⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2618.txt

📁 gnu 的radius服务器很好用的
💻 TXT
📖 第 1 页 / 共 2 页
字号:
Network Working Group                                            B. AbobaRequest for Comments: 2618                                        G. ZornCategory: Standards Track                                       Microsoft                                                                June 1999                    RADIUS Authentication Client MIBStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1999).  All Rights Reserved.Abstract   This memo defines a set of extensions which instrument RADIUS   authentication client functions. These extensions represent a portion   of the Management Information Base (MIB) for use with network   management protocols in the Internet community.  Using these   extensions IP-based management stations can manage RADIUS   authentication clients.1.  Introduction   This memo defines a portion of the Management Information Base (MIB)   for use with network management protocols in the Internet community.   In particular, it describes managed objects used for managing RADIUS   authentication clients.   Today a wide range of network devices, including routers and NASes,   act as RADIUS authentication clients in order to provide   authentication and authorization services. As a result, the effective   management of RADIUS authentication clients is of considerable   importance.Aboba & Zorn                Standards Track                     [Page 1]RFC 2618            RADIUS Authentication Client MIB           June 19992.  The SNMP Management Framework   The SNMP Management Framework presently consists of five major   components:    o   An overall architecture, described in RFC 2571 [1].    o   Mechanisms for describing and naming objects and events for the        purpose of management. The first version of this Structure of        Management Information (SMI) is called SMIv1 and described in        STD 16, RFC 1155 [2], STD 16, RFC 1212 [3] and RFC 1215 [4].        The second version, called SMIv2, is described in STD 58, RFC        2578 [5], RFC 2579 [6] and RFC 2580 [7].    o   Message protocols for transferring management information. The        first version of the SNMP message protocol is called SNMPv1 and        described in STD 15, RFC 1157 [8]. A second version of the        SNMP message protocol, which is not an Internet standards        track protocol, is called SNMPv2c and described in RFC 1901        [9] and RFC 1906 [10].  The third version of the message        protocol is called SNMPv3 and described in RFC 1906 [10], RFC        2572 [11] and RFC 2574 [12].    o   Protocol operations for accessing management information. The        first set of protocol operations and associated PDU formats is        described in STD 15, RFC 1157 [8]. A second set of protocol        operations and associated PDU formats is described in RFC 1905        [13].    o   A set of fundamental applications described in RFC 2573 [14] and        the view-based access control mechanism described in RFC 2575        [15].   Managed objects are accessed via a virtual information store, termed   the Management Information Base or MIB.  Objects in the MIB are   defined using the mechanisms defined in the SMI.   This memo specifies a MIB module that is compliant to the SMIv2. A   MIB conforming to the SMIv1 can be produced through the appropriate   translations. The resulting translated MIB must be semantically   equivalent, except where objects or events are omitted because no   translation is possible (use of Counter64). Some machine readable   information in SMIv2 will be converted into textual descriptions in   SMIv1 during the translation process. However, this loss of machine   readable information is not considered to change the semantics of the   MIB.Aboba & Zorn                Standards Track                     [Page 2]RFC 2618            RADIUS Authentication Client MIB           June 19993.  Overview   The RADIUS authentication protocol, described in [16], distinguishes   between the client function and the server function. In RADIUS   authentication, clients send Access-Requests, and servers reply with   Access-Accepts, Access-Rejects, and Access-Challenges.  Typically NAS   devices implement the client function, and thus would be expected to   implement the RADIUS authentication client MIB, while RADIUS   authentication servers implement the server function, and thus would   be expected to implement the RADIUS authentication server MIB.   