Internet DRAFT - draft-nishizuka-cgn-deployment-considerations
draft-nishizuka-cgn-deployment-considerations
Network Working Group K. Nishizuka
Internet-Draft NTT Communications
Intended status: Informational D. Natsume
Expires: April 1, 2014 NTT Neomeit
Sep 28, 2013
Carrier-Grade-NAT (CGN) Deployment Considerations.
draft-nishizuka-cgn-deployment-considerations-01
Abstract
This document provides deployment considerations for Carrier-Grade-
NAT (CGN). Due to emerging new web technologies such as Websocket,
SPDY and HTTP2.0, the trend of the Internet traffic has been
changing. The number of sessions of commonly-used applications were
investigated to estimate the efficiency of IPv4 address sharing of
CGN. Based on the result of the average number of sessions of
subscribers, the verification of CGN was conducted in the large scale
network experiment environment with one million emulated subscribers.
It revealed that CGN can be used in more centralized location of a
provider's network and it arose many considerations.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on April 1, 2014.
Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
Nishizuka & Natsume Expires April 1, 2014 [Page 1]
Internet-Draft CGN Deployment Considerations Sep 2013
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Conventions used in this document . . . . . . . . . . . . . . 3
3. Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . 3
4. The number of sessions of applications . . . . . . . . . . . . 4
5. Feasibility of port assignment methods . . . . . . . . . . . . 6
5.1. Port assignment methods . . . . . . . . . . . . . . . . . 6
5.2. Efficiency of address saving . . . . . . . . . . . . . . . 6
5.3. Logging design . . . . . . . . . . . . . . . . . . . . . . 7
5.3.1. Amount of the NAT log . . . . . . . . . . . . . . . . 7
5.3.2. Necessity for destination information . . . . . . . . 9
6. Scalability of CGN . . . . . . . . . . . . . . . . . . . . . . 9
6.1. Performance of CGN . . . . . . . . . . . . . . . . . . . . 9
6.2. Redundancy features of CGN . . . . . . . . . . . . . . . . 11
6.3. DNS query traffic considerations . . . . . . . . . . . . . 12
6.4. Separation of traffic . . . . . . . . . . . . . . . . . . 13
7. Tested web sites and applications (Excerpts) . . . . . . . . . 13
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14
9. Security Considerations . . . . . . . . . . . . . . . . . . . 14
10. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 14
11. References . . . . . . . . . . . . . . . . . . . . . . . . . . 15
11.1. Normative References . . . . . . . . . . . . . . . . . . . 15
11.2. Informative References . . . . . . . . . . . . . . . . . . 15
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 16
Nishizuka & Natsume Expires April 1, 2014 [Page 2]
Internet-Draft CGN Deployment Considerations Sep 2013
1. Introduction
IP address sharing is tentative technic to deal with the shortage of
IPv4 addresses. As described in [RFC6269], IP address sharing causes
many issues such as application failures and security
vulnerabilities. A part of these issues is based on the assigned
number of sessions per user and port allocation method of CGN. How
many sessions are sufficient for users is one of the important
considerations. Moreover, the efficiency of CGN is based on the
average number of sessions of subscribers. To answer to these
points, this document lists the number of port consumption of major
application and web sites.
This document also describes the deployment considerations of CGN to
specify the optimum place according to CGN performance. CGN
performance was experimentally-verified with realistic traffic
generated by amount of emulated users.
The growth of IPv6 is continual solution of the shortage of IPv4
addresses and frees these issues. By adopting the combination of the
IPv4 shared address and native IPv6, the duty of CGN will decrease
and as the result, the bad effect on applications which are caused by
the limitation of available ports and address translation itself and
security vulnerability will be resolved. The most effective way of
deploying CGN is examined in this document. Further discussion about
the integration of CGN into the existing network is studied in
[I-D.ietf-opsawg-lsn-deployment].
2. Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC2119.
