Personal                                                    A. O'Neill
Internet Draft                                              Flarion Technologies
Document: draft-oneill-mip-proxyccoa-00.txt                     8 May 2002
Expires: Oct 2002


                      Proxy CCoA Tunneling for Mobile IP
                      <draft-oneill-mip-proxyccoa-00.txt>


Status of this Memo

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of RFC2026.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet- Drafts as reference
   material or to cite them other than as work in progress.

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt
   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

Copyright Notice
   Copyright (C) The Internet Society (2002). All Rights Reserved.


Abstract

In MIPv4, when a Mobile Node (MN) registers with the 'D' bit, in the
MIP Registration to a Home Agent (HA), then the MN wishes to use a
Co-located Care-of address (CCoA) with a specific Home Address (HoA).
Packets sent to the MN Home Address (HoA) will then be encapsulated in
the CCoA by the HA and forwarded directly to the MN. Alternatively, a
MN can obtain from the local Foreign Agent(FA) a shared FA CoA for
inclusion in its MIP Registration to the FA/HA. In this case, the HA
encapsulates to the FA CoA, and the Foreign Agent then decapsulates and
delivers the HoA addressed packet unencapsulated to the MN. This draft
adds to MIPv4 the ability for the MN to acquire a MN specific FA CoA
that provides the MN with a topologically correct local address and
whose tunnel encaps/decaps is provided by the FA. This address is
called a proxy CCoA (PCCoA) and the associated processing in the MN and
FA is called Proxy CCoA tunneling. This capability is applicable to any
access technology but is especially useful for wir







A.W. O'Neill                 Expires Sept 2002                    [Page 1]


INTERNET-DRAFT       Proxy CCoA Tunneling for Mobile IP           May 2002


INDEX

Abstract

1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . .  2
2. Conventions used in this document . . . . . . . . . . . . . . . . .  3
3. Terminology used in this document . . . . . . . . . . . . . . . . .  3

4. MIPv4 Proxy CCoA Tunneling. . . . . . . . . . . . . . . . . . . . .  3
   4.1. Proxy CCoA Negotiation . . . . . . . . . . . . . . . . . . . .  3
   4.2. Downlink forwarding. . . . . . . . . . . . . . . . . . . . . .  5
   4.3. Uplink forwarding and reverse tunneling  . . . . . . . . . . .  5
   4.4. PCCoAs and smooth hand-off . . . . . . . . . . . . . . . . . .  5
   4.5. PCCoA Advantages . . . . . . . . . . . . . . . . . . . . . . .  7

5. New Packet Formats
   5.1. Mobility Agent Advertisement Extension . . . . . . . . . . . .  7
   5.2. Proxy CCoA Extension . . . . . . . . . . . . . . . . . . . . .  7
   5.3. New Registration Reply Codes . . . . . . . . . . . . . . . . .  8
   5.4. Binding Update Message . . . . . . . . . . . . . . . . . . . .  8
   5.5. Binding Acknowledgement Message. . . . . . . . . . . . . . . .  9

6. MIPv6 Considerations. . . . . . . . . . . . . . . . . . . . . . . .  9
7. Security Considerations . . . . . . . . . . . . . . . . . . . . . .  9
8. Notice Regarding Intellectual Property Rights . . . . . . . . . . .  9
9. References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10


1. Introduction

   In MIPv4, when a MN registers with the 'D' bit, in the MIP Registration
to a
   Home Agent through a Foreign Agent, then the MN wishes to use a
   Co-located Care-of address (CCoA) with a specific Home Address
   (HoA). Packets sent to the MN Home Address (HoA) will then be
   encapsulated in the CCoA by the HA and forwarded direct to the MN
   via the best route from any FA advertising the subnet of that
   address. In addition, the MN can use that CCoA as a topologically
   correct source/destination address for local access on the visited
   subnet. In CCoA based reverse tunneling, the MN can encapsulate the
   HoA itself into its Co-located Care of Address (CCoA) to cause the
   packet to be reverse tunneled to the HA. The MN can in addition
   leave the HoA unencapsulated so that the FA delivers the packet
   natively and unencapsulated to the destination address. This is
   known as selective reverse tunneling and is possible whether or not
   the MN registers via the local FA.

