Skip to main content

References from draft-farinacci-lisp-rfc6833bis

These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.

Reference type help

Document Title Status Type Downref
BCP 106
References Referenced by
normatively references
BCP 107
References Referenced by
normatively references
draft-ermagan-lisp-nat-traversal NAT traversal for LISP
References Referenced by
informatively references
draft-ietf-lisp-ddt Locator/ID Separation Protocol Delegated Database Tree (LISP-DDT)
References Referenced by
Experimental informatively references
draft-ietf-lisp-lcaf LISP Canonical Address Format (LCAF)
References Referenced by
Experimental informatively references
draft-ietf-lisp-sec Locator/ID Separation Protocol Security (LISP-SEC)
References Referenced by
Proposed Standard informatively references
draft-ietf-lisp-signal-free-multicast Signal-Free Locator/ID Separation Protocol (LISP) Multicast
References Referenced by
Experimental informatively references
draft-lewis-lisp-gpe LISP Generic Protocol Extension
References Referenced by
informatively references
draft-meyer-lisp-mn LISP Mobile Node
References Referenced by
informatively references
draft-portoles-lisp-eid-mobility LISP L2/L3 EID Mobility Using a Unified Control Plane
References Referenced by
informatively references
draft-quinn-vxlan-gpe Generic Protocol Extension for VXLAN
References Referenced by
informatively references
RFC 1035 Domain names - implementation and specification
References Referenced by
Internet Standard normatively references
RFC 2104 HMAC: Keyed-Hashing for Message Authentication
References Referenced by
Informational normatively references
RFC 2404 The Use of HMAC-SHA-1-96 within ESP and AH
References Referenced by
Proposed Standard normatively references
RFC 4086 Randomness Requirements for Security
References Referenced by
Best Current Practice normatively references
RFC 4107 Guidelines for Cryptographic Key Management
References Referenced by
Best Current Practice normatively references
RFC 4868 Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec
References Referenced by
Proposed Standard normatively references
RFC 6234 US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)
References Referenced by
Informational normatively references
RFC 6830 The Locator/ID Separation Protocol (LISP)
References Referenced by
Experimental informatively references
RFC 6831 The Locator/ID Separation Protocol (LISP) for Multicast Environments
References Referenced by
Experimental normatively references
RFC 6833 Locator/ID Separation Protocol (LISP) Map-Server Interface
References Referenced by
Experimental informatively references
RFC 6836 Locator/ID Separation Protocol Alternative Logical Topology (LISP+ALT)
References Referenced by
Experimental normatively references
RFC 6837 NERD: A Not-so-novel Endpoint ID (EID) to Routing Locator (RLOC) Database
References Referenced by
Experimental normatively references
RFC 7348 Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks
References Referenced by
Informational normatively references
RFC 7835 Locator/ID Separation Protocol (LISP) Threat Analysis
References Referenced by
Informational informatively references
STD 13
References Referenced by
normatively references