1、 TIA-1050.200-A October 2011cdma2000Packet Data Services: Wireless Local Area Network (WLAN) Interworking Revision A Access to Operator Service and Mobility for WLAN Interworking NOTICE TIA Engineering Standards and Publications are designed to serve the public interest through eliminating misunders
2、tandings between manufacturers and purchasers, facilitating interchangeability and improvement of products, and assisting the purchaser in selecting and obtaining with minimum delay the proper product for their particular need. The existence of such Standards and Publications shall not in any respec
3、t preclude any member or non-member of TIA from manufacturing or selling products not conforming to such Standards and Publications. Neither shall the existence of such Standards and Publications preclude their voluntary use by Non-TIA members, either domestically or internationally. Standards and P
4、ublications are adopted by TIA in accordance with the American National Standards Institute (ANSI) patent policy. By such action, TIA does not assume any liability to any patent owner, nor does it assume any obligation whatever to parties adopting the Standard or Publication. This Standard does not
5、purport to address all safety problems associated with its use or all applicable regulatory requirements. It is the responsibility of the user of this Standard to establish appropriate safety and health practices and to determine the applicability of regulatory limitations before its use. (From Proj
6、ect No. 3-0174.200-RV1, formulated under the cognizance of the TIA TR-45 Mobile (b) there is no assurance that the Document will be approved by any Committee of TIA or any other body in its present or any other form; (c) the Document may be amended, modified or changed in the standards development o
7、r any editing process. The use or practice of contents of this Document may involve the use of intellectual property rights (“IPR”), including pending or issued patents, or copyrights, owned by one or more parties. TIA makes no search or investigation for IPR. When IPR consisting of patents and publ
8、ished pending patent applications are claimed and called to TIAs attention, a statement from the holder thereof is requested, all in accordance with the Manual. TIA takes no position with reference to, and disclaims any obligation to investigate or inquire into, the scope or validity of any claims o
9、f IPR. TIA will neither be a party to discussions of any licensing terms or conditions, which are instead left to the parties involved, nor will TIA opine or judge whether proposed licensing terms or conditions are reasonable or non-discriminatory. TIA does not warrant or represent that procedures o
10、r practices suggested or provided in the Manual have been complied with as respects the Document or its contents. If the Document contains one or more Normative References to a document published by another organization (“other SSO”) engaged in the formulation, development or publication of standard
11、s (whether designated as a standard, specification, recommendation or otherwise), whether such reference consists of mandatory, alternate or optional elements (as defined in the TIA Engineering Manual, 4thedition) then (i) TIA disclaims any duty or obligation to search or investigate the records of
12、any other SSO for IPR or letters of assurance relating to any such Normative Reference; (ii) TIAs policy of encouragement of voluntary disclosure (see Engineering Manual Section 6.5.1) of Essential Patent(s) and published pending patent applications shall apply; and (iii) Information as to claims of
13、 IPR in the records or publications of the other SSO shall not constitute identification to TIA of a claim of Essential Patent(s) or published pending patent applications. TIA does not enforce or monitor compliance with the contents of the Document. TIA does not certify, inspect, test or otherwise i
14、nvestigate products, designs or services or any claims of compliance with the contents of the Document. ALL WARRANTIES, EXPRESS OR IMPLIED, ARE DISCLAIMED, INCLUDING WITHOUT LIMITATION, ANY AND ALL WARRANTIES CONCERNING THE ACCURACY OF THE CONTENTS, ITS FITNESS OR APPROPRIATENESS FOR A PARTICULAR PU
15、RPOSE OR USE, ITS MERCHANTABILITY AND ITS NONINFRINGEMENT OF ANY THIRD PARTYS INTELLECTUAL PROPERTY RIGHTS. TIA EXPRESSLY DISCLAIMS ANY AND ALL RESPONSIBILITIES FOR THE ACCURACY OF THE CONTENTS AND MAKES NO REPRESENTATIONS OR WARRANTIES REGARDING THE CONTENTS COMPLIANCE WITH ANY APPLICABLE STATUTE,
16、RULE OR REGULATION, OR THE SAFETY OR HEALTH EFFECTS OF THE CONTENTS OR ANY PRODUCT OR SERVICE REFERRED TO IN THE DOCUMENT OR PRODUCED OR RENDERED TO COMPLY WITH THE CONTENTS. TIA SHALL NOT BE LIABLE FOR ANY AND ALL DAMAGES, DIRECT OR INDIRECT, ARISING FROM OR RELATING TO ANY USE OF THE CONTENTS CONT
17、AINED HEREIN, INCLUDING WITHOUT LIMITATION ANY AND ALL INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, LITIGATION, OR THE LIKE), WHETHER BASED UPON BREACH OF CONTRACT, BREACH OF WARRANTY, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY
18、OR OTHERWISE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE FOREGOING NEGATION OF DAMAGES IS A FUNDAMENTAL ELEMENT OF THE USE OF THE CONTENTS HEREOF, AND THESE CONTENTS WOULD NOT BE PUBLISHED BY TIA WITHOUT SUCH LIMITATIONS. X.S0028-200-A v1.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 1
19、9 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 i ContentsDocument Title: Access to Operator Services and Mobility for WLAN Interworking CONTENTS 1 Introduction1 1.1 Scope1 2 References2 2.1 Normative References2 2.2 Inform
20、ative References4 3 Definitions, Symbols and Abbreviations5 3.1 Definitions .5 3.2 Symbols and Abbreviations .5 4 Architecture7 4.1 Reference Model7 4.2 Network Entities 8 4.3 Interfaces9 5 IP Connectivity for WLAN cdma2000 IP Access10 5.1 General.10 5.2 Tunnel Management Procedures10 5.2.1 Discover
21、y and Selection of a Remote Tunnel Endpoint10 5.2.2 Tunnel Establishment 10 5.2.3 Tunnel Disconnection14 5.3 Authentication and Authorization19 5.3.1 Authentication Procedures.19 5.4 Mobility Management Procedures.35 5.4.1 General 35 5.4.2 Usage of Mobile IPv435 5.4.3 Usage of Mobile IPv638 5.4.4 Bo
22、otstrapping Mechanisms .40 5.5 Timers43 5.6 IPv4-IPv6 Dual Stack Operation43 6 cdma2000 Packet Data Service Provision45 6.1 General.45 6.2 MMD Service Provision Considerations .45 6.3 BCMCS Service Provision Considerations45 7 Diameter Considerations47 7.1 AVPs47 7.2 Result-Code AVP Values 50 7.2.1
23、Permanent Failures 50 7.3 Diameter AVPs for Authentication and Authorization 50 X.S0028-200-A v1.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 Contents ii 7.4 Diameter AVPs
24、for Session Termination and Abort51 8 RADIUS Considerations 52 8.1 3GPP2 Vendor-Specific Attributes (VSA) 52 8.2 RADIUS Attributes for Authentication and Authorization54 9 Accounting .57 9.1 General.57 9.2 PDIF Procedures 57 9.2.1 RADIUS Support.57 9.2.2 Diameter Support.57 9.3 RADIUS Attributes for
25、 Accounting.58 9.4 Diameter AVPs for Accounting.60 10 Appendix Call Flow Examples (Informative) .63 10.1 MIPv4 FA CoA with Dynamic HA and HoA Assignment 63 10.2 MIPv4 Collocated CoA with Dynamic HA and HoA Assignment65 X.S0028-200-A v1.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
26、 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 iii List of FiguresLIST OF FIGURES Figure 1 Reference model for WLAN Interworking Scenario 3 .7 Figure 2 Reference model for WLAN Interworking Scenario 4 .8 Figure 3 Tunnel establishment flow
27、11 Figure 4 Tunnel Disconnection FLow 15 Figure 5 Tunnel Establishment Flow for EAP AKA.20 Figure 6 Tunnel Establishment Flow for EAP TLS 23 Figure 7 Tunnel Establishment Flow for using CAVE on 2G R-UIM with EAP-AKA .26 Figure 8 Multiple-Authentication for Single IKEv2 Session 28 Figure 9 Multiple-A
28、uthentication for Multiple IKEv2 Sessions.30 Figure 10 HA-Request VSA .52 Figure 11 HA-Authorized VSA 52 Figure 12 IP-Version-Authorized VSA.53 Figure 13 MIPv4-Mesg-ID VSA 54 Figure 14 MIPv4 MS using FA CoA and requesting for dynamic HA and HoA63 Figure 15 MIPv4 using Collocated CoA mode and request
29、ing for dynamic HA and HoA 65 X.S0028-200-A v1.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 List of Tables iv LIST OF TABLES Table 1 New IKEv2 CP attributes for MIP41 Table
30、 2 Diameter cdma2000 WLAN Interworking AVPs.49 Table 3 List of Diameter for Authentication and Authorization 51 Table 4 List of RADIUS Attributes for Authentication and Authorization .55 Table 5 Supported RADIUS Attributes for Accounting 59 Table 6 Supported Diameter AVPs for Accounting.61 X.S0028-2
31、00-A v1.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 v Revision HistoryREVISION HISTORY Revision Date Remarks X.S0028-200-0 v1.0 Feburuary 16, 2007 Initial publication X.S0
32、028-200-A v1.0 June 16, 2008 Revision A publicaiton X.S0028-200-A v1.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 Foreword vi FOREWORD (This foreword is not part of this St
33、andard.) This document was prepared by 3GPP2 TSG-X. This version of document additionally supports the following new features: 2G R-UIM support for authentication Multiple-Authentication SBBC This document is part of a multi-part document consisting of multiple parts that together describes cdma2000
