rfc9347v2.txt | rfc9347.txt | |||
---|---|---|---|---|
skipping to change at line 383 ¶ | skipping to change at line 383 ¶ | |||
the effective throughput of a tunnel. Senders implementing either of | the effective throughput of a tunnel. Senders implementing either of | |||
the above approaches will need to take care to not reduce the | the above approaches will need to take care to not reduce the | |||
effective capacity, and overall utility, of the tunnel through the | effective capacity, and overall utility, of the tunnel through the | |||
overuse of padding. | overuse of padding. | |||
2.2.4. Empty Payload | 2.2.4. Empty Payload | |||
To support reporting of congestion control information (described | To support reporting of congestion control information (described | |||
later) using a non-AGGFRAG_PAYLOAD-enabled SA, it is allowed to send | later) using a non-AGGFRAG_PAYLOAD-enabled SA, it is allowed to send | |||
an AGGFRAG_PAYLOAD payload with no data blocks (i.e., the ESP payload | an AGGFRAG_PAYLOAD payload with no data blocks (i.e., the ESP payload | |||
Length is equal to the AGGFRAG_PAYLOAD header length). This special | length is equal to the AGGFRAG_PAYLOAD header length). This special | |||
payload is called an empty payload. | payload is called an empty payload. | |||
Currently, this situation is only applicable in use cases without | Currently, this situation is only applicable in use cases without | |||
Internet Key Exchange Protocol Version 2 (IKEv2). | Internet Key Exchange Protocol Version 2 (IKEv2). | |||
2.2.5. IP Header Value Mapping | 2.2.5. IP Header Value Mapping | |||
[RFC4301] provides some direction on when and how to map various | [RFC4301] provides some direction on when and how to map various | |||
values from an inner IP header to the outer encapsulating header, | values from an inner IP header to the outer encapsulating header, | |||
namely the Don't Fragment (DF) bit [RFC0791], the Differentiated | namely the Don't Fragment (DF) bit [RFC0791], the Differentiated | |||
skipping to change at line 426 ¶ | skipping to change at line 426 ¶ | |||
By default, the DS field SHOULD NOT be copied, although a sender MAY | By default, the DS field SHOULD NOT be copied, although a sender MAY | |||
choose to allow for configuration to override this behavior. A | choose to allow for configuration to override this behavior. A | |||
sender SHOULD also allow the DS value to be set by configuration. | sender SHOULD also allow the DS value to be set by configuration. | |||
2.2.6. IPv4 Time To Live (TTL), IPv6 Hop Limit, and ICMP Messages | 2.2.6. IPv4 Time To Live (TTL), IPv6 Hop Limit, and ICMP Messages | |||
How to modify the inner packet IPv4 TTL [RFC0791] or IPv6 Hop Limit | How to modify the inner packet IPv4 TTL [RFC0791] or IPv6 Hop Limit | |||
[RFC8200] is specified in [RFC4301]. | [RFC8200] is specified in [RFC4301]. | |||
It is also specified in [RFC4301] how to apply policy to | [RFC4301] specifies how to apply policy to authenticated and | |||
authenticated and unauthenticated ICMP error packets (e.g., | unauthenticated ICMP error packets (e.g., Destination Unreachable) | |||
Destination Unreachable) arriving at or being forwarded through the | arriving at or being forwarded through the endpoint, in particular, | |||
endpoint, in particular, whether to process, ignore, or forward said | whether to process, ignore, or forward said packets. With the one | |||
packets. With the one exception that this document does not change | exception that this document does not change the handling of these | |||
the handling of these packets, they should be handled as specified in | packets, they should be handled as specified in [RFC4301]. | |||
[RFC4301]. | ||||
