Juniper Networks
Log in
|
How to Buy
|
Contact Us
|
United States (Change)
Choose Country
Close

Choose Country

North America

  • United States

Europe

  • Deutschland - Germany
  • España - Spain
  • France
  • Italia - Italy
  • Россия - Russia
  • United Kingdom

Asia Pacific

  • Asean Region (Vietnam, Indonesia, Singapore, Malaysia)
  • Australia
  • 中国 - China
  • India
  • 日本 - Japan
  • 대한민국 - Korea
  • 台灣 - Taiwan
Solutions
Products & Services
Company
Partners
Support
Education
Community
Security Intelligence Center

Technical Documentation

Download Software
Research a Problem Login required
Case Management Login required
Contract & Product Management Login required
Technical Documentation
Documentation Archive
Enterprise MIBs
File Format Help
Glossary
Portable Libraries
End-of-Life Products
Contact Support
Guidelines and Policies
Security Resources
Home > Support > Technical Documentation > JunosE Software > RADIUS IETF Attributes Supported for Subscriber AAA Access Messages
Print
Rate and give feedback:  Feedback Received. Thank You!
Rate and give feedback: 
Close
This document helped resolve my issue.  Yes No

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:  
E-mail: 
Submitting...
 

Related Documentation

  • Subscriber AAA Access Messages Overview
  • CLI Commands Used to Configure RADIUS IETF Attributes
  • CLI Commands Used to Include or Exclude Attributes in RADIUS Messages
  • CLI Commands Used to Ignore Attributes when Receiving Access-Accept Messages
  • RADIUS IETF Attributes
 

RADIUS IETF Attributes Supported for Subscriber AAA Access Messages

Table 1 lists the Access-Request, Access-Accept, Access-Reject, Access-Challenge, CoA, and Disconnect-Request attributes supported by JunosE Software. The following notes are referenced in Table 1:

  1. Attribute is used by Access-Request messages when terminating a PPP connection at the LNS or the initiating LAC.
  2. Attribute is used to support pass-through exchange of EAP messages.
  3. Attribute is used by Access-Challenge messages to set the PPP retransmission timeout used for EAP request packets.

Table 1 lists the RADIUS IETF attributes supported for Access-Request, Access-Accept, Access-Reject, CoA-Request, and Disconnect-Request messages.

Table 1: AAA Access Message RADIUS IETF Attributes Supported

Attribute Number

Attribute Name

Access- Request

Access- Accept

Access- Reject

Access-
Challenge

CoA-
Request

Disconnect-
Request

[1]

User-Name

✓

✓

–

–

✓

✓

[2]

User-Password

✓

–

–

–

–

–

[3]

CHAP-Password

✓

–

–

–

–

–

[4]

NAS-IP-Address

✓

–

–

–

–

–

[5]

NAS-Port

✓

–

–

–

–

–

[6]

Service-Type

✓

✓

–

–

–

–

[7]

Framed-Protocol

✓

✓

–

–

–

–

[8]

Framed-IP-Address

✓

✓

–

–

✓

–

[9]

Framed-IP-Netmask

–

✓

–

–

–

–

[11]

Filter-Id

–

✓

–

–

–

–

[12]

Framed-MTU
(See Note 2.)

✓

✓

–

–

–

–

[18]

Reply-Message
(See Note 2.)

–

✓

✓

✓

–

–

[22]

Framed-Route

–

✓

–

–

–

–

[24]

State
(See Note 2.)

–

–

✓

✓

–

–

[25]

Class

–

✓

–

–

–

–

[27]

Session-Timeout
(See Note 2.)

(See Note 3.)

–

✓

✓

✓

–

–

[28]

Idle-Timeout

–

✓

–

–

–

–

[30]

Called-Station-Id

✓

–

–

–

–

–

[31]

Calling-Station-Id

✓

–

–

–

✓

–

[32]

NAS-Identifier

✓

–

–

–

–

–

[33]

Proxy-State

✓

–

–

–

–

–

[44]

Acct-Session-Id

✓

–

–

–

✓

–

[50]

Acct-Multi-Session-Id

✓

–

–

–

–

✓

[60]

CHAP-Challenge

✓

–

–

–

–

–

[61]

NAS-Port-Type

✓

–

–

–

–

–

[62]

Port-Limit

–

✓

–

–

–

–

[64]

Tunnel-Type
(See Note 1.)

✓

✓

–

–

–

–

[65]

Tunnel-Medium-Type
(See Note 1.)

✓

✓

–

–

–

–

[66]

Tunnel-Client-Endpoint
(See Note 1.)

✓

✓

–

–

–

–

[67]

Tunnel-Server-Endpoint
(See Note 1.)

✓

✓

–

–

–

–

[68]

Acct-Tunnel-Connection
(See Note 1.)

✓

–

–

–

–

–

[69]

Tunnel-Password

–

✓

–

–

–

–

[77]

Connect-Info

✓

–

–

–

–

–

[79]

EAP-Message
(See Note 2.)

✓

✓

✓

✓

–

–

[80]

Message-Authenticator
(See Note 2.)

✓

✓

✓

✓

–

–

[82]

Tunnel-Assignment-Id

–

✓

–

–

–

–

[83]

Tunnel-Preference

–

✓

–

–

–

–

[85]

Acct-Interim-Interval

–

✓

–

–

–

–

[87]

NAS-Port-Id

✓

–

–

–

✓

–

[88]

Framed-Pool

–

✓

–

–

–

–

[90]

Tunnel-Client-Auth-Id
(See Note 1.)

✓

✓

–

–

–

–

[91]

Tunnel-Server-Auth-Id
(See Note 1.)

✓

✓

–

–

–

–

[96]

Framed-Interface-Id

–

✓

–

–

–

–

[97]

Framed-Ipv6-Prefix

–

✓

–

–

–

–

[99]

Framed-Ipv6-Route

–

✓

–

–

–

–

[100]

Framed-IPv6-Pool

–

✓

–

–

–

–

[101]

Error-Cause

–

–

–

–

✓

✓

[123]

Delegated-IPv6-Prefix

–

✓

–

–

–

–

[135]

Ascend-Primary-Dns

–

✓

–

–

–

–

[136]

Ascend-Secondary-Dns

–

✓

–

–

–

–

[188]

Ascend-Num-In-Multilink

✓

–

–

–

–

–

[242]

Ascend-Data-Filter

–

✓

–

–

–

–

 

Related Documentation

  • Subscriber AAA Access Messages Overview
  • CLI Commands Used to Configure RADIUS IETF Attributes
  • CLI Commands Used to Include or Exclude Attributes in RADIUS Messages
  • CLI Commands Used to Ignore Attributes when Receiving Access-Accept Messages
  • RADIUS IETF Attributes
 

Published: 2012-01-12

 
  • About Juniper
  • The New Network
  • Investor Relations
  • Press Releases
  • Newsletters
  • Juniper Offices
  • Resources
  • How to Buy
  • Partner Locator
  • Image Library
  • Visio Templates
  • Security Center
  • Community
  • Forums
  • Blogs
  • Junos Central
  • Social Media
  • Support
  • Technical Documentation
  • Knowledge Base (KB)
  • Software Downloads
  • Product Licensing
  • Contact Support
Site Map / RSS Feeds / Careers / Accessibility / Feedback / Privacy & Policy / Legal Notices
Copyright© 1999-2012 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out