The MIP tab is used to define the attributes for Mobile IP Registration Request (RRQ) messages, and is available in the following CDMA2000, Mobile IPv4 and WiMAX Forum test cases:
CSN Nodal (In the CSN Nodal Test Case, when Simple IP and WiMAX Forum Version 1.5.0 is selected, the MIP tab doesn't display).
PGW Nodal test cases, when you select NEMO Emulation, configure all Mobile Router configuration information.
|
|
|
|
|
|
|
||
|
||
|
||
Measurements collected for Mobile IP related processing are reported on the Mobile IP report tab.
NOTE: In the PGW Nodal test, Tcl Parameters will prefix with PiMip when MIP Tab is used in the PI-MIP Interface. |
Simultaneous Bindings | Use the checkbox to request simultaneous bindings on an HA SUT or to permit simultaneous bindings with an HA emulator. When enabled, you can specify whether they must be used (Mandatory) or may be used (Requested) with the drop-down list. Options: Requested or Mandatory Default: Requested Tcl Parameter: MipReqSimulBindingsEnabled Tcl Parameter: PiMipReqSimulBindingsEnabled |
|||||||||
Request Broadcast Datagrams | Use the checkbox to request broadcast datagrams in the MIP RRQ message. Tcl Parameter: MipReqBcastDatagramEnable Tcl Parameter: PiMipReqBcastDatagramEnable |
|||||||||
Encapsulation Mode | Use the drop-down list to select the IP layer encapsulation that will be used to tunnel traffic between an MN or FA and an HA.
Options: Default: IP/IP Tcl Parameters:
|
|||||||||
Reverse Tunnel | Use the checkbox to enable the reverse tunnel CDMA2000 or Mobile IPv4 configuration. When enabled, you can specify whether the configuration must be used (Mandatory) or may be used (Allowed) with the drop-down list.
Options: Mandatory or Allowed Default: Mandatory Tcl Parameter: MipReverseTunnelEnable Tcl Parameter: PiMipReverseTunnelEnable |
|||||||||
Broadcast Home Agent Address | This is an option to set the "Home Agent Address" field of "Registration Request Message" to "255.255.255.255". If this option is not enabled, the "Home Agent Address" field of "Registration Request Message" will be configured by the "Home Agent Address", normally this is the destination IP address of "Registration Request Message". Tcl Parameter: MipBroadCastHaAddr |
|||||||||
HA Lifetime | The number of seconds a session is maintained without a Re-registration Request. Enter 65535 to disable the lifetime timer.
Range: 1 — 65535 Default: 65535 Tcl Parameter: MipHaLifetime Tcl Parameter: PiMipHaLifetime |
|||||||||
Re-registration | Use the checkbox to enable Re-registration Requests. When enabled, you can define when the request is sent. Time Prior to Lifetime — The number of seconds prior to the expiration of the lifetime timer to send the Re-registration Request. Range: 0 — 100 Default: 20 Tcl Parameters:
Related Measurements |
|||||||||
Mobile Node De-registration | Use the checkbox to allow the MN to de-register all care-of addresses when it returns to its home network. An RRQ with a Lifetime of 0 and with a Care of Address and Source IP Address that both equal the MN's home address identifies a de-registration request. Tcl Parameter: MipMNDeregistrationEnabled Tcl Parameter: PiMipMNDeregistrationEnabled Related Measurements |
|||||||||
Retries and Initial Retry Interval | Tcl Parameters:
See Retries. |
|||||||||
Max Number of Router Prefixes | Available in HA Node, test case, indicates the maximum number of router prefixes supported. (Used in conjunction with PGW Nodal Test Case, when NEMO Emulation is selected) Option: 0 - 16 Default: 0 Tcl Parameter: MipMaxRouterPrefixes Tcl Parameter: PiMipMaxRouterPrefixes |
|||||||||
Proprietary Extensions | Tcl Parameter: MipExtEn |
|||||||||
RFC 3344 | Use the checkbox to enable either RFC 3344 (Checked) or RFC 2002 (Cleared) conformance. See RFC 3344, Section G. Changes since RFC 2002 for specific information on the differences between these options. Default: Checked Tcl Parameter: Rfc3344Enabler Tcl Parameter: PiRfc3344Enabler |
|||||||||
MN-NAI Extension | Defines the NAI used in the registration messages to identify the MN. You can use a static NAI for all MN nodes, or configure unique extension values with the Auto-Increment feature. In the Mobile IPv4 test cases, the extension is optional. Check the MN-NAI Extension box to include the extension in registration messages.
Range: N/A Default: N/A Tcl Parameters:
Related MeasurementsAn emulated HA will reject registration requests received with an invalid NAI extension and will reply with an error code value of 129. These errors are reported on the Mobile IP and Open RP tabs as HA Admin Prohibited (129). |
|||||||||
MN-FA Challenge Size | The number of bytes to use in the CHAP challenge.
Range: 4 — 255 Default: 4 Tcl Parameters:
|
|||||||||
PMIPv4 Device Id Extension | Select this parameter to support Device ID extension in the R3 MIP Registration Request (MIP RRQ) that holds the MSID/MAC address. Tcl Parameter: MipDeviceIdExtensionEnable Tcl Parameter: PiMipDeviceIdExtensionEnable |
|||||||||
Revocation Support Extension | When a test case supports the MIP Revocation test activity, you can include the Revocation Support Extension (RSE) in Registration Request messages sent by an FA node, or in Registration Reply messages sent by an HA node, by checking this box. This allows revocations to be processed before the session has been completely established. (RFC3543) Tcl Parameter: MipRseFladEnabler Tcl Parameter: PiMipRseFladEnabler
|
|||||||||
Access Technology Type Extension | In CDMA WiMAX Convergence testing, select the Access technology Type Extension checkbox to include it in the MIP Registration Requests. This is mainly to support Session Loading with Mobility. |
|||||||||
Inform Mobile Node | Use the Inform Mobile Node checkbox to allow the CSN to be involved in determining whether the mobile node should be informed of the revocation. When the box is cleared, the FA determines, based on its own provisioning, whether the mobile node should be informed of the revocation. Tcl Parameter: MipIBitEnable Tcl Parameter: PiMipIBitEnable |
|||||||||
AAA Authentication | Use the AAA Authentication checkbox to specify Authentication, Authorization, and Accounting values for the mobile node. Use the MIP Authentication parameters to configure the SPI, Secret, and Algorithm for the authentication extensions in the RRQ message. When a type of authentication is optional, a checkbox is presented that allows you to include or exclude that type of authentication. The following types of authentication are used with MIP: Tcl Parameter: MobileNodeAAAAuthEnabler Tcl Parameter: PiMobileNodeAAAAuthEnabler |
|||||||||
MN-AAA-SPI | The Security Parameter Index identifies a security context between two peers.
Range: N/A Default: 1000 (0 255 are reserved) Tcl Parameter: MipAaaSpi Tcl Parameter: PiMipAaaSpi |
|||||||||
MN-AAA-Secret | The secret code to be used in the extension. You can use one of three formats to provision the code:
Range: N/A Default: secret Tcl Parameter: MipAaaSecret Tcl Parameter: PiMipAaaSecret |
|||||||||
AAA Authentication Algorithm | The encryption algorithm specified in the extension. These options vary by test case.
Options: MD5 Authentication or HMAC Authentication Default: MD5 Authentication
Options: HMAC Authentication or Radius AAA Authentication Default: Radius AAA Authentication
Options: MD5 Authentication or HMAC Authentication Default: MD5 Authentication
Options: MD5 Authentication or HMAC Authentication Default: MD5 Authentication Tcl Parameter: MipAaaAuthType Tcl Parameter: PiMipAaaAuthType |
|||||||||
HMAC Authentication | Use the HMAC Authentication method to Hash Message Authentication Code (HMAC), a type of authentication using a cryptographic hash. |
|||||||||
Mobile Home Authentication | Use the Mobile Home Authentication checkbox to authenticate a Home Agent. A Home Agent is a routing device located on the local network of the mobile access router. It provides physical connection for the mobile networks. The Home Agent associates the home IP address of the mobile access router with the address of its current location on a remote network, known as its care-of address. The home agent tracks the location of the mobile access router roams so that the user does not need to reinitialize applications. The Home Agent also stores addresses in its routing table of the locations where the mobile access router travels. The HA emulator simulates a Home Agent when an HA SUT is not used. The following types of mobile home authentication are used with MIP: Tcl Parameter: MobileHomeAuthEnabler Tcl Parameter: PiMobileHomeAuthEnabler |
|||||||||
MN-HA SPI | The Security Parameter Index identifies a security context between two Home Agent peers.
