| < draft-nalawade-kapoor-tunnel-safi-04.txt | draft-nalawade-kapoor-tunnel-safi-05.txt > | |||
|---|---|---|---|---|
| Network Working Group Gargi Nalawade | Network Working Group Gargi Nalawade | |||
| Internet Draft Ruchi Kapoor | Internet Draft Ruchi Kapoor | |||
| Expires: April 2006 Dan Tappan | Expires: December 2006 Dan Tappan | |||
| Scott Wainner | Scott Wainner | |||
| Simon Barber | ||||
| Chris Metz | ||||
| Cisco Systems | Cisco Systems | |||
| Tunnel SAFI | BGP Tunnel SAFI | |||
| draft-nalawade-kapoor-tunnel-safi-04.txt | draft-nalawade-kapoor-tunnel-safi-05.txt | |||
| Status of this Memo | Status of this Memo | |||
| By submitting this Internet-Draft, each author represents that any | By submitting this Internet-Draft, each author represents that any | |||
| applicable patent or other IPR claims of which he or she is aware | applicable patent or other IPR claims of which he or she is aware | |||
| have been or will be disclosed, and any of which he or she becomes | have been or will be disclosed, and any of which he or she becomes | |||
| aware will be disclosed, in accordance with Section 6 of BCP 79. | aware will be disclosed, in accordance with Section 6 of BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||
| skipping to change at page 1, line 39 ¶ | skipping to change at page 1, line 41 ¶ | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| Abstract | Abstract | |||
| The architecture of an MPLS VPN solution relies on the establishment | There is a growing requirement for network operators to support | |||
| of two layers of reachability information. The first is the | multi-address familiy routing and forwarding services across their | |||
| association of a prefix, interface, or route table to a VPNv4 label | backbone networks. In general this is accomplished by constructing a | |||
| that is used on the egress PE to delineate a Virtual Route Forwarding | mesh of tunnels between the backbbone provider edge routers and then | |||
| table. The second is the association of the next-hop to reach the | advertising reachability to prefixes through specific tunnels. This | |||
| egress PE. By default, the MPLS VPN establishes an LSP tunnel from | document defines a new subsequence address family identifier | |||
| the ingress PE to the egress PE. A requirement exists to establish | associated with a tunnel end-point information. This enables a single | |||
| an IP tunnel between the ingress and egress PE in lieu of an LSP. | egress provider edge router to use the border gateway protocol as a | |||
| The egress PE's tunnel capability needs to be distributed to all the | scalable and efficient means to distribute its tunnel end-point | |||
| potential ingress PE's as well as the attributes of the tunnel. The | information to many ingress provider edge routers. The result is that | |||
| tunnel end-point discovery may occur within and across Autonomous | the mesh of tunnels is in place and packets can be forwarded through | |||
| Systems. BGP is the logical protocol of choice that is widely | these tunnels based on advertised reachability. | |||
| deployed for MPLS VPN solutions and can carry this information in a | ||||
| synchronized manner. This document defines how BGP speakers can | ||||
| convey Tunnel end-point reachability information. | ||||
| 1. Introduction | 1. Introduction | |||
| There is a growing requirement for network operators to support | ||||
| multi-address familiy routing and forwarding services across their | ||||
| backbone networks. In the context of network-based IP VPN, this is | ||||
| accomplished today using the mechanisms defined in RFC4364. More | ||||
| recently the softwires effort has emerged as a generalized, network- | ||||
| based routing and forwarding solution supporting connectivity of | ||||
| address familiy islands (e.g. IPv4, IPv6, VPNv4, VPNv6) across a | ||||
| uniform IPv4 or IPv6 backbone network [SW-MESH-FMWK]. In both cases | ||||
| the establishment of tunnels (IP or MPLS) between ingress and egress | ||||
| provider edge (PE) routers must be in place before packets of one | ||||
| address famility can be tunneled across the backbone network. | ||||
| Two end-points of a tunnel need to agree upon the end-point | Two end-points of a tunnel need to agree upon the end-point | |||
