v6ops J. Brzozowski Internet-Draft Comcast Cable Intended status: Best Current Practice G. Van De Velde Expires:April 21,November 11, 2016 Nokia May 10, 2016Alcatel-Lucent October 19, 2015Unique IPv6 Prefix Per Hostdraft-ietf-v6ops-unique-ipv6-prefix-per-host-00draft-ietf-v6ops-unique-ipv6-prefix-per-host-01 Abstract In some IPv6 environments the need has arisen for hosts to be able to utilise a unique IPv6 prefix even though the link or media may be shared. Typically hosts (subscribers) on a shared network, like Wi- Fi or Ethernet, will acquire unique IPv6 addresses from a common IPv6 prefix that is allocated or assigned for use on a specific link. Benefits of a unique IPv6 prefix compared to a unique IPv6 address from the service provider are going from enhanced subscriber management to improved isolation between subscribers. In most deployments today IPv6 address assignment from a single IPv6 prefix on a shared network is done by either using IPv6 stateless address auto-configuration (SLAAC) and/or stateful DHCPv6. While this is still viable and operates as designed there are some large scale environments where this concept introduces significant performance challenges and implications, specifically related to IPv6 router and neighbor discovery. This document outlines an approach utilising existing IPv6 protocols to allow hosts to be assigned a unique IPv6 prefix (instead of a unique IPv6 address from a shared IPv6 prefix). Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire onApril 21,November 11, 2016. Copyright Notice Copyright (c)20152016 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Motivation and Scope of Applicability . . . . . . . . . . . . 3 3. Design Princinples . . . . . . . . . . . . . . . . . . . . .43 4.Behaviour . . . . . . . . . . . . . . . . . . . . . . . . . . 4 4.1. Community Wi-Fi Network Topology Description . . . . . . 4 4.2. Wi-Fi Subscriber Onboarding Procedures . . . . . . . . . 6 4.3. UE IPv6 Addressing and Configuration . . . . . . . . . . 10 4.3.1. IPv6 Addressing . . . . . . . . . . . . . . . . . . . 10 4.3.2.IPv6Configuration .Unique Prefix Assignment . . . . . . . . . . . . . . . .114 5.Operational Considerations . . . . . . . .IPv6 Neighbourship Discovery Best Practices . . . . . . . . .115 6. Future work . . . . . . . . . . . . . . . . . . . . . . . . .136 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . .136 8. Security Considerations . . . . . . . . . . . . . . . . . . .136 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . .136 10. References . . . . . . . . . . . . . . . . . . . . . . . . .137 10.1. Normative References . . . . . . . . . . . . . . . . . .137 10.2. Informative References . . . . . . . . . . . . . . . . .147 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . .148 1. Introduction The concepts in this documentwereare originally developed as part of a large scale, production deployment of IPv6 support for acommunity Wi-Fiprovider managed shared network service. In this document IPv6 support does not preclude support for IPv4, however, the primary objectives for this work was to make it so that user equipment (UE) were capable of an IPv6 only experience from a network operators perspective. Details of IPv4 support are out of scope for this document. This document will also, in general, outline the requirements that must be satified by UE to allow for an IPv6 only experience. In most deployments today User Equipment (UE) IPv6 address assignment is commonly done using either IPv6 SLAAC RFC4862 [RFC4862] and/or DHCP IA_NA RFC3315 [RFC3315]. However, at current time there is a non-trivial UE/subscriber base not supporting DHCPv6 IA_NA, making IPv6 SLAAC based subscriber and address management forcommunity Wi- Fiprovider managed shared network services the technology of choice as it does not exclude any known IPv6 implementation. This document will detail the mechanics involved for IPv6 SLAAC based address and subscriber management coupled with stateless DHCPv6, where beneficial.A community Wi-Fi service is an environment to allow subscribers (hosts) to connectThis document will focus upon the process for UEs to obtain ashared network providing Internet and/or closed network services. Often Service providers use community Wi-Fi networks to provide enhanced subscriber connectivity experiences. Additionally retail owners frequently provide community Wi-Fi services to improve their customers retail experience. Upon further exploration the approach documented here has applicability in other environments including corporate, enterprise, or university settings whereunique IPv6support is desired over a shared media. Where applicable details related to the same will be provided.prefix. 