   Alternatively, a MN can use a shared FA CoA advertised to it by the
   FA in an Agent Advertisement. In this case, the HA encapsulates to
   the FA CoA who then decapsulates and delivers the HoA addressed
   packet natively unencapsulated to the MN. When reverse tunneling,
   the MN can select during MIP registration between the default Direct
   Delivery Style and the optional Encapsulating Delivery Style. In
   Direct Delivery Style, the MN sends packets unencapsulated via the
   FA using the HoA as a source address, and the FA undertakes the
   encapsulation of those packets towards the HA using the FA CoA as
   the source address of the tunnel.



A.W. O'Neill                 Expires Sept 2002                    [Page 2]


INTERNET-DRAFT       Proxy CCoA Tunneling for Mobile IP           May 2002


   In Encapsulating Delivery Style, the MN instead encapsulates packets
 with the
   HoA as a source address towards the FA, which after decapsulating,
   inspects the visitor list and then re-encapsulates into a tunnel
   with the FA CoA as the source address. In addition, once
   Encapsulating Delivery Style has been negotiated with the FA, then
   the MN can selectively bypass reverse tunneling by sending packets
   unencapsulated from the HoA.

   The MN and the FA in existing MIP specs are therefore able to
   selectively send and receive packets, either unencapsulated, or
   encapsulated using the HoA as an inner source/destination address
   and a CoA as the outer address.  When sending unencapsulated between
   each other, the MN and the FA avoid the additional bandwidth
   incurred by a tunnel header. By using a FA CoA, the MN is however
   deprived of a local topologically correct address (so preserving
   address space) but is able to selectively avoid tunneling over the
   access link, which is beneficial in cellular and other access
   systems. By using a CCoA, the MN gets a topologically correct
   address (where addresses are available) but then incurs the overhead
   of the additional tunnel header for incoming traffic and during any
   reverse tunneling operations. The use of a MN specific MIP tunnel
   address can also be useful for QoS support.

   What is missing in MIPv4 is the ability for the MN to acquire a MN
   specific FA CoA as a CCoA, that provides the MN with a topologically
   correct local address and whose tunnel encaps/decaps is provided by
   the FA. This address is here called a proxy CCoA (PCCoA) and the
   associated processing in the MN and FA is called Proxy CCoA
   tunneling. This draft also describes reverse tunneling and smooth
   hand-off extensions based on the PCCoA.


2. Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in
   this document are to be interpreted as described in RFC-2119
   [RFC2119].


3. Terminology used in this document

   Much of the terminology used in this document borrows from Mobile
   IPv4/v6.  The following introduces additional terminology.

   PCCoA - Proxy Co-located Care of Address PCCoA tunnelling - tunnel
   processing carried out by the FA


4. MIPv4 Proxy CCoA Capability

   4.1 Proxy CCoA Negotiation

   The negotiation of a PCCoA is a local matter between the MN and the FA
 and
   there is no known reason why the HA should in any way be informed of
   the optional configuration of the PCCoA capability by the MN on the
   local FA. The HA simply detects a MIP request, via the FA, for CCoA
   tunneling. According to Mobile IPv4 [MIPv4] and Reverse tunneling
   [RevTun], the HA will expect the following tunneling to occur.


A.W. O'Neill                 Expires Sept 2002             [Page 3]


INTERNET-DRAFT       Proxy CCoA Tunneling for Mobile IP           May
2002


   The HA will encapsulate all permitted unicast, multicast and
   broadcast packets, intended for the MN HoA, in the CCoA included
   within the associated MIP Registrations. The HA then sends the
   packets to this CCoA from the source address of the HA. If reverse
   tunneling is enabled then the HA will decapsulate all permitted
   unicast, multicast and broadcast packets that are tunneled from the
   CCoA to the HA address, with the inner source address matching the
   HoA of the MN.

   From the perspective of the HA, the CCoA is located at the MN and so
 requires
   the MIP signaling to have the 'D' bit set. However, as far as the FA
   is concerned the CoA is actually a PCCoA, which as far as Internet
   routing is concerned can be considered to be a MN specific FA CoA.
   The MN allocated this address is on a link-layer directly attached
   to the FA and so the FA can also enable the MN to make use of this
   MN specific FA CoA as a source/destination address for local
   communications. Therefore, the HA sees the PCCoA as a CCoA, the FA
   sees the PCCoA as a special MN specific FA CoA and the MN treats the
   PCCoA as an ordinary interface address. A specific implementation of
   the PCCoA process would be to simply move the tunnel/detunneling
   process for a CCoA to the other end of the link (from the MN to the
   FA) but in all other ways treat the address as a CCoA. This is then
   a link specific change in much the same way that header compression
   is a link specific function.