| information and its binding to a network address at the remote point. | information and its binding to a network address at the remote point. | |||
| Normally, this information can be manually shared and statically | Normally, this information can be manually shared and statically | |||
| configured when the number of tunnels to manage is relatively small. | configured when the number of tunnels to manage is relatively small. | |||
| In the case of a network such as an MPLS VPN where there is a need | In the case of a network such as an MPLS VPN where there is a need | |||
| for a tunnel between every ingress and egress PE, the number of | for a tunnel between every ingress and egress PE, the number of | |||
| tunnel end-points that need to be exchanged and maintained grows | tunnel end-points that need to be exchanged and maintained grows | |||
| dramatically as the network becomes large. The egress PE already | dramatically as the network becomes large. The egress PE already | |||
| defines reachability information for the private routing information | defines reachability information for the private routing information | |||
| as well as the NLRI of the PE itself. This information is | as well as the NLRI of the PE itself. This information is | |||
| skipping to change at page 2, line 46 ¶ | skipping to change at page 3, line 9 ¶ | |||
| PE and may or may not correlate with the capabilities of any other | PE and may or may not correlate with the capabilities of any other | |||
| potential ingress PE. For this reason, the ingress PE may select the | potential ingress PE. For this reason, the ingress PE may select the | |||
| most appropriate tunneling mechanism based on the compability of the | most appropriate tunneling mechanism based on the compability of the | |||
| tunnel capabilities between the ingress and egress PE's and their | tunnel capabilities between the ingress and egress PE's and their | |||
| preferences. | preferences. | |||
| 2. The Tunnel SAFI | 2. The Tunnel SAFI | |||
| This document defines a new BGP SAFI called the Tunnel SAFI. The | This document defines a new BGP SAFI called the Tunnel SAFI. The | |||
| <AFI, SAFI> [IANA-AFI] [IANA-SAFI] value pair used to identify this | <AFI, SAFI> [IANA-AFI] [IANA-SAFI] value pair used to identify this | |||
| SAFI are- AFI=1, SAFI=64, for the IPv4 Tunnel AFI; and AFI=2, SAFI=64 | SAFI are: AFI=1, SAFI=64, for the IPv4 Tunnel address family; and | |||
| for the IPv6 Tunnel AFI. | AFI=2, SAFI=64 for the IPv6 Tunnel address family. | |||
| For BGP Speakers supporting [BGP-4], the tunnel end point address | For BGP Speakers supporting [BGP-4], the tunnel end point address | |||
| will be carried as an NLRI in the MP_REACH attribute for the Tunnel | will be carried as an NLRI in the MP_REACH attribute for the Tunnel | |||
| SAFI. | SAFI. | |||
| The NLRI will be encoded as a 2-octet Identifier followed by the NLRI | The NLRI will be encoded as a 2-octet Identifier followed by the NLRI | |||
| format as specified by the respective AFI. The Identifier will | format as specified by the respective AFI. The Identifier will | |||
| identify the tunnel end point being advertised. This Identifier | identify the tunnel end point being advertised. This Identifier | |||
| enables multiple tunnel end-points to share the same network address, | enables multiple tunnels to share the same network address, thus | |||
| thus conserving the number of addresses needed to be configured by | conserving the number of addresses needed to be configured by the | |||
| the operator on each of the Tunnel-endpoints. | operator on each of the Tunnel-endpoints. The network address | |||
| contained in the Tunnel SAFI NLRI is the network address of the | ||||
| tunnel end point. | ||||
| 3. BGP Attribute | The network address contained in the BGP Tunnel SAFI NLRI SHOULD be | |||
| the same as the network address carried in the 'Network Address of | ||||
| Next Hop' field of the BGP Softwire Nexthop Attribute [BGP-SW-NEXT- | ||||
| HOP]. The BGP Softwire Nexthop Attribute will be carried separately | ||||
| in BGP advertisements, as described in [BGP-SW-NEXT-HOP]. | ||||
