Browse Prior Art Database

Secure Connectivity and Mobility Using Mobile IPv4 and IKEv2 Mobility and Multihoming (MOBIKE) (RFC5266)

IP.com Disclosure Number: IPCOM000171761D
Original Publication Date: 2008-Jun-01
Included in the Prior Art Database: 2008-Jun-18
Document File: 16 page(s) / 33K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

V. Devarapalli: AUTHOR [+2]

Abstract

Enterprise users require mobility and secure connectivity when they roam and connect to the services offered in the enterprise. Secure connectivity is required when the user connects to the enterprise from an untrusted network. Mobility is beneficial when the user moves, either inside or outside the enterprise network, and acquires a new IP address. This document describes a solution using Mobile IPv4 (MIPv4) and mobility extensions to IKEv2 (MOBIKE) to provide secure connectivity and mobility.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 8% of the total text.

Network Working Group                                     V. Devarapalli Request for Comments: 5266                                      Wichorus BCP: 136                                                       P. Eronen Category: Best Current Practice                                    Nokia                                                                June 2008

         Secure Connectivity and Mobility Using Mobile IPv4 and                 IKEv2 Mobility and Multihoming (MOBIKE)

Status of This Memo

   This document specifies an Internet Best Current Practices for the    Internet Community, and requests discussion and suggestions for    improvements.  Distribution of this memo is unlimited.

Abstract

   Enterprise users require mobility and secure connectivity when they    roam and connect to the services offered in the enterprise.  Secure    connectivity is required when the user connects to the enterprise    from an untrusted network.  Mobility is beneficial when the user    moves, either inside or outside the enterprise network, and acquires    a new IP address.  This document describes a solution using Mobile    IPv4 (MIPv4) and mobility extensions to IKEv2 (MOBIKE) to provide    secure connectivity and mobility.

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  2

   2.  Terminology  . . . . . . . . . . . . . . . . . . . . . . . . .  3

   3.  Solution Overview  . . . . . . . . . . . . . . . . . . . . . .  4

     3.1.  Access Modes . . . . . . . . . . . . . . . . . . . . . . .  6

       3.1.1.  Access Mode: 'c' . . . . . . . . . . . . . . . . . . .  6

       3.1.2.  Access Mode: 'f' . . . . . . . . . . . . . . . . . . .  6

       3.1.3.  Access Mode: 'mc'  . . . . . . . . . . . . . . . . . .  6

     3.2.  Mobility within the Enterprise . . . . . . . . . . . . . .  7

     3.3.  Mobility When outside the Enterprise . . . . . . . . . . .  7

     3.4.  Crossing Security Boundaries . . . . . . . . . . . . . . .  7

       3.4.1.  Operation When Moving from an Untrusted Network  . . .  8

       3.4.2.  Operation When Moving from a Trusted Network . . . . .  9

   4.  NAT Traversal  . . . . . . . . . . . . . . . . . . . . . . . . 10

   5.  Security Considerations  . . . . . . . . . . . . . . . . . . . 10

   6.  Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 10

   7.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 11

     7.1.  Normative References . . . . . . . . . . . . . . . . . . . 11

     7.2.  Informative References . . . . . . . . . . . . . . ....