Mobile IP and VPN Tarik Cicic University of Oslo December 2001 Overview • Concept of tunneling • Mobile IP concepts and deployment • Virtual Private Network principles 2 Tunneling • Technique for modifying data transport • Used to transport data – with inconsistent addresses – belonging to incompatible protocols • Packets belonging to Layer n are transported on Layer m, where n <= m • Examples: – IP in IP (L3 in L3) – ATM in IP (L2 in L3) 3 1 “Regular” Data Packets Header Payload • Information packed in the payload • Control information in the header • Each layer adds its header HTTP HTTP TCP HTTP IP HTTP TCP HTTP HTTP 4 ”n-in-n” HTTP IP2 HTTP TCP HTTP IP1 Tunneling HTTP TCP HTTP IP1 ”n-in-m” TCP HTTP HTTP TCP HTTP HTTP IP TCP HTTP HTTP HTTP HTTP HTTP IP IP IP (Not drawn to scale ☺) 5 Proc and Cons + Tunneling is essential for a range of new IP services - It adds overhead and complexity to the communications • We would prefer to not use it, whenever possible 6 2 Mobility Mobility Concepts • Work in office and at home (DHCP, dialup) • Home-network access wherever we are – VPN, IP-SEC, dialup • Switch networks without service interruption – Mobile IP • Other – WLAN roaming, protocol service discovery, cellular technologies 8 Mobile IP Terminology • Care-of-address: temporary address on a foreign network • Home Agent (HA): computer on the home network responsible for tracking the mobile node • Foreign agent (FA): computer on the remote network responsible for assigning the care-of addresses and informing HA about it 9 3 Basic Concept Sender Mobile node introduces itself to the FA Internet Receiver 129.240.64.135 Home agent Tunnel Local Address Care-of Address 129.240.64.135 158.9.13.15 129.240.64.97 192.4.69.3 Foreign agent FA sends Careof Address to the HA 158.9.13.15 10 Mobile IP Protocol Components • Agent discovery • Registration procedure • Handoff rules: – from one network to another – triggered by, e.g., traffic drop, retransmissions • Address binding 11 Route Optimization • Avoiding the “triangle” communication through binding updates Sender 129.240.64.135 is at 158.9.13.15 Receiver Home agent Internet 12 Foreign agent 4 Mobile IPv6 • Node autoconfiguration in foreign network • Secure binding updates • Source routing through the routing header Sender • No FA needed • No tunneling Receiver IPv6 Internet Home agent Foreign agent 13 Route Optimization in IPv6 • Routing header normally used • If a packet arrives to the HA, it is assumed that the source does not know the COA, and the packet is encapsulated to the mobile node: COA HA Dest Src Payload • Mobile node sends a routing update to the source 14 Mobile IP Summary • Mobile IP still not widely deployed: – IPv4 networks need substantial software to run Mobile IP (client protocol stack, FA, HA …) – IPv6 still on wait • We believe Mobile IP will become widespread • More work on – – – – dynamic (smooth) handover security compatibility merge between IP and telecom solutions 15 5 Virtual Private Networks Introduction • Technique to interconnect networks on geographically spread locations • Public network infrastructure is used instead of leased lines • The network looks private to the user, hence term “virtual” 17 VPN Advantages • Cost-saving, as it gains from statistical multiplexing • Flexibility (connecting new sites, contract modifications, points of presence etc.) • Transfer of servicing tasks to the network provider 18 6 VPN Challenges • Security • Reliability and QoS • Lack of standards 19 Security • Authentication (how to know that the data is really sent by the peer) • Policy enforcement (control lists, firewalls) • Transport of confidential data over public networks (encryption) • Monitoring network intrusions 20 VPN QoS • No QoS support in IP networks • Heavy requirements on ingress points in order to maintain the traffic contracts • Lesser efficiency 21 7 Where to Implement? • Layer 3 (IP SEC, GRE, L2TP, MPLS): + Flexibility, simplicity - IP only, poor standardization • Layer 2 (FR, ATM, PPP): + Multi-protocol, integration with access networks - Maintenance, complexity 22 Simple VNP Topology N1a 10.0.128/24 N2a 10.0.128/24 R1 VPN identifiers are needed: - to discriminate packets on destination - to perform policing on their way P1 R2 R3 P2 N1b 10.0.0/17 R4 23 N2b 10.0.0/17 Three VPN Categories • Access VPN: – remote, dial-in access to a “Point of Presence” in local area • Intranet VPN – site-to-site communication • Extranet VPN – business-to-business – mutual access policies enforced 24 8 Four VPN Implementation Methods • Virtual Leased Lines – intranet/extranet, L2 forwarding (e.g. AAL5/IP) • Virtual Private Dial Networks – access, L2 (e.g. PPP/L2TP/UDP/IP/PPP/L2) • Virtual Private Routed Networks – intranet/extranet, L3 • Virtual Private LAN Segments – intranet, L2 25 Virtual Leased Lines VLL is designed for companies with developed L2 (ATM) intranets Corporate Intranet III Corporate Intranet I IP AAL5 IP Link Backbone Corporate Intranet III 26 Virtual Dial Network Remote access with full functionality + cost reduction L2TP Server and Security Server Telephone PP Network P USA POP/ GW IP PPP L2TP UDP IP Link IP Backbone Corporate Intranet POP/ GW Telephone P Network PP Norway 27 9 Virtual Private Routed Networks Emulation of wide-area routed network Corporate Intranet III Corporate Intranet I IP IP IP IP Link IP • Most advanced Backbone • Complex • Virtual inter-domain routing (intra-VPRN reachability info) • Overlay/Piggybacked model 28 IP Corporate Intranet III Virtual Private LAN Segments Full virtual LAN implementation – complete protocol transparency Corporate Intranet III Corporate Intranet I IP L2 IP Link Backbone Backbone interconnect performs 29 as a L2 bridge Corporate Intranet III VPN Summary • • • • • “Suboptimal in theory, perfect in practice” Cost-saving technology Security issues VPN QoS issues Full IP standardization needed 30 10