summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc5214.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc5214.txt')
-rw-r--r--doc/rfc/rfc5214.txt843
1 files changed, 843 insertions, 0 deletions
diff --git a/doc/rfc/rfc5214.txt b/doc/rfc/rfc5214.txt
new file mode 100644
index 0000000..681eca1
--- /dev/null
+++ b/doc/rfc/rfc5214.txt
@@ -0,0 +1,843 @@
+
+
+
+
+
+
+Network Working Group F. Templin
+Request for Comments: 5214 Boeing Phantom Works
+Obsoletes: 4214 T. Gleeson
+Category: Informational Cisco Systems K.K.
+ D. Thaler
+ Microsoft Corporation
+ March 2008
+
+
+ Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
+
+Status of This Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+IESG Note
+
+ The IESG thinks that this work is related to IETF work done in WG
+ softwires, but this does not prevent publishing.
+
+Abstract
+
+ The Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) connects
+ dual-stack (IPv6/IPv4) nodes over IPv4 networks. ISATAP views the
+ IPv4 network as a link layer for IPv6 and supports an automatic
+ tunneling abstraction similar to the Non-Broadcast Multiple Access
+ (NBMA) model.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Templin, et al. Informational [Page 1]
+
+RFC 5214 ISATAP March 2008
+
+
+Table of Contents
+
+ 1. Introduction ....................................................2
+ 2. Requirements ....................................................3
+ 3. Terminology .....................................................3
+ 4. Domain of Applicability .........................................4
+ 5. Node Requirements ...............................................4
+ 6. Addressing Requirements .........................................4
+ 6.1. ISATAP Interface Identifiers ...............................4
+ 6.2. ISATAP Interface Address Configuration .....................5
+ 6.3. Multicast/Anycast ..........................................5
+ 7. Automatic Tunneling .............................................5
+ 7.1. Encapsulation ..............................................5
+ 7.2. Handling ICMPv4 Errors .....................................5
+ 7.3. Decapsulation ..............................................6
+ 7.4. Link-Local Addresses .......................................6
+ 7.5. Neighbor Discovery over Tunnels ............................6
+ 8. Neighbor Discovery for ISATAP Interfaces ........................6
+ 8.1. Conceptual Model of a Host .................................7
+ 8.2. Router and Prefix Discovery - Router Specification .........7
+ 8.3. Router and Prefix Discovery - Host Specification ...........7
+ 8.3.1. Host Variables ......................................7
+ 8.3.2. Potential Router List Initialization ................7
+ 8.3.3. Processing Received Router Advertisements ...........8
+ 8.3.4. Sending Router Solicitations ........................8
+ 8.4. Neighbor Unreachability Detection ..........................9
+ 9. Site Administration Considerations ..............................9
+ 10. Security Considerations ........................................9
+ 11. IANA Considerations ...........................................10
+ 12. Acknowledgments ...............................................10
+ 13. References ....................................................11
+ 13.1. Normative References .....................................11
+ 13.2. Informative References ...................................12
+ Appendix A. Modified EUI-64 Addresses in the IANA Ethernet
+ Address Block ...........................................13
+
+1. Introduction
+
+ This document specifies a simple mechanism called the Intra-Site
+ Automatic Tunnel Addressing Protocol (ISATAP) that connects
+ dual-stack (IPv6/IPv4) nodes over IPv4 networks. Dual-stack nodes
+ use ISATAP to automatically tunnel IPv6 packets in IPv4, i.e., ISATAP
+ views the IPv4 network as a link layer for IPv6.
+
+ ISATAP enables automatic tunneling whether global or private IPv4
+ addresses are used, and it presents a Non-Broadcast Multiple Access
+ (NBMA) abstraction similar to [RFC2491],[RFC2492],[RFC2529], and
+ [RFC3056].
