IP Transform Policy Distribution using Mobile IP/DIAMETER
draft-mccann-transform-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Tom Hiller , Pete McCann | ||
Last updated | 1999-06-25 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
The deployment of Mobile IP in a wide area network presents several challenges, not the least of which is how to provide subscribers with secure access to remote private networks. This draft outlines mechanisms whereby the home and visited network may negotiate the use of IP transforms, such as IP Security ESP and AH protocols, on the Mobile IP redirection tunnels. These mechanisms allow for the secure distribution of both keys and policies through a DIAMETER AAA infrastructure, obviating the need for other forms of key distribution or policy negotiation. The mechanisms are extensible to other kinds of IP transforms, such as IP Compression.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)