   Proxy CCoA tunneling is therefore possible in MIP if the MN obtains
   a CCoA from the FA subnet, the MN then registers for PCCoA service
   via the FA, and that FA is able to support PCCoA processing for that
   CCoA. The HA forwarding and tunnel processing is unaffected by the
   changes in this draft. The availability of the PCCoA capability is
   advertised by the FA in a FAA, by setting the new 'P' bit, or could
   be triggered via an MIP extension, configuration, PPP, DHCP or other
   signalling. To request PCCoA service, the MN MUST register via the
   FA, whether or not this is mandated by the FAA 'R' bit, so that the
   FA can undertake correct PCCoA processing. The MN can be allocated a
   PCCoA either by a unicasted MIP FAA that includes a MN specific FA
   CoA, through a DHCP server with a FA specific prefix, or by any
   other means that can ensure the address is uniquely bound to a MN on
   that FA.

   Proxy CCoA tunneling is negotiated by the MN by including the Proxy
   CCoA extension in the MIP Registration as well as setting the 'D'
   flag used to signal the use of a CCoA. This structure is required so
   that the FA can remove the PCCoA extension whilst leaving the 'D'
   bit so that the HA will continue to treat the MN as if it had a
   CCoA. In the future, if HAs require knowledge of the PCCoA
   mechanism, and sufficient deployment has / will occur, then the
   extension mechanism could be replaced by instead assigning and
   setting a new 'P' flag bit (proxy CCoA) in the MIP Registration, as
   well as setting the 'D' bit (CCoA).


   The MIP CCoA Registration, when acknowledged by both the HA and the
   FA in the MIP Reply, causes the FA to store both the HoA and the
   PCCoA in the visitor list for that MN. Both the HoA and the PCCoA
   can be used as source / destination addresses to/from the MN. The
   HoA is used for remote access to/from the HA whilst the PCCoA can be
   used for topologically correct local access whilst the MN remains at
   that FA.





A.W. O'Neill                 Expires Sept 2002                    [Page 4]


INTERNET-DRAFT       Proxy CCoA Tunneling for Mobile IP           May 2002


   4.2 Downlink Forwarding

   Downlink packets addressed to the HoA, arrive at the FA via the HA,
   encapsulated in the PCCoA of the MN. Downlink packets (local traffic
   using the PCCoA as a source/dest address) otherwise arrive directly,
   and unencapsulated, at the FA. The FA inspects the PCCoA and
   searches for it in the visitor list. If the packet is unencapsulated
   then it is simply forwarded to the owning MN. If the packet is
   encapsulated then it is first decapsulated and the inner unicast
   destination header inspected to ensure it matches the HoA state for
   that MN. If the decapsulated packet is broadcast/multicast, and the
   MIP flags for that MN have requested broadcast traffic and/or the MN
   is a member of that multicast group, then the packet is forwarded
   unencapsulated to the MN over a point-to-point access medium but
   must be sent in its encapsulated form over a broadcast medium.


   4.3 Uplink forwarding and reverse tunneling

   Uplink unicast packets from the HoA are sent unencapsulated via the FA
and
   injected into the routing fabric unencapsulated. In the case of
   reverse tunneling, the FA encapsulates the permitted unicast,
   broadcast and multicast packets with the PCCoA of the MN as the
   tunnel source address, and HA as the tunnel destination address.
   This is so that the packets will match the registered binding in the
   HA. Broadcast/multicast packets sent over a broadcast access medium
   must be encapsulated in the HoA and sent to the shared FA CoA where
   they are decapsulated, the visitor list and group membership for
   that MN inspected, and permitted packets re-encapsulated to the HA,
   as before, within the PCCoA. Note that with proxy CCoA tunneling the
   option for selective reverse tunneling from the MN is lost. However,
   this ability can be re-instated if the MN provides the FA with a
   classifier that specifically defines which of the MNs uplink traffic
   SHOULD NOT be reverse tunneled. This is achieved by first selecting
   Reverse tunneling for a specific HoA by setting the 'T' bit as
   normal in the MIP Registration, and then including a set of excluded
   classifiers in the form of quintuples describing the uplink unicast
   header.


