One document matched: draft-oneill-mip-nested-00.txt
Personal A. O'Neill
Internet Draft Flarion Technologies
Document: draft-oneill-mip-nested-00.txt 8 May 2002
Expires: Oct 2002
Nested MIP for IP Mobility Management
<draft-oneill-mip-nested-00.txt>
Status of this Memo
This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet- Drafts as reference
material or to cite them other than as work in progress.
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Copyright Notice
Copyright (C) The Internet Society (2002). All Rights Reserved.
Abstract
Regional Registration provides a mechanism for MIPv4 to localise
registrations. The Mobile Node (MN) initially registers to the HA via the
Gateway Foreign Agent (GFA) so that the HA can learn the GFA Care of Address
(CoA). The MN can then subsequently use a Regional Registration to maintain
the binding in the GFA as the MN moves and changes its Foreign Agent (FA) CoA
or Collocated CoA (CCoA). It can continue to do so whilst a MN remains under
the GFA through which the MN sent the Home Registration. The GFA performs CoA
switching between the GFA CoA and that used by the MN (CCoA or FA CoA).
Whilst the regional registration provides localisation, it does not at the
same time provide registration aggregation for MNs employing multiple HoAs.
The ability to concurrently support multiple MN addresses from arbitrary
addressing domains is a 3GPP commercial and technical requirement and
therefore of interest to operators seeking to move to an all-IP solution
based on MIP. In addition, the GFA is a very stateful element in the core of
the Internet that cannot be bypassed on failure through routing updates.
This draft describes a complementary, less stateful model for localisation
that in addition supports aggregation both for regional-like registration and
hand-offs. The model re-uses as much as possible from the home registration
signalling model of [RegTun] but requires a new form of aggregated regional
registration.
A.W. O'Neill Expires Oct 2002 [Page 1]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
INDEX
Abstract
1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Conventions used in this document . . . . . . . . . . . . . . . . . 2
3. Terminology used in this document . . . . . . . . . . . . . . . . . 2
4. Motivation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
5. Basic IPv4 Nested MIP Design . . . . . . . . . . . . . . . . . . . 6
5.1. Regional Tunnelling Implications. . . . . . . . . . . . . . . . . 8
5.2. Reverse Tunnelling Implications . . . . . . . . . . . . . . . . . 9
5.3. Private addressing. . . . . . . . . . . . . . . . . . . . . . . . 10
5.4. Security Associations . . . . . . . . . . . . . . . . . . . . . . 11
6. Basic Nested MIPv4 Signalling Description . . . . . . . . . . . . . 11
6.1. Local Access Only Signalling. . . . . . . . . . . . . . . . . . . 12
6.2. Remote Access Only Signalling . . . . . . . . . . . . . . . . . . 12
6.3. Local and Remote Access Signalling. . . . . . . . . . . . . . . . 13
7. Enhanced RA Registration. . . . . . . . . . . . . . . . . . . . . . 13
7.1 RA MIP Registration via the FA. . . . . . . . . . . . . . . . . 13
7.2 RA MIP Registration via the FA and RMA. . . . . . . . . . . . . 14
7.3 Efficient Remote Only Signalling. . . . . . . . . . . . . . . . 15
8. AAA Support for Nested MIP. . . . . . . . . . . . . . . . . . . . . 15
8.1. FA AAA Requests. . . . . . . . . . . . . . . . . . . . . . . . 15
8.2. RA AAA Requests. . . . . . . . . . . . . . . . . . . . . . . . 17
9. IPv6 Considerations . . . . . . . . . . . . . . . . . . . . . . . . 18
10. Security Considerations. . . . . . . . . . . . . . . . . . . . . . 18
11. Notice Regarding Intellectual Property Rights. . . . . . . . . . . 18
12. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . 18
13. References . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1. Introduction
Regional Registration provides a mechanism for MIPv4 to localise
registrations. The MN initially registers to the HA via the GFA so that the
HA can learn the GFA CoA. The MN can then subsequently use a Regional
Registration to maintain the binding in the GFA as the MN moves and changes
its FA CoA or CCoA. It can continue to do so whilst a MN remains under the
GFA through which the MN sent the Home Registration. The GFA performs CoA
switching between that of the GFA CoA and that used by the MN. Whilst the
regional registration provides localisation, it does not at the same
time provide registration aggregation for MNs employing multiple HoAs.
The ability to concurrently support multiple MN addresses from arbitrary
addressing domains is a 3GPP commercial and technical requirement and
therefore of interest to operators seeking to move to an all-IP solution
based on MIP.
A.W. O'Neill Expires Oct 2002 [Page 2]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
This draft describes a complementary model less stateful model for
localization that in addition supports aggregation both for regional-like
registration and hand-offs. The model re-uses as much as possible from the
home registration signalling model of [RegTun] but requires a new form of
regional registration. The required modifications to [RegTun] are described
in [RegTunMods] and focus on generalising the GFAIPext and the HFAext in the
home registration so that it can used across multiple addressing domains and
for non-GFA intermediate MIP nodes. The modifications also ensure that the MN
can be dynamically allocated an intermediate CoA by the intermediate MIP node
as well as being allocated a dynamic HA by the AAA system.
These modifications are then exploited in this draft to enable the MN to be
assigned a local HA that also then acts as a regional MIP node. The local HA
works in unison with any global HAs to provide local and or remote internet
access services for the MN. The remote access MIP layer is nested within the
local access MIP layer by using the local RoA as a CCoA for the global HoAs,
as well as a source / destination address for local access traffic. The
nesting results in a second layer of encapsulation between the local HA and
the FA, in addition to the remote access encapsulation between the global HA
and the MN. The benefit though is that as the local HoA visitor list for the
RoA is updated with each new FA CoA, an arbitrary number of remote access HoA
specific flows, encapsulated within the RoA, are automatically redirected to
the new FA without requiring additional MIP signalling or visitor list
changes. Other benefits include the localisation of regional signalling, and
clean separation between local and global concerns wrt security, addressing
plans, MIP forwarding models, privacy and AAA. Similarly, during hand-off, a
BU to the old FA for the RoA can enable aggregated inter-FA forwarding for a
multitude of HoA flows using that RoA.
Whilst the allocation of both a local and remote MIP home address places
additional burden on the IPv4 address space, this can be mitigated through
the use of private addresses in either or both the local and remote access
layers due to the clean separation of the layers that the model provides. The
model also supports the use of MIPv4 and MIPv6 in the two layers and so
provides a useful migration tool as well as operator independence in terms of
transition.
2. Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to
be interpreted as described in RFC-2119 [RFC2119].