2. Motivation and Scope of Applicability The motivation for this work falls into the following categories: oDeploy supportDeployment advice for IPv6 that will allowfor anstable and secure IPv6 only experience, even if IPv4 support is present o Ensure support for IPv6 is efficient and does not impact the performance of the underlying network and in turn the customer experience o Allow for the greatest flexibility across host implementation to allow for the widest range of addressing and configuration mechanisms to be employed. The goal here is the ensure that the widest population of UE implementations can leverage the availability ofIPv6.IPv6 o Lay the technological foundation for future work related to the use of IPv6 over shared medialike Wi-Fi While this work was originally conceived inrequiring optimized subscriber management o Two devices (subscriber/hosts), both attached to thecontext of large scale Wi-Fi networks,same provider managed shared network should only be able to communicate through thescope of applicability is much broader. The techniquesprovider managed First Hop Router o Provide guidelines regarding best common practices around IPv6 neighborship discovery andconcepts or subsets ofIPv6 address managent settings between thesame may also be applicable in residential or SOHO networking environments.First Hop router and directly connected hosts/subscribers. 3. Design Princinples TheWireless LAN Gateway (WLAN-GW)First Hop router discussed in this document is the L3-Edge router responsible for the communication with theWi-Fi subscribers (hosts)devices (hosts and subscribers) directly connected toaggregate the traffic from the Wi-Fi subscribers and the Wireless LAN network towardsa provider managed shared network, and to transport traffic between thecommunity Wi-Fi provider.directly connected devices and between directy connected devices and remote devices. Thegoalwork detailed in this document is focussed to provide details regarding best common practices of the IPv6 neighborship discovery and related IPv6 address management settings between the First Hop router and directly connected hosts/subscribers. The documented Best Current Practice helps aWLAN-GWservice provider to better manage the shared provider managed network on behalf of the connected devices. The Best Current Practice documented in this note is to providesufficient data-plane throughput capacityhosts/subscribers devices connected toaggregate all Wi-Fi subscriber traffic,the provider managed shared network with a unique IPv6 prefix while at the sametime it isfunctioning as control-plane anchor point to make sure that each subscriber is receiving the expected subscriber policy and service levels (throughput, QoS, security, parental-control, subscriber mobility management, etc.).The work detailed in this document intends4. IPv6 Unique Prefix Assignment When a UE connects toprovide details regarding the WLAN-GW Wi-Fi subscriber/host addressing methodology. Evolved WLAN-GW capabilities regarding fixed/mobile convergence, traffic steering, etc. are notthemain focusshared provider managed network andare outside the scope ofis attached it will initiate IP configuration phase. During thisdocument. 4. Behaviour This section outlinesphase theessential components ofUE will from an IPv6 perspective attempt to learn thedescribed system and interaction amongstdefault IPv6 gateway, thesame. 