⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2619.txt

📁 radius server在linux下的源码
💻 TXT
📖 第 1 页 / 共 2 页
字号:
Network Working Group                                             G. ZornRequest for Comments: 2619                                       B. AbobaCategory: Standards Track                                       Microsoft                                                                June 1999                    RADIUS Authentication Server MIBStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1999).  All Rights Reserved.Abstract   This memo defines a set of extensions which instrument RADIUS   authentication server functions. These extensions represent a portion   of the Management Information Base (MIB) for use with network   management protocols in the Internet community.  Using these   extensions IP-based management stations can manage RADIUS   authentication servers.1.  Introduction   This memo defines a portion of the Management Information Base (MIB)   for use with network management protocols in the Internet community.   In particular, it describes managed objects used for managing RADIUS   authentication servers.   RADIUS authentication servers are today widely deployed by dialup   Internet Service Providers, in order to provide authentication   services.  As a result, the effective management of RADIUS   authentication servers is of considerable importance.Zorn & Aboba                Standards Track                     [Page 1]RFC 2619            RADIUS Authentication Server MIB           June 19992.  The SNMP Management Framework   The SNMP Management Framework presently consists of five major   components:    o   An overall architecture, described in RFC 2571 [1].    o   Mechanisms for describing and naming objects and events for the        purpose of management.  The first version of this Structure of        Management Information (SMI) is called SMIv1 and described in        STD 16, RFC 1155 [2], STD 16, RFC 1212 [3] and RFC 1215 [4].        The second version, called SMIv2, is described in STD 58, RFC        2578 [5], RFC 2579 [6] and RFC 2580 [7].    o   Message protocols for transferring management information. The        first version of the SNMP message protocol is called SNMPv1 and        described in STD 15, RFC 1157 [8]. A second version of the        SNMP message protocol, which is not an Internet standards        track protocol, is called SNMPv2c and described in RFC 1901        [9] and RFC 1906 [10].  The third version of the message        protocol is called SNMPv3 and described in RFC 1906 [10], RFC        2572 [11] and RFC 2574 [12].    o   Protocol operations for accessing management information. The        first set of protocol operations and associated PDU formats is        described in STD 15, RFC 1157 [8]. A second set of protocol        operations and associated PDU formats is described in RFC 1905        [13].    o   A set of fundamental applications described in RFC 2573 [14] and        the view-based access control mechanism described in RFC 2575        [15].   Managed objects are accessed via a virtual information store, termed   the Management Information Base or MIB.  Objects in the MIB are   defined using the mechanisms defined in the SMI.   This memo specifies a MIB module that is compliant to the SMIv2.  A   MIB conforming to the SMIv1 can be produced through the appropriate   translations.  The resulting translated MIB must be semantically   equivalent, except where objects or events are omitted because no   translation is possible (use of Counter64).  Some machine readable   information in SMIv2 will be converted into textual descriptions in   SMIv1 during the translation process.  However, this loss of machine   readable information is not considered to change the semantics of the   MIB.Zorn & Aboba                Standards Track                     [Page 2]RFC 2619            RADIUS Authentication Server MIB           June 19993.  Overview   The RADIUS authentication protocol, described in [16], distinguishes   between the client function and the server function.  In RADIUS   authentication, clients send Access-Requests, and servers reply with   Access-Accepts, Access-Rejects, and Access-Challenges.  Typically NAS   devices implement the client function, and thus would be expected to   implement the RADIUS authentication client MIB, while RADIUS   authentication servers implement the server function, and thus would   be expected to implement the RADIUS authentication server MIB.   However, it is possible for a RADIUS authentication entity to perform   both client and server functions. For example, a RADIUS proxy may act   as a server to one or more RADIUS authentication clients, while   simultaneously acting as an authentication client to one or more   authentication servers.  In such situations, it is expected that   RADIUS entities combining client and server functionality will   support both the client and server MIBs.3.1.  