<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-brw-scone-rate-policy-discovery-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Rate-Limit Policies Discovery">Discovery of Network Rate-Limit Policies (NRLPs)</title>
    <seriesInfo name="Internet-Draft" value="draft-brw-scone-rate-policy-discovery-03"/>
    <author fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author fullname="Gyan Mishra">
      <organization>Verizon Inc</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>gyan.s.mishra@verizon.com</email>
      </address>
    </author>
    <author initials="M." surname="Amend" fullname="Markus Amend">
      <organization>Deutsche Telekom</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>markus.amend@telekom.de</email>
      </address>
    </author>
    <author initials="L." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="28"/>
    <area>wit</area>
    <workgroup>scone</workgroup>
    <keyword>collaborative networking</keyword>
    <keyword>adaptive application</keyword>
    <abstract>
      <?line 94?>

<t>This document specifies mechanims for hosts to dynamically discover Network Rate-Limit Policies (NRLPs). This information is then passed to applications that might adjust their behaviors accordingly.</t>
      <t>Networks already support mechanisms to advertize a set of network properties to hosts (e.g., link MTU (RFC 4861) and PREFIX64 (RFC 8781)). This document complements these tools and specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate NRLPs to hosts. For address family parity, a new DHCP option is also defined. The document also discusses how Provisioning Domains (PvD) can be used to notify hosts with NRLPs.</t>
    </abstract>
  </front>
  <middle>
    <?line 100?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>To optimally deliver connectivity services via a network attachment, networks advertize a set of network properties <xref target="RFC9473"/> to connected hosts such as:</t>
      <dl>
        <dt>Link Maximum Transmission Unit (MTU):</dt>
        <dd>
          <t>For example, the 3GPP <xref target="TS-23.501"/> specifies that "the link MTU size for IPv4 is sent to the UE by including it in the PCO (see TS 24.501). The link MTU size for IPv6 is sent to the UE by including it in the IPv6 Router Advertisement message (see RFC 4861)".</t>
        </dd>
        <dt/>
        <dd>
          <t><xref section="2.10" sectionFormat="of" target="RFC7066"/> indicates that a cellular host should honor the MTU option in the Router Advertisement (<xref section="4.6.4" sectionFormat="of" target="RFC4861"/>) given that the 3GPP system
architecture uses extensive tunneling in its packet core network below the 3GPP link, and this may lead to packet fragmentation issues.</t>
        </dd>
        <dt/>
        <dd>
          <t>MTU is cited as an example of path properties in <xref section="4" sectionFormat="of" target="RFC9473"/>.</t>
        </dd>
        <dt>Prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) <xref target="RFC8781"/>:</dt>
        <dd>
          <t>This option is useful to enable local DNSSEC validation, support networks with no DNS64, support IPv4 address literals on an IPv6-only host, etc.</t>
        </dd>
        <dt/>
        <dd>
          <t>NAT is cited as an example of path properties (see "Service Function" bullet in <xref section="4" sectionFormat="of" target="RFC9473"/>).</t>
        </dd>
      </dl>
      <t>Traffic exchanged over a network may be subject to rate-limit policies for various operational reasons. <xref target="I-D.brw-scone-throughput-advice-blob"/> specifies a generic object (called, Throughput Advice) that can be used by mechanims for hosts to dynamically discover these network rate-limit policies. This information can then passed to applications that might adjust their behaviors accordingly.</t>
      <t>Given that all IPv6 hosts and networks are required to support Neighbor Discovery <xref target="RFC4861"/>, this document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate rate-limit policies to hosts (<xref target="sec-nd"/>). The main motivations for the use of ND for such a discovery are listed in <xref section="3" sectionFormat="of" target="RFC8781"/>:</t>
      <ul spacing="normal">
        <li>
          <t>Fate sharing</t>
        </li>
        <li>
          <t>Atomic configuration</t>
        </li>
        <li>
          <t>Updatability: change the policy at any time</t>
        </li>
        <li>
          <t>Deployability</t>
        </li>
      </ul>
      <t>For address family parity, a DHCP option <xref target="RFC2132"/> is also defined for IPv4 in <xref target="sec-dhcp"/>. <xref target="sec-pvd"/> describes a discovery approach using Provisioning Domains (PvDs) <xref target="RFC8801"/>.</t>
      <t>These options are called: Network Rate-Limit Policy (NRLP).</t>
      <t>Whether host-to-network, network-to-host, or both policies are returned in an NRLP is deployment specific. All these combinations are supported in this document. Also, the design supports returning one more NRLP instances for a given traffic direction.</t>
