectivity functions as defined by [14], [15] and [16].
With this in mind the following goals are applicable to the 3GPP
Access Networks:
5.1.1 Simplicity
.
5.1.2 Automated IPv6-in-IPv4 tunnel establishment
.
5.1.3 IPv6 Address Assignment and Prefix Delegation
It is only an explicit goal to have a /128 address allocated for
global connectivity on the tunnel link.
5.1.4
.
5.1.5
.
Palet, et al. Expires August 18, 2005 [Page 15]
Internet-Draft Goals for Tunneling Configuration February 2005
5.1.6
.
5.1.7
.
5.2 Narrowband Access Networks
Somehow this type of networks are very similar to the 3GPP case,
because the main constrain is the low bandwidth and the high cost of
the usage of the access network. Examples of this are PSTN and ISDN
access networks.
.
5.3 Broadband Access Networks
This is typically the case when an ISP is offering IPv6 connectivity
to its customers, initially using controlled tunneling
infrastructure, as described in section 5.1 "Steps in Transitioning
Customer Connection Networks" of [3].
.
5.4 Unmanaged Networks
In unmanaged networks [2], Tunneling Configuration is applicable in
the case A where a gateway does not provide IPv6 at all (section 3),
and case C where a dual-stack gateway is connected to an IPv4-only
ISP (section 5).
In the case the link is not IPv4 capable, Tunneling Configuration is
applicable by means of IPv4 in IPv6 tunneling.
This will actually fall into the same set of goals as already
described for narrow or broadband access networks, depending on the
media.
5.5 Enterprise Networks
In the enterprise scenario [4], Tunneling Configuration can be used
to support both, remote users connecting to the enterprise network
(section 7.5.2) and internal users if the native infrastructure is
not yet available.
Palet, et al. Expires August 18, 2005 [Page 16]
Internet-Draft Goals for Tunneling Configuration February 2005
6. Conclusions
TBD.
7. Security Considerations
TBD.
8. Acknowledgements
This memo was written starting from previous existing work at v6ops,
such as "Goals for Zero-Configuration Tunneling in 3GPP" [7],
"Zero-Configuration Tunneling Requirements" [8] and "Goals for
Registered Assisted Tunneling" [9]. The authors would also like to
acknowledge inputs from Tim Chown and the European Commission support
in the co-funding of the Euro6IX project, where this work is being
developed.
9. References
9.1 Normative References
[1] Wiljakka, J., "Analysis on IPv6 Transition in 3GPP Networks",
Internet-Draft draft-ietf-v6ops-3gpp-analysis-11, October 2004.
[2] Huitema, C., Austein, R., Satapati, S. and R. van der Pol,
"Evaluation of IPv6 Transition Mechanisms for Unmanaged
Networks", RFC 3904, September 2004.
[3] Lind, M., Ksinant, V., Park, S., Baudot, A. and P. Savola,
"Scenarios and Analysis for Introducing IPv6 into ISP Networks",
Internet-Draft draft-ietf-v6ops-isp-scenarios-analysis-03, June
2004.
[4] Bound, J., "IPv6 Enterprise Network Scenarios",
Internet-Draft draft-ietf-v6ops-ent-scenarios-05, July 2004.
[5] Durand, A., Fasano, P., Guardini, I. and D. Lento, "IPv6 Tunnel
Broker", RFC 3053, January 2001.
[6] Narten, T., Nordmark, E. and W. Simpson, "Neighbor Discovery for
IP Version 6 (IPv6)", RFC 2461, December 1998.
9.2 Informative References
[7] Nielsen, k., "Goals for Zero-Configuration Tunneling in 3GPP",
Internet-Draft draft-nielsen-v6ops-3GPP-zeroconf-goals-00,
October 2004.
Palet, et al. Expires August 18, 2005 [Page 17]
Internet-Draft Goals for Tunneling Configuration February 2005
[8] Suryanarayanan, R., "Zero-Configuration Tunneling
Requirements",
Internet-Draft draft-suryanarayanan-v6ops-zeroconf-reqs-00,
October 2004.
[9] Parent, F., "Goals for Registered Assisted Tunneling",
Internet-Draft draft-ietf-v6ops-assisted-tunneling-requirements-01
, October 2004.
[10] Nordmark, E. and R. Gilligan, "Basic Transition Mechanisms for
IPv6 Hosts and Routers",
Internet-Draft draft-ietf-v6ops-mech-v2-06, September 2004.
[11] Palet, J. and M. Diaz, "Analysis of IPv6 Tunnel End-point
Discovery Mechanisms",
Internet-Draft draft-palet-v6ops-tun-auto-disc-03, January
2005.
[12] Palet, J., "IPv6 Tunnel End-point Automatic Discovery
Mechanism",
Internet-Draft draft-palet-v6ops-solution-tun-auto-disc-01,
October 2004.
[13] Myers, J., "Simple Authentication and Security Layer (SASL)",
RFC 2222, October 1997.
[14] Wasserman, M., "Recommendations for IPv6 in Third Generation
Partnership Project (3GPP) Standards", RFC 3314, September
2002.
[15] Loughney, J., "IPv6 Node Requirements",
Internet-Draft draft-ietf-ipv6-node-requirements-11, August
2004.
[16] IAB and IESG, "IAB/IESG Recommendations on IPv6 Address
Allocations to Sites", RFC 3177, September 2001.
Palet, et al. Expires August 18, 2005 [Page 18]
Internet-Draft Goals for Tunneling Configuration February 2005
Authors' Addresses
Jordi Palet Martinez
Consulintel
San Jose Artesano, 1
Alcobendas - Madrid
E-28108 - Spain
Phone: +34 91 151 81 99
Fax: +34 91 151 81 98
Email: jordi.palet@consulintel.es
Karen Egede Nielsen
Ericsson
Skanderborgvej 232
8260 Viby J
zip - Denmark
Phone: +45 89 38 51 00
Fax:
Email: karen.e.nielsen@ericsson.com
Florent Parent
Hexago
2875 boul. Laurier, suite 300
Sainte-Foy, QC G1V 2M2
Canada
Phone:
Fax:
Email: florent.parent@hexago.com
Alain Durand
Sun Microsystems, inc.
17 Network Circle UMPK17-202
Menlo Park, CA 94025
USA
Phone:
Fax:
Email: alain.durand@sun.com
Palet, et al. Expires August 18, 2005 [Page 19]
Internet-Draft Goals for Tunneling Configuration February 2005
Radhakrishnan Suryanarayanan
Samsung India Software Operations
No. 3/1 Millers Road
Bangalore
India
Phone: +91 80 51197777
Fax:
Email: rkrishnan.s@samsung.com
Pekka Savola
CSC/FUNET
Espoo
Finland
Phone:
Fax:
Email: psavola@funet.fi
Palet, et al. Expires August 18, 2005 [Page 20]
Internet-Draft Goals for Tunneling Configuration February 2005
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Palet, et al. Expires August 18, 2005 [Page 21]
Html markup produced by rfcmarkup 1.129d, available from
https://tools.ietf.org/tools/rfcmarkup/