SlideShare a Scribd company logo
RADIUS SBR
in a nutshell
Outline
●

AAA.

●

Radius Key Features.

●

Radius Operation.

●

Accounting.

●

SBR.

●

Future.
AAA
●

Architecture.

●

Distributed Systems.

●

●

Authentication,
Authorization and
Accounting.
Radius, Diameter.
Radius – Key Features
●

Client/Server Model.

●

Network Security.

●

Extensibility (TLVs).

●

Flexible
Authentication.
Radius Operation
●

User presents auth info to client.

●

Client sends “message” to Server.

●

Can load-balance servers.

●

Server validates the shared secret.

●

●

●

Radius server consults DB when
receiving the request.
Server can “accept”, “reject”,
“challenge” the user.
If all conditions are met, server
sends a list of configuration values
(like IP address, MTU, .. etc) to the
user in the response.
Challenge
●

●

Used with devices
such as smart cards.
Unpredictable
number to the user,
encryption, giving
back the result.
Proxy

With proxy RADIUS, one RADIUS server receives an authentication
(or accounting) request from a RADIUS client (such as a NAS),
forwards the request to a remote RADIUS server, receives the reply
from the remote server, and sends that reply to the client, possibly with
changes to reflect local administrative policy.


A common use for proxy RADIUS is roaming.
The choice of which server receives the forwarded request SHOULD
be based on the authentication "realm".

UDP
●
●

●

●

Retransmission timers are required.
The timing requirements of this particular
protocol are significantly different than TCP
provides.
The stateless nature of this protocol simplifies
the use of UDP.
UDP simplifies the server implementation.
Radius Packet
Radius Packet – Code Field
The Code field is one octet, and identifies the type of RADIUS packet.
RADIUS Codes (decimal) are assigned as follows:
1

Access-Request

2

Access-Accept

3

Access-Reject

4

Accounting-Request

5

Accounting-Response

11

Access-Challenge

12

Status-Server (experimental)

13

Status-Client (experimental)

255

Reserved
Radius Packet – Identifier Field
●
●

Aids in matching requests and replies.
The RADIUS server can detect a duplicate
request if it has the same client source IP
address and source UDP port and Identifier
within a short span of time.
Radius Packet – Authenticator Field
●

This value is used to authenticate the reply
from the RADIUS server, and is used in the
password hiding algorithm.

●

Request Authenticator and Response
Authenticator.
Radius Packet – Attributes
●

RADIUS Attributes carry the specific authentication,
authorization, information and configuration details for
the request and reply.
1

User-Name

2

User-Password

3

CHAP-Password

4

NAS-IP-Address

5

NAS-Port

6

Service-Type
….
Radius Accounting
●

●

●

●

Client generates an Accounting
start packet to accounting server.
Server acknowledges reception of
the packet.
At the end of the service, client
generates a stop packet.
Server acknowledges reception of
the packet.
Radius shortcomings
●

Doesn't define fail-over mechanisms.

●

Does not provide support for per-packet confidentiality.

●

●

●

●

●

In Accounting it assumes that replay protection is provided by the backend
server not the protocol.
Doesn't Define re-transmission (UDP), which is a major issue in
accounting.
does not provide for explicit support for agents, including proxies,
redirects, and relays.
Server-initiated messages are optional.
RADIUS does not support error messages, capability negotiation, or a
mandatory/non-mandatory flag for attributes.
Diameter
●

It evolved from and replaces RADIUS protocol.

●

Ability to exchange messages and deliver AVPs.

●

Capabilities negotiation.

●

Error notification.