| The BGP Tunnel Encapsulation Attribute [BGP-TUN] will be used to | 3. BGP Encapsulation Attributes | |||
| carry The Tunnel end-point information. The egress PE may support one | ||||
| or more tunnel methods. The egress PE MUST advertise all tunnel | ||||
| types for which it will support tunnel termination. The egress PE | ||||
| MAY advertise one or more tunnel types. | ||||
| If a BGP SPeaker supports the BGP Tunnel SAFI then it MUST understand | The BGP Tunnel SAFI will carry the tunnel end-point information | |||
| inside a BGP encapsulation attribute. The encapsulation attribute | ||||
| used can be either the BGP Tunnel Encapsulation Attribute [BGP-TUN] | ||||
| or the BGP Softwire Mesh encapsulation attribute [BGP-SW-ENCAP]. The | ||||
| egress PE may support one or more tunnel methods. The egress PE MUST | ||||
| advertise all tunnel types for which it will support tunnel | ||||
| termination. The egress PE MAY advertise one or more tunnel types. | ||||
| If a BGP Speaker supports the BGP Tunnel SAFI then it MUST understand | ||||
| the Tunnel Encapsulation attribute [BGP-TUN]. A BGP update for the | the Tunnel Encapsulation attribute [BGP-TUN]. A BGP update for the | |||
| Tunnel SAFI MUST never be sent without the BGP Tunnel Encapsulation | Tunnel SAFI MUST contain either the BGP Tunnel Encapsulation | |||
| Attribute. | Attribute [BGP-TUN] or the BGP Softwire Mesh encapsulation attribute | |||
| [BGP-SW-ENCAP]. A BGP update for the Tunnel SAFI MUST NOT contain | ||||
| both the BGP Tunnel Encapsulation Attribute [BGP-TUN] and the BGP | ||||
| Softwire Mesh encapsulation attribute [BGP-SW-ENCAP] in the same | ||||
| update message. If such an update message is received by a BGP | ||||
| speaker, the message should be ignored. | ||||
| The details of the contents of the BGP Tunnel Encapsulation Attribute | ||||
| [BGP-TUN] are described in the section below. | ||||
| 3.1 Contents of BGP Tunnel Encapsulation Attrubite. | ||||
| As defined in [BGP-TUN], the first bit of the TYPE field in the BGP | As defined in [BGP-TUN], the first bit of the TYPE field in the BGP | |||
| Tunnel Encapsulation Attribute is the 'transitive bit'. If the bit | Tunnel Encapsulation Attribute is the 'transitive bit'. If the bit | |||
| value is 1, implies that this tunnel is transitive. If the bit value | value is 1, implies that this tunnel is transitive. If the bit value | |||
| is 0, it implies this specific tunnel is not transitive. | is 0, it implies this specific tunnel is not transitive. | |||
| The Value Field of the BGP Tunnel Encapsulation Attribute, MUST | The Value Field of the BGP Tunnel Encapsulation Attribute, MUST | |||
| contain at least one of the following valid Type codes for this SAFI. | contain at least one of the following valid Type codes for this SAFI. | |||
| It MAY contain one or more TLVs with these Type codes. | It MAY contain one or more TLVs with these Type codes. | |||
| skipping to change at page 3, line 46 ¶ | skipping to change at page 4, line 30 ¶ | |||
| Type 2: mGRE Tunnel information | Type 2: mGRE Tunnel information | |||
| Type 3: IPSec Tunnel information | Type 3: IPSec Tunnel information | |||
| Type 4: MPLS Tunnel information | Type 4: MPLS Tunnel information | |||
| Type 5: L2TPv3 in IPSEC Tunnel information | Type 5: L2TPv3 in IPSEC Tunnel information | |||
| Type 6: mGRE in IPSEC Tunnel information | Type 6: mGRE in IPSEC Tunnel information | |||
| 3.1. L2TPv3 Tunnel information TLV | 3.1.1 L2TPv3 Tunnel information TLV | |||
| The L2TPv3 Tunnel Information TLV has a type value of 1. The value | The L2TPv3 Tunnel Information TLV has a type value of 1. The value | |||
| part of the L2TPv3 Tunnel Information Type contains the following : | part of the L2TPv3 Tunnel Information Type contains the following : | |||
| - Preference (2 Octets) | - Preference (2 Octets) | |||
| - Flags (1 Octet) | - Flags (1 Octet) | |||
| - Cookie Length (1 Octet) | - Cookie Length (1 Octet) | |||
| - Session ID (4 Octets) | - Session ID (4 Octets) | |||
| - Cookie (Variable) | - Cookie (Variable) | |||
| skipping to change at page 5, line 37 ¶ | skipping to change at page 6, line 19 ¶ | |||
| the egress PE, the associated Cookie MAY be generated such that | the egress PE, the associated Cookie MAY be generated such that | |||
