RFC 2107 - Ascend Tunnel Management Protocol - ATMP

[フレーム]

Network Working Group K. Hamzeh
Request for Comments: 2107 Ascend Communications
Category: Informational February 1997
 Ascend Tunnel Management Protocol - ATMP
Status of this Memo
 This memo provides information for the Internet community. This memo
 does not specify an Internet standard of any kind. Distribution of
 this memo is unlimited.
IESG Note:
 This note documents a private protocol for tunnel management. This
 protocol is NOT the product of an IETF working group nor is it a
 standards track document. There is ongoing effort in an IETF working
 group which could result in a standards track document which
 specifies a protocol which provides similar functionality.
Abstract
 This document specifies a generic tunnel management protocol that
 allows remote dial-in users to access their home network as if they
 were directly attached to the home network. The user's client
 software uses an address contained in the home network address space
 for the remote access. Packets to and from the home network are
 tunneled by the Network Access Server (NAS) to which the user
 connects and a Home Agent (HA) on the user's home network. This
 allows for the support of access to Virtual Private Networks and also
 allows for the use of protocols other than IP to be carried over the
 tunnel. An example of how the RADIUS (Remote Authentication Dial In
 User Service) can be used to provide the necessary configuration
 information to support this service is also provided.
1. Introduction
 The Ascend Tunnel Management Protocol (ATMP) is a protocol currently
 being used in Ascend Communication products to allow dial-in client
 software to obtain virtual presence on a user's home network from
 remote locations. A user calls into a remote NAS but, instead of
 using an address belonging to a network directly supported by the
 NAS, the client software uses an address belonging to the user's
 "Home Network". This address can be either provided by the client
 software or assigned from a pool of addresses from the Home Network
 address space. In either case, this address belongs to the Home
 Network and therefore special routing considerations are required in
Hamzeh Informational [Page 1]

RFC 2107 ATMP February 1997
 order to route packets to and from these clients. A tunnel between
 the NAS and a special "Home Agent" (HA) located on the Home Network
 is used to carry data to and from the client.
 ATMP currently allows for both IP and IPX protocols to be tunneled
 between the NAS and the HA. The protocol to be used, the HA to use,
 and other user specific information is provided by some configuration
 mechanism that is beyond the scope of this document. Appendix A
 illustrates how RADIUS [5] is used to convey this information to the
 NAS.
 The determination of the Home Network address to be used can be
 accomplished in different ways. It could, for example, be configured
 in the client and negotiated by IPCP (or IPXCP). Alternatively, it
 could be defined to be an address specific to the given user ID, or
 it could be assigned from a pool of addresses provided by the Home
 Network for the purpose of remote dial-in access. Again, how this
 address is assigned and how the NAS decides to invoke ATMP for a
 specific call is beyond the scope of this document.
1.1 Protocol Goals and Assumptions
 The ATMP protocol is implemented only by the NAS and HA. No other
 systems need to be aware of ATMP. All other systems communicate in
 the normal manner and are unaware that they may be communicating with
 remote clients. The clients themselves are unaware of ATMP. It is
 assumed that standard PPP [8] (or SLIP) clients are being used.
 Unlike the mobile-IP protocol [3], ATMP assumes that a single NAS
 will provide the physical connection to a remote client for the
 duration of the session. The client will not switch between NASes
 expecting to keep the same IP address and all associated sessions
 active during these transitions. A particular client can be
 registered with a given HA only once at any given time.
 Deregistration with a HA implies loss of all higher layer sessions
 for that client.
 IP multicasting is currently not provided by ATMP.
1.2 Terminology
 The terminology used in this document is similar to that used in
 mobile-IP. As pointed out in the previous section, however, ATMP
 provides a subset of the functionality provided by mobile-IP and the
 meanings of the various terms used herein have been modified
 accordingly.
Hamzeh Informational [Page 2]

