summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc6964.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc6964.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc6964.txt')
-rw-r--r--doc/rfc/rfc6964.txt1123
1 files changed, 1123 insertions, 0 deletions
diff --git a/doc/rfc/rfc6964.txt b/doc/rfc/rfc6964.txt
new file mode 100644
index 0000000..fcae608
--- /dev/null
+++ b/doc/rfc/rfc6964.txt
@@ -0,0 +1,1123 @@
+
+
+
+
+
+
+Independent Submission F. Templin
+Request for Comments: 6964 Boeing Research & Technology
+Category: Informational May 2013
+ISSN: 2070-1721
+
+
+ Operational Guidance for IPv6 Deployment in IPv4 Sites Using the
+ Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
+
+Abstract
+
+ Many end-user sites in the Internet today still have predominantly
+ IPv4 internal infrastructures. These sites range in size from small
+ home/office networks to large corporate enterprise networks, but
+ share the commonality that IPv4 provides satisfactory internal
+ routing and addressing services for most applications. As more and
+ more IPv6-only services are deployed, however, end-user devices
+ within such sites will increasingly require at least basic IPv6
+ functionality. This document therefore provides operational guidance
+ for deployment of IPv6 within predominantly IPv4 sites using the
+ Intra-Site Automatic Tunnel Addressing Protocol (ISATAP).
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This is a contribution to the RFC Series, independently of any other
+ RFC stream. The RFC Editor has chosen to publish this document at
+ its discretion and makes no statement about its value for
+ implementation or deployment. Documents approved for publication by
+ the RFC Editor are not a candidate for any level of Internet
+ Standard; see Section 2 of RFC 5741.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc6964.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Templin Informational [Page 1]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+Copyright Notice
+
+ Copyright (c) 2013 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document.
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
+ 2. Enabling IPv6 Services Using ISATAP . . . . . . . . . . . . . 4
+ 3. SLAAC Services . . . . . . . . . . . . . . . . . . . . . . . 5
+ 3.1. Advertising ISATAP Router Behavior . . . . . . . . . . . 5
+ 3.2. ISATAP Host Behavior . . . . . . . . . . . . . . . . . . 6
+ 3.3. Reference Operational Scenario - Shared Prefix Model . . 6
+ 3.4. Reference Operational Scenario - Individual Prefix Model 9
+ 3.5. SLAAC Site Administration Guidance . . . . . . . . . . . 12
+ 3.6. Loop Avoidance . . . . . . . . . . . . . . . . . . . . . 14
+ 3.7. Considerations for Compatibility of Interface Identifiers 14
+ 4. Manual Configuration . . . . . . . . . . . . . . . . . . . . 15
+ 5. Scaling Considerations . . . . . . . . . . . . . . . . . . . 15
+ 6. Site Renumbering Considerations . . . . . . . . . . . . . . . 16
+ 7. Path MTU Considerations . . . . . . . . . . . . . . . . . . . 16
+ 8. Alternative Approaches . . . . . . . . . . . . . . . . . . . 17
+ 9. Security Considerations . . . . . . . . . . . . . . . . . . . 17
+ 10. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 18
+ 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 18
+ 11.1. Normative References . . . . . . . . . . . . . . . . . . 18
+ 11.2. Informative References . . . . . . . . . . . . . . . . . 18
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Templin Informational [Page 2]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+1. Introduction
+
+ End-user sites in the Internet today internally use IPv4 routing and
+ addressing for core operating functions, such as web browsing, file
+ sharing, network printing, email, teleconferencing, and numerous
+ other site-internal networking services. Such sites typically have
+ an abundance of public and/or private IPv4 addresses for internal
+ networking and are separated from the public Internet by firewalls,
+ packet filtering gateways, proxies, address translators, and other
+ site-border demarcation devices. To date, such sites have had little
+ incentive to enable IPv6 services internally [RFC1687].
+
+ End-user sites that currently use IPv4 services internally come in
+ endless sizes and varieties. For example, a home network behind a
+ Network Address Translator (NAT) may consist of a single link
+ supporting a few laptops, printers, etc. As a larger example, a
+ small business may consist of one or a few offices with several
+ networks connecting considerably larger numbers of computers,
+ routers, handheld devices, printers, faxes, etc. Moving further up
+ the scale, large financial institutions, major retailers, large
+ corporations, etc., may consist of hundreds or thousands of branches
+ worldwide that are tied together in a complex global enterprise
+ network. Additional examples include personal-area networks, mobile
+ vehicular networks, disaster relief networks, tactical military
+ networks, various forms of Mobile Ad Hoc Networks (MANETs), etc.
+
+ With the proliferation of IPv6 services, however, existing IPv4 sites
+ will increasingly require a means for enabling IPv6 services so that
+ hosts within the site can communicate with IPv6-only correspondents.
+ Such services must be deployable with minimal configuration and in a
+ fashion that will not cause disruptions to existing IPv4 services.
+ The Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
+ [RFC5214] provides a simple-to-use service that sites can deploy in
+ the near term to meet these requirements.
+
+ ISATAP has also often been mentioned with respect to IPv6 deployment
+ in enterprise networks [RFC4057] [RFC4852] [ENT-IPv6]. ISATAP can
+ therefore be considered as an IPv6 solution alternative based on
+ candidate enterprise network characteristics.
+
+ This document provides operational guidance for using ISATAP to
+ enable IPv6 services within predominantly IPv4 sites while causing no
+ disruptions to existing IPv4 services. The terminology of ISATAP
+ (see [RFC5214], Section 3) applies also to this document.