The one way in which an AGGFRAG tunnel differs in ICMP error packet | The one way in which an AGGFRAG tunnel differs in ICMP error packet | |||
mechanics is with PMTU. When fragmentation is enabled on the AGGFRAG | mechanics is with PMTU. When fragmentation is enabled on the AGGFRAG | |||
tunnel, then no ICMP "Too Big" errors need to be generated for | tunnel, then no ICMP "Too Big" errors need to be generated for | |||
arriving ingress traffic, as the arriving inner packets will be | arriving ingress traffic, as the arriving inner packets will be | |||
naturally fragmented by the AGGFRAG encapsulation. | naturally fragmented by the AGGFRAG encapsulation. | |||
Otherwise, when fragmentation has been disabled on the AGGFRAG | Otherwise, when fragmentation has been disabled on the AGGFRAG | |||
tunnel, then the treatment of arriving inner traffic exactly maps to | tunnel, then the treatment of arriving inner traffic exactly maps to | |||
that of a non-AGGFRAG ESP tunnel. Explicitly, IPv4 with DF set and | that of a non-AGGFRAG ESP tunnel. Explicitly, IPv4 with DF set and | |||
IPv6 packets that cannot fit in its own outer packet payload will | IPv6 packets that cannot fit in its own outer packet payload will | |||
generate the appropriate ICMP "Too Big" error, as described | generate the appropriate ICMP "Too Big" error, as described in | |||
[RFC4301], and IPv4 packets without DF set will be IP fragmented, as | [RFC4301], and IPv4 packets without DF set will be IP fragmented, as | |||
described in [RFC4301]. | described in [RFC4301]. | |||
Packets egressing the tunnel continue to be handled as specified in | Packets egressing the tunnel continue to be handled as specified in | |||
[RFC4301]. | [RFC4301]. | |||
All other aspects of PMTU and the handling of ICMP "Too Big" messages | All other aspects of PMTU and the handling of ICMP "Too Big" messages | |||
(i.e., with regards to the outer AGGFRAG/ESP tunnel packet size) also | (i.e., with regards to the outer AGGFRAG/ESP tunnel packet size) also | |||
remain unchanged from [RFC4301]. | remain unchanged from [RFC4301]. | |||
skipping to change at line 513 ¶ | skipping to change at line 512 ¶ | |||
congestion. Thus, if they do not guarantee the bandwidth required by | congestion. Thus, if they do not guarantee the bandwidth required by | |||
the tunnel, the tunnel's operation, as well as the rest of their | the tunnel, the tunnel's operation, as well as the rest of their | |||
network, may be negatively impacted. | network, may be negatively impacted. | |||
One expected use case for the non-congestion-controlled mode is to | One expected use case for the non-congestion-controlled mode is to | |||
guarantee the full tunnel bandwidth is available and preferred over | guarantee the full tunnel bandwidth is available and preferred over | |||
other non-tunnel traffic. In fact, a typical site-to-site use case | other non-tunnel traffic. In fact, a typical site-to-site use case | |||
might have all of the user traffic utilizing the IP-TFS tunnel. | might have all of the user traffic utilizing the IP-TFS tunnel. | |||
The non-congestion-controlled mode is also appropriate if ESP over | The non-congestion-controlled mode is also appropriate if ESP over | |||
TCP is in use [RFC8229]. However, the use of TCP is considered a | TCP is in use [RFC9329]. However, the use of TCP is considered a | |||
fallback-only solution for IPsec; it is highly not preferred. This | fallback-only solution for IPsec; it is highly not preferred. This | |||
is also one of the reasons that TCP was not chosen as the | is also one of the reasons that TCP was not chosen as the | |||
encapsulation for IP-TFS instead of AGGFRAG. | encapsulation for IP-TFS instead of AGGFRAG. | |||
