RFC2989 日本語訳

2989 Criteria for Evaluating AAA Protocols for Network Access. B.Aboba, P. Calhoun, S. Glass, T. Hiller, P. McCann, H. Shiino, G.Zorn, G. Dommety,C.Perkins,B.Patil,D.Mitton,S.Manning,M.Beadles,P.Walsh,X.Chen,S.Sivalingham,A.Hameed,M.Munson,S.Jacobs,B.Lim,B.Hirschman, R.Hsu, Y.Xu, E.Campell,S.Baba, E.Jaques. November 2000. (Format: TXT=53197 bytes) (Status: INFORMATIONAL)
プログラムでの自動翻訳です。
英語原文

Network Working Group                                 B. Aboba, Microsoft
Request for Comments: 2989   P. Calhoun, S. Glass, Sun Microsystems, Inc.
Category: Informational T. Hiller, P. McCann, H. Shiino, P. Walsh, Lucent
                                 G. Zorn, G. Dommety, Cisco Systems, Inc.
                           C. Perkins, B. Patil, Nokia Telecommunications
                                   D. Mitton, S. Manning, Nortel Networks
                                              M. Beadles, SmartPipes Inc.
                                                         X. Chen, Alcatel
                         S. Sivalingham, Ericsson Wireless Communications
                                                       A. Hameed, Fujitsu
                                                  M. Munson, GTE Wireless
                                              S. Jacobs, GTE Laboratories
                            B. Lim, LG Information & Communications, Ltd.
                                                   B. Hirschman, Motorola
                                                   R. Hsu, Qualcomm, Inc.
                         H. Koo, Samsung Telecommunications America, Inc.
                                                   M. Lipford, Sprint PCS
                                            E. Campbell, 3Com Corporation
                                                Y. Xu, Watercove Networks
                                  S. Baba, Toshiba America Research, Inc.
                                            E. Jaques, Vodaphone Airtouch
                                                            November 2000

ワーキンググループB.Aboba、コメントを求めるマイクロソフト要求をネットワークでつないでください: 2989 P.カルフーン、S.ガラス、サン・マイクロシステムズ・インクカテゴリ: 情報のT.ヒラー、P.マッキャン、H.Shiino、P.ウォルシュ、透明なG.ゾルン、G.Dommety、シスコシステムズのInc.C.パーキンス、B.パティル、D.ミットン、ノキアのテレコミュニケーションS.マニング、ノーテルはSmartPipes株式会社のX.チェン、A.ハミード、アルカテルS.Sivalingham、エリクソン無線通信富士通のM.ムンソンのM.用務員をネットワークでつなぎます、GTEワイヤレスS; ジェイコブズ、GTE研究所B.リム、LG情報、およびコミュニケーションLtd.のB.ヒルシュマン、モトローラのR.シュー、クアルコムのInc.H.クー、三星テレコミュニケーションアメリカInc.M.Lipford、短距離競走PCS E.キャンベル、3Com社のY.シュー、WatercoveはS.馬場をネットワークでつなぎます、東芝のアメリカの研究Inc.E.ジャキュース、ボーダーフォンAirtouch2000年11月

        Criteria for Evaluating AAA Protocols for Network Access

ネットワークアクセスのためにAAAプロトコルを評価する評価基準

Status of this Memo

このMemoの状態

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

このメモはインターネットコミュニティのための情報を提供します。 それはどんな種類のインターネット標準も指定しません。 このメモの分配は無制限です。

Copyright Notice

版権情報

   Copyright (C) The Internet Society (2000).  All Rights Reserved.

Copyright(C)インターネット協会(2000)。 All rights reserved。

Abstract

要約

   This document represents a summary of Authentication, Authorization,
   Accounting (AAA) protocol requirements for network access.  In
   creating this document, inputs were taken from documents produced by
   the Network Access Server Requirements Next Generation (NASREQ),
   Roaming Operations (ROAMOPS), and MOBILEIP working groups, as well as
   from TIA 45.6.

このドキュメントはAuthentication、Authorization、ネットワークアクセサリーのためのAccounting(AAA)プロトコル要件の概要を表します。 このドキュメントを作成する際に、入力はNetwork Access Server Requirements Next Generation(NASREQ)、Roaming Operations(ROAMOPS)、およびMOBILEIPワーキンググループによって製作されたドキュメントから抜粋されました、よくTIA45.6のように。

Aboba, et al.                Informational                      [Page 1]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba、他 情報[1ページ]のRFC2989は2000年11月にアクセスAAA評価基準をネットワークでつなぎます。

   This document summarizes the requirements collected from those
   sources, separating requirements for authentication, authorization
   and accounting.  Details on the requirements are available in the
   original documents.

このドキュメントは認証、承認、および会計のための要件を切り離して、それらのソースから集められた要件をまとめます。 要件に関する詳細は正本で利用可能です。

1.  Introduction

1. 序論

   This document represents a summary of AAA protocol requirements for
   network access.  In creating this documents, inputs were taken from
   documents produced by the NASREQ [3], ROAMOPS [2], and MOBILEIP [5]
   working groups, as well as from TIA 45.6 [4].  This document
   summarizes the requirements collected from those sources, separating
   requirements for authentication, authorization and accounting.
   Details on the requirements are available in the original documents.

このドキュメントはネットワークアクセサリーのためのAAAプロトコル要件の概要を表します。 これが記録する作成では、入力はNASREQ[3]、ROAMOPS[2]、およびMOBILEIP[5]ワーキンググループによって製作されたドキュメントから抜粋されました、よくTIA45.6[4]のように。 このドキュメントは認証、承認、および会計のための要件を切り離して、それらのソースから集められた要件をまとめます。 要件に関する詳細は正本で利用可能です。

1.1.  Requirements language

1.1. 要件言語

   In this document, the key words "MAY", "MUST, "MUST NOT", "optional",
   "recommended", "SHOULD", and "SHOULD NOT", are to be interpreted as
   described in [1].

そして、このドキュメント、「5月」というキーワードで「必須、「必須NOT」、「任意」の、そして、「お勧め」の“SHOULD"、「」、[1]で説明されるように解釈されることになっていてください、」であるべきです

   Please note that the requirements specified in this document are to
   be used in evaluating AAA protocol submissions.  As such, the
   requirements language refers to capabilities of these protocols; the
   protocol documents will specify whether these features are required,
   recommended, or optional.  For example, requiring that a protocol
   support confidentiality is NOT the same thing as requiring that all
   protocol traffic be encrypted.

本書では指定された要件はAAAプロトコル差出を評価する際に使用されることです。 そういうものとして、要件言語はこれらのプロトコルの能力について言及します。 プロトコルドキュメントは、これらの特徴が必要であるか、お勧め、または任意であるかを指定するでしょう。 例えば、プロトコルサポート秘密性がすべてがトラフィックについて議定書の中で述べるのが必要であるのと同じものでないことは必要であることで、暗号化されてください。

   A protocol submission is not compliant if it fails to satisfy one or
   more of the MUST or MUST NOT requirements for the capabilities that
   it implements.  A protocol submission that satisfies all the MUST,
   MUST NOT, SHOULD and SHOULD NOT requirements for its capabilities is
   said to be "unconditionally compliant"; one that satisfies all the
   MUST and MUST NOT requirements but not all the SHOULD or SHOULD NOT
   requirements for its protocols is said to be "conditionally
   compliant."

1つか以上を満たさないならプロトコル提案が対応でない、それが実装する能力のためのNOT要件はそうしなければなりません。 すべてを満たすプロトコル提案、NOT、能力のためのSHOULDとSHOULD NOT要件は「無条件に言いなりになる」と言われています;でなければならない すべてを満たすもの、プロトコルのためのすべてのSHOULDかSHOULD NOT要件だけが「条件付きに言いなりになる」と言われているというわけではないというNOT要件はそうしなければなりません。

Aboba, et al.                Informational                      [Page 2]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba、他 情報[2ページ]のRFC2989は2000年11月にアクセスAAA評価基準をネットワークでつなぎます。

1.2.  Terminology

1.2. 用語

   Accounting
             The act of collecting information on resource usage for the
             purpose of trend analysis, auditing, billing, or cost
             allocation.

傾向変動分析、監査、支払い、または費用配分の目的のためにリソース用法における情報集めの行為を説明します。

   Administrative Domain
             An internet, or a collection of networks, computers, and
             databases under a common administration.  Computer entities
             operating in a common administration may be assumed to
             share administratively created security associations.

管理Domain Anインターネット、または一般的な管理の下におけるネットワーク、コンピュータ、およびデータベースの収集。 一般的な管理で作動するコンピュータ実体が行政上作成されたセキュリティ協会を共有すると思われるかもしれません。

   Attendant A node designed to provide the service interface between a
             client and the local domain.

クライアントと局所領域とのサービスインタフェースを提供するように設計された付き添いのAノード。

   Authentication
             The act of verifying a claimed identity, in the form of a
             pre-existing label from a mutually known name space, as the
             originator of a message (message authentication) or as the
             end-point of a channel (entity authentication).

認証はアイデンティティであると主張されたaについて確かめる行為(互いに知られている名前からの先在のラベルのフォームがメッセージの創始者(通報認証)として、または、チャンネルのエンドポイント(実体認証)として区切るコネ)です。

   Authorization
             The act of determining if a particular right, such as
             access to some resource, can be granted to the presenter of
             a particular credential.

決定するのにもかかわらずの、a特定の行為が何らかのリソースへのアクセスなどのように正す承認を特定の資格証明書のプレゼンターに与えることができます。

   Billing   The act of preparing an invoice.