3. Motivation
With a progressive exhaustion of IPv4 addresses, the demands for
sharing IPv4 addresses with multiple customers are rapidly rising,
thus many proposals are getting much attention include Carrier Grade
NAT (CGN, or LSN for Large Scale NAT) [RFC6888], Dual-Stack Lite
[RFC6333], NAT64 [RFC6146], Address+Port (A+P) [RFC6346], 464XLAT
[RFC6877] and MAP [I-D.ietf-softwire-map]. The practical
configuration of these method is based on the same considerations as
follows:
Nishizuka & Natsume Expires April 1, 2014 [Page 3]
Internet-Draft CGN Deployment Considerations Sep 2013
- Stateful or Stateless
- Centralized or Distributed
- Dynamic port assignment or Static port assignment
- Log reduction strategy
- Security considerations
The best practice about these considerations should be derived from
realistic experiment because there are pros and cons. Though we
tested them in NAT444 environment, the result is applicable for other
approaches. The investigation of number of sessions is described in
this document and it can be also helpful for all of them.
4. The number of sessions of applications
The number of concurrent sessions of applications is important factor
of designing of CGN because there is trade-off between the efficiency
of IPv4 address saving and the availability of those applications.
In addition, for security and fairness, we should limit the number of
sessions per user. As described in [RFC6269], infected devices could
rapidly exhaust the available ports of global pool addresses, hence
all the rest of users could not through the CGN anymore. In order to
place the CGN to existing network, we should know how many sessions
are sufficient for every user. Here is a list of applications and
their average sessions. We selected and tested 50 sites from the
list of top sites and remarkable applications. For web browsing, We
used Chrome and Firefox which are capable of SPDY.
Nishizuka & Natsume Expires April 1, 2014 [Page 4]
Internet-Draft CGN Deployment Considerations Sep 2013
+-------------------------+----------+--------+--------+--------+
| Application | Total | TCP | TCP | UDP |
| | sessions | port80 | port443| port53 |
+-------------------------+----------+--------+--------+--------+
| Web mail | 65 | 35 | 30 | 20 |
| | | | | |
| Video | 83 | 77 | 6 | 20 |
| | | | | |
| Portal site | 47 | 47 | 0 | 13 |
| | | | | |
| EC site | 45 | 43 | 2 | 11 |
| | | | | |
| blog | 61 | 59 | 2 | 17 |
| | | | | |
| Search Engine | 8 | 8 | 0 | 4 |
| | | | | |
| Online Banking | 20 | 2 | 18 | 4 |
| | | | | |
| Cloud Service | 29 | 23 | 6 | 6 |
| | | | | |
| iTunes | 20 | 1 | 19 | 7 |
| | | | | |
| Twitter | 33 | 1 | 32 | 12 |
| | | | | |
| Twitter(mobile) | 14 | 2 | 11 | 3 |
| | | | | |
| facebook | 51 | 40 | 11 | 18 |
| | | | | |
| facebook(mobile) | 18 | 11 | 7 | 10 |
| | | | | |
| Game | 95 | 86 | 9 | 19 |
| | | | | |
+-------------------------+----------+--------+--------+--------+
Figure 1: The number of sessions of applications.
Figure 1
The number of sessions of these applications are up to 100 sessions.
There are no longer high-consumption applications. This observation
implies that modern applications such as facebook have changed to use
multiplexed requests. Previously, web technologies for achieving
high-performance access consumed many HTTP sessions. Now, current
cutting edge technologies such as WebSocket, SPDY and HTTP2.0 avoid
such an abusing. Basically, all the requests are multiplexed into
one TCP connection. However, a kind of game applications still
consume many sessions.
Nishizuka & Natsume Expires April 1, 2014 [Page 5]
Internet-Draft CGN Deployment Considerations Sep 2013
The last factor of the estimation of number of sessions is how many
applications are used simultaneously within a single CPE (Customer
Premises Equipment) which includes non-PC devices like gaming
devices. Our investigation shows that the average number of session
of active subscriber is 400. We daresay the limitation of 1000
sessions per user would not affect the most of users while preventing
the severe abuse from certain users.