| packets received by the egress PE from an ingress PE can be quickly | packets received by the egress PE from an ingress PE can be quickly | |||
| validated for proper service context. | validated for proper service context. | |||
| The default value of the Length Field for the L2TPv3 Tunnel | The default value of the Length Field for the L2TPv3 Tunnel | |||
| information TLV is between 8 and 16 bytes, depending on the length of | information TLV is between 8 and 16 bytes, depending on the length of | |||
| the Cookie field specified in Cookie length. If the length of the TLV | the Cookie field specified in Cookie length. If the length of the TLV | |||
| is greater than that value, the subsequent portion of the Value field | is greater than that value, the subsequent portion of the Value field | |||
| contains one or more sub-TLVs as defined in [BGP-TUN]. | contains one or more sub-TLVs as defined in [BGP-TUN]. | |||
| 3.2. mGRE Tunnel Information TLV | 3.1.2 mGRE Tunnel Information TLV | |||
| The mGRE Tunnel Information Type has a Type 2. The value part of the | The mGRE Tunnel Information Type has a Type 2. The value part of the | |||
| mGRE Tunnel Information Type contains the following : | mGRE Tunnel Information Type contains the following : | |||
| - Preference (2 Octets) | - Preference (2 Octets) | |||
| - Flags (1 Octet) | - Flags (1 Octet) | |||
| - mGRE Key (0 or 4 Octets) | - mGRE Key (0 or 4 Octets) | |||
| The mGRE Tunnel Information TLV looks as follows : | The mGRE Tunnel Information TLV looks as follows : | |||
| skipping to change at page 6, line 45 ¶ | skipping to change at page 7, line 29 ¶ | |||
| PE to any potential ingress PE. In this case, the key value has | PE to any potential ingress PE. In this case, the key value has | |||
| unidirectional relevance from all viable ingress PE's to the egress | unidirectional relevance from all viable ingress PE's to the egress | |||
| PE. Alternatively, the key value may be statically configured such | PE. Alternatively, the key value may be statically configured such | |||
| that all ingress and egress PE's use the same key value. | that all ingress and egress PE's use the same key value. | |||
| If the Length field of the TLV contains a value greater than 3 Octets | If the Length field of the TLV contains a value greater than 3 Octets | |||
| plus the value specified in the Key Length, the subsequent portion of | plus the value specified in the Key Length, the subsequent portion of | |||
| the Value field contains one or more sub-TLVs as defined by [BGP- | the Value field contains one or more sub-TLVs as defined by [BGP- | |||
| TUN]. | TUN]. | |||
| 3.3. IPSec Tunnel Information TLV | 3.1.3 IPSec Tunnel Information TLV | |||
| The IPSec Tunnel Information Type has a Type 3. The value part of | The IPSec Tunnel Information Type has a Type 3. The value part of | |||
| the IPSec Tunnel Information Type contains the following : | the IPSec Tunnel Information Type contains the following : | |||
| - Preference (2 Octets) | - Preference (2 Octets) | |||
| - Flags (1 Octet) | - Flags (1 Octet) | |||
| - IKE ID Type (1 Octets) | - IKE ID Type (1 Octets) | |||
| - IKE ID Length (2 Octets) | - IKE ID Length (2 Octets) | |||
| - IKE Identifier (Variable) | - IKE Identifier (Variable) | |||
| skipping to change at page 8, line 10 ¶ | skipping to change at page 8, line 38 ¶ | |||
| Identifier. | Identifier. | |||
| IKE Identifier - A variable length field containing an IKE Identifier | IKE Identifier - A variable length field containing an IKE Identifier | |||
| of the egress PE. | of the egress PE. | |||
| If the Length field of the TLV contains a value greater than 11 | If the Length field of the TLV contains a value greater than 11 | |||
| Octets plus the value specified in the Key Length, the subsequent | Octets plus the value specified in the Key Length, the subsequent | |||
| portion of the Value field contains one or more sub-TLVs as defined | portion of the Value field contains one or more sub-TLVs as defined | |||
| by [BGP-TUN]. | by [BGP-TUN]. | |||
| 3.4. MPLS TLV | 3.1.4 MPLS TLV | |||
| The MPLS TLV has a Type 4. The value part of the MPLS TLV contains | The MPLS TLV has a Type 4. The value part of the MPLS TLV contains | |||
