Ads 468x60px

WiNG RADIUS Attributes

RADIUS Authentication Attributes:

The RADIUS protocol follows client-server architecture and uses the User Datagram Protocol (UDP) as described in RFC 2865. The RF Switch sends user information to the RADIUS server in an Access-Request message and after receiving a reply from the server acts according to the returned information.The RADIUS server receives user requests for access from the client, attempts to authenticate the user, and returns the configuration information and polices to the client. The RADIUS server may be configured to authenticate an Access-Request locally or against SQL, Kerberos, LDAP, or Active Directory.


During authentication the RADIUS server then returns one of three responses to the NAS RF Switch:
1)  Access-Reject – The user is unconditionally denied access to the requested network resource. Failure reasons may include an invalid credentials or an inactive account.
2)  Access-Challenge – Requests additional information from the user such as a secondary password, PIN, token or card. Access-Challenge is also used in more complex authentication when a secure tunnel is established between the user and the Radius Server such as authentication using Extensible Authentication Protocol (EAP).
3)  Access-Accept – The user is permitted access. The Access-Request often includes additional configuration information for the user using return attributes.RADIUS services can be enabled on the RF Switch for management user authentication as well as WLAN user authentication. RADIUS services are required for WLANs implementing 802.1X EAP and Hotspot services but may also be enabled for MAC based authentication.

RADIUS Accounting Attributes:
RADIUS accounting is used to send accounting information about an authenticated session to the RADIUS accounting server. Accounting information is sent to the server when a user connects and disconnects from a WLAN and may also be periodically forwarded during the session.
RADIUS accounting information can be used to track individual user’s network usage for billing purposes as well as be used as a tool for gathering statistic for general network monitoring.When network access is granted to the user by the RF Switch, an Accounting-Request message with the Acct-Status-Type field set to Start is forwarded by the RF Switch to the RADIUS server to signal the start of the user's network access. Start records typically contain the user's identification, network address, point of attachment and a unique session identifier.Optionally periodic Accounting-Request messages with the Acct-Status-Type field set to Interim Update may be sent by the RF Switch to the RADIUS server to update it on the status of an active session. Interim records typically convey the current session duration and information on current data usage.When the user's session is closed, the RF Switch forwards an Accounting-Request message with the
Acct-Status-Type field set to Stop. This provides information on the final usage in terms of time, packets transferred, data transferred and reason for disconnect and other information related to the user's network access.

RADIUS Accounting can be enabled / disabled on the RF Switch for each WLAN profile and administrators can select how the RF Switch forwards accounting information to the RADIUS server. For each WLAN profile the following accounting configuration is supported:
1)  Start-Stop – The RF Switch will forward Accounting-Requests at the start and end of the user sessions.
2)  Stop-Only – The RF Switch will forward Accounting-Requests at the end of the user sessions.
3)  Start-Interim-Stop – The RF Switch will forward Accounting-Requests at the start and end of the user sessions as well as periodically during the lifetime of the sessions.

Dynamic Authorization Extensions:
The RADIUS authentication protocol does not support unsolicited messages sent from the RADIUS server to the RF Switch. However, there are many instances in which it is desirable for changes to be made to session characteristics without requiring the RF Switch to initiate the exchange.

To overcome these limitations several vendors have implemented additional RADIUS extensions support unsolicited messages sent from the RADIUS server to a RF Switch. These extensions support Disconnect and Change-of-Authorization (CoA) messages that can be used to terminate an active user session or change the characteristics of an active session.
1)  Disconnect-Request – Causes a user session to be terminated. The Disconnect-Request packet identifies the NAS as well as the user session to be terminated by inclusion of the identification attributes shown in table 3.0.
2)  CoA-Request – Causes session information to by dynamically updated on the RF Switch. Currently a CoA-Request packet may only be used to change the session-timeout and the idle-timeout of a user.The following table outlines the dynamic authorization extension attributes that have been implemented on the RF Switch in accordance to RFC 3576.



Reference Documentation:

0 nhận xét:

Post a Comment