Diameter is an authentication, authorization, and accounting protocol for computer networks. The Diameter base protocol is defined by RFC ( Obsoletes: RFC ) and .. RFC , Diameter Network Access Server Application. RFC (part 1 of 4): Diameter Network Access Server Application. Diameter Network Access Server Application (NASREQ, RFC ). • Diameter Base Accounting (RFC ). • Diameter Extensible Authentication Protocol.
|Published (Last):||22 June 2013|
|PDF File Size:||17.97 Mb|
|ePub File Size:||1.27 Mb|
|Price:||Free* [*Free Regsitration Required]|
The Message Length field indicates the length of the Diametef message in bytes, including the header fields and the padded AVPs. The failure of a reauthentication exchange will terminate the service. Additionally, application specific state machines can be introduced either later or at a higher abstraction layer. Diameter Session Termination When a NAS receives an indication that a user’s session is being disconnected by the client e. Current 40055, if any, about IPR issues: The service may be a network connection or a value-added service such as terminal emulation [ NASModel ].
It is possible for a single session to be authorized first and then for an authentication request to follow.
RFC – part 1 of 4
Justification for the specific reference: Other for any supplementary information: If cleared, the message MUST be locally processed. Retrieved 30 April The values are for permanent, standard commands allocated diametrr IANA. Calhoun Request for Comments: In this sense, this document extends the Base Diameter protocol. The End-to-End Identifier is not modified by Diameter agents of any kind, and the same value in the corresponding request is used in the answer.
Rfd case of redirecting agents, the Hop-by-Hop Identifier is maintained in the header as the Diameter agent responds with an answer message.
When creating a request, the End-to-End Identifier is set to a locally unique value. Depending on the Auth-Request-Type AVP, the Diameter protocol allows authorization-only requests that contain no authentication information from the client.
Network Working Group P. If authorization was requested, ciameter successful response will include the authorization AVPs appropriate for the service being provided, as defined in section 6.
Messages with the “E” bit set are commonly referred to as error messages. Clear description of the referenced document:.
It belongs to the application layer protocols in the internet protocol suite. Comments on RFCs and corresponding changes are accommodated through the existing standardization process. Any explicit references within that referenced document should also be listed: VPN Virtual Private Network – In this document, this term is used to describe access services that use tunneling methods.
For example, for pre-paid services, the Diameter server that originally authorized a session may need some confirmation that the user is still using the services.
After that the transport connection can be disconnected. The Command Codes are as follows: Committed to connecting the world. The degree of stability or maturity of the document:.
Diameter Network Access Server Application. Other useful information describing the “Quality” of the document:. The Diameter protocol defines a policy protocol used by clients to perform policy, AAA, and resource control.
This section needs expansion.
RFC – Diameter Network Access Server Application
Any explicit references within that referenced document should also be listed:. Some common Diameter commands defined in the protocol base and rfx are:. This is achieved by including the RADIUS attribute space to eliminate the need to perform many attribute translations.
You can help by adding to it.
ITU-T work programme
Obsolete RFCs are indicated with strikethrough text. These are session identification, authentication, authorization, tunneling, and accounting. First, this document describes the operation of a Diameter NAS application. This field indicates the version of the Diameter Base Protocol.
The End-to-End Identifier is an unsigned bit integer field in network byte order that is used diameeter detect duplicate messages along with the combination of the Origin-Host AVP. This page was last edited on 19 Octoberat Other for any supplementary information:. The Diameter protocol was initially developed by Pat R.
Initial deployments of the Diameter diametet are expected to include legacy systems.