+
+
+
+Templin, et al. Informational [Page 2]
+
+RFC 5214 ISATAP March 2008
+
+
+ The main objectives of this document are to: 1) describe the domain
+ of applicability, 2) specify addressing requirements, 3) specify
+ automatic tunneling using ISATAP, 4) specify the operation of IPv6
+ Neighbor Discovery over ISATAP interfaces, and 5) discuss Site
+ Administration, Security, and IANA considerations.
+
+2. Requirements
+
+ The keywords MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD,
+ SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL, when they appear in this
+ document, are to be interpreted as described in [RFC2119].
+
+ This document also uses internal conceptual variables to describe
+ protocol behavior and external variables that an implementation must
+ allow system administrators to change. The specific variable names,
+ how their values change, and how their settings influence protocol
+ behavior are provided in order to demonstrate protocol behavior. An
+ implementation is not required to have them in the exact form
+ described here, as long as its external behavior is consistent with
+ that described in this document.
+
+3. Terminology
+
+ The terminology of [RFC2460] and [RFC4861] applies to this document.
+ The following additional terms are defined:
+
+ ISATAP node/host/router:
+ A dual-stack (IPv6/IPv4) node/host/router that implements the
+ specifications in this document.
+
+ ISATAP interface:
+ An ISATAP node's Non-Broadcast Multi-Access (NBMA) IPv6 interface,
+ used for automatic tunneling of IPv6 packets in IPv4.
+
+ ISATAP interface identifier:
+ An IPv6 interface identifier with an embedded IPv4 address
+ constructed as specified in Section 6.1.
+
+ ISATAP address:
+ An IPv6 unicast address that matches an on-link prefix on an
+ ISATAP interface of the node, and that includes an ISATAP
+ interface identifier.
+
+ locator:
+ An IPv4 address-to-interface mapping; i.e., a node's IPv4 address
+ and its associated interface.
+
+
+
+
+
+Templin, et al. Informational [Page 3]
+
+RFC 5214 ISATAP March 2008
+
+
+ locator set:
+ A set of locators associated with an ISATAP interface. Each
+ locator in the set belongs to the same site.
+
+4. Domain of Applicability
+
+ The domain of applicability for this technical specification is
+ automatic tunneling of IPv6 packets in IPv4 for ISATAP nodes within
+ sites that observe the security considerations found in this
+ document, including host-to-router, router-to-host, and host-to-host
+ automatic tunneling in certain enterprise networks and 3GPP/3GPP2
+ wireless operator networks. (Other scenarios with a sufficient trust
+ basis ensured by the mechanisms specified in this document also fall
+ within this domain of applicability.)
+
+ Extensions to the above domain of applicability (e.g., by combining
+ the mechanisms in this document with those in other technical
+ specifications) are out of the scope of this document.
+
+5. Node Requirements
+
+ ISATAP nodes observe the common functionality requirements for IPv6
+ nodes found in [RFC4294] and the requirements for dual IP layer
+ operation found in Section 2 of [RFC4213]. They also implement the
+ additional features specified in this document.
+
+6. Addressing Requirements
+
+6.1. ISATAP Interface Identifiers
+
+ ISATAP interface identifiers are constructed in Modified EUI-64
+ format per Section 2.5.1 of [RFC4291] by concatenating the 24-bit
+ IANA OUI (00-00-5E), the 8-bit hexadecimal value 0xFE, and a 32-bit
+ IPv4 address in network byte order as follows:
+
+ |0 1|1 3|3 6|
+ |0 5|6 1|2 3|
+ +----------------+----------------+--------------------------------+
+ |000000ug00000000|0101111011111110|mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm|
+ +----------------+----------------+--------------------------------+
+
+ When the IPv4 address is known to be globally unique, the "u" bit
+ (universal/local) is set to 1; otherwise, the "u" bit is set to 0.
+ "g" is the individual/group bit, and "m" represents the bits of the
+ IPv4 address.