| the following : | the following : | |||
| - Preference (2 Octets) | - Preference (2 Octets) | |||
| - Flags (1 Octet) | - Flags (1 Octet) | |||
| The MPLS Tunnel Information TLV looks as follows : | The MPLS Tunnel Information TLV looks as follows : | |||
| 0 1 | 0 1 | |||
| skipping to change at page 8, line 44 ¶ | skipping to change at page 9, line 29 ¶ | |||
| Preference A 2 Octet field containing a Preference associated with | Preference A 2 Octet field containing a Preference associated with | |||
| the TLV. The Preference value indicates a preferred ordering of | the TLV. The Preference value indicates a preferred ordering of | |||
| tunneling encapsulations according to the sender. The recipient of | tunneling encapsulations according to the sender. The recipient of | |||
| the information SHOULD take the sender's preference into account in | the information SHOULD take the sender's preference into account in | |||
| selecting which encapsulation it will use. A higher value indicates a | selecting which encapsulation it will use. A higher value indicates a | |||
| higher preference. | higher preference. | |||
| Flags - A 1 Octet field containing flag-bits. | Flags - A 1 Octet field containing flag-bits. | |||
| 3.5. L2TPv3 in IPSEC TLV | 3.1.5 L2TPv3 in IPSEC TLV | |||
| When the value in the Type field is 5, the Value portion of the | When the value in the Type field is 5, the Value portion of the | |||
| SAFI-Specific Attribute TLV will carry an IPSec TLV followed by an | SAFI-Specific Attribute TLV will carry an IPSec TLV followed by an | |||
| L2TPv3 TLV. | L2TPv3 TLV. | |||
| 3.5. mGRE in IPSEC TLV | 3.1.6 mGRE in IPSEC TLV | |||
| When the value in the Type field is 6, the Value portion of the | When the value in the Type field is 6, the Value portion of the | |||
| SAFI-Specific Attribute TLV will carry an IPSec TLV followed by an | SAFI-Specific Attribute TLV will carry an IPSec TLV followed by an | |||
| mGRE TLV. | mGRE TLV. | |||
| 4. Capability Advertisement | 4. Capability Advertisement | |||
| A BGP speaker MAY participate in the distribution of the IPv4-Tunnel | A BGP speaker MAY participate in the distribution of the IPv4 Tunnel | |||
| SAFI or IPv6-Tunnel SAFI information. A BGP speaker that wishes to | address family or IPv6 Tunnel address family information. A BGP | |||
| exchange the IPv4-Tunnel SAFI or the IPv6 Tunnel SAFI, MUST use the | speaker that wishes to exchange the IPv4 Tunnel address family or the | |||
| MP_EXT Capability Code as defined in [BGP-MP], to advertise the | IPv6 Tunnel address family, MUST use the MP_EXT Capability Code as | |||
| corresponding (AFI, SAFI) pair. | defined in [BGP-MP], to advertise the corresponding (AFI, SAFI) pair. | |||
| 5. Operation | 5. Operation | |||
| A BGP Speaker that receives the Capability for the IPv4 Tunnel | ||||
| A BGP Speaker that receives the Capability for the IPv4-Tunnel SAFI | address family or the IPv6 Tunnel address family, MAY advertise the | |||
| or the IPv6-Tunnel SAFI, MAY advertise the IPv4-Tunnel SAFI or IPv6- | IPv4 Tunnel address family or IPv6 Tunnel address family prefixes to | |||
| Tunnel SAFI prefixes to that peer. | that peer. | |||
| The BGP Tunnel Encapsulation attribute is defined only to be used in | The BGP Tunnel Encapsulation attribute is defined only to be used in | |||
| UPDATE messages for the IPv4 tunnel SAFI or the IPv6 Tunnel SAFI. If | UPDATE messages for the IPv4 tunnel address family or the IPv6 Tunnel | |||
| the BGP Tunnel Encapsulation Attribute is received in an UPDATE | address family. If the BGP Tunnel Encapsulation Attribute is received | |||
| message for any other AFI/SAFI, it MUST be ignored. | in an UPDATE message for any other AFI/SAFI, it MUST be ignored. | |||
| If a BGP Speaker receives an unrecognized Transitive Tunnel | If a BGP Speaker receives an unrecognized Transitive Tunnel | |||
| Encapsulation TLV as part of the BGP Tunnel Encapsulation Attribute, | Encapsulation TLV as part of the BGP Tunnel Encapsulation Attribute, | |||
| it MUST accept it and propagate it to other peers. | it MUST accept it and propagate it to other peers. | |||
| 6. Deployment Considerations | 6. Deployment Considerations | |||