準備の行為にインボイスを請求します。

   Broker    A Broker is an entity that is in a different administrative
             domain from both the home AAA server and the local ISP, and
             which provides services, such as facilitating payments
             between the local ISP and home administrative entities.
             There are two different types of brokers; proxy and
             routing.

ブローカーA BrokerはホームAAAサーバと地方のISPの両方と異なった管理ドメインにあって、地方のISPとホームの間の支払いを容易にすることなどのサービスに管理実体を提供する実体です。 2つの異なったタイプのブローカーがいます。 プロキシとルーティング。

   Client    A node wishing to obtain service from an attendant within
             an administrative domain.

管理ドメインの中の付添人からサービスを得たがっているクライアントAノード。

   End-to-End
             End-to-End is the security model that requires that
             security information be able to traverse, and be validated
             even when an AAA message is processed by intermediate nodes
             such as proxies, brokers, etc.

終わる終わりから終わりへのEndはセキュリティ情報が横断にできて、AAAメッセージがプロキシ、ブローカーなどの中間的ノードによって処理さえされるとき有効にされるのを必要とする機密保護モデルです。

Aboba, et al.                Informational                      [Page 3]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba、他 情報[3ページ]のRFC2989は2000年11月にアクセスAAA評価基準をネットワークでつなぎます。

   Foreign Domain
             An administrative domain, visited by a Mobile IP client,
             and containing the AAA infrastructure needed to carry out
             the necessary operations enabling Mobile IP registrations.
             From the point of view of the foreign agent, the foreign
             domain is the local domain.

モバイルIPクライアントによって訪問されて、モバイルIP登録証明書を可能にする必要な操作を行うのに必要であるAAAインフラストラクチャを含む外国Domain An管理ドメイン。 外国人のエージェントの観点から、外国ドメインは局所領域です。

   Home Domain
             An administrative domain, containing the network whose
             prefix matches that of a mobile node's home address, and
             containing the AAA infrastructure needed to carry out the
             necessary operations enabling Mobile IP registrations.
             From the point of view of the home agent, the home domain
             is the local domain.

ホームDomain An管理のドメイン、接頭語がモバイルノードのホームアドレスと、AAAインフラストラクチャを含むものに合っているネットワークを含むのはモバイルIP登録証明書を可能にする必要な操作を行う必要がありました。 ホームのエージェントの観点から、ホームドメインは局所領域です。

   Hop-by-hop
             Hop-by-hop is the security model that requires that each
             direct set of peers in a proxy network share a security
             association, and the security information does not traverse
             a AAA entity.

ホップごとのホップによるHopはプロキシネットワークにおける、それぞれのダイレクトセットの同輩がセキュリティ協会を共有して、セキュリティ情報がAAA実体を横断しないのを必要とする機密保護モデルです。

   Inter-domain Accounting
             Inter-domain accounting is the collection of information on
             resource usage of an entity within an administrative
             domain, for use within another administrative domain.  In
             inter-domain accounting, accounting packets and session
             records will typically cross administrative boundaries.

相互ドメインAccounting Inter-ドメイン会計は管理ドメインの中の実体のリソース用法における情報の収集です、別の管理ドメインの中の使用のために。 相互ドメイン会計では、会計パケットとセッション記録は管理境界を通常越えるでしょう。

   Intra-domain Accounting
             Intra-domain accounting is the collection of information on
             resource within an administrative domain, for use within
             that domain.  In intra-domain accounting, accounting
             packets and session records typically do not cross
             administrative boundaries.

イントラドメインAccounting Intra-ドメイン会計はそのドメインの中の使用のための管理ドメインの中のリソースにおける情報の収集です。 イントラドメイン会計では、会計パケットとセッション記録は管理境界を通常越えません。

   Local Domain
             An administrative domain containing the AAA infrastructure
             of immediate interest to a Mobile IP client when it is away
             from home.

それが家にいないときに即座にモバイルIPクライアントへの関心のAAAインフラストラクチャを含む地方のDomain An管理ドメイン。

   Proxy     A AAA proxy is an entity that acts as both a client and a
             server.  When a request is received from a client, the
             proxy acts as a AAA server.  When the same request needs to
             be forwarded to another AAA entity, the proxy acts as a AAA
             client.

プロキシA AAAプロキシは、両方としてクライアントを演じる実体とサーバです。クライアントから要求を受け取るとき、プロキシはAAAサーバとして務めます。同じ要求が、別のAAA実体に送られる必要があると、プロキシはAAAのクライアントとして務めます。

Aboba, et al.                Informational                      [Page 4]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba、他 情報[4ページ]のRFC2989は2000年11月にアクセスAAA評価基準をネットワークでつなぎます。

   Local Proxy
             A Local Proxy is a AAA server that satisfies the definition
             of a Proxy, and exists within the same administrative
             domain as the network device (e.g., NAS) that issued the
             AAA request.  Typically, a local proxy will enforce local
             policies prior to forwarding responses to the network
             devices, and are generally used to multiplex AAA messages
             from a large number of network devices.

地方のProxy A Local ProxyはProxyの定義を満たすAAAサーバであり、AAA要求を出したネットワークデバイス(例えば、NAS)と同じ管理ドメインの中に存在しています。 地元のプロキシは、通常、ネットワークデバイスへの推進応答の前にローカルの方針を実施して、一般に、多くのネットワークデバイスからAAAメッセージを多重送信するのに使用されます。

   Network Access Identifier
             The Network Access Identifier (NAI) is the userID submitted
             by the client during network access authentication.  In
             roaming, the purpose of the NAI is to identify the user as
             well as to assist in the routing of the authentication
             request.  The NAI may not necessarily be the same as the
             user's e-mail address or the user-ID submitted in an
             application layer authentication.

ネットワークAccess Identifier Network Access Identifier(NAI)はネットワークアクセス認証の間にクライアントによって提出されたuserIDです。 ローミングでは、NAIの目的は、ユーザを特定して、認証要求のルーティングを助けることです。 NAIは必ずユーザのEメールアドレスかユーザIDが応用層認証で提出したのと同じであるかもしれないというわけではありません。

   Routing Broker
             A Routing Broker is a AAA entity that satisfies the
             definition of a Broker, but is NOT in the transmission path
             of AAA messages between the local ISP and the home domain's
             AAA servers.  When a request is received by a Routing
             Broker, information is returned to the AAA requester that
             includes the information necessary for it to be able to
             contact the Home AAA server directly.  Certain
             organizations providing Routing Broker services MAY also
             act as a Certificate Authority, allowing the Routing Broker
             to return the certificates necessary for the local ISP and
             the home AAA servers to communicate securely.

ルート設定Broker Aルート設定BrokerはBrokerの定義を満たすAAA実体ですが、地方のISPとホームドメインのAAAサーバの間のAAAメッセージのトランスミッション経路のそのような実体ではありません。 ルート設定Brokerが要求を受け取るとき、直接ホームAAAサーバに連絡できるように必要情報を含んでいるAAAリクエスタに情報を返します。 また、ルート設定Brokerサービスを提供するある組織はCertificate Authorityとして機能するかもしれません、ルート設定Brokerが地方のISPとホームAAAサーバがしっかりとコミュニケートするのに必要な証明書を返すのを許容して。

   Non-Proxy Broker
             A Routing Broker is occasionally referred to as a Non-Proxy
             Broker.

非プロキシBroker Aルート設定Brokerは時折Non-プロキシBrokerと呼ばれます。

   Proxy Broker
             A Proxy Broker is a AAA entity that satisfies the
             definition of a Broker, and acts as a Transparent Proxy by
             acting as the forwarding agent for all AAA messages between
             the local ISP and the home domain's AAA servers.

プロキシBroker A Proxy Brokerは地方のISPとホームドメインのAAAサーバの間のすべてのAAAメッセージのための小口運送業者として務めることによってBrokerの定義、およびTransparent Proxyとしての行為を満たすAAA実体です。

   Real-time Accounting
             Real-time accounting involves the processing of information
             on resource usage within a defined time window.  Time
             constraints are typically imposed in order to limit
             financial risk.

リアルタイムのAccountingレアル-時間会計は定義されたタイムウィンドウの中のリソース用法で情報の処理にかかわります。 時間規制は、財政危機を制限するために通常課されます。

Aboba, et al.                Informational                      [Page 5]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba、他 情報[5ページ]のRFC2989は2000年11月にアクセスAAA評価基準をネットワークでつなぎます。

   Roaming Capability
             Roaming capability can be loosely defined as the ability to
             use any one of multiple Internet service providers (ISPs),
             while maintaining a formal, customer-vendor relationship
             with only one.  Examples of cases where roaming capability
             might be required include ISP "confederations" and ISP-
             provided corporate network access support.

1だけとの正式な顧客ベンダー関係を維持している間、緩く複数のインターネット接続サービス業者(ISP)のどれかを使用する能力とローミングCapability Roaming能力を定義できます。 ローミング能力が必要であるかもしれないケースに関する例はISP「同盟者」とISPの提供された企業ネットワークアクセスサポートを含んでいます。

   Session record
             A session record represents a summary of the resource
             consumption of a user over the entire session.  Accounting
             gateways creating the session record may do so by
             processing interim accounting events.

セッション記録Aセッション記録は全体のセッションの間、ユーザのリソース消費の概要を表します。 セッション記録を作成する会計ゲートウェイは処理でそう当座の会計イベントをするかもしれません。

   Transparent Proxy
             A Transparent Proxy is a AAA server that satisfies the
             definition of a Proxy, but does not enforce any local
             policies (meaning that it does not add, delete or modify
             attributes or modify information within messages it
             forwards).