5. Feasibility of port assignment methods
Basing on the investigation of the number of sessions of
applications, the realistic parameter of each port assignment method
was estimated by the verification.
5.1. Port assignment methods
The efficiency of IPv4 saving by CGN is highly depending on how to
allocate the ports of pool addresses to each users. There are 2
major methods: dynamic assignment and static assignment
[I-D.chen-sunset4-cgn-port-allocation]. There are combined problem
involving efficiency of address saving and logging information
reduction. Typical IP Network Address Translator (NAT)
[RFC2663][RFC2993] implementation uses dynamic assignment, so NAT444,
NAT64, DS-lite and 464XLAT are originally dynamic assignment
approach. To avoid the huge amount of information needed to be
recorded, those approaches have variations of static assignment
[I-D.donley-behave-deterministic-cgn] and MAP is inherently static
assignment approach. For taking advantage of both methods, the
hybrid method that is dynamic assignment of port ranges has been
implemented in some CGN. The merits of the port block assignment
have been referred in [RFC6346],
[I-D.donley-behave-deterministic-cgn] and
[I-D.chen-sunset4-cgn-port-allocation].
5.2. Efficiency of address saving
In the dynamic assignment, the ports of pool address are allocated
randomly for active users. This method can use pool addresses and
ports most effectively. The average number of port consumption (N)
per active subscriber is the key value for dynamic assignment. In
the verification, the average number of port consumption (N) was
estimated to be 400. At the same time, user-quota of 1000 sessions
was set to avoid the abuse. The percentage of the active subscribers
(a) was estimated to be 25% at the value during the busy hour of
traffic (21:00 pm to 1:00am). In this time, "active" subscriber
means who create a new session in certain period of time. Then, when
a CGN adopt the dynamic assignment, the required number of the pool
Nishizuka & Natsume Expires April 1, 2014 [Page 6]
Internet-Draft CGN Deployment Considerations Sep 2013
address is as follows:
# of pool address (P) = # of Subscriber (S) * a * N / (65536 - R)
Here, (R) is reserved TCP/UDP port list referred in
[I-D.donley-behave-deterministic-cgn]. CGN should eliminate the
wellknown ports (0-1023 for TCP and UDP) to avoid the bad
interpretation from destination servers. It is natural to translate
source port of outgoing packet to ephemeral ports. Using the
equation, 1550 pool addresses are sufficient for 1,000,000
subscribers.
On the other hand, in static assignment, the ports are allocated a
priori for every users. The pool addresses and ports are reserved to
every users, so most of them could be a dead stock because there are
light users and heavy users in aspect of port consumption. The max
number of port consumption in all subscribers is the key value for
static assignment. The true peak number of the session by a heavy
user could be over 10,000 sessions. However it can be assumed that
such a severe consumption of ports to be an abuse, so the number of
statically assigned port (M) is controllable parameter by each
providers. In the static assignment, the required number of the pool
address is as follows:
# of pool address (P) = # of Subscriber (S) * M / (65536 - R)
Taking account into the investigation of number of sessions of
applications, the desirable value of (M) is over 1,000. As the
result, no less than 15,501 pool addresses are needed for 1,000,000
subscribers. The compression ratio is one tenth of the case of
dynamic assignment.
The feasibility of dynamic and static assignment configuration was
confirmed in the verification.
5.3. Logging design
5.3.1. Amount of the NAT log
The size of the log is important consideration of dynamic assignment
because it demands a huge scale of logging ecosystem for CGN. There
is a case that providers must identify a user to respond abuse or
public safety requests. Conventionally, source IP address and a
timestamp are needed. It was possible to identify a user by
comparing IP address with authentication logs of the exact time.
