AAA in a nutshell

Mohamed Daif
Mohamed DaifVAS Engineer at TEData em TEData
RADIUS SBR
in a nutshell
Outline
●

AAA.

●

Radius Key Features.

●

Radius Operation.

●

Accounting.

●

SBR.

●

Future.
AAA
●

Architecture.

●

Distributed Systems.

●

●

Authentication,
Authorization and
Accounting.
Radius, Diameter.
Radius – Key Features
●

Client/Server Model.

●

Network Security.

●

Extensibility (TLVs).

●

Flexible
Authentication.
Radius Operation
●

User presents auth info to client.

●

Client sends “message” to Server.

●

Can load-balance servers.

●

Server validates the shared secret.

●

●

●

Radius server consults DB when
receiving the request.
Server can “accept”, “reject”,
“challenge” the user.
If all conditions are met, server
sends a list of configuration values
(like IP address, MTU, .. etc) to the
user in the response.
Challenge
●

●

Used with devices
such as smart cards.
Unpredictable
number to the user,
encryption, giving
back the result.
Proxy

With proxy RADIUS, one RADIUS server receives an authentication
(or accounting) request from a RADIUS client (such as a NAS),
forwards the request to a remote RADIUS server, receives the reply
from the remote server, and sends that reply to the client, possibly with
changes to reflect local administrative policy.


A common use for proxy RADIUS is roaming.
The choice of which server receives the forwarded request SHOULD
be based on the authentication "realm".

UDP
●
●

●

●

Retransmission timers are required.
The timing requirements of this particular
protocol are significantly different than TCP
provides.
The stateless nature of this protocol simplifies
the use of UDP.
UDP simplifies the server implementation.
Radius Packet
Radius Packet – Code Field
The Code field is one octet, and identifies the type of RADIUS packet.
RADIUS Codes (decimal) are assigned as follows:
1

Access-Request

2

Access-Accept

3

Access-Reject

4

Accounting-Request

5

Accounting-Response

11

Access-Challenge

12

Status-Server (experimental)

13

Status-Client (experimental)

255

Reserved
Radius Packet – Identifier Field
●
●

Aids in matching requests and replies.
The RADIUS server can detect a duplicate
request if it has the same client source IP
address and source UDP port and Identifier
within a short span of time.
Radius Packet – Authenticator Field
●

This value is used to authenticate the reply
from the RADIUS server, and is used in the
password hiding algorithm.

●

Request Authenticator and Response
Authenticator.
Radius Packet – Attributes
●

RADIUS Attributes carry the specific authentication,
authorization, information and configuration details for
the request and reply.
1

User-Name

2

User-Password

3

CHAP-Password

4

NAS-IP-Address

5

NAS-Port

6

Service-Type
….
Radius Accounting
●

●

●

●

Client generates an Accounting
start packet to accounting server.
Server acknowledges reception of
the packet.
At the end of the service, client
generates a stop packet.
Server acknowledges reception of
the packet.
Radius shortcomings
●

Doesn't define fail-over mechanisms.

●

Does not provide support for per-packet confidentiality.

●

●

●

●

●

In Accounting it assumes that replay protection is provided by the backend
server not the protocol.
Doesn't Define re-transmission (UDP), which is a major issue in
accounting.
does not provide for explicit support for agents, including proxies,
redirects, and relays.
Server-initiated messages are optional.
RADIUS does not support error messages, capability negotiation, or a
mandatory/non-mandatory flag for attributes.
Diameter
●

It evolved from and replaces RADIUS protocol.

●

Ability to exchange messages and deliver AVPs.

●

Capabilities negotiation.

●

Error notification.

●

●

Extensibility, required in [RFC2989], through addition
of new applications, commands, and AVPs
Basic services necessary for applications, such as the
handling of user sessions or accounting
SBR
●
●

●
●

A Juniper Radius product.
Delivers a total authentication, authorization, and accounting
(AAA) solution on the scale required by Internet service
providers and carriers.
Provides data services for wireline, wireless carriers.
Modular design that supports add-on functionality to meet
your specific site requirements (SIM, CDMA, WiMAX, Session
Control Module).
SBR - Features
●
●

●
●

Centralized management of user access control and security simplifies access administration.
powerful proxy RADIUS features enable to easily distribute authentication and accounting requests to
the appropriate RADIUS server for processing.
External authentication features enable you to authenticate against multiple, redundant
Structured Query Language (SQL) or Lightweight Directory Access Protocol (LDAP) databases
according to configurable load balancing and retry strategies.

●

Support for a wide variety of 802.1X-compliant access points and other network access servers.

●

You can define user’s allowed access hours

●

Multiple management interfaces (GUI, LCI, CLI, XML/HTTPS, SNMP).

●

3GPP support facilitates the management of mobile sessions and their associated resources
1 de 18

Recomendados

RADIUS por
RADIUSRADIUS
RADIUSamogh_ubale
6.7K visualizações24 slides
Implementing Cisco AAA por
Implementing Cisco AAAImplementing Cisco AAA
Implementing Cisco AAAdkaya
4.7K visualizações27 slides
Radius server,PAP and CHAP Protocols por
Radius server,PAP and CHAP ProtocolsRadius server,PAP and CHAP Protocols
Radius server,PAP and CHAP ProtocolsDhananjay Aloorkar
4.8K visualizações16 slides
AAA & RADIUS Protocols por
AAA & RADIUS ProtocolsAAA & RADIUS Protocols
AAA & RADIUS ProtocolsPeter R. Egli
14.3K visualizações12 slides
Radiojungle AAA RADIUS introduction por
Radiojungle AAA RADIUS introductionRadiojungle AAA RADIUS introduction
Radiojungle AAA RADIUS introductionsmoscato
2.8K visualizações14 slides
Radius1 por
Radius1Radius1
Radius1balamurugan.k Kalibalamurugan
677 visualizações22 slides

Mais conteúdo relacionado

Mais procurados

Radius Protocol por
Radius ProtocolRadius Protocol
Radius ProtocolNetwax Lab
1.9K visualizações9 slides
AAA Protocol por
AAA ProtocolAAA Protocol
AAA ProtocolNetwax Lab
3.4K visualizações8 slides
Cisco acs configuration guide por
Cisco acs configuration guideCisco acs configuration guide
Cisco acs configuration guideRichardsCCNA
953 visualizações214 slides
Radius vs. Tacacs+ por
Radius vs. Tacacs+Radius vs. Tacacs+
Radius vs. Tacacs+Netwax Lab
1.7K visualizações3 slides
TACACS Protocol por
TACACS ProtocolTACACS Protocol
TACACS ProtocolNetwax Lab
1.6K visualizações6 slides
Design and Performance Optimization of Authentication, Authorization, and Acc... por
Design and Performance Optimization of Authentication, Authorization, and Acc...Design and Performance Optimization of Authentication, Authorization, and Acc...
Design and Performance Optimization of Authentication, Authorization, and Acc...saidzaghloul
1K visualizações38 slides

Mais procurados(20)