However, it is possible for a RADIUS authentication entity to perform   both client and server functions. For example, a RADIUS proxy may act   as a server to one or more RADIUS authentication clients, while   simultaneously acting as an authentication client to one or more   authentication servers. In such situations, it is expected that   RADIUS entities combining client and server functionality will   support both the client and server MIBs.3.1.  Selected objects   This MIB module contains two scalars as well as a single table:   (1)  the RADIUS Authentication Server Table contains one row for        each RADIUS authentication server that the client shares a        secret with.   Each entry in the RADIUS Authentication Server Table includes fifteen   columns presenting a view of the activity of the RADIUS   authentication client.4.  DefinitionsRADIUS-AUTH-CLIENT-MIB DEFINITIONS ::= BEGINIMPORTS       MODULE-IDENTITY, OBJECT-TYPE, OBJECT-IDENTITY,       Counter32, Integer32, Gauge32,       IpAddress, TimeTicks, mib-2      FROM SNMPv2-SMI       SnmpAdminString                  FROM SNMP-FRAMEWORK-MIB       MODULE-COMPLIANCE, OBJECT-GROUP  FROM SNMPv2-CONF;radiusAuthClientMIB MODULE-IDENTITY       LAST-UPDATED "9906110000Z" -- 11 Jun 1999       ORGANIZATION "IETF RADIUS Working Group."       CONTACT-INFO              " Bernard Aboba                MicrosoftAboba & Zorn                Standards Track                     [Page 3]RFC 2618            RADIUS Authentication Client MIB           June 1999                One Microsoft Way                Redmond, WA  98052                US                Phone: +1 425 936 6605                EMail: bernarda@microsoft.com"       DESCRIPTION             "The MIB module for entities implementing the client              side of the Remote Access Dialin User Service (RADIUS)              authentication protocol."       REVISION "9906110000Z"    -- 11 Jun 1999       DESCRIPTION "Initial version as published in RFC 2618"       ::= { radiusAuthentication 2 }radiusMIB OBJECT-IDENTITY       STATUS  current       DESCRIPTION             "The OID assigned to RADIUS MIB work by the IANA."        ::= { mib-2 67 }radiusAuthentication  OBJECT IDENTIFIER ::= {radiusMIB 1}radiusAuthClientMIBObjects     OBJECT IDENTIFIER ::=                                               { radiusAuthClientMIB 1 }radiusAuthClient  OBJECT IDENTIFIER ::= { radiusAuthClientMIBObjects 1 }radiusAuthClientInvalidServerAddresses OBJECT-TYPE      SYNTAX Counter32      MAX-ACCESS read-only      STATUS current      DESCRIPTION            "The number of RADIUS Access-Response packets             received from unknown addresses."      ::= { radiusAuthClient 1 }radiusAuthClientIdentifier OBJECT-TYPE      SYNTAX SnmpAdminString      MAX-ACCESS read-only      STATUS current      DESCRIPTION             "The NAS-Identifier of the RADIUS authentication client.              This is not necessarily the same as sysName in MIB II."      ::= { radiusAuthClient 2 }radiusAuthServerTable OBJECT-TYPE      SYNTAX     SEQUENCE OF RadiusAuthServerEntry      MAX-ACCESS not-accessibleAboba & Zorn                Standards Track                     [Page 4]RFC 2618            RADIUS Authentication Client MIB           June 1999      STATUS     current      DESCRIPTION            "The (conceptual) table listing the RADIUS authentication             servers with which the client shares a secret."      ::= { radiusAuthClient 3 }radiusAuthServerEntry OBJECT-TYPE      SYNTAX     RadiusAuthServerEntry      MAX-ACCESS not-accessible      STATUS     current      DESCRIPTION            "An entry (conceptual row) representing a RADIUS             authentication server with which the client shares             a secret."      INDEX      { radiusAuthServerIndex }      ::= { radiusAuthServerTable 1 }RadiusAuthServerEntry ::= SEQUENCE {      radiusAuthServerIndex                           Integer32,      radiusAuthServerAddress                         IpAddress,      radiusAuthClientServerPortNumber                Integer32,      radiusAuthClientRoundTripTime                   TimeTicks,      radiusAuthClientAccessRequests                  Counter32,      radiusAuthClientAccessRetransmissions           Counter32,      radiusAuthClientAccessAccepts                   Counter32,      radiusAuthClientAccessRejects                   Counter32,      radiusAuthClientAccessChallenges                Counter32,      radiusAuthClientMalformedAccessResponses        Counter32,      radiusAuthClientBadAuthenticators               Counter32,      radiusAuthClientPendingRequests                   Gauge32,      radiusAuthClientTimeouts                        Counter32,      radiusAuthClientUnknownTypes                    Counter32,      radiusAuthClientPacketsDropped                  Counter32}radiusAuthServerIndex OBJECT-TYPE      SYNTAX     Integer32 (1..2147483647)      MAX-ACCESS not-accessible      STATUS     current      DESCRIPTION             "A number uniquely identifying each RADIUS             Authentication server with which this client             communicates."      ::= { radiusAuthServerEntry 1 }radiusAuthServerAddress OBJECT-TYPE      SYNTAX     IpAddress      MAX-ACCESS read-onlyAboba & Zorn                Standards Track                     [Page 5]RFC 2618            RADIUS Authentication Client MIB           June 1999      STATUS     current      DESCRIPTION            "The IP address of the RADIUS authentication server             referred to in this table entry."      ::= { radiusAuthServerEntry 2 }radiusAuthClientServerPortNumber  OBJECT-TYPE      SYNTAX Integer32 (0..65535)      MAX-ACCESS read-only      STATUS current      DESCRIPTION            "The UDP port the client is using to send requests to             this server."      ::= { radiusAuthServerEntry 3 }radiusAuthClientRoundTripTime  OBJECT-TYPE      SYNTAX TimeTicks      MAX-ACCESS read-only      STATUS current      DESCRIPTION            "The time interval (in hundredths of a second) between             the most recent Access-Reply/Access-Challenge and the             Access-Request that matched it from this RADIUS             authentication server."      ::= { radiusAuthServerEntry 4 }-- Request/Response statistics---- TotalIncomingPackets = Accepts + Rejects + Challenges + UnknownTypes---- TotalIncomingPackets - MalformedResponses - BadAuthenticators --- UnknownTypes - PacketsDropped = Successfully received---- AccessRequests + PendingRequests + ClientTimeouts =-- Successfully Received----radiusAuthClientAccessRequests OBJECT-TYPE      SYNTAX Counter32      MAX-ACCESS read-only      STATUS current      DESCRIPTION            "The number of RADIUS Access-Request packets sent             to this server. This does not include retransmissions."      ::= { radiusAuthServerEntry 5 }radiusAuthClientAccessRetransmissions OBJECT-TYPEAboba & Zorn                Standards Track                     [Page 6]RFC 2618            RADIUS Authentication Client MIB           June 1999      SYNTAX Counter32      MAX-ACCESS read-only      STATUS current      DESCRIPTION            "The number of RADIUS Access-Request packets             retransmitted to this RADIUS authentication server."      ::= { radiusAuthServerEntry 6 }radiusAuthClientAccessAccepts OBJECT-TYPE      SYNTAX Counter32      MAX-ACCESS read-only      STATUS current      DESCRIPTION            "The number of RADIUS Access-Accept packets             (valid or invalid) received from this server."      ::= { radiusAuthServerEntry 7 }radiusAuthClientAccessRejects OBJECT-TYPE      SYNTAX Counter32      MAX-ACCESS read-only      STATUS current      DESCRIPTION            "The number of RADIUS Access-Reject packets             (valid or invalid) received from this server."      ::= { radiusAuthServerEntry  8 }radiusAuthClientAccessChallenges OBJECT-TYPE      SYNTAX Counter32      MAX-ACCESS read-only      STATUS current      DESCRIPTION            "The number of RADIUS Access-Challenge packets             (valid or invalid) received from this server."      ::= { radiusAuthServerEntry 9 }-- "Access-Response" includes an Access-Accept, Access-Challenge-- or Access-RejectradiusAuthClientMalformedAccessResponses OBJECT-TYPE      SYNTAX Counter32      MAX-ACCESS read-only      STATUS current      DESCRIPTION            "The number of malformed RADIUS Access-Response             packets received from this server.             Malformed packets include packets with             an invalid length. Bad authenticators or             Signature attributes or unknown types are notAboba & Zorn                Standards Track                     [Page 7]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -