Skip to main content

Interactions between Proxy Mobile IPv6 (PMIPv6) and Mobile IPv6 (MIPv6): Scenarios and Related Issues
RFC 6612

Revision differences

Document history

Date Rev. By Action
2015-10-14
07 (System) Notify list changed from netlmm-chairs@ietf.org, draft-ietf-netlmm-mip-interactions@ietf.org to (None)
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Stewart Bryant
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Ralph Droms
2012-05-15
07 (System) RFC published
2010-12-08
07 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent.
2010-12-07
07 (System) IANA Action state changed to No IC from In Progress
2010-12-07
07 (System) IANA Action state changed to In Progress
2010-12-07
07 Amy Vezza IESG state changed to Approved-announcement sent
2010-12-07
07 Amy Vezza IESG has approved the document
2010-12-07
07 Amy Vezza Closed "Approve" ballot
2010-12-07
07 Amy Vezza Approval announcement text regenerated
2010-12-07
07 Amy Vezza Ballot writeup text changed
2010-12-07
07 Jari Arkko State Changes to Approved-announcement to be sent from Approved-announcement to be sent::Point Raised - writeup needed by Jari Arkko
2010-12-07
07 Jari Arkko Checked and updated RFC Editor notes. There's also a bug in the tools system; it only shows -06 when the IETF servers give -07.
2010-10-28
07 (System) New version available: draft-ietf-netlmm-mip-interactions-07.txt
2010-10-28
07 Cindy Morgan State changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation::External Party by Cindy Morgan
2010-10-28
07 Stewart Bryant
[Ballot comment]
I found the document very difficult to read for the reasons cited in point 1 of the GENART review.

This issue needs to …
[Ballot comment]
I found the document very difficult to read for the reasons cited in point 1 of the GENART review.

This issue needs to be addressed before publication.
2010-10-28
07 Stewart Bryant [Ballot discuss]
2010-10-28
07 Stewart Bryant [Ballot Position Update] Position for Stewart Bryant has been changed to No Objection from Discuss by Stewart Bryant
2010-10-28
07 Tim Polk
[Ballot comment]
There is one typo in the RFC Editor Note.  The change introduced by the following text is in section 3.2, not section 2. …
[Ballot comment]
There is one typo in the RFC Editor Note.  The change introduced by the following text is in section 3.2, not section 2.

Still in section 2, in the last bullet of list item 5:

I suspect the RFC Editor would work it out from the context, but suggest making the fix just to be sure.
2010-10-28
07 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss by Tim Polk
2010-10-28
07 Dan Romascanu
[Ballot comment]
The OPS-DIR review by Jouni Korhonen raised a number of non-blocking issues, most of them of editorial nature, which should be considered if …
[Ballot comment]
The OPS-DIR review by Jouni Korhonen raised a number of non-blocking issues, most of them of editorial nature, which should be considered if a new revision of the  document is spun out:

The document mentions that there are system specific issues that need to be taken into account; see Sections 4.2.1 and 4.3. Those are merely bypassed stating being "out of scope". While this is true, from operational and management perspective it would be nice to see even references here for further reading if any of those "out of scope" things have been solved or discussed somewhere. For example Section 4.2.1 depends on LMA discovery to work properly within the same administrative domain. There are solutions for this documented in IETF in PMIPv6 context. Another related nit to point out is that the document could actually mention that the separate HA/LMA functions actually would benefit from a shared subscriber database (e.g. AAA
server) to work properly. The text seems to hint that anyway.


Few editorial comments:

o Section 2 should also say that it uses acronyms from RFC5213 and RFC3775.

o Section 3 add a reference to HMIPv6-MIPv6.

o Sequence number based ordering is possible (optional) for PMIPv6 in
RFC5213 unlike stated in Section 3.2, step 1) first bullet. Not that it would help to solve the issue described here, but using sequence numbers in
PMIPv6 is possible in general as an option.

o Section 3.2 step 4) last bullet I do not understand why it mentions "both host-based and network-based security associations are used to update the same binding cache entry at the HA/LMA" as earlier the scenario has been scoped so that HA & LMA binding caches are separate.

o Section 3.2 -> s/(or binging cache)./(or binding cache).
              -> s/RFC4832, section 2.2/RFC4832, Section 2.2
              -> add a reference to IKEv2 [RFC5996]

o Section 3.3 says the ".. advertising the home link prefix to the MN in a unicast Router Advertisement message." While it makes sense and is typical behavior when a MAG receives a Router Solicitation, it is not necessarily the case always. The MAG can send multicast Router Advertisements when it so decides or send it before receiving a Router Solicitation.

o Section 4.2.1 -> s/MN-HoA.For/MN-HoA. For

o Section 4.2.2 -> s/MAG. the/MAG. The

o Section 4.2.2 could reference to draft-ietf-netlmm-lma-discovery when it discusses about LMA discovery and it not being defined in RFC5213.

o Section 5 reference [pmipv6-draft] should be [RFC5213].

o The document uses both (P)MIPv6 and (Proxy) Mobile IPv6 interchangeably.
It should stick with one style.

o The document uses both BCE and binding cache entry interchangeably. It should stick with one style.

o The document uses both HA and Home Agent interchangeably. It should stick with one style.

o The document uses both HA/LMA and LMA/HA interchangeably. It should stick with one style.

o Most of the acronyms are not expanded on the first use.
2010-10-28
07 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2010-10-27
07 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks
2010-10-26
07 Peter Saint-Andre [Ballot Position Update] New position, No Objection, has been recorded by Peter Saint-Andre
2010-10-21
07 Amy Vezza Telechat date was changed to 2010-10-28 from 2010-10-21 by Amy Vezza
2010-10-21
07 Stewart Bryant
[Ballot discuss]
I found the document very difficult to read for the reasons cited in point 1 of the GENART review.

This issue needs to …
[Ballot discuss]
I found the document very difficult to read for the reasons cited in point 1 of the GENART review.

This issue needs to be addressed before publication.
2010-10-21
07 Stewart Bryant [Ballot Position Update] New position, Discuss, has been recorded by Stewart Bryant
2010-10-21
07 Jari Arkko Placed on agenda for telechat - 2010-10-21 by Jari Arkko
2010-10-18
07 Ralph Droms [Ballot Position Update] Position for Ralph Droms has been changed to No Objection from Discuss by Ralph Droms
2010-09-07
07 Jari Arkko Waiting on Ralph and Tim to clear. Reminders sent.
2010-05-22
07 Samuel Weiler Request for Telechat review by SECDIR Completed. Reviewer: Donald Eastlake.
2010-05-21
07 Jari Arkko State Changes to IESG Evaluation::External Party from IESG Evaluation::AD Followup by Jari Arkko
2010-05-21
07 Jari Arkko Waiting for Tim and authors to comment on my text proposal.
2010-05-20
07 Cindy Morgan State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Cindy Morgan
2010-05-20
07 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded by Adrian Farrel
2010-05-20
07 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2010-05-20
07 Sean Turner
[Ballot comment]
I support Tim's DISCUSS positions.

Some nits:

Section 3, second sentence:
OLD
                      …
[Ballot comment]
I support Tim's DISCUSS positions.

Some nits:

Section 3, second sentence:
OLD
                                              This document does not
                                                            ^^^^
  only focus on scenarios where the two protocols are used by the same
  mobile node to manage local and global mobility, but it investigates
                                                        ^^
  also more complex scenarios where the protocols are more tightly
  ^^^^
NEW
                                                This document not
  only focuses on scenarios where the two protocols are used by the same
  mobile node to manage local and global mobility, but also investigates
  more complex scenarios where the protocols are more tightly


Section 3, page 9, line 4:
OLD
  depicted in the figure.  However, the LMA and HA can be also
                                                        ^^^^^^^
NEW
  depicted in the figure.  However, the LMA and HA can also be
2010-05-20
07 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded by Gonzalo Camarillo
2010-05-20
07 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2010-05-19
07 Ralph Droms
[Ballot comment]
Nit, in section 3.1: s/regardless/regardless of/

Nit, in section 3.2, list item 3: s/access when/access where/
Also, can you reword "delay in the …
[Ballot comment]
Nit, in section 3.1: s/regardless/regardless of/

Nit, in section 3.2, list item 3: s/access when/access where/
Also, can you reword "delay in the mobility signaling sent
          may imply adverse situations"; maybe "delay in the receipt
          mobility signaling may result in undesirable situations"?
Still in section 2, in the last bullet of list item 4, I don't understand
          "the threat described in [RFC4832] is worse"; worse than what?
2010-05-19
07 Ralph Droms
[Ballot discuss]
I have some clarifications I'd like to see in the Security Considerations section.