3. Terminology used in this document
Much of the terminology used in this document borrows from Mobile IPv4
[MIPv4], MIP Regional Tunnelling [RegTun], MIP Reverse Tunnelling [RevTun]
and MIP Route Optimisation [RoutOpt]. This draft introduces and uses the
following additional terminology.
A.W. O'Neill Expires Oct 2002 [Page 3]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
Local Access service - Internet access using a topologically local address
Remote Access service - Internet access using a topologically remote address
Regional Mobility Agent (RMA) - regional node supporting at least local HA
Regional Address (RoA) - A HoA-like address from the RMA based local HA function
RMA Region - the set of FAs able to allocate that RMA to a MN
LA/RA MIP - Local/Remote Access MIP functionality between the MN and the RMA/HA
LA visitor list - the MIP visitor list for the RoA / RMA
RA visitor list - the MIP visitor list for the CCoA / HA
LA/RA-NAI - the MN-NAI included in the LA/RA MIP Registration for AAA
LA/RA Hand-off - a hand-off effected using the LA/RA MIP signalling layer
LA/RA MIP Reg - An MIP Reg in the LA/RA layer to the RMA/HA.
Inter-FA Hand-off - a HO between two FAs that updates the FA CoA in the RMA.
Inter-RMA Hand-off - a HO between two RMAs that results in a RoA change
HFAIPext - the HFA IP address extension (generalization of GFAIPext)
4. Motivation
Traditional Internet Local Access (LA) assigns to a host a topologically
correct local address for the duration of a Local Access session. The
movement of the host across different access technologies or optionally for
different sessions on the same access technology, results in the Mobile Host
acquiring different addresses for each Local Access session. MIP has
historically provided a Remote Access (RA) service whereby a MN can roam with
a remote address from a home subnet onto a foreign subnet, by hiding that
address within an encapsulation using a local Care of Address from the Local
Access provider. If a Co-located Care of Address (CCoA) is assigned by the
local access provider, then the MN can use that address for MIP Remote
Access, or alternatively use that address for PPTP and/or IPSec remote access
(IPSRA) tunnelling.
MIP has more recently been targeted at wireless deployment scenarios where
MIP is used to provide remote access from a wireless provider to a service
domain such as a corporate, content or application provider or ISP. For this
model, MIP has been extended to support hand-off between FAs as the MN moves
during an access session. Herein lies a conflict though because the hand-off
is primarily local mobility management but is coupled to a remote access MIP
Registration/Reply exchange. If the remote access provider is the same as the
wireless provider then the remote access HA, and the intermediate networking
via the FA, can be designed and dimensioned to provide the required levels of
availability and reliability for the hand-off. If this is not done then local
mobility management can be compromised, through the slow response or
unavailability of the HA, generating the potential for chaining of inter-FA
forwarding tunnels. If the remote access and wireless providers are
different, then the performance of the wireless operators local mobility
management is dependent on a third party, which represents unacceptable
commercial coupling. This provides the motivation for regional registration
and tunnelling in [RegTun] and is also one motivation for our own
complimentary solution to localization.
If we then look further into commercial requirements, the design of 3GPP
systems mandates the concurrent support in the handset and network for
multiple addresses from third party domains, from which services are
consumed.
A.W. O'Neill Expires Oct 2002 [Page 4]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
Examples of such domains are corporate networks, content and
application stub networks, as well as full ISPs that may be aligned with, or
commercially distinct from, the wireless operator. The concurrent address
support allows a user for example to have connectivity with its local ISP for
Internet Local Access, with a remote corporate network for business e-mail
(Remote Access 1) whilst in addition receiving a news feed from a
subscription based financial information provider network (Remote Access 2).
These are also requirements common to other broadband Internet systems. A MIP
based system should therefore be able to efficiently deal with multiple
concurrent HoAs.
In 3G networks, the hand-off of the radio bearers for each MN uses a single
aggregated signalling phase for all the packet data protocol sessions
(PDPcontexts) up to the RAN Controller. However, hand-off between GPRS
Support Nodes (eg SGSNs where the MN potentially has Generic Tunnelling
Protocol (GTP) tunnels with multiple GGSNs), leads to multiple parallel
signalling phases, although each GTP tunnel can still itself move multiple
PDPcontexts within that tunnel. Returning to the situation with an all-IP
based solution based on MIP, each concurrent address (each HoA) implies a
distinct Remote Access MIP session (cf GTP), back to each independent
addressing domain. The movement of the MN then requires the update of each
distinct HA/HoA with the new CoA of the MN. This translates into multiple MIP
Registrations from the MN to/from each HA, along with multiple inter-FA hand-
off exchanges. Even when Regional Tunnelling [RegTun] is deployed, each
regional registration is HoA specific and therefore multiple parallel MIP
signalling phases are still required both to the GFA and to the previous FA.
Just as in the case of 3G, there is a need in an MIP local mobility
management system for aggregated hand-off as well as localized hand-off to a
regional MIP element. In addition, there is also a need, following sufficient
MN movement, for the regional hand-off of each remote access session between
regional MIP elements that can be considered to be equivalent in some ways to
the SGSN. Whilst [RegTun] does support GFA hand-off it does not do so (new
home registration) in a way which preserves in-flight traffic between the HA
and the old GFA, by failing to reroute traffic already present at the old GFA
to the new GFA. [ParallelMIP] describes a backwards compatible approach to
extend inter-FA and GFA signalling to support aggregation whilst [RMAsig]
describes an architecture for supporting hand-off between regional elements
whilst preserving in-flight traffic.
Finally, another key commercial requirement is to be able to support Local
Access in conjunction with Remote Access, each with distinct policy controls.
This is because Local Access is a commodity service and many service
providers would not wish to incur the expense of routing all customer traffic
(ie local and remote access) via their remote third party value-adding
service networks. They are only interested primarily in value-added traffic
flows. This is also true in corporate networks where only Intranet traffic
may wish to be routed to the corporate stub network whilst external Internet
access may be provided in the local vicinity of the access connection. In
addition, wireless operators would not wish to lose the ability to offer ISPs
services whilst at the same time wishing to support third party value-added
content and applications on their networks. This is not a universal situation
and so the local operator MIP solution needs to be able to flexibly handle
various combinations of local and remote access service and associated MN
specific traffic privileges.