      <t>Applications will have access to all available NRLPs and will, thus, adjust their behavior as a function of scope and traffic category indicated in a policy. Likewise, a host with multiple network attachments may use the discovered NRLPs to decide how to distribute its flows over these network attachments (prefer a network attachment to place an application session, migrate connection, etc.). That's said, this document does not make any recommendation about how a receiving host uses the discovered policies.</t>
      <t>Networks that advertize NLRPs are likely to maintain the policing in place within the network because of the trust model (hosts are not considered as trusted devices). Per-subscriber rate-limit policies are generally recommended to protect nodes against Denial of Service (DoS) attacks (e.g., <xref section="9.3" sectionFormat="of" target="RFC8803"/>). Discussion about conditions under which such a trust model can be relaxed is out of scope of this document.</t>
      <t>To enhance flexibility in applying rate-limiting policies and better accommodate diverse endpoint performance requirements, mechanisms such as solicited Router Advertisements (RAs) <xref target="RFC8273"/> and endpoint-specific DHCP responses can be used. These unicast responses enable granular signaling of rate-limit policies to individual endpoints, facilitating differentiated rate-limit configurations. However, this document does not prescribe how resources should be partitioned within local networks, as such considerations fall outside its scope.</t>
      <t>This document does not assume nor preclude that other mechanisms, e.g., Low Latency, Low Loss, and Scalable Throughput (L4S) <xref target="RFC9330"/>, are enabled in a bottleneck link. The reader may refer to I-D.brw-scone-manageability for a list of relevant mechanisms.</t>
      <t>Refer to <xref target="NRLP-WIRE"/> for configuration examples to use NRLP.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses the terms defined in <xref target="I-D.brw-scone-throughput-advice-blob"/>.</t>
    </section>
    <section anchor="sec-common">
      <name>Common NLRP Parameters</name>
      <t>The following common fields are present in all NRLP options:</t>
      <section anchor="instance-flags-if">
        <name>Instance Flags (IF)</name>
        <t>The format of this 8-bit flags is shown in <xref target="opt-format-ff"/>. This field is used to express some generic properties of the advice.</t>
        <figure anchor="opt-format-ff">
          <name>Flow flags Field</name>
          <artwork align="center"><![CDATA[
 0 1 2 3 4 5 6 7
+-+-+-+-+-+-+-+-+
|U|U|U|R|R|D|D|S|
+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>See <xref section="5" sectionFormat="of" target="I-D.brw-scone-throughput-advice-blob"/> for the meaning of the R/D/S flags.</t>
        <t>U are unassigned bits. These bits <bcp14>MUST</bcp14> be set to zero by senders and <bcp14>MUST</bcp14> be ignored by receivers.</t>
      </section>
      <section anchor="traffic-category-tc-throughput-parameters">
        <name>Traffic Category (TC) &amp; Throughput Parameters</name>
        <t>The following parameters are used:</t>
        <dl>
          <dt>TC:</dt>
          <dd>
            <t>See <xref section="5" sectionFormat="of" target="I-D.brw-scone-throughput-advice-blob"/>.</t>
          </dd>
          <dt>Committed Information Rate (CIR) (Mbps):</dt>
          <dd>
            <t>See <xref section="5" sectionFormat="of" target="I-D.brw-scone-throughput-advice-blob"/>.</t>
          </dd>
          <dt/>
          <dd>
            <t>This is a mandatory parameter.</t>
          </dd>
          <dt>Committed Burst Size (CBS) (bytes):</dt>
          <dd>
            <t>See <xref section="5" sectionFormat="of" target="I-D.brw-scone-throughput-advice-blob"/>.</t>
          </dd>
          <dt/>
          <dd>
            <t>This is a mandatory parameter.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="sec-nd">
      <name>IPv6 RA NRLP Option</name>
      <section anchor="sec-ndf">
        <name>Option Format</name>
        <t>The format of the IPv6 RA NRLP option, with only mandatory fields included, is illustrated in <xref target="opt-m-format"/>.</t>
        <figure anchor="opt-m-format">
          <name>NRLP Option Format</name>
          <artwork align="center"><![CDATA[
MSB                                                          LSB
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    | Instance Flags|    TC         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Committed Information Rate (CIR)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Committed Burst Size (CBS)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The fields of the option shown in <xref target="opt-m-format"/> are as follows:</t>
        <dl>
          <dt>Type:</dt>
          <dd>
            <t>8-bit identifier of the NRLP option as assigned by IANA (TBD1) (see <xref target="sec-iana-ra"/>).</t>
          </dd>
          <dt>Length:</dt>
          <dd>
