Ruckus SmartZone 100 And Virtual Essentials AAA (RADIUS) Interface Reference Guide For 3.6 Smart Zone (SZ100/v SZ E) SZ100VSZE 36 Rev A 20171110
2017-11-17
User Manual: Ruckus SmartZone 3.6 AAA (RADIUS) Interface Reference Guide (SZ100/vSZ-E)
Open the PDF directly: View PDF .
Page Count: 86
Download | |
Open PDF In Browser | View PDF |
REFERENCE GUIDE Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Supporting SmartZone 3.6 Part Number: 800-71561-001 Rev A Publication Date: November 2017 Copyright Notice and Proprietary Information Copyright 2017 Brocade Communications Systems, Inc. All rights reserved. No part of this documentation may be used, reproduced, transmitted, or translated, in any form or by any means, electronic, mechanical, manual, optical, or otherwise, without prior written permission of or as expressly provided by under license from Brocade. Destination Control Statement Technical data contained in this publication may be subject to the export control laws of the United States of America. Disclosure to nationals of other countries contrary to United States law is prohibited. It is the reader’s responsibility to determine the applicable regulations and to comply with them. Disclaimer THIS DOCUMENTATION AND ALL INFORMATION CONTAINED HEREIN (“MATERIAL”) IS PROVIDED FOR GENERAL INFORMATION PURPOSES ONLY. BROCADE and RUCKUS WIRELESS, INC. AND THEIR LICENSORS MAKE NO WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, WITH REGARD TO THE MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE, OR THAT THE MATERIAL IS ERROR-FREE, ACCURATE OR RELIABLE. BROCADE and RUCKUS RESERVE THE RIGHT TO MAKE CHANGES OR UPDATES TO THE MATERIAL AT ANY TIME. Limitation of Liability IN NO EVENT SHALL BROCADE or RUCKUS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES, OR DAMAGES FOR LOSS OF PROFITS, REVENUE, DATA OR USE, INCURRED BY YOU OR ANY THIRD PARTY, WHETHER IN AN ACTION IN CONTRACT OR TORT, ARISING FROM YOUR ACCESS TO, OR USE OF, THE MATERIAL. Trademarks Ruckus Wireless, Ruckus, the bark logo, BeamFlex, ChannelFly, Dynamic PSK, FlexMaster, Simply Better Wireless, SmartCell, SmartMesh, SmartZone, Unleashed, ZoneDirector and ZoneFlex are trademarks of Ruckus Wireless, Inc. in the United States and in other countries. Brocade, the B-wing symbol, MyBrocade, and ICX are trademarks of Brocade Communications Systems, Inc. in the United States and in other countries. Other trademarks may belong to third parties. 2 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Contents Preface..........................................................................................................................................................................................................5 Document Conventions..........................................................................................................................................................................5 Notes, Cautions, and Warnings.......................................................................................................................................................5 Document feedback...............................................................................................................................................................................5 Ruckus resources.................................................................................................................................................................................. 6 Online Training Resources...................................................................................................................................................................... 6 Contacting Ruckus Customer Services and Support..............................................................................................................................6 What Support Do I Need?...............................................................................................................................................................6 Open a Case...................................................................................................................................................................................6 Self-Service Resources................................................................................................................................................................... 7 About This Guide.......................................................................................................................................................................................... 9 About this Guide.................................................................................................................................................................................... 9 Terminology.................................................................................................................................................................................... 9 Legend......................................................................................................................................................................................... 10 Definition of Data Types.................................................................................................................................................................10 RFCs and Standards.....................................................................................................................................................................11 EAP Full Authentication............................................................................................................................................................................... 13 EAP Full Authentication Overview......................................................................................................................................................... 13 EAP Full Authentication........................................................................................................................................................................ 13 RADIUS Access Request [ID]........................................................................................................................................................ 14 RADIUS Access Challenge [EAP Request (SIM Start)]................................................................................................................... 17 RADIUS Access Request [EAP Response (NONCE_MT)].............................................................................................................. 18 RADIUS Access Challenge [EAP Request (RAND, MAC)].............................................................................................................. 21 RADIUS Access Request [EAP Response (SRES)]........................................................................................................................ 21 RADIUS Access Accept [EAP Success (MSK)].............................................................................................................................. 23 EAP - Full Authentication – 3GPP Solution........................................................................................................................................... 26 RADIUS Access Request [ID]........................................................................................................................................................ 27 RADIUS Access Challenge [EAP Request (SIM Start)] .................................................................................................................. 29 RADIUS Access Request [EAP Response (NONCE_MT)............................................................................................................... 30 RADIUS Access Challenge [EAP Request (RAND, MAC)].............................................................................................................. 32 RADIUS Access Request [EAP Response (SRES)]........................................................................................................................ 33 RADIUS Access Accept [EAP Success (MSK)].............................................................................................................................. 34 Authorization Access Request.......................................................................................................................................................36 Authorization Access Accept........................................................................................................................................................ 37 RADIUS Access Reject........................................................................................................................................................................ 38 Hotspot (WISPr) Authentication and Accounting.......................................................................................................................................... 39 Hotspot (WISPr) Authentication and Accounting Overview....................................................................................................................39 Hotspot (WISPr) Authentication Request ............................................................................................................................................. 40 Hotspot (WISPr) Authentication Response............................................................................................................................................43 Hotspot (WISPr) Accounting Request [Start].........................................................................................................................................44 Hotspot (WISPr) Accounting Request [Stop/Interim]............................................................................................................................. 46 Hotspot (WISPr) Accounting Response................................................................................................................................................ 49 Hotspot 2.0 Authentication..........................................................................................................................................................................51 Hotspot 2.0 Authentication Overview................................................................................................................................................... 51 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 3 SIM Based Authentication - Access Request....................................................................................................................................... 51 R2 Device Access Authentication......................................................................................................................................................... 52 Access Request............................................................................................................................................................................53 Access Response......................................................................................................................................................................... 54 R2 Device Onboarding......................................................................................................................................................................... 55 Onboarding Access Request........................................................................................................................................................ 55 Onboarding Access Response......................................................................................................................................................55 Hotspot 2.0 VSAs................................................................................................................................................................................ 56 AP Initiated Accounting Messages.............................................................................................................................................................. 57 AP Initiated Accounting Messages (PDG/LBO Sessions)...................................................................................................................... 57 Accounting Start Messages................................................................................................................................................................. 58 Accounting Interim Update and Stop Messages...................................................................................................................................60 Accounting On Messages.................................................................................................................................................................... 63 Accounting Off Messages.................................................................................................................................................................... 64 AAA Server Dynamic Authorization and List of Vendor Specific Attributes....................................................................................................67 Dynamic Authorization and List of Vendor Specific Attributes - AAA Server.......................................................................................... 67 Service Authorization............................................................................................................................................................................67 Change of Authorization (CoA) Messages - Not Set to Authorize Only...........................................................................................68 Change of Authorization Acknowledge Messages (CoA Ack)........................................................................................................ 69 Change of Authorization Negative Acknowledge Messages (CoA NAK).........................................................................................70 Disconnect Messages...................................................................................................................................................................70 Acknowledgment of Disconnect Messages (DM Ack)....................................................................................................................72 Negative Acknowledge of Disconnect Messages (DM NAK).......................................................................................................... 72 Disconnect Messages - Dynamic Authorization Client (AAA server)............................................................................................... 72 List of Vendor Specific Attributes..........................................................................................................................................................73 WISPr Vendor Specific Attributes.................................................................................................................................................. 73 Ruckus Wireless Vendor Specific Attributes.................................................................................................................................. 73 AP Roaming Scenarios................................................................................................................................................................................79 AP Roaming Scenarios........................................................................................................................................................................ 79 Roaming from AP1 to AP2 - PMK / OKC Disabled............................................................................................................................... 80 Roaming from AP1 to AP2 - PMK / OKC Enabled................................................................................................................................ 80 AP1 to AP2 Connected to Different Controller Node - PMK / OKC Disabled.........................................................................................81 Use Cases...................................................................................................................................................................................................83 Use Case Scenarios.............................................................................................................................................................................83 4 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Preface • • • • • Document Conventions............................................................................................................................................. 5 Document feedback.................................................................................................................................................. 5 Ruckus resources......................................................................................................................................................6 Online Training Resources......................................................................................................................................... 6 Contacting Ruckus Customer Services and Support................................................................................................. 6 Document Conventions The following tables list the text and notice conventions that are used throughout this guide. TABLE 1 Text conventions Convention Description monospace Example Identifies command syntax examples. bold User interface (UI) components such as screen or page names, keyboard keys, software buttons, and field names On the Start menu, click All Programs. italics Publication titles Refer to the Ruckus Small Cell Release Notes for more information device(config)# interface ethernet 1/1/6 Notes, Cautions, and Warnings Notes, cautions, and warning statements may be used in this document. They are listed in the order of increasing severity of potential hazards. NOTE A NOTE provides a tip, guidance, or advice, emphasizes important information, or provides a reference to related information. CAUTION A CAUTION statement alerts you to situations that can be potentially hazardous to you or cause damage to hardware, firmware, software, or data. DANGER A DANGER statement indicates conditions or situations that can be potentially lethal or extremely hazardous to you. Safety labels are also attached directly to products to warn of these conditions or situations. Document feedback Ruckus is interested in improving its documentation and welcomes your comments and suggestions. You can email your comments to Ruckus at: docs@ruckuswireless.com When contacting us, please include the following information: • Document title and release number • Document part number (on the cover page) Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 5 Preface Ruckus resources • Page number (if appropriate) • For example: – – – SmartCell Gateway 200 S2a Interface Reference Guide for SmartZone 3.5.1 Part number: 800-71306-001 Page 88 Ruckus resources Visit the Ruckus website to locate related documentation for your product and additional Ruckus resources. Release Notes and other user documentation are available at https://support.ruckuswireless.com/documents. You can locate documentation by product or perform a text search. White papers, data sheets, and other product documentation are available at www.ruckuswireless.com. Online Training Resources To access a variety of online Ruckus training modules, including free introductory courses to wireless networking essentials, site surveys, and Ruckus products, visit the Ruckus Training Portal at https://training.ruckuswireless.com. Contacting Ruckus Customer Services and Support The Customer Services and Support (CSS) organization is available to provide assistance to customers with active warranties on their Ruckus Networks products, and customers and partners with active support contracts. For product support information and details on contacting the Support Team, go directly to the Support Portal using https:// support.ruckuswireless.com, or go to https://www.ruckuswireless.com and select Support. What Support Do I Need? Technical issues are usually described in terms of priority (or severity). To determine if you need to call and open a case or access the selfservice resources use the following criteria: • Priority 1 (P1)—Critical. Network or service is down and business is impacted. No known workaround. Go to the Open a Case section. • Priority 2 (P2)—High. Network or service is impacted, but not down. Business impact may be high. Workaround may be available. Go to the Open a Case section. • Priority 3 (P3)—Medium. Network or service is moderately impacted, but most business remains functional. Go to the Self-Service Resources section. • Priority 4 (P4)—Low. Request for information, product documentation, or product enhancements. Go to the Self-Service Resources section. Open a Case When your entire network is down (P1), or severely impacted (P2), call the appropriate telephone number listed below to get help: • 6 Continental United States: 1-855-782-5871 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Preface Contacting Ruckus Customer Services and Support • Canada: 1-855-782-5871 • Europe, Middle East, Africa, and Asia Pacific, toll-free numbers are available at https://support.ruckuswireless.com/contact-us and Live Chat is also available. Self-Service Resources The Support Portal at https://support.ruckuswireless.com/contact-us offers a number of tools to help you to research and resolve problems with your Ruckus products, including: • Technical Documentation—https://support.ruckuswireless.com/documents • Community Forums—https://forums.ruckuswireless.com/ruckuswireless/categories • Knowledge Base Articles—https://support.ruckuswireless.com/answers • Software Downloads and Release Notes—https://support.ruckuswireless.com/software • Security Bulletins—https://support.ruckuswireless.com/security Using these resources will help you to resolve some issues, and will provide TAC with additional data from your troubleshooting analysis if you still require assistance through a support case or RMA. If you still require help, open and manage your case at https:// support.ruckuswireless.com/case_management Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 7 8 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A About This Guide • About this Guide....................................................................................................................................................... 9 About this Guide This SmartZone™ SZ100 and Virtual SmartZone Essentials (vSZ-E) AAA (RADIUS) Interface Reference Guide describes the interface between SZ100/vSZ-E (collectively referred to as “the controller” throughout this guide) and the Authentication, Authorization and Accounting (AAA) server. It describes the message flow between the controller and AAA for EAP-based full authentication, authorization, and accounting. This guide is written for service operators and system administrators who are responsible for managing, configuring, and troubleshooting Ruckus Wireless devices. Consequently, it assumes a basic working knowledge of local area networks, wireless networking, and wireless devices. NOTE If release notes are shipped with your product and the information there differs from the information in this guide, follow the instructions in the release notes. Most user guides and release notes are available in Adobe Acrobat Reader Portable Document Format (PDF) or HTML on the Ruckus Wireless Support Web site at https://support.ruckuswireless.com/contact-us. Terminology The table lists the terms used in this guide. TABLE 2 Terms used in this guide Terminology Description AAA Authentication, Authorization, and Accounting CHAP Challenge Handshake Authentication Protocol EAP Extensible Authentication Protocol EPS Evolved Packet System GGSN Gateway GPRS Support Node GSN GPRS Support Node HLR Home Location Register LCS Location Services MAP Mobile Application Part MTU Maximum Transmission Unit MWSG Metro Wireless Security Gateway OSU Online Sign-Up Passpoint Hotspot 2.0 certification PKI Public Key Infrastructure PDP Packet Data Protocol PPS-MO Per Provider Subscription Management Object R-WSG/WSG Ruckus Wireless Security Gateway Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 9 About This Guide About this Guide TABLE 2 Terms used in this guide (continued) Terminology Description Release1 Device Hotspot 2.0 Release1 specification compliant device Release 2 Device Hotspot 2.0 Release 2 passpoint enabled device RAC Radio Access Controller RADIUS Remote Access Dial In User Service TEID Tunnel End Point Identifier UE User Equipment WFA Wi-Fi Alliance Legend The table lists the legends/presence used in this guide. TABLE 3 Legends used in this guide Legend/Presence Description M Mandatory O Optional C Conditional U Indicates that the inclusion of the parameter is the choice of service-user Definition of Data Types The table lists the data types used in this guide. TABLE 4 Data Types Definition Data Type Description text Printable, generally UTF-8 encoded (subset of 'string') string 0-253 octets ipaddr 4 octets in network byte order integer 32 bit value in big endian order (high byte first) date 32 bit value in big endian order - seconds since 00:00:00 GMT, Jan. 1, 1970. ipv6addr 16 octets in network byte order. ipv6prefix 18 octets in network byte order. abinary Ascend's binary filter format. byte 8 bit unsigned integer. ether 6 octets of hh:hh:hh:hh:hh:hh where 'h' is hex digits, upper or lowercase. short 16-bit unsigned integer. octets Raw octets, printed and input as hex strings. For example, 0x123456789abcdef. 10 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A About This Guide About this Guide RFCs and Standards The table lists the references used in this guide TABLE 5 References used in this guide Serial Number Reference Description 1. 3GPP TS 23.234 3GPP system to WLAN inter-working 2. 3GPP TS 33.234 � Wireless Local Area Network (WLAN) inter-working security 3. RFC 2865 Remote authentication dial In user service (RADIUS)) 4. RFC 2866 RADIUS accounting 5. RFC 5176 Dynamic authorization extensions to remote authentication dial In user service (RADIUS) 6. RFC 5580 Carrying Location Objects in RADIUS and Diameter (August 2009) 7. WFA HS 2-0 WFA HS 2-0 Technical Specification R2 PUBLIC DRAFT v5.00 (Specification for HS 2.0 R2) Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 11 12 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A EAP Full Authentication • • • • EAP Full Authentication Overview............................................................................................................................ 13 EAP Full Authentication........................................................................................................................................... 13 EAP - Full Authentication – 3GPP Solution...............................................................................................................26 RADIUS Access Reject............................................................................................................................................38 EAP Full Authentication Overview This reference guide describes the interface between the controller and the AAA (Authentication, Authorization and Accounting) server. The RADIUS protocol is used for interfacing between Access Points (AP) and controller as well as between the controller and a third party AAA server. The controller acts as a RADIUS proxy for authentication and authorization. This guide also describes the message flow between the controller and AAA for EAP based full authentication, authorization and accounting in the following sections. EAP-SIM is used as EAP message payload type but can be replaced with EAP-AKA without affecting call flows and RADIUS attributes except EAP-Message (79). The controller supports two different call flows for authentication and authorization: • A 3GPP standard based solution, where authentication and service authorization are performed separately. • A proprietary solution where authentication and authorization are combined. This guide lists all the interface messages and RADIUS VSAs used between the controller and AAA. NOTE This guide does not provide design details of either the AAA server or the controller to handle interface requirements. NOTE Refer to the AP Roaming Scenarios chapter for various scenario cases. NOTE Refer to the Use Cases chapter for flow details on NAS IP, accounting session identifier and filter identifier. EAP Full Authentication This is authentication and authorization combined together. In this call flow, the controller acts as an AAA proxy server. It does not initiate a separate access request message to perform service authorization. Parameters needed by the controller (TTG) to establish the GTP tunnel (QoS, Charging Characteristics, MSISDN) are expected in the access accept message from AAA. The figure shows the detailed call flow. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 13 EAP Full Authentication EAP Full Authentication FIGURE 1 Combined authentication sequence diagram This section covers: • RADIUS Access Request [ID] on page 14 • RADIUS Access Challenge [EAP Request (SIM Start)] on page 17 • RADIUS Access Request [EAP Response (NONCE_MT)] on page 18 • RADIUS Access Challenge [EAP Request (RAND, MAC)] on page 21 • RADIUS Access Request [EAP Response (SRES)] on page 21 • RADIUS Access Accept [EAP Success (MSK)] on page 23 RADIUS Access Request [ID] The table lists the attribute details for the first message sent by the controller to the AAA server. NOTE When RFC 5580 is enabled for a WLAN, and the AAA server supports RFC 5580, location-related information is not conveyed in access requests. Instead, the exchange of location-related information is negotiated between the controller and the AAA server as stipulated in RFC 5580. TABLE 6 RADIUS access request attributes Attribute Attribute ID Presence Type Description User-Name 1 M String Indicates the name of the user to be authenticated. NAS-IP-Address 4 C Integer This attribute is the IP address of the AP which is serving the station or controller's control IP address, controller's management IP address and user defined value. 14 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A EAP Full Authentication EAP Full Authentication TABLE 6 RADIUS access request attributes (continued) Attribute Attribute ID Presence Type Description NAS-Port 5 O Integer This attribute indicates the physical port number of the NAS which authenticates the user. The controller uses the association ID for the STA in the AP to represent this. Service-Type 6 O Integer Indicates the type of service based on the user request or the type of service to be provided. Framed MTU 12 O Integer Indicates the Maximum Transmission Unit (MTU) to be configured for the user, when it is not negotiated by some other means. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-WLan-ID (4) VSA Length: 6 Reports the associated WLANs ID. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-SCG-CBLADE-IP (7) VSA Length: 6 Reports the control plane IP address. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C Integer Vendor ID:Ruckus:25053 VSA: Ruckus-SCG-DBLADE-IP (8) VSA Length: 6 Reports the control plane IP address. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C String Vendor ID: Ruckus:25053 VSA: Ruckus-SSID (3) VSA Length: Variable Reports the associated WLANs SSID in access request and accounting packet. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C String Vendor ID: Ruckus:25053 VSA: Ruckus-Location (5) VSA Length: Variable Reports the device location for this AP. This is a configurable value in the device location setting. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Called Station ID 30 O Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A String This attribute allows NAS to send the ID (BSSID), which is called by the user. It is MAC of the AP. It supports 2 types of values, namely BSSID:SSID, where BSSID is the MAC address of the WLAN on AP. The second value is APMAC:SSID, where AP-MAC is the MAC address of the AP.The letters in the MAC address are in uppercase.For example: 11-22-33-AA-BBCC:SSID. 15 EAP Full Authentication EAP Full Authentication TABLE 6 RADIUS access request attributes (continued) Attribute Attribute ID Presence Type Description Calling Station ID 31 M String Allows NAS to send the ID (UE MAC), which indicates as to who is calling this server. NAS-Identifier 32 C Integer NAS-IP-Address or NAS-Identifier attribute is mandatory in received messages. It supports 3 types of values, namely BSSID (MAC address of the WLAN on AP), AP-MAC (MAC address of AP) and user defined address (maximum length of 62). Proxy-State 33 O Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access reject, access challenge and accounting response. Acct-Session-ID 44 M Integer This attribute is a unique accounting identity to facilitate easy matching of start, interim and stop records in a log file. The start, interim and stop records for a given session must have the same Acct-Session-ID. NAS-Port-Type 61 M Integer Indicates the physical port type of NAS, which authenticates the user. Connect-Info 77 O String This attribute is sent from the NAS to indicate the nature of the user's connection. EAP Message 79 M Octets This attribute encapsulates Extensible Authentication Protocol (EAP) packets, which allows NAS to authenticate dial-in users via EAP, without having to understand the EAP protocol (EAP payload, EAP-SIM or EAP-AKA). Message Authenticator 80 M Octets This attribute is used in signing access requests for preventing spoofing of access requests using CHAP, ARAP or EAP authentication methods. It authenticates this whole RADIUS packet - HMAC-MD5 (Type| Identifier | Length | Request Authenticator | Attributes). Chargeable User ID 89 M String This attribute sends a null value during authentication. Operator-Name 126 C String The attribute identifies the owner of the access network by the AAA server. It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is Out of Band as specified in RFC 5580 Location-Information 127 C Octets This is a composite attribute, which provides meta data about the location information. It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is Out of Band as specified in RFC 5580. 16 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A EAP Full Authentication EAP Full Authentication TABLE 6 RADIUS access request attributes (continued) Attribute Attribute ID Presence Type Description Location-Data 128 M String This attribute contains the actual location information. It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is Out of Band as specified in RFC 5580. Basic-Location-Policy-Rules 129 C Octets This attribute provides the basic privacy policy associated to the location information. It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is Out of Band as specified in RFC 5580. Extended-Location-Policy-Rules 130 C Octets This attribute provides the extended privacy policy for the target whose location is specified.This attribute is sent with the above attribute (basic location policy). It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is Out of Band as specified in RFC 5580. Location-Capable 131 C Integer This attribute is sent in RADIUS access request during the authentication phase to indicate the AP's capability for providing the location. Encoded as per RFC 5580. NOTE This attribute is included only if location delivery method is not Out of Band. RADIUS Access Challenge [EAP Request (SIM Start)] The table lists the attribute details of the first message sent by the AAA to the controller, which is forwarded to the RADIUS client (access point). TABLE 7 RADIUS access challenge attributes Attribute Attribute ID Presence Type Description State 24 O Octets This attribute is sent by the server to the client in an accesschallenge message and must be sent unmodified from the client to the server in the new access request message - a reply to that challenge, if any. Proxy-State 33 C Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access reject, access-challenge and accounting response. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 17 EAP Full Authentication EAP Full Authentication TABLE 7 RADIUS access challenge attributes (continued) Attribute Attribute ID Presence Type Description EAP Message 79 M Octets This attribute encapsulates Extensible Authentication Protocol (EAP) packets, which allows NAS to authenticate dial-in users via EAP, without having to understand the EAP protocol (EAP payload, EAP-SIM or EAP-AKA). Message Authenticator 80 M Octets This attribute is used in signing access requests for preventing spoofing of access requests using CHAP, ARAP or EAP authentication methods. It authenticates this whole RADIUS packet - HMAC-MD5 (Type| Identifier | Length | Request Authenticator | Attributes). Chargeable User ID 89 M String This attribute sends a null value during authentication. Basic-Location-Policy-Rules 129 C Octets This attribute provides the basic privacy policy associated to the location information. It is encoded as per RFC 5580. NOTE This attribute is expected from the AAA server in the initial request location delivery method mentioned in RFC 5580. Extended-Location-Policy-Rules 130 C Octets This attribute provides the extended privacy policy for the target whose location is specified.This attribute is sent with the above attribute (basic location policy). It is encoded as per RFC 5580. NOTE This attribute is expected from the AAA server in the initial request location delivery method mentioned in RFC 5580. Requested-Location-Info 132 M Integer This attribute is only used in messages sent by the AAA server towards the AP. Using this attribute the AAA server indicates its request for location information. Encoded as per RFC 5580. NOTE This attribute is expected from the AAA server in the initial request location delivery method mentioned in RFC 5580. RADIUS Access Request [EAP Response (NONCE_MT)] The table lists the attribute details of messages sent by the controller to the AAA server and responses received from the UEs. TABLE 8 RADIUS access request attributes Attribute Attribute ID Presence Type Description User-Name 1 M String Indicates the name of the user to be authenticated. User-Password 2 C String This attribute indicates the password of the user to be authenticated. It is mandatory for PAP authentication. CHAP-Password 3 C String This attribute indicates the value provided by a CHAP user in response to the access-challenge. It is mandatory for CHAP authentication. NAS-IP-Address 4 C Integer This attribute is the IP address of the AP which is serving the station or controller's control IP address, controller's management IP address and user defined value. NAS-Port 5 O Integer This attribute indicates the physical port number of the NAS which authenticates the user. The controller uses the association ID for the STA in the AP to represent this. 18 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A EAP Full Authentication EAP Full Authentication TABLE 8 RADIUS access request attributes (continued) Attribute Attribute ID Presence Type Description Service-Type 6 O Integer Indicates the type of service based on the user request or the type of service to be provided. Framed MTU 12 O Integer Indicates the Maximum Transmission Unit (MTU) to be configured for the user, when it is not negotiated by some other means. State 24 O Octets This attribute is sent by the server to the client in an access-challenge message and must be sent unmodified from the client to the server in the new access request message - a reply to that challenge, if any. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-SCG-CBLADE-IP (7) VSA Length: 6 Reports the control plane IP address. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-SCG-DBLADE-IP (8) VSA Length: 6 Reports the data plane IP address. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C String Vendor ID: Ruckus:25053 VSA: Ruckus-SSID (3) VSA Length: Variable Reports the associated WLANs SSID in access request and accounting packet. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C String Vendor ID: Ruckus:25053 VSA: Ruckus-Location (5) VSA Length: Variable Reports the device location for this AP. This is a configurable value in the device location setting. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Called Station ID 30 O String This attribute allows NAS to send the ID (BSSID), which is called by the user. It is MAC of the AP. It supports 2 types of values, namely BSSID:SSID, where BSSID is the MAC address of the WLAN on AP. The second value is AP-MAC:SSID, where AP-MAC is the MAC address of the AP.The letters in the MAC address are in uppercase.For example: 11-22-33-AA-BB-CC:SSID. Calling Station ID 31 M String Allows NAS to send the ID (UE MAC), which indicates as to who is calling this server. NAS-Identifier 32 C Integer NAS-IP-Address or NAS-Identifier attribute is mandatory in received messages. It supports 3 types of values, namely BSSID (MAC address of the WLAN on AP), AP-MAC (MAC address of AP) and user defined address (maximum length of 62). Proxy-State 33 O Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access reject, access challenge and accounting response. Acct-Session-ID 44 M Integer This attribute is a unique accounting identity to facilitate easy matching of start, interim and stop records in a log file. The start, interim and stop records for a given session must have the same Acct-Session-ID. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 19 EAP Full Authentication EAP Full Authentication TABLE 8 RADIUS access request attributes (continued) Attribute Attribute ID Presence Type Description NAS-Port-Type 61 M Integer Indicates the physical port type of NAS, which authenticates the user. Connect-Info 77 O String This attribute is sent from the NAS to indicate the nature of the user's connection. EAP Message 79 M Octets This attribute encapsulates Extensible Authentication Protocol (EAP) packets, which allows NAS to authenticate dial-in users via EAP, without having to understand the EAP protocol (EAP payload, EAP-SIM or EAP-AKA). Message Authenticator 80 M Octets This attribute is used in signing access requests for preventing spoofing of access requests using CHAP, ARAP or EAP authentication methods. It authenticates this whole RADIUS packet - HMAC-MD5 (Type| Identifier | Length | Request Authenticator | Attributes). Chargeable User ID 89 M String This attribute sends a null value during authentication. Operator-Name 126 C String The attribute identifies the owner of the access network by the AAA server. It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is Out of Band as specified in RFC 5580. Location-Information 127 C Octets This is a composite attribute, which provides meta data about the location information. It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is Out of Band as specified in RFC 5580. Location-Data 128 M String This attribute contains the actual location information. It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is the initial request as specified in RFC 5580. Basic-Location-Policy-Rules 129 C Octets This attribute provides the basic privacy policy associated to the location information. It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is the initial request as specified in RFC 5580. Extended-Location-Policy-Rules 130 C Octets This attribute provides the extended privacy policy for the target whose location is specified.This attribute is sent with the above attribute (basic location policy). It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is the initial request as specified in RFC 5580. Location-Capable 131 C Integer This attribute is sent in RADIUS access request during the authentication phase to indicate the AP's capability for providing the location. Encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is the initial request as specified in RFC 5580. 