| In order for the Tunnels to come up between two end-points, the BGP | In order for the Tunnels to come up between two end-points, the BGP | |||
| Speakers advertising the Tunnel end-points using the IPv4/IPv6 Tunnel | Speakers advertising the Tunnel end-points using the IPv4/IPv6 Tunnel | |||
| SAFI, MUST exchange at least one common encapsulation option. | SAFI, MUST exchange at least one common encapsulation option. | |||
| skipping to change at page 11, line 18 ¶ | skipping to change at page 12, line 4 ¶ | |||
| infrastructure to distribute tunnel endpoint information. The Tunnel | infrastructure to distribute tunnel endpoint information. The Tunnel | |||
| SAFI UPDATE message is used to signal tunnel attribute and endpoint | SAFI UPDATE message is used to signal tunnel attribute and endpoint | |||
| information amongst PEs. And thus tunnel endpoint discovery is | information amongst PEs. And thus tunnel endpoint discovery is | |||
| accomplished using MP-BGP updates. | accomplished using MP-BGP updates. | |||
| 8. Security Considerations | 8. Security Considerations | |||
| This extension to BGP does not change the underlying security issues. | This extension to BGP does not change the underlying security issues. | |||
| 9. Acknowledgements | 9. Acknowledgements | |||
| The authors would like to thank Jim Guichard, Francois LeFaucher and | ||||
| We would like to thank Jim Guichard, Francois LeFaucher for their | David Ward for their contribution. We would like to thank Arjun | |||
| contribution. We would like to thank Arjun Sreekantiah, Shyam Suri, | Sreekantiah, Shyam Suri, Chandrashekhar Appanna, John Scudder and | |||
| Chandrashekhar Appanna, John Scudder and Mark Townsley for their | Mark Townsley for their comments and suggestions. | |||
| comments and suggestions. | ||||
| 10. References | 10. References | |||
| [IANA-AFI] http://www.iana.org/assignments/address-family-numbers | [IANA-AFI] http://www.iana.org/assignments/address-family-numbers | |||
| [IANA-SAFI] http://www.iana.org/assignments/safi-namespace | [IANA-SAFI] http://www.iana.org/assignments/safi-namespace | |||
| [BGP-4] Rekhter, Y. and T. Li (editors), "A Border Gateway Protocol | [BGP-4] Rekhter, Y. and T. Li (editors), "A Border Gateway Protocol | |||
| 4 (BGP-4)", Internet Draft draft-ietf-idr-bgp4-26.txt, April 2005. | 4 (BGP-4)", Internet Draft draft-ietf-idr-bgp4-26.txt, April 2005. | |||
| [BGP-CAP] Chandra, R., Scudder, J., "Capabilities Advertisement with | [BGP-CAP] Chandra, R., Scudder, J., "Capabilities Advertisement with | |||
| BGP-4", draft-ietf-idr-rfc2842bis-02.txt, April 2002. | BGP-4", draft-ietf-idr-rfc2842bis-02.txt, April 2002. | |||
| [BGP-TUN] Kapoor R., Nalawade G., "BGPv4 Tunnel Encapsulation | [BGP-TUN] Kapoor R., Nalawade G., "BGPv4 Tunnel Encapsulation | |||
| Attribute", draft-nalawade-kapoor-idr-bgp-ssa-02.txt, work in | Attribute", draft-nalawade-kapoor-idr-bgp-ssa-03.txt, work in | |||
| progress. | progress. | |||
| [MULTI-BGP] Bates et al, "Multiprotocol Extensions for BGP-4", draft- | [MULTI-BGP] Bates et al, "Multiprotocol Extensions for BGP-4", draft- | |||
| ietf-idr-rfc2858bis-02.txt, work in progress. | ietf-idr-rfc2858bis-02.txt, work in progress. | |||
| [SW-MESH-FMWK] Metz, C. et al, "A Framework for Softwire Mesh | ||||
| Signaling, Routing and Encapsulation across IPv4 and IPv6 Backbone | ||||
| Networks", draft-wu-softwire-mesh-framework-00, June 2006. | ||||
| [BGP-SW-NEXT-HOP] Nalawade G. et al, "BGP Softwire Nexthop | ||||
| Attribute", draft-nalawade-sw-nhop-00.txt, June 2006. | ||||
| [BGP-SW-ENCAP] Nalawade G., Barber S., Ward D., Kapoor R., Metz C., | ||||
| "BGPv4 Softwire Mesh Encapsulation Attribute", draft-softwire-mesh- | ||||
| encap-attribute-00.txt, June 2006. | ||||
| 11. Authors' Addresses | 11. Authors' Addresses | |||
| Gargi Nalawade | Gargi Nalawade | |||
| Cisco Systems, Inc | Cisco Systems, Inc | |||
| 170 West Tasman Drive | 170 West Tasman Drive | |||
| San Jose, CA 95134 | San Jose, CA 95134 | |||
| mailto:gargi@cisco.com | mailto:gargi@cisco.com | |||
| Ruchi Kapoor | Ruchi Kapoor | |||
| Cisco Systems, Inc | Cisco Systems, Inc | |||
| skipping to change at page 12, line 21 ¶ | skipping to change at page 13, line 18 ¶ | |||
| 170 West Tasman Drive | 170 West Tasman Drive | |||