   4.4 PCCoAs and smooth Hand-offs

   Smooth hand-offs [RoutOp] enable a MN that was previously registered
 at the
   old Foreign Agent (oFA) with an oFA CoA, to request the forwarding
   of packets, sent to the MN HoA and decapsulated from the oFA HoA, to
   the MNs new CoA. This means however, that smooth hand-offs are not
   supported for a MN with a CCoA that is either registered or
   unregistered at the oFA. This is because a FA is not allowed to
   decapsulate from the oCCoA and forward to the new CoA at the new
   point of attachment. Smooth forwarding could be supported by instead
   having the oFA additionally encapsulate the oCCoA to the nCoA but
   this clearly adds overhead and requires the nFA to have knowledge of
   the oCCoA to correctly forward in the case of the MN acquiring a nFA
   CoA.







A.W. O'Neill                 Expires Sept 2002                    [Page 5]


INTERNET-DRAFT       Proxy CCoA Tunneling for Mobile IP           May 2002


   The PCCoA capability in contrast brings the required functionality to
the FA
   to support the smooth forwarding of CCoAs, if the MN registered via
   the oFA, irrespective of whether or not the MN is using a CCoA or a
   PCCoA. In the case of a normal CCoA, the FA can still transiently
   support the PCCoA capability and automatically transition the CCoA
   to a PCCoA when the BU is received from the nFA or directly from the
   MN. This is only possible if the CCoA is uniquely advertised by that
   FA. The incoming BU that includes the nCoA will then create a
   binding between the HoA (and indirectly the oCCoA) and the nCCoA,
   such that the oFA can decapsulate everything from the oCCoA and re-
   encapsulate into the nCoA before forwarding. Broadcast / multicast
   traffic is handled by checking the MIP flags and the HoA group
   membership and re- encapsulating all permitted packets. The oFA will
   also encapsulate into the nCoA all packets that are received
   unencapsulated with a destination address equal to the oCCoA (local
   traffic using the oCCoA as a network address) during the shorter of
   the lifetime of the smooth hand-off or the delay until the oCCoA is
   re-allocated. The request to trigger transient PCCoA support is
   implicit at the oFA on the reception of a BU. In the case of a MN
   that was using a PCCoA at the oFA, the meaning of the BU is again
   implicit and the oFA simply proceeds as for the oCCoA after the
   PCCoA transition.


   If the BU is from the MN then it is for a CCoA at a MN that is not
   registering via the nFA. This however does not affect this hand-off
   but will affect subsequent hand-offs because the PCCoA transient
   forwarding is only possible if a MN registers via a FA. If the BU is
   originated by the nFA then the nCoA in the BU is either a nFA CoA or
   a nPCCoA, which affects the processing at the oFA. This is because
   the sending of a nFA CoA implies that the nFA does not support
   PCCoAs and therefore the oFA (which does support PCCoAs) should
   undertake all processing required to convert the oCCoA or the oPCCoA
   received traffic into a format that will be correctly received and
   forwarded by the nFA. This means that any broadcast/multicast
   traffic must be first encapsulated into the HoA of the MN before
   encapsulating into the nFA CoA. It also means that the BU must
   specifically indicate whether it is for a FA CoA or a CCoA/PCCoA by
   setting the new 'D' bit. The 'D' bit is set in the BU if the MIP
   Registration via the nFA had either the 'D' or the 'P' bit set, or
   is set by the MN that is using a CCoA. The difference at the nFA
   between a CCoA and a PCCoA is kept within the nFA, and between the
   nFA and the MN that requested a PCCoA by including the PCCoA
   extension in its registration.

   The BU is otherwise unchanged. In addition, the mandatory BUack and
   its status codes do not need to be extended because the failure of
   the BU for technical reasons at the oFA, for a CCoA, directly
   implies a PCCoA processing failure.

   When considering reverse smooth tunneling, as described in
 <draft-oneill-mip-
   revtun-ho-00.txt>, the mechanisms are unchanged for PCCoAs other
   than that the reverse smooth tunneling is now between MN specific
   and shared FA CoAs, rather than just between shared FA CoAs. The
   smooth BU will contain both 'T' and 'D' bits set and the reverse
   tunneling will be from the nCCoA to the oFA CoA and then from the
   oCCoA/PCCoA to the GFA/HA. Broadcast/multicast must be reverse
   tunneled according to the required processing at the receiver for
   the CoA type.

