<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-he-ipsecme-vpn-shared-ipsecsa-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="Shared IPsec Tunnel by VPNs">Shared Use of IPsec Tunnel in a Multi-VPN Environment</title>
    <seriesInfo name="Internet-Draft" value="draft-he-ipsecme-vpn-shared-ipsecsa-00"/>
    <author initials="Q." surname="He" fullname="Qi He">
      <organization abbrev="Huawei">Huawei Technologies</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <region/>
          <code/>
          <country/>
        </postal>
        <email>archibald.heqi@huawei.com</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization abbrev="Huawei">Huawei Technologies</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <region/>
          <code/>
          <country/>
        </postal>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="X." surname="Chen" fullname="Xiaolan Chen">
      <organization abbrev="Huawei">Huawei Technologies</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <region/>
          <code/>
          <country/>
        </postal>
        <email>chenxiaolan4@huawei.com</email>
      </address>
    </author>
    <author initials="B." surname="Ding" fullname="Beijing Ding">
      <organization abbrev="Huawei">Huawei Technologies</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <region/>
          <code/>
          <country/>
        </postal>
        <email>dingbeijing@huawei.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="03"/>
    <area>Security</area>
    <workgroup>IPSECME Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 84?>

<t>In a multi-VPN environment, currently, different IPsec tunnels (i.e., different IKE SAs and Child SAs) have to be created to differentiate and protect the traffic of each VPN between the device and its peer. When the number of neighbors of a device and the number of VPNs increases, the number of IPsec tunnels also increases considerably. This results in the need for a large number of SAs, which exceeds the device's capacity.</t>
      <t>This document proposes a method for different VPNs to share the use of a single IPsec tunnel, which can greatly reduce the number of SAs required in a multi-VPN scenario.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-he-ipsecme-vpn-shared-ipsecsa/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsec Working Group mailing list (<eref target="mailto:ipsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsec/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 90?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>IPsec <xref target="RFC4301"/> is widely used to provide security for IP communications. VPNs are also a widely used feature in IP networks to create logically isolated networks. Administrators can create multiple VPNs on a device and assign them to different services so that these services are isolated from each other. These VPNs can use the same address space or different address spaces. Regardless of the address spaces these VPNs use, the traffic between different VPNs is not accessible to each other.</t>
      <t>When an administrator has planned multiple VPNs on two devices for use by different services and needs to utilize IPsec to provide security for the traffic, the existing practice is to create separate IPsec tunnels (separate IKE SAs and Child SAs) for different VPNs, as shown in <xref target="differentvpns"/>. The reason for doing this is that the current IKEv2 <xref target="RFC7296"/> does not carry any VPN information when creating a Child SA. The initiator can know which VPN the Child SA is associated with when requesting the creation of this SA. However, the responder can't get any VPN-related information from the request and associate it with the correct VPN. Therefore, different VPNs need to be separated from the IKE SAs, since different IKE SAs require different interfaces (even logical interfaces) and these interfaces can be respectively associated with the corresponding VPNs.</t>
      <figure anchor="differentvpns">
        <name>Separate IPsec Tunnels for Different VPNs Between Two Devices</name>
        <artwork align="center"><![CDATA[
   +------------------+                  +------------------+
   |     Device A     |                  |     Device B     |
   |                  |                  |                  |
   |  +------------+  |                  |  +------------+  |
   |  |            |  |  IPsec Tunnel 1  |  |            |  |
---+->|    VPN 1   +--+------------------+->|    VPN 1   +--+-->
   |  |            |  |                  |  |            |  |
   |  +------------+  |                  |  +------------+  |
   |                  |                  |                  |
   |  +------------+  |                  |  +------------+  |
   |  |            |  |  IPsec Tunnel 2  |  |            |  |
---+->|    VPN 2   +--+------------------+->|    VPN 2   +--+-->