34、 Wireless Local Area Network Interworking. This document is subject to change following formal approval. Should this document be modified, it will be re-released with a change of release date and an identifying change in version number as follows: X.S0028-200-X version n.0 where: X an uppercase nume
35、rical or alphabetic character 0, A, B, C, that represents the revision level. n a numeric string 1, 2, 3, that indicates a point release level. This document uses the following conventions: “Shall” and “shall not” identify requirements to be followed strictly to conform to this document and from whi
36、ch no deviation is permitted. “Should” and “should not” indicate that one of several possibilities is recommended as particularly suitable, without mentioning or excluding others, that a certain course of action is preferred but not necessarily required, or that (in the negative form) a certain poss
37、ibility or course of action is discouraged but not prohibited. “May” and “need not” indicate a course of action permissible within the limits of the document. “Can” and “cannot” are used for statements of possibility and capability, whether material, physical or causal. X.S0028-200-A v1.0 1 2 3 4 5
38、6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 1.1 Scope 1 1 Introduction1 Introduction This document defines the procedures for the support of cdma20001IP data connectivity and mobility
39、 in Wireless Local Area Network (WLAN) Interworking for cdma2000 networks. These procedures correspond to scenarios 3 and 4 as described in WLAN Interworking Stage 1 Requirements 20. 1.1 Scope The main objective of this document is to provide secure access to the cdma2000 packet data services and in
40、ter/intra access mobility to cdma2000 users via a WLAN system operated by a cdma2000 operator or by a WLAN System operator who has a business relationship with one or more cdma2000 operators. 1lcdma2000 is the trademark for the technical nomenclature for certain specifications and standards of the O
41、rganizational Partners (OPs) of 3GPP2. Geographically (and as of the date of publication), cdma2000 is a registered trademark of the Telecommunications Industry Association (TIA-USA) in the United States.” X.S0028-200-A v1.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
42、29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 2 References 2 2.1 Normative References2 References 2.1 Normative References This section provides references to other specifications and standards that are necessary to implement this document. 1 IEEE 80
43、2.11: IEEE Std 802.11 (1999): “Standard for Information Technology - Telecommunications and information exchange between systems - Local and Metropolitan Area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications“. 2 IETF: RFC 33
44、44, Perkins, IP Mobility Support for IPv4, August 2002. 3 IETF: RFC 3775, D. Johnson, C.Perkins, J. Arkko, Mobility Support in IPv6, June 2004. 4 IETF: RFC 1035, P. Mockapetris, DOMAIN NAMES - IMPLEMENTATION AND SPECIFICATION, November 1987. 5 IETF: RFC 1123, R. Braden, Requirements for Internet Hos
45、ts - Application and Support, October 1989. 6 IETF: RFC 2865, C. Rigney, Remote Authentication Dial In User Service (RADIUS), June 2000. 7 IETF: RFC 2866, C. Rigney, RADIUS Accounting, June 2000. 8 IETF: RFC 3576, M. Chiba, G. Dommety, M. Eklund, Dynamic Authorization Extensions to Remote Authentica
46、tion Dial In User Service (RADIUS), July 2003. 9 IETF: RFC 3579, B. Aboba, RADIUS (Remote Authentication Dial In User Service), Support For Extensible Authentication Protocol (EAP), September 2003. 10 IETF: RFC 3588, P. Calhoun, Diameter Base Protocol, September 2003. 11 IETF: RFC 4072, P. Eronen, D
47、iameter Extensible Authentication Protocol (EAP) Application, August 2005. 12 IETF: RFC 4005, P. Calhoun, G. Zorn, Diameter Network Access Server Application, August 2005. 13 IETF: RFC 3948, A. Huttunen, et. al., UDP Encapsulation of IPsec ESP Packets, January 2005. 14 IETF: RFC 2716, B. Aboba, et.
48、al., PPP EAP TSL Authentication Protocol, October 1999. 15 3GPP2: S.S0055-A v3.0, Enhanced Cryptographic Algorithm, October 2005. 16 IETF: RFC 4306, Charlie Kaufman, Internet Key Exchange (IKEv2) Protocol. December 2005. X.S0028-200-A v1.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
49、24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 2.1 Normative References 3 2 References17 IETF: RFC 2406, S. Kent, IP Encapsulating Security Payload (ESP), November 1998. 18 IETF: RFC4555, P. Eronen, IKEv2 Mobility and Multihoming Protocol (MOBIKE), June 2006. 19 IETF: RFC 4187, J. Arko, Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA), January 2006. 20 3GPP2: S.R0087-A v1.0, cdma200