<?xml version="1.0" encoding="US-ASCII"?>
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private) -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY rfc2119 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
]>
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="exp" docName="draft-xls-intarea-evn6-05" ipr="trust200902">
  <front>
    <title abbrev="EVN6">EVN6: Mapping of Ethernet Virtual Network to IPv6 Underlay for Transmission</title>

    <author fullname="Chongfeng Xie" initials="C" surname="Xie">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <code>102209</code>

          <country>China</country>
        </postal>

        <email>xiechf@chinatelecom.cn</email>
      </address>
    </author>

    <author fullname="Jibin Sun" initials="J" surname="Sun">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <code>102209</code>

          <country>China</country>
        </postal>

        <email>sunjb@chinatelecom.cn</email>
      </address>
    </author>

    <author fullname="Xing Li" initials="X" surname="Li">
      <organization>CERNET Center/Tsinghua University</organization>

      <address>
        <postal>
          <street>Shuangqing Road No.30, Haidian District</street>

          <city>Beijing</city>

          <code>100084</code>

          <country>China</country>
        </postal>

        <email>xing@cernet.edu.cn</email>
      </address>
    </author>

    <author fullname="Congxiao Bao" initials="C" surname="Bao">
      <organization>CERNET Center/Tsinghua University</organization>

      <address>
        <postal>
          <street>Shuangqing Road No.30, Haidian District</street>

          <city>Beijing</city>

          <code>100084</code>

          <country>China</country>
        </postal>

        <email>congxiao@cernet.edu.cn</email>
      </address>
    </author>

    <author fullname="Mark Smith" initials="M" surname="Smith">
      <organization/>

      <address>
        <postal>
          <street>PO BOX 521</street>

          <city>Heidelberg</city>

          <code>3084</code>

          <country>Australia</country>
        </postal>

        <email>markzzzsmith@gmail.com</email>
      </address>
    </author>

   

    <date day="1" month="March" year="2026"/>

    <area>INT Area</area>

    <workgroup>Intarea Working Group</workgroup>

    <keyword>RFC</keyword>

    <abstract>
      <t>This document describes a mechanism of mapping of Ethernet Virtual
      Network to IPv6 Underlay for transmission. Unlike the existing methods,
      this approach places the Ethernet frames to be transmitted directly in
      the payload of IPv6 packets, i.e., L2 over IPv6, and uses stateless
      mapping to generate IPv6 source and destination addresses from the
      host's MAC addresses, the Ethernet Virtual Network identifier and site
      prefixes. The IPv6 packets generated in this way carry Ethernet frames
      and are routed to the destination site across the public IPv6 network.</t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>Ethernet Virtual Network is a network model of Layer-2 built on top of
      the underlay to provide connectivity between dispersed customer sites
      across public network. This overlay L2 virtual network is used to carry
      the Ethernet data from the individual hosts in an encapsulated format
      over a logical tunnel, as if they were connected using the same LAN.
      Ethernet Virtual Network can serve scenarios such as campus networks,
      enterprise branch interconnections, data center networks, wide area IP
      bearer networks, and SD-WAN.&nbsp;There have been multiple solutions,
      they may differ in the types of underlying networks or encapsulation
      methods, besides, they usually serve different scenarios.</t>

      <t>VXLAN <xref target="RFC7348"> </xref> is a network virtualization
      technology which has been used mainly in data centers. VXLAN uses
      MAC-in-UDP encapsulation for packets, specifically, it encapsulates
      original Ethernet frames into UDP packets. It then encapsulates the UDP
      packets with the IP header and Ethernet header of the physical network
      as outer headers, enabling these packets to be routed across the network
      like ordinary IP packets.</t>

      <t>VPLS <xref target="RFC4762"/> makes use of MPLS and VPN protocols to
      provide a virtual LAN between multiple locations. It is basically a way
      to provide Ethernet-based multi-point to multi-point communication over
      MPLS networks&#8203;. VPLS operates by creating a virtual
      &lsquo;switch&rsquo; at the customer&rsquo;s edge (CE) and the
      provider&rsquo;s edge (PE) of their respective networks.</t>