   |  |            |  |                  |  |            |  |
   |  +------------+  |                  |  +------------+  |
   |                  |                  |                  |
   |      ......      |                  |      ......      |
   |                  |                  |                  |
   |  +------------+  |                  |  +------------+  |
   |  |            |  |  IPsec Tunnel N  |  |            |  |
---+->|    VPN N   +--+------------------+->|    VPN N   +--+-->
   |  |            |  |                  |  |            |  |
   |  +------------+  |                  |  +------------+  |
   |                  |                  |                  |
   +------------------+                  +------------------+
]]></artwork>
      </figure>
      <t>Although it is possible to plan the use of private addresses for VPNs within a device, since the network between two devices is a public network, it is necessary to plan public addresses for both ends of the IPsec tunnel. If the number of tunnels increases, the amount of work involved in planning tunnel addresses rises, bringing network planning and management complexity to the operator.</t>
      <t>Meanwhile, for the same VPN, if the device has different neighbors, it needs to create IPsec tunnels with these neighbors separately, as shown in <xref target="differentdevices"/>.</t>
      <figure anchor="differentdevices">
        <name>Separate IPsec Tunnels for the Same VPN Between Different Devices</name>
        <artwork align="center"><![CDATA[
   +------------------+                  +------------------+
   |     Device A     |                  |     Device B     |
   |                  |                  |                  |
   |  +------------+  |  IPsec Tunnel 1  |  +------------+  |
---+->|            +--+------------------+->|            +--+-->
   |  |    VPN 1   |  |                  |  |    VPN 1   |  |
---+->|            +--+-------+          |  |            |  |
   |  +------------+  |       |          |  +------------+  |
   |                  |       |          |                  |
   |      ......      |       |          |      ......      |
   |                  |       |          |                  |
   |  +------------+  |       |          |  +------------+  |
   |  |            |  |       |          |  |            |  |
   |  |    VPN N   |  |       |          |  |    VPN N   |  |
   |  |            |  |       |          |  |            |  |
   |  +------------+  |       |          |  +------------+  |
   |                  |       |          |                  |
   +------------------+       |          +------------------+
                         IPsec|Tunnel 4
                              |          +------------------+
                              |          |     Device C     |
                              |          |                  |
                              |          |  +------------+  |
                              |          |  |            |  |
                              +----------+->|    VPN 1   +--+-->
                                         |  |            |  |
                                         |  +------------+  |
                                         |                  |
                                         |      ......      |
                                         |                  |
                                         |  +------------+  |
                                         |  |            |  |
                                         |  |    VPN N   |  |
                                         |  |            |  |
                                         |  +------------+  |
                                         |                  |
                                         +------------------+
]]></artwork>
      </figure>
      <t>When more peer devices exist and more VPNs are used, more IPsec tunnels need to be established. The complexity of network operation and maintenance is increased, and the number of SAs brought about is also a serious challenge for the devices, since the number of SAs supported by the devices is limited.</t>
      <t>This document proposes a method for multiple VPNs to share the use of IPsec tunnels, which can reduce the number of SAs in the multi-VPN environment, and indirectly reduce the difficulty of network planning, operation, and maintenance.</t>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>In 3GPP networks, the backhaul network between the base station and the security gateway is also protected by IPsec. For traffic traveling from one base station to another, it adds unnecessary overhead if the traffic is detoured from the security gateway. To avoid traffic detouring, the typical practice is to transmit traffic directly between base stations, so that each base station needs to establish an IPsec tunnel with neighboring base stations. As shown in <xref target="fullmeshipsec"/>, the full-meshed IPsec tunnels are established between base stations. In 5G and future millimeter wave applications, base stations will be deployed in more diverse scenarios and at higher densities than before, so devices will need to establish IPsec tunnels with more neighboring base stations.</t>
