Navigation
Back up to About Overview
[+] Expand All
[-] Collapse All
- Steel-Belted Radius Carrier 8.4.1 Reference Guide
- Copyright and Trademark Information
- Table of Contents
- List of Figures
- List of Tables
- About This Guide
- Introduction
- Introduction to Configuration Files
- Steel-Belted Radius Carrier Core and Radius Front-End Files
- Operations Files
- access.ini File
- admin.ini File
- events.ini File
- events.xml File
- radius.ini File
- [Addresses] Section
- [AuditLog] Section
- [AuthRejectLog] Section
- [Configuration] Section
- [CurrentSessions] Section
- [DynAuthProxy]
- [LatencyLog]
- [EmbedInClass] Section
- [HiddenEAPIdentity] Section
- [IPPoolSuffixes] Section
- [IPv6] Section
- [JavaScript] Section
- [LDAP] Section
- [LDAPAddresses] Section
- [Logging] Section
- [MsChapNameStripping] Section
- [PurgeThreadLogging] Section
- [Ports] Section
- [Self] Section
- [StaticAcctProxy] Section
- [Status] Section
- [Strip] Section
- [StripPrefix] Section
- [StripSuffix] Section
- [UserNameTransform] Section
- [ValidateAuth] and [ValidateAcct] Sections
- sbrd.conf File
- services File
- servtype.ini File
- update.ini File
- [HUP] and [USR2] Sections
- Auto-Restart Files
- Authentication Configuration Files
- authlog.ini File
- authReport.ini File
- authReportAccept.ini File
- authReportBadSharedSecret.ini File
- authReportReject.ini File
- authReportUnknownClient.ini File
- blacklist.ini File
- lockout.ini File
- redirect.ini File
- statlog.ini File
- Attribute Processing Files
- Dictionary Files
- .dct Files
- .dic Files
- Structured Attributes
- Structured Attribute Dictionary Definitions
- XML Format of Dictionary Files
- Functional Areas That Use Subattributes
- Packet Parsing and Formatting
- Features that Support the Use of Structured and Subattributes
- Single Subattribute Insertion
- Attribute Filtering
- Proxy Attribute Mapping
- Structured Attributes in Return Lists and Check Lists
- Javascript
- Converting Previous Attribute Flatteners with Subattributes
- Plug-in Attribute Access
- Example of Configuration and Usage of a Structured Attribute
- Structured Attribute Dictionary Definitions
- classmap.ini File
- filter.ini File
- Filter Rules
- Order of Filter Rules
- Values in Filter Rules
- Referencing Attribute Filters
- sample.rr File
- spi.ini File
- vendor.ini File
- Adding NAS Location Information to Access-Request Messages
- Location-Specific Configuration Files
- locspec.ctrl File
- proxy.ini File
- realm.pro File
- Example Configuration for Adding NAS Location Attributes to Access-Request
- Dictionary Files
- Address Assignment Files
- dhcp.ini File
- pool.dhc Files
- Accounting Configuration Files
- account.ini File
- acctReport.ini File
- sessionTable.ini File
- Realm Configuration Files
- Proxy Realm Configuration Files
- Directed Realm Configuration Files
- proxy.ini File
- Proxyrl.ini File
- Proxy RADIUS Configuration (.pro) File
- Directed Realm Configuration (.dir) File
- radius.ini Realm Settings
- EAP Configuration Files
- eap.ini File
- peapauth.aut File
- tlsauth.aut File
- [Server_Settings] Section
- [CRL_Checking] Section
- [Session_Resumption] Section
- Sample tlsauth.aut File
- tlsauth.eap File
- [Server_Settings] Section
- [Secondary_Authorization] Section
- [CRL_Checking] Section
- [Session_Resumption] Section
- Sample tlsauth.eap File
- Configuring Secondary Authorization
- ttlsauth.aut File
- Session State Register (SSR) Configuration Files
- Configuring the config.ini File
- Configuring the dbclusterndb.gen File
- Using the georedSess.ses File to Configure the Geo-Redundancy Feature
- Local CST Configuration Files