Range: N/A Default: 1000 (0 255 are reserved) Tcl Parameter: MipHaSpi Tcl Parameter: PiMipHaSpi |
|||||||||
MN-HA Secret | The secret code to be used in the extension. You can use one of three formats to provision the code:
Range: N/A Default: secret Tcl Parameter: MipHaSecret Tcl Parameter: PiMipHaSecret |
|||||||||
HA Authentication Algorithm | An HA node requires authentication. Two types of HA authentication are available: Options: MD5 Authentication or HMAC Authentication Default: MD5 Authentication Tcl Parameter: MipHaAuthType Tcl Parameter: PiMipHaAuthType |
|||||||||
FA Authentication | A Foreign Agent (FA) is a routing device on a non-local network that supports the mobile access router to indicate the address of its current location on a remote network, known as its care-of address. It functions as the connection point to the mobile access router, acting as a conduit of packets tramsferred from the HA to the mobile access router. The FA is a stationary router with a direct logical connection to the mobile access router. The mobile access router and Foreign Agent do not need to be connected directly by a wireless link. For example, if the mobile access router is roaming, the foreign agent connection with the mobile access router can exist on interfaces that are not on the same subnetwork. An FA Node requires authentication. The following types of FA authentication are used with MIP: |
|||||||||
MN-FA SPI | The Security Parameter Index identifies a security context between two Foreign Agent peers.
Range: N/A Default: 1000 (0 255 are reserved) Tcl Parameter: MipFaSpi Tcl Parameter: PiMipFaSpi |
|||||||||
MN-FA Secret | The secret code to be used in the extension. You can use one of three formats to provision the code:
Range: N/A Default: secret Tcl Parameter: MipFaSecret Tcl Parameter: PiMipFaSecret |
|||||||||
FA Authentication Algorithm | A FA node requires authentication. Two types of FA authentication are available: Options: MD5 Authentication or HMAC Authentication Default: MD5 Authentication Two types of authentication are available: Options: MD5 Authentication or HMAC Authentication Default: MD5 Authentication Tcl Parameter: MipFaAuthType Tcl Parameter: PiMipFaAuthType |
|||||||||
FA-HA Authentication | Devices emulating a FA and HA Node requires authentication. The following types of FA-HA authentication are used with MIP: Tcl Parameter: ForeignHomeAuthEnabler Tcl Parameter: PiForeignHomeAuthEnabler |
|||||||||
FA-HA SPI | The Security Parameter Index identifies a security context between a Foreign Agent and Home Agent.
Range: N/A Default: 1000 (0 255 are reserved) Tcl Parameter: MipFaHaSpi Tcl Parameter: PiMipFaHaSpi |
|||||||||
FA-HA Secret | The secret code to be used in the extension. You can use one of three formats to provision the code:
Range: N/A Default: secret Tcl Parameter: MipFaHaSecret Tcl Parameter: PiMipFaHaSecret |
|||||||||
FA-HA Authentication Algorithm | A FA node requires authentication. Two types of FA authentication are available: Options: MD5 Authentication or HMAC Authentication Default: MD5 Authentication Two types of authentication are available: Options: MD5 Authentication or HMAC Authentication Default: MD5 Authentication Tcl Parameter: MipFaHaAuthType Tcl Parameter: PiMipFaHaAuthType |
|||||||||
Calling Station ID Extension | The Calling Station ID in MIP RRQ is used by the PDSN/FA to send the subscriber's IMSI to HA (transfer the user information to the HA). Tcl Parameter: MipCallingIdExtEn Tcl Parameter: PiMipCallingIdExtEn Value: True/False
Tcl Parameter: MipCallingExtVendorId Tcl Parameter: PiMipCallingExtVendorId
Tcl Parameter: MipCallingExtNvseType Tcl Parameter: PiMipCallingExtNvseType
