<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-v6ops-nat64-wkp-1918-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="nat64-wkp-1918">NAT64 WKP</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-v6ops-nat64-wkp-1918-02"/>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google, LLC</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>
    <author fullname="Jen Linkova">
      <organization>Google, LLC</organization>
      <address>
        <email>furry13@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="16"/>
    <area>Operations and Management</area>
    <workgroup>IPv6 Operations</workgroup>
    <keyword>ipv6</keyword>
    <keyword>nat64</keyword>
    <keyword>wkp</keyword>
    <abstract>
      <?line 56?>

<t>This document removes the requirement introduced in Section 3.1 of RFC6052 that
the NAT64 Well-Known Prefix 64:FF9B::/96 <bcp14>MUST NOT</bcp14> be used to represent
non-global IPv4 addresses, such as those defined in <xref target="RFC1918"/> or listed in
Section 3 of <xref target="RFC5735"/>. The proposed change enables IPv6-only nodes to reach
IPv4-only services with non-global addresses by leveraging the Well-Known
Prefix.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-v6ops-nat64-wkp-1918/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        IPv6 Operations Working Group mailing list (<eref target="mailto:v6ops@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/v6ops/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/v6ops/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/furry13/6052-update-wkp1918"/>.</t>
    </note>
  </front>
  <middle>
    <?line 65?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Section 3.1 of <xref target="RFC6052"/> prohibits IPv4/IPv6 translators from using the
Well-Known Prefix (WKP, 64:FF9B::/96) to represent non-global IPv4 addresses,
such as those defined in <xref target="RFC1918"/> or listed in Section 3 of <xref target="RFC5735"/>.</t>
      <t>This restriction is relatively straightforward to implement in DNS64 <xref target="RFC6147"/>:
a DNS64 server simply avoids synthesizing an AAAA record using the WKP if the
original A record contains a non-global IPv4 address. However, this requirement
introduces significant operational challenges for systems that do not rely on
DNS64 and instead use local synthesis such as CLAT (Customer-side Translator,
<xref target="RFC6877"/>), or similar approaches.</t>
      <t>Enterprise and other closed networks often require IPv6-only nodes to
communicate with both internal (e.g., using RFC1918 addresses) and external
(Internet) IPv4-only destinations. The restriction in Section 3.1 of RFC6052
prevents such networks from utilizing the WKP and, consequently, from relying
on public DNS64 servers (e.g. forwarding requests for external zones to public
DNS64) which utilize the WKP in order to maximize compatibility.</t>
      <t>Using two NAT64 prefixes — the WKP for Internet destinations and a
Network-Specific Prefix (NSP) for non-global IPv4 addresses — is not a feasible
solution for nodes performing local synthesis or running CLAT. None of the
widely deployed NAT64 Prefix Discovery mechanisms (<xref target="RFC7050"/>, <xref target="RFC8781"/>)
provide a method to map a specific NAT64 prefix to a subset of IPv4 addresses
for which it should be used.</t>
      <t>According to Section 3 of <xref target="RFC7050"/>, a node must use all learned prefixes when
performing local IPv6 address synthesis. Consequently, if a node discovers both
the WKP and the NSP, it will use both prefixes to represent global IPv4
addresses. This duplication significantly complicates security policies,
troubleshooting, and other operational aspects of the network.</t>
      <t>Prohibiting the WKP from representing non-global IPv4 addresses offers no
substantial benefit to IPv6-only or IPv6-mostly deployments. Simultaneously, it
substantially complicates network design and the behavior of nodes.</t>
      <t>Given the recent operational experience in deploying IPv6-only and IPv6-mostly
networks, it is desirable to allow translators to use a single prefix
(including the WKP) to represent all IPv4 addresses, regardless of their global
or non-global status. This simplification would greatly improve the utility of
the WKP in enterprise networks.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="terminology">
        <name>Terminology</name>
        <t>This document reuses the Terminology section of <xref target="RFC6052"/>.</t>
      </section>
    </section>
    <section anchor="rfc6052-update">
      <name>RFC6052 Update</name>
      <t>This document updates Section 3.1 of <xref target="RFC6052"/> ("Restrictions on the Use of the
Well-Known Prefix") as follows:</t>
      <t>OLD TEXT:</t>
      <t>===</t>
      <t>The Well-Known Prefix <bcp14>MUST NOT</bcp14> be used to represent non-global IPv4 addresses,
such as those defined in <xref target="RFC1918"/> or listed in Section 3 of <xref target="RFC5735"/>. Address
translators <bcp14>MUST NOT</bcp14> translate packets in which an address is composed of the
Well-Known Prefix and a non- global IPv4 address; they <bcp14>MUST</bcp14> drop these packets.</t>
      <t>===</t>
      <t>NEW TEXT:</t>
      <t>===</t>
      <t>The Well-Known Prefix <bcp14>MAY</bcp14> be used to represent non-global IPv4 addresses, such
as those defined in <xref target="RFC1918"/> or listed in Section 3 of <xref target="RFC5735"/>.</t>
      <t>Unmanaged client-side translators (CLATs) <bcp14>MUST</bcp14> translate packets in which an
address is composed of the Well-Known Prefix and a non-global IPv4 address by
default.</t>
      <t>Provider-side translators (PLATs) <bcp14>MUST</bcp14> translate such packets unless configured
otherwise. Because administrators may rely on dropping these packets as an
implicit security policy, PLAT implementations <bcp14>MAY</bcp14> choose not to translate such
packets by default. However, such PLAT implementations <bcp14>SHOULD</bcp14> provide a
configuration knob to enable translation for these packets.</t>
      <t>===</t>
      <t>As noted in Errata 5547 (<xref target="EID5547"/>):</t>
      <t><tt>
IPv4 packets with private destination addresses are routinely translated to IPv4 packets with global destination addresses in NAT44.
Similarly, an IPv6 packet with a destination address representing a private IPv4 address [RFC6052] can be translated to an IPv4 packet with a global destination address by NAT64 [RFC6146].
If a 464XLAT CLAT cannot translate a private IPv4 address to an IPv6 address using the NAT64 /96 prefix and that IPv4 address [RFC6052], then the packet may not be translated to an IPv4 packet with a global address by the 464XLAT PLAT (stateful NAT64). This changes the intent of the sender, and in so doing violates the end to end principle.
</tt></t>
      <t>Removing the requirement introduced in RFC 6052 Section 3.1 addresses this
errata.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>There may be cases when it is desirable to ignore translation of private use
IPv4 addressing due to internal policy or overlapping internal networks. It is
important to note, however, that overlapping networks in IPv6 translated
addresses are also overlapping in IPv4, and so behavior will be similar across
protocols in the vast majority of use cases. Environments reliant on
<xref target="RFC7050"/> may be required to create configurations which address the filtering
of private use IPv4 addressing if there is an expectation of compliance with
the original section 3.1.</t>
      <section anchor="existing-behavior">
        <name>Existing Behavior</name>
        <t>Testing and operational experience with existing CLAT
implementations (both mobile and non-mobile) have revealed highly inconsistent
behavior regarding the original restriction in Section 3.1 of <xref target="RFC6052"/>. While
some implementations strictly comply with the original requirement and drop
packets destined for non-global IPv4 addresses, many other widely deployed
CLATs completely ignore this restriction and translate the packets.</t>
        <t>This inconsistency creates significant operational challenges. Network
operators are unable to predictably determine how unmanaged, client-side
devices will handle traffic directed to internal IPv4 services. This
unpredictable dropping or translating of packets on the client side severely
complicates network design, security policies, and troubleshooting.</t>
        <t>By formalizing the requirement that unmanaged CLAT implementations <bcp14>MUST</bcp14>
translate these packets by default (as updated in Section 3), and allowing PLAT devices to translate these packets, this document
provides clear, standardized instructions to implementers. This resolves the
current operational ambiguity, ensuring predictable behavior across all client
ecosystems and aligning the standard with the practical realities of modern
IPv6-mostly and IPv6-only deployments.</t>
        <t>Furthermore, where client-side translation and local synthesis are used, it is
currently not feasible to employ more than one translation prefix, especially if different prefixes must be used for different IPv4 destinations. None of the
widely deployed NAT64 Prefix Discovery mechanisms (<xref target="RFC7050"/>, <xref target="RFC8781"/>)
provide a method to map a specific NAT64 prefix to a subset of IPv4 addresses
for which it should be used.</t>
      </section>
      <section anchor="use-of-network-specific-prefix">
        <name>Use of Network Specific Prefix</name>
        <t>Use of a network specific prefix such as provided by <xref target="RFC8215"/> does not
preclude the removal of section 3.1 as a <bcp14>MUST</bcp14> requirement. If a network employs
a network specific prefix the behavior of synthesizing a private use IPv4
address is not prevented by standard. The use of a network specific prefix
implies the existence of a local mechanism for synthesizing IPv6 addresses
based on that specific prefix, and thereby rules out use of a public DNS64
resolver in the vast majority of cases, as large scale public DNS64 resolvers
use the WKP to maximize compatibility.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Legitimizing packets where the IPv6 destination address is composed of the WKP
and a non-global IPv4 address does not, inherently, introduce new security
considerations. Whether a specific traffic flow between an IPv6-only source and
a non-global IPv4 destination (or any flow to a non-global IPv4 destination) is
legitimate is a matter of local network topology and administrative policy.
However, existing NAT64 implementations compliant with RFC 6052 are expected to
drop such packets. Administrators may be relying on this implicit filtering as
a built-in security mechanism to prevent unauthorized access to private IPv4
infrastructure, rather than implementing explicit security policies. This
reliance is particularly prevalent in managed NAT64 (PLAT) environments.</t>
      <t>Modifying the recommended behavior to allow such address compositions may, in
the absence of explicit filtering, enable traffic flows that were previously
prohibited by the translator's default logic. To mitigate this risk, existing
managed NAT64 implementations compliant with RFC 6052 <bcp14>SHOULD NOT</bcp14> alter their
default dropping behavior. Instead, they <bcp14>SHOULD</bcp14> provide a configuration knob to
enable this functionality, ensuring that the transition to supporting
non-global addresses is an intentional administrative action accompanied by a
review of local security policies.</t>
      <t>Furthermore, administrators should not rely on the internal verification logic
of the translator to enforce security boundaries. Instead, explicit policies
such as access control lists (ACLs), firewall policies or NAT rules must be
used to define authorized traffic patterns through the translator.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6052">
          <front>
            <title>IPv6 Addressing of IPv4/IPv6 Translators</title>
            <author fullname="C. Bao" initials="C." surname="Bao"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>This document discusses the algorithmic translation of an IPv6 address to a corresponding IPv4 address, and vice versa, using only statically configured information. It defines a well-known prefix for use in algorithmic translations, while allowing organizations to also use network-specific prefixes when appropriate. Algorithmic translation is used in IPv4/IPv6 translators, as well as other types of proxies and gateways (e.g., for DNS) used in IPv4/IPv6 scenarios. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6052"/>
          <seriesInfo name="DOI" value="10.17487/RFC6052"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1918">
          <front>
            <title>Address Allocation for Private Internets</title>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="B. Moskowitz" initials="B." surname="Moskowitz"/>
            <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
            <author fullname="G. J. de Groot" initials="G. J." surname="de Groot"/>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <date month="February" year="1996"/>
            <abstract>
              <t>This document describes address allocation for private internets. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="5"/>
          <seriesInfo name="RFC" value="1918"/>
          <seriesInfo name="DOI" value="10.17487/RFC1918"/>
        </reference>
        <reference anchor="RFC5735">
          <front>
            <title>Special Use IPv4 Addresses</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document obsoletes RFC 3330. It describes the global and other specialized IPv4 address blocks that have been assigned by the Internet Assigned Numbers Authority (IANA). It does not address IPv4 address space assigned to operators and users through the Regional Internet Registries, nor does it address IPv4 address space assigned directly by IANA prior to the creation of the Regional Internet Registries. It also does not address allocations or assignments of IPv6 addresses or autonomous system numbers. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5735"/>
          <seriesInfo name="DOI" value="10.17487/RFC5735"/>
        </reference>
        <reference anchor="RFC6146">
          <front>
            <title>Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers</title>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="P. Matthews" initials="P." surname="Matthews"/>
            <author fullname="I. van Beijnum" initials="I." surname="van Beijnum"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document describes stateful NAT64 translation, which allows IPv6-only clients to contact IPv4 servers using unicast UDP, TCP, or ICMP. One or more public IPv4 addresses assigned to a NAT64 translator are shared among several IPv6-only clients. When stateful NAT64 is used in conjunction with DNS64, no changes are usually required in the IPv6 client or the IPv4 server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6146"/>
          <seriesInfo name="DOI" value="10.17487/RFC6146"/>
        </reference>
        <reference anchor="RFC6147">
          <front>
            <title>DNS64: DNS Extensions for Network Address Translation from IPv6 Clients to IPv4 Servers</title>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
            <author fullname="P. Matthews" initials="P." surname="Matthews"/>
            <author fullname="I. van Beijnum" initials="I." surname="van Beijnum"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>DNS64 is a mechanism for synthesizing AAAA records from A records. DNS64 is used with an IPv6/IPv4 translator to enable client-server communication between an IPv6-only client and an IPv4-only server, without requiring any changes to either the IPv6 or the IPv4 node, for the class of applications that work through NATs. This document specifies DNS64, and provides suggestions on how it should be deployed in conjunction with IPv6/IPv4 translators. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6147"/>
          <seriesInfo name="DOI" value="10.17487/RFC6147"/>
        </reference>
        <reference anchor="RFC6877">
          <front>
            <title>464XLAT: Combination of Stateful and Stateless Translation</title>
            <author fullname="M. Mawatari" initials="M." surname="Mawatari"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <author fullname="C. Byrne" initials="C." surname="Byrne"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This document describes an architecture (464XLAT) for providing limited IPv4 connectivity across an IPv6-only network by combining existing and well-known stateful protocol translation (as described in RFC 6146) in the core and stateless protocol translation (as described in RFC 6145) at the edge. 464XLAT is a simple and scalable technique to quickly deploy limited IPv4 access service to IPv6-only edge networks without encapsulation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6877"/>
          <seriesInfo name="DOI" value="10.17487/RFC6877"/>
        </reference>
        <reference anchor="RFC7050">
          <front>
            <title>Discovery of the IPv6 Prefix Used for IPv6 Address Synthesis</title>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document describes a method for detecting the presence of DNS64 and for learning the IPv6 prefix used for protocol translation on an access network. The method depends on the existence of a well-known IPv4-only fully qualified domain name "ipv4only.arpa.". The information learned enables nodes to perform local IPv6 address synthesis and to potentially avoid NAT64 on dual-stack and multi-interface deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7050"/>
          <seriesInfo name="DOI" value="10.17487/RFC7050"/>
        </reference>
        <reference anchor="RFC8781">
          <front>
            <title>Discovering PREF64 in Router Advertisements</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="April" year="2020"/>
            <abstract>
              <t>This document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8781"/>
          <seriesInfo name="DOI" value="10.17487/RFC8781"/>
        </reference>
        <reference anchor="RFC8215">
          <front>
            <title>Local-Use IPv4/IPv6 Translation Prefix</title>
            <author fullname="T. Anderson" initials="T." surname="Anderson"/>
            <date month="August" year="2017"/>
            <abstract>
              <t>This document reserves the IPv6 prefix 64:ff9b:1::/48 for local use within domains that enable IPv4/IPv6 translation mechanisms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8215"/>
          <seriesInfo name="DOI" value="10.17487/RFC8215"/>
        </reference>
        <reference anchor="EID5547" target="https://www.rfc-editor.org/errata/eid5547">
          <front>
            <title>Errata ID 5547: NAT64 Well-Known Prefix SHOULD NOT be used for Private Use IPv4 Addresses</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 268?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Mohamed Boucadair, Nick Buraglio, Lorenzo
Colitti, Suresh Krishnan, Ted Lemon, Jordi Palet for their helpful comments and
suggestions on this document.</t>
    </section>
    <section numbered="false" anchor="appendix-example-flow">
      <name>Appendix: Example flow</name>
      <t>{ <strong>Ed note</strong>: Nick Buraglio has suggested that we include an example flow
here. I think that this can be removed before publication, but it might be
helpful to include fur discussion / during LC, etc}</t>
      <t>To illustrate the updated normative behavior, consider an IPv6-only network
utilizing 464XLAT <xref target="RFC6877"/> where an administrator wishes to provide access to
an internal, IPv4-only corporate service hosted at 10.1.2.3.</t>
      <section numbered="false" anchor="scenario-a-unmanaged-clat-to-managed-plat-flow">
        <name>Scenario A: Unmanaged CLAT to Managed PLAT Flow</name>
        <t>An IPv4-only application on an unmanaged client device generates an IPv4 packet
destined for 10.1.2.3.</t>
        <t>The local CLAT intercepts the IPv4 packet and synthesizes an IPv6 destination
address by prepending the Well-Known Prefix: 64:ff9b::10.1.2.3.</t>
        <t>CLAT Behavior: Under the updated guidance in Section 3, the CLAT <bcp14>MUST</bcp14> translate
this packet by default, ignoring the non-global nature of the embedded IPv4
address, and forward the resulting IPv6 packet to the network.</t>
        <t>The IPv6 network routes the packet to the managed PLAT (NAT64 gateway).</t>
        <t>PLAT Behavior: Upon receiving the packet destined for 64:ff9b::10.1.2.3, the
PLAT evaluates its local configuration:</t>
        <t>Permit: If the administrator has explicitly enabled translation for non-global
addresses (or left the default translation behavior enabled), the PLAT
translates the packet back to IPv4 and forwards it to 10.1.2.3.</t>
        <t>Drop: If the administrator relies on a default-drop posture for non-global
addresses or has explicitly configured an access control list (ACL) blocking
this range, the PLAT drops the packet.</t>
      </section>
      <section numbered="false" anchor="scenario-b-native-ipv6-host-to-managed-plat">
        <name>Scenario B: Native IPv6 Host to Managed PLAT</name>
        <t>An IPv6-capable host (without a local CLAT) needs to communicate with the same
internal service. It acquires the destination address 64:ff9b::10.1.2.3 (e.g.,
via DNS64, local synthesis, or explicit application configuration).</t>
        <t>The host transmits the IPv6 packet, which is routed to the PLAT.</t>
        <t>PLAT Behavior: The PLAT applies the same configuration logic as in Scenario A.
It <bcp14>MUST</bcp14> translate the packet to IPv4 and forward it to 10.1.2.3 unless local
administrative policy configures it to drop the packet.</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