   Clearly however, the PCCoA capability is only available when the FA
   is both able (eg IPSEC) and trusted to perform the tunnel management
   for the MN.


A.W. O'Neill                 Expires Sept 2002         [Page 6]


INTERNET-DRAFT       Proxy CCoA Tunneling for Mobile IP           May
2002


4.5 PCCoA Advantages

   These procedures avoid the CCoA encapsulation for remote access traffic
over
   the access link. In addition, the FA is now in a position to police
   traffic addressed to a specific HoA from a specific gateway, via the
   PCCoA, before it is sent to the MN, and can also effectively support
   smooth hand-offs for all CCoAs. In the case of broadcast/multicast
   the FA is now in a position to avoid the additional encapsulation
   over the air in both directions when the access medium supports
   point to point link layer connectivity to/from the MN.  Finally, the
   MN specific (PCCoA) MIP encapsulation simplifies address-based QoS
   support in the network between the HA and the MN.


5. New Packet Formats

   5.1. Mobility Agent Advertisement Extension

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     Type      |    Length     |        Sequence Number        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           Lifetime            |R|B|H|F|M|G|r|T|S|I|P| reserved|
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                  zero or more Care-of Addresses               |
   |                              ...                              |

   The only change to the Mobility Agent Advertisement Extension [1] is
   the additional 'P' bit:

      P        Agent offers proxy CCoA tunneling.

   A foreign agent that sets the 'P' bit MUST support the proxy CCoA
   tunneling for any CCoAs that are uniquely advertised into the
   routing system by that FA. Using this information, a mobile node is
   able to choose a foreign agent that supports proxy CCoA tunneling.
   Notice that if a mobile node does not understand this bit, it simply
   ignores it as per [MIPv4] and reverts to normal CCoA behaviour. The
   ordering of addresses in FAAs is according to the relevant MIP specs
   and is not altered by this draft.


   5.2. Proxy CCoA Extension

   The Proxy CCoA Extension MAY ONLY be included if the 'D' bit is set
   and the MN is registering via the FA . If this extension is absent,
   and the 'D' bit is set, then normal CCoA behaviour from Mobile IP
   [MIPv4] and RevTun[2] is undertaken. The Encapsulating Delivery
   Style extension and the Proxy CCoA extension MUST NOT be in the same
   registration. Mobile Nodes and Foreign agents SHOULD support the
   Proxy CCoA Extension.

    0                   1
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     Type      |     Length    |       Type: TBA, Length 0.
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

A.W. O'Neill                 Expires Sept 2002                    [Page 7]


INTERNET-DRAFT       Proxy CCoA Tunneling for Mobile IP           May 2002


   5.3. New Registration Reply Codes

   Foreign agent registration replies MUST convey if the
   PCCoA request failed.  These new reply codes are defined:

      Service denied by the foreign agent:

      X1 PCCoA capability is mandatory
      X2 PCCoA capability is administratively barred
      X3 submitted PCCoA is not routable at the FA
      X4 submitted PCCoA unavailable

   In response to a Registration Request with the 'D' bit set, and
 accompanied
   by the PCCoA extension, mobile nodes may receive (and MUST accept)
   code 70 (poorly formed request) from foreign agents. However,
   foreign agents that support PCCoA capability MUST use the
   appropriate new code.

   If the MN registers via the FA with the 'D' bit set, and does not
   include the PCCoA extension, then code X1 should be returned to the
   MN to cause the MN to include the extension in any new request. If
   the MN does include the PCCoA extension and it is either
   administratively barred from using this capability (through either
   foreign or home AAA policy state), then code X2 should be returned
   to cause the MN to modify the Registration. Code X3 should be used
   if the MN attempts to use as a CCoA an address that is not routable
   at the FA, and code X4 should be used if the included address is
   already being used by another MN. In either case, the MN should
   attempt to get a new PCCoA for the local FA, either from the FA or
   via some other method.


   5.4. Binding Update Message

   The binding Update message is modified as described below. A new BU
 flag, the
   'D' flag, is added to indicate a request for smooth forwarding of
   the oCoA to the nCCoA/nPCCoA. The BU 'D' flag is only set if the MIP
   Registration to the nFA, that generated the BU also has the 'D' bit
   set.


