- Configuring Mobile IP
- Mobile IP MIB Support for SNMP
- Mobile IP NAT Detect
- Mobile IP Support for Foreign Agent Reverse Tunneling
- Mobile IP Challenge and Response Extensions
- Mobile IP Generic NAI Support and Home Address Allocation
- Mobile IP Home Agent Policy Routing
- Mobile IP Home Agent Accounting
- Mobile IP Dynamic Security Association and Key Distribution
- Mobile IP Support for RFC 3519 NAT Traversal
- Mobile IPv6 High Availability
- IPv6 ACL Extensions for Mobile IPv6
- Mobile IPv6 Home Agent
- IPv6 NEMO
- Index
Contents
- Mobile IP Challenge and Response Extensions
- Finding Feature Information
- Prerequisites for Mobile IP Challenge Response Extensions
- Restrictions for Mobile IP Challenge Response Extensions
- Information About Foreign Agent Challenge Response Extensions
- Challenge Response Extensions
- How to Configure Foreign Agent Challenge Response Extensions
- Configuring FA Challenge Response Extensions
- Verifying Foreign Agent Service Configuration
- Additional References
- Command Reference
Mobile IP Challenge and Response Extensions
The Mobile IP--Challenge/Response Extensions feature enables a foreign agent (FA) to authenticate a mobile node (MN) by sending mobile foreign challenge extensions (MFCE) and mobile node-AAA authentication extensions (MNAE) to the home agent (HA) in registration requests.
Feature Specifications for Mobile IP--Challenge/Response Extensions
Feature History |
|
---|---|
Release |
Modification |
12.2(13)T |
This feature was introduced. |
Supported Platforms |
|
For platforms supported in Cisco IOS Release 12.2(13)T, consult Cisco Feature Navigator. |
- Finding Feature Information
- Prerequisites for Mobile IP Challenge Response Extensions
- Restrictions for Mobile IP Challenge Response Extensions
- Information About Foreign Agent Challenge Response Extensions
- How to Configure Foreign Agent Challenge Response Extensions
- Additional References
- Command Reference
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Mobile IP Challenge Response Extensions
In the Mobile IP--Challenge/Response Extensions feature, the foreign agent expects mobile node RRQs to contain the following extensions:
Mobile node network address identifier
MHAE
Mobile node-foreign agent challenge extension
Mobile node-AAA extension authenticator computed based on a shared secret between the mobile node and the AAA server.
If unique per-user passwords are configured on the AAA and the mobile nodes, and the mobile node or home agent security association is configured on the AAA server, the HA expects mobile node RRQs received from the FA CoA to contain the following:
MFCE
Mobile node -AAA extension authenticator
Restrictions for Mobile IP Challenge Response Extensions
The Mobile IP--Challenge/Response Extensions feature has the following restrictions:
Mobile Node Colocated care-of address (CCOA) mode is not supported.
Information About Foreign Agent Challenge Response Extensions
Challenge Response Extensions
Mobile IP, as originally implemented, defines a Mobile-Foreign Authentication extension by which a mobile node can authenticate itself to a foreign agent. This Mobile-Foreign Authentication extension does not provide complete replay protection for the foreign agent and does not allow the foreign agent to use existing methods, such as Challenge Handshake Authentication Protocol (CHAP) to authenticate a mobile node. The Mobile IP--Foreign Agent Challenge/Response Extensions feature extends the Mobile IP agent advertisements and the registration requests that enable a foreign agent to use a challenge/response mechanism to authenticate a mobile node.
When the Mobile IP--Foreign Agent Challenge/Response Extensions feature is configured, the foreign agent expects the mobile node to include a challenge extension with a challenge value that the mobile node had previously advertised. The foreign agent also expects to receive this challenge extension within a specific time interval. The mobile node must also send an extension for authentication (MFAE or MN-AAA.)
How to Configure Foreign Agent Challenge Response Extensions
Configuring FA Challenge Response Extensions
Perform this task to configure a foreign agent to authenticate a mobile node by sending MFCEs and MNAEs in registration requests.
If unique per-user passwords are configured on the AAA and the mobile nodes, and the mobile node or home agent security association is configured on the AAA server, the HA expects mobile node RRQs received from the FA CoA to contain the following:
MFCE
Mobile node -AAA extension authenticator
If the MFCE and MN-AAA extension authenticator are not forwarded to the home agent, the AAA server storing the mobile node/ home agent SAs must have identical passwords for all users to aid SA retrieval.
Note | If the Mobile Node is registering in FA-COA mode and the Security Associations (SAs) must be obtained from AAA, the user password must be configured as "cisco". |
1.
enable
2.
configure
{terminal | memory | network}
3.
router
mobile
4.
ip
mobile
foreign-agent
care-of
interface
5.
interface
type
number
6.
ip
address
ip-address
mask
7.
ip
irdp
8.
ip
irdp
holdtime
seconds
9.
ip
irdp
maxadvertinterval
seconds
10.
ip
irdp
minadvertinterval
seconds
11.
ip
mobile
foreign-service
challenge
{timeout value | window number}
12.
ip
mobile
foreign-service
challenge
DETAILED STEPS
Verifying Foreign Agent Service Configuration
Perform this task to optionally verify that the interface has been configured to provide foreign agent services.
1.
enable
2.
show
ip
mobile
globals
3.
show
ip
mobile
interface
4.
show
ip
mobile
traffic
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable
Example: Router> enable |
Enables higher privilege levels, such as privileged EXEC mode. Enter your password if prompted. |
Step 2 |
show
ip
mobile
globals
Example: Router# show ip mobile globals |
(Optional) Displays global information for mobile agents. |
Step 3 |
show
ip
mobile
interface
Example: Router# show ip mobile interface |
(Optional) Displays advertisement information for interfaces that are providing foreign agent service or are home links for mobile nodes. |
Step 4 |
show
ip
mobile
traffic
Example: Router# show ip mobile traffic |
(Optional) Displays protocol counters. |
Additional References
The following sections provide additional references related to the Mobile IP--Challenge/Response Extensions feature:
Related Documents
Related Topic |
Document Title |
---|---|
Authentication |
The part " Authentication, Authorization, and Accounting (AAA)" in the Cisco IOS Security Configuration Guide, Release 12.2 |
IKE and IPSec security protocols |
The part " IP Security and Encryption" in the Cisco IOS Security Configuration Guide, Release 12.2 |
Mobile IP |
|
Cisco mobile networks |
|
Mobile wireless configuration |
|
Mobile wireless commands |
Standards
Standards |
Title |
---|---|
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature. |
-- |
MIBs
MIBs1 |
MIBs Link |
---|---|
|
To obtain lists of supported MIBs by platform and Cisco IOS release, and to download MIB modules, go to the Cisco MIB website on Cisco.com at the following URL: http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml |
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://tools.cisco.com/ITDIT/MIBS/servlet/index
If Cisco MIB Locator does not support the MIB information that you need, you can also obtain a list of supported MIBs and download MIBs from the Cisco MIBs page at the following URL:
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
To access Cisco MIB Locator, you must have an account on Cisco.com. If you have forgotten or lost your account information, send a blank e-mail to cco-locksmith@cisco.com. An automatic check will verify that your e-mail address is registered with Cisco.com. If the check is successful, account details with a new random password will be e-mailed to you. Qualified users can establish an account on Cisco.com by following the directions found at this URL:
RFCs
RFCs2 |
Title |
---|---|
RFC 2002 |
IP Mobility Support |
RFC 2003 |
IP Encapsulation within IP |
RFC 2005 |
Applicability Statement for IP Mobility Support |
RFC 2006 |
The Definitions of Managed Objects for IP Mobility Support |
RFC 3024 |
Reverse Tunneling for Mobile IP, revised |
Technical Assistance
Description |
Link |
---|---|
Technical Assistance Center (TAC) home page, containing 30,000 pages of searchable technical content, including links to products, technologies, solutions, technical tips, tools, and lots more. Registered Cisco.com users can log in from this page to access even more content. |
Command Reference
The following commands are introduced or modified in the feature or features documented in this module. For information about these commands, see the Cisco IOS IP Mobility Command Reference at http://www.cisco.com/en/US/docs/ios/ipmobility/command/reference/imo_book.html. For information about all Cisco IOS commands, go to the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup or to the Cisco IOS Master Commands List .