1 / 7

PMIPv6 inter-working with WiFi Access Authentication draft-liebsch-netext-pmip6-authiwk

PMIPv6 inter-working with WiFi Access Authentication draft-liebsch-netext-pmip6-authiwk. M. Liebsch, S.Gundavelli, P.Seite IETF83, NETEXT WG March 2012. Outline. Background & Motivation Document Objectives WLAN trusted access Feedback. Background & Motivation.

hedva
Télécharger la présentation

PMIPv6 inter-working with WiFi Access Authentication draft-liebsch-netext-pmip6-authiwk

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PMIPv6 inter-workingwith WiFi Access Authenticationdraft-liebsch-netext-pmip6-authiwk M. Liebsch, S.Gundavelli, P.Seite IETF83, NETEXT WG March 2012

  2. Outline • Background & Motivation • Document Objectives • WLAN trusted access • Feedback

  3. Background & Motivation • RFC5213 assumes completed authentication procedure before registration • AuthN can provide trigger for PMIPv6 operation after completion • Option to derive MN-Identifier from access authentication • Contraints: Validity >= duration of mobility session, Scope >= PMIPv6 domain • Approach/Solution not documented in the IETF • WLAN as well accepted access technology • Assumed untrusted (HotSpot, ...) • Enable WLAN trusted access • 3GPP recommendations for security and for PMIP operation using non-3GPP radio access • WiMAX Forum specification for WiFi inter-working

  4. Document Objectives • General BCP for AuthN inter-working with PMIPv6 • Advanced documentation • Include other SDOs‘ deployment and recommendations to use a particular authentication method • Include inter-working between WiFi AuthN and operators‘ AAA • Include considerations related Web-Authentication • Identification of protocol gaps and need for IETF specification

  5. WLAN-EPC Integrated Architecture • Identifies the primary protocol interfaces in the SP WiFI architecture AAA Proxy PCRF Web Portal AAA AAA MAG LMA AP WLC CAPWAP L2 802.1Q PMIPv6

  6. Enable WLAN trusted access • WiFi Access AuthN integral part of the attach sequence • PMIP tunnel between WLAN access and LMA • Link-layer security between MN and WiFi AP • AuthN inter-working with PMIPv6 and mobile operator AAA AuthN IWK AuthN – PMIP IWK AAA RADIUS PolicyCtrl MN Ctrl /MAG WiFi AP LMA PMIP tunnel L2 encryption Trusted Operator Networks

  7. Next Steps • Reasonable scope? • Adopt as a WG document

More Related