However, when IP address is shared by the CGN, it is necessary to
compare the translated address and port information which are given
by the destination host with the NAT log to identify the untranslated
Nishizuka & Natsume Expires April 1, 2014 [Page 7]
Internet-Draft CGN Deployment Considerations Sep 2013
IP address. According to the [RFC6888], following information is
recommended to log (for NAT444):
- Transport Protocol - 1 byte
- Source IP address:port - 6 byte
- Source IP address:port after translation - 6 byte
- Timestamp - 8 byte
In addition, the indicator of the allocation and deallocation are
needed because it assures that the identified subscriber certainly
had been using the translated IP address and port. Plus, some
identifier like the index or hostname of the CGN is needed to
identify to which realm an address belongs.
- Add/Delete - 1 byte
- CGN device ID - 4 byte
As the result, the minimum size of NAT log is 26 bytes in binary. In
ASCII format, the average size of NAT log is about 120 byte . Every
active subscriber generate 400 sessions in average for a certain
amount of time. It is assumed that the event happens every 5 minute
in the most severe condition. The size of the log (L) for time frame
(T) can be estimated as follows (for ASCII format):
The size of log (L) = # of Subscriber (S) * a * N * 120byte * 2 * (
Time frame(T) / 5 min. )
It should be noted that the log is generated at the timing of NAT
table creation and freeing. As the result, for 1,000,000 users, the
size of log is piled up to 6.4 terabytes per day. The verification
result confirm the existing estimation referred in
[I-D.donley-behave-deterministic-cgn].
The size of the log can be reduced without loss of information.
Compact format is the technique of reducing the amount of log by
using a notational change (hexadecimal number). It was confirmed by
verification that the compact format can reduce amount of log to
about 80% as compared with ASCII format. Though it was not tested,
theoretically binary format is the smallest notation and amount of
log can be reduced to 22%.
In static allocation, the amount of log is dramatically reduced even
to zero because the untranslated IP address and the translated IP
address / port range are mapped a priori.
Nishizuka & Natsume Expires April 1, 2014 [Page 8]
Internet-Draft CGN Deployment Considerations Sep 2013
5.3.2. Necessity for destination information
In [RFC6269], it is pointed out that only providing information about
the external address to a service provider is no longer sufficient to
identify customers unambiguously . One of the solutions is the
method of recording the source port information (and exact time
stamp) additionally by the destination server or FW, which is
demanded in [RFC6302]. The other solution is the method of recording
destination IP address and port information by CGN of service
provider. The both solutions are imperfect. In
[I-D.tsou-behave-natx4-log-reduction], it is noted that source port
recording is not supported by every application. Thus, to increase
the certainty, additional logging of destination address and port is
effective measure to deal with the legal request from servers which
are not compliant with [RFC6302]. In dynamic assignment, to log
destination address is additional. It is confirmed by the
verification that by logging destination address, only 4% of amount
of log is increased in ASCII format. On the other hand, in static
assignment, logging of every session is newly required and it has the
same amount of log as the dynamic assignment. It completely breaks
the merit of the static assignment.
6. Scalability of CGN
The estimation of efficiency of address saving and the logging design
are depending on the number of subscribers accommodated with a CGN.
The scalability of the current CGN was verified by the measurement of
the performance.
6.1. Performance of CGN
According to the experimental results, there are three base
capacities to indicate CGN performance as follows:
- Through put
- MCS: Max Concurrent Sessions
- CPS: Connections per Sec
These capacities are not independent of each other, but become mixed
load for CGN. Each load will be combined in real network traffic,
thus using subscriber emulated traffic is important for measuring the
performance in realistic way.
Through put is forwarding performance of CGN. Currently CGN
equipments with an IF of 1GigabitEthernet and 10GigabitEthernet are
flagship models of the manufactures, but CGN has an upper limit
internally because the performance depends on internal devices such
Nishizuka & Natsume Expires April 1, 2014 [Page 9]
Internet-Draft CGN Deployment Considerations Sep 2013
as CPUs. By ON / OFF of ALGs (Application Level Gateway), the
forwarding performance will be affected because the traffic process
is possibly changed to the path through CPU.
MCS shows an upper limit of the number of records kept in NAT table.
