Mobility support in RADIUS and Diameter

Size: px
Start display at page:

Download "Mobility support in RADIUS and Diameter"

Transcription

1 Mobility support in RADIUS and Diameter Päivi Savola Helsinki University of Technology May 28, 2003 Abstract This paper focuses on describing some of the possible implementations of authentication, authorization and accounting (AAA) using RADIUS and Diameter protocols in the context of user mobility and roaming. The focus is on established TCP/IP-based networks and the protocol support for mobility in RADIUS and Diameter. The extensibility of both protocols allows for several different approaches, and enables transferring a wide variety of information. This allows communicating different kinds of network access data, including configuring voluntary or mandatory tunnels to the home network, Mobile IP and IPv6 network access. Request forwarding by proxies and proxy chaining mechanisms in both protocols are examined. The establishment of request forwarding relationships is not covered by the RADIUS protocol, and some proposed solutions are presented. In addition to more sophisticated request forwarding procedures, Diameter also has mechanisms for discovering new Diameter servers. 1 Introduction Just a decade ago most users had a static connection to Internet using a certain computer and Internet Service Provider (ISP). The number of mobile users has grown in the last decade. These users have a need to access resources in their home networks and the Internet from multiple different locations possibly outside their home domain using the same piece of connection equipment. This user mobility from one network to another without separate service agreements with each temporary domain s ISP is called roaming. [23] This paper focuses on the possible implementations of authentication, authorization and accounting (AAA) and user roaming and mobility in established TCP/IP-based networks. The basic concepts of authentication, authorization and accounting are explained in in D. Comer s book "Internetworking with TCP/IP" [1]. The examined protocols are Remote Authentication Dial-In User Service (later RADIUS) which was originally described by C. Rigney, S. Willens, A. Rubens and W. Simpson in Request For Comments (RFC) 2058 [5]. The protocol has later been updated in other RFCs [6, 17]. The other protocol described is Diameter, which was chosen as a successor for RADIUS. The Diameter protocol specification is still a work in progress. The current status of the Diameter project can be seen in the Internet pages of the Internet Engineering Task Force s (IETF) AAA Working Group [28]. 1

2 For the purposes of this paper it is assumed that the user has a means of connecting to the local network and communicating with the local hosts. If the local network is not the user s home network, it is called foreign network. The mediation of AAA information requires trust between the participating parties. Because of space constraints the problem of trust, certificate and key management between the foreign and home domains has been left out of this paper, and the possible architectures are touched only briefly when the description of the protocol functionality requires it. 2 Base protocol support for mobility In this chapter the basic characteristics of the RADIUS and Diameter protocols are briefly described. The basic protocol definitions of RADIUS, and especially Diameter provide some mechanisms that can be utilized for mobility. The most notable of these is request forwarding. 2.1 RADIUS protocol The RADIUS [17] protocol as originally specified was intended to serve the purposes of dial-in access to networks. In dial-in network access the user calls a Network Access Server (NAS) with a modem thorough PSTN phone lines. As the number of users grew, configuring each user to the correspondingly growing number of NASes made necessary a centralized user authentication, authorization and accounting management. In the basic RADIUS protocol model the user connects to the NAS, who forwards the user identification data to a centralized RADIUS server. The server maintains a database of users and the details of the services to be delivered to each user. The RADIUS server will then send the NAS a reply telling it to either accept or reject the user s connection request, and configuration information about the kind of service to be delivered to the user. Alternately, if extra security is desired, the RADIUS server may send a numeric challenge thorough NAS to the user, and only grant network access upon a satisfactory answer to the challenge. In addition to these authentication and authorization requests NAS may also originate accounting requests, to which it will receive replies. Because of this client-server protocol arrangement, NAS is often referred to as the client or RADIUS client. Fig. 1 illustrates this consept. RADIUS protocol packets are carried inside UDP datagram payload. The RADIUS protocol uses UDP for several reasons of which the most important is the possibility to control packet resending mechanism at the application level. [17] This permits server-specific timeouts, and using backup or different servers whenever necessary. The communication between RADIUS client and server is protected by a shared secret, which is used to authenticate the messages sent by each party. User passwords are encrypted with the RSA Message Digest Algorithm MD5. [3] A RADIUS message has a header containing information about the message type, length, authentication information and an identifier, which allows requests ant their replies to be related together. The rest of the message consists of attribute 3-tuples of attribute code 2

3 Figure 1: NAS acting as a client for RADIUS server identifying the attribute name, a length field and attribute value. The attributes can be categorized into four groups: RADIUS protocol mangement attributes, user identification and authentication attributes, authorization attributes which detail the type of service to be delivered to the user and accounting attributes which tell about service usage. Accounting attributes are described in more detail in [18]. The type of RADIUS message and the particular RADIUS implementation define, what attributes are sent. [17] In addition to the basic set, several additional attributes and their usage have been defined in RADIUS protocol extensions. Examples of Radius extensions include attribute sets for supporting Extensible Authentication Protocol (EAP) and Tunnel Protocol support [21, 20]. This extensibility of the protocol by adding new attributes has proved to be a powerful tool. All possible data or connection types does not have to be known in advance, since given NAS support, even large amounts of configuration data can be communicated over the network and new attribute triples can be added without disturbing the existing implementations. This extensibility allows an useful functionality for mobility: request forwarding. If necessary the RADIUS server may act as a proxy. The server, upon receiving an access-request it cannot answer, may forward the request by acting as a client to another RADIUS server, which is sometimes called the remote server. The response the server receives from the remote server is then forwarded to the client. Essentially this allows RADIUS authentication requests to be directed to a certain RADIUS server from several network access points within the same domain and within certain limitations, even between domains. The RADIUS protocol itself is essentially stateless, so this requires the RADIUS server implementation to maintain internal transaction state. [17] The problems with this approach include the need for shared secret between all the RA- DIUS servers in the forwarding network, and the difficulty of configuring the server a request is to be forwarded to. End-to-end security is also impossible because of the need for each of the servers to modify some of the protocol attributes over which the MD5 checksum is calculated. Some RADIUS implementations propose to solve the RADIUS server discovery problem by adding a separate database of AAA servers or information about the AAA servers in the 3

