summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc4057.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc4057.txt')
-rw-r--r--doc/rfc/rfc4057.txt955
1 files changed, 955 insertions, 0 deletions
diff --git a/doc/rfc/rfc4057.txt b/doc/rfc/rfc4057.txt
new file mode 100644
index 0000000..d3b9fa6
--- /dev/null
+++ b/doc/rfc/rfc4057.txt
@@ -0,0 +1,955 @@
+
+
+
+
+
+
+Network Working Group J. Bound, Ed.
+Request for Comments: 4057 Hewlett Packard
+Category: Informational June 2005
+
+
+ IPv6 Enterprise Network Scenarios
+
+Status of This Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2005).
+
+Abstract
+
+ This document describes the scenarios for IPv6 deployment within
+ enterprise networks. It defines a small set of basic enterprise
+ scenarios and includes pertinent questions to allow enterprise
+ administrators to further refine their deployment scenarios.
+ Enterprise deployment requirements are discussed in terms of
+ coexistence with IPv4 nodes, networks and applications, and in terms
+ of basic network infrastructure requirements for IPv6 deployment.
+ The scenarios and requirements described in this document will be the
+ basis for further analysis to determine what coexistence techniques
+ and mechanisms are needed for enterprise IPv6 deployment. The
+ results of that analysis will be published in a separate document.
+
+Table of Contents
+
+ 1. Introduction................................................... 2
+ 2. Terminology.................................................... 3
+ 3. Base Scenarios................................................. 4
+ 3.1. Base Scenarios Defined................................... 4
+ 3.2. Scenarios Network Infrastructure Components.............. 5
+ 3.3. Specific Scenario Examples............................... 8
+ 3.4. Applicability Statement..................................10
+ 4. Network Infrastructure Component Requirements..................10
+ 4.1. DNS......................................................11
+ 4.2. Routing..................................................11
+ 4.3. Configuration of Hosts...................................11
+ 4.4. Security.................................................11
+ 4.5. Applications.............................................12
+ 4.6. Network Management.......................................12
+ 4.7. Address Planning.........................................12
+
+
+
+Bound Informational [Page 1]
+
+RFC 4057 IPv6 Enterprise Network Scenarios June 2005
+
+
+ 4.8. Multicast................................................12
+ 4.9. Multihoming..............................................12
+ 5. Security Considerations........................................12
+ 6. Normative References...........................................13
+ Acknowledgements...................................................13
+
+1. Introduction
+
+ This document describes the scenarios for IPv6 deployment within
+ enterprise networks. It defines a small set of basic enterprise
+ scenarios and includes pertinent questions to allow enterprise
+ administrators to further refine their deployment scenarios.
+ Enterprise deployment requirements are discussed in terms of
+ coexistence with IPv4 nodes, networks and applications, and in terms
+ of basic network infrastructure requirements for IPv6 deployment.
+ The scenarios and requirements described in this document will be the
+ basis for further analysis to determine what coexistence techniques
+ and mechanisms are needed for enterprise IPv6 deployment. The
+ results of that analysis will be published in a separate document.
+
+ The audience for this document is the enterprise network team
+ considering deployment of IPv6. The document will be useful for
+ enterprise teams that will have to determine the IPv6 transition
+ strategy for their enterprise. It is expected those teams include
+ members from management, network operations, and engineering. The
+ scenarios presented provide an example set of cases the enterprise
+ can use to build an IPv6 network scenario.
+
+ To frame the discussion, this document will describe a set of
+ scenarios each with a network infrastructure. It is impossible to
+ define every possible enterprise scenario that will apply to IPv6
+ adoption and transition.
+
+ Each enterprise will select the transition that best supports their
+ business requirements. Any attempt to define a default or one-size-
+ fits-all transition scenario, simply will not work. This document
+ does not try to depict the drivers for adoption of IPv6 by an
+ enterprise.
+
+ While it is difficult to quantify all the scenarios for an enterprise
+ network team to plan for IPv6, it is possible to depict a set of
+ abstract scenarios that will assist with planning. This document
+ presents three base scenarios to be used as models by enterprises
+ defining specific scenarios.