20 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A EAP Full Authentication EAP Full Authentication RADIUS Access Challenge [EAP Request (RAND, MAC)] The table lists the attribute details of messages sent by the AAA to the controller, which are forwarded to the RADIUS client (access point). TABLE 9 RADIUS access challenge attributes Attribute Attribute ID Presence Type Description State 24 O Octets This attribute is sent by the server to the client in an accesschallenge message and must be sent unmodified from the client to the server in the new access request message - a reply to that challenge, if any. Proxy-State 33 C Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access reject, access challenge and accounting response. EAP Message 79 M Octets This attribute encapsulates Extensible Authentication Protocol (EAP) packets, which allows NAS to authenticate dial-in users via EAP, without having to understand the EAP protocol (EAP payload, EAPSIM or EAP-AKA). Message Authenticator 80 M Octets This attribute is used in signing access requests for preventing spoofing of access requests using CHAP, ARAP or EAP authentication methods. It authenticates this whole RADIUS packet - HMAC-MD5 (Type| Identifier | Length | Request Authenticator | Attributes). Chargeable User ID 89 M String This attribute sends a null value during authentication. RADIUS Access Request [EAP Response (SRES)] The table lists the attribute details of messages sent by the controller to the AAA server. TABLE 10 RADIUS access request attributes Attribute Attribute ID Presence Type Description User-Name 1 M String Indicates the name of the user to be authenticated. User-Password 2 C String This attribute indicates the password of the user to be authenticated. It is mandatory for PAP authentication. CHAP-Password 3 C String This attribute indicates the value provided by a CHAP user in response to the access-challenge. It is mandatory for CHAP authentication. NAS-IP-Address 4 C Integer This attribute is the IP address of the AP which is serving the station or controller's control IP address, controller's management IP address and user defined value. NAS-Port 5 O Integer This attribute indicates the physical port number of the NAS which authenticates the user. The controller uses the association ID for the STA in the AP to represent this. Service-Type 6 O Integer Indicates the type of service based on the user request or the type of service to be provided. Framed MTU 12 O Integer Indicates the Maximum Transmission Unit (MTU) to be configured for the user, when it is not negotiated by some other means. State 24 O Octets This attribute is sent by the server to the client in an access-challenge message and must be sent unmodified from the client to the server in the new access request message - a reply to that challenge, if any. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-WLan-ID (4) Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 21 EAP Full Authentication EAP Full Authentication TABLE 10 RADIUS access request attributes (continued) Attribute Attribute ID Presence Type Description VSA Length: 6 Reports the associated WLANs ID. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-SCG-CBLADE-IP (7) VSA Length: 6 Reports the control plane IP address. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C Integer Vendor ID:Ruckus:25053 VSA: Ruckus-SCG-DBLADE-IP (8) VSA Length: 6 Reports the data plane IP address. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C String Vendor ID: Ruckus:25053 VSA: Ruckus-SSID (3) VSA Length: Variable Reports the associated WLANs SSID in access request and accounting packet. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C String Vendor ID: Ruckus:25053 VSA: Ruckus-Location (5) VSA Length: Variable Reports the device location for this AP. This is a configurable value in the device location setting. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Called Station ID 30 O String This attribute allows NAS to send the ID (BSSID), which is called by the user. It is MAC of the AP. It supports 2 types of values, namely BSSID:SSID, where BSSID is the MAC address of the WLAN on AP. The second value is AP-MAC:SSID, where AP-MAC is the MAC address of the AP.The letters in the MAC address are in uppercase.For example: 11-22-33-AA-BB-CC:SSID. Calling Station ID 31 M String This attribute allows NAS to send the ID (UE MAC), which indicates as to who is calling this server. The value supported is STA's MAC address where the letters in the MAC address are in uppercase.For example: 11-22-33-AA-BB-CC. NAS-Identifier 32 C Integer NAS-IP-Address or NAS-Identifier attribute is mandatory in received messages. It supports 3 types of values, namely BSSID (MAC address of the WLAN on AP), AP-MAC (MAC address f AP) and user defined address (maximum length of 62). Proxy-State 33 O Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access reject, access challenge and accounting response. Acct-Session-ID 44 M Integer This attribute is a unique accounting identity to facilitate easy matching of start, interim and stop records in a log file. The start, interim and stop records for a given session must have the same Acct-Session-ID. NAS-Port-Type 61 M Integer Indicates the physical port type of NAS, which authenticates the user. Connect-Info 77 O String This attribute is sent from the NAS to indicate the nature of the user's connection. 22 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A EAP Full Authentication EAP Full Authentication TABLE 10 RADIUS access request attributes (continued) Attribute Attribute ID Presence Type Description EAP Message 79 M Octets This attribute encapsulates Extensible Authentication Protocol (EAP) packets, which allows NAS to authenticate dial-in users via EAP, without having to understand the EAP protocol (EAP payload, EAP-SIM or EAPAKA). Message Authenticator 80 M Octets This attribute is used in signing access requests for preventing spoofing of access requests using CHAP, ARAP or EAP authentication methods. It authenticates this whole RADIUS packet - HMAC-MD5 (Type| Identifier | Length | Request Authenticator | Attributes). Chargeable User ID 89 M String This attribute sends a null value during authentication. RADIUS Access Accept [EAP Success (MSK)] The table lists the attribute details of messages sent by AAA to the controller, which is forwarded to the RADIUS client (access point) upon successful service authorization (see the next two messages). NAS calculates MSK using the MS-MPP-Send and MS-MPP-Recv attributes. TABLE 11 RADIUS access accept attributes Attribute Attribute ID Presence Type Description User-Name 1 O String Indicates the name of the user to be authenticated Filter-Id 11 O String Represents the User Role name sent by AAA. This is used by SCG to map the received Group Role Name to the UTP profile and forward the corresponding ACL/rate limiting parameters to NAS. NAS enforces the UTP for the given user. Filter-Id might be included in access accept irrespective of a WISPr, 802.1x or HS 2.0 call. Class 25 O Integer This attribute is sent by the server in access accept and client should include this attribute in accounting request without modification. ChargeableUser ID 89 C Integer This attribute is MSISDN or any chargeable user identity returned by the AAA server. This attribute is mandatory for TTG sessions only. Vendor-Specific 26 O String Vendor ID: 3GPP: 10415 VSA: 3GPP-GPRS-Negotiated-QoS-Profile (5) VSA Length: Variable This attribute carries the QoS value from AAA server. QoS from AAA is received from Ruckus defined VSA or from 3GPP defined VSA (3GPP-GPRS-Negotiated-QoS Profile). Vendor-Specific 26 O Integer Vendor ID: WISPr: 14122 VSA: WISPr-Bandwidth-Max-UP (7) VSA Length: Variable The attribute contains the maximum uplink value in bits per second. Vendor-Specific 26 O Integer Vendor ID: WISPr: 14122 VSA: WISPr-Bandwidth-Max-DOWN (8) VSA Length: Variable The attribute contains the maximum downlink value in bits per second. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 23 EAP Full Authentication EAP Full Authentication TABLE 11 RADIUS access accept attributes (continued) Attribute Attribute ID Presence Type Description Vendor-Specific 26 C Charging characteristics Vendor ID:Ruckus:25053 VSA: Ruckus-Charging-Charac (118) VSA Length: 4 Charging characteristics value, Octets are encoded according to TS 3GPP 32.215. This attribute carries the charging characteristics value, which is received from the AAA server. Vendor-Specific 26 C String Vendor ID:Ruckus:25053 VSA: Ruckus-IMSI (102) VSA Length: Variable BCD encoded IMSI of the subscriber. Session-Timeout 27 O Integer This attribute sets the maximum number of seconds of service to be provided to the user before session termination. Idle-Timeout 28 O Integer It sets the maximum number of consecutive seconds of idle connection allowed to the user, before the session gets terminated. Termination-Action 29 O Integer This attribute indicates the action that NAS will take when the specified service completes. Proxy-State 33 M Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access reject, access challenge and accounting response. Tunnel-Type 64 C Integer This attribute indicates the tunnel type for the access point. For example, tunnel type 13 is for VLAN. Tunnel-Medium-Type 65 C Integer This attribute indicates the tunnel medium type for the access point. For example, tunnel type 06 is for IEEE_802. EAP Message 79 M Octets This attribute encapsulates Extensible Authentication Protocol (EAP) packets, which allows NAS to authenticate dial-in users via EAP, without having to understand the EAP protocol (EAP payload, EAP-SIM or EAP-AKA). Message Authenticator 80 M Octets This attribute is used in signing access requests for preventing spoofing of access requests using CHAP, ARAP or EAP authentication methods. It authenticates this whole RADIUS packet - HMAC-MD5 (Type| Identifier | Length | Request Authenticator | Attributes). Tunnel-Private-Group-ID 81 C String This attribute contains the dynamic VLAN ID as configured in the authentication profile. Accounting-Interim-Interval 85 O Integer Indicates the number of seconds between each interim update for this specific session. If the value is blank, the configured default value is used as the accounting interim interval. Chargeable User ID 89 M String This attribute sends a null value during authentication. Vendor-Specific 26 C Integer Vendor ID:Ruckus:25053 VSA: Ruckus-Acct-Status (126) VSA Length: 4 24 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A EAP Full Authentication EAP Full Authentication TABLE 11 RADIUS access accept attributes (continued) Attribute Attribute ID Presence Type Description Acct Stat is true(1) or false(0). The controller sever uses this attribute on the access accept to indicate if the authenticator needs to send the accounting start for the current/specified client. Vendor-Specific 26 O Integer Vendor ID: Microsoft: 311 VSA: MS-MPPE-Send-Key (16) VSA Length: Variable This attribute contains a session key used by Microsoft Point-to-Point Encryption Protocol (MPPE). Vendor-Specific 26 O Integer Vendor ID: Microsoft: 311 VSA: MS-MPPE-Recv-Key (17) VSA Length: Variable This attribute contains a session key used by the Microsoft Point-to-Point Encryption Protocol (MPPE). Vendor-Specific 26 C Octets Vendor ID: Ruckus:25053 VSA: Ruckus-APN-NI (104) VSA Length: Variable This attribute carries the APN subscribed by the user. It contains only the network identifier (NI), which is part of the APN. The operator identifier part is stored separately in Ruckus-APN-OI. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-Session-Type(125) VSA Length: 6 Session type - TTG (2), Local-Breakout(3), LocalBreakout-AP(4), L3GRE (5), L2GRE (6), QinQL3 (7), PMIP (8). The controller server uses this attribute on the access -accept to indicate the forward policy of the specific UE. Basic-Location-Policy-Rules 129 C Octets This attribute provides the basic privacy policy associated to the location information. It is encoded as per RFC 5580. NOTE This attribute is expected from the AAA server in the initial request location delivery method as mentioned in RFC 5580. Extended-Location-Policy-Rules 130 C Octets This attribute provides the extended privacy policy for the target whose location is specified.This attribute is sent with the above attribute (basic location policy). It is encoded as per RFC 5580. NOTE This attribute is expected from the AAA server in the initial request location delivery method as mentioned in RFC 5580. Requested-Location-Info 132 M Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Integer This attribute is only used in messages sent by the AAA server towards the AP. Using this attribute the AAA server indicates its request for location information. Encoded as per RFC 5580. 25 EAP Full Authentication EAP - Full Authentication – 3GPP Solution TABLE 11 RADIUS access accept attributes (continued) Attribute Attribute ID Presence Type Description NOTE This attribute is expected from the AAA server in the initial request location delivery method as mentioned in RFC 5580. EAP - Full Authentication – 3GPP Solution In this call flow, EAP-SIM authentication is performed first. When the controller (acting as an AAA proxy) receives access accept from the AAA server, a separate access request is sent back to the AAA server to process a service authorization. The figure shows the detailed call flow. FIGURE 2 3GPP based solution sequence diagram 26 • RADIUS Access Request [ID] on page 27 • RADIUS Access Challenge [EAP Request (SIM Start)] on page 29 • RADIUS Access Request [EAP Response (NONCE_MT) on page 30 • RADIUS Access Challenge [EAP Request (RAND, MAC)] on page 32 • RADIUS Access Request [EAP Response (SRES)] on page 33 • RADIUS Access Accept [EAP Success (MSK)] on page 34 • Authorization Access Request on page 36 • Authorization Access Accept on page 37 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A EAP Full Authentication EAP - Full Authentication – 3GPP Solution RADIUS Access Request [ID] The table lists the attribute details of the first message sent by the controller to AAA. NOTE When RFC 5580 is enabled for a WLAN, and the AAA server supports RFC 5580, location-related information is not conveyed in access requests. Instead, the exchange of location-related information is negotiated between the controller and the AAA server as stipulated in RFC 5580. TABLE 12 RADIUS access request attributes Attribute Attribute ID Presence Type Description User-Name 1 M String Indicates the name of the user for authentication. NAS-IP-Address 4 C Integer This attribute is the IP address of the AP which is serving the station or controller's control IP address, controller's management IP address and user defined value. NAS-Port 5 O Integer This attribute indicates the physical port number of the NAS which authenticates the user. The controller uses the association ID for the STA in the AP to represent this. Service-Type 6 O Integer Indicates the type of service based on the user request or the type of service to be provided. Framed MTU 12 O Integer Indicates the Maximum Transmission Unit (MTU) to be configured for the user, when it is not negotiated by some other means. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-WLan-ID (4) VSA Length: 6 Reports the associated WLANs ID. Ruckus VSAs are received only from Ruckus APs. It is optional for 3rd party APs. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-SCG-CBLADE-IP (7) VSA Length: 6 Reports the control plane IP address. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-SCG-DBLADE-IP (8) VSA Length: 6 Reports the data plane IP address. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C String Vendor ID: Ruckus:25053 VSA: Ruckus-SSID (3) VSA Length: Variable. Reports the associated WLANs SSID in access request and accounting packet. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C String Vendor ID: Ruckus:25053 VSA: Ruckus-Location (5) VSA Length: Variable. Reports the device location for this AP. This is a configurable value in the device location setting. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Called Station ID 30 O Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A String This attribute allows NAS to send the ID (BSSID), which is called by the user. It is the MAC of the AP. It supports 2 types of values, namely BSSID:SSID, where BSSID is the MAC address of the WLAN on AP. The second value is AP-MAC:SSID, where AP- 27 EAP Full Authentication EAP - Full Authentication – 3GPP Solution TABLE 12 RADIUS access request attributes (continued) Attribute Attribute ID Presence Type Description MAC is the MAC address of the AP.The letters in the MAC address are in uppercase.For example: 11-22-33-AA-BBCC:SSID. Calling Station ID 31 M String Allows NAS to send the ID (UE MAC), which indicates as to who is calling this server. NAS-Identifier 32 C String NAS-IP-Address or NAS-Identifier attribute is mandatory in received messages. It supports 3 types of values, namely BSSID (MAC address of the WLAN on AP), AP-MAC (MAC address of AP) and user defined address (maximum length of 62). Proxy-State 33 O Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access-reject, accesschallenge and accounting response. Acct-Session-ID 44 M String This attribute is a unique accounting identity to facilitate easy matching of start, interim and stop records in a log file. The start, interim and stop records for a given session must have the same Acct-Session-ID. NAS-Port-Type 61 M Integer Indicates the physical port type of NAS, which authenticates the user. Connect-Info 77 O String This attribute is sent from the NAS to indicate the nature of the user's connection. EAP Message 79 M Octets This attribute encapsulates Extensible Authentication Protocol (EAP) packets, which allows NAS to authenticate dial-in users via EAP, without having to understand the EAP protocol (EAP payload, EAP-SIM or EAP-AKA). Message Authenticator 80 M Octets This attribute is used in signing access requests for preventing spoofing of access requests using CHAP, ARAP or EAP authentication methods. It authenticates the whole RADIUS packet - HMAC-MD5 (Type| Identifier | Length | Request Authenticator | Attributes). Chargeable User ID 89 M String This attribute sends a null value during authentication. Operator-Name 126 C String The attribute identifies the owner of the access network by the AAA server. It is encoded as per RFC 5580. Note: This attribute is included only if the location delivery method is Out of Band as specified in RFC 5580. Location-Information 127 C Octets This is a composite attribute, which provides meta data about the location information. It is encoded as per RFC 5580. Note: This attribute is included only if the location delivery method is Out of Band as specified in RFC 5580. Location-Data 128 M String This attribute contains the actual location information. It is encoded as per RFC 5580. Note: This attribute is included only if the location delivery method is the initial request as specified in RFC 5580. Basic-Location-Policy-Rules 129 C Octets This attribute provides the basic privacy policy associated to the location information. It is encoded as per RFC 5580. Note: This attribute is included only if the location delivery method is the initial request as specified in RFC 5580. Extended-Location-Policy-Rules 130 C Octets This attribute provides the extended privacy policy for the target whose location is specified. This attribute is sent with the above attribute (basic location policy). It is encoded as per RFC 5580. Note: This attribute is included only if the location delivery method is the initial request as specified in RFC 5580. 