4 DNS system. [9, 23] This does not however, solve inter-domain security problems since a shared secret and trust relationship between organizations is still required, especially since RADIUS does not possess auditing features. Additionally, not all RADIUS implementations are compatible, and therefore a forwarding arrangement between organizations can be difficult to arrange. 2.2 Diameter protocol As the number of users, points of access, offered services and their complexity grew, it became clear RADIUS could not meet all the AAA protocol requirements in an orderly fashion. The Diameter protocol was chosen as the successor of RADIUS, and is still a work in progress. Significant changes include specified failover mechanisms in cases of server outage and transport reliability, better security features and explicit support for agents and request forwarding. [29] Instead of UDP Diameter runs on top of TCP or SCTP, and has features to support structured connection set-up and closing, including heartbeat and error messages. The connections can also be encrypted using IPsec architecture [1] or TLS [10] Both of these features are particularly important for accounting messages. Backward compatibility with RADIUS has been maintained to some extent, and Diameter messages are similar in structure to RADIUS messages. Diameter protocol specifies a short header with message type, length, and application, hop-by-hop and end-to-end identifiers. The header is followed by a number of attribute-value pairs (AVP). The included AVPs depend on the type of message. Some AVPs are used by the protocol itself and others are used to carry different kinds of AAA data. Diameter protocol is extended similarly to RADIUS by adding new AVPs. [29] Unlike RADIUS, Diameter is a peer-to-peer protocol. There are 6 different kinds of roles a Diameter node can take. Diameter clients perform network access control by sending Diameter requests to Diameter servers, who perform authentication, authorization and accounting tasks for a domain. Proxy Agents forward request and response messages based on their Diameter routing table and routing-specific AVPs in a Diameter message. They may also do domain specific policy decisions and therefore sometimes have to modify message AVPs. Proxy Agent may also originate Diameter messages if it has needed to change a Diameter server s decision. Relay Agents forward requests and responses, but do not make policy decisions and therefore do not change non-routing specific AVPs. Redirect Agents do not forward messages between clients and servers, but instead reply with routing information about a suitable server in order to allow for a more direct communication. Lastly, Translation Agents perform protocol translation between Diameter nodes and RADIUS (or other AAA protocol) servers which are located in the same network. [29] In RADIUS protocol the support for forwarding requests to other RADIUS servers was mostly implicit, which posed several problems for mobility support. Diameter solves many of these problems with explicit protocol support for Proxy, Relay and Redirect Agents. In Diameter there are several alternative mechanisms for determining the correct recipient of an AAA request. Proxy and Relay Agents can be chained as in RADIUS, but the explicit support for chaining results in more resilient architecture in case of errors. A Diameter 4

5 node can also query a Redirect Agent for the correct recipient of a an AAA request for a user of certain domain. The ability of Proxy Agents to modify request and response messages takes into consideration the consequences of incomplete trust between two different administrative domains, and allows for determining the amount of possible risk. In addition to static, manually configured Diameter routing table entries, Diameter protocol also contains a dynamic peer discovery mechanism. Diameter servers are encouraged to maintain at least two (primary and secondary) connections to Diameter servers in each administrative domain. If a route to a suitable server cannot be found other techniques can also be employed. The possible methods include a Service Location Protocol version 2 (SLPv2) query [8] and NAPTR [22] and predefined guessed name queries to the Domain Name System (DNS) by using the user s Network Access Identifier s (NAI) [13] domain part as the lookup key. The identities and authorization of thus discovered Diameter nodes should be checked, before the Diameter node tries to establish a connection. Valid entries can be added to the Diameter routing table using a suitable record time to live. When two Diameter nodes establish a connection, a capability negotiation is performed in order to determine the peer s protocol version numbers, supported extensions and security mechanisms. The information is cached for future use. [29] From mobility point of view the dynamic peer discovery mechanism and capability negotiation can enable user roaming between domains without a separate agreement and NAS configuration between each Service Provider pair. This eases roaming management, while Proxy Agents can be employed in the structure to regulate the amount of trust between domains. 3 Mobility extensions The base protocol in both RADIUS and Diameter has some support for roaming, but there are also attribute set extensions to both that have special features to aid mobility and roaming. We examine two important extensions: tunnelling and mobile IP. 3.1 Tunnelling extensions The simplest arrangement of mobility using RADIUS is to dial in to the Service Provider NAS over PSTN phone lines. Phones are quite widespread, and the approach has an added advantage of making home domain configuration simpler. This solution is workable, if the required data speeds and connection prices are fairly low. It will, however, curtail the possibilities of accessing local resources, as all communication will go thorough the home network. As an alternative a tunnelling service may be used. The user connects to the Internet in some foreign network, but uses tunnelling protocols to create a virtual private line to the home network. Examples of tunnelling protocols are PPTP, L2F, L2TP and IPSEC. 5

6 Figure 2: Tunnelling setup procedure in RADIUS If suitable security measures are observed, the result is a Virtual Private Network (VPN) allowing a secure access to home network resources. [9] In a tunnelling arrangement the user connects to a local NAS, which authenticates the user with the user s home RADIUS server either by querying it or by the RADIUS proxy chaining mechanism. The necessary configuration information for tunnelling is usually contained in the response packet. The extensions used for tunnelling are contained in RFC 2868, "RADIUS Attributes for Tunnel Protocol Support" [20]. Fig. 2 illustrates the tunnel creation procedure. RADIUS can be used to define tunnelling mandatory, an example extension using L2TP is presented in by B. Adoba and G. Zorn in RFC 2194 [16]. In the case of a mandatory tunnel, the system functionality resembles a dial-in access to the home network except that the connection media is Internet instead of PSTN phone line. This way the local ISP does not have to dedicate special resources to tunnelling users to a certain network. Instead a connection is dynamically created to a tunnel server whenever needed. The attributes needed for carrying tunnelling accounting data are defined in [19]. Diameter has no tunnelling extensions defined at this point of time. [28] 3.2 RADIUS and IPv4 (Mobile IP) The Internet address basic routing scheme is hierarchical and fairly static, and therefore does not easily lend itself to quick topology changes. Mobile IP [27] establishes a way for a user to move from their home network to other foreign networks while still maintaining their network identity. The basic method employed is IP in IP tunnelling. When the user away from the home network, the Mobile IP the user, called also Mobile Node (MN) has two network identities: the static home address, and a temporary care-of address related 6

