Skip to main content

Gateway-Initiated Dual-Stack Lite Deployment
draft-ietf-softwire-gateway-init-ds-lite-08

The information below is for an old version of the document that is already published as an RFC.
Document Type
This is an older version of an Internet-Draft that was ultimately published as RFC 6674.
Authors Frank Brockners , Sri Gundavelli , Sebastian Speicher , David Ward
Last updated 2015-10-14 (Latest revision 2012-04-28)
Replaces draft-gundavelli-softwire-gateway-init-ds-lite, draft-softwire-gateway-init-ds-lite
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status Proposed Standard
Formats
Reviews
Additional resources Mailing list discussion
Stream WG state WG Document
Document shepherd (None)
IESG IESG state Became RFC 6674 (Proposed Standard)
Action Holders
(None)
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD Ralph Droms
IESG note ** No value found for 'doc.notedoc.note' **
Send notices to (None)
draft-ietf-softwire-gateway-init-ds-lite-08
SOFTWIRE WG                                                 F. Brockners
Internet-Draft                                             S. Gundavelli
Intended status: Standards Track                                   Cisco
Expires: October 30, 2012                                    S. Speicher
                                                     Deutsche Telekom AG
                                                                 D. Ward
                                                                   Cisco
                                                          April 28, 2012

              Gateway Initiated Dual-Stack Lite Deployment
              draft-ietf-softwire-gateway-init-ds-lite-08

Abstract

   Gateway-Initiated Dual-Stack lite (GI-DS-lite) is a variant of Dual-
   Stack lite (DS-lite) applicable to certain tunnel-based access
   architectures.  GI-DS-lite extends existing access tunnels beyond the
   access gateway to an IPv4-IPv4 NAT using softwires with an embedded
   context identifier that uniquely identifies the end-system the
   tunneled packets belong to.  The access gateway determines which
   portion of the traffic requires NAT using local policies and sends/
   receives this portion to/from this softwire.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on October 30, 2012.

Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents

Brockners, et al.       Expires October 30, 2012                [Page 1]
Internet-Draft          Gateway-Initiated DS-Lite             April 2012

   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Overview . . . . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Conventions  . . . . . . . . . . . . . . . . . . . . . . . . .  3
   3.  Gateway Initiated DS-Lite  . . . . . . . . . . . . . . . . . .  4
   4.  Protocol and related Considerations  . . . . . . . . . . . . .  6
   5.  Softwire Management and related Considerations . . . . . . . .  7
   6.  Softwire Embodiments . . . . . . . . . . . . . . . . . . . . .  7
   7.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . .  9
   8.  Security Considerations  . . . . . . . . . . . . . . . . . . .  9
   9.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 10
   10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     10.1.  Normative References  . . . . . . . . . . . . . . . . . . 10
     10.2.  Informative References  . . . . . . . . . . . . . . . . . 11
   Appendix A.  GI-DS-lite deployment . . . . . . . . . . . . . . . . 12
     A.1.   Connectivity establishment: Example call flow . . . . . . 12
     A.2.   GI-DS-lite applicability: Examples  . . . . . . . . . . . 13
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 14

Brockners, et al.       Expires October 30, 2012                [Page 2]
Internet-Draft          Gateway-Initiated DS-Lite             April 2012

1.  Overview

   Gateway-Initiated Dual-Stack lite (GI-DS-lite) is a variant of the
   Dual-Stack lite (DS-lite) [RFC6333], applicable to network
   architectures which use point to point tunnels between the access
   device and the access gateway.  The access gateway in these models is
   designed to serve large numbers of access devices.  Mobile
   architectures based on Mobile IPv6 [RFC6275], Proxy Mobile IPv6
   [RFC5213], or GTP [TS29060], as well as broadband architectures based
   on PPP or point-to-point VLANs as defined by the Broadband Forum
   [TR59] and [TR101] are examples for this type of architecture.

   The DS-lite approach leverages IPv4-in-IPv6 tunnels (or other
   tunneling modes) for carrying the IPv4 traffic from the customer
   network to the Address Family Transition Router (AFTR).  An
   established softwire between the AFTR and the access device is used
   for traffic forwarding purposes.  This turns the inner IPv4 address
   irrelevant for traffic routing and allows sharing private IPv4
   addresses [RFC1918] between customer sites within the service
   provider network.