      <t>The new approach, namely EVN6, proposed in this document aims to
      efficiently carry Ethernet Virtual Networks in IPv6 networks. It
      provides a methodology for dynamically creating a tunnel on the IPv6
      network to transparently forward Ethernet frame when communication is
      required between a source and destination node in a Ethernet Virtual
      Network. In this scheme, Ethernet frame to be transmitted is directly
      placed in the payload field of IPv6 packet without adding additional
      payload, the MAC address of the hosts that need to communicate, the
      identification of the Ethernet Virtual Network and the IPv6 prefix of
      the site can be used to generate outer IPv6 addresses. With EVN6
      implementation, any two hosts can communicate, regardless of the
      underlying IPv6 network structure and other details. This document
      specifies EVN6&rsquo;s overall architecture, typical workflow, Layer-2
      multicast and broadcast processing, etc.</t>

      <section title="Requirements Language">
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
        "OPTIONAL" in this document are to be interpreted as described in BCP
        14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only
        when, they appear in all capitals, as shown here.</t>
      </section>
    </section>

    <section title="Terminology">
      <t>The following terms are defined and used in this document,</t>

      <t indent="4">EVN6: Multi-site Ethernet Virtual Network built on IPv6 network</t>

      <t indent="4">E-ADPT: Ethernet Adaptor</t>

      <t indent="4">IID: Interface Identifier (Section 2.5.1 of <xref
      target="RFC4291"/>)</t>

      <t indent="4">VEI: Virtual Ethernet Identification, VEI is used to identify and
      distinguish different Ethernet Virtual Network instances across the
      entire network, the length of VEI is 32 bits</t>

      <t indent="4">MAC-VRF: A Virtual Routing and Forwarding table for Media Access
      Control (MAC) addresses on a PE&#65288;Section 3 of <xref
      target="RFC8365"/>&#65289;. It stores IPv6 site prefix, VEI of the
      Ethernet Virtual Network and other information of each MAC address</t>

      <t indent="4">PE: Provider Edge Router</t>

      <t indent="4">Pref6: Site prefix, Pref6 is a 64-bit subnet prefix (Section 2.5 
      of <xref target="RFC4291"/>) to identify one site of a given EVN6 instance</t>
    </section>

    <section title="Overall Architecture">
      <t>As a common underlay infrastructure, IPv6 network should
      simultaneously support multiple Ethernet Virtual Networks. To
      distinguish different Ethernet Virtual Network instances, VEI with a
      length of 32-bits is used to globally identify them, and it can identify
      up to 4.29 billion Ethernet Virtual Networks.</t>

      <t>Generally, Ethernet Virtual Network consists of multiple sites
      distributed in different geographical locations, and each site is
      connected to the IPv6 network through a local PE at the edge of the IPv6
      network. The PE device supports Ethernet Virtual Network services by
      introducing an E-ADPT functional subsystem. E-ADPT directly encapsulates
      the Ethernet data frames to be transmitted by the customer site into
      IPv6 packets and sends them to the IPv6 network. For the received IPv6
      packets destined to one of these local sites, E-ADPT removes their packet
      header and restores the original Ethernet frames.</t>

      <t><figure>
          <artwork><![CDATA[                                                                                                                                                       
               ---------------                    ---------
+---+ Pref6-1 |  +----+-----+ |                  |         | Pref6-2 +---+      
| H1+---------+--+  E-ADPT  | |                  |         +---------+ H2|
+---+  Site1  |  +----------+ |                  |         |  Site2  +---+
              |   |     |     |                  |         |   
              |   | +-------+ |                  |         |
              |   | |MAC-VRF| |                  |         |  
              |   | +-------+ |                  |         |
              |+-------------+|   -----------    |         |
              ||IPv6 Network ||  /           \   |         |
              ||    Layer    |--|IPv6 Network |--|         |
              |+-------------+|  \           /   |         |
               ---------------    -----------     ---------
                     PE1                              PE2 
                              