The number of holding sessions depends on retention time of NAT
table. That is because, even after the end of data transmission, the
NAT table is held in a certain period of time to guarantee the
behavior of an application. As described in [RFC6888] REQ-8, if the
CGN tracks TCP sessions, NAT tables may be released when RST or FIN
of TCP has been observed. In case of TCP session where RST or FIN
session has not been observed, and UDP and ICMP communication, NAT
table should retain a certain amount of time. Also, in case of Full
Cone NAT, a table of Full Cone NAT also should retain a certain time
to await communication from outside for a certain period of time. It
is effective to shorten the time-out value in order to suppress the
overflowing NAT table, but it is needed to be careful not to inhibit
the behavior of the application. It is desirable that retention time
of NAT table is configurable as time-out value. In the experiment,
the time-out values are as follows:
+------------------+---------+--------+--------+--------+--------+
| Protocols | TCP | TCP | UDP | DNS | ICMP |
| | | SYN | |(port53)| |
+------------------+---------+--------+--------+--------+--------+
| Time-out Value | 300 | 60 | 300 | 3 | 2 |
+------------------+---------+--------+--------+--------+--------+
Figure 2: The time-out values (sec) in the experiment.
Figure 2
These settings didn't break the behavior of applications we tested.
It is very difficult to estimate maximum number of concurrent
sessions in the network where traffic already exists. By our
assumption, maximum number of concurrent sessions was estimated to be
1M sessions per 10,000 users as follows:
Max Concurrent Sessions (MCS) = # of Subscriber (S) * a * N
As the result, it is verified that tested current CGN is able to have
16M sessions for 160,000 subscribers with the capability of the
dynamic assignment and logging. It means that introducing CGN up to
about 15G traffic section is capable, which implies that CGN can be
placed to more centralized position of the network. In summary, the
settings and the performance result are as follows:
Nishizuka & Natsume Expires April 1, 2014 [Page 10]
Internet-Draft CGN Deployment Considerations Sep 2013
+----------------------------------------------+
| | Assumed |
| | Values |
+---------------------------------+------------+
| average # of sessions(N) | 400 |
+---------------------------------+------------+
| % of the active subscribers (a) | 25 |
+---------------------------------+------------+
| | Verified |
| | Values |
+---------------------------------+------------+
| # of Subscriber (S) | 160,000 |
+---------------------------------+------------+
| Max Concurrent Sessions(MCS) | 16,000,000 |
+---------------------------------+------------+
| Connection Per Sec(CPS) | 30,000 |
+---------------------------------+------------+
| # of pool address (P) | 4,000 |
+---------------------------------+------------+
| size of log (L) (in 10min) | 7.0GB |
+---------------------------------+------------+
Figure 3: The performance results of tested CGN.
Figure 3
In the verification, session arrival rate by emulated subscribers was
not so high because the load of concurrent sessions is noticeable in
the equipment used in the experiment. There were no problems in weak
load of about 30,000 CPS. In case that traffic flows suddenly change
to standby equipment in redundant network, CPS performance becomes
rate-limiting, so CPS performance is also important factor to
minimize the effect of failures.
6.2. Redundancy features of CGN
It is often referred that introduction of CGN could create Single
Point of Failure(SPOF) (ex. in [RFC6269]). CGN is stateful, in
contrast to stateless BR of MAP, so the redundant configuration must
be achieved by the synchronization of the NAT table between redundant
equipments. Moreover, introduction of CGN creates layer 3 boundary
to NATed traffic, so the redundancy features may work with routers
via dynamic routing. Nevertheless, it is verified that current CGN
can be configured and introduced to service providers network with
the redundancy features. In the verification, CGN was able to switch
to another CGN with sub-sec loss of traffic even in the situation
that they holds 16M concurrent sessions.
Nishizuka & Natsume Expires April 1, 2014 [Page 11]
Internet-Draft CGN Deployment Considerations Sep 2013
6.3. DNS query traffic considerations
How to deal with the DNS query traffic is unignorable concern for
deployment of CGN. In the test scenario, a control experiment was
conducted to reveal the impact of the huge amount of DNS queries.
