diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc4057.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc4057.txt')
-rw-r--r-- | doc/rfc/rfc4057.txt | 955 |
1 files changed, 955 insertions, 0 deletions
diff --git a/doc/rfc/rfc4057.txt b/doc/rfc/rfc4057.txt new file mode 100644 index 0000000..d3b9fa6 --- /dev/null +++ b/doc/rfc/rfc4057.txt @@ -0,0 +1,955 @@ + + + + + + +Network Working Group J. Bound, Ed. +Request for Comments: 4057 Hewlett Packard +Category: Informational June 2005 + + + IPv6 Enterprise Network Scenarios + +Status of This Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2005). + +Abstract + + This document describes the scenarios for IPv6 deployment within + enterprise networks. It defines a small set of basic enterprise + scenarios and includes pertinent questions to allow enterprise + administrators to further refine their deployment scenarios. + Enterprise deployment requirements are discussed in terms of + coexistence with IPv4 nodes, networks and applications, and in terms + of basic network infrastructure requirements for IPv6 deployment. + The scenarios and requirements described in this document will be the + basis for further analysis to determine what coexistence techniques + and mechanisms are needed for enterprise IPv6 deployment. The + results of that analysis will be published in a separate document. + +Table of Contents + + 1. Introduction................................................... 2 + 2. Terminology.................................................... 3 + 3. Base Scenarios................................................. 4 + 3.1. Base Scenarios Defined................................... 4 + 3.2. Scenarios Network Infrastructure Components.............. 5 + 3.3. Specific Scenario Examples............................... 8 + 3.4. Applicability Statement..................................10 + 4. Network Infrastructure Component Requirements..................10 + 4.1. DNS......................................................11 + 4.2. Routing..................................................11 + 4.3. Configuration of Hosts...................................11 + 4.4. Security.................................................11 + 4.5. Applications.............................................12 + 4.6. Network Management.......................................12 + 4.7. Address Planning.........................................12 + + + +Bound Informational [Page 1] + +RFC 4057 IPv6 Enterprise Network Scenarios June 2005 + + + 4.8. Multicast................................................12 + 4.9. Multihoming..............................................12 + 5. Security Considerations........................................12 + 6. Normative References...........................................13 + Acknowledgements...................................................13 + +1. Introduction + + This document describes the scenarios for IPv6 deployment within + enterprise networks. It defines a small set of basic enterprise + scenarios and includes pertinent questions to allow enterprise + administrators to further refine their deployment scenarios. + Enterprise deployment requirements are discussed in terms of + coexistence with IPv4 nodes, networks and applications, and in terms + of basic network infrastructure requirements for IPv6 deployment. + The scenarios and requirements described in this document will be the + basis for further analysis to determine what coexistence techniques + and mechanisms are needed for enterprise IPv6 deployment. The + results of that analysis will be published in a separate document. + + The audience for this document is the enterprise network team + considering deployment of IPv6. The document will be useful for + enterprise teams that will have to determine the IPv6 transition + strategy for their enterprise. It is expected those teams include + members from management, network operations, and engineering. The + scenarios presented provide an example set of cases the enterprise + can use to build an IPv6 network scenario. + + To frame the discussion, this document will describe a set of + scenarios each with a network infrastructure. It is impossible to + define every possible enterprise scenario that will apply to IPv6 + adoption and transition. + + Each enterprise will select the transition that best supports their + business requirements. Any attempt to define a default or one-size- + fits-all transition scenario, simply will not work. This document + does not try to depict the drivers for adoption of IPv6 by an + enterprise. + + While it is difficult to quantify all the scenarios for an enterprise + network team to plan for IPv6, it is possible to depict a set of + abstract scenarios that will assist with planning. This document + presents three base scenarios to be used as models by enterprises + defining specific scenarios. + + The first scenario assumes the enterprise decides to deploy IPv6 in + conjunction with IPv4. The second scenario assumes the enterprise + decides to deploy IPv6 because of a specific set of applications that + + + +Bound Informational [Page 2] + +RFC 4057 IPv6 Enterprise Network Scenarios June 2005 + + + it wants to use over an IPv6 network. The third scenario assumes an + enterprise is building a new network or restructuring an existing + network and decides to deploy IPv6 as the predominant protocol within + the enterprise coexisting with IPv4. This document then briefly + reviews a set of network infrastructure components that must be + analyzed, which are common to most enterprises. + + This document then provides three specific scenario examples using + the network infrastructure components to depict the requirements. + These are common enterprise deployment cases to depict the challenges + for the enterprise to transition a network to IPv6. + + Next, supporting legacy functions on the network (while the + transition is in process), and the network infrastructure components + requiring analysis by the enterprise are discussed. The + interoperation with legacy functions within the enterprise will be + required for all transition except possibly by a new network that + will be IPv6 from inception. The network infrastructure components + will depict functions in their networks that require consideration + for IPv6 deployment and transition. + + Using the scenarios, network infrastructure components, and examples + in this document, an enterprise can define its specific scenario + requirements. Understanding the legacy functions and network + infrastructure components required, the enterprise can determine the + network operations required to deploy IPv6. The tools and mechanisms + to support IPv6 deployment operations will require enterprise + analysis. The analysis to determine the tools and mechanisms to + support the scenarios will be presented in subsequent document(s). + +2. Terminology + + Enterprise Network - A network that has multiple internal links, one + or more router connections to one or more + Providers, and is actively managed by a network + operations entity. + + Provider - An entity that provides services and + connectivity to the Internet or other private + external networks for the enterprise network. + + IPv6 Capable - A node or network capable of supporting both + IPv6 and IPv4. + + IPv4 only - A node or network capable of supporting only + IPv4. + + + + + +Bound Informational [Page 3] + +RFC 4057 IPv6 Enterprise Network Scenarios June 2005 + + + IPv6 only - A node or network capable of supporting only + IPv6. This does not imply an IPv6 only stack in + this document. + +3. Base Scenarios + + Three base scenarios are defined to capture the essential abstraction + set for the enterprise. Each scenario has assumptions and + requirements. This is not an exhaustive set of scenarios, but a base + set of general cases. + + Below we use the term network infrastructure to mean the software, + network operations and configuration, and methods used to operate a + network in an enterprise. + + For the base scenarios it is assumed that any IPv6 node is IPv6 + capable. + +3.1. Base Scenarios Defined + + Scenario 1: Wide-scale/total dual-stack deployment of IPv4 and IPv6 + capable hosts and network infrastructure. Enterprise + with an existing IPv4 network wants to deploy IPv6 in + conjunction with their IPv4 network. + + Assumptions: The IPv4 network infrastructure used has an equivalent + capability in IPv6. + + Requirements: Do not disrupt existing IPv4 network infrastructure + assumptions with IPv6. IPv6 should be equivalent or + "better" than the network infrastructure in IPv4. + However, it is understood that IPv6 is not required to + solve current network infrastructure problems, not + solved by IPv4. It may also not be feasible to deploy + IPv6 on all parts of the network immediately. + + Scenario 2: Sparse IPv6 dual-stack deployment in IPv4 network + infrastructure. Enterprise with an existing IPv4 + network wants to deploy a set of particular IPv6 + "applications" (application is voluntarily loosely + defined here, e.g., peer to peer). The IPv6 deployment + is limited to the minimum required to operate this set + of applications. + + Assumptions: IPv6 software/hardware components for the application + are available, and platforms for the application are + IPv6 capable. + + + + +Bound Informational [Page 4] + +RFC 4057 IPv6 Enterprise Network Scenarios June 2005 + + + Requirements: Do not disrupt IPv4 infrastructure. + + Scenario 3: IPv6-only network infrastructure with some IPv4-capable + nodes/applications needing to communicate over the IPv6 + infrastructure. Enterprise deploying a new network or + restructuring an