Criteria for Evaluating Network Access Server Protocols
نویسندگان
چکیده
Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document defines requirements for protocols used by Network Access Servers (NAS). 1. Requirements language In this document, the key words "MAY", "MUST, "MUST NOT", "optional", "recommended", "SHOULD", and "SHOULD NOT", are to be interpreted as described in [KEYWORDS]. 2. Introduction This document defines requirements for protocols used by Network Access Servers (NAS). Protocols used by NAS's may be divided into four spaces: Access protocols, Network protocols, AAA protocols, and Device Management protocols. The primary focus of this document is on AAA protocols. The reference model of a NAS used by this document, and the analysis of the functions of a NAS which led to the development of these requirements, may be found in [NAS-MODEL]. 3. Access Protocol Requirements There are three basic types of access protocols used by NAS's. First are the traditional telephony-based access protocols, which interface to the NAS via a modem or terminal adapter or similar device. These protocols typically support asynchronous or synchronous PPP [PPP] Beadles & Mitton Informational [Page 1]
منابع مشابه
Network Access Server Requirements Next Generation (NASREQNG) NAS Model
This document describes the terminology and gives a model of typical Network Access Server (NAS). The purpose of this effort is to set the reference space for describing and evaluating NAS service protocols, such as RADIUS (RFCs 2865, 2866) [1], [2] and follow-on efforts like AAA Working Group, and the Diameter protocol [3]. These are protocols for carrying user service information for authenti...
متن کاملCriteria for Evaluating AAA Protocols for Network Access
This document represents a summary of Authentication, Authorization, Accounting (AAA) protocol requirements for network access. In creating this document, inputs were taken from documents produced by the Network Access Server Requirements Next Generation (NASREQ), Roaming Operations (ROAMOPS), and MOBILEIP working groups, as well as from TIA 45.6. Aboba, et al. Informational [Page 1] RFC 2989 N...
متن کاملComputer Network Time Synchronization using a Low Cost GPS Engine
Accurate and reliable time is necessary for financial and legal transactions, transportation, distribution systems, and many other applications. Time synchronization protocols such as NTP (the Network Time Protocol) have kept clocks of such applications synchronized to each other for many years. Nowadays there are many commercial GPS based NTP time server products at the market but they almost ...
متن کاملManaging Handover Authentication in Big-domain Wireless Environment
Mobility management is the key feature of wireless network. When the mobile node roams from the home network to the foreign network, the foreign network access server usually does not have the security material of the mobile node, and can not authenticate the mobile node by itself. Thus the three-party authentication is used, and the foreign network access server consults the home authenticatio...
متن کاملAccess Mechanism of Interactive Terminals of Smart Grid
SGIT(Interactive Terminal of Smart Grid) access to the intranet of electric power information, expanding the boundaries of network protection and bringing in risks of security. Based on safe requirement and trust computing theory, TCM(Trust Cryptographic Module) and TAS(Trust Access Server) are introduced to Interactive terminals and boundary of information network respectively. Trusted operati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- RFC
دوره 3169 شماره
صفحات -
تاریخ انتشار 2001