4.1. Community Wi-Fi Network Topology Description The topology and design referenced in this document is a generalized description of functional components currently deployed in a large scale subscriber oriented network. +-----+ | AAA | +-----+ / Radius / +----+ | CP | +----+ +---------+ UE--802.11--| AP |---Soft_GRE---| WLAN-GW |----Internet/WAN access +----+ +---------+ | IP/HTTP | +---------------------+ | HTTP Captive Portal | +---------------------+ Figure 1 o UE: User Equipment. o 802.11: Wireless Network o AP: Access Point. o Soft-GRE: Stateless GRE tunnel o WLAN-GW: Wireless LAN Gateway o CP: Control Plane component ofIPv6 prefix information, theWLAN-GW o AAA: Accounting, AuthorisationDNS information, andAuthentication o HTTP Captive Portal: Captive portal used to redirect traffic towards during subscriber onboarding process While there are many ways for UE to associate to a Wi-Fi network (e.g. EAP-SIM, EAP-AKA, WPA2-PSK, etc.), community Wi-Fi predominantly leverages an HTTP Captive Portal. The key function fortheCaptive Portal isremaining information required toidentify the UE/subscriber and create onestablish globally routable IPv6 connectivity. For that purpose theWLAN-GWthecorrespondingUE/subscribercontext for policy and accounting. The Soft-GRE session issends astateless GRE tunnel between AP and the WLAN-GW.RS (Router Solicitation) message. TheAP is configured withFirst Hop Router receives this UE/subscriber RS message and starts theIP address or FQDN ofprocess to compose thetunnel concentrator or aggregation point and initiatesresponse to theGRE tunnel, over IPv6 preferrably, by encapsulating packets towards the WLAN-GW.UE/subscriber originated RS message. TheWLAN-GW is configured asFirst Hop Provider Router will answer using aGRE tunnel head-end server and accepts these GRE packets, while at the same time creating correct tunnel contextunicast RA (Router Advertisement) toidentifytheAP. Soft-GRE isUE/subscriber. This RA contains avery well established pragmatic technology. The use of GRE over IPv4 only furthers an operators dependence on IPv4 and should be deprecated by using GRE over IPv6 only. The AP has, as seen infew important parameters for theillustration, an interface attachedEU/subscriber tothe Wi-Fi networkconsume: (1) a /64 prefix andwill bridge traffic received on this Wi-Fi interface over the Soft-GRE tunnel to the WLAN-GW. This will include traffic(2) flags. The /64 prefix can be derived fromnewly attached UE/subscribers which have not been identifieda locally managed pool orauthorized on the Wi-Fi network. At the same time the AP implements split-horizon for BUM (broadcast, unknown and multicast) traffic, making sure that there is no undesired leakage of traffic between UE/subscribers attachedaggregate IPv6 block assigned to theWi-Fi network. The Control Plane (CP) of the WLAN-GW isFirst Hop Provider Router or from akey component used during onboarding of UE/subscriberscentrally allocated pool. The flags indicate toidentifythe UE/subscriberandtoexchange IPuse SLAAC and/or DHCPv6 for addressrelated details. For that purposeassignment, itcan make usage of DHCP, ARP, DHCPv6, ICMPv6 (RS/RA/NS/NA), Radius, Diameter, etc. 4.2. Wi-Fi Subscriber Onboarding Procedures This section provides detail about Best Practice operational steps to onboard a UE/subscriber and the key architectural technology used to createmay indicate if theWLAN-GW UE/subscriber policy and IP addressing context. The flow chart pictured belowautoconfigured address isproviding a sequential overview of the operational steps performed to onboard a UE onto a community Wi- Fi network. UE WLAN-GW AAA Captive-Portal DNS | | | | | | | | | | |--------RS-------->| | | | | |---Access-Req---->| | | | |<--Access-Acc-----| | | | |(=Radius UE info) | | | |<-------RA---------| | | | |(/64; M,L=0; O,A=1)| | | | | | | | | |------NS(DAD)----->| | | | | | | | | |-DHCPv6(info Req)->| | | | | (Askon/off-link and if 'Other' information (e.g. DNSIP addr.)| | | | | | | | | |<---DHCPv6 Reply---| | | | | | | | | |--------------------------------DNS----------------------------->| | | | | | |------HTTP GET---->| | | | |<--HTTP Redirect---| | | | | | | | | |--------------------------------DNS----------------------------->| | | | | | |<------------------------HTTP Login------------------->| | | | | | | | | |<-UE Identified-| | | |<--Radius CoA-----| | | | |(remove HTTP Red.)