Diameter is an authentication, authorization, and accounting protocol for computer networks. The Diameter base protocol is defined by RFC ( Obsoletes: RFC ) and .. RFC , Diameter Network Access Server Application. RFC (part 1 of 4): Diameter Network Access Server Application. Diameter Network Access Server Application (NASREQ, RFC ). • Diameter Base Accounting (RFC ). • Diameter Extensible Authentication Protocol.

Author: Gubei Nikolmaran
Country: Saint Kitts and Nevis
Language: English (Spanish)
Genre: Art
Published (Last): 25 October 2014
Pages: 465
PDF File Size: 5.90 Mb
ePub File Size: 15.99 Mb
ISBN: 477-2-17264-401-4
Downloads: 37826
Price: Free* [*Free Regsitration Required]
Uploader: Gardazilkree

This is part of the basic protocol 400 and all stacks should support it and as such abstract from the connectivity related operations. Retrieved from ” https: Archived from the original on 4 July Then it defines the Diameter message Command-Codes. The Diameter protocol requires that relaying and proxying agents maintain transaction state, which is used for failover purposes.

Information on RFC » RFC Editor

Some common Diameter commands defined in the protocol base and diaeter are:. For example, for pre-paid services, the Diameter server that originally authorized a session may need some confirmation that the user is still using the services. Diameter is used for many different interfaces defined by the 3GPP standards, with each interface typically defining new commands and attributes.

The packet consists of a Diameter header and a variable number of Attribute-Value Pairs, or AVPs, for encapsulating information relevant to the Diameter message. Current information, if any, about IPR issues:. It is not clear whether these translations can be accomplished without adding significant security vulnerabilities. Diameter Applications can extend the base protocol by adding new commands, attributes, or both.

As ofthe only value supported is 1. This field indicates the version of the Diameter Base Protocol. Standards Track Cisco 40005 Inc.


Relationship with other existing or emerging documents: The application can be an authentication application, an accounting application, or a vendor-specific application. The authorization AVPs are further broken down by service type. If authorization was requested, a successful response will include the authorization AVPs appropriate for the service being provided, as defined in section 6.

Adding a new optional AVP does not require a new application. Transaction state implies that upon forwarding a request, its Hop-by-Hop Identifier is saved; the field is replaced with a locally unique identifier, which is restored to its original value when the corresponding answer is received.

The name is a play on words, derived from the RADIUS protocol, which is the predecessor a diameter is twice the radius. This is achieved by including the RADIUS attribute space to eliminate the need to perform many attribute translations. The Dismeter Identifier is an unsigned bit integer field in network byte order that is used to match the requests with their answers as diametre same value in the request is used in the response.

Additionally, the following terms and acronyms are used in this application: Other useful information describing the “Quality” of the document: As a result, service cannot be started as a result of a response to an authorization-only request without introducing a significant security vulnerability.

Diameter Relay and redirect agents must not reject messages with unrecognized AVPs. Retrieved 12 October Justification for the specific reference:. This allows a single server to handle policies for many services. The ” R ” Request diamdter — If set, the message is a request.

Obsolete RFCs are indicated with strikethrough text. The values are for permanent, standard commands allocated by IANA.

This will ensure that any resources maintained on the servers are freed appropriately. The End-to-End Identifier is not modified by Diameter agents of any kind, and the same value in the corresponding request is used in the answer.


Relationship with other existing or emerging documents:. When creating a request, the End-to-End Identifier is set to a locally unique value.

ITU-T work programme

Network Working Group P. A design prior to PPP. The ” E ” Error bit — If set, the message contains a protocol error, and the message will not conform to the CCF described for this command.

Diameter Network Access Server Application. Retrieved 30 April The failure of a reauthentication exchange will terminate the service. After that the transport connection can be disconnected.

Diameter (protocol)

In this sense, this document extends the Base Diameter protocol. This capability goes beyond the Call Check capabilities described in section 5. A Command Code is used to determine the action that is to be taken for a particular message.

The ” T ” Potentially re-transmitted message bit — This flag is set after a link failover procedure, to aid the removal of duplicate requests. Internet Standards Application layer protocols Computer access control protocols Authentication protocols. Diameter Session Termination When a NAS receives an indication that a user’s session is being disconnected by the client e.

The RFC defines a core state machine for maintaining connections between peers and processing messages. Information about the call, the identity of the user, and the user’s authentication information are packaged into a Diameter AA-Request AAR message and sent to a server.

It belongs to the application layer protocols in the internet protocol suite. From Wikipedia, the free encyclopedia. Additionally, application specific state machines can be introduced either later or at a higher abstraction layer. Diameter is an authentication, authorization, and accounting protocol for computer networks.