Internet-Draft Global NAT64 Anycast April 2026
Matolin Expires 18 October 2026 [Page]
Workgroup:
Internet Area Working Group
Internet-Draft:
draft-matolin-global-nat64-anycast-00
Published:
Intended Status:
Standards Track
Expires:
Author:
M. Matolin
Valtrix Labs

Global Anycast NAT64 Well-Known Prefix

Abstract

This document defines a globally routable, anycast NAT64 service using the IPv6 prefix 2600:6464::/96 as a standardized translation substrate for IPv6-to-IPv4 connectivity.

The goal of this specification is to eliminate per-network NAT64 configuration complexity by introducing a single globally consistent NAT64 translation prefix operated as a distributed anycast service by participating Internet Service Providers, cloud providers, and content delivery networks.

The model assumes an IPv6-only client environment with mandatory IPv4 reachability via NAT64 translation. IPv4-only services remain reachable without modification.

IPv4 is not modified. IPv6 is not modified. Only translation placement and routing semantics are standardized.

This document defines:

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 18 October 2026.

Table of Contents

1. Introduction

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

NAT64 [RFC6146] enables IPv6-only clients to communicate with IPv4 servers via protocol translation. Current deployments require per-operator configuration of NAT64 prefixes, DNS64 behavior, and stateful translation pools.

This document proposes a globally standardized NAT64 prefix:

2600:6464::/96

and defines its use as a globally anycasted translation endpoint.

Instead of each operator deploying isolated NAT64 infrastructure, participating networks announce the prefix via BGP anycast, allowing the nearest translation edge to handle synthesis.

2. Motivation

Current NAT64 deployments suffer from:

This leads to:

A single global NAT64 anycast prefix provides:

3. Prefix Allocation

The IPv6 prefix 2600:6464::/96 is reserved as:

Global NAT64 Anycast Translation Prefix

Characteristics:

The last 32 bits represent the IPv4 address being synthesized.

Example:

2600:6464::0808:0808 -> 8.8.8.8

4. Anycast NAT64 Architecture

Participating operators advertise 2600:6464::/96 globally.

Routing behavior:

Client -> nearest NAT64 edge (anycast)
-> stateful or stateless translation
-> IPv4 Internet

The architecture is intentionally stateless at routing level and stateful at translation edge only.

All NAT state is local to the terminating edge.

5. IPv6-to-IPv4 Mapping

Mapping rule:

IPv6 address = 2600:6464:0:0:W.X.Y.Z

Where:

No DNS dependency is required if literal IPv4 embedding is used.

6. DNS64 Interaction

DNS64 MAY synthesize AAAA records using prefix 2600:6464::/96.

Example:

A record: example.com -> 93.184.216.34

Synthesized AAAA:
2600:6464::5db8:d822

DNSSEC considerations:

7. Reverse Traffic Policy

IPv4 -> IPv6 direct access via NAT64 prefix is explicitly disallowed.

Reason:

Only IPv6-originated sessions MAY traverse NAT64 edges.

8. Operational Requirements

Any network participating in global NAT64 anycast MUST:

SHOULD:

9. Security Considerations

Threat model includes:

Mitigations:

Anycast NAT64 edges MUST NOT forward packets without valid IPv4 extraction context.

10. IANA Considerations

IANA is requested to:

11. Acknowledgements

Inspired by decades of NAT64 deployments, CGNAT scaling pain, and the universal human desire to stop dealing with IPv4.

12. References

12.1. Normative References

[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, , <https://www.rfc-editor.org/info/rfc2119>.
[RFC8174]
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, , <https://www.rfc-editor.org/info/rfc8174>.
[RFC6146]
Bagnulo, M., Matthews, P., and I. van Beijnum, "Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers", RFC 6146, , <https://www.rfc-editor.org/info/rfc6146>.

12.2. Informative References

Author's Address

M. Matolin
Valtrix Labs