28 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A EAP Full Authentication EAP - Full Authentication – 3GPP Solution TABLE 12 RADIUS access request attributes (continued) Attribute Attribute ID Presence Type Description Location-Capable 131 C Integer This attribute is sent in RADIUS access request during the authentication phase to indicate the AP's capability for providing the location. Encoded as per RFC 5580. Note: This attribute is included only if the location delivery method is not Out of Band as specified in RFC 5580. RADIUS Access Challenge [EAP Request (SIM Start)] The table lists the attribute details of the messages sent by the AAA server to the controller and forwarded to the RADIUS client (NAS). TABLE 13 RADIUS access challenge attributes Attribute Attribute ID Presence Type Description State 24 O Octets This attribute is sent by the server to the client in an accesschallenge message and must be sent unmodified from the client to the server in the new access request message - a reply to that challenge, if any. Proxy-State 33 O Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access-reject, accesschallenge and accounting response. EAP Message 79 M Octets This attribute encapsulates Extensible Authentication Protocol (EAP) packets, which allows NAS to authenticate dial-in users via EAP, without having to understand the EAP protocol (EAP payload, EAP-SIM or EAP-AKA). Message Authenticator 80 M Octets This attribute is used for signing access request for preventing spoofing of access request using CHAP, ARAP or EAP authentication methods. It authenticates this whole RADIUS packet - HMAC-MD5 (Type| Identifier | Length | Request Authenticator | Attributes). Chargeable User ID 89 M String This attribute sends a null value during authentication. Basic-Location-Policy-Rules 129 C Octets This attribute provides the basic privacy policy associated to the location information. It is encoded as per RFC 5580. Note: This attribute is expected from the AAA server in the initial request location delivery method as mentioned in RFC 5580. Extended-Location-Policy-Rules 130 C Octets This attribute provides the extended privacy policy for the target whose location is specified.This attribute is sent with the above attribute (basic location policy). It is encoded as per RFC 5580. Note: This attribute is expected from the AAA server in the initial request location delivery method as mentioned in RFC 5580. Requested-Location-Info 132 M Integer This attribute is only used in messages sent by the AAA server towards the AP. Using this attribute the AAA server indicates its request for location information. Encoded as per RFC 5580. Note: This attribute is expected from the AAA server in the initial request location delivery method mentioned in RFC 5580. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 29 EAP Full Authentication EAP - Full Authentication – 3GPP Solution RADIUS Access Request [EAP Response (NONCE_MT) The table lists the attribute details for messages sent by the controller to the AAA server (response received from UE). TABLE 14 RADIUS access request attributes Attribute Attribute ID Presence Type Description User-Name 1 M String Indicates the name of the user for authentication. User-Password 2 C String This attribute indicates the password of the user to be authenticated. It is mandatory for PAP authentication. CHAP-Password 3 C String This attribute indicates the value provided by a CHAP user in response to the access-challenge. It is mandatory for CHAP authentication. NAS-IP-Address 4 C Integer This attribute is the IP address of the AP which is serving the station or controller's control IP address, controller's management IP address and user defined value. NAS-Port 5 O Integer This attribute indicates the physical port number of the NAS which authenticates the user. The controller uses the association ID for the STA in the AP to represent this. Service-Type 6 O Integer Indicates the type of service based on the user request or the type of service to be provided. Framed MTU 12 O Integer Indicates the Maximum Transmission Unit (MTU) to be configured for the user, when it is not negotiated by some other means. State 24 O Octets This attribute is sent by the server to the client in an access-challenge message and must be sent unmodified from the client to the server in the new access request message - a reply to that challenge, if any. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-WLan-ID (4) VSA Length: 6 Reports the associated WLANs ID. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-SCG-CBLADE-IP (7) VSA Length: 6 Reports the control plane IP address. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-SCG-DBLADE-IP (8) VSA Length: 6 Reports the data plane IP address. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C String Vendor ID: Ruckus:25053 VSA: Ruckus-Location(5) VSA Length: Variable Reports the device location for this AP. This is a configurable value in the device location setting. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. � Vendor-Specific 30 26 C String Vendor ID: Ruckus:25053 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A EAP Full Authentication EAP - Full Authentication – 3GPP Solution TABLE 14 RADIUS access request attributes (continued) Attribute Attribute ID Presence Type Description VSA: Ruckus-SSID (3) VSA Length: Variable Reports the associated WLANs SSID in access request and accounting packet. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Called Station ID 30 O String This attribute allows NAS to send the ID (BSSID), which is called by the user. It is MAC of the AP. It supports 2 types of values, namely BSSID:SSID, where BSSID is the MAC address of the WLAN on AP. The second value is APMAC:SSID, where APMAC is the MAC address of the AP.The letters in the MAC address are in uppercase.For example: 11-22-33-AA-BB-CC:SSID. Calling Station ID 31 M String Allows NAS to send the ID (UE MAC), which indicates as to who is calling this server. NAS-Identifier 32 C String NAS-IP-Address or NAS-Identifier attribute is mandatory in received messages. It supports 3 types of values, namely BSSID (MAC address of the WLAN on AP), APMAC (MAC address of AP) and user defined address (maximum length of 62). Proxy-State 33 O Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access-reject, access-challenge and accounting response. Acct-Session-ID 44 M String This attribute is a unique accounting identity to facilitate easy matching of start, interim and stop records in a log file. The start, interim and stop records for a given session must have the same Acct-Session-ID. NAS-Port-Type 61 M Integer Indicates the physical port type of NAS, which authenticates the user. Connect-Info 77 O String This attribute is sent from the NAS to indicate the nature of the user's connection. EAP Message 79 M Octets This attribute encapsulates Extensible Authentication Protocol (EAP) packets, which allows NAS to authenticate dial-in users via EAP, without having to understand the EAP protocol (EAP payload, EAP-SIM or EAP-AKA). Message Authenticator 80 M Octets This attribute is used in signing access requests for preventing spoofing of access requests using CHAP, ARAP or EAP authentication methods. It authenticates this whole RADIUS packet - HMAC-MD5 (Type| Identifier | Length | Request Authenticator | Attributes). Chargeable User ID 89 M String This attribute sends a null value during authentication. Operator-Name 126 C String The attribute identifies the owner of the access network by the AAA server. It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is Out of Band as specified in RFC 5580. Location-Information 127 C Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Octets This is a composite attribute, which provides meta data about the location information. It is encoded as per RFC 5580. 31 EAP Full Authentication EAP - Full Authentication – 3GPP Solution TABLE 14 RADIUS access request attributes (continued) Attribute Attribute ID Presence Type Description NOTE This attribute is included only if the location delivery method is Out of Band as specified in RFC 5580. Location-Data 128 M String This attribute contains the actual location information. It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is the initial request as specified in RFC 5580. Basic-Location-Policy-Rules 129 C Octets This attribute provides the basic privacy policy associated to the location information. It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is the initial request as specified in RFC 5580. Extended-Location-Policy-Rules 130 C Octets This attribute provides the extended privacy policy for the target whose location is specified.This attribute is sent with the above attribute (basic location policy). It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is the initial request as specified in RFC 5580. RADIUS Access Challenge [EAP Request (RAND, MAC)] The table lists the attribute details for messages sent by the AAA server to the controller and forwarded to the RADIUS client NAS. Attribute Attribute ID Presence Type Description State 24 O Octets This attribute is sent by the server to the client in an access-challenge message and must be sent unmodified from the client to the server in the new access request message - a reply to that challenge, if any. ProxyState 33 O Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access-reject, access-challenge and accounting response. EAP Message 79 M Octets This attribute encapsulates Extensible Authentication Protocol (EAP) packets, which allows NAS to authenticate dial-in users via EAP, without having to understand the EAP protocol (EAP payload, EAP-SIM or EAP-AKA). Message Authentic ator 80 M Octets This attribute is used in signing access requests for preventing spoofing of access requests using CHAP, ARAP or EAP authentication methods. It authenticates this whole RADIUS packet HMAC-MD5 (Type| Identifier | Length | Request Authenticator | Attributes). Chargeabl e User ID 89 M String This attribute sends a null value during authentication. 32 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A EAP Full Authentication EAP - Full Authentication – 3GPP Solution RADIUS Access Request [EAP Response (SRES)] The table lists the attribute details for messages sent by controller to AAA. TABLE 15 RADIUS access accept messages Attribute Attribute ID Presence Type Description User-Name 1 M String Indicates the name of the user for authentication. User-Password 2 C String This attribute indicates the password of the user to be authenticated. It is mandatory for PAP authentication. CHAP-Password 3 C String This attribute indicates the value provided by a CHAP user in response to the access-challenge. It is mandatory for CHAP authentication. NAS-IP-Address 4 C Integer This attribute is the IP address of the AP which is serving the station or controller's control IP address, controller's management IP address and user defined value. NAS-Port 5 O Integer This attribute indicates the physical port number of the NAS which authenticates the user. The controller uses the association ID for the STA in the AP to represent this. Service-Type 6 O Integer Indicates the type of service based on the user request or the type of service to be provided. Framed MTU 12 O Integer Indicates the Maximum Transmission Unit (MTU) to be configured for the user, when it is not negotiated by some other means. State 24 O Octets This attribute is sent by the server to the client in an access-challenge message and must be sent unmodified from the client to the server in the new access request message - a reply to that challenge, if any. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053. VSA: Ruckus-WLan-ID (4) VSA Length: 6 Reports the associated WLANs ID. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053. VSA: Ruckus-SCG-CBLADE-IP (7) VSA Length: 6 Reports the control plane IP address. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053. VSA: Ruckus-SCG-DBLADE-IP (8) VSA Length: 6 Reports the data plane IP address. Note: Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C String Vendor ID: Ruckus:25053. VSA: Ruckus-Location (5) VSA Length: Variable. Reports the device location for this AP. This is a configurable value in the device location setting. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Vendor-Specific( 26 C String Vendor ID: Ruckus:25053. VSA: Ruckus-SSID (3) VSA Length: Variable. Reports the associated WLANs SSID in access request and accounting packet. Note: Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 33 EAP Full Authentication EAP - Full Authentication – 3GPP Solution TABLE 15 RADIUS access accept messages (continued) Attribute Attribute ID Presence Type Description Calling Station ID 30 O String Allows NAS to send the ID (BSSID), which is called by the user. It is MAC of the AP. Calling Station ID 31 M IString Allows NAS to send the ID (UE MAC), which indicates as to who is calling this server. NAS-Identifier 32 C String NAS-IP-Address or NAS-Identifier attribute is mandatory in received messages. It supports 3 types of values, namely BSSID (MAC address of the WLAN on AP), AP-MAC (MAC address of AP) and user defined address (maximum length of 62). Proxy-State 33 O Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access-reject, access-challenge and accounting response. Acct-Session-ID 44 M String This attribute is a unique accounting identity to facilitate easy matching of start, interim and stop records in a log file. The start, interim and stop records for a given session must have the same Acct-Session-ID. NAS-Port-Type 61 M Integer Indicates the physical port type of NAS, which authenticates the user. Connect-Info 77 O String This attribute is sent from the NAS to indicate the nature of the user's connection. EAP Message 79 M Octets This attribute encapsulates Extensible Authentication Protocol (EAP) packets, which allows NAS to authenticate dial-in users via EAP, without having to understand the EAP protocol (EAP payload, EAPSIM or EAP-AKA). Message Authenticator 80 M Octets This attribute is used in signing access requests for preventing spoofing of access requests using CHAP, ARAP or EAP authentication methods. It authenticates this whole RADIUS packet HMAC-MD5 (Type| Identifier | Length | Request Authenticator | Attributes). Chargeable User ID 89 M String This attribute sends a null value during authentication. RADIUS Access Accept [EAP Success (MSK)] The table lists the attribute details for message sent by the AAA to the controller, which are forwarded to the RADIUS client (access point) upon successful service authorization (see the next two messages). TABLE 16 RADIUS access request messages Attribute Attribute ID Presence Type Description User-Name 1 M String Indicates the name of the user for authentication. Filter-Id 11 O String Represents the User Role name sent by AAA. This is used by SCG to map the received Group Role Name to the UTP profile and forward the corresponding ACL/rate limiting parameters to NAS. NAS enforces the UTP for the given user. Filter-Id might be included in access accept irrespective of a WISPr, 802.1x or HS 2.0 call. Class 25 O String This attribute is sent by the server in access accept and the client should include this attribute in the accounting request without modification. Vendor-Specific 26 O Integer Vendor ID: WISPr: 14122. VSA: WISPr-Bandwidth-Max-UP (7) 34 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A EAP Full Authentication EAP - Full Authentication – 3GPP Solution TABLE 16 RADIUS access request messages (continued) Attribute Attribute ID Presence Type Description VSA Length: Variable. The attribute contains the maximum uplink value in bits per second. Vendor-Specific 26 O Integer Vendor ID: WISPr: 14122. VSA: WISPr-Bandwidth-Max-DOWN (8). VSA Length: Variable. The attribute contains the maximum downlink value in bits per second. Vendor-Specific 26 M Integer Vendor ID: Microsoft 311. VSA: MS-MPPE-Send-Key (16). VSA Length: Variable. This attribute contains a session key used by Microsoft Point-toPoint Encryption Protocol (MPPE). Vendor-Specific 26 M Integer Vendor ID: Microsoft 311. VSA: MS-MPPE-Recv-Key (17). VSA Length: Variable. This attribute contains a session key used by the Microsoft Point-to-Point Encryption Protocol (MPPE). Vendor-Specific 26 C String Vendor ID: Ruckus:25053. VSA: Ruckus-IMSI (102). VSA Length: Variable. BCD encoded IMSI of the subscriber. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053. VSA: Ruckus-Session-Type (125). VSA Length: 6. Session Type - TTG (2), Local-Breakout(3), Local-BreakoutAP(4), L3oGRE (5), L2oGRE (6), QinQL3 (7), PMIP (8). The controller server uses this attribute on the access -accept to indicate the forward policy of the specific UE. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053. VSA: Ruckus-Acct-Status (126). VSA Length: 6. Acct Stat is true(1) or false(0). The controller server uses this attribute on the access accept to indicate if the authenticator needs to send the accounting start for the current/specified client. Session-Timeout 27 O Integer This attribute sets the maximum number of seconds of service to be provided to the user before termination of the session. Idle-Timeout 28 O Integer It sets the maximum number of consecutive seconds of idle connection allowed to the user before termination of the session. Termination-Action 29 O Integer Indicates the action that NAS will take when the specified service is completed. Proxy-State 33 O Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access reject, access challenge and accounting response. Tunnel-Type 64 C Integer This attribute indicates the tunnel type for the access point. For example, tunnel type 13 is for VLAN. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 35 EAP Full Authentication EAP - Full Authentication – 3GPP Solution TABLE 16 RADIUS access request messages (continued) Attribute Attribute ID Presence Type Description Tunnel-Medium-Type 65 C Integer This attribute indicates the tunnel medium type for the access point. For example, tunnel type 06 is for IEEE_802. EAP Message 79 M Octets This attribute encapsulates Extensible Authentication Protocol (EAP) packets, which allows NAS to authenticate dial-in users via EAP, without having to understand the EAP protocol (EAP payload, EAP-SIM or EAP-AKA). Message Authenticator 80 M String This attribute is used in signing access requests for preventing spoofing of access requests using CHAP, ARAP or EAP authentication methods. It authenticates this whole RADIUS packet - HMAC-MD5 (Type| Identifier | Length | Request Authenticator | Attributes). Tunnel-Private-Group-ID 81 C String This attribute contains the dynamic VLAN ID as configured in the authentication profile. Accounting-InterimInterval 85 O Integer Indicates the number of seconds between each interim update for this specific session. If the value is blank, the configured default value is used as the accounting interim interval. Basic-Location-PolicyRules 129 C Octets This attribute provides the basic privacy policy associated to the location information. It is encoded as per RFC 5580. NOTE This attribute is expected from the AAA server if the location delivery method is accounting request as specified in RFC 5580. Extended-Location-PolicyRules 130 C Octets This attribute provides the extended privacy policy for the target whose location is specified.This attribute is sent with the above attribute (basic location policy). It is encoded as per RFC 5580. NOTE This attribute is expected from the AAA server if the location delivery method is accounting request as specified in RFC 5580. Requested-Location-Info 132 M Integer This attribute is only used in messages sent by the AAA server towards the AP. Using this attribute the AAA server indicates its request for location information. Encoded as per RFC 5580. NOTE This attribute is expected from the AAA server if the location delivery method is accounting request as specified in RFC 5580. Authorization Access Request The authorization procedure starts after successful authentication only. Messages are initiated from the controller. The table lists the attribute details for messages sent by the controller to the AAA server. TABLE 17 Authorisation Access request attributes Attribute Attribute ID Presence Type Description User-Name 1 M String Indicates the name of the user to be authenticated. Vendor-Specific 26 C Integer Vendor ID: Ruckus VSA: 25053 VSA: Ruckus-SGSN-Number(124) VSA Length: Variable. 36 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A EAP Full Authentication EAP - Full Authentication – 3GPP Solution TABLE 17 Authorisation Access request attributes (continued) Attribute Attribute ID Presence Type Description AAA uses this attribute to populate the MAP update GPRS location. E.164 address of SGSN (controller). Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C String Vendor ID: Ruckus: 25053 VSA: Ruckus-SSID (3) VSA Length: Variable. Reports the associated WLANs SSID in access request and accounting packet. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C String Vendor ID: Ruckus: 25053 VSA: Ruckus-Location (5) VSA Length: Variable. Reports the device location for this AP. This is a configurable value in the device location setting. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. NAS-Identifier 32 C Integer NAS-IP-Address or NAS-Identifier attribute is mandatory in received messages. It supports 3 types of values, namely BSSID (MAC address of the WLAN on AP), AP-MAC (MAC address of AP) and user defined address (maximum length of 62). Proxy-State 33 O Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access reject, access challenge and accounting response. Chargeable User ID 89 M String This attribute sends a null value during authentication. Authorization Access Accept The authorization procedure starts only after successful authorization, where messages are sent by AAA to the controller. Information received from AAA is used in setting the GTP tunnel towards the GGSN (APN, QoS and Charging Characteristics). The table lists the attribute details for messages sent by the AAA server to the controller. TABLE 18 Authorization access accept attributes Attribute Attribute ID Presence Type Description User-Name 1 O String Indicates the name of the user for authentication. Filter-Id 11 O String Represents the User Role name sent by AAA. This is used by the controller to map the received Group Role Name to the UTP profile and forward the corresponding ACL/rate limiting parameters to NAS. NAS enforces the UTP for the given user. Filter-Id might be included in access accept irrespective of a WISPr, 802.1x or HS 2.0 call. Vendor-Specific 26 O Integer Vendor ID: WISPr: 14122 VSA: WISPr-Bandwidth-Max-UP (7) VSA Length: Variable. The attribute contains the maximum uplink value in bits per second. Vendor-Specific 26 O Integer Vendor ID: WISPr: 14122 VSA: WISPr-Bandwidth-Max-DOWN (8) VSA Length: Variable. The attribute contains the maximum downlink value in bits per second. Vendor-Specific 26 O Octets Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Vendor ID: Ruckus: 25053 VSA: Ruckus-APN-NI(104) 37 EAP Full Authentication RADIUS Access Reject TABLE 18 Authorization access accept attributes (continued) Attribute Attribute ID Presence Type Description VSA Length: Variable. This attribute carries the APN subscribed by the user. It contains only the network identifier (NI), which is part of the APN. The operator identifier part is stored separately in Ruckus-APN-OI. Vendor-Specific 26 O String Vendor ID: 3GPP: 10415 VSA:3GPP-GPRS-Negotiated-QoS-Profile (5) VSA Length: Variable. This attribute carries the QoS value from AAA server. QoS from AAA is received from Ruckus defined VSA or from 3GPP defined VSA (3GPPGPRS-Negotiated-QoS Profile). Vendor-Specific 26 O Charging characteristics Vendor ID: Ruckus: 25053 VSA: Ruckus-Charging-Charac (118) VSA Length: 4 Charging characteristics value, octets are encoded according to TS 3GPP 32.215. This attribute carries the charging characteristics value, which is received from the AAA server. Session-Timeout 27 O Integer This attribute de-authenticates the UE when the session time expires. Proxy-State 33 O Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access reject, access challenge and accounting response. Accounting-InterimInterval 85 O Integer Indicates the number of seconds between each interim update for this specific session. If the value is blank, the configured default value is used as the accounting interim interval. Chargeable User ID 89 M String This attribute sends a null value during authentication. RADIUS Access Reject The table lists the attribute details of access reject messages (failure scenarios) sent by the AAA in case of unsuccessful authentication or authorization. The controller can also initiate access reject towards NAS, based on certain use cases. TABLE 19 RADIUS access reject attributes Attribute Attribute ID Presence Type Description Reply-Message 18 O Integer Indicates the text, which could be displayed to the user. EAP Message 79 C Octets This attribute encapsulates Extensible Authentication Protocol (EAP) packets, which allows NAS to authenticate dial-in users via EAP, without having to understand the EAP protocol (EAP payload, EAP-SIM or EAP-AKA). Message Authenticator 80 C Octets This attribute is used for signing access requests for preventing spoofing of access requests using CHAP, ARAP or EAP authentication methods. It authenticates this whole RADIUS packet - HMAC-MD5 (Type| Identifier | Length | Request Authenticator | Attributes). This attribute is available only for EAP failures. 38 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Hotspot (WISPr) Authentication and Accounting • • • • • • Hotspot (WISPr) Authentication and Accounting Overview.......................................................................................39 Hotspot (WISPr) Authentication Request ................................................................................................................ 40 Hotspot (WISPr) Authentication Response...............................................................................................................43 Hotspot (WISPr) Accounting Request [Start]............................................................................................................44 Hotspot (WISPr) Accounting Request [Stop/Interim]................................................................................................ 46 Hotspot (WISPr) Accounting Response................................................................................................................... 49 Hotspot (WISPr) Authentication and Accounting Overview Hotspot (WISPr) authentication starts after a user has entered his or her logon credentials (user name and password) on the subscriber portal logon page. After this, the northbound portal interface initiates an access request message to process a service authorization. Additional parameters can be provided by the AAA server in the access accept message. These parameters define the limitations and behavior of a specific user, such as session timeout, grace period and idle timeout.The figure shows the detailed call flow. FIGURE 3 Hotspot (WISPr) call flow This section covers: • Hotspot (WISPr) Authentication Request on page 40 • Hotspot (WISPr) Authentication Response on page 43 • Hotspot (WISPr) Accounting Request [Start] on page 44 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 39 Hotspot (WISPr) Authentication and Accounting Hotspot (WISPr) Authentication Request Hotspot (WISPr) Authentication Request The table lists the attribute details of messages sent by the controller to Hotspot (WISPr). NOTE These attributes are sent in the Access-Request only if Client Fingerprinting is enabled. To enable this option in the controller web interface navigate to Access Points > Zone Tab > WLANs > Advanced Options > Select Enable Client Fingerprinting. FIGURE 4 Enable Client Fingerprinting TABLE 20 Hotspot (WISPr) authentication request attributes Attribute Attribute ID Presence Type Description User-Name 1 M String This attribute is the logon user name. User-Password 2 C String This attribute indicates the password of the user to be authenticated. This attribute is mandatory for PAP authentication. CHAP-Password 3 M String Indicates the value provided by a CHAP user in response to the accesschallenge. It is mandatory for CHAP authentication. NAS-IP-Address 4 C IP Address This attribute contains the controller management IP address. Service-Type 6 O Integer This attribute has the value 1 (login). Framed-IP-Address 8 O IP Address This attribute is STA’s IP address. Framed MTU 12 O Integer Indicates the Maximum Transmission Unit (MTU) to be configured for the user, when it is not negotiated by some other means. NOTE The attribute will not be available if the MTU size is set to auto in the WLAN configuration page of the controller Web interface. Vendor-Specific 26 O Integer Vendor ID: WISPr: 14122 Vendor Type: 1 VSA: WISPr-Location-ID VSA Length: Variable This attribute is a configurable value in the hotspot (WISPr) user interface. Vendor-Specific 26 O Integer Vendor ID: WISPr: 14122 Vendor Type: 2 VSA: WISPr-Location-Name VSA Length: Variable 40 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Hotspot (WISPr) Authentication and Accounting Hotspot (WISPr) Authentication Request TABLE 20 Hotspot (WISPr) authentication request attributes (continued) Attribute Attribute ID Presence Type Vendor-Specific 26 O Integer Description This attribute is a configurable value in the hotspot (WISPr) user interface. Vendor ID: WISPr: 14122 Vendor Type: 3 VSA: WISPr-Logoff-URL VSA Length: Variable This attribute indicates the hotspot (WISPr) service logout URL. Vendor-Specific 26 O String Vendor ID: Ruckus Vendor Type: 3 VSA: Ruckus-Client-Host-name VSA Length: 138 This attribute reports the configured client host name Vendor-Specific 26 O String Vendor ID: Ruckus Vendor Type: 3 VSA: Ruckus-Client-Os-Type VSA Length: 139 This attribute reports the Client OS Type. Vendor-Specific 26 O String Vendor ID: Ruckus Vendor Type: 3 VSA:Ruckus-Client-Os-Class VSA Length: Variable This attribute reports the client OS class Vendor-Specific 26 O String Vendor ID: WISPr: 25053 Vendor Type: 3 VSA: Ruckus-SSID (3) VSA Length: Variable Reports the associated WLANs SSID in the access request and accounting packet, Ruckus VSA is received only from Ruckus AP. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-Zone-ID (127) VSA Length: 6 Reports the zone ID to which the 3rd party AP is associated. This VSA is received only for 3rd party APs. Called Station ID 30 M Integer This attribute allows NAS to send the ID (BSSID), which is called by the user. It is MAC of the AP. It supports 2 types of values, namely BSSID:SSID, where BSSID is the MAC address of the WLAN on AP. The second value is APMAC:SSID, where AP-MAC is the MAC address of the AP. The letters in the MAC address are in uppercase. For example: 11-22-33-AA-BB-CC:SSID. Calling Station ID 31 M String STA’s MAC address where the letters in the MAC address are in uppercase. For example, 11-22-33-AA-BB-CC. NAS-Identifier 32 C Integer This attribute contains a string identifying the NAS originating the access request. It supports 3 types of values for BSSID (MAC address of the WLAN on AP). AP-MAC (MAC address of AP) is a user defined attribute where the maximum length is 62. This attribute can also be configured as per the configuration specified on the WLAN configuration page of the controller web interface. This attribute can also be configured as per the configuration specified on the WLAN configuration page of the controller web interface. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 41 Hotspot (WISPr) Authentication and Accounting Hotspot (WISPr) Authentication Request TABLE 20 Hotspot (WISPr) authentication request attributes (continued) Attribute Attribute ID Presence Type Description Chap-Challenge 60 M String This attribute contains the chap challenge sent by NAS to a PPP CHAP user. NAS-Port-Type 61 O Integer This attribute indicates the physical port type of the NAS, which authenticates the user. Vendor-Specific 26 C Integer Vendor ID: Ruckus: 2503 Vendor Type: 9 VSA: VLAN-ID VSA Length: Variable This attribute value is as per the configuration specified on the WLAN configuration page of the controller web interface. Operator-Name 126 C String The attribute identifies the owner of the access network by the AAA server. It is encoded as per RFC 5580. NOTE This attribute is included in the first access request when the location delivery method is Out of Band. If the location delivery method is the initial request then the subsequent access request is included in this parameter - as specified in RFC 5580. Location-Information 127 C Octets This is a composite attribute, which provides meta data about the location information. It is encoded as per RFC 5580. NOTE This attribute is included in the first access request when the location delivery method is Out of Band. If the location delivery method is the initial request then the subsequent access request is included in this parameter - as specified in RFC 5580. Location-Data 128 M String This attribute contains the actual location information. It is encoded as per RFC 5580. NOTE This attribute is included in the first access request when the location delivery method is Out of Band. If the location delivery method is the initial request then the subsequent access request is included in this parameter - as specified in RFC 5580. Basic-Location-PolicyRules 129 M String This attribute provides the basic privacy policy associated to the location information. It is encoded as per RFC 5580. NOTE This attribute is included in the first access request when the location delivery method is Out of Band. If the location delivery method is the initial request then the subsequent access request is included in this parameter - as specified in RFC 5580. Extended-Location-PolicyRules 130 C Octets This attribute provides the extended privacy policy for the target whose location is specified.This attribute is sent with the above attribute (basic location policy). It is encoded as per RFC 5580. NOTE This attribute is included in the first access request when the location delivery method is Out of Band. If the location delivery method is the initial request then the subsequent access request is included in this parameter - as specified in RFC 5580. 42 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Hotspot (WISPr) Authentication and Accounting Hotspot (WISPr) Authentication Response TABLE 20 Hotspot (WISPr) authentication request attributes (continued) Attribute Attribute ID Presence Type Description Location-Capable 131 C Integer This attribute is sent in RADIUS access request during the authentication phase to indicate the AP's capability for providing the location. Encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is the initial request or accounting request as specified in RFC 5580. NOTE Acct-Session-Id shall be optionally included in the WISPr Access Request by Ruckus AP if Accounting is disabled in the UI. Hotspot (WISPr) Authentication Response The table lists the attribute details of messages sent by the Hotspot (WISPr) module to the controller. TABLE 21 Hotspot (WISPr) authentication request attributes Attribute Attribute ID Presence Type Description Filter-Id 11 O String Represents the User Role name sent by AAA. This is used by SCG to map the received Group Role Name to the UTP profile and forward the corresponding ACL/ rate limiting parameters to NAS. NAS enforces the UTP for the given user. Filter-Id might be included in access accept irrespective of a WISPr, 802.1x or HS 2.0 call. Class 25 O Integer This attribute is sent by the server in access accept and the client should include this attribute in the accounting request without any modification. Vendor-Specific 26 O Integer Vendor ID: WISPr: 14122 VSA: WISPr-Bandwidth-Max-UP (7) VSA Length: Variable The attribute contains the maximum uplink value in bits per second. Vendor-Specific 26 O Integer Vendor ID: WISPr: 14122 VSA: WISPr-Bandwidth-Max-DOWN (8) VSA Length: Variable The attribute contains the maximum downlink value in bits per second. Vendor-Specific 26 O Integer Vendor ID: Ruckus: 25053 Vendor Type: 7 VSA: Ruckus-Grace-Period VSA Length: Variable This attribute is the grace period in hotspot (WISPr) WLANs. Session-Timeout 27 O Integer This attribute de-authenticates the UE when the session time expires. Idle-Timeout 28 O Integer This attribute sets the maximum number of consecutive seconds of idle connection allowed to the user before termination of the session. Accounting-InterimInterval 85 O Integer Indicates the number of seconds between each interim update for this specific session. If the value is blank, the configured default value is used as the accounting interim interval. Basic-Location-PolicyRules 129 M String This attribute provides the basic privacy policy associated to the location information. It is encoded as per RFC 5580. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 43 Hotspot (WISPr) Authentication and Accounting Hotspot (WISPr) Accounting Request [Start] TABLE 21 Hotspot (WISPr) authentication request attributes (continued) Attribute Attribute ID Presence Type Description NOTE This attribute is expected from the AAA server in the initial request location delivery method as mentioned in RFC 5580. Extended-LocationPolicy-Rules 130 C Octets This attribute provides the extended privacy policy for the target whose location is specified.This attribute is sent with the above attribute (basic location policy). It is encoded as per RFC 5580. NOTE This attribute is expected from the AAA server in the initial request location delivery method as mentioned in RFC 5580. Requested-LocationInfo 132 M Integer This attribute is only used in messages sent by the AAA server towards the AP. Using this attribute the AAA server indicates its request for location information. Encoded as per RFC 5580. NOTE This attribute is expected from the AAA server in the initial request location delivery method as mentioned in RFC 5580. Hotspot (WISPr) Accounting Request [Start] The table lists the attribute details of messages sent by the controller to the Hotspot (WISPr) module. TABLE 22 Hotspot (WISPr) accounting request (start) attributes Attribute Attribute ID Presence Type Description User-Name 1 M String This attribute is the logon user name. NAS-IP-Address 4 C IP Address This attribute is the IP address of the AP which is serving the station or controller's control IP address, controller's management IP address and user defined value. NAS-Port 5 O Integer This attribute is the AID value. Framed-IP-Address 8 O IP Address This attribute is STA’s IP address. Class 25 O Integer This attribute is sent by the server in access accept and the client should include this attribute in the accounting request without modification. Vendor-Specific 26 O Integer Vendor ID: WISPr: 14122 Vendor Type: 1 VSA: WISPr-Location-ID VSA Length: Variable This attribute is a configurable value in the hotspot (WISPr) user interface. Vendor-Specific 26 O Integer Vendor ID: WISPr: 14122 Vendor Type: 2 VSA: WISPr-Location-Name VSA Length: Variable This attribute is a configurable value in the hotspot (WISPr) user interface. Vendor-Specific 26 O Integer Vendor ID: Ruckus: 25053 Vendor Type: 2 VSA: Ruckus-STA-RSSI (2) 44 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Hotspot (WISPr) Authentication and Accounting Hotspot (WISPr) Accounting Request [Start] TABLE 22 Hotspot (WISPr) accounting request (start) attributes (continued) Attribute Attribute ID Presence Type Description VSA Length: Variable This attribute can only be present with Acct-Status-Type = Interim or Stop. Vendor-Specific 26 O String Vendor ID: Ruckus: 25053 Vendor Type: 3 VSA: Ruckus-SSID (3) VSA Length: Variable Reports the associated WLANs SSID in the access request and accounting packet, Ruckus VSA is received only from Ruckus AP. Vendor-Specific 26 O String Vendor ID: Ruckus: 25053 Vendor Type: 5 VSA: Ruckus-Location VSA Length: Variable Reports the device location for this AP. This is a configurable value in the device location setting. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Vendor-Specific 26 O Integer Vendor ID: Ruckus: 25053 Vendor Type: 7 VSA: Ruckus-SCG-CBLADE-IP VSA VSA Length: 6 This attribute indicate the control plane IP address that is being used. Vendor-Specific 26 O Integer Vendor ID: Ruckus: 25053 Vendor Type: 8 VSA: Ruckus-SCG-DBLADE-IP VSA VSA Length: 6 This attribute value is observed by NBI, when the GRE tunnel is set up. Called Station ID 30 M Integer This attribute allows NAS to send the ID (BSSID), which is called by the user. It is MAC of the AP. It supports 2 types of values, namely BSSID:SSID, where BSSID is the MAC address of the WLAN on AP. The second value is AP-MAC:SSID, where APMAC is the MAC address of the AP.The letters in the MAC address are in uppercase.For example: 11-22-33-AA-BB-CC:SSID Calling Station ID 31 M String STA’s MAC address the letters in the MAC address are in uppercase. For example, 11-22-33-AA-BB-CC. NAS-Identifier 32 C Integer This attribute contains a string identifying the NAS originating the access request. It supports 3 types of values for BSSID (MAC address of the WLAN on AP). AP-MAC (MAC address of AP) is a user defined attribute where the maximum length is 62. This attribute can also be configured as per the configuration specified on the WLAN configuration page of the controller web interface. Proxy-State 33 O Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access reject, access challenge and accounting response. Acct-Status-Type 40 M Integer This attribute has the following values where 1 is Start, 2 is Stop, 3 is Interim, 7 are On and 8 are Off. Acct-Delay-Time 41 C Integer This attribute can only be seen in accounting retry packets. This is a configurable option and by default this attribute is disabled. Acct-Session-ID 44 M Integer This attribute is a unique accounting identity to facilitate easy matching of start, interim and stop records in a log file. The start, interim and stop records for a given session must have the same Acct-Session-ID. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 45 Hotspot (WISPr) Authentication and Accounting Hotspot (WISPr) Accounting Request [Stop/Interim] TABLE 22 Hotspot (WISPr) accounting request (start) attributes (continued) Attribute Attribute ID Presence Type Description Acct-Authentic 45 M Integer This attribute value in EAP 802.1X-Auth and hotspot (WISPr) is: 1 for RADIUS-Auth and 2 for MAC-Auth local. Acct-TerminateCause 49 M Integer This attribute can only be present with Acct-Status-Type = Stop. Acct-Multi-SessionID 50 O Integer This attribute is hand-off between APs, which triggers new accounting session (stop followed by start) with different session identifiers. Acct-Multi-Session-ID retains the same ID to tie multiple sessions. Acct-Link-Count 51 O Integer Count of links in a multi-link session, when an accounting record is generated. Event-Timestamp 55 O Integer This attribute is included in the Accounting-Request packet to record the time that this event occurred on NAS. For example, in seconds since January 1, 2013 00:00 UTC. NAS-Port-Type 61 O Integer This attribute indicates the physical port type of the NAS, which authenticates the user. Connect-Info 77 O String This attribute is sent from the NAS to indicate the nature of the user's connection. Location-Information 127 C Octets This is a composite attribute, which provides meta data about the location information. It is encoded as per RFC 5580. Location-Data 128 M String This attribute contains the actual location information. It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is the accounting request as specified in RFC 5580. Basic-LocationPolicy-Rules 129 M String This attribute provides the basic privacy policy associated to the location information. It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is the accounting request as specified in RFC 5580. Extended-LocationPolicy-Rules 130 C Octets This attribute provides the extended privacy policy for the target whose location is specified.This attribute is sent with the above attribute (basic location policy). It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is the accounting request as specified in RFC 5580. Hotspot (WISPr) Accounting Request [Stop/Interim] The table lists the attribute details of messages sent by the controller to the Hotspot (WISPr) module. TABLE 23 Hotspot (WISPr) accounting request (stop/interim) attributes Attribute Attribute ID Presence Type Description User-Name 1 M String This attribute is the logon user name. NAS-IP-Address 4 C Integer This attribute is the IP address of the AP which is serving the station or controller's control IP address, controller's management IP address and user defined value. NAS-Port 5 O Integer This attribute is the AID value. Framed-IP-Address 8 O IP Address This attribute is STA’s IP address. 