    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     Type      |A|I|M|G|D| Rsv |            Lifetime           |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                    Mobile Node Home Address                   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                        Care-of Address                        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                                                               |
   +                         Identification                        +
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | Extensions ...
   +-+-+-+-+-+-+-+-





A.W. O'Neill                 Expires Sept 2002                    [Page 8]


INTERNET-DRAFT       Proxy CCoA Tunneling for Mobile IP           May 2002


   It is mandatory that a BU with the 'D' bit set must also have the 'A'
   bit set so that the BU sender has confirmation that the forwarding
   will occur. The absence of this flag indicates that the CoA in the
   BU is a nFA CoA. If the oCoA is either a CCoA or a PCCoA, then the
   absence of this flag causes the oFA to try to convert any arriving
   flows so that they are compatible with the destination nFA CoA. This
   specifically means that any permitted broadcast/multicast traffic,
   and any packets with the oCCoA/PCCoA as an unencapsulated
   destination address (local traffic), must first be encapsulated into
   the HoA before being additionally encapsulated into the nFA CoA in
   the BU.


   5.5. Binding Acknowledge Message

   The format of the Binding Acknowledge message is unchanged, apart from
   extending the allowed values of the status field to cover the same
   cases as identified for the MIP Reg. The processing is such that if
   a BU is sent with the 'D' bit set that does not also have the 'A'
   bit set, then the oFA should still accept the request, if in all
   other ways correct, and return an acknowledgement.

   Up-to-date values of the Code field are specified in the most recent
   "Assigned Numbers" [13].


6. IPv6 Considerations

   IPv6 has the use of a CCoA by the MN as the normal method of tunneling
due to
   the better address availability and allocation mechanisms compared
   to IPv4.  IPv6 does not have the notion of a Foreign Agent though,
   but an access router or a Local Mobility Agent could instead be
   modified to undertake the PCCoA functionality defined in this draft,
   with the obvious required changes. In the case of hand-off, the
   option of receiving a BU containing a nFA CoA is not possible and so
   the 'D' bit is not required to distinguish between the two CoA types
   (nFA CoA or a CCoA/PCCoA).



7. Security Considerations

   No new security issues are raised by this draft than are already
 considered
   in the design of Mobile IPv4 [MIPv4], MIPv4 reverse tunneling
   [RevTun], MIP Route Optimization [RoutOpt] and Mobile IPv6 [MIPv6].


8. Notice Regarding Intellectual Property Rights

   Flarion's submissions will conform with RFC 2026.  Flarion may seek
   patent protection on some or all of the technical information
   submitted by its employees in connection with the IETF's standards
   process.  If part(s) of a submission by Flarion is (are) included in
   a standard and Flarion owns patent(s) and/or pending patent
   application(s) that are essential to implementation of such included
   part(s) in said standard, Flarion is prepared to grant a license on
   fair, reasonable, reciprocal (license back) and non- discriminatory
   terms on such included part(s).


A.W. O'Neill                 Expires Sept 2002                    [Page 9]


INTERNET-DRAFT       Proxy CCoA Tunneling for Mobile IP           May 2002


9. References

   [RFC2026] Bradner, S., "The Internet Standards Process -- Revision 3",
 BCP 9,
   RFC 2026, October 1996.

   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
   Requirement Levels", BCP 14, RFC 2119, March 1997

   [MIPv4] C.E. Perkins, Ed., `` IP Mobility Support for IPv4,"
   RFC3220, January 2002

   [RevTun] G. Montenegro, Ed., "Reverse Tunneling for Mobile IP,
   revised," Internet RFC 3024, January 2001.

   [RoutOp] C. Perkins, D. Johnson, "Route Optimization in Mobile IP",
   Internet- Draft, draft-ietf-mobileip-optim-11.txt (work in
   progress), 6 September 2001.

   [MIPv6] D. Johnson, C. Perkins, ``Mobility Support in IPv6",
   Internet-Draft, draft-ietf-mobileip-ipv6-16.txt (work in progress),
   22 March 2002.

   [NestMIP] A.W. O'Neill, ``Nested MIP for mobility management,"
   Internet- draft, draft-ietf-oneill-mip-nested-00.txt, May 2002.

   [ConcatMIP] A.W. O'Neill, ``Concatenated MIP for mobility
   management," Internet-draft, draft-ietf-oneill-mip-nested-00.txt,
   May 2002.




Author's Addresses

Alan O'Neill
Flarion Technologies
Phone: +1 908 947 7033
Email: oneill@flarion.com






















A.W. O'Neill                 Expires Sept 2002                    [Page 10]