Access Node CGN
Emulated +-----------+
Subscribers +-------+ +-------+ | |
+----+ | | | | | |
| --+-----+ R +---------+ CGN +------+ |
+----+ | | | | | Core |
+---+---+ +-------+ | Network |
| | |
| | |
| +-------+ | +-------+ |
| | | | | | |
+-------------+ DNS +------+ | DNS | |
| | | | | |
+-------+ | +-------+ |
+-----------+
DNS Forwarder
Figure 4: Bypassing of DNS queries using DNS forwarder.
In the first case, the original DNS server IP address in the service
provider network is distributed to the subscribers. The emulated
subscribers use the DNS server to get host IP address by name, so all
query packets go through the CGN. The generated DNS query is 12M at
the speed of 10k query per sec. In the second case, IP address of a
DNS server placed in the bypassing position of CGN is distributed to
users. The second DNS server works as a forwarder, so all queries
are forwarded to the first DNS server. Therefore, all DNS queries
are bypassed from the CGN while data traffic is still going through
the CGN.
As the result, it was shown that DNS query almost does not affect the
performance of the CGN. The max concurrent sessions of DNS packet
was only 40k. NAT table of DNS (udp/53,tcp/53) timeouts in 3
seconds, thus It saves the consumption of NAT tables. However NAT
log was generated for every query and it doubled the total amount of
the log. It would be rare that the NAT log of DNS is needed to react
to a legal request. The impact of the DNS query traffic is
relatively small if DNS timeout is adjusted.
Nishizuka & Natsume Expires April 1, 2014 [Page 12]
Internet-Draft CGN Deployment Considerations Sep 2013
6.4. Separation of traffic
In the existing network, IPv4 communication and IPv6 communication
may already be mixed in the dual stack. In this case, by introducing
CGN which can route IPv6 and existing IPv4 aside from NAT function,
the influence for the network architecture could be suppressed and so
a flexible design is possible. However, though current CGN is
scalable enough to be deployed in core of the service providers
network, the feature of routing is insufficient to replace the
exsisting routers. Such a CGN is desirable, otherwise the design
which makes IPv6 traffic and traditional IPv4 traffic bypass from CGN
is effective choice for providers. In dividing NAT flows and non-NAT
flows routers, VRF (Virtual Routing and Forwarding) and PBR (policy
based routing) are needed at routers in front of CGN. In that case
it is indispensable to configure routers so that the hairpining
communication between the NAT user and non-NAT user to be possible.
The considerations about the separation of traffic and effective
deployment configuration are discussed in detail in
[I-D.ietf-opsawg-lsn-deployment].
7. Tested web sites and applications (Excerpts)
- Web Mail
gmail
yahoo mail
hot mail
- Video
ustream
youtube
nicovideos
Hulu
dailymotion
daum
qq
fc2
xvideos
- Portal&EC site
yahoo
rakuten
amazon
apple
- Blog
livedoor blog
Nishizuka & Natsume Expires April 1, 2014 [Page 13]
Internet-Draft CGN Deployment Considerations Sep 2013
ameba blog
- Search Engine
google
- Online Banking
mizuho bank
DC card
- Cloud Service
drop box
Evernote
- InstantMessenger & VoIP
skype
Line
- facebook
- twitter
- google map
- Online PC Game
aeria games
ameba pigg
nexon
hangame
- Consumer Game
Armored Core V (Play Station3)
Dark Souls 2 (Play Station3)
Gundam Extreme VS. (Play Station3)
Kinect adventure (XBox)
Persona 4 the ultimate in mayonaka arena (XBox)
Mingol 4 (WiiU)
Monster Hunter 3G (DS-lite)
Keri-hime sweets (iOS)
PuzzDra (iOS)
8. IANA Considerations
This document makes no request of IANA.
9. Security Considerations
TBD
10. Acknowledgments
This research and experiment are conducted under the great support of
Ministry of Internal Affairs and Communications of Japan. Many
thanks to MIC, JAIST members and Shin Miyakawa for their ideas and
feedback in documentation.