                   Figure 1: EVN6 System Architecture]]></artwork>
        </figure></t>

      <t>For a given Ethernet Virtual Network, E-ADPT uses the IPv6 site
      prefix, i.e., Pref6, to identify different sites, so the Pref6 of
      different sites within a given Ethernet Virtual Network is also
      different. There are no special requirements for the type of address
      block used for Pref6, as long as it belongs to the global unicast
      address type and is reachable in the global routing system. The Pref6 for
      each site can be allocated from the IPv6 address space owned by the
      operator. It should be noted that the length of Pref6 can be flexibly
      selected, it can be equal to or less than 64 bits. For Ethernet Virtual
      Network which has multiple sites, there is a 1:N relationship between
      the VEI and the site prefix of its sites.</t>

      <t>In order to send Ethernet frames to the correct destination site
      through the IPv6 network, a MAC-VRF table in PE is used to store the MAC
      addresses of all hosts in the Ethernet Virtual Network, the
      corresponding VEI of the Ethernet Virtual Network and Pref6 of the sites
      they belong to. The format of each record in MAC-VRF is shown in figure
      2, it contains MAC address, VEI, prefix of the corresponding
      site, Group Policy ID and Host ID.</t>
      <t>
      <figure>
          <artwork><![CDATA[
      +----------------------------------------------------------------+
      | MAC Address |    VEI  |  Pref6  |  Group Policy ID  | Host ID  |
      +----------------------------------------------------------------+
                                               Pref6:Site Prefix
    
         Figure 2: Structure of the Record in MAC-VRF]]></artwork>
        </figure>
      </t>
      <t>Group Policy ID: 24-bit identifier that indicates the source TSI
      Group membership being encapsulated by EVN6.  The allocation of Group
      Policy ID values is outside the scope of this document. </t> 
      
      <t>Host ID: 20-bits identifier that indicates the membership of each 
      host within the site it belongs to, the Host ID of each host is allocated from
      the Host ID Pool based on the host's MAC address while ensuring its 
      local uniqueness.</t>

      <t>For E-ADPT, MAC-VRF provides a data foundation for encapsulating
      Ethernet frames into corresponding IPv6 packets, the data in it should
      be available before sending Ethernet frame to other sites, so the
      mechanism requires the sites to pre-send host MAC/Pref6 Mapping
      Advertisement to other sites. After receiving mapping relationship data
      of a host sent by other PEs, the PE stores the mapping data in the local
      MAC-VRF. The exchange of MAC/Pref6 can be carried out through the
      control layer, such as extending EVPN<xref target="RFC7432"/>; However,
      this has been out of the scope of this document and will be discussed in
      other documents. When receiving Ethernet frame data sent by the host
      within the site, PE uses the destination MAC address as an index to
      search the local MAC-VRF table. If a corresponding entry is found,
      PE extracts its site prefix Pref6 and VEI value, then uses the process
      in section 4.2 to encapsulate the Ethernet frame in an IPv6 packet.
      Afterwards, the IPv6 data packet is transmitted to the IPv6 network.</t>
    </section>

    <section title="Operation">
      <t>In this section, the Ethernet Virtual Network in figure 3 is used as
      an example to illustrate the workflow, its profile includes: the VEI
      value is N1, it has three branch sites connected to PE1, PE2, and PE3,
      with site prefixes Pref6-1, Pref6-2, and Pref6-3, respectively. Hosts
      H1, H2, H3 and H4 are located at sites 1, site 2 and site 3,
      respectively.</t>