2.4.2. Congestion-Controlled Mode | 2.4.2. Congestion-Controlled Mode | |||
With the congestion-controlled mode, IP-TFS adapts to network | With the congestion-controlled mode, IP-TFS adapts to network | |||
congestion by lowering the packet send rate to accommodate the | congestion by lowering the packet send rate to accommodate the | |||
congestion, as well as raising the rate when congestion subsides. | congestion, as well as raising the rate when congestion subsides. | |||
Since overhead is per packet, by allowing for maximal fixed-size | Since overhead is per packet, by allowing for maximal fixed-size | |||
skipping to change at line 724 ¶ | skipping to change at line 723 ¶ | |||
4. Configuration of AGGFRAG Tunnels for IP-TFS | 4. Configuration of AGGFRAG Tunnels for IP-TFS | |||
IP-TFS is meant to be deployable with a minimal amount of | IP-TFS is meant to be deployable with a minimal amount of | |||
configuration. All IP-TFS-specific configuration should be specified | configuration. All IP-TFS-specific configuration should be specified | |||
at the unidirectional tunnel ingress (sending) side. It is intended | at the unidirectional tunnel ingress (sending) side. It is intended | |||
that non-IKEv2 operation is supported, at least, with local static | that non-IKEv2 operation is supported, at least, with local static | |||
configuration. | configuration. | |||
YANG and MIB documents have been defined for IP-TFS in [RFC9348] and | YANG and MIB documents have been defined for IP-TFS in [RFC9348] and | |||
[IPSECME-MIB-IPTFS]. | [RFC9349]. | |||
4.1. Bandwidth | 4.1. Bandwidth | |||
Bandwidth is a local configuration option. For the non-congestion- | Bandwidth is a local configuration option. For the non-congestion- | |||
controlled mode, the bandwidth SHOULD be configured. For the | controlled mode, the bandwidth SHOULD be configured. For the | |||
congestion-controlled mode, the bandwidth can be configured or the | congestion-controlled mode, the bandwidth can be configured or the | |||
congestion control algorithm discovers and uses the maximum bandwidth | congestion control algorithm discovers and uses the maximum bandwidth | |||
available. No standardized configuration method is required. | available. No standardized configuration method is required. | |||
4.2. Fixed Packet Size | 4.2. Fixed Packet Size | |||
skipping to change at line 1120 ¶ | skipping to change at line 1119 ¶ | |||
As noted previously in Section 2.4.2, for TFC to be maintained, the | As noted previously in Section 2.4.2, for TFC to be maintained, the | |||
encapsulated traffic flow should not be affecting network congestion | encapsulated traffic flow should not be affecting network congestion | |||
in a predictable way, and if it would be, then non-congestion- | in a predictable way, and if it would be, then non-congestion- | |||
controlled mode use should be considered instead. | controlled mode use should be considered instead. | |||
9. References | 9. References | |||
9.1. Normative References | 9.1. Normative References | |||
[RFC2119] Bradner, S. and RFC Publisher, "Key words for use in RFCs | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
to Indicate Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
<https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
[RFC4303] Kent, S. and RFC Publisher, "IP Encapsulating Security | [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", | |||
Payload (ESP)", RFC 4303, DOI 10.17487/RFC4303, December | RFC 4303, DOI 10.17487/RFC4303, December 2005, | |||
2005, <https://www.rfc-editor.org/info/rfc4303>. | <https://www.rfc-editor.org/info/rfc4303>. | |||
[RFC7296] Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., Kivinen, | [RFC7296] Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., and T. | |||