+
+
+
+
+
+
+Templin, et al. Informational [Page 4]
+
+RFC 5214 ISATAP March 2008
+
+
+ Per Section 2.5.1 of [RFC4291], ISATAP nodes are not required to
+ validate that interface identifiers created with modified EUI-64
+ tokens with the "u" bit set to universal are unique.
+
+6.2. ISATAP Interface Address Configuration
+
+ Each ISATAP interface configures a set of locators consisting of IPv4
+ address-to-interface mappings from a single site; i.e., an ISATAP
+ interface's locator set MUST NOT span multiple sites.
+
+ When an IPv4 address is removed from an interface, the corresponding
+ locator SHOULD be removed from its associated locator set(s). When a
+ new IPv4 address is assigned to an interface, the corresponding
+ locator MAY be added to the appropriate locator set(s).
+
+ ISATAP interfaces form ISATAP interface identifiers from IPv4
+ addresses in their locator set and use them to create link-local
+ ISATAP addresses (Section 5.3 of [RFC4862]).
+
+6.3. Multicast/Anycast
+
+ It is not possible to assume the general availability of wide-area
+ IPv4 multicast, so (unlike 6over4 [RFC2529]) ISATAP must assume that
+ its underlying IPv4 carrier network only has unicast capability.
+ Support for IPv6 multicast over ISATAP interfaces is not described in
+ this document.
+
+ Similarly, support for Reserved IPv6 Subnet Anycast Addresses is not
+ described in this document.
+
+7. Automatic Tunneling
+
+ ISATAP interfaces use the basic tunneling mechanisms specified in
+ Section 3 of [RFC4213]. The following sub-sections describe
+ additional specifications.
+
+7.1. Encapsulation
+
+ ISATAP addresses are mapped to a link-layer address by a static
+ computation; i.e., the last four octets are treated as an IPv4
+ address.
+
+7.2. Handling ICMPv4 Errors
+
+ ISATAP interfaces SHOULD process Address Resolution Protocol (ARP)
+ failures and persistent ICMPv4 errors as link-specific information
+ indicating that a path to a neighbor may have failed (Section 7.3.3
+ of [RFC4861]).
+
+
+
+Templin, et al. Informational [Page 5]
+
+RFC 5214 ISATAP March 2008
+
+
+7.3. Decapsulation
+
+ The specification in Section 3.6 of [RFC4213] is used. Additionally,
+ when an ISATAP node receives an IPv4 protocol 41 datagram that does
+ not belong to a configured tunnel interface, it determines whether
+ the packet's IPv4 destination address and arrival interface match a
+ locator configured in an ISATAP interface's locator set.
+
+ If an ISATAP interface that configures a matching locator is found,
+ the decapsulator MUST verify that the packet's IPv4 source address is
+ correct for the encapsulated IPv6 source address. The IPv4 source
+ address is correct if:
+
+ o the IPv6 source address is an ISATAP address that embeds the
+ IPv4 source address in its interface identifier, or
+
+ o the IPv4 source address is a member of the Potential Router
+ List (see Section 8.1).
+
+ Packets for which the IPv4 source address is incorrect for this
+ ISATAP interface are checked to determine whether they belong to
+ another tunnel interface.
+
+7.4. Link-Local Addresses
+
+ ISATAP interfaces use link-local addresses constructed as specified
+ in Section 6 of this document.
+
+7.5. Neighbor Discovery over Tunnels
+
+ ISATAP interfaces use the specifications for neighbor discovery found
+ in the following section of this document.
+
+8. Neighbor Discovery for ISATAP Interfaces
+
+ ISATAP interfaces use the neighbor discovery mechanisms specified in
+ [RFC4861]. The following sub-sections describe specifications that
+ are also implemented.