      <t>
      <figure>
          <artwork><![CDATA[                                                                           
                      +-------------------+  
                      |                   |  
                      |                +--+--+                   +----+ 
+---+              +--+--+             |     |   Site2(Pref6-2)  |    |
|   |Site1(Pref6-1)|     |             | PE2 +-------------------+ H2 |MAC2
| H1+--------------+ PE1 |             |     |                   |    | 
|   |              |     |             +--+--+                   +----+
+---+              +--+--+                |                      +----+         
 MAC1                 |        IPv6       |                      |    |
                      |       network     |                  ----+ H3 |MAC3    
                      |                +--+--+              |    |    | 
                      |                |     |Site3(Pref6-3)|    +----+
                      |                | PE3 +--------------|     
                      |                |     |              |    +----+ 
                      |                +--+--+              |    |    |                                
                      |                   |                  ----+ H4 |MAC4
                      +-------------------+                      |    | 
                                                                 +----+                                                                

              Figure 3: Diagram of Typical EVN6 Instance]]></artwork>
        </figure></t>

      <t>The workflow of EVN6 is illustrated as follows:</t>

      <section title="Network Creation Procedures">
        <t>Step 1: EVN6 network creation on each PE device</t>

        <t>When creating an Ethernet Virtual Network instance on an IPv6
        network, it should firstly enable the EVN6 function is in PE1, PE2,
        and PE3, then configure the relevant information of the Ethernet
        Virtual Network on this site, configure the Ethernet Virtual Network
        identifier VEI as N1, and set the site prefix Pref6 on the interface
        of the PE that the site accesses, indicating that the VEI of the
        Ethernet Virtual Network to which the site belongs to is N1, and its
        local site prefix is Pref6. This process can be configured manually or
        using specific systems such as network management. When the EVN6
        instance is running, the sites within it exchange host MAC/Pref6
        Mapping through the connected PEs, as described in Section 3.</t>
      </section>

      <section title="Data Transmission Procedures">
        <t>Step 2: Host information searching</t>

        <t>Host H2 in site 2 sends an Ethernet frame with the destination
        being Host H1 in site 1. Its frame header contains the MAC source
        address and MAC destination address, which are the MAC addresses of
        hosts H2 and H1, respectively. In this case, PE2 is the source PE and
        PE1 is the destination PE. After receiving the Ethernet frame in Site
        2, PE2 uses the destination MAC address as an index to search for the
        local MAC-VRF table. If a corresponding entry is found, the Pref6 of
        remote site (i.e. Pref6-1) and VEI information are extracted; If not
        found, the frame is not encapsulated or forwarded.</t>

        <t>Step 3: Address mapping and frame encapsulation</t>

        <t>In EVN6, each Ethernet frame needs to be associated with the VEI of
        the Ethernet Virtual Network to which the frame belongs. Upon
        receiving the Ethernet frame, PE2 can determine its VEI value based on
        local configuration. Then the VEI obtained is divided into two
        sub-segments: VEI-S1 and VEI-S2, the first 16 bits are VEI-S1, and the
        last 16 bits are VEI-S2. VEI-S1 and VEI-S2 will be respectively put
        into IPv6 source and destination address of the new IPv6 packet.</t>

         <t>IPv6 source and destination addresses are generated statelessly and 
         their formats are shown in figure 4.</t>

        <t><figure>
            <artwork><![CDATA[

         IPv6 Source Address
          0                     64       80   84         108      128
          +---------------------+--------+----+----------+--------+
          |     Pref6 of        | VEI-S1 |Flag|  Ext.    | Source |                    
          |    Source Site      |        |    |  Bits    | Host ID|
          +---------------------+--------+----+----------+--------+
                                |<--------------IID-------------->|


          IPv6 Destination Address
          0                     64       80   84         108      128
          +---------------------+--------+----+----------+--------+
          |     Pref6 of        | VEI-S2 |Flag|  Ext.    | Dst.   |                    
          | Destination Site    |        |    |  Bits    | Host ID|
          +---------------------+--------+----+----------+--------+
                                |<--------------IID-------------->|


      Figure 4: Formats of IPv6 Source and Destination Addresses]]></artwork>
          </figure></t>


        <t>Each field of the IPv6 source address is illustrated as follows,</t> 

        <t indent="4">-Pref6 of Source Site: 64-bit in length with the value of 
        Pref6-2, it is for identifying the site that the source host belongs to.</t>