| | | | | | | | |<--------UE/Subscriber connectedserver address) needs toInternet/WAN-------------------> | | | | | | | | | | Figure 2 Note that the Wireless Access Point (AP)be requested. The IPv6 RA flags used for best common practice in IPv6 SLAAC based Provider managed shared networks are: o M-flag = 0 (UE/subscriber address is notpicturedmanaged through DHCPv6), this flag may be set to 1 in theflow chart above. Thisfuture if/when DHCPv6 prefix delegation support isbecause the AP is from architectural perspective functioning as a L2 bridge between the UE and WLAN-GW. For Wi-Fi community service the APdesired) o O-flag = 1 (DHCPv6 isconfiguredused tosetup a Soft-GRE tunnel towardsrequest configuration information i.e. DNS, NTP information, not for IPv6 addressing) o A-flag = 1 (The UE/subscriber can configure itself using SLAAC) o L-flag = 0 (The UE/subscriber is off-link, which means that theWLAN-GW andUE/subscriber will send packets ALWAYS tobridge relevant Wi-Fi traffic uponhis default gateway, even if theSoft-GRE tunnel. The APdestination isalso configured for split-horizon towardswithin theWi-Fi interface for subscriber isolation and security purpose. The AP will forrange of theremainder/64 prefix) The use ofthis document be silently inserted betweena unique IPv6 prefix per UE adds an additional level of protection andWLAN-GWefficiency as it relates tobridge traffic between the WLAN-GW and APhow IPv6 Neighbor Discovery andvice versa When a newRouter Discovery processing. Since the UEconnectshas a unique IPv6 prefix all traffic by default will be directed to thecommunity Wi-Fi it connects toFirst Hop provider router. Further, theWi- Fi networkflag combinations documented above maximize the IPv6 configurations that are available byattaching tohosts including therelevant 'open' SSID advertised foruseas partof privacy IPv6 addressing. The architected result of designing thecommunity Wi-Fi offering. Once the UE/subscriberRA as documented above isattachedthat each UE/subscriber gets its own unique /64 IPv6 prefix for which it can use SLAAC or any other method tothe Wi-Fi SSIDselect its /128 unique address. In addition it willinitiate IP configuration. The focus of this document isuse stateless DHCPv6 toshareget the IPv6 addressassignment Best Practices, and hence will focus around those topics, eventhough there are many more aspectsof the DNS server, however it SHOULD NOT use stateful DHCPv6 todeployreceive aquality community Wi-Fiserviceoffering successfully. Onceprovider managed IPv6 address. If theUE is connectedUE/ subscriber desires tothe Wi-Fi shared network, it will from an IPv6 perspective attempt to learn the default IPv6 gateway, the IPv6 prefix information, the DNS information, and the remaining information required to establish globally routable IPv6 connectivity. For that purpose the the UE/subscriber sends a RS (Router Solicitation) message. This RS is forwarded by the AP-bridge over the Soft-GRE interface, however due to the split-horizon configuration for BUM traffic it is not relayed to anysend anything external including other UE/Subscribers attached to the Wi-Fi network. The WLAN-GW received this UE/subscriber RS message, and because it is the first time this UE/subscriber attaches to the Wi-Fi the UE/subscriberis by default not authorized. The WLAN-GW will now trydevices (assuming device todiscover additional information about the subscriber information by querying the AAA server. Thisdevice communications isdone by sending a Radius Access- Request. The Radius server receives this Access-Request,enabled andperforms a lookup in its policy database. If radius server discovers that the UE/ subscriber is a fresh device tryingsupported), then due togain access ontotheWi-Fi networkL-bit set itwill identify some parameters (e.g. IPv6 /64 prefix) toSHOULD sendback to the WLAN-GW together with a message to install a HTTP- redirect to a Captive Portal for further UE/subscriber identification. This will be sent from the AAA server to the WLAN-GW in a Radius Access-Ackowledge message. The WLAN-GW will use the received Radius informationthis traffic tocomposetheresponse toFirst Hop Provider Router. Now that the UE/subscriberoriginated RS message. The WLAN-GW will answer using a unicast RA (Router Advertisement) toreceived theUE/ subscriber. ThisRAcontains a few important parameters for the EU/ subscriber to consume: (1) a /64 prefixand(2) flags. The /64 prefix can be derived fromthe associated flags, it will assign itself alocally managed pool or aggregate128 bit IPv6block assigned toaddress using SLAAC. Since theWLAN-GW or from a pool signalledaddress is composed by theRadius server in a radius attribute. The flags may indicate to the UE/ subscriber to use SLAAC and/or DHCPv6 for address assignment, it may indicate if the autoconfigured address is on/off-link and if 'Other' information (e.g. DNS server address) needs to be requested. The IPv6 RA flags used for best common practice in IPv6 SLAAC based community Wi-Fi are: o M-flag = 0 (UE/subscriber address is not managed through DHCPv6), this flag may be set to 1 in the future if/when DHCPv6 prefix delegation support over Wi-Fi is desired) o O-flag = 1 (DHCPv6 is used to request configuration information i.e. DNS, NTP information, not for IPv6 addressing) o A-flag = 1 (TheUE/subscribercan configuredevice itselfusing SLAAC) o L-flag = 0 (The UE/subscriber is off-link, which means that the UE/subscriber will send packets ALWAYS to his default gateway, even if the destination is within the range of the /64 prefix) The use of a unique IPv6 prefix per UE adds an additional level of protection and efficiency asitrelates to how IPv6 Neighbor Discovery and Router Discovery processing. Since the UE has a unique IPv6 prefix all traffic by defaultwillbe directedneed tothe WLAN-GW. Further, the flag combinations documented above maximize the IPv6 configurations that are available by hosts including the use of privacy IPv6 addressing. The architected result of designing the RA as documented above isverify thateach UE/subscriber gets its own unique /64 IPv6 prefix for which it can use SLAAC or any other method to select its /128 unique address. In addition it will use stateless DHCPv6 to gettheIPv6addressof the DNS server, however it SHOULD NOT use stateful DHCPv6 to receive a service provider managed IPv6 address. If the UE/ subscriber desires to send anything external including other UE/ subscriber devices (assuming device to device communications is enabled and supported), then due to the L-bit set it SHOULD send this traffic to the WLAN-GW. Now that the UE/subscriber received the RA and the associated flags, it will assign itself a 128 bit IPv6 address using SLAAC. Since the address is composed by the UE/subscriber device itself it will need to verify that the address is unique on the shared network. The UE/ subscriber will for that purpose perform Duplicate Address Detection algorithm. This will occur for each address the UE attempts to utilize on the Wi-Fi network. At this stage the UE/subscriber has acquired a valid IPv6 address, however it may not have received one or more DNS server IPv6 address. The UE/subscriber can use stateless DHCPv6 exchange to identify a valid DNS server address(es). An alternative solution, albeit less supported by IPv6 hosts is to signal DNS server addresses is by utilising RA extensions described in RNDSS RFC6106 [RFC6106] in which the router uses Router Advertisement options to advertise a list of DNS recursive server addresses and a DNS Search List to IPv6 UE/ subscribers. The use of RNDSS and stateless DHCPv6 for the configuration of hosts are not mutually exclusive. Both methods can and should be enabled simultaneously allowing for the widest range of hosts or UEs to learn and use DNS over IPv6. DNS server IPv6 address(es) sent via DHCPv6 and RDNSS must be identical. At this moment the UE/subscriber has all information to be connected to the Internet, nevertheless the community Wi-Fi service provider has no idea about the identity or credentials of the UE/subscriber. For that purpose the Service provider has installed on the WLAN-GW a HTTP redirect for this particular UE/subscriber towards HTTP captive portal. First the subscriber utilises DNS to correlate the domain name with an IP address, next the HTTP GET is intercepted and an HTTP Redirect is issued to Redirect the HTTP session towards the Captive portal. The ultimate goal of this process is for the service provider to identify the UE/subscriber. From the moment the UE/ subscriber identified itself on the captive portal (login-ID/PW, PIN Challenge, etc.) then the captive portal informs the WLAN-GW about the correct policies (QoS, policing, etc.) and to remove the HTTP- redirect. From now onwards the WLAN-GW has identified the UE/subscriber and installed all the subscriber context for identification, billing, traffic conditioning. The UE/subscriber can access the Internet/WAN within his agreed commuity Wi-Fi parameters. 4.3. UE IPv6 Addressing and Configuration An over arching objective for any IPv6 deployment where subscriber endpoints or UEs are concerned must include an IPv6 only experience. Specifically, similar to residential broadband networks, Wi-Fi networks that support IPv6 must ensure there are no dependencies on IPv4. Due to fragmented support for various IPv6 address and configuration mechanisms network operators must effectively enable and support every combination of IPv6 address and configuration technique. Coordinating the configuraiton and values for the same is important to ensure proper UE behavior. 4.3.1. IPv6 Addressing Stateless IPv6 address autoconfiguration is expected to be the primary mechanism for UEs to leverage when establing globally routable IPv6 connectivity. Stateful DHCPv6 is currently not utilized in this model for host addressing since stateful DHCPv6 is not universally supported for address acquisition. Stateful DHCPv6 may be considering in the future as part of enabling support for IPv6 prefix delegation [RFC3633]. 4.3.2. IPv6 Configuration In order to make an IPv6 only experience possible Wi-Fi network operators must ensure that UEs are able to reach all critical network services over IPv6. Today, many host operating systems still prefer querying DNS over IPv4. Additionally, widely deployed hosts do not truly leverage a single common approach for IPv6 configuration. As such the following should be expected to be available to support a proper IPv6 only configuration: o RDNSS [RFC6106] is enabled by default and is expected to contain one or more globally routable IPv6 addresses o Stateless DHCPv6 [RFC3315] is enabled by default and will minimally transmit one or more DNS server IPv6 addresses. To ensure the desired behavioristriggered IPv6 router advertisements transmitted byunique on theWLAN-GWshared network. The UE/ subscriber willsetfor that purpose perform Duplicate Address Detection algorithm. This will occur for each address theM flagUE attempts to0 andutilize on theO flag to 1.shared provider managed network. 5.Operational ConsiderationsIPv6 Neighbourship Discovery Best Practices An operational consideration when using IPv6 address assignment using IPv6 SLAAC is that after the onboarding procedure the UE/subscriber will have a prefix with certain preferred and valid lifetimes. TheWLAN-GWFirst Hop Provider Router extends these lifetimes by sending an unsolicited RA, the applicable MaxRtrAdvInterval on the WLAN-GW MUST therefore be lower than the preferred lifetime. As a consequence of this process is that theWLAN-GWFirst Hop Router never knows when aUE/subscriberUE/ subscriber stops using addresses from a prefix and additional procedures are required to help theWLAN-GWFirst Hop Router to gain this information. When using stateful DHCPv6 IA_NA for IPv6 UE/subscriber address assignment this uncertainty on theWLAN-GWFirst Hop Router is not of impact due to the stateful nature of DHCPv6 IA_NA address assignment. Following is reference table of the key IPv6 router discovery and neighbor discoverytimers:timers for provider managed shared networks: o IPv6 Router Advertisement Interval = 300s o IPv6 Router LifeTime = 3600s o Reachable time = 30s o IPv6 Valid Lifetime = 3600s o IPv6 Preferred Lifetime = 1800s o Retransmit timer = 0s The stateless nature of the UE/subscriber IPv6 SLAAC connectivity model provides value to make sure that the UE/subscriber context is timely removed from theWLAN-GWFirst Hop Router to avoid ongoing resource depletion. A possible solution is to use a subscriber inactivity timer which after tracking a pre-defined (currently unspecified) # of minutes deletes the subscriber context on theWLAN-GW. When using SLAAC the UE/subscriber the IP address assignment happens without a WLAN-GW controlled state machine, and as result there is no state-information on the WLAN-GW about actual IPv6 address usage. To accomodate this the WLAN-GW can periodically