透明なProxy A Transparent ProxyはProxyの定義を満たしますが、どんなローカルの方針も実施しないAAAサーバ(それが加えないことを意味して、属性を削除するか、変更します、またはそれが転送するメッセージの中で情報を変更する)です。

2.  Requirements Summary

2. 要件概要

   The AAA protocol evaluation criteria for network access are
   summarized below.  For details on the requirements, please consult
   the documents referenced in the footnotes.

ネットワークアクセスのためのAAAプロトコル評価基準は以下へまとめられます。 要件に関する詳細に関しては、脚注で参照をつけられるドキュメントを参照してください。

Aboba, et al.                Informational                      [Page 6]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba、他 情報[6ページ]のRFC2989は2000年11月にアクセスAAA評価基準をネットワークでつなぎます。

2.1.  General requirements

2.1. 一般要件

   These requirements apply to all aspects of AAA and thus are
   considered general requirements.

これらの要件は、AAAの全面に申し込んで、その結果、一般的な要件であると考えられます。

   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |  General                  | NASREQ  | ROAMOPS | MOBILE  |
   |  Reqts.                   |         |         |   IP    |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   Scalability             |    M    |   M     |    M    |
   |      a                    |   12    |   3     |  30 39  |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   Fail-over               |    M    |         |    M    |
   |      b                    |   12    |         |   31    |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   Mutual auth             |    M    |         |    M    |
   |   AAA client/server       |   16    |         |   30    |
   |      c                    |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   Transmission level      |         |   M     |    S    |
   |   security                |         |   6     |  31 39  |
   |      d                    |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |  Data object              |    M    |   M     |    M    |
   |  Confidentiality          |   26    |   6     |   40    |
   |      e                    |         |         |         |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |  Data object              |    M    |   M     |    M    |
   |  Integrity                |   16    |   6     |  31 39  |
   |      f                    |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |  Certificate transport    |    M    |         |  S/M    |
   |      g                    |   42    |         |31,33/46 |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | 一般| NASREQ| ROAMOPS| モバイル| | Reqts。 | | | IP| | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | スケーラビリティ| M| M| M| | a| 12 | 3 | 30 39 | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | フェイルオーバー| M| | M| | b| 12 | | 31 | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | 互いのauth| M| | M| | AAAクライアント/サーバ| 16 | | 30 | | c| | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | トランスミッションレベル| | M| S| | セキュリティ| | 6 | 31 39 | | d| | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | データ・オブジェクト| M| M| M| | 秘密性| 26 | 6 | 40 | | e| | | | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | データ・オブジェクト| M| M| M| | 保全| 16 | 6 | 31 39 | | f| | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | 証明書輸送| M| | S/M| | g| 42 | |31,33/46 | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Aboba, et al.                Informational                      [Page 7]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba、他 情報[7ページ]のRFC2989は2000年11月にアクセスAAA評価基準をネットワークでつなぎます。

   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |  Reliable AAA transport   |    M    |         |    M    |
   |  mechanism                |   22    |         |  31 32  |
   |      h                    |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   Run Over IPv4           |    M    |   M     |    M    |
   |                           |   11    |   1     |   33    |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   Run Over IPv6           |    M    |         |    S    |
   |                           |   11    |   1     |   47    |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |  Support Proxy and        |    M    |         |    M    |
   |  Routing Brokers          |   12    |         |  31 39  |
   |      i                    |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |  Auditability             |    S    |         |         |
   |      j                    |   25    |         |         |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   Dual App and Transport  |         |   O     |     M   |
   |    Security not required  |         |   6     |    40   |
   |      k                    |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |  Ability to carry         |    M    |         |    S    |
   |  service-specific attr.   |   43    |         |  31 33  |
   |      l                    |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | 信頼できるAAA輸送| M| | M| | メカニズム| 22 | | 31 32 | | h| | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | IPv4をひいてください。| M| M| M| | | 11 | 1 | 33 | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | IPv6をひいてください。| M| | S| | | 11 | 1 | 47 | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | そしてプロキシをサポートしてください。| M| | M| | ルート設定ブローカー| 12 | | 31 39 | | i| | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | 監査能力| S| | | | j| 25 | | | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | 二元的な装置と輸送| | O| M| | セキュリティは必要ではありません。| | 6 | 40 | | k| | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | 運ぶ能力| M| | S| | サービス特有のattr。 | 43 | | 31 33 | | l| | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Key
   M = MUST
   S = SHOULD
   O = MAY
   N = MUST NOT
   B = SHOULD NOT

= Oが必須NOT B=がそうするべきでない5月のN=と等しいなら、M=必須Sを合わせてください。

Aboba, et al.                Informational                      [Page 8]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba、他 情報[8ページ]のRFC2989は2000年11月にアクセスAAA評価基準をネットワークでつなぎます。

   Clarifications

明確化

   [a]  The AAA protocol must be capable of supporting millions of users
        and tens of thousands of simultaneous requests.  The AAA
        architecture and protocol MUST be capable of supporting tens of
        thousands of devices, AAA servers, proxies and brokers.

[a] AAAプロトコルは何百万人ものユーザと何万もの同時の要求をサポートすることができなければなりません。 AAAアーキテクチャとプロトコルは何万台ものデバイス、AAAサーバ、プロキシ、およびブローカーをサポートできなければなりません。

   [b]  In the event of failure to communicate with a given server, the
        protocol must provide a mechanism to change service to another
        backup or secondary server.

[b] 与えられたサーバとコミュニケートしないことの場合、プロトコルは、別のバックアップかセカンダリサーバに対するサービスを変えるためにメカニズムを提供しなければなりません。

   [c]  This requirement refers to the ability to support mutual
        authentication between the AAA client and server.

[c] この要件はAAAのクライアントとサーバの間の互いの認証をサポートする能力について言及します。

   [d]  The AAA protocol requires authentication, integrity protection
        and confidentiality at the transmission layer.  This security
        model is also referred to as hop-by-hop security, whereas the
        security is established between two communicating peers.  All of
        the security is removed when the AAA message is processed by a
        receiving AAA entity.

[d] AAAプロトコルはトランスミッション層で認証、保全保護、および秘密性を必要とします。 また、この機密保護モデルはホップごとのセキュリティと呼ばれますが、セキュリティは2人の交信している同輩の間で確立されます。 受信AAA実体でAAAメッセージを処理するとき、セキュリティのすべてを取り除きます。

   [e]  The AAA protocol requires confidentiality at the object level,
        where an object consists of one or more attributes.  Object
        level confidentiality implies that only the target AAA entity
        for whom the data is ultimately destined may decrypt the data,
        regardless of the fact that the message may traverse one or more
        intermediate AAA entities (e.g., proxies, brokers).

[e] オブジェクトが1つ以上の属性から成るところでAAAプロトコルはオブジェクトレベルで秘密性を必要とします。 オブジェクトレベル秘密性は、データが結局運命づけられている目標AAA実体だけがデータを解読するかもしれないのを含意します、メッセージが1つ以上の中間的AAA実体(例えば、プロキシ、ブローカー)を横断するかもしれないという事実にかかわらず。

   [f]  The AAA protocol requires authentication and integrity
        protection at the object level, which consists of one or more
        attributes.  Object level authentication must be persistent
        across one or more intermediate AAA entity (e.g., proxy, broker,
        etc), meaning that any AAA entity in a proxy chain may verify
        the authentication.  This implies that data that is covered by
        object level security CANNOT be modified by intermediate
        servers.

[f] AAAプロトコルはオブジェクトレベルで認証と保全保護を必要とします。(それは、1つ以上の属性から成ります)。 オブジェクトレベル認証は1つ以上の中間的AAA実体(例えば、プロキシ、ブローカーなど)の向こう側に永続的であるに違いありません、プロキシチェーンにおけるどんなAAA実体も認証について確かめるかもしれないことを意味して。 これはそのデータを含意します、すなわち、オブジェクトレベルでカバーされて、セキュリティが中間的サーバによって変更されません。

   [g]  The AAA protocol MUST be capable of transporting certificates.
        This requirement is intended as an optimization, in lieu of
        requiring that an out-of-band protocol be used to fetch
        certificates.

[g] AAAプロトコルは証明書を輸送できなければなりません。 バンドで出ているプロトコルが使用されるのが必要であることの代わりに最適化として、この要件が証明書をとって来ることを意図します。

   [h]  This requirement refers to resilience against packet loss,
        including:

[h] この要件はパケット損失、包含に対して弾力を呼びます:

        1. Hop-by-hop retransmission and fail-over so that reliability
           does not solely depend on single hop transport
           retransmission.

1. ホップで、信頼性が唯一単一のホップ輸送「再-トランスミッション」によらないように、「再-トランスミッション」とフェイルオーバーを飛び越してください。

Aboba, et al.                Informational                      [Page 9]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba、他 情報[9ページ]のRFC2989は2000年11月にアクセスAAA評価基準をネットワークでつなぎます。

        2. Control of the retransmission mechanism by the AAA
           application.
        3. Acknowledgment by the transport that a message was delivered
           successfully, separate from message semantics or syntax
           evaluation.
        5. Piggy-backing of acknowledgments in AAA messages.
        6. Timely delivery of AAA responses.

2. AAAアプリケーションによる「再-トランスミッション」メカニズムのコントロール。 3. メッセージがそうであったという輸送による承認が首尾よく提供されて、メッセージ意味論か構文評価から分離してください。 5. AAAメッセージにおける承認を背負います。 6. AAA応答のタイムリーな配送。

   [i]  In the Mobile IP AAA architecture, brokers can be in the
        forwarding path, in which case they act as transparent proxies
        (proxy brokers).  Alternatively, it is also possible to conceive
        of brokers operating as certifying authorities outside of the
        forwarding path (routing brokers).

