References from draft-farinacci-lisp-rfc6833bis

This is an experimental product. These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.

Reference type help

Document Title Status Type Downref
BCP 106 Randomness Requirements for Security
Refs Ref'd by
Best Current Practice normatively references
BCP 107 Guidelines for Cryptographic Key Management
Refs Ref'd by
Best Current Practice normatively references
draft-ermagan-lisp-nat-traversal NAT traversal for LISP
Refs Ref'd by
informatively references
draft-ietf-lisp-ddt Locator/ID Separation Protocol Delegated Database Tree (LISP-DDT)
Refs Ref'd by
Experimental informatively references
draft-ietf-lisp-lcaf LISP Canonical Address Format (LCAF)
Refs Ref'd by
Experimental informatively references
draft-ietf-lisp-sec LISP-Security (LISP-SEC)
Refs Ref'd by
Proposed Standard informatively references
draft-ietf-lisp-signal-free-multicast Signal-Free Locator/ID Separation Protocol (LISP) Multicast
Refs Ref'd by
Experimental informatively references
draft-lewis-lisp-gpe LISP Generic Protocol Extension
Refs Ref'd by
informatively references
draft-meyer-lisp-mn LISP Mobile Node
Refs Ref'd by
informatively references
draft-portoles-lisp-eid-mobility LISP L2/L3 EID Mobility Using a Unified Control Plane
Refs Ref'd by
informatively references
draft-quinn-vxlan-gpe Generic Protocol Extension for VXLAN
Refs Ref'd by
informatively references
RFC 1035 Domain names - implementation and specification
Refs Ref'd by
Internet Standard normatively references
RFC 2104 HMAC: Keyed-Hashing for Message Authentication
Refs Ref'd by
Informational normatively references
RFC 2404 The Use of HMAC-SHA-1-96 within ESP and AH
Refs Ref'd by
Proposed Standard normatively references
RFC 4086 Randomness Requirements for Security
Refs Ref'd by
Best Current Practice normatively references
RFC 4107 Guidelines for Cryptographic Key Management
Refs Ref'd by
Best Current Practice normatively references
RFC 4868 Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec
Refs Ref'd by
Proposed Standard normatively references
RFC 6234 US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)
Refs Ref'd by
Informational normatively references
RFC 6830 The Locator/ID Separation Protocol (LISP)
Refs Ref'd by
Experimental informatively references
RFC 6831 The Locator/ID Separation Protocol (LISP) for Multicast Environments
Refs Ref'd by
Experimental normatively references
RFC 6833 Locator/ID Separation Protocol (LISP) Map-Server Interface
Refs Ref'd by
Experimental informatively references
RFC 6836 Locator/ID Separation Protocol Alternative Logical Topology (LISP+ALT)
Refs Ref'd by
Experimental normatively references
RFC 6837 NERD: A Not-so-novel Endpoint ID (EID) to Routing Locator (RLOC) Database
Refs Ref'd by
Experimental normatively references
RFC 7348 Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks
Refs Ref'd by
Informational normatively references
RFC 7835 Locator/ID Separation Protocol (LISP) Threat Analysis
Refs Ref'd by
Informational informatively references
STD 13 Domain names - implementation and specification
Refs Ref'd by
Internet Standard normatively references