      <figure anchor="fullmeshipsec">
        <name>Full-Meshed IPsec Tunnels Among Base Stations</name>
        <artwork align="center"><![CDATA[
+------------------+                     +------------------+
|                  |<------------------->|                  |
|  Base Station 1  |                     |  Base Station 2  |
|                  |<---------+          |                  |
+------------------+          |          +------------------+
         ^                    |             ^      ^         
         |                    |             |      |         
         |                    |             |      |         
         |                    |             |      |         
         |      +-------------+-------------+      |         
         |      |             |                    |         
         |      |             |                    |         
         |      |             |                    |         
         v      v             |                    |         
+------------------+          |          +---------+--------+
|                  |          +--------->|                  |
|  Base Station 3  |                     |  Base Station 4  |
|                  |<------------------->|                  |
+------------------+                     +------------------+
]]></artwork>
      </figure>
      <t>Due to the considerable infrastructure construction cost, the operator that owns base stations partially compensates for their investment by sharing their equipment with other operators through Radio Access Network (RAN) Sharing technology <xref target="RANSharing"/>. When multiple operators share the RAN, different operators will be assigned to different VPNs. Because of the isolation of these VPNs, the traffic of different operators does not cross or affect each other, even though the address spaces they use may overlap. However, for these different VPNs, separate IPsec tunnels are needed.</t>
      <t>The number of IPsec tunnels is seriously boosted as the number of base stations and operators sharing the RAN increases. For a scenario where the number of neighbors is N, and the number of sharing operators is M, it is necessary to establish a number of IKE SAs of N * M and a minimum number of Child SAs of N * M. The limited number of SAs supported by the device restricts the development and evolution of services in this scenario.</t>
      <section anchor="possible-solutions">
        <name>Possible Solutions</name>
        <t>Since the device needs to establish an IPsec tunnel with each of its neighbors, and the number of neighbors of the device cannot be optimized, what can be considered is to share the same IPsec tunnel for different VPNs between every two devices. Currently, each VPN's IPsec tunnel uses a separate IKE SA and Child SA, while the shared IPsec tunnel allows different VPNs to use the same IKE SA and Child SA, greatly reducing the number of IKE SAs and Child SAs.</t>
        <t>Currently, when IKEv2 negotiates the creation of a Child SA, it only negotiates the range of traffic to be protected based on the IP five-tuple information without VPN information. That is, the current Child SA does not associate VPN attributes, therefore, different IKE SAs are created to distinguish the traffic of different VPNs. To realize the sharing of the same IPsec tunnel by different VPNs, firstly, it is necessary to add the VPN attribute for each traffic selector when negotiating the traffic to be protected in Child SAs, so that the traffic of different VPNs can be unambiguously placed into the same Child SA. Secondly, because the relationship between Child SAs and VPNs is not one-to-one, it is not possible to determine the VPN based on the SPI field in the IPsec data packet, so it is also necessary to carry the VPN information in the IPsec data packet to distinguish to which VPN the inner packet belongs.</t>
      </section>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="vpn-based-traffic-selection-in-ikev2">
      <name>VPN-Based Traffic Selection in IKEv2</name>
      <section anchor="negotiation-of-support-for-vpn-based-traffic-selection">
        <name>Negotiation of Support for VPN-Based Traffic Selection</name>
        <t>To indicate support for combining VPN information with the Traffic Selector when creating or rekeying the Child SA, the initiator includes the VPN_BASED_TS_SUPPORTED notify payload in the IKE_SA_INIT exchange request.</t>