            <t>8-bit unsigned integer.  The length of the option (including
the Type and Length fields) is in units of 8 octets.</t>
          </dd>
        </dl>
        <t>Refer to <xref target="sec-common"/> for the meaning of the other parameters.</t>
      </section>
      <section anchor="ipv6-host-behavior">
        <name>IPv6 Host Behavior</name>
        <t>The procedure for rate-limit configuration is the same as it is with any
other Neighbor Discovery option <xref target="RFC4861"/>.</t>
        <t>The host <bcp14>MUST</bcp14> be prepared to receive multiple NRLP options
in RAs; each with distinct scope and/or application group.</t>
        <t>If the host receives multiple NRLP options with overlapping scope/TC, the host <bcp14>MUST</bcp14> silently discard all these options.</t>
        <t>If the receiving host has LAN capabilities (e.g., mobile CE or mobile handset with tethering), the following behavior applies:</t>
        <ul spacing="normal">
          <li>
            <t>If an RA NRLP is advertised from the network, and absent local rate-limit policies, the
device should send RAs to the downstream attached LAN devices with the same NRLP values received from the network.</t>
          </li>
          <li>
            <t>If local rate-limit policies are provided to the device, the device may change the scope or values received from the network
to accommodate these policies. The device may decide to not relay received RAs to internal nodes if local policies were
already advertized using RAs and those policies are consistent with the network policies.</t>
          </li>
        </ul>
        <t>Applications running over a host can learn the bitrates associated with a network attachment by invoking a dedicated API. The exact details of the API is OS-specific and, thus, out of scope of this document.</t>
      </section>
    </section>
    <section anchor="sec-dhcp">
      <name>DHCP NRLP Option</name>
      <ul empty="true">
        <li>
          <t>Note that the base DHCP can only signal a rate policy change when the
  client first joins the network or renews its lease, whereas IPv6 ND
  can update the rate policy at the network's discretion. <xref target="RFC6704"/>
  specifies an approach for forcing reconfiguration of individual hosts
  without suffering from the limitations of the FORCERENEW design in <xref target="RFC3203"/>.</t>
        </li>
      </ul>
      <section anchor="option-format">
        <name>Option Format</name>
        <t>The format of the DHCP NRLP option is illustrated in <xref target="dhc-format"/>.</t>
        <figure anchor="dhc-format">
          <name>NRLP DHCP Option Format</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_V4_NRLP|     Length    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~      NRLP Instance Data #1    ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   ---
.              ...              .    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ optional
~      NRLP Instance Data #n    ~    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   ---
]]></artwork>
        </figure>
        <t>The fields of the option shown in  <xref target="dhc-format"/> are as follows:</t>
        <dl>
          <dt>Code:</dt>
          <dd>
            <t>OPTION_V4_NRLP (TBD2).  (see <xref target="sec-iana-dhcp"/>).</t>
          </dd>
          <dt>Length:</dt>
          <dd>
            <t>Indicates the length of the enclosed data in octets.</t>
          </dd>
          <dt>NRLP Instance Data:</dt>
          <dd>
            <t>Includes a network rate-limit policy. The format of this field with only mandatory parameters is shown in <xref target="nrlp-m-format"/>.</t>
          </dd>
          <dt/>
          <dd>
            <t>When several NRLPs are to be included, the "NRLP Instance Data" field is repeated.</t>
          </dd>
        </dl>
        <figure anchor="nrlp-m-format">
          <name>NRLP Instance Data Format with Mandatory Fields</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   NRLP Instance Data Length   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Instance Flags |      TC       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Information Rate   |
|              (CIR)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Burst Size (CBS)   |
|                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The fields shown in <xref target="nrlp-m-format"/> are as follows:</t>
        <dl>
          <dt>NRLP Instance Data Length:</dt>
          <dd>
            <t>Length of all following data in octets. This field is set to '8' when only the nominal bitrate is provided for an NLRP instance.</t>
          </dd>
        </dl>
        <t>Refer to <xref target="sec-common"/> for the meaning of the other parameters.</t>
        <t>OPTION_V4_NRLP is a concatenation-requiring option. As such, the mechanism specified in <xref target="RFC3396"/> <bcp14>MUST</bcp14> be used if OPTION_V4_NRLP exceeds the maximum DHCP option size of 255 octets.</t>
        <t>OPTION_V4_NRLP is permitted to be included in the RADIUS DHCPv4-Options Attribute <xref target="RFC9445"/>.</t>