+
+
+
+
+
+
+
+Templin Informational [Page 3]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+2. Enabling IPv6 Services Using ISATAP
+
+ Existing sites within the Internet will soon need to enable IPv6
+ services. Larger sites typically obtain provider-independent IPv6
+ prefixes from an Internet registry and advertise the prefixes into
+ the IPv6 routing system on their own behalf, i.e., they act as an
+ Internet Service Provider (ISP) unto themselves. Smaller sites that
+ wish to enable IPv6 can arrange to obtain public IPv6 prefixes from
+ an ISP, where the prefixes may be either purely native or the near-
+ native prefixes offered by the IPv6 Rapid Deployment on IPv4 (6rd)
+ [RFC5969]. Alternatively, the site can obtain prefixes independently
+ of an ISP, e.g., via a tunnel broker [RFC3053], by using one of its
+ public IPv4 addresses to form a 6to4 prefix [RFC3056], etc. In any
+ case, after obtaining IPv6 prefixes, the site can automatically
+ enable IPv6 services internally by configuring ISATAP.
+
+ The ISATAP service uses a Non-Broadcast, Multiple Access (NBMA)
+ tunnel virtual interface model [RFC2491] [RFC2529] based on IPv6-in-
+ IPv4 encapsulation [RFC4213]. The encapsulation format can further
+ use Differentiated Services (DS) [RFC2983] and Explicit Congestion
+ Notification (ECN) [RFC3168] mapping between the inner and outer IP
+ headers to ensure expected per-hop behavior within well-managed
+ sites.
+
+ The ISATAP service is based on two node types known as advertising
+ ISATAP routers and ISATAP hosts. (While out of scope for this
+ document, a third node type known as non-advertising ISATAP routers
+ is defined in [ISATAP-UPDATE].) Each node may further have multiple
+ ISATAP interfaces (i.e., one interface for each site) and may act as
+ an advertising ISATAP router on some of those interfaces and a simple
+ ISATAP host on others. Hence, the node type is considered on a per-
+ interface basis.
+
+ Advertising ISATAP routers configure their ISATAP interfaces as
+ advertising router interfaces (see [RFC4861], Section 6.2.2). ISATAP
+ hosts configure their ISATAP interfaces as simple host interfaces and
+ also coordinate their autoconfiguration operations with advertising
+ ISATAP routers. In this sense, advertising ISATAP routers are
+ "servers" while ISATAP hosts are "clients" in the service model.
+
+ Advertising ISATAP routers arrange to add their IPv4 addresses to the
+ site's Potential Router List (PRL) so that ISATAP clients can
+ discover them, as discussed in Sections 8.3.2 and 9 of [RFC5214].
+ Alternatively, site administrators could include IPv4 anycast
+ addresses in the PRL and assign each such address to multiple
+ advertising ISATAP routers. In that case, IPv4 routing within the
+ site would direct the ISATAP client to the nearest advertising ISATAP
+ router.
+
+
+
+Templin Informational [Page 4]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+ After the PRL is published, ISATAP clients within the site can
+ automatically perform unicast IPv6 Neighbor Discovery Router
+ Solicitation (RS) / Router Advertisement (RA) exchanges with
+ advertising ISATAP routers using IPv6-in-IPv4 encapsulation [RFC4861]
+ [RFC5214]. In the exchange, the IPv4 source address of the RS and
+ the destination address of the RA are an IPv4 address of the client,
+ while the IPv4 destination address of the RS and the source address
+ of the RA are an IPv4 address of a server found in the PRL.
+ Similarly, the IPv6 source address of the RS is a link-local ISATAP
+ address that embeds the client's IPv4 address, while the source
+ address of the RA is a link-local ISATAP address that embeds the
+ server's IPv4 address. (The destination addresses of the RS and RA
+ may be either the neighbor's link-local ISATAP address or a link-
+ scoped multicast address, depending on the implementation.)
+
+ Following router discovery, ISATAP clients can configure and assign
+ IPv6 addresses and/or prefixes using Stateless Address
+ AutoConfiguration (SLAAC) [RFC4862] [RFC5214]. While out of scope
+ for this document, use of the Dynamic Host Configuration Protocol for
+ IPv6 (DHCPv6) [RFC3315] is also possible, pending future updates (see
+ [ISATAP-UPDATE]).
+
+3. SLAAC Services
+
+ Predominantly IPv4 sites can enable SLAAC services for ISATAP clients
+ that need to communicate with IPv6 correspondents. SLAAC services
+ are enabled using either the "shared" or "individual" prefix model.
+ In the shared prefix model, all advertising ISATAP routers advertise
+ a common prefix (e.g., 2001:db8::/64) to ISATAP clients within the
+ site. In the individual prefix model, advertising ISATAP router
+ advertise individual prefixes (e.g., 2001:db8:0:1::/64,
+ 2001:db8:0:2::/64, 2001:db8:0:3::/64, etc.) to ISATAP clients within
+ the site. Note that combinations of the shared and individual prefix
+ models are also possible, in which some of the site's ISATAP routers
+ advertise shared prefixes and others advertise individual prefixes.
+
+ The following sections discuss operational considerations for
+ enabling ISATAP SLAAC services within predominantly IPv4 sites.
+
+3.1. Advertising ISATAP Router Behavior
+
+ Advertising ISATAP routers that support SLAAC services send RA
+ messages in response to RS messages received on an advertising ISATAP
+ interface. SLAAC services are enabled when advertising ISATAP
+ routers advertise non-link-local IPv6 prefixes in the Prefix
+ Information Options (PIOs) with the A flag set to 1 [RFC4861]. When
+ there are multiple advertising ISATAP routers, the routers can
+ advertise a shared IPv6 prefix or individual IPv6 prefixes.
+
+
+
+Templin Informational [Page 5]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+3.2. ISATAP Host Behavior
+
+ ISATAP hosts resolve the PRL and send RS messages to obtain RA
+ messages from an advertising ISATAP router. When the host receives
+ RA messages, it uses SLAAC to configure IPv6 addresses from any
+ advertised prefixes with the A flag set to 1 as specified in
+ [RFC4862] and [RFC5214], then it assigns the addresses to the ISATAP
+ interface. The host also assigns any of the advertised prefixes with
+ the L flag set to 1 to the ISATAP interface. (Note that the IPv6
+ link-local prefix fe80::/64 is always considered on-link on an ISATAP
+ interface.)
