- Steel-Belted Radius Carrier 8.4.0 Reference Guide
- Copyright and Trademark Information
- Table of Contents
- List of Figures
- List of Tables
- About This Guide
- Introduction
- Introduction to Configuration Files
- Steel-Belted Radius Carrier Core and Radius Front-End Files
- Operations Files
- access.ini File
- admin.ini File
- events.ini File
- events.xml File
- radius.ini File
- [Addresses] Section
- [AuditLog] Section
- [AuthRejectLog] Section
- [Configuration] Section
- [CurrentSessions] Section
- [DynAuthProxy]
- [LatencyLog]
- [EmbedInClass] Section
- [HiddenEAPIdentity] Section
- [IPPoolSuffixes] Section
- [IPv6] Section
- [JavaScript] Section
- [LDAP] Section
- [LDAPAddresses] Section
- [Logging] Section
- [MsChapNameStripping] Section
- [PurgeThreadLogging] Section
- [Ports] Section
- [Self] Section
- [StaticAcctProxy] Section
- [Status] Section
- [Strip] Section
- [StripPrefix] Section
- [StripSuffix] Section
- [UserNameTransform] Section
- [ValidateAuth] and [ValidateAcct] Sections
- sbrd.conf File
- services File
- servtype.ini File
- update.ini File
- [HUP] and [USR2] Sections
- Auto-Restart Files
- Authentication Configuration Files
- authlog.ini File
- authReport.ini File
- authReportAccept.ini File
- authReportBadSharedSecret.ini File
- authReportReject.ini File
- authReportUnknownClient.ini File
- blacklist.ini File
- lockout.ini File
- redirect.ini File
- statlog.ini File
- Attribute Processing Files
- Dictionary Files
- .dct Files
- .dic Files
- Structured Attributes
- Structured Attribute Dictionary Definitions
- XML Format of Dictionary Files
- Functional Areas That Use Subattributes
- Packet Parsing and Formatting
- Features that Support the Use of Structured and Subattributes
- Single Subattribute Insertion
- Attribute Filtering
- Proxy Attribute Mapping
- Structured Attributes in Return Lists and Check Lists
- Javascript
- Converting Previous Attribute Flatteners with Subattributes
- Plug-in Attribute Access
- Example of Configuration and Usage of a Structured Attribute
- Structured Attribute Dictionary Definitions
- classmap.ini File
- filter.ini File
- Filter Rules
- Order of Filter Rules
- Values in Filter Rules
- Referencing Attribute Filters
- sample.rr File
- spi.ini File
- vendor.ini File
- Adding NAS Location Information to Access-Request Messages
- Location-Specific Configuration Files
- locspec.ctrl File
- proxy.ini File
- realm.pro File
- Example Configuration for Adding NAS Location Attributes to Access-Request
- Dictionary Files
- Address Assignment Files
- dhcp.ini File
- pool.dhc Files
- Accounting Configuration Files
- account.ini File
- acctReport.ini File
- sessionTable.ini File
- Realm Configuration Files
- Proxy Realm Configuration Files
- Directed Realm Configuration Files
- proxy.ini File
- Proxyrl.ini File
- Proxy RADIUS Configuration (.pro) File
- Directed Realm Configuration (.dir) File
- radius.ini Realm Settings
- EAP Configuration Files
- eap.ini File
- peapauth.aut File
- tlsauth.aut File
- [Server_Settings] Section
- [CRL_Checking] Section
- [Session_Resumption] Section
- Sample tlsauth.aut File
- tlsauth.eap File
- [Server_Settings] Section
- [Secondary_Authorization] Section
- [CRL_Checking] Section
- [Session_Resumption] Section
- Sample tlsauth.eap File
- Configuring Secondary Authorization
- ttlsauth.aut File
- Session State Register (SSR) Configuration Files
- Configuring the config.ini File
- Configuring the dbclusterndb.gen File
- Using the georedSess.ses File to Configure the Geo-Redundancy Feature
- Local CST Configuration Files
- dbclusterRPC.gen File
- cstserver.ini File
- Operations Files
- Back-End Authentication and Accounting
- SQL Plug-Ins
- Common Configuration Items
- [Bootstrap] Section
- [Settings] Section
- Limitations of Underlying Database APIs
- SQL Parameter
- ErrorMap
- mssql.ini File
- mysql.ini File
- oracle.ini File
- LogLevel
- [Server] Section
- [Server/name] Sections
- Load Balancing Example
- JDBC Plug-ins
- SQL Authentication
- SQL Accounting
- SQL Accessors
- Detailed Use Cases
- Working with Stored Procedures
- SQL Database Data Retrieval Methods
- SQL=SELECT Method for Data Retrieval from SQL Databases
- Stored Procedure Method for Data Retrieval from SQL Databases
- Common Configuration Items
- LDAP Plug-Ins
- Overview
- Common Configurations
- LDAP Authentication
- LDAP Accessor Files
- CDR Accounting Plug-Ins
- CDR Process Overview
- Types of Call Detail Records
- Configuring Accounting Options with cdracct.acc
- Displaying CDR Information
- CDR Fields
- CDR Field Formats for Binary and ASN.1 CDR Files
- SQL Plug-Ins
- SIM Authentication Module
- Common Configurations
- ss7db.gen File
- gsmmap.gen File
- [Bootstrap] Section
- [Settings] Section
- [Realms] Section
- Configuring Each Realm Section
- Network Equipment and Data Needed for Processing Access-Requests
- Target Module Section
- Signalware MML Commands
- SIM/AKA Authentication
- Overview
- Configuring the simauth.aut File
- Authentication Gateway
- Configuring the ulcmmg.conf File
- Configuring the GWrelay.conf File
- Starting and Stopping the GWrelay Process
- Configuring the authGateway.conf File
- [Routing-Configuration] Section
- [Supported-MAP-Messages] Section
- [Common-AGW-Configurations] Section
- [Process<name>] Section
- Configuring the authGateway Startup with MML Commands
- Common Configurations
- Optional Mobility Module Configuration Files
- WiMAX Mobility Module Configuration File
- SNMP Configuration Files
- SNMP Configuration Overview
- SNMP Overview
- jnprsnmpd.conf File Overview
- testagent.sh Script Overview and Syntax
- SNMP Traps and Statistics Overview
- SNMP Configuration Overview
- Appendixes
- Authentication Protocols
- Vendor-Specific Attributes
- Configuration Examples
- Detailed Use Cases
- Using SQL Accessors
- Using LDAP Accessors
- Assigning IP Addresses Based on APN
- Adding Attributes to an Access-Accept
- Overview
- Data Flow
- Configuration Tasks
- Configuring Files for Adding Attributes to Access-Accept
- Example Configuration for Adding Attributes to Access-Accept
- Activate the Authentication Method
- Interfacing with a Kineto IP Network Controller
- Attribute Handling Methods
- Access-Request Conversion
- Access-Accept Conversion
- Access-Reject Conversion
- Configuring the SIM Authentication Module for Handling Kineto Attributes
- Using Managed IPv6 Address Pools
- SIR.conf File
- [SBR_INFO] Section
- [Level_One] Section
- [Level_Two] Section
- Glossary
Download This Guide
blacklist.ini File
The blacklist.ini configuration file enables and configures blacklist settings. Only one profile can be created for the purposes of blacklisting, and any login attempt that matches that profile is blocked. An authentication request matches the blacklist profile if the attributes in the request match the check list attributes of the profile. The profile can contain multiple attributes, and if any of the attributes match those of the profile, the attempt is rejected.
The blacklist.ini file contains one configuration section called [Settings] (Table 52), which has the following settings:
Table 52: blacklist.ini Syntax
Parameter | Function |
---|---|
Enable |
Default value is 0. |
IncludeProxy |
Default value is 0. |
Profile | Specifies the name of the blacklist profile in the Steel-Belted Radius Carrier database. |
The following example enables the blacklist feature and specifies Steel-Belted Radius Carrier use the BlockedNumbers profile to filter authentication requests.
[Settings] Enable = 1 IncludeProxy = 0 Profile = BlockedNumbers
The BlockedNumbers profile called by this blacklist.ini file specifies check list attributes Steel-Belted Radius Carrier uses to reject authentication requests. The following entries in the BlockedNumbers profile identify Calling-Station-Id phone numbers used by rogue users you want to block.
Calling-Station-Id = 617-999-9119 Calling-Station-Id = 800-515-7889