Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.

Slides:



Advertisements
Similar presentations
Security Issues In Mobile IP
Advertisements

Secure Mobile IP Communication
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Mobile IPv6 趨勢介紹 1. Mobile IP and its Variants Mobile IPv4 (MIPv4) – MIPv4 – Low-Latency Handover for MIPv4 (FMIPv4) – Regional Registration for MIPv4.
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
1 Mobile IP Why mobile IP? How mobile IP works –Introduction –Agent discovery/Advertisement –Registration –Routing considerations –Security Mobility management.
1 Mobile IP Myungchul Kim Tel:
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
NISNet Winter School Finse Internet & Web Security Case Study 2: Mobile IPv6 security Dieter Gollmann Hamburg University of Technology
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Mobile IP Overview: Standard IP Standard IP Evolution of Mobile IP Evolution of Mobile IP How it works How it works Problems Assoc. with it Problems Assoc.
What we will cover… Home Networking: Network Address Translation (NAT) Mobile Routing.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
MOBILITY SUPPORT IN IPv6
Chapter 13 Mobile IP. Outline  ADDRESSING  AGENTS  THREE PHASES  AGENT DISCOVERY  REGISTRATION  DATA TRANSFER  INEFFICIENCY IN MOBILE IP.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
COS 420 Day 20. Agenda Group Project Discussion Protocol Definition Due April 12 Paperwork Due April 29 Assignment 3 Due Assignment 4 is posted Last Assignment.
Mobile IP.
IP Mobility Support Basic idea of IP mobility management o understand the issues of network-layer mobility support in IP network o understand the basic.
Mobile IP Polytechnic University Anthony Scalera Heine Nzumafo Duminda Wickramasinghe Edited by: Malathi Veeraraghavan 12/05/01.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
Lectured By: Vivek Dimri Asst Professor CSE Deptt. Sharda University, Gr. Noida.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
National Institute Of Science & Technology Mobile IP Jiten Mishra (EC ) [1] MOBILE IP Under the guidance of Mr. N. Srinivasu By Jiten Mishra EC
Mobile IP Chapter 19. Introduction Mobile IP is designed to allow portable computers to move from one network to another Associated with wireless technologies.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Mohamed M Khalil Mobile IPv4 & Mobile IPv6. 2 Mohamed M Khalil Mobile IP- Why ? IP based Network Sub-network A Sub-network B Mobile workforce carry.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
1 Can DHCP support mobility across LANs (on different subnets?)  On its own, the answer is NO; for reasons cited in DHCP talk on slide 9.  However,
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Introduction to Mobile IPv6
IETF WG Presentation1. IETF WG Presentation2 General Description This group develops or adopts architectures and protocols to support mobility inside.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Identify the traffic that should go across the VPN. Check the ACL configuration Try to ping across the tunnel using a ping that matches the ACL We should.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Mobile IP 순천향대학교 정보기술공학부 이 상 정 VoIP 특론 순천향대학교 정보기술공학부 이 상 정 2 References  Tutorial: Mobile IP
Mobile IPv6 and Firewalls: Problem Statement Speaker: Jong-Ru Lin
REGIONAL COLLEGE FOR EDUCATION RESEARCH & TECHNOLOGY.
Mobile IP Definition: Mobile IP is a standard communication protocol, defined to allow mobile device users to move from one IP network to another while.
An Introduction to Mobile IPv4
Mobile IP 순천향대학교 전산학과 문종식
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Sandeep Pinnamaneni Vijay Chand Uyyuru Vivek Nemarugommula
K. Salah1 Security Protocols in the Internet IPSec.
DMET 602: Networks and Media Lab Amr El Mougy Yasmeen EssamAlaa Tarek.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Mobility support in IP v4. Internet Computing (CS-413) 2.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
 Mobile IP is the underlying technology for support of various mobile data and wireless networking applications.  It is designed by IETF.
IPSecurity.
Preferred Alternatives for Tunnelling HIP (PATH)
DMET 602: Networks and Media Lab
Mobile Networking (I) CS 395T - Mobile Computing and Wireless Networks
Chapter 18 IP Security  IP Security (IPSec)
EA C451 Vishal Gupta.
IPSec IPSec is communication security provided at the network layer.
Mobility And IP Addressing
* Essential Network Security Book Slides.
DMET 602: Networks and Media Lab
Presentation transcript:

Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula

Problem Definition Mobile IP relies on sending traffic from the home network to the mobile node or foreign agent through IP-in-IP tunnelling. IP nodes which communicate from behind a NAT are reachable only through the NAT's public address(es). IP-in-IP tunnelling does not generally contain enough information to permit unique translation from the common public address(es) to the particular care-of address of a mobile node or foreign agent which resides behind the NAT; in particular there are no TCP/UDP port numbers available for a NAT to work with.

Problem Illustrated

Solutions The draft by H. Levkowetz (ipUnplugged), S. Vaarala (Netseal) released in April,2002, presents extensions to the Mobile IP protocol and a tunnelling method which permits mobile nodes using Mobile IP to operate in private address networks, which are separated from the public internet by NAT devices. Assumptions:The primary assumption in this document is that the network allows communication between an UDP port chosen by the mobile node and the home agent UDP port 434

Co-located care of address The mobile users connect to the Home Agent at the office to access the corresponding node (CN) in the home network. The mobile node will request a temporary care-of address belonging to the local router R from a DHCP server in the visited network. The Home Agent will discover that a NAPT traversal has occurred by comparing the source IP address and the care-of address The Mobile IP tunnel is then modified to include a UDP header, in order to facilitate traversal of the NAPT with payload datagrams between the mobile node and the correspondent node ( ). The source IP address in the header of the registration request as received by the Home Agent, i.e , will be used as source IP address for the outer IP header in the Mobile IP tunnel seen from the Home Agent instead of the care-of address, i.e

Mobile IP Registration The mobile node (or to be more correct the mobile node virtual interface adapter MN-VIA) sends a Mobile IP registration request towards the Home Agent. The registration request is sent with the UDP destination port equal to 434 and the UDP source port set to any chosen port number. In order to distinguish between datagrams sent from different nodes in the visited network, the NAPT will also keep a state table with the care-of address and the UDP source port number on the inside and a newly allocated UDP source port number on the outside of the firewall. The latter UDP source port number is selected so that it is unique among the sessions traversing the NAPT at any point in time.

Registration (continued) The Home Agent will discover the discrepancy between source IP address and care-of address inside the registration request message. In order to protect against spoofing, the Home Agent will verify the authenticator as well as the time stamp of the registration reply. If acceptable, the Home Agent will select a UDP port number to be used for the Mobile IP data path and communicate it to the mobile node as part of the registration reply message.

Registration Procedure

Mobile IP Payload Transfer There are two main differences in the way payload transfer is performed when a NAPT is present: 1. First of all the payload datagrams to be sent through the Mobile IP tunnel are required to have a UDP header in between the two IP headers. 2. The second item is that the Home Agent is applying the source IP header of the registration request, i.e. the IP address of the NAPT , as the destination IP address also for datagrams destined for the mobile node.

MIP Traffic Flow

IPSec NAT Transparency The IPSec NAT Transparency feature introduces support for IPSec traffic to travel through NAT or PAT points in the network by encapsulating IPSec packets in a User Datagram Protocol (UDP) wrapper, which allows the packets to travel across NAT devices. IKE Phase 1 Negotiation: NAT Detection IKE Phase 2 Negotiation: NAT Traversal Decision UDP Encapsulation of IPSec Packets for NAT Traversal UDP Encapsulation of IPSec Packets for NAT Traversal

IKE Phase 1 Negotiation: NAT Detection During Internet Key Exchange (IKE) phase 1 negotiation, two types of NAT detection occur before IKE Quick Mode begins— NAT support and NAT existence along the network path. To detect NAT support, you should exchange the vendor identification (ID) string with the remote peer. Detecting whether NAT exists along the network path allows you to find any NAT device between two peers and the exact location of NAT. To detect whether a NAT device exists along the network path, the peers should send a payload with hashes of the IP address and port of both the source and destination address from each end.

IKE Phase 2 Negotiation: NAT Traversal Decision IKE phase 2 decides whether or not the peers at both ends will use NAT traversal. Quick Mode (QM) security association (SA) payload in QM1 and QM2 is used to for NAT traversal negotiation. Because the NAT device changes the IP address and port number, incompatablities between NAT and IPSec can be created. Thus, exchanging the original source address bypasses any incompatablities.

UDP Encapsulation of IPSec Packets for NAT Traversal In addition to allowing IPSec packets to traverse across NAT devices, UDP encapsulation also addresses many incompatability issues between IPSec and NAT and PAT. Incompatability Between Fixed IKE Destination Ports and PAT—Resolved PAT changes the port address in the new UDP header for translation and leaves the original payload unchanged.

Standard IPSec Tunnel Through a NAT/PAT Point (No UDP Encapsulation)

IPSec Packet with UDP Encapsulation

Conclusions The ordinary Mobile IP security mechanisms are also used with the NAT traversal mechanism described in this document. Relying on unauthenticated address information when forming or updating a mobility binding leads to several redirection attack vulnerabilities. In providing a mobile node with a mechanism for NAT traversal of Mobile IP traffic, we expand the address space where a mobile node may function and acquire care-of addresses. There are many compatibility issues IPsec ESP and NAT which hav been resolved.

References salWithMobileIP.pdf oc/product/software/ios122/122newft/1 22t/122t13/ftipsnat.htm#wp oc/product/software/ios122/122newft/1 22t/122t13/ftipsnat.htm#wp