+
+
+
+
+
+
+
+
+
+
+
+
+
+Templin, et al. Informational [Page 6]
+
+RFC 5214 ISATAP March 2008
+
+
+8.1. Conceptual Model of a Host
+
+ To the list of Conceptual Data Structures (Section 5.1 of [RFC4861]),
+ ISATAP interfaces add the following:
+
+ Potential Router List (PRL)
+ A set of entries about potential routers; used to support router
+ and prefix discovery. Each entry ("PRL(i)") has an associated
+ timer ("TIMER(i)"), and an IPv4 address ("V4ADDR(i)") that
+ represents a router's advertising ISATAP interface.
+
+8.2. Router and Prefix Discovery - Router Specification
+
+ Advertising ISATAP interfaces send Solicited Router Advertisement
+ messages as specified in Section 6.2.6 of [RFC4861] except that the
+ messages are sent directly to the soliciting node; i.e., they might
+ not be received by other nodes on the link.
+
+8.3. Router and Prefix Discovery - Host Specification
+
+ The Host Specification in Section 6.3 of [RFC4861] is used. The
+ following sub-sections describe specifications added by ISATAP
+ interfaces.
+
+8.3.1. Host Variables
+
+ To the list of host variables (Section 6.3.2 of [RFC4861]), ISATAP
+ interfaces add the following:
+
+ PrlRefreshInterval
+ Time in seconds between successive refreshments of the PRL after
+ initialization. The designated value of all ones (0xffffffff)
+ represents infinity.
+
+ Default: 3600 seconds
+
+ MinRouterSolicitInterval
+ Minimum time in seconds between successive solicitations of the
+ same advertising ISATAP interface. The designated value of all
+ ones (0xffffffff) represents infinity.
+
+8.3.2. Potential Router List Initialization
+
+ ISATAP nodes initialize an ISATAP interface's PRL with IPv4 addresses
+ acquired via manual configuration, a DNS Fully Qualified Domain Name
+ (FQDN) [RFC1035], a DHCPv4 [RFC2131] vendor-specific option, or an
+ unspecified alternate method. Domain names are acquired via manual
+
+
+
+
+Templin, et al. Informational [Page 7]
+
+RFC 5214 ISATAP March 2008
+
+
+ configuration, receipt of a DHCPv4 Domain Name option [RFC2132], or
+ an unspecified alternate method. FQDNs are resolved into IPv4
+ addresses through a static host file lookup, querying the DNS
+ service, querying a site-specific name service, or with an
+ unspecified alternate method.
+
+ After initializing an ISATAP interface's PRL, the node sets a timer
+ for the interface to PrlRefreshInterval seconds and re-initializes
+ the interface's PRL as specified above when the timer expires. When
+ an FQDN is used, and when it is resolved via a service that includes
+ Times to Live (TTLs) with the IPv4 addresses returned (e.g., DNS 'A'
+ resource records [RFC1035]), the timer SHOULD be set to the minimum
+ of PrlRefreshInterval and the minimum TTL returned. (Zero-valued
+ TTLs are interpreted to mean that the PRL is re-initialized before
+ each Router Solicitation event; see Section 8.3.4.)
+
+8.3.3. Processing Received Router Advertisements
+
+ To the list of checks for validating Router Advertisement messages
+ (Section 6.1.2 of [RFC4861]), ISATAP interfaces add the following:
+
+ o IP Source Address is a link-local ISATAP address that embeds
+ V4ADDR(i) for some PRL(i).
+
+ Valid Router Advertisements received on an ISATAP interface are
+ processed as specified in Section 6.3.4 of [RFC4861].
+
+8.3.4. Sending Router Solicitations
+
+ To the list of events after which Router Solicitation messages may be
+ sent (Section 6.3.7 of [RFC4861]), ISATAP interfaces add the
+ following:
+
+ o TIMER(i) for some PRL(i) expires.
+
+ Since unsolicited Router Advertisements may be incomplete and/or
+ absent, ISATAP nodes MAY schedule periodic Router Solicitation events
+ for certain PRL(i)s by setting the corresponding TIMER(i).