        <t>A responder that does not support the VPN-based traffic selection processes the request as normal, and does not include the new Notify in the response. As per regular IKEv2 processing, a responder that does not recognize this new Notify, <bcp14>MUST</bcp14> ignore the notify. The absence of the Notify in the response indicates to the initiator that the responder doesn't support or want the use of VPN-based traffic selection. The initiator can continue the IKEv2 negotiation normally or terminate the negotiation based on its local choices.</t>
        <t>A responder that supports the VPN-based traffic selection includes the VPN_BASED_TS_SUPPORTED notify payload in the response, to indicate that it's willing to use the VPN-based Traffic Selectors when creating or rekeying the Child SAs. If both peers have exchanged VPN_BASED_TRAFFIC_SELECTOR_SUPPORTED notifies, peers <bcp14>MUST</bcp14> use the new traffic selectors defined in this document during the CREATE_CHILD_SA exchange, and <bcp14>MUST NOT</bcp14> use the traditional traffic selectors.</t>
        <t>The IKE_SA_INIT message exchange in this case is shown below:</t>
        <artwork><![CDATA[
Initiator                         Responder
-------------------------------------------------------------------
HDR, SAi1, KEi, Ni,
    N(VPN_BASED_TS_SUPPORTED)  -->
                             <--  HDR, SAr1, KEr, Nr, [CERTREQ,]
                                      N(VPN_BASED_TS_SUPPORTED)
]]></artwork>
      </section>
      <section anchor="vpn-based-traffic-selector-negotiation">
        <name>VPN-Based Traffic Selector Negotiation</name>
        <t>Two new Traffic Selector types are introduced to combine the VPN information with the IP address range information. TS_IPV4_ADDR_RANGE_VPN is for the IPv4 VPN addresses, and TS_IPV6_ADDR_RANGE_VPN is for IPv6. Compared to TS_IPV4_ADDR_RANGE and TS_IPV6_ADDR_RANGE, the two new Traffic Selectors contain an additional field called "VPN ID". This new field indicates which VPN the Traffic Selector is associated with.</t>
        <t>When multiple Traffic Selectors with different VPN IDs are included in the TSi and TSr payloads, only the ones with the same VPN ID can be paired. For example, the Traffic Selectors with VPN 1 in the TSi payload should be paired with the Traffic Selectors with VPN 1 in the TSr payload.</t>
        <t>If a Traffic Selector in the TSi or TSr payload can't be paired with a corresponding one with the same VPN ID, then this Traffic Selector <bcp14>MUST</bcp14> be ignored. For example, if a Traffic Selector with VPN 2 is in the TSi payload and no Traffic Selector with VPN 2 is in the TSr payload, then this one in the TSi payload must be ignored.</t>
        <t>If the VPN ID in the paired Traffic Selectors is not recognized, or if all Traffic Selectors in the TSi payload can't be paired with any Traffic Selector in the TSr payload, then the responder <bcp14>SHOULD</bcp14> reply with the TS_UNACCEPTABLE notification to the initiator.</t>
        <t>The initiator and responder <bcp14>MUST</bcp14> share the same understanding of VPN IDs; otherwise, the traffic negotiation result may divert from the operator's expectation. How to do this is out of the scope of this document, and one possible way is that the operator configures the same VPNs and VPN IDs for all devices.</t>
        <t>Other processes for the two new Traffic Selectors are the same as the ones for the traditional Traffic Selectors.</t>
      </section>
      <section anchor="payload-formats">
        <name>Payload Formats</name>
        <section anchor="vpnbasedtssupported-notify">
          <name>VPN_BASED_TS_SUPPORTED Notify</name>
          <t>The VPN_BASED_TS_SUPPORTED Notify Message type notification is used by the initiator and responder to indicate their support for combining VPN information with the Traffic Selector when creating or rekeying the Child SA.</t>
          <artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-+-------------+-------------------------------+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+---------------+-+-------------+-------------------------------+
|Protocol ID(=0)| SPI Size (=0) |      Notify Message Type      |
+---------------+---------------+-------------------------------+
]]></artwork>
          <ul spacing="normal">
            <li>
              <t>Protocol ID (1 octet) - <bcp14>MUST</bcp14> be 0.</t>
            </li>
            <li>
              <t>SPI Size (1 octet) - <bcp14>MUST</bcp14> be 0, meaning no SPI is present.</t>
            </li>
            <li>
              <t>Notify Message Type (2 octets) - <bcp14>MUST</bcp14> be set to the value <tt>TBD1</tt>.</t>
            </li>
          </ul>
          <t>This Notify Message type contains no data.</t>
          <t>The Critical bit <bcp14>MUST</bcp14> be 0. A non-zero value <bcp14>MUST</bcp14> be ignored.</t>
        </section>