+
+ The first scenario assumes the enterprise decides to deploy IPv6 in
+ conjunction with IPv4. The second scenario assumes the enterprise
+ decides to deploy IPv6 because of a specific set of applications that
+
+
+
+Bound Informational [Page 2]
+
+RFC 4057 IPv6 Enterprise Network Scenarios June 2005
+
+
+ it wants to use over an IPv6 network. The third scenario assumes an
+ enterprise is building a new network or restructuring an existing
+ network and decides to deploy IPv6 as the predominant protocol within
+ the enterprise coexisting with IPv4. This document then briefly
+ reviews a set of network infrastructure components that must be
+ analyzed, which are common to most enterprises.
+
+ This document then provides three specific scenario examples using
+ the network infrastructure components to depict the requirements.
+ These are common enterprise deployment cases to depict the challenges
+ for the enterprise to transition a network to IPv6.
+
+ Next, supporting legacy functions on the network (while the
+ transition is in process), and the network infrastructure components
+ requiring analysis by the enterprise are discussed. The
+ interoperation with legacy functions within the enterprise will be
+ required for all transition except possibly by a new network that
+ will be IPv6 from inception. The network infrastructure components
+ will depict functions in their networks that require consideration
+ for IPv6 deployment and transition.
+
+ Using the scenarios, network infrastructure components, and examples
+ in this document, an enterprise can define its specific scenario
+ requirements. Understanding the legacy functions and network
+ infrastructure components required, the enterprise can determine the
+ network operations required to deploy IPv6. The tools and mechanisms
+ to support IPv6 deployment operations will require enterprise
+ analysis. The analysis to determine the tools and mechanisms to
+ support the scenarios will be presented in subsequent document(s).
+
+2. Terminology
+
+ Enterprise Network - A network that has multiple internal links, one
+ or more router connections to one or more
+ Providers, and is actively managed by a network
+ operations entity.
+
+ Provider - An entity that provides services and
+ connectivity to the Internet or other private
+ external networks for the enterprise network.
+
+ IPv6 Capable - A node or network capable of supporting both
+ IPv6 and IPv4.
+
+ IPv4 only - A node or network capable of supporting only
+ IPv4.
+
+
+
+
+
+Bound Informational [Page 3]
+
+RFC 4057 IPv6 Enterprise Network Scenarios June 2005
+
+
+ IPv6 only - A node or network capable of supporting only
+ IPv6. This does not imply an IPv6 only stack in
+ this document.
+
+3. Base Scenarios
+
+ Three base scenarios are defined to capture the essential abstraction
+ set for the enterprise. Each scenario has assumptions and
+ requirements. This is not an exhaustive set of scenarios, but a base
+ set of general cases.
+
+ Below we use the term network infrastructure to mean the software,
+ network operations and configuration, and methods used to operate a
+ network in an enterprise.
+
+ For the base scenarios it is assumed that any IPv6 node is IPv6
+ capable.
+
+3.1. Base Scenarios Defined
+
+ Scenario 1: Wide-scale/total dual-stack deployment of IPv4 and IPv6
+ capable hosts and network infrastructure. Enterprise
+ with an existing IPv4 network wants to deploy IPv6 in
+ conjunction with their IPv4 network.
+
+ Assumptions: The IPv4 network infrastructure used has an equivalent
+ capability in IPv6.
+
+ Requirements: Do not disrupt existing IPv4 network infrastructure
+ assumptions with IPv6. IPv6 should be equivalent or
+ "better" than the network infrastructure in IPv4.
+ However, it is understood that IPv6 is not required to
+ solve current network infrastructure problems, not
+ solved by IPv4. It may also not be feasible to deploy
+ IPv6 on all parts of the network immediately.
+
+ Scenario 2: Sparse IPv6 dual-stack deployment in IPv4 network
+ infrastructure. Enterprise with an existing IPv4
+ network wants to deploy a set of particular IPv6
+ "applications" (application is voluntarily loosely
+ defined here, e.g., peer to peer). The IPv6 deployment
+ is limited to the minimum required to operate this set
+ of applications.
+
+ Assumptions: IPv6 software/hardware components for the application
+ are available, and platforms for the application are
+ IPv6 capable.
