<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lh-spring-srv6-sfc-csid-05" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Compressed SID (CSID) for SRv6 SFC</title>
    <seriesInfo name="Internet-Draft" value="draft-lh-spring-srv6-sfc-csid-05"/>
    <author initials="C." surname="Li" fullname="Cheng Li" role="editor">
      <organization>Huawei</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>c.l@huawei.com</email>
      </address>
    </author>
    <author initials="W." surname="Cheng" fullname="Weiqiang Cheng">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>chengweiqiang@chinamobile.com</email>
      </address>
    </author>
    <author initials="H." surname="Huang" fullname="Hongyi Huang" role="editor">
      <organization>Huawei</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>hongyi.huang@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Li" fullname="Sen Li">
      <organization>China Mobile International Limited</organization>
      <address>
        <postal>
          <country>Hong Kong SAR China</country>
        </postal>
        <email>senli@cmi.chinamobile.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="17"/>
    <area>Routing Area</area>
    <workgroup>SPRING Working Group</workgroup>
    <keyword>Service programming</keyword>
    <keyword>Compression</keyword>
    <abstract>
      <?line 64?>

<t>In SRv6, an SRv6 SID is a 128-bit value. When too many 128-bit SRv6 SIDs are included in an SRH, the introduced overhead will affect the transmission efficiency of payload. In order to address this problem, Compressed SID(CSID) is proposed. This document defines new behaviors for service segments with REPLACE-CSID and NEXT-CSID flavors to enable compressed SRv6 service programming.</t>
    </abstract>
  </front>
  <middle>
    <?line 68?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Segment Routing <xref target="RFC8402"/> is a source routing paradigm to support steering packets through a programmed path at the ingress node. Currently, two data planes are defined for Segment Routing: MPLS and IPv6. When IPv6 data plane is used in Segment Routing, it is called SRv6 <xref target="RFC8754"/> . <xref target="RFC8754"/> defines a new extension header in IPv6, called Segment Routing Header (SRH), to support SRv6. To support SRv6 network programming, <xref target="RFC8986"/> defines a framework to build a network program with topological and service segments carried in a Segment Routing header (SRH) <xref target="RFC8754"/>.</t>
      <t>A Service Function Chain (SFC) <xref target="RFC7665"/> defines an ordered set of abstract service functions and ordering constraints that must be applied to packets and/or frames and/or flows.</t>
      <t>A service function chain can be implemented by SRv6 by using a sequence of SRv6 SIDs including service segments defined in <xref target="I-D.ietf-spring-sr-service-programming"/>.</t>
      <t>However, when too many 128-bit SRv6 SIDs are included in an SRH, the overhead of the SRH will affect the transmission efficiency of the payload. <xref target="I-D.ietf-spring-compression-requirement"/> points out the problem of long SRv6 SID lists reduce payload efficiency. To mitigate such overhead, <xref target="RFC9800"/> defines new flavors for basic SR endpoint behaviors defined in <xref target="RFC8986"/>. Using the new flavored behavior SID, a 128-bit SRv6 SID can be compressed to be an 32-bit or 16-bit Compressed SID (CSID), which reduces a lot of size of the SRv6 header.</t>
      <t>To enable SRv6 SID lists compression for service function chaining (SFC), this document defines new behaviors of service segments with flavors defined in <xref target="RFC9800"/>.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document leverages the terms defined in <xref target="RFC8402"/>, <xref target="RFC8754"/>, <xref target="RFC8986"/>, <xref target="RFC9800"/> and <xref target="I-D.ietf-spring-sr-service-programming"/>. The reader is assumed to be familiar with this terminology. This document does not introduce any new terms.</t>
      </section>
    </section>
    <section anchor="proxy_behaviors">
      <name>SR Proxy Behaviors</name>
      <t><xref target="I-D.ietf-spring-sr-service-programming"/> defines several SRv6 endpoint behaviors for service proxy segments. A service proxy segment ID is represented as an 128-bit value just like other SIDs defined in <xref target="RFC8986"/>. This section defines some new behaviors of those service proxy segments by combining the existing service proxy segment behaviors with CSID flavors, such as REPLACE-CSID flavor and NEXT-CSID flavor.</t>
      <t>The main difference between behaviors are the forwarding instructions. Therefore, when CSID compression mechanism applies to SR Proxy behaviors, the pseudo code of the new behaviors can be generated by updating the forwarding instructions of CSID to SR proxy forwarding instructions. The following sections define the details of the pseudo code of new behaviors.</t>
      <section anchor="static-sr-proxy">
        <name>Static SR Proxy</name>
        <t>In <xref target="I-D.ietf-spring-sr-service-programming"/>, an End.AS - Static proxy endpoint behavior is defined for the static SR proxy. According to the traffic type encapsulated in the SRv6 payload, the pseudo code of Ethernet, IPv4 and IPv6 is described as well in <xref target="I-D.ietf-spring-sr-service-programming"/>. This section defines the new behaviors of associate the NEXT-CSID and REPLACE-CSID Flavor to END.AS.</t>
        <section anchor="static-proxy-for-inner-type-ethernet">
          <name>Static Proxy for Inner Type Ethernet</name>
          <section anchor="replace-csid-flavor">
            <name>REPLACE-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the REPLACE-CSID flavor (a.k.a End.AS with REPLACE-CSID) for Ethernet traffic, the procedure described in <xref section="4.2.1" sectionFormat="of" target="RFC9800"/> is executed except for line R10 and R21 that are both replaced as follows.</t>
            <artwork><![CDATA[
P01.   If (Upper-layer header type != 143 (Ethernet)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Perform IPv6 decapsulation.
P05.   Submit the frame to the Ethernet module for transmission via
         interface IFACE-OUT.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="static-eth-replace-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.1.2.1" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an Ethernet frame received on the interface IFACE-IN and with a destination MAC address that is neither a broadcast address nor matches the address of IFACE-IN, as per <xref section="6.1.2.1" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
          <section anchor="next-csid-flavor">
            <name>NEXT-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the NEXT-CSID flavor (a.k.a End.AS with NEXT-CSID) for Ethernet traffic, the procedure described in <xref section="4.1.1" sectionFormat="of" target="RFC9800"/> is executed except for line N08 of that and line S15 of <xref section="4.1" sectionFormat="of" target="RFC8986"/> that are both replaced as follows.</t>
            <artwork><![CDATA[
Q01.   If (Upper-layer header type != 143 (Ethernet)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
Q03.   }
Q04.   Perform IPv6 decapsulation.
Q05.   Submit the frame to the Ethernet module for transmission via
         interface IFACE-OUT.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="static-eth-next-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.1.2.1" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an Ethernet frame received on the interface IFACE-IN and with a destination MAC address that is neither a broadcast address nor matches the address of IFACE-IN, as per <xref section="6.1.2.1" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
        </section>
        <section anchor="static-proxy-for-inner-type-ipv4">
          <name>Static Proxy for Inner Type IPv4</name>
          <section anchor="replace-csid-flavor-1">
            <name>REPLACE-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the REPLACE-CSID flavor (a.k.a End.AS with REPLACE-CSID) for IPv4 traffic, the procedure described in <xref section="4.2.1" sectionFormat="of" target="RFC9800"/> is executed except for line R10 and R21 that are both replaced as follows.</t>
            <artwork><![CDATA[
P01.   If (Upper-layer header type != 4 (IPv4)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Perform IPv6 decapsulation.
P05.   Submit the packet to the IPv4 module for transmission on
         interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="static-ipv4-replace-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.1.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an IPv4 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, as per <xref section="6.1.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
          <section anchor="next-csid-flavor-1">
            <name>NEXT-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the NEXT-CSID flavor (a.k.a End.AS with NEXT-CSID) for IPv4 traffic, the procedure described in <xref section="4.1.1" sectionFormat="of" target="RFC9800"/> is executed except for line N08 of that and line S15 of <xref section="4.1" sectionFormat="of" target="RFC8986"/> that are both replaced as follows.</t>
            <artwork><![CDATA[
Q01.   If (Upper-layer header type != 4 (IPv4)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
Q03.   }
Q04.   Perform IPv6 decapsulation.
