Slides Talk1 PDF
Slides Talk1 PDF
Slides Talk1 PDF
3. RADIUS Protocol.
4. Diameter Protocol.
7. Summary.
8. Discussion Topic.
Importance of Authentication,
Authorization and Accounting (AAA)
Authentication
Examples of credentials:
1.passwords.
2.one-time token.
3.digital certificates,
4.Or any other
information
related to the identity
(e.g. biometric
parameters.)
Examples :
1. IP address filtering.
2. IP address assignment.
3. Route assignment.
4. Encryption.
1. User Id.
2. Service description.
3. Session duration.
4. The user data is sent to the Authentication Server for the purpose of verification.
5. After the verification process is successful, the user is then identified in the network.
8. The gets the response and is able to access the desired resource.
Authentication in Proxy Appliance
contd
Source Url:
https://www.bluecoat.com/sites/default/files/documents/files/Authentication,_
Authorization,_and_Accounting.4.pdf
AAA Mechanism
Authentication-based mechanisms :
The user authentication information is used as precondition for the
authorization process
Credential-based mechanisms:
This method uses credential information which is a important and
trustworthy information for the purpose of authorization.
COPS: This stands for The Common Open Policy Service. This protocol deals
with policy information.
SNMP: This stands for Simple Network Management Protocol. The accounting
information or records are all transferred to MIB (Management Information
Base) and it is sorted or classified there and finally stored.
AAA Services
Distributed Servers:
1. The goal of distributed servers is to provide
authentication, authorization and accounting.
The goal of the AAA server is to evaluate and determine the user requests
based on the set of policies.
The policies which are used by the AAA server are all stored in the PR
(Policy Repository).
AAA Architecture contd
1. centralized management
2. security.
The users send request to the server and the server authenticates the user
against a central database.
Source Url:https://www.rivier.edu/journal/ROAJ-Fall-2009/J286-RADIUS-
Sood.pdf
RADIUS Client/Server Architecture
The Network Access Server (NAS) which resides inside the RADIUS client.
The NAS helps the remote users to access the desired network resources.
The NAS has the facility to access a local RADIUS server as well as a
remote RADIUS server with the help of WAN.
The user initially establishes a connection with the Network Access Server
(NAS). Step 1 in the figure in slide no: 23.
The NAS wants to authenticate the user on the network so it requests for user
id or username and password. Step 2 in the figure in slide no: 23.
The NAS then sends a Authentication Request Packet to the RADIUS Server
for the purpose of authentication. Step 4 in the figure in slide no: 23.
RADIUS Services Contd.
The Server can either allow the user to access the desired network
resource or deny the user from accessing the network resource.
1. PPP
2. Telnet
RADIUS Services Contd.
1.time duration.
2. packet and bytes send and received.
In June 2000 the third generation of RADIUS came into the market
(standards- RFC2865 and RFC2866)
RADIUS Security
The AVP also plays an important role in routing and redirecting the
Diameter messages.
The Diameter protocol supports several agents like relays, proxies etc.
The relay agents are responsible for routing the diameter messages which
contain user information from one node to another
The Diameter protocol helps to establish and maintain session between the
server and the client at the application level.
In case of Diameter protocol the servers and the clients have the authority
to know each others capability
Protocol Description
The Diameter packet consists of header part and several AVPs.
Flag field has several flags each of them have a specific meaning and
functionality.
1. R bit which stands for request bit. If it is set the message is a request send
from client to server and if it is off then the message is an answer.
2.There is P bit, if this bit is set then the message is either redirected or routed
else the message is locally processed.
3. E bit ,if this particular bit is set then there is protocol error in message and
these messages are then referred as error messages.
1. Radius Server can not initiate 1.The Diameter Server can initiate
message.
messages.
2.Radius uses UDP for packet 2. Diameter uses TCP for data
transfer,less secure. transmission,more secured.
3.The scalability is less. 3.The scalability is more compared to
Radius.
4.This protocol do not support 4.This Protocol supports capability
capability negotiation. negotiation.
5.In context of version compatibility 5.The Diameter nodes are capable to
the Radius has poor performance. know each others version number.
6.The Radius Server can not demand 6.The Diameter server can demand for
for reauthentication or reauthorization. reauthentication or reauthorizatio.
7.The Radius is less reliable. 7.The Diameter is more reliable.
Comparison of RADIUS and
Diameter Protocol contd
8. This protocol do not provide end to 8.The Diameter provides end to end
end authentication. authentication.
9.Radius has offline states.No state 9.The Diameter has authentication
information is maintained. and authorization states.
Applications of RADIUS and
Diameter
RADIUS Protocol Diameter Protocol
5.Web servers.
6.Modems.
Summary
Usage of AAA.