Network Working GroupInternet Engineering Task Force (IETF) G. ZornInternet-DraftRequest for Comments: 7156 Network ZenIntended status:Category: Standards Track Q. WuExpires: February 3, 2013ISSN: 2070-1721 Huawei J. KorhonenNSN August 2, 2012Broadcom April 2014 Diameter Support for Proxy Mobile IPv6 Localized Routingdraft-ietf-dime-pmip6-lr-18Abstract In Proxy Mobile IPv6, packets received from a Mobile Node (MN) by the Mobile Access Gateway (MAG) to which it is attached are typically tunneled to a Local Mobility Anchor (LMA) for routing. The term "localized routing" refers to a method by which packets are routed directly between an MN's MAG and the MAG of its Correspondent Node (CN) without involving any LMA. In a Proxy Mobile IPv6 deployment, it may be desirable to control the establishment of localized routing sessions between two MAGs in a Proxy Mobile IPv6 domain by requiring that the session be authorized. This document specifies how to accomplish this using the Diameter protocol. Status ofthisThis Memo ThisInternet-Draftissubmitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documentsan Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF).Note that other groups may also distribute working documents as Internet-Drafts. The listIt represents the consensus ofcurrent Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents validthe IETF community. It has received public review and has been approved fora maximumpublication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 5741. Information about the current status ofsix monthsthis document, any errata, and how to provide feedback on it may beupdated, replaced, or obsoleted by other documentsobtained atany time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on February 3, 2013.http://www.rfc-editor.org/info/rfc7156. Copyright Notice Copyright (c)20122014 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . .. 32 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 3. Solution Overview . . . . . . . . . . . . . . . . . . . . . . 3 4. Attribute Value Pair Used inthisThis Document . . . . . . . . ..4 4.1. User-Name AVP . . . . . . . . . . . . . . . . . . . . . .54 4.2. PMIP6-IPv4-Home-Address AVP . . . . . . . . . . . . . . . 5 4.3. MIP6-Home-Link-Prefix AVP . . . . . . . . . . . . . . . . 5 4.4. MIP6-Feature-Vector AVP . . . . . . . . . . . . . . . . . 5 5. Example Signaling Flows for Localized Routing Service Authorization . . . . . . . . . . . . . . . . . . . . . . . . 6 6. Security Considerations . . . . . . . . . . . . . . . . . . . 9 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10 8. Contributors . . . . . . . . . . . . . . . . . . . . . . . ..10 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . ..10 10. References . . . . . . . . . . . . . . . . . . . . . . . . ..10 10.1. Normative References . . . . . . . . . . . . . . . . . ..10 10.2. Informative References . . . . . . . . . . . . . . . . .. 11 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . .11 1. Introduction Proxy Mobile IPv6 (PMIPv6) [RFC5213] allows theMobilityMobile Access Gateway (MAG) to optimize media delivery by locally routing packets from a Mobile Node (MN) to a Correspondent Node (CN) that is locally attached to an access link connected to the same Mobile Access Gateway, avoiding tunneling them to the Mobile Node's Local Mobility Anchor (LMA). This is referred to as "local routing" in RFC5213.5213 [RFC5213]. However, this mechanism is not applicable to the typical scenarios in which the MN and CN are connected to different MAGs and are registered to the same LMA or different LMAs. [RFC6279] takes those typical scenarios into account and defines the problem statement for PMIPv6 localized routing.[I-D.ietf-netext-pmip-lr] specifies the PMIPv6 localized routing protocol basedBased on the scenarios A11, A12, and A21 described in [RFC6279],which[RFC6705] specifies the PMIPv6 localized routing protocol that is used to establish a localized routing path between two Mobile Access Gateways in a PMIPv6 domain.However, there is no relevant work discussing how AAA-based mechanisms can be used to provide authorization to the Mobile Node's MAG or LMA for enabling localized routing between MAGs.This document describesDiameter [I-D.ietf-dime-rfc3588bis]Authentication, Authorization, and Accounting (AAA) support using Diameter [RFC6733] for the authorizationofprocedure between the PMIPv6 mobility entitiesin case of A11,A12,A21 during(MAG or LMA) and a AAA server within a Proxy Mobile IPv6 domain for localizedrouting.routing in the scenarios A11, A12, and A21 described in [RFC6279]. 2. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described inRFC 2119[RFC2119]. 3. Solution Overview This document addresses how to provide authorization information to the Mobile Node's MAG or LMAfor enablingto enable localized routing and resolve the destination MN's MAG by means of interaction between the LMA and the AAA server. Figure 1 shows the reference architecture for Localized Routing Service Authorization. This reference architecture assumes that o If the MN and CN belong to different LMAs, the MN and CN should share the same MAG(i.e.,A12(i.e., scenario A12 described in [RFC6279]), e.g., MN1 and CN2 in Figure 1 are attached tothe sameMAG1 and belong to LMA1 andLMA2LMA2, respectively. Note that LMA1 and LMA2 in Figure 1 are in the same provider domain (as described in [RFC6279]). o If the MN and CN are attached tothedifferent MAGs, the MN and CN should belong to the same LMA(i.e.,A21(i.e., scenario A21 described in[RFC6279]), e.g.,[RFC6279]); for example, MN1 and CN3 intheFigureFigure 1 are attached totheMAG1 andMAG3 respectivelyMAG3, respectively, but belong to LMA1. o The MN and CN may belong to the same LMA andaremay be attached to the sameMAG(i.e.,A11MAG (i.e., scenario A11 described in [RFC6279]),e.g.,MN1e.g., MN1 and CN1 intheFigure 1 are both attached to the MAG1 and belong to LMA1. o The MAG and LMA support Diameter client functionality. +---------+ +---------------------->| AAA & | | +------>| Policy | | | | Profile | | Diameter +---------+ | | | +--V-+ +----+ | +------->|LMA1| |LMA2| | | +---++ +----+ | | | | | Diameter | | +-------+--------- | | | | | | PMIP | | \\ | | // // \\ | | // // \\ | | // // \\ | | | | | | +---->+---------------+ +----+ | | MAG1 | |MAG3| +-------->+---------------+ +----+ : : : : +---+ +---+ +---+ +---+ |MN1| |CN1| |CN2| |CN3| +---+ +---+ +---+ +---+ Figure 1: Localized Routing Service Authorization Reference Architecture The interaction of the MAG and LMA with the AAA server according to the extension specified in this document is used to authorize the localized routing service. 4. Attribute Value Pair Used inthisThis Document This section describes Attribute Value Pairs (AVPs) and AVP values defined by this specification orre-usedreused from existing specifications in aPMIPv6- specificPMIPv6-specific way. 4.1. User-Name AVP The User-Name AVP (AVP Code 1) is defined in[I-D.ietf-dime-rfc3588bis].[RFC6733], Section 8.14. This AVP is used to carry theMN- Identifier (MobileMobile Nodeidentifier)identifier (MN-Identifier) [RFC5213] in the Diameter AA-Request(AAR)message[I-D.ietf-dime-rfc4005bis].[RFC7155] sent to the AAA server. The MN-Identifier is defined in PMIPv6 [RFC5213]. 4.2. PMIP6-IPv4-Home-Address AVP The PMIP6-IPv4-Home-Address AVP (AVP Code 505) is defined in[RFC5779].[RFC5779], Section 5.2. This AVP is used to carry theIPv4-MN-HoA (MobileMobile Node's IPv4 homeaddress)[RFC5844]address (IPv4-MN-HoA) in the Diameter AA-Request(AAR)message[I-D.ietf-dime-rfc4005bis].[RFC7155] sent to the AAA server. The IPv4-MN-HoA is defined in [RFC5844]. 4.3. MIP6-Home-Link-Prefix AVP The MIP6-Home-Link-Prefix AVP (AVP Code 125) is defined in[RFC5779].