+
+
+
+
+Bound Informational [Page 4]
+
+RFC 4057 IPv6 Enterprise Network Scenarios June 2005
+
+
+ Requirements: Do not disrupt IPv4 infrastructure.
+
+ Scenario 3: IPv6-only network infrastructure with some IPv4-capable
+ nodes/applications needing to communicate over the IPv6
+ infrastructure. Enterprise deploying a new network or
+ restructuring an existing network, decides IPv6 is the
+ basis for most network communication. Some IPv4
+ capable nodes/applications will need to communicate
+ over that infrastructure.
+
+ Assumptions: Required IPv6 network infrastructure is available, or
+ available over some defined timeline, supporting the
+ enterprise plan.
+
+ Requirements: Interoperation and Coexistence with IPv4 network
+ infrastructure and applications are required for
+ communications.
+
+3.2. Scenarios Network Infrastructure Components
+
+ This section defines the network infrastructure that exists for the
+ above enterprise scenarios. This is not an exhaustive list, but a
+ base list that can be expanded by the enterprise for specific
+ deployment scenarios. The network infrastructure components are
+ presented as functions that the enterprise must analyze as part of
+ defining their specific scenario. The analysis of these functions
+ will identify actions that are required to deploy IPv6.
+
+ Network Infrastructure Component 1
+ Enterprise Provider Requirements
+ - Is external connectivity required?
+ - One site vs. multiple sites and are they within different
+ geographies?
+ - Leased lines or VPNs?
+ - If multiple sites, how is the traffic exchanged securely?
+ - How many global IPv4 addresses are available to the enterprise?
+ - What is the IPv6 address assignment plan available from the
+ provider?
+ - What prefix delegation is required by the Enterprise?
+ - Will the enterprise be multihomed?
+ - What multihoming techniques are available from the provider?
+ - Will clients within the enterprise be multihomed?
+ - Does the provider offer any IPv6 services?
+ - Which site-external IPv6 routing protocols are required?
+ - Is there an external data center to the enterprise, such as
+ servers located at the Provider?
+ - Is IPv6 available using the same access links as IPv4, or
+ different ones?
+
+
+
+Bound Informational [Page 5]
+
+RFC 4057 IPv6 Enterprise Network Scenarios June 2005
+
+
+ Network Infrastructure Component 2
+ Enterprise Application Requirements
+ - List of applications in use?
+ - Which applications must be moved to support IPv6 first?
+ - Can the application be upgraded to IPv6?
+ - Will the application have to support both IPv4 and IPv6?
+ - Do the enterprise platforms support both IPv4 and IPv6?
+ - Do the applications have issues with NAT v4-v4 and NAT v4-v6?
+ - Do the applications need globally routable IP addresses?
+ - Do the applications care about dependency between IPv4 and IPv6
+ addresses?
+ - Are applications run only on the internal enterprise network?
+
+ Network Infrastructure Component 3
+ Enterprise IT Department Requirements
+ - Who "owns"/"operates" the network: in house or outsourced?
+ - Is working remotely (i.e., through VPNs) supported?
+ - Are inter-site communications required?
+ - Is network mobility used or required for IPv6?
+ - What are the requirements of the IPv6 address plan?
+ - Is there a detailed asset management database, including hosts,
+ IP/MAC addresses, etc.?
+ - What is the enterprise's approach to numbering geographically
+ separate sites that have their own Service Providers?
+ - What will be the internal IPv6 address assignment procedure?
+ - What site internal IPv6 routing protocols are required?
+ - What will be the IPv6 Network Management policy/procedure?
+ - What will be the IPv6 QOS policy/procedure?
+ - What will be the IPv6 Security policy/procedure?
+ - What is the IPv6 training plan to educate the enterprise?
+ - What network operations software will be impacted by IPv6?
+ - DNS
+ - Management (SNMP & ad-hoc tools)
+ - Enterprise Network Servers Applications
+ - Mail Servers
+ - High Availability Software for Nodes
+ - Directory Services
+ - Are all these software functions upgradeable to IPv6?
+ - If not upgradeable, then what are the workarounds?
