Diameter is an authentication, authorization, and accounting protocol for computer networks. The Diameter base protocol is defined by RFC ( Obsoletes: RFC ) and .. RFC , Diameter Network Access Server Application. RFC (part 1 of 4): Diameter Network Access Server Application. Diameter Network Access Server Application (NASREQ, RFC ). • Diameter Base Accounting (RFC ). • Diameter Extensible Authentication Protocol.

Author: Kagakinos Tozil
Country: Comoros
Language: English (Spanish)
Genre: Literature
Published (Last): 27 June 2012
Pages: 358
PDF File Size: 7.38 Mb
ePub File Size: 1.77 Mb
ISBN: 974-6-43796-840-5
Downloads: 29678
Price: Free* [*Free Regsitration Required]
Uploader: Yozshurn

The End-to-End Identifier is not modified by Diameter agents of any kind, and the same value in the corresponding request is used in the answer. Relationship with other existing or emerging documents:. Views Read Edit View history. This allows a single server to handle policies for many services. Internet Standards Application layer protocols Computer access control protocols Authentication protocols.

The failure of a reauthentication exchange will terminate the service. The Diameter protocol was initially developed by Pat R. It is possible for a single session to be authorized first and then for an authentication request to follow.

If cleared, the message MUST be locally processed. For example, for pre-paid services, the Diameter server that originally authorized a session may need some confirmation that the user is still using the services. This is part of the basic protocol functionality and all stacks should support it and as such abstract from the connectivity related operations.


The authorization AVPs are further broken down by service type. Retrieved from ” https: Diameter Session Reauthentication or Reauthorization. The RFC defines an authorization and an accounting state machine.

The packet diameteg of a Diameter header and a variable number of Attribute-Value Pairs, or AVPs, for encapsulating information relevant to the Diameter message.

Diameter (protocol)

VPN Virtual Private Network – In this document, this term is used to describe access services that use tunneling methods. The values are for permanent, standard commands allocated by IANA.

Clear description of the referenced document: Application-ID is used to identify for which Diameter application the message is applicable. Messages with the “E” bit set are commonly referred to as error messages.

This field indicates the version of the Diameter Base Protocol. Information about the call, the identity of the user, and the user’s authentication information are packaged into rcf Diameter AA-Request AAR message and sent to a server.

If cleared, the message is an answer. Standards Track Cisco Systems Inc.

All RFCs always remain available on-line. The degree of stability or maturity of the document: The Message Length field indicates the length of the Diameter message in bytes, including the header fields and the padded AVPs.


Network Working Group P. When combined with the Diameter Base protocol, Transport Profile, and Extensible Authentication Protocol specifications, this application specification satisfies typical diametdr access services requirements. After that the transport connection can be disconnected.

The End-to-End Identifier is an unsigned bit integer field in network byte order that is used to detect duplicate messages along with the combination of the Origin-Host AVP. The ” R ” Request bit — If set, the message is a request.

Diameter (protocol) – Wikipedia

Table of Contents 1. Any explicit references within that referenced document should also be listed:.

Call and Session Information. From Wikipedia, the free encyclopedia. Archived from the original on 4 July Any explicit diamefer within that referenced document should also be listed: This capability goes beyond the Call Check capabilities described in section 5. Clear description of the referenced document:.

Diameter diaemter an authentication, authorization, and accounting protocol for computer networks. Committed to connecting the world. This section needs expansion. The application can be an authentication application, an accounting application, or a vendor-specific application.