| San Jose, CA 95134 | San Jose, CA 95134 | |||
| mailto:tappan@cisco.com | mailto:tappan@cisco.com | |||
| Scott Wainner | Scott Wainner | |||
| Cisco Systems, Inc | Cisco Systems, Inc | |||
| 13600 Dulles Technology Drive | 13600 Dulles Technology Drive | |||
| Herndon, VA 20171 | Herndon, VA 20171 | |||
| mailto:swainner@cisco.com | mailto:swainner@cisco.com | |||
| Simon Barber | ||||
| Cisco Systems, Inc | ||||
| mailto:sbarber@cisco.com | ||||
| Chris Metz | ||||
| Cisco Systems, Inc | ||||
| 170 West Tasman Drive | ||||
| San Jose, CA 95134 | ||||
| mailto:chmetz@cisco.com | ||||
| 12. Intellectual Property Statement | 12. Intellectual Property Statement | |||
| The IETF takes no position regarding the validity or scope of any | The IETF takes no position regarding the validity or scope of any | |||
| Intellectual Property Rights or other rights that might be claimed to | Intellectual Property Rights or other rights that might be claimed to | |||
| pertain to the implementation or use of the technology described in | pertain to the implementation or use of the technology described in | |||
| this document or the extent to which any license under such rights | this document or the extent to which any license under such rights | |||
| might or might not be available; nor does it represent that it has | might or might not be available; nor does it represent that it has | |||
| made any independent effort to identify any such rights. Information | made any independent effort to identify any such rights. Information | |||
| on the procedures with respect to rights in RFC documents can be | on the procedures with respect to rights in RFC documents can be | |||
| found in BCP 78 and BCP 79. | found in BCP 78 and BCP 79. | |||
| skipping to change at page 13, line 7 ¶ | skipping to change at page 14, line 14 ¶ | |||
| Director. | Director. | |||
| The IETF invites any interested party to bring to its attention any | The IETF invites any interested party to bring to its attention any | |||
| copyrights, patents or patent applications, or other proprietary | copyrights, patents or patent applications, or other proprietary | |||
| rights that may cover technology that may be required to implement | rights that may cover technology that may be required to implement | |||
| this standard. Please address the information to the IETF at ietf- | this standard. Please address the information to the IETF at ietf- | |||
| ipr@ietf.org. | ipr@ietf.org. | |||
| 13. Full Copyright Statement | 13. Full Copyright Statement | |||
| Copyright (C) The Internet Society (2005). This document is subject | Copyright (C) The Internet Society (2006). All Rights Reserved. | |||
| to the rights, licenses and restrictions contained in BCP 78, and | ||||
| except as set forth therein, the authors retain all their rights." | ||||
| "This document and the information contained herein are provided on | This document is subject to the rights, licenses and restrictions | |||
| an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE | contained in BCP 78, and except as set forth therein, the authors | |||
| REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE | retain all their rights. | |||
| INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR | ||||
| IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF | This document and the information contained herein are provided on an | |||
| THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED | "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | |||
| OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET | ||||
| ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, | ||||
| INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE | ||||
| INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED | ||||
| WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | |||
| 14. Expiration Date | 14. Expiration Date | |||
| This memo is filed as <draft-nalawade-kapoor-tunnel-safi-04.txt>, and | This memo is filed as <draft-nalawade-kapoor-tunnel-safi-05.txt>, and | |||
| expires April, 2006. | expires December, 2006. | |||
| End of changes. 28 change blocks. | ||||
| 67 lines changed or deleted | 121 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||