+
+ When periodic Router Solicitation events are scheduled, the node
+ SHOULD set TIMER(i) so that the next event will refresh remaining
+ lifetimes stored for PRL(i) before they expire, including the Router
+ Lifetime, Valid Lifetimes received in Prefix Information Options, and
+ Route Lifetimes received in Route Information Options [RFC4191].
+ TIMER(i) MUST be set to no less than MinRouterSolicitInterval seconds
+ where MinRouterSolicitInterval is configurable for the node, or for a
+ specific PRL(i), with a conservative default value (e.g., 2 minutes).
+
+
+
+
+Templin, et al. Informational [Page 8]
+
+RFC 5214 ISATAP March 2008
+
+
+ When TIMER(i) expires, the node sends Router Solicitation messages as
+ specified in Section 6.3.7 of [RFC4861] except that the messages are
+ sent directly to PRL(i); i.e., they might not be received by other
+ routers. While the node continues to require periodic Router
+ Solicitation events for PRL(i), and while PRL(i) continues to act as
+ a router, the node resets TIMER(i) after each expiration event as
+ described above.
+
+8.4. Neighbor Unreachability Detection
+
+ ISATAP hosts SHOULD perform Neighbor Unreachability Detection
+ (Section 7.3 of [RFC4861]). ISATAP routers MAY perform Neighbor
+ Unreachability Detection, but this might not scale in all
+ environments.
+
+ After address resolution, ISATAP hosts SHOULD perform an initial
+ reachability confirmation by sending Neighbor Solicitation messages
+ and receiving a Neighbor Advertisement message. ISATAP routers MAY
+ perform this initial reachability confirmation, but this might not
+ scale in all environments.
+
+9. Site Administration Considerations
+
+ Site administrators maintain a Potential Router List (PRL) of IPv4
+ addresses representing advertising ISATAP interfaces of routers.
+
+ The PRL is commonly maintained as an FQDN for the ISATAP service in
+ the site's name service (see Section 8.3.2). There are no mandatory
+ rules for the selection of the FQDN, but site administrators are
+ encouraged to use the convention "isatap.domainname" (e.g.,
+ isatap.example.com).
+
+ When the site's name service includes TTLs with the IPv4 addresses
+ returned, site administrators SHOULD configure the TTLs with
+ conservative values to minimize control traffic.
+
+10. Security Considerations
+
+ Implementers should be aware that, in addition to possible attacks
+ against IPv6, security attacks against IPv4 must also be considered.
+ Use of IP security at both IPv4 and IPv6 levels should nevertheless
+ be avoided, for efficiency reasons. For example, if IPv6 is running
+ encrypted, encryption of IPv4 would be redundant unless traffic
+ analysis is felt to be a threat. If IPv6 is running authenticated,
+ then authentication of IPv4 will add little. Conversely, IPv4
+ security will not protect IPv6 traffic once it leaves the ISATAP
+ domain. Therefore, implementing IPv6 security is required even if
+ IPv4 security is available.
+
+
+
+Templin, et al. Informational [Page 9]
+
+RFC 5214 ISATAP March 2008
+
+
+ The threats associated with IPv6 Neighbor Discovery are described in
+ [RFC3756].
+
+ There is a possible spoofing attack in which spurious ip-protocol-41
+ packets are injected into an ISATAP link from outside. Since an
+ ISATAP link spans an entire IPv4 site, restricting access to the link
+ can be achieved by restricting access to the site; i.e., by having
+ site border routers implement IPv4 ingress filtering and ip-
+ protocol-41 filtering.
+
+ Another possible spoofing attack involves spurious ip-protocol-41
+ packets injected from within an ISATAP link by a node pretending to
+ be a router. The Potential Router List (PRL) provides a list of IPv4
+ addresses representing advertising ISATAP interfaces of routers that
+ hosts use in filtering decisions. Site administrators should ensure
+ that the PRL is kept up to date, and that the resolution mechanism
+ (see Section 9) cannot be subverted.