Nishizuka & Natsume Expires April 1, 2014 [Page 14]
Internet-Draft CGN Deployment Considerations Sep 2013
11. References
11.1. Normative References
[I-D.donley-behave-deterministic-cgn]
Donley, C., Grundemann, C., Sarawat, V., Sundaresan, K.,
and O. Vautrin, "Deterministic Address Mapping to Reduce
Logging in Carrier Grade NAT Deployments",
draft-donley-behave-deterministic-cgn-06 (work in
progress), July 2013.
[I-D.ietf-opsawg-lsn-deployment]
Kuarsingh, V. and J. Cianfarani, "CGN Deployment with BGP/
MPLS IP VPNs", draft-ietf-opsawg-lsn-deployment-03 (work
in progress), June 2013.
[RFC2663] Srisuresh, P. and M. Holdrege, "IP Network Address
Translator (NAT) Terminology and Considerations",
RFC 2663, August 1999.
[RFC2993] Hain, T., "Architectural Implications of NAT", RFC 2993,
November 2000.
[RFC6269] Ford, M., Boucadair, M., Durand, A., Levis, P., and P.
Roberts, "Issues with IP Address Sharing", RFC 6269,
June 2011.
[RFC6888] Perreault, S., Yamagata, I., Miyakawa, S., Nakagawa, A.,
and H. Ashida, "Common Requirements for Carrier-Grade NATs
(CGNs)", BCP 127, RFC 6888, April 2013.
11.2. Informative References
[I-D.chen-sunset4-cgn-port-allocation]
Chen, G., "Analysis of NAT64 Port Allocation Method",
draft-chen-sunset4-cgn-port-allocation-02 (work in
progress), July 2013.
[I-D.ietf-softwire-map]
Troan, O., Dec, W., Li, X., Bao, C., Matsushima, S.,
Murakami, T., and T. Taylor, "Mapping of Address and Port
with Encapsulation (MAP)", draft-ietf-softwire-map-08
(work in progress), August 2013.
[I-D.tsou-behave-natx4-log-reduction]
Tsou, T., Li, W., Taylor, T., and J. Huang, "Port
Management To Reduce Logging In Large-Scale NATs",
draft-tsou-behave-natx4-log-reduction-04 (work in
Nishizuka & Natsume Expires April 1, 2014 [Page 15]
Internet-Draft CGN Deployment Considerations Sep 2013
progress), July 2013.
[RFC6146] Bagnulo, M., Matthews, P., and I. van Beijnum, "Stateful
NAT64: Network Address and Protocol Translation from IPv6
Clients to IPv4 Servers", RFC 6146, April 2011.
[RFC6302] Durand, A., Gashinsky, I., Lee, D., and S. Sheppard,
"Logging Recommendations for Internet-Facing Servers",
BCP 162, RFC 6302, June 2011.
[RFC6333] Durand, A., Droms, R., Woodyatt, J., and Y. Lee, "Dual-
Stack Lite Broadband Deployments Following IPv4
Exhaustion", RFC 6333, August 2011.
[RFC6346] Bush, R., "The Address plus Port (A+P) Approach to the
IPv4 Address Shortage", RFC 6346, August 2011.
[RFC6877] Mawatari, M., Kawashima, M., and C. Byrne, "464XLAT:
Combination of Stateful and Stateless Translation",
RFC 6877, April 2013.
Authors' Addresses
Kaname Nishizuka
NTT Communications Corporation
Granpark Tower
3-4-1 Shibaura, Minato-ku
Tokyo 108-8118
Japan
Email: kaname@nttv6.jp
Daigo Natsume
NTT-Neomeit Corporation
3-15 Babacho, Chuo-ku, Osaka-shi
Osaka 540-8511
Japan
Email: daigo.natsume@ntt-neo.co.jp
Nishizuka & Natsume Expires April 1, 2014 [Page 16]