+
+3.3. Reference Operational Scenario - Shared Prefix Model
+
+ Figure 1 depicts an example ISATAP network topology for allowing
+ hosts within a predominantly IPv4 site to configure ISATAP services
+ using SLAAC with the shared prefix model. The example shows two
+ advertising ISATAP routers ('A', 'B'), two ISATAP hosts ('C', 'D'),
+ and an ordinary IPv6 host ('E') outside of the site in a typical
+ deployment configuration. In this model, routers 'A' and 'B' both
+ advertise the same (shared) IPv6 prefix 2001:db8::/64 into the IPv6
+ routing system, and also advertise the prefix in the RA messages they
+ send to ISATAP clients.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Templin Informational [Page 6]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+ .-(::::::::) 2001:db8:1::1
+ .-(::: IPv6 :::)-. +-------------+
+ (:::: Internet ::::) | IPv6 Host E |
+ `-(::::::::::::)-' +-------------+
+ `-(::::::)-'
+ ,~~~~~~~~~~~~~~~~~,
+ ,----|companion gateway|--.
+ / '~~~~~~~~~~~~~~~~~' :
+ / |.
+ ,-' `.
+ ; +------------+ +------------+ )
+ : | Router A | | Router B | /
+ : | (isatap) | | (isatap) | :
+ : | 192.0.2.1 | | 192.0.2.1 | ;
+ + +------------+ +------------+ \
+ fe80::*:192.0.2.1 fe80::*:192.0.2.1
+ | 2001:db8::/64 2001:db8::/64 |
+ | ;
+ : IPv4 Site -+-'
+ `-. (PRL: 192.0.2.1) .)
+ \ _)
+ `-----+--------)----+'----'
+ fe80::*:192.0.2.18 fe80::*:192.0.2.34
+ 2001:db8::*:192.0.2.18 2001:db8::*:192.0.2.34
+ +--------------+ +--------------+
+ | 192.0.2.18 | | 192.0.2.34 |
+ | (isatap) | | (isatap) |
+ | Host C | | Host D |
+ +--------------+ +--------------+
+
+ (* == "0000:5efe", i.e., the organizational unique code for ISATAP,
+ per Section 6.1 of [RFC5214])
+
+ Figure 1: Example ISATAP Network Topology Using Shared Prefix Model
+
+ With reference to Figure 1, advertising ISATAP routers 'A' and 'B'
+ within the IPv4 site connect to the IPv6 Internet either directly or
+ via a companion gateway. The routers advertise the shared prefix
+ 2001:db8::/64 into the IPv6 Internet routing system either as a
+ singleton /64 or as part of a shorter aggregated IPv6 prefix. For
+ the purpose of this example, we also assume that the IPv4 site is
+ configured within multiple IPv4 subnets -- each with an IPv4 prefix
+ length of /28.
+
+ Advertising ISATAP routers 'A' and 'B' both configure the IPv4
+ anycast address 192.0.2.1 on a site-interior IPv4 interface, then
+ configure an advertising ISATAP router interface for the site with
+ link-local ISATAP address fe80::5efe:192.0.2.1. The site
+
+
+
+Templin Informational [Page 7]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+ administrator then places the single IPv4 address 192.0.2.1 in the
+ site's PRL. 'A' and 'B' then both advertise the anycast address/
+ prefix into the site's IPv4 routing system so that ISATAP clients can
+ locate the router that is topologically closest. (Note: advertising
+ ISATAP routers can also use individual IPv4 unicast addresses instead
+ of, or in addition to, a shared IPv4 anycast address. In that case,
+ the PRL will contain multiple IPv4 addresses of advertising routers
+ -- some of which may be anycast and others unicast.)
+
+ ISATAP host 'C' connects to the site via an IPv4 interface with
+ address 192.0.2.18/28 and also configures an ISATAP host interface
+ with link-local ISATAP address fe80::5efe:192.0.2.18 over the IPv4
+ interface. 'C' next resolves the PRL and sends an RS message to the
+ IPv4 address 192.0.2.1, where IPv4 routing will direct it to the
+ closest of either 'A' or 'B'. Assuming 'A' is closest, 'C' receives
+ an RA from 'A' then configures a default IPv6 route with next-hop
+ address fe80::5efe:192.0.2.1 via the ISATAP interface and processes
+ the IPv6 prefix 2001:db8::/64 advertised in the PIO. If the A flag
+ is set in the PIO, 'C' uses SLAAC to automatically configure the IPv6
+ address 2001:db8::5efe:192.0.2.18 (i.e., an address with an ISATAP
+ interface identifier) and assigns it to the ISATAP interface. If the
+ L flag is set, 'C' also assigns the prefix 2001:db8::/64 to the
+ ISATAP interface, and the IPv6 address becomes a true ISATAP address.
+
+ In the same fashion, ISATAP host 'D' configures its IPv4 interface
+ with address 192.0.2.34/28 and configures its ISATAP interface with
+ link-local ISATAP address fe80::5efe:192.0.2.34. 'D' next performs
+ an RS/RA exchange that is serviced by 'B', then uses SLAAC to
+ autoconfigure the address 2001:db8::5efe:192.0.2.34 and a default
+ IPv6 route with next-hop address fe80::5efe:192.0.2.1. Finally, IPv6
+ host 'E' connects to an IPv6 network outside of the site. 'E'
+ configures its IPv6 interface in a manner specific to its attached
+ IPv6 link and autoconfigures the IPv6 address 2001:db8:1::1.
+
+ Following this autoconfiguration, when host 'C' inside the site has
+ an IPv6 packet to send to host 'E' outside the site, it prepares the
+ packet with source address 2001:db8::5efe:192.0.2.18 and destination
+ address 2001:db8:1::1. 'C' then uses IPv6-in-IPv4 encapsulation to
+ forward the packet to the IPv4 address 192.0.2.1, which will be
+ directed to 'A' based on IPv4 routing. 'A' in turn decapsulates the
+ packet and forwards it into the public IPv6 Internet, where it will
+ be conveyed to 'E' via normal IPv6 routing. In the same fashion,
+ host 'D' uses IPv6-in-IPv4 encapsulation via its default router 'B'
+ to send IPv6 packets to IPv6 Internet hosts such as 'E'.
+
+ When host 'E' outside the site sends IPv6 packets to ISATAP host 'C'
+ inside the site, the IPv6 routing system may direct the packet to
+ either 'A' or 'B'. If the site is not partitioned internally, the
+
+
+
+Templin Informational [Page 8]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+ router that receives the packet can use ISATAP to statelessly forward
+ the packet directly to 'C'. If the site may be partitioned
+ internally, however, the packet must first be forwarded to 'C's
+ serving router based on IPv6 routing information. This implies that,
+ in a partitioned site, the advertising ISATAP routers must connect
+ within a full or partial mesh of IPv6 links, and they must either run
+ a dynamic IPv6 routing protocol or configure static routes so that
+ incoming IPv6 packets can be forwarded to the correct serving router.
+
+ In this example, 'A' can configure the IPv6 route
+ 2001:db8::5efe:192.0.2.32/124 with the IPv6 address of the next hop
+ toward 'B' in the mesh network as the next hop, and 'B' can configure
+ the IPv6 route 2001:db8::5efe:192.0.2.16/124 with the IPv6 address of
+ the next hop toward 'A' as the next hop. (Notice that the /124
+ prefixes properly cover the /28 prefix of the IPv4 address that is
+ embedded within the IPv6 address.) In that case, when 'A' receives a
+ packet from the IPv6 Internet with destination address
+ 2001:db8::5efe:192.0.2.34, it first forwards the packet toward 'B'
+ over an IPv6 mesh link. 'B' in turn uses ISATAP to forward the
+ packet into the site, where IPv4 routing will direct it to 'D'. In
+ the same fashion, when 'B' receives a packet from the IPv6 Internet
+ with destination address 2001:db8::5efe:192.0.2.18, it first forwards
+ the packet toward 'A' over an IPv6 mesh link. 'A' then uses ISATAP
+ to forward the packet into the site, where IPv4 routing will direct
+ it to 'C'.
+
+ Finally, when host 'C' inside the site connects to host 'D' inside
+ the site, it has the option of using the native IPv4 service or the
+ ISATAP IPv6-in-IPv4 encapsulation service. When there is operational
+ assurance that IPv4 services between the two hosts are available, the
+ hosts may be better served to continue to use legacy IPv4 services in
+ order to avoid encapsulation overhead and to avoid communication
+ failures due to middleboxes in the path that filter protocol-41
+ packets [RFC4213]. If 'C' and 'D' could be in different IPv4 network
+ partitions, however, IPv6-in-IPv4 encapsulation should be used with
+ one or both of routers 'A' and 'B' serving as intermediate gateways.
+
+3.4. Reference Operational Scenario - Individual Prefix Model
+
+ Figure 2 depicts an example ISATAP network topology for allowing
+ hosts within a predominantly IPv4 site to configure ISATAP services
+ using SLAAC with the individual prefix model. The example shows two
+ advertising ISATAP routers ('A', 'B'), two ISATAP hosts ('C', 'D'),
+ and an ordinary IPv6 host ('E') outside of the site in a typical
+ deployment configuration. In the figure, ISATAP routers 'A' and 'B'
+ both advertise different prefixes taken from the aggregated prefix
+ 2001:db8::/48, with 'A' advertising 2001:db8:0:1::/64 and 'B'
+ advertising 2001:db8:0:2::/64.
+
+
+
+Templin Informational [Page 9]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+ .-(::::::::) 2001:db8:1::1
+ .-(::: IPv6 :::)-. +-------------+
+ (:::: Internet ::::) | IPv6 Host E |
+ `-(::::::::::::)-' +-------------+
+ `-(::::::)-'
+ ,~~~~~~~~~~~~~~~~~,
+ ,----|companion gateway|--.
+ / '~~~~~~~~~~~~~~~~~' :
+ / |.
+ ,-' `.
+ ; +------------+ +------------+ )
+ : | Router A | | Router B | /
+ : | (isatap) | | (isatap) | :
+ : | 192.0.2.17 | | 192.0.2.33 | ;
+ + +------------+ +------------+ \
+ fe80::*:192.0.2.17 fe80::*:192.0.2.33
+ 2001:db8:0:1::/64 2001:db8:0:2::/64
+ | ;
+ : IPv4 Site -+-'
+ `-. (PRL: 192.0.2.1) .)
+ \ _)
+ `-----+--------)----+'----'
+ fe80::*:192.0.2.18 fe80::*:192.0.2.34
+ 2001:db8:0:1::*:192.0.2.18 2001:db8:0:2::*:192.0.2.34
+ +--------------+ +--------------+
+ | 192.0.2.18 | | 192.0.2.34 |
+ | (isatap) | | (isatap) |
+ | Host C | | Host D |
+ +--------------+ +--------------+
+
+ (* == "0000:5efe")
+
+ Figure 2: Example ISATAP Network Topology Using
+ Individual Prefix Model
+
+ With reference to Figure 2, advertising ISATAP routers 'A' and 'B'
+ within the IPv4 site connect to the IPv6 Internet either directly or
+ via a companion gateway. Router 'A' advertises the individual prefix
+ 2001:db8:0:1::/64 into the IPv6 Internet routing system, and router
+ 'B' advertises the individual prefix 2001:db8:0:2::/64. The routers
+ could instead both advertise a shorter shared prefix such as
+ 2001:db8::/48 into the IPv6 routing system, but in that case they
+ would need to configure a mesh of IPv6 links between themselves in
+ the same fashion as described for the shared prefix model in
+ Section 3.3. For the purpose of this example, we also assume that
+ the IPv4 site is configured within multiple IPv4 subnets -- each with
+ an IPv4 prefix length of /28.