[RFC5779], Section 5.3. This AVP is used to carry theMN-HNP (MobileMobile Node's home networkprefix)prefix (MN-HNP) in theAAR.Diameter AA-Request [RFC7155] sent to the AAA server. 4.4. MIP6-Feature-Vector AVP The MIP6-Feature-Vector AVP is defined in[RFC5447].[RFC5447] and contains a 64-bit flags field used to indicate supported capabilities to the AAA server. This document allocates a new capability flag bit according to the IANA rules in RFC5447.5447 [RFC5447]. INTER_MAG_ROUTING_SUPPORTED(TBD)(0x0002000000000000) When set, this flag indicates support or authorization of Direct routing of IP packets between MNs anchored to different MAGs without involving anyLMA is supported. This bitLMA. During the network access authentication and authorization procedure [RFC5779], this flag isused with MN-Identifier. When aset by the MAG or LMAsets this bitin theMIP6- Feature-Vector and MN-Identifier corresponding toMIP6-Feature- Vector AVP included in theMobile Node is carried with this bit, it indicatesrequest to indicate to the home AAA server (HAAA) thatthe Mobile Node associated with this LMA is allowed to use localized routing.If this bit is cleared and MN-Identifier correspondinginter-MAG direct routing may be provided to theMobile Node is carried with this bit, it indicates tomobile node identified by thehome AAA server (HAAA) thatUser-Name AVP. By setting theMobile Node associated with this LMA is not allowed to use localized routing. When a MAG or LMA sets this bitINTER_MAG_ROUTING_SUPPORTED flag in theMIP6-Feature-Vector and MN- Identifiers corresponding toresponse, theMobile Node and Correspondent Node are both carried with this bit, itHAAA indicates to theHAAAMAG or LMA thatlocalizeddirect routing of IP packets betweenMobile Nodethis mobile node andCorrespondent Nodeanother node anchored to a differentMAGs is supported. If this bitMAG isclearedauthorized. The MAG andMN- Identifiers corresponding totheMobile Node and Correspondent Node are both carried with this bit to HAAA, it indicatesLMA set also the INTER_MAG_ROUTING_SUPPORTED flag of the MIP6-Feature-Vector AVP in AA-R sent to the HAAAthat localized routingfor requesting authorization ofIP packetsinter-MAG direct routing betweenMobile Node and Correspondent Node anchored to different MAGs is not supported.the mobile nodes identified in the request by two distinct instances of the User-Name AVP. If this bit isclearedset in the returned MIP6-Feature-Vector AVP, the HAAAdoes not authorizeauthorizes direct routing of packets between MNs anchored to different MAGs. When the INTER_MAG_ROUTING_SUPPORTED flag is cleared, either in request or response, it indicates that the procedures related to authorization of localized routing between MNs anchored to differentMAG. TheMAGs is not supported or not authorized. MAG and LMA compliant to this specification MUST support this policy feature on a per-MN andper-subscriptionper- subscription basis. 5. Example Signaling Flows for Localized Routing Service Authorization Localized Routing Service Authorization can happen during the network access authentication procedure [RFC5779] before localized routing is initialized. In this case, the preauthorized pairs ofLMA/prefixLMA / prefix sets can be downloaded to Proxy Mobile IPv6 entities during theRFC 5779 procedure.procedure from [RFC5779]. Localized routing can be initiated once the destination of a received packet matches one or more of the prefixes received during theRFC 5779 procedure.procedure from [RFC5779]. Figure 2 shows an example scenario in which MAG1 acts as a Diameter client, processing the data packet from MN1 to MN2 and requesting authorization of localized routing(i.e.,MAG-Initiated(i.e., MAG-Initiated LR authorization). In this example scenario, MN1 and MN2 are attached to the same MAG and anchored to the different LMAs(i.e.,A12(i.e., scenario A12 described in [RFC6279]). In this case, MAG1 knows that MN2 belongs to a different LMA (which can be