        <section anchor="tsipv4addrrangevpn-and-tsipv6addrrangevpn-traffic-selectors">
          <name>TS_IPV4_ADDR_RANGE_VPN and TS_IPV6_ADDR_RANGE_VPN Traffic Selectors</name>
          <t>The TS_IPV4_ADDR_RANGE_VPN and TS_IPV6_ADDR_RANGE_VPN Traffic Selectors are used to identify packet flows, based on IP address ranges and VPN information, for processing by IPsec security services.</t>
          <artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+-------------------------------+
|   TS Type     |IP Protocol ID*|       Selector Length         |
+---------------+---------------+-------------------------------+
|           Start Port*         |           End Port*           |
+---------------+---------------+-------------------------------+
|                                                               |
~                         Starting Address*                     ~
|                                                               |
+---------------------------------------------------------------+
|                                                               |
~                         Ending Address*                       ~
|                                                               |
+---------------------------------------------------------------+
|                             VPN ID                            |
+---------------------------------------------------------------+
]]></artwork>
          <ul spacing="normal">
            <li>
              <t>TS Type (one octet) - Specifies the type of Traffic Selector.</t>
            </li>
            <li>
              <t>IP protocol ID (1 octet) - Value specifying an associated IP protocol ID (such as UDP, TCP, and ICMP).  A value of zero means that the protocol ID is not relevant to this Traffic Selector -- the SA can carry all protocols.</t>
            </li>
            <li>
              <t>Selector Length (2 octets, unsigned integer) - Specifies the length of this Traffic Selector substructure including the header.</t>
            </li>
            <li>
              <t>Start Port (2 octets, unsigned integer) - Value specifying the smallest port number allowed by this Traffic Selector.  For protocols for which port is undefined (including protocol 0), or if all ports are allowed, this field <bcp14>MUST</bcp14> be zero.  ICMP and ICMPv6 Type and Code values, as well as Mobile IP version 6 (MIPv6) mobility header (MH) Type values, are represented in this field as specified in Section 4.4.1.1 of <xref target="RFC4301"/>.  ICMP Type and Code values are treated as a single 16-bit integer port number, with Type in the most significant eight bits and Code in the least significant eight bits.  MIPv6 MH Type values are treated as a single 16-bit integer port number, with Type in the most significant eight bits and the least significant eight bits set to zero.</t>
            </li>
            <li>
              <t>End Port (2 octets, unsigned integer) - Value specifying the largest port number allowed by this Traffic Selector.  For protocols for which port is undefined (including protocol 0), or if all ports are allowed, this field <bcp14>MUST</bcp14> be 65535.  ICMP and ICMPv6 Type and Code values, as well as MIPv6 MH Type values, are represented in this field as specified in Section 4.4.1.1 of <xref target="RFC4301"/>.  ICMP Type and Code values are treated as a single 16-bit integer port number, with Type in the most significant eight bits and Code in the least significant eight bits.  MIPv6 MH Type values are treated as a single 16-bit integer port number, with Type in the most significant eight bits and the least significant eight bits set to zero.</t>
            </li>
            <li>
              <t>Starting Address - The smallest address included in this Traffic Selector (length determined by TS Type).</t>
            </li>
            <li>
              <t>Ending Address - The largest address included in this Traffic Selector (length determined by TS Type).</t>
            </li>
            <li>
              <t>VPN ID - Specifies the ID of the VPN that this Traffic Selector is associated with.</t>
            </li>
          </ul>
          <t>The following table lists values for the Traffic Selector Type field and the corresponding Address Selector Data.</t>
          <artwork><![CDATA[
TS Type                            Value
-------------------------------------------------------------------
TS_IPV4_ADDR_RANGE_VPN              TBD2

    A range of IPv4 VPN addresses, represented by three four-
    octet values.  The first value is the beginning IPv4 address
    (inclusive), the second value is the ending IPv4 address
    (inclusive), and the third value is the VPN ID associated with
    these IPv4 addresses.  All addresses with the same VPN ID
    falling between the two specified addresses are considered to
    be within the list.