T., and RFC Publisher, "Internet Key Exchange Protocol | Kivinen, "Internet Key Exchange Protocol Version 2 | |||
Version 2 (IKEv2)", STD 79, RFC 7296, | (IKEv2)", STD 79, RFC 7296, DOI 10.17487/RFC7296, October | |||
DOI 10.17487/RFC7296, October 2014, | 2014, <https://www.rfc-editor.org/info/rfc7296>. | |||
<https://www.rfc-editor.org/info/rfc7296>. | ||||
[RFC8174] Leiba, B. and RFC Publisher, "Ambiguity of Uppercase vs | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
DOI 10.17487/RFC8174, May 2017, | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
<https://www.rfc-editor.org/info/rfc8174>. | ||||
9.2. Informative References | 9.2. Informative References | |||
[AppCrypt] Schneier, B., "Applied Cryptography: Protocols, | [AppCrypt] Schneier, B., "Applied Cryptography: Protocols, | |||
Algorithms, and Source Code in C", 1996. | Algorithms, and Source Code in C", 1996. | |||
[IPSECME-MIB-IPTFS] | [RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791, | |||
Fedyk, D. and E. Kinzie, "Definitions of Managed Objects | DOI 10.17487/RFC0791, September 1981, | |||
for IP Traffic Flow Security", Work in Progress, Internet- | ||||
Draft, draft-ietf-ipsecme-mib-iptfs-11, 21 October 2022, | ||||
<https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme- | ||||
mib-iptfs-11>. | ||||
[RFC0791] Postel, J. and RFC Publisher, "Internet Protocol", STD 5, | ||||
RFC 791, DOI 10.17487/RFC0791, September 1981, | ||||
<https://www.rfc-editor.org/info/rfc791>. | <https://www.rfc-editor.org/info/rfc791>. | |||
[RFC1191] Mogul, J., Deering, S., and RFC Publisher, "Path MTU | [RFC1191] Mogul, J. and S. Deering, "Path MTU discovery", RFC 1191, | |||
discovery", RFC 1191, DOI 10.17487/RFC1191, November 1990, | DOI 10.17487/RFC1191, November 1990, | |||
<https://www.rfc-editor.org/info/rfc1191>. | <https://www.rfc-editor.org/info/rfc1191>. | |||
[RFC2474] Nichols, K., Blake, S., Baker, F., Black, D., and RFC | [RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black, | |||
Publisher, "Definition of the Differentiated Services | "Definition of the Differentiated Services Field (DS | |||
Field (DS Field) in the IPv4 and IPv6 Headers", RFC 2474, | Field) in the IPv4 and IPv6 Headers", RFC 2474, | |||
DOI 10.17487/RFC2474, December 1998, | DOI 10.17487/RFC2474, December 1998, | |||
<https://www.rfc-editor.org/info/rfc2474>. | <https://www.rfc-editor.org/info/rfc2474>. | |||
[RFC2914] Floyd, S. and RFC Publisher, "Congestion Control | [RFC2914] Floyd, S., "Congestion Control Principles", BCP 41, | |||
Principles", BCP 41, RFC 2914, DOI 10.17487/RFC2914, | RFC 2914, DOI 10.17487/RFC2914, September 2000, | |||
September 2000, <https://www.rfc-editor.org/info/rfc2914>. | <https://www.rfc-editor.org/info/rfc2914>. | |||
[RFC3168] Ramakrishnan, K., Floyd, S., Black, D., and RFC Publisher, | [RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition | |||
"The Addition of Explicit Congestion Notification (ECN) to | of Explicit Congestion Notification (ECN) to IP", | |||
IP", RFC 3168, DOI 10.17487/RFC3168, September 2001, | RFC 3168, DOI 10.17487/RFC3168, September 2001, | |||
<https://www.rfc-editor.org/info/rfc3168>. | <https://www.rfc-editor.org/info/rfc3168>. | |||
[RFC4301] Kent, S., Seo, K., and RFC Publisher, "Security | [RFC4301] Kent, S. and K. Seo, "Security Architecture for the | |||
Architecture for the Internet Protocol", RFC 4301, | Internet Protocol", RFC 4301, DOI 10.17487/RFC4301, | |||
DOI 10.17487/RFC4301, December 2005, | December 2005, <https://www.rfc-editor.org/info/rfc4301>. | |||
<https://www.rfc-editor.org/info/rfc4301>. | ||||
[RFC4342] Floyd, S., Kohler, E., Padhye, J., and RFC Publisher, | [RFC4342] Floyd, S., Kohler, E., and J. Padhye, "Profile for | |||