        <t indent="4">-VEI-S1: 16-bits in length, it starts from the 64th bit
        of source IPv6 address.</t>

        <t indent="4">-Flag: 4-bits in length, it is an identification field 
        in the format of GRRR. The first bit, i.e., G bit, is the Group Policy 
        flag, and the last three digits are reserved bits, with a default 
        value of 0. If the G bit is 1, the 24-bit Extensible Bits field is assigned
        to the Group Policy ID; If the G flag is 0, then all the 24 bits are 
        set to zero.</t>

        <t indent="4">-Extensible Bits: 24-bit in length, its value is related to
        the Flag field as mentioned above.</t>

        <t indent="4">-Source Host ID: 20-bits in length, it is for identifying the site
        to which the source host belongs. The local site PE allocates the host ID from
        the Host ID Pool based on the host's MAC address.  Host ID is stored at the 
        MAC-VRF table of local site.</t>

        <t>Each field of IPv6 destination address is illustrated as follows,</t>
        
        <t indent="4">-Pref6 of Destination Site: 64-bit in length with the value of 
        Pref6-1, it is for identifying the source host within its site.</t>

        <t indent="4">-VEI-S2: 16-bits in length, it starts from the 64th bit
        of destination IPv6 address.</t>

        <t indent="4">-Flag: 4-bits in length, it is a identification field 
        in the format of GRRR. The first bit, i.e., G bit, is the Group Policy 
        flag, and the last three digits are reserved bits, with a default 
        value of 0. If the G bit is 1, the 24-bit Extensible Bits field is assigned
        to the Group Policy ID; If the G flag is 0, then all the 24 bits are 
        set to zero.</t>

        <t indent="4">-Extensible Bits: 24-bit in length, its value is related to
        the Flag field as mentioned above.</t>

        <t indent="4">-Destination Host ID: 20-bits in length, it is for identifying the
        site to which the destination host belongs. If the frame is a unicast message, 
        the Host ID is allocated from the host ID Pool of the destination site, and stored
        in the MAC-VRF of destination site; If it is a BUM message, the Host ID in the destination
        address is set to FFFFF.</t>

        <t>Moreover, the Ethernet frame is put into the payload of IPv6 packet
        and the value of the "Next header" field in the header is set to 143,
        indicating that the payload of the IPv6 packet is an Ethernet
        frame.</t>

        <t><figure>
            <artwork><![CDATA[    
                             +-------------------------------+
                             |        Ethernet Frame         |                    
                             +-------------------------------+
                                              |
                                              V
           +-----------------+-------------------------------+
           |  IPv6 Header    |    Payload(Ethernet Frame)    |                    
           +-----------------+-------------------------------+

         Figure 5: Encapsulation of Ethernet Frame into IPv6 Packet]]></artwork>
          </figure></t>

        <t>After the IPv6 packet is generated, it is sent to the IPv6 network
        via the underlying IPv6 network layer.</t>

        <t>Step 4: Packet forwarding in IPv6 network</t>

        <t>When receiving an IPv6 packet, routers in an IPv6 network use the
        destination address in the packet to look up the routing table and
        forward it. Since the IPv6 destination address contains the site
        prefix of the destination site, i.e. Pref6-1 in this case, which
        provides the egress PE of the packet, routers can forward the IPv6
        packet carrying the Ethernet frame to the destination PE, i.e. PE1 in
        this case. It should be noted that this process does not require
        additional functionality for non-PE routers in the network, nor does
        it require extra IPv6 routing information to be added to the IPv6
        network.</t>
      </section>

      <section title="Data Receiving Procedures">
        <t>Step 5: Packet de-capsulation and Ethernet frame restoration</t>

