RFC 3776 (rfc3776) - Page 1 of 40


Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents



Alternative Format: Original Text Document



Network Working Group                                           J. Arkko
Request for Comments: 3776                                      Ericsson
Category: Standards Track                                 V. Devarapalli
                                                   Nokia Research Center
                                                               F. Dupont
                                                       GET/ENST Bretagne
                                                               June 2004


         Using IPsec to Protect Mobile IPv6 Signaling Between
                      Mobile Nodes and Home Agents

Status of this Memo

   This document specifies an Internet standards track protocol for the
   Internet community, and requests discussion and suggestions for
   improvements.  Please refer to the current edition of the "Internet
   Official Protocol Standards" (STD 1) for the standardization state
   and status of this protocol.  Distribution of this memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2004).

Abstract

   Mobile IPv6 uses IPsec to protect signaling between the home agent
   and the mobile node.  Mobile IPv6 base document defines the main
   requirements these nodes must follow.  This document discusses these
   requirements in more depth, illustrates the used packet formats,
   describes suitable configuration procedures, and shows how
   implementations can process the packets in the right order.

Table of Contents

   1.    Introduction . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.    Terminology  . . . . . . . . . . . . . . . . . . . . . . . .  5
   3.    Packet Formats . . . . . . . . . . . . . . . . . . . . . . .  5
         3.1   Binding Updates and Acknowledgements . . . . . . . . .  5
         3.2   Return Routability Signaling . . . . . . . . . . . . .  7
         3.3   Prefix Discovery . . . . . . . . . . . . . . . . . . .  8
         3.4   Payload Packets  . . . . . . . . . . . . . . . . . . .  9
   4.    Requirements . . . . . . . . . . . . . . . . . . . . . . . .  9
         4.1   Mandatory Support  . . . . . . . . . . . . . . . . . . 10
         4.2   Policy Requirements  . . . . . . . . . . . . . . . . . 10
         4.3   IPsec Protocol Processing  . . . . . . . . . . . . . . 13
         4.4   Dynamic Keying . . . . . . . . . . . . . . . . . . . . 15
   5.    Example Configurations . . . . . . . . . . . . . . . . . . . 16



Arkko, et al.               Standards Track