- dbclusterRPC.gen File
- cstserver.ini File
- Operations Files
- Back-End Authentication and Accounting
- SQL Plug-Ins
- Common Configuration Items
- [Bootstrap] Section
- [Settings] Section
- Limitations of Underlying Database APIs
- SQL Parameter
- ErrorMap
- mssql.ini File
- mysql.ini File
- oracle.ini File
- LogLevel
- [Server] Section
- [Server/name] Sections
- Load Balancing Example
- JDBC Plug-ins
- SQL Authentication
- SQL Accounting
- SQL Accessors
- Detailed Use Cases
- Working with Stored Procedures
- SQL Database Data Retrieval Methods
- SQL=SELECT Method for Data Retrieval from SQL Databases
- Stored Procedure Method for Data Retrieval from SQL Databases
- Common Configuration Items
- LDAP Plug-Ins
- Overview
- Common Configurations
- LDAP Authentication
- LDAP Accessor Files
- CDR Accounting Plug-Ins
- CDR Process Overview
- Types of Call Detail Records
- Configuring Accounting Options with cdracct.acc
- Displaying CDR Information
- CDR Fields
- CDR Field Formats for Binary and ASN.1 CDR Files
- SQL Plug-Ins
- SIM Authentication Module
- Common Configurations
- ss7db.gen File
- gsmmap.gen File
- [Bootstrap] Section
- [Settings] Section
- [Realms] Section
- Configuring Each Realm Section
- Network Equipment and Data Needed for Processing Access-Requests
- Target Module Section
- Signalware MML Commands
- SIM/AKA Authentication
- Overview
- Configuring the simauth.aut File
- Authentication Gateway
- Configuring the ulcmmg.conf File
- Configuring the GWrelay.conf File
- Starting and Stopping the GWrelay Process
- Configuring the authGateway.conf File
- [Routing-Configuration] Section
- [Supported-MAP-Messages] Section
- [Common-AGW-Configurations] Section
- [Process<name>] Section
- Configuring the authGateway Startup with MML Commands
- Common Configurations
- Optional Mobility Module Configuration Files
- WiMAX Mobility Module Configuration File
- SNMP Configuration Files
- SNMP Configuration Overview
- SNMP Overview
- jnprsnmpd.conf File Overview
- testagent.sh Script Overview and Syntax
- SNMP Traps and Statistics Overview
- SNMP Configuration Overview
- Appendixes
- Authentication Protocols
- Vendor-Specific Attributes
- Configuration Examples
- Detailed Use Cases
- Using SQL Accessors
- Using LDAP Accessors
- Assigning IP Addresses Based on APN
- Adding Attributes to an Access-Accept
- Overview
- Data Flow
- Configuration Tasks
- Configuring Files for Adding Attributes to Access-Accept
- Example Configuration for Adding Attributes to Access-Accept
- Activate the Authentication Method
- Interfacing with a Kineto IP Network Controller
- Attribute Handling Methods
- Access-Request Conversion
- Access-Accept Conversion
- Access-Reject Conversion
- Configuring the SIM Authentication Module for Handling Kineto Attributes
- Using Managed IPv6 Address Pools
- SIR.conf File
- [SBR_INFO] Section
- [Level_One] Section
- [Level_Two] Section
- Glossary
Download This Guide
Audience
This guide is intended for network administrators working for wireline and wireless carriers that are deploying converged services or emerging wireless technologies such as Worldwide Interoperability Microwave Access (WiMAX). It provides the information that administrators need to implement and maintain authentication, authorization, and accounting (AAA) services.
This guide assumes that you are familiar with general RADIUS and networking concepts, as well as the network environment that includes Steel-Belted Radius Carrier.
If you use Steel-Belted Radius Carrier with third-party products such as Oracle, this guide assumes you are familiar with the installation, configuration, and use of those products.