TS_IPV6_ADDR_RANGE_VPN              TBD3

    A range of IPv6 VPN addresses, represented by two sixteen-
    octet values and one four-octet value.  The first sixteen-
    octet value is the beginning IPv6 address (inclusive), the
    second sixteen-octet value is the ending IPv6 address
    (inclusive), and the four-octet value is the VPN ID
    associated with these IPv6 addresses.  All addresses with the
    same VPN ID falling between the two specified addresses are
    considered to be within the list.
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="ipsec-data-packet-processing">
      <name>IPsec Data Packet Processing</name>
      <t>When traffic belonging to different VPNs share the same IPsec tunnel (i.e., the same Child SA), the outer IP header and the ESP <xref target="RFC4303"/> / AH <xref target="RFC4302"/> header (the SPI field) are the same for all IPsec traffic. Hence, these headers aren't able to differentiate which VPN the inner traffic belongs to. In order to differentiate between the inner packets' VPNs, it is required that the VPN ID information should be added into the IPsec data packet.</t>
      <t>The possible way is to add VPN ID information in the AH header, and in the ESP header or trailer.</t>
      <section anchor="carrying-vpn-id-in-the-esp-data-packet">
        <name>Carrying VPN ID in the ESP Data Packet</name>
        <section anchor="carrying-vpn-id-in-esp-header">
          <name>Carrying VPN ID in ESP Header</name>
          <t>When using IPsec ESP, the second possible option is that the sender inserts the four-octet VPN ID into the ESP header after the Sequence Number field. The extended ESP format is shown as <xref target="extendedespheader"/>.</t>
          <figure anchor="extendedespheader">
            <name>Extended ESP Format 1</name>
            <artwork align="center"><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------------------------------------------------------+
|               Security Parameters Index (SPI)                 |
+---------------------------------------------------------------+
|                      Sequence Number                          |
+---------------------------------------------------------------+
|                            VPN ID                             |
+---------------------------------------------------------------+---
|                        IV (optional)                          | ^ p
+---------------------------------------------------------------+ | a
|                                                               | | y
~               Rest of Payload Data  (variable)                ~ | l
|                                                               | | o
+               +-----------------------------------------------+ | a
|               |         TFC Padding * (optional, variable)    | v d
+---------------+         +-------------------------------------+---
|                         |        Padding (0-255 bytes)        |
+-------------------------+     +---------------+---------------+
|                               |  Pad Length   | Next Header   |
+-------------------------------+---------------+---------------+
|                                                               |
~              Integrity Check Value-ICV (variable)             ~
|                                                               |
+---------------------------------------------------------------+
]]></artwork>
          </figure>
          <ul spacing="normal">
            <li>
              <t>VPN ID - Specifies the ID of the VPN that this ESP packet belongs to.</t>
            </li>
          </ul>
          <t>The receiver distinguishes the VPN from the VPN ID in the ESP header. Then, all these packets will be processed by the corresponding VPN after the decryption and integrity check.</t>
        </section>
        <section anchor="carrying-vpn-id-in-esp-trailer">
          <name>Carrying VPN ID in ESP Trailer</name>
          <t>When using IPsec ESP, the second possible option is that the sender inserts the four-octet VPN ID into the ESP trailer before the Padding field. The extended ESP format is shown as <xref target="extendedesptrailer1"/>.</t>
          <figure anchor="extendedesptrailer1">
            <name>Extended ESP Format 2</name>
            <artwork align="center"><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------------------------------------------------------+
|               Security Parameters Index (SPI)                 |
+---------------------------------------------------------------+
|                      Sequence Number                          |
+---------------------------------------------------------------+---
|                        IV (optional)                          | ^ p
+---------------------------------------------------------------+ | a
|                                                               | | y
~               Rest of Payload Data  (variable)                ~ | l
|                                                               | | o
+               +-----------------------------------------------+ | a
|               |         TFC Padding * (optional, variable)    | v d
+---------------+         +-------------------------------------+---
|                         |                VPN ID               |
+-------------------------+-------------------------------------+
|      VPN ID (Cont.)     |        Padding (0-255 bytes)        |
