<?xml version="1.0" encoding="US-ASCII"?>
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private) -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY rfc2119 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
]>
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="info" docName="draft-ma-v6ops-5g-ipv6only-02" ipr="trust200902">
  <front>
    <title abbrev="5G IPv6-only Deployment Considerations">Considerations of
    Gradual IPv6-only Deployment in 5G Mobile Networks</title>

    <author fullname="Chenhao Ma" initials="C" surname="Ma">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <code>102209</code>

          <country>China</country>
        </postal>

        <email>machh@chinatelecom.cn</email>
      </address>
    </author>

    <author fullname="Chongfeng Xie" initials="C" surname="Xie">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <code>102209</code>

          <country>China</country>
        </postal>

        <email>xiechf@chinatelecom.cn</email>
      </address>
    </author>

    <date day="2" month="March" year="2026"/>

    <area>OPS Area</area>

    <workgroup>v6ops Working Group</workgroup>

    <keyword>5G IPv6-only</keyword>

    <abstract>
      <t>This document describes the approach of gradually deploying 464XLAT
      based IPv6-only technology on user plane in 3GPP 5G networks. It also
      discusses the challenges and potential solutions.</t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>Currently, IPv6 has been widely in mobile networks of operators
      worldwide, and it has even gained the dominant position from the
      perspective of traffic. However, IPv4 applications still exist in the
      network, and the support for IPv4 services must still be considered to
      guarantee the users&rsquo; experience. Furthermore, operators have begun
      experimenting with deploying IPv6-only approach in their mobile
      networks.</t>

      <t>The 5G system is defined in the 3GPP standards organization. In the
      5G system architecture, the session related to the endpoint's access to
      the internet is called the Packet Data Unit (PDU) session, and its type
      determines the IP protocol used for user access. In the 5G standards,
      the PDU session supports both IPv6 and IPv4 protocols, and it also
      provides policies to ensure that user equipment (UE) can access the
      internet. When a UE only supports the IPv4 protocol while the network
      supports dual-stack (IPv4 and IPv6), the network will provide an IPv4
      protocol stack configuration for the UE. Accordingly, for UE only
      supporting IPv6,the network will provide an IPv6 protocol stack
      configuration for the UE. Additionally, there are policy configuration
      schemes related to static addresses and other aspects, but It does not
      specify the requirements related to IPv6-only technology.</t>

      <t>There are several IPv6-only transition technologies described in
      <xref target="RFC9313"/> . Most existing deployments utilize 464XLAT
      technology in cellular network. This document describes the architecture
      for deploying 464XLAT based IPv6-only technology on user plane in 3GPP
      5G system. Based on the field trail, this document also discusses the
      major issues encountered and potential solutions to address them.</t>

      <section title="Requirements Language">
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
        "OPTIONAL" in this document are to be interpreted as described in BCP
        14<xref target="RFC2119"/> <xref target="RFC8174"/> when, and only
        when, they appear in all capitals, as shown here.</t>
      </section>
    </section>

    <section title="Terms and abbreviation">
      <t>The following terms are defined in this document:<list
          style="symbols">
          <t>464XLAT: IPv6-Only Transition Mechanism (IPv6-to-IPv4
          Translation)</t>

          <t>5GC: 5G Core</t>

          <t>5GS: 5G System</t>

          <t>AMF: Access and Mobility Management Function</t>

          <t>CLAT: CLAT is customer-side translator (XLAT) that compiles with
          <xref target="RFC6146"/></t>

          <t>PLAT: PLAT is provider-side translator (XLAT) that compiles with
          <xref target="RFC7915"/></t>

          <t>PDU&#65306;Protocol Data Unit</t>

          <t>IMEI: International Mobile Equipment Identity</t>

          <t>SMF&#65306;Session Management Function</t>

          <t>UE: User Equipment, e.g., mobile phone.</t>

          <t>LBO&#65306;Local Break Out</t>
        </list></t>
    </section>

    <section title="5GS IPv6-only Architecture on User Plane">
      <t>Examples of 5GS IPv6-only architectures on user plane are shown in
      the figures in the following sections. In production 5GS network, there
      is roaming behavior which specifies where the PDU session anchor and its
      controlling SMF are located in. That decides whether UE&rsquo;s PDU
      sessions get IP configuration and access the Internet from home 5GS
      network or visited 5GS network. Regarding roaming, 5GS contains three
      scenarios including non-roaming, roaming with home routed, and roaming
      with local break out.</t>

