<?xml version="1.0" encoding="US-ASCII"?>
<!-- This template is for creating an Internet Draft using xml2rfc,
    which is available here: http://xml.resource.org. -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC2629 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2629.xml">
<!ENTITY RFC3552 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3552.xml">
<!ENTITY RFC5226 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5226.xml">
<!ENTITY RFC2474 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2474.xml">
<!ENTITY RFC7223 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7223.xml">
<!ENTITY RFC7224 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7224.xml">
<!ENTITY RFC7277 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7277.xml">
<!ENTITY RFC7317 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7317.xml">
<!ENTITY RFC0854 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.0854.xml">
<!ENTITY RFC4253 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4253.xml">
<!ENTITY RFC6241 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6241.xml">
<!ENTITY RFC1918 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.1918.xml">
<!ENTITY RFC5424 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5424.xml">
<!ENTITY RFC7922 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7922.xml">
<!ENTITY RFC6177 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6177.xml">
<!ENTITY RFC7217 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7217.xml">
<!ENTITY RFC7527 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7527.xml">
<!ENTITY RFC1122 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.1122.xml">
<!ENTITY RFC3719 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3719.xml">
<!ENTITY RFC0792 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.0792.xml">
<!ENTITY RFC4443 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4443.xml">
]>

<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<?rfc strict="yes" ?>
<?rfc toc="yes"?>
<?rfc tocdepth="4"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes" ?>
<?rfc compact="yes" ?>
<?rfc subcompact="no" ?>
<rfc category="info" docName="draft-ali-ipv6rtr-reqs-00" ipr="trust200902">

<!-- ***** FRONT MATTER ***** -->

<front>

<title>Requirements for IPv6 Routers</title>

<author initials='Z.' surname='Kahn' fullname='Zaid Ali Kahn'>
<organization>LinkedIn</organization>
<address>
<postal>
<street>xxx</street>
<city>xxx</city>
<region>CA</region>
<code>xxx</code>
<country>USA</country>
</postal>
<email>zaid@linkedin.com</email>
</address>
</author>

<author initials='J.' surname='Brzozowski' fullname='John Brzozowski'>
<organization>Comcast</organization>
<address>
<postal>
<street>xxx</street>
<city>xxx</city>
<region>xxx</region>
<code>xxx</code>
<country>USA</country>
</postal>
<email>John_Brzozowski@comcast.com</email>
</address>
</author>

<author initials='R.' surname='White' fullname='Russ White'>
<organization>LinkedIn</organization>
<address>
<postal>
<street>144 Warm Wood Lane</street>
<city>Apex</city>
<region>NC</region>
<code>27539</code>
<country>USA</country>
</postal>
<email>russ@riw.us</email>
</address>
</author>

<date/>

<abstract>
<t>An example.</t>
</abstract>

</front>

<middle>

<section title="Introduction" toc="default">

<t>This memo defines and discusses requirements for devices that perform forwarding for Internet Protocol version 6 (IPv6). This can include (but is not limited to) the devices described below.</t>

<t>
<list style="symbols">
<t>Devices which are primarily designed to forward traffic between multiple interfaces. These are normally referred to by the Internet community as routers or, in some cases, intermediate systems.</t>
<t>Devices which are designed to modify packets rather than "just" forwarding them. These are often referred to by the Internet community as middle boxes.</t>
</list>
</t>

<t>Readers should recognize that while this memo applies to IPv6, devices processing IPv6 packets will often also process IPv4 packets, forward based on MPLS labels, and potentially process many other protocols. This memo will only interact with IPv4, MPLS, and other protocols as they impact the behavior of an IPv6 forwarding device; no attempt is made to specify requirements for protocols other than IPv6.</t>

<t>The reader should, therefore, not count on this document as a "sole source of truth," but rather use this document as a guide.</t>

<t>This document is broken into the following sections: a review of Internet architecture and principles, requirements relating to device management, requirements related to telemetry, requirements related to IPv6 forwarding and addressing, and future considerations. Following these sections, a short conclusion is provided for review.</t>

</section> <!-- End of the introduction section -->

<!-- major section -->
<section title="Review of the Internet Architecture" toc="default">

