summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc7847.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc7847.txt')
-rw-r--r--doc/rfc/rfc7847.txt899
1 files changed, 899 insertions, 0 deletions
diff --git a/doc/rfc/rfc7847.txt b/doc/rfc/rfc7847.txt
new file mode 100644
index 0000000..d605cc2
--- /dev/null
+++ b/doc/rfc/rfc7847.txt
@@ -0,0 +1,899 @@
+
+
+
+
+
+
+Internet Engineering Task Force (IETF) T. Melia, Ed.
+Request for Comments: 7847 Kudelski Security
+Category: Informational S. Gundavelli, Ed.
+ISSN: 2070-1721 Cisco
+ May 2016
+
+
+ Logical-Interface Support for IP Hosts with Multi-Access Support
+
+Abstract
+
+ A logical interface is a software semantic internal to the host
+ operating system. This semantic is available in all popular
+ operating systems and is used in various protocol implementations.
+ Logical-interface support is required on the mobile node attached to
+ a Proxy Mobile IPv6 domain for leveraging various network-based
+ mobility management features such as inter-technology handoffs,
+ multihoming, and flow mobility support. This document explains the
+ operational details of the logical-interface construct and the
+ specifics on how link-layer implementations hide the physical
+ interfaces from the IP stack and from the network nodes on the
+ attached access networks. Furthermore, this document identifies the
+ applicability of this approach to various link-layer technologies and
+ analyzes the issues around it when used in conjunction with various
+ mobility management features.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Not all documents
+ approved by the IESG are a candidate for any level of Internet
+ Standard; see Section 2 of RFC 5741.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc7847.
+
+
+
+
+
+
+
+
+
+
+Melia & Gundavelli Informational [Page 1]
+
+RFC 7847 Logical-Interface Support May 2016
+
+
+Copyright Notice
+
+ Copyright (c) 2016 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
+ 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
+ 3. Hiding Link-Layer Technologies -- Approaches and
+ Applicability . . . . . . . . . . . . . . . . . . . . . . . . 4
+ 3.1. Link-Layer Abstraction -- Approaches . . . . . . . . . . 4
+ 3.2. Link-Layer Support . . . . . . . . . . . . . . . . . . . 5
+ 3.3. Logical Interface . . . . . . . . . . . . . . . . . . . . 6
+ 4. Technology Use Cases . . . . . . . . . . . . . . . . . . . . 6
+ 5. Logical-Interface Functional Details . . . . . . . . . . . . 7
+ 5.1. Configuration of a Logical Interface . . . . . . . . . . 8
+ 5.2. Logical-Interface Conceptual Data Structures . . . . . . 9
+ 6. Logical-Interface Use Cases in Proxy Mobile IPv6 . . . . . . 11
+ 6.1. Multihoming Support . . . . . . . . . . . . . . . . . . . 11
+ 6.2. Inter-technology Handoff Support . . . . . . . . . . . . 12
+ 6.3. Flow Mobility Support . . . . . . . . . . . . . . . . . . 13
+ 7. Security Considerations . . . . . . . . . . . . . . . . . . . 13
+ 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 14
+ 8.1. Normative References . . . . . . . . . . . . . . . . . . 14
+ 8.2. Informative References . . . . . . . . . . . . . . . . . 14
+ Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 15
+ Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . 15
+ Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 16
+
+
+
+
+
+
+
+
+
+
+
+
+Melia & Gundavelli Informational [Page 2]
+
+RFC 7847 Logical-Interface Support May 2016
+
+
+1. Introduction
+
+ Proxy Mobile IPv6 (PMIPv6) [RFC5213] is a network-based mobility
+ management protocol standardized by IETF. One of the key goals of
+ the PMIPv6 protocol is to enable a mobile node to perform handovers
+ across access networks based on different access technologies. The
+ protocol was also designed with the goal to allow a mobile node to
+ simultaneously attach to different access networks and perform flow-
+ based access selection [RFC7864]. The base protocol features
+ specified in [RFC5213] and [RFC5844] have support for these
+ capabilities. However, to support these features, the mobile node is
+ required to be enabled with a specific software configuration known
+ as logical-interface support. The logical-interface configuration is
+ essential for a mobile node to perform inter-access handovers without
+ impacting the IP sessions on the host.
+
+ A logical-interface construct is internal to the operating system.