I don't know exactly what this text means:
  Scenarios …
[Ballot discuss]
I have some clarifications I'd like to see in the Security Considerations section.

I don't know exactly what this text means:
  Scenarios A.1 and B described in Section 3 do not introduce any
  security considerations in addition to those described in [pmipv6-
  draft] or [RFC3775].
Does it mean do not identify any security issues?

Des scenario A2 identify any security issues?

Do the solutions in section 4 introduce any security considerations?
2010-05-19
07 Ralph Droms [Ballot Position Update] New position, Discuss, has been recorded by Ralph Droms
2010-05-19
07 Sean Turner [Ballot comment]
I support Tim's DISCUSS positions.
2010-05-19
07 Sean Turner [Ballot Position Update] New position, No Objection, has been recorded by Sean Turner
2010-05-19
07 Ralph Droms
[Ballot comment]
Nit, in section 3.1: s/regardless/regardless of/

Nit, in section 3.2, list item 3: s/access when/access where/
Also, can you reword "delay in the …
[Ballot comment]
Nit, in section 3.1: s/regardless/regardless of/

Nit, in section 3.2, list item 3: s/access when/access where/
Also, can you reword "delay in the mobility signaling sent
          may imply adverse situations"; maybe "delay in the receipt
          mobility signaling may result in undesirable situations"?
Still in section 2, in the last bullet of list item 4, I don't understand
          "the threat described in [RFC4832] is worse"; worse than what?
2010-05-19
07 Tim Polk
[Ballot comment]
(1) Section 3.2, list item 4 bullet 3

s/binging/binding/

(2) The final sentence in Section 5 (Security Considerations) is considerably weaker  than the …
[Ballot comment]
(1) Section 3.2, list item 4 bullet 3

s/binging/binding/

(2) The final sentence in Section 5 (Security Considerations) is considerably weaker  than the
text in Section 3.2, list item 4 bullet 4.

From section 3.2:
                              Based on this
          consideration, the threat described in [RFC4832] is worse as
          it affects also hosts that are using the LMA/HA as MIPv6 HA
          and are not using PMIPv6.
From section 5:
    Note that the compromised MAG threat described in [RFC4832]
  applies also here.

I suggest that the text in the security considerations be strengthened...
2010-05-19
07 Tim Polk
[Ballot discuss]
(1) The security considerations seem incomplete:

(A) there was considerably more detail in the security considerations for one of the five
IDs combined …
[Ballot discuss]
(1) The security considerations seem incomplete:

(A) there was considerably more detail in the security considerations for one of the five
IDs combined into this draft.  See:

  http://tools.ietf.org/html/draft-giaretta-netlmm-mip-interactions-00#page-21

These issues seem to be relevant.  Perhaps this text should be incorporated?

(B) The text states that there were no new security considerations for Scenarios A.1 or B.
Does the subsequent text pertain to A.2?  It would be good to clarify this.

(2) The security considerations refer to [pmipv6-draft] but this does not appear in the
references section.  It looks like that should be RFC 5213.
2010-05-19
07 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2010-05-19
07 Russ Housley
[Ballot comment]
Please consider the comments from the Gen-ART Review by Enrico
  Marocco on 12 May 2010.  The review can be found at:

  …
[Ballot comment]
Please consider the comments from the Gen-ART Review by Enrico
  Marocco on 12 May 2010.  The review can be found at:

    http://www.softarmor.com/rai/temp-gen-art/
    draft-ietf-netlmm-mip-interactions-06-marocco.txt
2010-05-19
07 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2010-05-19
07 Tim Polk
[Ballot comment]
(1) Section 3.2, list item 4 bullet 3

s/binging/binding/

(2) The final sentence in Section 5 (Security Considerations) is considerably weaker  than the …
[Ballot comment]
(1) Section 3.2, list item 4 bullet 3

s/binging/binding/

(2) The final sentence in Section 5 (Security Considerations) is considerably weaker  than the
text in Section 3.2, list item 4 bullet 4.

From section 3.2:
                              Based on this
          consideration, the threat described in [RFC4832] is worse as
          it affects also hosts that are using the LMA/HA as MIPv6 HA
          and are not using PMIPv6.
From section 5:
    Note that the compromised MAG threat described in [RFC4832]
  applies also here.

I suggest that the text in the security considerations be strengthened...
2010-05-18
07 Jari Arkko State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Jari Arkko
2010-05-18
07 Jari Arkko The draft will be sent forward to IESG telechat, even though there are
outstanding Gen-ART review comments and Last Call comments from Charles
Perkins.
2010-05-17
07 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2010-05-16
07 Jari Arkko [Ballot Position Update] New position, Yes, has been recorded for Jari Arkko
2010-05-16
07 Jari Arkko Ballot has been issued by Jari Arkko
2010-05-16
07 Jari Arkko Created "Approve" ballot
2010-05-13
07 Amanda Baber IANA comments:

We understand this document to have NO IANA actions.
2010-05-03
07 Samuel Weiler Request for Telechat review by SECDIR is assigned to Donald Eastlake
2010-05-03
07 Samuel Weiler Request for Telechat review by SECDIR is assigned to Donald Eastlake
2010-05-03
06 (System) New version available: draft-ietf-netlmm-mip-interactions-06.txt
2010-05-03
07 Amy Vezza Last call sent
2010-05-03
07 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2010-05-01
07 Jari Arkko Expecting one more change from the authors, but have sent the document forward to IETF Last Call anyway.
2010-05-01
07 Jari Arkko Placed on agenda for telechat - 2010-05-20 by Jari Arkko
2010-05-01
07 Jari Arkko State Changes to Last Call Requested from AD Evaluation::AD Followup by Jari Arkko
2010-05-01
07 Jari Arkko Last Call was requested by Jari Arkko
2010-05-01
07 (System) Ballot writeup text was added
2010-05-01
07 (System) Last call text was added
2010-05-01
07 (System) Ballot approval text was added
2010-04-30
07 (System) Sub state has been changed to AD Follow up from New Id Needed
2010-04-30
05 (System) New version available: draft-ietf-netlmm-mip-interactions-05.txt
2010-04-19
07 Jari Arkko Still waiting for the authors to update the draft. Reminder sent.
2009-12-09
07 Jari Arkko State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Jari Arkko
2009-12-09
07 Jari Arkko
I have finally made my AD review of this document. Apologies for the delay. Overall, the document was easy to read and I had no …
I have finally made my AD review of this document. Apologies for the delay. Overall, the document was easy to read and I had no major problems. I do want you to revise the document for the following issues, however:

The document should state that the list of scenarios is not exhaustive. (Or convince the reader that the given scenarios are the only possible ones.)

Section 3.2 should talk about how you can identify nodes that get PMIP service and those that don't. This does not seem like a trivial exercise. You can make a policy lookup, but then you rely on the operator knowing what software your device has. I realize that you rule this out of scope later, and I do not ask you to explain the specific mechanisms. I am asking you to outline the implications of having a mechanism.

I would also like the authors to respond to Christian Vogt's review (posted October 1st). I did not see a response, but maybe I missed it.

What about Basavaraj Patil's question in the mailing list on October 21st? Is there a need to add something to the document about his scenario?

>    The solution for this scenario may depend on the access network being
>    able to determine that a particular mobile node wants to use Mobile
>    IPv6. 
Only a "may depend"? How would it otherwise work? I would suggest /s/may depend/depend/

> As described in
> [RFC4877], the identifier of the MN is known by the Home Agent
> after the IKEv2 exchange, but this is not used in the MIPv6
> signaling, nor as a lookup key for the binding cache.

Maybe you should bring that if authentication is performed at the MIP layer (authentication option) then this information is available. In other words, authentication mechanisms differ with respect to the ease that the identifier will be available.

> Since all these steps must be performed by the mobile node before
> sending the Binding Update, they have an impact on the handover
> latency experienced by the MN.  For this reason it is recommended
> that the mobile node establishes the IPsec security association (and
> consequently is provided by the HA/LMA with a MIPv6-HoA) when it is
> still attached to the PMIPv6 domain.