      <section title="Non-roaming Network Scenario">
        <t>Based on wireless 3GPP network architecture defined in [RFC6877],
        the non-roaming network architecture is depicted as figure 1. When a
        mobile network operator run only a 5GC, there is just non-roaming
        network scenario. In this csae, the CLAT function is deployed on the
        UE, while the PLAT/stateful NAT64 function and DNS64 function are
        deployed on the network side.<figure>
            <artwork><![CDATA[ +-------+  +------------+      _________  
 |UE     |  |5GC         |     /         \ 
 |+----+ |  |  +-----+   |    /           \ 
 ||CLAT| +--+--+UPF  +---+---+  Internet  | 
 |+----+ |  |  +-----+   |    \          / 
 +-------+  +---/-----\--+     +--------+ 
               /       \                    
            +------+  +------+               
            |NAT64 |  |DNS64 |               
            +------+  +------+                                                      ]]></artwork>
          </figure></t>
      </section>

      <section title="Roaming Network Scenario with Home Routed">
        <t>Generally, large mobile operators run multiple 5GCs divided by
        administrative divisions or other geographical methods. The roaming
        network scenario with home routed is shown in figure 2. In this case,
        UEs acquire IP network configuration and access the Internet in their
        home 5GS network. The IP address allocation strategy and traffic exit
        interface are decided by their home 5GC. The CLAT function is deployed
        on the UE, while the PLAT/stateful NAT64 function and DNS64 function
        are deployed on the home network.</t>
      </section>

      <section title="Roaming Network Scenario with Local Break Out">
        <t>The roaming network scenario with LBO is shown in figure 3. In this
        case, UEs get IP network configuration and access the Internet in the
        visited network. The CLAT function is deployed on the UE, while the
        PLAT/stateful NAT64 function and DNS64 function are deployed on the
        visited network. Home network also need to support NAT64 and DNS64
        when UE is in the non-roaming case.</t>

        <t>The following table 1 summarizes 5GC's network capabilities where
        the mobile network shall have to provide IPv6-only connectivity
        service.<figure>
            <artwork><![CDATA[+------------------+-----+-------------+---------------+
|Scenario          |UE   |Home Network |Visited Network|
+------------------+-----+-------------+---------------+
|Non-roaming       |CLAT |NAT64 DNS64  |               |
+------------------+-----+-------------+---------------+
|Roaming with Local|CLAT |NAT64 DNS64  |NAT64 DNS64    |
|Breakout          |     |             |               |
+------------------+-----+-------------+---------------+
|Roaming with Home |CLAT |NAT64 DNS64  |               |
|Routed            |     |             |               |
+------------------+-----+-------------+---------------+
 Table 1. Network Capabilities for IPv6-only 5G Scenarios]]></artwork>
          </figure></t>
      </section>
    </section>

    <section title="Deployment Challenges">
      <t>Based on our practices, for large-size mobile network operators,
      it&rsquo;s very difficult for operators to deploy IPv6-only capabilities
      across the whole network at once. There is a transition period that the
      IPv6-only capability is deployed gradually. This section identifies the
      major challenges when applying 464XLAT in a production network.</t>

      <section title="Roaming Challenge">
        <t>In the scenario where 5GC A supports IPv6-only capability while 5GC
        B doesn&rsquo;t. When UE A from 5GC A roams to 5GC B, it only obtains
        IPv6 configuration and accesses Internet according to the local
        breakout roaming policy. In this case, the access to IPv4 Internet may
        fail due to 5GC B lacks NAT64 and DNS64 capabilities.</t>
      </section>

      <section title="UE Challenge">
        <t>Regarding UE challenge, a significant number of terminals have not
        enabled CLAT functionality. The vast majority of Android terminals
        support and have enabled the CLAT functionality. Most new terminals
        like smart watch do not support this feature. Moreover, Apple's iOS in
        China does not enable CLAT functionality.</t>
      </section>

      <section title="UP Layer Challenge">
        <t>When IPv6-only users access IPv4 sites, the actual address they
        reach is generated by the DNS64 server, which combines a special IPv6
        prefix with the IPv4 site address to form an IPv6 address. Existing
        layer 3&amp;layer 4 content billing rules based on IPv4 addresses will
        no longer be effective and will need to be adjusted to accommodate the
        IPv6 addresses formed by DNS64.</t>
      </section>

      <section title=" DNS64 Configuration Challenge">
        <t>After enabling the DNS64 functionality, there is an increase in the
        processing load due to the additional handling of IPv6 queries and the
        DNS64 conversion, which consumes some device performance. The extent
        of this performance demand increase depends on the scale of IPv6
        queries. In a 5G network, once the DNS64 functionality is enabled, DNS
        resolution requests from both IPv6-only and dual-stack users will be
        processed by the DNS64 server. Even IPv4 resolution requests from
        dual-stack users will be treated as if they were from IPv6-only users,
        which place a significant load pressure on the DNS server. This may
        futher impact the service logic of the existing dual-stack users.</t>
      </section>
    </section>

    <section title="Deployment Solutions">
      <section title="PDP Context / APN Isolation Method">
        <t>In 3GPP mobile networks, the PDP context (in GPRS/UMTS) or PDN
        connection (in LTE/5G) represents a logical association between a User
        Equipment (UE) and a packet data network. Each context is associated
        with a specific APN or DNN (in 5G), which identifies the external
        network (e.g., the Internet, a corporate intranet, or an operator's
        walled garden) and determines the services and policies applied to
        that connection. Operators can leverage this architecture to separate
        users into different logical networks based on their service
        requirements, including IPv6 capabilities and DNS64 needs.</t>

        <t>An operator can configure multiple APNs with distinct
        characteristics:</t>

        <t><figure>
            <artwork><![CDATA[APN Type|IP Capabilities|DNS Configuration       |Target Users
APN-A   | Dual-stack    |Standard DNS resolvers  |Legacy dual-stack users
APN-B   | IPv6-only     |DNS64-capable resolvers |IPv6-only early adopters
APN-C   | IPv4-only     |Standard DNS resolvers  |Legacy IPv4-only devices]]></artwork>
          </figure> When a UE attaches to the network, it requests a PDP
        context for a specific APN. The network can:</t>

        <t> Assign users to different APNs based on subscription data (e.g.,
        user profile in HLR/HSS). </t>

        <t>Dynamically steer users to different APNs based on device
        capabilities (e.g., whether the UE supports IPv6-only operation). </t>

        <t>Use policy control to selectively enable DNS64 for certain user
        groups.</t>

        <t>Each PDP context can have its own DNS server addresses assigned
        via: </t>

        <t>PCO (Protocol Configuration Options) during context activation.</t>

        <t> DHCPv6 or Router Advertisement (for IPv6) within the context. </t>

        <t>Stateless address autoconfiguration with RDNSS options. </t>

        <t>For IPv6-only contexts, the operator can configure DNS64-capable
        resolvers; for dual-stack contexts, standard resolvers are used.</t>

        <t>In a typical IPv6-only rollout using APN isolation, an operator
        initially provisions a small pilot group with a dedicated
        "ipv6only.apn," where their PDP contexts receive IPv6-only addresses
        and DNS64 resolver addresses via Protocol Configuration Options (PCO).
        Subsequently, the operator expands deployment by updating subscription
        profiles to move more users to this IPv6-only APN. Eventually, the
        IPv6-only APN becomes the default for all new subscriptions, while
        legacy APNs are retained for backward compatibility. Throughout this
        phased approach, dual-stack users connected to standard APNs continue
        using conventional DNS resolvers and never utilize the DNS64
        infrastructure, ensuring clean separation between user groups and
        preventing unnecessary load on NAT64 gateways.</t>