A.W. O'Neill Expires Oct 2002 [Page 5]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
Local Access is possible within the existing Remote Access MIP model in three
main ways. Firstly the MN can acquire a CCoA at the FA and use this as a
source address for local traffic whilst using the CCoA as the binding for the
remote access layer. The problem here though is that if the MN then moves
from the FA then the local access address and the HA binding immediately
becomes invalid, and associated address allocation delays is the reason that
the use of the CCoA as a source address is constrained in MIPv4. The second
alternative is to use the HoA as a source address (not reverse tunnelling)
but this requires the foreign FA and domain to not undertake ingress
filtering, and still results in dog-leg routing for the return traffic via
the remote access HA. The third option is to use a second parallel MIP
'remote' access session with a local HA to generate local access in parallel
with a truly remote access session to a global HA. However, this once again
leads to additional MIP signalling and processing load further demonstrating
the need for aggregated hand-off. Clearly, none of these are in any way
optimal and a better solution needs to be found for supporting local access
in MIPv4 that can survive hand-off and ingress filtering checks.
These limitations in existing technology have motivated the design of two
additional regional mechanisms, each of which can co-exist if necessary with
[RegTun] in the Internet, each of which is optimal for a subset of the all-IP
mobility requirements. This draft deals with Nested MIP whilst a subsequent
draft [ConcatMIP] deals with Concatenated MIP.
5. Basic Nested MIPv4 Design
The above limitations can be avoided through the use of two distinct MIP
access layers, where potentially multiple Remote Access sessions are
supported in the Remote Access layer, all running over the single Local
Access MIP session in the Local Access layer. The forwarding is shown in
figure 1.
The LA layer runs between the MN and a Regional Mobility Agent (RMA) that
provides the MN with a Regional Address (RoA- a la HoA). The RMA in this case
acts like a regional HA and the RoA like a regional HoA. The FA allocates a
topologically close RMA to the MN by selecting one RMA from a configured or
discovered set of available RMAs. Availability can simplistically for example
be determined from previous successful and failed MIP Reg/Reps from MNs to
RMAs. A choice of RMAs is useful to enable load-sharing and to improve
availability. The FA can then use dynamic MIP address allocation to acquire
the RoA from the assigned RMA. The RoA can satisfy ingress filtering at least
within the region of that RMA, and certainly within the domain, and the RoA
will obviously survive hand-off between FAs beneath the same RMA because the
LA MIP Registrations will update the evolving FA CoA. The topological
closeness of the RMA means that the dog-leg routing for that RoA address is
of little concern from a latency, QoS or reachability perspective. As the MN
moves, then the binding between the RoA and the MNs current LA CoA is updated
using standard MIP Registrations with hand-off extensions as detailed in
[RoutOpt] and/or [LowLat]. LA MIP enables a MN to use either a CCoA or FA CoA
for this Registration, but in the basic MIPv4 design this is a FA CoA. The MN
can, in addition, continue to use an RMA after it moves into legacy regions
that lack their own RMA. It does this by continuing to send LA MIP
Registrations, from the external FA to the RMA, although there are known
additional constraints with what is likely to be an inter-domain hand-off.
A.W. O'Neill Expires Oct 2002 [Page 6]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
Regional inter-RMA hand-off is however preferred, as is described in
[RMAsig], because continuing to use a non-local RMA comes at the cost of
increasing dog-leg routing which compromises much of the motivation for the
deployment of an RMA.
This localised MIP capability is known as the Local Access MIP layer (LA
MIP), which effectively provides localised mobility management as well as
optionally providing Local Access services. For Local Access service, the MN
simply uses the RoA from the RMA as an interface address and hence as a
source and destination address for packets. Downlink (forward) packets are
routed to the RMA where they are encapsulated into the present FA CoA for the
MN. The RoA is therefore valid within the region of the RMA as it can survive
a number of inter-FA hand-offs through the LA MIP hand-off signalling.
If the MN wishes to also/alternatively invoke Remote Access, then the RoA can
be used as a global CCoA by the Remote Access MIP layer (RA MIP). The RoA is
included in the RA MIP Registrations to each global HA, as the CCoA for each
of the HoAs. The Remote Access sessions are effectively nested within the LA
MIP layer. Forwarding between each CN and the MN is first to the global HA
which encapsulates into the CCoA=RoA. This is then forwarded to the RMA from
whose subnet the RoA was obtained. The RMA then encapsulates these packets
into the present FA CoA for the RoA that is being maintained by the local
access MIP Registrations. The FA then decapsulates from the FA CoA and
forwards the CCoA addressed packets to the MN. This generates one tunnel from
HA to MN/RoA and one from RMA to FA/CoA). The impact of the tunnel over the
air-interface can be minimised using header compression or alternatively
through the use of Proxy Co-located Care of Addresses [PCCoA]. This overhead
is however never more than that already accepted for MIPv6.
CN HA RMA FA MN
Forward LA CN------------------------------------------------>RoA
RMA=====>FACoA
Reverse LA CN<------------------------------------------------RoA
RevTun LA CN<------------------------------------------------RoA
RMA<=====FACoA
Forward RA CN------------------------------------------------>HoA
HA==================================>RoA
RMA=====>FACoA
Reverse RA CN<------------------------------------------------HoA
RevTun RA CN<------------------------------------------------HoA
(RMA bypass) HA<==================================RoA
RevTun LA/RA CN<------------------------------------------------HoA
HA<==================================RoA
RMA<=====FACoA
Figure 1. Forward and reverse traffic in Nested MIP
A.W. O'Neill Expires Oct 2002 [Page 7]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
The Local Access session uses the RoA for forwarding. The Remote Access
sessions also use the RoA, but as a global CCoA. This ensures that the LA MIP
registration updates for the RoA, as the MN moves in the local routed
topology, can affect and correctly redirect all ongoing access (local and
Remote) sessions, using a single hand-off message sequence. The LA MIP layer
therefore provides both localization of hand-off signalling to the RMA, and
aggregation of hand-off for an arbitrary number of Remote Access sessions
using HoAs from arbitrarily located global HAs. Specifically, in the case of
a smooth hand-off [RoutOpt], a single LA MIP Registration to the RMA, and a
single triggered BU from the new FA to the old FA is all that is required to
provide mobility management for an arbitrary number of MIP access sessions on
the RoA. LA MIP hand-off will in addition automatically support PPTP and
IPSEC based (IPSRA) remote access tunnels that use the RoA as a tunnel end-
point.
The basic model is clearly deployable with little impact on MIP standards.
The Remote Access service, whether based on MIP, PPTP, IPSRA or any
other VPN technique, is effectively invisible to the local mobility
management system (LA MIP) and the host simply needs to observe the
allocation of the RoA as an interface address, and then use that address as
it sees fit. This is because neither IPSRA nor PPTP interact with the MIP
elements, and the RA MIP registration in the basic design is direct between
the MN and the Remote Access global HA. However, the host must also be able
react to interface address (RoA) reconfigurations that it would observe
during an RMA change. Clearly, the larger the RMA region, then the lower the
likelihood that an RMA change would interfere with ongoing PPTP and/or IPSRA
sessions whilst irrespective of region size the RA MIP layer would simply
issue an updated Home Registration back to the HA.
5.1. Regional Tunnelling Implications
The GFA in [RegTun] is a gateway element at the top of a visited domain,
beneath which can reside an arbitrary number of Regional Foreign Agents. CoA
switching is then used between the elements to support both forward and
reverse tunnelling, with the reverse tunnel source CoA having to match the
forward tunnel destination CoA.
The basic RMA is also a regional element but its functionality is equivalent
neither to that of a GFA or an RFA. For example, the RMA forwards like a HA
by encapsulating incoming packets to the RoA with the FA CoA registered by
the local access layer. The RMA is traversed in the forward path as a result
of routing towards the RoA rather than as a direct result of CoA switching.
In the reverse direction, the RMA does not need to be traversed whilst the
RFAs and GFA must be. Given that the Nested forwarding is based on routing
rather than on tunnel switching, the Nested RMA is less stateful and more
ameniable to fall-over recovery. Routing prefix from RMAs for the same RMA
prefixes can be weighted so that the RoA traffic can be served by alternate
RMAs, on an RMA failure, without requiring a change in the HA binding. The
local RMAs can then duplicate registration information so that fast recovery
is possible. Ingress filtering is performed by the FA and the FA may know the
regional prefixes supported by the RMA which includes the assigned RoA.
Specifically though, the FA discovers the RoA at the LA layer and uses this
to update the ingress filtering to prevent unassigned RoAs being employed by
an attacker.
A.W. O'Neill Expires Oct 2002 [Page 8]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
This is reasonable because the FA and RMA are owned by the same operator and
are mutually trusted.
It is perfectly possible, whilst not necessarily advisable, that a GFA and a
RMA could be used together in a domain, with the GFA sitting in the RA layer
between the global HA and the RMA. The GFA would use the RoA as a CCoA in its
visitor list for the HoA, whilst the HA would use the GFA CoA. Alternatively,
a closer integration is preferred with the RMA supporting alternative
forwarding functionality for different groups of MNs consuming a range of
services, and specifically providing GFA support for backwards compatibility
with any deployed MNs requiring that service. As an example, for MNs that are
only able to use a single RA MIP session and do not require local access, CoA
switching might be a better solution than Nested as there is clearly no need
for aggregated hand-off or the RoA. This is dealt with in more detail in
[ConcatMIP] and some of the required generalisations in the Regional
Tunnelling signalling are described in [RegTunMods].
5.2. Reverse Tunnelling Implications
Reverse tunnelling (upstream) requires the source address in the
encapsulating header to match the registered CoA in the receiving nodes
visitor list that is used to tunnel forward packets (downstream) for the HoA
as a source address. This means that the downstream MIP element must
encapsulate using the CoA that it sent to the upstream node in the MIP
Registration, at any point in the reverse tunnelling hierarchy. The
implications of this restriction on local hand-off, is described in
[RevTunMods], which suggests modifications to HAs, GFAs, RFAs and FAs in
[MIPv4] and [RegTun] to better support reverse tunnels during inter-FA hand-
off.
Nested MIP greatly reduces the problem for RA reverse tunnelling because the
MN encapsulates from the RoA to the HA which is valid across multiple inter-
FA hand-offs under the same RMA. Therefore, the [RevTunMods] are only
required when the RoA changes which is a much less frequent event. In
addition, the localization provided by [RegTun] requires [RevTunMods] to be
supported in the GFA but are not required in the basic RMA because the MN
tunnels directly to the HA and not via the RMA. Nested MIP therefore greatly
simplifies and improves reverse tunnel support for Remote Access services.
Nested MIP in the reverse direction only requires a tunnel between the MN and
the HA so the improved reverse tunnel support does not come at the expense of
reduced bandwidth efficiency in this case.
Reverse tunnelling is also optionally supported in the LA layer between the
FA and the RMA. This can be used to route Local Access and Remote Access
packets, from the RoA back to the RMA, using a second local encapsulation.
This can be used to ensure traversal through an RMA based NAT or firewall. It
can also be used to expose the outbound packets to an RMA based policing,
accounting or QoS capability, or any other RoA specific processing. This
capability can also be undertaken selectively for Local Access or Remote
Access traffic by modifying the FA visitor list such that reverse tunnelling
happens in the LA layer only, RA layer only, or both LA and RA layer. This
can then reverse tunnel unencapsulated packets (Local Access only),
encapsulated packets (all Remote Access), or encapsulated packets from a
specific Remote Access session (HA/HoA specific).
A.W. O'Neill Expires Oct 2002 [Page 9]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
5.3. Private addressing Implications
5.3.1 LA Private Addresses
The RMA and FA are by definition within the same domain and are closely
linked by configuration and topology. The RMA and FA can therefore
communicate using private addresses. The RMA and the associated RoA are both
dynamically allocated and therefore the RoA could be either a public or
private address. The MIP Registration must therefore carry sufficient
information to enable the RMA to dynamically allocate private and public
addresses in a controlled manner which would typically be either an MIP flag
or an extension type.
If Local Access only is requested by, or provided to, the MN then it is fully
acceptable for the RoA to be a private address and for a NAT to be deployed
in the domain to translate this address into public address space. This
capability is equivalent to NAT usage by existing fixed access ISPs and
because the NAT is not between the RMA and the FA, then MIP NAT traversal is
not required [MIPNAT]. If the MN tries to use a private RoA address as a CCoA
in any RA MIP Registrations then these registrations will pass through a NAT
in the foreign domain but will clearly fail. This provides a simple method
for an operator to prevent a MN from undertaking Remote Access services to
external networks, whether based on MIP, PPTP or IPSRA.
If Remote Access only, or Local and Remote Access is provided to the MN then
the RoA provided to the MN can still be a private address if MIP NAT
traversal [MIPNAT] is supported for this MN. This requires the global HA, the
NAT and the MN to support an additional UDP and MIP header in the CCoA based
tunnel. Note that the packets do not need to traverse the RMA in the uplink
direction.
If the MN is dynamically allocated a public RoA address, then Internet Local
Access can pass-through or bypass the NATs in the domain. In addition, the
public RoA can now be included in RA MIP Registrations and they will succeed
without requiring [MIPNAT] capabilities.
In all cases, the private or public RoA forwarding in the RMA and FA is
unambiguous because by definition these addresses are always unique in the
RMA and FA provided that the RMA does not accept LA MIP Registrations from
FAs using private addresses from outside its private addressing domain
(typically inter-domain LA MIP Registrations).