7 Figure 3: Mobile IP communication without reverse tunnelling to the foreign network the node currently inhabits. The node provides a host called Home Agent (HA) in its home network information about its current local network. The HA then receives the packets destined to the Mobile Node s home address and tunnels them to the foreign network to a host called Foreign Agent (FA) which delivers them to the Mobile Node. FA can also act as a default router for the local network s registered mobile nodes. The packet forwarding procedure can be seen in Fig. 3. The packets sent by the mobile node can also be tunnelled back to the home network and then sent to their destination by the HA. This arrangement is called reverse tunnelling. [25] One scenario requiring reverse tunnelling is the use of Network Address Translation (NAT) in user s home network. Since only the router/firewall implementing NAT at the edge of home network is aware of the address mapping, all communication between inside and outside hosts must flow thorough the router/firewall. Reverse tunnelling can also be mandated by the home domain s security policies, if all connections to hosts outside the home network must be supervised by the home network s firewall. Examples of this kind of supervision include restrictions on the allowed protocols and ports, and the requirement of initiating all connections from inside the home network. A third circumstance needing reverse tunnelling is if the foreign network routes and possibly filters packets based on the source address. This is fairly commonly done to prevent different kinds of spoofing and resource-stealing attacks, and in pheripheral networks many routers and firewalls silently drop packets where the source address and source network do not match. Reverse tunnelling allows topologically correct source IP addresses. While the Mobile IP defines a way for the mobile node to authenticate itself to the FA (the Mobile-Foreign Authentication extension), RADIUS also has an extension [24] specifically to allow for various authentication mechanisms and provide extra security in particu- 7

8 lar by making challenges possible. Connecting to Internet thorough a foreign domain requires co-operation of both the home and local service provider, as the user will be using the local provider s network resources, but will authenticate itself to the home provider. These problems are proposed to be solved by an AAA infrastructure, which will enable inter-domain authentication, authorization and accounting. The AAA requirements for Mobile IP have been defined by S. Glass, T. Hiller, S. Jacobs and C. Perkins in RFC 2977, "Mobile IP Authentication, Authorization and Accounting Requirements". [23] In the most basic model, the mobile node connects to the provider of the required service, called attendant. In the case of Mobile IP the Foreign Agent takes usually the role of attendant. Because usage of resources is usually controlled, the attendant will act in the traditional role of NAS in connecting to the local AAA server (AAAL). The AAAL in turn will contact a server in the mobile node s home domain (AAAH) for authentication of the mobile node s credentials, and for authorization information. When accounting records are generated in the foreign network, they are similarly forwarded to the user s home accounting authority. In case of commercial networks, the scale of resources granted reflects the amount of trust between the two administrative domains. The standardized method of identifying a user (especially in tunnelling or roaming contexts) is Network Access Identifier (NAI). [13] NAI is of the form user@domain, where user identifies the mobile node, and domain the node s home network or administrative realm. When the mobile node connects to the local network, NAI can be used to determine where the local RADIUS server can send the authentication and authentication requests and later accounting data. In fact it is possible for a mobile node to connect to foreign network without a home IP address, as it can be provided in the attributes of the authentication reply and other configuration data from the home network AAAH. The extensions for this are described by P. Calhoun and C. Perkins in RFC [15] RADIUS does not provide for mechanisms of establishing trust between two different domains. Agreements between service providers are certainly possible but are not scalable in the long run without a proxy architecture. [14] In a proxy architecture the number of needed shared keys and bilateral agreements is reduced by a hierarchical arrangement of RADIUS proxies, whose purpose is to route AAA traffic from one network to another. In addition policy management can be implemented in proxies by modifying the RADIUS messages if needed. Broker architectures, where each trusts a third party broker server have also been proposed. [23] Some implementations add entries for AAA hosts in the DNS system. [9, 23] All these approaches present their own set of security problems, which are outside the scope of this document. 3.3 RADIUS and IPv6 In IPv6 [11] the routing scheme is different from Mobile IP. Each host has a more or less static home address. When the host roams thorough foreign networks it acquires a list 8

9 Figure 4: In IPv6 the traffic is directed to the care-of address of care-of addresses thorough a stateless autoconfiguration or a stateful procedure such as DHCPv6. [12] When the care-of address changes, the mobile host informs Home Agent in the home network and its communication partners about the current address. Home Agent tunnels the packets sent to the mobile hosts home address, which then performs a binding update operation, so that the sender will send the next packets inside a timeout to the careof address. [2] One course of events leading to a binding update operation is shown in Fig. 4. In the figure a user is roaming outside home network, while another host in a third network wishes to initiate communication with the roaming user. In full IPv6 networks The Foreign Agents are not employed, and therefore there may not be an obvious candidate to take on the role of attendant. If dial-in access is not employed, the role of NAS can be filled for example by the local router or DHCP server. [26] In some cases the NAS may not always know whether a user will be using IPv4, IPv6 or both with IPv6 transmitted inside IPv4, and therefore using both attribute sets at the same time is permissible. If tunnelling is required, the related tunnel attributes should be used. [20] 3.4 Diameter mobility extensions Diameter can be used in authenticating, authorizing a Mobile Node and accounting for services provided. The DIAMMIP application defines the necessary AVPs and their usage. [30] Unlike in RADIUS, there is no need to separately define a way for building an AAA infrastructure because of the intra-domain capabilities of Diameter protocol. The basic model of communication is similar to RADIUS. When a Mobile Node (MN) arrives at a foreign network, it will contact a Foreign Agent (FA) to be able to contact the network. FA in turn will request authentication and authorization from the foreign 9

10 Figure 5: AAA relationship initiation in Diameter when using Mobile IP (IPv4) AAA authority, AAAF. Foreign AAAF, a Diameter node, will then determine the Mobile Node s home Diameter server and forward the credentials to the home Diameter server, also called home AAA authority (AAAH). If the AAAF is not capable of determining the home Diameter server, it will forward the request to the closest probable hop towards it, provided the security policy of the local domain allows it. If the request does not ask for a particular Home Agent, the home Diameter server will allocate one according to its internal policy, and send the information back with the request response. Other configuration information like for example home address can also be sent in the response. NAI [13] is used for user identification. Fig. 5 shows forwarding the access request to the home Diameter server and the allocation of a home agent. In some cases it is also possible to allocate the Home Agent in a foreign network. This is negotiated between the home and foreign Diameter servers. [30] When the number of networks grow, the amount of security associations (SA) between domains becomes large, and shared secrets between Home and Foreign Agents are no longer practical. The problem has been proposed to be solved with Key Distribution Centre (KDC) structure in the Diameter servers. The necessary session keys are created in the Diameter server in the network that the Home Agent resides in after the authorization phase. The keys for Home and Foreign Agents are propagated in Diameter protocol messages, while Mobile Node has its own procedure where the key is created from a nonce by cryptography by the MN and home Diameter server using HMAC-MD5. [4] 10

11 4 Conclusion In this paper we have examined the features that support for user mobility and roaming in RADIUS and Diameter AAA protocols. RADIUS support for mobility is based on the implicit possibility of forwarding requests. Correspondingly, in RADIUS the different mobility architectures rely on building a network of other trusted RADIUS servers by proxy chains. The specifications of each implementation are covered in different extensions. Diameter has more sophisticated support for mobility, including a way to discover new Diameter nodes, and a more sophisticated forwarding system. Mobile IP is also supported. In large scale networks Diameter is much preferable to RADIUS because of several new features including peer discovery, end-to-end security and protocol error messages which make the protocol more extensible, interoperable and reliable. The strengths of Diameter lie especially in roaming user authentication and authorization and providing accounting records. AAA using Diameter also requires a more limited amount of trust between the participating operators. However, the Diameter protocol is considerably more complex than RADIUS, and therefore may not gain popularity in systems where processing and memory resources are scarce, for example in embedded systems. References [1] Comer E. Douglas, "Internetworking with TCP/IP, Principles, protocols and architecture", Prentice Hall 2000 [2] Gai S., "Internetworking IPv6 with Cisco Routers" (network edition), [3] S. Dusse and R. Rivest, "The MD5 Message-Digest Algorithm", RFC 1321, MIT Laboratory for Computer Science, RSA Data Security Inc., April [4] H. Krawczyk, M. Bellare, and R. Cannetti. HMAC: Keyed- Hashing for Message Authentication. RFC 2104, February [5] Rigney, C., Willens, S., Rubens, A. and W. Simpson, "Remote Authentication Dial In User Service (RADIUS)", RFC 2058, January 1997 [6] Rigney, C., Rubens, A., Simpson, W. and Willens S., "Remote Authentication Dial In User Service (RADIUS)", RFC 2138, April [7] Rigney, C., "RADIUS Accounting", RFC 2139, April [8] Veizades J., Guttman E., Perkins C. and Kaplan S., "Service Location Protocol", RFC 2165, June 1997 [9] Aboba B., Lu J., Alsop J., Ding J. and Wang W., "Review of Roaming Implementations", RFC 2194, September 1997 [10] Dierks T. and Allen C., "The TLS Protocol Version 1.0", RFC 2246, January

12 [11] Deering, S. and R. Hinden, "Internet Protocol, Version 6 (IPv6) Specification", RFC 2460, December [12] T. Narten and Thomson, S., "IPv6 Stateless Address Autoconfiguration", RFC 2462, December [13] Aboba, B. and M. Beadles, "The Network Access Identifier", RFC 2486, January [14] Aboba, B. and J. Vollbrecht, "Proxy Chaining and Policy Implementation in Roaming", RFC 2607, June [15] Calhoun, P. and C. Perkins, "Mobile IP Network Address Identifier Extension, RFC 2794, March [16] Aboba B. and Zorn G., "Implementation of L2TP Compulsory Tunneling via RA- DIUS", RFC 2809, April 2000 [17] Rigney, C., Rubens, A., Simpson, W. and Willens S., "Remote Authentication Dial In User Service (RADIUS)", RFC 2865, June [18] Rigney, C., "RADIUS Accounting", RFC 2866, June 2000 [19] Zorn, G. and D. Mitton, "RADIUS Accounting Modifications for Tunnel Protocol Support", RFC 2867, June [20] Zorn, G., Leifer, D., Rubens, A., Shriver, J., Holdrege, M. and I. Goyret, "RADIUS Attributes for Tunnel Protocol Support", RFC 2868, June [21] Rigney, C., Willats W. and Calhoun P., "RADIUS Extensions", RFC 2869, June 2000 [22] Mealling M. and Daniel R., "The Naming Authority Pointer (NAPTR) DNS Resource Record", RFC 2915, September 2000 [23] Glass S., Hiller T., Jacobs S. and Perkins C., "Mobile IP Authentication, Authorization, and Accounting Requirements", RFC 2977, October 2000 [24] Calhoun, P. and C. Perkins, "Mobile IP Foreign Agent Challenge/Response Extension", RFC 3012, December [25] Montenegro, G., "Reverse Tunneling for Mobile IP (revised)", RFC 3024, January [26] Aboba B., Zorn G. and Mitton D., "RADIUS and IPv6", RFC 3162, August 2001 [27] Perkins C., "IP Mobility Support for IPv4", RFC 3344, August 2002 [28] IETF Authentication, Authorization and Accounting (aaa) working group home page, [29] Calhoun P., Loughney J., Guttman E., Zorn G. and Arkko J., "Diameter Base Protocol", December 2002, Work in progress [30] Calhoun P., Perkins C. and Johansson T., "Diameter Mobile IPv4 Application", October 2002, Work in progress 12

Request for Comments: Starent Networks A. Lior Bridgewater Systems K. Leung Cisco Systems October 2007

Request for Comments: Starent Networks A. Lior Bridgewater Systems K. Leung Cisco Systems October 2007 Network Working Group Request for Comments: 5030 Category: Informational M. Nakhjiri, Ed. Motorola K. Chowdhury Starent Networks A. Lior Bridgewater Systems K. Leung Cisco Systems October 2007 Mobile IPv4

More information

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G.

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G. Network Security Chapter 17 Security of Mobile Internet Communications Network Security (WS 2002): 17 Mobile Internet Security 1 Motivation for Mobile IP Routing in the Internet: Based on IP destination

More information

Category: Standards Track Sun Microsystems Laboratories November 2000

Category: Standards Track Sun Microsystems Laboratories November 2000 Network Working Group Request for Comments: 3012 Category: Standards Track C. Perkins Nokia Research Center P. Calhoun Sun Microsystems Laboratories November 2000 Status of this Memo Mobile IPv4 Challenge/Response

More information

Network Working Group. Category: Informational February 1997

Network Working Group. Category: Informational February 1997 Network Working Group K. Hamzeh Request for Comments: 2107 Ascend Communications Category: Informational February 1997 Status of this Memo Ascend Tunnel Management Protocol - ATMP This memo provides information

More information

Network Working Group. Category: Standards Track <draft-aboba-radius-iana-03.txt> 30 March 2003 Updates: RFC IANA Considerations for RADIUS

Network Working Group. Category: Standards Track <draft-aboba-radius-iana-03.txt> 30 March 2003 Updates: RFC IANA Considerations for RADIUS Network Working Group INTERNET-DRAFT Category: Standards Track 30 March 2003 Updates: RFC 2865 B. Aboba Microsoft IANA Considerations for RADIUS This document is an Internet-Draft

More information

Diameter. Term Paper Seminar in Communication Systems. Author: Christian Schulze Student ID: Date: February 4, 2003 Tutor: Martin Gutbrod

Diameter. Term Paper Seminar in Communication Systems. Author: Christian Schulze Student ID: Date: February 4, 2003 Tutor: Martin Gutbrod Diameter Term Paper Seminar in Communication Systems Author: Christian Schulze Student ID: 2611745 Date: February 4, 2003 Tutor: Martin Gutbrod Table of Contents Introduction... 3 AAA... 3 Authentication...