        <t>PDP context and APN isolation provide strong separation between
        different user groups at the bearer level, ensuring that dual-stack
        users never unintentionally utilize DNS64 resolvers and overload NAT64
        gateways. This approach offers operators fine-grained control over
        which users receive IPv6-only service based on subscription data,
        device capabilities, or other policy criteria, while maintaining full
        backward compatibility for legacy devices that continue operating on
        existing APNs without any modification. Furthermore, User Equipment
        behaves normally by simply requesting an APN and receiving the
        appropriate configuration, as this method leverages proven, mature
        technology that is widely deployed and well understood by mobile
        operators worldwide, making it a reliable foundation for managing
        IPv6-only deployments in 3GPP networks.</t>

        <t>Despite its strengths, PDP context and APN isolation introduce
        significant operational complexity, as managing multiple APNs
        increases the burden on provisioning, billing, and subscription
        management systems, particularly when moving users between APNs
        requires updates to individual subscriber profiles that may not be
        practical for large-scale or dynamic changes. The approach operates at
        the bearer level rather than the IP flow level, limiting its
        granularity and making it incapable of supporting percentage-based
        rollout strategies within a single user group without resorting to
        complex multi-APN configurations. Additionally, some User Equipment
        may cache APN information or exhibit unpredictable behavior when
        multiple APNs are available, and crucially, this method is specific to
        3GPP mobile networks and does not apply to fixed broadband or
        enterprise environments, leaving a gap that must be addressed by
        complementary solutions.</t>
      </section>

      <section title="IMEI Configuration at Network Side">
        <t>One solution is to enhance the core network's capability to
        configure IP addresses and DNS server addresses based on IMEI number
        ranges. The IMEI is a unique sequence of 14 to 15 digits assigned to
        each mobile phone. It serves as a device identification number,
        enabling service providers to recognize the phone within the network.
        The primary purpose of the IMEI is to uniquely identify each device,
        allowing the network to determine whether the UE supports CLAT
        functionality. By configuring a whitelist of IMEIs that support CLAT
        functionality in the network, the network can assign an IPv6-only
        environment to UEs listed in the whitelist.</t>
      </section>

      <section title="Option 108">
        <t>One possible solution is to use the option108 [RFC 8925] <xref
        target="RFC8925"/>method, allowing UEs to choose whether to join the
        IPv6-only network. Additionally, a method for configuring DNS64 server
        addresses needs to be considered. However, in practical deployments,
        core network support for DHCPv4 functionality is optional and may not
        be applicable to all networks.</t>
      </section>

      <section title="Using RA to deliver PREF64 and DNS64 configuration">
        <t>Another possible solution is to transmit PREF64 and DNS64 address
        information through the RA option. In 5G systems, RA is used to
        advertise IPv6 prefixes in SLAAC, which is a mandatory functionality.
        Transmitting this information through RA is also a logical approach.
        Currently, the IETF has produced two RFCs, namely [RFC 8106]<xref
        target="RFC8106"/> and [RFC 8781]<xref target="RFC8781"/>. In
        practical implementations, the mobile core network supporting
        IPv6-only environments (IPv6-only mode) should include these two
        options in the RA messages. Upon receiving this message, the UE can
        abandon the IPv4 interface and operate in IPv6-only mode. In this
        solution, the core network does not need to be aware of the final
        protocol stack configuration used by the UE.</t>
      </section>
    </section>

    <section title="PREF64 and DNS64 Configuration via Router Advertisement Options">
      <t>This section specifies a method for advertising PREF64 (NAT64 prefix)
      and DNS64 configuration to hosts by combining PREF64 RA Option and DNS64
      RA Option.</t>

      <section title="Option Overview">
        <t>The mechanism relies on the presence of two distinct Router
        Advertisement options:</t>

        <t>1. PREF64 Option: Carries the IPv6 prefix used by the network's
        NAT64 gateway for IPv4/IPv6 protocol translation. The format,
        semantics, and processing rules for this option are defined in <xref
        target="RFC8781"/>.</t>

        <t>2. DNS64 Option: Carries the IPv6 address(es) of DNS64 servers
        capable of synthesizing AAAA records from A records. The format and
        semantics of this option are defined in RFC 8781<xref
        target="RFC8781"/> and <xref target="I-D.ma-6man-ra-dns64-flag"/>.</t>

