IETF Dictionary of RADIUS Attribute Value Pairs


Table A-4 lists the supported RADIUS (IETF) attributes. If the attribute has a security server-specific format, the format is specified.

Table A-4. Internet Engineering Task Force (IETF) RADIUS

Attribute

Number

Description

Type of Value

Inbound/Outbound

Multiple

User-Name

1

Name of the user being authenticated.

string

Inbound

No

User-Password

2

User password or input following an access challenge. Passwords longer than 16 characters are encrypted using IETF Draft #2 or later specifications.

string

Outbound

No

CHAP-Password

3

Point-to-Point Protocol (PPP) Challenge Handshake Authentication Protocol (CHAP) response to an Access-Challenge.

string

Outbound

No

NAS-IP Address

4

IP address of the AAA client that is requesting authentication.

ipaddr

Inbound

No

NAS-Port

5

Physical port number of the AAA client that is authenticating the user. The AAA client port value (32 bits) consists of one or two 16-bit values, depending on the setting of the RADIUS server extended portnames command. Each 16-bit number is a 5-digit decimal integer interpreted as follows:

For asynchronous terminal lines, async network interfaces, and virtual async interfaces, the value is 00ttt, where ttt is the line number or async interface unit number.

For ordinary synchronous network interfaces, the value is 10xxx.

For channels on a primary-rate Integrated Services Digital Network (ISDN) interface, the value is 2ppcc.

For channels on a basic rate ISDN interface, the value is 3bb0c.

For other types of interfaces, the value is 6nnss.

integer

Inbound

No

Service-Type

6

Type of service requested or type of service to be provided:

In a request:

Framed For known PPP or Serial Line Internet Protocol (SLIP) connection.

Administrative user For enable command.

In a response:

Login Make a connection.

Framed Start SLIP or PPP.

Administrative user Start an EXEC or enable ok.

Exec user Start an EXEC session.

integer

Both

No

Framed-Protocol

7

Framing to be used for framed access.

integer

Both

No

Framed-IP-Address

8

Address to be configured for the user.

Framed-IP-Netmask

9

IP netmask to be configured for the user when the user is a router to a network. This AV results in a static route being added for Framed-IP-Address with the mask specified.

ipaddr (maximum length 15 characters)

Outbound

No

Framed-Routing

10

Routing method for the user when the user is a router to a network. Only None and Send and Listen values are supported for this attribute.

integer

Outbound

No

Filter-Id

11

Name of the filter list for the user, formatted as follows: %d, %d.in, or %d.out. This attribute is associated with the most recent service-type command. For login and EXEC, use %d or %d.out as the line access list value from 0 to 199. For framed service, use %d or %d.out as interface output access list and %d.in for input access list. The numbers are self-encoding to the protocol to which they refer.

string

Outbound

Yes

Framed-MTU

12

Indicates the maximum transmission unit (MTU) that can be configured for the user when the MTU is not negotiated by PPP or some other means.

integer (maximum length 10 characters)

Outbound

No

Framed-Compression

13

Compression protocol used for the link. This attribute results in /compress being added to the PPP or SLIP autocommand generated during EXEC authorization. Not currently implemented for non-EXEC authorization.

integer

Outbound

Yes

Login-IP-Host

14

Host to which the user connects when the Login-Service attribute is included.

ipaddr (maximum length 15 characters)

Both

Yes

Login-Service

15

Service that should be used to connect the user to the login host.

Service is indicated by a numeric value:

0: Telnet

1: Rlogin

2: TCP-Clear

3: PortMaster

4: LAT

integer

Both

No

Login-TCP-Port

16

Transmission Control Protocol (TCP) port with which the user is to be connected when the Login-Service attribute is also present.

integer (maximum length 10 characters)

Outbound

No

Reply-Message

18

Text to be displayed to the user.

string

Outbound

Yes

Callback-Number

19

string

Outbound

No

Callback-Id

20

string

Outbound

No

Framed-Route

22

Routing information to be configured for the user on this AAA client. The RADIUS Request For Comments (RFC) format (net/bits [router [metric]]) and the old style dotted mask (netmask [router [metric]]) are supported. If the router field is omitted or 0 (zero), the peer IP address is used. Metrics are ignored.

string

Outbound

Yes

Framed-IPX-Network

23

integer

Outbound

No

State

24

Allows state information to be maintained between the AAA client and the RADIUS server. This attribute is only applicable to CHAP challenges.

string (maximum length 253 characters)

Outbound

No

Class

25

Arbitrary value that the AAA client includes in all accounting packets for this user (if supplied by the RADIUS server).

string

Both

Yes

Vendor-Specific

26

Allows vendors to support their own extended attributes. The Cisco RADIUS implementation supports one vendor-specific option using the format recommended in the specification. The Cisco vendor-ID is 9, and the supported option is vendor-type 1, cisco-avpair. The value is a string of the format:

protocol:attribute sep value

protocol is a value of the Cisco protocol attribute for a particular type of authorization. Attribute and value are an appropriate AV pair defined in the Cisco TACACS+ specification, and sep is "=" for mandatory attributes and "*" for optional attributes. This allows the full set of TACACS+ authorization features to be used for RADIUS. The following is an example:

cisco-avpair= "ip:addr-pool=first"

cisco-avpair= "shell:priv-lvl=15"

The first example causes the Cisco multiple named IP address pools feature to be activated during IP authorization (during PPP Internet Protocol Control Protocol [IPCP] address assignment). The second example causes a user of a device-hosted administrative session to have immediate access to EXEC commands.

string

Outbound

Yes

Session-Timeout

27

Maximum number of seconds of service to be provided to the user before the session terminates. This AV becomes the per-user absolute timeout. This attribute is not valid for PPP sessions.

integer (maximum length 10 characters)

Outbound

No

Idle-Timeout

28

Maximum number of consecutive seconds of idle connection time allowed to the user before the session terminates. This AV becomes the per-user session timeout. This attribute is not valid for PPP sessions.

integer (maximum length 10 characters)

Outbound

No

Termination-Action

29

integer

Both

No

Called-Station-Id

30

Allows the AAA client to send the telephone number the call came from as part of the access-request packet using automatic number identification or similar technology. This attribute has the same value as remote-addr in TACACS+. This attribute is only supported on ISDN and for modem calls on the Cisco AS5200 if used with PRI.

string

Inbound

No

Calling-Station-Id

31

Allows the AAA client to send the telephone number the user called into as part of the access-request packet, using dialed number identification server (DNIS) or similar technology. This attribute is only supported on ISDN and for modem calls on the Cisco AS5200 if used with PRI.

string

Inbound

No

NAS-Identifier

32

string

Inbound

No

Proxy-State

33

Included in proxied RADIUS requests per RADIUS standards. The operation of Cisco Secure ACS does not depend on the contents of this attribute.

string (maximum length 253 characters)

Inbound

No

Login-LAT-Service

34

System with which the user is to be connected by local-area transport (LAT) protocol. This attribute is only available in EXEC mode.

string (maximum length 253 characters)

Inbound

No

Login-LAT-Node

35

string

Inbound

No

Login-LAT-Group

36

string

Inbound

No

Framed-AppleTalk-Link

37

integer

Outbound

No

Framed-AppleTalk-Network

38

integer

Outbound

Yes

Framed-AppleTalk-Zone

39

string

Outbound

No

Acct-Status-Type

40

Specifies whether this accounting request marks the beginning of the user service (start) or the end (stop).

integer

Inbound

No

Acct-Delay-Time

41

Number of seconds the client has been trying to send a particular record.

integer

Inbound

No

Acct-Input-Octets

42

Number of octets received from the port while this service is being provided.

integer

Inbound

No

Acct-Output-Octets

43

Number of octets sent to the port while this service is being delivered.

integer

Inbound

No

Acct-Session-Id

44

Unique accounting identifier that makes it easy to match start and stop records in a log file. The Acct-Session-Id restarts at 1 each time the router is power cycled or the software is reloaded. Contact Cisco support if this is unsuitable.

string

Inbound

No

Acct-Authentic

45

Way in which the user was authenticatedby RADIUS, by the AAA client itself, or by another remote authentication protocol. This attribute is set to radius for users authenticated by RADIUS; to remote for TACACS+ and Kerberos; or to local for local, enable, line, and if-needed methods. For all other methods, the attribute is omitted.

integer

Inbound

No

Acct-Session-Time

46

Number of seconds the user has been receiving service.

integer

Inbound

No

Acct-Input-Packets

47

Number of packets received from the port while this service is being provided to a framed user.

integer

Inbound

No

Acct-Output-Packets

48

Number of packets sent to the port while this service is being delivered to a framed user.

integer

Inbound

No

Acct-Terminate-Cause

49

Reports details on why the connection was terminated. Termination causes are indicated by a numeric value:

1: User request

2: Lost carrier

3: Lost service

4: Idle timeout

5: Session-timeout

6: Admin reset

7: Admin reboot

8: Port error

9: AAA client error

10: AAA client request

11: AAA client reboot

12: Port unneeded

13: Port pre-empted

14: Port suspended

15: Service unavailable

16: Callback

17: User error

18: Host request

integer

Inbound

No

Acct-Multi-Session-Id

50

string

Inbound

No

Acct-Link-Count

51

integer

Inbound

No

Acct-Input-Gigawords

52

integer

Inbound

No

Acct-Output-Gigawords

53

integer

Inbound

No

Event-Timestamp

55

date

Inbound

No

CHAP-Challenge

60

string

Inbound

No

NAS-Port-Type

61

Indicates the type of physical port the AAA client is using to authenticate the user. Physical ports are indicated by a numeric value:

0: Asynchronous

1: Synchronous

2: ISDN-Synchronous

3: ISDN-Asynchronous (V.120)

4: ISDN-Asynchronous (V.110)

5: Virtual

integer

Inbound

No

Port-Limit

62

Sets the maximum number of ports to be provided to the user by the network access server.

integer (maximum length 10 characters)

Both

No

Login-LAT-Port

63

string

Both

No

Tunnel-Type

64

tagged integer

Both

Yes

Tunnel-Medium-Type

65

tagged integer

Both

Yes

Tunnel-Client-Endpoint

66

tagged string

Both

Yes

Tunnel-Server-Endpoint

67

tagged string

Both

Yes

Acct-Tunnel-Connection

68

string

Inbound

No

Tunnel-Password

69

tagged string

Both

Yes

ARAP-Password

70

string

Inbound

No

ARAP-Features

71

string

Outbound

No

ARAP-Zone-Access

72

integer

Outbound

No

ARAP-Security

73

integer

Inbound

No

ARAP-Security-Data

74

string

Inbound

No

Password-Retry

75

integer

Internal use only

No

Prompt

76

integer

Internal use only

No

Connect-Info

77

string

Inbound

No

Configuration-Token

78

string

Internal use only

No

EAP-Message

79

string

Internal use only

No

Message-Authenticator

80

string

Outbound

No

Tunnel-Private-Group-ID

81

tagged string

Both

Yes

Tunnel-Assignment-ID

82

tagged string

Both

Yes

Tunnel-Preference

83

tagged integer

Both

No

Acct-Interim-Interval

85

integer

Outbound

No

NAS-Port-Id

87

string

Inbound

No

Framed-Pool

88

string

Internal use only

No

Tunnel-Client-Auth-ID

90

tagged string

Both

Yes

Tunnel-Server-Auth-ID

91

tagged string

Both

Yes

Primary-DNS-Server

135

ipaddr

Both

No

Secondary-DNS-Server

136

ipaddr

Both

No

Multilink-ID

187

integer

Inbound

No

Num-In-Multilink

188

integer

Inbound

No

Pre-Input-Octets

190

integer

Inbound

No

Pre-Output-Octets

191

integer

Inbound

No

Pre-Input-Packets

192

integer

Inbound

No

Pre-Output-Packets

193

integer

Inbound

No

Maximum-Time

194

integer

Both

No

Disconnect-Cause

195

integer

Inbound

No

Data-Rate

197

integer

Inbound

No

PreSession-Time

198

integer

Inbound

No

PW-Lifetime

208

integer

Outbound

No

IP-Direct

209

ipaddr

Outbound

No

PPP-VJ-Slot-Comp

210

integer

Outbound

No

Assign-IP-Pool

218

integer

Outbound

No

Route-IP

228

integer

Outbound

No

Link-Compression

233

integer

Outbound

No

Target-Utils

234

integer

Outbound

No

Maximum-Channels

235

integer

Outbound

No

Data-Filter

242

Ascend filter

Outbound

Yes

Call-Filter

243

Ascend filter

Outbound

Yes

Idle-Limit

244

integer

Outbound

No





Cisco Access Control Security(c) AAA Administrative Services
Cisco Access Control Security: AAA Administration Services
ISBN: 1587051249
EAN: 2147483647
Year: 2006
Pages: 173

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net