More information

Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track

Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track ISSN: 2070-1721 F. Xia B. Sarikaya Huawei USA J. Korhonen, Ed. Nokia Siemens Networks S. Gundavelli Cisco D.

More information

Part II. Raj Jain. Washington University in St. Louis

Part II. Raj Jain. Washington University in St. Louis Part II Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/ 19-1 Overview

More information

Network Working Group Request for Comments: 2486 Category: Standards Track WorldCom Advanced Networks January 1999

Network Working Group Request for Comments: 2486 Category: Standards Track WorldCom Advanced Networks January 1999 Network Working Group Request for Comments: 2486 Category: Standards Track B. Aboba Microsoft M. Beadles WorldCom Advanced Networks January 1999 The Network Access Identifier Status of this Memo This document

More information

Request for Comments: Ericsson February 2004

Request for Comments: Ericsson February 2004 Network Working Group Request for Comments: 3702 Category: Informational J. Loughney Nokia G. Camarillo Ericsson February 2004 Authentication, Authorization, and Accounting Requirements for the Session

More information

Basic IP Service for Converged Access Network Specification

Basic IP Service for Converged Access Network Specification GPP X.S00-00-0 Version.0 Date: December, 00 Basic IP Service for Converged Access Network Specification COPYRIGHT GPP and its Organizational Partners claim copyright in this document and individual Organizational

More information

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track April 2019 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track April 2019 ISSN: Internet Engineering Task Force (IETF) A. DeKok Request for Comments: 8559 FreeRADIUS Updates: 5176, 5580 J. Korhonen Category: Standards Track April 2019 ISSN: 2070-1721 Abstract Dynamic Authorization

More information

Unified IP Service Control Architecture Based on Mobile Communication Scheme

Unified IP Service Control Architecture Based on Mobile Communication Scheme UDC 621.396.65:621.397.2 Unified IP Service Control Architecture Based on Mobile Communication Scheme VMitsuaki Kakemizu VMasaaki Wakamoto VAkira Orita (Manuscript received December 1, 2000) The Internet

More information

Merit Network, Incorporated Bernard Aboba Microsoft March 1997

Merit Network, Incorporated Bernard Aboba Microsoft March 1997 Internet Draft Category: Experimental expires in six months Pat R. Calhoun US Robotics Access Corp. Allan Rubens Merit Network, Incorporated Bernard Aboba Microsoft March 1997 DIAMETER Extensible Authentication

More information

Network Working Group Request for Comments: 2059 Category: Informational January 1997

Network Working Group Request for Comments: 2059 Category: Informational January 1997 Network Working Group C. Rigney Request for Comments: 2059 Livingston Category: Informational January 1997 Status of this Memo RADIUS Accounting This memo provides information for the Internet community.

More information

Network Working Group. February 2005

Network Working Group. February 2005 Network Working Group Request for Comments: 4014 Category: Standards Track R. Droms J. Schnizlein Cisco Systems February 2005 Status of This Memo Remote Authentication Dial-In User Service (RADIUS) Attributes

More information

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure

More information

AAA Working Group Pat R. Calhoun

AAA Working Group Pat R. Calhoun AAA Working Group Pat R. Calhoun Black Storm Networks Category: Standards Track John Loughney Nokia Erik Guttman Sun Microsystems, Inc. Glen Zorn Cisco Systems, Inc. Jari Arkko Ericsson Diameter Base Protocol

More information

Internet Engineering Task Force (IETF) Request for Comments: 5997 Updates: 2866 August 2010 Category: Informational ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 5997 Updates: 2866 August 2010 Category: Informational ISSN: Internet Engineering Task Force (IETF) A. DeKok Request for Comments: 5997 FreeRADIUS Updates: 2866 August 2010 Category: Informational ISSN: 2070-1721 Abstract Use of Status-Server Packets in the Remote

More information

Virtual Private Networks

Virtual Private Networks EN-2000 Reference Manual Document 8 Virtual Private Networks O ne of the principal features of routers is their support of virtual private networks (VPNs). This document discusses transmission security,

More information

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1 Mobile IP Petr Grygárek rek 1 Basic principle Picture from IOS IP and IP Routing Configuration Guide Mobile node maintains the same IP address even while roaming in foreign networks even if it s address

More information

Configuring Internet Key Exchange Security Protocol

Configuring Internet Key Exchange Security Protocol Configuring Internet Key Exchange Security Protocol This chapter describes how to configure the Internet Key Exchange (IKE) protocol. IKE is a key management protocol standard that is used in conjunction

More information

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application Table of Contents L2TP Configuration 1 L2TP Overview 1 Introduction 1 Typical L2TP Networking Application 1 Basic Concepts of L2TP 2 L2TP Tunneling Modes and Tunnel Establishment Process 4 L2TP Features

More information

Distributed AAA: Proposals for Ad Hoc Networks

Distributed AAA: Proposals for Ad Hoc Networks Distributed AAA: Proposals for Ad Hoc Networks Pradip Lamsal Department of Computer Science University of Helsinki, Finland pradip.lamsal@helsinki.fi ABSTRACT AAA frameworks such as diameter protocol allows

More information

Jisc Assent Service Technical Specification

Jisc Assent Service Technical Specification Version: 1.0 - March 2015 1. Introduction 1.1. Overview This document is the Technical Specification for the Jisc Assent service provided in the UK by Jisc and is subject to periodic revision; changes

More information

Internet Control Message Protocol

Internet Control Message Protocol Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts.