+ - Do any of the software functions store, display, or allow input
+ of IP addresses?
+ - Other services (e.g., NTP, etc.)
+
+
+
+
+
+
+
+
+
+Bound Informational [Page 6]
+
+RFC 4057 IPv6 Enterprise Network Scenarios June 2005
+
+
+ - What network hardware will be impacted by IPv6?
+ - Routers/switches
+ - Printers/Faxes
+ - Firewalls
+ - Intrusion Detection
+ - Load balancers
+ - VPN Points of Entry/Exit
+ - Security Servers and Services
+ - Network Interconnect for Platforms
+ - Intelligent Network Interface Cards
+ - Network Storage Devices
+ - Are all these hardware functions upgradeable to IPv6?
+ - If not, what are the workarounds?
+ - Do any of the hardware functions store, display, or allow input
+ of IP addresses?
+ - Are the nodes moving within the enterprise network?
+ - Are the nodes moving outside and inside the enterprise
+ network?
+
+ Network Infrastructure Component 4
+ Enterprise Network Management System
+ - Performance Management required?
+ - Network Management applications required?
+ - Configuration Management required?
+ - Policy Management and Enforcement required?
+ - Security Management required?
+ - Management of Transition Tools and Mechanisms?
+ - What new considerations does IPv6 create for Network Management?
+
+ Network Infrastructure Component 5
+ Enterprise Network Interoperation and Coexistence
+ - What platforms are required to be IPv6 capable?
+ - What network ingress and egress points to the site are required
+ to be IPv6 capable?
+ - What transition mechanisms are needed to support IPv6 network
+ operations?
+ - What policy/procedures are required to support the transition to
+ IPv6?
+ - What policy/procedures are required to support interoperation
+ with legacy nodes and applications?
+
+
+
+
+
+
+
+
+
+
+
+Bound Informational [Page 7]
+
+RFC 4057 IPv6 Enterprise Network Scenarios June 2005
+
+
+3.3. Specific Scenario Examples
+
+ This section presents a set of base scenario examples and is not an
+ exhaustive list of examples. These examples were selected to provide
+ further clarity for base scenarios within an enterprise of a less
+ abstract nature. The example networks may use the scenarios depicted
+ in 3.1 and the infrastructure components in 3.2, but there are no
+ direct implications specifically within these example networks.
+ Section 3.1, 3.2, and 3.3 should be used in unison for enterprise
+ IPv6 deployment planning and analysis.
+
+ Example Network A:
+
+ A distributed network across a number of geographically
+ separated campuses.
+
+ - External network operation.
+ - External connectivity required.
+ - Multiple sites connected by leased lines.
+ - Provider independent IPv4 addresses.
+ - ISP does not offer IPv6 service.
+ - Private Leased Lines no Service Provider used.
+
+ Applications run by the enterprise:
+
+ - Internal Web/Mail.
+ - File servers.
+ - Java applications.
+ - Collaborative development tools.
+ - Enterprise Resource applications.
+ - Multimedia applications.
+ - Financial Enterprise applications.
+ - Data Warehousing applications.
+
+ Internal network operation:
+
+ - In house operation of the network.
+ - DHCP (v4) is used for all desktops; servers use static address
+ configuration.
+ - The DHCP server that updates naming records for dynamic desktops
+ uses dynamic DNS.
+ - A web based tool is used to enter name to address mappings for
+ statically addressed servers.
+ - Network management is done using SNMP.
+ - All routers and switches are upgradeable to IPv6.
+ - Existing firewalls can be upgraded to support IPv6 rules.
+
+
+
+
+
+Bound Informational [Page 8]
+
+RFC 4057 IPv6 Enterprise Network Scenarios June 2005
+
+
+ - Load balancers do not support IPv6, upgrade path unclear.
+ - Peer-2-Peer Application and Security supported.
+ - IPv4 Private address space is used within the enterprise.
+
+ Example Network B:
+
+ A bank running a large network supporting online
+ transaction processing (OLTP) across a distributed
+ multi-sited network, with access to a central database
+ on a remote network from the OLTP network.
+
+ - External connectivity not required.
