ters
2.1. 48-Bit MAC Identifiers, OUIs, and Other Prefixes
2.1.1. Special First Octet Bits
... 2.2.3. EUI-64 Documentation Values
2.3. Other 48-Bit MAC Identifiers Used by the IETF
2.... I
3.2. Documentation Protocol Number
4. Other OUI/CID-Based Parameters
4.1. LLDP IETF Org... OUI/CID-Based Protocol Number Template
A.3. Other IANA OUI/CID-Based Parameter Template
Appendix
rmat
(PDF), HTML, XML.
Obsoletes xxxx refers to other RFCs that this one replaces;
Obsoleted by xxxx re... at have replaced this one.
Updates xxxx refers to other RFCs that this one merely updates (but
does not r... 17487/RFC0065)
0066 NIC - third level ideas and other noise. S.D. Crocker. August 1970.
(Format: T... RFC1100)
1101 DNS encoding of network names and other types. P. Mockapetris. April
1989. (Format:
C0123 | Crocker, S., "NIC - third level ideas and other noise", RFC 66, DOI 10.17487/RFC0066, August 1970... ckapetris, P., "DNS encoding of network names and other types", RFC 1101, DOI 10.17487/RFC1101, April 198... arpenter, B., "IPng White Paper on Transition and Other Considerations", RFC 1671, DOI 10.17487/RFC1671, ... angled Web: Issues of I18N, Domain Names, and the Other Internet protocols", RFC 2825, DOI 10.17487/RFC28
e RFC is
bbbbbb bytes.
Obsoletes xxxx refers to other RFCs that this one replaces;
Obsoleted by xxxx re... at have replaced this one.
Updates xxxx refers to other RFCs that this one merely updates (but
does not r... rlier or later RFC in a related series.
BCPs and other RFCs may be obtained using HTTP, FTP, or email. ... o RFC6648)
0179 Deprecate DES, RC4-HMAC-EXP, and Other Weak Cryptographic
Algorithms in Kerberos. L
e RFC is
bbbbbb bytes.
Obsoletes xxxx refers to other RFCs that this one replaces;
Obsoleted by xxxx re... at have replaced this one.
Updates xxxx refers to other RFCs that this one merely updates (but
does not r... rlier or later RFC in a related series.
BCPs and other RFCs may be obtained using HTTP, FTP, or email. ... o RFC6648)
0179 Deprecate DES, RC4-HMAC-EXP, and Other Weak Cryptographic
Algorithms in Kerberos. L