[i] モバイルIP AAAアーキテクチャには、ブローカーが推進経路にいることができます、その場合、彼らは透明なプロキシ(プロキシブローカー)として務めます。 あるいはまた、また、推進経路(ルーティングブローカー)の外で当局を公認するとして働いているブローカーを想像するのも可能です。

   [j]  An auditable process is one in which it is possible to
        definitively determine what actions have been performed on AAA
        packets as they travel from the home AAA server to the network
        device and back.

[j] 監査可能プロセスはホームAAAサーバからネットワークデバイスまで旅行して、戻るときどんな動作がAAAパケットに実行されたかを決定的に決定するのが可能であるものです。

   [k]  The AAA protocol MUST allow communication to be secured.
        However, the AAA protocol MUST also allow an underlying security
        service (e.g., IP Security) to be used.  When the latter is
        used, the former MUST NOT be required.

[k] AAAプロトコルは、コミュニケーションが保証されるのを許容しなければなりません。 しかしながら、また、AAAプロトコルは、基本的なセキュリティー・サービス(例えば、IP Security)が使用されるのを許容しなければなりません。 後者が使用されているとき、前者を必要としてはいけません。

   [l]  The AAA protocol MUST be extensible by third parties (e.g.,
        other IETF Working Groups), in order to define attributes that
        are specific to the service being defined.  This requirement
        simply means that the AAA protocol MUST allow groups other than
        the AAA WG to define standard attributes.

[l] AAAプロトコルは第三者(例えば、他のIETF Working Groups)が広げることができるに違いありません、定義されるサービスに特定の属性を定義するために。 この要件は、AAA WG以外のグループがAAAプロトコルで標準の属性を定義できなければならないことを単に意味します。

Aboba, et al.                Informational                     [Page 10]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba、他 情報[10ページ]のRFC2989は2000年11月にアクセスAAA評価基準をネットワークでつなぎます。

2.2.  Authentication Requirements

2.2. 認証要件

   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   | Authentication            | NASREQ  | ROAMOPS | MOBILE  |
   | Reqts.                    |         |         |   IP    |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   NAI Support             |    M    |   M     |   S/M   |
   |      a                    |    9    |   2     |32,34,39/|
   |                           |         |         |   40    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   CHAP Support            |    M    |   M     |         |
   |      b                    |   10    |   3     |         |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   EAP Support             |    M    |   S     |         |
   |      c                    |   10    |   3     |         |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   PAP/Clear-Text Support  |    M    |   B     |         |
   |      d                    |   26    |   3     |         |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   Re-authentication       |    M    |         |    S    |
   |   on demand               |   17    |         |   33    |
   |      e                    |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   Authorization Only      |    M    |         |         |
   |   without Authentication  |    9    |         |         |
   |      f                    |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | 認証| NASREQ| ROAMOPS| モバイル| | Reqts。 | | | IP| | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | NAIサポート| M| M| S/M| | a| 9 | 2 |32,34,39/| | | | | 40 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | やつサポート| M| M| | | b| 10 | 3 | | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | EAPサポート| M| S| | | c| 10 | 3 | | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | 乳首/クリアテキストサポート| M| B| | | d| 26 | 3 | | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | 再認証| M| | S| | 要求に関して| 17 | | 33 | | e| | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | 承認専用| M| | | | 認証なしで| 9 | | | | f| | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Key
   M = MUST
   S = SHOULD
   O = MAY
   N = MUST NOT
   B = SHOULD NOT

Key M = MUST S = SHOULD O = MAY N = MUST NOT B = SHOULD NOT

Aboba, et al.                Informational                     [Page 11]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba, et al. Informational [Page 11] RFC 2989 Network Access AAA Evaluation Criteria November 2000

   Clarifications

Clarifications

   [a]  The AAA protocol MUST allow the use of Network Access
        Identifiers (NAI) [8] to identify users and/or devices.

[a] The AAA protocol MUST allow the use of Network Access Identifiers (NAI) [8] to identify users and/or devices.

   [b]  The AAA protocol MUST allow CHAP [20] authentication information
        to be transported.  This is commonly used by Network Access
        Servers that request authentication of a PPP user.

[b] The AAA protocol MUST allow CHAP [20] authentication information to be transported. This is commonly used by Network Access Servers that request authentication of a PPP user.

   [c]  The AAA protocol MUST allow for Extensible Authentication
        Protocol (EAP) [14] payload to be transported.  Since some EAP
        authentication mechanisms require more than one round trip, the
        AAA protocol must allow for such authentication mechanisms to be
        used.  The actual EAP authentication mechanism negotiated MUST
        be transparent to the AAA protocol.  When EAP is used,
        authentication typically occurs between the user being
        authenticated and his/her home AAA server.

[c] The AAA protocol MUST allow for Extensible Authentication Protocol (EAP) [14] payload to be transported. Since some EAP authentication mechanisms require more than one round trip, the AAA protocol must allow for such authentication mechanisms to be used. The actual EAP authentication mechanism negotiated MUST be transparent to the AAA protocol. When EAP is used, authentication typically occurs between the user being authenticated and his/her home AAA server.

   [d]  While PAP is deprecated, it is still in widespread use for its
        original intended purpose, which is support of clear-text
        passwords.  As a result, a AAA protocol will need to be able to
        securely transport clear-text passwords.  This includes
        providing for confidentiality of clear-text passwords traveling
        over the wire, as well as protecting against disclosure of
        clear-text passwords to proxies in the forwarding path.

[d] While PAP is deprecated, it is still in widespread use for its original intended purpose, which is support of clear-text passwords. As a result, a AAA protocol will need to be able to securely transport clear-text passwords. This includes providing for confidentiality of clear-text passwords traveling over the wire, as well as protecting against disclosure of clear-text passwords to proxies in the forwarding path.

   [e]  The AAA protocol MUST allow for a user to be re-authenticated
        on-demand.  The protocol MUST allow for this event to be
        triggered by either the user, access device (AAA client), or the
        home or visited AAA server.

[e] The AAA protocol MUST allow for a user to be re-authenticated on-demand. The protocol MUST allow for this event to be triggered by either the user, access device (AAA client), or the home or visited AAA server.

   [f]  The AAA protocol MUST NOT require that credentials of the user
        be provided during authorization.  The AAA protocol supports
        authorization by identification or assertion only.

[f] The AAA protocol MUST NOT require that credentials of the user be provided during authorization. The AAA protocol supports authorization by identification or assertion only.

Aboba, et al.                Informational                     [Page 12]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba, et al. Informational [Page 12] RFC 2989 Network Access AAA Evaluation Criteria November 2000

2.3.  Authorization Requirements

2.3. Authorization Requirements

   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   | Authorization             | NASREQ  | ROAMOPS | MOBILE  |
   | Reqts.                    |         |         |   IP    |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Static and Dynamic      |         |         |         |
   |   IPv4/6 Address Assign.  |    M    |   M     |   M     |
   |      a                    |   11    |   5     | 32 36   |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   RADIUS gateway          |    M    |   M     |    M    |
   |   capability              |   44    |   3     |    45   |
   |      b                    |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   Reject                  |    M    |   M     |   M     |
   |   capability              |   12    |   4     |  39     |
   |      c                    |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   Precludes layer 2       |    N    |   N     |         |
   |   tunneling               |   11    |   5     |         |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |  Re-Authorization on      |    M    |         |   S     |
   |   demand                  |   18    |         | 30 33   |
   |      d                    |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |  Support for Access Rules,|    M    |         |         |
   |  Restrictions, Filters    | 11, 19  |         |         |
   |      e                    |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |  State Reconciliation     |    M    |         |         |
   |      f                    |   20    |         |         |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |  Unsolicited Disconnect   |    M    |         |         |
   |      g                    |   18    |         |         |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | Authorization | NASREQ | ROAMOPS | MOBILE | | Reqts. | | | IP | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Static and Dynamic | | | | | IPv4/6 Address Assign. | M | M | M | | a | 11 | 5 | 32 36 | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | RADIUS gateway | M | M | M | | capability | 44 | 3 | 45 | | b | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | Reject | M | M | M | | capability | 12 | 4 | 39 | | c | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | Precludes layer 2 | N | N | | | tunneling | 11 | 5 | | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | Re-Authorization on | M | | S | | demand | 18 | | 30 33 | | d | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | Support for Access Rules,| M | | | | Restrictions, Filters | 11, 19 | | | | e | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | State Reconciliation | M | | | | f | 20 | | | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | Unsolicited Disconnect | M | | | | g | 18 | | | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Aboba, et al.                Informational                     [Page 13]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba, et al. Informational [Page 13] RFC 2989 Network Access AAA Evaluation Criteria November 2000

   Key
   M = MUST
   S = SHOULD
   O = MAY
   N = MUST NOT
   B = SHOULD NOT

Key M = MUST S = SHOULD O = MAY N = MUST NOT B = SHOULD NOT

   Clarifications

Clarifications

   [a]  The AAA protocol MUST allow a server to provide a static or
        dynamic address during the authorization phase of a user and/or
        device.  The address assigned MUST be either of type IPv4 or
        IPv6.  If both the client AND the server are aware of a pre-
        configured address, then it is considered static.  Anything else
        is dynamic.

[a] The AAA protocol MUST allow a server to provide a static or dynamic address during the authorization phase of a user and/or device. The address assigned MUST be either of type IPv4 or IPv6. If both the client AND the server are aware of a pre- configured address, then it is considered static. Anything else is dynamic.

   [b]  This requirement refers to the ability of a new AAA protocol be
        sufficiently compatible with the large installed base of
        attributes for existing approaches (RADIUS), such that a server
        implementation could speak both protocols, or translate between
        them.

[b] This requirement refers to the ability of a new AAA protocol be sufficiently compatible with the large installed base of attributes for existing approaches (RADIUS), such that a server implementation could speak both protocols, or translate between them.

   [c]  This requirement refers to the ability of a proxy broker to deny
        access without forwarding the access request to the AAA server,
        or to deny access after receiving an access accept from the AAA
        server.

[c] This requirement refers to the ability of a proxy broker to deny access without forwarding the access request to the AAA server, or to deny access after receiving an access accept from the AAA server.

   [d]  This requirement refers to the ability of the AAA client or
        server to trigger re-authorization, or to the ability of the
        server to send updated authorization information to the device,
        such as "stop service."  Authorization can allow for a time
        period, then additional authorization can be sought to continue.
        A server can initially authorize a user to connect and receive
        services, but later decide the user is no longer allowed use of
        the service, for example after N minutes.  Authorizations can
        have a time limit.  Re-authorization does not necessarily imply
        re-authentication.

[d] This requirement refers to the ability of the AAA client or server to trigger re-authorization, or to the ability of the server to send updated authorization information to the device, such as "stop service." Authorization can allow for a time period, then additional authorization can be sought to continue. A server can initially authorize a user to connect and receive services, but later decide the user is no longer allowed use of the service, for example after N minutes. Authorizations can have a time limit. Re-authorization does not necessarily imply re-authentication.

   [e]  This requirement refers to the ability to of the protocol to
        describe access operational limitations and authorization
        restrictions to usage to the NAS which includes (but is not
        limited to):

[e] This requirement refers to the ability to of the protocol to describe access operational limitations and authorization restrictions to usage to the NAS which includes (but is not limited to):

        1. Session expirations and Idle Timeouts
        2. Packet filters
        3. Static routes
        4. QoS parameters

1. Session expirations and Idle Timeouts 2. Packet filters 3. Static routes 4. QoS parameters

Aboba, et al.                Informational                     [Page 14]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba, et al. Informational [Page 14] RFC 2989 Network Access AAA Evaluation Criteria November 2000

   [f]  This requirement refers to the ability of the NAS to use the AAA
        server to manage resource allocation state.  This capability can
        assist with, but it is not synonymous with, simultaneous user
        login control, port usage limitations, or IP address pooling.

[f] This requirement refers to the ability of the NAS to use the AAA server to manage resource allocation state. This capability can assist with, but it is not synonymous with, simultaneous user login control, port usage limitations, or IP address pooling.

        The design must provide for recovery from data loss due to a
        variety of faults, including NAS and AAA server reboots, and
        NAS/AAA server communication outages, and MUST be independent of
        the accounting stream.  The granularity of the recovery of state
        information after an outage may be on the order of a fraction of
        a minute.  In order to provide for state recovery, explicit
        session/resource status and update and disconnect messages will
        be required.

The design must provide for recovery from data loss due to a variety of faults, including NAS and AAA server reboots, and NAS/AAA server communication outages, and MUST be independent of the accounting stream. The granularity of the recovery of state information after an outage may be on the order of a fraction of a minute. In order to provide for state recovery, explicit session/resource status and update and disconnect messages will be required.

        Because of potential multi-domain issues, only systems that
        allocate or use a resource should track its state.

Because of potential multi-domain issues, only systems that allocate or use a resource should track its state.

   [g]  This requirement refers to the ability of the AAA server to
        request the NAS to disconnect an active session for
        authorization policy reasons.

[g] This requirement refers to the ability of the AAA server to request the NAS to disconnect an active session for authorization policy reasons.

Aboba, et al.                Informational                     [Page 15]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba, et al. Informational [Page 15] RFC 2989 Network Access AAA Evaluation Criteria November 2000

2.4.  Accounting Requirements

2.4. Accounting Requirements

   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   | Accounting                | NASREQ  | ROAMOPS | MOBILE  |
   | Reqts.                    |         |         |   IP    |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   Real-time accounting    |    M    |    M    |   M     |
   |      a                    |   14    |    7    |  31     |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   Mandatory Compact       |         |    M    |         |
   |    Encoding               |         |    7    |         |
   |      b                    |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   Accounting Record       |         |    M    |   M     |
   |    Extensibility          |         |    7    |  33     |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   Batch Accounting        |    S    |         |         |
   |      c                    |   21    |         |         |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   Guaranteed Delivery     |    M    |         |    M    |
   |      d                    |   22    |         |   31    |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |   Accounting Time Stamps  |    M    |         |    M    |
   |      e                    |   23    |         |   40    |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |  Dynamic Accounting       |    M    |         |         |
   |      f                    |   48    |         |         |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | Accounting | NASREQ | ROAMOPS | MOBILE | | Reqts. | | | IP | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | Real-time accounting | M | M | M | | a | 14 | 7 | 31 | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | Mandatory Compact | | M | | | Encoding | | 7 | | | b | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | Accounting Record | | M | M | | Extensibility | | 7 | 33 | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | Batch Accounting | S | | | | c | 21 | | | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | Guaranteed Delivery | M | | M | | d | 22 | | 31 | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | Accounting Time Stamps | M | | M | | e | 23 | | 40 | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | Dynamic Accounting | M | | | | f | 48 | | | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Aboba, et al.                Informational                     [Page 16]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba, et al. Informational [Page 16] RFC 2989 Network Access AAA Evaluation Criteria November 2000

   Key
   M = MUST
   S = SHOULD
   O = MAY
   N = MUST NOT
   B = SHOULD NOT

Key M = MUST S = SHOULD O = MAY N = MUST NOT B = SHOULD NOT

   Clarifications

Clarifications

   [a]  This requirement may be loosely defined as reporting
        synchronously with events.  Typically the time window is on the
        order of seconds, not milliseconds.

[a] This requirement may be loosely defined as reporting synchronously with events. Typically the time window is on the order of seconds, not milliseconds.

   [b]  The AAA protocol's Accounting data format MUST NOT be bloated,
        imposing a large overhead for one or more accounting data
        elements.

[b] The AAA protocol's Accounting data format MUST NOT be bloated, imposing a large overhead for one or more accounting data elements.

   [c]  This requirement refers to the ability to buffer or store
        multiple accounting records, and send them together at some
        later time.

[c] This requirement refers to the ability to buffer or store multiple accounting records, and send them together at some later time.

   [d]  This is an application layer acknowledgment.  This is sent when
        the receiving server is willing to take responsibility for the
        message data.

[d] This is an application layer acknowledgment. This is sent when the receiving server is willing to take responsibility for the message data.

   [e]  This requirement refers to the ability to reflect the time of
        occurrence of events such as log-on, logoff, authentication,
        authorization and interim accounting.  It also implies the
        ability to provide for unambiguous time-stamps.

[e] This requirement refers to the ability to reflect the time of occurrence of events such as log-on, logoff, authentication, authorization and interim accounting. It also implies the ability to provide for unambiguous time-stamps.

   [f]  This requirement refers to the ability to account for dynamic
        authentication and authorization.  To support this, there can be
        multiple accounting records for a single session.

[f] This requirement refers to the ability to account for dynamic authentication and authorization. To support this, there can be multiple accounting records for a single session.

2.5.  Unique Mobile IP requirements

2.5. Unique Mobile IP requirements

   In addition to the above requirements, Mobile IP also has the
   following additional requirements:

In addition to the above requirements, Mobile IP also has the following additional requirements:

Aboba, et al.                Informational                     [Page 17]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba, et al. Informational [Page 17] RFC 2989 Network Access AAA Evaluation Criteria November 2000

   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |  Encoding of Mobile IP    |         |         |   M     |
   |  registration messages    |         |         |   33    |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |  Firewall friendly        |         |         |   M     |
   |      a                    |         |         |   35    |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           |         |         |         |
   |  Allocation of local Home |         |         |   S/M   |
   |  agent                    |         |         |  37/41  |
   |                           |         |         |         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | Encoding of Mobile IP | | | M | | registration messages | | | 33 | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | Firewall friendly | | | M | | a | | | 35 | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | Allocation of local Home | | | S/M | | agent | | | 37/41 | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Key
   M = MUST
   S = SHOULD
   O = MAY
   N = MUST NOT
   B = SHOULD NOT

Key M = MUST S = SHOULD O = MAY N = MUST NOT B = SHOULD NOT

   Clarifications

Clarifications

   [a]  A firewall friendly protocol is one which is designed to
        accommodate a firewall acting as a proxy.  For example, this
        would permit a Home Agent AAA server situated behind a firewall
        to be reachable from the Internet for the purposes of providing
        AAA services to a Mobile IP Foreign Agent.

[a] A firewall friendly protocol is one which is designed to accommodate a firewall acting as a proxy. For example, this would permit a Home Agent AAA server situated behind a firewall to be reachable from the Internet for the purposes of providing AAA services to a Mobile IP Foreign Agent.

        Notes

Notes

        [1] Section 4.2.1 of [2]
        [2] Section 4.2.2 of [2]. Also see [8].
        [3] Section 4.2.3 of [2]. Also see [14].
        [4] Section 4.2.4 of [2].
        [5] Section 4.2.5 of [2].
        [6] Section 4.2.6 of [2].
        [7] Section 4.3 of [2].
        [8] Section 6 of [3].  Also see [6].
        [9] Section 8.2.2.2 of [3].  Also see [14].
        [10] Section 8.2.2.1 of [3].  Also see [14].
        [11] Section 8.3.2.2 of [3].  Also see [7].
        [12] Section 8.1.1 of [3].
        [13] Section 8.1.4.4 of [3].
        [14] Section 8.4.1.2 of [3].

[1] Section 4.2.1 of [2] [2] Section 4.2.2 of [2]. Also see [8]. [3] Section 4.2.3 of [2]. Also see [14]. [4] Section 4.2.4 of [2]. [5] Section 4.2.5 of [2]. [6] Section 4.2.6 of [2]. [7] Section 4.3 of [2]. [8] Section 6 of [3]. Also see [6]. [9] Section 8.2.2.2 of [3]. Also see [14]. [10] Section 8.2.2.1 of [3]. Also see [14]. [11] Section 8.3.2.2 of [3]. Also see [7]. [12] Section 8.1.1 of [3]. [13] Section 8.1.4.4 of [3]. [14] Section 8.4.1.2 of [3].

Aboba, et al.                Informational                     [Page 18]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba, et al. Informational [Page 18] RFC 2989 Network Access AAA Evaluation Criteria November 2000

        [15] Section 8.4.2 of [3].
        [16] Section 8.1.3 of [3].
        [17] Section 8.2.1.2 of [3].
        [18] Section 8.3.1.1 of [3].
        [19] Section 8.3.2.1 of [3].  Also see [7].
        [20] Section 8.3.2.3 of [3].  Also see [6], [7].
        [21] Section 8.4.1.3 of [3].
        [22] Section 8.4.1.1 of [3].
        [23] Section 8.4.1.4 of [3].
        [24] Section 8.4.3.1 of [3].
        [25] Section 8.4.3.2 of [3].
        [26] Section 8.2.3.1 of [3].
        [27] Section 8.3.3.1 of [3].
        [28] Section 8.1.4.1 of [3].
        [29] Refer [15]
        [30] Section 3 of [5]
        [31] Section 3.1 of [5]
        [32] Section 4 of [5]
        [33] Section 5 of [5]
        [34] Section 5.1 of [5]
        [35] Section 5.2 of [5]
        [36] Section 5.3 of [5]
        [37] Section 5.4 of [5]
        [38] Section 5.5 of [5]
        [39] Section 6 of [5]
        [40] Section 5.1 of [4]
        [41] Section 5.2.2 of [4]
        [42] Section 8.2.2.2 of [3]
        [43] Section 8.1.2.3 of [3]
        [44] Section 8.1.2.2 of [3]
        [45] Section 5.4 of [4]
        [46] Section 7 of [4]
        [47] Section 8 of [5]
        [48] Section 8.4.1.5 of [3]

[15] Section 8.4.2 of [3]. [16] Section 8.1.3 of [3]. [17] Section 8.2.1.2 of [3]. [18] Section 8.3.1.1 of [3]. [19] Section 8.3.2.1 of [3]. Also see [7]. [20] Section 8.3.2.3 of [3]. Also see [6], [7]. [21] Section 8.4.1.3 of [3]. [22] Section 8.4.1.1 of [3]. [23] Section 8.4.1.4 of [3]. [24] Section 8.4.3.1 of [3]. [25] Section 8.4.3.2 of [3]. [26] Section 8.2.3.1 of [3]. [27] Section 8.3.3.1 of [3]. [28] Section 8.1.4.1 of [3]. [29] Refer [15] [30] Section 3 of [5] [31] Section 3.1 of [5] [32] Section 4 of [5] [33] Section 5 of [5] [34] Section 5.1 of [5] [35] Section 5.2 of [5] [36] Section 5.3 of [5] [37] Section 5.4 of [5] [38] Section 5.5 of [5] [39] Section 6 of [5] [40] Section 5.1 of [4] [41] Section 5.2.2 of [4] [42] Section 8.2.2.2 of [3] [43] Section 8.1.2.3 of [3] [44] Section 8.1.2.2 of [3] [45] Section 5.4 of [4] [46] Section 7 of [4] [47] Section 8 of [5] [48] Section 8.4.1.5 of [3]

3.  References

3. References

   [1]  Bradner, S., "Key words for use in RFCs to Indicate Requirement
        Levels", BCP 14, RFC 2119, March 1997.

[1] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997.

   [2]  Aboba, B. and G. Zorn, "Criteria for Evaluating Roaming
        Protocols", RFC 2477, January 1999.

[2] Aboba, B. and G. Zorn, "Criteria for Evaluating Roaming Protocols", RFC 2477, January 1999.

   [3]  Beadles, M. and D. Mitton, "Criteria for Evaluating Network
        Access Server Protocols", Work in Progress.

[3] Beadles, M. and D. Mitton, "Criteria for Evaluating Network Access Server Protocols", Work in Progress.

   [4]  Hiller, T., et al., "Cdma2000 Wireless Data Requirements for
        AAA", Work in Progress.

[4] Hiller, T., et al., "Cdma2000 Wireless Data Requirements for AAA", Work in Progress.

Aboba, et al.                Informational                     [Page 19]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba, et al. Informational [Page 19] RFC 2989 Network Access AAA Evaluation Criteria November 2000

   [5]  Glass, S., Hiller, T., Jacobs, S. and C. Perkins, "Mobile IP
        Authentication, Authorization, and Accounting Requirements", RFC
        2977, October 2000.

[5] Glass, S., Hiller, T., Jacobs, S. and C. Perkins, "Mobile IP Authentication, Authorization, and Accounting Requirements", RFC 2977, October 2000.

   [6]  Mitton, D., Beadles, M., "Network Access Server Requirements
        Next Generation (NASREQNG) NAS Model", RFC 2881, July 2000.

[6] Mitton, D., Beadles, M., "Network Access Server Requirements Next Generation (NASREQNG) NAS Model", RFC 2881, July 2000.

   [7]  Mitton, D., "Network Access Server Requirements: Extended RADIUS
        Practices", RFC 2882, July 2000.

[7] Mitton, D., "Network Access Server Requirements: Extended RADIUS Practices", RFC 2882, July 2000.

   [8]  Aboba,  B. and M. Beadles, "The Network Access Identifier", RFC
        2486, January 1999.

[8] Aboba, B. and M. Beadles, "The Network Access Identifier", RFC 2486, January 1999.

   [9]  Rigney, C., Willens, S., Rubens, A. and W. Simpson, "Remote
        Authentication Dial In User Service (RADIUS)", RFC 2865, June
        2000.

[9] Rigney, C., Willens, S., Rubens, A. and W. Simpson, "Remote Authentication Dial In User Service (RADIUS)", RFC 2865, June 2000.

   [10] Rigney, C., "RADIUS Accounting", RFC 2866, June 2000.

[10] Rigney, C., "RADIUS Accounting", RFC 2866, June 2000.

   [11] Simpson, W., Editor, "The Point-to-Point Protocol (PPP)", STD
        51, RFC 1661, July 1994.

[11] Simpson, W., Editor, "The Point-to-Point Protocol (PPP)", STD 51, RFC 1661, July 1994.

   [12] Sklower, K., Lloyd, B., McGregor, G., Carr, D. and T. Coradetti,
        "The PPP Multilink Protocol (MP)", RFC 1990, August 1996.

[12] Sklower, K., Lloyd, B., McGregor, G., Carr, D. and T. Coradetti, "The PPP Multilink Protocol (MP)", RFC 1990, August 1996.

   [13] Simpson, W., Editor, "PPP LCP Extensions", RFC 1570, January
        1994.

[13] Simpson, W., Editor, "PPP LCP Extensions", RFC 1570, January 1994.

   [14] Blunk, L. and J. Vollbrecht, "PPP Extensible Authentication
        Protocol (EAP)", RFC 2284, March 1998.

[14] Blunk, L. and J. Vollbrecht, "PPP Extensible Authentication Protocol (EAP)", RFC 2284, March 1998.

   [15] Solomon, J. and S. Glass, "Mobile-IPv4 Configuration Option for
        PPP IPCP", RFC 2290, Feb 1998

[15] Solomon, J. and S. Glass, "Mobile-IPv4 Configuration Option for PPP IPCP", RFC 2290, Feb 1998

   [16] Calhoun, P. and C. Perkins, "Mobile IP Network Access Identifier
        Extension for IPv4", RFC 2794, March 2000.

[16] Calhoun, P. and C. Perkins, "Mobile IP Network Access Identifier Extension for IPv4", RFC 2794, March 2000.

   [17] Perkins, C., "IP Mobility Support", RFC 2002, Oct 1996.

[17] Perkins, C., "IP Mobility Support", RFC 2002, Oct 1996.

   [18] Johnson, D. and C. Perkins, "Mobility Support in IPv6", Work in
        Progress.

[18] Johnson, D. and C. Perkins, "Mobility Support in IPv6", Work in Progress.

   [19] Aboba, B. and J. Vollbrecht, "Proxy Chaining and Policy
        Implementation in Roaming", RFC 2607, June 1999.

[19] Aboba, B. and J. Vollbrecht, "Proxy Chaining and Policy Implementation in Roaming", RFC 2607, June 1999.

   [20] Simpson, W., "PPP Challenge Handshake Authentication Protocol
        (CHAP)", RFC 1994, August 1996.

[20] Simpson, W., "PPP Challenge Handshake Authentication Protocol (CHAP)", RFC 1994, August 1996.

Aboba, et al.                Informational                     [Page 20]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba, et al. Informational [Page 20] RFC 2989 Network Access AAA Evaluation Criteria November 2000

4.  Security Considerations

4. Security Considerations

   This document, being a requirements document, does not have any
   security concerns.  The security requirements on protocols to be
   evaluated using this document are described in the referenced
   documents.