existing network, decides IPv6 is the + basis for most network communication. Some IPv4 + capable nodes/applications will need to communicate + over that infrastructure. + + Assumptions: Required IPv6 network infrastructure is available, or + available over some defined timeline, supporting the + enterprise plan. + + Requirements: Interoperation and Coexistence with IPv4 network + infrastructure and applications are required for + communications. + +3.2. Scenarios Network Infrastructure Components + + This section defines the network infrastructure that exists for the + above enterprise scenarios. This is not an exhaustive list, but a + base list that can be expanded by the enterprise for specific + deployment scenarios. The network infrastructure components are + presented as functions that the enterprise must analyze as part of + defining their specific scenario. The analysis of these functions + will identify actions that are required to deploy IPv6. + + Network Infrastructure Component 1 + Enterprise Provider Requirements + - Is external connectivity required? + - One site vs. multiple sites and are they within different + geographies? + - Leased lines or VPNs? + - If multiple sites, how is the traffic exchanged securely? + - How many global IPv4 addresses are available to the enterprise? + - What is the IPv6 address assignment plan available from the + provider? + - What prefix delegation is required by the Enterprise? + - Will the enterprise be multihomed? + - What multihoming techniques are available from the provider? + - Will clients within the enterprise be multihomed? + - Does the provider offer any IPv6 services? + - Which site-external IPv6 routing protocols are required? + - Is there an external data center to the enterprise, such as + servers located at the Provider? + - Is IPv6 available using the same access links as IPv4, or + different ones? + + + +Bound Informational [Page 5] + +RFC 4057 IPv6 Enterprise Network Scenarios June 2005 + + + Network Infrastructure Component 2 + Enterprise Application Requirements + - List of applications in use? + - Which applications must be moved to support IPv6 first? + - Can the application be upgraded to IPv6? + - Will the application have to support both IPv4 and IPv6? + - Do the enterprise platforms support both IPv4 and IPv6? + - Do the applications have issues with NAT v4-v4 and NAT v4-v6? + - Do the applications need globally routable IP addresses? + - Do the applications care about dependency between IPv4 and IPv6 + addresses? + - Are applications run only on the internal enterprise network? + + Network Infrastructure Component 3 + Enterprise IT Department Requirements + - Who "owns"/"operates" the network: in house or outsourced? + - Is working remotely (i.e., through VPNs) supported? + - Are inter-site communications required? + - Is network mobility used or required for IPv6? + - What are the requirements of the IPv6 address plan? + - Is there a detailed asset management database, including hosts, + IP/MAC addresses, etc.? + - What is the enterprise's approach to numbering geographically + separate sites that have their own Service Providers? + - What will be the internal IPv6 address assignment procedure? + - What site internal IPv6 routing protocols are required? + - What will be the IPv6 Network Management policy/procedure? + - What will be the IPv6 QOS policy/procedure? + - What will be the IPv6 Security policy/procedure? + - What is the IPv6 training plan to educate the enterprise? + - What network operations software will be impacted by IPv6? + - DNS + - Management (SNMP & ad-hoc tools) + - Enterprise Network Servers Applications + - Mail Servers + - High Availability Software for Nodes + - Directory Services + - Are all these software functions upgradeable to IPv6? + - If not upgradeable, then what are the workarounds? + - Do any of the software functions store, display, or allow input + of IP addresses? + - Other services (e.g., NTP, etc.) + + + + + + + + + +Bound Informational [Page 6] + +RFC 4057 IPv6 Enterprise Network Scenarios June 2005 + + + - What network hardware will be impacted by IPv6? + - Routers/switches + - Printers/Faxes + - Firewalls + - Intrusion Detection + - Load balancers + - VPN Points of Entry/Exit + - Security Servers and Services + - Network Interconnect for Platforms + - Intelligent Network Interface Cards + - Network Storage Devices + - Are all these hardware functions upgradeable to IPv6? + - If not, what are the workarounds? + - Do any of the hardware functions store, display, or allow input + of IP addresses? + - Are the nodes moving within the enterprise network? + - Are the nodes moving outside and inside the enterprise + network? + + Network Infrastructure Component 4 + Enterprise Network Management System + - Performance Management required? + - Network Management applications required? + - Configuration Management required? + - Policy Management and Enforcement required? + - Security Management required? + - Management of Transition Tools and Mechanisms? + - What new considerations does IPv6 create for Network Management? + + Network Infrastructure Component 5 + Enterprise Network Interoperation and Coexistence + - What platforms are required to be IPv6 capable? + - What network ingress and egress points to the site are required + to be IPv6 capable? + - What transition mechanisms are needed to support IPv6 network + operations? + - What policy/procedures are required to support the transition to + IPv6? + - What policy/procedures are required to support interoperation + with legacy nodes and applications? + + + + + + + + + + + +Bound Informational [Page 7] + +RFC 4057 IPv6 Enterprise Network Scenarios June 2005 + + +3.3. Specific Scenario Examples + + This section presents a set of base scenario examples and is not an + exhaustive list of examples. These examples were selected to provide + further clarity for base scenarios within an enterprise of a less + abstract nature. The example networks may use the scenarios depicted + in 3.1 and the infrastructure components in 3.2, but there are no + direct implications specifically within these example networks. + Section 3.1, 3.2, and 3.3 should be used in unison for enterprise + IPv6 deployment planning and analysis. + + Example Network A: + + A distributed network across a number of geographically + separated campuses. + + - External network operation. + - External connectivity required. + - Multiple sites connected by leased lines. + - Provider independent IPv4 addresses. + - ISP does not offer IPv6 service. + - Private Leased Lines no Service Provider used. + + Applications run by the enterprise: + + - Internal Web/Mail. + - File servers. + - Java applications. + - Collaborative development tools. + - Enterprise Resource applications. + - Multimedia applications. + - Financial Enterprise applications. + - Data Warehousing applications. + + Internal network operation: + + - In house operation of the network. + - DHCP (v4) is used for all desktops; servers use static address + configuration. + - The DHCP server that updates naming records for dynamic desktops + uses dynamic DNS. + - A web based tool is used to enter name to address mappings for + statically addressed servers. + - Network management is done using SNMP. + - All routers and switches are upgradeable to IPv6. + - Existing firewalls can be upgraded to support IPv6 rules. + + + + + +Bound Informational [Page 8] + +RFC 4057 IPv6 Enterprise Network Scenarios June 2005 + + + - Load balancers do not support IPv6, upgrade path unclear. + - Peer-2-Peer Application and Security supported. + - IPv4 Private address space is used within the enterprise. + + Example Network B: + + A bank running a large network supporting online + transaction processing (OLTP) across a distributed + multi-sited network, with access to a central database + on a remote network from the OLTP network. + + - External connectivity not required. + - Multiple sites connected by VPN. + - Multiple sites connected by Native IP protocol. + - Private address space used with NAT. + - Connections to private exchanges. + + Applications in the enterprise: + + - ATM transaction application. + - ATM management application. + - Financial Software and Database. + - Part of the workforce is mobile and requires access to the + enterprise from outside networks. + + Internal Network Operation: + + - Existing firewalls can be upgraded to support IPv6 rules. + - Load balancers do not support IPv6, upgrade path unclear. + - Identifying and managing each node's IP address. + + Example Network C: + + A Security Defense, Emergency, or other Mission Critical network + operation: + + - External network required at secure specific points. + - Network is its own Internet. + - Network must be able to absorb ad-hoc creation of sub-networks. + - Entire parts of the network are completely mobile. + - All nodes on the network can be mobile (including routers). + - Network high-availability is mandatory. + - Network must be able to be managed from ad-hoc location. + - All nodes must be able to be configured from stateless mode. + + + + + + + +Bound Informational [Page 9] + +RFC 4057 IPv6 Enterprise Network Scenarios June 2005 + + + Applications run by the Enterprise: + + - Multimedia streaming of audio, video, and data for all nodes. + - Data computation and analysis on stored and created data. + - Transfer of data coordinate points to sensor devices. + - Data and Intelligence gathering applications from all nodes. + + Internal Network Operations: + + - All packets must be secured end-2-end with encryption. + - Intrusion Detection exists on all network entry points. + - Network must be able to