< draft-yegani-gre-key-extension-02.txt   draft-yegani-gre-key-extension-03.txt >
Network Working Group P. Yegani Network Working Group P. Yegani
Internet-Draft G. Dommety Internet-Draft G. Dommety
Intended status: Standards Track Cisco Systems Intended status: Standards Track Cisco Systems
Expires: September 3, 2007 A. Lior Expires: December 3, 2007 A. Lior
Bridgewater Systems Bridgewater Systems
K. Chowdhury K. Chowdhury
J. Navali J. Navali
Starent Networks Starent Networks
March 2, 2007 June 2007
GRE Key Extension for Mobile IPv4 GRE Key Extension for Mobile IPv4
draft-yegani-gre-key-extension-02 draft-yegani-gre-key-extension-03
Status of this Memo Status of this Memo
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
skipping to change at page 1, line 39 skipping to change at page 1, line 39
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on September 3, 2007. This Internet-Draft will expire on December 3, 2007.
Copyright Notice Copyright Notice
Copyright (C) The IETF Trust (2007). Copyright (C) The IETF Trust (2007).
Abstract Abstract
The GRE specification contains a Key field, which MAY contain a value The GRE specification contains a Key field, which MAY contain a value
that is used to identify a particular GRE data stream. This that is used to identify a particular GRE data stream. This
specification defines a new Mobile IP extension that is used to specification defines a new Mobile IP extension that is used to
skipping to change at page 4, line 22 skipping to change at page 4, line 22
session. session.
If the FA does not support GRE encapsulation, the FA MUST reset the If the FA does not support GRE encapsulation, the FA MUST reset the
'G' bit in the Agent Advertisement message. In this case, if the MN 'G' bit in the Agent Advertisement message. In this case, if the MN
sets the 'G' bit in the Registration Request message, the FA returns sets the 'G' bit in the Registration Request message, the FA returns
a Registration Reply message to the MN with code 'Requested a Registration Reply message to the MN with code 'Requested
Encapsulation Unavailable' (0x48) per [RFC3344]. Encapsulation Unavailable' (0x48) per [RFC3344].
If the FA allows GRE encapsulation, and either the MN requested GRE If the FA allows GRE encapsulation, and either the MN requested GRE
encapsulation or local policy dictates using GRE encapsulation for encapsulation or local policy dictates using GRE encapsulation for
the session, the FA MUST include the GRE Key in the GRE-KEY Extension the session, the FA MUST include the GRE Key in the GRE Key Extension
in all Mobile IP Registration Requests (including initial, renewal in all Mobile IP Registration Requests (including initial, renewal
and de-registration requests) before forwarding the request to the and de-registration requests) before forwarding the request to the
HA. The GRE key assignment in the FA and the HA is outside the scope HA. The FA may include a GRE key of value zero in the GRE Key
of this memo. Extension to signal that the HA assign GRE keys in both directions.
The GRE key assignment in the FA and the HA is outside the scope of
this memo.
The GRE Key Extension SHALL follow the format defined in [RFC3344]. The GRE Key Extension SHALL follow the format defined in [RFC3344].
This extension SHALL be added after the MN-HA and MN-FA Challenge and This extension SHALL be added after the MN-HA and MN-FA Challenge and
MN-AAA extensions (if any) and before the FA-HA Auth extension (if MN-AAA extensions (if any) and before the FA-HA Auth extension (if
any). any).
4.2. Home Agent Requirements for GRE Tunneling Support 4.2. Home Agent Requirements for GRE Tunneling Support
The HA MUST follow the procedures specified in RFC 3344 in processing The HA MUST follow the procedures specified in RFC 3344 in processing
this extension in Registration Request messages. If the HA receives this extension in Registration Request messages. If the HA receives
skipping to change at page 5, line 8 skipping to change at page 5, line 10
without the GRE Key Extension, it SHALL send an RRP with code 'Poorly without the GRE Key Extension, it SHALL send an RRP with code 'Poorly
Formed Request (0xY2)'. Formed Request (0xY2)'.
If the HA receives a Registration Request with a GRE Key Extension If the HA receives a Registration Request with a GRE Key Extension
but without the 'G' bit set, the HA SHOULD treat this as if 'G' bit but without the 'G' bit set, the HA SHOULD treat this as if 'G' bit
is set in the Registration Request i.e., the presence of GRE Key is set in the Registration Request i.e., the presence of GRE Key
Extension indicates a request for GRE encapsulation. Extension indicates a request for GRE encapsulation.
If the HA receives the GRE Key Extension in a Registration Request If the HA receives the GRE Key Extension in a Registration Request
and recognizes the GRE Key Extension as well as supports GRE and recognizes the GRE Key Extension as well as supports GRE
encapsulation, it SHOULD accept the RRQ and send a RRP with code encapsulation, the following procedures should apply:
'Accepted (0)'. The HA MUST assign a GRE key and include the GRE Key
Extension in the RRP before sending it to the FA. The HA MUST The HA SHOULD accept the RRQ and send a RRP with code 'Accepted (0)'.
include the GRE Key Extension in all RRPs in response to any RRQ that The HA MUST assign a GRE key and include the GRE Key Extension in the
included GRE Key Extension, when a GRE key is available for the RRP before sending it to the FA. The HA MUST include the GRE Key
registration. Extension in all RRPs in response to any RRQ that included GRE Key
Extension, when a GRE key is available for the registration.
If the HA receives the GRE Key Extension in the initial Registration
Request and recognizes the GRE Key Extension carrying a GRE key value
of zero, it SHOULD accept the RRQ and send a RRP with code 'Accepted
(0)'. The HA MUST assign GRE keys for both directions and include
these keys in the GRE Key Extension in the RRP before sending it to
the FA. The HA MUST include the GRE Key Extension in the RRP in
response to the initial RRQ that included GRE Key Extension, when a
GRE key is available for the registration.
4.3. Mobile Node Requirements for GRE Tunneling Support 4.3. Mobile Node Requirements for GRE Tunneling Support
If the MN is capable of supporting GRE encapsulation, it SHOULD set If the MN is capable of supporting GRE encapsulation, it SHOULD set
the 'G' bit in the Flags field in the Registration Request per the 'G' bit in the Flags field in the Registration Request per
[RFC3344]. [RFC3344].
5. GRE Key Extension and Tunneling Procedures 5. GRE Key Extension and Tunneling Procedures
GRE tunneling support for Mobile IP will permit asymmetric GRE keying GRE tunneling support for Mobile IP will permit asymmetric GRE keying
 End of changes. 7 change blocks. 
13 lines changed or deleted 25 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/