46 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Hotspot (WISPr) Authentication and Accounting Hotspot (WISPr) Accounting Request [Stop/Interim] TABLE 23 Hotspot (WISPr) accounting request (stop/interim) attributes (continued) Attribute Attribute ID Presence Type Description Class 25 O Integer This attribute is sent by the server in access accept and the client should include this attribute in the accounting request without modification. Vendor-Specific 26 O Integer Vendor ID: WISPr: 14122 Vendor Type: 1 VSA: WISPr-Location-ID VSA Length: Variable This attribute is a configurable value in the hotspot (WISPr) user interface. Vendor-Specific 26 O Integer Vendor ID: WISPr: 14122 Vendor Type: 2 VSA: WISPr-Location-Name VSA Length: Variable This attribute is a configurable value in the hotspot (WISPr) user interface. Vendor-Specific 26 O Integer Vendor ID: Ruckus: 25053 Vendor Type: 2 VSA: Ruckus-STA-RSSI (2) VSA Length: Variable This attribute can only be present with Acct-Status-Type = Interim or Stop. Vendor-Specific 26 O String Vendor ID: Ruckus: 25053 Vendor Type: 3 VSA: Ruckus-SSID (3) VSA Length: Variable Reports the associated WLANs SSID in the access request and accounting packet, Ruckus VSA is received only from Ruckus AP. Vendor-Specific 26 O String Vendor ID: Ruckus: 25053 Vendor Type: 5 VSA: Ruckus-Location VSA Length: Variable Reports the device location for this AP. This is a configurable value in the device location setting. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Vendor-Specific 26 O Integer Vendor ID: Ruckus: 25053 Vendor Type: 7 VSA: Ruckus-SCG-CBLADE-IP VSA VSA Length: Variable This attribute indicate the control plane IP address that is being used. Vendor-Specific 26 O Integer Vendor ID: Ruckus: 25053 Vendor Type: 8 VSA: Ruckus-SCG-DBLADE-IP VSA VSA Length: Variable This attribute value is observed by NBI, when the GRE tunnel is set up. Called Station ID 30 M Integer Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A This attribute allows NAS to send the ID (BSSID), which is called by the user. It is MAC of the AP. It supports 2 types of values, namely BSSID:SSID, where BSSID is the MAC address of the WLAN on AP. The second value is AP-MAC:SSID, where AP-MAC is the MAC address of the AP. The letters in the MAC address are in uppercase.For example: 11-22-33-AA-BB-CC:SSID 47 Hotspot (WISPr) Authentication and Accounting Hotspot (WISPr) Accounting Request [Stop/Interim] TABLE 23 Hotspot (WISPr) accounting request (stop/interim) attributes (continued) Attribute Attribute ID Presence Type Description Calling Station ID 31 M String STA’s MAC address the letters in the MAC address are in uppercase. For example, 11-22-33-AA-BB-CC. NAS-Identifier 32 C Integer This attribute contains a string identifying the NAS originating the access request. It supports 3 types of values for BSSID (MAC address of the WLAN on AP). AP-MAC (MAC address of AP) is a user defined attribute where the maximum length is 62. This attribute can also be configured as per the configuration specified on the WLAN configuration page of the controller web interface. Proxy-State 33 O Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access reject, access challenge and accounting response. Acct-Status-Type 40 M Integer This attribute has the following values where 1 is Start, 2 is Stop, 3 is Interim, 7 are On and 8 are Off. Acct-Delay-Time 41 C Integer This attribute can only be seen in accounting retry packets. This is a configurable option and by default this attribute is disabled. Acct-Input-Octets 42 M Integer This attribute indicates the number of octets received from the port over the course of this service provided. Acct-Output-Octets 43 M Integer This attribute indicates the number of octets sent to the port in the course of delivering this service. Acct-Session-ID 44 M Integer This attribute is a unique accounting identity to facilitate easy matching of start, interim and stop records in a log file. The start, interim and stop records for a given session must have the same Acct-Session-ID. Acct-Authentic 45 M Integer This attribute value in EAP 802.1X-Auth and hotspot (WISPr) is: 1 for RADIUS-Auth and 2 for MAC-Auth local. Acct-Session-Time 46 M Integer This attribute can only be present with Acct-Status-Type = Interim, Stop. Acct-Terminate-Cause 49 M Integer This attribute can only be present with Acct-Status-Type = Stop. Acct-Multi-Session-ID 50 O Integer This attribute is hand-off between APs, which triggers new accounting session (stop followed by start) with different session identifiers. Acct-Multi-Session-ID retains the same ID to tie multiple sessions. Acct-Link-Count 51 O Integer Count of links in a multi-link session, when an accounting record is generated. Acct-Input-Gigawords 52 M Integer This attribute can only be present with Acct-Status-Type = Interim, Stop. Acct-Output-Gigawords 53 M Integer This attribute can only be present with Acct-Status-Type = Interim, Stop. Event-Timestamp 55 O Integer This attribute is included in the Accounting-Request packet to record the time that this event occurred on NAS. For example, in seconds since January 1, 2013 00:00 UTC. NAS-Port-Type 61 O Integer This attribute indicates the physical port type of the NAS, which authenticates the user. Connect-Info 77 O String This attribute is sent from the NAS to indicate the nature of the user's connection. Location-Information 127 C Octets This is a composite attribute, which provides meta data about the location information. It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is accounting request as specified in RFC 5580. Location-Data 48 128 M String This attribute contains the actual location information. It is encoded as per RFC 5580. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Hotspot (WISPr) Authentication and Accounting Hotspot (WISPr) Accounting Response TABLE 23 Hotspot (WISPr) accounting request (stop/interim) attributes (continued) Attribute Attribute ID Presence Type Description NOTE This attribute is included only if the location delivery method is accounting request as specified in RFC 5580. Basic-Location-Policy-Rules 129 M String This attribute provides the basic privacy policy associated to the location information. It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is accounting request as specified in RFC 5580. Extended-Location-PolicyRules 130 C Octets This attribute provides the extended privacy policy for the target whose location is specified.This attribute is sent with the above attribute (basic location policy). It is encoded as per RFC 5580. NOTE This attribute is included only if the location delivery method is accounting request as specified in RFC 5580. Hotspot (WISPr) Accounting Response The table lists the attribute details of messages received by the controller to the Hotspot (WISPr) module. TABLE 24 Hotspot (WISPr) accounting response attributes Attribute Presence Type Description Response Authenticator M Integer MD5(Code|ID|Length|RequestAuth|RequestAuth|RequestAuth|Attributes|Secret) Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 49 50 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Hotspot 2.0 Authentication • • • • • Hotspot 2.0 Authentication Overview.......................................................................................................................51 SIM Based Authentication - Access Request...........................................................................................................51 R2 Device Access Authentication............................................................................................................................ 52 R2 Device Onboarding............................................................................................................................................ 55 Hotspot 2.0 VSAs....................................................................................................................................................56 Hotspot 2.0 Authentication Overview Hotspot 2.0 WLAN supports 802.1x authentication and passpoint technology. Passpoint enabled devices (R2 devices) connect to the network automatically based on their PPS-MO and facilitates seamless roaming for users on Wi-Fi network. WLAN supports Hotspot 2.0 Online SignUp (OSU) procedure and passpoint enabled devices, which connect to the network and are provisioned with PPS-MO. R2 users can onboard PPS-MO through authentication procedure using RADIUS credentials. Non SIM based authentication (EAP-TTLS) is supported as per the WFA RFC mandate for Hotspot 2.0 R2 devices. SIM based authentication (EAP SIM and EAP AKA) is supported as per the WFA RFC mandate for Hotspot 2.0 R1 devices. SIM based authentication is similar to EAP - Full Authentication – 3GPP Solution except that RADIUS message include Hotspot 2.0 specific attributes. SIM based authentication is also applicable for R1 devices associated with Hotspot 2.0 WLAN and RADIUS messages are proxied to the external AAA server. R2 devices are associated with Hotspot 2.0 WLAN on receiving the PPS-MO from the controller. Alternatively R2 devices can also get PPSMO from remote OSU server and RADIUS request is proxied to external AAA server during access. NOTE For this release, TTLS RADIUS authentication is supported. There is no support for EAP-SIM. SIM Based Authentication - Access Request SIM based authentication for Hotspot 2.0 devices is similar to EAP - Full Authentication – 3GPP Solution. In addition to the parameters mentioned in each of the following RADIUS access-accept. The table lists the attributes specific to Hotspot 2.0. • RADIUS Access Request [ID] on page 27 • RADIUS Access Request [EAP Response (NONCE_MT)] on page 18 • RADIUS Access Request [EAP Response (SRES)] on page 21 TABLE 25 Hotspot 2.0 RADIUS access request attributes Attribute Attribute ID Presence Type Description Vendor-Specific 26 C String Vendor ID: 40808 Vendor Type: 2 VSA: AP Version VSA Length: Variable This attribute indicates version 0 as R1 compliant AP and version 1as R2 compliant AP. Vendor-Specific 26 C String Vendor ID: 40808 Vendor Type: 3 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 51 Hotspot 2.0 Authentication R2 Device Access Authentication TABLE 25 Hotspot 2.0 RADIUS access request attributes (continued) Attribute Attribute ID Presence Type Description VSA: Mobile Device Version VSA Length: Variable This attribute indicates version 0 as R1 compliant AP and version 1 as R2 compliant AP. Version 1 also includes the update identifier details. R2 Device Access Authentication In the R2 device authentication where PPS-MO is provisioned by an external OSU, RADIUS access request is always proxied to the remote AAA server when the device connects to the Hotspot 2.0 WLAN. RAC proxies the request to the AAA server based on the realm configuration defined in Services&Profiles > Hotspot 2.0 of the controller web interface. The figure shows the call flow for R2 devices when PPS-MO is received from external OSU. RAC does not decode the EAP payload and certificate details. It merely proxy’s the request based on the RADIUS user name attribute used in the request. 52 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Hotspot 2.0 Authentication R2 Device Access Authentication FIGURE 5 R2 device access authentication Access Request The table lists the attributes specific to Hotspot 2.0. TABLE 26 Hotspot 2.0 RADIUS access request attributes Attribute Attribute ID Presence Type Description Vendor-Specific 26 C String Vendor ID: 40808 Vendor Type: 2 VSA: AP Version VSA Length: Variable This attribute indicates version 0 as R1 compliant AP and version 1as R2 compliant AP. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 53 Hotspot 2.0 Authentication R2 Device Access Authentication TABLE 26 Hotspot 2.0 RADIUS access request attributes (continued) Attribute Attribute ID Presence Type Description Vendor-Specific 26 C String Vendor ID: 40808 Vendor Type: 3 VSA: Mobile Device Version VSA Length: Variable This attribute indicates version 0 as R1 compliant AP and version 1 as R2 compliant AP. Version 1 also includes the update identifier details. NOTE R2 access requests will have similar attributes as captured in EAP Full Authentication with a few exceptions: • The Username in the access request will have the value 'anonymous@realm.com'. 'Realm.com' will vary depending on the NAI realm configured in the PPS-MO. • The EAP message will carry an EAP-TTLS payload. It will be used to exchange certificate details and MSCHAPv2 credentials unlike EAP carrying EAP SIM credentials such as RAND, SRES, and Kc in EAP-SIM. Access Response The table lists the attributes specific to Hotspot 2.0. An HS 2.0 R2 call will have RADIUS responses such as multiple access challenges and Access Accept as captured or EAP SIM full authentication. See the note at the end of the table. TABLE 27 Hotspot 2.0 RADIUS access response attributes Attribute Attribute ID Presence Type Description Vendor-Specific 26 C String Vendor ID: 40808 Vendor Type: 1 VSA: Subscription Remediation Needed VSA Length: Variable This attribute provides the remediation URL. Vendor-Specific 26 C String Vendor ID: 40808 Vendor Type: 4 VSA: De-authentication Request VSA Length: Variable This attribute is applicable only for R2 devices. It gives the de-authenticated URL and the re-authentication delay. Vendor-Specific 26 C String Vendor ID: 40808 Vendor Type: 5 VSA: Session Information URL VSA Length: Variable 54 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Hotspot 2.0 Authentication R2 Device Onboarding TABLE 27 Hotspot 2.0 RADIUS access response attributes (continued) Attribute Attribute ID Presence Type Description This attribute provides the URL details seen before session termination. NOTE The EAP message for the HS 2.0 R2 call will have TLS and MSCHAPv2 credentials instead of SIM. NOTE Attributes such as Client Hello, Server Hello are standard TLS 1.0 specific attributes and are embedded within EAP. For details refer to RFC 2246. R2 Device Onboarding The UE can onboard with a controller using AAA credentials, where the controller proxys the onboarding requests to AAA. Onboarding Access Request The details in the access request are as follows: TABLE 28 Onboarding Access Request Attribute Attribute ID Presence Type Description NAS-Port-Type 61 M Integer Indicates the physical port type of NAS, which authenticates the user. NAS-Port 5 O Integer This attribute indicates the physical port number of the NAS which authenticates the user. The controller uses the association ID for the STA in the AP to represent this. User-Name 1 M String Indicates the name of the user for authentication. User-Password 2 C String This attribute indicates the password of the user to be authenticated. It is mandatory for PAP authentication. Calling Station ID 31 O String This attribute will contain the Calling Station ID as received from NAS during authentication or the accounting procedure Message Authenticator 80 O Octets This attribute is used to sign access requests to prevent spoofing access requests using CHAP, ARAP or EAP authentication methods. It authenticates this whole RADIUS packet - HMAC-MD5 (Type| Identifier | Length | Request Authenticator | Attributes). NAS-IP-address 4 C IP Address This attribute is the IP address of the AP which is serving the station or controller's control IP address, controller's management IP address and user defined value. Proxy-State 33 O Octets This attribute is available to be sent by a proxy server to another server. Onboarding Access Response The details in the access response are as follows: TABLE 29 Onboarding Access Response Attribute Attribute ID Presence Type Description Proxy-State 33 O Octets This attribute is available to be sent by a proxy server to another server. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 55 Hotspot 2.0 Authentication Hotspot 2.0 VSAs TABLE 29 Onboarding Access Response (continued) Attribute Attribute ID Presence Type Description Filter-Id 11 O String Represents the User Role name sent by AAA. This is used by SCG to map the received Group Role Name to the UTP profile and forward the corresponding ACL/ rate limiting parameters to NAS. NAS enforces the UTP for the given user. Filter-Id might be included in access accept irrespective of a WISPr, 802.1x or HS 2.0 call. WISPr uplink 26 O Integer Vendor ID: WISPr: 14122 VSA: WISPr-Bandwidth-Max-UP (7) VSA Length: Variable The attribute contains the maximum uplink value in bits per second. WISPr downlink 26 O Integer Vendor ID: WISPr: 14122 VSA: WISPr-Bandwidth-Max-DOWN (8) VSA Length: Variable The attribute contains the maximum downlink value in bits per second. Hotspot 2.0 VSAs There are vendor specific attributes for Hotspot 2.0 as mandated by WFA Hotspot 2.0 specifications along with the regular RADIUS message attributes (as per RFC 2865). The figure indicates the VSA fields in a hotspot 2.0 subscription remediation flow. FIGURE 6 Hotspot 2.0 VSA fields 56 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A AP Initiated Accounting Messages • • • • • AP Initiated Accounting Messages (PDG/LBO Sessions)......................................................................................... 57 Accounting Start Messages.....................................................................................................................................58 Accounting Interim Update and Stop Messages...................................................................................................... 60 Accounting On Messages....................................................................................................................................... 63 Accounting Off Messages........................................................................................................................................64 AP Initiated Accounting Messages (PDG/LBO Sessions) The controller honors RADIUS accounting messages received from AP, for both Ruckus AP and 3rd Party AP. For accounting messages from AP, controller generates W-AN-CDR/S-CDR/W-CDR as configured in the controller UI (non-proxy mode), or proxy accounting messages received from AP to configured external AAA server (proxy mode). The figure shows the controller proxy accounting messages from NAS to external AAA server. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 57 AP Initiated Accounting Messages Accounting Start Messages FIGURE 7 AP initiated accounting messages This section covers: • Accounting Start Messages on page 58 • Accounting Interim Update and Stop Messages on page 60 • Accounting On Messages on page 63 • Accounting Off Messages on page 64 Accounting Start Messages The table lists the attribute details of messages sent by the controller to the AAA server. TABLE 30 Accounting start message attributes Attribute Attribute ID Presence Type Description User-Name 1 M String The username of the given accounting session. 58 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A AP Initiated Accounting Messages Accounting Start Messages TABLE 30 Accounting start message attributes (continued) Attribute Attribute ID Presence Type Description NAS-IP-Address 4 C IP Address This attribute is the IP address of the AP which is serving the station or user equipment, controller's control IP address, controller's management IP address and user defined value. NAS-Port 5 O Integer This attribute indicates the physical port number of the NAS which authenticates the user. The controller uses the association ID for the STA in the AP to represent this. Framed-IP-Address 8 O IP Address This attribute indicates the address to be configured for the user. Vendor-Specific 26 C String Vendor ID: Ruckus:25053 VSA: Ruckus-SSID (3) VSA Length: Variable Reports the associated WLANs SSID in access request and accounting packet. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C String Vendor ID: Ruckus:25053 VSA: Ruckus-Location (5) VSA Length: Variable Reports the device location for this AP. This is a configurable value in the device location setting. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-SCG-CBLADE-IP (7) VSA Length: 6 Reports the control plane IP address. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-SCG-DBLADE-IP (8) VSA Length: 6 Reports the data plane IP address. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Called Station ID 30 O Integer This attribute supports two kinds of formats, namely, BSSID:SSID, which is the MAC address of the WLAN on AP and AP-MAC:SSID which is the MAC address of AP. The letters in the MAC address are in uppercase. For example: 11-22-33AA-BB-CC:SSID. Calling Station ID 31 O String Allows NAS to send the ID (UE MAC), which indicates as to who is calling the STA's MAC address. The letters in the MAC address are in uppercase. For example: 11-22-33-AA-BB-CC. NAS-Identifier 32 C Integer NAS-IP-Address or NAS-Identifier attribute is mandatory in received messages. It supports 3 types of values, namely BSSID (MAC address of the WLAN on AP), AP-MAC (MAC address of AP) and user defined address (maximum length of 62). Proxy-State 33 C Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access reject, access challenge and accounting response. Acct-Status-Type 40 M Integer This attribute indicates whether the Accounting-Request attribute marks the beginning of the user service (Start). Start value is 1. Acct-Delay-Time 41 C Integer This is a configurable option and by default this attribute is disabled.In case the accounting message gets retransmitted, this attribute contains the time stamp of the consecutive retransmitted message. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 59 AP Initiated Accounting Messages Accounting Interim Update and Stop Messages TABLE 30 Accounting start message attributes (continued) Attribute Attribute ID Presence Type Description Acct-Session-ID 44 M Integer This attribute is a unique accounting identity to facilitate easy matching of start, interim and stop records in a log file. The start, interim and stop records for a given session must have the same Acct-Session-ID. Acct-Authentic 45 M Integer This attribute indicates whether the user was authenticated through RADIUS server or NAS or remote authentication protocol. Acct-Multi-Session-ID 50 O Integer This attribute is a unique Accounting ID, to link multiple related sessions in a log file Acct-Link-Count 51 O Integer Count of links in a multi-link session, when an accounting record is generated. Event-Timestamp 55 O Integer This attribute is included in the accounting-request packet for recording the time in seconds that the event occurred on NAS. For example, January 1, 2013 00:00 UTC. NAS-Port-Type 61 O Integer Indicates the physical port type of NAS, which authenticates the user. Connect-Info 77 O String This attribute is sent from the NAS to indicate the nature of the user's connection. Chargeable User ID 89 C String This attribute is MSISDN or any chargeable user identity returned by the AAA server. Location-Information 127 C Octets This is a composite attribute, which provides meta data about the location information. It is encoded as per RFC 5580. NOTE This attribute is included only when the expected location delivery method is accounting request as specified in RFC 5580. Location-Data 128 M String This attribute contains the actual location information. It is encoded as per RFC 5580. NOTE This attribute is included only when the expected location delivery method is accounting request as specified in RFC 5580. Basic-Location-PolicyRules 129 C Octets This attribute provides the basic privacy policy associated to the location information. It is encoded as per RFC 5580. NOTE This attribute is included only when the expected location delivery method is accounting request as specified in RFC 5580. Extended-LocationPolicy-Rules 130 C Octets This attribute provides the extended privacy policy for the target whose location is specified.This attribute is sent with the above attribute (basic location policy). It is encoded as per RFC 5580. NOTE This attribute is included only when the expected location delivery method is accounting request as specified in RFC 5580. Accounting Interim Update and Stop Messages The table lists the attribute details of messages sent by the controller to AAA. TABLE 31 Accounting interim update and stop message attributes Attribute Attribute ID Presence Type Description User-Name 1 M String The username of the given accounting session. 60 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A AP Initiated Accounting Messages Accounting Interim Update and Stop Messages TABLE 31 Accounting interim update and stop message attributes (continued) Attribute Attribute ID Presence Type Description NAS-IP-Address 4 C IP Address This attribute is the IP address of the AP which is serving the station or controller's control IP address, controller's management IP address and user defined value. NAS-Port 5 O Integer This attribute indicates the physical port number of the NAS which authenticates the user. The controller uses the association ID for the STA in the AP to represent this. Framed-IP-Address 8 O IP Address This attribute indicates the address to be configured for the user. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-STA-RSSI (2) VSA Length: 6 UE reports the current RSSI value in the accounting packet. Ruckus VSA is received only from Ruckus AP. Vendor-Specific 26 C String Vendor ID: Ruckus:25053 VSA: Ruckus-SSID (3) VSA Length: Variable Reports the associated WLANs SSID in the access request and accounting packet. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Vendor-Specific 26 C String Vendor ID: Ruckus:25053 VSA: Ruckus-Location (5) VSA Length: Variable Reports the device location for this AP. This is a configurable value in the device location setting. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Vendor-Specific 26 C Integer Vendor D: Ruckus:25053 VSA: Ruckus-SCG-CBLADE-IP (7) VSA Length: 6 Reports the control plane IP address. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-SCG-DBLADE-IP (8) VSA Length: 6 Reports the data plane address. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Called Station ID 30 O Integer This attribute allows NAS to send the ID (BSSID), which is called by the user. It is MAC of the AP. It supports 2 types of values, namely BSSID:SSID, where BSSID is the MAC address of the WLAN on AP. The second value is AP-MAC:SSID, where AP-MAC is the MAC address of the AP. The letters in the MAC address are in uppercase.For example: 11-22-33-AA-BB-CC:SSID Calling Station ID 31 O String Allows NAS to send the ID (UE MAC), which indicates as to who is calling this server. NAS-Identifier 32 C Integer NAS-IP-Address or NAS-Identifier attribute is mandatory in received messages. It supports 3 types of values, namely BSSID (MAC address of the WLAN on AP), AP-MAC (MAC address of AP) and user defined address (maximum length of 62). Proxy-State 33 O Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 61 AP Initiated Accounting Messages Accounting Interim Update and Stop Messages TABLE 31 Accounting interim update and stop message attributes (continued) Attribute Attribute ID Presence Type Description unmodified in the access accept, access reject, access challenge and accounting response. Acct-Status-Type 40 M Integer Value differs based on message type. Attribute interim update has the value 3 and stop has the value 2. Acct-Delay-Time 41 C Integer This is a configurable option and by default this attribute is disabled. In case the accounting message gets retransmitted, this attribute contains the time stamp of the consecutive retransmitted message. Acct-Input-Octets 42 M Integer This attribute indicates the number of octets received from the port over the course of the service provided. This attribute is present in Acct- Status-Type = Interim, Stop. Acct-Output-Octets 43 M Integer This attribute indicates the number of octets sent to the port in the course of delivering this service. Acct-Session-ID 44 M Integer This attribute is a unique accounting identity to facilitate easy matching of start, interim and stop records in a log file. The start, interim and stop records for a given session must have the same Acct-Session-ID. Acct-Authentic 45 M Integer This attribute indicates whether the user was authenticated through RADIUS server or NAS or remote authentication protocol. Acct-Session-Time 46 M Integer This attribute indicates the number of seconds for receiving the service. Acct-Input-Packets 47 M Integer This attribute indicates the number of packets received from the port over the course of the service provided to a framed user. Acct-Output-Packets 48 M Integer This attribute indicates the number of packets sent from the port over the course of the service provided to a framed user. Acct-Terminate-Cause 49 M Integer This attribute indicates how the session was terminated. This attribute can only be present in accounting request records where the AcctStatus-Type is set to Stop. Acct-Multi-Session-ID 50 O Integer This attribute is a unique Accounting ID, linking multiple related sessions in a log file. Acct-Link-Count 51 O Integer Count of links in a multi-link session, when an accounting record is generated. Acct-Input-Gigawords 52 M Integer This attribute indicates the number of times that the Acct-Input-Octets counter wraps around 2^32 over the course of this provided service. Acct-Output-Gigawords 53 M Integer This attribute indicates the number of times the Acct-Output-Octets counter is wrapped around 2^32 in the course of delivering this service. Event-Timestamp 55 O Integer This attribute is included in the accounting request packet to record the time (in seconds) that this event occurred on NAS. For example, January 1, 2013 00:00 UTC. NAS-Port-Type 61 O Integer Indicates the physical port type of NAS, which authenticates the user. Connect-Info 77 O String This attribute is sent from the NAS to indicate the nature of the user's connection. Chargeable User ID 89 C String AP includes Chargeable User ID attribute along with the values received from the AAA server. Location-Information 127 C Octets This is a composite attribute, which provides meta data about the location information. It is encoded as per RFC 5580. Note: This attribute is included only when the expected location delivery method is accounting request as specified in RFC 5580. Location-Data 128 M String This attribute contains the actual location information. It is encoded as per RFC 5580. 62 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A AP Initiated Accounting Messages Accounting On Messages TABLE 31 Accounting interim update and stop message attributes (continued) Attribute Attribute ID Presence Type Description NOTE This attribute is included only when the expected location delivery method is accounting request as specified in RFC 5580. Basic-Location-PolicyRules 129 C Octets This attribute provides the basic privacy policy associated to the location information. It is encoded as per RFC 5580. NOTE This attribute is included only when the expected location delivery method is accounting request as specified in RFC 5580. Extended-LocationPolicy-Rules 130 C Octets This attribute provides the extended privacy policy for the target whose location is specified.This attribute is sent with the above attribute (basic location policy). It is encoded as per RFC 5580. NOTE This attribute is included only when the expected location delivery method is accounting request as specified in RFC 5580. Accounting On Messages The table lists the attribute details of messages sent by the controller to the AAA server. TABLE 32 Accounting on message attributes Attribute Attribute ID Presence Type Description User-Name 1 M String The username of the given accounting session. NAS-IP-Address 4 C IP Address This attribute is the IP address of the AP which is serving the station or controller's control IP address, controller's management IP address and user defined value. Vendor-Specific 26 C String Vendor ID: Ruckus:25053 VSA: Ruckus-SSID (3) VSA Length: - Variable Reports the associated WLANs SSID in the access request and accounting packet, Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Vendor-Specific 26 C String Vendor ID: Ruckus:25053 VSA: Ruckus-Location(5) VSA Length: Variable Reports the device location for this AP. This is a configurable value in the device location setting. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-SCG-CBLADE-IP (7) VSA Length: 6 Reports the control plane IP address. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 63 AP Initiated Accounting Messages Accounting Off Messages TABLE 32 Accounting on message attributes (continued) Attribute Attribute ID Presence Type Description Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-SCG-DBLADE-IP (8) VSA Length: 6 Reports the data plane IP address. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Called Station ID 30 O Integer This attribute allows NAS to send the ID (BSSID), which is called by the user. It is MAC of the AP. It supports 2 types of values, namely BSSID:SSID, where BSSID is the MAC address of the WLAN on AP. The second value is AP-MAC:SSID, where AP-MAC is the MAC address of the AP. The letters in the MAC address are in uppercase.For example: 11-22-33-AA-BB-CC:SSID NAS-Identifier 32 C Integer NAS-IP-Address or NAS-Identifier attribute is mandatory in received messages. It supports 3 types of values, namely BSSID (MAC address of the WLAN on AP), AP-MAC (MAC address of AP) and user defined address (maximum length of 62). Proxy-State 33 O Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access reject, access challenge and accounting response. Acct-Status-Type 40 M Integer This attribute indicates whether the Accounting-Request attribute marks it as Accounting-On (7) and Accounting-Off(8). Acct-Delay-Time 41 C Integer In case the accounting message gets retransmitted, this attribute contains the time stamp of the consecutive retransmitted message. Acct-Authentic 45 M Integer This attribute indicates whether the user was authenticated through RADIUS server or NAS or Remote authentication protocol. Accounting Off Messages The table lists the attribute details of messages sent by the controller to the AAA server. TABLE 33 Accounting off message attributes Attribute Attribute ID Presence Type Description User-Name 1 M String The username of the given accounting session. NAS-IP-Address 4 C IP Address This attribute is the IP address of the AP which is serving the station or controller's control IP address, controller's management IP address and user defined value. Vendor-Specific 26 C String Vendor ID: Ruckus:25053 VSA: Ruckus-SSID (3) VSA Length: Variable Reports the associated WLANs SSID in access request and accounting packet. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C String Vendor ID: Ruckus:25053 VSA: Ruckus-Location (5) VSA Length: Variable Reports the device location for this AP. This is a configurable value in the device location setting. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Vendor-Specific 64 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-SCG-CBLADE-IP (7) Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A AP Initiated Accounting Messages Accounting Off Messages TABLE 33 Accounting off message attributes (continued) Attribute Attribute ID Presence Type Description VSA Length: 6 Reports the control plane IP address. Ruckus VSAs are received from Ruckus APs only. It is optional for 3rd party APs. Vendor-Specific 26 C Integer Vendor ID: Ruckus:25053 VSA: Ruckus-SCG-DBLADE-IP (8) VSA Length: 6 Reports the data plane IP address. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Called Station ID 30 O Integer This attribute allows NAS to send the ID (BSSID), which is called by the user. It is MAC of the AP. It supports 2 types of values, namely BSSID:SSID, where BSSID is the MAC address of the WLAN on AP. The second value is AP-MAC:SSID, where AP-MAC is the MAC address of the AP. The letters in the MAC address are in uppercase.For example: 11-22-33-AA-BB-CC:SSID. NAS-Identifier 32 C Integer NAS-IP-Address or NAS-Identifier attribute is mandatory in received messages. It supports 3 types of values, namely BSSID (MAC address of the WLAN on AP), APMAC (MAC address of AP) and user defined address (maximum length of 62). Proxy-State 33 O Octets This attribute is available to be sent by a proxy server (controller) to another server (AAA server) when forwarding an access request, accounting request (start, stop or interim) and must be returned unmodified in the access accept, access reject, access challenge and accounting response. Acct-Status-Type 40 M Integer This attribute indicates whether the Accounting-Request attribute marks it as Accounting-On (7) and Accounting-Off(8). Acct-Delay-Time 41 C Integer In case the accounting message gets retransmitted, this attribute contains the time stamp of the consecutive retransmitted message. Acct-Authentic 45 M Integer This attribute indicates whether the user was authenticated through RADIUS server or NAS or Remote authentication protocol. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 65 66 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A AAA Server Dynamic Authorization and List of Vendor Specific Attributes • • • Dynamic Authorization and List of Vendor Specific Attributes - AAA Server............................................................. 67 Service Authorization...............................................................................................................................................67 List of Vendor Specific Attributes............................................................................................................................. 73 Dynamic Authorization and List of Vendor Specific Attributes - AAA Server The AAA server initiates messages to the controller signaling an authorization change, as described in RFC 5176, Dynamic Authorization Extensions to RADIUS. This occurs when modifications are made to the subscriber GPRS profile at the HLR (via OAM). Reference TS 29.234 describes these procedures on the Wm reference point using the diameter protocol. The following sections list the message flow attributes utilized for RADIUS Dynamic Authorization Extension. Change of Authorization (CoA) and Disconnect Message (DM) messages can have any of the following attributes as a session identifier. • User name • CUI with MSISDN • Acct-Sess-Id (Session identification attribute) Service Authorization A change in service authorization is initiated at the AAA server. For example, when the AAA server receives a MAP-InsertSubscriberData from the HLR along with the modified GPRS profile information (QoS) or is modified for any other reason the controller AAA proxy intercepts the CoA request. It checks if the CoA message contains a session identification attribute (such as user name) as well as attributes indicating the authorization changes (new QoS). Depending on these attributes the call flows could vary. If the CoA request contains a session identification and the attribute - service-type (6) is set to authorize-only the controller responds with CoA NAK since the controller does not support CoA with service-type as authorize-only. If the CoA request does not contain the service-type (6) attribute, the message must contain a session identification attributes as well as authorization attributes (QoS). The controller supports RADIUS CoA (Change-of-Authorization) in limited form. RADIUS CoA is supported only for modifying QoS profile when subscriber traffic is tunneled to the core network (Gn and S2a) interface. It is also supported when traffic originates from Ruckus Wireless or from 3rd Party APs. NOTE Refer to the Authentication and Authorization section for this procedure. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 67 AAA Server Dynamic Authorization and List of Vendor Specific Attributes Service Authorization Change of Authorization (CoA) Messages - Not Set to Authorize Only The table lists the attribute details of CoA messages where the service type AVP is not set.is not set. CoA can have any of the following attributes as session identifier: • User name • CUI with MSISDN • Acct-Sess-Id TABLE 34 Change of Authorization (CoA) messages - Authorize-Only is not set Attribute Attribute ID Message Code Presence Type/Description M 43 User-Name 1 C Identifies the username of the UE/subscriber to be disconnected. Username is received from NAS during authentication or accounting session. NAS-IP-Address 4 C This attribute is the IP address of the AP which is serving the station or user equipment, controller's control IP address, controller's management IP address and user defined value. NAS-Port 5 O Indicates the physical NAS port number, which authenticates the user or the port on which a session is terminated. If present should match the session context table. 