RFC 3776 Home Agent IPsec June 2004 5.1 Format . . . . . . . . . . . . . . . . . . . . . . . . 17 5.2 Manual Configuration . . . . . . . . . . . . . . . . . 18 5.2.1 Binding Updates and Acknowledgements . . . . . . 18 5.2.2 Return Routability Signaling . . . . . . . . . . 19 5.2.3 Prefix Discovery . . . . . . . . . . . . . . . . 20 5.2.4 Payload Packets . . . . . . . . . . . . . . . . 21 5.3 Dynamic Keying . . . . . . . . . . . . . . . . . . . . 22 5.3.1 Binding Updates and Acknowledgements . . . . . . 22 5.3.2 Return Routability Signaling . . . . . . . . . . 23 5.3.3 Prefix Discovery . . . . . . . . . . . . . . . . 24 5.3.4 Payload Packets . . . . . . . . . . . . . . . . 25 6. Processing Steps within a Node . . . . . . . . . . . . . . . 25 6.1 Binding Update to the Home Agent . . . . . . . . . . . 25 6.2 Binding Update from the Mobile Node . . . . . . . . . 26 6.3 Binding Acknowledgement to the Mobile Node . . . . . . 27 6.4 Binding Acknowledgement from the Home Agent . . . . . 28 6.5 Home Test Init to the Home Agent . . . . . . . . . . . 29 6.6 Home Test Init from the Mobile Node . . . . . . . . . 30 6.7 Home Test to the Mobile Node . . . . . . . . . . . . . 30 6.8 Home Test from the Home Agent . . . . . . . . . . . . 31 6.9 Prefix Solicitation Message to the Home Agent . . . . 31 6.10 Prefix Solicitation Message from the Mobile Node . . . 31 6.11 Prefix Advertisement Message to the Mobile Node . . . 32 6.12 Prefix Advertisement Message from the Home Agent . . . 32 6.13 Payload Packet to the Home Agent . . . . . . . . . . . 32 6.14 Payload Packet from the Mobile Node . . . . . . . . . 32 6.15 Payload Packet to the Mobile Node . . . . . . . . . . 32 6.16 Payload Packet from the Home Agent . . . . . . . . . . 32 6.17 Establishing New Security Associations . . . . . . . . 32 6.18 Rekeying Security Associations . . . . . . . . . . . . 33 6.19 Movements and Dynamic Keying . . . . . . . . . . . . . 34 7. Implementation Considerations . . . . . . . . . . . . . . . 35 7.1 IPsec . . . . . . . . . . . . . . . . . . . . . . . . 35 7.2 IKE . . . . . . . . . . . . . . . . . . . . . . . . . 36 7.3 Bump-in-the-Stack . . . . . . . . . . . . . . . . . . 37 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . 37 9. Security Considerations . . . . . . . . . . . . . . . . . . 37 10 References . . . . . . . . . . . . . . . . . . . . . . . . . 38 10.1 Normative References . . . . . . . . . . . . . . . . . 38 10.2 Informative References . . . . . . . . . . . . . . . . 38 11. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 39 12. Authors' Addresses . . . . . . . . . . . . . . . . . . . . . 39 13. Full Copyright Statement . . . . . . . . . . . . . . . . . . 40 Arkko, et al. Standards Track