+ It is an approach of interface abstraction, where a logical link-
+ layer implementation hides a variety of physical interfaces from the
+ IP stack. This semantic was used on a variety of operating systems
+ to implement applications such as Mobile IP client [RFC6275] and
+ IPsec VPN client [RFC4301]. Many host operating systems have support
+ for some form of such logical-interface construct. But, there is no
+ specification that documents the behavior of these logical interfaces
+ or the requirements of a logical interface for supporting the above-
+ mentioned mobility management features. This specification attempts
+ to document these aspects.
+
+ The rest of the document provides a functional description of a
+ logical interface on the mobile node and the interworking between a
+ mobile node using a logical interface and the network elements in the
+ Proxy Mobile IPv6 domain. It also analyzes the issues involved with
+ the use of a logical interface and characterizes the contexts in
+ which such usage is appropriate.
+
+2. Terminology
+
+ All the mobility-related terms used in this document are to be
+ interpreted as defined in the Proxy Mobile IPv6 specifications
+ [RFC5213] and [RFC5844]. In addition, this document uses the
+ following terms:
+
+ PIF (Physical Interface): A network interface module on the host
+ that is used for connecting to an access network. A host
+ typically has a number of network interface modules, such as
+ Ethernet, Wireless LAN, LTE, etc. Each of these network
+ interfaces can support specific link technology.
+
+
+
+
+Melia & Gundavelli Informational [Page 3]
+
+RFC 7847 Logical-Interface Support May 2016
+
+
+ LIF (Logical Interface): A virtual interface in the IP stack. A
+ logical interface appears to the IP stack just as any other
+ physical interface and provides similar semantics with respect to
+ packet transmit and receive functions to the upper layers of the
+ IP stack. However, it is only a logical construct and is not a
+ representation of an instance of any physical hardware.
+
+ SIF (Sub-Interface): A physical or logical interface that is part of
+ a logical-interface construct. For example, a logical interface
+ may have been created by abstracting two physical interfaces, LTE
+ and WLAN. These physical interfaces, LTE and WLAN, are referred
+ to as sub-interfaces of that logical interface. In some cases, a
+ sub-interface can also be another logical interface, such as an
+ IPsec tunnel interface.
+
+3. Hiding Link-Layer Technologies -- Approaches and Applicability
+
+ There are several techniques that allow hiding changes in access
+ technology changes from the host layer. These changes in access
+ technology are primarily due to the host's movement between access
+ networks. This section classifies these existing techniques into a
+ set of generic approaches, according to their most representative
+ characteristics. Later sections of this document analyze the
+ applicability of these solution approaches for supporting features,
+ such as inter-technology handovers and IP flow mobility support for a
+ mobile node.
+
+3.1. Link-Layer Abstraction -- Approaches
+
+ The following generic mechanisms can hide access technology changes
+ from the host IP layer:
+
+ o Link-Layer Support -- Certain link-layer technologies are able to
+ hide physical media changes from the upper layers. For example,
+ IEEE 802.11 is able to seamlessly change between IEEE 802.11a/b/g
+ physical layers. Also, an 802.11 Station (STA) can move between
+ different access points within the same domain without the IP
+ stack being aware of the movement. In this case, the IEEE 802.11
+ Media Access Control (MAC) layer takes care of the mobility,
+ making the media change invisible to the upper layers. Another
+ example is IEEE 802.3, which supports changing the rate from 10
+ Mbps to 100 Mbps and to 1000 Mbps. Another example is the
+ situation in the 3GPP Evolved Packet System [TS23401] where the
+ User Equipment (UE) can perform inter-access handovers between
+ three different access technologies (2G GSM/EDGE Radio Access
+ Network (GERAN), 3G Universal Terrestrial Radio Access Network
+ (UTRAN), and 4G Evolved UTRAN (E-UTRAN)) that are invisible to the
+ IP layer at the UE.
+
+
+
+Melia & Gundavelli Informational [Page 4]
+
+RFC 7847 Logical-Interface Support May 2016
+
+
+ o A logical interface denotes a mechanism that logically groups
+ several physical interfaces so they appear to the IP layer as a
+ single interface (see Figure 1). Depending on the type of access
+ technologies, it might be possible to use more than one physical
+ interface at a time -- such that the node is simultaneously
+ attached via different access technologies -- or just perform
+ handovers across a variety of physical interfaces. Controlling
+ the way the different access technologies are used (simultaneous,
+ sequential attachment, etc.) is not trivial and requires
+ additional intelligence and/or configuration within the logical-
+ interface implementation. The configuration is typically handled
+ via a connection manager, and it is based on a combination of user
+ preferences on one hand and operator preferences such as those
+ provisioned by the Access Network Discovery and Selection Function
+ (ANDSF) [TS23402] on the other hand. The IETF Interfaces MIB
+ specified in [RFC2863] and the YANG data model for interface
+ management specified in [RFC7223] treat a logical interface just
+ like any other type of network interface on the host. This
+ essentially makes the logical interface a natural operating system
+ construct.
+
+3.2. Link-Layer Support
+
+ Link-layer mobility support applies to cases in which the same link-
+ layer technology is used and mobility can be fully handled at that
+ layer. One example is the case where several 802.11 access points
+ are deployed in the same subnet with a common IP-layer configuration
+ (DHCP server, default router, etc.). In this case, the handover
+ across access points need not be hidden to the IP layer since the IP-
+ layer configuration remains the same after a handover. This type of
+ scenario is applicable to cases when the different points of
+ attachment (i.e., access points) belong to the same network domain,
+ e.g., enterprise, hotspots from same operator, etc.
+
+ Since this type of link-layer technology does not typically allow for
+ simultaneous attachment to different access networks of the same
+ technology, the logical interface would not be used to provide
+ simultaneous access for purposes of multihoming or flow mobility.
+ Instead, the logical interface can be used to provide inter-access
+ technology handover between this type of link-layer technology and
+ another link-layer technology, e.g., between IEEE 802.11 and IEEE
+ 802.16.
+
+
+
+
+
+
+
+
+
+Melia & Gundavelli Informational [Page 5]
+
+RFC 7847 Logical-Interface Support May 2016
+
+
+3.3. Logical Interface
+
+ The use of a logical interface allows the mobile node to provide a
+ single-interface perspective to the IP layer and its upper layers
+ (transport and application). Doing so allows inter-access technology
+ handovers or application flow handovers to be hidden across different
+ physical interfaces.
+
+ The logical interface may support simultaneous attachment in addition
+ to sequential attachment. It requires additional support at the node
+ and the network in order to benefit from simultaneous attachment.
+ For example, special mechanisms are required to enable addressing a
+ particular interface from the network (e.g., for flow mobility). In
+ particular, extensions to PMIPv6 are required in order to enable the
+ network (i.e., the mobile access gateway (MAG) and local mobility
+ anchor (LMA)) to deal with the logical interface, instead of using
+ extensions to IP interfaces as currently specified in RFC 5213. RFC
+ 5213 assumes that each physical interface capable of attaching to a
+ MAG is an IP interface, while the logical-interface solution groups
+ several physical interfaces under the same IP logical interface.
+
+ It is therefore clear that the logical-interface approach satisfies
+ the requirement of multi-access technology and supports both
+ sequential and simultaneous access.
+
+4. Technology Use Cases
+
+ 3GPP has defined the Evolved Packet System (EPS) for heterogeneous
+ wireless access. A mobile device equipped with 3GPP and non-3GPP
+ wireless technologies can simultaneously or sequentially connect to
+ any of the available access networks and receive IP services through
+ any of them. This document focuses on employing a logical interface
+ for simultaneous and sequential use of a variety of access
+ technologies.
+
+ As mentioned in the previous sections, the logical-interface
+ construct is able to hide from the IP layer the specifics of each
+ technology in the context of network-based mobility (e.g., in multi-
+ access technology networks based on PMIPv6). The LIF concept can be
+ used with at least the following technologies: 3GPP access
+ technologies (3G and LTE), IEEE 802.16 access technology, and IEEE
+ 802.11 access technology.
+
+ In some UE implementations, the wireless connection setup is based on
+ creation of a PPP interface between the IP layer and the wireless
+ modem that is configured with the IP Control Protocol (IPCP) and IPv6
+ Control Protocol (IPv6CP) [RFC5072]. In this case, the PPP interface
+ does not have any layer 2 (L2) addresses assigned. In some other
+
+
+
+Melia & Gundavelli Informational [Page 6]
+
+RFC 7847 Logical-Interface Support May 2016
+
+
+ implementations, the wireless modem is presented to the IP layer as a
+ virtual Ethernet interface.
+
+5. Logical-Interface Functional Details
+
+ This section identifies the functional details of a logical interface
+ and provides some implementation considerations.
+
+ On most operating systems, a network interface is associated with a
+ physical device that offers the services for transmitting and
+ receiving IP packets from the network. In some configurations, a
+ network interface can also be implemented as a logical interface,
+ which does not have the inherent capability to transmit or receive
+ packets on a physical medium, but relies on other physical interfaces
+ for such services. An example of such configuration is an IP tunnel
+ interface.
+
+ An overview of a logical interface is shown in Figure 1. The logical
+ interface allows heterogeneous attachment while making changes in the
+ underlying media transparent to the IP stack. Simultaneous and
+ sequential network attachment procedures are therefore possible,
+ enabling inter-technology and flow mobility scenarios.
+
+ +----------------------------+
+ | TCP/UDP |
+ Session-to-IP +---->| |
+ Address Binding | +----------------------------+
+ +---->| IP |
+ IP Address +---->| |
+ Binding | +----------------------------+
+ +---->| Logical Interface |
+ Logical-to- +---->| IPv4/IPv6 Address |
+ Physical | +----------------------------+
+ Interface +---->| L2 | L2 | | L2 |
+ Binding |(IF#1)|(IF#2)| ..... |(IF#n)|
+ +------+------+ +------+
+ | L1 | L1 | | L1 |
+ | | | | |
+ +------+------+ +------+
+
+ Figure 1: General Overview of Logical Interface
+
+ From the perspective of the IP stack and the applications, a logical
+ interface is just another interface. In fact, the logical interface
+ is only visible to the IP and upper layers when enabled. A host does
+ not see any operational difference between a logical and a physical
+ interface. As with physical interfaces, a logical interface is
+ represented as a software object to which IP address configuration is
+
+
+
+Melia & Gundavelli Informational [Page 7]
+
+RFC 7847 Logical-Interface Support May 2016
+
+
+ bound. However, the logical interface has some special properties
+ that are essential for enabling inter-technology handover and flow-
+ mobility features. Following are those properties:
+
+ 1. The logical interface has a relation to a set of physical
+ interfaces (sub-interfaces) on the host that it is abstracting.
+ These sub-interfaces can be attached or detached from the logical
+ interface at any time. The sub-interfaces attached to a logical
+ interface are not visible to the IP and upper layers.
+
+ 2. The logical interface may be attached to multiple access
+ technologies.
+
+ 3. The Transmit/Receive functions of the logical interface are
+ mapped to the Transmit/Receive services exposed by the sub-
+ interfaces. This mapping is dynamic, and any change is not
+ visible to the upper layers of the IP stack.
+
+ 4. The logical interface maintains IP flow information for each of
+ its sub-interfaces. A conceptual data structure is maintained
+ for this purpose. The host may populate this information based
+ on tracking each of the sub-interfaces for the active flows.
+
+5.1. Configuration of a Logical Interface
+
+ A host may be statically configured with the logical-interface
+ configuration, or an application such as a connection manager on the
+ host may dynamically create it. Furthermore, the set of sub-
+ interfaces that are part of a logical-interface construct may be a
+ fixed set or may be kept dynamic, with the sub-interfaces getting
+ added or deleted as needed. The specific details related to these
+ configuration aspects are implementation specific and are outside the
+ scope of this document.
+
+ The IP layer should be configured with a default router reachable via
+ the logical interface. The default router can be internal to the
+ logical interface, i.e., it is a logical router that in turn decides
+ which physical interface is to be used to transmit packets.
+
+
+
+
+
+
+
+
+
+
+
+
+
+Melia & Gundavelli Informational [Page 8]
+
+RFC 7847 Logical-Interface Support May 2016
+
+
+5.2. Logical-Interface Conceptual Data Structures
+
+ Every logical interface maintains a list of sub-interfaces that are
+ part of that logical-interface construct. This is a conceptual data
+ structure, called the LIF table. Figure 2 shows an example LIF table
+ where logical interface LIF-1 has three sub-interfaces, ETH-0,
+ WLAN-0, and LTE-0, and logical interface LIF-2 has two sub-
+ interfaces, ETH-1 and WLAN-1. For each LIF entry, the table should
+ store the associated link status and policy associated with that sub-
+ interface (e.g., active or not active). The method by which the
+ routing policies are configured on the host is out of scope for this
+ document.
+
+ +=======================+========================+==================+
+ | Logical_Interface | Sub_Interface | Status/Policy |
+ +=======================+========================+==================+
+ | LIF-1 | ETH-0 | UP |
+ +=======================+========================+==================+
+ | LIF-1 | WLAN-0 | DOWN |
+ +=======================+========================+==================+
+ | LIF-1 | LTE-0 | UP |
+ +=======================+========================+==================+
+ | LIF-2 | ETH-1 | UP |
+ +=======================+========================+==================+
+ | LIF-2 | WLAN-1 | UP |
+ +=======================+========================+==================+
+
+ Figure 2: Logical-Interface Table
+
+ The logical interface also maintains the list of flows associated
+ with a given sub-interface, and this conceptual data structure is
+ called the Flow table. Figure 3 shows an example Flow table, where
+ flows FID-1, FID-2, FID-3, FID-4, and FID-5 are associated with sub-
+ interfaces ETH-0, WLAN-0, LTE-0, ETH-1, and WLAN-1, respectively.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Melia & Gundavelli Informational [Page 9]
+
+RFC 7847 Logical-Interface Support May 2016
+
+
+ +=======================+========================+
+ | Flow | Sub_Interface |
+ +=======================+========================+
+ | FID-1 | ETH-0 |
+ +=======================+========================+
+ | FID-2 | WLAN-0 |
+ +=======================+========================+
+ | FID-3 | LTE-0 |
+ +=======================+========================+
+ | FID-4 | ETH-1 |
+ +=======================+========================+
+ | FID-5 | WLAN-1 |
+ +=======================+========================+
+
+ Figure 3: Flow Table
+
+ The Flow table allows the logical interface to properly route each IP
+ flow over a specific sub-interface. The logical interface can
+ identify the flows arriving on its sub-interfaces and associate them
+ to those sub-interfaces. This approach is similar to reflective QoS
+ performed by the IP routers. For locally generated traffic (e.g.,
+ unicast flows), the logical interface should perform interface
+ selection based on the Flow Routing Policies. In case traffic of an
+ existing flow is suddenly received from the network on a different
+ sub-interface from the one locally stored, the logical interface
+ should interpret the event as an explicit flow mobility trigger from
+ the network, and it should update the corresponding entry in the Flow
+ table. Similarly, locally generated events from the sub-interfaces
+ or configuration updates to the local policy rules can cause updates
+ to the table and hence trigger flow mobility.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Melia & Gundavelli Informational [Page 10]
+
+RFC 7847 Logical-Interface Support May 2016
+
+
+6. Logical-Interface Use Cases in Proxy Mobile IPv6
+
+ This section explains how the logical-interface support on the mobile
+ node can be used for enabling some of the Proxy Mobile IPv6 protocol
+ features.
+
+6.1. Multihoming Support
+
+ Figure 4 shows a mobile node with multiple interfaces attached to a
+ Proxy Mobile IPv6 domain. In this scenario, the mobile node is
+ configured to use a logical interface over the physical interfaces
+ through which it is attached.
+
+ LMA Binding Table
+ +========================+
+ +----+ | HNP MN-ID CoA ATT |
+ |LMA | +========================+
+ +----+ | HNP-1 MN-1 PCoA-1 5 |
+ //\\ | HNP-1 MN-1 PCoA-2 4 |
+ +---------//--\\-----------+
+ ( // \\ )
+ ( // \\ )
+ +------//--------\\--------+
+ // \\
+ PCoA-1 // \\ PCoA-2
+ +----+ +----+
+ (WLAN) |MAG1| |MAG2| (3GPP)
+ +----+ +----+
+ \ /
+ \ /
+ \ /
+ \ /
+ \ /
+ +-------+ +-------+
+ | if_1 | | if_2 |
+ |(WLAN) | |(3GPP) |
+ +-------+-+-------+
+ | Logical |
+ | Interface |
+ | (HNP-1) |
+ +-----------------|
+ | MN |
+ +-----------------+
+
+ Figure 4: Multihoming Support
+
+
+
+
+
+
+Melia & Gundavelli Informational [Page 11]
+
+RFC 7847 Logical-Interface Support May 2016
+
+
+6.2. Inter-technology Handoff Support
+
+ The Proxy Mobile IPv6 protocol enables a mobile node with multiple
+ network interfaces to move between access technologies but still
+ retain the same address configuration on its attached interface.
+ Figure 5 shows a mobile node performing an inter-technology handoff
+ between access networks. The protocol enables a mobile node to
+ achieve address continuity during handoffs. If the host is
+ configured to use a logical interface over the physical interface
+ through which it is attached, following are the related
+ considerations.
+
+ LMA's Binding Table
+ +==========================+
+ +----+ | HNP MN-ID CoA ATT |
+ |LMA | +==========================+
+ +----+ | HNP-1 MN-1 PCoA-1 5 |
+ //\\ (pCoA-2)(4) <--change
+ +---------//--\\-----------+
+ ( // \\ )
+ ( // \\ )
+ +------//--------\\--------+
+ // \\
+ PCoA-1 // \\ PCoA-2
+ +----+ +----+
+ (WLAN) |MAG1| |MAG2| (3GPP)
+ +----+ +----+
+ \ /
+ \ Handoff /
+ \ /
+ \ /
+ +-------+ +-------+
+ | if_1 | | if_2 |
+ |(WLAN) | |(3GPP) |
+ +-------+-+-------+
+ | Logical |
+ | Interface |
+ | (HNP-1) |
+ +-----------------|
+ | MN |
+ +-----------------+
+
+ Figure 5: Inter-technology Handoff Support
+
+ o When the mobile node performs a handoff between if_1 and if_2, the
+ change will not be visible to the applications of the mobile node.
+
+
+
+
+
+Melia & Gundavelli Informational [Page 12]
+
+RFC 7847 Logical-Interface Support May 2016
+
+
+ o The protocol signaling between the network elements will ensure
+ the local mobility anchor will switch the forwarding for the
+ advertised prefix set from MAG1 to MAG2.
+
+6.3. Flow Mobility Support
+
+ To support IP flow mobility, there is a need to support vertical
+ handoff scenarios such as transferring a subset of a prefix(es)
+ (hence the flows associated to it/them) from one interface to
+ another. The mobile node can support this scenario by using the
+ logical-interface support. This scenario is similar to the inter-
+ technology handoff scenario defined in Section 6.2; only a subset of
+ the prefixes are moved between interfaces.
+
+ Additionally, IP flow mobility in general initiates when the LMA
+ decides to move a particular flow from its default path to a
+ different one. The LMA can decide the best MAG to be used to forward
+ a particular flow when the flow is initiated (e.g., based on
+ application policy profiles) and/or during the lifetime of the flow
+ upon receiving a network-based or a mobile-based trigger. However,
+ the specific details on how the LMA can formulate such flow policy is
+ outside the scope of this document.
+
+7. Security Considerations
+
+ This specification explains the operational details of a logical
+ interface on an IP host. The logical-interface implementation on the
+ host is not visible to the network and does not require any special
+ security considerations.
+
+ Different layer 2 interfaces and the access networks to which they
+ are connected have different security properties. For example, the
+ layer 2 network security of a Wireless LAN network operated by an end
+ user is in the control of the home user whereas an LTE operator has
+ control of the layer 2 security of the LTE access network. An
+ external entity using lawful means, or through other means, obtains
+ the security keys from the LTE operator, but the same may not be
+ possible in the case of a Wireless LAN network operated by a home
+ user. Therefore, grouping interfaces with such varying security
+ properties into one logical interface could have negative
+ consequences in some cases. Such differences, though subtle, are
+ entirely hidden by logical interfaces and are unknown to the upper
+ layers.
+
+
+
+
+
+
+
+
+Melia & Gundavelli Informational [Page 13]
+
+RFC 7847 Logical-Interface Support May 2016
+
+
+8. References
+
+8.1. Normative References
+
+ [RFC5213] Gundavelli, S., Ed., Leung, K., Devarapalli, V.,
+ Chowdhury, K., and B. Patil, "Proxy Mobile IPv6",
+ RFC 5213, DOI 10.17487/RFC5213, August 2008,
+ <http://www.rfc-editor.org/info/rfc5213>.
+
+ [RFC5844] Wakikawa, R. and S. Gundavelli, "IPv4 Support for Proxy
+ Mobile IPv6", RFC 5844, DOI 10.17487/RFC5844, May 2010,
+ <http://www.rfc-editor.org/info/rfc5844>.
+
+8.2. Informative References
+
+ [RFC2863] McCloghrie, K. and F. Kastenholz, "The Interfaces Group
+ MIB", RFC 2863, DOI 10.17487/RFC2863, June 2000,
+ <http://www.rfc-editor.org/info/rfc2863>.
+
+ [RFC4301] Kent, S. and K. Seo, "Security Architecture for the
+ Internet Protocol", RFC 4301, DOI 10.17487/RFC4301,
+ December 2005, <http://www.rfc-editor.org/info/rfc4301>.
+
+ [RFC5072] Varada, S., Ed., Haskins, D., and E. Allen, "IP Version 6
+ over PPP", RFC 5072, DOI 10.17487/RFC5072, September 2007,
+ <http://www.rfc-editor.org/info/rfc5072>.
+
+ [RFC6275] Perkins, C., Ed., Johnson, D., and J. Arkko, "Mobility
+ Support in IPv6", RFC 6275, DOI 10.17487/RFC6275, July
+ 2011, <http://www.rfc-editor.org/info/rfc6275>.
+
+ [RFC7223] Bjorklund, M., "A YANG Data Model for Interface
+ Management", RFC 7223, DOI 10.17487/RFC7223, May 2014,
+ <http://www.rfc-editor.org/info/rfc7223>.
+
+ [RFC7864] Bernardos, CJ., Ed., "Proxy Mobile IPv6 Extensions to
+ Support Flow Mobility", RFC 7864, DOI 10.17487/RFC7864,
+ May 2016, <http://www.rfc-editor.org/info/rfc7864>.
+
+ [TS23401] 3rd Generation Partnership Project, "Technical
+ Specification Group Services and System Aspects; General
+ Packet Radio Service (GPRS) enhancements for Evolved
+ Universal Terrestrial Radio Access Network (E-UTRAN)
+ access", TS 23.401, V13.6.0, March 2016.
+
+
+
+
+
+
+
+Melia & Gundavelli Informational [Page 14]
+
+RFC 7847 Logical-Interface Support May 2016
+
+
+ [TS23402] 3rd Generation Partnership Project, "Technical
+ Specification Group Services and System Aspects;
+ Architecture enhancements for non-3GPP accesses", TS
+ 23.402, V13.5.0, March 2016.
+
+Acknowledgements
+
+ The authors would like to acknowledge all the discussions on this
+ topic in the NETLMM and NETEXT working groups. The authors would
+ also like to thank Joo-Sang Youn, Pierrick Seite, Rajeev Koodli,
+ Basavaraj Patil, Peter McCann, Julien Laganier, Maximilian Riegel,
+ Georgios Karagian, Stephen Farrell, and Benoit Claise for their input
+ to the document.
+
+Contributors
+
+ This document reflects contributions from the following individuals
+ (listed in alphabetical order):
+
+ Carlos Jesus Bernardos Cano
+ Email: cjbc@it.uc3m.es
+
+ Antonio De la Oliva
+ Email: aoliva@it.uc3m.es
+
+ Yong-Geun Hong
+ Email: yonggeun.hong@gmail.com
+
+ Kent Leung
+ Email: kleung@cisco.com
+
+ Tran Minh Trung
+ Email: trungtm2909@gmail.com
+
+ Hidetoshi Yokota
+ Email: yokota@kddilabs.jp
+
+ Juan Carlos Zuniga
+ Email: JuanCarlos.Zuniga@InterDigital.com
+
+
+
+
+
+
+
+
+
+
+
+
+Melia & Gundavelli Informational [Page 15]
+
+RFC 7847 Logical-Interface Support May 2016
+
+
+Authors' Addresses
+
+ Telemaco Melia (editor)
+ Kudelski Security
+ Geneva
+ Switzerland
+
+ Email: telemaco.melia@gmail.com
+
+
+ Sri Gundavelli (editor)
+ Cisco
+ 170 West Tasman Drive
+ San Jose, CA 95134
+ United States
+
+ Email: sgundave@cisco.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Melia & Gundavelli Informational [Page 16]
+