   Similar to DS-lite, GI-DS-lite enables the service provider to share
   public IPv4 addresses among different customers by combining
   tunneling and NAT.  It allows multiple access devices behind the
   access gateway to share the same private IPv4 address [RFC1918].
   Rather than initiating the tunnel right on the access device, GI-DS-
   lite logically extends the already existing access tunnels beyond the
   access gateway towards the Address Family Transition Router (AFTR)
   using a tunneling mechanism with semantics for carrying context state
   related to the encapsulated traffic.  This approach results in
   supporting overlapping IPv4 addresses in the access network,
   requiring no changes to either the access device, or to the access
   architecture.  Additional tunneling overhead in the access network is
   also omitted.  If e.g., GRE based encapsulation mechanisms is chosen,
   it allows the network between the access gateway and the AFTR to be
   either IPv4 or IPv6 and provides the operator to migrate to IPv6 in
   incremental steps.

2.  Conventions

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

   The following abbreviations are used within this document:

Brockners, et al.       Expires October 30, 2012                [Page 3]
Internet-Draft          Gateway-Initiated DS-Lite             April 2012

      AFTR: Address Family Transition Router.  An AFTR combines IP-in-IP
      tunnel termination and IPv4-IPv4 NAT.

      AD: Access Device.  It is the end host, also known as the mobile
      node in mobile architectures.

      CID: Context Identifier

      DS-lite: Dual-stack lite

      GI-DS-lite: Gateway-initiated DS-lite

      NAT: Network Address Translator

      SW: Softwire [RFC4925]

      SWID: Softwire Identifier

3.  Gateway Initiated DS-Lite

   The section provides an overview of Gateway Initiated DS-Lite (GI-DS-
   lite).  Figure 1 outlines the generic deployment scenario for GI-DS-
   lite.  This generic scenario can be mapped to multiple different
   access architectures, some of which are described in Appendix A.

   In Figure 1, access devices (AD-1 and AD-2) are connected to the
   Gateway using some form of tunnel technology and the same is used for
   carrying IPv4 (and optionally IPv6) traffic of the access device.
   These access devices may also be connected to the Gateway over point-
   to-point links.  The details on how the network delivers the IPv4
   address configuration to the access devices are specific to the
   access architecture and are outside the scope of this document.  With
   GI-DS-lite, Gateway and AFTR are connected by a softwire [RFC4925].
   The softwire is identified by a softwire identifier (SWID).  The SWID
   does not need to be globally unique, i.e. different SWIDs could be
   used to identify a softwire at the different ends of a softwire.  The
   form of the SWID depends on the tunneling technology used for the
   softwire.  The SWID could e.g. be the endpoints of a GRE-tunnel or a
   VPN-ID, Section 6 for details.  A Context-Identifier (CID) is used to
   multiplex flows associated with the individual access devices onto
   the softwire.  Deployment dependent, the flows from a particular AD
   can be identified using either the source IP-address or an access
   tunnel identifier.  Local policies at the Gateway determine which
   part of the traffic received from an access device is tunneled over
   the softwire to the AFTR.  The combination of CID and SWID must be
   unique between gateway and AFTR to identify the flows associated with
   an AD.  The CID is typically a 32-bit wide identifier and is assigned

Brockners, et al.       Expires October 30, 2012                [Page 4]
Internet-Draft          Gateway-Initiated DS-Lite             April 2012

   by the Gateway.  It is retrieved either from a local or remote (e.g.
   AAA) repository.  Like the SWID, the embodiment of the CID depends on
   the tunnel mode used and the type of the network connecting Gateway
   and AFTR.  If, for example GRE [RFC2784] with "GRE Key and Sequence
   Number Extensions" [RFC2890] is used as softwire technology, the
   network connecting Gateway and AFTR could be either IPv4-only, IPv6-
   only, or a dual-stack IP network.  The CID would be carried within
   the GRE-key field.  Section 6 for details on different softwire types
   supported with GI-DS-lite.