      </section>
      <section anchor="dhcpv4-client-behavior">
        <name>DHCPv4 Client Behavior</name>
        <t>To discover a network rate-limit policy, the DHCP client includes OPTION_V4_NRLP in a Parameter Request List option <xref target="RFC2132"/>.</t>
        <t>The DHCP client <bcp14>MUST</bcp14> be prepared to receive multiple "NRLP Instance Data" field entries in the OPTION_V4_NRLP option; each instance is to be treated as a separate network rate-limit policy.</t>
      </section>
    </section>
    <section anchor="sec-pvd">
      <name>Provisioning Domains</name>
      <t>PvD may also be used as a mechanism to discover NRLP. Typically, the network will configured to set the H-flag so clients can
request PvD Additional Information (<xref section="4.1" sectionFormat="of" target="RFC8801"/>).</t>
      <t><xref target="pvd-ex"/> provides an example of the returned "application/pvd+json" to indicate a network-to-host
NRLP for all subscriber traffic. The NRLP list may include multiple instances if distinct policies
are to be returned for distinct traffic categories.</t>
      <figure anchor="pvd-ex">
        <name>NRLP Example with PvD</name>
        <sourcecode type="json"><![CDATA[
{
   "nrlp":[
      {
         "direction":0,
         "scope":0,
         "tc":0,
         "cir":50,
         "cbs":10000,
         "ebs":20000
      }
   ]
}
]]></sourcecode>
      </figure>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The techniques discussed in the document offer the following security benefit: An OS can identify the type of application (background, foreground, streaming, real-time, etc.) and enforce appropriate network policies, even if a misbehaving application tries
to evade the rate-limit policies. If an application attempts to bypass rate-limiting by changing its 5-tuple or creating multiple flows,
the OS can detect this and manage the application's traffic accordingly.</t>
      <section anchor="nd">
        <name>ND</name>
        <t>As discussed in <xref target="RFC8781"/>, because RAs are required in all IPv6 configuration scenarios, RAs must already be secured, e.g., by deploying an RA-Guard <xref target="RFC6105"/>. Providing all configuration in RAs reduces the attack surface to be targeted by malicious attackers trying to provide hosts with invalid configuration, as compared to distributing the configuration through multiple different mechanisms that need to be secured independently.</t>
        <t>RAs are already used in mobile networks to advertize the link MTU. The same security considerations for MTU discovery apply for the NRLP discover.</t>
        <t>An attacker who has access to the RAs exchanged over an AC may:</t>
        <dl>
          <dt>Decrease the bitrate:</dt>
          <dd>
            <t>This may lower the perceived QoS if the host aggressively lowers its transmission rate.</t>
          </dd>
          <dt>Increase the bitrate value:</dt>
          <dd>
            <t>The AC will be overloaded, but still the rate-limit at the network will discard excess traffic.</t>
          </dd>
          <dt>Drop RAs:</dt>
          <dd>
            <t>This is similar to the current operations, where no NRLP RA is shared.</t>
          </dd>
          <dt>Inject fake RAs:</dt>
          <dd>
            <t>The implications are similar to the impacts of tweaking the values of a legitimate RA.</t>
          </dd>
        </dl>
      </section>
      <section anchor="dhcp">
        <name>DHCP</name>
        <t>An attacker who has access to the DHCP exchanged over an AC may do a lot of harm (e.g., prevent access to the network).</t>
        <t>The following mechanisms may be considered to mitigate spoofed or modified DHCP responses:</t>
        <dl>
          <dt>DHCPv6-Shield <xref target="RFC7610"/>:</dt>
          <dd>
            <t>The network access node (e.g., a border router, a CPE, an Access Point (AP)) discards DHCP response messages received from any local endpoint.</t>
          </dd>
          <dt>Source Address Validation Improvement (SAVI) solution for DHCP <xref target="RFC7513"/>:</dt>
          <dd>
            <t>The network access node filters packets with forged source IP addresses.</t>
          </dd>
        </dl>
        <t>The above mechanisms would ensure that the endpoint receives the correct NRLP information, but these mechanisms cannot provide any information about the DHCP server or the entity hosting the DHCP server.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="sec-iana-ra">
        <name>Neighbor Discovery Option</name>
        <t>This document requests IANA to assign the following new IPv6 Neighbor Discovery Option
type in the "IPv6 Neighbor Discovery Option Formats" sub-registry under the "Internet Control Message Protocol version 6 (ICMPv6)
Parameters" registry maintained at <xref target="IANA-ND"/>.</t>
        <table anchor="iana-new-op">
          <name>Neighbor Discovery NRLP Option</name>
          <thead>
            <tr>