+
+ The use of temporary addresses [RFC4941] and Cryptographically
+ Generated Addresses [RFC3972] on ISATAP interfaces is outside the
+ scope of this specification.
+
+11. IANA Considerations
+
+ The IANA has specified the format for Modified EUI-64 address
+ construction (Appendix A of [RFC4291]) in the IANA Ethernet Address
+ Block. The text in the Appendix of this document has been offered as
+ an example specification. The current version of the IANA registry
+ for Ether Types can be accessed at:
+
+ http://www.iana.org/assignments/ethernet-numbers
+
+12. Acknowledgments
+
+ The ideas in this document are not original, and the authors
+ acknowledge the original architects. Portions of this work were
+ sponsored through SRI International and Nokia and Boeing internal
+ projects and government contracts. Government sponsors include
+ Monica Farah Stapleton and Russell Langan (U.S. Army CECOM ASEO) and
+ Dr. Allen Moshfegh (U.S. Office of Naval Research). SRI
+ International sponsors include Dr. Mike Frankel, J. Peter
+ Marcotullio, Lou Rodriguez, and Dr. Ambatipudi Sastry.
+
+ The following are acknowledged for providing peer review input: Jim
+ Bound, Rich Draves, Cyndi Jung, Ambatipudi Sastry, Aaron Schrader,
+ Ole Troan, and Vlad Yasevich.
+
+
+
+
+
+Templin, et al. Informational [Page 10]
+
+RFC 5214 ISATAP March 2008
+
+
+ The following are acknowledged for their significant contributions:
+ Marcelo Albuquerque, Brian Carpenter, Alain Durand, Hannu Flinck,
+ Jason Goldschmidt, Christian Huitema, Nathan Lutchansky, Karen
+ Nielsen, Mohan Parthasarathy, Chirayu Patel, Art Shelest, Markku
+ Savela, Pekka Savola, Margaret Wasserman, Brian Zill, and members of
+ the IETF IPv6 and V6OPS working groups. Mohit Talwar contributed to
+ earlier versions of this document.
+
+ The authors acknowledge the work done by Brian Carpenter and Cyndi
+ Jung in RFC 2529 that introduced the concept of intra-site automatic
+ tunneling. This concept was later called: "Virtual Ethernet" and
+ researched by Quang Nguyen under the guidance of Dr. Lixia Zhang.
+
+13. References
+
+13.1. Normative References
+
+ [RFC1035] Mockapetris, P., "Domain names - implementation and
+ specification", STD 13, RFC 1035, November 1987.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+ [RFC2131] Droms, R., "Dynamic Host Configuration Protocol", RFC
+ 2131, March 1997.
+
+ [RFC2132] Alexander, S. and R. Droms, "DHCP Options and BOOTP Vendor
+ Extensions", RFC 2132, March 1997.
+
+ [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6
+ (IPv6) Specification", RFC 2460, December 1998.
+
+ [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman,
+ "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861,
+ September 2007.
+
+ [RFC4213] Nordmark, E. and R. Gilligan, "Basic Transition Mechanisms
+ for IPv6 Hosts and Routers", RFC 4213, October 2005.
+
+ [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing
+ Architecture", RFC 4291, February 2006.
+
+ [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless
+ Address Autoconfiguration", RFC 4862, September 2007.
+
+
+
+
+
+
+
+Templin, et al. Informational [Page 11]
+
+RFC 5214 ISATAP March 2008
+
+
+13.2. Informative References
+
+ [RFC2491] Armitage, G., Schulter, P., Jork, M., and G. Harter, "IPv6
+ over Non-Broadcast Multiple Access (NBMA) networks", RFC
+ 2491, January 1999.
+
+ [RFC2492] Armitage, G., Schulter, P., and M. Jork, "IPv6 over ATM
+ Networks", RFC 2492, January 1999.
+
+ [RFC2529] Carpenter, B. and C. Jung, "Transmission of IPv6 over IPv4
+ Domains without Explicit Tunnels", RFC 2529, March 1999.