But the steps are configuration tasks, and there is no need to perform them on a per-movement basis. A far better recommendation would be to move the steps to mobile node initialization time or to a periodic process.

> The MAG needs to discover the
> HA/LMA; however the current version of [RFC5213] assumes that the LMA
> is assigned to the MAG or discovered by the MAG when the mobile node
> attaches to the MAG. the exact mechanism is not specified in
> [RFC5213].

I think it would be fair to state somewhere that in configurations where there is just one of these nodes, the discovery is not an issue.

> This document requires that the a home agent that also implements the
> PMIPv6 LMA functionality should allow both the mobile node and the
> authorized MAGs to modify the binding cache entries for the mobile
> node.  Note that the compromised MAG threat described in [RFC4832]
> applies also here.

I would like to see a discussion of what the security policy database entries need to look like in this situation. For instance, is it possible to have such a configuration?

> The scenarios where Proxy Mobile IPv6 (PMIPv6) and Mobile IPv6
> (MIPv6) protocols are both deployed in a network require some
> analysis and considerations.  This document describes all identified
> possible scenarios, which require an interaction between PMIPv6 and
> MIPv6 and discusses all issues related to these scenarios.  Solutions
> and recommendations to enable these scenarios are also described.

Clumsy language. Maybe "The use of Proxy Mobile IPv6 (PMIPv6) and Mobile IPv6 (MIPv6) in the same network requires some care. This document discusses scenarios where such mixed usage is appropriate and points out the need for interaction between the two mechanisms. Solutions ..."


>    Some SDOs are also investigating more complex scenarios where the
Expand the term SDO or use some other phrase.

> However, in case there are nodes that implement Mobile IPv6 and want
> to use this protocol, the network must offer MIPv6 service to them.

There is no "MIPv6 service" in this case. It would be better to say, e.g., "must offer plain IP connectivity service without proxy mobility".

>    advertising the HNP, the MAG should advertise the topologically

The term HNP has not appeared before (at least not outside "MN-HNP" which is presumably another term).

> This section highlights some considerations that are applicable to
> scenario C where the LMA and HA are logically collocated and need to
> be evaluated when selecting the technical approach to be chosen.

Complex sentence that seems to be repeating the same thing.

> based on the base specification [RFC3775]

I'm sure there's a better way to write this...

>          ordered by a timestamp option. .

Garbage at the end.

> If a different LMA is
> assigned to the MAG, the mobile node will not be on the home
> link but will still have an active MIPv6 binding cache entry
> and this may be not desirable in some deployments..

Garbage at the end. Please also explain why this is not desirable.

>    LMA hss changed, and therefore the mobile node sends a MIPv6 Binding

s/hss/has/

>    o  The downlink packets in the case where both the MIPv6 binding
>      cache entry and PMIPv6 binding cache entry exist are processed as
>      follows:
>
>    o
>
>      1.  The MIPv6 binding cache entry is processed first.  If the

Odd indentation & bullet style.
2009-08-07
07 Jari Arkko State Changes to AD Evaluation from Publication Requested by Jari Arkko
2009-06-05
07 Amy Vezza [Note]: 'Document Shepherd is Vidya Narayanan (vidyan@qualcomm.com)' added by Amy Vezza
2009-06-05
07 Amy Vezza
Shepherd Write-Up for draft-ietf-netlmm-mip-interactions:

# (1.a) Who is the Document Shepherd for this document? Has the Document # Shepherd personally reviewed this version of …
Shepherd Write-Up for draft-ietf-netlmm-mip-interactions:

# (1.a) Who is the Document Shepherd for this document? Has the Document # Shepherd personally reviewed this version of the document and, in particular, # does he or she believe this version is ready for forwarding to the IESG for # publication?

Document Shepherd is Vidya Narayanan. I have personally reviewed the document and I believe the document is ready for publication.


# (1.b) Has the document had adequate review both from key WG members and from # key non-WG members? Does the Document Shepherd have any concerns about the # depth or breadth of the reviews that have been performed?

The document has had extensive reviews within the WG. I do not have any concerns about the depth or breadth of reviews received.


# (1.c) Does the Document Shepherd have concerns that the document needs more # review from a particular or broader perspective, e.g., security, operational # complexity, someone familiar with AAA, internationalization or XML?

I have no concerns about the reviews for this document.


# (1.d) Does the Document Shepherd have any specific concerns or issues with # this document that the Responsible Area Director and/or the IESG should be # aware of? For example, perhaps he or she is uncomfortable with certain parts # of the document, or has concerns whether there really is a need for it. In # any event, if the WG has discussed those issues and has indicated that it # still wishes to advance the document, detail those concerns here. Has an # IPR disclosure related to this document been filed? If so, please include a # reference to the disclosure and summarize the WG discussion and conclusion # on this issue.

I have no concerns on the document. There have been no IPR disclosures filed on this document.


# (1.e) How solid is the WG consensus behind this document? Does it # represent the strong concurrence of a few individuals, with others # being silent, or does the WG as a whole understand and agree with it?

There is a strong consensus behind the document.


# (1.f) Has anyone threatened an appeal or otherwise indicated extreme # discontent? If so, please summarise the areas of conflict in separate # email messages to the Responsible Area Director. (It should be in a # separate email because this questionnaire is entered into the ID Tracker.)

Nobody has threatened to appeal and the document is a product of the WG as a whole.


# (1.g) Has the Document Shepherd personally verified that the document # satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and # http://tools.ietf.org/tools/idnits/). Boilerplate checks are not # enough; this check needs to be thorough. Has the document met all formal # review criteria it needs to, such as the MIB Doctor, media type and URI # type reviews?

No ID nit errors are present on the document and the document meets the review criteria.

# (1.h) Has the document split its references into normative and informative?
# Are there normative references to documents that are not ready for # advancement or are otherwise in an unclear state? If such normative # references exist, what is the strategy for their completion? Are there # normative references that are downward references, as described in # [RFC3967]? If so, list these downward references to support the Area # Director in the Last Call procedure for them [RFC3967].

There is a split to normative and informative references. The document has draft-ietf-mip6-bootstrapping-integrated-dhc as a normative reference. This draft is in the RFC editor queue and is expected to be published soon. So, there is no concern on having normative references in an unclear state. There are no downward references in the document.

# (1.i) Has the Document Shepherd verified that the document IANA # consideration section exists and is consistent with the body of the # document? If the document specifies protocol extensions, are reservations # requested in appropriate IANA registries? Are the IANA registries clearly # identified? If the document creates a new registry, does it define the # proposed initial contents of the registry and an allocation procedure for # future registrations? Does it suggest a reasonable name for the new # registry? See [RFC2434]. If the document describes an Expert Review # process has Shepherd conferred with the Responsible Area Director so that # the IESG can appoint the needed Expert during the IESG Evaluation?

There are no actions for IANA in this document. However, an IANA considerations section stating that does exist.


# (1.j) Has the Document Shepherd verified that sections of the document that # are written in a formal language, such as XML code, BNF rules, MIB # definitions, etc., validate correctly in an automated checker?

No formal language segments exist.


# (1.k) The IESG approval announcement includes a Document Announcement # Write-Up. Please provide such a Document Announcement Write-Up? Recent # examples can be found in the "Action" announcements for approved documents.
# The approval announcement contains the following sections:

Technical Summary
The Proxy Mobile IPv6 specification in RFC 5213 describes network based mobility management for IPv6 hosts across IPv6 network domains. This document describes the possible interactions between Proxy Mobile IPv6 and Mobile IPv6. It provides some guidelines on the best practices to use when combining these two protocols to provide mobility for end hosts.

Working Group Summary
There is a consensus in the NETLMM WG for publication as an informational RFC.

Document Quality
The document has gone through various reviews and a successful WGLC.

Personnel
Responsible AD is Jari Arkko and the document shepherd is Vidya Narayanan.
2009-06-05
07 Amy Vezza Draft Added by Amy Vezza in state Publication Requested
2009-06-01
04 (System) New version available: draft-ietf-netlmm-mip-interactions-04.txt
2009-05-01
03 (System) New version available: draft-ietf-netlmm-mip-interactions-03.txt
2009-02-23
02 (System) New version available: draft-ietf-netlmm-mip-interactions-02.txt
2008-11-17
01 (System) New version available: draft-ietf-netlmm-mip-interactions-01.txt
2008-10-24
00 (System) New version available: draft-ietf-netlmm-mip-interactions-00.txt