3GPP VSA (Negotiated-QoS-Profile) 5 O This attribute carries the new QoS value and can be either be Ruckus defined VSA or 3GPP defined VSA. NOTE The controller uses this attribute for updating the QoS from the AAA server, whichever is present. If both are present priority is for 3GPP-QoS attribute. Service-Type 6 O This attribute indicates the type of service the user has requested, or the type of service to be provided. CoA request should be processed if present. Framed-IP-Address 8 O The IPv4 address associated with a session. This is the IP address, which gets assigned to UE after successfull call establishment. If present should match the session context table. Filter-Id 11 O Represents the user role name sent by AAA. This is used by SCG to map the received Group Role Name to the UTP profile and forward the corresponding ACL/rate limiting parameters to NAS. NAS enforces the UTP for the given user. Vendor-Specific 26 O Vendor ID: WISPr: 14122 VSA: WISPr-Bandwidth-Max-UP (7) VSA Length: Variable The attribute contains the maximum uplink value in bits per second. Vendor-Specific 26 O Vendor ID: WISPr: 14122 VSA: WISPr-Bandwidth-Max-DOWN (8) 68 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A AAA Server Dynamic Authorization and List of Vendor Specific Attributes Service Authorization TABLE 34 Change of Authorization (CoA) messages - Authorize-Only is not set (continued) Attribute Attribute ID Presence Type/Description VSA Length: Variable The attribute contains the maximum downlink value in bits per second. Session-Timeout 27 O This attribute sets the maximum number of seconds of service to be provided to the user before termination of the session Idle-Timeout 28 O It sets the maximum number of consecutive seconds of idle connection allowed to the user before termination of the session. Called Station ID 30 O This attribute will contain the Called Station ID as received from NAS during authentication or the accounting procedure. Calling Station ID 31 O This attribute will contain the Calling Station ID as received from NAS during authentication or the accounting procedure NAS-Identifier 32 C If present, it should match with the value in the controller session table. Acct-Session-ID 44 C This attribute should have the same value as sent by NAS during the accounting procedure. State 45 O This attribute is copied as is if it is received in a request from the AAA server. Acct-Multi-Session-Id 50 O Thus attribute uniquely identifyies related sessions. It should have the same value received in authentication or accouting request. If present should match the session context table. Accounting-Interim-Interval 85 O Indicates the number of seconds between each interim update for this specific session. If the value is blank, the configured default value is used as the accounting interim interval. NAS-Port-Id 87 O String identifying the port based on the session and should match the session context if present in request. Chargeable User ID 89 C This attribute is MSISDN or any chargeable user identity returned by the AAA server. Framed-Interface-Id 96 O The IPv6 interface identifier associated with a session, which is always sent with framed-IPv6 prefix. If present should match the session context. Framed-IPv6-Prefix 97 O The IPv6 prefix associated with a session, which is always sent with framed interface identifier. If present should match the session context. Change of Authorization Acknowledge Messages (CoA Ack) The table lists the attributes of CoA messages being acknowledged by the controller to DAC. TABLE 35 Change of Authorization (CoA) messages - Acknowledge Attribute Attribute ID Message Code Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Presence Type/Description M 44 69 AAA Server Dynamic Authorization and List of Vendor Specific Attributes Service Authorization TABLE 35 Change of Authorization (CoA) messages - Acknowledge (continued) Attribute Attribute ID Presence Type/Description State 24 C This attribute is copied without any modification or only if it is sent in the CoA request. Change of Authorization Negative Acknowledge Messages (CoA NAK) The table lists the attributes of CoA messages that are not acknowledged by the controller to the DAC. TABLE 36 Change of Authorization (CoA) messages - Negative Acknowledge Attribute Attribute ID Message Code Presence Type/Description M 45 Service-Type 6 C Indicates the type of service based on the user request or the type of service to be provided. It is included only if the Service-Type attribute is present in CoA request, is set to authorize only. State 24 C This attribute is copied without any modification or only if it is sent in the CoA request. Error-Cause 101 C Included only if the Service-Type attribute is present in CoA request is set to authorize only. It is included only if the Error-Cause attribute is set to request initiated. NOTE For other scenarios, the attribute Error-Cause will have the value as mentioned in TS. Disconnect Messages The table lists the attributes of disconnect messages, which are initiated by the controller. TABLE 37 Disconnected messages Attribute Attribute ID Message Code Presence Type/Description M 40 User-Name 1 M Identifies the user name of the UE/ subscriber to be disconnect. User name received from NAS during authentication or accounting session. NAS-IP-Address 4 C If present, it should match with the value in the controller session table. NAS-Port 5 O Indicates the physical NAS port number, which authenticates the user or the port on which a session is terminated. If present should match the session context table. Framed-IP-Address 8 O The IPv4 address associated with a session. This is the IP address, 70 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A AAA Server Dynamic Authorization and List of Vendor Specific Attributes Service Authorization TABLE 37 Disconnected messages (continued) Attribute Attribute ID Presence Type/Description which gets assigned to UE after successfull call establishment. If present should match the session context table. Calling Station ID 31 C This attribute will contain the Calling Station ID as received from NAS during authentication or the accounting procedure. NAS-Identifier 32 C It supports 3 types of values, namely BSSID (MAC address of the WLAN on AP), AP-MAC (MAC address of AP) and user defined address (maximum length of 62). Acct-Session-ID 44 C This attribute should have the same value as sent by NAS during accounting procedure. State 45 O This attribute is copied as is if it is received in a request from the AAA server. Acct-Multi-Session-Id 50 O Thus attribute uniquely identifyies related sessions. It should have the same value received in authentication or accouting request. If present should match the session context table. Message Authenticator 80 O This attribute is used to sign access requests to prevent spoofing access requests using CHAP, ARAP or EAP authentication methods. It authenticates this whole RADIUS packet - HMAC-MD5 (Type| Identifier | Length | Request Authenticator | Attributes). NAS-Port-Id 87 O String identifying the port based on the session and should match the session context if present in request. Chargeable User ID 89 C This attribute is MSISDN or any chargeable user identity returned by the AAA server. Framed-Interface-Id 96 O The IPv6 interface identifier associated with a session, which is always sent with framed-IPv6 prefix. If present should match the session context. Framed-IPv6-Prefix 97 O The IPv6 prefix associated with a session, which is always sent with framed interface identifier. If present should match the session context. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 71 AAA Server Dynamic Authorization and List of Vendor Specific Attributes Service Authorization Acknowledgment of Disconnect Messages (DM Ack) The table lists the attributes of disconnect messages, which are acknowledged. TABLE 38 Acknowledgment of disconnect messages Attribute Attribute ID Message Code Acct-Terminate-Cause 49 Presence Type/Description M 41 O This attribute indicates how the session was terminated. Value for Admin-Reset is set to 6. Negative Acknowledge of Disconnect Messages (DM NAK) The table lists the attributes of disconnect messages, which are not acknowledged. TABLE 39 Negative acknowledgment of disconnect messages Attribute Attribute ID Message Code Error-Cause 101 Presence Type/Description M 41 C Included only if the Service-Type attribute is present in CoA request is set to authorize only. It is included only if the Error-Cause attribute is set to request initiated. Disconnect Messages - Dynamic Authorization Client (AAA server) A disconnect request packet is sent by the Dynamic Authorization Client for terminating user session(s) on a NAS and to discard all associated session context. The disconnect request packet is sent to UDP port 3799 where it identifies the NAS as well as the user session(s) to be terminated by including the identification attributes. Disconnected messages can have any of the following attributes as a session identifier. • User name • CUI with MSISDN • Acct-Sess-Id The table lists the attribute details of the disconnect messages, which are initiated by the dynamic authorization client of the AAA server. TABLE 40 Disconnected messages initiated by dynamic authorization client (DAC) Attribute Attribute ID Message Code Presence Type/Description M 40 User-Name 1 C Identifies the username of the UE/ subscriber to be disconnect. User name received from NAS during authentication or accounting session. NAS-IP-Address 4 C This attribute is the IP address of the AP which is serving the station or controller's control IP address, controller's management IP address and user defined value. Calling Station ID 31 O String This attribute will contain the Calling Station ID as received from NAS 72 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A AAA Server Dynamic Authorization and List of Vendor Specific Attributes List of Vendor Specific Attributes TABLE 40 Disconnected messages initiated by dynamic authorization client (DAC) (continued) Attribute Attribute ID Presence Type/Description during authentication or the accounting procedure. NAS-Identifier 32 C If present, it should match with the value in the controller session table. Proxy-State 33 O This attribute is available to be sent by a proxy server to another server. Acct-Session-ID 44 C This attribute should have the same value as sent by NAS during accounting procedure. Chargeable User ID 89 C String This attribute is MSISDN or any chargeable user identity returned by the AAA server. List of Vendor Specific Attributes This section lists the vendor specific attributes. This section includes: • WISPr Vendor Specific Attributes on page 73 • Ruckus Wireless Vendor Specific Attributes on page 73 WISPr Vendor Specific Attributes The table lists the WISPr vendor specific attributes. The VSA ID for the following VSAs is 14122 and the type is 26. TABLE 41 WISPr vendor specific attributes - 14122 Attribute Name Vendor Type RADIUS Message Type Purpose WISPr-Location-ID 1 Access-Accept Accounting Start - Stop This attribute indicates the WISPr location id for the specified WISPr service. WISPr-Location-Name 2 Access-Accept Accounting Start - Stop and Interim This attribute indicates the WISPr location name for the specified WISPr service. WISPr-Bandwidth-Max-UP 7 Access-Accept This attribute specifies the maximum rate at which the corresponding user is allowed to transmit for upstream data. WISPr-Bandwidth-Max-DOWN 8 Access-Accept This attribute specifies the maximum rate at which the corresponding user is allowed to transmit for downstream data Ruckus Wireless Vendor Specific Attributes All Ruckus Wireless vendor specific attributes are encoded as sequence of: • Vendor type • Vendor length Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 73 AAA Server Dynamic Authorization and List of Vendor Specific Attributes List of Vendor Specific Attributes • Value fields The figure shows the VSA fields. FIGURE 8 VSA fields The table lists the Ruckus Wireless vendor specific attributes. The VSA ID for all the following VSAs is 25053 and type is 26. TABLE 42 Ruckus Wireless vendor specific attributes - 25053 Attribute Name Vendor Type RADIUS Message Type Purpose Ruckus-User-Groups 1 Access-Accept RADIUS server uses this attribute to indicate the access point group, specifying the UE group. Ruckus-STA-RSSI 2 Accounting - Interim - Stop This attribute reports the UEs current RSSI value in the accounting packet. Ruckus-SSID 3 Access- Request Accounting - Start -Interim- Stop This attribute reports the associated WLANs SSID in the access request and accounting packet. Ruckus-WLan-ID 4 Access- Request Accounting - Start -Interim- Stop This attribute reports the associated WLANs ID. Ruckus VSA is received only from Ruckus AP. Note: It is optional for 3rd party APs. Ruckus-Location 5 Access- Request Accounting - Start -Interim- Stop This attribute reports the device location for the current/ specified access point. This is a configurable value in the device location setting. Ruckus VSA is received only from Ruckus AP. It is optional for 3rd party APs. Ruckus-Grace-Period 6 Access- Request Accounting - Start -Interim- Stop This attribute is the grace period in Hotspot WLANs. Ruckus-SCG-CBLADE-IP 7 Access- Request Accounting - Start -Interim- Stop This attribute reports the control plane IP address. Ruckus-SCG-DBLADE-IP 8 Access- Request Accounting - Start -Interim- Stop This attribute reports the data plane IP address. Ruckus-VLAN-ID 9 Access-Accept This attribute value is as per the configuration specified on the WLAN configuration page of the controller web interface 74 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A AAA Server Dynamic Authorization and List of Vendor Specific Attributes List of Vendor Specific Attributes TABLE 42 Ruckus Wireless vendor specific attributes - 25053 (continued) Attribute Name Vendor Type RADIUS Message Type Purpose and indicates the VLAN ID when it is not zero. Refer to the figure showing the VSA fields. Ruckus-Sta-Expiration 10 This attribute indicates the expiration value from the RADIUS server. Ruckus-Sta-UUID 11 This attribute indicates the UUID value from the RADIUS server, when the UUID exists. Ruckus-Accept-Enhancement-Reason 12 This attribute indicates the reason from the RADIUS server, when the reason exists. Ruckus-VLAN-ID 13 This attribute indicates the user name from the RADIUS server, when the user exists. Ruckus-IMSI 102 Accounting - Start-Stop This is sent by AAA to the controller as an authorization accept RADIUS message. Mcontroller utilizes this information to create the PDP context toward GGSN. Refer to the figure showing the VSA fields. Ruckus-MSISDN 103 Ruckus-APN 104 The CUI is generally used, but MSISDN can also be used. Access- Request Accounting - Start - Stop This attribute carries the APN subscribed by the user. It contains only the network identifier (NI), which is part of the APN. The operator identifier part is stored separately in Ruckus-APN-OI. Note: This attribute is always sent and received as a string format, as explained in the figure showing the VSA fields. Ruckus-QoS 105 Ruckus-NAS-Type 109 Ruckus-Status 110 Ruckus-APN-OI 111 3GPP-QoS is now used instead of this VSA. However, this VSA is supported in 2.1.x releases. Accounting - Start The Accounting Response does not have a status type. This attribute was added to inform AUT that the Accounting has failed due to the setting of this VSA. Access-Accept Accounting - Start Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A The value for this parameter is always 1. It contains the Operator ID, which is part of the APN name. APN NI part is sent in the Ruckus-APN attribute. 75 AAA Server Dynamic Authorization and List of Vendor Specific Attributes List of Vendor Specific Attributes TABLE 42 Ruckus Wireless vendor specific attributes - 25053 (continued) Attribute Name Vendor Type RADIUS Message Type Purpose Refer to the encoding as explained in Figure 8 . Ruckus-Session-Type 125 Access- Accept The controller server uses this attribute on the access-accept to indicate forward policy of the specific UE. Ruckus-Acct-Status 126 Access- Accept The controller server uses this attribute on the access accept to indicate if the authenticator needs to send the accounting start for the current/specified client. Ruckus-Zone-ID 127 Access- Request The controller server uses this attribute to report the zone ID to which the 3rd party AP is associated. This VSA is received only for 3rd party APs. Ruckus-Auth-Server-Id 128 RAS(IDM) and SCG-RACC use this attribute to obtain the AAA UUID from RAS(IDM) and SCG-RAC. Ruckus-Utp-Id 129 SCG-RAC and Ruckus-AP use this attribute to provide the UTP ID value to the AP. Ruckus-Area-Code 130 This attribute carries the area code of the NAS location. Ruckus-Cell-Identifier 131 This attribute carries the cell ID of the NAS location. Ruckus-Wispr-Redirect-Policy 132 External AAA and SCG-RAC use this attribute to get the vanilla values for the WISPrTTG feature. Ruckus-Eth-Profile-Id 133 Ruckus-AP and SCG-RAC use this attribute to find the Ethernet-Profile-Id for a particular session. Ruckus-Zone-Name 134 SCG-RAC and the external AAA use this attribute to notify the Zone that the AP belongs to. Ruckus-Wlan-Name 135 SCG-RAC and the external AAA use this attribute to notify the name of the WLAN that the AP belongs to. Ruckus-Read-Preference 137 The NBI/RAC and external AAA use this attribute to notify the primary/secondary database from where the data is to be read. Ruckus-Client-Host-Name 138 76 String Host name of the client device accessing the network Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A AAA Server Dynamic Authorization and List of Vendor Specific Attributes List of Vendor Specific Attributes TABLE 42 Ruckus Wireless vendor specific attributes - 25053 (continued) Attribute Name Vendor Type RADIUS Message Type Purpose Ruckus-Client-Os-Type 139 String Operating System on the client device. Ruckus-Client-Os-Class 140 String Operating System groups classes category that represent the OS related objects on the client device. Ruckus-Vlan-Pool 141 String List of VLAN identifiers supported for the WLAN. This attribute can be found only in RADIUS Access-Accept. APs use the MAC hashing to find the proper VLAN ID from the VLAN pool dynamically and tag all the user equipment data traffic. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 77 78 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A AP Roaming Scenarios • • • • AP Roaming Scenarios............................................................................................................................................79 Roaming from AP1 to AP2 - PMK / OKC Disabled.................................................................................................. 80 Roaming from AP1 to AP2 - PMK / OKC Enabled................................................................................................... 80 AP1 to AP2 Connected to Different Controller Node - PMK / OKC Disabled............................................................ 81 AP Roaming Scenarios The AP roaming scenarios are as follows. NOTE The session timeout values received from the AAA server are used for maintaining the PMK/OKC cache timer values at the controller and AP. If the timer value received is less than the default value of 12 hours, it will be used. Otherwise the default value will be used as the maximum value. • Roaming from AP1 to AP2 - PMK / OKC Disabled on page 80 • Roaming from AP1 to AP2 - PMK / OKC Enabled on page 80 • AP1 to AP2 Connected to Different Controller Node - PMK / OKC Disabled on page 81 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 79 AP Roaming Scenarios Roaming from AP1 to AP2 - PMK / OKC Disabled Roaming from AP1 to AP2 - PMK / OKC Disabled In this scenario as seen in the figure, the UE (subscriber) roams from AP1 to AP2. Authentication and accounting messages are initiated from the AP and the PMK (Pairwise Master Key) / OKC (Opportunistic Key Caching) cache is disabled. FIGURE 9 UE roaming from AP1 to AP2 - PMK / OKC disabled Roaming from AP1 to AP2 - PMK / OKC Enabled In this scenario as seen in the figure, the UE (subscriber) roams from AP1 to AP2. Authentication and accounting messages are initiated from the AP and the PMK/OKC cache is enabled. 80 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A AP Roaming Scenarios AP1 to AP2 Connected to Different Controller Node - PMK / OKC Disabled FIGURE 10 UE roaming from AP1 to AP2 - PMK/OKC enabled AP1 to AP2 Connected to Different Controller Node PMK / OKC Disabled In this scenario as seen in the figure, the UE (subscriber) roams from AP1 to AP2 with both the APs connected to the different controller nodes in a cluster environment. This scenario is specific to TTG sessions, where the controller has a GTP tunnel from the controller to the GGSN/PGW. The AP initiates authentication of messages whereas accounting messages are initiated by the controller. PMK / OKC cache is disabled. Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 81 AP Roaming Scenarios AP1 to AP2 Connected to Different Controller Node - PMK / OKC Disabled FIGURE 11 UE roams from AP1 to AP2 connected to different controller node 82 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Use Cases • Use Case Scenarios................................................................................................................................................ 83 Use Case Scenarios The following are the use cases pertaining to NAS IP, Accounting session identifier, and filter identifier. Authentication and Accounting of NAS IP AVP CoA / DM Handling with NAS IP AVP Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 83 Use Cases Use Case Scenarios CoA Handling with Accounting Session Identifier DM Handling with Accounting Session Identifier User Role change using Radius CoA - Filter Identifier 84 Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A Use Cases Use Case Scenarios Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide Part Number: 800-71561-001 Rev A 85 Copyright © 2006-2017. Ruckus Wireless, Inc. 350 West Java Dr. Sunnyvale, CA 94089. USA www.ruckuswireless.com
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : Yes Author : Brocade Create Date : 2017:11:10 09:05:17Z Modify Date : 2017:11:10 14:53:22+05:30 Subject : Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide for SmartZone 3.6 Has XFA : No Language : EN-US XMP Toolkit : Adobe XMP Core 5.4-c006 80.159825, 2016/09/16-03:31:08 Format : application/pdf Creator : Brocade Title : Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide for SmartZone 3.6 Description : Ruckus SmartZone 100 and Virtual SmartZone Essentials AAA (RADIUS) Interface Reference Guide for SmartZone 3.6 Creator Tool : AH XSL Formatter V6.4 R1 for Windows (x64) : 6.4.2.26942 (2016/12/07 15:30JST) Metadata Date : 2017:11:10 14:53:22+05:30 Producer : Antenna House PDF Output Library 6.4.928 (Windows (x64)) Trapped : False Document ID : uuid:f502c96c-d9a1-42c1-85d3-2b64aa773ac0 Instance ID : uuid:4ffb0c1b-51c0-4143-892a-e9a17fc36fa5 Page Mode : UseOutlines Page Count : 86EXIF Metadata provided by EXIF.tools