        <t>As shown in figure 6, when receiving a IPv6 packet, the receiving
        PE, i.e., PE1, checks whether the destination address prefix matches
        the site prefix Pref6-1 on PE1? If yes, it extracts VEI-S1 and VEI-S2
        from the IIDs of the source and destination IPv6 addresses, and
        concatenates them into VEI, then check if the VEI value is equal to
        N1? If yes, it then checks if the "Next header" value in the IPv6
        header is 143? If yes, it then discards the IPv6 header, takes out the
        Ethernet frame, and sends the Ethernet frame to H1 within Site 1 based
        on its destination MAC address. Otherwise, the packet is discarded due
        to abnormal situation.</t>

        <t><figure>
            <artwork><![CDATA[
                               +---------------------------+
                               |PE1 receives an IPv6 packet|
                               +---------------------------+
                                             |
                                             V
                                          +------+                      
                                         /Does the \        
                           N           '/destination\                         
                   --------------------+   address   +
                  |                    \    match   /
                  V                     \  Pref6-1 /
    +------------------------+            +------+
    |PE1 continues forwarding|              Y|  
    |forwarding IPv6 packet  |               V                        
    +------------------------+  +-------------------------+         
                                |PE1 extracts VEI from the|
                                |IIDs of IPv6 source and  |
                                |destination addresses    |
                                +-------------------------+
                                             |
                                             V
                                            +--+                       
                          N               /      \                              
                   ----------------------+ VEI=N1?+
                  |                       \      /
                  V                         +--+
    +----------------------------+          Y|
    |The packet is discarded due |           |
    |to abnormal situation       |           V                      
    +----------------------------+        +-----+  
                                        /   The   \        
                          N            /  value of \                         
                   -------------------+"Next header"+
                  |                    \  is 143?  /
                  V                     \         /
    +----------------------------+        +-----+   
    |The packet is discarded due |          Y|
    |to abnormal situation       |           |
    +----------------------------+           V
                    +------------------------------------------+
                    |PE1 decapsulates IPv6 packet and sends the| 
                    | released Ethernet frame to H1 based on   |
                    | the destination MAC address              |
                    +------------------------------------------+                                                            
         
       Figure 6: Process of Ethernet Frame Restoration in PE]]></artwork>
          </figure></t>
      </section>
    </section>

    <section title="Multicast and Broadcast">
      <section title="Multicast">
        <t>Link layer multicast is used to send Ethernet frames to multiple
        members of a group, these members are distributed across different sites
        of the Ethernet virtual network. The case here is used to illustrate
        multicast process: VN1 is an instance of Ethernet virtual network over
        IPv6 underlay, it consists of N1 sites and contains M1 hosts distributed
        on different sites, and its VEI is vn1. Of all the sites, site-0 has
        the site prefix Pref6-0 and is connected to the local PE1.</t>

        <t>G1 is a multicast group in instance VN1, it contains m1 members,
        and m1 ? M1. The members of G1 are distributed on
        n1 sites of instance VN1: site-1, site-2, &hellip;, Site-n1, since
        these sites are a subset of the total sites, n1 is less or equal
        than N1. The site prefixes of each site are Pref6-1, Pref6-2, &hellip;
        , Pref6-n1. For multicast, MAC-VRF also maintains related entries,
        with MAC addresses being multicast addresses. Per IEEE 802.1Q,
        multicast addresses of Ethernet have the least significant bit in the
        first octet set to 1. Due to the presence of multiple destination
        sites for a given group, there are multiple site prefixes in each
        entry as follows:</t>

        <t><figure>
            <artwork><![CDATA[
+--------------------------------------------------------------------------+
| Multicast MAC Address | VEI |Length of Pref6|Pref6-1,Pref6-2,...,Pref6-n1|
+--------------------------------------------------------------------------+
                   Figure 7: Record of Multicast in MAC-VRF]]></artwork>
          </figure>Host H1 in site-0 sends a multicast frame to group G1. When
        the E-ADPT in PE1 receives the frame, it will look up its MAC-VRF with
        the destination multicast address of the frame as the key. When a
        matching entry is found and its VEI field is vn1, the list of site
        prefixes is extracted from the entry. Each item in the list is the site
        prefix of the remote site where the members of group G1 are located.
        Then, for each remote site, the following operations are performed
        recurrently by the E-ADPT of PE1,</t>