<t>The Internet relies or interacts with a number of basic concepts and considerations. These concepts are not explicitly called out in any specification, nor do they necessarily impact protocol design or packet forwarding directly. This section provides an overview of these concepts and considerations to help the reader understand the larger context of this document.</t>

<section title="Robustness Principle" toc="default">

<t>Every point where multiple protocols, or multiple implementations of the same protocol, interact, is an interaction surface that can threaten the robustness of the overall system. While it may seem the global Internet has achieved a level of stability that makes it immune to such considerations, the reality is every network is a complex system, and is therefore subject to massive non repeatable unanticipated failures. Postel's Robustness Principle countered this problem with a simple statement: <xref target="RFC7922">"Be conservative in what you do, and liberal in what you accept from others."</xref></t>

<t>However, since this time, it has been noted that following this law allows errors in protocols to accumulate over time, with overall negative effects on the system as a whole. <xref target="RFC1918">RFC1918</xref> describes several points in conjunction with this principle that bear updating based on further experience with large scale protocol and network deployments within the Internet community, including:</t>

<t>
<list style="symbols">
<t>Software should be written to deal with error states gracefully. Software should not degrade in a way that will cause the failure of adjacent systems when possible. For instance, when a routing protocol implementation fails, it should not do so in a way that will cause the spreading of or continued existence of false reachability information, nor should it fail in a way that overloads adjacent routers or interacting protocols and causing a cascading failure.</t>
<t>It is best to assume the network is filled with poor implementations and malevolent actors, both of which will find every possible failure mode over time.</t>
<t>It is best to assume every technology will be used to the limits of its technical capabilities, rather than assuming a particular protocol's scope of use will align (in any way) with the intent of the original designer(s). Successful implementations attract more functionality, much like a few nodes in a scale free graph eventually become connectivity hubs.</t>
<t>Protocols and implementations change over time. A corollary of the assumption that protocols will be used until they reach their technical limits rather than staying within a tightly scoped purpose, is that protocols will change over time as they gain new functionality. Protocol and implementation design should take into account use cases that have not yet been thought of by building flexibility into protocols.</t>
<t>Obscure, but legal, protocol features are often ignored or left unimplemented. It is important to work within the bounds of what is actually implemented in any given protocol, and to leave corner cases for another day. It is never helpful to boil the ocean whether in a design, an implementation, or a protocol.</t>
</list>
</t>

</section> <!-- end of robustness principle section -->
<section title="Complexity Principle" toc="default">

<t>The simplest and most obvious solution to any problem is often easy to design, deploy, and manage. It's also often wrong and/or broken. As much as developers, designers, and operators might like to make things as simple as possible, hard problems require complex solutions. This leads to the following observations.</t>

<t>Elegance is the ultimate goal. Rather than seeking out simple solutions because they are simple, seek out solutions that will solve the problem in the simplest way possible. Often this will require seeing the problem from different angles, trying to break the problem up in multiple ways, and trying, abandoning, and rebuilding ideas and implementations until a better way is found.</t>

<t>There are always tradeoffs. For any protocol, network, or operational design decision, there will a tradeoff between at least two competing goals. If some problem appears to have a single solution with not tradeoffs, this doesn't mean the tradeoffs don't exist. Rather, it means the tradeoffs haven't been discovered yet.</t>

</section> <!-- end of complexity principle section -->
<section title="Layered Structure" toc="default">

<t>The Internet data plane is organized around broad top and bottom layers, and much thinner middle layer. This is illustrated in the figure below.</t>

<figure align="center" anchor="layering-model">
<artwork align="left"><![CDATA[
\                         /
 \ HTTP, FTP, SNMP, ETC. /
  \                     /
    \     TCP, UDP    /
     \               /
       \    IPv6   /
       /   (MPLS)  \
     /               \
    /                 \
  /  Ethernet, Wireless \
 /    Physical Media     \
/                         \
]]></artwork>
</figure>

<t>This layering emulates or mirrors many naturally occurring systems, and is a common strategy for managing complexity. The single protocol in the center, IPv6, serves to separate the complexity of the lower layers from the complexity of the upper layers. This center layer of the Internet ecosystem has traditionally been called the Network Layer, in reference to the <xref target="DoD" pageno="false" format="default">Department of Defense (DoD)</xref> and <xref target="OSI" pageno="false" format="default">OSI models.</xref> The Internet ecosystem includes three different protocols in this central location.</t>