More information

Computer Networks II, advanced networking

Computer Networks II, advanced networking Computer Networks II, advanced networking AAA II What is AAA Harri Toivanen 11.11.2004 AAA What today? Authentication methods Weak Authentication Radius Diameter Authentication methods Authentication methods

More information

Network PMIP Support COPYRIGHT. 3GPP2 X.S Version 1.0 Date: December 5, 2008

Network PMIP Support COPYRIGHT. 3GPP2 X.S Version 1.0 Date: December 5, 2008 GPP X.S00-0 Version.0 Date: December, 00 COPYRIGHT GPP and its Organizational Partners claim copyright in this document and individual Organizational Partners may copyright and issue documents or standards

More information

Request for Comments: B. Aboba Microsoft Corporation September RADIUS Attributes for Virtual LAN and Priority Support

Request for Comments: B. Aboba Microsoft Corporation September RADIUS Attributes for Virtual LAN and Priority Support Network Working Group Request for Comments: 4675 Category: Standards Track P. Congdon M. Sanchez Hewlett-Packard Company B. Aboba Microsoft Corporation September 2006 RADIUS Attributes for Virtual LAN

More information

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers Network Working Group H. Soliman, Ed. Request for Comments: 5555 Elevate Technologies Category: Standards Track June 2009 Status of This Memo Mobile IPv6 Support for Dual Stack Hosts and Routers This document

More information

Network Working Group Request for Comments: Nokia Research Center F. Dupont GET/ENST Bretagne June 2004

Network Working Group Request for Comments: Nokia Research Center F. Dupont GET/ENST Bretagne June 2004 Network Working Group Request for Comments: 3776 Category: Standards Track J. Arkko Ericsson V. Devarapalli Nokia Research Center F. Dupont GET/ENST Bretagne June 2004 Using IPsec to Protect Mobile IPv6

More information

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide SonicWALL 6.2.0.0 Addendum A Supplement to the SonicWALL Internet Security Appliance User's Guide Contents SonicWALL Addendum 6.2.0.0... 3 New Network Features... 3 NAT with L2TP Client... 3 New Tools

More information

Independent Submission Request for Comments: 6218 Category: Informational. J. Walker Intel Corporation J. Salowey Cisco Systems April 2011

Independent Submission Request for Comments: 6218 Category: Informational. J. Walker Intel Corporation J. Salowey Cisco Systems April 2011 Independent Submission Request for Comments: 6218 Category: Informational ISSN: 2070-1721 G. Zorn Network Zen T. Zhang Advista Technologies J. Walker Intel Corporation J. Salowey Cisco Systems April 2011

More information

Module 28 Mobile IP: Discovery, Registration and Tunneling

Module 28 Mobile IP: Discovery, Registration and Tunneling Module 28 Mobile IP: Discovery, and Tunneling Learning Objectives Introduction to different phases of Mobile IP Understanding how a mobile node search the agents using Discovery process Understand how

More information

[MS-SSTP]: Secure Socket Tunneling Protocol (SSTP) Intellectual Property Rights Notice for Open Specifications Documentation

[MS-SSTP]: Secure Socket Tunneling Protocol (SSTP) Intellectual Property Rights Notice for Open Specifications Documentation [MS-SSTP]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,

More information

Internet Engineering Task Force (IETF) Category: Standards Track. May Mobile IPv6 (MIPv6) Bootstrapping for the Integrated Scenario

Internet Engineering Task Force (IETF) Category: Standards Track. May Mobile IPv6 (MIPv6) Bootstrapping for the Integrated Scenario Internet Engineering Task Force (IETF) Request for Comments: 6611 Category: Standards Track ISSN: 2070-1721 K. Chowdhury, Ed. Radio Mobile Access, Inc. A. Yegin Samsung May 2012 Abstract Mobile IPv6 (MIPv6)

More information

Lawful Interception based on Sniffers in Next Generation Networks

Lawful Interception based on Sniffers in Next Generation Networks Lawful Interception based on Sniffers in Next Generation Networks Australian Telecommunications Networks & Applications Conference 2004 (ATNAC2004), Sydney, Australia, December 8-10 2004 Abstract Andres

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

IEEE 802.1x, RADIUS AND DYNAMIC VLAN ASSIGNMENT

IEEE 802.1x, RADIUS AND DYNAMIC VLAN ASSIGNMENT IEEE 802.1x, RADIUS AND DYNAMIC VLAN ASSIGNMENT Hüseyin ÇOTUK Information Technologies hcotuk@etu.edu.tr Ahmet ÖMERCİOĞLU Information Technologies omercioglu@etu.edu.tr Nurettin ERGİNÖZ Master Student

More information

Mobile IP. Mobile IP 1

Mobile IP. Mobile IP 1 Mobile IP Mobile IP 1 Motivation for Mobile IP Routing based on IP destination address, network prefix (e.g. 129.13.42) determines physical subnet change of physical subnet implies change of IP address

More information

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Cisco How Virtual Private Networks Work

Cisco How Virtual Private Networks Work Table of Contents How Virtual Private Networks Work...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Background Information...1 What Makes a VPN?...2 Analogy:

More information

Diameter NASREQ Application. Status of this Memo. This document is an Internet-Draft and is subject to all provisions of Section 10 of RFC2026.

Diameter NASREQ Application. Status of this Memo. This document is an Internet-Draft and is subject to all provisions of Section 10 of RFC2026. AAA Working Group Pat R. Calhoun Internet-Draft Black Storm Networks Category: Standards Track William Bulley Merit Network, Inc. Allan C. Rubens Tut Systems, Inc.

More information

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4. CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Internet Engineering Task Force (IETF) Huawei Technologies November 2013

Internet Engineering Task Force (IETF) Huawei Technologies November 2013 Internet Engineering Task Force (IETF) Request for Comments: 7075 Updates: 6733 Category: Standards Track ISSN: 2070-1721 T. Tsou Huawei Technologies (USA) R. Hao Comcast Cable T. Taylor, Ed. Huawei Technologies

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

Request for Comments: 4433 Category: Standards Track Cisco Systems Inc. March 2006

Request for Comments: 4433 Category: Standards Track Cisco Systems Inc. March 2006 Network Working Group Request for Comments: 4433 Category: Standards Track M. Kulkarni A. Patel K. Leung Cisco Systems Inc. March 2006 Status of This Memo Mobile IPv4 Dynamic Home Agent (HA) Assignment

More information

Mobile IPv6. Washington University in St. Louis

Mobile IPv6. Washington University in St. Louis Mobile IPv6 Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