RFC 2107 ATMP February 1997
 Connection Profile
 A table used to route packets other than by destination
 address. The Connection Profile is a named entity that
 contains information indicating how packets addressed to it are
 to be routed. It may be used to route packets to unregistered
 IP addresses and for routing protocols other than IP (e.g.,
 IPX).
 Foreign Agent (FA)
 A routing entity that resides in a NAS on a remote network that
 allows a mobile node to utilize a home network address. It
 tunnels datagrams to, and detunnels datagrams from, the home
 agent for the given home network.
 Home Address
 An address that is assigned for an extended period of time to a
 mobile node. It may remain unchanged regardless of where the
 MN is attached to the Internet. Alternatively, it could be
 assigned from a pool of addresses. The management of this pool
 is beyond the scope of this document.
 Home Agent (HA)
 A router on a mobile node's home network which tunnels
 datagrams for delivery to, and detunnels datagrams from, a
 mobile node when it is away from home.
 Home Network
 The address space of the network to which a user logically
 belongs. When a workstation is physically connected to a LAN,
 the LAN address space is the user's home network. ATMP
 provides for a remote virtual connection to a LAN.
 Mobile Node (MN)
 A host that wishes to use a Home Network address while
 physically connected by a point-to-point link (phone line,
 ISDN, etc.) to a NAS that does not reside on the Home Network.
 Also referred to as the client.
 Mobility Binding
 The association of a Home Address with a Foreign Agent IP
 address and a Tunnel ID.
Hamzeh Informational [Page 3]

RFC 2107 ATMP February 1997
 Network Access Server (NAS)
 A device providing temporary, on-demand, network access to
 users. This access is point-to-point using phone or ISDN
 lines.
 Tunnel
 The path followed by a datagram when it is encapsulated. The
 model is that, while it is encapsulated, a datagram is routed
 to a knowledgeable decapsulation agent, which decapsulates the
 datagram and then correctly delivers it to its ultimate
 destination. Each mobile node connecting to a home agent does
 so over a unique tunnel, identified by a tunnel identifier
 which is unique to a given FA-HA pair. A tunnel can carry both
 IP and IPX datagrams simultaneously.
1.3 Protocol Overview
 A mobile node that wishes to use a home address while connected to a
 remote NAS must register with the appropriate home agent. The
 foreign agent entity of the remote NAS performs this registration on
 behalf of the MN. Once registered, a tunnel is established between
 the FA and HA to carry datagrams to and from the MN. While a MN is
 registered with an HA, the HA must intercept any packets destined for
 the MN's home address and forward them via the tunnel to the FA. When
 the FA detects that the MN has disconnected from the NAS, it issues a
 deregister request to the HA.
 Because ATMP allows protocols other than IP to be carried on its
 tunnels and also allows unregistered IP address to be used to provide
 for access to enterprise networks, the HA doesn't necessarily route
 datagrams received from the MN in the conventional manner. The
 registration request allows for a named "Connection Profile" to be
 specified in the registration request. This Connection Profile
 contains configuration information that tells the HA where to send
 packets that it receives from the MN.
1.4 Specification Language
 In this document, several words are used to signify the requirements
 of the specification. These words are often capitalized.
 MUST This word, or the adjective "required", means
 that the definition is an absolute requirement
 of the specification.
Hamzeh Informational [Page 4]

RFC 2107 ATMP February 1997
 MUST NOT This phrase means that the definition is an
 absolute prohibition of the specification.
 SHOULD This word, or the adjective "recommended",
 means that, in some circumstances, valid
 reasons may exist to ignore this item, but
 the full implications must be understood and
 carefully weighed before choosing a different
 course. Unexpected results may result
 otherwise.
 MAY This word, or the adjective "optional", means
 that this item is one of an allowed set of
 alternatives. An implementation which does
 not include this option MUST be prepared to
 interoperate with another implementation which
 does include the option.
 silently discard The implementation discards the datagram
 without further processing, and without
 indicating an error to the sender. The
 implementation SHOULD provide the capability of
 logging the error, including the contents of
 the discarded datagram, and SHOULD record the
 event in a statistics counter.
2.0 Protocol Specification
 ATMP defines a set of request and reply messages sent with UDP [4].
 The HA listens on UDP port 5150 [6]) for requests from FA's. The UDP
 checksum field MUST be computed and verified. There are 7 different
 ATMP message types represented by the following Type values:
 Message Type Type code
 Registration Request 1
 Challenge Request 2
 Challenge Reply 3
 Registration Reply 4
Hamzeh Informational [Page 5]