+ - Multiple sites connected by VPN.
+ - Multiple sites connected by Native IP protocol.
+ - Private address space used with NAT.
+ - Connections to private exchanges.
+
+ Applications in the enterprise:
+
+ - ATM transaction application.
+ - ATM management application.
+ - Financial Software and Database.
+ - Part of the workforce is mobile and requires access to the
+ enterprise from outside networks.
+
+ Internal Network Operation:
+
+ - Existing firewalls can be upgraded to support IPv6 rules.
+ - Load balancers do not support IPv6, upgrade path unclear.
+ - Identifying and managing each node's IP address.
+
+ Example Network C:
+
+ A Security Defense, Emergency, or other Mission Critical network
+ operation:
+
+ - External network required at secure specific points.
+ - Network is its own Internet.
+ - Network must be able to absorb ad-hoc creation of sub-networks.
+ - Entire parts of the network are completely mobile.
+ - All nodes on the network can be mobile (including routers).
+ - Network high-availability is mandatory.
+ - Network must be able to be managed from ad-hoc location.
+ - All nodes must be able to be configured from stateless mode.
+
+
+
+
+
+
+
+Bound Informational [Page 9]
+
+RFC 4057 IPv6 Enterprise Network Scenarios June 2005
+
+
+ Applications run by the Enterprise:
+
+ - Multimedia streaming of audio, video, and data for all nodes.
+ - Data computation and analysis on stored and created data.
+ - Transfer of data coordinate points to sensor devices.
+ - Data and Intelligence gathering applications from all nodes.
+
+ Internal Network Operations:
+
+ - All packets must be secured end-2-end with encryption.
+ - Intrusion Detection exists on all network entry points.
+ - Network must be able to bolt on to the Internet to share
+ bandwidth as required from Providers.
+ - VPNs can be used, but NAT can never be used.
+ - Nodes must be able to access IPv4 legacy applications over IPv6
+ network.
+
+3.4. Applicability Statement
+
+ The specific network scenarios selected are chosen to depict a base
+ set of examples, and to support further analysis of enterprise
+ networks. This is not a complete set of network scenarios. Though
+ Example Network C is a verifiable use case, currently the scenario
+ defines an early adopter of enterprise networks transitioning to IPv6
+ as a predominant protocol strategy (i.e., IPv6 Routing, Applications,
+ Security, and Operations), viewing IPv4 as legacy operations
+ immediately in the transition strategy, and at this time may not be
+ representative of many initial enterprise IPv6 deployments. Each
+ enterprise planning team will need to make that determination as IPv6
+ deployment evolves.
+
+4. Network Infrastructure Component Requirements
+
+ The enterprise will need to determine which network infrastructure
+ components require enhancements or need to be added for deployment of
+ IPv6. This infrastructure will need to be analyzed and understood as
+ a critical resource to manage. The list in this section is not
+ exhaustive, but contains the essential network infrastructure
+ components for the enterprise to consider before beginning to define
+ more fine-tuned requirements such as QOS, PKI, or Bandwidth
+ requirements for IPv6. The components are only identified here and
+ their details will be discussed in the analysis document for
+ enterprise scenarios. References currently available for components
+ are provided.
+
+
+
+
+
+
+
+Bound Informational [Page 10]
+
+RFC 4057 IPv6 Enterprise Network Scenarios June 2005
+
+
+4.1. DNS
+
+ DNS will now have to support both IPv4 and IPv6 DNS records and the
+ enterprise will need to determine how the DNS is to be managed and
+ accessed, and secured. The range of DNS operational issues is beyond
+ the scope of this document. However, DNS resolution and transport
+ solutions for both IP protocols are influenced by the chosen IPv6
+ deployment scenario. Users need to consider all current DNS IPv4
+ operations and determine if those operations are supported for IPv6
+ [DNSV6].
+
+4.2. Routing
+
+ Interior and Exterior routing will be required to support both IPv4
+ and IPv6 routing protocols, and the coexistence of IPv4 and IPv6 over
+ the enterprise network. The enterprise will need to define the IPv6
+ routing topology, any ingress and egress points to provider networks,
+ and transition mechanisms that they wish to use for IPv6 adoption.
