Canonical URL: ; File formats: Plain Text PDF; Status: PROPOSED STANDARD; Obsoleted by: RFC ; Updated by. Diameter is an authentication, authorization, and accounting protocol for computer networks. The Diameter base protocol is defined by RFC ( Obsoletes: RFC ) and defines the minimum requirements for an AAA protocol. Diameter. Diameter is the protocol used within EPS/IMS architectures for AAA ( Authentication, Diameter is specified primarily as a base protocol by the IETF in RFC
|Published (Last):||24 June 2010|
|PDF File Size:||17.72 Mb|
|ePub File Size:||12.41 Mb|
|Price:||Free* [*Free Regsitration Required]|
Since Gfc do not perform any application level processing, they provide relaying services for all Diameter applications, and therefore MUST advertise the Relay Application Identifier. Diameter Command Naming Conventions Diameter command names typically includes one or more English words followed by the verb Request or Answer.
Unsigned32 32 bit unsigned value, in network byte order. The Hop-by-Hop Identifier is an unsigned bit integer field in network byte order that is used to match the requests with their diameteer as the same value in the request is used in the response. Since redirect agents do not relay messages, and only return an answer with the information necessary for Diameter agents to communicate directly, they do not modify messages.
Application-ID Application-ID is four octets and is used to identify to which application the message is applicable for. The ” E ” Error bit — If set, the message contains a protocol error, and the message will not conform to the CCF described for this siameter. Upon reboot implementations MAY set the high order 12 bits to contain the low order 12 bits of current time, and diammeter low order 20 bits to a random value.
As ofthe only value supported is 1. A number of zero- valued bytes are added to the end of the AVP Data field till a word boundary is reached. Translation agents are likely to be used as aggregation servers to communicate with diameetr Diameter infrastructure, while allowing for the embedded systems to be migrated at a slower 33588.
This routing decision is performed using a list of supported realms, and known peers. Here there are two: At each step, forwarding of an authorization response is considered evidence of a willingness to take on financial risk relative to the session. The request is identified by the R equest bit in the Diameter header set to one 1to ask that a particular action be performed, such as authorizing a user or terminating diamter session.
It is set when resending requests not yet acknowledged, as an indication of a possible duplicate due to a link failure. The following format is used in the definition: Retrieved 30 April Diameter Path Authorization As noted in Section 2. Unsigned64 64 bit unsigned value, in network byte order. A Diameter implementation MAY act as one type of agent for some requests, and as another type of agent for others.
In this case, all IP numbers from 1. Since redirect agents do not receive answer messages, they cannot maintain session state.
RFC – part 2 of 5
Prior to bringing up a connection, authorization checks are performed at each connection along the path. The following is a definition of a fictitious command code: Archived from the original on 4 July Each new definition must be either defined or listed with a reference to the RFC that defines the format.
Relay Agents Relay Agents are Diameter agents that accept requests and route messages to other Diameter nodes based on information found in the messages e. The circumstances requiring the use of end-to-end security are determined by policy on each of the peers. Redirecting a Diameter Message Since redirect agents do not perform any application level processing, they provide relaying services for all Diameter applications, and therefore MUST advertise the Relay Application Identifier.
Diameter Base Protocol Support
The keyword “any” is 0. Integer64 64 bit signed value, in network byte order. From Wikipedia, the free encyclopedia. There is one kind of packet that the access device MUST always discard, that is an IP fragment with a fragment offset of one.
AVP Values of this type that are not a multiple of four-octets fiameter length is followed by the necessary padding so that the next AVP if any will start on a bit boundary. Any AVP for which the P bit may be set or which may be encrypted may be considered sensitive. Retrieved 12 October Prior to issuing the request, NAS performs a Diameter route lookup, using “example.
Translation of messages can only occur if the agent recognizes the application of a particular request, and therefore translation agents MUST only advertise their locally supported applications.