Radius Protocol por Netwax Lab
Radius ProtocolRadius Protocol
Radius Protocol
Netwax Lab1.9K visualizações
AAA Protocol por Netwax Lab
AAA ProtocolAAA Protocol
AAA Protocol
Netwax Lab3.4K visualizações
Cisco acs configuration guide por RichardsCCNA
Cisco acs configuration guideCisco acs configuration guide
Cisco acs configuration guide
RichardsCCNA953 visualizações
Radius vs. Tacacs+ por Netwax Lab
Radius vs. Tacacs+Radius vs. Tacacs+
Radius vs. Tacacs+
Netwax Lab1.7K visualizações
TACACS Protocol por Netwax Lab
TACACS ProtocolTACACS Protocol
TACACS Protocol
Netwax Lab1.6K visualizações
Design and Performance Optimization of Authentication, Authorization, and Acc... por saidzaghloul
Design and Performance Optimization of Authentication, Authorization, and Acc...Design and Performance Optimization of Authentication, Authorization, and Acc...
Design and Performance Optimization of Authentication, Authorization, and Acc...
saidzaghloul1K visualizações
Tacacs por 1 2d
TacacsTacacs
Tacacs
1 2d1.6K visualizações
EAP-TLS por Karri Huhtanen
EAP-TLSEAP-TLS
EAP-TLS
Karri Huhtanen435 visualizações
Routing host certificates in eduroam/govroam por Karri Huhtanen
Routing host certificates in eduroam/govroamRouting host certificates in eduroam/govroam
Routing host certificates in eduroam/govroam
Karri Huhtanen172 visualizações
Implementing 802.1x Authentication por dkaya
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
dkaya15.3K visualizações
EAP-TLS (extended version) por Karri Huhtanen
EAP-TLS (extended version)EAP-TLS (extended version)
EAP-TLS (extended version)
Karri Huhtanen262 visualizações
TLS and Certificates por Karri Huhtanen
TLS and CertificatesTLS and Certificates
TLS and Certificates
Karri Huhtanen692 visualizações
10215 A 14 por Juanchi_43
10215 A 1410215 A 14
10215 A 14
Juanchi_43509 visualizações
Security issues in RADIUS based Wi-Fi AAA por Karri Huhtanen
Security issues in RADIUS based Wi-Fi AAASecurity issues in RADIUS based Wi-Fi AAA
Security issues in RADIUS based Wi-Fi AAA
Karri Huhtanen702 visualizações
At8000 s configurando_8021x por NetPlus
At8000 s configurando_8021xAt8000 s configurando_8021x
At8000 s configurando_8021x
NetPlus1.4K visualizações
Security por Akram Salih
SecuritySecurity
Security
Akram Salih372 visualizações
Managing HotSpot Clients With FreeRadius por Dashamir Hoxha
Managing HotSpot Clients With FreeRadiusManaging HotSpot Clients With FreeRadius
Managing HotSpot Clients With FreeRadius
Dashamir Hoxha26.1K visualizações
802.1x Authentication Standard por Dan Miller
802.1x Authentication Standard802.1x Authentication Standard
802.1x Authentication Standard
Dan Miller1.9K visualizações
802.1x Implementation Plan for Seacoast por Sithideth Banavong
802.1x Implementation Plan for Seacoast802.1x Implementation Plan for Seacoast
802.1x Implementation Plan for Seacoast
Sithideth Banavong1.6K visualizações
PIW ISE best practices por Sergey Kucherenko
PIW ISE best practicesPIW ISE best practices
PIW ISE best practices
Sergey Kucherenko6.4K visualizações

Destaque

Authentication, authorization, accounting(aaa) slides por
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesrahul kundu
5.5K visualizações7 slides
Authentication and Authorization in Asp.Net por
Authentication and Authorization in Asp.NetAuthentication and Authorization in Asp.Net
Authentication and Authorization in Asp.NetShivanand Arur
12.7K visualizações20 slides
CCNA Security 06- AAA por
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAAAhmed Habib
4.5K visualizações28 slides
Introduction to Diameter Protocol - Part1 por
Introduction to Diameter Protocol - Part1Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1Basim Aly (JNCIP-SP, JNCIP-ENT)
21K visualizações77 slides
Diameter Presentation por
Diameter PresentationDiameter Presentation
Diameter PresentationBeny Haddad
40.3K visualizações43 slides
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ... por
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...gueste4e93e3
1.6K visualizações51 slides

Destaque(18)

Authentication, authorization, accounting(aaa) slides por rahul kundu
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
rahul kundu5.5K visualizações
Authentication and Authorization in Asp.Net por Shivanand Arur
Authentication and Authorization in Asp.NetAuthentication and Authorization in Asp.Net
Authentication and Authorization in Asp.Net
Shivanand Arur12.7K visualizações
CCNA Security 06- AAA por Ahmed Habib
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
Ahmed Habib4.5K visualizações
Diameter Presentation por Beny Haddad
Diameter PresentationDiameter Presentation
Diameter Presentation
Beny Haddad40.3K visualizações
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ... por gueste4e93e3
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
gueste4e93e31.6K visualizações
Granite Introduction 11 por tnorenberg
Granite   Introduction 11Granite   Introduction 11
Granite Introduction 11
tnorenberg1.1K visualizações
NoSQL Databases for Implementing Data Services – Should I Care? por Guido Schmutz
NoSQL Databases for Implementing Data Services – Should I Care?NoSQL Databases for Implementing Data Services – Should I Care?
NoSQL Databases for Implementing Data Services – Should I Care?
Guido Schmutz4K visualizações
Acit Mumbai - understanding vpns por Sleek International
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
Sleek International1.6K visualizações
Telecordia Ims Presentation Expections And Challenges por Jeanne Rog
Telecordia Ims Presentation Expections And ChallengesTelecordia Ims Presentation Expections And Challenges
Telecordia Ims Presentation Expections And Challenges
Jeanne Rog529 visualizações
Capturing Network Traffic into Database por Tigran Tsaturyan
Capturing Network Traffic into Database Capturing Network Traffic into Database
Capturing Network Traffic into Database
Tigran Tsaturyan15.3K visualizações
CCNA Security 07-Securing the local area network por Ahmed Habib
CCNA Security 07-Securing the local area networkCCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area network
Ahmed Habib2.6K visualizações
Wireshar training por Luke Luo
Wireshar trainingWireshar training
Wireshar training
Luke Luo1.2K visualizações
Convert Wireshark PCAP Files to Sequence Diagrams por EventHelix.com Inc.
Convert Wireshark PCAP Files to Sequence DiagramsConvert Wireshark PCAP Files to Sequence Diagrams
Convert Wireshark PCAP Files to Sequence Diagrams
EventHelix.com Inc.4.3K visualizações
Identity Services Engine Overview and Update por Cisco Canada
Identity Services Engine Overview and UpdateIdentity Services Engine Overview and Update
Identity Services Engine Overview and Update
Cisco Canada6.7K visualizações
Demystifying TrustSec, Identity, NAC and ISE por Cisco Canada
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISE
Cisco Canada15K visualizações
CCNA Security - Chapter 3 por Irsandi Hasan
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
Irsandi Hasan7.7K visualizações

