Diameter is an authentication, authorization, and accounting protocol for computer networks. The Diameter base protocol is defined by RFC ( Obsoletes: RFC ) and .. RFC , Diameter Network Access Server Application. RFC (part 1 of 4): Diameter Network Access Server Application. Diameter Network Access Server Application (NASREQ, RFC ). • Diameter Base Accounting (RFC ). • Diameter Extensible Authentication Protocol.
|Published (Last):||25 December 2005|
|PDF File Size:||5.46 Mb|
|ePub File Size:||16.14 Mb|
|Price:||Free* [*Free Regsitration Required]|
Other for any supplementary information:. Comments on RFCs and corresponding changes are accommodated through the existing standardization process.
Information on RFC » RFC Editor
A Command Code is used to determine the action that is to be taken for a particular message. Diameter Session Termination When a NAS receives an indication that a user’s session is being disconnected by the client e. Committed to connecting the world.
The name is a play on words, derived from the RADIUS protocol, which is the predecessor a diameter is twice the radius. You can help by adding to it.
It is set when resending requests not yet acknowledged as an indication of a possible duplicate due to a link failure. These are session identification, authentication, authorization, tunneling, and accounting. Information about the call, the identity of the user, and the user’s authentication information are packaged into a Diameter AA-Request AAR message and sent to a server.
Diameter Applications can extend the base protocol by adding new commands, attributes, or both. Views Read Edit View history. The RFC defines a core state machine for maintaining connections between peers and processing messages. The degree of stability or maturity of the document:.
The packet consists of a Diameter header and a variable number of Attribute-Value Pairs, or AVPs, for encapsulating information relevant to the Diameter message. Clear description of the referenced document:. Transaction state implies that upon forwarding a request, its Hop-by-Hop Identifier is saved; the field is replaced with a locally unique identifier, which is restored to its original value when the corresponding answer is received.
This allows a single server to handle policies for many services. Depending on the Auth-Request-Type AVP, the Diameter protocol allows authorization-only requests that contain no authentication information from the client. Diameter Relay and redirect agents must not reject messages with unrecognized AVPs.
Relationship with other existing or emerging documents: The Diameter protocol requires that relaying and proxying agents maintain transaction state, which is used for failover purposes. Application-ID is used to identify for which Diameter application the message is applicable.
This section needs expansion. Justification for the specific reference:. The End-to-End Identifier is not diameterr by Diameter agents of any kind, and the same value in the corresponding request is used in the answer. Other for any supplementary information: Received answers that diaeter not match a known Hop-by-Hop Identifier are ignored by the Diameter agent.
Diameter Network Access Server Application. Initial deployments of the Diameter protocol are expected to include legacy systems. The server will respond with an AAA message to specify the new service parameters.
The Diameter protocol was initially developed by Pat R. The End-to-End Identifier is an unsigned bit integer field in network byte order that is used to detect duplicate messages along with the combination of the Origin-Host AVP. Obsolete RFCs are indicated with strikethrough text. The Diameter protocol defines a policy protocol used by clients to perform policy, AAA, and resource control. Additionally, the following terms and acronyms are used in this application: Adding a new optional AVP does not require a new application.
Standards Track Cisco Systems Inc.
ITU-T work programme
Then it defines the Diameter message Command-Codes. Network Working Group P. Justification for the specific reference: VPN Virtual Private Network – In this document, this term is used to describe access services that use tunneling methods.
Current information, if any, about IPR issues:.
RFC – Diameter Network Access Server Application
As ofthe only value supported is 1. If cleared, the message MUST be locally processed. Distribution of this memo is unlimited. Clear description of the referenced document: This capability goes beyond the Call Check capabilities described in section 5. Additionally, application specific state machines can be introduced either later or at a higher abstraction layer. The ” E ” Error bit — If set, the message contains a protocol error, and the message will not conform to the CCF described for this command.
This will ensure that any resources maintained on the servers are freed appropriately.
The ” T ” Potentially re-transmitted message bit — This flag is set after a link failover procedure, dlameter aid the removal of duplicate requests.
Other useful information describing the “Quality” of the document: