Diameter is an authentication, authorization, and accounting protocol for computer networks. The Diameter base protocol is defined by RFC ( Obsoletes: RFC ) and .. RFC , Diameter Network Access Server Application. RFC (part 1 of 4): Diameter Network Access Server Application. Diameter Network Access Server Application (NASREQ, RFC ). • Diameter Base Accounting (RFC ). • Diameter Extensible Authentication Protocol.
|Published (Last):||5 March 2010|
|PDF File Size:||1.81 Mb|
|ePub File Size:||20.53 Mb|
|Price:||Free* [*Free Regsitration Required]|
Retrieved from fiameter https: The ” T ” Potentially re-transmitted message bit — This flag is set after rfx link failover procedure, to aid the removal of duplicate requests.
Some common Diameter commands defined in the protocol base and applications are:. Depending on the Auth-Request-Type AVP, the Diameter protocol allows authorization-only requests that contain no authentication information from the client.
Application-ID is used to identify for which Diameter application the message is applicable. Committed to connecting the world.
Diameter (protocol) – Wikipedia
It is set when resending requests not yet acknowledged as an indication of a possible duplicate due to a link failure. Archived from the original on 4 July Diameter is used for many different interfaces defined by rc 3GPP standards, with each interface typically defining new commands and attributes. The server will respond dimaeter an AAA message to specify the new service parameters. Other for any supplementary information: You can help by adding to it. Current information, if any, about IPR issues: The ” R ” Request bit — If set, the message is a request.
Diameter Session Termination When a NAS receives an indication that a user’s session is being disconnected by the client e. Information about the call, the identity of the user, and the user’s authentication information are packaged into a Diameter AA-Request AAR message and sent to a server. Standards Track Cisco Systems Inc.
All RFCs always remain available on-line. These are session identification, authentication, authorization, tunneling, and accounting. The packet consists of a Diameter header and a variable number of Attribute-Value Pairs, or AVPs, for encapsulating information relevant to the Diameter message.
This will ensure that any resources maintained on the servers are freed appropriately. Views Read Edit View history. The degree of stability or maturity of the document: Diaameter a new optional AVP does not require a new application.
ITU-T work programme
The service may be a network connection or a value-added service such as terminal emulation [ NASModel ]. In this sense, this document extends the Base Diameter protocol. If an AVP with the ” M ” bit set is received by a Diameter client, server, proxy, or translation agent and either the AVP or its value is unrecognized, the message must be rejected.
The values are for permanent, standard commands allocated by IANA. Transaction state implies that upon forwarding a request, its Hop-by-Hop Identifier is saved; the field is replaced with a locally unique identifier, which is restored to its original value when the corresponding answer is received. The RFC defines a core state machine for maintaining connections between peers and processing messages.
Relationship with other existing or emerging documents: It belongs to the application layer protocols in the internet protocol suite.
A request for authorization will include some AVPs defined in section 6. The degree of stability or maturity of the document:.
If cleared, the message MUST be locally processed. Comments on RFCs and corresponding changes are diamfter through the existing standardization process. The failure of a reauthentication exchange will terminate the service.
For example, for pre-paid services, the Diameter server that originally authorized a session may need some confirmation that the user is still using the services. Additionally, application specific state machines can be introduced either later or at a higher abstraction layer. VPN Virtual Private Network – In this document, this term is used to describe access services that use tunneling methods. Table of Contents 1.