●

●

Extensibility, required in [RFC2989], through addition
of new applications, commands, and AVPs
Basic services necessary for applications, such as the
handling of user sessions or accounting
SBR
●
●

●
●

A Juniper Radius product.
Delivers a total authentication, authorization, and accounting
(AAA) solution on the scale required by Internet service
providers and carriers.
Provides data services for wireline, wireless carriers.
Modular design that supports add-on functionality to meet
your specific site requirements (SIM, CDMA, WiMAX, Session
Control Module).
SBR - Features
●
●

●
●

Centralized management of user access control and security simplifies access administration.
powerful proxy RADIUS features enable to easily distribute authentication and accounting requests to
the appropriate RADIUS server for processing.
External authentication features enable you to authenticate against multiple, redundant
Structured Query Language (SQL) or Lightweight Directory Access Protocol (LDAP) databases
according to configurable load balancing and retry strategies.

●

Support for a wide variety of 802.1X-compliant access points and other network access servers.

●

You can define user’s allowed access hours

●

Multiple management interfaces (GUI, LCI, CLI, XML/HTTPS, SNMP).

●

3GPP support facilitates the management of mobile sessions and their associated resources

More Related Content

PPT
RADIUS
PPT
Implementing Cisco AAA
PPTX
Radius server,PAP and CHAP Protocols
PDF
AAA & RADIUS Protocols
PPT
Radiojungle AAA RADIUS introduction
PDF
The Three Musketeers (Authentication, Authorization, Accounting)
PDF
radius dhcp dot1.x (802.1x)
RADIUS
Implementing Cisco AAA
Radius server,PAP and CHAP Protocols
AAA & RADIUS Protocols
Radiojungle AAA RADIUS introduction
The Three Musketeers (Authentication, Authorization, Accounting)
radius dhcp dot1.x (802.1x)

What's hot (20)

PDF
Radius Protocol
PDF
AAA Protocol
PDF
Cisco acs configuration guide
PDF
Radius vs. Tacacs+
PDF
TACACS Protocol
PPT
Design and Performance Optimization of Authentication, Authorization, and Acc...
PDF
Tacacs
PDF
PDF
Routing host certificates in eduroam/govroam
PPT
Implementing 802.1x Authentication
PDF
EAP-TLS (extended version)
PDF
TLS and Certificates
PPT
10215 A 14
PDF
Security issues in RADIUS based Wi-Fi AAA
PDF
At8000 s configurando_8021x
PPTX
Security
PDF
Managing HotSpot Clients With FreeRadius
PPTX
802.1x Authentication Standard
PDF
802.1x Implementation Plan for Seacoast
PPTX
PIW ISE best practices
Radius Protocol
AAA Protocol
Cisco acs configuration guide
Radius vs. Tacacs+
TACACS Protocol
Design and Performance Optimization of Authentication, Authorization, and Acc...
Tacacs
Routing host certificates in eduroam/govroam
Implementing 802.1x Authentication
EAP-TLS (extended version)
TLS and Certificates
10215 A 14
Security issues in RADIUS based Wi-Fi AAA
At8000 s configurando_8021x
Security
Managing HotSpot Clients With FreeRadius
802.1x Authentication Standard
802.1x Implementation Plan for Seacoast
PIW ISE best practices
Ad

Viewers also liked (18)

PPTX
Authentication, authorization, accounting(aaa) slides
PPTX
Authentication and Authorization in Asp.Net
PPT
CCNA Security 06- AAA
PPTX
Introduction to Diameter Protocol - Part1
PPTX
Diameter Presentation
PPT
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
PPT
Granite Introduction 11
PPTX
Stylish Bathroom Accessories
PPTX
NoSQL Databases for Implementing Data Services – Should I Care?
PPT
Acit Mumbai - understanding vpns
PPT
Telecordia Ims Presentation Expections And Challenges
PPTX
Capturing Network Traffic into Database
PPT
CCNA Security 07-Securing the local area network
PPTX
Wireshar training
PPTX
Convert Wireshark PCAP Files to Sequence Diagrams
PDF
Identity Services Engine Overview and Update
PDF
Demystifying TrustSec, Identity, NAC and ISE
PPT
CCNA Security - Chapter 3
Authentication, authorization, accounting(aaa) slides
Authentication and Authorization in Asp.Net
CCNA Security 06- AAA
Introduction to Diameter Protocol - Part1
Diameter Presentation
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
Granite Introduction 11
Stylish Bathroom Accessories
NoSQL Databases for Implementing Data Services – Should I Care?
Acit Mumbai - understanding vpns
Telecordia Ims Presentation Expections And Challenges
Capturing Network Traffic into Database
CCNA Security 07-Securing the local area network
Wireshar training
Convert Wireshark PCAP Files to Sequence Diagrams
Identity Services Engine Overview and Update
Demystifying TrustSec, Identity, NAC and ISE
CCNA Security - Chapter 3
Ad

Similar to AAA in a nutshell (20)

PPTX
08 WLAN Network Admission Control (NAC).pptx
PDF
RADIUS in Action: Securing, Monitoring and Protecting Network Infrastructure
PDF
RADIUS in Action: Securing, Monitoring and Protecting Network Infrastructure
DOC
Tutorial radius client mikrotik
PDF
TNC19 Radiator Technical Workshop -- Using Radiator to ensure better SP/IdP c...
DOCX
AAA server
PDF
SIM Authentication Architectures and Interfaces
PDF
Introduction to DIAMETER
PDF
SIM Authentication Architectures and Interfaces
PPTX
AAA Best Practices
DOCX
RADIUS provides three services- authentication- authorization- and acc.docx
PDF
Radius client
PPT
RSASecureID.ppt
PPT
RSASecureID (2).ppt
PPTX
TekRADIUS
PPTX
TekRADIUS
PDF
Les fonctionnalites mariadb
PDF
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
PPTX
WiFi Hotspot Password
PPTX
Adapting to evolving user, security, and business needs with aruba clear pass
08 WLAN Network Admission Control (NAC).pptx
RADIUS in Action: Securing, Monitoring and Protecting Network Infrastructure
RADIUS in Action: Securing, Monitoring and Protecting Network Infrastructure
Tutorial radius client mikrotik
TNC19 Radiator Technical Workshop -- Using Radiator to ensure better SP/IdP c...
AAA server
SIM Authentication Architectures and Interfaces
Introduction to DIAMETER
SIM Authentication Architectures and Interfaces
AAA Best Practices
RADIUS provides three services- authentication- authorization- and acc.docx
Radius client
RSASecureID.ppt
RSASecureID (2).ppt
TekRADIUS
TekRADIUS
Les fonctionnalites mariadb
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
WiFi Hotspot Password
Adapting to evolving user, security, and business needs with aruba clear pass

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPT
Teaching material agriculture food technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Approach and Philosophy of On baking technology
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
KodekX | Application Modernization Development
PDF
Machine learning based COVID-19 study performance prediction
Electronic commerce courselecture one. Pdf
Unlocking AI with Model Context Protocol (MCP)
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation_ Review paper, used for researhc scholars
Teaching material agriculture food technology
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Approach and Philosophy of On baking technology
20250228 LYD VKU AI Blended-Learning.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectral efficient network and resource selection model in 5G networks
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Big Data Technologies - Introduction.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
Understanding_Digital_Forensics_Presentation.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KodekX | Application Modernization Development
Machine learning based COVID-19 study performance prediction

AAA in a nutshell

  • 1. RADIUS SBR in a nutshell
  • 2. Outline ● AAA. ● Radius Key Features. ● Radius Operation. ● Accounting. ● SBR. ● Future.
  • 4. Radius – Key Features ● Client/Server Model. ● Network Security. ● Extensibility (TLVs). ● Flexible Authentication.
  • 5. Radius Operation ● User presents auth info to client. ● Client sends “message” to Server. ● Can load-balance servers. ● Server validates the shared secret. ● ● ● Radius server consults DB when receiving the request. Server can “accept”, “reject”, “challenge” the user. If all conditions are met, server sends a list of configuration values (like IP address, MTU, .. etc) to the user in the response.
  • 6. Challenge ● ● Used with devices such as smart cards. Unpredictable number to the user, encryption, giving back the result.
  • 7. Proxy With proxy RADIUS, one RADIUS server receives an authentication (or accounting) request from a RADIUS client (such as a NAS), forwards the request to a remote RADIUS server, receives the reply from the remote server, and sends that reply to the client, possibly with changes to reflect local administrative policy.  A common use for proxy RADIUS is roaming. The choice of which server receives the forwarded request SHOULD be based on the authentication "realm". 
  • 8. UDP ● ● ● ● Retransmission timers are required. The timing requirements of this particular protocol are significantly different than TCP provides. The stateless nature of this protocol simplifies the use of UDP. UDP simplifies the server implementation.
  • 10. Radius Packet – Code Field The Code field is one octet, and identifies the type of RADIUS packet. RADIUS Codes (decimal) are assigned as follows: 1 Access-Request 2 Access-Accept 3 Access-Reject 4 Accounting-Request 5 Accounting-Response 11 Access-Challenge 12 Status-Server (experimental) 13 Status-Client (experimental) 255 Reserved
  • 11. Radius Packet – Identifier Field ● ● Aids in matching requests and replies. The RADIUS server can detect a duplicate request if it has the same client source IP address and source UDP port and Identifier within a short span of time.
  • 12. Radius Packet – Authenticator Field ● This value is used to authenticate the reply from the RADIUS server, and is used in the password hiding algorithm. ● Request Authenticator and Response Authenticator.
  • 13. Radius Packet – Attributes ● RADIUS Attributes carry the specific authentication, authorization, information and configuration details for the request and reply. 1 User-Name 2 User-Password 3 CHAP-Password 4 NAS-IP-Address 5 NAS-Port 6 Service-Type ….
  • 14. Radius Accounting ● ● ● ● Client generates an Accounting start packet to accounting server. Server acknowledges reception of the packet. At the end of the service, client generates a stop packet. Server acknowledges reception of the packet.
  • 15. Radius shortcomings ● Doesn't define fail-over mechanisms. ● Does not provide support for per-packet confidentiality. ● ● ● ● ● In Accounting it assumes that replay protection is provided by the backend server not the protocol. Doesn't Define re-transmission (UDP), which is a major issue in accounting. does not provide for explicit support for agents, including proxies, redirects, and relays. Server-initiated messages are optional. RADIUS does not support error messages, capability negotiation, or a mandatory/non-mandatory flag for attributes.
  • 16. Diameter ● It evolved from and replaces RADIUS protocol. ● Ability to exchange messages and deliver AVPs. ● Capabilities negotiation. ● Error notification. ● ● Extensibility, required in [RFC2989], through addition of new applications, commands, and AVPs Basic services necessary for applications, such as the handling of user sessions or accounting
  • 17. SBR ● ● ● ● A Juniper Radius product. Delivers a total authentication, authorization, and accounting (AAA) solution on the scale required by Internet service providers and carriers. Provides data services for wireline, wireless carriers. Modular design that supports add-on functionality to meet your specific site requirements (SIM, CDMA, WiMAX, Session Control Module).
  • 18. SBR - Features ● ● ● ● Centralized management of user access control and security simplifies access administration. powerful proxy RADIUS features enable to easily distribute authentication and accounting requests to the appropriate RADIUS server for processing. External authentication features enable you to authenticate against multiple, redundant Structured Query Language (SQL) or Lightweight Directory Access Protocol (LDAP) databases according to configurable load balancing and retry strategies. ● Support for a wide variety of 802.1X-compliant access points and other network access servers. ● You can define user’s allowed access hours ● Multiple management interfaces (GUI, LCI, CLI, XML/HTTPS, SNMP). ● 3GPP support facilitates the management of mobile sessions and their associated resources