RFC 2107 ATMP February 1997
 Deregister Request 5
 Deregister Reply 6
 Error Notification 7
2.1 Registration Request
 The FA issues a Registration Request to request the HA to establish a
 mobility binding for the specified MN home address. The request is
 issued to the HA by the FA upon detecting a MN that wishes to use a
 home address supported by the HA receiving the request.
 IP fields
 Source Address The IP address of the foreign agent
 interface from which the request is
 issued.
 Destination Address The IP address of the home agent.
 UDP fields:
 Source Port variable
 Destination Port 5150 (or port number configured in FA
 for given HA)
Hamzeh Informational [Page 6]

RFC 2107 ATMP February 1997
 The UDP header is followed by the ATMP fields shown below:
 0 1 2 3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Version | Type | Identifier |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Foreign Agent |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Mobile Node |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Mobile Node Mask |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Mobile Node IPX Net |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |Mobile Node IPX Station . . .
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | reserved |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Home Network Name . . .
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 Version The ATMP protocol version. MUST be 1.
 Type 1 for Registration Request.
 Identifier A 16 bit number used to match replies
 with requests. A new value should be
 provided in each new request.
 Retransmissions of the same request
 should use the same identifier.
 Foreign Agent The IP address of the foreign agent
 issuing the request (typically the same
 as the UDP source address).
 Mobile Node The IP address to be used by the mobile
 node. This is the mobile node's home
 address. This field can be all 0's if
 IPX is to be tunneled to the mobile node.
 Mobile Node Mask The network bit mask for the mobile node.
 Currently this value should be set to all
 1's.
 Mobile Node IPX Net The Network portion of the mobile node's
 IPX address. This value should be set to
 all 0's if only IP is to be tunneled.
Hamzeh Informational [Page 7]

RFC 2107 ATMP February 1997
 Mobile Node IPX Station The 6 octet value used to represent the
 station portion of the mobile node's IPX
 address. This value should be set to all
 0's if only IP is to be tunneled instead
 of IPX.
 Reserved This field is for future extensibility
 and MUST be set to all 0's.
 HN Name This is the name of the "Connection
 Profile" to be used by the home agent to
 forward all packets received from the
 mobile node. This character string is
 terminated by a NUL character and can be
 up to 32 characters long, including the
 NUL terminator.
2.2 Challenge Request
 The Home Agent issues a Challenge Request in response to the receipt
 of a Registration Request from a Foreign Agent. It is used by the
 Home Agent, in conjunction with the Challenge Reply, to authenticate
 the Foreign Agent.
 IP fields
 Source Address The IP address of the Home Agent
 interface from which the request is
 issued.
 Destination Address Copied form the Source Address of the
 Registration Request.
 UDP fields:
 Source Port variable
 Destination Port Copied from the Source Port of the
 Registration Request.
Hamzeh Informational [Page 8]

RFC 2107 ATMP February 1997
The UDP header is followed by the ATMP fields shown below:
 0 1 2 3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Version | Type | Identifier |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | |
 | Authenticator |
 | |
 | |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Result Code |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 Version The ATMP protocol version. MUST be 1.
 Type 2 for Challenge Request
 Identifier A 16 bit number used to match replies
 with requests. A new value should be
 provided in each new request.
 Retransmissions of the same request
 should use the same identifier.
 Authenticator A series of 16 octet values randomly
 generated by the Home Agent. The
 receiving Foreign Agent is to perform an
 MD5 [7] hash of these values along with a
 shared secret. The resultant digest is
 returned in the Challenge Reply. See
 Sec. 2.3 Retransmissions of the Challenge
 Request should use the same Authenticator
 value.
 A value of all 0's in this field
 indicates an error occurred with the
 Registration Request. The error code
 will be in the following field.
Hamzeh Informational [Page 9]