Similar a AAA in a nutshell

Tutorial radius client mikrotik por
Tutorial radius client mikrotikTutorial radius client mikrotik
Tutorial radius client mikrotikAdi Utami
7.5K visualizações13 slides
TNC19 Radiator Technical Workshop -- Using Radiator to ensure better SP/IdP c... por
TNC19 Radiator Technical Workshop -- Using Radiator to ensure better SP/IdP c...TNC19 Radiator Technical Workshop -- Using Radiator to ensure better SP/IdP c...
TNC19 Radiator Technical Workshop -- Using Radiator to ensure better SP/IdP c...Radiator Software
363 visualizações18 slides
AAA server por
AAA serverAAA server
AAA serverhetvi naik
363 visualizações12 slides
Introduction to DIAMETER por
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETERHossein Yavari
663 visualizações30 slides
AAA Best Practices por
AAA Best PracticesAAA Best Practices
AAA Best PracticesSagar Gor
299 visualizações5 slides
RADIUS provides three services- authentication- authorization- and acc.docx por
RADIUS provides three services- authentication- authorization- and acc.docxRADIUS provides three services- authentication- authorization- and acc.docx
RADIUS provides three services- authentication- authorization- and acc.docxacarolyn
3 visualizações2 slides

Similar a AAA in a nutshell(20)

Tutorial radius client mikrotik por Adi Utami
Tutorial radius client mikrotikTutorial radius client mikrotik
Tutorial radius client mikrotik
Adi Utami7.5K visualizações
TNC19 Radiator Technical Workshop -- Using Radiator to ensure better SP/IdP c... por Radiator Software
TNC19 Radiator Technical Workshop -- Using Radiator to ensure better SP/IdP c...TNC19 Radiator Technical Workshop -- Using Radiator to ensure better SP/IdP c...
TNC19 Radiator Technical Workshop -- Using Radiator to ensure better SP/IdP c...
Radiator Software363 visualizações
AAA server por hetvi naik
AAA serverAAA server
AAA server
hetvi naik363 visualizações
Introduction to DIAMETER por Hossein Yavari
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETER
Hossein Yavari663 visualizações
AAA Best Practices por Sagar Gor
AAA Best PracticesAAA Best Practices
AAA Best Practices
Sagar Gor299 visualizações
RADIUS provides three services- authentication- authorization- and acc.docx por acarolyn
RADIUS provides three services- authentication- authorization- and acc.docxRADIUS provides three services- authentication- authorization- and acc.docx
RADIUS provides three services- authentication- authorization- and acc.docx
acarolyn3 visualizações
Radius client por dhenis1
Radius clientRadius client
Radius client
dhenis1779 visualizações
RSASecureID.ppt por PepeMartin23
RSASecureID.pptRSASecureID.ppt
RSASecureID.ppt
PepeMartin2314 visualizações
RSASecureID (2).ppt por PepeMartin23
RSASecureID (2).pptRSASecureID (2).ppt
RSASecureID (2).ppt
PepeMartin236 visualizações
TekRADIUS por Yasin KAPLAN
TekRADIUSTekRADIUS
TekRADIUS
Yasin KAPLAN57 visualizações
TekRADIUS por Yasin KAPLAN
TekRADIUSTekRADIUS
TekRADIUS
Yasin KAPLAN159 visualizações
Les fonctionnalites mariadb por lemugfr
Les fonctionnalites mariadbLes fonctionnalites mariadb
Les fonctionnalites mariadb
lemugfr1.1K visualizações
WiFi Hotspot Password por Maryam Namira
WiFi Hotspot PasswordWiFi Hotspot Password
WiFi Hotspot Password
Maryam Namira144 visualizações
MariaDB MaxScale por MariaDB plc
MariaDB MaxScaleMariaDB MaxScale
MariaDB MaxScale
MariaDB plc1.9K visualizações
MariaDB for the Enterprise por All Things Open
MariaDB for the EnterpriseMariaDB for the Enterprise
MariaDB for the Enterprise
All Things Open973 visualizações
Database Security Threats - MariaDB Security Best Practices por MariaDB plc
Database Security Threats - MariaDB Security Best PracticesDatabase Security Threats - MariaDB Security Best Practices
Database Security Threats - MariaDB Security Best Practices
MariaDB plc1.5K visualizações
ClearPass_Design Info.pptx por ssuser63c018
ClearPass_Design Info.pptxClearPass_Design Info.pptx
ClearPass_Design Info.pptx
ssuser63c01826 visualizações
8021x feature config_guide por Wilson Ospina
8021x feature config_guide8021x feature config_guide
8021x feature config_guide
Wilson Ospina719 visualizações

Último

Case Study Copenhagen Energy and Business Central.pdf por
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdfAitana
16 visualizações3 slides
Serverless computing with Google Cloud (2023-24) por
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)wesley chun
11 visualizações33 slides
20231123_Camunda Meetup Vienna.pdf por
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
41 visualizações73 slides
PharoJS - Zürich Smalltalk Group Meetup November 2023 por
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023Noury Bouraqadi
132 visualizações17 slides
Ransomware is Knocking your Door_Final.pdf por
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
59 visualizações46 slides
HTTP headers that make your website go faster - devs.gent November 2023 por
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023Thijs Feryn
22 visualizações151 slides

Último(20)

Case Study Copenhagen Energy and Business Central.pdf por Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 visualizações
Serverless computing with Google Cloud (2023-24) por wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 visualizações
PharoJS - Zürich Smalltalk Group Meetup November 2023 por Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi132 visualizações
Ransomware is Knocking your Door_Final.pdf por Security Bootcamp
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp59 visualizações
HTTP headers that make your website go faster - devs.gent November 2023 por Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 visualizações
Mini-Track: AI and ML in Network Operations Applications por Network Automation Forum
Mini-Track: AI and ML in Network Operations ApplicationsMini-Track: AI and ML in Network Operations Applications
Mini-Track: AI and ML in Network Operations Applications
Network Automation Forum10 visualizações
Scaling Knowledge Graph Architectures with AI por Enterprise Knowledge
Scaling Knowledge Graph Architectures with AIScaling Knowledge Graph Architectures with AI
Scaling Knowledge Graph Architectures with AI
Enterprise Knowledge38 visualizações
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum34 visualizações
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker40 visualizações
Uni Systems for Power Platform.pptx por Uni Systems S.M.S.A.
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptx
Uni Systems S.M.S.A.56 visualizações
Evolving the Network Automation Journey from Python to Platforms por Network Automation Forum
Evolving the Network Automation Journey from Python to PlatformsEvolving the Network Automation Journey from Python to Platforms
Evolving the Network Automation Journey from Python to Platforms
Network Automation Forum13 visualizações
Voice Logger - Telephony Integration Solution at Aegis por Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma39 visualizações
Melek BEN MAHMOUD.pdf por MelekBenMahmoud
Melek BEN MAHMOUD.pdfMelek BEN MAHMOUD.pdf
Melek BEN MAHMOUD.pdf
MelekBenMahmoud14 visualizações
Unit 1_Lecture 2_Physical Design of IoT.pdf por StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec12 visualizações
Business Analyst Series 2023 - Week 3 Session 5 por DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10300 visualizações
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software280 visualizações

AAA in a nutshell

  • 1. RADIUS SBR in a nutshell
  • 2. Outline ● AAA. ● Radius Key Features. ● Radius Operation. ● Accounting. ● SBR. ● Future.
  • 4. Radius – Key Features ● Client/Server Model. ● Network Security. ● Extensibility (TLVs). ● Flexible Authentication.
  • 5. Radius Operation ● User presents auth info to client. ● Client sends “message” to Server. ● Can load-balance servers. ● Server validates the shared secret. ● ● ● Radius server consults DB when receiving the request. Server can “accept”, “reject”, “challenge” the user. If all conditions are met, server sends a list of configuration values (like IP address, MTU, .. etc) to the user in the response.
  • 6. Challenge ● ● Used with devices such as smart cards. Unpredictable number to the user, encryption, giving back the result.
  • 7. Proxy With proxy RADIUS, one RADIUS server receives an authentication (or accounting) request from a RADIUS client (such as a NAS), forwards the request to a remote RADIUS server, receives the reply from the remote server, and sends that reply to the client, possibly with changes to reflect local administrative policy.  A common use for proxy RADIUS is roaming. The choice of which server receives the forwarded request SHOULD be based on the authentication "realm". 
  • 8. UDP ● ● ● ● Retransmission timers are required. The timing requirements of this particular protocol are significantly different than TCP provides. The stateless nature of this protocol simplifies the use of UDP. UDP simplifies the server implementation.
  • 10. Radius Packet – Code Field The Code field is one octet, and identifies the type of RADIUS packet. RADIUS Codes (decimal) are assigned as follows: 1 Access-Request 2 Access-Accept 3 Access-Reject 4 Accounting-Request 5 Accounting-Response 11 Access-Challenge 12 Status-Server (experimental) 13 Status-Client (experimental) 255 Reserved
  • 11. Radius Packet – Identifier Field ● ● Aids in matching requests and replies. The RADIUS server can detect a duplicate request if it has the same client source IP address and source UDP port and Identifier within a short span of time.
  • 12. Radius Packet – Authenticator Field ● This value is used to authenticate the reply from the RADIUS server, and is used in the password hiding algorithm. ● Request Authenticator and Response Authenticator.
  • 13. Radius Packet – Attributes ● RADIUS Attributes carry the specific authentication, authorization, information and configuration details for the request and reply. 1 User-Name 2 User-Password 3 CHAP-Password 4 NAS-IP-Address 5 NAS-Port 6 Service-Type ….
  • 14. Radius Accounting ● ● ● ● Client generates an Accounting start packet to accounting server. Server acknowledges reception of the packet. At the end of the service, client generates a stop packet. Server acknowledges reception of the packet.
  • 15. Radius shortcomings ● Doesn't define fail-over mechanisms. ● Does not provide support for per-packet confidentiality. ● ● ● ● ● In Accounting it assumes that replay protection is provided by the backend server not the protocol. Doesn't Define re-transmission (UDP), which is a major issue in accounting. does not provide for explicit support for agents, including proxies, redirects, and relays. Server-initiated messages are optional. RADIUS does not support error messages, capability negotiation, or a mandatory/non-mandatory flag for attributes.
  • 16. Diameter ● It evolved from and replaces RADIUS protocol. ● Ability to exchange messages and deliver AVPs. ● Capabilities negotiation. ● Error notification. ● ● Extensibility, required in [RFC2989], through addition of new applications, commands, and AVPs Basic services necessary for applications, such as the handling of user sessions or accounting
  • 17. SBR ● ● ● ● A Juniper Radius product. Delivers a total authentication, authorization, and accounting (AAA) solution on the scale required by Internet service providers and carriers. Provides data services for wireline, wireless carriers. Modular design that supports add-on functionality to meet your specific site requirements (SIM, CDMA, WiMAX, Session Control Module).
  • 18. SBR - Features ● ● ● ● Centralized management of user access control and security simplifies access administration. powerful proxy RADIUS features enable to easily distribute authentication and accounting requests to the appropriate RADIUS server for processing. External authentication features enable you to authenticate against multiple, redundant Structured Query Language (SQL) or Lightweight Directory Access Protocol (LDAP) databases according to configurable load balancing and retry strategies. ● Support for a wide variety of 802.1X-compliant access points and other network access servers. ● You can define user’s allowed access hours ● Multiple management interfaces (GUI, LCI, CLI, XML/HTTPS, SNMP). ● 3GPP support facilitates the management of mobile sessions and their associated resources