Q05.   Submit the packet to the IPv4 module for transmission on
         interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="static-ipv4-next-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.1.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an IPv4 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, as per <xref section="6.1.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
        </section>
        <section anchor="static-proxy-for-inner-type-ipv6">
          <name>Static Proxy for Inner Type IPv6</name>
          <section anchor="replace-csid-flavor-2">
            <name>REPLACE-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the REPLACE-CSID flavor (a.k.a End.AS with REPLACE-CSID) for IPv6 traffic, the procedure described in <xref section="4.2.1" sectionFormat="of" target="RFC9800"/> is executed except for line R10 and R21 that are both replaced as follows.</t>
            <artwork><![CDATA[
P01.   If (Upper-layer header type != 41 (IPv6)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Perform IPv6 decapsulation.
P05.   Submit the packet to the IPv6 module for transmission on
         interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="static-ipv6-replace-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.1.2.3" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, as per <xref section="6.1.2.3" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
          <section anchor="next-csid-flavor-2">
            <name>NEXT-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the NEXT-CSID flavor (a.k.a End.AS with NEXT-CSID) for IPv6 traffic, the procedure described in <xref section="4.1.1" sectionFormat="of" target="RFC9800"/> is executed except for line N08 of that and line S15 of <xref section="4.1" sectionFormat="of" target="RFC8986"/> that are both replaced as follows.</t>
            <artwork><![CDATA[
Q01.   If (Upper-layer header type != 41 (IPv6)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
Q03.   }
Q04.   Perform IPv6 decapsulation.
Q05.   Submit the packet to the IPv6 module for transmission on
         interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="static-ipv6-next-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.1.2.3" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, as per <xref section="6.1.2.3" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
        </section>
      </section>
      <section anchor="dynamic-sr-proxy">
        <name>Dynamic SR Proxy</name>
        <t>In <xref target="I-D.ietf-spring-sr-service-programming"/>, an End.AD - Dynamic proxy endpoint behavior is defined for the dynamic SR proxy. According to the traffic type encapsulated in the SRv6 payload, the pseudo code of Ethernet, IPv4 and IPv6 is described as well in <xref target="I-D.ietf-spring-sr-service-programming"/>. This section defines the new behaviors of associate the NEXT-CSID and REPLACE-CSID Flavor to END.AD.</t>
        <section anchor="dynamic-proxy-for-inner-type-ethernet">
          <name>Dynamic Proxy for Inner Type Ethernet</name>
          <section anchor="replace-csid-flavor-3">
            <name>REPLACE-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the REPLACE-CSID flavor (a.k.a End.AD with REPLACE-CSID) for Ethernet traffic, the procedure described in <xref section="4.2.1" sectionFormat="of" target="RFC9800"/> is executed except for line R10 and R21 that are both replaced as follows.</t>
            <artwork><![CDATA[
P01.   If (Upper-layer header type != 143 (Ethernet)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Copy the IPv6 encapsulation in a CACHE entry associated with
            the interface IFACE-IN.
P05.   Perform IPv6 decapsulation.
P06.   Submit the frame to the Ethernet module for transmission via
         interface IFACE-OUT.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="dynamic-eth-replace-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an Ethernet frame received on the interface IFACE-IN and with a destination MAC address that is neither a broadcast address nor matches the address of IFACE-IN, as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
          <section anchor="next-csid-flavor-3">
            <name>NEXT-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the NEXT-CSID flavor (a.k.a End.AD with NEXT-CSID) for Ethernet traffic, the procedure described in <xref section="4.1.1" sectionFormat="of" target="RFC9800"/> is executed except for line N08 of that and line S15 of <xref section="4.1" sectionFormat="of" target="RFC8986"/> that are both replaced as follows.</t>
            <artwork><![CDATA[
Q01.   If (Upper-layer header type != 143 (Ethernet)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
Q03.   }
Q04.   Copy the IPv6 encapsulation in a CACHE entry associated with
            the interface IFACE-IN.
Q05.   Perform IPv6 decapsulation.
Q06.   Submit the frame to the Ethernet module for transmission via
         interface IFACE-OUT.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="dynamic-eth-next-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an Ethernet frame received on the interface IFACE-IN and with a destination MAC address that is neither a broadcast address nor matches the address of IFACE-IN, as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
        </section>
        <section anchor="dynamic-proxy-for-inner-type-ipv4">
          <name>Dynamic Proxy for Inner Type IPv4</name>
          <section anchor="replace-csid-flavor-4">
            <name>REPLACE-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the REPLACE-CSID flavor (a.k.a End.AD with REPLACE-CSID) for IPv4 traffic, the procedure described in <xref section="4.2.1" sectionFormat="of" target="RFC9800"/> is executed except for line R10 and R21 that are both replaced as follows.</t>
            <artwork><![CDATA[
P01.   If (Upper-layer header type != 4 (IPv4)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Copy the IPv6 encapsulation in a CACHE entry associated with
            the interface IFACE-IN.
P05.   Perform IPv6 decapsulation.
P06.   Submit the frame to the IPv4 module for transmission via
         interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="dynamic-ipv4-replace-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an IPv4 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
          <section anchor="next-csid-flavor-4">
            <name>NEXT-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the NEXT-CSID flavor (a.k.a End.AD with NEXT-CSID) for IPv4 traffic, the procedure described in <xref section="4.1.1" sectionFormat="of" target="RFC9800"/> is executed except for line N08 of that and line S15 of <xref section="4.1" sectionFormat="of" target="RFC8986"/> that are both replaced as follows.</t>
            <artwork><![CDATA[
Q01. If (Upper-layer header type != 4 (IPv4)) {
Q02.   Resubmit the packet to the IPv6 module for transmission to
        the new destination.
Q03. }
Q04. Copy the IPv6 encapsulation in a CACHE entry associated with
        the interface IFACE-IN.
Q05. Perform IPv6 decapsulation.
Q06. Submit the frame to the IPv4 module for transmission via
      interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="dynamic-ipv4-next-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an IPv4 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
        </section>
        <section anchor="dynamic-proxy-for-inner-type-ipv6">
          <name>Dynamic Proxy for Inner Type IPv6</name>
          <section anchor="replace-csid-flavor-5">
            <name>REPLACE-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the REPLACE-CSID flavor (a.k.a End.AD with REPLACE-CSID) for IPv6 traffic, the procedure described in <xref section="4.2.1" sectionFormat="of" target="RFC9800"/> is executed except for line R10 and R21 that are both replaced as follows.</t>
            <artwork><![CDATA[
P01. If (Upper-layer header type != 41 (IPv6)) {
P02.   Resubmit the packet to the IPv6 module for transmission to
        the new destination.
P03. }
P04. Copy the IPv6 encapsulation in a CACHE entry associated with
        the interface IFACE-IN.
P05. Perform IPv6 decapsulation.
P06. Submit the frame to the IPv6 module for transmission via
      interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="dynamic-ipv6-replace-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
          <section anchor="next-csid-flavor-5">
            <name>NEXT-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the NEXT-CSID flavor (a.k.a End.AD with NEXT-CSID) for IPv6 traffic, the procedure described in <xref section="4.1.1" sectionFormat="of" target="RFC9800"/> is executed except for line N08 of that and line S15 of <xref section="4.1" sectionFormat="of" target="RFC8986"/> that are both replaced as follows.</t>
            <artwork><![CDATA[
Q01. If (Upper-layer header type != 41 (IPv6)) {
Q02.   Resubmit the packet to the IPv6 module for transmission to
        the new destination.
Q03. }
Q04. Copy the IPv6 encapsulation in a CACHE entry associated with
        the interface IFACE-IN.
Q05. Perform IPv6 decapsulation.
