Proxy Mobile IPv6
RFC 5213
Document | Type | RFC - Proposed Standard (August 2008; Errata) | |
---|---|---|---|
Authors | Kuntal Chowdhury , Kent Leung , Basavaraj Patil , Vijay Devarapalli , Sri Gundavelli | ||
Last updated | 2020-01-21 | ||
Replaces | draft-sgundave-mip6-proxymip6 | ||
Stream | Internent Engineering Task Force (IETF) | ||
Formats | plain text html pdf htmlized (tools) htmlized with errata bibtex | ||
Reviews | |||
Stream | WG state | (None) | |
Document shepherd | No shepherd assigned | ||
IESG | IESG state | RFC 5213 (Proposed Standard) | |
Action Holders |
(None)
|
||
Consensus Boilerplate | Unknown | ||
Telechat date | |||
Responsible AD | Jari Arkko | ||
Send notices to | (None) |
Network Working Group S. Gundavelli, Ed. Request for Comments: 5213 K. Leung Category: Standards Track Cisco V. Devarapalli Wichorus K. Chowdhury Starent Networks B. Patil Nokia August 2008 Proxy Mobile IPv6 Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract Network-based mobility management enables IP mobility for a host without requiring its participation in any mobility-related signaling. The network is responsible for managing IP mobility on behalf of the host. The mobility entities in the network are responsible for tracking the movements of the host and initiating the required mobility signaling on its behalf. This specification describes a network-based mobility management protocol and is referred to as Proxy Mobile IPv6. Gundavelli, et al. Standards Track [Page 1] RFC 5213 Proxy Mobile IPv6 August 2008 Table of Contents 1. Introduction ................................................. 4 2. Conventions and Terminology ................................. 5 2.1. Conventions Used in This Document ....................... 5 2.2. Terminology ............................................. 5 3. Proxy Mobile IPv6 Protocol Overview ......................... 9 4. Proxy Mobile IPv6 Protocol Security ......................... 15 4.1. Peer Authorization Database (PAD) Example Entries ....... 16 4.2. Security Policy Database (SPD) Example Entries ........... 17 5. Local Mobility Anchor Operation ............................. 17 5.1. Extensions to Binding Cache Entry Data Structure ......... 18 5.2. Supported Home Network Prefix Models ..................... 19 5.3. Signaling Considerations ................................. 20 5.3.1. Processing Proxy Binding Updates ..................... 20 5.3.2. Initial Binding Registration (New Mobility Session) .. 22 5.3.3. Binding Lifetime Extension (No Handoff) ............. 23 5.3.4. Binding Lifetime Extension (After Handoff) ........... 24 5.3.5. Binding De-Registration ............................. 24 5.3.6. Constructing the Proxy Binding Acknowledgement Message ............................................. 25 5.4. Multihoming Support ..................................... 27 5.4.1. Binding Cache Entry Lookup Considerations ........... 28 5.5. Timestamp Option for Message Ordering ................... 34 5.6. Routing Considerations ................................... 37 5.6.1. Bi-Directional Tunnel Management ..................... 37 5.6.2. Forwarding Considerations ........................... 38 5.6.3. Explicit Congestion Notification (ECN) Considerations for Proxy Mobile IPv6 Tunnels ......... 39 5.7. Local Mobility Anchor Address Discovery ................. 40 5.8. Mobile Prefix Discovery Considerations ................... 40 5.9. Route Optimization Considerations ....................... 41 6. Mobile Access Gateway Operation ............................. 41 6.1. Extensions to Binding Update List Entry Data Structure ... 42 6.2. Mobile Node's Policy Profile ............................. 43 6.3. Supported Access Link Types ............................. 44 6.4. Supported Address Configuration Modes ................... 44 6.5. Access Authentication and Mobile Node Identification ..... 45 6.6. Acquiring Mobile Node's Identifier ....................... 45 6.7. Home Network Emulation ................................... 46 6.8. Link-local and Global Address Uniqueness ................. 46 6.9. Signaling Considerations ................................. 48 6.9.1. Binding Registrations ............................... 48 6.9.2. Router Solicitation Messages ......................... 56 6.9.3. Default-Router ....................................... 57 6.9.4. Retransmissions and Rate Limiting ................... 58Show full document text