RFC 2107 ATMP February 1997
 Result Code If non-zero, this value indicates the
 error condition that occurred. See Sec.
 2.8 for a list of Result Code values and
 their meanings.
 A non-zero value in this field implies
 that the Authenticator field will be
 zero.
2.3 Challenge Reply
 The Foreign Agent issues a Challenge Reply upon receipt of a valid
 Challenge Request (one with a Result Code of 0) from the Home Agent.
 The Foreign Agent uses the randomly generated Authenticator value
 from the Challenge Request along with a shared secret to produce an
 MD5 digest value which is returned to the Home Agent in the Challenge
 Reply.
 IP fields
 Source Address The IP address of the Foreign Agent
 interface from which the reply is issued.
 Destination Address Copied from the Source Address of the
 Challenge Request.
 UDP fields:
 Source Port variable
 Destination Port Copied from the Source Port of the
 Challenge Request.
 The UDP header is followed by the ATMP fields shown below:
 0 1 2 3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Version | Type | Identifier |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Reply Length | Reply . . .
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Hamzeh Informational [Page 10]

RFC 2107 ATMP February 1997
 Version The ATMP protocol version. MUST be 1.
 Type 3 for Challenge Reply
 Identifier Copied from the corresponding
 Deregistration Request.
 Reply Length This field specifies the length of the
 challenge reply computation based on the
 received Authenticator and the shared
 secret. For MD5 this length will always
 be 16. This field is provided for future
 extensibility.
 Reply This is the computed challenge reply. It
 is computed by performing an MD5 message
 digest computation over the Authenticator
 value received in the Challenge Request
 appended with the secret shared between
 the Foreign Agent and the Home Agent.
 The digests produced by MD5 are always 16
 octets long.
2.4 Registration Reply
 A Registration Reply is issued by a Home Agent in reply to a
 Challenge Reply received from a Foreign Agent. The Registration
 Reply indicates to the Foreign Agent whether the registration was
 accepted by the Home Agent or not. It also provides a "tunnel ID" to
 uniquely identify the tunnel to be associated with this session.
 The Home Agent calculates the same MD5 hash on the Challenge Request
 Authenticator field and the shared secret. The resulting digest is
 compared with the Reply value in the Challenge Reply and if it is
 equal, authentication is successful. Otherwise the registration is
 not accepted and the Foreign Agent is informed by the Result Code of
 the Registration Reply that registration failed due to an
 authentication failure.
 IP fields
 Source Address The IP address of the Home Agent
 interface from which the reply is issued.
 Destination Address Copied from the Source Address of the
 Challenge Reply.
Hamzeh Informational [Page 11]

RFC 2107 ATMP February 1997
 UDP fields:
 Source Port variable
 Destination Port Copied from the Source Port of the
 Challenge Reply.
 The UDP header is followed by the ATMP fields shown below:
 0 1 2 3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Version | Type | Identifier |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Result Code | Tunnel ID |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 Version The ATMP protocol version. MUST be 1.
 Type 4 for Registration Reply
 Identifier Copied from the corresponding
 Registration Request.
 Result Code Specifies the result of the registration
 and authentication attempt by the Foreign
 Agent. Sec. 2.8 for a list of Result
 Code values and their meanings.
 Tunnel ID This is the identifier used to indicate a
 given mobility binding between a given
 Mobile Node and Home Agent. This
 identifier is used to distinguish
 multiple tunnels between a given Foreign
 Agent-Home Agent pair. It is carried in
 the "key" field of the GRE [1] tunnel
 packets that ATMP uses as the tunnel
 protocol. It is also used in
 Deregistration Requests and Error
 Notification messages to indicate the
 particular mobility binding to which they
 relate.
Hamzeh Informational [Page 12]

RFC 2107 ATMP February 1997
2.5 Deregistration Request
 The Deregistration Request is issued by the Foreign Agent to the Home
 Agent to indicate that the specified mobility binding is to be ended.
 This request may result from the Foreign Agent detecting that its
 connection to the Mobile Node has terminated. It can also be issued
 in response to a detected error condition by the Foreign Agent or
 receipt of an Error Notification message from the Home Agent.
 IP fields
 Source Address The IP address of the Foreign Agent
 interface from which the request is
 issued.
 Destination Address 5150 (or port number configured in FA
 for given HA)
 UDP fields:
 Source Port variable
 Destination Port Copied from the Source Port of the
 Challenge Reply.
 The UDP header is followed by the ATMP fields shown below:
 0 1 2 3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Version | Type | Identifier |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Tunnel ID |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 Version The ATMP protocol version. MUST be 1.
 Type 5 for Deregistration Request
 Identifier A 16 bit number used to match replies
 with requests. A new value should be
 provided in each new request.
 Retransmissions of the same request
 should use the same identifier.
Hamzeh Informational [Page 13]

RFC 2107 ATMP February 1997
 Tunnel ID Tunnel identifier of the mobility binding
 to be terminated.
2.6 Deregistration Reply
 The Deregistration Reply is issued by the Home Agent in response to a
 Deregistration Request received from a Foreign Agent. If the
 Deregistration Request was valid, the Home Agent removes the
 specified mobility binding from its tables and issues an affirmative
 reply. Otherwise the Home Agent issues a Deregistration Reply with a
 Result Code indicating the reason for failure of the Deregistration
 Request.
 IP fields
 Source Address The IP address of the Home Agent
 interface from which the reply is issued.
 Destination Address Copied from the Source Address of the
 received Deregistration Request.
 UDP fields:
 Source Port variable
 Destination Port Copied from the Source Port of the
 received Deregistration Request.
 The UDP header is followed by the ATMP fields shown below:
 0 1 2 3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Version | Type | Identifier |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Result Code | Tunnel ID |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 Version The ATMP protocol version. MUST be 1.
 Type 6 for Deregistration Reply
 Identifier Copied from the corresponding
 Deregistration Request.
Hamzeh Informational [Page 14]

RFC 2107 ATMP February 1997
 Result Code Specifies the result of the registration
 and authentication attempt by the Foreign
 Agent. Sec. 2.8 for a list of Result
 Code values and their meanings.
 Tunnel ID Tunnel identifier of the mobility binding
 specified in the Deregistration Request.
2.7 Error Notification
 This message is sent by either agent to inform the other agent that
 an error condition has occurred. It provides a last-ditch error
 recovery mechanism that is used for conditions that cannot be
 reported back to the sender by the normal request-reply mechanism,
 such as the receipt of a spontaneously generated reply.
 IP fields
 Source Address The IP address of the issuing agent
 interface from which this message is
 issued.
 Destination Address The IP address of the Home Agent or
 Foreign Agent to which this message is to
 be issued.
 UDP fields:
 Source Port variable
 Destination Port If issued to a Home Agent, 5150 (or the
 port number configured for the given HA).
 If issued to a Foreign Agent, the source
 port number saved from the original
 Registration Request.
 The UDP header is followed by the ATMP fields shown below:
 0 1 2 3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Version | Type | Identifier |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Result Code | Tunnel ID |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Hamzeh Informational [Page 15]

RFC 2107 ATMP February 1997
 Version The ATMP protocol version. MUST be 1.
 Type 7 for Error Notification
 Identifier If issued in response to a received reply
 type message, this value should be copied
 from the identifier field of the reply.
 Otherwise the identifier should be the
 value that would be used for the next
 generated request.
 Result Code This indicates the type of error
 detected. The possible result codes are
 defined in Sec. 2.8.
 Tunnel ID Tunnel identifier of the mobility binding
 to which this message pertains. If the
 Error Notification is being sent in
 response to an unsolicited reply, the
 Tunnel ID is copied from the reply.
2.8 Result Codes
 Error Code Description
 0 NO_ERROR Successful operation
 1 AUTH_FAILED Authentication of the Foreign Agent failed.
 Registration denied.
 2 NOT_ENABLED The Home Agent is not configured to run ATMP.
 3 TOO_MANY Too many Mobile Node sessions. Home Agent is out
 of resources.
 4 PARAMETER_ERROR An invalid value was detected in an ATMP message.
 5 INVALID_TUNNEL_ID The Tunnel ID contained in a GRE packet is
 invalid or the corresponding mobility binding
 does not exist. This usually occurs when either
 the MN or HA has reset.
 6 TIMEOUT A response to an ATMP request was not received in
 time.
Hamzeh Informational [Page 16]

RFC 2107 ATMP February 1997
 7 NET_UNREACHABLE The Home Network for this mobility binding is not
 operational (the "Connection Profile" is "down"
 or is not defined).
 8 GENERAL_ERROR General Error indication.
2.9 Protocol Operation
 Upon detection of a Mobile Node requiring ATMP service, the NAS
 invokes its ATMP Foreign Agent entity.The FA retrieves configuration
 information for the user involved.This information is obtained in a
 method particular to the NAS and is not specified by this document.
 The information obtained MUST include the Home Agent address and the
 shared secret for this HA.It also MAY include the Home Network Name,
 if a Connection Profile is to be used for this session.
 The FA then sends a Registration Request to the HA informing it that
 an MN wishes to register with it. The FA then waits for the HA to
 respond with a Challenge Request. The FA retransmits the
 Registration Request every 2 seconds until it receives the Challenge
 Request. If, after 10 retransmissions, no Challenge Request is
 received, the FA will terminate the Registration Request, logs the
 registration failure, and disconnects the MN.
 Upon receipt of the Challenge Request, the FA examines the Result
 code. If it indicates an error condition, the condition is logged
 and the MN is disconnected. If the result is zero, the FA generates
 a Challenge Reply. The Challenge Reply is generated by appending the
 Authenticator obtained from the Challenge Request with the shared
 secret (obtained from the configuration data) and then computing the
 MD5 hash of this concatenated string (authenticator + secret). The
 16 octet hash is then returned in the Challenge Reply for validation
 by the HA.
 Upon receipt of the Challenge Reply from the FA, the HA does the same
 computation of the MD5 hash based on the Challenge Request
 Authenticator and the shared-secret (which it too must be configured
 with). If this digest matches that provided in the Challenge Reply
 by the FA then the authentication is successful and the registration
 is accepted. If the authentication fails, or resource limitations
 prohibit the registration attempt, the HA returns a Registration
 Reply with a non-zero result code to the FA.
 If the HA accepts the Challenge Reply from the FA, it assigns a
 Tunnel ID to this session and returns this Tunnel ID in a
 Registration Reply with a zero result code. This Tunnel ID needs to
 be unique for the FA-HA pair. The Tunnel ID is used to multiplex and
 demultiplex the packets sent between a given FA-HA pair.
Hamzeh Informational [Page 17]

RFC 2107 ATMP February 1997
 At the time the HA decides to accept a registration, it creates a
 control block that associates the Tunnel ID with the appropriate
 routing information. If the Registration Request included a Home
 Network Name, this name is saved in the table and used as the name of
 the Connection Profile for this session.
 Upon receipt of the Registration Reply, the FA examines the result
 code. If it is non-zero, the FA logs the registration failure and
 disconnects the MN. If it is zero, the FA saves the Tunnel ID in a
 control block associated with the MN session. The FA and HA are now
 ready to exchange data packets for this MN session.
 On the FA side, all data received from the MN will be encapsulated
 using GRE and sent to the HA with the assigned Tunnel ID included in
 the GRE Key field. When the HA receives a GRE packet it decapsulates
 it and routes it using the routing information contained in the HA's
 control block associated with this Tunnel ID.
 When the HA receives a packet destined for the MN's Home Address, it
 MUST encapsulate it in a GRE packet and forward it to the appropriate
 FA. The Tunnel ID is included in the GRE Key field to allow the FA
 to demultiplex the packet.
 When the FA receives a GRE packet, it will examine the Tunnel ID in
 the GRE Key field to see if it matches the Tunnel ID assigned to any
 of the MN's currently connected to the FA. If so, the packet is
 decapsulated and forwarded to the MN. If the Tunnel ID doesn't match
 any active MN's, an Error Notification message is issued to the HA
 and the GRE packet is silently discarded.
 When the FA wishes to disconnect the MN from the HA, it issues a
 Deregistration Request. This request is issued every 2 seconds. If
 after 10 attempts a Deregistration Reply is not received from the HA,
 an error condition is logged and the MN is disconnected. Upon
 receipt of a Deregistration Reply from the HA, the FA deallocates the
 Tunnel ID and disconnects the MN.
3.0 Security Considerations
 The Registration function of ATMP is protected by a
 Challenge/Response mechanism similar to CHAP [2]. The Home Agent
 challenges each registration attempt by a Foreign Agent for
 authentication.This authentication requires the configuration of a
 shared secret for each HA/client pair.
Hamzeh Informational [Page 18]

RFC 2107 ATMP February 1997
4.0 Author's Address
 Kory Hamzeh
 Ascend Communications
 1275 Harbor Bay Parkway
 Alameda, CA 94502
 EMail: kory@ascend.com
5.0 References
 [1] Hanks, S. Li, T., Farinacci, D., and Traina, P., "Generic
 Routing Encapsulation (GRE)", RFC 1701, October 1994.
 [2] Lloyd, B., and W. Simpson, "PPP Authentication Protocols",
 RFC 1334, October 1992.
 [3] Perkins, C., "IP Mobility Support", RFC 2002, October 1996.
 [4] Postel, J., "User Data Protocol", STD 6, RFC 768, August 1990.
 [5] Rigney, C., Rubens, A., Simpson, W., and S. Willens, "Remote
 Authentication Dial In User Service (RADIUS)", RFC 2058,
 January 1997.
 [6] Reynolds, J., and J. Postel, "Assigned Numbers", STD 2,
 RFC 1700, October, 1994.
 [7] Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321, April
 1992.
 [8] Simpson, W., Editor, "The Point-to-Point Protocol (PPP)", STD
 51, RFC 1661, July 1994.
Hamzeh Informational [Page 19]

RFC 2107 ATMP February 1997
Appendix A
 Additional RADIUS Attributes for ATMP
 This appendix indicates the RADIUS attributes that have been added by
 Ascend to support ATMP for IP. Currently these are defined as non-
 vendor-specific attributes but have been included in [5].
 Attribute: "Ascend-Home-Agent-IP-Addr"
 Type: IP-Address
 Value: The IP address of the Home Agent
 Attribute: "Ascend-Home-Agent-Password"
 Type: String
 Value: Secret shared for this user with HA
 Attribute: "Ascend-Home-Network-Name"
 Type: String
 Value: Name of Connection Profile for this session
 Attribute: "Ascend-Home-Agent-UDP-Port"
 Type: Integer
 Value: The destination UDP port number for the specified HA
Appendix B
 IPX Operation
 ATMP specifies a mechanism which allows IPX clients to receive
 mobility services from a HA. Section 2 details the protocol used
 to register, deregister, and authenticate a tunnel used for IPX.
 Note that ATMP is based on IP datagrams for the management of
 tunnels and, thus, IPX tunneling with ATMP always requires an
 underlying IP network.
 Each IPX mobile client requires an IPX network number and node
 address pair. Since IPX does not support a similar facility to
 IP's "host route," an enterprise-unique network number needs to be
 chosen for each home agent. This network number MUST be distinct
 from the IPX network number assigned to any of the home agent's
 LAN interfaces. Each mobile client tunneled to the home agent MUST
 use the same IPX network number.
 For example, consider a home agent which supports two mobile
 clients. The home agent is on a LAN network with an IPX address
 of AA000001. The home agent's client network may be assigned
 AA000002. The two mobile clients may have addresses
 AA000002:0040F1000001 and AA000002:0040F1000002 respectively.
Hamzeh Informational [Page 20]

RFC 2107 ATMP February 1997
 IPX node numbers need to be unique on a given network. A mechanism
 must exist to guarantee that for each home agent's network, a
 given mobile client's node address is unique. Several techniques
 may be employed to assure unique node addresses. The current
 implementation of ATMP described in this document relies on RADIUS
 to assign a node address at the foreign agent. The following
 RADIUS attributes are included for IPX operation in addition to
 the attributes described in Appendix A for IP operation:
 Attribute: "Framed-IPX-Network" (See [5] for details).
 Attribute: "Ascend-IPX-Node-Addr"
 Type: String
 String: The node address for the mobile client in 12 octet
 ASCII representing the hexadecimal string. Both
 lower and upper case characters are permissible.
Hamzeh Informational [Page 21]

AltStyle によって変換されたページ (->オリジナル) /