Q06. Submit the frame to the IPv6 module for transmission via
      interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="dynamic-ipv6-next-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
        </section>
      </section>
      <section anchor="shared-memory-sr-proxy">
        <name>Shared Memory SR Proxy</name>
        <t>This document does not need to define new flavors for shared proxy behavior as the processing will be executed by using the shared memory <xref section="6.3" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
      </section>
      <section anchor="mas_proxy">
        <name>Masquerading SR Proxy</name>
        <t>As per <xref target="I-D.ietf-spring-sr-service-programming"/>, when forwarding packets to SR-unaware SFs, masquerading SR proxy sets the destination address of the IPv6 header as segment list[0] which is the original final destination address. When receiving the traffic returning from the service, de-masquerading sets the destination address as segment list[Segment Left].</t>
        <t>To be consistent with the behavior of masquerading proxy, it's required that any segment list containing one or more masquerading proxy CSID <bcp14>MUST NOT</bcp14> apply any compression encoding to the last segment (segment list[0]).</t>
        <t>Note: The service receiving an IPv6 packet from the proxy uses the destination address (copied from last segment) as final destination and could apply certain actions based on that. In order to process and forward packets correctly, it is required that the last segment not be compressed.</t>
        <t>To be consistent with the behavior of masquerading proxy, when processing an IPv6 packet matching a FIB entry locally instantiated as an SRv6 masquerading CSID, it's required that the updated destination address <bcp14>MUST</bcp14> be cached in the proxy by adding a dynamic caching mechanism similar to the one described in <xref section="6.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/> in case that segment list[Segment Left] is a compressed SID.</t>
        <t>When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, the destination address <bcp14>MUST</bcp14> be recovered from CACHE in case that segment list[Segment Left] could be a CSID container.</t>
        <section anchor="srv6-masquerading-proxy-pseudocode">
          <name>SRv6 Masquerading Proxy Pseudocode</name>
          <t>In <xref target="I-D.ietf-spring-sr-service-programming"/>, an End.AM - Masquerading proxy endpoint behavior is defined for the Masquerading SR proxy. According to the traffic type encapsulated in the SRv6 payload, the pseudo code of Ethernet, IPv4 and IPv6 is described as well in <xref target="I-D.ietf-spring-sr-service-programming"/>. This section defines the new behaviors of associate the NEXT-CSID and REPLACE-CSID Flavor to END.AM.</t>
          <section anchor="replace-csid-flavor-6">
            <name>REPLACE-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 masquerading proxy SID with the REPLACE-CSID flavor (a.k.a End.AM with REPLACE-CSID), the procedure described in Figure 23 from <xref section="4.2.1" sectionFormat="of" target="RFC9800"/> is executed except for line R10 and R21 that are both replaced as follows.</t>
            <artwork><![CDATA[
P01. Copy the IPv6 Destination Address in a CACHE entry associated 
      with the interface IFACE-IN.
P02. Copy Segment List[0] from the SRH to the Destination Address
      of the IPv6 header.
P03. Submit the packet to the IPv6 module for transmission on
      interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="srv6-masquerading-replace-code"/>.</t>
            <t><strong>De-masquerading</strong>: When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, the procedure described in Figure 24 from <xref section="6.4.1" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/> is executed except for line S10 that is replaced as follows.</t>
            <artwork><![CDATA[
D01. Retrieve the CACHE entry associated with IFACE-IN.
D02. If the CACHE entry is not empty {
D03.    Destination Address of the IPv6 header is set to CACHE.
D04. }
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="srv6-de-masquerading-replace-code"/>.</t>
          </section>
          <section anchor="next-csid-flavor-6">
            <name>NEXT-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 masquerading proxy SID with the NEXT-CSID flavor (a.k.a End.AM with NEXT-CSID), the procedure described in <xref section="4.1.1" sectionFormat="of" target="RFC9800"/> is executed except for line N08 of that and line S15 of <xref section="4.1" sectionFormat="of" target="RFC8986"/> that are both replaced as follows.</t>
            <artwork><![CDATA[
Q01. Copy the IPv6 Destination Address in a CACHE entry associated 
      with the interface IFACE-IN.
Q02. Copy Segment List[0] from the SRH to the Destination Address
      of the IPv6 header.
Q03. Submit the packet to the IPv6 module for transmission on
      interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="srv6-masquerading-next-code"/>}.</t>
            <t><strong>De-masquerading</strong>: When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, the procedure described in <xref section="6.4.1" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/> is executed except for line S10 that is replaced as follows.</t>
            <artwork><![CDATA[
E01. Retrieve the CACHE entry associated with IFACE-IN.
E02. If the CACHE entry is not empty {
E03.    Destination Address of the IPv6 header is set to CACHE.
E04. }
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="srv6-de-masquerading-next-code"/>.</t>
          </section>
        </section>
        <section anchor="destination-nat-flavor">
          <name>Destination NAT Flavor</name>
          <section anchor="replace-csid-flavor-7">
            <name>REPLACE-CSID Flavor</name>
            <t>The Destination NAT flavor of the SRv6 masquerading proxy with the REPLACE-CSID (a.k.a End.AM- Masquerading proxy with NAT with REPLACE-CSID, End.AMN with REPLACE-CSID for short) is executed except for line S09.1 and S10 in <xref section="6.4.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/> replaced as follows.</t>
            <artwork><![CDATA[
P01. Copy the Destination Address of the IPv6 header to the
      Segment List[0] entry of the SRH.
P02. Retrieve the CACHE entry associated with IFACE-IN.
P03. If the CACHE entry is not empty {
P04.    Destination Address of the IPv6 header is set to CACHE.
P05. }
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="nat-replace-code"/>.</t>
          </section>
          <section anchor="next-csid-flavor-7">
            <name>NEXT-CSID Flavor</name>
            <t>The Destination NAT flavor of the SRv6 masquerading proxy with the NEXT-CSID (a.k.a End.AM- Masquerading proxy with NAT with NEXT-CSID, End.AMN with NEXT-CSID for short) is executed except for line S09.1 and S10 in <xref section="6.4.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/> replaced as follows.</t>
            <artwork><![CDATA[
Q01. Copy the Destination Address of the IPv6 header to the
      Segment List[0] entry of the SRH.
Q02. Retrieve the CACHE entry associated with IFACE-IN.
Q03. If the CACHE entry is not empty {
Q04.    Destination Address of the IPv6 header is set to CACHE.