<t>
<list style="symbols">
<t>IPv4, an older network protocol that, it is anticipated, will be replaced over time as the Internet ecosystem standardizes on IPv6</t>
<t>IPv6, a newer network protocol that is being adopted</t>
<t>MPLS, or MultiProtocol Label Switching, which is often used as a data plane within an autonomous system</t>
</list>
</t>

<t>These protocols are often treated as if they exist in strict hierarchical layers with a well defined and followed Application Programming Interface (API), data models, Remote Procedure Calls (RPCs), sockets, etc. The reality, however, is there are often solid reasons for violating these layers, creating interaction surfaces that are often deeper than intended or understood without some experience. Beyond this, such layering mechanisms act as information abstractions. It is well known that all such abstractions leak. Because of these intentional and unintentional leakages of information, the interactions between protocols is often subtle.</t>

</section> <!-- end of layered structure section -->
<section title="Routers" toc="default">

<t>A router connects to two or more logical interfaces and at least one physical interface. A router processes packets by:</t>

<t>
<list style="symbols">
<t>Receiving a packet through an interface</t>
<t>Stripping the data link and/or physical header off the packet</t>
<t>Examining the packet for errors, information that must be handled locally, etc.</t>
<t>Looking up the destination in a local forwarding table</t>
<t>Rewriting the data link and/or physical layer header</t>
<t>Transmitting the packet out an interface</t>
</list>
</t>

<t>When consulting the forwarding table, the router searches for the longest prefix containing the destination address, and uses the information in the table to determine the next hop, or rather the next logically connected device to forward the packet to. The next hop will either be another router, which will presumably carry the packet closer to the final destination, or it will be the destination host itself. The following figure provides a conceptual model of a router; not all routers actually have this set of tables and interactions, and some have many more moving parts. This model is simply used as a common reference to promote understanding.</t>

<figure align="center" anchor="router-model">
<artwork align="left"><![CDATA[
+-------------+            +-------------+
| Candidate   |            | Startup     |
| Config      |<--+    +-->| Config      |
+--+----------+   |    |   +-------+-----+
   |              |    |           |
   v              |    |           v
+-----------------+----+-----------------+
| Running Configuration                  +------>----------+
+---+----------+----------+----------+---+                 |
    |          |          |          |                     |
    v          |          |          |                     |
+-------+      |          |          |                     |
| IS-IS |<-----------------------------------> Adjacent    |
+---+---+      v          |          |         Routers     |
    |      +-------+      |          |                     |
    |      |  BGP  |<------------------------> Peers       |
    |      +---+---+      v          |                     |
    |          |      +-------+      |                     |
    |          |      | OSPF  |<-------------> Adjacent    |
    |          |      +---+---+      v         Routers     |
    |          |          |      +-------+                 |
    |          |          |      | Other |                 |
    |          |          |      +---+---+                 |
    |          |          |          |                     |
+---+----------+----------+----------+---+                 |
| RIB Manager                            |                 |
+---+------------------------------------+                 |
    |                                                      |
+---+------------------------------------+                 |
| Routing Information Base (RIB)         |                 |
+---+------------------------------------+                 |
    |                                                      |
+---+------------------------------------+                 |
| Forwarding Information Base (FIB)      |                 |
+---+----------+---------------------+---+                 |
    |          |                     |                     |
+---+---+  +---+---+             +---+---+                 |
| Int 1 |  | Int 2 |     ...     | Int X | <---------------+
+-------+  +-------+             +-------+
    ^                                |
    |                                v
Packets In                       Packets Out
]]></artwork>
</figure>

</section> <!-- end of router section -->
</section> <!-- end of internet architecture review section -->

<!-- major section -->
<section title="Requirements Related to Device Management" toc="default">

<t>Network engineering began in the era of Command Line Interfaces (CLIs), and has generally stayed with these CLIs even as the Graphical User Interface (GUI) has become the standard way of interacting with almost every other computing device. Direct human interaction with networking devices in large scale and complex environments, however, tends to result in an unacceptably low Mean Time Between Mistakes (MTBM), directly impacting the overall availability of the network. In reaction to this, operators have increased their reliance on automation in deploying and configuring devices. This section considers the various components of device management.</t>

