<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lh-spring-srv6-sfc-csid-06" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Compressed SID (CSID) for SRv6 SFC</title>
    <seriesInfo name="Internet-Draft" value="draft-lh-spring-srv6-sfc-csid-06"/>
    <author initials="C." surname="Li" fullname="Cheng Li" role="editor">
      <organization>Huawei</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>c.l@huawei.com</email>
      </address>
    </author>
    <author initials="W." surname="Cheng" fullname="Weiqiang Cheng">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>chengweiqiang@chinamobile.com</email>
      </address>
    </author>
    <author initials="G." surname="Zeng" fullname="Guangming Zeng" role="editor">
      <organization>Huawei</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>zengguanming@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Li" fullname="Sen Li">
      <organization>China Mobile International Limited</organization>
      <address>
        <postal>
          <country>Hong Kong SAR China</country>
        </postal>
        <email>senli@cmi.chinamobile.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="26"/>
    <area>Routing Area</area>
    <workgroup>SPRING Working Group</workgroup>
    <keyword>Service programming</keyword>
    <keyword>Compression</keyword>
    <abstract>
      <?line 73?>

<t>In SRv6, an SRv6 SID is a 128-bit value. When too many 128-bit SRv6 SIDs are included in an SRH, the introduced overhead will affect the transmission efficiency of payload. In order to address this problem, Compressed SID(CSID) is proposed. This document defines new behaviors for service segments with REPLACE-CSID and NEXT-CSID flavors to enable compressed SRv6 service programming.</t>
    </abstract>
  </front>
  <middle>
    <?line 77?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Segment Routing <xref target="RFC8402"/> is a source routing paradigm to support steering packets through a programmed path at the ingress node. Currently, two data planes are defined for Segment Routing: MPLS and IPv6. When IPv6 data plane is used in Segment Routing, it is called SRv6 <xref target="RFC8754"/> . <xref target="RFC8754"/> defines a new extension header in IPv6, called Segment Routing Header (SRH), to support SRv6. To support SRv6 network programming, <xref target="RFC8986"/> defines a framework to build a network program with topological and service segments carried in a Segment Routing header (SRH) <xref target="RFC8754"/>.</t>
      <t>A Service Function Chain (SFC) <xref target="RFC7665"/> defines an ordered set of abstract service functions and ordering constraints that must be applied to packets and/or frames and/or flows.</t>
      <t>A service function chain can be implemented by SRv6 by using a sequence of SRv6 SIDs including service segments defined in <xref target="I-D.ietf-spring-sr-service-programming"/>.</t>
      <t>However, when too many 128-bit SRv6 SIDs are included in an SRH, the overhead of the SRH will affect the transmission efficiency of the payload. <xref target="I-D.ietf-spring-compression-requirement"/> points out the problem of long SRv6 SID lists reduce payload efficiency. To mitigate such overhead, <xref target="RFC9800"/> defines new flavors for basic SR endpoint behaviors defined in <xref target="RFC8986"/>. Using the new flavored behavior SID, a 128-bit SRv6 SID can be compressed to be an 32-bit or 16-bit Compressed SID (CSID), which reduces a lot of size of the SRv6 header.</t>
      <t>To enable SRv6 SID lists compression for service function chaining (SFC), this document defines new behaviors of service segments with flavors defined in <xref target="RFC9800"/>.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document leverages the terms defined in <xref target="RFC8402"/>, <xref target="RFC8754"/>, <xref target="RFC8986"/>, <xref target="RFC9800"/> and <xref target="I-D.ietf-spring-sr-service-programming"/>. The reader is assumed to be familiar with this terminology. This document does not introduce any new terms.</t>
      </section>
    </section>
    <section anchor="proxy_behaviors">
      <name>SR Proxy Behaviors</name>
      <t><xref target="I-D.ietf-spring-sr-service-programming"/> defines several SRv6 endpoint behaviors for service proxy segments. A service proxy segment ID is represented as an 128-bit value just like other SIDs defined in <xref target="RFC8986"/>. This section defines some new behaviors of those service proxy segments by combining the existing service proxy segment behaviors with CSID flavors, such as REPLACE-CSID flavor and NEXT-CSID flavor.</t>
      <t>The main difference between behaviors are the forwarding instructions. Therefore, when CSID compression mechanism applies to SR Proxy behaviors, the pseudo code of the new behaviors can be generated by updating the forwarding instructions of CSID to SR proxy forwarding instructions. The following sections define the details of the pseudo code of new behaviors.</t>
      <section anchor="static-sr-proxy">
        <name>Static SR Proxy</name>
        <t>In <xref target="I-D.ietf-spring-sr-service-programming"/>, an End.AS - Static proxy endpoint behavior is defined for the static SR proxy. According to the traffic type encapsulated in the SRv6 payload, the pseudo code of Ethernet, IPv4 and IPv6 is described as well in <xref target="I-D.ietf-spring-sr-service-programming"/>. This section defines the new behaviors of associate the NEXT-CSID and REPLACE-CSID Flavor to END.AS.</t>
        <section anchor="static-proxy-for-inner-type-ethernet">
          <name>Static Proxy for Inner Type Ethernet</name>
          <section anchor="replace-csid-flavor">
            <name>REPLACE-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the REPLACE-CSID flavor (a.k.a End.AS with REPLACE-CSID) for Ethernet traffic, the procedure described in <xref section="4.2.1" sectionFormat="of" target="RFC9800"/> is executed except for line R10 and R21 that are both replaced as follows.</t>
            <artwork><![CDATA[
P01.   If (Upper-layer header type != 143 (Ethernet)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Perform IPv6 decapsulation.
P05.   Submit the frame to the Ethernet module for transmission via
         interface IFACE-OUT.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="static-eth-replace-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.1.2.1" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an Ethernet frame received on the interface IFACE-IN and with a destination MAC address that is neither a broadcast address nor matches the address of IFACE-IN, as per <xref section="6.1.2.1" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
          <section anchor="next-csid-flavor">
            <name>NEXT-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the NEXT-CSID flavor (a.k.a End.AS with NEXT-CSID) for Ethernet traffic, the procedure described in <xref section="4.1.1" sectionFormat="of" target="RFC9800"/> is executed except for line N08 of that and line S15 of <xref section="4.1" sectionFormat="of" target="RFC8986"/> that are both replaced as follows.</t>
            <artwork><![CDATA[
Q01.   If (Upper-layer header type != 143 (Ethernet)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
Q03.   }
Q04.   Perform IPv6 decapsulation.
Q05.   Submit the frame to the Ethernet module for transmission via
         interface IFACE-OUT.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="static-eth-next-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.1.2.1" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an Ethernet frame received on the interface IFACE-IN and with a destination MAC address that is neither a broadcast address nor matches the address of IFACE-IN, as per <xref section="6.1.2.1" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
        </section>
        <section anchor="static-proxy-for-inner-type-ipv4">
          <name>Static Proxy for Inner Type IPv4</name>
          <section anchor="replace-csid-flavor-1">
            <name>REPLACE-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the REPLACE-CSID flavor (a.k.a End.AS with REPLACE-CSID) for IPv4 traffic, the procedure described in <xref section="4.2.1" sectionFormat="of" target="RFC9800"/> is executed except for line R10 and R21 that are both replaced as follows.</t>
            <artwork><![CDATA[
P01.   If (Upper-layer header type != 4 (IPv4)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Perform IPv6 decapsulation.
P05.   Submit the packet to the IPv4 module for transmission on
         interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="static-ipv4-replace-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.1.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an IPv4 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, as per <xref section="6.1.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
          <section anchor="next-csid-flavor-1">
            <name>NEXT-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the NEXT-CSID flavor (a.k.a End.AS with NEXT-CSID) for IPv4 traffic, the procedure described in <xref section="4.1.1" sectionFormat="of" target="RFC9800"/> is executed except for line N08 of that and line S15 of <xref section="4.1" sectionFormat="of" target="RFC8986"/> that are both replaced as follows.</t>
            <artwork><![CDATA[
Q01.   If (Upper-layer header type != 4 (IPv4)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
Q03.   }
Q04.   Perform IPv6 decapsulation.
Q05.   Submit the packet to the IPv4 module for transmission on
         interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="static-ipv4-next-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.1.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an IPv4 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, as per <xref section="6.1.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
        </section>
        <section anchor="static-proxy-for-inner-type-ipv6">
          <name>Static Proxy for Inner Type IPv6</name>
          <section anchor="replace-csid-flavor-2">
            <name>REPLACE-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the REPLACE-CSID flavor (a.k.a End.AS with REPLACE-CSID) for IPv6 traffic, the procedure described in <xref section="4.2.1" sectionFormat="of" target="RFC9800"/> is executed except for line R10 and R21 that are both replaced as follows.</t>
            <artwork><![CDATA[
P01.   If (Upper-layer header type != 41 (IPv6)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Perform IPv6 decapsulation.
P05.   Submit the packet to the IPv6 module for transmission on
         interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="static-ipv6-replace-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.1.2.3" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, as per <xref section="6.1.2.3" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
          <section anchor="next-csid-flavor-2">
            <name>NEXT-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the NEXT-CSID flavor (a.k.a End.AS with NEXT-CSID) for IPv6 traffic, the procedure described in <xref section="4.1.1" sectionFormat="of" target="RFC9800"/> is executed except for line N08 of that and line S15 of <xref section="4.1" sectionFormat="of" target="RFC8986"/> that are both replaced as follows.</t>
            <artwork><![CDATA[
Q01.   If (Upper-layer header type != 41 (IPv6)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
Q03.   }
Q04.   Perform IPv6 decapsulation.
Q05.   Submit the packet to the IPv6 module for transmission on
         interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="static-ipv6-next-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.1.2.3" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, as per <xref section="6.1.2.3" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
        </section>
      </section>
      <section anchor="dynamic-sr-proxy">
        <name>Dynamic SR Proxy</name>
        <t>In <xref target="I-D.ietf-spring-sr-service-programming"/>, an End.AD - Dynamic proxy endpoint behavior is defined for the dynamic SR proxy. According to the traffic type encapsulated in the SRv6 payload, the pseudo code of Ethernet, IPv4 and IPv6 is described as well in <xref target="I-D.ietf-spring-sr-service-programming"/>. This section defines the new behaviors of associate the NEXT-CSID and REPLACE-CSID Flavor to END.AD.</t>
        <section anchor="dynamic-proxy-for-inner-type-ethernet">
          <name>Dynamic Proxy for Inner Type Ethernet</name>
          <section anchor="replace-csid-flavor-3">
            <name>REPLACE-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the REPLACE-CSID flavor (a.k.a End.AD with REPLACE-CSID) for Ethernet traffic, the procedure described in <xref section="4.2.1" sectionFormat="of" target="RFC9800"/> is executed except for line R10 and R21 that are both replaced as follows.</t>
            <artwork><![CDATA[
P01.   If (Upper-layer header type != 143 (Ethernet)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Copy the IPv6 encapsulation in a CACHE entry associated with
            the interface IFACE-IN.
P05.   Perform IPv6 decapsulation.
P06.   Submit the frame to the Ethernet module for transmission via
         interface IFACE-OUT.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="dynamic-eth-replace-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an Ethernet frame received on the interface IFACE-IN and with a destination MAC address that is neither a broadcast address nor matches the address of IFACE-IN, as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
          <section anchor="next-csid-flavor-3">
            <name>NEXT-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the NEXT-CSID flavor (a.k.a End.AD with NEXT-CSID) for Ethernet traffic, the procedure described in <xref section="4.1.1" sectionFormat="of" target="RFC9800"/> is executed except for line N08 of that and line S15 of <xref section="4.1" sectionFormat="of" target="RFC8986"/> that are both replaced as follows.</t>
            <artwork><![CDATA[
Q01.   If (Upper-layer header type != 143 (Ethernet)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
Q03.   }
Q04.   Copy the IPv6 encapsulation in a CACHE entry associated with
            the interface IFACE-IN.
Q05.   Perform IPv6 decapsulation.
Q06.   Submit the frame to the Ethernet module for transmission via
         interface IFACE-OUT.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="dynamic-eth-next-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an Ethernet frame received on the interface IFACE-IN and with a destination MAC address that is neither a broadcast address nor matches the address of IFACE-IN, as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
        </section>
        <section anchor="dynamic-proxy-for-inner-type-ipv4">
          <name>Dynamic Proxy for Inner Type IPv4</name>
          <section anchor="replace-csid-flavor-4">
            <name>REPLACE-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the REPLACE-CSID flavor (a.k.a End.AD with REPLACE-CSID) for IPv4 traffic, the procedure described in <xref section="4.2.1" sectionFormat="of" target="RFC9800"/> is executed except for line R10 and R21 that are both replaced as follows.</t>
            <artwork><![CDATA[
P01.   If (Upper-layer header type != 4 (IPv4)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Copy the IPv6 encapsulation in a CACHE entry associated with
            the interface IFACE-IN.
P05.   Perform IPv6 decapsulation.
P06.   Submit the frame to the IPv4 module for transmission via
         interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="dynamic-ipv4-replace-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an IPv4 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
          <section anchor="next-csid-flavor-4">
            <name>NEXT-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the NEXT-CSID flavor (a.k.a End.AD with NEXT-CSID) for IPv4 traffic, the procedure described in <xref section="4.1.1" sectionFormat="of" target="RFC9800"/> is executed except for line N08 of that and line S15 of <xref section="4.1" sectionFormat="of" target="RFC8986"/> that are both replaced as follows.</t>
            <artwork><![CDATA[
Q01. If (Upper-layer header type != 4 (IPv4)) {
Q02.   Resubmit the packet to the IPv6 module for transmission to
        the new destination.
Q03. }
Q04. Copy the IPv6 encapsulation in a CACHE entry associated with
        the interface IFACE-IN.
Q05. Perform IPv6 decapsulation.
Q06. Submit the frame to the IPv4 module for transmission via
      interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="dynamic-ipv4-next-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an IPv4 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
        </section>
        <section anchor="dynamic-proxy-for-inner-type-ipv6">
          <name>Dynamic Proxy for Inner Type IPv6</name>
          <section anchor="replace-csid-flavor-5">
            <name>REPLACE-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the REPLACE-CSID flavor (a.k.a End.AD with REPLACE-CSID) for IPv6 traffic, the procedure described in <xref section="4.2.1" sectionFormat="of" target="RFC9800"/> is executed except for line R10 and R21 that are both replaced as follows.</t>
            <artwork><![CDATA[
P01. If (Upper-layer header type != 41 (IPv6)) {
P02.   Resubmit the packet to the IPv6 module for transmission to
        the new destination.
P03. }
P04. Copy the IPv6 encapsulation in a CACHE entry associated with
        the interface IFACE-IN.
P05. Perform IPv6 decapsulation.
P06. Submit the frame to the IPv6 module for transmission via
      interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="dynamic-ipv6-replace-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
          <section anchor="next-csid-flavor-5">
            <name>NEXT-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the NEXT-CSID flavor (a.k.a End.AD with NEXT-CSID) for IPv6 traffic, the procedure described in <xref section="4.1.1" sectionFormat="of" target="RFC9800"/> is executed except for line N08 of that and line S15 of <xref section="4.1" sectionFormat="of" target="RFC8986"/> that are both replaced as follows.</t>
            <artwork><![CDATA[
Q01. If (Upper-layer header type != 41 (IPv6)) {
Q02.   Resubmit the packet to the IPv6 module for transmission to
        the new destination.
Q03. }
Q04. Copy the IPv6 encapsulation in a CACHE entry associated with
        the interface IFACE-IN.
Q05. Perform IPv6 decapsulation.
Q06. Submit the frame to the IPv6 module for transmission via
      interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="dynamic-ipv6-next-code"/>.</t>
            <t>The upper-layer header processing is unchanged as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
            <t>When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, as per <xref section="6.2.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
          </section>
        </section>
      </section>
      <section anchor="shared-memory-sr-proxy">
        <name>Shared Memory SR Proxy</name>
        <t>This document does not need to define new flavors for shared proxy behavior as the processing will be executed by using the shared memory <xref section="6.3" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/>.</t>
      </section>
      <section anchor="mas_proxy">
        <name>Masquerading SR Proxy</name>
        <t>As per <xref target="I-D.ietf-spring-sr-service-programming"/>, when forwarding packets to SR-unaware SFs, masquerading SR proxy sets the destination address of the IPv6 header as segment list[0] which is the original final destination address. When receiving the traffic returning from the service, de-masquerading sets the destination address as segment list[Segment Left].</t>
        <t>To be consistent with the behavior of masquerading proxy, it's required that any segment list containing one or more masquerading proxy CSID <bcp14>MUST NOT</bcp14> apply any compression encoding to the last segment (segment list[0]).</t>
        <t>Note: The service receiving an IPv6 packet from the proxy uses the destination address (copied from last segment) as final destination and could apply certain actions based on that. In order to process and forward packets correctly, it is required that the last segment not be compressed.</t>
        <t>To be consistent with the behavior of masquerading proxy, when processing an IPv6 packet matching a FIB entry locally instantiated as an SRv6 masquerading CSID, it's required that the updated destination address <bcp14>MUST</bcp14> be cached in the proxy by adding a dynamic caching mechanism similar to the one described in <xref section="6.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/> in case that segment list[Segment Left] is a compressed SID.</t>
        <t>When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, the destination address <bcp14>MUST</bcp14> be recovered from CACHE in case that segment list[Segment Left] could be a CSID container.</t>
        <section anchor="srv6-masquerading-proxy-pseudocode">
          <name>SRv6 Masquerading Proxy Pseudocode</name>
          <t>In <xref target="I-D.ietf-spring-sr-service-programming"/>, an End.AM - Masquerading proxy endpoint behavior is defined for the Masquerading SR proxy. According to the traffic type encapsulated in the SRv6 payload, the pseudo code of Ethernet, IPv4 and IPv6 is described as well in <xref target="I-D.ietf-spring-sr-service-programming"/>. This section defines the new behaviors of associate the NEXT-CSID and REPLACE-CSID Flavor to END.AM.</t>
          <section anchor="replace-csid-flavor-6">
            <name>REPLACE-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 masquerading proxy SID with the REPLACE-CSID flavor (a.k.a End.AM with REPLACE-CSID), the procedure described in Figure 23 from <xref section="4.2.1" sectionFormat="of" target="RFC9800"/> is executed except for line R10 and R21 that are both replaced as follows.</t>
            <artwork><![CDATA[
P01. Copy the IPv6 Destination Address in a CACHE entry associated 
      with the interface IFACE-IN.
P02. Copy Segment List[0] from the SRH to the Destination Address
      of the IPv6 header.
P03. Submit the packet to the IPv6 module for transmission on
      interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="srv6-masquerading-replace-code"/>.</t>
            <t><strong>De-masquerading</strong>: When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, the procedure described in Figure 24 from <xref section="6.4.1" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/> is executed except for line S10 that is replaced as follows.</t>
            <artwork><![CDATA[
D01. Retrieve the CACHE entry associated with IFACE-IN.
D02. If the CACHE entry is not empty {
D03.    Destination Address of the IPv6 header is set to CACHE.
D04. }
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="srv6-de-masquerading-replace-code"/>.</t>
          </section>
          <section anchor="next-csid-flavor-6">
            <name>NEXT-CSID Flavor</name>
            <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 masquerading proxy SID with the NEXT-CSID flavor (a.k.a End.AM with NEXT-CSID), the procedure described in <xref section="4.1.1" sectionFormat="of" target="RFC9800"/> is executed except for line N08 of that and line S15 of <xref section="4.1" sectionFormat="of" target="RFC8986"/> that are both replaced as follows.</t>
            <artwork><![CDATA[
Q01. Copy the IPv6 Destination Address in a CACHE entry associated 
      with the interface IFACE-IN.
Q02. Copy Segment List[0] from the SRH to the Destination Address
      of the IPv6 header.
Q03. Submit the packet to the IPv6 module for transmission on
      interface IFACE-OUT via NH-ADDR.
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="srv6-masquerading-next-code"/>}.</t>
            <t><strong>De-masquerading</strong>: When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN, the procedure described in <xref section="6.4.1" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/> is executed except for line S10 that is replaced as follows.</t>
            <artwork><![CDATA[
E01. Retrieve the CACHE entry associated with IFACE-IN.
E02. If the CACHE entry is not empty {
E03.    Destination Address of the IPv6 header is set to CACHE.
E04. }
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="srv6-de-masquerading-next-code"/>.</t>
          </section>
        </section>
        <section anchor="destination-nat-flavor">
          <name>Destination NAT Flavor</name>
          <section anchor="replace-csid-flavor-7">
            <name>REPLACE-CSID Flavor</name>
            <t>The Destination NAT flavor of the SRv6 masquerading proxy with the REPLACE-CSID (a.k.a End.AM- Masquerading proxy with NAT with REPLACE-CSID, End.AMN with REPLACE-CSID for short) is executed except for line S09.1 and S10 in <xref section="6.4.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/> replaced as follows.</t>
            <artwork><![CDATA[
P01. Copy the Destination Address of the IPv6 header to the
      Segment List[0] entry of the SRH.
P02. Retrieve the CACHE entry associated with IFACE-IN.
P03. If the CACHE entry is not empty {
P04.    Destination Address of the IPv6 header is set to CACHE.
P05. }
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="nat-replace-code"/>.</t>
          </section>
          <section anchor="next-csid-flavor-7">
            <name>NEXT-CSID Flavor</name>
            <t>The Destination NAT flavor of the SRv6 masquerading proxy with the NEXT-CSID (a.k.a End.AM- Masquerading proxy with NAT with NEXT-CSID, End.AMN with NEXT-CSID for short) is executed except for line S09.1 and S10 in <xref section="6.4.2" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/> replaced as follows.</t>
            <artwork><![CDATA[
Q01. Copy the Destination Address of the IPv6 header to the
      Segment List[0] entry of the SRH.
Q02. Retrieve the CACHE entry associated with IFACE-IN.
Q03. If the CACHE entry is not empty {
Q04.    Destination Address of the IPv6 header is set to CACHE.
Q05. }
]]></artwork>
            <t>A rendering of the complete pseudocode is provided in <xref target="nat-next-code"/>.</t>
          </section>
        </section>
        <section anchor="cache-flavor">
          <name>Cache Flavor</name>
          <t>The caching flavor of the SRv6 masquerading proxy with CSID is enabled as per <xref section="6.4.3" sectionFormat="of" target="I-D.ietf-spring-sr-service-programming"/> without any modification.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security requirements and mechanisms described in <xref target="RFC8402"/> and <xref target="RFC8754"/> also apply to this document.</t>
      <t>This document does not introduce any new security considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="srv6-endpoint-behaviors">
        <name>SRv6 Endpoint Behaviors</name>
        <t>This document requests the IANA to allocate, within the "SRv6 Endpoint Behaviors" sub-registry belonging to the top-level "Segment-routing with IPv6 dataplane (SRv6) Parameters" registry, the following allocations:</t>
        <artwork><![CDATA[
Value      Description                               Reference
--------------------------------------------------------------
180        End.AS with REPLACE-CSID                  [This.ID]
181        End.AS with NEXT-CSID                     [This.ID]
182        End.AD with REPLACE-CSID                  [This.ID]
183        End.AD with NEXT-CSID                     [This.ID]
184        End.AM with REPLACE-CSID                  [This.ID]
185        End.AM with NEXT-CSID                     [This.ID]
186        End.AMN with REPLACE-CSID                 [This.ID]
187        End.AMN with NEXT-CSID                    [This.ID]
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8402">
          <front>
            <title>Segment Routing Architecture</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="July" year="2018"/>
            <abstract>
              <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
              <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
              <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8402"/>
          <seriesInfo name="DOI" value="10.17487/RFC8402"/>
        </reference>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC9800">
          <front>
            <title>Compressed SRv6 Segment List Encoding</title>
            <author fullname="W. Cheng" initials="W." role="editor" surname="Cheng"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="F. Clad" initials="F." role="editor" surname="Clad"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>Segment Routing over IPv6 (SRv6) is the instantiation of Segment Routing (SR) on the IPv6 data plane. This document specifies new flavors for the SRv6 endpoint behaviors defined in RFC 8986, which enable the compression of an SRv6 segment list. Such compression significantly reduces the size of the SRv6 encapsulation needed to steer packets over long segment lists.</t>
              <t>This document updates RFC 8754 by allowing a Segment List entry in the Segment Routing Header (SRH) to be either an IPv6 address, as specified in RFC 8754, or a REPLACE-CSID container in packed format, as specified in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9800"/>
          <seriesInfo name="DOI" value="10.17487/RFC9800"/>
        </reference>
        <reference anchor="I-D.ietf-spring-sr-service-programming">
          <front>
            <title>Service Programming with Segment Routing</title>
            <author fullname="Ahmed Abdelsalam" initials="A." surname="Abdelsalam">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Xiaohu Xu" initials="X." surname="Xu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Daniel Bernier" initials="D." surname="Bernier">
              <organization>Bell Canada</organization>
            </author>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei</organization>
            </author>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Shaowen Ma" initials="S." surname="Ma">
              <organization>Mellanox</organization>
            </author>
            <author fullname="Chaitanya Yadlapalli" initials="C." surname="Yadlapalli">
              <organization>AT&amp;T</organization>
            </author>
            <author fullname="Wim Henderickx" initials="W." surname="Henderickx">
              <organization>Nokia</organization>
            </author>
            <author fullname="Stefano Salsano" initials="S." surname="Salsano">
              <organization>Universita di Roma "Tor Vergata"</organization>
            </author>
            <date day="3" month="November" year="2025"/>
            <abstract>
              <t>   This document defines data plane functionality required to implement
   service segments and achieve service programming in SR-enabled MPLS
   and IPv6 networks, as described in the Segment Routing architecture.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-spring-sr-service-programming-12"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="I-D.ietf-spring-compression-requirement">
          <front>
            <title>Compressed SRv6 SID List Requirements</title>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Chongfeng Xie" initials="C." surname="Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Ron Bonica" initials="R." surname="Bonica">
              <organization>Juniper</organization>
            </author>
            <author fullname="Darren Dukes" initials="D." surname="Dukes">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei</organization>
            </author>
            <author fullname="Shaofu Peng" initials="S." surname="Peng">
              <organization>ZTE</organization>
            </author>
            <author fullname="Wim Henderickx" initials="W." surname="Henderickx">
              <organization>Nokia</organization>
            </author>
            <date day="3" month="April" year="2023"/>
            <abstract>
              <t>   This document specifies requirements for solutions to compress SRv6
   SID lists.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-spring-compression-requirement-03"/>
        </reference>
      </references>
    </references>
    <?line 576?>

<section anchor="complete-pseudocodes">
      <name>Complete Pseudocodes</name>
      <section anchor="static-eth-replace-code">
        <name>REPLACE-CSID Flavor for Static Proxy for Inner Type Ethernet</name>
        <t>When processing the SRH of a packet matching a FIB entry locally instantiated as an SRv6 static proxy SID with the REPLACE-CSID flavor for Ethernet traffic:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0 and (DA.Arg.Index == 0 or
           Segment List[0][DA.Arg.Index-1] == 0)) {
S03.     Stop processing the SRH, and proceed to process the next
           header in the packet, whose type is identified by
           the Next Header field in the routing header.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
           Code 0 (Hop limit exceeded in transit),
           interrupt packet processing and discard the packet.
S07.   }
S08.   max_LE = (Hdr Ext Len / 2) - 1
R01.   If (DA.Arg.Index != 0) {
R02.     If ((Last Entry > max_LE) or (Segments Left > Last Entry)) {
R03.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R04.     }
R05.     Decrement DA.Arg.Index by 1.
R06.     If (Segment List[Segments Left][DA.Arg.Index] == 0) {
R07.       Decrement Segments Left by 1.
R08.       Decrement IPv6 Hop Limit by 1.
R09.       Update IPv6 DA with Segment List[Segments Left]
P01.       If (Upper-layer header type != 143 (Ethernet)) {
P02.         Resubmit the packet to the IPv6 module for    
                transmission to the new destination.
P03.       }
P04.       Perform IPv6 decapsulation.
P05.       Submit the frame to the Ethernet module for transmission
             via interface IFACE-OUT.
R11.     }
R12.   } Else {
R13.     If((Last Entry > max_LE) or (Segments Left > Last Entry+1)){
R14.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R15.     }
R16.     Decrement Segments Left by 1.
R17.     Set DA.Arg.Index to (128/LNFL - 1).
R18.   }
R19.   Decrement IPv6 Hop Limit by 1.
R20.   Write Segment List[Segments Left][DA.Arg.Index] into the bits
         [LBL..LBL+LNFL-1] of the Destination Address of the IPv6
         header.
P01.   If (Upper-layer header type != 143 (Ethernet)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Perform IPv6 decapsulation.
P05.   Submit the frame to the Ethernet module for transmission via
         interface IFACE-OUT.
S16. }
]]></artwork>
      </section>
      <section anchor="static-eth-next-code">
        <name>NEXT-CSID Flavor for Static Proxy for Inner Type Ethernet</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the NEXT-CSID flavor for Ethernet traffic:</t>
        <artwork><![CDATA[
N01. If (DA.Argument != 0) {
N02.   If (IPv6 Hop Limit <= 1) {
N03.     Send an ICMP Time Exceeded message to the Source Address
           with Code 0 (Hop limit exceeded in transit),
           interrupt packet processing, and discard the packet.
N04.   }
N05.   Copy the value of DA.Argument into the bits [LBL..(LBL+AL-1)]
         of the Destination Address.
N06.   Set the bits [(LBL+AL)..127] of the Destination Address to
         zero.
N07.   Decrement IPv6 Hop Limit by 1.
Q01.   If (Upper-layer header type != 143 (Ethernet)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
Q03.   }
Q04.   Perform IPv6 decapsulation.
Q05.   Submit the frame to the Ethernet module for transmission via
           interface IFACE-OUT.
N09. }
S02. If (Segments Left == 0) {
S03.   Stop processing the SRH, and proceed to process the next
         header in the packet, whose type is identified by
         the Next Header field in the routing header.
S04. }
S05. If (IPv6 Hop Limit <= 1) {
S06.   Send an ICMP Time Exceeded message to the Source Address
         with Code 0 (Hop limit exceeded in transit),
         interrupt packet processing, and discard the packet.
S07. }
S08. max_LE = (Hdr Ext Len / 2) - 1
S09. If ((Last Entry > max_LE) or (Segments Left > Last Entry+1)) {
S10.   Send an ICMP Parameter Problem to the Source Address
         with Code 0 (Erroneous header field encountered)
         and Pointer set to the Segments Left field,
         interrupt packet processing, and discard the packet.
S11. }
S12. Decrement IPv6 Hop Limit by 1.
S13. Decrement Segments Left by 1.
S14. Update IPv6 DA with Segment List[Segments Left].
Q01. If (Upper-layer header type != 143 (Ethernet)) {
Q02.   Resubmit the packet to the IPv6 module for transmission to
         the new destination.
Q03. }
Q04. Perform IPv6 decapsulation.
Q05. Submit the frame to the Ethernet module for transmission via
        interface IFACE-OUT.
]]></artwork>
      </section>
      <section anchor="static-ipv4-replace-code">
        <name>REPLACE-CSID Flavor for Static Proxy for Inner Type IPv4</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the REPLACE-CSID flavor for IPv4 traffic:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0 and (DA.Arg.Index == 0 or
           Segment List[0][DA.Arg.Index-1] == 0)) {
S03.     Stop processing the SRH, and proceed to process the next
           header in the packet, whose type is identified by
           the Next Header field in the routing header.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
           Code 0 (Hop limit exceeded in transit),
           interrupt packet processing and discard the packet.
S07.   }
S08.   max_LE = (Hdr Ext Len / 2) - 1
R01.   If (DA.Arg.Index != 0) {
R02.     If ((Last Entry > max_LE) or (Segments Left > Last Entry)) {
R03.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R04.     }
R05.     Decrement DA.Arg.Index by 1.
R06.     If (Segment List[Segments Left][DA.Arg.Index] == 0) {
R07.       Decrement Segments Left by 1.
R08.       Decrement IPv6 Hop Limit by 1.
R09.       Update IPv6 DA with Segment List[Segments Left]
P01.       If (Upper-layer header type != 4 (IPv4)) {
P02.         Resubmit the packet to the IPv6 module for transmission
               to the new destination.
P03.       }
P04.       Perform IPv6 decapsulation.
P05.       Submit the packet to the IPv4 module for transmission on
             interface IFACE-OUT via NH-ADDR.
R11.     }
R12.   } Else {
R13.     If((Last Entry > max_LE) or (Segments Left > Last Entry+1)){
R14.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R15.     }
R16.     Decrement Segments Left by 1.
R17.     Set DA.Arg.Index to (128/LNFL - 1).
R18.   }
R19.   Decrement IPv6 Hop Limit by 1.
R20.   Write Segment List[Segments Left][DA.Arg.Index] into the bits
         [LBL..LBL+LNFL-1] of the Destination Address of the IPv6
         header.
P01.   If (Upper-layer header type != 4 (IPv4)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Perform IPv6 decapsulation.
P05.   Submit the packet to the IPv4 module for transmission on
         interface IFACE-OUT via NH-ADDR.
S16. }
]]></artwork>
      </section>
      <section anchor="static-ipv4-next-code">
        <name>NEXT-CSID Flavor for Static Proxy for Inner Type IPv4</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the NEXT-CSID flavor for IPv4 traffic:</t>
        <artwork><![CDATA[
N01. If (DA.Argument != 0) {
N02.   If (IPv6 Hop Limit <= 1) {
N03.     Send an ICMP Time Exceeded message to the Source Address
           with Code 0 (Hop limit exceeded in transit),
           interrupt packet processing, and discard the packet.
N04.   }
N05.   Copy the value of DA.Argument into the bits [LBL..(LBL+AL-1)]
         of the Destination Address.
N06.   Set the bits [(LBL+AL)..127] of the Destination Address to
         zero.
N07.   Decrement IPv6 Hop Limit by 1.
Q01.   If (Upper-layer header type != 4 (IPv4)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
Q03.   }
Q04.   Perform IPv6 decapsulation.
Q05.   Submit the packet to the IPv4 module for transmission on
         interface IFACE-OUT via NH-ADDR.
N09. }
S02. If (Segments Left == 0) {
S03.   Stop processing the SRH, and proceed to process the next
         header in the packet, whose type is identified by
         the Next Header field in the routing header.
S04. }
S05. If (IPv6 Hop Limit <= 1) {
S06.   Send an ICMP Time Exceeded message to the Source Address
         with Code 0 (Hop limit exceeded in transit),
         interrupt packet processing, and discard the packet.
S07. }
S08. max_LE = (Hdr Ext Len / 2) - 1
S09. If ((Last Entry > max_LE) or (Segments Left > Last Entry+1)) {
S10.   Send an ICMP Parameter Problem to the Source Address
         with Code 0 (Erroneous header field encountered)
         and Pointer set to the Segments Left field,
         interrupt packet processing, and discard the packet.
S11. }
S12. Decrement IPv6 Hop Limit by 1.
S13. Decrement Segments Left by 1.
S14. Update IPv6 DA with Segment List[Segments Left].
Q01. If (Upper-layer header type != 4 (IPv4)) {
Q02.   Resubmit the packet to the IPv6 module for transmission to
         the new destination.
Q03. }
Q04. Perform IPv6 decapsulation.
Q05. Submit the packet to the IPv4 module for transmission on
       interface IFACE-OUT via NH-ADDR.
]]></artwork>
      </section>
      <section anchor="static-ipv6-replace-code">
        <name>REPLACE-CSID Flavor for Static Proxy for Inner Type IPv6</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the REPLACE-CSID flavor for IPv6 traffic:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0 and (DA.Arg.Index == 0 or
           Segment List[0][DA.Arg.Index-1] == 0)) {
S03.     Stop processing the SRH, and proceed to process the next
           header in the packet, whose type is identified by
           the Next Header field in the routing header.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
           Code 0 (Hop limit exceeded in transit),
           interrupt packet processing and discard the packet.
S07.   }
S08.   max_LE = (Hdr Ext Len / 2) - 1
R01.   If (DA.Arg.Index != 0) {
R02.     If ((Last Entry > max_LE) or (Segments Left > Last Entry)) {
R03.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R04.     }
R05.     Decrement DA.Arg.Index by 1.
R06.     If (Segment List[Segments Left][DA.Arg.Index] == 0) {
R07.       Decrement Segments Left by 1.
R08.       Decrement IPv6 Hop Limit by 1.
R09.       Update IPv6 DA with Segment List[Segments Left]
P01.     If (Upper-layer header type != 41 (IPv6)) {
P02.       Resubmit the packet to the IPv6 module for transmission to
             the new destination.
P03.     }
P04.     Perform IPv6 decapsulation.
P05.     Submit the packet to the IPv6 module for transmission on
         interface IFACE-OUT via NH-ADDR.
R11.     }
R12.   } Else {
R13.     If((Last Entry > max_LE) or (Segments Left > Last Entry+1)){
R14.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R15.     }
R16.     Decrement Segments Left by 1.
R17.     Set DA.Arg.Index to (128/LNFL - 1).
R18.   }
R19.   Decrement IPv6 Hop Limit by 1.
R20.   Write Segment List[Segments Left][DA.Arg.Index] into the bits
         [LBL..LBL+LNFL-1] of the Destination Address of the IPv6
         header.
P01.   If (Upper-layer header type != 41 (IPv6)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Perform IPv6 decapsulation.
P05.   Submit the packet to the IPv6 module for transmission on
         interface IFACE-OUT via NH-ADDR.
S16. }
]]></artwork>
      </section>
      <section anchor="static-ipv6-next-code">
        <name>NEXT-CSID Flavor for Static Proxy for Inner Type IPv6</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 static proxy SID with the NEXT-CSID flavor for IPv6 traffic:</t>
        <artwork><![CDATA[
N01. If (DA.Argument != 0) {
N02.   If (IPv6 Hop Limit <= 1) {
N03.     Send an ICMP Time Exceeded message to the Source Address
           with Code 0 (Hop limit exceeded in transit),
           interrupt packet processing, and discard the packet.
N04.   }
N05.   Copy the value of DA.Argument into the bits [LBL..(LBL+AL-1)]
         of the Destination Address.
N06.   Set the bits [(LBL+AL)..127] of the Destination Address to
         zero.
N07.   Decrement IPv6 Hop Limit by 1.
Q01.   If (Upper-layer header type != 41 (IPv6)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
Q03.   }
Q04.   Perform IPv6 decapsulation.
Q05.   Submit the packet to the IPv6 module for transmission on
         interface IFACE-OUT via NH-ADDR.
N09. }
S02. If (Segments Left == 0) {
S03.   Stop processing the SRH, and proceed to process the next
         header in the packet, whose type is identified by
         the Next Header field in the routing header.
S04. }
S05. If (IPv6 Hop Limit <= 1) {
S06.   Send an ICMP Time Exceeded message to the Source Address
         with Code 0 (Hop limit exceeded in transit),
         interrupt packet processing, and discard the packet.
S07. }
S08. max_LE = (Hdr Ext Len / 2) - 1
S09. If ((Last Entry > max_LE) or (Segments Left > Last Entry+1)) {
S10.   Send an ICMP Parameter Problem to the Source Address
         with Code 0 (Erroneous header field encountered)
         and Pointer set to the Segments Left field,
         interrupt packet processing, and discard the packet.
S11. }
S12. Decrement IPv6 Hop Limit by 1.
S13. Decrement Segments Left by 1.
S14. Update IPv6 DA with Segment List[Segments Left].
Q01. If (Upper-layer header type != 41 (IPv6)) {
Q02.   Resubmit the packet to the IPv6 module for transmission to
        the new destination.
Q03. }
Q04. Perform IPv6 decapsulation.
Q05. Submit the packet to the IPv6 module for transmission on
       interface IFACE-OUT via NH-ADDR.
]]></artwork>
      </section>
      <section anchor="dynamic-eth-replace-code">
        <name>REPLACE-CSID Flavor for Dynamic Proxy for Inner Type Ethernet</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the REPLACE-CSID flavor for Ethernet traffic:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0 and (DA.Arg.Index == 0 or
           Segment List[0][DA.Arg.Index-1] == 0)) {
S03.     Stop processing the SRH, and proceed to process the next
           header in the packet, whose type is identified by
           the Next Header field in the routing header.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
           Code 0 (Hop limit exceeded in transit),
           interrupt packet processing and discard the packet.
S07.   }
S08.   max_LE = (Hdr Ext Len / 2) - 1
R01.   If (DA.Arg.Index != 0) {
R02.     If ((Last Entry > max_LE) or (Segments Left > Last Entry)) {
R03.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R04.     }
R05.     Decrement DA.Arg.Index by 1.
R06.     If (Segment List[Segments Left][DA.Arg.Index] == 0) {
R07.       Decrement Segments Left by 1.
R08.       Decrement IPv6 Hop Limit by 1.
R09.       Update IPv6 DA with Segment List[Segments Left]
P01.       If (Upper-layer header type != 143 (Ethernet)) {
P02.         Resubmit the packet to the IPv6 module for transmission to
               the new destination.
P03.       }
P04.       Copy the IPv6 encapsulation in a CACHE entry associated with
                the interface IFACE-IN.
P05.       Perform IPv6 decapsulation.
P06.       Submit the frame to the Ethernet module for transmission via
         interface IFACE-OUT.
R11.     }
R12.   } Else {
R13.     If((Last Entry > max_LE) or (Segments Left > Last Entry+1)){
R14.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R15.     }
R16.     Decrement Segments Left by 1.
R17.     Set DA.Arg.Index to (128/LNFL - 1).
R18.   }
R19.   Decrement IPv6 Hop Limit by 1.
R20.   Write Segment List[Segments Left][DA.Arg.Index] into the bits
         [LBL..LBL+LNFL-1] of the Destination Address of the IPv6
         header.
P01.   If (Upper-layer header type != 143 (Ethernet)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Copy the IPv6 encapsulation in a CACHE entry associated with
            the interface IFACE-IN.
P05.   Perform IPv6 decapsulation.
P06.   Submit the frame to the Ethernet module for transmission via
         interface IFACE-OUT.
S16. }
]]></artwork>
      </section>
      <section anchor="dynamic-eth-next-code">
        <name>NEXT-CSID Flavor for Dynamic Proxy for Inner Type Ethernet</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the NEXT-CSID flavor for Ethernet traffic:</t>
        <artwork><![CDATA[
N01. If (DA.Argument != 0) {
N02.   If (IPv6 Hop Limit <= 1) {
N03.     Send an ICMP Time Exceeded message to the Source Address
           with Code 0 (Hop limit exceeded in transit),
           interrupt packet processing, and discard the packet.
N04.   }
N05.   Copy the value of DA.Argument into the bits [LBL..(LBL+AL-1)]
         of the Destination Address.
N06.   Set the bits [(LBL+AL)..127] of the Destination Address to
         zero.
N07.   Decrement IPv6 Hop Limit by 1.
Q01.   If (Upper-layer header type != 143 (Ethernet)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
Q03.   }
Q04.   Copy the IPv6 encapsulation in a CACHE entry associated with
            the interface IFACE-IN.
Q05.   Perform IPv6 decapsulation.
Q06.   Submit the frame to the Ethernet module for transmission via
         interface IFACE-OUT.
N09. }
S02. If (Segments Left == 0) {
S03.   Stop processing the SRH, and proceed to process the next
         header in the packet, whose type is identified by
         the Next Header field in the routing header.
S04. }
S05. If (IPv6 Hop Limit <= 1) {
S06.   Send an ICMP Time Exceeded message to the Source Address
         with Code 0 (Hop limit exceeded in transit),
         interrupt packet processing, and discard the packet.
S07. }
S08. max_LE = (Hdr Ext Len / 2) - 1
S09. If ((Last Entry > max_LE) or (Segments Left > Last Entry+1)) {
S10.   Send an ICMP Parameter Problem to the Source Address
         with Code 0 (Erroneous header field encountered)
         and Pointer set to the Segments Left field,
         interrupt packet processing, and discard the packet.
S11. }
S12. Decrement IPv6 Hop Limit by 1.
S13. Decrement Segments Left by 1.
S14. Update IPv6 DA with Segment List[Segments Left].
Q01. If (Upper-layer header type != 143 (Ethernet)) {
Q02.   Resubmit the packet to the IPv6 module for transmission to
        the new destination.
Q03. }
Q04. Copy the IPv6 encapsulation in a CACHE entry associated with
        the interface IFACE-IN.
Q05. Perform IPv6 decapsulation.
Q06. Submit the frame to the Ethernet module for transmission via
       interface IFACE-OUT.
]]></artwork>
      </section>
      <section anchor="dynamic-ipv4-replace-code">
        <name>REPLACE-CSID Flavor for Dynamic Proxy for Inner Type IPv4</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the REPLACE-CSID flavor for IPv4 traffic:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0 and (DA.Arg.Index == 0 or
           Segment List[0][DA.Arg.Index-1] == 0)) {
S03.     Stop processing the SRH, and proceed to process the next
           header in the packet, whose type is identified by
           the Next Header field in the routing header.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
           Code 0 (Hop limit exceeded in transit),
           interrupt packet processing and discard the packet.
S07.   }
S08.   max_LE = (Hdr Ext Len / 2) - 1
R01.   If (DA.Arg.Index != 0) {
R02.     If ((Last Entry > max_LE) or (Segments Left > Last Entry)) {
R03.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R04.     }
R05.     Decrement DA.Arg.Index by 1.
R06.     If (Segment List[Segments Left][DA.Arg.Index] == 0) {
R07.       Decrement Segments Left by 1.
R08.       Decrement IPv6 Hop Limit by 1.
R09.       Update IPv6 DA with Segment List[Segments Left]
P01.       If (Upper-layer header type != 4 (IPv4)) {
P02.        Resubmit the packet to the IPv6 module for transmission to
               the new destination.
P03.       }
P04.       Copy the IPv6 encapsulation in a CACHE entry associated with
                the interface IFACE-IN.
P05.       Perform IPv6 decapsulation.
P06.       Submit the frame to the IPv4 module for transmission via
             interface IFACE-OUT via NH-ADDR.
R11.     }
R12.   } Else {
R13.     If((Last Entry > max_LE) or (Segments Left > Last Entry+1)){
R14.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R15.     }
R16.     Decrement Segments Left by 1.
R17.     Set DA.Arg.Index to (128/LNFL - 1).
R18.   }
R19.   Decrement IPv6 Hop Limit by 1.
R20.   Write Segment List[Segments Left][DA.Arg.Index] into the bits
         [LBL..LBL+LNFL-1] of the Destination Address of the IPv6
         header.
P01.   If (Upper-layer header type != 4 (IPv4)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.   }
P04.   Copy the IPv6 encapsulation in a CACHE entry associated with
            the interface IFACE-IN.
P05.   Perform IPv6 decapsulation.
P06.   Submit the frame to the IPv4 module for transmission via
         interface IFACE-OUT via NH-ADDR.
S16. }
]]></artwork>
      </section>
      <section anchor="dynamic-ipv4-next-code">
        <name>NEXT-CSID Flavor for Dynamic Proxy for Inner Type IPv4</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the NEXT-CSID flavor for IPv4 traffic:</t>
        <artwork><![CDATA[
N01. If (DA.Argument != 0) {
N02.   If (IPv6 Hop Limit <= 1) {
N03.     Send an ICMP Time Exceeded message to the Source Address
           with Code 0 (Hop limit exceeded in transit),
           interrupt packet processing, and discard the packet.
N04.   }
N05.   Copy the value of DA.Argument into the bits [LBL..(LBL+AL-1)]
         of the Destination Address.
N06.   Set the bits [(LBL+AL)..127] of the Destination Address to
         zero.
N07.   Decrement IPv6 Hop Limit by 1.
Q01.   If (Upper-layer header type != 4 (IPv4)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
          the new destination.
Q03.   }
Q04.   Copy the IPv6 encapsulation in a CACHE entry associated with
          the interface IFACE-IN.
Q05.   Perform IPv6 decapsulation.
Q06.   Submit the frame to the IPv4 module for transmission via
          interface IFACE-OUT via NH-ADDR.
N09. }
S02. If (Segments Left == 0) {
S03.   Stop processing the SRH, and proceed to process the next
         header in the packet, whose type is identified by
         the Next Header field in the routing header.
S04. }
S05. If (IPv6 Hop Limit <= 1) {
S06.   Send an ICMP Time Exceeded message to the Source Address
         with Code 0 (Hop limit exceeded in transit),
         interrupt packet processing, and discard the packet.
S07. }
S08. max_LE = (Hdr Ext Len / 2) - 1
S09. If ((Last Entry > max_LE) or (Segments Left > Last Entry+1)) {
S10.   Send an ICMP Parameter Problem to the Source Address
         with Code 0 (Erroneous header field encountered)
         and Pointer set to the Segments Left field,
         interrupt packet processing, and discard the packet.
S11. }
S12. Decrement IPv6 Hop Limit by 1.
S13. Decrement Segments Left by 1.
S14. Update IPv6 DA with Segment List[Segments Left].
Q01. If (Upper-layer header type != 4 (IPv4)) {
Q02.   Resubmit the packet to the IPv6 module for transmission to
        the new destination.
Q03. }
Q04. Copy the IPv6 encapsulation in a CACHE entry associated with
        the interface IFACE-IN.
Q05. Perform IPv6 decapsulation.
Q06. Submit the frame to the IPv4 module for transmission via
      interface IFACE-OUT via NH-ADDR.
]]></artwork>
      </section>
      <section anchor="dynamic-ipv6-replace-code">
        <name>REPLACE-CSID Flavor for Dynamic Proxy for Inner Type IPv6</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the REPLACE-CSID flavor for IPv6 traffic:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0 and (DA.Arg.Index == 0 or
           Segment List[0][DA.Arg.Index-1] == 0)) {
S03.     Stop processing the SRH, and proceed to process the next
           header in the packet, whose type is identified by
           the Next Header field in the routing header.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
           Code 0 (Hop limit exceeded in transit),
           interrupt packet processing and discard the packet.
S07.   }
S08.   max_LE = (Hdr Ext Len / 2) - 1
R01.   If (DA.Arg.Index != 0) {
R02.     If ((Last Entry > max_LE) or (Segments Left > Last Entry)) {
R03.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R04.     }
R05.     Decrement DA.Arg.Index by 1.
R06.     If (Segment List[Segments Left][DA.Arg.Index] == 0) {
R07.       Decrement Segments Left by 1.
R08.       Decrement IPv6 Hop Limit by 1.
R09.       Update IPv6 DA with Segment List[Segments Left]
P01.       If (Upper-layer header type != 41 (IPv6)) {
P02.       Resubmit the packet to the IPv6 module for transmission to
           the new destination.
P03.       }
P04.     Copy the IPv6 encapsulation in a CACHE entry associated with
            the interface IFACE-IN.
P05.     Perform IPv6 decapsulation.
P06.     Submit the frame to the IPv6 module for transmission via
           interface IFACE-OUT via NH-ADDR.
R11.     }
R12.   } Else {
R13.     If((Last Entry > max_LE) or (Segments Left > Last Entry+1)){
R14.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R15.     }
R16.     Decrement Segments Left by 1.
R17.     Set DA.Arg.Index to (128/LNFL - 1).
R18.   }
R19.   Decrement IPv6 Hop Limit by 1.
R20.   Write Segment List[Segments Left][DA.Arg.Index] into the bits
         [LBL..LBL+LNFL-1] of the Destination Address of the IPv6
         header.
P01.   If (Upper-layer header type != 41 (IPv6)) {
P02.     Resubmit the packet to the IPv6 module for transmission to
          the new destination.
P03.   }
P04.   Copy the IPv6 encapsulation in a CACHE entry associated with
          the interface IFACE-IN.
P05.   Perform IPv6 decapsulation.
P06.   Submit the frame to the IPv6 module for transmission via
          interface IFACE-OUT via NH-ADDR.
S16. }
]]></artwork>
      </section>
      <section anchor="dynamic-ipv6-next-code">
        <name>NEXT-CSID Flavor for Dynamic Proxy for Inner Type IPv6</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 dynamic proxy SID with the NEXT-CSID flavor for IPv6 traffic:</t>
        <artwork><![CDATA[
N01. If (DA.Argument != 0) {
N02.   If (IPv6 Hop Limit <= 1) {
N03.     Send an ICMP Time Exceeded message to the Source Address
           with Code 0 (Hop limit exceeded in transit),
           interrupt packet processing, and discard the packet.
N04.   }
N05.   Copy the value of DA.Argument into the bits [LBL..(LBL+AL-1)]
         of the Destination Address.
N06.   Set the bits [(LBL+AL)..127] of the Destination Address to
         zero.
N07.   Decrement IPv6 Hop Limit by 1.
Q01.   If (Upper-layer header type != 41 (IPv6)) {
Q02.     Resubmit the packet to the IPv6 module for transmission to
          the new destination.
Q03.   }
Q04.   Copy the IPv6 encapsulation in a CACHE entry associated with
          the interface IFACE-IN.
Q05.   Perform IPv6 decapsulation.
Q06.   Submit the frame to the IPv6 module for transmission via
         interface IFACE-OUT via NH-ADDR.
N09. }
S02. If (Segments Left == 0) {
S03.   Stop processing the SRH, and proceed to process the next
         header in the packet, whose type is identified by
         the Next Header field in the routing header.
S04. }
S05. If (IPv6 Hop Limit <= 1) {
S06.   Send an ICMP Time Exceeded message to the Source Address
         with Code 0 (Hop limit exceeded in transit),
         interrupt packet processing, and discard the packet.
S07. }
S08. max_LE = (Hdr Ext Len / 2) - 1
S09. If ((Last Entry > max_LE) or (Segments Left > Last Entry+1)) {
S10.   Send an ICMP Parameter Problem to the Source Address
         with Code 0 (Erroneous header field encountered)
         and Pointer set to the Segments Left field,
         interrupt packet processing, and discard the packet.
S11. }
S12. Decrement IPv6 Hop Limit by 1.
S13. Decrement Segments Left by 1.
S14. Update IPv6 DA with Segment List[Segments Left].
Q01. If (Upper-layer header type != 41 (IPv6)) {
Q02.   Resubmit the packet to the IPv6 module for transmission to
        the new destination.
Q03. }
Q04. Copy the IPv6 encapsulation in a CACHE entry associated with
        the interface IFACE-IN.
Q05. Perform IPv6 decapsulation.
Q06. Submit the frame to the IPv6 module for transmission via
      interface IFACE-OUT via NH-ADDR.
]]></artwork>
      </section>
      <section anchor="srv6-masquerading-replace-code">
        <name>REPLACE-CSID Flavor for SRv6 Masquerading Proxy</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 masquerading proxy SID with the REPLACE-CSID flavor:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (Segments Left == 0 and (DA.Arg.Index == 0 or
           Segment List[0][DA.Arg.Index-1] == 0)) {
S03.     Stop processing the SRH, and proceed to process the next
           header in the packet, whose type is identified by
           the Next Header field in the routing header.
S04.   }
S05.   If (IPv6 Hop Limit <= 1) {
S06.     Send an ICMP Time Exceeded message to the Source Address,
           Code 0 (Hop limit exceeded in transit),
           interrupt packet processing and discard the packet.
S07.   }
S08.   max_LE = (Hdr Ext Len / 2) - 1
R01.   If (DA.Arg.Index != 0) {
R02.     If ((Last Entry > max_LE) or (Segments Left > Last Entry)) {
R03.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R04.     }
R05.     Decrement DA.Arg.Index by 1.
R06.     If (Segment List[Segments Left][DA.Arg.Index] == 0) {
R07.       Decrement Segments Left by 1.
R08.       Decrement IPv6 Hop Limit by 1.
R09.       Update IPv6 DA with Segment List[Segments Left]
P01.       Copy the IPv6 Destination Address in a CACHE entry associated 
           with the interface IFACE-IN.
P02.       Copy Segment List[0] from the SRH to the Destination Address
             of the IPv6 header.
P03.       Submit the packet to the IPv6 module for transmission on
             interface IFACE-OUT via NH-ADDR.
R11.     }
R12.   } Else {
R13.     If((Last Entry > max_LE) or (Segments Left > Last Entry+1)){
R14.       Send an ICMP Parameter Problem to the Source Address,
             Code 0 (Erroneous header field encountered),
             Pointer set to the Segments Left field,
             interrupt packet processing and discard the packet.
R15.     }
R16.     Decrement Segments Left by 1.
R17.     Set DA.Arg.Index to (128/LNFL - 1).
R18.   }
R19.   Decrement IPv6 Hop Limit by 1.
R20.   Write Segment List[Segments Left][DA.Arg.Index] into the bits
         [LBL..LBL+LNFL-1] of the Destination Address of the IPv6
         header.
P01.   Copy the IPv6 Destination Address in a CACHE entry associated 
        with the interface IFACE-IN.
P02.   Copy Segment List[0] from the SRH to the Destination Address
        of the IPv6 header.
P03.   Submit the packet to the IPv6 module for transmission on
        interface IFACE-OUT via NH-ADDR.
S16. }
]]></artwork>
      </section>
      <section anchor="srv6-de-masquerading-replace-code">
        <name>REPLACE-CSID Flavor for SRv6 De-masquerading Proxy</name>
        <t>When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (IPv6 Hop Limit <= 1) {
S03.     Send an ICMP Time Exceeded message to the Source Address,
         Code 0 (hop limit exceeded in transit),
         Interrupt packet processing and discard the packet.
S04.   }
S05.   If (Segments Left != 0) {
S06.     max_last_entry = (Hdr Ext Len / 2) - 1
S07.     If ((Last Entry > max_last_entry) or
             (Segments Left > Last Entry)) {
S08.       Send an ICMP Parameter Problem message to the Source Address,
           Code 0 (Erroneous header field encountered),
           Pointer set to the Segments Left field,
           Interrupt packet processing and discard the packet.
S09.     }
D01.     Retrieve the CACHE entry associated with IFACE-IN.
D02.     If the CACHE entry is not empty {
D03.        Destination Address of the IPv6 header is set to CACHE.
D04.     }
S11.   }
S12.   Decrement Hop Limit by 1.
S13.   Submit the packet to the IPv6 module for transmission to the
       next destination.
S14. }
]]></artwork>
      </section>
      <section anchor="srv6-masquerading-next-code">
        <name>NEXT-CSID Flavor for SRv6 Masquerading Proxy</name>
        <t>When processing an IPv6 packet that matches a FIB entry locally instantiated as an SRv6 masquerading proxy SID with the NEXT-CSID flavor:</t>
        <artwork><![CDATA[
N01. If (DA.Argument != 0) {
N02.   If (IPv6 Hop Limit <= 1) {
N03.     Send an ICMP Time Exceeded message to the Source Address
           with Code 0 (Hop limit exceeded in transit),
           interrupt packet processing, and discard the packet.
N04.   }
N05.   Copy the value of DA.Argument into the bits [LBL..(LBL+AL-1)]
         of the Destination Address.
N06.   Set the bits [(LBL+AL)..127] of the Destination Address to
         zero.
N07.   Decrement IPv6 Hop Limit by 1.
Q01.    Copy the IPv6 Destination Address in a CACHE entry associated 
         with the interface IFACE-IN.
Q02.    Copy Segment List[0] from the SRH to the Destination Address
         of the IPv6 header.
Q03.    Submit the packet to the IPv6 module for transmission on
         interface IFACE-OUT via NH-ADDR.
N09. }
S02. If (Segments Left == 0) {
S03.   Stop processing the SRH, and proceed to process the next
         header in the packet, whose type is identified by
         the Next Header field in the routing header.
S04. }
S05. If (IPv6 Hop Limit <= 1) {
S06.   Send an ICMP Time Exceeded message to the Source Address
         with Code 0 (Hop limit exceeded in transit),
         interrupt packet processing, and discard the packet.
S07. }
S08. max_LE = (Hdr Ext Len / 2) - 1
S09. If ((Last Entry > max_LE) or (Segments Left > Last Entry+1)) {
S10.   Send an ICMP Parameter Problem to the Source Address
         with Code 0 (Erroneous header field encountered)
         and Pointer set to the Segments Left field,
         interrupt packet processing, and discard the packet.
S11. }
S12. Decrement IPv6 Hop Limit by 1.
S13. Decrement Segments Left by 1.
S14. Update IPv6 DA with Segment List[Segments Left].
Q01. Copy the IPv6 Destination Address in a CACHE entry associated 
      with the interface IFACE-IN.
Q02. Copy Segment List[0] from the SRH to the Destination Address
      of the IPv6 header.
Q03. Submit the packet to the IPv6 module for transmission on
      interface IFACE-OUT via NH-ADDR.
]]></artwork>
      </section>
      <section anchor="srv6-de-masquerading-next-code">
        <name>NEXT-CSID Flavor for SRv6 De-masquerading Proxy</name>
        <t>When processing an IPv6 packet received on the interface IFACE-IN and with a destination address that does not match any address of IFACE-IN:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (IPv6 Hop Limit <= 1) {
S03.     Send an ICMP Time Exceeded message to the Source Address,
         Code 0 (hop limit exceeded in transit),
         Interrupt packet processing and discard the packet.
S04.   }
S05.   If (Segments Left != 0) {
S06.     max_last_entry = (Hdr Ext Len / 2) - 1
S07.     If ((Last Entry > max_last_entry) or
             (Segments Left > Last Entry)) {
S08.       Send an ICMP Parameter Problem message to the Source Address,
           Code 0 (Erroneous header field encountered),
           Pointer set to the Segments Left field,
           Interrupt packet processing and discard the packet.
S09.     }
E01.     Retrieve the CACHE entry associated with IFACE-IN.
E02.     If the CACHE entry is not empty {
E03.        Destination Address of the IPv6 header is set to CACHE.
E04.     }
S11.   }
S12.   Decrement Hop Limit by 1.
S13.   Submit the packet to the IPv6 module for transmission to the
       next destination.
S14. }
]]></artwork>
      </section>
      <section anchor="nat-replace-code">
        <name>REPLACE-CSID Flavor for Destination NAT Flavor</name>
        <t>The Destination NAT flavor of the SRv6 masquerading proxy with the REPLACE-CSID is executed:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (IPv6 Hop Limit <= 1) {
S03.     Send an ICMP Time Exceeded message to the Source Address,
         Code 0 (hop limit exceeded in transit),
         Interrupt packet processing and discard the packet.
S04.   }
S05.   If (Segments Left != 0) {
S06.     max_last_entry = (Hdr Ext Len / 2) - 1
S07.     If ((Last Entry > max_last_entry) or
             (Segments Left > Last Entry)) {
S08.       Send an ICMP Parameter Problem message to the Source Address,
           Code 0 (Erroneous header field encountered),
           Pointer set to the Segments Left field,
           Interrupt packet processing and discard the packet.
S09.     }
P01.      Copy the Destination Address of the IPv6 header to the
           Segment List[0] entry of the SRH.
P02.      Retrieve the CACHE entry associated with IFACE-IN.
P03.      If the CACHE entry is not empty {
P04.         Destination Address of the IPv6 header is set to CACHE.
P05.      }
S11.   }
S12.   Decrement Hop Limit by 1.
S13.   Submit the packet to the IPv6 module for transmission to the
       next destination.
S14. }
]]></artwork>
      </section>
      <section anchor="nat-next-code">
        <name>NEXT-CSID Flavor for Destination NAT Flavor</name>
        <t>The Destination NAT flavor of the SRv6 masquerading proxy with the NEXT-CSID is executed:</t>
        <artwork><![CDATA[
S01. When an SRH is processed {
S02.   If (IPv6 Hop Limit <= 1) {
S03.     Send an ICMP Time Exceeded message to the Source Address,
         Code 0 (hop limit exceeded in transit),
         Interrupt packet processing and discard the packet.
S04.   }
S05.   If (Segments Left != 0) {
S06.     max_last_entry = (Hdr Ext Len / 2) - 1
S07.     If ((Last Entry > max_last_entry) or
             (Segments Left > Last Entry)) {
S08.       Send an ICMP Parameter Problem message to the Source Address,
           Code 0 (Erroneous header field encountered),
           Pointer set to the Segments Left field,
           Interrupt packet processing and discard the packet.
S09.     }
Q01.      Copy the Destination Address of the IPv6 header to the
           Segment List[0] entry of the SRH.
Q02.      Retrieve the CACHE entry associated with IFACE-IN.
Q03.      If the CACHE entry is not empty {
Q04.         Destination Address of the IPv6 header is set to CACHE.
Q05.      }
S11.   }
S12.   Decrement Hop Limit by 1.
S13.   Submit the packet to the IPv6 module for transmission to the
       next destination.
S14. }
]]></artwork>
      </section>
    </section>
    <section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="H." surname="Huang" fullname="Hongyi Huang">
        <organization>Huawei Technologies</organization>
        <address>
          <postal>
            <country>China</country>
          </postal>
          <email>hongyi.huang@huawei.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
