Download presentation
Presentation is loading. Please wait.
Published byJayson Patrick Modified over 9 years ago
1
draft-ietf-mobileip-vpn-problem-solution-02 Sami Vaarala Netseal
2
Outline Design team conclusions and rationale Three layer solution Summary and status of solution draft Optimizations and improvements
3
Design team conclusions and rationale Decided to document base approach –Favor solution with minimal changes to standards –Optimizations considered (but postponed) We need an internal home agent –The MN needs to be able to move inside –But overhead of always tunnelling to the DMZ was considered to be too high We need an external mobility agent –IPsec does not have standardized mobility (SA endpoint update), and we want ”seamless” mobility even when outside –We need to support FAs in the external networks => the lowest layer must speak MIP Some problems left out of scope for now –E.g. networks with only HTTP access
4
Three layer solution – Topology Firewall External Home Agent Internal Home Agent VPN External network Internal network (e.g. corporate network) MN CN Internal MIPv4 tunnel IPsec tunnel External MIPv4 tunnel DMZ
5
Three layer solution – MN inside (1) MNExt. HAInt. HAVPN GWCN RRQ RRP RRQ (dereg.) Internal MIP tunnel OK RRP Data traffic (w/ reverse tunnelling) If external HA responds, deregister
6
Three layer solution – MN inside (2) MNExt. HAInt. HAVPN GWCN RRQ RRP Internal MIP tunnel OK Data traffic (w/ reverse tunnelling) MN moves and gets a new care-of address RRQ
7
Three layer solution – MN outside (1) MNExt. HAInt. HAVPN GW CN External MIP tunnel OK : IPsec tunnel OK Internal MIP tunnel OK RRQ RRP IKE + VPN address assignment RRQ RRP Data packets (w/ reverse tunnelling) All data goes through the internal HA, even if CN is outside
8
Three layer solution – MN outside (2) MNExt. HAInt. HAVPN GW CN External MIP tunnel OK RRQ RRP Data packets (w/ reverse tunnelling) MN moves and gets a new care-of address Data packets (w/ reverse tunnelling) RRQ
9
Three layer solution – Pros and Cons Pros –Only mobile node aware of solution –No changes to IPsec or Mobile IPv4 standards –Existing VPN, HA, FA boxes can be used Cons –Overhead (latency, packet size) –Three layers to manage (e.g. authentication) –Software complexity Three layers != three boxes –Combined VPN+HA box possible
10
Summary of the solution draft Solution draft –Applicability statement of MIPv4 & IPsec –for enterprise mobile users –only imposes requirements on the mobile node What’s there in addition to standards? –Scenarios, message and packet diagrams –Network detection requirements and basic algorithm important because has major security impact! double registration, trust (only) internal HA reply –Other security considerations
11
Solution draft status -02 –Missing minor comments from design team –Security review by Radia pending Plan –Final design team round => -03 –Working group review => -04 –Last call
12
Optimizations and improvements Scoped outside base solution draft –Interesting because of base solution overhead –Worst case – 129 octets / packet Really the worst case, NAT on each layer Approaches collapse tunnelling some way –Combined VPN/FA device –IPsec mobility SA endpoint update –Zero-overhead MIP tunnelling address switching Improve security of network detection
13
Thank you! Questions ?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.