<section title="Configuration" toc="default">

<t>Configuration primarily relates to the startup, candidate, and running configurations in the router model shown above. In order to deploy networks at any scale, operators rely on automated management of network device configuration. This effort has traditional focused on Simple Network Management Protocol (SNMP) Management Information Base (MIBs). In the future, operators expect to move towards open source/open standards YANG models.</t>

<t>Network devices should place a priority on supporting machine readable Application Programming Interfaces (APIs), rather than human interaction, particularly interfaces that understand and accept configuration and other information carried in YANG models.</t>

<t>To support automated network device configuration, IPv6 routers and network devices SHOULD support YANG and SNMP configuration, including (but not limited to):</t>

<t>
<list style="symbols">
<t><xref target="OPENCONF" pageno="false" format="default">Openconfig models</xref> related to the protocols configured on the device, interface state, and device state</t>
<t><xref target="RFC7223" />: A YANG Data Model for Interface Management</t>
<t><xref target="RFC7224" />: IANA Interface Type YANG Module</t>
<t><xref target="RFC7277" />: A YANG Data Model for IP Management</t>
<t><xref target="RFC7317" />: A YANG Data Model for System Management</t>
<t>Simple Network Management Protocol (SNMP) MIBs as appropriate</t>
</list>
</t>

</section> <!-- end of configuration section -->
<section title="Device Access" toc="default">

<t>To operate a network at scale, operators rely on the ability to access a device to troubleshoot and gather state manually and programmatically through a number of different interfaces. These interfaces should provide current device configuration, current device state (such as interface state, packets drops, etc.), and current control plane contents (such as the RIB in the figure above). In other words, manual and programmable interfaces should provide information about the network device (the whole device stack).</t>

<t>To support automated state gathering and troubleshooting, routers supporting IPv6 SHOULD support:</t>

<t>
<list style="symbols">
<t>TELNET (<xref target="RFC0854" />): TELNET SHOULD be disabled by default, but should be available for operational purposes as required or as configured by the operator</t>
<t>SSH (<xref target="RFC4253" />): SSH SHOULD be the default access for IPv6 capable network devices</t>
<t>NETCONF (<xref target="RFC6241" />)</t>
<t>RESTCONF (<xref target="I-D.ietf-netconf-restconf" />)</t>
</list>
</t>

</section> <!-- end of device access section -->
<section title="Zero Touch Provisioning" toc="default">

<t>To operate a network at scale, operators rely on protocols and mechanisms that reduce provisioning time to a minimum. The preferred state is zero touch provisioning; plug a new network device in and it just works without any manual configuration. This is likely to be unattainable for some time yet to come, but coming closer to this ideal reduces MTBM and Operational Expenses (OPEX), both important goals in the real world.</t>

<t>To reach this goal, IPv6 network devices should support several standards, including, but not limited to:</t>

<t>
<list style="symbols">
<t><xref target="I-D.ietf-dhc-rfc3315bis" />: Dynamic Configuration Protocol for IPv6</t>
<t>SLAAC (<xref target="RFC7217" /> and <xref target="RFC7527" />): SLAAC SHOULD be enabled by default on all network device interfaces</t>
</list>
</t>

<t>(not certain SLAAC should be default, but I put it there for now)</t>

</section> <!-- end of ztp section -->
<section title="Device Protection against Denial of Service Attacks" toc="default">

<t>Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are unfortunately common in the Internet globally; these types of attacks cost network operators a great deal in opportunity and operational costs in prenvetion and responses. The network control plane, as well as protocols used to access the device. To provide for effective counters to DoS and DDoS attacks directly on network devices:</t>

<t>
<list style="symbols">
<t>Manufacturers and system integrators should test and clearly report the packet/traffic load handling capabilities of devices with and without various encryption methods enabled</t>
<t>Network devices should be able to police traffic destined to the control plane based on the rate of traffic received</t>
<t>Ideally, network devices should be able to police traffic destined to the control plane based on best practice host based firewall techniques</t>
</list>
</t>

</section> <!-- end of device level protection against DoS attacks section -->
</section> <!-- end of device management section -->

<!-- major section -->
<section title="Requirements Related to Telemetry" toc="default">