determined by looking up the binding cache entries corresponding to MN1 and MN2 and comparing the addresses of LMA1 and LMA2). In order tosetupset up a localized routing path with MAG2, MAG1 acts as Diameter client and sends anAARAA-Request message to theDiameterAAA server. The message contains an instance of the MIP6-Feature-Vector (MFV) AVP([RFC5447], Section 4.2.5)[RFC5447] with the LOCAL_MAG_ROUTING_SUPPORTED bit([RFC5779],Section 5.5 ) set,two([RFC5779], Section 5.5) set, two instances of the User-Name AVP([I-D.ietf-dime-rfc3588bis], Section 8.14)containing MN1-Identifier[RFC6733] containing the identifiers of MN1 andMN2-Identifier.MN2. In addition, the message may containeithereither: - an instance of the MIP6-Home-Link-Prefix AVP([RFC5779], Section 5.3) or[RFC5779] carrying the MN1's IPv4 address; - an instance of thePMIP6-IPv4- Home- AddressPMIP6-IPv4-Home-Address AVP([RFC5779], Section 5.2) containing[RFC5779] carrying theIP address/ HNP of MN1.MN1's home network prefix (MN-HNP). TheDiameterAAA server authorizes the localized routing service by checking if MN1 and MN2 are allowed to use localized routing. If so, theDiameterAAA server responds withana AAA message encapsulating an instance of the MIP6-Feature-Vector (MFV) AVP([RFC5447], Section 4.2.5)[RFC5447] with thetheLOCAL_MAG_ROUTING_SUPPORTED bit([RFC5779],Section([RFC5779], Section 5.5) set indicating that direct routing of IP packets between MNs anchored to the same MAG issupported.authorized. MAG1 then knows that the localized routing between MN1 and MN2 is allowed.ThenThen, MAG1 sends the Request messages respectively to LMA1 and LMA2. The request message is the Localized Routing Initialization (LRI) message in Figure 2 and belongs to the Initial phase of the localized routing. LMA1 and LMA2respondsrespond to MAG1 using the Localized Routing Acknowledge message (LRAinFigure 2 )in Figure 2) in accordance with[I-D.ietf-netext-pmip-lr].[RFC6705]. In case of LRA_WAIT_TIME expiration[I-D.ietf-netext-pmip-lr],MAG1[RFC6705], MAG1 should ask for authorization of localized routing again according to the procedure described above before the LRI is retransmitted up to a maximum of LRI_RETRIES. +---+ +---+ +----+ +----+ +---+ +----+ |MN2| |MN1| |MAG1| |LMA1| |AAA| |LMA2| +-|-+ +-+-+ +-+--+ +-+--+ +-+-+ +-+--+ | | Anchored | | |o---------------------------------------------oo-----------------------------------------------o | | Anchored | | | | o------------------o | | | Data[MN1->MN2] | | | | |------->| | | | | | |AAR(MFV,AA-Request(MFV, MN1,MN2) | | | |--------------------> | ||------------------->|| | | AA-Answer(MFV) |AAA(MFV)| | | |<-------------------- ||<-------------------|| | | | LRI | | | | | |-------->| | | | | | | LRI | | | ||--------------------------->||----------------------------->| | | | LRA | | | | | |<--------| | | | | | | LRA | | | ||<---------------------------||<-----------------------------| Figure 2:MAG-initiatedMAG-Initiated Localized Routing Authorization in A12 Figure 3 shows the second example scenario, in which LMA1 acts as a Diameter client, processing the data packet from MN2 to MN1 and requesting the authorization of localized routing. In this scenario, MN1 and MN2 are attached tothea different MAG and anchored to the same LMA (i.e., A21 described in[RFC6279] ),[RFC6279]), LMA knows that MN1 and MN2 belong to the same LMA (which can be determined by looking up the binding cache entries corresponding to MN1 and MN2 and comparing the addresses of the LMA corresponding to MN1 and LMA corresponding to MN2). In contrast with the signaling flow shown in Figure 2, it is LMA1 instead of MAG1whichthat initiates the setup of the localized routing path. The Diameter client in LMA1 sends an AA-Request message to theDiameterAAA server. The message contains an instance of theMIP6- Feature-VectorMIP6-Feature-Vector (MFV) AVP([RFC5447], Section 4.2.5)[RFC5447] with the INTER_MAG_ROUTING_SUPPORTED bit (Section 4.5) set indicating direct routing of IP packets between MNs anchored to different MAGs is supported and two instances of the User-Name AVP([I-D.ietf-dime-rfc3588bis], Section 8.14)containing MN1-Identifier[RFC6733] containing identifiers of MN1 andMN2-Identifier.MN2. TheDiameterAAA server authorizes the localized routing service by checking if MN1 and MN2 are allowed to use localized routing. If so, theDiameterAAA server responds with anAA- AnswerAA-Answer message encapsulating an instance of the MIP6-Feature-Vector (MFV) AVP([RFC5447], Section 4.2.5)[RFC5447] with the INTER_MAG_ROUTING_SUPPORTED bit (Section 4.5) set indicating that direct routing of IP packets between MNs anchored to different MAGs issupported.authorized. LMA1 then knows the localized routing is allowed. Insuccessa successful case, LMA1 responds to MAG1 in accordance with[I-D.ietf-netext-pmip-lr].[RFC6705]. In the case of LRA_WAIT_TIME expiration[I-D.ietf-netext-pmip-lr],LMA1[RFC6705], LMA1 should ask for authorization of localized routing again according to the procedure described above before the LRI is retransmitted up to a maximum of LRI_RETRIES. +---+ +----+ +----+ +---+ +----+ +---+ |MN1| |MAG1| |LMA1| |AAA| |MAG2| |MN2| +-+-+ +-+--+ +-+--+ +-+-+ +-+--+ +-+-+ | | | Anchored | | | Anchored o-------------------+--------o o--------+-------o Data[MN2->MN1] | | | | |<----- | | | | ||AAR(MFV,MN1,MN2) ||AA-Request(MFV,MN1,MN2) | | | |--------->| | | | || AAA(MFV) ||AA-Answer(MFV) | | | | LRI |<---------| | | | |<------| LRI | | | | LRA |------------------>| | | |------>| LRA | | | | |<------------------| | Figure 3:LMA-initiatedLMA-Initiated Localized Routing Authorization in A21 Figure 4 shows another example scenario, in which LMA1 acts as a Diameter client, processing the data packet from MN2 to MN1 and requesting the authorization of localized routing. In this scenario, MN1 and MN2 are attached to the same MAG and anchored to the same LMA (i.e., A11 described in [RFC6279]), the LMA knows that MN1 and MN2 belong to the same LMA (which can be determined by looking up the binding cache entries corresponding to MN1 and MN2 and comparing the addresses of LMA corresponding to MN1 and LMA corresponding to MN2). The Diameter client in LMA1 sends an AA-Request message to theDiameterAAA server. The message contains an instance of theMIP6- Feature-VectorMIP6-Feature-Vector AVP([RFC5447], Section 4.2.5)[RFC5447] with the LOCAL_MAG_ROUTING_SUPPORTED bit set and two instances of theUser- NameUser-Name AVP([I-D.ietf-dime-rfc3588bis], Section 8.14)containing MN1- Identifier[RFC6733] containing the identifiers MN1 andMN2-Identifier.MN2. TheDiameterAAA server authorizes the localized routing service by checking if MN1 and MN2 are allowed to use localized routing. If so, theDiameterAAA server responds with anAA- AnswerAA-Answer message encapsulating an instance of theMIP6-Feature- VectorMIP6-Feature-Vector (MFV) AVP([RFC5447], Section 4.2.5)[RFC5447] with the LOCAL_MAG_ROUTING_SUPPORTED bit([RFC5779],Section([RFC5779], Section 5.5) set indicating that direct routing of IP packets between MNs anchored to the same MAG issupported.authorized. LMA1 then knows the localized routing is allowed and responds to MAG1 for localized routing in accordance with[I-D.ietf-netext-pmip-lr].