                        Access Device: AD-1
                        Context Id: CID-1
                                             NAT Mappings:
      IPv4: a.b.c.d            +---+         (CID-1, TCP port1 <->
      +------+  access tunnel  |   |                 e.f.g.h, TCP port2)
      | AD-1 |=================| G |                          +---+
      +------+                 | A |                          | A |
                               | T |    Softwire SWID-1       | F |
                               | E |==========================| T |
      IPv4: a.b.c.d            | W |  (e.g. IPv4-over-GRE     | R |
      +------+                 | A |   over IPv4 or IPv6)     +---+
      | AD-2 |=================| Y |
      +------+  access tunnel  |   |         (CID-2, TCP port3 <->
                               |   |                 e.f.g.h, TCP port4)
                               +---+

                        Access Device: AD-2
                        Context Id: CID-2

    Figure 1: Gateway-initiated dual-stack lite reference architecture

   The AFTR combines softwire termination and IPv4-IPv4 NAT.  The NAT
   binding of the AD's address could be assigned autonomously by the
   AFTR from a local address pool, configured on a per-binding basis
   (either by a remote control entity through a NAT control protocol or
   through manual configuration), or derived from the CID (e.g., the
   CID, in case 32-bit wide, could be mapped 1:1 to an external IPv4-
   address).  A simple example of a translation table at the AFTR is
   shown in Figure 2.  The choice of the appropriate translation scheme
   for a traffic flow can take parameters such as destination IP-
   address, incoming interface, etc. into account.  The IP-address of
   the AFTR, which, depending on the transport network between the
   Gateway and the AFTR, will either be an IPv6 or an IPv4 address, is
   configured on the Gateway.  A variety of methods, such as out-of-band
   mechanisms, or manual configuration apply.

Brockners, et al.       Expires October 30, 2012                [Page 5]
Internet-Draft          Gateway-Initiated DS-Lite             April 2012

       +=====================================+======================+
       |  Softwire-Id/Context-Id/IPv4/Port   |  Public IPv4/Port    |
       +=====================================+======================+
       |  SWID-1/CID-1/a.b.c.d/TCP-port1     |  e.f.g.h/TCP-port2   |
       |                                     |                      |
       |  SWID-1/CID-2/a.b.c.d/TCP-port3     |  e.f.g.h/TCP-port4   |
       +-------------------------------------+----------------------+

              Figure 2: Example translation table on the AFTR

   GI-DS-lite does not require a 1:1 relationship between Gateway and
   AFTR, but more generally applies to (M:N) scenarios, where M Gateways
   are connected to N AFTRs.  Multiple Gateways could be served by a
   single AFTR.  AFTRs could be dedicated to specific groups of access-
   devices, groups of Gateways, or geographic regions.  An AFTR could,
   but does not have to be co-located with a Gateway.

4.  Protocol and related Considerations

   o  Depending on the embodiment of the CID (e.g. for GRE-encapsulation
      with GRE-key), the NAT binding entry maintained at the AFTR, which
      reflects an active flow between an access device inside the
      network and a node in the Internet, SHOULD be extended to include
      the CID and the identifier of the softwire (SWID).

   o  When creating an IPv4 to IPv4 NAT binding for an IPv4 packet flow
      received from the Gateway over the softwire, the AFTR SHOULD
      associate the CID with that NAT binding.  It SHOULD use the
      combination of CID and SWID as the unique identifier and use those
      parameters in the NAT binding entry.

   o  When forwarding a packet to the access device, the AFTR SHOULD
      obtain the CID from the NAT binding associated with that flow.
      E.g., in case of GRE-encapsulation, it SHOULD add the CID to the
      GRE Key and Sequence number extension of the GRE header and tunnel
      it to the Gateway.

   o  On receiving any packet from the softwire, the AFTR SHOULD obtain
      the CID from the incoming packet and use it for performing the NAT
      binding look up and for performing the packet translation before
      forwarding the packet.

   o  The Gateway, on receiving any IPv4 packet from the access device
      SHOULD lookup the CID for that access device.  In case of GRE
      encapsulation it can for example add the CID to the GRE Key and
      Sequence number extension of the GRE header and tunnel it to the

Brockners, et al.       Expires October 30, 2012                [Page 6]
Internet-Draft          Gateway-Initiated DS-Lite             April 2012

      AFTR.

   o  On receiving any packet from the softwire, the Gateway SHOULD
      obtain the CID from the packet and use it for making the
      forwarding decision.

   o  When encapsulating an IPv4 packet, Gateway and AFTR SHOULD use its
      Diffserv Codepoint (DSCP) to derive the DSCP (or MPLS Traffic-
      Class Field in case of MPLS) of the softwire.

5.  Softwire Management and related Considerations

   The following are the considerations related to the operational
   management of the softwire between AFTR and Gateway.

   o  The softwire between the Gateway and the AFTR MAY be created at
      system startup time, OR dynamically established on-demand.
      Deployment dependent, Gateway and AFTR can employ OAM mechanisms
      such as ICMP, BFD [RFC5880], or LSP ping [RFC4379] for softwire
      health management and corresponding protection strategies.

   o  The softwire peers MAY be provisioned to perform policy
      enforcement, such as for determining the protocol-type or overall
      portion of traffic that gets tunneled, or for any other quality of
      service related settings.  The specific details on how this is
      achieved or the types of policies that can be applied are outside
      the scope for this document.

   o  The softwire peers SHOULD use the correct path MTU value for the
      tunnel path between the access gateway and the AFTR.  This value
      MAY be statically configured at softwire creation time, or
      dynamically discovered using the standard path MTU discovery
      techniques.

   o  A Gateway and an AFTR can have multiple softwires established
      between them (e.g. to separate address domains, provide for load-
      sharing etc.).

6.  Softwire Embodiments

   Deployment and requirements dependent, different tunnel technologies
   apply for the softwire connecting Gateway and AFTR.  GRE
   encapsulation with GRE-key extensions, MPLS VPNs [RFC4364], or plain
   IP-in-IP encapsulation can be used.  Softwire identification and
   Context-ID depend on the tunneling technology employed:

Brockners, et al.       Expires October 30, 2012                [Page 7]
Internet-Draft          Gateway-Initiated DS-Lite             April 2012

   o  GRE with GRE-key: SWID is the tunnel identifier of the GRE tunnel
      between the GW and the AFTR.  The CID is the GRE-key associated
      with the AD.

   o  MPLS VPN: The SWID is a generic identifier which uniquely
      identifies the VPN at either the Gateway or AFTR.  Depending on
      whether the Gateway or AFTR are acting as customer edge (CE) or,
      provider edge (PE), the SWID could e.g. be an attachment circuit
      identifier, an identifier representing the set of VPN route labels
      pointing to the routes within the VPN, etc.  The AD's IPv4-address
      is the CID.  For a given VPN, the AD's IPv4 address must be
      unique.

   o  IPv4/IPv6-in-MPLS: The SWID is the top MPLS label.  CID might be
      the next MPLS label in the stack, if present, or the IP address of
      the AD.

   o  IPv4-in-IPv4: SWID is the outer IPv4 source address.  The AD's
      IPv4 address is the CID.  For a given outer IPv4 source address,
      the AD's IPv4 address must be unique.

   o  IPv4-in-IPv6: SWID is the outer IPv6 source address.  If the AD's
      IPv4 address is used as CID, the AD's IPv4 address must be unique.
      If the IPv6-Flow-Label [RFC6437] is used as CID, the IPv4
      addresses of the ADs may overlap.  Given that the IPv6-Flow-Label
      is 20-bit wide, which is shorter than the recommended 32-bit CID,
      large scale deployments may require additional scaling
      considerations.  In addition, one should ensure sufficient
      randomization of the IP-Flow-Label to avoid possible interference
      with other uses of the IP-Flow-Label, such as Equal Cost Multipath
      (ECMP) support.

   Figure 3 gives an overview of the different tunnel modes as they
   apply to different deployment scenarios. "x" indicates that a certain
   deployment scenario is supported.  The following abbreviations are
   used:

   o  IPv4 address

      *  "up": Deployments with "unique private IPv4 addresses" assigned
         to the access devices are supported.

      *  "op": Deployments with "overlapping private IPv4 addresses"
         assigned to the access devices are supported.

      *  "s": Deployments where all access devices are assigned the same
         IPv4 address are supported.

Brockners, et al.       Expires October 30, 2012                [Page 8]
Internet-Draft          Gateway-Initiated DS-Lite             April 2012

   o  Network-type

      *  "v4": Gateway and AFTR are connected by an IPv4-only network

      *  "v6": Gateway and AFTR are connected by an IPv6-only network

      *  "v4v6": Gateway and AFTR are connected by a dual stack network,
         supporting IPv4 and IPv4.

      *  "MPLS": Gateway and AFTR are connected by a MPLS network

        +===================+==============+=======================+
        |                    | IPv4 address|      Network-type     |
        |    Softwire        +----+----+---+----+----+------+------+
        |                    | up | op | s | v4 | v6 | v4v6 | MPLS |
        +====================+====+====+===+====+====+======+======+
        | GRE with GRE-key   |  x |  x | x |  x |  x |   x  |      |
        | MPLS VPN           |  x |  x |   |    |    |      |   x  |
        | IPv4/IPv6-in-MPLS  |  x |  x | x |    |    |      |   x  |
        | IPv4-in-IPv4       |  x |    |   |  x |    |      |      |
        | IPv4-in-IPv6       |  x |    |   |    |  x |      |      |
        | IPv4-in-IPv6 w/ FL |  x |  x | x |    |  x |      |      |
        +====================+====+====+===+====+====+======+======+

              Figure 3: Tunnel modes and their applicability

7.  IANA Considerations

   This specification does not require any IANA actions.

8.  Security Considerations

   The approach specified in this document allows the use of Dual-stack
   lite for tunnel-based access architectures.  Rather than initiating
   the tunnel from the access device, GI-DS-lite logically extends the
   already existing access tunnel beyond the access gateway towards the
   Address Family Transition Router, and builds a virtual softwire
   between the AFTR and the access device.  This approach requires the
   use of an additional context identifier in the AFTR and at the access
   gateway, which is required for making IP packet forwarding decisions.

   A packet when received with an Incorrect context identifier at the
   access gateway/AFTR will result in associating the packet to an
   incorrect access device.  Therefore, care must be taken to ensure an
   IP packet tunneled between the access gateway and the AFTR is carried

Brockners, et al.       Expires October 30, 2012                [Page 9]
Internet-Draft          Gateway-Initiated DS-Lite             April 2012

   with the context identifier of the access device associated with that
   IP packet.  The context identifier is not carried from the access
   device and it is not possible for one access device to claim the
   context identifier of some other access device.  However, It is
   possible an on-path attacker between the access gateway and the AFTR
   can potentially modify the context identifier in the packet,
   resulting in association of the packet to an incorrect access device.
   This threat is no different from an on-path attacker modifying the
   source/destination address of an IP packet.  However, this threat can
   be prevented by enabling IPsec security with integrity protection
   turned on, between the access gateway and the AFTR, that will ensure
   the correct binding of the context identifier and the inner packet.
   This specification does not require any other new security
   considerations other than those specified in dual-stack lite
   specification [RFC6333], and in the security considerations specified
   for the given access architecture, such as Proxy Mobile IPv6,
   leveraging this transitioning scheme.

9.  Acknowledgements

   The authors would like to acknowledge the discussions on this topic
   with Mark Grayson, Jay Iyer, Kent Leung, Vojislav Vucetic, Flemming
   Andreasen, Dan Wing, Jouni Korhonen, Teemu Savolainen, Parviz Yegani,
   Farooq Bari, Mohamed Boucadair, Vinod Pandey, Jari Arkko, Eric Voit,
   Yiu L. Lee, Tina Tsou, Guo-Liang Yang, Cathy Zhou, Olaf Bonness, Paco
   Cortes, Jim Guichard, Stephen Farrell, Pete Resnik, Ralph Droms.

10.  References

10.1.  Normative References

   [RFC1918]  Rekhter, Y., Moskowitz, R., Karrenberg, D., Groot, G., and
              E. Lear, "Address Allocation for Private Internets",
              BCP 5, RFC 1918, February 1996.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC2784]  Farinacci, D., Li, T., Hanks, S., Meyer, D., and P.
              Traina, "Generic Routing Encapsulation (GRE)", RFC 2784,
              March 2000.

   [RFC2890]  Dommety, G., "Key and Sequence Number Extensions to GRE",
              RFC 2890, September 2000.

   [RFC4364]  Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private

Brockners, et al.       Expires October 30, 2012               [Page 10]
Internet-Draft          Gateway-Initiated DS-Lite             April 2012

              Networks (VPNs)", RFC 4364, February 2006.

   [RFC4379]  Kompella, K. and G. Swallow, "Detecting Multi-Protocol
              Label Switched (MPLS) Data Plane Failures", RFC 4379,
              February 2006.

   [RFC5213]  Gundavelli, S., Leung, K., Devarapalli, V., Chowdhury, K.,
              and B. Patil, "Proxy Mobile IPv6", RFC 5213, August 2008.

   [RFC5555]  Soliman, H., "Mobile IPv6 Support for Dual Stack Hosts and
              Routers", RFC 5555, June 2009.

   [RFC5844]  Wakikawa, R. and S. Gundavelli, "IPv4 Support for Proxy
              Mobile IPv6", RFC 5844, May 2010.

   [RFC5880]  Katz, D. and D. Ward, "Bidirectional Forwarding Detection
              (BFD)", RFC 5880, June 2010.

   [RFC6275]  Perkins, C., Johnson, D., and J. Arkko, "Mobility Support
              in IPv6", RFC 6275, July 2011.

   [RFC6333]  Durand, A., Droms, R., Woodyatt, J., and Y. Lee, "Dual-
              Stack Lite Broadband Deployments Following IPv4
              Exhaustion", RFC 6333, August 2011.

   [RFC6437]  Amante, S., Carpenter, B., Jiang, S., and J. Rajahalme,
              "IPv6 Flow Label Specification", RFC 6437, November 2011.

10.2.  Informative References

   [I-D.draft-ietf-dime-nat-control]
              Brockners, F., Bhandari, S., Singh, V., and V. Fajardo,
              "Diameter NAT Control Application", August 2009.

   [RFC4925]  Li, X., Dawkins, S., Ward, D., and A. Durand, "Softwire
              Problem Statement", RFC 4925, July 2007.

   [TR101]    Broadband Forum, "TR-101: Migration to Ethernet-Based DSL
              Aggregation", April 2006.

   [TR59]     Broadband Forum, "TR-059: DSL Evolution - Architecture
              Requirements for the Support of QoS-Enabled IP Services",
              September 2003.

   [TS23060]  "3rd Generation Partnership Project; Technical
              Specification Group Services and System Aspects; General
              Packet Radio Service (GPRS); Service description; Stage
              2.", 2009.

Brockners, et al.       Expires October 30, 2012               [Page 11]
Internet-Draft          Gateway-Initiated DS-Lite             April 2012

   [TS23401]  "3rd Generation Partnership Project; Technical
              Specification Group Services and System Aspects; General
              Packet Radio Service (GPRS) enhancements for Evolved
              Universal Terrestrial Radio Access Network (E-UTRAN)
              access.", 2009.

   [TS29060]  "3rd Generation Partnership Project; Technical
              Specification Group Core Network and Terminals; General
              Packet Radio Service (GPRS); GPRS Tunnelling Protocol
              (GTP), V9.1.0", 2009.

Appendix A.  GI-DS-lite deployment

A.1.  Connectivity establishment: Example call flow

   Figure 4 shows an example call flow - linking access tunnel
   establishment on the Gateway with the softwire to the AFTR.  This
   simple example assumes that traffic from the AD uses a single access
   tunnel and that the Gateway will use local polices to decide which
   portion of the traffic received over this access tunnel needs to be
   forwarded to the AFTR.