        <t indent="4">{</t>

        <t indent="4">- Generate the source IPv6 address with the source MAC
        address, vn1 and Pref6-0 using the method in section 4.2.</t>

        <t indent="4">- Generate the destination IPv6 address with destination
        multicast MAC address, vn1 and Pref6-k using the method in section
        4.2.</t>

        <t indent="4">- Generate the IPv6 header using the IPv6 source and
        destination addresses created above, encapsulate the frame into IPv6
        packet, then send the new IPv6 packet into the IPv6-only network.</t>

        <t indent="5">}</t>

        <t>Through the above n1 cycles the multicast frame is encapsulated
        into IPv6 packet and send out.</t>

        <t>When the packet traverses the IPv6-only network and reaches an
        egress PE, for instance PE2. The E-ADPT of PE2 extracts its
        destination site prefix, i.e. Pref6-k, and VEI with value of vn1 from
        its IPv6 destination and source addresses. E-ADPT uses Pref6-k as the
        key to query the local MAC-VRF. If the corresponding entry is found,
        and the value of the VEI field is vn1, this indicates that one site
        attached to PE2 hosts the members of group G1, then E-ADPT removes
        the IPv6 header and sends the released frame with the original
        multicast MAC address into this site.</t>
      </section>

      <section title="Broadcast">
        <t>Link-layer broadcast is used to send Ethernet frames to all other
        hosts of the virtual Ethernet instance. Per 802.1Q, the destination address of
        the broadcast frame is FF-FF-FF-FF-FF-FF, and all hosts in the same
        Layer-2 network will receive the broadcast frame. EVN6 framework needs
        to support link layer broadcast as well. Herein, the case of instance
        VN1 in section 5.1 is used to illustrate the process of broadcast.</t>

        <t>Host H1 located in site-0 sends a broadcast Ethernet frame. After
        receiving the frame and detecting that the destination MAC address is
        a broadcast address, PE1 needs to transmit it to each remote site of
        instance VN1. The E-ADPT in PE1 queries the MAC-VRF with the value of
        vn1 as the key, retrieves all the site prefixes of instance VN1:
        Pref6-1, Pref6-2, &hellip; , Pref6-N1. Then, for each remote site, the
        following operations are performed recurrently by the E-ADPT of
        PE1,</t>

        <t indent="4">{</t>

        <t indent="4">- Generate the source IPv6 address with the source MAC
        address, vn1 and Pref6-0 of site-0 using the method in section
        4.2.</t>

        <t indent="4">- Generate the destination IPv6 address with the broadcast
        MAC address(ff:ff:ff:ff:ff:ff), Pref6-k and vn1 using the method in
        section 4.2.</t>

        <t indent="4">- Generate the IPv6 header using the IPv6 source and
        destination addresses created above, encapsulate the frame into IPv6
        packet, then send the new IPv6 packet into the IPv6-only network.</t>

        <t indent="5">}</t>

        <t>Through the above N1-1 cycles the broadcast frame is encapsulated
        into IPv6 packets and send the data out.</t>

        <t>When the packet traverses the IPv6-only network and reaches an
        egress PE, for instance, PE2. The E-ADPT of PE2 extracts its Pref6-k
        and VEI with the value of vn1 from the destination IPv6 address and
        source IPv6 address of the packet. E-ADPT uses Pref6-k as the key to
        query the local MAC-VRF. If the corresponding entry is found and its
        VEI value is also vn1, this indicates that the site on PE2 is one site
        of instance VN1, then E-ADPT remove the IPv6 header sends the
        broadcast frame to this site.</t>