+ The enterprise will also need to determine what IPv6 transition
+ mechanisms are supported by their upstream providers.
+
+4.3. Configuration of Hosts
+
+ IPv6 introduces the concept of stateless autoconfiguration in
+ addition to stateful autoconfiguration, for the configuration of
+ hosts within the enterprise. The enterprise will have to determine
+ the best method of host configuration for its network, if it will use
+ stateless or stateful autoconfiguration, and how autoconfiguration
+ will operate for DNS updates. It will also need to determine how
+ prefix delegation will be done from their upstream provider and how
+ those prefixes will be cascaded down to the enterprise IPv6 network.
+ The policy for DNS or choice of autoconfiguration is out of scope for
+ this document [CONF, DHCPF, DHCPL].
+
+4.4. Security
+
+ Current existing mechanisms used for IPv4 to provide security need to
+ be supported for IPv6 within the enterprise. IPv6 should create no
+ new security concerns for IPv4. The entire security infrastructure
+ currently used in the enterprise needs to be analyzed against IPv6
+ deployment effect to determine what is supported in IPv6. Users
+ should review other current security IPv6 network infrastructure work
+ in the IETF and within the industry. Users will have to work with
+ their platform and software providers to determine which IPv6
+ security network infrastructure components are supported. The
+ security filters and firewall requirements for IPv6 need to be
+ determined by the enterprise. The policy choice of users for
+ security is beyond the scope of this document.
+
+
+
+Bound Informational [Page 11]
+
+RFC 4057 IPv6 Enterprise Network Scenarios June 2005
+
+
+4.5. Applications
+
+ Existing applications will need to be ported or provide proxies to
+ support both IPv4 and IPv6 [APPS].
+
+4.6. Network Management
+
+ The addition of IPv6 network infrastructure components will need to
+ be managed by the enterprise network operations center. Users will
+ need to work with their network management platform providers to
+ determine what is supported for IPv6 while planning IPv6 adoption,
+ and which tools are available to monitor the network. Network
+ management will not need to support both IPv4 and IPv6 and view nodes
+ as dual stacks.
+
+4.7. Address Planning
+
+ The address space within the enterprise will need to be defined and
+ coordinated with the routing topology of the enterprise network. It
+ is also important to identify the pool of IPv4 address space
+ available to the enterprise to assist with IPv6 transition methods.
+
+4.8. Multicast
+
+ Enterprises utilizing IPv4 Multicast services will need to consider
+ how these services may be implemented operationally in an IPv6-
+ enabled environment.
+
+4.9. Multihoming
+
+ At this time, current IPv6 allocation policies are mandating the
+ allocation of IPv6 address space from the upstream provider. If an
+ enterprise is multihomed, the enterprise will have to determine how
+ it wishes to support multihoming. This also is an area of study
+ within the IETF and work in progress.
+
+5. Security Considerations
+
+ This document lists scenarios for the deployment of IPv6 in
+ enterprise networks, and there are no security considerations
+ associated with making such a list.
+
+ There will be security considerations for the deployment of IPv6 in
+ each of these scenarios, but they will be addressed in the document
+ that includes the analysis of each scenario.
+
+
+
+
+
+
+Bound Informational [Page 12]
+
+RFC 4057 IPv6 Enterprise Network Scenarios June 2005
+
+
+6. Normative References
+
+ [DNSV6] Durand, A., Ihren, J., and P. Savola, "Operational
+ Considerations and Issues with IPv6 DNS", Work in Progress.
+
+ [CONF] Thomson, S. and T. Narten, "IPv6 Stateless Address
+ Autoconfiguration", RFC 2462, December 1998.
+
+ [DHCPF] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., and
+ M. Carney, "Dynamic Host Configuration Protocol for IPv6
+ (DHCPv6)", RFC 3315, July 2003
+
+ [DHCPL] Nikander, P., Kempf, J., and E. Nordmark, "IPv6 Neighbor
+ Discovery (ND) Trust Models and Threats", RFC 3756, May
+ 2004.
+
+ [APPS] Shin, M-K., Hong, Y-G., Hagino, J., Savola, P., and E.
