Diameter is an authentication, authorization, and accounting protocol for computer networks. The Diameter base protocol is defined by RFC ( Obsoletes: RFC ) and .. RFC , Diameter Network Access Server Application. RFC (part 1 of 4): Diameter Network Access Server Application. Diameter Network Access Server Application (NASREQ, RFC ). • Diameter Base Accounting (RFC ). • Diameter Extensible Authentication Protocol.
|Published (Last):||11 September 2006|
|PDF File Size:||3.11 Mb|
|ePub File Size:||10.12 Mb|
|Price:||Free* [*Free Regsitration Required]|
Received answers that do not match a known Hop-by-Hop Identifier are ignored by the Diameter agent. Views Read Edit View history.
The Hop-by-Hop Identifier is an unsigned bit integer field in network byte order that is used to match the requests with their answers as the same value in the request is used in the response.
In this sense, this document extends the Base Diameter protocol.
Diameter is used for many different interfaces defined by the 3GPP standards, with each interface typically defining new commands and attributes. If cleared, viameter message is an answer.
First, this document describes the operation of a Diameter NAS application. Additionally, application specific state machines can be introduced either later or at a higher abstraction layer.
As a result, service cannot be started as a result of a response to an authorization-only request without introducing a significant security vulnerability. The Diameter protocol defines a policy protocol used by clients to perform policy, AAA, and resource control. This field indicates the version rcf the Diameter Base Protocol.
RFC – part 1 of 4
The ” T ” Potentially re-transmitted message bit — This flag is set after a link failover procedure, to aid the removal of duplicate requests. Diameter Session Reauthentication or Reauthorization.
The End-to-End Identifier is not modified by Diameter agents of any kind, and the same value in the corresponding request is used in the answer.
Please refer to the current edition of the “Internet Official Protocol Standards” STD 1 for the standardization state and status of this protocol. It belongs to the application layer protocols in the internet protocol suite.
Retrieved 12 October VPN Virtual Private Network – In this document, this term is used to describe access services that use tunneling methods. Dfc Request for Comments: From Wikipedia, the free encyclopedia.
Table of Contents 1. Any explicit references within that referenced document should also be listed: Messages with the “E” bit set are commonly referred to as error messages. When creating a request, the End-to-End Identifier is set to a locally unique value. This is achieved by including the RADIUS attribute space to eliminate the need to perform many attribute translations. Diameter Network Access Diammeter Application.
ITU-T A.5 reference justification
The Message Length field indicates the length of the Diameter message in bytes, including the header fields and the padded AVPs. The authorization AVPs are further broken down by service type. Feedback Contact Us Accessibility.
This will ensure that any resources maintained on the servers are freed appropriately.
Retrieved 30 April Initial deployments of the Diameter protocol are expected to include legacy systems. Depending on the Auth-Request-Type AVP, the Diameter protocol allows authorization-only requests that contain no authentication information from the client. Diameter Session Termination When rcf NAS receives an indication that a user’s session is being disconnected by the client e.
Relationship with other existing or emerging documents:. Justification for the specific reference:.
A Command Code is used to determine the action that is to be taken for a particular message. Diameter is an authentication, authorization, and accounting protocol for computer networks.
Standards Track Cisco Systems Inc. After that the transport connection can be disconnected. If cleared, the message MUST be locally processed. The Diameter protocol requires that relaying and proxying agents maintain transaction state, which is used for failover purposes. It is set when resending requests not yet acknowledged as an indication of a possible duplicate due to a link failure.
This capability goes beyond the Call Check capabilities described in section 5.
This page was last edited on 19 Octoberat Network Working Group P. When set the AVP Code belongs to the specific vendor code address space. Clear description of the referenced document:.
Any explicit references within that referenced document should also be listed:.