Juniper Networks
Log in
|
How to Buy
|
Contact Us
|
United States (Change)
Choose Country
Close

Choose Country

North America

  • United States

Europe

  • Deutschland - Germany
  • España - Spain
  • France
  • Italia - Italy
  • Россия - Russia
  • United Kingdom

Asia Pacific

  • Asean Region (Vietnam, Indonesia, Singapore, Malaysia)
  • Australia
  • 中国 - China
  • India
  • 日本 - Japan
  • 대한민국 - Korea
  • 台灣 - Taiwan
Solutions
Products & Services
Company
Partners
Support
Education
Community
Security Intelligence Center

Technical Documentation

Support
Technical Documentation
Content Explorer New
 
Enterprise MIBs
 
EOL Documentation
 
Feature Explorer Login required New
 
File Format Help
 
Glossary
 
Portable Libraries
 
 
Home > Support > Technical Documentation > JunosE Software > RADIUS IETF Attributes Supported for Subscriber AAA Access Messages
Print
Rate and give feedback:  Feedback Received. Thank You!
Rate and give feedback: 
Close
This document helped resolve my issue.  Yes No

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:  
E-mail: 
Submitting...
 

Related Documentation

  • Subscriber AAA Access Messages Overview
  • CLI Commands Used to Configure RADIUS IETF Attributes
  • CLI Commands Used to Include or Exclude Attributes in RADIUS Messages
  • CLI Commands Used to Ignore Attributes when Receiving Access-Accept Messages
  • RADIUS IETF Attributes
 

RADIUS IETF Attributes Supported for Subscriber AAA Access Messages

Table 1 lists the Access-Request, Access-Accept, Access-Reject, Access-Challenge, CoA, and Disconnect-Request attributes supported by JunosE Software. The following notes are referenced in Table 1:

  1. Attribute is used by Access-Request messages when terminating a PPP connection at the LNS or the initiating LAC.
  2. Attribute is used to support pass-through exchange of EAP messages.
  3. Attribute is used by Access-Challenge messages to set the PPP retransmission timeout used for EAP request packets.

Table 1 lists the RADIUS IETF attributes supported for Access-Request, Access-Accept, Access-Reject, CoA-Request, and Disconnect-Request messages.

Table 1: AAA Access Message RADIUS IETF Attributes Supported

Attribute Number

Attribute Name

Access- Request

Access- Accept

Access- Reject

Access-
Challenge

CoA-
Request

Disconnect-
Request

[1]

User-Name

✓

✓

–

–

✓

✓

[2]

User-Password

✓

–

–

–

–

–

[3]

CHAP-Password

✓

–

–

–

–

–

[4]

NAS-IP-Address

✓

–

–

–

–

–

[5]

NAS-Port

✓

–

–

–

–

–

[6]

Service-Type

✓

✓

–

–

–

–

[7]

Framed-Protocol

✓

✓

–

–

–

–

[8]

Framed-IP-Address

✓

✓

–

–

✓

–

[9]

Framed-IP-Netmask

–

✓

–

–

–

–

[11]

Filter-Id

–

✓

–

–

–

–

[12]

Framed-MTU
(See Note 2.)

✓

✓

–

–

–

–

[18]

Reply-Message
(See Note 2.)

–

✓

✓

✓

–

–

[22]

Framed-Route

–

✓

–

–

–

–

[24]

State
(See Note 2.)

–

–

✓

✓

–

–

[25]

Class

–

✓

–

–

–

–

[27]

Session-Timeout
(See Note 2.)

(See Note 3.)

–

✓

✓

✓

–

–

[28]

Idle-Timeout

–

✓

–

–

–

–

[30]

Called-Station-Id

✓

–

–

–

–

–

[31]

Calling-Station-Id

✓

–

–

–

✓

–

[32]

NAS-Identifier

✓

–

–

–

–

–

[33]

Proxy-State

✓

–

–

–

–

–

[44]

Acct-Session-Id

✓

–

–

–

✓

✓

[50]

Acct-Multi-Session-Id

✓

–

–

–

–

✓

[60]

CHAP-Challenge

✓

–

–

–

–

–

[61]

NAS-Port-Type

✓

–

–

–

–

–

[62]

Port-Limit

–

✓

–

–

–

–

[64]

Tunnel-Type
(See Note 1.)

✓

✓

–

–

–

–

[65]

Tunnel-Medium-Type
(See Note 1.)

✓

✓

–

–

–

–

[66]

Tunnel-Client-Endpoint
(See Note 1.)

✓

✓

–

–

–

–

[67]

Tunnel-Server-Endpoint
(See Note 1.)

✓

✓

–

–

–

–

[68]

Acct-Tunnel-Connection
(See Note 1.)

✓

–

–

–

–

–

[69]

Tunnel-Password

–

✓

–

–

–

–

[77]

Connect-Info

✓

–

–

–

–

–

[79]

EAP-Message
(See Note 2.)

✓

✓

✓

✓

–

–

[80]

Message-Authenticator
(See Note 2.)

✓

✓

✓

✓

–

–

[82]

Tunnel-Assignment-Id

–

✓

–

–

–

–

[83]

Tunnel-Preference

–

✓

–

–

–

–

[85]

Acct-Interim-Interval

–

✓

–

–

–

–

[87]

NAS-Port-Id

✓

–

–

–

✓

–

[88]

Framed-Pool

–

✓

–

–

–

–

[90]

Tunnel-Client-Auth-Id
(See Note 1.)

✓

✓

–

–

–

–

[91]

Tunnel-Server-Auth-Id
(See Note 1.)

✓

✓

–

–

–

–

[96]

Framed-Interface-Id

–

✓

–

–

–

–

[97]

Framed-Ipv6-Prefix

–

✓

–

–

–

–

[99]

Framed-Ipv6-Route

–

✓

–

–

–

–

[100]

Framed-IPv6-Pool

–

✓

–

–

–

–

[101]

Error-Cause

–

–

–

–

✓

✓

[123]

Delegated-IPv6-Prefix

–

✓

–

–

–

–

[135]

Ascend-Primary-Dns

–

✓

–

–

–

–

[136]

Ascend-Secondary-Dns

–

✓

–

–

–

–

[144]

DS-Lite-Tunnel-Name

–

✓

–

–

–

–

[188]

Ascend-Num-In-Multilink

✓

–

–

–

–

–

[242]

Ascend-Data-Filter

–

✓

–

–

–

–

 

Related Documentation

  • Subscriber AAA Access Messages Overview
  • CLI Commands Used to Configure RADIUS IETF Attributes
  • CLI Commands Used to Include or Exclude Attributes in RADIUS Messages
  • CLI Commands Used to Ignore Attributes when Receiving Access-Accept Messages
  • RADIUS IETF Attributes
 

Published: 2012-06-27

 
  • About Juniper
  • Investor Relations
  • Press Releases
  • Newsletters
  • Juniper Offices
  • Green Networking
  • Resources
  • How to Buy
  • Partner Locator
  • Image Library
  • Visio Templates
  • Security Center
  • Community
  • Forums
  • Blogs
  • Junos Central
  • Social Media
  • Developers
  • Support
  • Technical Documentation
  • Knowledge Base (KB)
  • Software Downloads
  • Product Licensing
  • Contact Support
Site Map / RSS Feeds / Careers / Accessibility / Feedback / Privacy & Policy / Legal Notices
Copyright© 1999-2012 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out