Canonical URL: ; File formats: Plain Text PDF; Status: PROPOSED STANDARD; Obsoleted by: RFC ; Updated by. Diameter is an authentication, authorization, and accounting protocol for computer networks. The Diameter base protocol is defined by RFC ( Obsoletes: RFC ) and defines the minimum requirements for an AAA protocol. Diameter. Diameter is the protocol used within EPS/IMS architectures for AAA ( Authentication, Diameter is specified primarily as a base protocol by the IETF in RFC

Author: Bashura Nitaur
Country: Senegal
Language: English (Spanish)
Genre: Music
Published (Last): 15 March 2008
Pages: 430
PDF File Size: 11.41 Mb
ePub File Size: 11.99 Mb
ISBN: 194-1-49744-264-6
Downloads: 65849
Price: Free* [*Free Regsitration Required]
Uploader: Tygogor

The “ip” keyword means any protocol will match. This section needs expansion. The AVP contains the identity of the peer the request was received from. dfc

For a match to occur, the same IP version must be present in the packet that was used in describing the IP address. This AVP would be encoded as follows: This field is only present if the respective bit-flag is enabled. Diameter implementations are required to support all Mandatory AVPs which are allowed by the message’s formal syntax and defined either in the base Diameter standard or in one of the Diameter Application specifications governing the message.

The absence of a particular flag may be diametef with a ‘! One or more Session-Ids must follow. Internet Standards Application layer protocols Computer access control protocols Authentication protocols.

For IPv4, a typical first rule is often “deny in ip! The supported TCP flags are: Some common Diameter commands defined in the protocol base and applications are:.

Diameter (protocol)

From Wikipedia, the free encyclopedia. Fragmented packets that have a non-zero offset i. Relaying of Diameter messages The example provided in Figure 2 depicts a request issued from NAS, which is an access device, for the user bob example.


The ” R ” Request bit — If set, the message is a request. Any AVP for which the P bit may be set or which may be encrypted may be considered sensitive.

Since redirect agents do not relay messages, and only return an answer with the information necessary for Diameter agents to communicate directly, they do not modify messages. Packets may be marked or metered based on the following information that is associated with it: See Section 4 for more information on AVPs.

Only this exact IP number will match the rule.

The bit value is transmitted in network byte order. A Command Code is used to determine diaketer action that is to be taken for a particular message. Diaameter access device MAY apply deny rules of its own before the supplied rules, for example to protect the access device owner’s infrastructure.

For example, where TLS or IPsec transmission- level security is sufficient, there may be no need for end-to-end security. The list may be specified as any combination of ranges or individual types separated by commas. The first two octets of the Address. E rror – If set, the message contains a protocol error, and the message will not conform to the ABNF described for this command.

This is known as the Realm Ffc Table, as is defined further in Section 2. When creating a request, the End-to-End Identifier is set to a locally unique value. Which AVPs are sensitive is determined by service provider policy. An access device that is unable to interpret or apply a deny rule MUST terminate the session. Accounting requests without corresponding authorization responses SHOULD be subjected to further scrutiny, as should accounting requests indicating a difference between the requested and provided service.


The rule syntax is a modified subset of ipfw 8 from FreeBSD, and the ipfw. On 6h 28m 16s UTC, 7 February the time value will overflow. The absence of a diammeter option may be denoted with a ‘!

Diameter (protocol) – Wikipedia

By authorizing a request, the home Diameter server is implicitly indicating its willingness to engage in the business transaction as specified by the contractual relationship between the server and the previous hop.

The following is a definition of a fictitious command code: Archived from the original on 4 July Adding a new optional AVP does not require a new application. Proxies MAY be used in call control centers or access ISPs that provide outsourced connections, they can monitor the number and types of ports in use, and make allocation and admission decisions according to their configuration.

The combination of the Origin-Host see Section 6. Diameter Path Authorization As noted in Section 2. The ” T ” Potentially re-transmitted message bit — This flag is set after a link failover procedure, to aid the removal of duplicate requests. If an AVP with the ” M ” bit set is received by a Diameter client, server, proxy, or translation agent and either the AVP or its value is unrecognized, the message must be rejected.