2003
DOI: 10.17487/rfc3519
|View full text |Cite
|
Sign up to set email alerts
|

Mobile IP Traversal of Network Address Translation (NAT) Devices

Abstract: Mobile IP's datagram tunnelling is incompatible with Network Address

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2004
2004
2015
2015

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(32 citation statements)
references
References 13 publications
0
32
0
Order By: Relevance
“…4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 T Foreign agent supports reverse tunneling as specified in [12]. U Mobility agent supports UDP Tunneling as specified in [27]. X Mobility agent supports Registration Revocation as specified in [28].…”
Section: Agent Discoverymentioning
confidence: 99%
“…4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 T Foreign agent supports reverse tunneling as specified in [12]. U Mobility agent supports UDP Tunneling as specified in [27]. X Mobility agent supports Registration Revocation as specified in [28].…”
Section: Agent Discoverymentioning
confidence: 99%
“…If the care-of address is a private address, then Mobile IP NAT Traversal as [RFC3519] MAY be used in combination with the extensions described in this specification. In that case, to transport IPv6 packets, the next header field of the Mobile Tunnel Data message header [RFC3519] MUST be set to the value for IPv6.…”
Section: Registration With a Private Coamentioning
confidence: 99%
“…In that case, to transport IPv6 packets, the next header field of the Mobile Tunnel Data message header [RFC3519] MUST be set to the value for IPv6. Note that in that case, the encapsulation field of the UDP Tunnel Request Extension defined in [RFC3519] MUST be set to zero.…”
Section: Registration With a Private Coamentioning
confidence: 99%
“…In cases where this specification is used for NAT traversal, it is important to note that it has the same vulnerabilities associated with [RFC3519]. An attacker is able to hijack the mobile node's session with the home agent if it can modify the contents of the outer IPv4 header.…”
Section: Security Considerationsmentioning
confidence: 99%