Diameter is an authentication, authorization, and accounting protocol for computer networks. The Diameter base protocol is defined by RFC ( Obsoletes: RFC ) and .. RFC , Diameter Network Access Server Application. RFC (part 1 of 4): Diameter Network Access Server Application. Diameter Network Access Server Application (NASREQ, RFC ). • Diameter Base Accounting (RFC ). • Diameter Extensible Authentication Protocol.

Author: Voodoogis Kajiran
Country: Seychelles
Language: English (Spanish)
Genre: Video
Published (Last): 4 September 2013
Pages: 495
PDF File Size: 19.70 Mb
ePub File Size: 5.69 Mb
ISBN: 322-5-24911-308-7
Downloads: 43525
Price: Free* [*Free Regsitration Required]
Uploader: Necage

Comments on RFCs and corresponding changes are accommodated through the existing standardization process. This page was last edited on 19 Octoberat After that the transport connection can be disconnected. Transaction state implies that upon forwarding a request, its Hop-by-Hop Identifier is saved; the field is replaced with a locally unique identifier, which is restored to its original value when the corresponding answer is received.

The ” E rfcc Error bit — If set, the message contains a protocol error, and the message will not conform to the CCF described for this command.

Distribution of this memo is unlimited. When set the AVP Code belongs to the specific vendor code address space. This allows a single server to handle policies for many services. Current information, diamefer any, about IPR issues: Retrieved 12 October The Command Codes are as follows: Committed to connecting the world.

Diameter Session Termination When a NAS receives an indication that a user’s session is being disconnected by the client e. Calhoun Request for Comments: All RFCs always remain available on-line.


A design prior to PPP.

ITU-T work programme

Standards Track Cisco Systems Inc. It is set when resending requests not yet acknowledged as an indication of a possible duplicate due to a link failure. Clear description of the referenced document:. Feedback Contact Us Accessibility. Diameter Network Access Server Application.

The failure of a reauthentication exchange will terminate the service. This section needs expansion.

Depending on the Auth-Request-Type AVP, the Diameter protocol allows authorization-only requests that contain no authentication information from the client.

This is part of the basic protocol functionality and all stacks should support it and as such abstract from 40005 connectivity related operations. Initial deployments of the Diameter protocol are expected to include legacy systems. If an AVP with the ” M ” bit set is received by a Diameter client, server, proxy, or translation agent and either the AVP or its value is unrecognized, the message must be rejected.

Received answers that do not match a known Hop-by-Hop Identifier are ignored by the Diameter agent. This capability goes beyond the Call Check capabilities described in section 5. Additionally, application specific state machines can be introduced either later or at a higher abstraction layer.

Diameter (protocol)

The Message Length field indicates the length of the Diameter message in bytes, including the header fields and the padded AVPs. Justification for the specific reference:. VPN Virtual Private Network – In this document, this term is used to describe access services that use tunneling methods. This will ensure that any resources maintained on the servers are freed appropriately. Archived from the original on 4 July The RFC defines an authorization and an accounting state machine.


RFC – part 1 of 4

Diameter Applications can extend the base protocol by adding new commands, diametwr, or both. Clear description of the referenced document: The End-to-End Identifier is an unsigned bit integer field in network byte order that is used to detect duplicate messages along with the combination of the Origin-Host AVP. Additionally, the following terms and acronyms are used in this application: If cleared, the message is an answer.

It is possible for a single session to be authorized first and then for an authentication request to follow. The ” T ” Potentially re-transmitted message bit — This flag is set after a link failover procedure, to aid the removal of duplicate requests. The following sections list the AVPs used in these messages, grouped by common usage.

When creating a request, the End-to-End Identifier diametdr set to a locally unique value. Justification for the specific reference: Any explicit references within that referenced document should also be listed:. Messages with the “E” bit set are commonly referred to as error messages. Adding a new optional AVP does not require a new application.