             AD            Gateway         AAA/Policy       AFTR
             |                |                 |            |
             |----(1)-------->|                 |            |
             |               (2)<-------------->|            |
             |               (3)                |            |
             |                |<------(4)------------------->|
             |               (5)                |            |
             |<---(6)-------->|                 |            |
             |                |                 |            |

           Figure 4: Example call flow for session establishment

   1.  Gateway receives a request to create an access tunnel endpoint.

   2.  The Gateway authenticates and authorizes the access tunnel.
       Based on local policy or through interaction with the AAA/Policy
       system the Gateway recognizes that IPv4 service should be
       provided using GI-DS-lite.

   3.  The Gateway creates an access tunnel endpoint.  The access tunnel
       links AD and Gateway.

   4.  (Optional): The Gateway and the AFTR establish a control session
       between each other.  This session can for example be used to

Brockners, et al.       Expires October 30, 2012               [Page 12]
Internet-Draft          Gateway-Initiated DS-Lite             April 2012

       exchange accounting or NAT-configuration information.  Accounting
       information could be supplied to the Gateway, AAA/Policy, or
       other network entities which require information about the
       externally visible address/port pairs of a particular access
       device.  The Diameter NAT Control Application
       [I-D.draft-ietf-dime-nat-control] could for example be used for
       this purpose.

   5.  The Gateway allocates a unique CID and associates those flows
       received from the access tunnel that need to be tunneled towards
       the AFTR with the softwire linking Gateway and AFTR.  Local
       forwarding policy on the Gateway determines which traffic will
       need to be tunneled towards the AFTR.

   6.  Gateway and AD complete the access tunnel establishment
       (depending on the procedures and mechanisms of the corresponding
       access network architecture this step can include the assignment
       of an IPv4 address to the AD).

A.2.  GI-DS-lite applicability: Examples

   The section outlines deployment examples of the generic GI-DS-lite
   architecture described in Section 3.

   o  Mobile IP based access architectures: In a DSMIPv6 [RFC5555] based
      network scenario, the Mobile IPv6 home agent will implement the
      GI-DS-lite Gateway function along with the dual-stack Mobile IPv6
      functionality.

   o  Proxy Mobile IPv6 based access architectures: In a PMIPv6
      [RFC5213] scenario the local mobility anchor (LMA) will implement
      the GI-DS-lite Gateway function along with the PMIPv6 IPv4 support
      [RFC5844] functionality.

   o  GTP based access architectures: 3GPP TS 23.401 [TS23401] and 3GPP
      TS 23.060 [TS23060] define mobile access architectures using GTP.
      For GI-DS-lite, the PDN-Gateway/GGSN will also assume the Gateway
      function.

   o  Fixed WiMAX architecture: If GI-DS-lite is applied to fixed WiMAX,
      the ASN-Gateway will implement the GI-DS-lite Gateway function.

   o  Mobile WiMAX: If GI-DS-lite is applied to mobile WiMAX, the home
      agent will implement the Gateway function.

   o  PPP-based broadband access architectures: If GI-DS-lite is applied
      to PPP-based access architectures the Broadband Remote Access
      Server (BRAS) or Broadband Network Gateway (BNG) will implement

Brockners, et al.       Expires October 30, 2012               [Page 13]
Internet-Draft          Gateway-Initiated DS-Lite             April 2012

      the GI-DS-lite Gateway function.

   o  In broadband access architectures using per-subscriber VLANs the
      BNG will implement the GI-DS-lite Gateway function.

Authors' Addresses

   Frank Brockners
   Cisco
   Hansaallee 249, 3rd Floor
   DUESSELDORF, NORDRHEIN-WESTFALEN  40549
   Germany

   Email: fbrockne@cisco.com

   Sri Gundavelli
   Cisco
   170 West Tasman Drive
   SAN JOSE, CA  95134
   USA

   Email: sgundave@cisco.com

   Sebastian Speicher
   Deutsche Telekom AG
   Landgrabenweg 151
   BONN, NORDRHEIN-WESTFALEN  53277
   Germany

   Email: sebastian.speicher@telekom.de

   David Ward
   Cisco
   170 West Tasman Drive
   SAN JOSE, CA  95134
   USA

   Email: wardd@cisco.com

Brockners, et al.       Expires October 30, 2012               [Page 14]