Tcl Parameter: MipCallingExtId Tcl Parameter: PiMipCallingExtId
|
|||||||||
Correlation ID Extension | The Correlation ID in MIP RRQ is used by the PDSN/FA to send current PPP session Correlation ID to the HA. See RFC 3115. Tcl Parameter: MipCorrelIdExtEn Tcl Parameter: PiMipCorrelIdExtEn Value: True/False
Tcl Parameter: MipCorrelExtVendorId Tcl Parameter: PiMipCorrelExtVendorId
Tcl Parameter: MipCorrelExtNvseType Tcl Parameter: PiMipCorrelExtNvseType
Tcl Parameter: MipCorrelExtId Tcl Parameter: PiMipCorrelExtId
|
|||||||||
WiMAX Support | Use the WiMAX Support checkbox to enable or disable the WiMAX settings and enter the key values for generation and distribution to perform operations within trusted boundaries. Tcl Parameter: MipWimaxEn MIP Root Key Enter the MIP root key for generation and distribution. Range : A maximum of 64 bytes (128 hex characters excluding 0x) Default: 0X Tcl Parameter: WimaxMipMrk HA Root Key Enter the HA root key for generation and distribution. Range : A maximum of 64 bytes (128 hex characters excluding 0x) Default: 0X |
|||||||||
Use Static Home Address | Select and a valid IPv4 or IPv6 address. Tcl Parameter:
|
|||||||||
Apply Parameters from Test Data File | Select to apply a Test Data file.
Tcl Parameter: MipCfgFileEn Tcl Parameter: PiMipCfgFileEn |
|||||||||
DMU | When DMU is supported by the SUTs in an End-to-End Mobile IP test, use the following parameters to define the MIP Key Data payload according to the provisioning on the HA SUT and the home AAA server. You can provision unique AAA Secret, HA Secret, and Chap Secret values for each MN by using the Auto-Increment format.
|
AAA Secret | The decrypted MN-AAA key. Range: N/A Default: secret Tcl Parameter: MipAaaSecret2 Tcl Parameter: PiMipAaaSecret2
|
|||||||||||||||||||||||||||||||||||||
HA Secret | The decrypted MN-AAA key. Range: N/A Default: secret Tcl Parameter: MipHaSecret2 Tcl Parameter: PiMipHaSecret2
|
|||||||||||||||||||||||||||||||||||||
MSID | The Mobile Subscriber ID. Range: N/A Default: msid12345678901 Tcl Parameter: MipMsid Tcl Parameter: PiMipMsid |
|||||||||||||||||||||||||||||||||||||
Chap Secret | The decrypted Simple IP CHAP key. Range: N/A Default: secret Tcl Parameter: MipChapSecret Tcl Parameter: PiMipChapSecret |
|||||||||||||||||||||||||||||||||||||
AAA Authenticator | The authenticator that will be received from the home AAA server. Range: 0 — 18446744073709551615 (0x0 — 0xFFFFFFFFFFFFFFFF) when Vendor Variant = None or Range: 0x0 — 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF) when Vendor Variant = AuthenticatorExt (Only Hex allowed) Default: 12345678 when Vendor Variant = None or Default: 0x12345678 when Vendor Variant = AuthenticatorExt Tcl Parameter: MipAaaAuth Tcl Parameter: PiMipAaaAuth |
|||||||||||||||||||||||||||||||||||||
Vendor Variant | Vendor Variant is used to affect the range of AAA Authenticator and MN Authenticator. If AuthenticatorExt is selected, the AAA Authenticator and MN Authenticator fields are extended to 16 bytes and only accept Hex number with 0x prefix. Options: None (default), AuthenticatorExt Tcl Parameter: DmuVendorVariant |
|||||||||||||||||||||||||||||||||||||
MN Authenticator | The authenticator that will be sent from the MN to the home AAA server. Range: 0 — 16777215 (0x0 — 0xFFFFFF) when Vendor Variant = None or Range: 0x0 — 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF) when Vendor Variant = AuthenticatorExt (Only Hex allowed) Default: 123456 when Vendor Variant = None or Default: 0x123456 when Vendor Variant = AuthenticatorExt Tcl Parameter: MipMnAuth Tcl Parameter: PiMipMnAuth |
|||||||||||||||||||||||||||||||||||||
|