bolt on to the Internet to share + bandwidth as required from Providers. + - VPNs can be used, but NAT can never be used. + - Nodes must be able to access IPv4 legacy applications over IPv6 + network. + +3.4. Applicability Statement + + The specific network scenarios selected are chosen to depict a base + set of examples, and to support further analysis of enterprise + networks. This is not a complete set of network scenarios. Though + Example Network C is a verifiable use case, currently the scenario + defines an early adopter of enterprise networks transitioning to IPv6 + as a predominant protocol strategy (i.e., IPv6 Routing, Applications, + Security, and Operations), viewing IPv4 as legacy operations + immediately in the transition strategy, and at this time may not be + representative of many initial enterprise IPv6 deployments. Each + enterprise planning team will need to make that determination as IPv6 + deployment evolves. + +4. Network Infrastructure Component Requirements + + The enterprise will need to determine which network infrastructure + components require enhancements or need to be added for deployment of + IPv6. This infrastructure will need to be analyzed and understood as + a critical resource to manage. The list in this section is not + exhaustive, but contains the essential network infrastructure + components for the enterprise to consider before beginning to define + more fine-tuned requirements such as QOS, PKI, or Bandwidth + requirements for IPv6. The components are only identified here and + their details will be discussed in the analysis document for + enterprise scenarios. References currently available for components + are provided. + + + + + + + +Bound Informational [Page 10] + +RFC 4057 IPv6 Enterprise Network Scenarios June 2005 + + +4.1. DNS + + DNS will now have to support both IPv4 and IPv6 DNS records and the + enterprise will need to determine how the DNS is to be managed and + accessed, and secured. The range of DNS operational issues is beyond + the scope of this document. However, DNS resolution and transport + solutions for both IP protocols are influenced by the chosen IPv6 + deployment scenario. Users need to consider all current DNS IPv4 + operations and determine if those operations are supported for IPv6 + [DNSV6]. + +4.2. Routing + + Interior and Exterior routing will be required to support both IPv4 + and IPv6 routing protocols, and the coexistence of IPv4 and IPv6 over + the enterprise network. The enterprise will need to define the IPv6 + routing topology, any ingress and egress points to provider networks, + and transition mechanisms that they wish to use for IPv6 adoption. + The enterprise will also need to determine what IPv6 transition + mechanisms are supported by their upstream providers. + +4.3. Configuration of Hosts + + IPv6 introduces the concept of stateless autoconfiguration in + addition to stateful autoconfiguration, for the configuration of + hosts within the enterprise. The enterprise will have to determine + the best method of host configuration for its network, if it will use + stateless or stateful autoconfiguration, and how autoconfiguration + will operate for DNS updates. It will also need to determine how + prefix delegation will be done from their upstream provider and how + those prefixes will be cascaded down to the enterprise IPv6 network. + The policy for DNS or choice of autoconfiguration is out of scope for + this document [CONF, DHCPF, DHCPL]. + +4.4. Security + + Current existing mechanisms used for IPv4 to provide security need to + be supported for IPv6 within the enterprise. IPv6 should create no + new security concerns for IPv4. The entire security infrastructure + currently used in the enterprise needs to be analyzed against IPv6 + deployment effect to determine what is supported in IPv6. Users + should review other current security IPv6 network infrastructure work + in the IETF and within the industry. Users will have to work with + their platform and software providers to determine which IPv6 + security network infrastructure components are supported. The + security filters and firewall requirements for IPv6 need to be + determined by the enterprise. The policy choice of users for + security is beyond the scope of this document. + + + +Bound Informational [Page 11] + +RFC 4057 IPv6 Enterprise Network Scenarios June 2005 + + +4.5. Applications + + Existing applications will need to be ported or provide proxies to + support both IPv4 and IPv6 [APPS]. + +4.6. Network Management + + The addition of IPv6 network infrastructure components will need to + be managed by the enterprise network operations center. Users will + need to work with their network management platform providers to + determine what is supported for IPv6 while planning IPv6 adoption, + and which tools are available to monitor the network. Network + management will not need to support both IPv4 and IPv6 and view nodes + as dual stacks. + +4.7. Address Planning + + The address space within the enterprise will need to be defined and + coordinated with the routing topology of the enterprise network. It + is also important to identify the pool of IPv4 address space + available to the enterprise to assist with IPv6 transition methods. + +4.8. Multicast + + Enterprises utilizing IPv4 Multicast services will need to consider + how these services may be implemented operationally in an IPv6- + enabled environment. + +4.9. Multihoming + + At this time, current IPv6 allocation policies are mandating the + allocation of IPv6 address space from the upstream provider. If an + enterprise is multihomed, the enterprise will have to determine how + it wishes to support multihoming. This also is an area of study + within the IETF and work in progress. + +5. Security Considerations + + This document lists scenarios for the deployment of IPv6 in + enterprise networks, and there are no security considerations + associated with making such a list. + + There will be security considerations for the deployment of IPv6 in + each of these scenarios, but they will be addressed in the document + that includes the analysis of each scenario. + + + + + + +Bound Informational [Page 12] + +RFC 4057 IPv6 Enterprise Network Scenarios June 2005 + + +6. Normative References + + [DNSV6] Durand, A., Ihren, J., and P. Savola, "Operational + Considerations and Issues with IPv6 DNS", Work in Progress. + + [CONF] Thomson, S. and T. Narten, "IPv6 Stateless Address + Autoconfiguration", RFC 2462, December 1998. + + [DHCPF] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., and + M. Carney, "Dynamic Host Configuration Protocol for IPv6 + (DHCPv6)", RFC 3315, July 2003 + + [DHCPL] Nikander, P., Kempf, J., and E. Nordmark, "IPv6 Neighbor + Discovery (ND) Trust Models and Threats", RFC 3756, May + 2004. + + [APPS] Shin, M-K., Hong, Y-G., Hagino, J., Savola, P., and E. + Castro, "Application Aspects of IPv6 Transition", RFC 4038, + March 2005. + +Acknowledgements + + The Authors would like to acknowledge contributions from the + following: IETF v6ops Working Group, Alan Beard, Brian Carpenter, + Alain Durand, Bob Hinden, and Pekka Savola. + + + + + + + + + + + + + + + + + + + + + + + + + + +Bound Informational [Page 13] + +RFC 4057 IPv6 Enterprise Network Scenarios June 2005 + + +Authors' Addresses + + Yanick Pouffary (Chair of Design Team) + HP Competency Center + 950, Route des Colles, BP027, + 06901 Sophia Antipolis CEDEX + FRANCE + + Phone: + 33492956285 + EMail: Yanick.pouffary@hp.com + + + Jim Bound (Editor) + Hewlett Packard + 110 Spitbrook Road + Nashua, NH 03062 + USA + + Phone: (603) 884-0062 + EMail: jim.bound@hp.com + + + Marc Blanchet + Viagenie inc. + 2875 boul. Laurier, bur. 300 + Ste-Foy, Quebec, G1V 2M2 + Canada + + EMail: Marc.Blanchet@viagenie.qc.ca + + + Tony Hain + Cisco Systems + 500 108th Ave. N.E. Suite 400 + Bellevue, WA 98004 + USA + + EMail: alh-ietf@tndh.net + + + Paul Gilbert + Cisco Systems + 1 Penn Plaza, 5th floor, + NY, NY 10119 + USA + + Phone: (212) 714-4334 + EMail: pgilbert@cisco.com + + + +Bound Informational [Page 14] + +RFC 4057 IPv6 Enterprise Network Scenarios June 2005 + + + Margaret Wasserman + ThingMagic + One Broadway + Cambridge, MA 02142 + USA + + Phone: (617) 758-4177 + EMail: margaret@thingmagic.com + + + Jason Goldschmidt + Sun Microsystems + M/S UMPK17-103 + 17 Network Circle + Menlo Park, CA 94025 + USA + + Phone: (650) 786-3502 + Fax: (650) 786-8250 + EMail: jason.goldschmidt@sun.com + + + Aldrin Isaac + Bloomberg L.P. + 499 Park Avenue + New York, NY 10022 + USA + + Phone: (212) 940-1812 + EMail: aisaac@bloomberg.com + + + Tim Chown + School of Electronics and Computer Science + University of Southampton + Southampton SO17 1BJ + United Kingdom + + EMail: tjc@ecs.soton.ac.uk + + + + + + + + + + + + +Bound Informational [Page 15] + +RFC 4057 IPv6 Enterprise Network Scenarios June 2005 + + + Jordi Palet Martinez + Consulintel + San Jose Artesano, 1 + Madrid, SPAIN + + Phone: +34 91 151 81 99 + Fax: +34 91 151 81 98 + EMail: jordi.palet@consulintel.es + + + Fred Templin + Nokia + 313 Fairchild Drive + Mountain View, CA 94043 + USA + + Phone: (650) 625-2331 + EMail: ftemplin@iprg.nokia.com + + + Roy Brabson + IBM + PO BOX 12195 + 3039 Cornwallis Road + Research Triangle Park, NC 27709 + USA + + Phone: (919) 254-7332 + EMail: rbrabson@us.ibm.com + + + + + + + + + + + + + + + + + + + + + + +Bound Informational [Page 16] + +RFC 4057 IPv6 Enterprise Network Scenarios June 2005 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2005). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at ietf- + ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + +Bound Informational [Page 17] + |