<t>Telemetry relates to information devices push to systems used to monitor and track the state of the network. This applies to individual devices as well as the network as a system. There are three broad categories of telemetry: device state, topology state, and flow state. These three roughly correspond to the management plane, the control plane, and the forwarding plane of the network. Each of the sections below considers one of these three telemetry types.</t>

<section title="Device Status and Error Logging" toc="default">

<t>IPv6 network devices should be able to report errors and status changes in a number of different formats. The supported formats should focus on machine readability, rather than human readability. Specifically, IPv6 network devices SHOULD support:</t>

<t>
<list style="symbols">
<t>NETCONF/RESTCONF transporting telemetry formatted according to YANG (see above)</t>
<t><xref target="RFC5424">Syslog (RFC5424)</xref></t>
<t>SNMP as appropriate</t>
</list>
</t>

<t>NETCONF/RESTCONF transporting telemetry formatted according to YANG should be the current focus of development for vendor provided and open source software; ideally, the entire network could be monitored using a single modeling language to ease implementation of telemetry systems and increase the pace at which new software can be deployed in production environments.</t>

</section> <!-- end of device status section -->

<section title="Network Topology and Traceability" toc="default">

<t>IPv6 network devices are part of a system of devices that, combined, make up the entire network. Viewing the network as a system is often crucial for operational purposes, such as understanding flows, tracing changes in the topology, utilization, and other factors over time. To support systemic monitoring of the network topology, IPv6 devices SHOULD support at least:</t>

<t>
<list style="symbols">
<t><xref target="RFC5424" />: North-Bound Distribution of Link-State and Traffic Engineer (TE) Information using BGP</t>
<t><xref target="I-D.ietf-i2rs-yang-l2-network-topology" />: An I2RS model for layer 2 topologies</t>
<t><xref target="I-D.ietf-i2rs-yang-l3-topology" />: An I2RS model for layer 3 topologies</t>
<t><xref target="I-D.ietf-i2rs-yang-network-topo" />: A Data Model for Network Topologies</t>
</list>
</t>

<t>(More to be added)</t>

</section> <!-- end of topology section -->
<section title="Traffic Flow and Traceability" toc="default">

<t>(To be added)</t>

</section> <!-- end of traffic flow section -->
</section> <!-- end of telemetry section -->

<section title="Requirements Related to IPv6 Forwarding and Addressing" toc="default">

<t>There are a number of capabilities that a device should have to be deployed into an IPv6 network, and several forwarding plane considerations operators and vendors need to bear in mind. The sections below explain these considerations.</t>

<section title="The IPv6 Address is not a Host Identifier" toc="default">

<t>The IPv6 address is commonly treated as a host identifier; it is not. Rather, it is an interface identifier that describes the topological point where a particular host connects to the Internet. It is generally harmful to embed IPv6 addresses inside upper layer headers to identify a particular host.</t>

</section> <!-- end of IPv6 address is not a host identifier -->
<section title="Router Handling of IPv6 Addresses" toc="default">

<t>Internet Routing Registries may allocate a network operator a wide range of prefix lengths (see <xref target="RFC6177">RFC6177</xref> for further information). Within this allocation, network operators will often suballocate address space along nibble boundaries (/48, /52, /56, /60, and /64) for ease of configuration and management. Several common practices are:</t>

<t>
<list style="symbols">
<t>Each multiaccess interface is allocated a /64</t>
<t>Point-to-point links are allocated a /64, but may be addressed with a longer prefix length to prevent certain kinds of denial of service attacks</t>
<t>Although aggregation may only performed to the nibble boundaries noted above, variances are possible</t>
<t>Loopback addresses are assigned a /128</t>
</list>
</t>

<t>Given these common practices, routers designed to run IPv6 SHOULD support the following addressing conventions:</t>

<t>
<list style="symbols">
<t>The default prefix length on any interface other than a loopback SHOULD be a /64</t>
<t>Configuring a prefix length longer than a /64 on any interface not configured as a point-to-point should require additional configuration steps to prevent manual configuration errors</t>
<t>Network devices SHOULD NOT assume IPv6 prefix lengths only on nibble boundaries, but rather should support any prefix length shorter than the /64, /128, and longer prefixes used for point-to-point interfaces</t>
<t>Loopback interfaces SHOULD default to a /128 prefix length unless some additional configuration is undertaken to override this default setting</t>
</list>
</t>