Mobile Communications Chapter 9: Network Protocols/Mobile IP

Mobile Communications Chapter 9: Network Protocols/Mobile IP Mobile Communications Chapter 9: Network Protocols/Mobile IP Motivation Data transfer Encapsulation Security IPv6 Problems DHCP Ad-hoc s Routing protocols 9.0.1 Motivation for Mobile IP Routing based on

More information

Internet Engineering Task Force (IETF) February Local Mobility Anchor (LMA) Discovery for Proxy Mobile IPv6

Internet Engineering Task Force (IETF) February Local Mobility Anchor (LMA) Discovery for Proxy Mobile IPv6 Internet Engineering Task Force (IETF) Request for Comments: 6097 Category: Informational ISSN: 2070-1721 J. Korhonen Nokia Siemens Networks V. Devarapalli Vasona Networks February 2011 Abstract Local

More information

REMOTE AUTHENTICATION DIAL IN USER SERVICE

REMOTE AUTHENTICATION DIAL IN USER SERVICE AAA / REMOTE AUTHENTICATION DIAL IN USER SERVICE INTRODUCTION TO, A PROTOCOL FOR AUTHENTICATION, AUTHORIZATION AND ACCOUNTING SERVICES Peter R. Egli INDIGOO.COM 1/12 Contents 1. AAA - Access Control 2.

More information

Request for Comments: Category: Best Current Practice June 2008

Request for Comments: Category: Best Current Practice June 2008 Network Working Group Request for Comments: 5266 BCP: 136 Category: Best Current Practice V. Devarapalli Wichorus P. Eronen Nokia June 2008 Secure Connectivity and Mobility Using Mobile IPv4 and IKEv2

More information

Network Working Group Request for Comments: 2866 Category: Informational June 2000 Obsoletes: 2139

Network Working Group Request for Comments: 2866 Category: Informational June 2000 Obsoletes: 2139 Network Working Group C. Rigney Request for Comments: 2866 Livingston Category: Informational June 2000 Obsoletes: 2139 Status of this Memo RADIUS Accounting This memo provides information for the Internet

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Sample excerpt. Virtual Private Networks. Contents

Sample excerpt. Virtual Private Networks. Contents Contents Overview...................................................... 7-3.................................................... 7-5 Overview of...................................... 7-5 IPsec Headers...........................................

More information

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Network Security - ISA 656 IPsec IPsec Key Management (IKE) Network Security - ISA 656 IPsec IPsec (IKE) Angelos Stavrou September 28, 2008 What is IPsec, and Why? What is IPsec, and Why? History IPsec Structure Packet Layout Header (AH) AH Layout Encapsulating

More information

Configuring L2TP over IPsec

Configuring L2TP over IPsec CHAPTER 62 This chapter describes how to configure L2TP over IPsec on the ASA. This chapter includes the following topics: Information About L2TP over IPsec, page 62-1 Licensing Requirements for L2TP over

More information

Using PANA for Mobile IPv6 Bootstrapping

Using PANA for Mobile IPv6 Bootstrapping Using PANA for Mobile IPv6 Bootstrapping Julien Bournelle 1, Jean-Michel Combes 2, Maryline Laurent-Maknavicius 1, and Sondes Larafa 1 1 GET/INT, 9 rue Charles Fourier, 91011 Evry, France julien.bournelle@gmail.com

More information

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP Introduction: Mobile IP Overview An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet

More information

How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT

How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT Table of Contents TABLE OF CONTENTS 1 BACKGROUND 2 WINDOWS SERVER CONFIGURATION STEPS 2 CONFIGURING USER AUTHENTICATION 3 ACTIVE DIRECTORY

More information

Request for Comments: E. Demaria Telecom Italia J. Bournelle Orange Labs R. Lopez University of Murcia September 2009

Request for Comments: E. Demaria Telecom Italia J. Bournelle Orange Labs R. Lopez University of Murcia September 2009 Network Working Group Request for Comments: 5637 Category: Informational G. Giaretta Qualcomm I. Guardini E. Demaria Telecom Italia J. Bournelle Orange Labs R. Lopez University of Murcia September 2009

More information

IPV6 SIMPLE SECURITY CAPABILITIES.

IPV6 SIMPLE SECURITY CAPABILITIES. IPV6 SIMPLE SECURITY CAPABILITIES. 50 issues from RFC 6092 edited by J. Woodyatt, Apple Presentation by Olle E. Johansson, Edvina AB. ABSTRACT The RFC which this presentation is based upon is focused on

More information

On the Internet, nobody knows you re a dog.

On the Internet, nobody knows you re a dog. On the Internet, nobody knows you re a dog. THREATS TO DISTRIBUTED APPLICATIONS 1 Jane Q. Public Big Bank client s How do I know I am connecting to my bank? server s Maybe an attacker...... sends you phishing

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

3GPP TS V9.4.0 ( )

3GPP TS V9.4.0 ( ) TS 24.303 V9.4.0 (2011-09) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Mobility management based on Dual-Stack Mobile IPv6; Stage

More information

CASP Cross- Application Signaling Protocol

CASP Cross- Application Signaling Protocol CASP Cross- Application Signaling Protocol Henning Schulzrinne August 27, 2002 Overview Protocol properties Message delivery Transport protocol usage Message forwarding Message format Next-hop discovery

More information

Chapter 8. User Authentication

Chapter 8. User Authentication Chapter 8. User Authentication This chapter describes how NetDefendOS implements user authentication. Overview, page 220 Authentication Setup, page 221 8.1. Overview In situations where individual users

More information

Route Optimization based on ND-Proxy for Mobile Nodes in IPv6 Mobile Networks

Route Optimization based on ND-Proxy for Mobile Nodes in IPv6 Mobile Networks Route Optimization based on ND-Proxy for Mobile Nodes in IPv6 Mobile Networks Jaehoon Jeong, Kyeongjin Lee, Jungsoo Park, Hyoungjun Kim Protocol Engineering Center, ETRI, 161 Gajeong-dong Yuseong-gu, Daejeon,

More information

Security Issues In Mobile IP

Security Issues In Mobile IP Security Issues In Mobile IP Zhang Chao Tsinghua University Electronic Engineering 1 OUTLINE 1.Introduction 2.Typical threats 3. Mobile IPv6 and new threats 4.Open issues 2 OUTLINE 1.Introduction 2.Typical

More information

SJTU 2018 Fall Computer Networking. Wireless Communication

SJTU 2018 Fall Computer Networking. Wireless Communication SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