Selected objects   This MIB module contains fourteen scalars as well as a single table:   (1)  the RADIUS Authentication Client Table contains one row for        each RADIUS authentication client that the server shares a        secret with.   Each entry in the RADIUS Authentication Client Table includes twelve   columns presenting a view of the activity of the RADIUS   authentication server.4.  DefinitionsRADIUS-AUTH-SERVER-MIB DEFINITIONS ::= BEGINIMPORTS       MODULE-IDENTITY, OBJECT-TYPE, OBJECT-IDENTITY,       Counter32, Integer32,       IpAddress, TimeTicks, mib-2      FROM SNMPv2-SMI       SnmpAdminString                  FROM SNMP-FRAMEWORK-MIB       MODULE-COMPLIANCE, OBJECT-GROUP  FROM SNMPv2-CONF;radiusAuthServMIB MODULE-IDENTITY       LAST-UPDATED "9906110000Z"       ORGANIZATION "IETF RADIUS Working Group."       CONTACT-INFO              " Bernard Aboba                MicrosoftZorn & Aboba                Standards Track                     [Page 3]RFC 2619            RADIUS Authentication Server MIB           June 1999                One Microsoft Way                Redmond, WA  98052                US                Phone: +1 425 936 6605                EMail: bernarda@microsoft.com"       DESCRIPTION             "The MIB module for entities implementing the server              side of the Remote Access Dialin User Service (RADIUS)              authentication protocol."       REVISION "9906110000Z"    --  11 Jun 1999       DESCRIPTION "Initial version as published in RFC 2619"       ::= { radiusAuthentication 1 }radiusMIB OBJECT-IDENTITY       STATUS  current       DESCRIPTION             "The OID assigned to RADIUS MIB work by the IANA."        ::= { mib-2 67 }radiusAuthentication  OBJECT IDENTIFIER ::= {radiusMIB 1}radiusAuthServMIBObjects     OBJECT IDENTIFIER ::=                                                 { radiusAuthServMIB 1 }radiusAuthServ      OBJECT IDENTIFIER ::= { radiusAuthServMIBObjects 1 }radiusAuthServIdent OBJECT-TYPE       SYNTAX      SnmpAdminString       MAX-ACCESS  read-only       STATUS      current       DESCRIPTION             "The implementation identification string for the              RADIUS authentication server software in use on the              system, for example; `FNS-2.1'"       ::= {radiusAuthServ 1}radiusAuthServUpTime OBJECT-TYPE       SYNTAX      TimeTicks       MAX-ACCESS  read-only       STATUS      current       DESCRIPTION             "If the server has a persistent state (e.g., a process),              this value will be the time elapsed (in hundredths of a              seco) since the server process was started.              For software without persistent state, this value will              be zero."       ::= {radiusAuthServ 2}Zorn & Aboba                Standards Track                     [Page 4]RFC 2619            RADIUS Authentication Server MIB           June 1999radiusAuthServResetTime OBJECT-TYPE       SYNTAX      TimeTicks       MAX-ACCESS  read-only       STATUS      current       DESCRIPTION             "If the server has a persistent state (e.g., a process)              and supports a `reset' operation (e.g., can be told to              re-read configuration files), this value will be the              time elapsed (in hundredths of a second) since the              server was `reset.'  For software that does not              have persistence or does not support a `reset' operation,              this value will be zero."       ::= {radiusAuthServ 3}radiusAuthServConfigReset OBJECT-TYPE       SYNTAX INTEGER { other(1),                        reset(2),                        initializing(3),                        running(4)}       MAX-ACCESS  read-write       STATUS      current       DESCRIPTION              "Status/action object to reinitialize any persistent               server state.  When set to reset(2), any persistent               server state (such as a process) is reinitialized as if               the server had just been started.  This value will               never be returned by a read operation.  When read, one of               the following values will be returned:                   other(1) - server in some unknown state;                   initializing(3) - server (re)initializing;                   running(4) - server currently running."       ::= {radiusAuthServ 4}-- New Stats proposed by Dale E. Reed Jr (daler@iea-software.com)radiusAuthServTotalAccessRequests OBJECT-TYPE        SYNTAX Counter32        MAX-ACCESS read-only        STATUS current        DESCRIPTION               "The number of packets received on the                authentication port."        ::= { radiusAuthServ 5}radiusAuthServTotalInvalidRequests OBJECT-TYPE        SYNTAX Counter32        MAX-ACCESS read-only        STATUS currentZorn & Aboba                Standards Track                     [Page 5]RFC 2619            RADIUS Authentication Server MIB           June 1999        DESCRIPTION              "The number of RADIUS Access-Request packets               received from unknown addresses."        ::= { radiusAuthServ 6 }radiusAuthServTotalDupAccessRequests OBJECT-TYPE       SYNTAX Counter32       MAX-ACCESS read-only       STATUS current       DESCRIPTION             "The number of duplicate RADIUS Access-Request              packets received."       ::= { radiusAuthServ 7 }radiusAuthServTotalAccessAccepts OBJECT-TYPE       SYNTAX Counter32       MAX-ACCESS read-only       STATUS current       DESCRIPTION             "The number of RADIUS Access-Accept packets sent."       ::= { radiusAuthServ 8 }radiusAuthServTotalAccessRejects OBJECT-TYPE      SYNTAX Counter32      MAX-ACCESS read-only      STATUS current      DESCRIPTION            "The number of RADIUS Access-Reject packets sent."      ::= { radiusAuthServ 9 }radiusAuthServTotalAccessChallenges OBJECT-TYPE      SYNTAX Counter32      MAX-ACCESS read-only      STATUS current      DESCRIPTION            "The number of RADIUS Access-Challenge packets sent."      ::= { radiusAuthServ 10 }radiusAuthServTotalMalformedAccessRequests OBJECT-TYPE      SYNTAX Counter32      MAX-ACCESS read-only      STATUS current      DESCRIPTION            "The number of malformed RADIUS Access-Request             packets received. Bad authenticators             and unknown types are not included as             malformed Access-Requests."      ::= { radiusAuthServ 11 }Zorn & Aboba                Standards Track                     [Page 6]RFC 2619            RADIUS Authentication Server MIB           June 1999radiusAuthServTotalBadAuthenticators OBJECT-TYPE      SYNTAX Counter32      MAX-ACCESS read-only      STATUS current      DESCRIPTION            "The number of RADIUS Authentication-Request packets             which contained invalid Signature attributes received."      ::= { radiusAuthServ 12 }radiusAuthServTotalPacketsDropped OBJECT-TYPE      SYNTAX Counter32      MAX-ACCESS read-only      STATUS current      DESCRIPTION            "The number of incoming packets             silently discarded for some reason other             than malformed, bad authenticators or             unknown types."      ::= { radiusAuthServ 13 }radiusAuthServTotalUnknownTypes OBJECT-TYPE      SYNTAX Counter32      MAX-ACCESS read-only      STATUS current      DESCRIPTION            "The number of RADIUS packets of unknown type which             were received."      ::= { radiusAuthServ 14 }-- End of newradiusAuthClientTable OBJECT-TYPE       SYNTAX     SEQUENCE OF RadiusAuthClientEntry       MAX-ACCESS not-accessible       STATUS     current       DESCRIPTION             "The (conceptual) table listing the RADIUS authentication              clients with which the server shares a secret."       ::= { radiusAuthServ 15 }radiusAuthClientEntry OBJECT-TYPE       SYNTAX     RadiusAuthClientEntry       MAX-ACCESS not-accessible       STATUS     current       DESCRIPTION             "An entry (conceptual row) representing a RADIUS              authentication client with which the server shares a              secret."Zorn & Aboba                Standards Track                     [Page 7]RFC 2619            RADIUS Authentication Server MIB           June 1999       INDEX      { radiusAuthClientIndex }       ::= { radiusAuthClientTable 1 }RadiusAuthClientEntry ::= SEQUENCE {       radiusAuthClientIndex                           Integer32,       radiusAuthClientAddress                         IpAddress,       radiusAuthClientID                        SnmpAdminString,       radiusAuthServAccessRequests                    Counter32,       radiusAuthServDupAccessRequests                 Counter32,       radiusAuthServAccessAccepts                     Counter32,       radiusAuthServAccessRejects                     Counter32,       radiusAuthServAccessChallenges                  Counter32,       radiusAuthServMalformedAccessRequests           Counter32,       radiusAuthServBadAuthenticators                 Counter32,       radiusAuthServPacketsDropped                    Counter32,       radiusAuthServUnknownTypes                      Counter32}radiusAuthClientIndex OBJECT-TYPE       SYNTAX     Integer32 (1..2147483647)       MAX-ACCESS not-accessible       STATUS     current       DESCRIPTION             "A number uniquely identifying each RADIUS              authentication client with which this server              communicates."       ::= { radiusAuthClientEntry 1 }radiusAuthClientAddress OBJECT-TYPE       SYNTAX     IpAddress       MAX-ACCESS read-only       STATUS     current       DESCRIPTION             "The NAS-IP-Address of the RADIUS authentication client              referred to in this table entry."       ::= { radiusAuthClientEntry 2 }radiusAuthClientID OBJECT-TYPE       SYNTAX     SnmpAdminString       MAX-ACCESS read-only       STATUS     current       DESCRIPTION             "The NAS-Identifier of the RADIUS authentication client              referred to in this table entry. This is not necessarily              the same as sysName in MIB II."       ::= { radiusAuthClientEntry 3 }-- Server CountersZorn & Aboba                Standards Track                     [Page 8]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -