Personal                                                    A. O'Neill 
Internet Draft                                              Flarion Technologies
Document: draft-oneill-mip-nested-00.txt                    8 May 2002
Expires: Oct 2002                                       
                                                         


                     Nested MIP for IP Mobility Management
                       <draft-oneill-mip-nested-00.txt>


Status of this Memo

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of RFC2026.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet- Drafts as reference
   material or to cite them other than as work in progress.

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt
   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

Copyright Notice
   Copyright (C) The Internet Society (2002). All Rights Reserved.

Abstract

   Regional Registration provides a mechanism for MIPv4 to localise 
   registrations. The Mobile Node (MN) initially registers to the HA via the 
   Gateway Foreign Agent (GFA) so that the HA can learn the GFA Care of Address 
   (CoA). The MN can then subsequently use a Regional Registration to maintain 
   the binding in the GFA as the MN moves and changes its Foreign Agent (FA) CoA 
   or Collocated CoA (CCoA). It can continue to do so whilst a MN remains under 
   the GFA through which the MN sent the Home Registration. The GFA performs CoA 
   switching between the GFA CoA and that used by the MN (CCoA or FA CoA).

   Whilst the regional registration provides localisation, it does not at the 
   same time provide registration aggregation for MNs employing multiple HoAs. 
   The ability to concurrently support multiple MN addresses from arbitrary 
   addressing domains is a 3GPP commercial and technical requirement and 
   therefore of interest to operators seeking to move to an all-IP solution 
   based on MIP. In addition, the GFA is a very stateful element in the core of  
   the Internet that cannot be bypassed on failure through routing updates.

   This draft describes a complementary, less stateful model for localisation 
   that in addition supports aggregation both for regional-like registration and 
   hand-offs. The model re-uses as much as possible from the home registration 
   signalling model of [RegTun] but requires a new form of aggregated regional 
   registration.


A.W. O'Neill                   Expires Oct 2002                        [Page 1]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002

INDEX
Abstract                                                          

1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . .  2

2. Conventions used in this document . . . . . . . . . . . . . . . . .  2                          

3. Terminology used in this document . . . . . . . . . . . . . . . . .  2               

4. Motivation. . . . . . . . . . . . . . . . . . . . . . . . . . . . .  4

5. Basic IPv4 Nested MIP Design  . . . . . . . . . . . . . . . . . . .  6
5.1. Regional Tunnelling Implications. . . . . . . . . . . . . . . . .  8
5.2. Reverse Tunnelling Implications . . . . . . . . . . . . . . . . .  9
5.3. Private addressing. . . . . . . . . . . . . . . . . . . . . . . . 10
5.4. Security Associations . . . . . . . . . . . . . . . . . . . . . . 11

6. Basic Nested MIPv4 Signalling Description . . . . . . . . . . . . . 11 
6.1. Local Access Only Signalling. . . . . . . . . . . . . . . . . . . 12
6.2. Remote Access Only Signalling . . . . . . . . . . . . . . . . . . 12 
6.3. Local and Remote Access Signalling. . . . . . . . . . . . . . . . 13  

7. Enhanced RA Registration. . . . . . . . . . . . . . . . . . . . . . 13 
   7.1 RA MIP Registration via the FA. . . . . . . . . . . . . . . . . 13 
   7.2 RA MIP Registration via the FA and RMA. . . . . . . . . . . . . 14  
   7.3 Efficient Remote Only Signalling. . . . . . . . . . . . . . . . 15

8. AAA Support for Nested MIP. . . . . . . . . . . . . . . . . . . . . 15
   8.1. FA AAA Requests. . . . . . . . . . . . . . . . . . . . . . . . 15
   8.2. RA AAA Requests. . . . . . . . . . . . . . . . . . . . . . . . 17 

9. IPv6 Considerations . . . . . . . . . . . . . . . . . . . . . . . . 18

10. Security Considerations. . . . . . . . . . . . . . . . . . . . . . 18

11. Notice Regarding Intellectual Property Rights. . . . . . . . . . . 18

12. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . 18

13. References . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

1. Introduction

   Regional Registration provides a mechanism for MIPv4 to localise  
   registrations. The MN initially registers to the HA via the GFA so that the 
   HA can learn the GFA CoA. The MN can then subsequently use a Regional 
   Registration to maintain the binding in the GFA as the MN moves and changes 
   its FA CoA or CCoA. It can continue to do so whilst a MN remains under the 
   GFA through which the MN sent the Home Registration. The GFA performs CoA 
   switching between that of the GFA CoA and that used by the MN. Whilst the 
   regional registration provides localisation, it does not at the same 
   time provide registration aggregation for MNs employing multiple HoAs. 
   The ability to concurrently support multiple MN addresses from arbitrary 
   addressing domains is a 3GPP commercial and technical requirement and 
   therefore of interest to operators seeking to move to an all-IP solution 
   based on MIP. 

A.W. O'Neill                   Expires Oct 2002                        [Page 2]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002

   This draft describes a complementary model less stateful model for 
   localization that in addition supports aggregation both for regional-like 
   registration and hand-offs. The model re-uses as much as possible from the 
   home registration signalling model of [RegTun] but requires a new form of 
   regional registration. The required modifications to [RegTun] are described 
   in [RegTunMods] and focus on generalising the GFAIPext and the HFAext in the 
   home registration so that it can used across multiple addressing domains and 
   for non-GFA intermediate MIP nodes. The modifications also ensure that the MN 
   can be dynamically allocated an intermediate CoA by the intermediate MIP node 
   as well as being allocated a dynamic HA by the AAA system.

   These modifications are then exploited in this draft to enable the MN to be 
   assigned a local HA that also then acts as a regional MIP node. The local HA 
   works in unison with any global HAs to provide local and or remote internet 
   access services for the MN. The remote access MIP layer is nested within the 
   local access MIP layer by using the local RoA as a CCoA for the global HoAs, 
   as well as a source / destination address for local access traffic. The 
   nesting results in a second layer of encapsulation between the local HA and 
   the FA, in addition to the remote access encapsulation between the global HA 
   and the MN. The benefit though is that as the local HoA visitor list for the 
   RoA is updated with each new FA CoA, an arbitrary number of remote access HoA 
   specific flows, encapsulated within the RoA,  are automatically redirected to 
   the new FA without requiring additional MIP signalling or visitor list 
   changes. Other benefits include the localisation of regional signalling, and 
   clean separation between local and global concerns wrt security, addressing 
   plans, MIP forwarding models, privacy and AAA. Similarly, during hand-off, a 
   BU to the old FA for the RoA can enable aggregated inter-FA forwarding for a 
   multitude of HoA flows using that RoA.

   Whilst the allocation of both a local and remote MIP home address places 
   additional burden on the IPv4 address space, this can be mitigated through 
   the use of private addresses in either or both the local and remote access 
   layers due to the clean separation of the layers that the model provides. The 
   model also supports the use of MIPv4 and MIPv6 in the two layers and so 
   provides a useful migration tool as well as operator independence in terms of 
   transition.


2. Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", 
   "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in this document are to 
   be interpreted as described in RFC-2119 [RFC2119]. 


3. Terminology used in this document

   Much of the terminology used in this document borrows from Mobile IPv4 
   [MIPv4], MIP Regional Tunnelling [RegTun], MIP Reverse Tunnelling [RevTun] 
   and MIP Route Optimisation [RoutOpt]. This draft introduces and uses the 
   following additional terminology.






A.W. O'Neill                   Expires Oct 2002                        [Page 3]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002


Local Access service - Internet access using a topologically local address
Remote Access service - Internet access using a topologically remote address
Regional Mobility Agent (RMA) - regional node supporting at least local HA 
Regional Address (RoA) - A HoA-like address from the RMA based local HA function
RMA Region - the set of FAs able to allocate that RMA to a MN 
LA/RA MIP - Local/Remote Access MIP functionality between the MN and the RMA/HA
LA visitor list - the MIP visitor list for the RoA / RMA
RA visitor list - the MIP visitor list for the CCoA / HA
LA/RA-NAI - the MN-NAI included in the LA/RA MIP Registration for AAA 
LA/RA Hand-off - a hand-off effected using the LA/RA MIP signalling layer
LA/RA MIP Reg - An MIP Reg in the LA/RA layer to the RMA/HA.
Inter-FA Hand-off - a HO between two FAs that updates the FA CoA in the RMA.
Inter-RMA Hand-off - a HO between two RMAs that results in a RoA change
HFAIPext - the HFA IP address extension (generalization of GFAIPext)


4. Motivation

   Traditional Internet Local Access (LA) assigns to a host a topologically 
   correct local address for the duration of a Local Access session. The 
   movement of the host across different access technologies or optionally for 
   different sessions on the same access technology, results in the Mobile Host 
   acquiring different addresses for each Local Access session. MIP has 
   historically provided a Remote Access (RA) service whereby a MN can roam with 
   a remote address from a home subnet onto a foreign subnet, by hiding that 
   address within an encapsulation using a local Care of Address from the Local 
   Access provider. If a Co-located Care of Address (CCoA) is assigned by the 
   local access provider, then the MN can use that address for MIP Remote 
   Access, or alternatively use that address for PPTP and/or IPSec remote access 
   (IPSRA) tunnelling.

   MIP has more recently been targeted at wireless deployment scenarios where 
   MIP is used to provide remote access from a wireless provider to a service 
   domain such as a corporate, content or application provider or ISP. For this 
   model, MIP has been extended to support hand-off between FAs as the MN moves 
   during an access session. Herein lies a conflict though because the hand-off 
   is primarily local mobility management but is coupled to a remote access MIP 
   Registration/Reply exchange. If the remote access provider is the same as the 
   wireless provider then the remote access HA, and the intermediate networking 
   via the FA, can be designed and dimensioned to provide the required levels of 
   availability and reliability for the hand-off. If this is not done then local 
   mobility management can be compromised, through the slow response or 
   unavailability of the HA, generating the potential for chaining of inter-FA 
   forwarding tunnels. If the remote access and wireless providers are 
   different, then the performance of the wireless operators local mobility 
   management is dependent on a third party, which represents unacceptable 
   commercial coupling. This provides the motivation for regional registration 
   and tunnelling in [RegTun] and is also one motivation for our own 
   complimentary solution to localization.

   If we then look further into commercial requirements, the design of 3GPP 
   systems mandates the concurrent support in the handset and network for 
   multiple addresses from third party domains, from which services are 
   consumed. 


A.W. O'Neill                   Expires Oct 2002                        [Page 4]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002


   Examples of such domains are corporate networks, content and 
   application stub networks, as well as full ISPs that may be aligned with, or 
   commercially distinct from, the wireless operator. The concurrent address 
   support allows a user for example to have connectivity with its local ISP for 
   Internet Local Access, with a remote corporate network for business e-mail 
   (Remote Access 1) whilst in addition receiving a news feed from a 
   subscription based financial information provider network (Remote Access 2). 
   These are also requirements common to other broadband Internet systems. A MIP 
   based system should therefore be able to efficiently deal with multiple 
   concurrent HoAs.

   In 3G networks, the hand-off of the radio bearers for each MN uses a single 
   aggregated signalling phase for all the packet data protocol sessions 
   (PDPcontexts) up to the RAN Controller. However, hand-off between GPRS 
   Support Nodes (eg SGSNs where the MN potentially has Generic Tunnelling 
   Protocol (GTP) tunnels with multiple GGSNs), leads to multiple parallel 
   signalling phases, although each GTP tunnel can still itself move multiple 
   PDPcontexts within that tunnel. Returning to the situation with an all-IP 
   based solution based on MIP, each concurrent address (each HoA) implies a 
   distinct Remote Access MIP session (cf GTP), back to each independent 
   addressing domain. The movement of the MN then requires the update of each 
   distinct HA/HoA with the new CoA of the MN. This translates into multiple MIP 
   Registrations from the MN to/from each HA, along with multiple inter-FA hand-
   off exchanges. Even when Regional Tunnelling [RegTun] is deployed, each 
   regional registration is HoA specific and therefore multiple parallel MIP 
   signalling phases are still required both to the GFA and to the previous FA. 
   Just as in the case of 3G, there is a need in an MIP local mobility 
   management system for aggregated hand-off as well as localized hand-off to a 
   regional MIP element. In addition, there is also a need, following sufficient 
   MN movement, for the regional hand-off of each remote access session between 
   regional MIP elements that can be considered to be equivalent in some ways to 
   the SGSN. Whilst [RegTun] does support GFA hand-off it does not do so (new 
   home registration) in a way which preserves in-flight traffic between the HA 
   and the old GFA, by failing to reroute traffic already present at the old GFA 
   to the new GFA. [ParallelMIP] describes a backwards compatible approach to 
   extend inter-FA and GFA signalling to support aggregation whilst [RMAsig] 
   describes an architecture for supporting hand-off between regional elements 
   whilst preserving in-flight traffic.

   Finally, another key commercial requirement is to be able to support Local 
   Access in conjunction with Remote Access, each with distinct policy controls. 
   This is because Local Access is a commodity service and many service 
   providers would not wish to incur the expense of routing all customer traffic 
   (ie local and remote access) via their remote third party value-adding 
   service networks. They are only interested primarily in value-added traffic 
   flows. This is also true in corporate networks where only Intranet traffic 
   may wish to be routed to the corporate stub network whilst external Internet 
   access may be provided in the local vicinity of the access connection. In 
   addition, wireless operators would not wish to lose the ability to offer ISPs 
   services whilst at the same time wishing to support third party value-added 
   content and applications on their networks. This is not a universal situation 
   and so the local operator MIP solution needs to be able to flexibly handle 
   various combinations of local and remote access service and associated MN 
   specific traffic privileges. 

   
A.W. O'Neill                   Expires Oct 2002                        [Page 5]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002


   Local Access is possible within the existing Remote Access MIP model in three 
   main ways. Firstly the MN can acquire a CCoA at the FA and use this as a 
   source address for local traffic whilst using the CCoA as the binding for the 
   remote access layer. The problem here though is that if the MN then moves 
   from the FA then the local access address and the HA binding immediately 
   becomes invalid, and associated address allocation delays is the reason that 
   the use of the CCoA as a source address is constrained in MIPv4. The second 
   alternative is to use the HoA as a source address (not reverse tunnelling) 
   but this requires the foreign FA and domain to not undertake ingress 
   filtering, and still results in dog-leg routing for the return traffic via 
   the remote access HA. The third option is to use a second parallel MIP 
   'remote' access session with a local HA to generate local access in parallel 
   with a truly remote access session to a global HA. However, this once again 
   leads to additional MIP signalling and processing load further demonstrating 
   the need for aggregated hand-off.  Clearly, none of these are in any way 
   optimal and a better solution needs to be found for supporting local access 
   in MIPv4 that can survive hand-off and ingress filtering checks.

   These limitations in existing technology have motivated the design of two 
   additional regional mechanisms, each of which can co-exist if necessary with 
   [RegTun] in the Internet, each of which is optimal for a subset of the all-IP 
   mobility requirements. This draft deals with Nested MIP whilst a subsequent 
   draft [ConcatMIP] deals with Concatenated MIP.


5. Basic Nested MIPv4 Design

   The above limitations can be avoided through the use of two distinct MIP 
   access layers, where potentially multiple Remote Access sessions are 
   supported in the Remote Access layer, all running over the single Local 
   Access MIP session in the Local Access layer. The forwarding is shown in 
   figure 1.

   The LA layer runs between the MN and a Regional Mobility Agent (RMA) that 
   provides the MN with a Regional Address (RoA- a la HoA). The RMA in this case 
   acts like a regional HA and the RoA like a regional HoA. The FA allocates a 
   topologically close RMA to the MN by selecting one RMA from a configured or 
   discovered set of available RMAs. Availability can simplistically for example 
   be determined from previous successful and failed MIP Reg/Reps from MNs to 
   RMAs. A choice of RMAs is useful to enable load-sharing and to improve 
   availability. The FA can then use dynamic MIP address allocation to acquire 
   the RoA from the assigned RMA. The RoA can satisfy ingress filtering at least 
   within the region of that RMA, and certainly within the domain, and the RoA 
   will obviously survive hand-off between FAs beneath the same RMA because the 
   LA MIP Registrations will update the evolving FA CoA. The topological 
   closeness of the RMA means that the dog-leg routing for that RoA address is 
   of little concern from a latency, QoS or reachability perspective. As the MN 
   moves, then the binding between the RoA and the MNs current LA CoA is updated 
   using standard MIP Registrations with hand-off extensions as detailed in 
   [RoutOpt] and/or [LowLat]. LA MIP enables a MN to use either a CCoA or FA CoA 
   for this Registration, but in the basic MIPv4 design this is a FA CoA. The MN 
   can, in addition, continue to use an RMA after it moves into legacy regions 
   that lack their own RMA. It does this by continuing to send LA MIP   
   Registrations, from the external FA to the RMA, although there are known 
   additional constraints with what is likely to be an inter-domain hand-off. 

A.W. O'Neill                   Expires Oct 2002                        [Page 6]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002

   Regional inter-RMA hand-off is however preferred, as is described in 
   [RMAsig], because continuing to use a non-local RMA comes at the cost of 
   increasing dog-leg routing which compromises much of the motivation for the 
   deployment of an RMA. 

   This localised MIP capability is known as the Local Access MIP layer (LA 
   MIP), which effectively provides localised mobility management as well as 
   optionally providing Local Access services. For Local Access service, the MN 
   simply uses the RoA from the RMA as an interface address and hence as a 
   source and destination address for packets. Downlink (forward) packets are 
   routed to the RMA where they are encapsulated into the present FA CoA for the 
   MN. The RoA is therefore valid within the region of the RMA as it can survive 
   a number of inter-FA hand-offs through the LA MIP hand-off signalling.

   If the MN wishes to also/alternatively invoke Remote Access, then the RoA can 
   be used as a global CCoA by the Remote Access MIP layer (RA MIP). The RoA is 
   included in the RA MIP Registrations to each global HA, as the CCoA for each 
   of the HoAs. The Remote Access sessions are effectively nested within the LA 
   MIP layer. Forwarding between each CN and the MN is first to the global HA 
   which encapsulates into the CCoA=RoA. This is then forwarded to the RMA from 
   whose subnet the RoA was obtained. The RMA then encapsulates these packets 
   into the present FA CoA for the RoA that is being maintained by the local 
   access MIP Registrations. The FA then decapsulates from the FA CoA and 
   forwards the CCoA addressed packets to the MN. This generates one tunnel from 
   HA to MN/RoA and one from RMA to FA/CoA).  The impact of the tunnel over the 
   air-interface can be minimised using header compression or alternatively 
   through the use of Proxy Co-located Care of Addresses [PCCoA]. This overhead 
   is however never more than that already accepted for MIPv6.


                   CN           HA           RMA           FA            MN

     Forward  LA     CN------------------------------------------------>RoA	                         
                                                RMA=====>FACoA

     Reverse  LA     CN<------------------------------------------------RoA

     RevTun  LA      CN<------------------------------------------------RoA 
                                                RMA<=====FACoA

     Forward  RA     CN------------------------------------------------>HoA
				          HA==================================>RoA
						            RMA=====>FACoA

     Reverse RA      CN<------------------------------------------------HoA

     RevTun RA       CN<------------------------------------------------HoA
     (RMA bypass)		          HA<==================================RoA

     RevTun LA/RA    CN<------------------------------------------------HoA
				          HA<==================================RoA
						            RMA<=====FACoA

            Figure 1. Forward and reverse traffic in Nested MIP



A.W. O'Neill                   Expires Oct 2002                        [Page 7]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002


   The Local Access session uses the RoA for forwarding. The Remote Access 
   sessions also use the RoA, but as a global CCoA. This ensures that the LA MIP 
   registration updates for the RoA, as the MN moves in the local routed 
   topology, can affect and correctly redirect all ongoing access (local and 
   Remote) sessions, using a single hand-off message sequence. The LA MIP layer 
   therefore provides both localization of hand-off signalling to the RMA, and 
   aggregation of hand-off for an arbitrary number of Remote Access sessions 
   using HoAs from arbitrarily located global HAs. Specifically, in the case of 
   a smooth hand-off [RoutOpt], a single LA MIP Registration to the RMA, and a 
   single triggered BU from the new FA to the old FA is all that is required to 
   provide mobility management for an arbitrary number of MIP access sessions on 
   the RoA. LA MIP hand-off will in addition automatically support PPTP and 
   IPSEC based (IPSRA) remote access tunnels that use the RoA as a tunnel end-
   point.

   The basic model is clearly deployable with little impact on MIP standards. 
   The Remote Access service, whether based on MIP, PPTP, IPSRA or any 
   other VPN technique, is effectively invisible to the local mobility 
   management system (LA MIP) and the host simply needs to observe the 
   allocation of the RoA as an interface address, and then use that address as 
   it sees fit. This is because neither IPSRA nor PPTP interact with the MIP 
   elements, and the RA MIP registration in the basic design is direct between 
   the MN and the Remote Access global HA. However, the host must also be able 
   react to interface address (RoA) reconfigurations that it would observe 
   during an RMA change. Clearly, the larger the RMA region, then the lower the 
   likelihood that an RMA change would interfere with ongoing PPTP and/or IPSRA 
   sessions whilst irrespective of region size the RA MIP layer would simply 
   issue an updated Home Registration back to the HA.


   5.1. Regional Tunnelling Implications

   The GFA in [RegTun] is a gateway element at the top of a visited domain, 
   beneath which can reside an arbitrary number of Regional Foreign Agents. CoA 
   switching is then used between the elements to support both forward and 
   reverse tunnelling, with the reverse tunnel source CoA having to match the 
   forward tunnel destination CoA. 

   The basic RMA is also a regional element but its functionality is equivalent 
   neither to that of a GFA or an RFA. For example, the RMA forwards like a HA 
   by encapsulating incoming packets to the RoA with the FA CoA registered by 
   the local access layer. The RMA is traversed in the forward path as a result 
   of routing towards the RoA rather than as a direct result of CoA switching. 
   In the reverse direction, the RMA does not need to be traversed whilst the 
   RFAs and GFA must be. Given that the Nested forwarding is based on routing 
   rather than on tunnel switching, the Nested RMA is less stateful and more 
   ameniable to fall-over recovery. Routing prefix from RMAs for the same RMA 
   prefixes can be weighted so that the RoA traffic can be served by alternate 
   RMAs, on an RMA failure, without requiring a change in the HA binding. The 
   local RMAs can then duplicate registration information so that fast recovery 
   is possible. Ingress filtering is performed by the FA and the FA may know the   
   regional prefixes supported by the RMA which includes the assigned RoA. 
   Specifically though, the FA discovers the RoA at the LA layer and uses this 
   to update the ingress filtering to prevent unassigned RoAs being employed by 
   an attacker.

A.W. O'Neill                   Expires Oct 2002                        [Page 8]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002

   
   This is reasonable because the FA and RMA are owned by the same operator and 
   are mutually trusted.

   It is perfectly possible, whilst not necessarily advisable, that a GFA and a 
   RMA could be used together in a domain, with the GFA sitting in the RA layer 
   between the global HA and the RMA. The GFA would use the RoA as a CCoA in its 
   visitor list for the HoA, whilst the HA would use the GFA CoA. Alternatively, 
   a closer integration is preferred with the RMA supporting alternative 
   forwarding functionality for different groups of MNs consuming a range of 
   services, and specifically providing GFA support for backwards compatibility 
   with any deployed MNs requiring that service. As an example, for MNs that are 
   only able to use a single RA MIP session and do not require local access, CoA 
   switching might be a better solution than Nested as there is clearly no need 
   for aggregated hand-off or the RoA. This is dealt with in more detail in 
   [ConcatMIP] and some of the required generalisations in the Regional 
   Tunnelling signalling are described in [RegTunMods].


   5.2. Reverse Tunnelling Implications

   Reverse tunnelling (upstream) requires the source address in the 
   encapsulating header to match the registered CoA in the receiving nodes 
   visitor list that is used to tunnel forward packets (downstream) for the HoA 
   as a source address. This means that the downstream MIP element must 
   encapsulate using the CoA that it sent to the upstream node in the MIP 
   Registration, at any point in the reverse tunnelling hierarchy. The 
   implications of this restriction on local hand-off, is described in 
   [RevTunMods], which suggests modifications to HAs, GFAs, RFAs and FAs in 
   [MIPv4] and [RegTun] to better support reverse tunnels during inter-FA hand-
   off. 

   Nested MIP greatly reduces the problem for RA reverse tunnelling because the 
   MN encapsulates from the RoA to the HA which is valid across multiple inter-
   FA hand-offs under the same RMA. Therefore, the [RevTunMods] are only 
   required when the RoA changes which is a much less frequent event. In 
   addition, the localization provided by [RegTun] requires [RevTunMods] to be 
   supported in the GFA but are not required in the basic RMA because the MN 
   tunnels directly to the HA and not via the RMA. Nested MIP therefore greatly 
   simplifies and improves reverse tunnel support for Remote Access services. 
   Nested MIP in the reverse direction only requires a tunnel between the MN and 
   the HA so the improved reverse tunnel support does not come at the expense of 
   reduced bandwidth efficiency in this case.

   Reverse tunnelling is also optionally supported in the LA layer between the 
   FA and the RMA.  This can be used to route Local Access and Remote Access 
   packets, from the RoA back to the RMA, using a second local encapsulation. 
   This can be used to ensure traversal through an RMA based NAT or firewall. It 
   can also be used to expose the outbound packets to an RMA based policing, 
   accounting or QoS capability, or any other RoA specific processing. This 
   capability can also be undertaken selectively for Local Access or Remote 
   Access traffic by modifying the FA visitor list such that reverse tunnelling 
   happens in the LA layer only, RA layer only, or both LA and RA layer. This 
   can then reverse tunnel unencapsulated packets (Local Access only), 
   encapsulated packets (all Remote Access), or encapsulated packets from a 
   specific Remote Access session (HA/HoA specific).

A.W. O'Neill                   Expires Oct 2002                        [Page 9]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002


   5.3. Private addressing Implications

   5.3.1 LA Private Addresses

   The RMA and FA are by definition within the same domain and are closely 
   linked by configuration and topology. The RMA and FA can therefore 
   communicate using private addresses. The RMA and the associated RoA are both 
   dynamically allocated and therefore the RoA could be either a public or 
   private address. The MIP Registration must therefore carry sufficient 
   information to enable the RMA to dynamically allocate private and public 
   addresses in a controlled manner which would typically be either an MIP flag 
   or an extension type.

   If Local Access only is requested by, or provided to, the MN then it is fully 
   acceptable for the RoA to be a private address and for a NAT to be deployed 
   in the domain to translate this address into public address space. This 
   capability is equivalent to NAT usage by existing fixed access ISPs and 
   because the NAT is not between the RMA and the FA, then MIP NAT traversal is 
   not required [MIPNAT]. If the MN tries to use a private RoA address as a CCoA 
   in any RA MIP Registrations then these registrations will pass through a NAT 
   in the foreign domain but will clearly fail. This provides a simple method 
   for an operator to prevent a MN from undertaking Remote Access services to 
   external networks, whether based on MIP, PPTP or IPSRA. 

   If Remote Access only, or Local and Remote Access is provided to the MN then 
   the RoA provided to the MN can still be a private address if MIP NAT 
   traversal [MIPNAT] is supported for this MN. This requires the global HA, the 
   NAT and the MN to support an additional UDP and MIP header in the CCoA based 
   tunnel. Note that the packets do not need to traverse the RMA in the uplink 
   direction.

   If the MN is dynamically allocated a public RoA address, then Internet Local 
   Access can pass-through or bypass the NATs in the domain. In addition, the 
   public RoA can now be included in RA MIP Registrations and they will succeed 
   without requiring [MIPNAT] capabilities.

   In all cases, the private or public RoA forwarding in the RMA and FA is 
   unambiguous because by definition these addresses are always unique in the 
   RMA and FA provided that the RMA does not accept LA MIP Registrations from 
   FAs using private addresses from outside its private addressing domain 
   (typically inter-domain LA MIP Registrations).
 

   5.3.2 RA Private Addresses

   The standard MIP RA layer acts to hide the HoA destination address at the 
   home network, from the Internet routing fabric, using a tunnel from the HA to 
   the FA CoA. The HoA can therefore be either a public or a private address in 
   principle. There are significant complications however with overlapping 
   address spaces in the FA if the visitor list is indexed on a private HoA. 
   This is because the HoA is not guaranteed to be unique because MNs from two 
   different but overlapping private addressing domains can visit the same FA 
   with the same HoA. 

   

A.W. O'Neill                   Expires Oct 2002                       [Page 10]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002

   The nested model resolves this ambiguity because the basic forwarding in the 
   RMA and FA is based on the RoA which is guaranteed to be unique, and not the 
   potentially ambiguous HoA. HoA specific processing in the RMA and FA elements 
   can still be supported however because the visitor list entry can still be 
   assured to be unique through concatenation of the RoA and HoA. Therefore 
   private HoAs can now be fully supported in the RA layer of the Nested MIP 
   model. This is true whether the RoA is itself public or private. 

   The use of a private address for the HA is limited by the addressing plan 
   between the RMA and the HA. RA MIP Registrations/Replies must be routable to 
   and from the HA, forward tunnels must be routable from the HA address to the 
   RoA, and reverse tunnels must be routable from the RoA to the RMA (LA reverse 
   tunnel) or from the RoA to the HA (RA reverse tunnel. The existence of a NAT 
   between a private RoA and a public HA address can still support Remote Access 
   through deployment of [MIPNAT]. The HA itself can also use a private address 
   in conjunction with a private RoA as long as they are both from coordinated 
   and routable private address spaces. 

   5.4 Security Associations

   The two MIP layers would continue to use the family of authentication 
   extensions (and associated SAs) that are required in MIP standards docs 
   [MIPv4, RegTun, RevTun, RoutOpt etc]. These include the MN-FA, FA-HA and MN-
   HA auth extensions, with the RMA being treated as a HA in the LA MIP Layer. 
   The only significant differences though are that each FA can now practically 
   employ a pre-configured security association (SA) with each RMA, and the RMA 
   and FA can potentially dynamically allocate to the MN an SA with the RMA. The 
   system can of course also rely on [MIPAAA] by the FA informing AAA of the 
   allocated RMA address and the foreign AAA returning the key material for the 
   FA/MN to use with that RMA. In either case, the MN-FA and the FA-RMA can be 
   shared across both LA and RA MIP traffic. Finally, LA hand-off continues to 
   make use of the authentication mechanisms associated with the particular MIP 
   hand-off solution (inter-FA SAs, PFANE etc). Minor extensions to the existing 
   security mechanisms are required for supporting inter-RMA hand-off and these 
   are described in [RMAsig].

	
6. Basic Nested MIPv4 Signalling Description

   The two MIP layers in the Nested model are clearly separable in the basic 
   model because one layer is between the MN and the HA whilst the other is 
   between the MN, the FA and the RMA. There are therefore essential no
   changes required to existing MIP standards to support Nested MIP, provided 
   that the LA MIP layer is hidden from the MN host stack and exposed to that MN 
   simply as an RoA interface address. The RA layer does not need to see 
   a FA nor use Agent Solicitations or Advertisements. The RA layer simply needs 
   to respond to interface address changes, on RMA hand-off (RoA change) by 
   refreshing its bindings with the new (RoA) interface address. The LA MIP  
   layer can then operate between a network driver and/or PCMCIA card on the 
   host and the FA/RMA nodes, with the FAA seen by the network driver to detect 
   and control FA CoA based access, with hand-off extensions to deal with FA 
   changes. The FAA must indicate to the network driver the current FA address, 
   RMA address and/or region NAI so that the network driver knows when to 
   undertake an inter-FA and inter-RMA hand-off using LA MIP signalling. This 
   model ensures that local mobility management is not dependent on the vagaries 
   of host implementations but are instead under tight operator control. 

A.W. O'Neill                   Expires Oct 2002                       [Page 11]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002

   The LA MIP signalling for inter-RMA hand-off requires similar extensions to 
   those required for [RegTun] home registration which are discussed in 
   [RMAsig]. Note also that it is possible for the LA layer to run between a hub 
   and the RMA, to support multiple RA sessions for MNs sharing the RoA and the 
   wireless link on the hub. This is again discussed in [RMAsig].

   The clean separation between the layers is lost is lost if the LA layer is 
   exposed to the host resulting in the need for host RA layer MIP changes. It   
   is also lost if the RA MIP layer, due to alternative implementation decisions 
   requires FAA support, and/or the RA MIP signalling is processed by the FA or 
   the RMA. These changes are described in section 7 and [RMAsig].

   6.1 Local Access Only Signalling

   The FA advertises its capabilities to the MN using the FA advertisement (FAA) 
   that contains a FA CoA as per [MIPv4]. The MN sends a LA MIP Registration via 
   the FA with the CoA set to the advertised FA CoA, and including the MN-NAI as 
   per RFC 2794 to download MN privileges, and security state as in [MIPAAA] 
   from the home operator via the foreign operator. The LA MIP Reg HA/HoA fields 
   are left empty by the MN to enable dynamic allocation of an RMA in the FA, 
   and the subsequent dynamic allocation of a RoA by that RMA. Note that LA 
   layer and RA layer Registrations need to be distinguished in the FA by using 
   different type values, flags or extensions which is discussed further in 
   [RMAsig]. The FA forwards the LA MIP Reg to the allocated RMA, which then 
   acts like a local HA by dynamically allocating an RoA to the MN. The RMA then 
   sends an LA MIP Reply to the MN via the FA, with the HA and HoA fields now 
   populated, and containing any RMA derived security state, so that the FA and 
   MN can be correctly initialized. The MN then has Internet local access 
   enabled and uses the RoA as a topologically correct source / destination 
   address. The relative role of the AAA system, the FA and the RMA in securing 
   the LA layer can be achieved a number of ways including mechanisms defined in 
   [MIPAAA] and referenced by [RegTun].

   Remote access can potentially be prevented, by the FA blocking MIP 
   Registrations not addressed to the allocated RMA or by appropriate blocking 
   of data packets in an FA or RMA located firewall. A private RoA can also be 
   used in conjunction with a NAT to prevent remote access MIP signalling to 
   destinations outside of the local operator private addressing domain.

   6.2 Remote Access Only Signalling

   The MN first undertakes LA MIP signalling to obtain an RMA and an RoA, and to 
   bring the MN privileges into the FA. These privileges will indicate that the 
   MN is not allowed to use the local access service but is permitted to 
   undertake remote access. This results in the FA blocking any unencapsulated 
   packets to/from the RoA, other than those necessary for LA/RA MIP signalling. 
   The MN then sends an RA MIP Reg directly to the statically allocated HA and 
   HoA stored in the MN, using the RoA as the CoA and setting the 'D' bit to 
   indicate that the CoA is a CCoA. The MN can include its MN-NAI that it used 
   in the local access registration if it wishes but this will only be observed 
   by the HA. If successful, remote access is then enabled and the remote access 
   service survives inter-FA hand-off through the local access mobility 
   management. The MN receives packets from the HA encapsulated in the RoA. The 
   MN can send RA packets using either the HoA as a source address and risk 
   ingress filtering, or more likely by reverse tunnelling to the HA if it set 
   the 'T' bit (reverse tunnelling) in the RA MIP registration. 

A.W. O'Neill                   Expires Oct 2002                       [Page 12]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002


   Reverse  tunnelling just to the RMA is also possible, if the RA Reg is sent 
   via the RMA, so that HoA state can be stored and ingress checks can be 
   reasonably undertaken without compromising hand-off aggregation.
 
   The MN privileges might also indicate that only a specific remote access 
   registration is allowed based on specific HA and/or HoA state. The FA and/or 
   RMA could then block encapsulated packets sent from/to addresses other than 
   the permitted HA/HoA parameters. However, this form of remote access control 
   is better supported if the RA MIP Registration is directed through and 
   policed by the FA and / or RMA, rather than blocking traffic flow, as 
   discussed in section 7.

   6.3 Local and Remote Access Signalling

   This is the same as section 6.2 except that the MN privileges enable local 
   access service as well as remote access service. The RMA and FA will 
   therefore allow both encapsulated and unencapsulated packets using the RoA. 
   Once again local access can be provided in addition to a specific remote 
   access service as indicated by the MN privileges.


7. Enhanced Remote Access Registration

   The Remote access signalling as described in the basic model is between the 
   MN and the HA. This means that neither the FA nor the RMA are directly able 
   to determine or affect the HoA or HA being used for the remote access 
   session(s). The RA MIP signalling can alternatively be routed via the FA or 
   RMA, which results in modifications/extensions to the FA and RMA (HA) visitor 
   lists. This is because the clean separation between the LA and RA layers is 
   now lost. These issues are examined below.

   7.1 RA MIP Registration via the FA

   The RA MIP Registration can be routed via the FA by the FA setting the 'R' 
   bit in the FAA, and exposing the FAA directly to the RA MIP layer. 
   Alternatively, the RA MIP host stack can be made aware of the FA address by 
   the LA MIP layer acting as either a virtual FA or by relaying a modified FAA. 
   Most importantly, for correct movement and hand-off processing, it is 
   critical that the RA MIP layer is only exposed to RMA changes. MNs then 
   wishing to continue to bypass the FA will do so at the risk of having their 
   RA MIP Reg, or the resulting remote access traffic dropped by the FA. The FA 
   can police such RA MIP Regs using firewall rules, and a remote access HoA 
   aware visitor list can police the resulting traffic. If instead, the MN sends 
   its RA MIP Registrations to the FA, then the FA will extend the FA RoA 
   specific visitor list with the RA MIP state for the RA MIP layer. The RA MIP 
   Reg will then forward the Reg to the HA as normal. The message routing is 
   already covered by existing MIP standards and is not further discussed here, 
   but the convergence of the LA MIP and RA MIP visitor lists is an obvious 
   change. Also provided in existing standards, but an addition compared to 
   section 5, is that the MN can now potentially exploit the AAA system to 
   obtain a dynamically allocated HA. This is discussed in section 8.

   



A.W. O'Neill                   Expires Oct 2002                       [Page 13]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002

   The additions to standard MIP are that these remote access requests should be 
   checked against the LA visitor list and the MN privileges delivered to the FA 
   by the AAA system. The FA must only accept RA MIP Regs for RoAs that are in 
   the LA visitor list, for HAs and RA MIP flags that are permitted by the MN 
   privileges. In addition, the FA can supplement the local access visitor list 
   with a HA/HoA specific RA visitor list to support HA/HoA specific processing 
   for both remote access registrations and the resulting traffic. HoA specific 
   processing however requires the HoA state to be context transferred in an 
   aggregated manner between FAs during FA hand-off, triggered by a single 
   inter-FA hand-off message such as the BU.

   Each LA MIP visitor list can have multiple RA MIP visitor lists, and the 
   combination of the RoA and the HoA can be used to identify a specific RA 
   visitor list to correctly support private addresses. Other than this, both RA 
   and LA visitor lists are fully compliant standard MIP entities with there own 
   lifetimes, identification fields and MIP flags. A more fully integrated 
   implementation of the multiple visitor lists is possible.

   7.2 RA MIP Registration via the FA and RMA.

   The RA MIP Registration can also be onward directed to the RMA by re-using 
   the MIP Registration extensions from [RegTun] and from [RegTunMods]. This 
   enables HA/HoA specific processing to also be added to the RMA such as 
   policing, accounting and QoS support. This is useful because it enables out 
   of profile packets to be removed before traversing expensive backhaul 
   bandwidth to the basestation, it enables appropriate accounting state to be 
   more centrally located in high-availability platforms that are shielded from 
   the highest hand-off dynamics and finally enables the RMA to undertake HoA 
   specific QoS mechanisms. This is all possible because the FA is aware of the 
   RMA address from the local access layer. The FA directs remote access 
   requests onto the allocated RMA so that the RMA can discover any configured 
   or allocated HA/HoA addresses and the associated MIP flags. The RMA can then 
   build and maintain an RA visitor list for that HA/HoA, in addition to the LA 
   visitor list for the RoA. The RMA can then support HA/HoA specific processing

   The RA MIP includes the RoA as the CCoA for the HoA, as it already knows the 
   RoA allocated to the MN by the RMA, from the LA MIP signalling. If the MN has 
   a pre-configured HA and /or HoA then these can also be included otherwise 
   they are set to zero and the HA obtained from the MN privileges. The FA adds 
   the FA CoA into the HFAext and sends this to the RMA, secured by the FA-
   HA(RMA) authentication extension. The FA can also add the HFAIPext to 
   communicate any dynamically allocated HA to the RMA as described in 
   [RegTunMods]. The RMA then forwards the RA Registration to the HA address 
   contained in the HFAIPext received from the FA. This can be secured by an 
   RMA-HA auth extension to protect any RMA-HA extensions, with the security 
   state to support this being delivered to the FA by the AAAH-AAAF path and 
   relayed to the RMA, or delivered directly to the RMA by the AAAF either as a 
   result of an RMA request or pushed (Diameter) from the AAA system.

   The RMA uses the HFAext from the FA, and the CCoA=RoA to index and refresh 
   the LA visitor list, and the HA/HoA information is used to install an RA 
   visitor list bound to the LA list, awaiting if necessary the return of any 
   dynamically allocated HoA information. The RMA then forwards the RA 
   Registration to the HA address contained in the HFAIPext received from the 
   FA. The HA then allocates the HoA and the MIP Reply contains both the HA and 
   the HoA to update all visitor lists on the Reply path.

A.W. O'Neill                   Expires Oct 2002                       [Page 14]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002


   7.3 Efficient Remote Access Only Signalling

   The signalling examples in section 6.2 and 6.3 can now be undertaken more 
   efficiently in cases that the RA MIP Registration visits both the FA and the 
   RMA. This is achieved by integrating the LA update into each RA MIP 
   signalling phase, and only otherwise using LA only signalling for inter-FA 
   hand-off. As before, the FAA advertises the FA CoA and the MN sends an RA MIP 
   Reg to the FA containing the MN-NAI. The HA is set to either zero or to the 
   static HA of the MN and the HoA is set to either zero or to the static HoA of 
   the MN. The CoA is also set to zero because the RoA has not yet been 
   allocated. The 'I' bit in the FAA should indicate support for a zero CoA. The 
   MN-NAI is used to obtain the MN privileges and to dynamically allocate a HA 
   if required from the home AAA system. The FA allocates an RMA as before and 
   forwards this registration to that RMA along with the HFAext containing the 
   FA CoA, and the HFAIPext containing the address of a dynamically allocated 
   HA. The RMA consumes both of these extensions and then creates a new HFAext 
   containing the RMA CoA=RoA for the HA. These are then both added to the 
   original Registration Request and sent to the HA. The Registration Reply is 
   then returned via the RMA containing the HA and the dynamically allocated 
   HoA. It is then sent to the FA which adds any dynamically allocated RMA IP 
   address in a HFAIPext, and finally onto the MN, The HA does not need to 
   include the HFAIPext back to the MN because the MN is registering via the FA. 
   The RMA must however add the HFAext to the Reply to carry the RoA back to the 
   FA, which forwards it to the MN. This results in all nodes discovering all 
   the state normally built by the combination of the LA and RA MIP layers. This 
   state is then maintained by the LA MIP layer undertaking mobility management, 
   and the RA MIP layer refreshing the HoA visitor lists in the RMA and HA.


8. AAA Support for Nested MIP

   The following sections detail some additional optional mechanisms within, and 
   hence requirements for, AAA systems supporting the Basic Nested MIP model.

   8.1. FA AAA Requests

   LA MIP is provided to MNs following a AAA check which is triggered at the FA, 
   based on the NAI in the LA MIP Registration as per RFC 2794. This "LA-NAI" is 
   used to route the AAA request to the home AAA server for the MN via any 
   foreign AAA server as per AAA Roaming. This triggers appropriate 
   authentication and authorization results in the MN privileges being returned 
   to the FA. This indicates the authorized service allowances in the foreign 
   wireless network as well as controlling the accounting requirements for the 
   session. The LA-NAI effectively uses the AAA system to support MN access into 
   a wireless network. When that wireless network belongs to a foreign wireless 
   operator then the MN is undertaking wireless roaming whether from a home 
   wireless operator or a home fixed operator. In the context of Nested MIP, the 
   MN privileges obtained via the LA-NAI can include configuration for local 
   access, for remote access back to the home network, and additional remote 
   access configurations for services either provided by the home operator or by 
   third parties who outsource wireless roaming support to the home operator. 





A.W. O'Neill                   Expires Oct 2002                       [Page 15]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002   


   The FA AAA request can enable the global HA to be dynamically allocated 
   through the AAA system, and the RoA either dynamically allocated through MIP 
   signalling or by the AAA system. The AAA system can similarly support the 
   delivery of the RMA and RoA. In either case, the AAA system needs to be able 
   to control whether the MN gets a public or private HoA/RoA address and also 
   means that MIP must also be able to request either type of address on behalf 
   of AAA delivered MN privileges. The AAA system can also be used to deliver 
   and refresh the MN-FA, MN-RMA, MN-HA, FA-RMA, FA-HA and RMA-HA SAs to/for the 
   FA and the other elements in the system, in conjunction with complementary 
   deliveries to the RMA and HA.

   Following completion of the initial LA MIP AAA exchanges, the MN is then in a 
   position to additionally initiate RA MIP Regs. If a RA MIP Reg is routed via 
   the FA and includes either no LA-NAI, or the same LA-NAI as that included in 
   the LA MIP Registration, then the RA MIP Reg should be checked against the LA 
   MN privileges already delivered by the AAA system to the FA, as agreed for 
   roaming between the home and foreign operators. However, there is then an 
   additional AAA requirement for a MN to be able to initiate RA MIP to third 
   party services whose operators either have no commercial relationship with 
   the home network operator of the MN, or do not wish to share customer 
   configuration information with that home network operator for such services. 
   In this case the RA MIP Registration could include a service specific RA-NAI 
   which would cause the FA  to trigger a second AAA request via the foreign 
   operator AAA server to the AAA server of the third party service provider, 
   effectively bypassing the MN home operator AAA system. This enables the FA 
   (and foreign operator) to acquire the RA MN privileges from that RA service 
   provider, which then supplements or supplants the LA MN privileges. This 
   enables service specific policing, routing and QoS features to be provided to 
   specific remote access flows, as well as ensuring that the accounting records 
   are delivered to the service provider rather than to the home network 
   operator. This therefore provides additional motivation for enabling HoA 
   independent forwarding for remote access flows in general, whilst being able 
   to add HoA specific features as required by more complex commercial models. 

   This model also provides clean separation between the MN-NAI specific MN 
   privileges provided by a specific AAA provider, from the remote access 
   services that are accounted for under that authorization. Essentially, the MN 
   can dynamically bind any of its MN-NAIs to a specific RA MIP session by 
   including that MN-NAI in the RA MIP Reg. If the FA does not recognize the MN-
   NAI then the FA uses the AAA system to authenticate the user with the service 
   provider, acquire the associated MN privileges, and commence accounting. If 
   the associated MN privileges have already previously been fetched during a 
   previous LA/RA MIP Reg, then a AAA request is not required. This flexibility 
   can be constrained by the authenticator installing service specific state (HA 
   address, application bounds etc) into the MN privileges. For each such MN-
   NAI, the MN and the foreign AAA server needs to have a unique security 
   association with the service provider AAA system so that the MN can be 
   authenticated, the MN privileges securely delivered, and the service 
   accounting records protected.

   In summary, the MN can have multiple NAIs from a range of LA and RA 
   providers. The MN can use one MN-NAI to configure the LA MIP payer of the 
   foreign wireless network using AAA roaming from its home network operator. 
  


A.W. O'Neill                   Expires Oct 2002                       [Page 16]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002


   That MN-NAI will have MN privileges for local access and potentially for 
   remote access, and the home network operator is the authenticator for the MN, 
   authorizes its access onto the foreign network, and is the ultimate recipient 
   for the accounting records generated under that NAI. This LA-NAI is called 
   the 'connectivityNAI'. Each RA MIP Reg can then also include a 'serviceNAI' 
   to AAA each remote access session, and that NAI can be either the LA-NAI 
   invoked to gain connectivity, or any other MN-NAI whose associated MN 
   privileges support the remote access service requirements. MN privileges can 
   be service independent or can include service state which limits them to 
   specific types of remote access sessions. This layered approach flexibly 
   provides home network and home service provider control over services invoked 
   by the MN within a wide range of commercial models.

   Note that during LA hand-off it is necessary to transfer at least the active 
   AAA configuration to the new FA.

   8.2. RMA AAA Behaviour

   There are also benefits in being able to deliver the MN privileges to the RMA 
   so that policing, accounting and QoS functions can be appropriately 
   distributed between the FA and the RMA. This can be achieved three different 
   ways, some of which depend on the RA MIP Regs being routed via the FA and / 
   or RMA.

   Firstly, the preferred approach is for the foreign network AAA server to 
   deliver the MN privileges in parallel to both the FA and the RMA(local HA) 
   along with accounting configuration information. This requires the FA to 
   include the RMA address or NAI in the AAA request, or for the AAA system to 
   allocate that address. This model is similar to that envisaged for MIP AAA 
   security associations and key distribution [MIPAAA] for FA, HA state 
   distribution, although Diameter would most likely be a prerequisite.

   Alternatively, and especially when RA MIP Registrations are processed by the 
   RMA, the RMA can undertake an additional AAA request to obtain the AAA state 
   from the local AAA server. This only occurs after the FA has completed its 
   AAA request and obtained the AAA state from the home AAA server but has the 
   disadvantage of the AAA requests running sequentially although the second one 
   can probably make use of cached state in the local AAA server.

   The third approach is to have the FA route the AAA request to the foreign AAA 
   server via an RMA AAA proxy so that the RMA is on the path for the delivered 
   AAA state. This also enables the RMA to decide which subset of the AAA state 
   is delivered to the FA and puts in place a chain of command via the RMA so 
   that it can undertake authentication and accounting processing for the MN and 
   FA. The FA can then limit its AAA functions to those that must be placed in 
   the edge device. This is beneficial because all AAA state in the FA must be 
   context transferred on every FA hand-off, using expensive access backhaul 
   bandwidth, whilst AAA state located in the RMA need only be context transfer 
   on each RMA hand-off, and each transfer then consumes cheaper core bandwidth. 
   The downside here though is that the RMA AAA proxy then needs to potentially 
   process all AAA requests, many of which will not be MIP related.





A.W. O'Neill                   Expires Oct 2002                       [Page 17]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002


 9. IPv6 Considerations

   The Nested model is equally applicable to IPv6 with the major changes being 
   that the MN in IPv6 is able to rapidly acquire a local interface address from 
   each FA. This address can then be used as a MN CCoA for the LA MIP layer to 
   the RMA. The RMA would still allocate the RoA to the MN, and the MN would 
   once again use this RoA as a MN CCoA for the RA layer HoA. This is to ensure 
   that each new MN CCoA does not need to be communicated to the HA. The RA
   layer is therefore unchanged conceptually from the MIPv4 model but is nested 
   within a CCoA rather than a FA CoA at the LA layer. This is necessary because 
   the FA is missing in IPv6. If this is replaced by a Local Mobility Agent(LMA) 
   with similar capabilities, then the LMA and RMA could once again cooperate to 
   control and manage local and remote access services in sympathy with the MN 
   privileges and the operator policies. This may also enable something similar 
   to a FA CoA to be supported. 

   Nested MIP also provides clean separation between address spaces at the RA 
   and LA layers which means that IPv6, IPv4, MIPv6 and MIPv4 can be variously 
   combined to support evolution and incremental heterogeneous deployment.   

10. Security Considerations

   No new security issues are raised by this draft than are already considered 
   in the design of MIPv4, regional tunnelling [RegTun], [RoutOpt] and reverse 
   tunnelling [RevTun]. At all times all information elements are authenticated 
   to the same level as that demanded by MIP and AAA exchanges. New 
   authentication extensions are required but are generated and distributed 
   using established techniques.


11. Notice Regarding Intellectual Property Rights 
    
   Flarion's submissions will conform with RFC 2026.  Flarion may seek patent 
   protection on some or all of the technical information submitted by its 
   employees in connection with the IETF's standards process.  If part(s) of a 
   submission by Flarion is (are) included in a standard and Flarion owns 
   patent(s) and/or pending patent application(s) that are essential to 
   implementation of such included part(s) in said standard, Flarion is prepared 
   to grant a license on fair, reasonable, reciprocal (license back) and non-
   discriminatory terms on such included part(s).


12. Acknowledgements

   Michaela Vanderveen and Vincent Park of Flarion Technologies conducted 
   reviews of this draft.










A.W. O'Neill                   Expires Oct 2002                       [Page 18]

INTERNET-DRAFT         Nested MIP for IP Mobility Management           May 2002


12. References

   [RFC2026] Bradner, S., "The Internet Standards Process -- Revision 3", BCP 9, 
   RFC 2026, October 1996.

   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement 
   Levels", BCP 14, RFC 2119, March 1997 

   [MIPv4] C.E. Perkins, Ed., `` IP Mobility Support for IPv4," RFC3220, 
   January 2002 

   [RegTun] E. Gustafsson. Ed., " Mobile IPv4 Regional Registration, 
   Internet-draft, draft-ietf-mobileip-reg-tunnel-06.txt, 1March 2002                                  
 
   [RegTunMods] A. O'Neill, "Modifications to Regional Tunnelling", Internet-
   draft, draft-oneill-mip-regtun-mods-00.txt, 9 April 2002.                               

   [RevTun] G. Montenegro, Ed., "Reverse Tunnelling for Mobile IP, revised," 
   Internet RFC 3024, January 2001.

   [RevTunMods]  A. O'Neill, "Hand-off Extensions for Reverse Tunnelling",  
   Internet-draft, draft-oneill-mip-revtun-ho-00.txt, 22 Feb 2002. 

   [PCCoA] A. O'Neill, "Proxy CCoA Tunnelling for Mobile IP", Internet-draft, 
   draft-oneill-mip-proxyCCoA-00.txt, May 2002.

   [ParallelMIP] A. O'Neill, "Parallel MIP for Aggregated Mobility Management", 
   Internet-draft, draft-oneill-mip-parallel-00.txt, May 2002.

   [ConcatMIP] A. O'Neill, "Concatenated MIP for Mobility Management", Internet-
   draft, draft-oneill-mip-concat-00.txt, May 2002.

   [RMAsig] A. O'Neill, "Regional Mobility Agent Signalling", Internet-draft, 
   draft-oneill-mip-rmasig-00.txt, May 2002.

   [MIPAAA] Charles E. Perkins, Pat R. Calhoun, "AAA Registration Keys for 
   Mobile IP", draft-ietf-mobileip-aaa-key-09.txt (work in progress), 26 
   February 2002                                          

   [RoutOpt] C. Perkins, D. Johnson, "Route Optimization in Mobile IP", 
   Internet-Draft, draft-ietf-mobileip-optim-11.txt (work in progress), 6 
   September 2001.

   [LowLat] K.E. Malki, Ed., "Low Latency Handoffs in Mobile IPv4", Internet-
   Draft, draft-ietf-mobileip-lowlatency-handoffs-v4-03.txt, November 2001.
            
   [MIPv6] D. Johnson, C. Perkins, ``Mobility Support in IPv6", Internet-Draft, 
   draft-ietf-mobileip-ipv6-16.txt (work in progress), 22 March 2002.

Author's Addresses

Alan O'Neill
Flarion Technologies
Phone: +1 908 947 7033
Email: oneill@flarion.com

A.W. O'Neill                   Expires Oct 2002                       [Page 19]