IPv6 Security (Theory vs Practice) APRICOT 14 Manila, Philippines. Merike Kaeo

IPv6 Security (Theory vs Practice) APRICOT 14 Manila, Philippines. Merike Kaeo IPv6 Security (Theory vs Practice) APRICOT 14 Manila, Philippines Merike Kaeo merike@doubleshotsecurity.com Current IPv6 Deployments Don t break existing IPv4 network Securing IPv6 Can t secure something

More information

MIX Network for Location Privacy First Draft

MIX Network for Location Privacy First Draft 2G1319 Communication Systems Design Department of Microelectronics and Information Technology, KTH csd2002-ipv6privacy@2g1319.ssvl.kth.se MIX Network for Location Privacy First Draft O. Sirovatcenko April

More information

Internet Engineering Task Force (IETF) RD-IPtech R. Maglione Cisco Systems April 2013

Internet Engineering Task Force (IETF) RD-IPtech R. Maglione Cisco Systems April 2013 Internet Engineering Task Force (IETF) Request for Comments: 6930 Category: Standards Track ISSN: 2070-1721 D. Guo S. Jiang, Ed. Huawei Technologies Co., Ltd R. Despres RD-IPtech R. Maglione Cisco Systems

More information

Mobility Management - Basics

Mobility Management - Basics Mobility Management - Basics Summer Semester 2012 Integrated Communication Systems Group Ilmenau University of Technology Content Motivation Problem and possible solutions IP-based mobility management

More information

Configuring Request Authentication and Authorization

Configuring Request Authentication and Authorization CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter

More information

Network Access Flows APPENDIXB

Network Access Flows APPENDIXB APPENDIXB This appendix describes the authentication flows in Cisco Identity Services Engine (ISE) by using RADIUS-based Extensible Authentication Protocol (EAP) and non-eap protocols. Authentication verifies

More information

MIP4 Working Group. Generic Notification Message for Mobile IPv4 draft-ietf-mip4-generic-notification-message-16

MIP4 Working Group. Generic Notification Message for Mobile IPv4 draft-ietf-mip4-generic-notification-message-16 MIP4 Working Group Internet-Draft Intended status: Standards Track Expires: April 28, 2011 H. Deng China Mobile H. Levkowetz Netnod V. Devarapalli WiChorus S. Gundavelli Cisco Systems B. Haley Hewlett-Packard

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

Chapter 10 Security Protocols of the Data Link Layer

Chapter 10 Security Protocols of the Data Link Layer Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) [NetSec], WS 2005/06 10.1 Scope of Link Layer Security Protocols

More information

Open Diameter Conformance Testing

Open Diameter Conformance Testing Open Diameter Conformance Testing Dario Djuric *, Ognjen Dobrijevic *, Darko Huljenic ** and Maja Matijasevic * * University of Zagreb Faculty of Electrical Engineering and Computing, Unska 3, HR-10000

More information

Virtual Private Network

Virtual Private Network VPN and IPsec Virtual Private Network Creates a secure tunnel over a public network Client to firewall Router to router Firewall to firewall Uses the Internet as the public backbone to access a secure

More information

Mobile Communications Mobility Support in Network Layer

Mobile Communications Mobility Support in Network Layer Motivation Mobility support needed to be able to use mobile devices in the Mobile devices need IP address for their communication Applications would like to communicate while being on the move Mobile Communications

More information

The EN-4000 in Virtual Private Networks

The EN-4000 in Virtual Private Networks EN-4000 Reference Manual Document 8 The EN-4000 in Virtual Private Networks O ne of the principal features of routers is their support of virtual private networks (VPNs). This document discusses transmission

More information

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Mobile Communications Chapter 8: Network Protocols/Mobile IP Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security, IPv6, Problems Micro mobility support DHCP Ad-hoc networks, Routing protocols Prof. Jó Ueyama

More information

Network Working Group

Network Working Group Network Working Group Request for Comments: 2868 Updates: RFC 2865 Category: Informational G. Zorn Cisco Systems, Inc. D. Leifer A. Rubens Ascend Communications J. Shriver Intel Corporation M. Holdrege

More information

Foreword xxiii Preface xxvii IPv6 Rationale and Features

Foreword xxiii Preface xxvii IPv6 Rationale and Features Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP

More information

Network Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example

Network Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example Contents Network Address Translation (NAT) 13.10.2008 Prof. Sasu Tarkoma Overview Background Basic Network Address Translation Solutions STUN TURN ICE Summary What is NAT Expand IP address space by deploying

More information

Network Security and Cryptography. December Sample Exam Marking Scheme

Network Security and Cryptography. December Sample Exam Marking Scheme Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers

More information

October 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo

October 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo Internet Draft draft-hoffman-rfc2487bis-04.txt October 4, 2000 Expires in six months Paul Hoffman Internet Mail Consortium Status of this Memo SMTP Service Extension for Secure SMTP over TLS This document

More information

Hardware Management Console External Connectivity Security for IBM POWER5 Processor-based Systems

Hardware Management Console External Connectivity Security for IBM POWER5 Processor-based Systems Hardware Management Console External Connectivity Security for IBM POWER5 Processor-based Systems March 2, 2007 by: Jason Stapels Ann Burkes Brian Myers Table of Contents 1 Introduction...3 1.1 Disclaimer...3

More information

An Analysis of The Fast Handovers for Mobile IPv6 Protocol

An Analysis of The Fast Handovers for Mobile IPv6 Protocol An Analysis of The Fast Handovers for Mobile IPv6 Protocol Janne Lundberg Helsinki University of Technology Laboratory for Theoretical Computer Science May 28, 2003 Abstract Fast Handovers for Mobile IPv6

More information

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice

More information

IPsec NAT Transparency

IPsec NAT Transparency sec NAT Transparency First Published: November 25, 2002 Last Updated: March 1, 2011 The sec NAT Transparency feature introduces support for Security (sec) traffic to travel through Network Address Translation

More information

Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00

Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00 Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00 Fred Detienne, Cisco Systems Manish Kumar, Cisco Systems Mike Sullenberger, Cisco Systems What is Dynamic Mesh VPN? DMVPN is a solution for building VPNs

More information

Kerberos based AAA framework for mobile networks

Kerberos based AAA framework for mobile networks WIDE Technical-Report in 2006 Kerberos based AAA framework for mobile networks wide-tr-nautilus6-krb-in-nemo-00.pdf WIDE Project : http://www.wide.ad.jp/ If you have any comments on this document, please

More information