+
+ [RFC3056] Carpenter, B. and K. Moore, "Connection of IPv6 Domains
+ via IPv4 Clouds", RFC 3056, February 2001.
+
+ [RFC3756] Nikander, P., Ed., Kempf, J., and E. Nordmark, "IPv6
+ Neighbor Discovery (ND) Trust Models and Threats", RFC
+ 3756, May 2004.
+
+ [RFC3972] Aura, T., "Cryptographically Generated Addresses (CGA)",
+ RFC 3972, March 2005.
+
+ [RFC4191] Draves, R. and D. Thaler, "Default Router Preferences and
+ More-Specific Routes", RFC 4191, November 2005.
+
+ [RFC4294] Loughney, J., Ed., "IPv6 Node Requirements", RFC 4294,
+ April 2006.
+
+ [RFC4941] Narten, T., Draves, R., and S. Krishnan, "Privacy
+ Extensions for Stateless Address Autoconfiguration in
+ IPv6", RFC 4941, September 2007.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Templin, et al. Informational [Page 12]
+
+RFC 5214 ISATAP March 2008
+
+
+Appendix A. Modified EUI-64 Addresses in the IANA Ethernet Address
+ Block
+
+ Modified EUI-64 addresses (Section 2.5.1 and Appendix A of [RFC4291])
+ in the IANA Ethernet Address Block are formed by concatenating the
+ 24-bit IANA OUI (00-00-5E) with a 40-bit extension identifier and
+ inverting the "u" bit; i.e., the "u" bit is set to one (1) to
+ indicate universal scope and set to zero (0) to indicate local scope.
+ Modified EUI-64 addresses have the following appearance in memory
+ (bits transmitted right-to-left within octets, octets transmitted
+ left-to-right):
+
+ 0 23 63
+ | OUI | extension identifier |
+ 000000ug00000000 01011110xxxxxxxx xxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxx
+
+ When the first two octets of the extension identifier encode the
+ hexadecimal value 0xFFFE, the remainder of the extension identifier
+ encodes a 24-bit vendor-supplied id as follows:
+
+ 0 23 39 63
+ | OUI | 0xFFFE | vendor-supplied id |
+ 000000ug00000000 0101111011111111 11111110xxxxxxxx xxxxxxxxxxxxxxxx
+
+ When the first octet of the extension identifier encodes the
+ hexadecimal value 0xFE, the remainder of the extension identifier
+ encodes a 32-bit IPv4 address as follows:
+
+ 0 23 31 63
+ | OUI | 0xFE | IPv4 address |
+ 000000ug00000000 0101111011111110 xxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxx
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Templin, et al. Informational [Page 13]
+
+RFC 5214 ISATAP March 2008
+
+
+Authors' Addresses
+
+ Fred L. Templin
+ Boeing Phantom Works
+ P.O. Box 3707 MC 7L-49
+ Seattle, WA 98124
+ USA
+
+ EMail: fred.l.templin@boeing.com
+
+
+ Tim Gleeson
+ Cisco Systems K.K.
+ Shinjuku Mitsui Building
+ 2-1-1 Nishishinjuku, Shinjuku-ku
+ Tokyo 163-0409
+ Japan
+
+ EMail: tgleeson@cisco.com
+
+
+ Dave Thaler
+ Microsoft Corporation
+ One Microsoft Way
+ Redmond, WA 98052-6399
+ US
+
+ Phone: +1 425 703 8835
+ EMail: dthaler@microsoft.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Templin, et al. Informational [Page 14]
+
+RFC 5214 ISATAP March 2008
+
+
+Full Copyright Statement
+
+ Copyright (C) The IETF Trust (2008).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78 and at http://www.rfc-editor.org/copyright.html,
+ and except as set forth therein, the authors retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
+ THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
+ OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
+ THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+
+
+
+
+
+
+
+
+
+
+
+Templin, et al. Informational [Page 15]
+