        <t/>
      </section>
    </section>

    <section title="Security Considerations">
      <t>In the EVN6 framework, PE devices located at the edge of the network
      encapsulate Ethernet frames in IPv6 packets and support transmission
      between different sites. When generating the outer IPv6 header, the PE
      device maps information such as the IPv6 address prefix of the site, the
      MAC address of the host, and the identity of the virtual network to the
      IPv6 address of the outer encapsulation header, which applies to both
      the source and destination addresses. In this way, the outer IPv6
      address is dynamically generated based on information such as MAC
      address. For any host to host communication, even if the source and
      destination hosts are in the same virtual private network, when their
      source and destination address pairs are different, the generated outer
      encapsulated IP address is also different. The outer IPv6 address varies
      with the MAC address of the Ethernet frame, this is different from
      traditional encapsulation scheme of pre-configuring tunnel IP addresses,
      as statically configured tunnel endpoint addresses are likely to become
      the targets of DDOS attacks. In EVN6, tunnel encapsulation adopts
      dynamically generated tunnel endpoint IPv6 addresses, which avoids the
      risk of DDOS attacks caused by statically pre-configured tunnel
      addresses. From this perspective, this solution improves the security of
      Ethernet virtual networks.</t>
    </section>

    <section title="Benefits and Advantages Analysis">
      <t>Compared with existing overlay approaches, EVN6 is perceived to have
      the following major advantages,</t>

      <t>1) Improved forwarding efficiency</t>

      <t>EVN6 encapsulates Ethernet frame into IPv6 packet without extra
      encapsulation headers, compared with existing approaches, such as VxLAN,
      encapsulation and processing costs can be reduced. </t>

      <t>2) High delivery flexibility</t>

      <t>EVN6 service can be provisioned to customer site as long as its
      access to the lPv6 Internet is available. There is no specific requirement
      for the interworking between ISPs, so it can be easily deployed in a 
      multi-operator environment. </t>

      <t>3) Enhanced anti-DDoS capability </t>

      <t>With EVN6 tunnel, endpoint addresses are generated dynamically and
      there is no pre-configured static tunnel endpoint address, so the risk
      of DDoS attack to pre-configured static address can be avoided. </t>

      <t>4) Source address based Traffic load-balancing</t>

      <t>Since the outer IPv6 source and destination addresses are generated
      by mapping source and destination host MAC address, VEI and site
      prefixes, different hosts within the same site have different outer IPv6
      addresses, so traffic load balancing can be implemented based on the
      source IPv6 addresses.</t>
    </section>

    <section title="IANA Considerations">
      <t>There are no other special IANA considerations.</t>
    </section>

    <section title="Acknowledgment">
      <t/>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.2119"?>

      <?rfc include="reference.RFC.8174"?>

      <?rfc include="reference.RFC.4291"?>

      <?rfc include="reference.RFC.7432"?>
    </references>

    <references title="Informative References">
      <?rfc include="reference.RFC.4762"?>

      <?rfc include="reference.RFC.4861"?>

      <?rfc include="reference.RFC.7348"?>

      <?rfc include="reference.RFC.7364"?>

      <?rfc include="reference.RFC.7365"?>

      <?rfc include="reference.RFC.8365"?>

      <?rfc include="reference.RFC.8926"?>

      <reference anchor="IEEE.802.1Q.2014"
                 target="http://standards.ieee.org/getieee802/download/802.1Q-2014.pdf">
        <front>
          <title>IEEE Standard for Information technology&mdash;
          Telecommunications and information exchange between systems&mdash;
          Local and metropolitan area networks&mdash; Specific requirements
          Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer
          (PHY) Specifications</title>

          <author>
            <organization/>
          </author>

          <date month="March" year="2012"/>
        </front>
      </reference>

      <reference anchor="IEEE.802.1D.2004"
                 target="http://standards.ieee.org/getieee802/download/802.1D-2004.pdf">
        <front>
          <title>IEEE Standard for Information technology&mdash;
          Telecommunications and information exchange between systems&mdash;
          Local and metropolitan area networks&mdash; Specific requirements
          Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer
          (PHY) Specifications</title>

          <author>
            <organization/>
          </author>

          <date month="March" year="2012"/>
        </front>
      </reference>
    </references>
  </back>
</rfc>