"Profile for Datagram Congestion Control Protocol (DCCP) | Datagram Congestion Control Protocol (DCCP) Congestion | |||
Congestion Control ID 3: TCP-Friendly Rate Control | Control ID 3: TCP-Friendly Rate Control (TFRC)", RFC 4342, | |||
(TFRC)", RFC 4342, DOI 10.17487/RFC4342, March 2006, | DOI 10.17487/RFC4342, March 2006, | |||
<https://www.rfc-editor.org/info/rfc4342>. | <https://www.rfc-editor.org/info/rfc4342>. | |||
[RFC4821] Mathis, M., Heffner, J., and RFC Publisher, "Packetization | [RFC4821] Mathis, M. and J. Heffner, "Packetization Layer Path MTU | |||
Layer Path MTU Discovery", RFC 4821, DOI 10.17487/RFC4821, | Discovery", RFC 4821, DOI 10.17487/RFC4821, March 2007, | |||
March 2007, <https://www.rfc-editor.org/info/rfc4821>. | <https://www.rfc-editor.org/info/rfc4821>. | |||
[RFC5348] Floyd, S., Handley, M., Padhye, J., Widmer, J., and RFC | [RFC5348] Floyd, S., Handley, M., Padhye, J., and J. Widmer, "TCP | |||
Publisher, "TCP Friendly Rate Control (TFRC): Protocol | Friendly Rate Control (TFRC): Protocol Specification", | |||
Specification", RFC 5348, DOI 10.17487/RFC5348, September | RFC 5348, DOI 10.17487/RFC5348, September 2008, | |||
2008, <https://www.rfc-editor.org/info/rfc5348>. | <https://www.rfc-editor.org/info/rfc5348>. | |||
[RFC6040] Briscoe, B. and RFC Publisher, "Tunnelling of Explicit | [RFC6040] Briscoe, B., "Tunnelling of Explicit Congestion | |||
Congestion Notification", RFC 6040, DOI 10.17487/RFC6040, | Notification", RFC 6040, DOI 10.17487/RFC6040, November | |||
November 2010, <https://www.rfc-editor.org/info/rfc6040>. | 2010, <https://www.rfc-editor.org/info/rfc6040>. | |||
[RFC7120] Cotton, M. and RFC Publisher, "Early IANA Allocation of | [RFC7120] Cotton, M., "Early IANA Allocation of Standards Track Code | |||
Standards Track Code Points", BCP 100, RFC 7120, | Points", BCP 100, RFC 7120, DOI 10.17487/RFC7120, January | |||
DOI 10.17487/RFC7120, January 2014, | 2014, <https://www.rfc-editor.org/info/rfc7120>. | |||
<https://www.rfc-editor.org/info/rfc7120>. | ||||
[RFC7510] Xu, X., Sheth, N., Yong, L., Callon, R., Black, D., and | [RFC7510] Xu, X., Sheth, N., Yong, L., Callon, R., and D. Black, | |||
RFC Publisher, "Encapsulating MPLS in UDP", RFC 7510, | "Encapsulating MPLS in UDP", RFC 7510, | |||
DOI 10.17487/RFC7510, April 2015, | DOI 10.17487/RFC7510, April 2015, | |||
<https://www.rfc-editor.org/info/rfc7510>. | <https://www.rfc-editor.org/info/rfc7510>. | |||
[RFC7893] Stein, Y., Black, D., Briscoe, B., and RFC Publisher, | [RFC7893] Stein, Y., Black, D., and B. Briscoe, "Pseudowire | |||
"Pseudowire Congestion Considerations", RFC 7893, | Congestion Considerations", RFC 7893, | |||
DOI 10.17487/RFC7893, June 2016, | DOI 10.17487/RFC7893, June 2016, | |||
<https://www.rfc-editor.org/info/rfc7893>. | <https://www.rfc-editor.org/info/rfc7893>. | |||
[RFC8084] Fairhurst, G. and RFC Publisher, "Network Transport | [RFC8084] Fairhurst, G., "Network Transport Circuit Breakers", | |||
Circuit Breakers", BCP 208, RFC 8084, | BCP 208, RFC 8084, DOI 10.17487/RFC8084, March 2017, | |||
DOI 10.17487/RFC8084, March 2017, | ||||
<https://www.rfc-editor.org/info/rfc8084>. | <https://www.rfc-editor.org/info/rfc8084>. | |||
[RFC8126] Cotton, M., Leiba, B., Narten, T., and RFC Publisher, | [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for | |||
"Guidelines for Writing an IANA Considerations Section in | Writing an IANA Considerations Section in RFCs", BCP 26, | |||
RFCs", BCP 26, RFC 8126, DOI 10.17487/RFC8126, June 2017, | RFC 8126, DOI 10.17487/RFC8126, June 2017, | |||
<https://www.rfc-editor.org/info/rfc8126>. | <https://www.rfc-editor.org/info/rfc8126>. | |||