        <t>A router (e.g., a 5G User Plane Function (UPF), a broadband
        gateway, or a network router) MUST include both options in its Router
        Advertisements to fully enable IPv6-only with NAT64/DNS64
        functionality on the link.</t>
      </section>

      <section title="Host Behavior ">
        <t>Upon receiving a Router Advertisement message containing both a
        valid PREF64 Option and a valid DNS64 Option, a host supporting this
        specification SHOULD:</t>

        <t>1. Process the PREF64 Option. This involves:</t>

        <t>Extracting the NAT64 prefix and its length.</t>

        <t>Calculating the validity of the prefix.</t>

        <t>Installing the prefix in its local policy table to be used for
        detecting synthesized IPv6 addresses.</t>

        <t>2. Process the DNS64 Option as follows:</t>

        <t>Extract the DNS64 server addresses and their Lifetime. Add these
        addresses to its list of available recursive DNS resolvers, marking
        them with a special attribute indicating DNS64 capability.</t>

        <t>Prefer DNS64 servers for resolution. The host MAY prioritize these
        DNS64 servers over other configured DNS servers (e.g., those learned
        via DHCPv6 or the RDNSS option) to ensure synthesis occurs.</t>

        <t>3. Resolution and Communication:</t>

        <t>When an application requires name resolution, the host queries the
        DNS64 server for a AAAA record.</t>

        <t>If the DNS64 server returns a synthetic AAAA record (constructed by
        embedding the IPv4 address from the authoritative A record into the
        advertised PREF64 prefix), the host will initiate communication using
        this IPv6 address.</t>

        <t>Traffic destined for this synthesized IPv6 address will be routed
        to the network's NAT64 gateway, which will perform the necessary
        protocol translation to reach the target IPv4-only server.</t>

        <t>A host MAY use heuristics to discover a NAT64 prefix if only the
        DNS64 Option is present, as defined in RFC 7050. However, the explicit
        signaling via the PREF64 Option is the preferred and more reliable
        method.</t>
      </section>

      <section title="Router Behavior">
        <t>A router configured to support IPv6-only with NAT64 MUST:</t>

        <t>1. Generate periodic and solicited Router Advertisements that
        include both the PREF64 Option and the DNS64 Option.</t>

        <t>2. PREF64 Option Configuration: Populate the PREF64 Option with the
        correct prefix, prefix length, and lifetime as per network policy and
        RFC 8781.</t>

        <t>3. DNS64 Option Configuration: Populate the DNS64 Option with the
        IPv6 address(es) of the network's DNS64 servers and a valid
        Lifetime.</t>

        <t>4. Ensure the lifetime values for both options are aligned to
        provide a consistent user experience. It is generally advisable to set
        similar lifetimes for both the NAT64 prefix and the DNS64 servers.</t>
      </section>

      <section title="Backward Compatibility and Coexistence">
        <t>Hosts that do not support the DNS64 Option will ignore it as
        specified in RFC 4861. They may rely on other methods (e.g., DHCPv6,
        RDNSS) to discover DNS servers, but may not achieve full IPv6-only
        functionality without manual configuration.</t>

        <t>This method coexists with the DHCPv6-based method for conveying
        DNS64 server information. If a host receives both, the source of truth
        is implementation-specific. It is RECOMMENDED that network
        administrators ensure consistent configuration across all discovery
        mechanisms.</t>

        <t>The DNS64 Option is distinct from the RDNSS Option (RFC 8106). A
        router MAY include both an RDNSS Option (pointing to standard DNS
        servers) and a DNS64 Option (pointing to DNS64 servers). A host that
        understands the DNS64 Option can then distinguish between servers that
        perform synthesis and those that do not.</t>
      </section>

      <section title="Deployment Scenarios">
        <t>This section describes the operational contexts in which the
        proposed DNS64 Router Advertisement option provides tangible benefits,
        and clarifies its relationship with existing transition
        technologies.</t>

        <t>1. Coexistence of IPv6-Only and Dual-Stack Users</t>

        <t>Many operators are migrating towards IPv6&nbhy;only access networks
        while still supporting a large base of dual&nbhy;stack subscribers. In
        such a mixed environment, IPv6&nbhy;only hosts require DNS64 to reach
        IPv4&nbhy;only content, whereas dual&nbhy;stack hosts should continue
        to use standard (non&nbhy;DNS64) resolvers to avoid unnecessary load
        on NAT64 gateways. However, when DNS server addresses are advertised
        via RDNSS (RFC 8106), all hosts receive the same set of resolvers.
        Without additional signaling, IPv6&nbhy;only hosts cannot distinguish
        which resolvers are DNS64&nbhy;capable, and dual&nbhy;stack hosts may
        inadvertently send queries to a DNS64 server, increasing the traffic
        that must be translated by the NAT64 device.</t>

        <t>2. Phased Rollout of DNS64 Services</t>

        <t>Operators often introduce new services incrementally to manage risk
        and validate performance. For example, an operator may wish to start
        by directing 10% of its IPv6&nbhy;only subscribers to a DNS64 resolver
        and gradually increase that percentage over time. Using RDNSS alone,
        such a phased rollout would require either complex per&nbhy;user
        provisioning (e.g., separate network slices or PDP contexts) or
        network&nbhy;wide changes that affect all users simultaneously. The
        proposed option can be selectively included in Router Advertisements
        sent to a subset of hosts, enabling fine&nbhy;grained,
        percentage&nbhy;based deployment without per&nbhy;host configuration
        changes. As the rollout progresses, the option can be enabled for more
        prefixes or more RA instances until full coverage is achieved.</t>

        <t>3. Multiple DNS Server Tiers with Different Capabilities</t>

        <t>In some networks, operators operate multiple tiers of recursive
        resolvers. For instance, a set of high&nbhy;performance resolvers may
        be dedicated to standard (non&nbhy;DNS64) queries, while a separate
        set of resolvers (perhaps with more logging or policy enforcement) are
        configured to perform DNS64 synthesis. Both sets may share the same
        IPv6 prefixes, making it impossible for a host to know which resolvers
        offer DNS64 solely from the addresses themselves. The proposed option
        provides an explicit signal that a given resolver supports DNS64,
        enabling hosts to make an informed choice without resorting to probe
        queries (which add latency and overhead) or static configuration
        (which reduces flexibility).</t>

        <t>4. Networks That Prefer Centralized Translation</t>

        <t>While host&nbhy;side synthesis (e.g., using the Pref64 option
        defined in RFC 8781) is a powerful tool, it requires host support and
        may not be available on all devices. Moreover, some operators prefer
        to keep translation logic centralized for reasons of policy control,
        logging, security, or ease of troubleshooting. For such environments,
        DNS64 remains a necessary component of the IPv6&nbhy;only transition
        toolkit. The proposed option enhances these deployments by giving
        operators control over which hosts receive DNS64 resolver information,
        thereby avoiding the overloading of NAT64 gateways and enabling
        gradual migration strategies.</t>
      </section>
    </section>

    <section title="Security Considerations">
      <t>To implement PREF64 RA Options, see the security sonsiderations
      presented in Section 7 of <xref target="RFC8781"/></t>

      <t>To implement DNS64 RA Options, see the security sonsiderations
      presented in Section 7 of <xref target="RFC8106"/></t>
    </section>

    <section title="IANA Considerations">
      <t>This document doesn't introduce any IANA considerations.</t>
    </section>

    <section title="Acknowledgements">
      <t>The comments and suggestions of the following are gratefully
      acknowledged: Lorenzo Colitti, Jordi Palet.</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.2119"?>

      <?rfc include="reference.RFC.3587"?>

      <?rfc include="reference.RFC.6146"?>

      <?rfc include='reference.RFC.6877'?>

      <?rfc include='reference.RFC.7915'?>

      <?rfc include='reference.RFC.8106'?>

      <?rfc include='reference.RFC.8174'?>

      <?rfc include='reference.RFC.8781'?>

      <?rfc include='reference.RFC.8925'?>

      <?rfc include="reference.RFC.9313"?>

      <?rfc include="reference.I-D.ma-6man-ra-dns64-flag"?>
    </references>
  </back>
</rfc>
