Browse Prior Art Database

EtherIP: Tunneling Ethernet Frames in IP Datagrams (RFC3378)

IP.com Disclosure Number: IPCOM000009817D
Original Publication Date: 2002-Sep-01
Included in the Prior Art Database: 2002-Sep-20
Document File: 10 page(s) / 19K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

R. Housley: AUTHOR [+2]

Abstract

This document describes the EtherIP, an early tunneling protocol, to provide informational and historical context for the assignment of IP protocol 97. EtherIP tunnels Ethernet and IEEE 802.3 media access control frames in IP datagrams so that non-IP traffic can traverse an IP internet. The protocol is very lightweight, and it does not provide protection against infinite loops.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 15% of the total text.

Network Working Group                                         R. Housley

Request for Comments: 3378                              RSA Laboratories

Category: Informational                                    S. Hollenbeck

                                                          VeriSign, Inc.

                                                          September 2002

           EtherIP: Tunneling Ethernet Frames in IP Datagrams

Status of this Memo

   This memo provides information for the Internet community.  It does

   not specify an Internet standard of any kind.  Distribution of this

   memo is unlimited.

Abstract

   This document describes the EtherIP, an early tunneling protocol, to

   provide informational and historical context for the assignment of IP

   protocol 97.  EtherIP tunnels Ethernet and IEEE 802.3 media access

   control frames in IP datagrams so that non-IP traffic can traverse an

   IP internet.  The protocol is very lightweight, and it does not

   provide protection against infinite loops.

1. Introduction

   EtherIP was first designed and developed in 1991.  This document was

   written to document the protocol for informational purposes and to

   provide historical context for the assignment of IP protocol 97 by

   IANA.

   The IETF Layer Two Tunneling Protocol Extensions (L2TPEXT) Working

   Group and IETF Pseudo Wire Emulation Edge-to-Edge (PWE3) Working

   Group are developing protocols that overcome the deficiencies of

   EtherIP.  In general, the standards track protocols produced by these

   IETF working groups should be used instead of EtherIP.

   The EtherIP protocol is used to tunnel Ethernet [DIX] and IEEE 802.3

   [CSMA/CD] media access control (MAC) frames (including IEEE 802.1Q

   [VLAN] datagrams) across an IP internet.  Tunneling is usually

   performed when the layer three protocol carried in the MAC frames is

   not IP or when encryption obscures the layer three protocol control

   information needed for routing.  EtherIP may be implemented in an end

   station to enable tunneling for that single station, or it may be

   implemented in a bridge-like station to enable tunneling for multiple

   stations connected to a particular local area network (LAN) segment.

Housley & Hollenbeck         Informational                      [Page 1]

RFC 3378                        EtherIP                   September 2002

   EtherIP may be used to enable communications between stations that

   implement Ethernet or IEEE 802.3 with a layer three protocol other

   than IP.  For example, two stations connected to different Ethernet

   LANs using the Xerox Network Systems Internetwork Datagram Protocol

   (IDP) [XNS]...