              <th align="left">Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">NRLP Option</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: Please replace all "TBD1" occurrences with the assigned value.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-iana-dhcp">
        <name>DHCP Option</name>
        <t>This document requests IANA to assign the following new DHCP Option Code in the "BOOTP Vendor Extensions and DHCP Options" registry maintained at <xref target="IANA-BOOTP"/>.</t>
        <table anchor="iana-new-dhcp">
          <name>DHCP NRLP Option</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Name</th>
              <th align="left">Data Length</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">OPTION_V4_NRLP</td>
              <td align="left">N</td>
              <td align="left">NRLP Option</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: Please replace all "TBD2" occurrences with the assigned value.</t>
          </li>
        </ul>
      </section>
      <section anchor="dhcp-options-permitted-in-the-radius-dhcpv4-options-attribute">
        <name>DHCP Options Permitted in the RADIUS DHCPv4-Options Attribute</name>
        <t>This document requests IANA to add the following DHCP Option Code to the "DHCP Options Permitted in the RADIUS DHCPv4-Options Attribute" registry maintained at <xref target="IANA-BOOTP"/>.</t>
        <table anchor="iana-radius-dhcp">
          <name>New DHCP Option Permitted in the RADIUS DHCPv4-Options Attribute Registry</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Name</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">OPTION_V4_NRLP</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="provisioning-domains-split-dns-additional-information">
        <name>Provisioning Domains Split DNS Additional Information</name>
        <t>IANA is requested to add the following entry to the "Additional Information PvD Keys"
registry under the "Provisioning Domains (PvDs)" registry group <xref target="IANA-PVD"/>:</t>
        <dl>
          <dt>JSON key:</dt>
          <dd>
            <t>"nrlp"</t>
          </dd>
          <dt>Description:</dt>
          <dd>
            <t>"Network Rate-Limit Policies (NRLPs)"</t>
          </dd>
          <dt>Type:</dt>
          <dd>
            <t>Array of Objects</t>
          </dd>
        </dl>
        <t>Example:</t>
        <artwork><![CDATA[
   {
      "nrlp":[
         {
            "scope":0,
            "direction":0,
            "tc":0,
            "cir":50,
            "cbs": 10000
         }
      ]
   }
]]></artwork>
        <dl>
          <dt>Reference:</dt>
          <dd>
            <t>This-Document</t>
          </dd>
        </dl>
      </section>
      <section anchor="new-pvd-network-rate-limit-policies-nrlps-registry">
        <name>New PvD Network Rate-Limit Policies (NRLPs) Registry</name>
        <t>IANA is requested to create a new registry "PvD Rate-Limit Policies (NRLPs)" registry,
within the "Provisioning Domains (PvDs)" registry group.</t>
        <t>The initial contents of this registry are provided in <xref target="iana-pvd-initial"/>.</t>
        <table anchor="iana-pvd-initial">
          <name>Initial PvD Network Rate-Limit Policies (NRLPs) Registry Content</name>
          <thead>
            <tr>
              <th align="left">JSON key</th>
              <th align="left">Description</th>
              <th align="left">Type</th>
              <th align="left">Example</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">scope</td>
              <td align="left">Specifies whether the policy is per host (when set to "1") or per subscriber (when set to "0)</td>
              <td align="left">Boolean</td>
              <td align="left">1</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">direction</td>
              <td align="left">Indicates the traffic direction to which a policy applies</td>
              <td align="left">integer</td>
              <td align="left">1</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">reliability</td>
              <td align="left">Specifies whether the policy is for both reliable and unreliable traffic (when set to "0"), for reliable (when set to "1"), or for unreliable traffic (when set to "2")</td>
              <td align="left">integer</td>
              <td align="left">1</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">tc</td>
              <td align="left">Specifies a traffic category to which this policy applies</td>
              <td align="left">Integer</td>
              <td align="left">0</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">cir</td>
              <td align="left">Committed Information Rate (CIR)</td>
              <td align="left">Integer</td>
              <td align="left">50</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">cbs</td>
              <td align="left">Committed Burst Size (CBS)</td>
              <td align="left">Integer</td>
              <td align="left">10000</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <t>Assignments must not be added directly to the "PvD Network Rate-Limit Policies (NRLPs)" registry.