Q05. }
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="nat-next-code"/>.</t>
          </section>
        </section>
        <section anchor="cache-flavor">
          <name>Cache Flavor</name>
          <t>The caching flavor of the SRv6 masquerading proxy with CSID is enabled as per <xref section="6.4.3" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/> without any modification.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security requirements and mechanisms described in <xref target="RFC8402"/> and <xref target="RFC8754"/> also apply to this document.</t>
      <t>This document does not introduce any new security considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="srv6-endpoint-behaviors">
        <name>SRv6 Endpoint Behaviors</name>
        <t>This document requests the IANA to allocate, within the "SRv6 Endpoint Behaviors" sub-registry belonging to the top-level "Segment-routing with IPv6 dataplane (SRv6) Parameters" registry, the following allocations:</t>
        <artwork><![CDATA[
Value      Description                               Reference
--------------------------------------------------------------
180        End.AS with REPLACE-CSID                  [This.ID]
181        End.AS with NEXT-CSID                     [This.ID]
182        End.AD with REPLACE-CSID                  [This.ID]
183        End.AD with NEXT-CSID                     [This.ID]
184        End.AM with REPLACE-CSID                  [This.ID]
185        End.AM with NEXT-CSID                     [This.ID]
186        End.AMN with REPLACE-CSID                 [This.ID]
187        End.AMN with NEXT-CSID                    [This.ID]
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8402">
          <front>
            <title>Segment Routing Architecture</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="July" year="2018"/>
            <abstract>
              <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
              <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
              <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8402"/>
          <seriesInfo name="DOI" value="10.17487/RFC8402"/>
        </reference>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC9800">
          <front>
            <title>Compressed SRv6 Segment List Encoding</title>
            <author fullname="W. Cheng" initials="W." role="editor" surname="Cheng"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="F. Clad" initials="F." role="editor" surname="Clad"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>Segment Routing over IPv6 (SRv6) is the instantiation of Segment Routing (SR) on the IPv6 data plane. This document specifies new flavors for the SRv6 endpoint behaviors defined in RFC 8986, which enable the compression of an SRv6 segment list. Such compression significantly reduces the size of the SRv6 encapsulation needed to steer packets over long segment lists.</t>
              <t>This document updates RFC 8754 by allowing a Segment List entry in the Segment Routing Header (SRH) to be either an IPv6 address, as specified in RFC 8754, or a REPLACE-CSID container in packed format, as specified in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9800"/>
          <seriesInfo name="DOI" value="10.17487/RFC9800"/>
        </reference>
        <reference anchor="I-D.ietf-spring-sr-service-programming">
          <front>
            <title>Service Programming with Segment Routing</title>
            <author fullname="Francois Clad" initials="F." surname="Clad">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Xiaohu Xu" initials="X." surname="Xu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Daniel Bernier" initials="D." surname="Bernier">
              <organization>Bell Canada</organization>
            </author>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei</organization>
            </author>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Shaowen Ma" initials="S." surname="Ma">
              <organization>Mellanox</organization>
            </author>
            <author fullname="Chaitanya Yadlapalli" initials="C." surname="Yadlapalli">
              <organization>AT&amp;T</organization>
            </author>
            <author fullname="Wim Henderickx" initials="W." surname="Henderickx">
              <organization>Nokia</organization>
            </author>
            <author fullname="Stefano Salsano" initials="S." surname="Salsano">
              <organization>Universita di Roma "Tor Vergata"</organization>
            </author>
            <date day="23" month="February" year="2025"/>
            <abstract>
              <t>   This document defines data plane functionality required to implement
   service segments and achieve service programming in SR-enabled MPLS
   and IPv6 networks, as described in the Segment Routing architecture.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-spring-sr-service-programming-11"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="I-D.ietf-spring-compression-requirement">
          <front>
            <title>Compressed SRv6 SID List Requirements</title>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Ron Bonica" initials="R." surname="Bonica">
              <organization>Juniper</organization>
            </author>
            <author fullname="Darren Dukes" initials="D." surname="Dukes">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei</organization>
            </author>
            <author fullname="Shaofu Peng" initials="S." surname="Peng">
              <organization>ZTE</organization>
            </author>
            <author fullname="Wim Henderickx" initials="W." surname="Henderickx">
              <organization>Nokia</organization>
            </author>
            <date day="3" month="April" year="2023"/>
            <abstract>
              <t>   This document specifies requirements for solutions to compress SRv6
   SID lists.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-spring-compression-requirement-03"/>
        </reference>
      </references>
    </references>
    <?line 567?>

<section anchor="complete-pseudocodes">
      <name>Complete Pseudocodes</name>
      <section anchor="static-eth-replace-code">
        <name>REPLACE-CSID Flavor for Static Proxy for Inner Type Ethernet</name>
        <t>When processing the SRH of a packet matching a FIB entry locally instantiated as an SRv6 static proxy SID with the REPLACE-CSID flavor for Ethernet traffic:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0 and (DA.Arg.Index == 0 or
           Segment List[0][DA.Arg.Index-1] == 0)) {
S03.     Stop processing the SRH, and proceed to process the next
           header in the packet, whose type is identified by
           the Next Header field in the routing header.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
           Code 0 (Hop limit exceeded in transit),
           interrupt packet processing and discard the packet.
S07.   }
S08.   max_LE = (Hdr Ext Len / 2) - 1
R01.   If (DA.Arg.Index != 0) {
R02.     If ((Last Entry > max_LE) or (Segments Left > Last Entry)) {
R03.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R04.     }
R05.     Decrement DA.Arg.Index by 1.
R06.     If (Segment List[Segments Left][DA.Arg.Index] == 0) {
R07.       Decrement Segments Left by 1.
R08.       Decrement IPv6 Hop Limit by 1.
R09.       Update IPv6 DA with Segment List[Segments Left]
P01.       If (Upper-layer header type != 143 (Ethernet)) {
P02.         Resubmit the packet to the IPv6 module for    
                transmission to the new destination.
P03.       }
P04.       Perform IPv6 decapsulation.
P05.       Submit the frame to the Ethernet module for transmission
             via interface IFACE-OUT.
R11.     }
R12.   } Else {
R13.     If((Last Entry > max_LE) or (Segments Left > Last Entry+1)){
R14.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R15.     }
R16.     Decrement Segments Left by 1.
R17.     Set DA.Arg.Index to (128/LNFL - 1).
R18.   }
R19.   Decrement IPv6 Hop Limit by 1.
R20.   Write Segment List[Segments Left][DA.Arg.Index] into the bits
         [LBL..LBL+LNFL-1] of the Destination Address of the IPv6
         header.
P01.   If (Upper-layer header type != 143 (Ethernet)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Perform IPv6 decapsulation.
P05.   Submit the frame to the Ethernet module for transmission via
         interface IFACE-OUT.
S16. }
]]></artwork>
      </section>
      <section anchor="static-eth-next-code">
        <name>NEXT-CSID Flavor for Static Proxy for Inner Type Ethernet</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the NEXT-CSID flavor for Ethernet traffic:</t>
        <artwork><![CDATA[
N01. If (DA.Argument != 0) {
N02.   If (IPv6 Hop Limit <= 1) {
N03.     Send an ICMP Time Exceeded message to the Source Address
           with Code 0 (Hop limit exceeded in transit),
           interrupt packet processing, and discard the packet.
N04.   }
N05.   Copy the value of DA.Argument into the bits [LBL..(LBL+AL-1)]
         of the Destination Address.
N06.   Set the bits [(LBL+AL)..127] of the Destination Address to
         zero.
N07.   Decrement IPv6 Hop Limit by 1.
Q01.   If (Upper-layer header type != 143 (Ethernet)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
Q03.   }
Q04.   Perform IPv6 decapsulation.
Q05.   Submit the frame to the Ethernet module for transmission via
           interface IFACE-OUT.
N09. }
S02. If (Segments Left == 0) {
S03.   Stop processing the SRH, and proceed to process the next
         header in the packet, whose type is identified by
         the Next Header field in the routing header.
S04. }
S05. If (IPv6 Hop Limit <= 1) {
S06.   Send an ICMP Time Exceeded message to the Source Address
         with Code 0 (Hop limit exceeded in transit),
         interrupt packet processing, and discard the packet.
S07. }
S08. max_LE = (Hdr Ext Len / 2) - 1
S09. If ((Last Entry > max_LE) or (Segments Left > Last Entry+1)) {
S10.   Send an ICMP Parameter Problem to the Source Address
         with Code 0 (Erroneous header field encountered)
         and Pointer set to the Segments Left field,
         interrupt packet processing, and discard the packet.
S11. }
S12. Decrement IPv6 Hop Limit by 1.
S13. Decrement Segments Left by 1.
S14. Update IPv6 DA with Segment List[Segments Left].
Q01. If (Upper-layer header type != 143 (Ethernet)) {
Q02.   Resubmit the packet to the IPv6 module for transmission to
         the new destination.
Q03. }
Q04. Perform IPv6 decapsulation.
Q05. Submit the frame to the Ethernet module for transmission via
        interface IFACE-OUT.
]]></artwork>
      </section>
      <section anchor="static-ipv4-replace-code">
        <name>REPLACE-CSID Flavor for Static Proxy for Inner Type IPv4</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the REPLACE-CSID flavor for IPv4 traffic:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0 and (DA.Arg.Index == 0 or
           Segment List[0][DA.Arg.Index-1] == 0)) {
S03.     Stop processing the SRH, and proceed to process the next
           header in the packet, whose type is identified by
           the Next Header field in the routing header.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
           Code 0 (Hop limit exceeded in transit),
           interrupt packet processing and discard the packet.
S07.   }
S08.   max_LE = (Hdr Ext Len / 2) - 1
R01.   If (DA.Arg.Index != 0) {
R02.     If ((Last Entry > max_LE) or (Segments Left > Last Entry)) {
R03.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R04.     }
R05.     Decrement DA.Arg.Index by 1.
R06.     If (Segment List[Segments Left][DA.Arg.Index] == 0) {
R07.       Decrement Segments Left by 1.
R08.       Decrement IPv6 Hop Limit by 1.
R09.       Update IPv6 DA with Segment List[Segments Left]
P01.       If (Upper-layer header type != 4 (IPv4)) {
P02.         Resubmit the packet to the IPv6 module for transmission
               to the new destination.