[RFC8200] Deering, S., Hinden, R., and RFC Publisher, "Internet | [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | |||
Protocol, Version 6 (IPv6) Specification", STD 86, | (IPv6) Specification", STD 86, RFC 8200, | |||
RFC 8200, DOI 10.17487/RFC8200, July 2017, | DOI 10.17487/RFC8200, July 2017, | |||
<https://www.rfc-editor.org/info/rfc8200>. | <https://www.rfc-editor.org/info/rfc8200>. | |||
[RFC8201] McCann, J., Deering, S., Mogul, J., Hinden, R., Ed., and | [RFC8201] McCann, J., Deering, S., Mogul, J., and R. Hinden, Ed., | |||
RFC Publisher, "Path MTU Discovery for IP version 6", | "Path MTU Discovery for IP version 6", STD 87, RFC 8201, | |||
STD 87, RFC 8201, DOI 10.17487/RFC8201, July 2017, | DOI 10.17487/RFC8201, July 2017, | |||
<https://www.rfc-editor.org/info/rfc8201>. | <https://www.rfc-editor.org/info/rfc8201>. | |||
[RFC8229] Pauly, T., Touati, S., Mantha, R., and RFC Publisher, "TCP | [RFC8546] Trammell, B. and M. Kuehlewind, "The Wire Image of a | |||
Encapsulation of IKE and IPsec Packets", RFC 8229, | Network Protocol", RFC 8546, DOI 10.17487/RFC8546, April | |||
DOI 10.17487/RFC8229, August 2017, | 2019, <https://www.rfc-editor.org/info/rfc8546>. | |||
<https://www.rfc-editor.org/info/rfc8229>. | ||||
[RFC8546] Trammell, B., Kuehlewind, M., and RFC Publisher, "The Wire | [RFC8899] Fairhurst, G., Jones, T., Tüxen, M., Rüngeler, I., and T. | |||
Image of a Network Protocol", RFC 8546, | Völker, "Packetization Layer Path MTU Discovery for | |||
DOI 10.17487/RFC8546, April 2019, | Datagram Transports", RFC 8899, DOI 10.17487/RFC8899, | |||
<https://www.rfc-editor.org/info/rfc8546>. | September 2020, <https://www.rfc-editor.org/info/rfc8899>. | |||
[RFC8899] Fairhurst, G., Jones, T., Tüxen, M., Rüngeler, I., Völker, | [RFC9329] Pauly, T. and V. Smyslov, "TCP Encapsulation of Internet | |||
T., and RFC Publisher, "Packetization Layer Path MTU | Key Exchange Protocol (IKE) and IPsec Packets", RFC 9329, | |||
Discovery for Datagram Transports", RFC 8899, | DOI 10.17487/RFC9329, November 2022, | |||
DOI 10.17487/RFC8899, September 2020, | <https://www.rfc-editor.org/info/rfc9329>. | |||
<https://www.rfc-editor.org/info/rfc8899>. | ||||
[RFC9348] Fedyk, D. and C. Hopps, "A YANG Data Model for IP Traffic | [RFC9348] Fedyk, D. and C. Hopps, "A YANG Data Model for IP Traffic | |||
Flow Security", RFC 9348, DOI 10.17487/RFC9348, December | Flow Security", RFC 9348, DOI 10.17487/RFC9348, January | |||
2022, <https://www.rfc-editor.org/info/rfc9348>. | 2023, <https://www.rfc-editor.org/info/rfc9348>. | |||
[RFC9349] Fedyk, D. and E. Kinzie, "Definitions of Managed Objects | ||||
for IP Traffic Flow Security", RFC 9349, | ||||
DOI 10.17487/RFC9349, January 2023, | ||||
<https://www.rfc-editor.org/info/rfc9349>. | ||||
Appendix A. Example of an Encapsulated IP Packet Flow | Appendix A. Example of an Encapsulated IP Packet Flow | |||
Below, an example inner IP packet flow within the encapsulating | Below, an example inner IP packet flow within the encapsulating | |||
tunnel packet stream is shown. Notice how encapsulated IP packets | tunnel packet stream is shown. Notice how encapsulated IP packets | |||
can start and end anywhere, and more than one or less than one may | can start and end anywhere, and more than one or less than one may | |||
occur in a single encapsulating packet. | occur in a single encapsulating packet. | |||
Offset: 0 Offset: 100 Offset: 2000 Offset: 600 | Offset: 0 Offset: 100 Offset: 2000 Offset: 600 | |||
[ ESP1 (1404) ][ ESP2 (1404) ][ ESP3 (1404) ][ ESP4 (1404) ] | [ ESP1 (1404) ][ ESP2 (1404) ][ ESP3 (1404) ][ ESP4 (1404) ] | |||
End of changes. 30 change blocks. | ||||
98 lines changed or deleted | 88 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |