diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc5213.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc5213.txt')
-rw-r--r-- | doc/rfc/rfc5213.txt | 5155 |
1 files changed, 5155 insertions, 0 deletions
diff --git a/doc/rfc/rfc5213.txt b/doc/rfc/rfc5213.txt new file mode 100644 index 0000000..cafd88f --- /dev/null +++ b/doc/rfc/rfc5213.txt @@ -0,0 +1,5155 @@ + + + + + + +Network Working Group S. Gundavelli, Ed. +Request for Comments: 5213 K. Leung +Category: Standards Track Cisco + V. Devarapalli + Wichorus + K. Chowdhury + Starent Networks + B. Patil + Nokia + August 2008 + + + Proxy Mobile IPv6 + +Status of This Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Abstract + + Network-based mobility management enables IP mobility for a host + without requiring its participation in any mobility-related + signaling. The network is responsible for managing IP mobility on + behalf of the host. The mobility entities in the network are + responsible for tracking the movements of the host and initiating the + required mobility signaling on its behalf. This specification + describes a network-based mobility management protocol and is + referred to as Proxy Mobile IPv6. + + + + + + + + + + + + + + + + + + + +Gundavelli, et al. Standards Track [Page 1] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +Table of Contents + + 1. Introduction ................................................. 4 + 2. Conventions and Terminology ................................. 5 + 2.1. Conventions Used in This Document ....................... 5 + 2.2. Terminology ............................................. 5 + 3. Proxy Mobile IPv6 Protocol Overview ......................... 9 + 4. Proxy Mobile IPv6 Protocol Security ......................... 15 + 4.1. Peer Authorization Database (PAD) Example Entries ....... 16 + 4.2. Security Policy Database (SPD) Example Entries ........... 17 + 5. Local Mobility Anchor Operation ............................. 17 + 5.1. Extensions to Binding Cache Entry Data Structure ......... 18 + 5.2. Supported Home Network Prefix Models ..................... 19 + 5.3. Signaling Considerations ................................. 20 + 5.3.1. Processing Proxy Binding Updates ..................... 20 + 5.3.2. Initial Binding Registration (New Mobility Session) .. 22 + 5.3.3. Binding Lifetime Extension (No Handoff) ............. 23 + 5.3.4. Binding Lifetime Extension (After Handoff) ........... 24 + 5.3.5. Binding De-Registration ............................. 24 + 5.3.6. Constructing the Proxy Binding Acknowledgement + Message ............................................. 25 + 5.4. Multihoming Support ..................................... 27 + 5.4.1. Binding Cache Entry Lookup Considerations ........... 28 + 5.5. Timestamp Option for Message Ordering ................... 34 + 5.6. Routing Considerations ................................... 37 + 5.6.1. Bi-Directional Tunnel Management ..................... 37 + 5.6.2. Forwarding Considerations ........................... 38 + 5.6.3. Explicit Congestion Notification (ECN) + Considerations for Proxy Mobile IPv6 Tunnels ......... 39 + 5.7. Local Mobility Anchor Address Discovery ................. 40 + 5.8. Mobile Prefix Discovery Considerations ................... 40 + 5.9. Route Optimization Considerations ....................... 41 + 6. Mobile Access Gateway Operation ............................. 41 + 6.1. Extensions to Binding Update List Entry Data Structure ... 42 + 6.2. Mobile Node's Policy Profile ............................. 43 + 6.3. Supported Access Link Types ............................. 44 + 6.4. Supported Address Configuration Modes ................... 44 + 6.5. Access Authentication and Mobile Node Identification ..... 45 + 6.6. Acquiring Mobile Node's Identifier ....................... 45 + 6.7. Home Network Emulation ................................... 46 + 6.8. Link-local and Global Address Uniqueness ................. 46 + 6.9. Signaling Considerations ................................. 48 + 6.9.1. Binding Registrations ............................... 48 + 6.9.2. Router Solicitation Messages ......................... 56 + 6.9.3. Default-Router ....................................... 57 + 6.9.4. Retransmissions and Rate Limiting ................... 58 + 6.9.5. Path MTU Discovery ................................... 59 + 6.10. Routing Considerations ................................... 60 + + + +Gundavelli, et al. Standards Track [Page 2] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + 6.10.1. Transport Network ................................... 60 + 6.10.2. Tunneling and Encapsulation Modes ................... 61 + 6.10.3. Local Routing ....................................... 62 + 6.10.4. Tunnel Management ................................... 62 + 6.10.5. Forwarding Rules ..................................... 62 + 6.11. Supporting DHCP-Based Address Configuration on the + Access Link ............................................. 64 + 6.12. Home Network Prefix Renumbering ......................... 66 + 6.13. Mobile Node Detachment Detection and Resource Cleanup ... 66 + 6.14. Allowing Network Access to Other IPv6 Nodes ............. 67 + 7. Mobile Node Operation ....................................... 67 + 7.1. Moving into a Proxy Mobile IPv6 Domain ................... 67 + 7.2. Roaming in the Proxy Mobile IPv6 Domain ................. 69 + 8. Message Formats ............................................. 69 + 8.1. Proxy Binding Update Message ............................. 69 + 8.2. Proxy Binding Acknowledgement Message ................... 71 + 8.3. Home Network Prefix Option ............................... 72 + 8.4. Handoff Indicator Option ................................. 73 + 8.5. Access Technology Type Option ........................... 74 + 8.6. Mobile Node Link-layer Identifier Option ................. 76 + 8.7. Link-local Address Option ............................... 77 + 8.8. Timestamp Option ......................................... 77 + 8.9. Status Values ........................................... 78 + 9. Protocol Configuration Variables ............................. 80 + 9.1. Local Mobility Anchor - Configuration Variables ......... 80 + 9.2. Mobile Access Gateway - Configuration Variables ......... 81 + 9.3. Proxy Mobile IPv6 Domain - Configuration Variables ....... 82 + 10. IANA Considerations ......................................... 83 + 11. Security Considerations ..................................... 84 + 12. Acknowledgements ............................................. 85 + 13. References ................................................... 86 + 13.1. Normative References ..................................... 86 + 13.2. Informative References ................................... 87 + Appendix A. Proxy Mobile IPv6 Interactions with AAA + Infrastructure ..................................... 89 + Appendix B. Routing State ....................................... 89 + + + + + + + + + + + + + + + +Gundavelli, et al. Standards Track [Page 3] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +1. Introduction + + IP mobility for IPv6 hosts is specified in Mobile IPv6 [RFC3775]. + Mobile IPv6 requires client functionality in the IPv6 stack of a + mobile node. Exchange of signaling messages between the mobile node + and home agent enables the creation and maintenance of a binding + between the mobile node's home address and its care-of address. + Mobility as specified in [RFC3775] requires the IP host to send IP + mobility management signaling messages to the home agent, which is + located in the network. + + Network-based mobility is another approach to solving the IP mobility + challenge. It is possible to support mobility for IPv6 nodes without + host involvement by extending Mobile IPv6 [RFC3775] signaling + messages between a network node and a home agent. This approach to + supporting mobility does not require the mobile node to be involved + in the exchange of signaling messages between itself and the home + agent. A proxy mobility agent in the network performs the signaling + with the home agent and does the mobility management on behalf of the + mobile node attached to the network. Because of the use and + extension of Mobile IPv6 signaling and home agent functionality, this + protocol is referred to as Proxy Mobile IPv6 (PMIPv6). + + Network deployments that are designed to support mobility would be + agnostic to the capability in the IPv6 stack of the nodes that it + serves. IP mobility for nodes that have mobile IP client + functionality in the IPv6 stack as well as those nodes that do not, + would be supported by enabling Proxy Mobile IPv6 protocol + functionality in the network. The advantages of developing a + network-based mobility protocol based on Mobile IPv6 are: + + o Reuse of home agent functionality and the messages/format used in + mobility signaling. Mobile IPv6 is a mature protocol with several + implementations that have undergone interoperability testing. + + o A common home agent would serve as the mobility agent for all + types of IPv6 nodes. + + The problem statement and the need for a network-based mobility + protocol solution has been documented in [RFC4830]. Proxy Mobile + IPv6 is a solution that addresses these issues and requirements. + + + + + + + + + + +Gundavelli, et al. Standards Track [Page 4] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +2. Conventions and Terminology + +2.1. Conventions Used in This Document + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in RFC 2119 [RFC2119]. + +2.2. Terminology + + All the general mobility-related terms used in this document are to + be interpreted as defined in the Mobile IPv6 base specification + [RFC3775]. + + This document adopts the terms, Local Mobility Anchor (LMA) and + Mobile Access Gateway (MAG) from the NETLMM Goals document [RFC4831]. + This document also provides the following context-specific + explanation to the following terms used in this document. + + Proxy Mobile IPv6 Domain (PMIPv6-Domain) + + Proxy Mobile IPv6 domain refers to the network where the mobility + management of a mobile node is handled using the Proxy Mobile IPv6 + protocol as defined in this specification. The Proxy Mobile IPv6 + domain includes local mobility anchors and mobile access gateways + between which security associations can be set up and + authorization for sending Proxy Binding Updates on behalf of the + mobile nodes can be ensured. + + Local Mobility Anchor (LMA) + + Local Mobility Anchor is the home agent for the mobile node in a + Proxy Mobile IPv6 domain. It is the topological anchor point for + the mobile node's home network prefix(es) and is the entity that + manages the mobile node's binding state. The local mobility + anchor has the functional capabilities of a home agent as defined + in Mobile IPv6 base specification [RFC3775] with the additional + capabilities required for supporting Proxy Mobile IPv6 protocol as + defined in this specification. + + Mobile Access Gateway (MAG) + + Mobile Access Gateway is a function on an access router that + manages the mobility-related signaling for a mobile node that is + attached to its access link. It is responsible for tracking the + mobile node's movements to and from the access link and for + signaling the mobile node's local mobility anchor. + + + + +Gundavelli, et al. Standards Track [Page 5] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + Mobile Node (MN) + + Throughout this document, the term mobile node is used to refer to + an IP host or router whose mobility is managed by the network. + The mobile node may be an IPv4-only node, IPv6-only node, or a + dual-stack node and is not required to participate in any IP + mobility related signaling for achieving mobility for an IP + address that is obtained in that Proxy Mobile IPv6 domain. + + LMA Address (LMAA) + + The global address that is configured on the interface of the + local mobility anchor and is the transport endpoint of the bi- + directional tunnel established between the local mobility anchor + and the mobile access gateway. This is the address to which the + mobile access gateway sends the Proxy Binding Update messages. + When supporting IPv4 traversal, i.e., when the network between the + local mobility anchor and the mobile access gateway is an IPv4 + network, this address will be an IPv4 address and will be referred + to as IPv4-LMAA, as specified in [IPV4-PMIP6]. + + Proxy Care-of Address (Proxy-CoA) + + Proxy-CoA is the global address configured on the egress interface + of the mobile access gateway and is the transport endpoint of the + tunnel between the local mobility anchor and the mobile access + gateway. The local mobility anchor views this address as the + care-of address of the mobile node and registers it in the Binding + Cache entry for that mobile node. When the transport network + between the mobile access gateway and the local mobility anchor is + an IPv4 network and if the care-of address that is registered at + the local mobility anchor is an IPv4 address, the term, IPv4- + Proxy-CoA is used, as specified in [IPV4-PMIP6]. + + Mobile Node's Home Network Prefix (MN-HNP) + + The MN-HNP is a prefix assigned to the link between the mobile + node and the mobile access gateway. More than one prefix can be + assigned to the link between the mobile node and the mobile access + gateway, in which case, all of the assigned prefixes are managed + as a set associated with a mobility session. The mobile node + configures its interface with one or more addresses from its home + network prefix(es). If the mobile node connects to the Proxy + Mobile IPv6 domain through multiple interfaces, simultaneously, + each of the attached interfaces will be assigned a unique set of + home network prefixes, and all the prefixes assigned to a given + interface of a mobile node will be managed under one mobility + session. For example, home network prefixes P1 and P2 assigned to + + + +Gundavelli, et al. Standards Track [Page 6] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + interface I1 will be managed under one mobility session and + prefixes P3, P4, and P5 assigned to interface I2 of the mobile + node will be managed under a different mobility session. + Additionally, in some configurations the assigned prefix can be of + 128-bit prefix length. + + Mobile Node's Home Address (MN-HoA) + + MN-HoA is an address from a mobile node's home network prefix. + The mobile node will be able to use this address as long as it is + attached to the access network that is in the scope of that Proxy + Mobile IPv6 domain. If the mobile node uses more than one address + from its home network prefix(es), any one of these addresses is + referred to as mobile node's home address. Unlike in Mobile IPv6 + where the home agent is aware of the home address of the mobile + node, in Proxy Mobile IPv6, the mobility entities are only aware + of the mobile node's home network prefix(es) and are not always + aware of the exact address(es) that the mobile node configured on + its interface from its home network prefix(es). However, in some + configurations and based on the enabled address configuration + modes on the access link, the mobility entities in the network can + be certain about the exact address(es) configured by the mobile + node. + + Mobile Node's Home Link + + This is the link on which the mobile node obtained its layer-3 + address configuration for the attached interface after it moved + into that Proxy Mobile IPv6 domain. This is the link that + conceptually follows the mobile node. The network will ensure the + mobile node always sees this link with respect to the layer-3 + network configuration, on any access link that it attaches to in + that Proxy Mobile IPv6 domain. + + Multihomed Mobile Node + + A mobile node that connects to the same Proxy Mobile IPv6 domain + through more than one interface and uses these interfaces + simultaneously is referred to as a multihomed mobile node. + + Mobile Node Identifier (MN-Identifier) + + The identity of a mobile node in the Proxy Mobile IPv6 domain. + This is the stable identifier of a mobile node that the mobility + entities in a Proxy Mobile IPv6 domain can always acquire and use + for predictably identifying a mobile node. This is typically an + identifier such as a Network Access Identifier (NAI) [RFC4282] or + other identifier such as a Media Access Control (MAC) address. + + + +Gundavelli, et al. Standards Track [Page 7] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + Mobile Node Link-layer Identifier (MN-LL-Identifier) + + An identifier that identifies the attached interface of a mobile + node. For those interfaces that have a link-layer identifier, + this identifier can be based on that. The link-layer identifier, + in some cases, is generated by the mobile node and conveyed to the + mobile access gateway. This identifier of the attached interface + must be stable, as seen by any of the mobile access gateways in a + given Proxy Mobile IPv6 domain. In some other cases, there might + not be any link-layer identifier associated with the mobile node's + interface. An identifier value of ALL_ZERO is not considered a + valid identifier and cannot be used as an interface identifier. + + Policy Profile + + Policy Profile is an abstract term for referring to a set of + configuration parameters that are configured for a given mobile + node. The mobility entities in the Proxy Mobile IPv6 domain + require access to these parameters for providing the mobility + management to a given mobile node. The specific details on how + the network entities obtain this policy profile is outside the + scope of this document. + + Proxy Binding Update (PBU) + + A request message sent by a mobile access gateway to a mobile + node's local mobility anchor for establishing a binding between + the mobile node's home network prefix(es) assigned to a given + interface of a mobile node and its current care-of address (Proxy- + CoA). + + Proxy Binding Acknowledgement (PBA) + + A reply message sent by a local mobility anchor in response to a + Proxy Binding Update message that it received from a mobile access + gateway. + + Per-MN-Prefix and Shared-Prefix Models + + The term Per-MN-Prefix model is used to refer to an addressing + model where there is a unique network prefix or prefixes assigned + for each node. The term Shared-Prefix model is used to refer to + an addressing model where the prefix(es) are shared by more than + one node. This specification supports the Per-MN-Prefix model and + does not support the Shared-Prefix model. + + + + + + +Gundavelli, et al. Standards Track [Page 8] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + Mobility Session + + In the context of Proxy Mobile IPv6 specification, the term + mobility session refers to the creation or existence of state + associated with the mobile node's mobility binding on the local + mobility anchor and on the serving mobile access gateway. + + DHCP + + Throughout this document, the acronym DHCP refers to DHCP for + IPv6, as defined in [RFC3315]. + + ALL_ZERO and NON_ZERO + + Protocol message fields initialized with value 0 in each byte of + the field. For example, an 8-byte link-layer identifier field + with the value set to 0 in each of the 8 bytes, or an IPv6 address + with the value 0 in all of the 16 bytes. Conversely, the term + NON_ZERO is used to refer to any value other than an ALL_ZERO + value. + +3. Proxy Mobile IPv6 Protocol Overview + + This specification describes a network-based mobility management + protocol. It is called Proxy Mobile IPv6 and is based on Mobile IPv6 + [RFC3775]. + + Proxy Mobile IPv6 protocol is intended for providing network-based IP + mobility management support to a mobile node, without requiring the + participation of the mobile node in any IP mobility related + signaling. The mobility entities in the network will track the + mobile node's movements and will initiate the mobility signaling and + set up the required routing state. + + The core functional entities in the NETLMM infrastructure are the + Local Mobility Anchor (LMA) and the Mobile Access Gateway (MAG). The + local mobility anchor is responsible for maintaining the mobile + node's reachability state and is the topological anchor point for the + mobile node's home network prefix(es). The mobile access gateway is + the entity that performs the mobility management on behalf of a + mobile node, and it resides on the access link where the mobile node + is anchored. The mobile access gateway is responsible for detecting + the mobile node's movements to and from the access link and for + initiating binding registrations to the mobile node's local mobility + anchor. There can be multiple local mobility anchors in a Proxy + Mobile IPv6 domain each serving a different group of mobile nodes. + The architecture of a Proxy Mobile IPv6 domain is shown in Figure 1. + + + + +Gundavelli, et al. Standards Track [Page 9] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + +----+ +----+ + |LMA1| |LMA2| + +----+ +----+ + LMAA1 -> | | <-- LMAA2 + | | + \\ //\\ + \\ // \\ + \\ // \\ + +---\\------------- //------\\----+ + ( \\ IPv4/IPv6 // \\ ) + ( \\ Network // \\ ) + +------\\--------//------------\\-+ + \\ // \\ + \\ // \\ + \\ // \\ + Proxy-CoA1--> | | <-- Proxy-CoA2 + +----+ +----+ + |MAG1|-----{MN2} |MAG2| + +----+ | +----+ + | | | + MN-HNP1 --> | MN-HNP2 | <-- MN-HNP3, MN-HNP4 + {MN1} {MN3} + + Figure 1: Proxy Mobile IPv6 Domain + + When a mobile node enters a Proxy Mobile IPv6 domain and attaches to + an access link, the mobile access gateway on that access link, after + identifying the mobile node and acquiring its identity, will + determine if the mobile node is authorized for the network-based + mobility management service. + + If the network determines that the mobile node is authorized for + network-based mobility service, the network will ensure that the + mobile node using any of the address configuration mechanisms + permitted by the network will be able to obtain the address + configuration on the connected interface and move anywhere in that + Proxy Mobile IPv6 domain. The obtained address configuration + includes the address(es) from its home network prefix(es), the + default-router address on the link, and other related configuration + parameters. From the perspective of each mobile node, the entire + Proxy Mobile IPv6 domain appears as a single link, the network + ensures that the mobile node does not detect any change with respect + to its layer-3 attachment even after changing its point of attachment + in the network. + + + + + + + +Gundavelli, et al. Standards Track [Page 10] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + The mobile node may be an IPv4-only node, IPv6-only node, or a dual- + stack (IPv4/v6) node. Based on the policy profile information that + indicates the type of address or prefixes to be assigned for the + mobile node in the network, the mobile node will be able to obtain an + IPv4, IPv6, or dual IPv4/IPv6 address and move anywhere in that Proxy + Mobile IPv6 domain. However, this specification only supports IPv6 + address/prefix mobility with the transport network being IPv6. The + support for IPv4 addressing or an IPv4 transport network is specified + in the companion document [IPV4-PMIP6]. + + If the mobile node connects to the Proxy Mobile IPv6 domain through + multiple interfaces and over multiple access networks, the network + will allocate a unique set of home network prefixes for each of the + connected interfaces. The mobile node will be able to configure + address(es) on those interfaces from the respective home network + prefix(es). However, if the mobile node performs a handoff by moving + its address configuration from one interface to the other, and if the + local mobility anchor receives a handoff hint from the serving mobile + access gateway about the same, the local mobility anchor will assign + the same home network prefix(es) that it previously assigned prior to + the handoff. The mobile node will also be able to perform a handoff + by changing its point of attachment from one mobile access gateway to + a different mobile access gateway using the same interface and will + be able to retain the address configuration on the attached + interface. + + + + + + + + + + + + + + + + + + + + + + + + + + +Gundavelli, et al. Standards Track [Page 11] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + +-----+ +-----+ +-----+ + | MN | | MAG | | LMA | + +-----+ +-----+ +-----+ + | | | + MN Attached | | + | | | + | MN Attached Event from MN/Network | + | (Acquire MN-Id and Profile) | + | | | + |--- Rtr Sol --------->| | + | | | + | |--- PBU ------------->| + | | | + | | Accept PBU + | | (Allocate MN-HNP(s), Setup BCE and Tunnel) + | | | + | |<------------- PBA ---| + | | | + | Accept PBA | + | (Set Up Tunnel and Routing) | + | | | + | |==== Bi-Dir Tunnel ===| + | | | + |<--------- Rtr Adv ---| | + | | | + IP Address | | + Configuration | | + | | | + + Figure 2: Mobile Node Attachment - Signaling Call Flow + + Figure 2 shows the signaling call flow when the mobile node enters + the Proxy Mobile IPv6 domain. The Router Solicitation message from + the mobile node may arrive at any time after the mobile node's + attachment and has no strict ordering relation with the other + messages in the call flow. + + For updating the local mobility anchor about the current location of + the mobile node, the mobile access gateway sends a Proxy Binding + Update message to the mobile node's local mobility anchor. Upon + accepting this Proxy Binding Update message, the local mobility + anchor sends a Proxy Binding Acknowledgement message including the + mobile node's home network prefix(es). It also creates the Binding + Cache entry and sets up its endpoint of the bi-directional tunnel to + the mobile access gateway. + + + + + + +Gundavelli, et al. Standards Track [Page 12] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + The mobile access gateway on receiving the Proxy Binding + Acknowledgement message sets up its endpoint of the bi-directional + tunnel to the local mobility anchor and also sets up the forwarding + for the mobile node's traffic. At this point, the mobile access + gateway has all the required information for emulating the mobile + node's home link. It sends Router Advertisement messages to the + mobile node on the access link advertising the mobile node's home + network prefix(es) as the hosted on-link prefix(es). + + The mobile node, on receiving these Router Advertisement messages on + the access link, attempts to configure its interface using either + stateful or stateless address configuration modes, based on the modes + that are permitted on that access link as indicated in Router + Advertisement messages. At the end of a successful address + configuration procedure, the mobile node has one or more addresses + from its home network prefix(es). + + After address configuration, the mobile node has one or more valid + addresses from its home network prefix(es) at the current point of + attachment. The serving mobile access gateway and the local mobility + anchor also have proper routing states for handling the traffic sent + to and from the mobile node using any one or more of the addresses + from its home network prefix(es). + + The local mobility anchor, being the topological anchor point for the + mobile node's home network prefix(es), receives any packets that are + sent to the mobile node by any node in or outside the Proxy Mobile + IPv6 domain. The local mobility anchor forwards these received + packets to the mobile access gateway through the bi-directional + tunnel. The mobile access gateway on other end of the tunnel, after + receiving the packet, removes the outer header and forwards the + packet on the access link to the mobile node. However, in some + cases, the traffic sent from a correspondent node that is locally + connected to the mobile access gateway may not be received by the + local mobility anchor and may be routed locally by the mobile access + gateway (refer to Section 6.10.3). + + The mobile access gateway acts as the default router on the point-to- + point link shared with the mobile node. Any packet that the mobile + node sends to any correspondent node will be received by the mobile + access gateway and will be sent to its local mobility anchor through + the bi-directional tunnel. The local mobility anchor on the other + end of the tunnel, after receiving the packet, removes the outer + header and routes the packet to the destination. However, in some + cases, the traffic sent to a correspondent node that is locally + connected to the mobile access gateway may be locally routed by the + mobile access gateway (refer to Section 6.10.3). + + + + +Gundavelli, et al. Standards Track [Page 13] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + +-----+ +-----+ +-----+ +-----+ + | MN | |p-MAG| | LMA | |n-MAG| + +-----+ +-----+ +-----+ +-----+ + | | | | + | |==Bi-Dir Tunnel=| | + MN Detached | | | + | MN Detached Event | | + | | | | + | |-- DeReg PBU -->| | + | | | | + | | Accept PBU | + | | (Start MinDelayBeforeBCEDelete Timer) + | | | | + | |<-------- PBA --| | + | | | | + MN Attached | | | + | | | MN Attached event received + | | | from MN or from network + | | | (Acquire MN-Id and Profile) + | | | | + |--- Rtr Sol ------------------------------------->| + .... + Registration steps as in Fig. 2. + .... + | | |==Bi-Dir Tunnel=| + | | | | + |<------------------------------------ Rtr Adv ----| + | | | | + MN retains HoA/HNP(s) + | | | | + + Figure 3: Mobile Node Handoff - Signaling Call Flow + + Figure 3 shows the signaling call flow for the mobile node's handoff + from the previously attached mobile access gateway (p-MAG) to the + newly attached mobile access gateway (n-MAG). This call flow only + reflects a specific message ordering, it is possible the registration + message from the n-MAG may arrive before the de-registration message + from the p-MAG arrives. + + After obtaining the initial address configuration in the Proxy Mobile + IPv6 domain, if the mobile node changes its point of attachment, the + mobile access gateway on the previous link will detect the mobile + node's detachment from the link. It will signal the local mobility + anchor and will remove the binding and routing state for that mobile + node. The local mobility anchor, upon receiving this request, will + identify the corresponding mobility session for which the request was + + + + +Gundavelli, et al. Standards Track [Page 14] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + received, and accepts the request after which it waits for a certain + amount of time to allow the mobile access gateway on the new link to + update the binding. However, if it does not receive any Proxy + Binding Update message within the given amount of time, it will + delete the binding cache entry. + + The mobile access gateway on the new access link, upon detecting the + mobile node on its access link, will signal the local mobility anchor + to update the binding state. After completion of the signaling, the + serving mobile access gateway will send the Router Advertisements + containing the mobile node's home network prefix(es), and this will + ensure the mobile node will not detect any change with respect to the + layer-3 attachment of its interface. + +4. Proxy Mobile IPv6 Protocol Security + + The signaling messages, Proxy Binding Update, and Proxy Binding + Acknowledgement, exchanged between the mobile access gateway and the + local mobility anchor, MUST be protected using end-to-end security + association(s) offering integrity and data origin authentication. + + The mobile access gateway and the local mobility anchor MUST + implement IPsec for protecting the Proxy Mobile IPv6 signaling + messages [RFC4301]. IPsec is a mandatory-to-implement security + mechanism. However, additional documents may specify alternative + mechanisms and the mobility entities can enable a specific mechanism + for securing Proxy Mobile IPv6 signaling messages, based on either a + static configuration or after a dynamic negotiation using any + standard security negotiation protocols. As in Mobile IPv6 + [RFC3775], the use of IPsec for protecting a mobile node's data + traffic is optional. + + IPsec Encapsulating Security Payload (ESP) [RFC4303] in transport + mode with mandatory integrity protection SHOULD be used for + protecting the signaling messages. Confidentiality protection of + these messages is not required. + + IPsec ESP [RFC4303] in tunnel mode MAY be used to protect the mobile + node's tunneled data traffic, if protection of data traffic is + required. + + Internet Key Exchange Protocol version 2 (IKEv2) [RFC4306] SHOULD be + used to set up security associations between the mobile access + gateway and the local mobility anchor to protect the Proxy Binding + Update and Proxy Binding Acknowledgement messages. The mobile access + gateway and the local mobility anchor can use any of the + authentication mechanisms, as specified in [RFC4306], for mutual + authentication. + + + +Gundavelli, et al. Standards Track [Page 15] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + The Mobile IPv6 specification [RFC3775] requires the home agent to + prevent a mobile node from creating security associations or creating + binding cache entries for another mobile node's home address. In the + protocol described in this document, the mobile node is not involved + in creating security associations for protecting the signaling + messages or sending binding updates. Therefore, the local mobility + anchor MUST restrict the creation and manipulation of proxy bindings + to specifically authorized mobile access gateways and prefixes. The + local mobility anchor MUST be locally configurable to authorize such + specific combinations. Additional mechanisms, such as a policy store + or Authentication, Authorization, and Accounting (AAA) may be + employed, but these are outside the scope of this specification. + + Unlike in Mobile IPv6 [RFC3775], these signaling messages do not + carry either the Home Address destination option or the Type 2 + Routing header, and hence the policy entries and security association + selectors stay the same and require no special IPsec related + considerations. + +4.1. Peer Authorization Database (PAD) Example Entries + + This section describes PAD entries [RFC4301] on the mobile access + gateway and the local mobility anchor. The PAD entries are only + example configurations. Note that the PAD is a logical concept and a + particular mobile access gateway or a local mobility anchor + implementation can implement the PAD in any implementation-specific + manner. The PAD state may also be distributed across various + databases in a specific implementation. + + In the example shown below, the identity of the local mobility anchor + is assumed to be lma_identity_1 and the identity of the mobile access + gateway is assumed to be mag_identity_1. + + mobile access gateway PAD: + - IF remote_identity = lma_identity_1 + Then authenticate (shared secret/certificate/EAP) + and authorize CHILD_SAs for remote address lma_address_1 + + local mobility anchor PAD: + - IF remote_identity = mag_identity_1 + Then authenticate (shared secret/certificate/EAP) + and authorize CHILD_SAs for remote address mag_address_1 + + Figure 4: PAD Entries + + + + + + + +Gundavelli, et al. Standards Track [Page 16] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + The list of authentication mechanisms in the above examples is not + exhaustive. There could be other credentials used for authentication + stored in the PAD. + +4.2. Security Policy Database (SPD) Example Entries + + This section describes the security policy entries [RFC4301] on the + mobile access gateway and the local mobility anchor required to + protect the Proxy Mobile IPv6 signaling messages. The SPD entries + are only example configurations. A particular mobile access gateway + or a local mobility anchor implementation could configure different + SPD entries as long as they provide the required security. + + In the example shown below, the identity of the mobile access gateway + is assumed to be mag_identity_1, the address of the mobile access + gateway is assumed to be mag_address_1, and the address of the local + mobility anchor is assumed to be lma_address_1. The acronym MH + represents the protocol number for the Mobility Header [RFC3775], + while the terms local_mh_type and remote_mh_type stand for local + mobility header type and remote mobility header type, respectively. + + mobile access gateway SPD-S: + - IF local_address = mag_address_1 & + remote_address = lma_address_1 & + proto = MH & (local_mh_type = BU | remote_mh_type = BA) + Then use SA ESP transport mode + Initiate using IDi = mag_identity_1 to address lma_address_1 + + local mobility anchor SPD-S: + - IF local_address = lma_address_1 & + remote_address = mag_address_1 & + proto = MH & (local_mh_type = BA | remote_mh_type = BU) + Then use SA ESP transport mode + + Figure 5: SPD Entries + +5. Local Mobility Anchor Operation + + The local mobility anchor MUST support the home agent function as + defined in [RFC3775] and the extensions defined in this + specification. A home agent with these modifications and enhanced + capabilities for supporting the Proxy Mobile IPv6 protocol is + referred to as a local mobility anchor. + + This section describes the operational details of the local mobility + anchor. + + + + + +Gundavelli, et al. Standards Track [Page 17] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +5.1. Extensions to Binding Cache Entry Data Structure + + Every local mobility anchor MUST maintain a Binding Cache entry for + each currently registered mobile node. A Binding Cache entry is a + conceptual data structure, described in Section 9.1 of [RFC3775]. + + For supporting this specification, the Binding Cache Entry data + structure needs to be extended with the following additional fields. + + o A flag indicating whether or not this Binding Cache entry is + created due to a proxy registration. This flag is set to value 1 + for Binding Cache entries that are proxy registrations and is set + to value 0 for all other entries. + + o The identifier of the registered mobile node, MN-Identifier. This + identifier is obtained from the Mobile Node Identifier Option + [RFC4283] present in the received Proxy Binding Update message. + + o The link-layer identifier of the mobile node's connected interface + on the access link. This identifier can be acquired from the + Mobile Node Link-layer Identifier option, present in the received + Proxy Binding Update message. If the option was not present in + the request, this variable length field MUST be set to two + (octets) and MUST be initialized to a value of ALL_ZERO. + + o The link-local address of the mobile access gateway on the point- + to-point link shared with the mobile node. This is generated by + the local mobility anchor after accepting the initial Proxy + Binding Update message. + + o A list of IPv6 home network prefixes assigned to the mobile node's + connected interface. The home network prefix(es) may have been + statically configured in the mobile node's policy profile, or, + they may have been dynamically allocated by the local mobility + anchor. Each one of these prefix entries will also include the + corresponding prefix length. + + o The tunnel interface identifier (tunnel-if-id) of the bi- + directional tunnel between the local mobility anchor and the + mobile access gateway where the mobile node is currently anchored. + This is internal to the local mobility anchor. The tunnel + interface identifier is acquired during the tunnel creation. + + o The access technology type, by which the mobile node is currently + attached. This is obtained from the Access Technology Type + option, present in the Proxy Binding Update message. + + + + + +Gundavelli, et al. Standards Track [Page 18] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + o The 64-bit timestamp value of the most recently accepted Proxy + Binding Update message sent for this mobile node. This is the + time of day on the local mobility anchor, when the message was + received. If the Timestamp option is not present in the Proxy + Binding Update message (i.e., when the sequence-number-based + scheme is in use), the value MUST be set to ALL_ZERO. + + Typically, any one of the mobile node's home network prefixes from + its mobility session may be used as a key for locating its Binding + Cache entry in all cases except when there has been a handoff of the + mobile node's session to a new mobile access gateway, and that mobile + access gateway is unaware of the home network prefix(es) assigned to + that mobility session. In such handoff cases, the Binding Cache + entry can be located under the considerations specified in Section + 5.4.1. + +5.2. Supported Home Network Prefix Models + + This specification supports the Per-MN-Prefix model and does not + support the Shared-Prefix model. According to the Per-MN-Prefix + model, home network prefix(es) assigned to a mobile node are for that + mobile node's exclusive use and no other node shares an address from + that prefix (other than the Subnet-Router anycast address [RFC4291] + that is used by the mobile access gateway hosting that prefix on that + link). + + There may be more than one prefix assigned to a given interface of + the mobile node; all of those assigned prefixes MUST be unique to + that mobile node, and all are part of exactly one mobility session. + If the mobile node simultaneously attaches to the Proxy Mobile IPv6 + domain through multiple interfaces, each of the attached interfaces + MUST be assigned one or more unique prefixes. Prefixes that are not + assigned to the same interface MUST NOT be managed under the same + mobility session. + + The mobile node's home network prefix(es) assigned to a given + interface of a mobile node (part of a mobility session) will be + hosted on the access link where the mobile node is attached (using + that interface). The local mobility anchor is not required to + perform any proxy Neighbor Discovery (ND) operations [RFC4861] for + defending the mobile node's home address(es), as the prefixes are not + locally hosted on the local mobility anchor. However, from the + routing perspective, the home network prefix(es) is topologically + anchored on the local mobility anchor. + + + + + + + +Gundavelli, et al. Standards Track [Page 19] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +5.3. Signaling Considerations + + This section provides the rules for processing the signaling + messages. The processing rules specified in this section and other + related sections are chained and are in a specific order. When + applying these considerations for processing the signaling messages, + the specified order MUST be maintained. + +5.3.1. Processing Proxy Binding Updates + + 1. The received Proxy Binding Update message (a Binding Update + message with the (P) flag set to value of 1, format specified in + Section 8.1) MUST be authenticated as described in Section 4. + When IPsec is used for message authentication, the Security + Parameter Index (SPI) in the IPsec header [RFC4306] of the + received packet is needed for locating the security association, + for authenticating the Proxy Binding Update message. + + 2. The local mobility anchor MUST observe the rules described in + Section 9.2 of [RFC3775] when processing the Mobility Header in + the received Proxy Binding Update message. + + 3. The local mobility anchor MUST ignore the check, specified in + Section 10.3.1 of [RFC3775], related to the presence of the Home + Address destination option in the Proxy Binding Update message. + + 4. The local mobility anchor MUST identify the mobile node from the + identifier present in the Mobile Node Identifier option + [RFC4283] of the Proxy Binding Update message. If the Mobile + Node Identifier option is not present in the Proxy Binding + Update message, the local mobility anchor MUST reject the + request and send a Proxy Binding Acknowledgement message with + Status field set to MISSING_MN_IDENTIFIER_OPTION (Missing Mobile + Node Identifier option) and the identifier in the Mobile Node + Identifier option carried in the message MUST be set to a zero + length identifier. + + 5. The local mobility anchor MUST apply the required policy checks, + as explained in Section 4, to verify that the sender is a + trusted mobile access gateway authorized to send Proxy Binding + Update messages on behalf of this mobile node. + + 6. If the local mobility anchor determines that the requesting node + is not authorized to send Proxy Binding Update messages for the + identified mobile node, it MUST reject the request and send a + Proxy Binding Acknowledgement message with the Status field set + to MAG_NOT_AUTHORIZED_FOR_PROXY_REG (not authorized to send + proxy binding updates). + + + +Gundavelli, et al. Standards Track [Page 20] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + 7. If the local mobility anchor cannot identify the mobile node + based on the identifier present in the Mobile Node Identifier + option [RFC4283] of the Proxy Binding Update message, it MUST + reject the request and send a Proxy Binding Acknowledgement + message with the Status field set to + NOT_LMA_FOR_THIS_MOBILE_NODE (Not a local mobility anchor for + this mobile node). + + 8. If the local mobility anchor determines that the mobile node is + not authorized for the network-based mobility management + service, it MUST reject the request and send a Proxy Binding + Acknowledgement message with the Status field set to + PROXY_REG_NOT_ENABLED (Proxy Registration not enabled). + + 9. The local mobility anchor MUST apply the considerations + specified in Section 5.5 for processing the Sequence Number + field and the Timestamp option (if present) in the Proxy Binding + Update message. + + 10. If there is no Home Network Prefix option(s) (with any value) + present in the Proxy Binding Update message, the local mobility + anchor MUST reject the request and send a Proxy Binding + Acknowledgement message with the Status field set to + MISSING_HOME_NETWORK_PREFIX_OPTION (Missing Home Network Prefix + option). + + 11. If the Handoff Indicator option is not present in the Proxy + Binding Update message, the local mobility anchor MUST reject + the request and send a Proxy Binding Acknowledgement message + with the Status field set to MISSING_HANDOFF_INDICATOR_OPTION + (Missing Handoff Indicator option). + + 12. If the Access Technology Type option is not present in the Proxy + Binding Update message, the local mobility anchor MUST reject + the request and send a Proxy Binding Acknowledgement message + with the Status field set to MISSING_ACCESS_TECH_TYPE_OPTION + (Missing Access Technology Type option). + + 13. Considerations specified in Section 5.4.1 MUST be applied for + performing the Binding Cache entry existence test. If those + checks specified in Section 5.4.1 result in associating the + received Proxy Binding Update message to a new mobility session + creation request, considerations from Section 5.3.2 (Initial + Binding Registration - New Mobility Session), MUST be applied. + If those checks result in associating the request to an existing + mobility session, the following checks determine the next set of + processing rules that need to be applied. + + + + +Gundavelli, et al. Standards Track [Page 21] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + * If the received Proxy Binding Update message has the lifetime + value of zero, considerations from Section 5.3.5 (Binding De- + Registration) MUST be applied. + + * If the Proxy-CoA in the Binding Cache entry matches the + source address of the request (or the address in the + Alternate Care-of Address option, if the option is present), + considerations from Section 5.3.3 (Binding LIfetime Extension + - No handoff) MUST be applied. + + * For all other cases, considerations from Section 5.3.4 + (Binding Lifetime Extension - After handoff) MUST be applied. + + 14. When sending the Proxy Binding Acknowledgement message with any + Status field value, the message MUST be constructed as specified + in Section 5.3.6. + +5.3.2. Initial Binding Registration (New Mobility Session) + + 1. If there is at least one instance of the Home Network Prefix + option present in the Proxy Binding Update message with the + prefix value set to ALL_ZERO, the local mobility anchor MUST + allocate one or more home network prefixes to the mobile node and + assign it to the new mobility session created for the mobile + node. The local mobility anchor MUST ensure the allocated + prefix(es) is not in use by any other node or mobility session. + The decision on how many prefixes to be allocated for the + attached interface can be based on a global policy or a policy + specific to that mobile node. However, when stateful address + autoconfiguration using DHCP is supported on the link, + considerations from Section 6.11 MUST be applied for the prefix + assignment. + + 2. If the local mobility anchor is unable to allocate any home + network prefix for the mobile node, it MUST reject the request + and send a Proxy Binding Acknowledgement message with the Status + field set to 130 (Insufficient resources). + + 3. If there are one or more Home Network Prefix options present in + the Proxy Binding Update message (with each of the prefixes set + to a NON_ZERO value), the local mobility anchor, before accepting + that request, MUST ensure each one of those prefixes is owned by + the local mobility anchor, and further that the mobile node is + authorized to use these prefixes. If the mobile node is not + authorized to use any one or more of those prefixes, the local + mobility anchor MUST reject the request and send a Proxy Binding + + + + + +Gundavelli, et al. Standards Track [Page 22] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + Acknowledgement message with the Status field set to + NOT_AUTHORIZED_FOR_HOME_NETWORK_PREFIX (mobile node not + authorized for one or more of the requesting home network + prefixes). + + 4. Upon accepting the request, the local mobility anchor MUST create + a Binding Cache entry for the mobile node. It must set the + fields in the Binding Cache entry to the accepted values for that + registration. + + 5. If there is no existing bi-directional tunnel to the mobile + access gateway that sent the request, the local mobility anchor + MUST establish a bi-directional tunnel to that mobile access + gateway. Considerations from Section 5.6.1 MUST be applied for + managing the dynamically created bi-directional tunnel. + + 6. The local mobility anchor MUST create a prefix route(s) over the + tunnel to the mobile access gateway for forwarding any traffic + received for the mobile node's home network prefix(es) associated + with this mobility session. The created tunnel and the routing + state MUST result in the forwarding behavior on the local + mobility anchor as specified in Section 5.6.2. + + 7. The local mobility anchor MUST send the Proxy Binding + Acknowledgement message with the Status field set to 0 (Proxy + Binding Update Accepted). The message MUST be constructed as + specified in Section 5.3.6. + +5.3.3. Binding Lifetime Extension (No Handoff) + + 1. Upon accepting the Proxy Binding Update message for extending the + binding lifetime, received from the same mobile access gateway + (if the Proxy-CoA in the Binding Cache entry is the same as the + Proxy-CoA in the request) that last updated the binding, the + local mobility anchor MUST update the Binding Cache entry with + the accepted registration values. + + 2. The local mobility anchor MUST send the Proxy Binding + Acknowledgement message with the Status field set to 0 (Proxy + Binding Update Accepted). The message MUST be constructed as + specified in Section 5.3.6. + + + + + + + + + + +Gundavelli, et al. Standards Track [Page 23] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +5.3.4. Binding Lifetime Extension (After Handoff) + + 1. Upon accepting the Proxy Binding Update message for extending the + binding lifetime, received from a new mobile access gateway (if + the Proxy-CoA in the Binding Cache entry does not match the + Proxy-CoA in the request) where the mobile node's mobility + session is handed off, the local mobility anchor MUST update the + Binding Cache entry with the accepted registration values. + + 2. The local mobility anchor MUST remove the previously created + route(s) for the mobile node's home network prefix(es) associated + with this mobility session. Additionally, if there are no other + mobile nodes sharing the dynamically created bi-directional + tunnel to the previous mobile access gateway, the tunnel SHOULD + be deleted, applying considerations from section 5.6.1 (if the + tunnel is a dynamically created tunnel and not a fixed pre- + established tunnel). + + 3. If there is no existing bi-directional tunnel to the mobile + access gateway that sent the request, the local mobility anchor + MUST establish a bi-directional tunnel to that mobile access + gateway. Considerations from Section 5.6.1 MUST be applied for + managing the dynamically created bi-directional tunnel. + + 4. The local mobility anchor MUST create prefix route(s) over the + tunnel to the mobile access gateway for forwarding any traffic + received for the mobile node's home network prefix(es) associated + with that mobility session. The created tunnel and routing state + MUST result in the forwarding behavior on the local mobility + anchor as specified in Section 5.6.2. + + 5. The local mobility anchor MUST send the Proxy Binding + Acknowledgement message with the Status field set to 0 (Proxy + Binding Update Accepted). The message MUST be constructed as + specified in Section 5.3.6. + +5.3.5. Binding De-Registration + + 1. If the received Proxy Binding Update message with the lifetime + value of zero, has a Source Address in the IPv6 header (or the + address in the Alternate Care-of Address option, if the option is + present) different from what is present in the Proxy-CoA field in + the Binding Cache entry, the local mobility anchor MUST ignore + the request. + + 2. Upon accepting the Proxy Binding Update message, with the + lifetime value of zero, the local mobility anchor MUST wait for + MinDelayBeforeBCEDelete amount of time, before it deletes the + + + +Gundavelli, et al. Standards Track [Page 24] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + Binding Cache entry. However, it MUST send the Proxy Binding + Acknowledgement message with the Status field set to 0 (Proxy + Binding Update Accepted). The message MUST be constructed as + specified in Section 5.3.6. + + * During this wait period, the local mobility anchor SHOULD drop + the mobile node's data traffic. + + * During this wait period, if the local mobility anchor receives + a valid Proxy Binding Update message for the same mobility + session with the lifetime value of greater than zero, and if + that request is accepted, then the Binding Cache entry MUST + NOT be deleted, but must be updated with the newly accepted + registration values, and the wait period should be ended. + + * By the end of this wait period, if the local mobility anchor + did not receive any valid Proxy Binding Update messages for + this mobility session, then it MUST delete the Binding Cache + entry and remove the routing state created for that mobility + session. The local mobility anchor can potentially reassign + the prefix(es) associated with this mobility session to other + mobile nodes. + +5.3.6. Constructing the Proxy Binding Acknowledgement Message + + o The local mobility anchor, when sending the Proxy Binding + Acknowledgement message to the mobile access gateway, MUST + construct the message as specified below. + + IPv6 header (src=LMAA, dst=Proxy-CoA) + Mobility header + - BA /* P flag must be set to value of 1 */ + Mobility Options + - Mobile Node Identifier option (mandatory) + - Home Network Prefix option(s) (mandatory) + - Handoff Indicator option (mandatory) + - Access Technology Type option (mandatory) + - Timestamp option (optional) + - Mobile Node Link-layer Identifier option (optional) + - Link-local Address option (optional) + + Figure 6: Proxy Binding Acknowledgement Message Format + + o The Source Address field in the IPv6 header of the message MUST be + set to the destination address of the received Proxy Binding + Update message. + + + + + +Gundavelli, et al. Standards Track [Page 25] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + o The Destination Address field in the IPv6 header of the message + MUST be set to the source address of the received Proxy Binding + Update message. When there is no Alternate Care-of Address option + present in the request, the destination address is the same as the + Proxy-CoA; otherwise, the address may not be the same as the + Proxy-CoA. + + o The Mobile Node Identifier option [RFC4283] MUST be present. The + identifier field in the option MUST be copied from the Mobile Node + Identifier option in the received Proxy Binding Update message. + If the option was not present in the request, the identifier in + the option MUST be set to a zero length identifier. + + o At least one Home Network Prefix option MUST be present. + + * If the Status field is set to a value greater than or equal to + 128, i.e., if the Proxy Binding Update is rejected, all the + Home Network Prefix options that were present in the request + (along with their prefix values) MUST be present in the reply. + But, if there was no Home Network Prefix option present in the + request, then there MUST be only one Home Network Prefix option + with the value in the option set to ALL_ZERO. + + * For all other cases, there MUST be a Home Network Prefix option + for each of the assigned home network prefixes (for that + mobility session), and with the prefix value in the option set + to the allocated prefix value. + + o The Handoff Indicator option MUST be present. The handoff + indicator field in the option MUST be copied from the Handoff + Indicator option in the received Proxy Binding Update message. If + the option was not present in the request, the value in the option + MUST be set to zero. + + o The Access Technology Type option MUST be present. The access + technology type field in the option MUST be copied from the Access + Technology Type option in the received Proxy Binding Update + message. If the option was not present in the request, the value + in the option MUST be set to zero. + + o The Timestamp option MUST be present only if the same option was + present in the received Proxy Binding Update message and MUST NOT + be present otherwise. Considerations from Section 5.5 must be + applied for constructing the Timestamp option. + + o The Mobile Node Link-layer Identifier option MUST be present only + if the same option was present in the received Proxy Binding + Update message and MUST NOT be present otherwise. The link-layer + + + +Gundavelli, et al. Standards Track [Page 26] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + identifier value MUST be copied from the Mobile Node Link-layer + Identifier option present in the received Proxy Binding Update + message. + + o The Link-local Address option MUST be present only if the same + option was present in the received Proxy Binding Update message + and MUST NOT be present otherwise. If the Status field in the + reply is set to a value greater than or equal to 128, i.e., if the + Proxy Binding Update is rejected, then the link-local address from + the request MUST be copied to the Link-local Address option in the + reply, otherwise the following considerations apply. + + * If the received Proxy Binding Update message has the Link-local + Address option with ALL_ZERO value and if there is an existing + Binding Cache entry associated with this request, then the + link-local address from the Binding Cache entry MUST be copied + to the Link-local Address option in the reply. + + * If the received Proxy Binding Update message has the Link-local + Address option with ALL_ZERO value and if there is no existing + Binding Cache entry associated with this request, then the + local mobility anchor MUST generate the link-local address that + the mobile access gateway can use on the point-to-point link + shared with the mobile node. This generated address MUST be + copied to the Link-local Address option in the reply. The same + address MUST also be copied to the link-local address field of + Binding Cache entry created for this mobility session. + + * If the received Proxy Binding Update message has the Link-local + Address option with NON_ZERO value, then the link-local address + from the request MUST be copied to the Link-local Address + option in the reply. The same address MUST also be copied to + the link-local address field of the Binding Cache entry + associated with this request (after creating the Binding Cache + entry, if one does not exist). + + o If IPsec is used for protecting the signaling messages, the + message MUST be protected using the security association existing + between the local mobility anchor and the mobile access gateway. + + o Unlike in Mobile IPv6 [RFC3775], the Type 2 Routing header MUST + NOT be present in the IPv6 header of the packet. + +5.4. Multihoming Support + + This specification allows mobile nodes to connect to a Proxy Mobile + IPv6 domain through multiple interfaces for simultaneous access. The + following are the key aspects of this multihoming support. + + + +Gundavelli, et al. Standards Track [Page 27] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + o When a mobile node connects to a Proxy Mobile IPv6 domain through + multiple interfaces for simultaneous access, the local mobility + anchor MUST allocate a mobility session for each of the attached + interfaces. Each mobility session should be managed under a + separate Binding Cache entry and with its own lifetime. + + o The local mobility anchor MAY allocate more than one home network + prefix for a given interface of the mobile node. However, all the + prefixes associated with a given interface MUST be managed as part + of one mobility session, associated with that interface. + + o The local mobility anchor MUST allow for a handoff between two + different interfaces of a mobile node. In such a scenario, all + the home network prefixes associated with one interface (part of + one mobility session) will be associated with a different + interface of the mobile node. The decision on when to create a + new mobility session and when to update an existing mobility + session MUST be based on the Handover hint present in the Proxy + Binding Update message and under the considerations specified in + this section. + +5.4.1. Binding Cache Entry Lookup Considerations + + There can be multiple Binding Cache entries for a given mobile node. + When doing a lookup for a mobile node's Binding Cache entry for + processing a received Proxy Binding Update message, the local + mobility anchor MUST apply the following multihoming considerations + (in the below specified order, starting with Section 5.4.1.1). These + rules are chained with the processing rules specified in Section 5.3. + +5.4.1.1. Home Network Prefix Option (NON_ZERO Value) Present in the + Request + + +=====================================================================+ + | Registration/De-Registration Message | + +=====================================================================+ + | At least one HNP Option with NON_ZERO Value | + +=====================================================================+ + | ATT | + +=====================================================================+ + | MN-LL-Identifier Opt Present | MN-LL-Identifier Opt Not Present | + +=====================================================================+ + | HI | + +==================================+==================================+ + | BCE Lookup Key: Any of the Home Network Prefixes from the request | + +=====================================================================+ + + Figure 7: Binding Cache Entry (BCE) Lookup Using Home Network Prefix + + + +Gundavelli, et al. Standards Track [Page 28] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + If there is at least one Home Network Prefix option present in the + request with a NON_ZERO prefix value and irrespective of the presence + of the Mobile Node Link-layer Identifier option in the request, the + following considerations MUST be applied. If there is more than one + instance of the Home Network Prefix option, any one of the Home + Network Prefix options present in the request (with NON_ZERO prefix + value) can be used for locating the Binding Cache entry. + + 1. The local mobility anchor MUST verify if there is an existing + Binding Cache entry with one of its home network prefixes + matching the prefix value in one of the Home Network Prefix + options of the received Proxy Binding Update message. + + 2. If a Binding Cache entry does not exist (with one of its home + network prefixes in the Binding Cache entry matching the prefix + value in one of the Home Network Prefix options of the received + Proxy Binding Update message), the request MUST be considered as + a request for creating a new mobility session. + + 3. If there exists a Binding Cache entry (with one of its home + network prefixes in the Binding Cache entry matching the prefix + value in one of the Home Network Prefix options of the received + Proxy Binding Update message), but if the mobile node identifier + in the entry does not match the mobile node identifier in the + Mobile Node Identifier option of the received Proxy Binding + Update message, the local mobility anchor MUST reject the request + with the Status field value set to + NOT_AUTHORIZED_FOR_HOME_NETWORK_PREFIX (mobile node is not + authorized for one or more of the requesting home network + prefixes). + + 4. If there exists a Binding Cache entry (matching MN-Identifier and + one of its home network prefixes in the Binding Cache entry + matching the prefix value in one of the Home Network Prefix + options of the received Proxy Binding Update message), but if all + the prefixes in the request do not match all the prefixes in the + Binding Cache entry, or if they do not match in count, then the + local mobility anchor MUST reject the request with the Status + field value set to BCE_PBU_PREFIX_SET_DO_NOT_MATCH (all the home + network prefixes listed in the BCE do not match all the prefixes + in the received PBU). + + 5. If there exists a Binding Cache entry (matching MN-Identifier and + all the home network prefixes in the Binding Cache entry matching + all the home network prefixes in the received Proxy Binding + Update message) and if any one or more of these below stated + conditions are true, the request MUST be considered as a request + for updating that Binding Cache entry. + + + +Gundavelli, et al. Standards Track [Page 29] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + * If there is a Mobile Node Link-layer Identifier option present + in the request and if the link-layer identifier in the option + matches the link-layer identifier of the Binding Cache entry + and the access technology type in the Access Technology Type + option present in the request matches the access technology + type in the Binding Cache entry. + + * If the Handoff Indicator field in the Handoff Indicator option + present in the request is set to a value of 2 (Handoff between + two different interfaces of the mobile node). + + * If there is no Mobile Node Link-layer Identifier option + present in the request, the link-layer identifier value in the + Binding Cache entry is set to ALL_ZERO, the access technology + type field in the Access Technology Type option present in the + request matches the access technology type in the Binding + Cache entry, and if the Handoff Indicator field in the Handoff + Indicator option present in the request is set to a value of 3 + (Handoff between mobile access gateways for the same + interface). + + * If the Proxy-CoA in the Binding Cache entry matches the source + address of the request (or the address in the Alternate + Care-of Address option, if the option is present) and if the + access technology type field in the Access Technology Type + option present in the request matches the access technology + type in the Binding Cache entry. + + 6. For all other cases, the message MUST be considered as a request + for creating a new mobility session. However, if the received + Proxy Binding Update message has the lifetime value of zero and + if the request cannot be associated with any existing mobility + session, the message MUST be silently ignored. + + + + + + + + + + + + + + + + + + +Gundavelli, et al. Standards Track [Page 30] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +5.4.1.2. Mobile Node Link-layer Identifier Option Present in the + Request + + +=====================================================================+ + | Registration/De-Registration Message | + +=====================================================================+ + | No HNP option with a NON_ZERO Value | + +=====================================================================+ + | ATT | + +=====================================================================+ + | MN-LL-Identifier Option Present (NON_ZERO Value) | + +=====================================================================+ + | HI | + +==================================+==================================+ + | BCE Lookup Keys: (MN-Identifier + ATT + MN-LL-Identifier) | + +=====================================================================+ + + Figure 8: BCE Lookup Using Link-layer Identifier + + If there is no Home Network Prefix option present in the request with + a NON_ZERO prefix value, but if there is a Mobile Node Link-layer + Identifier option present in the request, then the following + considerations MUST be applied for locating the Binding Cache entry. + + 1. The local mobility anchor MUST verify if there is an existing + Binding Cache entry, with the mobile node identifier matching the + identifier in the received Mobile Node Identifier option, access + technology type matching the value in the received Access + Technology Type option, and the link-layer identifier value + matching the identifier in the received Mobile Node Link-layer + Identifier option. + + 2. If there exists a Binding Cache entry (matching MN-Identifier, + Access Technology Type (ATT), and MN-LL-Identifier), the request + MUST be considered as a request for updating that Binding Cache + entry. + + 3. If there does not exist a Binding Cache entry (matching MN- + Identifier, ATT, and MN-LL-Identifier) and the Handoff Indicator + field in the Handoff Indicator option present in the request is + set to a value of 2 (Handoff between two different interfaces of + the mobile node). The local mobility anchor MUST apply the + following additional considerations. + + * The local mobility anchor MUST verify if there exists one and + only one Binding Cache entry with the mobile node identifier + matching the identifier in the Mobile Node Identifier option + present in the request and for any link-layer identifier + + + +Gundavelli, et al. Standards Track [Page 31] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + value. If there exists only one such entry (matching the MN- + Identifier), the request MUST be considered as a request for + updating that Binding Cache entry. + + 4. If there does not exist a Binding Cache entry (matching MN- + Identifier, ATT, and MN-LL-Identifier) and if the Handoff + Indicator field in the Handoff Indicator option present in the + request is set to a value of 4 (Handoff state unknown), the local + mobility anchor MUST apply the following additional + considerations. + + * The local mobility anchor MUST verify if there exists one and + only one Binding Cache entry with the mobile node identifier + matching the identifier in the Mobile Node Identifier option + present in the request and for any link-layer identifier + value. If there exists only one such entry (matching the MN- + Identifier), the local mobility anchor SHOULD wait until the + existing Binding Cache entry is de-registered by the + previously serving mobile access gateway, before the request + can be considered as a request for updating that Binding Cache + entry. However, if there is no de-registration message that + is received within MaxDelayBeforeNewBCEAssign amount of time, + the local mobility anchor, upon accepting the request, MUST + consider the request as a request for creating a new mobility + session. The local mobility anchor MAY also choose to create + a new mobility session without waiting for a de-registration + message, and this should be configurable on the local mobility + anchor. + + 5. For all other cases, the message MUST be considered as a request + for creating a new mobility session. However, if the received + Proxy Binding Update message has the lifetime value of zero and + if the request cannot be associated with any existing mobility + session, the message MUST be silently ignored. + + + + + + + + + + + + + + + + + +Gundavelli, et al. Standards Track [Page 32] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +5.4.1.3. Mobile Node Link-layer Identifier Option Not Present in the + Request + + +=====================================================================+ + | Registration/De-Registration Message | + +=====================================================================+ + | No HNP option with a NON_ZERO Value | + +=====================================================================+ + | ATT | + +=====================================================================+ + | MN-LL-Identifier Option Not Present | + +=====================================================================+ + | HI | + +==================================+==================================+ + | BCE Lookup Key: (MN-Identifier) | + +=====================================================================+ + + Figure 9: BCE Lookup Using Mobile Node Identifier + + If there is no Home Network Prefix option present in the request with + a NON_ZERO prefix value and if there is also no Mobile Node Link- + layer Identifier option present in the request, then the following + considerations MUST be applied for locating the Binding Cache entry. + + 1. The local mobility anchor MUST verify if there exists one and + only one Binding Cache entry with the mobile node identifier + matching the identifier in the Mobile Node Identifier option + present in the request. + + 2. If there exists only one such entry (matching the MN-Identifier) + and the Handoff Indicator field in the Handoff Indicator option + present in the request is set to a value of 2 (Handoff between + two different interfaces of the mobile node) or set to a value of + 3 (Handoff between mobile access gateways for the same + interface), then the request MUST be considered as a request for + updating that Binding Cache entry. + + 3. If there exists only one such entry (matching the MN-Identifier) + and the Handoff Indicator field in the Handoff Indicator option + present in the request is set to a value of 4 (Handoff state + unknown), the local mobility anchor SHOULD wait until the + existing Binding Cache entry is de-registered by the previously + serving mobile access gateway before the request can be + considered as a request for updating that Binding Cache entry. + However, if there is no de-registration message that is received + within MaxDelayBeforeNewBCEAssign amount of time, the local + mobility anchor, upon accepting the request, MUST consider the + request as a request for creating a new mobility session. The + + + +Gundavelli, et al. Standards Track [Page 33] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + local mobility anchor MAY also choose to create a new mobility + session without waiting for a de-registration message, and this + should be configurable on the local mobility anchor. + + 4. For all other cases, the message MUST be considered as a request + for creating a new mobility session. However, if the received + Proxy Binding Update message has the lifetime value of zero and + if the request cannot be associated with any existing mobility + session, the message MUST be silently ignored. + +5.5. Timestamp Option for Message Ordering + + Mobile IPv6 [RFC3775] uses the Sequence Number field in binding + registration messages as a way for the home agent to process the + binding updates in the order they were sent by a mobile node. The + home agent and the mobile node are required to manage this counter + over the lifetime of a binding. However, in Proxy Mobile IPv6, as + the mobile node moves from one mobile access gateway to another and + in the absence of mechanisms such as context transfer between the + mobile access gateways, the serving mobile access gateway will be + unable to determine the sequence number that it needs to use in the + signaling messages. Hence, the sequence number scheme, as specified + in [RFC3775], will be insufficient for Proxy Mobile IPv6. + + If the local mobility anchor cannot determine the sending order of + the received Proxy Binding Update messages, it may potentially + process an older message sent by a mobile access gateway where the + mobile node was previously anchored, but delivered out of order, + resulting in incorrectly updating the mobile node's Binding Cache + entry and creating a routing state for tunneling the mobile node's + traffic to the previous mobile access gateway. + + For solving this problem, this specification adopts two alternative + solutions. One is based on timestamps and the other based on + sequence numbers, as defined in [RFC3775]. + + The basic principle behind the use of timestamps in binding + registration messages is that the node generating the message inserts + the current time of day, and the node receiving the message checks + that this timestamp is greater than all previously accepted + timestamps. The timestamp-based solution may be used when the + serving mobile access gateways in a Proxy Mobile IPv6 domain do not + have the ability to obtain the last sequence number that was sent in + a Proxy Binding Update message for updating a given mobile node's + binding. + + + + + + +Gundavelli, et al. Standards Track [Page 34] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + Clock drift reduces the effectiveness of the timestamp mechanism. + The time required for reconnection is the total of the time required + for the mobile node to roam between two mobile access gateways and + the time required for the serving mobile access gateway to detect the + mobile node on its access link and construct the Proxy Binding Update + message. If the clock skew on any one of these two neighboring + mobile access gateways (relative to the common time source used for + clock synchronization) is more than half this reconnection time, the + timestamp solution will not predictably work in all cases and hence + SHOULD NOT be used. + + As an alternative to the Timestamp-based approach, the specification + also allows the use of Sequence-Number-based scheme, as specified in + [RFC3775]. However, for this scheme to work, the serving mobile + access gateway in a Proxy Mobile IPv6 domain MUST have the ability to + obtain the last sequence number that was sent in a binding + registration message for that mobility session. The sequence number + MUST be maintained on a mobile node's per mobility session basis and + MUST be available to the serving mobile access gateway. This may be + achieved by using context transfer schemes or by maintaining the + sequence number in a policy store. However, the specific details on + how the mobile node's sequence number is made available to the + serving mobile access gateway prior to sending the Proxy Binding + Update message is outside the scope of this document. + + Using the Timestamp-Based Approach: + + 1. A local mobility anchor implementation MUST support the Timestamp + option. If the Timestamp option is present in the received Proxy + Binding Update message, then the local mobility anchor MUST + include a valid Timestamp option in the Proxy Binding + Acknowledgement message that it sends to the mobile access + gateway. + + 2. All the mobility entities in a Proxy Mobile IPv6 domain that are + exchanging binding registration messages using the Timestamp + option MUST have adequately synchronized time-of-day clocks. + This is the essential requirement for this solution to work. If + this requirement is not met, the solution will not predictably + work in all cases. + + 3. The mobility entities in a Proxy Mobile IPv6 domain SHOULD + synchronize their clocks to a common time source. For + synchronizing the clocks, the nodes MAY use the Network Time + Protocol [RFC4330]. Deployments MAY also adopt other approaches + suitable for that specific deployment. Alternatively, if there + is a mobile node generated timestamp that is increasing at every + attachment to the access link and if that timestamp is available + + + +Gundavelli, et al. Standards Track [Page 35] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + to the mobile access gateway (e.g., the Timestamp option in the + SEND [RFC3971] messages that the mobile node sends), the mobile + access gateway can use this timestamp or sequence number in the + Proxy Binding Update messages and does not have to depend on any + external clock source. However, the specific details on how this + is achieved are outside the scope of this document. + + 4. When generating the timestamp value for building the Timestamp + option, the mobility entities MUST ensure that the generated + timestamp is the elapsed time past the same reference epoch, as + specified in the format for the Timestamp option (Section 8.8). + + 5. If the Timestamp option is present in the received Proxy Binding + Update message, the local mobility anchor MUST ignore the + sequence number field in the message. However, it MUST copy the + sequence number from the received Proxy Binding Update message to + the Proxy Binding Acknowledgement message. + + 6. Upon receipt of a Proxy Binding Update message with the Timestamp + option, the local mobility anchor MUST check the timestamp field + for validity. In order for it to be considered valid, the + following MUST be true. + + * The timestamp value contained in the Timestamp option MUST be + close enough (within TimestampValidityWindow amount of time + difference) to the local mobility anchor's time-of-day clock. + However, if the flag MobileNodeGeneratedTimestampInUse is set + to a value of 1, the local mobility anchor MUST ignore this + check and perform only the following check. + + * The timestamp MUST be greater than all previously accepted + timestamps in the Proxy Binding Update messages sent for that + mobile node. + + 7. If the timestamp value in the received Proxy Binding Update is + valid (validity as specified in the above considerations) or if + the flag MobileNodeGeneratedTimestampInUse is set to value of 1, + the local mobility anchor MUST return the same timestamp value in + the Timestamp option included in the Proxy Binding + Acknowledgement message that it sends to the mobile access + gateway. + + 8. If the timestamp value in the received Proxy Binding Update is + lower than the previously accepted timestamp in the Proxy Binding + Update messages sent for that mobility binding, the local + mobility anchor MUST reject the Proxy Binding Update message and + send a Proxy Binding Acknowledgement message with the Status + field set to TIMESTAMP_LOWER_THAN_PREV_ACCEPTED (Timestamp lower + + + +Gundavelli, et al. Standards Track [Page 36] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + than previously accepted timestamp). The message MUST also + include the Timestamp option with the value set to the current + time of day on the local mobility anchor. + + 9. If the timestamp value in the received Proxy Binding Update is + not valid (validity as specified in the above considerations), + the local mobility anchor MUST reject the Proxy Binding Update + and send a Proxy Binding Acknowledgement message with the Status + field set to TIMESTAMP_MISMATCH (Timestamp mismatch). The + message MUST also include the Timestamp option with the value set + to the current time of day on the local mobility anchor. + + Using the Sequence-Number-Based Approach: + + 1. If the Timestamp option is not present in the received Proxy + Binding Update message, the local mobility anchor MUST fall back + to the Sequence-Number-based scheme. It MUST process the + sequence number field as specified in [RFC3775]. Also, it MUST + NOT include the Timestamp option in the Proxy Binding + Acknowledgement messages that it sends to the mobile access + gateway. + + 2. An implementation MUST support the Sequence-Number-based scheme, + as specified in [RFC3775]. + + 3. The Sequence-Number-based approach can be used only when there is + some mechanism (such as context transfer procedure between mobile + access gateways) that allows the serving mobile access gateway to + obtain the last sequence number that was sent in a Proxy Binding + Update message for updating a given mobile node's binding. + +5.6. Routing Considerations + +5.6.1. Bi-Directional Tunnel Management + + The bi-directional tunnel MUST be used for routing the mobile node's + data traffic between the mobile access gateway and the local mobility + anchor. A tunnel hides the topology and enables a mobile node to use + address(es) from its home network prefix(es) from any access link in + that Proxy Mobile IPv6 domain. A tunnel may be created dynamically + when needed and removed when not needed. However, implementations + MAY choose to use static pre-established tunnels instead of + dynamically creating and tearing them down on a need basis. The + following considerations MUST be applied when using dynamically + created tunnels. + + + + + + +Gundavelli, et al. Standards Track [Page 37] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + o A bi-directional tunnel MUST be established between the local + mobility anchor and the mobile access gateway and the local + mobility anchor with IPv6-in-IPv6 encapsulation, as described in + [RFC2473]. The tunnel endpoints are the Proxy-CoA and LMAA. + However, when using IPv4 transport, the endpoints of the tunnel + are IPv4-LMAA and IPv4-Proxy-CoA with the encapsulation mode as + specified in [IPV4-PMIP6]. + + o Implementations MAY use a software timer for managing the tunnel + lifetime and a counter for keeping a count of all the mobile nodes + that are sharing the tunnel. The timer value can be set to the + accepted binding lifetime and can be updated after each periodic + re-registration for extending the lifetime. If the tunnel is + shared for multiple mobile nodes, the tunnel lifetime must be set + to the highest binding lifetime that is granted to any one of + those mobile nodes sharing that tunnel. + + o The tunnel SHOULD be deleted when either the tunnel lifetime + expires or when there are no mobile nodes sharing the tunnel. + +5.6.2. Forwarding Considerations + + Intercepting Packets Sent to the Mobile Node's Home Network: + + o When the local mobility anchor is serving a mobile node, it MUST + be able to receive packets that are sent to the mobile node's home + network. In order for it to receive those packets, it MUST + advertise a connected route in to the Routing Infrastructure for + the mobile node's home network prefix(es) or for an aggregated + prefix with a larger scope. This essentially enables IPv6 routers + in that network to detect the local mobility anchor as the last- + hop router for the mobile node's home network prefix(es). + + Forwarding Packets to the Mobile Node: + + o On receiving a packet from a correspondent node with the + destination address matching a mobile node's home network + prefix(es), the local mobility anchor MUST forward the packet + through the bi-directional tunnel set up for that mobile node. + + o The format of the tunneled packet is shown below. Considerations + from [RFC2473] MUST be applied for IPv6 encapsulation. However, + when using IPv4 transport, the format of the packet is as + described in [IPV4-PMIP6]. + + + + + + + +Gundavelli, et al. Standards Track [Page 38] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + IPv6 header (src= LMAA, dst= Proxy-CoA /* Tunnel Header */ + IPv6 header (src= CN, dst= MN-HOA ) /* Packet Header */ + Upper layer protocols /* Packet Content*/ + + Figure 10: Tunneled Packet from LMA to MAG + + o The format of the tunneled packet is shown below, when payload + protection using IPsec is enabled for the mobile node's data + traffic. However, when using IPv4 transport, the format of the + packet is as described in [IPV4-PMIP6]. + + IPv6 header (src= LMAA, dst= Proxy-CoA /* Tunnel Header */ + ESP Header in tunnel mode /* ESP Header */ + IPv6 header (src= CN, dst= MN-HoA ) /* Packet Header */ + Upper layer protocols /* Packet Content*/ + + Figure 11: Tunneled Packet from LMA to MAG with Payload Protection + + Forwarding Packets Sent by the Mobile Node: + + o All the reverse tunneled packets that the local mobility anchor + received from the mobile access gateway, after removing the tunnel + header MUST be routed to the destination specified in the inner + packet header. These routed packets will have the Source Address + field set to the mobile node's home address. Considerations from + [RFC2473] MUST be applied for IPv6 decapsulation. + +5.6.3. Explicit Congestion Notification (ECN) Considerations for Proxy + Mobile IPv6 Tunnels + + This section describes how the ECN information needs to be handled by + the mobility agents at the tunnel entry and exit points. The ECN + considerations for IP tunnels are specified in [RFC3168], and the + same considerations apply to Proxy Mobile IPv6 tunnels (using IPv6- + in-IPv6 encapsulation mode). Specifically, the full-functionality + option MUST be supported. The relevant ECN considerations from + [RFC3168] are summarized here for convenience. + + Encapsulation Considerations: + + o If the Explicit Congestion Notification (ECN) field in the inner + header is set to ECT(0) or ECT(1), where ECT stands for ECN- + Capable Transport (ECT), the ECN field from the inner header MUST + be copied to the outer header. Additionally, when payload + protection using IPsec is enabled for the mobile node's data + traffic, the ECN considerations from [RFC4301] MUST be applied. + + + + + +Gundavelli, et al. Standards Track [Page 39] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + Decapsulation Considerations: + + o If the Explicit Congestion Notification (ECN) field in the inner + header is set to ECT(0) or ECT(1), and if the ECN field in the + outer header is set to Congestion Experienced (CE), then the ECN + field in the inner header MUST be set to CE. Otherwise, the ECN + field in the inner header MUST NOT be modified. Additionally, + when payload protection using IPsec is enabled for the mobile + node's data traffic, the ECN considerations from [RFC4301] MUST be + applied. + +5.7. Local Mobility Anchor Address Discovery + + Dynamic Home Agent Address Discovery (DHAAD), as explained in Section + 10.5 of [RFC3775], allows a mobile node to discover all the home + agents on its home link by sending an ICMP Home Agent Address + Discovery Request message to the Mobile IPv6 Home Agent's anycast + address, derived from its home network prefix. + + The DHAAD message in the current form cannot be used in Proxy Mobile + IPv6 for discovering the address of the mobile node's local mobility + anchor. In Proxy Mobile IPv6, the local mobility anchor will not be + able to receive any messages sent to the Mobile IPv6 Home Agent's + anycast address corresponding to the mobile node's home network + prefix(es), as the prefix(es) is not hosted on any of its interfaces. + Further, the mobile access gateway will not predictably be able to + locate the serving local mobility anchor that has the mobile node's + binding cache entry. Hence, this specification does not support + Dynamic Home Agent Address Discovery protocol. + + In Proxy Mobile IPv6, the address of the local mobility anchor + configured to serve a mobile node can be discovered by the mobility + access gateway entity via other means. The LMA to be assigned to a + mobile node may be a configured entry in the mobile node's policy + profile, or it may be obtained through mechanisms outside the scope + of this document. + +5.8. Mobile Prefix Discovery Considerations + + This specification does not support mobile prefix discovery. The + mobile prefix discovery mechanism as specified in [RFC3775] is not + applicable to Proxy Mobile IPv6. + + + + + + + + + +Gundavelli, et al. Standards Track [Page 40] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +5.9. Route Optimization Considerations + + The Route Optimization in Mobile IPv6, as defined in [RFC3775], + enables a mobile node to communicate with a correspondent node + directly using its care-of address and further the Return Routability + procedure enables the correspondent node to have reasonable trust + that the mobile node is reachable at both its home address and + care-of address. + + This specification does not support the Route Optimization specified + in Mobile IPv6 [RFC3775]. However, this specification does support + another form of route optimization, as specified in Section 6.10.3. + +6. Mobile Access Gateway Operation + + The Proxy Mobile IPv6 protocol described in this document introduces + a new functional entity, the mobile access gateway (MAG). The mobile + access gateway is the entity that is responsible for detecting the + mobile node's movements to and from the access link and sending the + Proxy Binding Update messages to the local mobility anchor. In + essence, the mobile access gateway performs mobility management on + behalf of a mobile node. + + The mobile access gateway is a function that typically runs on an + access router. However, implementations MAY choose to split this + function and run it across multiple systems. The specifics on how + that is achieved or the signaling interactions between those + functional entities are beyond the scope of this document. + + The mobile access gateway has the following key functional roles: + + o It is responsible for detecting the mobile node's movements on the + access link and for initiating the mobility signaling with the + mobile node's local mobility anchor. + + o Emulation of the mobile node's home link on the access link by + sending Router Advertisement messages containing the mobile node's + home network prefix(es), each prefix carried using the Prefix + Information option [RFC4861]. + + o Responsible for setting up the forwarding for enabling the mobile + node to configure one or more addresses from its home network + prefix(es) and use it from the attached access link. + + + + + + + + +Gundavelli, et al. Standards Track [Page 41] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +6.1. Extensions to Binding Update List Entry Data Structure + + Every mobile access gateway MUST maintain a Binding Update List. + Each entry in the Binding Update List represents a mobile node's + mobility binding with its local mobility anchor. The Binding Update + List is a conceptual data structure, described in Section 11.1 of + [RFC3775]. + + For supporting this specification, the conceptual Binding Update List + entry data structure needs be extended with the following additional + fields. + + o The identifier of the attached mobile node, MN-Identifier. This + identifier is acquired during the mobile node's attachment to the + access link through mechanisms outside the scope of this document. + + o The link-layer identifier of the mobile node's connected + interface. This can be acquired from the received Router + Solicitation messages from the mobile node or during the mobile + node's attachment to the access network. This is typically a + link-layer identifier conveyed by the mobile node; however, the + specific details on how that is conveyed is out of scope for this + specification. If this identifier is not available, this variable + length field MUST be set to two (octets) and MUST be initialized + to a value of ALL_ZERO. + + o A list of IPv6 home network prefixes assigned to the mobile node's + connected interface. The home network prefix(es) may have been + statically configured in the mobile node's policy profile, or, may + have been dynamically allocated by the local mobility anchor. + Each of these prefix entries will also include the corresponding + prefix length. + + o The Link-local address of the mobile access gateway on the access + link shared with the mobile node. + + o The IPv6 address of the local mobility anchor serving the attached + mobile node. This address is acquired from the mobile node's + policy profile or from other means. + + o The interface identifier (if-id) of the point-to-point link + between the mobile node and the mobile access gateway. This is + internal to the mobile access gateway and is used to associate the + Proxy Mobile IPv6 tunnel to the access link where the mobile node + is attached. + + + + + + +Gundavelli, et al. Standards Track [Page 42] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + o The tunnel interface identifier (tunnel-if-id) of the bi- + directional tunnel between the mobile node's local mobility anchor + and the mobile access gateway. This is internal to the mobile + access gateway. The tunnel interface identifier is acquired + during the tunnel creation. + +6.2. Mobile Node's Policy Profile + + A mobile node's policy profile contains the essential operational + parameters that are required by the network entities for managing the + mobile node's mobility service. These policy profiles are stored in + a local or a remote policy store. The mobile access gateway and the + local mobility anchor MUST be able to obtain a mobile node's policy + profile. The policy profile MAY also be handed over to a serving + mobile access gateway as part of a context transfer procedure during + a handoff or the serving mobile access gateway MAY be able to + dynamically generate this profile. The exact details on how this + achieved is outside the scope of this document. However, this + specification requires that a mobile access gateway serving a mobile + node MUST have access to its policy profile. + + The following are the mandatory fields of the policy profile: + + o The mobile node's identifier (MN-Identifier) + + o The IPv6 address of the local mobility anchor (LMAA) + + The following are the optional fields of the policy profile: + + o The mobile node's IPv6 home network prefix(es) assigned to the + mobile node's connected interface. These prefixes have to be + maintained on a per-interface basis. There can be multiple unique + entries for each interface of the mobile node. The specific + details on how the network maintains this association between the + prefix set and the interfaces, specially during the mobility + session handoff between interfaces, is outside the scope of this + document. + + o The mobile node's IPv6 home network Prefix lifetime. This + lifetime will be the same for all the hosted prefixes on the link, + as they all are part of one mobility session. This value can also + be the same for all the mobile node's mobility sessions. + + o Supported address configuration procedures (Stateful, Stateless, + or both) for the mobile node in the Proxy Mobile IPv6 domain + + + + + + +Gundavelli, et al. Standards Track [Page 43] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +6.3. Supported Access Link Types + + This specification supports only point-to-point access link types, + and thus, it assumes that the mobile node and the mobile access + gateway are the only two nodes on the access link. The link is + assumed to have multicast capability. + + This protocol may also be used on other link types, as long as the + link is configured in such a way that it emulates point-to-point + delivery between the mobile node and the mobile access gateway for + all the protocol traffic. + + It is also necessary to be able to identify mobile nodes attaching to + the link. Requirements relating to this are covered in Section 6.6. + + Finally, while this specification can operate without link-layer + indications of node attachment and detachment to the link, the + existence of such indications either on the network or mobile node + side improves the resulting performance. + +6.4. Supported Address Configuration Modes + + A mobile node in the Proxy Mobile IPv6 domain can configure one or + more global IPv6 addresses on its interface (using Stateless, + Stateful address autoconfiguration procedures or manual address + configuration) from the hosted prefix(es) on that link. The Router + Advertisement messages sent on the access link specify the address + configuration methods permitted on that access link for that mobile + node. However, the advertised flags, with respect to the address + configuration, will be consistent for a mobile node, on any of the + access links in that Proxy Mobile IPv6 domain. Typically, these + configuration settings will be based on the domain-wide policy or + based on a policy specific to each mobile node. + + When stateless address autoconfiguration is supported on the access + link, the mobile node can generate one or more IPv6 addresses from + the hosted prefix(es) by standard IPv6 mechanisms such as Stateless + Autoconfiguration [RFC4862] or Privacy extensions [RFC4941]. + + When stateful address autoconfiguration is supported on the link, the + mobile node can obtain the address configuration from the DHCP server + located in the Proxy Mobile IPv6 domain, by standard DHCP mechanisms, + as specified in [RFC3315]. The obtained address(es) will be from its + home network prefix(es). Section 6.11 specifies the details on how + this configuration can be achieved. + + + + + + +Gundavelli, et al. Standards Track [Page 44] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + Additionally, other address configuration mechanisms specific to the + access link between the mobile node and the mobile access gateway may + also be used for delivering the address configuration to the mobile + node. This specification does not modify the behavior of any of the + standard IPv6 address configuration mechanisms. + +6.5. Access Authentication and Mobile Node Identification + + When a mobile node attaches to an access link connected to the mobile + access gateway, the deployed access security protocols on that link + SHOULD ensure that the network-based mobility management service is + offered only after authenticating and authorizing the mobile node for + that service. The exact specifics on how this is achieved or the + interactions between the mobile access gateway and the access + security service are outside the scope of this document. This + specification goes with the stated assumption of having an + established trust between the mobile node and the mobile access + gateway before the protocol operation begins. + +6.6. Acquiring Mobile Node's Identifier + + All the network entities in a Proxy Mobile IPv6 domain MUST be able + to identify a mobile node, using its MN-Identifier. This identifier + MUST be stable and unique across the Proxy Mobile IPv6 domain. The + mobility entities in the Proxy Mobile IPv6 domain MUST be able to use + this identifier in the signaling messages and unambiguously identify + a given mobile node. The following are some of the considerations + related to this MN-Identifier. + + o The MN-Identifier is typically obtained as part of the access + authentication or from a notified network attachment event. In + cases where the user identifier authenticated during access + authentication uniquely identifies a mobile node, the MN- + Identifier MAY be the same as the user identifier. However, the + user identifier MUST NOT be used if it identifies a user account + that can be used from more than one mobile node operating in the + same Proxy Mobile IPv6 domain. + + o In some cases, the obtained identifier, as part of the access + authentication, can be a temporary identifier and further that + temporary identifier may be different at each re-authentication. + However, the mobile access gateway MUST be able to use this + temporary identifier and obtain the mobile node's stable + identifier from the policy store. For instance, in AAA-based + systems, the Remote Authentication Dial-In User Service (RADIUS) + attribute, Chargeable-User-Identifier [RFC4372] may be used, as + long as it uniquely identifies a mobile node, and not a user + account that can be used with multiple mobile nodes. + + + +Gundavelli, et al. Standards Track [Page 45] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + o In some cases and for privacy reasons, the MN-Identifier that the + policy store delivers to the mobile access gateway may not be the + true identifier of the mobile node. However, the mobility access + gateway MUST be able to use this identifier in the signaling + messages exchanged with the local mobility anchor. + + o The mobile access gateway MUST be able to identify the mobile node + by its MN-Identifier, and it MUST be able to associate this + identity to the point-to-point link shared with the mobile node. + +6.7. Home Network Emulation + + One of the key functions of a mobile access gateway is to emulate the + mobile node's home network on the access link. It must ensure the + mobile node does not detect any change with respect to its layer-3 + attachment even after it changes its point of attachment in that + Proxy Mobile IPv6 domain. + + For emulating the mobile node's home link on the access link, the + mobile access gateway must be able to send Router Advertisement + messages advertising the mobile node's home network prefix(es) + carried using the Prefix Information option(s) [RFC4861] and with + other address configuration parameters consistent with its home link + properties. Typically, these configuration settings will be based on + the domain-wide policy or based on a policy specific to each mobile + node. + + Typically, the mobile access gateway learns the mobile node's home + network prefix(es) details from the received Proxy Binding + Acknowledgement message, or it may obtain them from the mobile node's + policy profile. However, the mobile access gateway SHOULD send the + Router Advertisements advertising the mobile node's home network + prefix(es) only after successfully completing the binding + registration with the mobile node's local mobility anchor. + + When advertising the home network prefix(es) in the Router + Advertisement messages, the mobile access gateway MAY set the prefix + lifetime value for the advertised prefix(es) to any chosen value at + its own discretion. An implementation MAY choose to tie the prefix + lifetime to the mobile node's binding lifetime. The prefix lifetime + can also be an optional configuration parameter in the mobile node's + policy profile. + +6.8. Link-local and Global Address Uniqueness + + A mobile node in the Proxy Mobile IPv6 domain, as it moves from one + mobile access gateway to the other, will continue to detect its home + network and does not detect a change of layer-3 attachment. Every + + + +Gundavelli, et al. Standards Track [Page 46] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + time the mobile node attaches to a new link, the event related to the + interface state change will trigger the mobile node to perform + Duplicate Address Detection (DAD) operation on the link-local and + global address(es). However, if the mobile node is Detecting Network + Attachment in IPv6 (DNAv6) enabled, as specified in [DNAV6], it may + not detect the link change due to DNAv6 optimizations and may not + trigger the duplicate address detection (DAD) procedure for its + existing addresses, which may potentially lead to address collisions + after the mobile node's handoff to a new link. + + The issue of address collision is not relevant to the mobile node's + global address(es). Since the assigned home network prefix(es) are + for the mobile node's exclusive usage, no other node shares an + address (other than Subnet-Router anycast address that is configured + by the mobile access gateway) from the prefix(es), and so the + uniqueness for the mobile node's global address is assured on the + access link. + + The issue of address collision is however relevant to the mobile + node's link-local addresses since the mobile access gateway and the + mobile node will have link-local addresses configured from the same + link-local prefix (FE80::/64). This leaves a room for link-local + address collision between the two neighbors (i.e., the mobile node + and the mobile access gateway) on that access link. For solving this + problem, this specification requires that the link-local address that + the mobile access gateway configures on the point-to-point link + shared with a given mobile node be generated by the local mobility + anchor and be stored in the mobile node's Binding Cache entry. This + address will not change for the duration of that mobile node's + mobility session and can be provided to the serving mobile access + gateway at every mobile node's handoff, as part of the Proxy Mobile + IPv6 signaling messages. The specific method by which the local + mobility anchor generates the link-local address is out of scope for + this specification. + + It is highly desirable that the access link on the mobile access + gateway shared with the mobile node be provisioned in such a way that + before the mobile node completes the DAD operation [RFC4862] on its + link-local address, the mobile access gateway on that link is aware + of its own link-local address provided by the local mobility anchor + that it needs to use on that access link. This essentially requires + a successful completion of the Proxy Mobile IPv6 signaling by the + mobile access gateway before the mobile node completes the DAD + operation. This can be achieved by ensuring that link-layer + attachment does not complete until the Proxy Mobile IPv6 signaling is + + + + + + +Gundavelli, et al. Standards Track [Page 47] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + completed. Alternatively, network and local mobility anchor capacity + and signaling retransmission timers can be provisioned in such a way + that signaling is likely to complete during the default waiting + period associated with the DAD process. + + Optionally, implementations MAY choose to configure a fixed link- + local address across all the access links in a Proxy Mobile IPv6 + domain and without a need for carrying this address from the local + mobility anchor to the mobile access gateway in the Proxy Mobile IPv6 + signaling messages. The configuration variable + FixedMAGLinkLocalAddressOnAllAccessLinks determines the enabled mode + in that Proxy Mobile IPv6 domain. + +6.9. Signaling Considerations + +6.9.1. Binding Registrations + +6.9.1.1. Mobile Node Attachment and Initial Binding Registration + + 1. After detecting a new mobile node on its access link, the mobile + access gateway MUST identify the mobile node and acquire its MN- + Identifier. If it determines that the network-based mobility + management service needs to be offered to the mobile node, it + MUST send a Proxy Binding Update message to the local mobility + anchor. + + 2. The Proxy Binding Update message MUST include the Mobile Node + Identifier option [RFC4283], carrying the MN-Identifier for + identifying the mobile node. + + 3. The Home Network Prefix option(s) MUST be present in the Proxy + Binding Update message. If the mobile access gateway learns the + mobile node's home network prefix(es) either from its policy + store or from other means, the mobile access gateway MAY choose + to request the local mobility anchor to allocate the specific + prefix(es) by including a Home Network Prefix option for each of + those requested prefixes. The mobile access gateway MAY also + choose to include just one Home Network Prefix option with the + prefix value of ALL_ZERO, for requesting the local mobility + anchor to do the prefix assignment. However, when including a + Home Network Prefix option with the prefix value of ALL_ZERO, + there MUST be only one instance of the Home Network prefix + option in the request. + + 4. The Handoff Indicator option MUST be present in the Proxy + Binding Update message. The Handoff Indicator field in the + Handoff Indicator option MUST be set to a value indicating the + handoff hint. + + + +Gundavelli, et al. Standards Track [Page 48] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + * The Handoff Indicator field MUST be set to a value of 1 + (Attachment over a new interface) if the mobile access + gateway determines (under the Handoff Indicator + considerations specified in this section) that the mobile + node's current attachment to the network over this interface + is not as a result of a handoff of an existing mobility + session (over the same interface or through a different + interface), but as a result of an attachment over a new + interface. This essentially serves as a request to the local + mobility anchor to create a new mobility session and not + update any existing Binding Cache entry created for the same + mobile node connected to the Proxy Mobile IPv6 domain through + a different interface. + + * The Handoff Indicator field MUST be set to a value of 2 + (Handoff between two different interfaces of the mobile node) + if the mobile access gateway definitively knows the mobile + node's current attachment is due to a handoff of an existing + mobility session between two different interfaces of the + mobile node. + + * The Handoff Indicator field MUST be set to a value of 3 + (Handoff between mobile access gateways for the same + interface) if the mobile access gateway definitively knows + the mobile node's current attachment is due to a handoff of + an existing mobility session between two mobile access + gateways and for the same interface of the mobile node. + + * The Handoff Indicator field MUST be set to a value of 4 + (Handoff state unknown) if the mobile access gateway cannot + determine if the mobile node's current attachment is due to a + handoff of an existing mobility session. + + 5. The mobile access gateway MUST apply the below considerations + when choosing the value for the Handoff Indicator field. + + * The mobile access gateway can choose to use the value 2 + (Handoff between two different interfaces of the mobile + node), only when it knows that the mobile node has, on + purpose, switched from one interface to another, and the + previous interface is going to be disabled. It may know this + due to a number of factors. For instance, most cellular + networks have controlled handovers where the network knows + that the host is moving from one attachment to another. In + this situation, the link-layer mechanism can inform the + mobility functions that this is indeed a movement, not a new + attachment. + + + + +Gundavelli, et al. Standards Track [Page 49] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + * Some link layers have link-layer identifiers that can be used + to distinguish (a) the movement of a particular interface to + a new attachment from (b) the attachment of a new interface + from the same host. Option value 3 (Handoff between mobile + access gateways for the same interface) is appropriate in + case (a) and a value of 1 (Attachment over a new interface) + in case (b). + + * The mobile access gateway MUST NOT set the option value to 2 + (Handoff between two different interfaces of the mobile node) + or 3 (Handoff between mobile access gateways for the same + interface) if it cannot be determined that the mobile node + can move the address between the interfaces involved in the + handover or that it is the same interface that has moved. + Otherwise, Proxy Mobile IPv6-unaware hosts that have multiple + physical interfaces to the same domain may suffer unexpected + failures. + + * Where no support from the link layer exists, the host and the + network would need to inform each other about the intended + movement. The Proxy Mobile IPv6 protocol does not specify + this and simply requires that knowledge about movements can + be derived either from the link-layer or from somewhere else. + The method by which this is accomplished is outside the scope + of this specification. + + 6. Either the Timestamp option or a valid sequence number + maintained on a per mobile node's mobility session basis as + specified in [RFC3775] (if the Sequence-Number-based scheme is + in use) MUST be present. This can be determined based on the + value of the configuration flag TimestampBasedApproachInUse. + When Timestamp option is added to the message, the mobile access + gateway SHOULD also set the Sequence Number field to a value of + a monotonically increasing counter (maintained at each mobile + access gateway and not to be confused with the per mobile node + sequence number specified in [RFC3775]). The local mobility + anchor will ignore this field when there is a Timestamp option + present in the request, but will return the same value in the + Proxy Binding Acknowledgement message. This will be useful for + matching the reply to the request message. + + 7. The Mobile Node Link-layer Identifier option carrying the link- + layer identifier of the currently attached interface MUST be + present in the Proxy Binding Update message, if the mobile + access gateway is aware of the same. If the link-layer + identifier of the currently attached interface is not known or + if the identifier value is ALL_ZERO, this option MUST NOT be + present. + + + +Gundavelli, et al. Standards Track [Page 50] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + 8. The Access Technology Type option MUST be present in the Proxy + Binding Update message. The access technology type field in the + option SHOULD be set to the type of access technology by which + the mobile node is currently attached to the mobile access + gateway. + + 9. The Link-local Address option MUST be present in the Proxy + Binding Update message only if the value of the configuration + variable FixedMAGLinkLocalAddressOnAllAccessLinks is set to a + value of ALL_ZERO; otherwise, the Link-local Address option MUST + NOT be present in the request. Considerations from Section 6.8 + MUST be applied when using the Link-local Address option. + + * For querying the local mobility anchor to provide the link- + local address that it should use on the point-to-point link + shared with the mobile node, this option MUST be set to + ALL_ZERO value. This essentially serves as a request to the + local mobility anchor to provide the link-local address that + it can use on the access link shared with the mobile node. + + 10. The Proxy Binding Update message MUST be constructed as + specified in Section 6.9.1.5. + + 11. If there is no existing Binding Update List entry for that + mobile node, the mobile access gateway MUST create a Binding + Update List entry for the mobile node upon sending the Proxy + Binding Update message. + +6.9.1.2. Receiving Proxy Binding Acknowledgement + + On receiving a Proxy Binding Acknowledgement message (format + specified in Section 8.2) from the local mobility anchor, the mobile + access gateway MUST process the message as specified below. + + 1. The received Proxy Binding Acknowledgement message (a Binding + Acknowledgement message with the (P) flag set to value of 1) + MUST be authenticated as described in Section 4. When IPsec is + used for message authentication, the SPI in the IPsec header + [RFC4306] of the received packet is needed for locating the + security association, for authenticating the Proxy Binding + Acknowledgement message. + + 2. The mobile access gateway MUST observe the rules described in + Section 9.2 of [RFC3775] when processing Mobility Headers in the + received Proxy Binding Acknowledgement message. + + + + + + +Gundavelli, et al. Standards Track [Page 51] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + 3. The mobile access gateway MUST apply the considerations + specified in Section 5.5 for processing the Sequence Number + field and the Timestamp option (if present) in the message. + + 4. The mobile access gateway MUST ignore any checks, specified in + [RFC3775], related to the presence of a Type 2 Routing header in + the Proxy Binding Acknowledgement message. + + 5. The mobile access gateway MAY use the mobile node identifier + present in the Mobile Node Identifier option for matching the + response to the request messages that it sent recently. + However, if there is more than one request message in its + request queue for the same mobile node, the sequence number + field can be used for identifying the exact message from those + messages. There are other ways to achieve this and + implementations are free to adopt the best approach that suits + their implementation. Additionally, if the received Proxy + Binding Acknowledgement message does not match any of the Proxy + Binding Update messages that it sent recently, the message MUST + be ignored. + + 6. If the received Proxy Binding Acknowledgement message has any + one or more of the following options, Handoff Indicator option, + Access Technology Type option, Mobile Node Link-layer Identifier + option, Mobile Node Identifier option, carrying option values + that are different from the option values present in the + corresponding request (Proxy Binding Update) message, the + message MUST be ignored as the local mobility anchor is expected + to echo back all these listed options and with the same option + values in the reply message. In this case, the mobile access + gateway MUST NOT retransmit the Proxy Binding Update message + until an administrative action is taken. + + 7. If the received Proxy Binding Acknowledgement message has the + Status field value set to PROXY_REG_NOT_ENABLED (Proxy + registration not enabled for the mobile node), the mobile access + gateway SHOULD NOT send a Proxy Binding Update message again for + that mobile node until an administrative action is taken. It + MUST deny the mobility service to that mobile node. + + 8. If the received Proxy Binding Acknowledgement message has the + Status field value set to TIMESTAMP_LOWER_THAN_PREV_ACCEPTED + (Timestamp value lower than previously accepted value), the + mobile access gateway SHOULD try to register again to reassert + the mobile node's presence on its access link. The mobile + access gateway is not specifically required to synchronize its + clock upon receiving this error code. + + + + +Gundavelli, et al. Standards Track [Page 52] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + 9. If the received Proxy Binding Acknowledgement message has the + Status field value set to TIMESTAMP_MISMATCH (Invalid timestamp + value), the mobile access gateway SHOULD try to register again + only after it has synchronized its clock to a common time source + that is used by all the mobility entities in that domain for + their clock synchronization. The mobile access gateway SHOULD + NOT synchronize its clock to the local mobility anchor's system + clock, based on the timestamp present in the received message. + + 10. If the received Proxy Binding Acknowledgement message has the + Status field value set to NOT_AUTHORIZED_FOR_HOME_NETWORK_PREFIX + (The mobile node is not authorized for one or more of the + requesting home network prefixes), the mobile access gateway + SHOULD NOT request the same prefix(es) again, but MAY request + the local mobility anchor to do the assignment of prefix(es) by + including only one Home Network Prefix option with the prefix + value set to ALL_ZERO. + + 11. If the received Proxy Binding Acknowledgement message has the + Status field value set to any value greater than or equal to 128 + (i.e., if the binding is rejected), the mobile access gateway + MUST NOT advertise the mobile node's home network prefix(es) in + the Router Advertisement messages sent on that access link and + MUST deny the mobility service to the mobile node by not + forwarding any packets received from the mobile node using an + address from the home network prefix(es). It MAY also tear down + the point-to-point link shared with the mobile node. + + 12. If the received Proxy Binding Acknowledgement message has the + Status field value set to 0 (Proxy Binding Update accepted), the + mobile access gateway MUST establish a bi-directional tunnel to + the local mobility anchor (if there is no existing bi- + directional tunnel to that local mobility anchor). + Considerations from Section 5.6.1 MUST be applied for managing + the dynamically created bi-directional tunnel. + + 13. The mobile access gateway MUST set up the route for forwarding + the packets received from the mobile node using address(es) from + its home network prefix(es) through the bi-directional setup for + that mobile node. The created tunnel and the routing state MUST + result in the forwarding behavior on the mobile access gateway + as specified in Section 6.10.5. + + 14. The mobile access gateway MUST also update the Binding Update + List entry to reflect the accepted binding registration values. + It MUST also advertise the mobile node's home network prefix(es) + as the hosted on-link prefixes, by including them in the Router + Advertisement messages that it sends on that access link. + + + +Gundavelli, et al. Standards Track [Page 53] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + 15. If the received Proxy Binding Acknowledgement message has the + address in the Link-local Address option set to a NON_ZERO + value, the mobile access gateway SHOULD configure that link- + local address on that point-to-point link and SHOULD NOT + configure any other link-local address without performing a DAD + operation [RFC4862]. This will avoid any potential link-local + address collisions on that access link. However, if the link- + local address generated by the local mobility anchor happens to + be already in use by the mobile node on that link, the mobile + access gateway MUST NOT use that address, but SHOULD configure a + different link-local address. It SHOULD also upload this link- + local address to the local mobility anchor by immediately + sending a Proxy Binding Update message and by including this + address in the Link-local Address option. + +6.9.1.3. Extending Binding Lifetime + + 1. For extending the lifetime of a currently registered mobile node + (i.e., after a successful initial binding registration from the + same mobile access gateway), the mobile access gateway can send a + Proxy Binding Update message to the local mobility anchor with a + new lifetime value. This re-registration message MUST be + constructed with the same set of options as the initial Proxy + Binding Update message, under the considerations specified in + Section 6.9.1.1. However, the following exceptions apply. + + 2. There MUST be a Home Network Prefix option for each of the + assigned home network prefixes assigned for that mobility session + and with the prefix value in the option set to that respective + prefix value. + + 3. The Handoff Indicator field in the Handoff Indicator option MUST + be set to a value of 5 (Handoff state not changed - Re- + Registration). + +6.9.1.4. Mobile Node Detachment and Binding De-Registration + + 1. If at any point the mobile access gateway detects that the mobile + node has moved away from its access link, or if it decides to + terminate the mobile node's mobility session, it SHOULD send a + Proxy Binding Update message to the local mobility anchor with + the lifetime value set to zero. This de-registration message + MUST be constructed with the same set of options as the initial + Proxy Binding Update message, under the considerations specified + in Section 6.9.1.1. However, the following exceptions apply. + + + + + + +Gundavelli, et al. Standards Track [Page 54] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + 2. There MUST be a Home Network Prefix option for each of the + assigned home network prefixes assigned for that mobility session + and with the prefix value in the option set to the respective + prefix value. + + 3. The Handoff Indicator field in the Handoff Indicator option MUST + be set to a value of 4 (Handoff state unknown). + + Either upon receipt of a Proxy Binding Acknowledgement message from + the local mobility anchor with the Status field set to 0 (Proxy + Binding Update Accepted), or after INITIAL_BINDACK_TIMEOUT [RFC3775] + timeout waiting for the reply, the mobile access gateway MUST do the + following: + + 1. It MUST remove the Binding Update List entry for the mobile node + from its Binding Update List. + + 2. It MUST remove the created routing state for tunneling the mobile + node's traffic. + + 3. If there is a dynamically created tunnel to the mobile node's + local mobility anchor and if there are not other mobile nodes for + which the tunnel is being used, then the tunnel MUST be deleted. + + 4. It MUST tear down the point-to-point link shared with the mobile + node. This action will force the mobile node to remove any IPv6 + address configuration on the interface connected to this point- + to-point link. + +6.9.1.5. Constructing the Proxy Binding Update Message + + o The mobile access gateway, when sending the Proxy Binding Update + message to the local mobility anchor, MUST construct the message + as specified below. + + IPv6 header (src=Proxy-CoA, dst=LMAA) + Mobility header + - BU /* P & A flags MUST be set to value 1 */ + Mobility Options + - Mobile Node Identifier option (mandatory) + - Home Network Prefix option(s) (mandatory) + - Handoff Indicator option (mandatory) + - Access Technology Type option (mandatory) + - Timestamp option (optional) + - Mobile Node Link-layer Identifier option (optional) + - Link-local Address option (optional) + + Figure 12: Proxy Binding Update Message Format + + + +Gundavelli, et al. Standards Track [Page 55] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + o The Source Address field in the IPv6 header of the message MUST be + set to the global address configured on the egress interface of + the mobile access gateway. When there is no Alternate Care-of + Address option present in the request, this address will be + considered as the Proxy-CoA for this Proxy Binding Update message. + However, when there is an Alternate Care-of Address option present + in the request, this address will be not be considered as the + Proxy-CoA, but the address in the Alternate Care-of Address option + will be considered as the Proxy-CoA. + + o The Destination Address field in the IPv6 header of the message + MUST be set to the local mobility anchor address. + + o The Mobile Node Identifier option [RFC4283] MUST be present. + + o At least one Home Network Prefix option MUST be present. + + o The Handoff Indicator option MUST be present. + + o The Access Technology Type option MUST be present. + + o The Timestamp option MAY be present. + + o The Mobile Node Link-layer Identifier option MAY be present. + + o The Link-local Address option MAY be present. + + o If IPsec is used for protecting the signaling messages, the + message MUST be protected, using the security association existing + between the local mobility anchor and the mobile access gateway. + + o Unlike in Mobile IPv6 [RFC3775], the Home Address option [RFC3775] + MUST NOT be present in the IPv6 Destination Options extension + header of the Proxy Binding Update message. + +6.9.2. Router Solicitation Messages + + A mobile node may send a Router Solicitation message on the access + link shared with the mobile access gateway. The Router Solicitation + message that the mobile node sends is as specified in [RFC4861]. The + mobile access gateway, on receiving the Router Solicitation message + or before sending a Router Advertisement message, MUST apply the + following considerations. + + 1. The mobile access gateway, on receiving the Router Solicitation + message, SHOULD send a Router Advertisement message containing + the mobile node's home network prefix(es) as the on-link + prefix(es). However, before sending the Router Advertisement + + + +Gundavelli, et al. Standards Track [Page 56] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + message containing the mobile node's home network prefix(es), it + SHOULD complete the binding registration process with the mobile + node's local mobility anchor. + + 2. If the local mobility anchor rejects the Proxy Binding Update + message, or, if the mobile access gateway failed to complete the + binding registration process for whatever reason, the mobile + access gateway MUST NOT advertise the mobile node's home network + prefix(es) in the Router Advertisement messages that it sends on + the access link. However, it MAY choose to advertise a local + visited network prefix to enable the mobile node for regular IPv6 + access. + + 3. The mobile access gateway SHOULD add the MTU option, as specified + in [RFC4861], to the Router Advertisement messages that it sends + on the access link. This will ensure the mobile node on the link + uses the advertised MTU value. The MTU value SHOULD reflect the + tunnel MTU for the bi-directional tunnel between the mobile + access gateway and the local mobility anchor. Considerations + from Section 6.9.5 SHOULD be applied for determining the tunnel + MTU value. + +6.9.3. Default-Router + + In Proxy Mobile IPv6, the mobile access gateway is the IPv6 default- + router for the mobile node on the access link. However, as the + mobile node moves from one access link to another, the serving mobile + access gateway on those respective links will send the Router + Advertisement messages. If these Router Advertisements are sent + using a different link-local address or a different link-layer + address, the mobile node will always detect a new default-router + after every handoff. For solving this problem, this specification + requires all the mobile access gateways in the Proxy Mobile IPv6 + domain to use the same link-local and link-layer address on any of + the access links wherever the mobile node attaches. These addresses + can be fixed addresses across the entire Proxy Mobile IPv6 domain, + and all the mobile access gateways can use these globally fixed + address on any of the point-to-point links. The configuration + variables FixedMAGLinkLocalAddressOnAllAccessLinks and + FixedMAGLinkLayerAddressOnAllAccessLinks SHOULD be used for this + purpose. Additionally, this specification allows the local mobility + anchor to generate the link-local address and provide it to the + mobile access gateway as part of the signaling messages. + + However, both of these approaches (a link-local address generated by + the local mobility anchor or when using a globally fixed link-local + address) have implications on the deployment of SEcure Neighbor + Discovery (SEND) [RFC3971]. In SEND, routers have certificates and + + + +Gundavelli, et al. Standards Track [Page 57] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + public key pairs, and their Router Advertisements are signed with the + private keys of these key pairs. When a number of different routers + use the same addresses, the routers either all have to be able to + construct these signatures for the same key pair, or the used key + pair and the router's cryptographic identity must change after a + movement. Both approaches are problematic. Sharing of private key + information across multiple nodes in a PMIP6 domain is poor design + from a security perspective. And changing even the cryptographic + identity of the router goes against the general idea of the Proxy + Mobile IPv6 being as invisible to the hosts as possible. + + There is, however, ongoing work in the IETF to revise the SEND + specifications. It is suggested that these revisions also address + the above problem. Other revisions are needed to deal with other + problematic cases (such as Neighbor Discovery proxies) before wide- + spread deployment of SEND. + +6.9.4. Retransmissions and Rate Limiting + + The mobile access gateway is responsible for retransmissions and rate + limiting the Proxy Binding Update messages that it sends to the local + mobility anchor. The Retransmission and the Rate Limiting rules are + as specified in [RFC3775]. However, the following considerations + MUST be applied. + + 1. When the mobile access gateway sends a Proxy Binding Update + message, it should use the constant, INITIAL_BINDACK_TIMEOUT + [RFC3775], for configuring the retransmission timer, as specified + in Section 11.8 [RFC3775]. However, the mobile access gateway is + not required to use a longer retransmission interval of + InitialBindackTimeoutFirstReg, as specified in [RFC3775], for the + initial Proxy Binding Update message. + + 2. If the mobile access gateway fails to receive a valid matching + response for a registration or re-registration message within the + retransmission interval, it SHOULD retransmit the message until a + response is received. However, the mobile access gateway MUST + ensure the mobile node is still attached to the connected link + before retransmitting the message. + + 3. As specified in Section 11.8 of [RFC3775], the mobile access + gateway MUST use an exponential back-off process in which the + timeout period is doubled upon each retransmission, until either + the node receives a response or the timeout period reaches the + value MAX_BINDACK_TIMEOUT [RFC3775]. The mobile access gateway + MAY continue to send these messages at this slower rate + indefinitely. + + + + +Gundavelli, et al. Standards Track [Page 58] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + 4. If the Timestamp-based scheme is in use, the retransmitted Proxy + Binding Update messages MUST use the latest timestamp. If the + Sequence Number scheme is in use, the retransmitted Proxy Binding + Update messages MUST use a Sequence Number value greater than + that was used for the previous transmission of this Proxy Binding + Update message, just as specified in [RFC3775]. + +6.9.5. Path MTU Discovery + + It is important that mobile node, mobile access gateway, and local + mobility anchor have a correct understanding of MTUs. When the + mobile node uses the correct MTU, it can send packets that do not + exceed the local link MTU and do not cause the tunneled packets from + the mobile access gateway to be fragmented. This is important both + from the perspective of efficiency, as well as preventing hard-to- + diagnose MTU problems. The following are some of the considerations + related to Path MTU discovery. + + o The local mobility anchor and mobile access gateway MAY use the + Path MTU discovery mechanisms, as specified in [RFC1981] or in + [RFC4821], for determining the Path MTU (PMTU) for the (LMA-MAG) + paths. The specific discovery mechanism to be used in a given + deployment can be configurable. + + o The mobility entities MUST implement and SHOULD support ICMP-based + Path MTU discovery mechanism, as specified in [RFC1981]. However, + this mechanism may not work correctly if the Proxy Mobile IPv6 + network does not deliver or process ICMP Packet Too Big messages. + + o The mobility entities MAY implement Packetization Layer Path MTU + discovery mechanisms, as specified in [RFC4821], and use any + application traffic as a payload for the PMTU discovery. Neither + the Proxy Mobile IPv6 protocol or the tunnel between the mobile + access gateway and local mobility agent can easily be used for + this purpose. However, implementations SHOULD support at least + the use of an explicit ICMP Echo Request/Response for this + purpose. + + o The mobility entities MAY choose to perform Path MTU discovery for + all the (LMA-MAG) paths at the boot time and may repeat this + operation periodically to ensure the Path MTU values have not + changed for those paths. If the dynamic PMTU discovery mechanisms + fail to determine the Path MTU, an administratively configured + default value MUST be used. + + + + + + + +Gundavelli, et al. Standards Track [Page 59] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + o The IPv6 tunnel MTU for an established tunnel between the local + mobility anchor and the mobile access gateway MUST be computed + based on the determined Path MTU value for that specific path and + the computation should be as specified in Section 6.7 of + [RFC2473]. + + o The mobile access gateway SHOULD use the determined tunnel Path + MTU value (for the tunnel established with the mobile node's local + mobility anchor) as the MTU value in the MTU option that it sends + in the Router Advertisements on the access link shared with the + mobile node. But, if the MTU value of the access link shared with + the mobile node is lower than the determined Path MTU value, then + the MTU of the access link MUST be used in the MTU option. + + o If the mobile access gateway detects a change in the MTU value for + any of the paths (LMA-MAG) and at any point of time, the + corresponding tunnel MTU value MUST be updated to reflect the + change in Path MTU value. The adjusted tunnel MTU value (lower of + the Path MTU and the access link MTU) SHOULD be notified to the + impacted mobile nodes by sending additional Router Advertisement + messages. Additionally, the adjusted tunnel MTU value MUST be + used in all the subsequent Router Advertisement messages as well. + +6.10. Routing Considerations + + This section describes how the mobile access gateway handles the + traffic to/from the mobile node that is attached to one of its access + interfaces. + + Proxy-CoA LMAA + | | + +--+ +---+ +---+ +--+ + |MN|----------|MAG|======================|LMA|----------|CN| + +--+ +---+ +---+ +--+ + IPv6 Tunnel + + Figure 13: Proxy Mobile IPv6 Tunnel + +6.10.1. Transport Network + + As per this specification, the transport network between the local + mobility anchor and the mobile access gateway is an IPv6 network. + The document [IPV4-PMIP6] specifies the required extensions for + negotiating IPv4 transport and the corresponding encapsulation mode. + + + + + + + +Gundavelli, et al. Standards Track [Page 60] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +6.10.2. Tunneling and Encapsulation Modes + + An IPv6 address that a mobile node uses from its home network + prefix(es) is topologically anchored at the local mobility anchor. + For a mobile node to use this address from an access network attached + to a mobile access gateway, proper tunneling techniques have to be in + place. Tunneling hides the network topology and allows the mobile + node's IPv6 datagram to be encapsulated as a payload of another IPv6 + packet and to be routed between the local mobility anchor and the + mobile access gateway. The Mobile IPv6 base specification [RFC3775] + defines the use of IPv6-over-IPv6 tunneling [RFC2473] between the + home agent and the mobile node, and this specification extends the + use of the same tunneling mechanism for use between the local + mobility anchor and the mobile access gateway. + + On most operating systems, a tunnel is implemented as a virtual + point-to-point interface. The source and the destination address of + the two endpoints of this virtual interface along with the + encapsulation mode are specified for this virtual interface. Any + packet that is routed over this interface gets encapsulated with the + outer header as specified for that point-to-point tunnel interface. + + For creating a point-to-point tunnel to any local mobility anchor, + the mobile access gateway may implement a tunnel interface with the + Source Address field set to a global address on its egress interface + (Proxy-CoA) and the destination address field set to the global + address of the local mobility anchor (LMAA). + + The following is the supported packet encapsulation mode that can be + used by the mobile access gateway and the local mobility anchor for + routing mobile node's IPv6 datagrams. + + o IPv6-In-IPv6 - IPv6 datagram encapsulated in an IPv6 packet + [RFC2473]. + + The companion document [IPV4-PMIP6] specifies other encapsulation + modes for supporting IPv4 transport. + + o IPv6-In-IPv4 - IPv6 datagram encapsulation in an IPv4 packet. The + details on how this mode is negotiated are specified in + [IPV4-PMIP6]. + + o IPv6-In-IPv4-UDP - IPv6 datagram encapsulation in an IPv4 UDP + packet. This mode is specified in [IPV4-PMIP6]. + + o IPv6-In-IPv4-UDP-TLV - IPv6 datagram encapsulation in an IPv4 UDP + packet with a TLV header. This mode is specified in [IPV4-PMIP6]. + + + + +Gundavelli, et al. Standards Track [Page 61] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +6.10.3. Local Routing + + If there is data traffic between a visiting mobile node and a + correspondent node that is locally attached to an access link + connected to the mobile access gateway, the mobile access gateway MAY + optimize on the delivery efforts by locally routing the packets and + by not reverse tunneling them to the mobile node's local mobility + anchor. The flag EnableMAGLocalRouting MAY be used for controlling + this behavior. However, in some systems, this may have an + implication on the mobile node's accounting and policy enforcement as + the local mobility anchor is not in the path for that traffic and it + will not be able to apply any traffic policies or do any accounting + for those flows. + + This decision of path optimization SHOULD be based on the policy + configured on the mobile access gateway, but enforced by the mobile + node's local mobility anchor. The specific details on how this is + achieved are beyond of the scope of this document. + +6.10.4. Tunnel Management + + All the considerations mentioned in Section 5.6.1 for the tunnel + management on the local mobility anchor apply for the mobile access + gateway as well. + +6.10.5. Forwarding Rules + + Forwarding Packets Sent to the Mobile Node's Home Network: + + o On receiving a packet from the bi-directional tunnel established + with the mobile node's local mobility anchor, the mobile access + gateway MUST use the destination address of the inner packet for + forwarding it on the interface where the destination network + prefix is hosted. The mobile access gateway MUST remove the outer + header before forwarding the packet. Considerations from + [RFC2473] MUST be applied for IPv6 decapsulation. If the mobile + access gateway cannot find the connected interface for that + destination address, it MUST silently drop the packet. For + reporting an error in such a scenario, in the form of an ICMP + control message, the considerations from [RFC2473] MUST be + applied. + + o On receiving a packet from a correspondent node that is connected + to the mobile access gateway as a regular IPv6 host (see Section + 6.14) destined to a mobile node that is also locally attached, the + mobile access gateway MUST check the flag EnableMAGLocalRouting to + determine if the packet can be delivered directly to the mobile + node. If the mobile access gateway is not allowed to route the + + + +Gundavelli, et al. Standards Track [Page 62] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + packet directly, it MUST route the packet towards the local + mobility anchor where the destination address is topologically + anchored, else it can route the packet directly to the mobile + node. + + Forwarding Packets Sent by the Mobile Node: + + o On receiving a packet from a mobile node connected to its access + link, the mobile access gateway MUST ensure that there is an + established binding for that mobile node with its local mobility + anchor before forwarding the packet directly to the destination or + before tunneling the packet to the mobile node's local mobility + anchor. + + o On receiving a packet from a mobile node connected to its access + link for a destination that is locally connected, the mobile + access gateway MUST check the flag EnableMAGLocalRouting, to + ensure the mobile access gateway is allowed to route the packet + directly to the destination. If the mobile access gateway is not + allowed to route the packet directly, it MUST route the packet + through the bi-directional tunnel established between itself and + the mobile node's local mobility anchor. Otherwise, it MUST route + the packet directly to the destination. + + o On receiving a packet from a mobile node connected to its access + link, to a destination that is not directly connected, the packet + MUST be forwarded to the local mobility anchor through the bi- + directional tunnel established between itself and the mobile + node's local mobility anchor. However, the packets that are sent + with the link-local source address MUST NOT be forwarded. + + o The format of the tunneled packet is shown below. Considerations + from [RFC2473] MUST be applied for IPv6 encapsulation. However, + when using IPv4 transport, the format of the tunneled packet is as + described in [IPV4-PMIP6]. + + IPv6 header (src= Proxy-CoA, dst= LMAA /* Tunnel Header */ + IPv6 header (src= MN-HoA, dst= CN ) /* Packet Header */ + Upper layer protocols /* Packet Content*/ + + Figure 14: Tunneled Packet from MAG to LMA + + o The format of the tunneled packet is shown below, when payload + protection using IPsec is enabled for the mobile node's data + traffic. However, when using IPv4 transport, the format of the + packet is as described in [IPV4-PMIP6]. + + + + + +Gundavelli, et al. Standards Track [Page 63] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + IPv6 header (src= Proxy-CoA, dst= LMAA /* Tunnel Header */ + ESP Header in tunnel mode /* ESP Header */ + IPv6 header (src= MN-HoA, dst= CN ) /* Packet Header */ + Upper layer protocols /* Packet Content*/ + + Figure 15: Tunneled Packet from MAG to LMA with Payload Protection + +6.11. Supporting DHCP-Based Address Configuration on the Access Link + + This section explains how Stateful Address Configuration using DHCP + support can be enabled in a Proxy Mobile IPv6 domain. It also + identifies the required configuration in DHCP and mobility + infrastructures for supporting this address configuration mode and + also identifies the protocol interactions between these two systems. + + o For supporting Stateful Address Configuration using DHCP, the DHCP + relay agent [RFC3315] service MUST be supported on all the mobile + access gateways in the Proxy Mobile IPv6 domain. Further, as + specified in Section 20 of [RFC3315], the DHCP relay agent should + be configured to use a list of destination addresses, which MAY + include unicast addresses, the All_DHCP_Servers multicast address, + or other addresses as required in a given deployment. + + o The DHCP infrastructure needs to be configured to assign addresses + from each of the prefixes assigned to a link in that Proxy Mobile + IPv6 domain. The DHCP relay agent indicates the link to which the + mobile node is attached by including an IPv6 address from any of + the prefixes assigned to that link in the link-address field of + the Relay Forward message. Therefore, for each link in the Mobile + IPv6 domain, the DHCP infrastructure will: + + * be configured with a list of all of the prefixes associated + with that link; + + * identify the link to which the mobile node is attached by + looking up the prefix for the link-address field in the Relay + Forward message in the list of prefixes associated with each + link; + + * assign to the host an address from each prefix associated with + the link to which the mobile node is attached. + + This DHCP infrastructure configuration requirement is identical to + other IPv6 networks; other than receiving DHCP messages from a + mobile node through different relay agents (MAGs) over time, the + DHCP infrastructure will be unaware of the mobile node's + capability with respect to mobility support. + + + + +Gundavelli, et al. Standards Track [Page 64] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + o The local mobility anchor needs to have the same awareness with + respect to the links along with the associated prefixes in a Proxy + Mobile IPv6 domain. When a local mobility anchor assigns + prefix(es) to a mobile node, it MUST assign all the prefixes + associated with a given link and all of those assigned prefixes + will remain as the home network prefixes for that mobile node + throughout the life of that mobility session. The serving mobile + access gateway that hosts these prefixes is physically connected + to that link and can function as the DHCP relay agent. This + common understanding between DHCP and mobility entities about all + the links in the domain along with the associated prefixes + provides the required coordination for allowing mobility entities + to perform prefix assignment dynamically to a mobile node and + still allow the DHCP infrastructure to perform address assignment + for that mobile node only from its home network prefixes. + + o When a mobile node sends a DHCP request message, the DHCP relay + agent function on the mobile access gateway will set the link- + address field in the DHCP message to an address in the mobile + node's home network prefix (any one of the mobile node's home + network prefixes assigned to that mobile node's attached + interface). The mobile access gateway can generate an + autoconfiguration address from one of the mobile node's home + network prefixes [RFC4862] and can use this address link-address + option, so as to provide a hint to the DHCP Server for the link + identification. The DHCP server, on receiving the request from + the mobile node, will allocate addresses from all the prefixes + associated with that link (identified using the link-address field + of the request). + + o Once the mobile node obtains address(es), moves to a different + link, and sends a DHCP request (at any time) for extending the + DHCP lease, the DHCP relay agent on the new link will set the + link-address field in the DHCP Relay Forward message to one of the + mobile node's home network prefixes. The DHCP server will + identify the client from the Client-DUID option and will identify + the link from the link-address option present in the request and + will allocate the same address(es) as before. + + o For correct operation of the model of network-based mobility + management in which the host does not participate in any mobility + management, the mobile node MUST always be assigned an identical + set of IPv6 addresses regardless of the access link to which the + mobile node is attached. For example, the mobile access gateways + + + + + + + +Gundavelli, et al. Standards Track [Page 65] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + in the Proxy Mobile IPv6 domain should be configured so that DHCP + messages from a mobile node will always be handled by the same + DHCP server or by a server from the same group of coordinated DHCP + servers serving that domain. DHCP-based address configuration is + not recommended for deployments in which the local mobility anchor + and the mobile access gateway are located in different + administrative domains. + +6.12. Home Network Prefix Renumbering + + If the mobile node's home network prefix(es) gets renumbered or + becomes invalid during the middle of a mobility session, the mobile + access gateway MUST withdraw the prefix(es) by sending a Router + Advertisement message on the access link with zero prefix lifetime + for the prefix(es) that is being renumbered. Also, the local + mobility anchor and the mobile access gateway MUST delete the created + routing state for the renumbered prefix(es). However, the specific + details on how the local mobility anchor notifies the mobile access + gateway about the mobile node's home network prefix(es) renumbering + are outside the scope of this document. + +6.13. Mobile Node Detachment Detection and Resource Cleanup + + Before sending a Proxy Binding Update message to the local mobility + anchor for extending the lifetime of a currently existing binding of + a mobile node, the mobile access gateway MUST make sure the mobile + node is still attached to the connected link by using some reliable + method. If the mobile access gateway cannot predictably detect the + presence of the mobile node on the connected link, it MUST NOT + attempt to extend the registration lifetime of the mobile node. + Further, in such a scenario, the mobile access gateway SHOULD + terminate the binding of the mobile node by sending a Proxy Binding + Update message to the mobile node's local mobility anchor with + lifetime value set to 0. It MUST also remove any local state such as + the Binding Update List entry created for that mobile node. + + The specific detection mechanism of the loss of a visiting mobile + node on the connected link is specific to the access link between the + mobile node and the mobile access gateway and is outside the scope of + this document. Typically, there are various link-layer-specific + events specific to each access technology that the mobile access + gateway can depend on for detecting the node loss. In general, the + mobile access gateway can depend on one or more of the following + methods for the detection presence of the mobile node on the + connected link: + + + + + + +Gundavelli, et al. Standards Track [Page 66] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + o Link-layer event specific to the access technology + + o Session termination event on point-to-point link types + + o IPv6 Neighbor Unreachability Detection event from IPv6 stack + + o Notification event from the local mobility anchor + +6.14. Allowing Network Access to Other IPv6 Nodes + + In some Proxy Mobile IPv6 deployments, network operators may + provision the mobile access gateway to offer network-based mobility + management service only to some visiting mobile nodes and enable just + regular IP access to some other nodes. This requires the network to + have control on when to enable network-based mobility management + service to a mobile node and when to enable regular IPv6 access. + This specification does not disallow such configuration. + + Upon detecting a mobile node on its access link and after policy + considerations, the mobile access gateway MUST determine if network- + based mobility management service should be offered to that mobile + node. If the mobile node is entitled to network-based mobility + management service, then the mobile access gateway must ensure the + mobile node does not detect any change with respect to its layer-3 + attachment, as explained in various sections of this specification. + + If the mobile node is not entitled to the network-based mobility + management service, as determined from the policy considerations, the + mobile access gateway MAY choose to offer regular IPv6 access to the + mobile node, and in such a scenario, the normal IPv6 considerations + apply. If IPv6 access is enabled, the mobile node SHOULD be able to + obtain IPv6 address(es) using the normal IPv6 address configuration + procedures. The obtained address(es) must be from a local visitor + network prefix(es). This essentially ensures that the mobile access + gateway functions as a normal access router to a mobile node attached + to its access link and without impacting its host-based mobility + protocol operation. + +7. Mobile Node Operation + + This non-normative section explains the mobile node's operation in a + Proxy Mobile IPv6 domain. + +7.1. Moving into a Proxy Mobile IPv6 Domain + + When a mobile node enters a Proxy Mobile IPv6 domain and attaches to + an access network, the mobile access gateway on the access link + detects the attachment of the mobile node and completes the binding + + + +Gundavelli, et al. Standards Track [Page 67] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + registration with the mobile node's local mobility anchor. If the + binding update operation is successfully performed, the mobile access + gateway will create the required state and set up the forwarding for + the mobile node's data traffic. + + When a mobile node attaches to the access link, it will typically + send a Router Solicitation message [RFC4861]. The mobile access + gateway on the access link will respond to the Router Solicitation + message with a Router Advertisement message. The Router + Advertisement message will carry the mobile node's home network + prefix(es), default-router address, and other address configuration + parameters. + + If the mobile access gateway on the access link receives a Router + Solicitation message from the mobile node, before it completes the + signaling with the mobile node's local mobility anchor, the mobile + access gateway may not know the mobile node's home network prefix(es) + and may not be able to emulate the mobile node's home link on the + access link. In such a scenario, the mobile node may notice a delay + before it receives a Router Advertisement message. This will also + affect mobile nodes that would be capable of handling their own + mobility, or mobile nodes that do not need to maintain the same IP + address through movements. + + If the received Router Advertisement message has the Managed Address + Configuration flag set, the mobile node, as it would normally do, + will send a DHCP Request [RFC3315]. The DHCP relay service enabled + on that access link will ensure the mobile node can obtain one or + more addresses from its home network prefix(es). + + If the received Router Advertisement message does not have the + Managed Address Configuration flag set and if the mobile node is + allowed to use autoconfigured address(es), the mobile node will be + able to obtain IPv6 address(es) from each of its home network + prefixes using any of the standard IPv6 address configuration + mechanisms permitted for that mode. + + If the mobile node is IPv4-enabled and if the network permits, it + will be able to obtain the IPv4 address configuration, as specified + in the companion document [IPV4-PMIP6]. + + Once the address configuration is complete, the mobile node can + continue to use this address configuration as long as it is attached + to the network that is in the scope of that Proxy Mobile IPv6 domain. + + + + + + + +Gundavelli, et al. Standards Track [Page 68] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +7.2. Roaming in the Proxy Mobile IPv6 Domain + + After obtaining the address configuration in the Proxy Mobile IPv6 + domain, as the mobile node moves and changes its point of attachment + from one mobile access gateway to the other, it can still continue to + use the same address configuration. As long as the attached access + link is in the scope of that Proxy Mobile IPv6 domain, the mobile + node will always detect the same router advertising itself as a + default-router and advertising the mobile node's home network + prefix(es) on each connected link. If the mobile node has address + configuration that it obtained using DHCP, it will be able to retain + the address configuration and extend the lease lifetime. + +8. Message Formats + + This section defines extensions to the Mobile IPv6 [RFC3775] protocol + messages. + +8.1. Proxy Binding Update Message + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Sequence # | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + |A|H|L|K|M|R|P| Reserved | Lifetime | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + . . + . Mobility options . + . . + + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + A Binding Update message that is sent by a mobile access gateway to a + local mobility anchor is referred to as the "Proxy Binding Update" + message. A new flag (P) is included in the Binding Update message. + The rest of the Binding Update message format remains the same as + defined in [RFC3775] and with the additional (R) and (M) flags, as + specified in [RFC3963] and [RFC4140], respectively. + + + + + + + + + + +Gundavelli, et al. Standards Track [Page 69] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + Proxy Registration Flag (P) + + A new flag (P) is included in the Binding Update message to + indicate to the local mobility anchor that the Binding Update + message is a proxy registration. The flag MUST be set to the + value of 1 for proxy registrations and MUST be set to 0 for direct + registrations sent by a mobile node. + + Mobility Options + + Variable-length field of such length that the complete Mobility + Header is an integer multiple of 8 octets long. This field + contains zero or more TLV-encoded mobility options. The encoding + and format of defined options are described in Section 6.2 of + [RFC3775]. The local mobility anchor MUST ignore and skip any + options that it does not understand. + + As per this specification, the following mobility options are + valid in a Proxy Binding Update message. These options can be + present in the message in any order. There can be one or more + instances of the Home Network Prefix options present in the + message. However, there cannot be more than one instance of any + of the following options. + + Mobile Node Identifier option + + Home Network Prefix option + + Handoff Indicator option + + Access Technology Type option + + Timestamp option + + Mobile Node Link-layer Identifier option + + Link-local Address option + + Additionally, there can be one or more instances of the Vendor- + Specific Mobility option [RFC5094]. + + For descriptions of other fields present in this message, refer to + Section 6.1.7 of [RFC3775]. + + + + + + + + +Gundavelli, et al. Standards Track [Page 70] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +8.2. Proxy Binding Acknowledgement Message + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Status |K|R|P|Reserved | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Sequence # | Lifetime | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + . . + . Mobility options . + . . + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + A Binding Acknowledgement message that is sent by a local mobility + anchor to a mobile access gateway is referred to as the "Proxy + Binding Acknowledgement" message. A new flag (P) is included in the + Binding Acknowledgement message. The rest of the Binding + Acknowledgement message format remains the same as defined in + [RFC3775] and with the additional (R) flag as specified in [RFC3963]. + + Proxy Registration Flag (P) + + A new flag (P) is included in the Binding Acknowledgement message + to indicate that the local mobility anchor that processed the + corresponding Proxy Binding Update message supports proxy + registrations. The flag is set to a value of 1 only if the + corresponding Proxy Binding Update had the Proxy Registration Flag + (P) set to value of 1. + + Mobility Options + + A variable-length field of such length that the complete Mobility + Header is an integer multiple of 8 octets long. This field + contains zero or more TLV-encoded mobility options. The encoding + and format of defined options are described in Section 6.2 of + [RFC3775]. The mobile access gateway MUST ignore and skip any + options that it does not understand. + + As per this specification, the following mobility options are + valid in a Proxy Binding Acknowledgement message. These options + can be present in the message in any order. There can be one or + + + + + + + +Gundavelli, et al. Standards Track [Page 71] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + more instances of the Home Network Prefix options present in the + message. However, there cannot be more than one instance of any + of the following options. + + Mobile Node Identifier option + + Home Network Prefix option + + Handoff Indicator option + + Access Technology Type option + + Timestamp option + + Mobile Node Link-layer Identifier option + + Link-local Address option + + Additionally, there can be one or more instances of the Vendor- + Specific Mobility option [RFC5094]. + + Status + + An 8-bit unsigned integer indicating the disposition of the Proxy + Binding Update. Values of the Status field less than 128 indicate + that the Proxy Binding Update was accepted by the local mobility + anchor. Values greater than or equal to 128 indicate that the + Proxy Binding Update message was rejected by the local mobility + anchor. Section 8.9 defines the Status values that can used in + Proxy Binding Acknowledgement message. + + For descriptions of other fields present in this message, refer to + Section 6.1.8 of [RFC3775]. + +8.3. Home Network Prefix Option + + A new option, Home Network Prefix option is defined for use with the + Proxy Binding Update and Proxy Binding Acknowledgement messages + exchanged between a local mobility anchor and a mobile access + gateway. This option is used for exchanging the mobile node's home + network prefix information. There can be multiple Home Network + Prefix options present in the message. + + The Home Network Prefix Option has an alignment requirement of 8n+4. + Its format is as follows: + + + + + + +Gundavelli, et al. Standards Track [Page 72] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type | Length | Reserved | Prefix Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + + + + | | + + Home Network Prefix + + | | + + + + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Type + 22 + + Length + + 8-bit unsigned integer indicating the length of the option + in octets, excluding the type and length fields. This field + MUST be set to 18. + + Reserved (R) + + This 8-bit field is unused for now. The value MUST be + initialized to 0 by the sender and MUST be ignored by the + receiver. + + Prefix Length + + 8-bit unsigned integer indicating the prefix length of the + IPv6 prefix contained in the option. + + Home Network Prefix + + A sixteen-byte field containing the mobile node's IPv6 Home + Network Prefix. + + +8.4. Handoff Indicator Option + + A new option, Handoff Indicator option is defined for use with the + Proxy Binding Update and Proxy Binding Acknowledgement messages + exchanged between a local mobility anchor and a mobile access + gateway. This option is used for exchanging the mobile node's + handoff-related hints. + + + + +Gundavelli, et al. Standards Track [Page 73] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + The Handoff Indicator option has no alignment requirement. Its + format is as follows: + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type | Length | Reserved (R) | HI | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Type + 23 + + Length + + 8-bit unsigned integer indicating the length of the option + in octets, excluding the type and length fields. This field + MUST be set to 2. + + Reserved (R) + + This 8-bit field is unused for now. The value MUST be + initialized to 0 by the sender and MUST be ignored by the + receiver. + + Handoff Indicator (HI) + + An 8-bit field that specifies the type of handoff. The values + (0 - 255) will be allocated and managed by IANA. The following + values are currently defined. + + 0: Reserved + 1: Attachment over a new interface + 2: Handoff between two different interfaces of the mobile node + 3: Handoff between mobile access gateways for the same interface + 4: Handoff state unknown + 5: Handoff state not changed (Re-registration) + + +8.5. Access Technology Type Option + + A new option, Access Technology Type option is defined for use with + the Proxy Binding Update and Proxy Binding Acknowledgement messages + exchanged between a local mobility anchor and a mobile access + gateway. This option is used for exchanging the type of the access + technology by which the mobile node is currently attached to the + mobile access gateway. + + + + + +Gundavelli, et al. Standards Track [Page 74] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + The Access Technology Type Option has no alignment requirement. Its + format is as follows: + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type | Length | Reserved (R) | ATT | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Type + 24 + + Length + + 8-bit unsigned integer indicating the length of the option + in octets, excluding the type and length fields. This field + MUST be set to 2. + + Reserved (R) + + This 8-bit field is unused for now. The value MUST be + initialized to 0 by the sender and MUST be ignored by the + receiver. + + Access Technology Type (ATT) + + An 8-bit field that specifies the access technology through + which the mobile node is connected to the access link on the + mobile access gateway. + + The values (0 - 255) will be allocated and managed by IANA. The + following values are currently reserved for the below specified + access technology types. + + 0: Reserved ("Reserved") + 1: Virtual ("Logical Network Interface") + 2: PPP ("Point-to-Point Protocol") + 3: IEEE 802.3 ("Ethernet") + 4: IEEE 802.11a/b/g ("Wireless LAN") + 5: IEEE 802.16e ("WIMAX") + + + + + + + + + + + +Gundavelli, et al. Standards Track [Page 75] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +8.6. Mobile Node Link-layer Identifier Option + + A new option, Mobile Node Link-layer Identifier option is defined for + use with the Proxy Binding Update and Proxy Binding Acknowledgement + messages exchanged between a local mobility anchor and a mobile + access gateway. This option is used for exchanging the mobile node's + link-layer identifier. + + The format of the Link-layer Identifier option is shown below. Based + on the size of the identifier, the option MUST be aligned + appropriately, as per mobility option alignment requirements + specified in [RFC3775]. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type | Length | Reserved | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + + Link-layer Identifier + + . ... . + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Type + 25 + + Length + 8-bit unsigned integer indicating the length of the option + in octets, excluding the type and length fields. + + Reserved + + This field is unused for now. The value MUST be initialized to + 0 by the sender and MUST be ignored by the receiver. + + Link-layer Identifier + + A variable length field containing the mobile node's link-layer + identifier. + + The content and format of this field (including byte and bit + ordering) is as specified in Section 4.6 of [RFC4861] for + carrying link-layer addresses. On certain access links, where + the link-layer address is not used or cannot be determined, + this option cannot be used. + + + + + +Gundavelli, et al. Standards Track [Page 76] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +8.7. Link-local Address Option + + A new option, Link-local Address option is defined for use with the + Proxy Binding Update and Proxy Binding Acknowledgement messages + exchanged between a local mobility anchor and a mobile access + gateway. This option is used for exchanging the link-local address + of the mobile access gateway. + + The Link-local Address option has an alignment requirement of 8n+6. + Its format is as follows: + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type | Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + + + + | | + + Link-local Address + + | | + + + + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Type + 26 + + Length + + 8-bit unsigned integer indicating the length of the option + in octets, excluding the type and length fields. This field + MUST be set to 16. + + Link-local Address + + A sixteen-byte field containing the link-local address. + +8.8. Timestamp Option + + A new option, Timestamp option is defined for use in the Proxy + Binding Update and Proxy Binding Acknowledgement messages. + + The Timestamp option has an alignment requirement of 8n+2. Its + format is as follows: + + + + + + +Gundavelli, et al. Standards Track [Page 77] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type | Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + + Timestamp + + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Type + 27 + + Length + + 8-bit unsigned integer indicating the length in octets of + the option, excluding the type and length fields. The value + for this field MUST be set to 8. + + Timestamp + + A 64-bit unsigned integer field containing a timestamp. The + value indicates the number of seconds since January 1, 1970, + 00:00 UTC, by using a fixed point format. In this format, the + integer number of seconds is contained in the first 48 bits of + the field, and the remaining 16 bits indicate the number of + 1/65536 fractions of a second. + +8.9. Status Values + + This document defines the following new Status values for use in + Proxy Binding Acknowledgement messages. These values are to be + allocated from the same number space, as defined in Section 6.1.8 of + [RFC3775]. + + Status values less than 128 indicate that the Proxy Binding Update + message was accepted by the local mobility anchor. Status values + greater than 128 indicate that the Proxy Binding Update was rejected + by the local mobility anchor. + + PROXY_REG_NOT_ENABLED: 152 + + Proxy registration not enabled for the mobile node + + + + + + + + +Gundavelli, et al. Standards Track [Page 78] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + NOT_LMA_FOR_THIS_MOBILE_NODE: 153 + + Not local mobility anchor for this mobile node + + MAG_NOT_AUTHORIZED_FOR_PROXY_REG: 154 + + The mobile access gateway is not authorized to send proxy binding + updates + + NOT_AUTHORIZED_FOR_HOME_NETWORK_PREFIX: 155 + + The mobile node is not authorized for one or more of the + requesting home network prefixes + + TIMESTAMP_MISMATCH: 156 + + Invalid timestamp value (the clocks are out of sync) + + TIMESTAMP_LOWER_THAN_PREV_ACCEPTED: 157 + + The timestamp value is lower than the previously accepted value + + MISSING_HOME_NETWORK_PREFIX_OPTION: 158 + + Missing home network prefix option + + BCE_PBU_PREFIX_SET_DO_NOT_MATCH: 159 + + All the home network prefixes listed in the BCE do not match all + the prefixes in the received PBU + + MISSING_MN_IDENTIFIER_OPTION: 160 + + Missing mobile node identifier option + + MISSING_HANDOFF_INDICATOR_OPTION: 161 + + Missing handoff indicator option + + MISSING_ACCESS_TECH_TYPE_OPTION: 162 + + Missing access technology type option + + + + + + + + + +Gundavelli, et al. Standards Track [Page 79] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + Additionally, the following Status values defined in [RFC3775] can + also be used in a Proxy Binding Acknowledgement message. + + 0 Proxy Binding Update accepted + + 128 Reason unspecified + + 129 Administratively prohibited + + 130 Insufficient resources + +9. Protocol Configuration Variables + +9.1. Local Mobility Anchor - Configuration Variables + + The local mobility anchor MUST allow the following variables to be + configured by the system management. The configured values for these + protocol variables MUST survive server reboots and service restarts. + + MinDelayBeforeBCEDelete + + This variable specifies the amount of time in milliseconds the + local mobility anchor MUST wait before it deletes a Binding Cache + entry of a mobile node, upon receiving a Proxy Binding Update + message from a mobile access gateway with a lifetime value of 0. + During this wait time, if the local mobility anchor receives a + Proxy Binding Update for the same mobility binding, with a + lifetime value greater than 0, then it must update the binding + cache entry with the accepted binding values. By the end of this + wait-time, if the local mobility anchor did not receive any valid + Proxy Binding Update message for that mobility binding, it MUST + delete the Binding Cache entry. This delay essentially ensures a + mobile node's Binding Cache entry is not deleted too quickly and + allows some time for the new mobile access gateway to complete the + signaling for the mobile node. + + The default value for this variable is 10000 milliseconds. + + + + + + + + + + + + + + +Gundavelli, et al. Standards Track [Page 80] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + MaxDelayBeforeNewBCEAssign + + This variable specifies the amount of time in milliseconds the + local mobility anchor MUST wait for the de-registration message + for an existing mobility session before it decides to create a new + mobility session. + + The default value for this variable is 1500 milliseconds. + + Note that there is a dependency between this value and the values + used in the retransmission algorithm for Proxy Binding Updates. + The retransmissions need to happen before + MaxDelayBeforeNewBCEAssign runs out, as otherwise there are + situations where a de-registration from a previous mobile access + gateway may be lost, and the local mobility anchor creates, + needlessly, a new mobility session and new prefixes for the mobile + node. However, this affects situations where there is no + information from the lower layers about the type of a handoff or + other parameters that can be used for identifying the mobility + session. + + TimestampValidityWindow + + This variable specifies the maximum amount of time difference in + milliseconds between the timestamp in the received Proxy Binding + Update message and the current time of day on the local mobility + anchor, that is allowed by the local mobility anchor for the + received message to be considered valid. + + The default value for this variable is 300 milliseconds. This + variable must be adjusted to suit the deployments. + +9.2. Mobile Access Gateway - Configuration Variables + + The mobile access gateway MUST allow the following variables to be + configured by the system management. The configured values for these + protocol variables MUST survive server reboots and service restarts. + + EnableMAGLocalRouting + + This flag indicates whether or not the mobile access gateway is + allowed to enable local routing of the traffic exchanged between a + visiting mobile node and a correspondent node that is locally + connected to one of the interfaces of the mobile access gateway. + The correspondent node can be another visiting mobile node as + well, or a local fixed node. + + + + + +Gundavelli, et al. Standards Track [Page 81] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + The default value for this flag is set to a value of 0, indicating + that the mobile access gateway MUST reverse tunnel all the traffic + to the mobile node's local mobility anchor. + + When the value of this flag is set to a value of 1, the mobile + access gateway MUST route the traffic locally. + + This aspect of local routing MAY be defined as policy on a per + mobile basis and when present will take precedence over this flag. + +9.3. Proxy Mobile IPv6 Domain - Configuration Variables + + All the mobile entities (local mobility anchors and mobile access + gateways) in a Proxy Mobile IPv6 domain MUST allow the following + variables to be configured by the system management. The configured + values for these protocol variables MUST survive server reboots and + service restarts. These variables MUST be globally fixed for a given + Proxy Mobile IPv6 domain resulting in the same values being enforced + on all the mobility entities in that domain. + + TimestampBasedApproachInUse + + This flag indicates whether or not the timestamp-based approach + for message ordering is in use in that Proxy Mobile IPv6 domain. + When the value for this flag is set to 1, all the mobile access + gateways in that Proxy Mobile IPv6 domain MUST apply the + timestamp-based considerations listed in Section 5.5. When the + value of this flag is set to 0, sequence-number-based + considerations listed in Section 5.5 MUST be applied. The default + value for this flag is set to value of 1, indicating that the + timestamp-based mechanism is in use in that Proxy Mobile IPv6 + domain. + + MobileNodeGeneratedTimestampInUse + + This flag indicates whether or not the mobile-node-generated + timestamp approach is in use in that Proxy Mobile IPv6 domain. + When the value for this flag is set to 1, the local mobility + anchors and mobile access gateways in that Proxy Mobile IPv6 + domain MUST apply the mobile node generated timestamp + considerations as specified in Section 5.5. + + This flag is relevant only when timestamp-based approach is in + use. The value for this flag MUST NOT be set to value of 1, if + the value of the TimestampBasedApproachInUse flag is set to 0. + + + + + + +Gundavelli, et al. Standards Track [Page 82] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + The default value for this flag is set to value of 0, indicating + that the mobile node generated timestamp mechanism is not in use + in that Proxy Mobile IPv6 domain. + + FixedMAGLinkLocalAddressOnAllAccessLinks + + This variable indicates the link-local address value that all the + mobile access gateways SHOULD use on any of the access links + shared with any of the mobile nodes in that Proxy Mobile IPv6 + domain. If this variable is initialized to ALL_ZERO value, it + implies the use of fixed link-local address mode is not enabled + for that Proxy Mobile IPv6 domain. + + FixedMAGLinkLayerAddressOnAllAccessLinks + + This variable indicates the link-layer address value that all the + mobile access gateways SHOULD use on any of the access links + shared with any of the mobile nodes in that Proxy Mobile IPv6 + domain. For access technologies where there is no link-layer + address, this variable MUST be initialized to ALL_ZERO value. + +10. IANA Considerations + + This document defines six new Mobility Header options, the Home + Network Prefix Option, Handoff Indicator Option, Access Technology + Type Option, Mobile Node Link-layer Identifier Option, Link-local + Address Option, and Timestamp Option. These options are described in + Section 8. The Type value for these options has been assigned from + the same numbering space as allocated for the other mobility options, + as defined in [RFC3775]. + + The Handoff Indicator Option, defined in Section 8.4 of this + document, introduces a new Handoff Indicator (HI) numbering space, + where the values from 0 to 5 have been reserved by this document. + Approval of new Handoff Indicator type values are to be made through + IANA Expert Review. + + The Access Technology Type Option, defined in Section 8.5 of this + document, introduces a new Access Technology type (ATT) numbering + space, where the values from 0 to 5 have been reserved by this + document. Approval of new Access Technology type values are to be + made through IANA Expert Review. + + This document also defines new Binding Acknowledgement status values, + as described in Section 8.9. The status values MUST be assigned from + the same number space used for Binding Acknowledgement status values, + as defined in [RFC3775]. The allocated values for each of these + status values must be greater than 128. + + + +Gundavelli, et al. Standards Track [Page 83] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + This document creates a new registry for the flags in the Binding + Update message called the "Binding Update Flags". + + The following flags are reserved: + + (A) 0x8000 [RFC3775] + + (H) 0x4000 [RFC3775] + + (L) 0x2000 [RFC3775] + + (K) 0x1000 [RFC3775] + + (M) 0x0800 [RFC4140] + + (R) 0x0400 [RFC3963] + + This document reserves a new flag (P) as follows: + + (P) 0x0200 + + The rest of the values in the 16-bit field are reserved. New values + can be assigned by Standards Action or IESG approval. + + This document also creates a new registry for the flags in the + Binding Acknowledgment message called the "Binding Acknowledgment + Flags". The following values are reserved. + + (K) 0x80 [RFC3775] + + (R) 0x40 [RFC3963] + + This document reserves a new flag (P) as follows: + + (P) 0x20 + + The rest of the values in the 8-bit field are reserved. New values + can be assigned by Standards Action or IESG approval. + +11. Security Considerations + + The potential security threats against any network-based mobility + management protocol are described in [RFC4832]. This section + explains how Proxy Mobile IPv6 protocol defends itself against those + threats. + + + + + + +Gundavelli, et al. Standards Track [Page 84] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + Proxy Mobile IPv6 protocol recommends the signaling messages, Proxy + Binding Update and Proxy Binding Acknowledgement, exchanged between + the mobile access gateway and the local mobility anchor to be + protected using IPsec using the established security association + between them. This essentially eliminates the threats related to the + impersonation of the mobile access gateway or the local mobility + anchor. + + This specification allows a mobile access gateway to send binding + registration messages on behalf of a mobile node. If proper + authorization checks are not in place, a malicious node may be able + to hijack a mobile node's mobility session or may carry out a denial- + of-service attack. To prevent this attack, this specification + requires the local mobility anchor to allow only authorized mobile + access gateways that are part of that Proxy Mobile IPv6 domain to + send Proxy Binding Update messages on behalf of a mobile node. + + To eliminate the threats on the interface between the mobile access + gateway and the mobile node, this specification requires an + established trust between the mobile access gateway and the mobile + node and to authenticate and authorize the mobile node before it is + allowed to access the network. Further, the established + authentication mechanisms enabled on that access link will ensure + that there is a secure binding between the mobile node's identity and + its link-layer address. The mobile access gateway will definitively + identify the mobile node from the packets that it receives on that + access link. + + To address the threat related to a compromised mobile access gateway, + the local mobility anchor, before accepting a Proxy Binding Update + message for a given mobile node, may ensure that the mobile node is + attached to the mobile access gateway that sent the Proxy Binding + Update message. This may be accomplished by contacting a trusted + entity, which is able to track the mobile node's current point of + attachment. However, the specific details of the actual mechanisms + for achieving this is outside the scope of this document. + +12. Acknowledgements + + The authors would like to specially thank Jari Arkko, Julien + Laganier, Christian Vogt, Dave Thaler, Pasi Eronen, Pete McCann, + Brian Haley, Ahmad Muhanna, JinHyeock Choi, and Elwyn Davies for + their thorough reviews of this document. + + The authors would also like to thank Alex Petrescu, Alice Qinxia, + Alper Yegin, Ashutosh Dutta, Behcet Sarikaya, Charles Perkins, + Domagoj Premec, Fred Templin, Genadi Velev, George Tsirtsis, Gerardo + Giaretta, Henrik Levkowetz, Hesham Soliman, James Kempf, Jean-Michel + + + +Gundavelli, et al. Standards Track [Page 85] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + Combes, John Jason Brzozowski, Jun Awano, John Zhao, Jong-Hyouk Lee, + Jonne Soininen, Jouni Korhonen, Kalin Getov, Kilian Weniger, Lars + Eggert, Magnus Westerlund, Marco Liebsch, Mohamed Khalil, Nishida + Katsutoshi, Pierrick Seite, Phil Roberts, Ralph Droms, Ryuji + Wakikawa, Sangjin Jeong, Suresh Krishnan, Tero Kauppinen, Uri + Blumenthal, Ved Kafle, Vidya Narayanan, Youn-Hee Han, and many others + for their passionate discussions in the working group mailing list on + the topic of localized mobility management solutions. These + discussions stimulated much of the thinking and shaped the document + to the current form and we acknowledge that! + + The authors would also like to thank Ole Troan, Akiko Hattori, Parviz + Yegani, Mark Grayson, Michael Hammer, Vojislav Vucetic, Jay Iyer, Tim + Stammers, Bernie Volz, and Josh Littlefield for their input on this + document. + +13. References + +13.1. Normative References + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [RFC2473] Conta, A. and S. Deering, "Generic Packet Tunneling in + IPv6 Specification", RFC 2473, December 1998. + + [RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The + Addition of Explicit Congestion Notification (ECN) to + IP", RFC 3168, September 2001. + + [RFC3315] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., + and M. Carney, "Dynamic Host Configuration Protocol for + IPv6 (DHCPv6)", RFC 3315, July 2003. + + [RFC3775] Johnson, D., Perkins, C., and J. Arkko, "Mobility + Support in IPv6", RFC 3775, June 2004. + + [RFC4282] Aboba, B., Beadles, M., Arkko, J., and P. Eronen, "The + Network Access Identifier", RFC 4282, December 2005. + + [RFC4283] Patel, A., Leung, K., Khalil, M., Akhtar, H., and K. + Chowdhury, "Mobile Node Identifier Option for Mobile + IPv6 (MIPv6)", RFC 4283, November 2005. + + [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing + Architecture", RFC 4291, February 2006. + + + + + +Gundavelli, et al. Standards Track [Page 86] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + [RFC4301] Kent, S. and K. Seo, "Security Architecture for the + Internet Protocol", RFC 4301, December 2005. + + [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", + RFC 4303, December 2005. + + [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, + "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, + September 2007. + +13.2. Informative References + + [RFC1981] McCann, J., Deering, S., and J. Mogul, "Path MTU + Discovery for IP version 6", RFC 1981, August 1996. + + [RFC2865] Rigney, C., Willens, S., Rubens, A., and W. Simpson, + "Remote Authentication Dial In User Service (RADIUS)", + RFC 2865, June 2000. + + [RFC3588] Calhoun, P., Loughney, J., Guttman, E., Zorn, G., and + J. Arkko, "Diameter Base Protocol", RFC 3588, + September 2003. + + [RFC3963] Devarapalli, V., Wakikawa, R., Petrescu, A., and P. + Thubert, "Network Mobility (NEMO) Basic Support + Protocol", RFC 3963, January 2005. + + [RFC3971] Arkko, J., Kempf, J., Zill, B., and P. Nikander, + "SEcure Neighbor Discovery (SEND)", RFC 3971, + March 2005. + + [RFC4140] Soliman, H., Castelluccia, C., El Malki, K., and L. + Bellier, "Hierarchical Mobile IPv6 Mobility Management + (HMIPv6)", RFC 4140, August 2005. + + [RFC4306] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", + RFC 4306, December 2005. + + [RFC4330] Mills, D., "Simple Network Time Protocol (SNTP) Version + 4 for IPv4, IPv6 and OSI", RFC 4330, January 2006. + + [RFC4372] Adrangi, F., Lior, A., Korhonen, J., and J. Loughney, + "Chargeable User Identity", RFC 4372, January 2006. + + [RFC4821] Mathis, M. and J. Heffner, "Packetization Layer Path + MTU Discovery", RFC 4821, March 2007. + + + + + +Gundavelli, et al. Standards Track [Page 87] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + [RFC4830] Kempf, J., "Problem Statement for Network-Based + Localized Mobility Management (NETLMM)", RFC 4830, + April 2007. + + [RFC4831] Kempf, J., "Goals for Network-Based Localized Mobility + Management (NETLMM)", RFC 4831, April 2007. + + [RFC4832] Vogt, C. and J. Kempf, "Security Threats to Network- + Based Localized Mobility Management (NETLMM)", + RFC 4832, April 2007. + + [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless + Address Autoconfiguration", RFC 4862, September 2007. + + [RFC4941] Narten, T., Draves, R., and S. Krishnan, "Privacy + Extensions for Stateless Address Autoconfiguration in + IPv6", RFC 4941, September 2007. + + [RFC5094] Devarapalli, V., Patel, A., and K. Leung, "Mobile IPv6 + Vendor Specific Option", RFC 5094, December 2007. + + [IPV4-PMIP6] Wakikawa, R. and S. Gundavelli, "IPv4 Support for Proxy + Mobile IPv6", Work in Progress, May 2008. + + [DNAV6] Narayanan, S., Ed., "Detecting Network Attachment in + IPv6 Networks (DNAv6)", Work in Progress, + February 2008. + + + + + + + + + + + + + + + + + + + + + + + + +Gundavelli, et al. Standards Track [Page 88] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +Appendix A. Proxy Mobile IPv6 Interactions with AAA Infrastructure + + Every mobile node that roams in a proxy Mobile IPv6 domain would + typically be identified by an identifier, MN-Identifier, and that + identifier will have an associated policy profile that identifies the + mobile node's home network prefix(es) on a per-interface basis, + permitted address configuration modes, roaming policy, and other + parameters that are essential for providing network-based mobility + management service. This information is typically configured in AAA. + In some cases, the home network prefix(es) may be dynamically + assigned to the mobile node's interface, after its initial attachment + to the Proxy Mobile IPv6 domain over that interface and may not be + configured in the mobile node's policy profile. + + The network entities in the proxy Mobile IPv6 domain, while serving a + mobile node, will have access to the mobile node's policy profile and + these entities can query this information using RADIUS [RFC2865] or + DIAMETER [RFC3588] protocols. + +Appendix B. Routing State + + The following section explains the routing state created for a mobile + node on the mobile access gateway. This routing state reflects only + one specific way of implementation, and one MAY choose to implement + it in other ways. The policy based route defined below acts as a + traffic selection rule for routing a mobile node's traffic through a + specific tunnel created between the mobile access gateway and that + mobile node's local mobility anchor and with the specific + encapsulation mode, as negotiated. + + The below example identifies the routing state for two visiting + mobile nodes, MN1 and MN2, with their respective local mobility + anchors, LMA1 and LMA2. + + For all traffic from the mobile node, identified by the mobile node's + MAC address, ingress interface or source prefix (MN-HNP) to + _ANY_DESTINATION_ route via interface tunnel0, next-hop LMAA. + + + + + + + + + + + + + + +Gundavelli, et al. Standards Track [Page 89] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + + +==================================================================+ + | Packet Source | Destination Address | Destination Interface | + +==================================================================+ + | MAC_Address_MN1, | _ANY_DESTINATION_ | Tunnel0 | + | (IPv6 Prefix or |----------------------------------------------| + | Input Interface) | Locally Connected | Tunnel0 | + +------------------------------------------------------------------+ + | MAC_Address_MN2, | _ANY_DESTINATION_ | Tunnel1 | + + (IPv6 Prefix or -----------------------------------------------| + | Input Interface | Locally Connected | direct | + +------------------------------------------------------------------+ + + Example - Policy-Based Route Table + + + +==================================================================+ + | Interface | Source Address | Destination Address | Encapsulation | + +==================================================================+ + | Tunnel0 | Proxy-CoA | LMAA1 | IPv6-in-IPv6 | + +------------------------------------------------------------------+ + | Tunnel1 | Proxy-CoA | LMAA2 | IPv6-in-IPv6 | + +------------------------------------------------------------------+ + + Example - Tunnel Interface Table + + + + + + + + + + + + + + + + + + + + + + + + + + + +Gundavelli, et al. Standards Track [Page 90] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +Authors' Addresses + + Sri Gundavelli (editor) + Cisco + 170 West Tasman Drive + San Jose, CA 95134 + USA + + EMail: sgundave@cisco.com + + + Kent Leung + Cisco + 170 West Tasman Drive + San Jose, CA 95134 + USA + + EMail: kleung@cisco.com + + + Vijay Devarapalli + Wichorus + 3590 North First Street + San Jose, CA 95134 + USA + + EMail: vijay@wichorus.com + + + Kuntal Chowdhury + Starent Networks + 30 International Place + Tewksbury, MA + + EMail: kchowdhury@starentnetworks.com + + + Basavaraj Patil + Nokia + 6000 Connection Drive + Irving, TX 75039 + USA + + EMail: basavaraj.patil@nokia.com + + + + + + + +Gundavelli, et al. Standards Track [Page 91] + +RFC 5213 Proxy Mobile IPv6 August 2008 + + +Full Copyright Statement + + Copyright (C) The IETF Trust (2008). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND + THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS + OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF + THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + + + + + + + + + + + + +Gundavelli, et al. Standards Track [Page 92] + |