P03.       }
P04.       Perform IPv6 decapsulation.
P05.       Submit the packet to the IPv4 module for transmission on
             interface IFACE-OUT via NH-ADDR.
R11.     }
R12.   } Else {
R13.     If((Last Entry > max_LE) or (Segments Left > Last Entry+1)){
R14.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R15.     }
R16.     Decrement Segments Left by 1.
R17.     Set DA.Arg.Index to (128/LNFL - 1).
R18.   }
R19.   Decrement IPv6 Hop Limit by 1.
R20.   Write Segment List[Segments Left][DA.Arg.Index] into the bits
         [LBL..LBL+LNFL-1] of the Destination Address of the IPv6
         header.
P01.   If (Upper-layer header type != 4 (IPv4)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Perform IPv6 decapsulation.
P05.   Submit the packet to the IPv4 module for transmission on
         interface IFACE-OUT via NH-ADDR.
S16. }
]]></artwork>
      </section>
      <section anchor="static-ipv4-next-code">
        <name>NEXT-CSID Flavor for Static Proxy for Inner Type IPv4</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the NEXT-CSID flavor for IPv4 traffic:</t>
        <artwork><![CDATA[
N01. If (DA.Argument != 0) {
N02.   If (IPv6 Hop Limit <= 1) {
N03.     Send an ICMP Time Exceeded message to the Source Address
           with Code 0 (Hop limit exceeded in transit),
           interrupt packet processing, and discard the packet.
N04.   }
N05.   Copy the value of DA.Argument into the bits [LBL..(LBL+AL-1)]
         of the Destination Address.
N06.   Set the bits [(LBL+AL)..127] of the Destination Address to
         zero.
N07.   Decrement IPv6 Hop Limit by 1.
Q01.   If (Upper-layer header type != 4 (IPv4)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
Q03.   }
Q04.   Perform IPv6 decapsulation.
Q05.   Submit the packet to the IPv4 module for transmission on
         interface IFACE-OUT via NH-ADDR.
N09. }
S02. If (Segments Left == 0) {
S03.   Stop processing the SRH, and proceed to process the next
         header in the packet, whose type is identified by
         the Next Header field in the routing header.
S04. }
S05. If (IPv6 Hop Limit <= 1) {
S06.   Send an ICMP Time Exceeded message to the Source Address
         with Code 0 (Hop limit exceeded in transit),
         interrupt packet processing, and discard the packet.
S07. }
S08. max_LE = (Hdr Ext Len / 2) - 1
S09. If ((Last Entry > max_LE) or (Segments Left > Last Entry+1)) {
S10.   Send an ICMP Parameter Problem to the Source Address
         with Code 0 (Erroneous header field encountered)
         and Pointer set to the Segments Left field,
         interrupt packet processing, and discard the packet.
S11. }
S12. Decrement IPv6 Hop Limit by 1.
S13. Decrement Segments Left by 1.
S14. Update IPv6 DA with Segment List[Segments Left].
Q01. If (Upper-layer header type != 4 (IPv4)) {
Q02.   Resubmit the packet to the IPv6 module for transmission to
         the new destination.
Q03. }
Q04. Perform IPv6 decapsulation.
Q05. Submit the packet to the IPv4 module for transmission on
       interface IFACE-OUT via NH-ADDR.
]]></artwork>
      </section>
      <section anchor="static-ipv6-replace-code">
        <name>REPLACE-CSID Flavor for Static Proxy for Inner Type IPv6</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the REPLACE-CSID flavor for IPv6 traffic:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0 and (DA.Arg.Index == 0 or
           Segment List[0][DA.Arg.Index-1] == 0)) {
S03.     Stop processing the SRH, and proceed to process the next
           header in the packet, whose type is identified by
           the Next Header field in the routing header.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
           Code 0 (Hop limit exceeded in transit),
           interrupt packet processing and discard the packet.
S07.   }
S08.   max_LE = (Hdr Ext Len / 2) - 1
R01.   If (DA.Arg.Index != 0) {
R02.     If ((Last Entry > max_LE) or (Segments Left > Last Entry)) {
R03.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R04.     }
R05.     Decrement DA.Arg.Index by 1.
R06.     If (Segment List[Segments Left][DA.Arg.Index] == 0) {
R07.       Decrement Segments Left by 1.
R08.       Decrement IPv6 Hop Limit by 1.
R09.       Update IPv6 DA with Segment List[Segments Left]
P01.     If (Upper-layer header type != 41 (IPv6)) {
P02.       Resubmit the packet to the IPv6 module for transmission to
             the new destination.
P03.     }
P04.     Perform IPv6 decapsulation.
P05.     Submit the packet to the IPv6 module for transmission on
         interface IFACE-OUT via NH-ADDR.
R11.     }
R12.   } Else {
R13.     If((Last Entry > max_LE) or (Segments Left > Last Entry+1)){
R14.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R15.     }
R16.     Decrement Segments Left by 1.
R17.     Set DA.Arg.Index to (128/LNFL - 1).
R18.   }
R19.   Decrement IPv6 Hop Limit by 1.
R20.   Write Segment List[Segments Left][DA.Arg.Index] into the bits
         [LBL..LBL+LNFL-1] of the Destination Address of the IPv6
         header.
P01.   If (Upper-layer header type != 41 (IPv6)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Perform IPv6 decapsulation.
P05.   Submit the packet to the IPv6 module for transmission on
         interface IFACE-OUT via NH-ADDR.
S16. }
]]></artwork>
      </section>
      <section anchor="static-ipv6-next-code">
        <name>NEXT-CSID Flavor for Static Proxy for Inner Type IPv6</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the NEXT-CSID flavor for IPv6 traffic:</t>
        <artwork><![CDATA[
N01. If (DA.Argument != 0) {
N02.   If (IPv6 Hop Limit <= 1) {
N03.     Send an ICMP Time Exceeded message to the Source Address
           with Code 0 (Hop limit exceeded in transit),
           interrupt packet processing, and discard the packet.
N04.   }
N05.   Copy the value of DA.Argument into the bits [LBL..(LBL+AL-1)]
         of the Destination Address.
N06.   Set the bits [(LBL+AL)..127] of the Destination Address to
         zero.
N07.   Decrement IPv6 Hop Limit by 1.
Q01.   If (Upper-layer header type != 41 (IPv6)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
Q03.   }
Q04.   Perform IPv6 decapsulation.
Q05.   Submit the packet to the IPv6 module for transmission on
         interface IFACE-OUT via NH-ADDR.
N09. }
S02. If (Segments Left == 0) {
S03.   Stop processing the SRH, and proceed to process the next
         header in the packet, whose type is identified by
         the Next Header field in the routing header.
S04. }
S05. If (IPv6 Hop Limit <= 1) {
S06.   Send an ICMP Time Exceeded message to the Source Address
         with Code 0 (Hop limit exceeded in transit),
         interrupt packet processing, and discard the packet.
S07. }
S08. max_LE = (Hdr Ext Len / 2) - 1
S09. If ((Last Entry > max_LE) or (Segments Left > Last Entry+1)) {
S10.   Send an ICMP Parameter Problem to the Source Address
         with Code 0 (Erroneous header field encountered)
         and Pointer set to the Segments Left field,
         interrupt packet processing, and discard the packet.
S11. }
S12. Decrement IPv6 Hop Limit by 1.
S13. Decrement Segments Left by 1.
S14. Update IPv6 DA with Segment List[Segments Left].
Q01. If (Upper-layer header type != 41 (IPv6)) {
Q02.   Resubmit the packet to the IPv6 module for transmission to
        the new destination.
Q03. }
Q04. Perform IPv6 decapsulation.
Q05. Submit the packet to the IPv6 module for transmission on
       interface IFACE-OUT via NH-ADDR.
]]></artwork>
      </section>
      <section anchor="dynamic-eth-replace-code">
        <name>REPLACE-CSID Flavor for Dynamic Proxy for Inner Type Ethernet</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the REPLACE-CSID flavor for Ethernet traffic:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0 and (DA.Arg.Index == 0 or
           Segment List[0][DA.Arg.Index-1] == 0)) {
S03.     Stop processing the SRH, and proceed to process the next
           header in the packet, whose type is identified by
           the Next Header field in the routing header.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
           Code 0 (Hop limit exceeded in transit),
           interrupt packet processing and discard the packet.
S07.   }
S08.   max_LE = (Hdr Ext Len / 2) - 1
R01.   If (DA.Arg.Index != 0) {
R02.     If ((Last Entry > max_LE) or (Segments Left > Last Entry)) {
R03.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R04.     }
R05.     Decrement DA.Arg.Index by 1.
R06.     If (Segment List[Segments Left][DA.Arg.Index] == 0) {
R07.       Decrement Segments Left by 1.
R08.       Decrement IPv6 Hop Limit by 1.
R09.       Update IPv6 DA with Segment List[Segments Left]
P01.       If (Upper-layer header type != 143 (Ethernet)) {
P02.         Resubmit the packet to the IPv6 module for transmission to
               the new destination.
P03.       }
P04.       Copy the IPv6 encapsulation in a CACHE entry associated with
                the interface IFACE-IN.
P05.       Perform IPv6 decapsulation.
P06.       Submit the frame to the Ethernet module for transmission via
         interface IFACE-OUT.
R11.     }
R12.   } Else {
R13.     If((Last Entry > max_LE) or (Segments Left > Last Entry+1)){
R14.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R15.     }
R16.     Decrement Segments Left by 1.
R17.     Set DA.Arg.Index to (128/LNFL - 1).
R18.   }
R19.   Decrement IPv6 Hop Limit by 1.
R20.   Write Segment List[Segments Left][DA.Arg.Index] into the bits
         [LBL..LBL+LNFL-1] of the Destination Address of the IPv6
         header.
P01.   If (Upper-layer header type != 143 (Ethernet)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Copy the IPv6 encapsulation in a CACHE entry associated with
            the interface IFACE-IN.
P05.   Perform IPv6 decapsulation.
P06.   Submit the frame to the Ethernet module for transmission via
         interface IFACE-OUT.
S16. }
]]></artwork>
      </section>
      <section anchor="dynamic-eth-next-code">
        <name>NEXT-CSID Flavor for Dynamic Proxy for Inner Type Ethernet</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the NEXT-CSID flavor for Ethernet traffic:</t>
        <artwork><![CDATA[
N01. If (DA.Argument != 0) {
N02.   If (IPv6 Hop Limit <= 1) {
N03.     Send an ICMP Time Exceeded message to the Source Address
           with Code 0 (Hop limit exceeded in transit),
           interrupt packet processing, and discard the packet.
N04.   }
N05.   Copy the value of DA.Argument into the bits [LBL..(LBL+AL-1)]
         of the Destination Address.
N06.   Set the bits [(LBL+AL)..127] of the Destination Address to
         zero.
N07.   Decrement IPv6 Hop Limit by 1.
Q01.   If (Upper-layer header type != 143 (Ethernet)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
Q03.   }
Q04.   Copy the IPv6 encapsulation in a CACHE entry associated with
            the interface IFACE-IN.
Q05.   Perform IPv6 decapsulation.
Q06.   Submit the frame to the Ethernet module for transmission via
         interface IFACE-OUT.
N09. }
S02. If (Segments Left == 0) {
S03.   Stop processing the SRH, and proceed to process the next
         header in the packet, whose type is identified by
         the Next Header field in the routing header.
S04. }
S05. If (IPv6 Hop Limit <= 1) {
S06.   Send an ICMP Time Exceeded message to the Source Address
         with Code 0 (Hop limit exceeded in transit),
         interrupt packet processing, and discard the packet.
S07. }
S08. max_LE = (Hdr Ext Len / 2) - 1
S09. If ((Last Entry > max_LE) or (Segments Left > Last Entry+1)) {
S10.   Send an ICMP Parameter Problem to the Source Address
         with Code 0 (Erroneous header field encountered)
         and Pointer set to the Segments Left field,
         interrupt packet processing, and discard the packet.
S11. }
S12. Decrement IPv6 Hop Limit by 1.
S13. Decrement Segments Left by 1.
S14. Update IPv6 DA with Segment List[Segments Left].
Q01. If (Upper-layer header type != 143 (Ethernet)) {
Q02.   Resubmit the packet to the IPv6 module for transmission to
        the new destination.
Q03. }
Q04. Copy the IPv6 encapsulation in a CACHE entry associated with
        the interface IFACE-IN.
Q05. Perform IPv6 decapsulation.
Q06. Submit the frame to the Ethernet module for transmission via
       interface IFACE-OUT.
]]></artwork>
      </section>
      <section anchor="dynamic-ipv4-replace-code">
        <name>REPLACE-CSID Flavor for Dynamic Proxy for Inner Type IPv4</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the REPLACE-CSID flavor for IPv4 traffic:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0 and (DA.Arg.Index == 0 or
           Segment List[0][DA.Arg.Index-1] == 0)) {
S03.     Stop processing the SRH, and proceed to process the next
           header in the packet, whose type is identified by
           the Next Header field in the routing header.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
           Code 0 (Hop limit exceeded in transit),
           interrupt packet processing and discard the packet.
S07.   }
S08.   max_LE = (Hdr Ext Len / 2) - 1
R01.   If (DA.Arg.Index != 0) {
R02.     If ((Last Entry > max_LE) or (Segments Left > Last Entry)) {
R03.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R04.     }
R05.     Decrement DA.Arg.Index by 1.
R06.     If (Segment List[Segments Left][DA.Arg.Index] == 0) {
R07.       Decrement Segments Left by 1.
R08.       Decrement IPv6 Hop Limit by 1.
R09.       Update IPv6 DA with Segment List[Segments Left]
P01.       If (Upper-layer header type != 4 (IPv4)) {
P02.        Resubmit the packet to the IPv6 module for transmission to
               the new destination.
P03.       }
P04.       Copy the IPv6 encapsulation in a CACHE entry associated with
                the interface IFACE-IN.
P05.       Perform IPv6 decapsulation.
P06.       Submit the frame to the IPv4 module for transmission via
             interface IFACE-OUT via NH-ADDR.
R11.     }
R12.   } Else {
R13.     If((Last Entry > max_LE) or (Segments Left > Last Entry+1)){
R14.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R15.     }
R16.     Decrement Segments Left by 1.
R17.     Set DA.Arg.Index to (128/LNFL - 1).
R18.   }
R19.   Decrement IPv6 Hop Limit by 1.
R20.   Write Segment List[Segments Left][DA.Arg.Index] into the bits
         [LBL..LBL+LNFL-1] of the Destination Address of the IPv6
         header.
P01.   If (Upper-layer header type != 4 (IPv4)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Copy the IPv6 encapsulation in a CACHE entry associated with
            the interface IFACE-IN.
P05.   Perform IPv6 decapsulation.
P06.   Submit the frame to the IPv4 module for transmission via
         interface IFACE-OUT via NH-ADDR.
S16. }
]]></artwork>
      </section>
      <section anchor="dynamic-ipv4-next-code">
        <name>NEXT-CSID Flavor for Dynamic Proxy for Inner Type IPv4</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the NEXT-CSID flavor for IPv4 traffic:</t>
        <artwork><![CDATA[
N01. If (DA.Argument != 0) {
N02.   If (IPv6 Hop Limit <= 1) {
N03.     Send an ICMP Time Exceeded message to the Source Address
           with Code 0 (Hop limit exceeded in transit),
           interrupt packet processing, and discard the packet.
N04.   }
N05.   Copy the value of DA.Argument into the bits [LBL..(LBL+AL-1)]
         of the Destination Address.
N06.   Set the bits [(LBL+AL)..127] of the Destination Address to
         zero.
N07.   Decrement IPv6 Hop Limit by 1.
Q01.   If (Upper-layer header type != 4 (IPv4)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
          the new destination.
Q03.   }
Q04.   Copy the IPv6 encapsulation in a CACHE entry associated with
          the interface IFACE-IN.
Q05.   Perform IPv6 decapsulation.
Q06.   Submit the frame to the IPv4 module for transmission via
          interface IFACE-OUT via NH-ADDR.
N09. }
S02. If (Segments Left == 0) {
S03.   Stop processing the SRH, and proceed to process the next
         header in the packet, whose type is identified by
         the Next Header field in the routing header.
S04. }
S05. If (IPv6 Hop Limit <= 1) {
S06.   Send an ICMP Time Exceeded message to the Source Address
         with Code 0 (Hop limit exceeded in transit),
         interrupt packet processing, and discard the packet.
S07. }
S08. max_LE = (Hdr Ext Len / 2) - 1
S09. If ((Last Entry > max_LE) or (Segments Left > Last Entry+1)) {
S10.   Send an ICMP Parameter Problem to the Source Address
         with Code 0 (Erroneous header field encountered)
         and Pointer set to the Segments Left field,
         interrupt packet processing, and discard the packet.
S11. }
S12. Decrement IPv6 Hop Limit by 1.
S13. Decrement Segments Left by 1.
S14. Update IPv6 DA with Segment List[Segments Left].
Q01. If (Upper-layer header type != 4 (IPv4)) {
Q02.   Resubmit the packet to the IPv6 module for transmission to
        the new destination.
Q03. }
Q04. Copy the IPv6 encapsulation in a CACHE entry associated with
        the interface IFACE-IN.
Q05. Perform IPv6 decapsulation.
Q06. Submit the frame to the IPv4 module for transmission via
      interface IFACE-OUT via NH-ADDR.
]]></artwork>
      </section>
      <section anchor="dynamic-ipv6-replace-code">
        <name>REPLACE-CSID Flavor for Dynamic Proxy for Inner Type IPv6</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the REPLACE-CSID flavor for IPv6 traffic:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0 and (DA.Arg.Index == 0 or
           Segment List[0][DA.Arg.Index-1] == 0)) {
S03.     Stop processing the SRH, and proceed to process the next
           header in the packet, whose type is identified by
           the Next Header field in the routing header.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
           Code 0 (Hop limit exceeded in transit),
           interrupt packet processing and discard the packet.
S07.   }
S08.   max_LE = (Hdr Ext Len / 2) - 1
R01.   If (DA.Arg.Index != 0) {
R02.     If ((Last Entry > max_LE) or (Segments Left > Last Entry)) {
R03.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R04.     }
R05.     Decrement DA.Arg.Index by 1.
R06.     If (Segment List[Segments Left][DA.Arg.Index] == 0) {
R07.       Decrement Segments Left by 1.
R08.       Decrement IPv6 Hop Limit by 1.
R09.       Update IPv6 DA with Segment List[Segments Left]
P01.       If (Upper-layer header type != 41 (IPv6)) {
P02.       Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.       }
P04.     Copy the IPv6 encapsulation in a CACHE entry associated with
            the interface IFACE-IN.
P05.     Perform IPv6 decapsulation.
P06.     Submit the frame to the IPv6 module for transmission via
           interface IFACE-OUT via NH-ADDR.
R11.     }
R12.   } Else {
R13.     If((Last Entry > max_LE) or (Segments Left > Last Entry+1)){
R14.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R15.     }
R16.     Decrement Segments Left by 1.
R17.     Set DA.Arg.Index to (128/LNFL - 1).
R18.   }
R19.   Decrement IPv6 Hop Limit by 1.
R20.   Write Segment List[Segments Left][DA.Arg.Index] into the bits
         [LBL..LBL+LNFL-1] of the Destination Address of the IPv6
         header.
P01.   If (Upper-layer header type != 41 (IPv6)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
          the new destination.
P03.   }
P04.   Copy the IPv6 encapsulation in a CACHE entry associated with
          the interface IFACE-IN.
P05.   Perform IPv6 decapsulation.
P06.   Submit the frame to the IPv6 module for transmission via
          interface IFACE-OUT via NH-ADDR.
S16. }
]]></artwork>
      </section>
      <section anchor="dynamic-ipv6-next-code">
        <name>NEXT-CSID Flavor for Dynamic Proxy for Inner Type IPv6</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the NEXT-CSID flavor for IPv6 traffic:</t>
        <artwork><![CDATA[
N01. If (DA.Argument != 0) {
N02.   If (IPv6 Hop Limit <= 1) {
N03.     Send an ICMP Time Exceeded message to the Source Address
           with Code 0 (Hop limit exceeded in transit),
           interrupt packet processing, and discard the packet.
N04.   }
N05.   Copy the value of DA.Argument into the bits [LBL..(LBL+AL-1)]
         of the Destination Address.
N06.   Set the bits [(LBL+AL)..127] of the Destination Address to
         zero.
N07.   Decrement IPv6 Hop Limit by 1.
Q01.   If (Upper-layer header type != 41 (IPv6)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
          the new destination.
Q03.   }
Q04.   Copy the IPv6 encapsulation in a CACHE entry associated with
          the interface IFACE-IN.
Q05.   Perform IPv6 decapsulation.
Q06.   Submit the frame to the IPv6 module for transmission via
         interface IFACE-OUT via NH-ADDR.
N09. }
S02. If (Segments Left == 0) {
S03.   Stop processing the SRH, and proceed to process the next
         header in the packet, whose type is identified by
         the Next Header field in the routing header.
S04. }
S05. If (IPv6 Hop Limit <= 1) {
S06.   Send an ICMP Time Exceeded message to the Source Address
         with Code 0 (Hop limit exceeded in transit),
         interrupt packet processing, and discard the packet.
S07. }
S08. max_LE = (Hdr Ext Len / 2) - 1
S09. If ((Last Entry > max_LE) or (Segments Left > Last Entry+1)) {
S10.   Send an ICMP Parameter Problem to the Source Address
         with Code 0 (Erroneous header field encountered)
         and Pointer set to the Segments Left field,
         interrupt packet processing, and discard the packet.
S11. }
S12. Decrement IPv6 Hop Limit by 1.
S13. Decrement Segments Left by 1.
S14. Update IPv6 DA with Segment List[Segments Left].
Q01. If (Upper-layer header type != 41 (IPv6)) {
Q02.   Resubmit the packet to the IPv6 module for transmission to
        the new destination.
Q03. }
Q04. Copy the IPv6 encapsulation in a CACHE entry associated with
        the interface IFACE-IN.
Q05. Perform IPv6 decapsulation.
Q06. Submit the frame to the IPv6 module for transmission via
      interface IFACE-OUT via NH-ADDR.
]]></artwork>
      </section>
      <section anchor="srv6-masquerading-replace-code">
        <name>REPLACE-CSID Flavor for SRv6 Masquerading Proxy</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 masquerading proxy SID with the REPLACE-CSID flavor:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0 and (DA.Arg.Index == 0 or
           Segment List[0][DA.Arg.Index-1] == 0)) {
S03.     Stop processing the SRH, and proceed to process the next
           header in the packet, whose type is identified by
           the Next Header field in the routing header.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
           Code 0 (Hop limit exceeded in transit),
           interrupt packet processing and discard the packet.
S07.   }
S08.   max_LE = (Hdr Ext Len / 2) - 1
R01.   If (DA.Arg.Index != 0) {
R02.     If ((Last Entry > max_LE) or (Segments Left > Last Entry)) {
R03.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R04.     }
R05.     Decrement DA.Arg.Index by 1.
R06.     If (Segment List[Segments Left][DA.Arg.Index] == 0) {
R07.       Decrement Segments Left by 1.
R08.       Decrement IPv6 Hop Limit by 1.
R09.       Update IPv6 DA with Segment List[Segments Left]
P01.       Copy the IPv6 Destination Address in a CACHE entry associated 
           with the interface IFACE-IN.
P02.       Copy Segment List[0] from the SRH to the Destination Address
             of the IPv6 header.
P03.       Submit the packet to the IPv6 module for transmission on
             interface IFACE-OUT via NH-ADDR.
R11.     }
R12.   } Else {
R13.     If((Last Entry > max_LE) or (Segments Left > Last Entry+1)){
R14.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R15.     }
R16.     Decrement Segments Left by 1.
R17.     Set DA.Arg.Index to (128/LNFL - 1).
R18.   }
R19.   Decrement IPv6 Hop Limit by 1.
R20.   Write Segment List[Segments Left][DA.Arg.Index] into the bits
         [LBL..LBL+LNFL-1] of the Destination Address of the IPv6
         header.
P01.   Copy the IPv6 Destination Address in a CACHE entry associated 
        with the interface IFACE-IN.
P02.   Copy Segment List[0] from the SRH to the Destination Address
        of the IPv6 header.
P03.   Submit the packet to the IPv6 module for transmission on
        interface IFACE-OUT via NH-ADDR.
S16. }
]]></artwork>
      </section>
      <section anchor="srv6-de-masquerading-replace-code">
        <name>REPLACE-CSID Flavor for SRv6 De-masquerading Proxy</name>
        <t>When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (IPv6 Hop Limit <= 1) {
S03.     Send an ICMP Time Exceeded message to the Source Address,
         Code 0 (hop limit exceeded in transit),
         Interrupt packet processing and discard the packet.
S04.   }
S05.   If (Segments Left != 0) {
S06.     max_last_entry = (Hdr Ext Len / 2) - 1
S07.     If ((Last Entry > max_last_entry) or
             (Segments Left > Last Entry)) {
S08.       Send an ICMP Parameter Problem message to the Source Address,
           Code 0 (Erroneous header field encountered),
           Pointer set to the Segments Left field,
           Interrupt packet processing and discard the packet.
S09.     }
D01.     Retrieve the CACHE entry associated with IFACE-IN.
D02.     If the CACHE entry is not empty {
D03.        Destination Address of the IPv6 header is set to CACHE.
D04.     }
S11.   }
S12.   Decrement Hop Limit by 1.
S13.   Submit the packet to the IPv6 module for transmission to the
       next destination.
S14. }
]]></artwork>
      </section>
      <section anchor="srv6-masquerading-next-code">
        <name>NEXT-CSID Flavor for SRv6 Masquerading Proxy</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 masquerading proxy SID with the NEXT-CSID flavor:</t>
        <artwork><![CDATA[
N01. If (DA.Argument != 0) {
N02.   If (IPv6 Hop Limit <= 1) {
N03.     Send an ICMP Time Exceeded message to the Source Address
           with Code 0 (Hop limit exceeded in transit),
           interrupt packet processing, and discard the packet.
N04.   }
N05.   Copy the value of DA.Argument into the bits [LBL..(LBL+AL-1)]
         of the Destination Address.
N06.   Set the bits [(LBL+AL)..127] of the Destination Address to
         zero.
N07.   Decrement IPv6 Hop Limit by 1.
Q01.    Copy the IPv6 Destination Address in a CACHE entry associated 
         with the interface IFACE-IN.
Q02.    Copy Segment List[0] from the SRH to the Destination Address
         of the IPv6 header.
Q03.    Submit the packet to the IPv6 module for transmission on
         interface IFACE-OUT via NH-ADDR.
N09. }
S02. If (Segments Left == 0) {
S03.   Stop processing the SRH, and proceed to process the next
         header in the packet, whose type is identified by
         the Next Header field in the routing header.
S04. }
S05. If (IPv6 Hop Limit <= 1) {
S06.   Send an ICMP Time Exceeded message to the Source Address
         with Code 0 (Hop limit exceeded in transit),
         interrupt packet processing, and discard the packet.
S07. }
S08. max_LE = (Hdr Ext Len / 2) - 1
S09. If ((Last Entry > max_LE) or (Segments Left > Last Entry+1)) {
S10.   Send an ICMP Parameter Problem to the Source Address
         with Code 0 (Erroneous header field encountered)
         and Pointer set to the Segments Left field,
         interrupt packet processing, and discard the packet.
S11. }
S12. Decrement IPv6 Hop Limit by 1.
S13. Decrement Segments Left by 1.
S14. Update IPv6 DA with Segment List[Segments Left].
Q01. Copy the IPv6 Destination Address in a CACHE entry associated 
      with the interface IFACE-IN.
Q02. Copy Segment List[0] from the SRH to the Destination Address
      of the IPv6 header.
Q03. Submit the packet to the IPv6 module for transmission on
      interface IFACE-OUT via NH-ADDR.
]]></artwork>
      </section>
      <section anchor="srv6-de-masquerading-next-code">
        <name>NEXT-CSID Flavor for SRv6 De-masquerading Proxy</name>
        <t>When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (IPv6 Hop Limit <= 1) {
S03.     Send an ICMP Time Exceeded message to the Source Address,
         Code 0 (hop limit exceeded in transit),
         Interrupt packet processing and discard the packet.
S04.   }
S05.   If (Segments Left != 0) {
S06.     max_last_entry = (Hdr Ext Len / 2) - 1
S07.     If ((Last Entry > max_last_entry) or
             (Segments Left > Last Entry)) {
S08.       Send an ICMP Parameter Problem message to the Source Address,
           Code 0 (Erroneous header field encountered),
           Pointer set to the Segments Left field,
           Interrupt packet processing and discard the packet.
S09.     }
E01.     Retrieve the CACHE entry associated with IFACE-IN.
E02.     If the CACHE entry is not empty {
E03.        Destination Address of the IPv6 header is set to CACHE.
E04.     }
S11.   }
S12.   Decrement Hop Limit by 1.
S13.   Submit the packet to the IPv6 module for transmission to the
       next destination.
S14. }
]]></artwork>
      </section>
      <section anchor="nat-replace-code">
        <name>REPLACE-CSID Flavor for Destination NAT Flavor</name>
        <t>The Destination NAT flavor of the SRv6 masquerading proxy with the REPLACE-CSID is executed:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (IPv6 Hop Limit <= 1) {
S03.     Send an ICMP Time Exceeded message to the Source Address,
         Code 0 (hop limit exceeded in transit),
         Interrupt packet processing and discard the packet.
S04.   }
S05.   If (Segments Left != 0) {
S06.     max_last_entry = (Hdr Ext Len / 2) - 1
S07.     If ((Last Entry > max_last_entry) or
             (Segments Left > Last Entry)) {
S08.       Send an ICMP Parameter Problem message to the Source Address,
           Code 0 (Erroneous header field encountered),
           Pointer set to the Segments Left field,
           Interrupt packet processing and discard the packet.
S09.     }
P01.      Copy the Destination Address of the IPv6 header to the
           Segment List[0] entry of the SRH.
P02.      Retrieve the CACHE entry associated with IFACE-IN.
P03.      If the CACHE entry is not empty {
P04.         Destination Address of the IPv6 header is set to CACHE.
P05.      }
S11.   }
S12.   Decrement Hop Limit by 1.
S13.   Submit the packet to the IPv6 module for transmission to the
       next destination.
S14. }
]]></artwork>
      </section>
      <section anchor="nat-next-code">
        <name>NEXT-CSID Flavor for Destination NAT Flavor</name>
        <t>The Destination NAT flavor of the SRv6 masquerading proxy with the NEXT-CSID is executed:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (IPv6 Hop Limit <= 1) {
S03.     Send an ICMP Time Exceeded message to the Source Address,
         Code 0 (hop limit exceeded in transit),
         Interrupt packet processing and discard the packet.
S04.   }
S05.   If (Segments Left != 0) {
S06.     max_last_entry = (Hdr Ext Len / 2) - 1
S07.     If ((Last Entry > max_last_entry) or
             (Segments Left > Last Entry)) {
S08.       Send an ICMP Parameter Problem message to the Source Address,
           Code 0 (Erroneous header field encountered),
           Pointer set to the Segments Left field,
           Interrupt packet processing and discard the packet.
S09.     }
Q01.      Copy the Destination Address of the IPv6 header to the
           Segment List[0] entry of the SRH.
Q02.      Retrieve the CACHE entry associated with IFACE-IN.
Q03.      If the CACHE entry is not empty {
Q04.         Destination Address of the IPv6 header is set to CACHE.
Q05.      }
S11.   }
S12.   Decrement Hop Limit by 1.
S13.   Submit the packet to the IPv6 module for transmission to the
       next destination.
S14. }
]]></artwork>
      </section>
    </section>
    <section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