+-------------------------+     +---------------+---------------+
|                               |  Pad Length   | Next Header   |
+-------------------------------+---------------+---------------+
|                                                               |
~              Integrity Check Value-ICV (variable)             ~
|                                                               |
+---------------------------------------------------------------+
]]></artwork>
          </figure>
          <ul spacing="normal">
            <li>
              <t>VPN ID - Specifies the ID of the VPN that this ESP packet belongs to.</t>
            </li>
          </ul>
          <t>The third possible option is that the sender inserts the four-octet VPN ID into the ESP trailer before the Next Header field. The extended ESP format is shown as <xref target="extendedesptrailer2"/>.</t>
          <figure anchor="extendedesptrailer2">
            <name>Extended ESP Format 3</name>
            <artwork align="center"><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------------------------------------------------------+
|               Security Parameters Index (SPI)                 |
+---------------------------------------------------------------+
|                      Sequence Number                          |
+---------------------------------------------------------------+---
|                        IV (optional)                          | ^ p
+---------------------------------------------------------------+ | a
|                                                               | | y
~               Rest of Payload Data  (variable)                ~ | l
|                                                               | | o
+               +-----------------------------------------------+ | a
|               |         TFC Padding * (optional, variable)    | v d
+---------------+         +-------------------------------------+---
|                         |        Padding (0-255 bytes)        |
+-------------------------+     +---------------+---------------+
|                               |  Pad Length   |    VPN ID     |
+-------------------------------+---------------+---------------+
|                  VPN ID (Cont.)               |  Next Header  |
+-----------------------------------------------+---------------+
|                                                               |
~              Integrity Check Value-ICV (variable)             ~
|                                                               |
+---------------------------------------------------------------+
]]></artwork>
          </figure>
          <ul spacing="normal">
            <li>
              <t>VPN ID - Specifies the ID of the VPN that this ESP packet belongs to.</t>
            </li>
          </ul>
          <t>The receiver decrypts the ESP packet and distinguishes the VPN from the VPN ID in the ESP trailer. Then, all these packets will be processed by the corresponding VPN after the decryption and integrity check.</t>
        </section>
      </section>
      <section anchor="carrying-vpn-id-in-the-ah-data-packet">
        <name>Carrying VPN ID in the AH Data Packet</name>
        <t>When using IPsec AH, the sender inserts the four-octet VPN ID into the AH header after the Sequence Number field. The extended AH header format is shown as <xref target="extendedahheader"/>.</t>
        <figure anchor="extendedahheader">
          <name>Extended AH Header Format</name>
          <artwork align="center"><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+-------------------------------+
| Next Header   |  Payload Len  |          RESERVED             |
+---------------+---------------+-------------------------------+
|                 Security Parameters Index (SPI)               |
+---------------------------------------------------------------+
|                       Sequence Number                         |
+---------------------------------------------------------------+
|                            VPN ID                             |
+---------------------------------------------------------------+
|                                                               |
~              Integrity Check Value-ICV (variable)             ~
|                                                               |
+---------------------------------------------------------------+
]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>VPN ID - Specifies the ID of the VPN that this AH packet belongs to.</t>
          </li>
        </ul>
        <t>The receiver distinguishes the VPN from the VPN ID in the AH header. Then, all these packets will be processed by the corresponding VPN after the integrity check.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4302">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6. This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4301">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RANSharing" target="https://www.3gpp.org/ftp/Specs/archive/32_series/32.130/32130-i00.zip">
          <front>
            <title>Telecommunication management; Network sharing; Concepts and requirements</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2023" month="September"/>
          </front>
          <seriesInfo name="3GPP TS 32.130 v18.0.0" value=""/>
        </reference>
      </references>
    </references>
    <?line 533?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
