Navigation
Back up to About Overview
[+] Expand All
[-] Collapse All
- Steel-Belted Radius Carrier 8.4.1 Reference Guide
- Copyright and Trademark Information
- Table of Contents
- List of Figures
- List of Tables
- About This Guide
- Introduction
- Introduction to Configuration Files
- Steel-Belted Radius Carrier Core and Radius Front-End Files
- Operations Files
- access.ini File
- admin.ini File
- events.ini File
- events.xml File
- radius.ini File
- [Addresses] Section
- [AuditLog] Section
- [AuthRejectLog] Section
- [Configuration] Section
- [CurrentSessions] Section
- [DynAuthProxy]
- [LatencyLog]
- [EmbedInClass] Section
- [HiddenEAPIdentity] Section
- [IPPoolSuffixes] Section
- [IPv6] Section
- [JavaScript] Section
- [LDAP] Section
- [LDAPAddresses] Section
- [Logging] Section
- [MsChapNameStripping] Section
- [PurgeThreadLogging] Section
- [Ports] Section
- [Self] Section
- [StaticAcctProxy] Section
- [Status] Section
- [Strip] Section
- [StripPrefix] Section
- [StripSuffix] Section
- [UserNameTransform] Section
- [ValidateAuth] and [ValidateAcct] Sections
- sbrd.conf File
- services File
- servtype.ini File
- update.ini File
- [HUP] and [USR2] Sections
- Auto-Restart Files
- Authentication Configuration Files
- authlog.ini File
- authReport.ini File
- authReportAccept.ini File
- authReportBadSharedSecret.ini File
- authReportReject.ini File
- authReportUnknownClient.ini File
- blacklist.ini File
- lockout.ini File
- redirect.ini File
- statlog.ini File
- Attribute Processing Files
- Dictionary Files
- .dct Files
- .dic Files
- Structured Attributes
- Structured Attribute Dictionary Definitions
- XML Format of Dictionary Files
- Functional Areas That Use Subattributes
- Packet Parsing and Formatting
- Features that Support the Use of Structured and Subattributes
- Single Subattribute Insertion
- Attribute Filtering
- Proxy Attribute Mapping
- Structured Attributes in Return Lists and Check Lists
- Javascript
- Converting Previous Attribute Flatteners with Subattributes
- Plug-in Attribute Access
- Example of Configuration and Usage of a Structured Attribute
- Structured Attribute Dictionary Definitions
- classmap.ini File
- filter.ini File
- Filter Rules
- Order of Filter Rules
- Values in Filter Rules
- Referencing Attribute Filters
- sample.rr File
- spi.ini File
- vendor.ini File
- Adding NAS Location Information to Access-Request Messages
- Location-Specific Configuration Files
- locspec.ctrl File
- proxy.ini File
- realm.pro File
- Example Configuration for Adding NAS Location Attributes to Access-Request
- Dictionary Files
- Address Assignment Files
- dhcp.ini File
- pool.dhc Files
- Accounting Configuration Files
- account.ini File
- acctReport.ini File
- sessionTable.ini File
- Realm Configuration Files
- Proxy Realm Configuration Files
- Directed Realm Configuration Files
- proxy.ini File
- Proxyrl.ini File
- Proxy RADIUS Configuration (.pro) File
- Directed Realm Configuration (.dir) File
- radius.ini Realm Settings
- EAP Configuration Files
- eap.ini File
- peapauth.aut File
- tlsauth.aut File
- [Server_Settings] Section
- [CRL_Checking] Section
- [Session_Resumption] Section
- Sample tlsauth.aut File
- tlsauth.eap File
- [Server_Settings] Section
- [Secondary_Authorization] Section
- [CRL_Checking] Section
- [Session_Resumption] Section
- Sample tlsauth.eap File
- Configuring Secondary Authorization
- ttlsauth.aut File
- Session State Register (SSR) Configuration Files
- Configuring the config.ini File
- Configuring the dbclusterndb.gen File
- Using the georedSess.ses File to Configure the Geo-Redundancy Feature
- Local CST Configuration Files
- dbclusterRPC.gen File
- cstserver.ini File
- Operations Files
- Back-End Authentication and Accounting
- SQL Plug-Ins
- Common Configuration Items
- [Bootstrap] Section
- [Settings] Section
- Limitations of Underlying Database APIs
- SQL Parameter
- ErrorMap
- mssql.ini File
- mysql.ini File
- oracle.ini File
- LogLevel
- [Server] Section
- [Server/name] Sections
- Load Balancing Example
- JDBC Plug-ins
- SQL Authentication
- SQL Accounting
- SQL Accessors
- Detailed Use Cases
- Working with Stored Procedures
- SQL Database Data Retrieval Methods
- SQL=SELECT Method for Data Retrieval from SQL Databases
- Stored Procedure Method for Data Retrieval from SQL Databases
- Common Configuration Items
- LDAP Plug-Ins
- Overview
- Common Configurations
- LDAP Authentication
- LDAP Accessor Files
- CDR Accounting Plug-Ins
- CDR Process Overview
- Types of Call Detail Records
- Configuring Accounting Options with cdracct.acc
- Displaying CDR Information
- CDR Fields
- CDR Field Formats for Binary and ASN.1 CDR Files
- SQL Plug-Ins
- SIM Authentication Module
- Common Configurations
- ss7db.gen File
- gsmmap.gen File
- [Bootstrap] Section
- [Settings] Section
- [Realms] Section
- Configuring Each Realm Section
- Network Equipment and Data Needed for Processing Access-Requests
- Target Module Section
- Signalware MML Commands
- SIM/AKA Authentication
- Overview
- Configuring the simauth.aut File
- Authentication Gateway
- Configuring the ulcmmg.conf File
- Configuring the GWrelay.conf File
- Starting and Stopping the GWrelay Process
- Configuring the authGateway.conf File
- [Routing-Configuration] Section
- [Supported-MAP-Messages] Section
- [Common-AGW-Configurations] Section
- [Process<name>] Section
- Configuring the authGateway Startup with MML Commands
- Common Configurations
- Optional Mobility Module Configuration Files
- WiMAX Mobility Module Configuration File
- SNMP Configuration Files
- SNMP Configuration Overview
- SNMP Overview
- jnprsnmpd.conf File Overview
- testagent.sh Script Overview and Syntax
- SNMP Traps and Statistics Overview
- SNMP Configuration Overview
- Appendixes
- Authentication Protocols
- Vendor-Specific Attributes
- Configuration Examples
- Detailed Use Cases
- Using SQL Accessors
- Using LDAP Accessors
- Assigning IP Addresses Based on APN
- Adding Attributes to an Access-Accept
- Overview
- Data Flow
- Configuration Tasks
- Configuring Files for Adding Attributes to Access-Accept
- Example Configuration for Adding Attributes to Access-Accept
- Activate the Authentication Method
- Interfacing with a Kineto IP Network Controller
- Attribute Handling Methods
- Access-Request Conversion
- Access-Accept Conversion
- Access-Reject Conversion
- Configuring the SIM Authentication Module for Handling Kineto Attributes
- Using Managed IPv6 Address Pools
- SIR.conf File
- [SBR_INFO] Section
- [Level_One] Section
- [Level_Two] Section
- Glossary
This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply.

Download This Guide
Obtaining Documentation
To obtain the most current version of all Juniper Networks technical documentation, see the products documentation page on the Juniper Networks website at http://www.juniper.net/.