perform a Subscriber Host Connectivity Verification (i.e. periodically ping each IPv6 UE/ subscriber from the WLAN-GW) to make sure that the subscriber table on the WLAN-GW is correct and that the inactive UE/subscribers are removed.First Hop Router. When employing stateless IPv6 address assignment a number of widely deployed operating systems will attempt to utilize RFC 4941 RFC4941 [RFC4941] temporary 'private' addresses. This can lead to the consequence that a UE has multiple /128 addresses from the same IPv6 prefix. TheWLAN-GWFirst Hop Provder Router MUST be able to handle the presence and use of multiple globally routable IPv6 addresses.When geo-localisation is of importance the WLAN-GW needs to have information about the Access Point to which the UE/subscriber is connected. In an environment using DHCPv6 IA_NA for IPv6 address assignment this is achieved by having the AP insert an interface-id RFC3315 [RFC3315] in the UE/subscriber DHCPv6 Solicit message. The interface-id format expected is [ap-mac;ssid;[o-s]], e.g. [00:11:22:33:44:55;example;o] (o stands for open, s for secure). This way the service provider can learn both the AP-MAC (identifies location) and the SSID (identifies service). When a service provider uses SLAAC IPv6 address assignment it becomes harder for the service provider to rely on this type of information and alternate solutions have to be used to acquire the MAC address of the Access Point to which the UE/subscriber is connected. A solution could be for the WLAN-GW to support NSoGRE to harvest the Access-Point MAC address to which the UE/subscriber is connected. For security purposes it will be important for the service provider to have the capability on the WLAN-GW to have supported mechanics for LI (Lawfull Intercept) and the installation of IPv6 filters per subscriber.For accounting purposes theWLAN-GWFirst Hop Provider Router must be able to send usage statistics per UE/subscriber using Radius attributes. 6. Future work oSupport forInformational draft regarding WLAN IPv6prefix delegation over Wi-FiDeployment technology experiences roll-out 7. IANA Considerations No IANA considerations are defined at this time. 8. Security Considerations No Additional Security Considerations are made in this document. 9. Acknowledgements The authors would like to thank the following, in alphabetical order, for their contributions: Lorenzo Colitti, Killian Desmedt, Brad Hilgenfeld, Wim Henderickx, Erik Kline, Thomas Lynn, Phil Sanderson, Colleen Szymanik, Sanjay Wadhwa 10. References 10.1. Normative References [RFC3315] Droms, R., Ed., Bound, J., Volz, B., Lemon, T., Perkins, C., and M. Carney, "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", RFC 3315, DOI 10.17487/RFC3315, July 2003, <http://www.rfc-editor.org/info/rfc3315>. [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless Address Autoconfiguration", RFC 4862, DOI10.17487/ RFC4862,10.17487/RFC4862, September 2007, <http://www.rfc-editor.org/info/rfc4862>. [RFC4941] Narten, T., Draves, R., and S. Krishnan, "Privacy Extensions for Stateless Address Autoconfiguration in IPv6", RFC 4941, DOI 10.17487/RFC4941, September 2007, <http://www.rfc-editor.org/info/rfc4941>. [RFC6106] Jeong, J., Park, S., Beloeil, L., and S. Madanapalli, "IPv6 Router Advertisement Options for DNS Configuration", RFC 6106, DOI 10.17487/RFC6106, November 2010, <http://www.rfc-editor.org/info/rfc6106>. [RFC6180] Arkko, J. and F. Baker, "Guidelines for Using IPv6 Transition Mechanisms during IPv6 Deployment", RFC 6180, DOI 10.17487/RFC6180, May 2011, <http://www.rfc-editor.org/info/rfc6180>. 10.2. Informative References [I-D.ietf-v6ops-v4v6tran-framework] Carpenter, B., Jiang, S., and V. Kuarsingh, "Framework for IP Version Transition Scenarios", draft-ietf-v6ops- v4v6tran-framework-02 (work in progress), July 2011. [RFC6343] Carpenter, B., "Advisory Guidelines for 6to4 Deployment", RFC 6343, DOI 10.17487/RFC6343, August 2011, <http://www.rfc-editor.org/info/rfc6343>. Authors' Addresses John Jason Brzozowski Comcast Cable 1701 John F. Kennedy Blvd. Philadelphia, PA USA Email: john_brzozowski@cable.comcast.com Gunter Van De VeldeAlcatel-LucentNokia Antwerp Belgium Email:gunter.van_de_velde@alcatel-lucent.comgunter.van_de_velde@nokia.com