</section> <!-- end of router handling of IPv6 addresses -->
<section title="Maximum Transmission Unit and Jumbo Frames" toc="default">

<t>The long history of the Maximum Transmission Unit (MTU) in networks is not a happy one. Specific problems with MTU sizing include:</t>

<t>
<list style="symbols">
<t>Many different default sizes on different media types, from very small (576 bytes on X.25) to very large (17914 bytes on 16Mbps Token Ring)</t>
<t>Many different ways to calcualte the MTU on any given link; for instance a 9000 byte MTU can be calculated as 8184 bytes on one operating system, 8972 on another, and 9000 on a third</t>
<t>The increasing use of tunnel encapsulations in the network; for instance MPLS over GRE over IP over...</t>
<t>The wide variety of default MTUs across many different end hosts and operating systems</t>
<t>The general ineffectiveness of path MTU discovery to operate correctly in the face of packet filters and rate limiters</t>
<t>Lower speed links at the network edge which require a lot of time to serialize a packet with a large MTU</t>
<t>Increased jitter caused by increasing the disparity between large and small packet size across a lower bandwidth links</t>
</list>
</t>

<t>The final point requires some further elucidation. The time required to serialize various packets at various speeds areL</t>

<t>
<list style="symbols">
<t>64 byte packet onto a 10Mb/s link: .5ms</t>
<t>1500 byte packet onto a 10Mb/s link: 1.2ms</t>
<t>9000 byte packet onto a 10Mb/s link: 7.2ms</t>
<t>64 byte packet onto a 100Mb/s link: .05ms</t>
<t>1500 byte packet onto a 100Mb/s link: .12ms</t>
<t>9000 byte packet onto a 100Mb/s link: .72ms</t>
</list>
</t>

<t>A 64 byte packet trapped behind a single 1500 byte packet on a 10Mb/s link suffers 1.7ms of serialization delay. Each additional 1500 byte packet added to the queue in front of the 64 byte packet adds and addtional 1.2ms of delay. In contrast, a 64 byte packet trapped behind a single 9000 byte packet on a 10Mb/s link suffers 7.7ms of serialization delay. Each additional 9000 byte packet added to the queue adds an additional 7.2ms of serialization delay. The practical result is that larger MTU sizes on lower speed links can add a significant amount of delay and jitter into a flow. On the other hand, increasing the MTU on higher speed links appears to add megligable additional delay and jitter.</t>

<t>The result is that it costs less in terms of overall systemic performance to use higher MTUs on higher speed links than on lower speed links. Based on this, increasing the MTU across any particular link may not increase overall end-to-end performance, but can greatly enhance the performance of local applications (such as a local BGP peering session, or a large/long standing elephant flow used to transfer data across a local fabric), while also providing room for tunnel encapsulations to be added with less impact on lower MTU end systems.</t>

<t>The general rule of thumb is to assume the largest size MTU should be used on higher speed transit only links in order to support a wide array of available link sizes, default MTUs, and tunnel encapsulations. Routers designed for a network or data center core SHOULD support at least 9000 byte MTUs on all interfaces. MTU detection mechanisms, such as <xref target="RFC7922">IS-IS hello padding,</xref> SHOULD be enabled to ensure correct point-to-point MTU configuration.</t>

</section> <!-- end of MTU section -->
<section title="ICMP Considerations" toc="default">

<t>Internet Control Message Protocool (ICMP) is described in <xref target="RFC0792" /> and <xref target="RFC4443" />. ICMP is often used to perform a traceroute through a network (normally by using a TTL expired ICMP message), for Path MTU discovery, and, in IPv6, for autoconfiguration and neighbor discovery. ICMP is often blocked by middle boxes of various kinds and/or ICMP filters configured on the ingress edge of a provider network. Routers implementing IPv6 SHOULD:</t>

<t>
<list style="symbols">
<t>NOT filter ICMP by default, as this has negative impacts on many aspects of IPv6 operation, particularly path MTU</t>
<t>Rate limit the generation of ICMP messages relative to the ability of the device to generate packets and to block the use of ICMP packets being used as part of a distributed denial of service attack</t>
<t>Implement the filtering suggestions in <xref target="I-D.gont-opsec-icmp-ingress-filtering" /></t>
</list>
</t>