[RFC6705]. In the case of LRA_WAIT_TIME expiration[I-D.ietf-netext-pmip-lr],[RFC6705], LMA1 should ask for authorization of localized routing again according to the procedure described above before the LRI is retransmitted up to a maximum of LRI_RETRIES. +---+ +---+ +----+ +----+ +---+ |MN2| |MN1| |MAG1| |LMA1| |AAA| +-+-+ +-+-+ +-+--+ +-+--+ +-|-+ | | Anchored | | o-----------------------o | | | Anchored | | | o--------+-------o Data[MN2->MN1] | | | |<----- | | | ||AAR(MFV,MN1,MN2)|AA-Request(MFV,MN1,MN2) | | | |--------->| | | || AAA(MFV) ||AA-Answer(MFV) | | | LRI |<---------| | | |<------| | | | | LRA | | | | |------>| | Figure 4:LMA-initiatedLMA-Initiated Localized Routing Authorization in A11 6. Security Considerations The security considerations for the DiameterNASREQ [I-D.ietf-dime-rfc4005bis]Network Access Server Requirements (NASREQ) [RFC7155] and Diameter Proxy Mobile IPv6 [RFC5779] applications are also applicable to this document. The service authorization solicited by the MAG or the LMA relies upon the existing trust relationship between the MAG/LMA and the AAA server. Anauthorisedauthorized MAGcouldcould, inprincipleprinciple, track the movement of any participatingCNsmobile nodes at the level of the MAG to which they are anchored. If such a MAG were compromised, or under the control of abad-actor,bad actor, then such tracking could represent a privacy breach for the set of trackedCNs.mobile nodes. In such a case, the traffic pattern from the compromised MAG might benotablenotable, so monitoringfor e.g.for, e.g., excessive queries fromMAGsMAGs, might be worthwhile. 7. IANA Considerations This specification defines a new value in theMobility"Mobility CapabilityregistryRegistry" [RFC5447] for use with the MIP6-Feature-Vector AVP: INTER_MAG_ROUTING_SUPPORTED (see Section 4.4). 8. Contributors Paulo Loureiro, Jinwei Xia and Yungui Wang all contributed to early versions of this document. 9. Acknowledgements The authors would like to thank Lionel Morand, Marco Liebsch, Carlos Jesus Bernardos Cano, Dan Romascanu, Elwyn Davies, Basavaraj Patil, Ralph Droms, StephenFarrel,RobertFarrel, Robert Sparks, BenoitClaiseClaise, and Abhay Roy for their valuable comments and suggestions on this document. 10. References 10.1. Normative References[I-D.ietf-dime-rfc3588bis] Fajardo, V., Arkko, J., Loughney, J., and G. Zorn, "Diameter Base Protocol", draft-ietf-dime-rfc3588bis-34 (work in progress), June 2012. [I-D.ietf-dime-rfc4005bis] Zorn, G., "Diameter Network Access Server Application", draft-ietf-dime-rfc4005bis-11 (work in progress), July 2012. [I-D.ietf-netext-pmip-lr] Krishnan, S., Koodli, R., Loureiro, P., Wu, Q., and A. Dutta, "Localized Routing for Proxy Mobile IPv6", draft-ietf-netext-pmip-lr-10 (work in progress), May 2012.[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC5213] Gundavelli, S., Leung, K., Devarapalli, V., Chowdhury, K., and B. Patil, "Proxy Mobile IPv6", RFC 5213, August 2008. [RFC5447] Korhonen, J., Bournelle, J., Tschofenig, H., Perkins, C., and K. Chowdhury, "Diameter Mobile IPv6: Support for Network Access Server to Diameter Server Interaction", RFC 5447, February 2009. [RFC5779] Korhonen, J., Bournelle, J., Chowdhury, K., Muhanna, A., and U. Meyer, "Diameter Proxy Mobile IPv6: Mobile Access Gateway and Local Mobility Anchor Interaction with Diameter Server", RFC 5779, February 2010. [RFC5844] Wakikawa, R. and S. Gundavelli, "IPv4 Support for Proxy Mobile IPv6", RFC 5844, May 2010. [RFC6705] Krishnan, S., Koodli, R., Loureiro, P., Wu, Q., and A. Dutta, "Localized Routing for Proxy Mobile IPv6", RFC 6705, September 2012. [RFC6733] Fajardo, V., Arkko, J., Loughney, J., and G. Zorn, "Diameter Base Protocol", RFC 6733, October 2012. [RFC7155] Zorn, G., Ed., "Diameter Network Access Server Application", RFC 7155, April 2014. 10.2. Informative References [RFC6279] Liebsch, M., Jeong, S., and Q. Wu, "Proxy Mobile IPv6 (PMIPv6) Localized Routing Problem Statement", RFC 6279, June 2011. Authors' Addresses Glen Zorn Network Zen 227/358 Thanon Sanphawut Bang Na, Bangkok 10260 Thailand Phone: +66 (0) 87-040-4617Email:EMail: glenzorn@gmail.com Qin Wu Huawei Technologies Co., Ltd. 101 Software Avenue, Yuhua District Nanjing, Jiangsu21001210012 China Phone:+86-25-84565892 Email: sunseawq@huawei.com+86-25-56623633 EMail: bill.wu@huawei.com Jouni KorhonenNokia Siemens Networks Linnoitustie 6 Espoo FI-02600,Broadcom Porkkalankatu 24 FIN-00180 Helsinki FinlandEmail:EMail: jouni.nospam@gmail.com