When a new attribute is added to the "SCONE Rate-Limit Policy Objects" Registry Group created by <xref target="I-D.brw-scone-throughput-advice-blob"/>,
a new JSON key is mirrored in the "PvD Network Rate-Limit Policies (NRLPs)" registry.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="I-D.brw-scone-throughput-advice-blob">
          <front>
            <title>Throughput Advice Object for SCONE</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <date day="13" month="December" year="2024"/>
            <abstract>
              <t>   Traffic exchanged over a network may be subject to rate-limit
   policies for various operational reasons.  This document specifies a
   generic object (called, Throughput Advice) that can be used by
   mechanisms for hosts to dynamically discover these network rate-limit
   policies.  This information is then passed to applications that might
   adjust their behaviors accordingly.

   The design of the throughput advice object is independent of the
   discovery channel (protocol, API, etc.).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-brw-scone-throughput-advice-blob-02"/>
        </reference>
        <reference anchor="RFC2132">
          <front>
            <title>DHCP Options and BOOTP Vendor Extensions</title>
            <author fullname="S. Alexander" initials="S." surname="Alexander"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>This document specifies the current set of DHCP options. Future options will be specified in separate RFCs. The current list of valid options is also available in ftp://ftp.isi.edu/in-notes/iana/assignments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2132"/>
          <seriesInfo name="DOI" value="10.17487/RFC2132"/>
        </reference>
        <reference anchor="RFC8801">
          <front>
            <title>Discovering Provisioning Domain Names and Data</title>
            <author fullname="P. Pfister" initials="P." surname="Pfister"/>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="W. Shao" initials="W." surname="Shao"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>Provisioning Domains (PvDs) are defined as consistent sets of network configuration information. PvDs allows hosts to manage connections to multiple networks and interfaces simultaneously, such as when a home router provides connectivity through both a broadband and cellular network provider.</t>
              <t>This document defines a mechanism for explicitly identifying PvDs through a Router Advertisement (RA) option. This RA option announces a PvD identifier, which hosts can compare to differentiate between PvDs. The option can directly carry some information about a PvD and can optionally point to PvD Additional Information that can be retrieved using HTTP over TLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8801"/>
          <seriesInfo name="DOI" value="10.17487/RFC8801"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3396">
          <front>
            <title>Encoding Long Options in the Dynamic Host Configuration Protocol (DHCPv4)</title>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <date month="November" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3396"/>
          <seriesInfo name="DOI" value="10.17487/RFC3396"/>
        </reference>
        <reference anchor="RFC9445">
          <front>
            <title>RADIUS Extensions for DHCP-Configured Services</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>This document specifies two new Remote Authentication Dial-In User Service (RADIUS) attributes that carry DHCP options. The specification is generic and can be applicable to any service that relies upon DHCP. Both DHCPv4- and DHCPv6-configured services are covered.</t>
              <t>Also, this document updates RFC 4014 by relaxing a constraint on permitted RADIUS attributes in the RADIUS Attributes DHCP suboption.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9445"/>
          <seriesInfo name="DOI" value="10.17487/RFC9445"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IANA-PVD" target="https://www.iana.org/assignments/pvds/">
          <front>
            <title>Provisioning Domains (PvDs)</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-ND" target="https://www.iana.org/assignments/icmpv6-parameters/">
          <front>
            <title>IPv6 Neighbor Discovery Option Formats</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-BOOTP" target="https://www.iana.org/assignments/bootp-dhcp-parameters/">
          <front>
            <title>BOOTP Vendor Extensions and DHCP Options</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="NRLP-WIRE" target="https://github.com/boucadair/draft-xxx-ac-rate-policy-discovery/blob/main/example-nrlp-wire-format.md">
          <front>
            <title>Examples of Wire Format Options</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC9473">
          <front>
            <title>A Vocabulary of Path Properties</title>
            <author fullname="R. Enghardt" initials="R." surname="Enghardt"/>
            <author fullname="C. Krähenbühl" initials="C." surname="Krähenbühl"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>Path properties express information about paths across a network and the services provided via such paths. In a path-aware network, path properties may be fully or partially available to entities such as endpoints. This document defines and categorizes path properties. Furthermore, the document identifies several path properties that might be useful to endpoints or other entities, e.g., for selecting between paths or for invoking some of the provided services. This document is a product of the Path Aware Networking Research Group (PANRG).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9473"/>
          <seriesInfo name="DOI" value="10.17487/RFC9473"/>
        </reference>
        <reference anchor="RFC7066">
          <front>
            <title>IPv6 for Third Generation Partnership Project (3GPP) Cellular Hosts</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Arkko" initials="J." role="editor" surname="Arkko"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>As the deployment of third and fourth generation cellular networks progresses, a large number of cellular hosts are being connected to the Internet. Standardization organizations have made the Internet Protocol version 6 (IPv6) mandatory in their specifications. However, the concept of IPv6 covers many aspects and numerous specifications. In addition, the characteristics of cellular links in terms of bandwidth, cost, and delay put special requirements on how IPv6 is used. This document considers IPv6 for cellular hosts that attach to the General Packet Radio Service (GPRS), Universal Mobile Telecommunications System (UMTS), or Evolved Packet System (EPS) networks (hereafter collectively referred to as Third Generation Partnership Project (3GPP) networks). This document also lists specific IPv6 functionalities that need to be implemented in addition to what is already prescribed in the IPv6 Node Requirements document (RFC 6434). It also discusses some issues related to the use of these components when operating in these networks. This document obsoletes RFC 3316.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7066"/>
          <seriesInfo name="DOI" value="10.17487/RFC7066"/>
        </reference>
        <reference anchor="RFC8781">
          <front>
            <title>Discovering PREF64 in Router Advertisements</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="April" year="2020"/>
            <abstract>
              <t>This document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8781"/>
          <seriesInfo name="DOI" value="10.17487/RFC8781"/>
        </reference>
        <reference anchor="RFC8803">
          <front>
            <title>0-RTT TCP Convert Protocol</title>
            <author fullname="O. Bonaventure" initials="O." role="editor" surname="Bonaventure"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="S. Gundavelli" initials="S." surname="Gundavelli"/>
            <author fullname="S. Seo" initials="S." surname="Seo"/>
            <author fullname="B. Hesmans" initials="B." surname="Hesmans"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>This document specifies an application proxy, called Transport Converter, to assist the deployment of TCP extensions such as Multipath TCP. A Transport Converter may provide conversion service for one or more TCP extensions. The conversion service is provided by means of the 0-RTT TCP Convert Protocol (Convert).</t>
              <t>This protocol provides 0-RTT (Zero Round-Trip Time) conversion service since no extra delay is induced by the protocol compared to connections that are not proxied. Also, the Convert Protocol does not require any encapsulation (no tunnels whatsoever).</t>
              <t>This specification assumes an explicit model, where the Transport Converter is explicitly configured on hosts. As a sample applicability use case, this document specifies how the Convert Protocol applies for Multipath TCP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8803"/>
          <seriesInfo name="DOI" value="10.17487/RFC8803"/>
        </reference>
        <reference anchor="RFC8273">
          <front>
            <title>Unique IPv6 Prefix per Host</title>
            <author fullname="J. Brzozowski" initials="J." surname="Brzozowski"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>This document outlines an approach utilizing existing IPv6 protocols to allow hosts to be assigned a unique IPv6 prefix (instead of a unique IPv6 address from a shared IPv6 prefix). Benefits of using a unique IPv6 prefix over a unique service-provider IPv6 address include improved host isolation and enhanced subscriber management on shared network segments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8273"/>
          <seriesInfo name="DOI" value="10.17487/RFC8273"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC6704">
          <front>
            <title>Forcerenew Nonce Authentication</title>
            <author fullname="D. Miles" initials="D." surname="Miles"/>
            <author fullname="W. Dec" initials="W." surname="Dec"/>
            <author fullname="J. Bristow" initials="J." surname="Bristow"/>
            <author fullname="R. Maglione" initials="R." surname="Maglione"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Dynamic Host Configuration Protocol (DHCP) FORCERENEW allows for the reconfiguration of a single host by forcing the DHCP client into a Renew state on a trigger from the DHCP server. In the Forcerenew Nonce Authentication protocol, the server sends a nonce to the client in the initial DHCP ACK that is used for subsequent validation of a FORCERENEW message. This document updates RFC 3203. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6704"/>
          <seriesInfo name="DOI" value="10.17487/RFC6704"/>
        </reference>
        <reference anchor="RFC3203">
          <front>
            <title>DHCP reconfigure extension</title>
            <author fullname="Y. T'Joens" initials="Y." surname="T'Joens"/>
            <author fullname="C. Hublet" initials="C." surname="Hublet"/>
            <author fullname="P. De Schrijver" initials="P." surname="De Schrijver"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document defines extensions to DHCP (Dynamic Host Configuration Protocol) to allow dynamic reconfiguration of a single host triggered by the DHCP server (e.g., a new IP address and/or local configuration parameters). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3203"/>
          <seriesInfo name="DOI" value="10.17487/RFC3203"/>
        </reference>
        <reference anchor="RFC6105">
          <front>
            <title>IPv6 Router Advertisement Guard</title>
            <author fullname="E. Levy-Abegnoli" initials="E." surname="Levy-Abegnoli"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <author fullname="C. Popoviciu" initials="C." surname="Popoviciu"/>
            <author fullname="J. Mohacsi" initials="J." surname="Mohacsi"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>Routed protocols are often susceptible to spoof attacks. The canonical solution for IPv6 is Secure Neighbor Discovery (SEND), a solution that is non-trivial to deploy. This document proposes a light-weight alternative and complement to SEND based on filtering in the layer-2 network fabric, using a variety of filtering criteria, including, for example, SEND status. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6105"/>
          <seriesInfo name="DOI" value="10.17487/RFC6105"/>
        </reference>
        <reference anchor="RFC7610">
          <front>
            <title>DHCPv6-Shield: Protecting against Rogue DHCPv6 Servers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <date month="August" year="2015"/>
            <abstract>
              <t>This document specifies a mechanism for protecting hosts connected to a switched network against rogue DHCPv6 servers. It is based on DHCPv6 packet filtering at the layer 2 device at which the packets are received. A similar mechanism has been widely deployed in IPv4 networks ('DHCP snooping'); hence, it is desirable that similar functionality be provided for IPv6 networks. This document specifies a Best Current Practice for the implementation of DHCPv6-Shield.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="199"/>
          <seriesInfo name="RFC" value="7610"/>
          <seriesInfo name="DOI" value="10.17487/RFC7610"/>
        </reference>
        <reference anchor="RFC7513">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
      </references>
    </references>
    <?line 475?>

<section anchor="sec-aaa">
      <name>Example of Authentication, Authorization, and Accounting (AAA)</name>
      <t><xref target="radius-ex"/> provides an example of the exchanges that might occur between a DHCP server
and an Authentication, Authorization, and Accounting (AAA) server to retrieve the per-subscriber NRLPs.</t>
      <t>This example assumes that the Network Access Server (NAS) embeds both Remote Authentication Dial-In User Service
(RADIUS) <xref target="RFC2865"/> client and DHCP server capabilities.</t>
      <figure anchor="radius-ex">
        <name>An Example of RADIUS NRLP Exchanges</name>
        <artwork><![CDATA[
   .-------------.           .-------------.             .-------.
   |    Host     |           |     NAS     |             |  AAA  |
   | DHCP Client |           | DHCP Server |             |Server |
   |             |           |RADIUS Client|             |       |
   '------+------'           '------+------'             '---+---'
          |                         |                        |
          o------DHCPDISCOVER------>|                        |
          |                         o----Access-Request ---->|
          |                         |                        |
          |                         |<----Access-Accept------o
          |                         |     DHCPv4-Options     |
          |<-----DHCPOFFER----------o    (OPTION_V4_NRLP)    |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |
          o-----DHCPREQUEST-------->|                        |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |
          |<-------DHCPACK----------o                        |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |

                     DHCP                    RADIUS
]]></artwork>
      </figure>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Tommy Pauly for the comment on PvD.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