+ Castro, "Application Aspects of IPv6 Transition", RFC 4038,
+ March 2005.
+
+Acknowledgements
+
+ The Authors would like to acknowledge contributions from the
+ following: IETF v6ops Working Group, Alan Beard, Brian Carpenter,
+ Alain Durand, Bob Hinden, and Pekka Savola.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bound Informational [Page 13]
+
+RFC 4057 IPv6 Enterprise Network Scenarios June 2005
+
+
+Authors' Addresses
+
+ Yanick Pouffary (Chair of Design Team)
+ HP Competency Center
+ 950, Route des Colles, BP027,
+ 06901 Sophia Antipolis CEDEX
+ FRANCE
+
+ Phone: + 33492956285
+ EMail: Yanick.pouffary@hp.com
+
+
+ Jim Bound (Editor)
+ Hewlett Packard
+ 110 Spitbrook Road
+ Nashua, NH 03062
+ USA
+
+ Phone: (603) 884-0062
+ EMail: jim.bound@hp.com
+
+
+ Marc Blanchet
+ Viagenie inc.
+ 2875 boul. Laurier, bur. 300
+ Ste-Foy, Quebec, G1V 2M2
+ Canada
+
+ EMail: Marc.Blanchet@viagenie.qc.ca
+
+
+ Tony Hain
+ Cisco Systems
+ 500 108th Ave. N.E. Suite 400
+ Bellevue, WA 98004
+ USA
+
+ EMail: alh-ietf@tndh.net
+
+
+ Paul Gilbert
+ Cisco Systems
+ 1 Penn Plaza, 5th floor,
+ NY, NY 10119
+ USA
+
+ Phone: (212) 714-4334
+ EMail: pgilbert@cisco.com
+
+
+
+Bound Informational [Page 14]
+
+RFC 4057 IPv6 Enterprise Network Scenarios June 2005
+
+
+ Margaret Wasserman
+ ThingMagic
+ One Broadway
+ Cambridge, MA 02142
+ USA
+
+ Phone: (617) 758-4177
+ EMail: margaret@thingmagic.com
+
+
+ Jason Goldschmidt
+ Sun Microsystems
+ M/S UMPK17-103
+ 17 Network Circle
+ Menlo Park, CA 94025
+ USA
+
+ Phone: (650) 786-3502
+ Fax: (650) 786-8250
+ EMail: jason.goldschmidt@sun.com
+
+
+ Aldrin Isaac
+ Bloomberg L.P.
+ 499 Park Avenue
+ New York, NY 10022
+ USA
+
+ Phone: (212) 940-1812
+ EMail: aisaac@bloomberg.com
+
+
+ Tim Chown
+ School of Electronics and Computer Science
+ University of Southampton
+ Southampton SO17 1BJ
+ United Kingdom
+
+ EMail: tjc@ecs.soton.ac.uk
+
+
+
+
+
+
+
+
+
+
+
+
+Bound Informational [Page 15]
+
+RFC 4057 IPv6 Enterprise Network Scenarios June 2005
+
+
+ Jordi Palet Martinez
+ Consulintel
+ San Jose Artesano, 1
+ Madrid, SPAIN
+
+ Phone: +34 91 151 81 99
+ Fax: +34 91 151 81 98
+ EMail: jordi.palet@consulintel.es
+
+
+ Fred Templin
+ Nokia
+ 313 Fairchild Drive
+ Mountain View, CA 94043
+ USA
+
+ Phone: (650) 625-2331
+ EMail: ftemplin@iprg.nokia.com
+
+
+ Roy Brabson
+ IBM
+ PO BOX 12195
+ 3039 Cornwallis Road
+ Research Triangle Park, NC 27709
+ USA
+
+ Phone: (919) 254-7332
+ EMail: rbrabson@us.ibm.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bound Informational [Page 16]
+
+RFC 4057 IPv6 Enterprise Network Scenarios June 2005
+
+
+Full Copyright Statement
+
+ Copyright (C) The Internet Society (2005).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
+ ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
+ INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
+ INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at ietf-
+ ipr@ietf.org.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+Bound Informational [Page 17]
+