+
+
+
+
+Templin Informational [Page 10]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+ Advertising ISATAP routers 'A' and 'B' both configure individual IPv4
+ unicast addresses 192.0.2.17/28 and 192.0.2.33/28 (respectively)
+ instead of, or in addition to, a shared IPv4 anycast address. Router
+ 'A' then configures an advertising ISATAP router interface for the
+ site with link-local ISATAP address fe80::5efe:192.0.2.17, while
+ router 'B' configures an advertising ISATAP router interface for the
+ site with link-local ISATAP address fe80::5efe:192.0.2.33. The site
+ administrator then places the IPv4 addresses 192.0.2.17 and
+ 192.0.2.33 in the site's PRL. 'A' and 'B' then both advertise their
+ IPv4 addresses into the site's IPv4 routing system.
+
+ ISATAP host 'C' connects to the site via an IPv4 interface with
+ address 192.0.2.18/28 and also configures an ISATAP host interface
+ with link-local ISATAP address fe80::5efe:192.0.2.18 over the IPv4
+ interface. 'C' next resolves the PRL and sends an RS message to the
+ IPv4 address 192.0.2.17, where IPv4 routing will direct it to 'A'.
+ 'C' then receives an RA from 'A' then configures a default IPv6 route
+ with next-hop address fe80::5efe:192.0.2.17 via the ISATAP interface
+ and processes the IPv6 prefix 2001:db8:0:1:/64 advertised in the PIO.
+ If the A flag is set in the PIO, 'C' uses SLAAC to automatically
+ configure the IPv6 address 2001:db8:0:1::5efe:192.0.2.18 (i.e., an
+ address with an ISATAP interface identifier) and assigns it to the
+ ISATAP interface. If the L flag is set, 'C' also assigns the prefix
+ 2001:db8:0:1::/64 to the ISATAP interface, and the IPv6 address
+ becomes a true ISATAP address.
+
+ In the same fashion, ISATAP host 'D' configures its IPv4 interface
+ with address 192.0.2.34/28 and configures its ISATAP interface with
+ link-local ISATAP address fe80::5efe:192.0.2.34. 'D' next performs
+ an RS/RA exchange that is serviced by 'B', then uses SLAAC to
+ autoconfigure the address 2001:db8:0:2::5efe:192.0.2.34 and a default
+ IPv6 route with next-hop address fe80::5efe:192.0.2.33. Finally,
+ IPv6 host 'E' connects to an IPv6 network outside of the site. 'E'
+ configures its IPv6 interface in a manner specific to its attached
+ IPv6 link, and it autoconfigures the IPv6 address 2001:db8:1::1.
+
+ Following this autoconfiguration, when host 'C' inside the site has
+ an IPv6 packet to send to host 'E' outside the site, it prepares the
+ packet with source address 2001:db8::5efe:192.0.2.18 and destination
+ address 2001:db8:1::1. 'C' then uses IPv6-in-IPv4 encapsulation to
+ forward the packet to the IPv4 address 192.0.2.17, which will be
+ directed to 'A' based on IPv4 routing. 'A' in turn decapsulates the
+ packet and forwards it into the public IPv6 Internet, where it will
+ be conveyed to 'E' via normal IPv6 routing. In the same fashion,
+ host 'D' uses IPv6-in-IPv4 encapsulation via its default router 'B'
+ to send IPv6 packets to IPv6 Internet hosts such as 'E'.
+
+
+
+
+
+Templin Informational [Page 11]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+ When host 'E' outside the site sends IPv6 packets to ISATAP host 'C'
+ inside the site, the IPv6 routing system will direct the packet to
+ 'A' since 'A' advertises the individual prefix that matches 'C's
+ destination address. 'A' can then use ISATAP to statelessly forward
+ the packet directly to 'C'. If 'A' and 'B' both advertise the shared
+ shorter prefix 2001:db8::/48 into the IPv6 routing system, however,
+ packets coming from 'E' may be directed to either 'A' or 'B'. In
+ that case, the advertising ISATAP routers must connect within a full
+ or partial mesh of IPv6 links the same as for the shared prefix model
+ and must either run a dynamic IPv6 routing protocol or configure
+ static routes so that incoming IPv6 packets can be forwarded to the
+ correct serving router.
+
+ In this example, 'A' can configure the IPv6 route 2001:db8:0:2::/64
+ with the IPv6 address of the next hop toward 'B' in the mesh network
+ as the next hop, and 'B' can configure the IPv6 route
+ 2001:db8:0.1::/64 with the IPv6 address of the next hop toward 'A' as
+ the next hop. Then, when 'A' receives a packet from the IPv6
+ Internet with destination address 2001:db8:0:2::5efe:192.0.2.34, it
+ first forwards the packet toward 'B' over an IPv6 mesh link. 'B' in
+ turn uses ISATAP to forward the packet into the site, where IPv4
+ routing will direct it to 'D'. In the same fashion, when 'B'
+ receives a packet from the IPv6 Internet with destination address
+ 2001:db8:0:1::5efe:192.0.2.18, it first forwards the packet toward
+ 'A' over an IPv6 mesh link. 'A' then uses ISATAP to forward the
+ packet into the site, where IPv4 routing will direct it to 'C'.
+
+ Finally, when host 'C' inside the site connects to host 'D' inside
+ the site, it has the option of using the native IPv4 service or the
+ ISATAP IPv6-in-IPv4 encapsulation service. When there is operational
+ assurance that IPv4 services between the two hosts are available, the
+ hosts may be better served to continue to use legacy IPv4 services in
+ order to avoid encapsulation overhead and to avoid any IPv4
+ protocol-41 filtering middleboxes that may be in the path. If 'C'
+ and 'D' may be in different IPv4 network partitions, however,
+ IPv6-in-IPv4 encapsulation should be used with one or both of routers
+ 'A' and 'B' serving as intermediate gateways.
+
+3.5. SLAAC Site Administration Guidance
+
+ In common practice, firewalls, gateways, and packet filtering devices
+ of various forms are often deployed in order to divide the site into
+ separate partitions. In both the shared and individual prefix models
+ described above, the entire site can be represented by the aggregate
+ IPv6 prefix assigned to the site, while each site partition can be
+ represented by "sliver" IPv6 prefixes taken from the aggregate. In
+ order to provide a simple service that does not interact poorly with
+ the site topology, site administrators should therefore institute an
+
+
+
+Templin Informational [Page 12]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+ address plan to align IPv6 sliver prefixes with IPv4 site partition
+ boundaries.
+
+ For example, in the shared prefix model in Section 3.3, the aggregate
+ prefix is 2001:db8::/64, and the sliver prefixes are
+ 2001:db8::5efe:192.0.2.0/124, 2001:db8::5efe:192.0.2.16/124,
+ 2001:db8::5efe:192.0.2.32/124, etc. In the individual prefix model
+ in Section 3.4, the aggregate prefix is 2001:db8::/48, and the sliver
+ prefixes are 2001:db8:0:0::/64, 2001:db8:0:1::/64, 2001:db8:0:2::/64,
+ etc.
+
+ When individual prefixes are used, site administrators can configure
+ advertising ISATAP routers to advertise different individual prefixes
+ to different sets of clients, e.g., based on the client's IPv4 subnet
+ prefix such that the IPv6 prefixes are congruent with the IPv4
+ addressing plan. (For example, administrators can configure each
+ advertising ISATAP router to provide services only to certain sets of
+ ISATAP clients through inbound IPv6 Access Control List (ACL) entries
+ that match the IPv4 subnet prefix embedded in the ISATAP interface
+ identifier of the IPv6 source address.) When a shared prefix is
+ used, site administrators instead configure the ISATAP routers to
+ advertise the shared prefix to all clients.
+
+ Advertising ISATAP routers can advertise prefixes with the (A, L)
+ flags set to (1,0) so that ISATAP clients will use SLAAC to
+ autoconfigure IPv6 addresses with ISATAP interface identifiers from
+ the prefixes and assign them to the receiving ISATAP interface, but
+ they will not assign the prefix itself to the ISATAP interface. In
+ that case, the advertising router must assign the sliver prefix for
+ the site partition to the advertising ISATAP interface. In this way,
+ the advertising router considers the addresses covered by the sliver
+ prefix as true ISATAP addresses, but the ISATAP clients themselves do
+ not. This configuration enables a hub-and-spoke architecture, which
+ in some cases may be augmented by route optimization based on the
+ receipt of ICMPv6 Redirects.
+
+ Site administrators can implement address selection policy rules
+ [RFC6724] through explicit configurations in each ISATAP client in
+ order to give preference to IPv4 destination addresses over
+ destination addresses derived from one of the client's IPv6 sliver
+ prefixes. For example, site administrators can configure each ISATAP
+ client associated with a sliver prefix such as
+ 2001:db8::5efe:192.0.2.64/124 to add the prefix to its address
+ selection policy table with a lower precedence than the prefix
+ ::ffff:0:0/96. In this way, IPv4 addresses are preferred over IPv6
+ addresses from within the same sliver. The prefix could be added to
+ each ISATAP client either manually or through an automated service
+ such as a DHCP option [ADDR-SELECT] discovered by the client, e.g.,
+
+
+
+Templin Informational [Page 13]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+ using Stateless DHCPv6 [RFC3736]. In this way, clients will use IPv4
+ communications to reach correspondents within the same IPv4 site
+ partition and will use IPv6 communications to reach correspondents in
+ other partitions and/or outside of the site.
+
+ It should be noted that sliver prefixes longer than /64 cannot be
+ advertised for SLAAC purposes. Also, sliver prefixes longer than /64
+ do not allow for interface identifier rewriting by address
+ translators. These factors may favor the individual prefix model in
+ some deployment scenarios, while the flexibility afforded by the
+ shared prefix model may be more desirable in others. Additionally,
+ if the network is small, then the shared prefix model works well. If
+ the network is large, however, a better alternative may be to deploy
+ separate ISATAP routers in each partition and have each advertise its
+ own individual prefix.
+
+ Finally, site administrators should configure ISATAP routers to not
+ send ICMPv6 Redirect messages to inform a source client of a better
+ next hop toward the destination unless there is strong assurance that
+ the client and the next hop are within the same IPv4 site partition.
+
+3.6. Loop Avoidance
+
+ In sites that provide IPv6 services through ISATAP with SLAAC as
+ described in this section, site administrators must take operational
+ precautions to avoid routing loops. For example, each advertising
+ ISATAP router should drop any incoming IPv6 packets that would be
+ forwarded back to itself via another of the site's advertising
+ routers. Additionally, each advertising ISATAP router should drop
+ any encapsulated packets received from another advertising router
+ that would be forwarded back to that same advertising router. This
+ corresponds to the mitigation documented in Section 3.2.3 of
+ [RFC6324], but other mitigations specified in that document can also
+ be employed.
+
+ Note that IPv6 packets with link-local ISATAP addresses are exempt
+ from these checks, since they cannot be forwarded by an IPv6 router
+ and may be necessary for router-to-router coordinations.
+
+3.7. Considerations for Compatibility of Interface Identifiers
+
+ [RFC5214], Section 6.1 specifies the setting of the "u" bit in the
+ Modified EUI-64 interface identifier format used by ISATAP.
+ Implementations that comply with the specification set the "u" bit to
+ 1 when the IPv4 address is known to be globally unique; however, some
+ legacy implementations unconditionally set the "u" bit to 0.
+
+
+
+
+
+Templin Informational [Page 14]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+ Implementations interpret the ISATAP interface identifier only within
+ the link to which the corresponding ISATAP prefix is assigned; hence,
+ the value of the "u" bit is interpreted only within the context of an
+ on-link prefix and not within a global context. Implementers are
+ responsible for ensuring that their products are interoperable;
+ therefore, implementations must make provisions for ensuring "u" bit
+ compatibility for intra-link communications.
+
+ Site administrators should accordingly configure ACL entries and
+ other literal representations of ISATAP interface identifiers such
+ that both values of the "u" bit are accepted. For example, if the
+ site administrator configures an ACL entry that matches the prefix
+ "fe80::0000:5efe:192.0.2.0/124", they should also configure a
+ companion list entry that matches the prefix
+ "fe80::0200:5efe:192.0.2.0/124".
+
+4. Manual Configuration
+
+ When no autoconfiguration services are available (e.g., if there are
+ no advertising ISATAP routers present), site administrators can use
+ manual configuration to assign IPv6 addresses with ISATAP interface
+ identifiers to the ISATAP interfaces of clients. Otherwise, site
+ administrators should avoid manual configurations that would in any
+ way invalidate the assumptions of the autoconfiguration service. For
+ example, manually configured addresses may not be automatically
+ renumbered during a site-wide renumbering event, which could
+ subsequently result in communication failures.
+
+5. Scaling Considerations
+
+ Section 3 depicts ISATAP network topologies with only two advertising
+ ISATAP routers within the site. In order to support larger numbers
+ of ISATAP clients (and/or multiple site partitions), the site can
+ deploy more advertising ISATAP routers to support load balancing and
+ generally shortest-path routing.
+
+ Such an arrangement requires that the advertising ISATAP routers
+ participate in an IPv6 routing protocol instance so that IPv6
+ addresses/prefixes can be mapped to the correct ISATAP router. The
+ routing protocol instance can be configured as either a full-mesh
+ topology involving all advertising ISATAP routers, or as a partial-
+ mesh topology with each advertising ISATAP router associating with
+ one or more companion gateways. Each such companion gateway would in
+ turn participate in a full mesh between all companion gateways.
+
+
+
+
+
+
+
+Templin Informational [Page 15]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+6. Site Renumbering Considerations
+
+ Advertising ISATAP routers distribute IPv6 prefixes to ISATAP clients
+ within the site. If the site subsequently reconnects to a different
+ ISP, however, the site must renumber to use addresses derived from
+ the new IPv6 prefixes [RFC6879].
+
+ For IPv6 services provided by SLAAC, site renumbering in the event of
+ a change in an ISP-served IPv6 prefix entails a simple renumbering of
+ IPv6 addresses and/or prefixes that are assigned to the ISATAP
+ interfaces of clients within the site. In some cases, filtering
+ rules (e.g., within filtering tables at site-border firewalls) may
+ also require renumbering, but this operation can be automated and
+ limited to only one or a few administrative "touch points".
+
+ In order to renumber the ISATAP interfaces of clients within the site
+ using SLAAC, advertising ISATAP routers need only schedule the
+ services offered by the old ISP for deprecation and begin to
+ advertise the IPv6 prefixes provided by the new ISP. Lifetimes of
+ ISATAP client interface addresses will eventually expire, and the
+ host will renumber its interfaces with addresses derived from the new
+ prefixes. ISATAP clients should also eventually remove any
+ deprecated SLAAC prefixes from their address selection policy tables,
+ but this action is not time-critical.
+
+ Finally, site renumbering in the event of a change in an ISP-served
+ IPv6 prefix further entails locating and rewriting all IPv6 addresses
+ in naming services, databases, configuration files, packet filtering
+ rules, documentation, etc. If the site has published the IPv6
+ addresses of any site-internal nodes within the public Internet DNS
+ system, then the corresponding resource records will also need to be
+ updated during the renumbering operation. This can be accomplished
+ via secure dynamic updates to the DNS.
+
+7. Path MTU Considerations
+
+ IPv6-in-IPv4 encapsulation overhead effectively reduces the size of
+ IPv6 packets that can traverse the tunnel in relation to the actual
+ Maximum Transmission Unit (MTU) of the underlying IPv4 network path
+ between the tunnel ingress and egress. Two methods for accommodating
+ IPv6 path MTU discovery over IPv6-in-IPv4 tunnels (i.e., the static
+ and dynamic methods) are documented in Section 3.2 of [RFC4213].
+
+ The static method places a "safe" upper bound on the size of IPv6
+ packets permitted to enter the tunnel; however, the method can be
+ overly conservative when larger IPv4 path MTUs are available. The
+ dynamic method can accommodate much larger IPv6 packet sizes in some
+
+
+
+
+Templin Informational [Page 16]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+ cases, but can fail silently if the underlying IPv4 network path does
+ not return the necessary error messages.
+
+ This document notes that sites that include well-managed IPv4 links,
+ routers, and other network middleboxes are candidates for use of the
+ dynamic MTU determination method, which may provide for a better
+ operational IPv6 experience in the presence of IPv6-in-IPv4 tunnels.
+
+ Finally, since all ISATAP tunnels terminate at a host, transport
+ protocols that perform packet-size negotiations will see an IPv6 MTU
+ that accounts for the encapsulation headers and therefore will avoid
+ sending encapsulated packets that exceed the IPv4 path MTU.
+
+8. Alternative Approaches
+
+ [RFC4554] proposes a use of VLANs for IPv4-IPv6 coexistence in
+ enterprise networks. The ISATAP approach provides a more flexible
+ and broadly applicable alternative and with fewer administrative
+ touch points.
+
+ The tunnel broker service [RFC3053] uses point-to-point tunnels that
+ require end users to establish an explicit administrative
+ configuration of the tunnel's far end, which may be outside of the
+ administrative boundaries of the site.
+
+ 6to4 [RFC3056] and Teredo [RFC4380] provide "last resort" unmanaged
+ automatic tunneling services when no other means for IPv6
+ connectivity is available. These services are given lower priority
+ when the ISATAP managed service and/or native IPv6 services are
+ enabled.
+
+ 6rd [RFC5969] enables a stateless prefix delegation capability based
+ on IPv4-embedded IPv6 prefixes, whereas ISATAP enables a stateful
+ prefix delegation capability based on native IPv6 prefixes.
+
+9. Security Considerations
+
+ In addition to the security considerations documented in [RFC5214],
+ sites that use ISATAP should take care to ensure that no routing
+ loops are enabled [RFC6324]. Additional security concerns with IP
+ tunneling are documented in [RFC6169].
+
+
+
+
+
+
+
+
+
+
+Templin Informational [Page 17]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+10. Acknowledgments
+
+ The following are acknowledged for their insights that helped shape
+ this work: Dmitry Anipko, Fred Baker, Ron Bonica, Brian Carpenter,
+ Remi Despres, Thomas Henderson, Philip Homburg, Lee Howard, Ray
+ Hunter, Joel Jaeggli, John Mann, Gabi Nakibly, Christopher Palmer,
+ Hemant Singh, Mark Smith, Ole Troan, and Gunter Van de Velde.
+
+11. References
+
+11.1. Normative References
+
+ [RFC3315] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C.,
+ and M. Carney, "Dynamic Host Configuration Protocol for
+ IPv6 (DHCPv6)", RFC 3315, July 2003.
+
+ [RFC3736] Droms, R., "Stateless Dynamic Host Configuration Protocol
+ (DHCP) Service for IPv6", RFC 3736, April 2004.
+
+ [RFC4213] Nordmark, E. and R. Gilligan, "Basic Transition Mechanisms
+ for IPv6 Hosts and Routers", RFC 4213, October 2005.
+
+ [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman,
+ "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861,
+ September 2007.
+
+ [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless
+ Address Autoconfiguration", RFC 4862, September 2007.
+
+ [RFC5214] Templin, F., Gleeson, T., and D. Thaler, "Intra-Site
+ Automatic Tunnel Addressing Protocol (ISATAP)", RFC 5214,
+ March 2008.
+
+11.2. Informative References
+
+ [ADDR-SELECT]
+ Matsumoto, A., Fujisaki, T., and T. Chown, "Distributing
+ Address Selection Policy using DHCPv6", Work in Progress,
+ April 2013.
+
+ [ENT-IPv6] Chittimaneni, K., Chown, T., Howard, L., Kuarsingh, V.,
+ Pouffary, Y., and E. Vyncke, "Enterprise IPv6 Deployment
+ Guidelines", Work in Progress, February 2013.
+
+ [ISATAP-UPDATE]
+ Templin, F., "ISATAP Updates", Work in Progress, May 2012.
+
+
+
+
+
+Templin Informational [Page 18]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+ [RFC1687] Fleischman, E., "A Large Corporate User's View of IPng",
+ RFC 1687, August 1994.
+
+ [RFC2491] Armitage, G., Schulter, P., Jork, M., and G. Harter, "IPv6
+ over Non-Broadcast Multiple Access (NBMA) networks", RFC
+ 2491, January 1999.
+
+ [RFC2529] Carpenter, B. and C. Jung, "Transmission of IPv6 over IPv4
+ Domains without Explicit Tunnels", RFC 2529, March 1999.
+
+ [RFC2983] Black, D., "Differentiated Services and Tunnels", RFC
+ 2983, October 2000.
+
+ [RFC3053] Durand, A., Fasano, P., Guardini, I., and D. Lento, "IPv6
+ Tunnel Broker", RFC 3053, January 2001.
+
+ [RFC3056] Carpenter, B. and K. Moore, "Connection of IPv6 Domains
+ via IPv4 Clouds", RFC 3056, February 2001.
+
+ [RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition
+ of Explicit Congestion Notification (ECN) to IP", RFC
+ 3168, September 2001.
+
+ [RFC4057] Bound, J., "IPv6 Enterprise Network Scenarios", RFC 4057,
+ June 2005.
+
+ [RFC4380] Huitema, C., "Teredo: Tunneling IPv6 over UDP through
+ Network Address Translations (NATs)", RFC 4380, February
+ 2006.
+
+ [RFC4554] Chown, T., "Use of VLANs for IPv4-IPv6 Coexistence in
+ Enterprise Networks", RFC 4554, June 2006.
+
+ [RFC4852] Bound, J., Pouffary, Y., Klynsma, S., Chown, T., and D.
+ Green, "IPv6 Enterprise Network Analysis - IP Layer 3
+ Focus", RFC 4852, April 2007.
+
+ [RFC5969] Townsley, W. and O. Troan, "IPv6 Rapid Deployment on IPv4
+ Infrastructures (6rd) -- Protocol Specification", RFC
+ 5969, August 2010.
+
+ [RFC6169] Krishnan, S., Thaler, D., and J. Hoagland, "Security
+ Concerns with IP Tunneling", RFC 6169, April 2011.
+
+ [RFC6324] Nakibly, G. and F. Templin, "Routing Loop Attack Using
+ IPv6 Automatic Tunnels: Problem Statement and Proposed
+ Mitigations", RFC 6324, August 2011.
+
+
+
+
+Templin Informational [Page 19]
+
+RFC 6964 ISATAP Operational Guidance May 2013
+
+
+ [RFC6724] Thaler, D., Draves, R., Matsumoto, A., and T. Chown,
+ "Default Address Selection for Internet Protocol Version 6
+ (IPv6)", RFC 6724, September 2012.
+
+ [RFC6879] Jiang, S., Liu, B., and B. Carpenter, "IPv6 Enterprise
+ Network Renumbering Scenarios, Considerations, and
+ Methods", RFC 6879, February 2013.
+
+Author's Address
+
+ Fred L. Templin
+ Boeing Research & Technology
+ P.O. Box 3707 MC 7L-49
+ Seattle, WA 98124
+ USA
+
+ EMail: fltemplin@acm.org
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Templin Informational [Page 20]
+