</section> <!-- end of icmp considerations section -->
<section title="Machine Access to the Forwarding Table" toc="default">

<t>In order to support treating the "network as a whole" as a single programmable system, it is important for each network device have the ability to directly program forwarding information. This programmatic interface allows controllers, which are programmed to support specific business logic and applications, to modify and filter traffic flows without interfering with the distributed control plane. While there are several programmatic interfaces available, this document suggests that the I2RS interface to the RIB be supported in all IPv6 network devices. Specifically, these drafts should be supported to enable network programmability:</t>

<t>
<list style="symbols">
<t><xref target="I-D.ietf-i2rs-fb-rib-data-model" />: Filter-Based RIB Data Model</t>
<t><xref target="I-D.ietf-i2rs-fb-rib-info-model" />: Filter-Based RIB Information Model</t>
<t><xref target="I-D.ietf-i2rs-rib-data-model" />: A YANG Data Model for Routing Information Base (RIB)</t>
<t><xref target="RFC7922" />: I2RS Traceability</t>
</list>
</t>

</section> <!-- end of machine rib access section -->
<section title="Processing IPv6 Extension Headers" toc="default">

<t>(To be added)</t>

</section> <!-- end of extension headers section -->
<section title="IPv6 Only Forwarding" toc="default">

<t>(To be added)</t>

</section> <!-- end of ipv6 only forwarding section -->
</section> <!-- end of IPv6 forwarding section -->

<!-- major section -->
<section title="Future Considerations" toc="default">

<t>(To be added)</t>

<section title="Segment Routing" toc="default">

<t>(To be added)</t>

</section> <!-- end of segment routing section -->

</section> <!-- end future considerations -->

<section title="Security Considerations" toc="default">



<t>(To be added)</t>

</section> <!-- end of security considerations -->


<section title="Conclusion" toc="default">

<t>(To be added)</t>

</section> <!-- end of conclusion -->

</middle>

<back>

<references title="Normative References">
<!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml"?-->
&RFC2119;

</references>

<references title="Informative References">

<reference anchor="OPENCONF" target='https://github.com/openconfig/public/tree/master/release'>
<front>
<title>Openconfig release YANG models</title>
<author>
<organization>OpenConfig</organization>
</author>
<date year="2016" />
</front>
</reference>

<reference anchor="DoD" target='https://en.wikipedia.org/wiki/Internet_protocol_suite'>
<front>
<title>The Internet Protocol Suite</title>
<author>
<organization>Wikipedia</organization>
</author>
<date year="2016" />
</front>
</reference>

<reference anchor="OSI" target='https://en.wikipedia.org/wiki/OSI_model'>
<front>
<title>OSI Model</title>
<author>
<organization>Wikipedia</organization>
</author>
<date year="2016" />
</front>
</reference>

&RFC2629;
&RFC2474;
&RFC7223;
&RFC7224;
&RFC7277;
&RFC7317;
&RFC0854;
&RFC4253;
&RFC6241;
&RFC1918;
&RFC5424;
&RFC7922;
&RFC6177;
&RFC7217;
&RFC7527;
&RFC1122;
&RFC0792;
&RFC4443;
<?rfc include="reference.I-D.ietf-netconf-restconf.xml"?>
<?rfc include="reference.I-D.ietf-i2rs-fb-rib-data-model.xml"?>
<?rfc include="reference.I-D.ietf-i2rs-fb-rib-info-model.xml"?>
<?rfc include="reference.I-D.ietf-i2rs-rib-data-model.xml"?>
<?rfc include="reference.I-D.ietf-dhc-rfc3315bis.xml"?>
<?rfc include="reference.I-D.ietf-i2rs-yang-l2-network-topology.xml"?>
<?rfc include="reference.I-D.ietf-i2rs-yang-l3-topology.xml"?>
<?rfc include="reference.I-D.ietf-i2rs-yang-network-topo.xml"?>
<?rfc include="http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.draft-gont-opsec-icmp-ingress-filtering-02.xml"?>

</references> <!-- end of informative references -->

</back>
</rfc>