5.3.2 RA Private Addresses
The standard MIP RA layer acts to hide the HoA destination address at the
home network, from the Internet routing fabric, using a tunnel from the HA to
the FA CoA. The HoA can therefore be either a public or a private address in
principle. There are significant complications however with overlapping
address spaces in the FA if the visitor list is indexed on a private HoA.
This is because the HoA is not guaranteed to be unique because MNs from two
different but overlapping private addressing domains can visit the same FA
with the same HoA.
A.W. O'Neill Expires Oct 2002 [Page 10]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
The nested model resolves this ambiguity because the basic forwarding in the
RMA and FA is based on the RoA which is guaranteed to be unique, and not the
potentially ambiguous HoA. HoA specific processing in the RMA and FA elements
can still be supported however because the visitor list entry can still be
assured to be unique through concatenation of the RoA and HoA. Therefore
private HoAs can now be fully supported in the RA layer of the Nested MIP
model. This is true whether the RoA is itself public or private.
The use of a private address for the HA is limited by the addressing plan
between the RMA and the HA. RA MIP Registrations/Replies must be routable to
and from the HA, forward tunnels must be routable from the HA address to the
RoA, and reverse tunnels must be routable from the RoA to the RMA (LA reverse
tunnel) or from the RoA to the HA (RA reverse tunnel. The existence of a NAT
between a private RoA and a public HA address can still support Remote Access
through deployment of [MIPNAT]. The HA itself can also use a private address
in conjunction with a private RoA as long as they are both from coordinated
and routable private address spaces.
5.4 Security Associations
The two MIP layers would continue to use the family of authentication
extensions (and associated SAs) that are required in MIP standards docs
[MIPv4, RegTun, RevTun, RoutOpt etc]. These include the MN-FA, FA-HA and MN-
HA auth extensions, with the RMA being treated as a HA in the LA MIP Layer.
The only significant differences though are that each FA can now practically
employ a pre-configured security association (SA) with each RMA, and the RMA
and FA can potentially dynamically allocate to the MN an SA with the RMA. The
system can of course also rely on [MIPAAA] by the FA informing AAA of the
allocated RMA address and the foreign AAA returning the key material for the
FA/MN to use with that RMA. In either case, the MN-FA and the FA-RMA can be
shared across both LA and RA MIP traffic. Finally, LA hand-off continues to
make use of the authentication mechanisms associated with the particular MIP
hand-off solution (inter-FA SAs, PFANE etc). Minor extensions to the existing
security mechanisms are required for supporting inter-RMA hand-off and these
are described in [RMAsig].
6. Basic Nested MIPv4 Signalling Description
The two MIP layers in the Nested model are clearly separable in the basic
model because one layer is between the MN and the HA whilst the other is
between the MN, the FA and the RMA. There are therefore essential no
changes required to existing MIP standards to support Nested MIP, provided
that the LA MIP layer is hidden from the MN host stack and exposed to that MN
simply as an RoA interface address. The RA layer does not need to see
a FA nor use Agent Solicitations or Advertisements. The RA layer simply needs
to respond to interface address changes, on RMA hand-off (RoA change) by
refreshing its bindings with the new (RoA) interface address. The LA MIP
layer can then operate between a network driver and/or PCMCIA card on the
host and the FA/RMA nodes, with the FAA seen by the network driver to detect
and control FA CoA based access, with hand-off extensions to deal with FA
changes. The FAA must indicate to the network driver the current FA address,
RMA address and/or region NAI so that the network driver knows when to
undertake an inter-FA and inter-RMA hand-off using LA MIP signalling. This
model ensures that local mobility management is not dependent on the vagaries
of host implementations but are instead under tight operator control.
A.W. O'Neill Expires Oct 2002 [Page 11]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
The LA MIP signalling for inter-RMA hand-off requires similar extensions to
those required for [RegTun] home registration which are discussed in
[RMAsig]. Note also that it is possible for the LA layer to run between a hub
and the RMA, to support multiple RA sessions for MNs sharing the RoA and the
wireless link on the hub. This is again discussed in [RMAsig].
The clean separation between the layers is lost is lost if the LA layer is
exposed to the host resulting in the need for host RA layer MIP changes. It
is also lost if the RA MIP layer, due to alternative implementation decisions
requires FAA support, and/or the RA MIP signalling is processed by the FA or
the RMA. These changes are described in section 7 and [RMAsig].
6.1 Local Access Only Signalling
The FA advertises its capabilities to the MN using the FA advertisement (FAA)
that contains a FA CoA as per [MIPv4]. The MN sends a LA MIP Registration via
the FA with the CoA set to the advertised FA CoA, and including the MN-NAI as
per RFC 2794 to download MN privileges, and security state as in [MIPAAA]
from the home operator via the foreign operator. The LA MIP Reg HA/HoA fields
are left empty by the MN to enable dynamic allocation of an RMA in the FA,
and the subsequent dynamic allocation of a RoA by that RMA. Note that LA
layer and RA layer Registrations need to be distinguished in the FA by using
different type values, flags or extensions which is discussed further in
[RMAsig]. The FA forwards the LA MIP Reg to the allocated RMA, which then
acts like a local HA by dynamically allocating an RoA to the MN. The RMA then
sends an LA MIP Reply to the MN via the FA, with the HA and HoA fields now
populated, and containing any RMA derived security state, so that the FA and
MN can be correctly initialized. The MN then has Internet local access
enabled and uses the RoA as a topologically correct source / destination
address. The relative role of the AAA system, the FA and the RMA in securing
the LA layer can be achieved a number of ways including mechanisms defined in
[MIPAAA] and referenced by [RegTun].
Remote access can potentially be prevented, by the FA blocking MIP
Registrations not addressed to the allocated RMA or by appropriate blocking
of data packets in an FA or RMA located firewall. A private RoA can also be
used in conjunction with a NAT to prevent remote access MIP signalling to
destinations outside of the local operator private addressing domain.
6.2 Remote Access Only Signalling
The MN first undertakes LA MIP signalling to obtain an RMA and an RoA, and to
bring the MN privileges into the FA. These privileges will indicate that the
MN is not allowed to use the local access service but is permitted to
undertake remote access. This results in the FA blocking any unencapsulated
packets to/from the RoA, other than those necessary for LA/RA MIP signalling.
The MN then sends an RA MIP Reg directly to the statically allocated HA and
HoA stored in the MN, using the RoA as the CoA and setting the 'D' bit to
indicate that the CoA is a CCoA. The MN can include its MN-NAI that it used
in the local access registration if it wishes but this will only be observed
by the HA. If successful, remote access is then enabled and the remote access
service survives inter-FA hand-off through the local access mobility
management. The MN receives packets from the HA encapsulated in the RoA. The
MN can send RA packets using either the HoA as a source address and risk
ingress filtering, or more likely by reverse tunnelling to the HA if it set
the 'T' bit (reverse tunnelling) in the RA MIP registration.
A.W. O'Neill Expires Oct 2002 [Page 12]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
Reverse tunnelling just to the RMA is also possible, if the RA Reg is sent
via the RMA, so that HoA state can be stored and ingress checks can be
reasonably undertaken without compromising hand-off aggregation.
The MN privileges might also indicate that only a specific remote access
registration is allowed based on specific HA and/or HoA state. The FA and/or
RMA could then block encapsulated packets sent from/to addresses other than
the permitted HA/HoA parameters. However, this form of remote access control
is better supported if the RA MIP Registration is directed through and
policed by the FA and / or RMA, rather than blocking traffic flow, as
discussed in section 7.
6.3 Local and Remote Access Signalling
This is the same as section 6.2 except that the MN privileges enable local
access service as well as remote access service. The RMA and FA will
therefore allow both encapsulated and unencapsulated packets using the RoA.
Once again local access can be provided in addition to a specific remote
access service as indicated by the MN privileges.
7. Enhanced Remote Access Registration
The Remote access signalling as described in the basic model is between the
MN and the HA. This means that neither the FA nor the RMA are directly able
to determine or affect the HoA or HA being used for the remote access
session(s). The RA MIP signalling can alternatively be routed via the FA or
RMA, which results in modifications/extensions to the FA and RMA (HA) visitor
lists. This is because the clean separation between the LA and RA layers is
now lost. These issues are examined below.
7.1 RA MIP Registration via the FA
The RA MIP Registration can be routed via the FA by the FA setting the 'R'
bit in the FAA, and exposing the FAA directly to the RA MIP layer.
Alternatively, the RA MIP host stack can be made aware of the FA address by
the LA MIP layer acting as either a virtual FA or by relaying a modified FAA.
Most importantly, for correct movement and hand-off processing, it is
critical that the RA MIP layer is only exposed to RMA changes. MNs then
wishing to continue to bypass the FA will do so at the risk of having their
RA MIP Reg, or the resulting remote access traffic dropped by the FA. The FA
can police such RA MIP Regs using firewall rules, and a remote access HoA
aware visitor list can police the resulting traffic. If instead, the MN sends
its RA MIP Registrations to the FA, then the FA will extend the FA RoA
specific visitor list with the RA MIP state for the RA MIP layer. The RA MIP
Reg will then forward the Reg to the HA as normal. The message routing is
already covered by existing MIP standards and is not further discussed here,
but the convergence of the LA MIP and RA MIP visitor lists is an obvious
change. Also provided in existing standards, but an addition compared to
section 5, is that the MN can now potentially exploit the AAA system to
obtain a dynamically allocated HA. This is discussed in section 8.
A.W. O'Neill Expires Oct 2002 [Page 13]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
The additions to standard MIP are that these remote access requests should be
checked against the LA visitor list and the MN privileges delivered to the FA
by the AAA system. The FA must only accept RA MIP Regs for RoAs that are in
the LA visitor list, for HAs and RA MIP flags that are permitted by the MN
privileges. In addition, the FA can supplement the local access visitor list
with a HA/HoA specific RA visitor list to support HA/HoA specific processing
for both remote access registrations and the resulting traffic. HoA specific
processing however requires the HoA state to be context transferred in an
aggregated manner between FAs during FA hand-off, triggered by a single
inter-FA hand-off message such as the BU.
Each LA MIP visitor list can have multiple RA MIP visitor lists, and the
combination of the RoA and the HoA can be used to identify a specific RA
visitor list to correctly support private addresses. Other than this, both RA
and LA visitor lists are fully compliant standard MIP entities with there own
lifetimes, identification fields and MIP flags. A more fully integrated
implementation of the multiple visitor lists is possible.
7.2 RA MIP Registration via the FA and RMA.
The RA MIP Registration can also be onward directed to the RMA by re-using
the MIP Registration extensions from [RegTun] and from [RegTunMods]. This
enables HA/HoA specific processing to also be added to the RMA such as
policing, accounting and QoS support. This is useful because it enables out
of profile packets to be removed before traversing expensive backhaul
bandwidth to the basestation, it enables appropriate accounting state to be
more centrally located in high-availability platforms that are shielded from
the highest hand-off dynamics and finally enables the RMA to undertake HoA
specific QoS mechanisms. This is all possible because the FA is aware of the
RMA address from the local access layer. The FA directs remote access
requests onto the allocated RMA so that the RMA can discover any configured
or allocated HA/HoA addresses and the associated MIP flags. The RMA can then
build and maintain an RA visitor list for that HA/HoA, in addition to the LA
visitor list for the RoA. The RMA can then support HA/HoA specific processing
The RA MIP includes the RoA as the CCoA for the HoA, as it already knows the
RoA allocated to the MN by the RMA, from the LA MIP signalling. If the MN has
a pre-configured HA and /or HoA then these can also be included otherwise
they are set to zero and the HA obtained from the MN privileges. The FA adds
the FA CoA into the HFAext and sends this to the RMA, secured by the FA-
HA(RMA) authentication extension. The FA can also add the HFAIPext to
communicate any dynamically allocated HA to the RMA as described in
[RegTunMods]. The RMA then forwards the RA Registration to the HA address
contained in the HFAIPext received from the FA. This can be secured by an
RMA-HA auth extension to protect any RMA-HA extensions, with the security
state to support this being delivered to the FA by the AAAH-AAAF path and
relayed to the RMA, or delivered directly to the RMA by the AAAF either as a
result of an RMA request or pushed (Diameter) from the AAA system.
The RMA uses the HFAext from the FA, and the CCoA=RoA to index and refresh
the LA visitor list, and the HA/HoA information is used to install an RA
visitor list bound to the LA list, awaiting if necessary the return of any
dynamically allocated HoA information. The RMA then forwards the RA
Registration to the HA address contained in the HFAIPext received from the
FA. The HA then allocates the HoA and the MIP Reply contains both the HA and
the HoA to update all visitor lists on the Reply path.
A.W. O'Neill Expires Oct 2002 [Page 14]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
7.3 Efficient Remote Access Only Signalling
The signalling examples in section 6.2 and 6.3 can now be undertaken more
efficiently in cases that the RA MIP Registration visits both the FA and the
RMA. This is achieved by integrating the LA update into each RA MIP
signalling phase, and only otherwise using LA only signalling for inter-FA
hand-off. As before, the FAA advertises the FA CoA and the MN sends an RA MIP
Reg to the FA containing the MN-NAI. The HA is set to either zero or to the
static HA of the MN and the HoA is set to either zero or to the static HoA of
the MN. The CoA is also set to zero because the RoA has not yet been
allocated. The 'I' bit in the FAA should indicate support for a zero CoA. The
MN-NAI is used to obtain the MN privileges and to dynamically allocate a HA
if required from the home AAA system. The FA allocates an RMA as before and
forwards this registration to that RMA along with the HFAext containing the
FA CoA, and the HFAIPext containing the address of a dynamically allocated
HA. The RMA consumes both of these extensions and then creates a new HFAext
containing the RMA CoA=RoA for the HA. These are then both added to the
original Registration Request and sent to the HA. The Registration Reply is
then returned via the RMA containing the HA and the dynamically allocated
HoA. It is then sent to the FA which adds any dynamically allocated RMA IP
address in a HFAIPext, and finally onto the MN, The HA does not need to
include the HFAIPext back to the MN because the MN is registering via the FA.
The RMA must however add the HFAext to the Reply to carry the RoA back to the
FA, which forwards it to the MN. This results in all nodes discovering all
the state normally built by the combination of the LA and RA MIP layers. This
state is then maintained by the LA MIP layer undertaking mobility management,
and the RA MIP layer refreshing the HoA visitor lists in the RMA and HA.
8. AAA Support for Nested MIP
The following sections detail some additional optional mechanisms within, and
hence requirements for, AAA systems supporting the Basic Nested MIP model.
8.1. FA AAA Requests
LA MIP is provided to MNs following a AAA check which is triggered at the FA,
based on the NAI in the LA MIP Registration as per RFC 2794. This "LA-NAI" is
used to route the AAA request to the home AAA server for the MN via any
foreign AAA server as per AAA Roaming. This triggers appropriate
authentication and authorization results in the MN privileges being returned
to the FA. This indicates the authorized service allowances in the foreign
wireless network as well as controlling the accounting requirements for the
session. The LA-NAI effectively uses the AAA system to support MN access into
a wireless network. When that wireless network belongs to a foreign wireless
operator then the MN is undertaking wireless roaming whether from a home
wireless operator or a home fixed operator. In the context of Nested MIP, the
MN privileges obtained via the LA-NAI can include configuration for local
access, for remote access back to the home network, and additional remote
access configurations for services either provided by the home operator or by
third parties who outsource wireless roaming support to the home operator.
A.W. O'Neill Expires Oct 2002 [Page 15]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
The FA AAA request can enable the global HA to be dynamically allocated
through the AAA system, and the RoA either dynamically allocated through MIP
signalling or by the AAA system. The AAA system can similarly support the
delivery of the RMA and RoA. In either case, the AAA system needs to be able
to control whether the MN gets a public or private HoA/RoA address and also
means that MIP must also be able to request either type of address on behalf
of AAA delivered MN privileges. The AAA system can also be used to deliver
and refresh the MN-FA, MN-RMA, MN-HA, FA-RMA, FA-HA and RMA-HA SAs to/for the
FA and the other elements in the system, in conjunction with complementary
deliveries to the RMA and HA.
Following completion of the initial LA MIP AAA exchanges, the MN is then in a
position to additionally initiate RA MIP Regs. If a RA MIP Reg is routed via
the FA and includes either no LA-NAI, or the same LA-NAI as that included in
the LA MIP Registration, then the RA MIP Reg should be checked against the LA
MN privileges already delivered by the AAA system to the FA, as agreed for
roaming between the home and foreign operators. However, there is then an
additional AAA requirement for a MN to be able to initiate RA MIP to third
party services whose operators either have no commercial relationship with
the home network operator of the MN, or do not wish to share customer
configuration information with that home network operator for such services.
In this case the RA MIP Registration could include a service specific RA-NAI
which would cause the FA to trigger a second AAA request via the foreign
operator AAA server to the AAA server of the third party service provider,
effectively bypassing the MN home operator AAA system. This enables the FA
(and foreign operator) to acquire the RA MN privileges from that RA service
provider, which then supplements or supplants the LA MN privileges. This
enables service specific policing, routing and QoS features to be provided to
specific remote access flows, as well as ensuring that the accounting records
are delivered to the service provider rather than to the home network
operator. This therefore provides additional motivation for enabling HoA
independent forwarding for remote access flows in general, whilst being able
to add HoA specific features as required by more complex commercial models.
This model also provides clean separation between the MN-NAI specific MN
privileges provided by a specific AAA provider, from the remote access
services that are accounted for under that authorization. Essentially, the MN
can dynamically bind any of its MN-NAIs to a specific RA MIP session by
including that MN-NAI in the RA MIP Reg. If the FA does not recognize the MN-
NAI then the FA uses the AAA system to authenticate the user with the service
provider, acquire the associated MN privileges, and commence accounting. If
the associated MN privileges have already previously been fetched during a
previous LA/RA MIP Reg, then a AAA request is not required. This flexibility
can be constrained by the authenticator installing service specific state (HA
address, application bounds etc) into the MN privileges. For each such MN-
NAI, the MN and the foreign AAA server needs to have a unique security
association with the service provider AAA system so that the MN can be
authenticated, the MN privileges securely delivered, and the service
accounting records protected.
In summary, the MN can have multiple NAIs from a range of LA and RA
providers. The MN can use one MN-NAI to configure the LA MIP payer of the
foreign wireless network using AAA roaming from its home network operator.
A.W. O'Neill Expires Oct 2002 [Page 16]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
That MN-NAI will have MN privileges for local access and potentially for
remote access, and the home network operator is the authenticator for the MN,
authorizes its access onto the foreign network, and is the ultimate recipient
for the accounting records generated under that NAI. This LA-NAI is called
the 'connectivityNAI'. Each RA MIP Reg can then also include a 'serviceNAI'
to AAA each remote access session, and that NAI can be either the LA-NAI
invoked to gain connectivity, or any other MN-NAI whose associated MN
privileges support the remote access service requirements. MN privileges can
be service independent or can include service state which limits them to
specific types of remote access sessions. This layered approach flexibly
provides home network and home service provider control over services invoked
by the MN within a wide range of commercial models.
Note that during LA hand-off it is necessary to transfer at least the active
AAA configuration to the new FA.
8.2. RMA AAA Behaviour
There are also benefits in being able to deliver the MN privileges to the RMA
so that policing, accounting and QoS functions can be appropriately
distributed between the FA and the RMA. This can be achieved three different
ways, some of which depend on the RA MIP Regs being routed via the FA and /
or RMA.
Firstly, the preferred approach is for the foreign network AAA server to
deliver the MN privileges in parallel to both the FA and the RMA(local HA)
along with accounting configuration information. This requires the FA to
include the RMA address or NAI in the AAA request, or for the AAA system to
allocate that address. This model is similar to that envisaged for MIP AAA
security associations and key distribution [MIPAAA] for FA, HA state
distribution, although Diameter would most likely be a prerequisite.
Alternatively, and especially when RA MIP Registrations are processed by the
RMA, the RMA can undertake an additional AAA request to obtain the AAA state
from the local AAA server. This only occurs after the FA has completed its
AAA request and obtained the AAA state from the home AAA server but has the
disadvantage of the AAA requests running sequentially although the second one
can probably make use of cached state in the local AAA server.
The third approach is to have the FA route the AAA request to the foreign AAA
server via an RMA AAA proxy so that the RMA is on the path for the delivered
AAA state. This also enables the RMA to decide which subset of the AAA state
is delivered to the FA and puts in place a chain of command via the RMA so
that it can undertake authentication and accounting processing for the MN and
FA. The FA can then limit its AAA functions to those that must be placed in
the edge device. This is beneficial because all AAA state in the FA must be
context transferred on every FA hand-off, using expensive access backhaul
bandwidth, whilst AAA state located in the RMA need only be context transfer
on each RMA hand-off, and each transfer then consumes cheaper core bandwidth.
The downside here though is that the RMA AAA proxy then needs to potentially
process all AAA requests, many of which will not be MIP related.
A.W. O'Neill Expires Oct 2002 [Page 17]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
9. IPv6 Considerations
The Nested model is equally applicable to IPv6 with the major changes being
that the MN in IPv6 is able to rapidly acquire a local interface address from
each FA. This address can then be used as a MN CCoA for the LA MIP layer to
the RMA. The RMA would still allocate the RoA to the MN, and the MN would
once again use this RoA as a MN CCoA for the RA layer HoA. This is to ensure
that each new MN CCoA does not need to be communicated to the HA. The RA
layer is therefore unchanged conceptually from the MIPv4 model but is nested
within a CCoA rather than a FA CoA at the LA layer. This is necessary because
the FA is missing in IPv6. If this is replaced by a Local Mobility Agent(LMA)
with similar capabilities, then the LMA and RMA could once again cooperate to
control and manage local and remote access services in sympathy with the MN
privileges and the operator policies. This may also enable something similar
to a FA CoA to be supported.
Nested MIP also provides clean separation between address spaces at the RA
and LA layers which means that IPv6, IPv4, MIPv6 and MIPv4 can be variously
combined to support evolution and incremental heterogeneous deployment.
10. Security Considerations
No new security issues are raised by this draft than are already considered
in the design of MIPv4, regional tunnelling [RegTun], [RoutOpt] and reverse
tunnelling [RevTun]. At all times all information elements are authenticated
to the same level as that demanded by MIP and AAA exchanges. New
authentication extensions are required but are generated and distributed
using established techniques.
11. Notice Regarding Intellectual Property Rights
Flarion's submissions will conform with RFC 2026. Flarion may seek patent
protection on some or all of the technical information submitted by its
employees in connection with the IETF's standards process. If part(s) of a
submission by Flarion is (are) included in a standard and Flarion owns
patent(s) and/or pending patent application(s) that are essential to
implementation of such included part(s) in said standard, Flarion is prepared
to grant a license on fair, reasonable, reciprocal (license back) and non-
discriminatory terms on such included part(s).
12. Acknowledgements
Michaela Vanderveen and Vincent Park of Flarion Technologies conducted
reviews of this draft.
A.W. O'Neill Expires Oct 2002 [Page 18]
INTERNET-DRAFT Nested MIP for IP Mobility Management May 2002
12. References
[RFC2026] Bradner, S., "The Internet Standards Process -- Revision 3", BCP 9,
RFC 2026, October 1996.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement
Levels", BCP 14, RFC 2119, March 1997
[MIPv4] C.E. Perkins, Ed., `` IP Mobility Support for IPv4," RFC3220,
January 2002
[RegTun] E. Gustafsson. Ed., " Mobile IPv4 Regional Registration,
Internet-draft, draft-ietf-mobileip-reg-tunnel-06.txt, 1March 2002
[RegTunMods] A. O'Neill, "Modifications to Regional Tunnelling", Internet-
draft, draft-oneill-mip-regtun-mods-00.txt, 9 April 2002.
[RevTun] G. Montenegro, Ed., "Reverse Tunnelling for Mobile IP, revised,"
Internet RFC 3024, January 2001.
[RevTunMods] A. O'Neill, "Hand-off Extensions for Reverse Tunnelling",
Internet-draft, draft-oneill-mip-revtun-ho-00.txt, 22 Feb 2002.
[PCCoA] A. O'Neill, "Proxy CCoA Tunnelling for Mobile IP", Internet-draft,
draft-oneill-mip-proxyCCoA-00.txt, May 2002.
[ParallelMIP] A. O'Neill, "Parallel MIP for Aggregated Mobility Management",
Internet-draft, draft-oneill-mip-parallel-00.txt, May 2002.
[ConcatMIP] A. O'Neill, "Concatenated MIP for Mobility Management", Internet-
draft, draft-oneill-mip-concat-00.txt, May 2002.
[RMAsig] A. O'Neill, "Regional Mobility Agent Signalling", Internet-draft,
draft-oneill-mip-rmasig-00.txt, May 2002.
[MIPAAA] Charles E. Perkins, Pat R. Calhoun, "AAA Registration Keys for
Mobile IP", draft-ietf-mobileip-aaa-key-09.txt (work in progress), 26
February 2002
[RoutOpt] C. Perkins, D. Johnson, "Route Optimization in Mobile IP",
Internet-Draft, draft-ietf-mobileip-optim-11.txt (work in progress), 6
September 2001.
[LowLat] K.E. Malki, Ed., "Low Latency Handoffs in Mobile IPv4", Internet-
Draft, draft-ietf-mobileip-lowlatency-handoffs-v4-03.txt, November 2001.
[MIPv6] D. Johnson, C. Perkins, ``Mobility Support in IPv6", Internet-Draft,
draft-ietf-mobileip-ipv6-16.txt (work in progress), 22 March 2002.
Author's Addresses
Alan O'Neill
Flarion Technologies
Phone: +1 908 947 7033
Email: oneill@flarion.com
A.W. O'Neill Expires Oct 2002 [Page 19]
| PAFTECH AB 2003-2026 | 2026-04-24 04:23:46 |