This document, being a requirements document, does not have any security concerns. The security requirements on protocols to be evaluated using this document are described in the referenced documents.

5.  IANA Considerations

5. IANA Considerations

   This memo does not create any new number spaces for IANA
   administration.

This memo does not create any new number spaces for IANA administration.

6.  Acknowledgments

6. Acknowledgments

   Thanks to the members of the Mobile IP, AAA, and NASREQ working
   groups who have discussed and commented on these requirements. We
   would also like to thank the members of the AAA evaluation team, Mike
   St. Johns, Barney Wolf, Mark Stevens, David Nelson, Dave Mitton,
   Basavaraj Patil and Stuart Barkley for their thorough review of this
   document.

Thanks to the members of the Mobile IP, AAA, and NASREQ working groups who have discussed and commented on these requirements. We would also like to thank the members of the AAA evaluation team, Mike St. Johns, Barney Wolf, Mark Stevens, David Nelson, Dave Mitton, Basavaraj Patil and Stuart Barkley for their thorough review of this document.

7.  Authors' Addresses

7. Authors' Addresses

   Bernard Aboba
   Microsoft Corporation
   One Microsoft Way
   Redmond, WA 98052

Bernard Aboba Microsoft Corporation One Microsoft Way Redmond, WA 98052

   Phone: +1 425-936-6605
   Fax:   +1 425-936-7329
   EMail: bernarda@microsoft.com

Phone: +1 425-936-6605 Fax: +1 425-936-7329 EMail: bernarda@microsoft.com

   Pat R. Calhoun
   Network and Security Research Center, Sun Labs
   Sun Microsystems, Inc.
   15 Network Circle
   Menlo Park, CA 94025

Pat R. Calhoun Network and Security Research Center, Sun Labs Sun Microsystems, Inc. 15 Network Circle Menlo Park, CA 94025

   Phone: +1 650-786-7733
   EMail: pcalhoun@eng.sun.com

Phone: +1 650-786-7733 EMail: pcalhoun@eng.sun.com

Aboba, et al.                Informational                     [Page 21]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba, et al. Informational [Page 21] RFC 2989 Network Access AAA Evaluation Criteria November 2000

   Steven M. Glass
   Sun Microsystems
   1 Network Drive
   Burlington, MA 01845

Steven M. Glass Sun Microsystems 1 Network Drive Burlington, MA 01845

   Phone: +1 781-442-0504
   Fax:   +1 781-442-1677
   EMail: steven.glass@sun.com

Phone: +1 781-442-0504 Fax: +1 781-442-1677 EMail: steven.glass@sun.com

   Tom Hiller
   Wireless Data Standards & Architectures
   Lucent Technologies
   263 Shuman Drive
   Room 1HP2F-218
   Naperville, IL 60563

Tom Hiller Wireless Data Standards & Architectures Lucent Technologies 263 Shuman Drive Room 1HP2F-218 Naperville, IL 60563

   Phone: +1 630-976-7673
   EMail: tom.hiller@lucent.com

Phone: +1 630-976-7673 EMail: tom.hiller@lucent.com

   Peter J. McCann
   Lucent Technologies
   Rm 2Z-305
   263 Shuman Blvd
   Naperville, IL  60566

Peter J. McCann Lucent Technologies Rm 2Z-305 263 Shuman Blvd Naperville, IL 60566

   Phone: +1 630-713 9359
   EMail: mccap@lucent.com

Phone: +1 630-713 9359 EMail: mccap@lucent.com

   Hajime Shiino
   Lucent Technologies Japan Ltd.
   25 Mori Bldg. 1-4-30 Roppongi,
   Minato-ku Tokyo
   Japan

Hajime Shiino Lucent Technologies Japan Ltd. 25 Mori Bldg. 1-4-30 Roppongi, Minato-ku Tokyo Japan

   Phone: +81-3-5561-3695
   EMail: hshiino@lucent.com

Phone: +81-3-5561-3695 EMail: hshiino@lucent.com

   Glen Zorn
   Cisco Systems, Inc.
   500 108th Avenue N.E., Suite 500
   Bellevue, WA 98004

Glen Zorn Cisco Systems, Inc. 500 108th Avenue N.E., Suite 500 Bellevue, WA 98004

   Phone: +1 425-468-0955
   EMail: gwz@cisco.com

Phone: +1 425-468-0955 EMail: gwz@cisco.com

Aboba, et al.                Informational                     [Page 22]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba, et al. Informational [Page 22] RFC 2989 Network Access AAA Evaluation Criteria November 2000

   Gopal Dommety
   IOS Network Protocols
   Cisco Systems, Inc.
   170 West Tasman Drive
   San Jose, CA 95134-1706

Gopal Dommety IOS Network Protocols Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

   Phone: +1 408-525-1404
   Fax:   +1 408-526-4952
   EMail: gdommety@cisco.com

Phone: +1 408-525-1404 Fax: +1 408-526-4952 EMail: gdommety@cisco.com

   Charles E. Perkins
   Communications Systems Lab
   Nokia Research Center
   313 Fairchild Drive
   Mountain View, CA

Charles E. Perkins Communications Systems Lab Nokia Research Center 313 Fairchild Drive Mountain View, CA

   Phone: +1 650-625-2986
   Fax:   +1-650-625-2502
   EMail: charliep@iprg.nokia.com

Phone: +1 650-625-2986 Fax: +1-650-625-2502 EMail: charliep@iprg.nokia.com

   Basavaraj Patil
   Nokia Networks
   6000 Connection Dr.
   Irving, TX 75039

Basavaraj Patil Nokia Networks 6000 Connection Dr. Irving, TX 75039

   Phone: +1 972-894-6709
   Fax:   +1 972-894-5349
   EMail: Basavaraj.Patil@nokia.com

Phone: +1 972-894-6709 Fax: +1 972-894-5349 EMail: Basavaraj.Patil@nokia.com

   David Mitton
   Nortel Networks
   880 Technology Park Drive
   Billerica, MA 01821

David Mitton Nortel Networks 880 Technology Park Drive Billerica, MA 01821

   Phone: +1 978-288-4570
   EMail: dmitton@nortelnetworks.com

Phone: +1 978-288-4570 EMail: dmitton@nortelnetworks.com

   Serge Manning
   Nortel Networks
   2201 Lakeside Blvd
   Richardson, TX  75082-4399

Serge Manning Nortel Networks 2201 Lakeside Blvd Richardson, TX 75082-4399

   Phone: +1 972-684-7277
   EMail: smanning@nortelnetworks.com

Phone: +1 972-684-7277 EMail: smanning@nortelnetworks.com

Aboba, et al.                Informational                     [Page 23]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba, et al. Informational [Page 23] RFC 2989 Network Access AAA Evaluation Criteria November 2000

   Mark Anthony Beadles
   SmartPipes, Inc.
   565 Metro Place South
   Suite 300
   Dublin, OH 43017

Mark Anthony Beadles SmartPipes, Inc. 565 Metro Place South Suite 300 Dublin, OH 43017

   Phone: +1 614-923-5657
   EMail: mbeadles@smartpipes.com

Phone: +1 614-923-5657 EMail: mbeadles@smartpipes.com

   Pat Walsh
   Lucent Technologies
   263 Shuman Blvd.
   1F-545
   Naperville, IL

Pat Walsh Lucent Technologies 263 Shuman Blvd. 1F-545 Naperville, IL

   Phone: +1 630-713-5063
   EMail: walshp@lucent.com

Phone: +1 630-713-5063 EMail: walshp@lucent.com

   Xing Chen
   Alcatel USA
   1000 Coit Road
   Plano, TX 75075

Xing Chen Alcatel USA 1000 Coit Road Plano, TX 75075

   Phone: +1 972-519-4142
   Fax:   +1 972-519-3300
   EMail: xing.chen@usa.alcatel.com

Phone: +1 972-519-4142 Fax: +1 972-519-3300 EMail: xing.chen@usa.alcatel.com

   Sanjeevan Sivalingham
   Ericsson Wireless Communications Inc.,
   Rm Q-356C
   6455 Lusk Blvd
   San Diego, CA 92126

Sanjeevan Sivalingham Ericsson Wireless Communications Inc., Rm Q-356C 6455 Lusk Blvd San Diego, CA 92126

   Phone: +1 858-332-5670
   EMail: s.sivalingham@ericsson.com

Phone: +1 858-332-5670 EMail: s.sivalingham@ericsson.com

   Alan Hameed
   Fujitsu
   2801 Telecom Parkway
   Richardson, TX 75082

Alan Hameed Fujitsu 2801 Telecom Parkway Richardson, TX 75082

   Phone: +1 972-479-2089

Phone: +1 972-479-2089

Aboba, et al.                Informational                     [Page 24]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba, et al. Informational [Page 24] RFC 2989 Network Access AAA Evaluation Criteria November 2000

   Mark Munson
   GTE Wireless
   One GTE Place
   Alpharetta, GA  30004

Mark Munson GTE Wireless One GTE Place Alpharetta, GA 30004

   Phone: +1 678-339-4439
   EMail: mmunson@mobilnet.gte.com

Phone: +1 678-339-4439 EMail: mmunson@mobilnet.gte.com

   Stuart Jacobs
   Secure Systems Department
   GTE Laboratories
   40 Sylvan Road,
   Waltham, MA 02451-1128

Stuart Jacobs Secure Systems Department GTE Laboratories 40 Sylvan Road, Waltham, MA 02451-1128

   Phone: +1 781-466-3076
   Fax:   +1 781-466-2838
   EMail: sjacobs@gte.com

Phone: +1 781-466-3076 Fax: +1 781-466-2838 EMail: sjacobs@gte.com

   Byung-Keun Lim
   LG Electronics, Ltd.
   533, Hogye-dong, Dongan-ku, Anyang-shi,
   Kyungki-do,431-080
   Korea

Byung-Keun Lim LG Electronics, Ltd. 533, Hogye-dong, Dongan-ku, Anyang-shi, Kyungki-do,431-080 Korea

   Phone: +82-31-450-7199
   Fax:   +82-31-450-7050
   EMail: bklim@lgic.co.kr

Phone: +82-31-450-7199 Fax: +82-31-450-7050 EMail: bklim@lgic.co.kr

   Brent Hirschman
   1501 Shure Dr.
   Arlington Hieghts, IL 60006

Brent Hirschman 1501 Shure Dr. Arlington Hieghts, IL 60006

   Phone: +1 847-632-1563
   EMail: qa4053@email.mot.com

Phone: +1 847-632-1563 EMail: qa4053@email.mot.com

   Raymond T. Hsu
   Qualcomm Inc.
   6455 Lusk Blvd.
   San Diego, CA 92121

Raymond T. Hsu Qualcomm Inc. 6455 Lusk Blvd. San Diego, CA 92121

   Phone: +1 619-651-3623
   EMail: rhsu@qualcomm.com

Phone: +1 619-651-3623 EMail: rhsu@qualcomm.com

Aboba, et al.                Informational                     [Page 25]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba, et al. Informational [Page 25] RFC 2989 Network Access AAA Evaluation Criteria November 2000

   Haeng S. Koo
   Samsung Telecommunications America, Inc.
   1130 E. Arapaho Road
   Richardson, TX 75081

Haeng S. Koo Samsung Telecommunications America, Inc. 1130 E. Arapaho Road Richardson, TX 75081

   Phone: +1 972-761-7755
   EMail: hskoo@sta.samsung.com

Phone: +1 972-761-7755 EMail: hskoo@sta.samsung.com

   Mark A. Lipford
   Sprint PCS
   8001 College Blvd.; Suite 210
   Overland Park, KS  66210

Mark A. Lipford Sprint PCS 8001 College Blvd.; Suite 210 Overland Park, KS 66210

   Phone: +1 913-664-8335
   EMail: mlipfo01@sprintspectrum.com

Phone: +1 913-664-8335 EMail: mlipfo01@sprintspectrum.com

   Ed Campbell
   3Com Corporation
   1800 W. Central Rd.
   Mount Prospect, IL 60056

Ed Campbell 3Com Corporation 1800 W. Central Rd. Mount Prospect, IL 60056

   Phone: +1 847-342-6769
   EMail: ed_campbell@3com.com

Phone: +1 847-342-6769 EMail: ed_campbell@3com.com

   Name: Yingchun Xu
   WaterCove Networks
   One Century Centre, Suite 550
   1750 E. Golf Road
   Schaumburg, IL

Name: Yingchun Xu WaterCove Networks One Century Centre, Suite 550 1750 E. Golf Road Schaumburg, IL

   Phone: +1 847-477-9280
   EMail: yxu@watercove.com

以下に電話をしてください。 +1 847-477-9280 メールしてください: yxu@watercove.com

   Shinichi Baba
   Toshiba America Research, Inc.
   PO Box 136,
   Convent Station, NJ 07961-0136

新市ラム酒入りケーキ東芝アメリカ研究Inc.私書箱136、修道院駅、ニュージャージー07961-0136

   Phone: +1 973-829-4795
   EMail: sbaba@tari.toshiba.com

以下に電話をしてください。 +1 973-829-4795 メールしてください: sbaba@tari.toshiba.com

Aboba, et al.                Informational                     [Page 26]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba、他 情報[26ページ]のRFC2989は2000年11月にアクセスAAA評価基準をネットワークでつなぎます。

   Eric Jaques
   Vodafone AirTouch
   2999 Oak Road, MS-750
   Walnut Creek, CA 94596

エリックジャキュースボーダフォンエアタッチ2999オーク道路、ウォールナットクリーク、MS-750カリフォルニア 94596

   Phone: +1 925-279-6142
   EMail: ejaques@akamail.com

以下に電話をしてください。 +1 925-279-6142 メールしてください: ejaques@akamail.com

8.  Intellectual Property Statement

8. 知的所有権声明

   The IETF takes no position regarding the validity or scope of any
   intellectual property or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; neither does it represent that it
   has made any effort to identify any such rights.  Information on the
   IETF's procedures with respect to rights in standards-track and
   standards-related documentation can be found in BCP-11.  Copies of
   claims of rights made available for publication and any assurances of
   licenses to be made available, or the result of an attempt made to
   obtain a general license or permission for the use of such
   proprietary rights by implementors or users of this specification can
   be obtained from the IETF Secretariat.

IETFはどんな知的所有権の正当性か範囲、実現に関係すると主張されるかもしれない他の権利、本書では説明された技術の使用またはそのような権利の下におけるどんなライセンスも利用可能であるかもしれない、または利用可能でないかもしれない範囲に関しても立場を全く取りません。 どちらも、それはそれを表しません。いずれもどんなそのような権利も特定するための努力にしました。 BCP-11で標準化過程の権利と規格関連のドキュメンテーションに関するIETFの手順に関する情報を見つけることができます。 権利のクレームのコピーで利用可能に作られるべきライセンスの保証、または一般的なライセンスか許可が作成者によるそのような所有権の使用に得させられた試みの結果が公表といずれにも利用可能になったか、またはIETF事務局からこの仕様のユーザを得ることができます。

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights which may cover technology that may be required to practice
   this standard.  Please address the information to the IETF Executive
   Director.

IETFはこの規格を練習するのに必要であるかもしれない技術をカバーするかもしれないどんな著作権もその注目していただくどんな利害関係者、特許、特許出願、または他の所有権も招待します。 IETF専務に情報を記述してください。

Aboba, et al.                Informational                     [Page 27]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000

Aboba、他 情報[27ページ]のRFC2989は2000年11月にアクセスAAA評価基準をネットワークでつなぎます。

9.  Full Copyright Statement

9. 完全な著作権宣言文

   Copyright (C) The Internet Society (2000).  All Rights Reserved.

Copyright(C)インターネット協会(2000)。 All rights reserved。

   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph are
   included on all such copies and derivative works.  However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

それに関するこのドキュメントと翻訳は、コピーして、それが批評するか、またはそうでなければわかる他のもの、および派生している作品に提供するか、または準備されているかもしれなくて、コピーされて、発行されて、全体か一部広げられた実現を助けるかもしれません、どんな種類の制限なしでも、上の版権情報とこのパラグラフがそのようなすべてのコピーと派生している作品の上に含まれていれば。 しかしながら、このドキュメント自体は何らかの方法で変更されないかもしれません、インターネット協会か他のインターネット組織の版権情報か参照を取り除くのなどように、それを英語以外の言語に翻訳するのが著作権のための手順がインターネットStandardsの過程で定義したどのケースに従わなければならないか、必要に応じてさもなければ、インターネット標準を開発する目的に必要であるのを除いて。

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assigns.

上に承諾された限られた許容は、永久であり、インターネット協会、後継者または案配によって取り消されないでしょう。

   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

このドキュメントとそして、「そのままで」という基礎とインターネットの振興発展を目的とする組織に、インターネット・エンジニアリング・タスク・フォースが速達の、または、暗示しているすべての保証を放棄するかどうかというここにことであり、他を含んでいて、含まれて、情報の使用がここに侵害しないどんな保証も少しもまっすぐになるという情報か市場性か特定目的への適合性のどんな黙示的な保証。

Acknowledgement

承認

   Funding for the RFC Editor function is currently provided by the
   Internet Society.

RFC Editor機能のための基金は現在、インターネット協会によって提供されます。

Aboba, et al.                Informational                     [Page 28]

Aboba、他 情報[28ページ]

一覧

 RFC 1〜100  RFC 1401〜1500  RFC 2801〜2900  RFC 4201〜4300 
 RFC 101〜200  RFC 1501〜1600  RFC 2901〜3000  RFC 4301〜4400 
 RFC 201〜300  RFC 1601〜1700  RFC 3001〜3100  RFC 4401〜4500 
 RFC 301〜400  RFC 1701〜1800  RFC 3101〜3200  RFC 4501〜4600 
 RFC 401〜500  RFC 1801〜1900  RFC 3201〜3300  RFC 4601〜4700 
 RFC 501〜600  RFC 1901〜2000  RFC 3301〜3400  RFC 4701〜4800 
 RFC 601〜700  RFC 2001〜2100  RFC 3401〜3500  RFC 4801〜4900 
 RFC 701〜800  RFC 2101〜2200  RFC 3501〜3600  RFC 4901〜5000 
 RFC 801〜900  RFC 2201〜2300  RFC 3601〜3700  RFC 5001〜5100 
 RFC 901〜1000  RFC 2301〜2400  RFC 3701〜3800  RFC 5101〜5200 
 RFC 1001〜1100  RFC 2401〜2500  RFC 3801〜3900  RFC 5201〜5300 
 RFC 1101〜1200  RFC 2501〜2600  RFC 3901〜4000  RFC 5301〜5400 
 RFC 1201〜1300  RFC 2601〜2700  RFC 4001〜4100  RFC 5401〜5500 
 RFC 1301〜1400  RFC 2701〜2800  RFC 4101〜4200 

スポンサーリンク

fieldset要素の上パディングがボーダー領域の外側に設置される

ホームページ製作・web系アプリ系の製作案件募集中です。

上に戻る