radius attributes configuration guide cisco ios release 12...configure nas for aaa and incoming...

176
RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

Upload: others

Post on 04-Feb-2021

13 views

Category:

Documents


0 download

TRANSCRIPT

  • RADIUS Attributes Configuration GuideCisco IOS Release 12.4

    Americas HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706USAhttp://www.cisco.comTel: 408 526-4000 800 553-NETS (6387)Fax: 408 527-0883

  • THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

    THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPEDWITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITEDWARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

    The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain versionof the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

    NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALLFAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OFMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADEPRACTICE.

    IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO ORITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

    Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationshipbetween Cisco and any other company. (1110R)

    Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output,network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative contentis unintentional and coincidental.

    © 2012 Cisco Systems, Inc. All rights reserved.

    http://www.cisco.com/go/trademarks

  • C O N T E N T S

    RADIUS Attributes Overview and RADIUS IETF Attributes 1

    Finding Feature Information 1

    Information About RADIUS Attributes 1

    IETF Attributes Versus VSAs 1

    RADIUS Packet Format 2

    RADIUS Packet Types 2

    RADIUS Files 3

    Dictionary File 3

    Clients File 4

    Users File 4

    RADIUS IETF Attributes 5

    Supported RADIUS IETF Attributes 5

    Comprehensive List of RADIUS Attribute Descriptions 11

    Additional References 27

    Feature Information for RADIUS Attributes Overview and RADIUS IETF Attributes 29

    RADIUS Vendor-Proprietary Attributes 31

    Finding Feature Information 31

    Supported Vendor-Proprietary RADIUS Attributes 31

    Comprehensive List of Vendor-Proprietary RADIUS Attribute Descriptions 45

    Feature Information for RADIUS Vendor-Proprietary Attributes 56

    RADIUS Vendor-Specific Attributes and RADIUS Disconnect-Cause Attribute Values 57

    Finding Feature Information 57

    Information About RADIUS Vendor-Specific Attributes and RADIUS Disconnect-Cause

    Attribute Values 57

    RADIUS Disconnect-Cause Attribute Values 70

    Additional References 75

    Feature Information for RADIUS Vendor-Specific Attributes and RADIUS Disconnect-Cause

    Attribute Values 76

    Connect-Info RADIUS Attribute 77 79

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 iii

  • Finding Feature Information 79

    Prerequisites for Connect-Info RADIUS Attribute 77 80

    How to Verify the Connect-Info RADIUS Attribute 77 80

    Configuration Example for Connect-Info RADIUS Attribute 77 80

    Configure NAS for AAA and Incoming Modem Calls Example 80

    Additional References 81

    Feature Information for Connect-Info RADIUS Attribute 77 82

    Encrypted Vendor-Specific Attributes 85

    Finding Feature Information 85

    Prerequisites for Encrypted Vendor-Specific Attributes 85

    Information About Encrypted Vendor-Specific Attributes 86

    Tagged String VSA 86

    Encrypted String VSA 86

    Tagged and Encrypted String VSA 87

    How to Verify Encrypted Vendor-Specific Attributes 87

    Configuration Examples for Encrypted Vendor-Specific Attributes 87

    NAS Configuration Example 87

    RADIUS User Profile with a Tagged and Encrypted VSA Example 88

    Additional References 88

    Feature Information for Encrypted Vendor-Specific Attributes 89

    RADIUS Attribute 5 NAS-Port Format Specified on a Per-Server Group Level 91

    Finding Feature Information 91

    Prerequisites for RADIUS Attribute 5 NAS-Port Format Specified on a Per-Server Group Level 91

    Information About RADIUS Attribute 5 NAS-Port Format Specified on a Per-Server Group

    Level 92

    RADIUS Attribute 5 Format Customization 92

    How to Configure RADIUS Attribute 5 NAS-Port Format Specified on a Per-Server Group

    Level 92

    Configuring the RADIUS Attribute 5 Format on a Per-Server Group Level 92

    Monitoring and Maintaining RADIUS Attribute 5 Format on a Per-Server Group Level 94

    Configuration Examples for RADIUS Attribute 5 NAS-Port Format Specified on a Per-Server

    Group Level 94

    RADIUS Attribute 5 Format Specified on a Per-Server Level Example 94

    Additional References 95

    Feature Information for RADIUS Attribute 5 NAS-Port Format Specified on a Per-Server

    Group Level 96

    Contents

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4iv

  • RADIUS Attribute 8 Framed-IP-Address in Access Requests 99

    Finding Feature Information 99

    Prerequisites for RADIUS Attribute 8 Framed-IP-Address in Access Requests 99

    Information About RADIUS Attribute 8 Framed-IP-Address in Access Requests 100

    How to Configure RADIUS Attribute 8 Framed-IP-Address in Access Requests 100

    Configuring RADIUS Attribute 8 in Access Requests 100

    Verifying RADIUS Attribute 8 in Access Requests 101

    Configuration Examples for RADIUS Attribute 8 Framed-IP-Address in Access Requests 102

    NAS Configuration That Sends the IP Address of the Dial-in Host to the RADIUS Server in

    the RADIUS Access Request 102

    Additional References 102

    Feature Information for RADIUS Attribute 8 Framed-IP-Address in Access Requests 104

    RADIUS Attribute 82 Tunnel Assignment ID 107

    Finding Feature Information 107

    Prerequisites for RADIUS Attribute 82 Tunnel Assignment ID 107

    Restrictions for RADIUS Attribute 82 Tunnel Assignment ID 107

    Information About RADIUS Attribute 82 Tunnel Assignment ID 108

    How to Verify if RADIUS Attribute 82 is Being Used by the LAC 108

    Configuration Examples for RADIUS Attribute 82 Tunnel Assignment ID 108

    LAC Configuration Example 109

    LNS Configuration Example 109

    RADIUS Configuration Example 109

    Additional References 110

    Feature Information for RADIUS Attribute 82 Tunnel Assignment ID 111

    RADIUS Attribute 104 113

    Finding Feature Information 113

    Prerequisites for RADIUS Attribute 104 113

    Restrictions for RADIUS Attribute 104 114

    Information About RADIUS Attribute 104 114

    Policy-Based Routing Background 114

    Attribute 104 and the Policy-Based Route Map 114

    RADIUS Attribute 104 Overview 114

    Permit Route Map 115

    Default Private Route 115

    Route Map Order 115

    How to Apply RADIUS Attribute 104 115

    Contents

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 v

  • Applying RADIUS Attribute 104 to Your User Profile 115

    Verifying Route Maps 116

    Troubleshooting the RADIUS Profile 116

    Configuration Examples for RADIUS Attribute 104 117

    Route-Map Configuration in Which Attribute 104 Has Been Applied Example 117

    Additional References 118

    Related Documents 118

    Standards 118

    MIBs 119

    RFCs 119

    Technical Assistance 119

    Feature Information for RADIUS Attribute 104 119

    RADIUS Tunnel Attribute Extensions 121

    Finding Feature Information 121

    Prerequisites for RADIUS Tunnel Attribute Extensions 121

    Restrictions for RADIUS Tunnel Attribute Extensions 121

    Information About RADIUS Tunnel Attribute Extensions 122

    How RADIUS Tunnel Attribute Extensions Work 122

    How to Verify RADIUS Attribute 90 and RADIUS Attribute 91 123

    Configuration Examples for RADIUS Tunnel Attribute Extensions 123

    L2TP Network Server Configuration Example 123

    RADIUS User Profile with RADIUS Tunneling Attributes 90 and 91 Example 124

    Additional References 124

    Feature Information for RADIUS Tunnel Attribute Extensions 125

    Glossary 126

    V.92 Reporting Using RADIUS Attribute v.92-info 129

    Finding Feature Information 129

    Prerequisites for V.92 Reporting Using RADIUS Attribute v.92-info 129

    Restrictions for V.92 Reporting Using RADIUS Attribute v.92-info 130

    Information About V.92 Reporting Using RADIUS Attribute v.92-info 130

    V.92 Standard Overview 130

    VSA v.92-info 130

    How to Monitor and Verify V.92 Call Information 131

    Monitoring V.92 Call Information 131

    Verifying V.92 Call Information 138

    Contents

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4vi

  • Troubleshooting Tips 141

    Additional References 141

    Related Documents 142

    Standards 142

    MIBs 142

    RFCs 142

    Technical Assistance 143

    Feature Information for V.92 Reporting Using RADIUS Attribute v.92-info 143

    RADIUS Attribute Screening 145

    Finding Feature Information 145

    Prerequisites for RADIUS Attribute Screening 146

    Restrictions for RADIUS Attribute Screening 146

    Information About RADIUS Attribute Screening 146

    How to Screen RADIUS Attributes 147

    Configuring RADIUS Attribute Screening 147

    Verifying RADIUS Attribute Screening 150

    Configuration Examples for RADIUS Attribute Screening 150

    Authorization Accept Example 150

    Accounting Reject Example 150

    Authorization Reject and Accounting Accept Example 151

    Rejecting Required Attributes Example 151

    Additional References 151

    Feature Information for RADIUS Attribute Screening 152

    Glossary 153

    RADIUS NAS-IP-Address Attribute Configurability 155

    Finding Feature Information 155

    Prerequisites for RADIUS NAS-IP-Address Attribute Configurability 155

    Restrictions for RADIUS NAS-IP-Address Attribute Configurability 156

    Information About RADIUS NAS-IP-Address Attribute Configurability 156

    Using the RADIUS NAS-IP-Address Attribute Configurability Feature 157

    How to Configure RADIUS NAS-IP-Address Attribute Configurability 157

    Configuring RADIUS NAS-IP-Address Attribute Configurability 157

    Monitoring and Maintaining RADIUS NAS-IP-Address Attribute Configurability 158

    Configuration Examples for RADIUS NAS-IP-Address Attribute Configurability 159

    Configuring a RADIUS NAS-IP-Address Attribute Configurability Example 159

    Contents

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 vii

  • Additional References 159

    Related Documents 160

    Standards 160

    MIBs 160

    RFCs 160

    Technical Assistance 161

    Feature Information for RADIUS NAS-IP-Address Attribute Configurability 161

    AAA Per VC QoS Policy Support 163

    Finding Feature Information 163

    Prerequisites for AAA Per VC QoS Policy Support 163

    Restrictions for AAA Per VC QoS Policy Support 163

    Information About AAA Per VC QoS Policy Support 164

    RADIUS Push and Pull 164

    Interface Policy Map AAA Attributes 165

    Configuration Examples for AAA Per VC QoS Policy Support 165

    RADIUS Interface Policy Map Profile Example 166

    Define the Policy Map on the Router Example 166

    Display the Service Policy Example 166

    Additional References 166

    Feature Information for AAA Per VC QoS Policy Support 168

    Contents

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4viii

  • RADIUS Attributes Overview and RADIUS IETFAttributes

    Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specificauthentication, authorization, and accounting (AAA) elements in a user profile, which is stored on theRADIUS daemon. This module lists the RADIUS attributes currently supported.

    • Finding Feature Information, page 1• Information About RADIUS Attributes, page 1• Additional References, page 27• Feature Information for RADIUS Attributes Overview and RADIUS IETF Attributes, page 29

    Finding Feature InformationYour software release may not support all the features documented in this module. For the latest featureinformation and caveats, see the release notes for your platform and software release. To find informationabout the features documented in this module, and to see a list of the releases in which each feature issupported, see the Feature Information Table at the end of this document.

    Use Cisco Feature Navigator to find information about platform support and Cisco software image support.To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.

    Information About RADIUS Attributes• IETF Attributes Versus VSAs, page 1• RADIUS Packet Format, page 2• RADIUS Files, page 3• RADIUS IETF Attributes, page 5

    IETF Attributes Versus VSAsRADIUS Internet Engineering Task Force (IETF) attributes are the original set of 255 standard attributesthat are used to communicate AAA information between a client and a server. Because IETF attributes arestandard, the attribute data is predefined and well known; thus all clients and servers who exchange AAAinformation via IETF attributes must agree on attribute data such as the exact meaning of the attributes andthe general bounds of the values for each attribute.

    RADIUS vendor-specific attributes (VSAs) derived from one IETF attribute--vendor-specific (attribute 26).Attribute 26 allows a vendor to create an additional 255 attributes however they wish. That is, a vendor can

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 1

    http://www.cisco.com/go/cfn

  • create an attribute that does not match the data of any IETF attribute and encapsulate it behind attribute 26;thus, the newly created attribute is accepted if the user accepts attribute 26.

    See "Chapter 1, "RADIUS Vendor-Specific Attributes and RADIUS Disconnect-Cause Attribute Values."for more information on VSAs.

    RADIUS Packet FormatThe data between a RADIUS server and a RADIUS client is exchanged in RADIUS packets. The datafields are transmitted from left to right.

    Figure 1 shows the fields within a RADIUS packet.

    Figure 1 RADIUS Packet Diagram

    Each RADIUS packet contains the following information:

    • Code--The code field is one octet; it identifies one of the following types of RADIUS packets:

    ◦ Access-Request (1)◦ Access-Accept (2)◦ Access-Reject (3)◦ Accounting-Request (4)◦ Accounting-Response (5)

    • Identifier--The identifier field is one octet; it helps the RADIUS server match requests and responsesand detect duplicate requests.

    • Length--The length field is two octets; it specifies the length of the entire packet.• Authenticator--The authenticator field is 16 octets. The most significant octet is transmitted first; it is

    used to authenticate the reply from the RADIUS server. Two types of authenticators are as follows:

    ◦ Request-Authentication: Available in Access-Request and Accounting-Request packets◦ Response-Authenticator: Available in Access-Accept, Access-Reject, Access-Challenge, and

    Accounting-Response packets

    • RADIUS Packet Types, page 2

    RADIUS Packet TypesThe following list defines the various types of RADIUS packet types that can contain attribute information:

    Access-Request--Sent from a client to a RADIUS server. The packet contains information that allows theRADIUS server to determine whether to allow access to a specific network access server (NAS), whichallows access to the user. Any user performing authentication must submit an Access-Request packet. Oncean Access-Request packet is received, the RADIUS server must forward a reply.

    RADIUS Packet Format RADIUS Packet Types

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.42

  • Access-Accept--Once a RADIUS server receives an Access-Request packet, it must send an Access-Acceptpacket if all attribute values in the Access-Request packet are acceptable. Access-Accept packets providethe configuration information necessary for the client to provide service to the user.

    Access-Reject--Once a RADIUS server receives an Access-Request packet, it must send an Access-Rejectpacket if any of the attribute values are not acceptable.

    Access-Challenge--Once the RADIUS server receives an Access-Accept packet, it can send the client anAccess-Challenge packet, which requires a response. If the client does not know how to respond or if thepackets are invalid, the RADIUS server discards the packets. If the client responds to the packet, a newAccess-Request packet should be sent with the original Access-Request packet.

    Accounting-Request--Sent from a client to a RADIUS accounting server, which provides accountinginformation. If the RADIUS server successfully records the Accounting-Request packet, it must submit anAccounting Response packet.

    Accounting-Response--Sent by the RADIUS accounting server to the client to acknowledge that theAccounting-Request has been received and recorded successfully.

    RADIUS FilesUnderstanding the types of files used by RADIUS is important for communicating AAA information froma client to a server. Each file defines a level of authentication or authorization for the user: The dictionaryfile defines which attributes the user’s NAS can implement; the clients file defines which users are allowedto make requests to the RADIUS server; the users files defines which user requests the RADIUS serverauthenticates based on security and configuration data.

    • Dictionary File, page 3• Clients File, page 4• Users File, page 4

    Dictionary FileA dictionary file provides a list of attributes that are dependent upon which attributes your NAS supports.However, you can add your own set of attributes to your dictionary for custom solutions. It defines attributevalues, thereby allowing you to interpret attribute output such as parsing requests. A dictionary file containsthe following information:

    • Name--The ASCII string “name” of the attribute, such as User-Name.• ID--The numerical “name” of the attribute; for example, User-Name attribute is attribute 1.• Value type--Each attribute can be specified as one of the following five value types:

    ◦ abinary--0 to 254 octets.◦ date--32-bit value in big endian order. For example, seconds since 00:00:00 GMT, JAN. 1, 1970.◦ ipaddr--4 octets in network byte order.◦ integer--32-bit value in big endian order (high byte first).◦ string--0 to 253 octets.

    When the data type for a particular attribute is an integer, you can optionally expand the integer to equate tosome string. The follow sample dictionary includes an integer-based attribute and its corresponding values:

    # dictionary sample of integer entry#ATTRIBUTE Service-Type 6 integer VALUE Service-Type Login 1VALUE Service-Type Framed 2

    RADIUS FilesDictionary File

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 3

  • VALUE Service-Type Callback-Login 3VALUE Service-Type Callback-Framed 4VALUE Service-Type Outbound 5VALUE Service-Type Administrative 6VALUE Service-Type NAS-Prompt 7VALUE Service-Type Authenticate-Only 8VALUE Service-Type Callback-NAS-Prompt 9VALUE Service-Type Call-Check 10VALUE Service-Type Callback-Administrative 11

    Clients FileA clients file is important because it contains a list of RADIUS clients that are allowed to sendauthentication and accounting requests to the RADIUS server. To receive authentication, the name andauthentication key the client sends the server must be an exact match with the data contained in clients file.

    The following is an example of a clients file. The key, as shown in this example, must be the same as theradius-server key SomeSecret command.

    #Client Name Key #---------------- ---------------10.1.2.3:256 testnas01 bananasnas02 MoNkEysnas07.foo.com SomeSecret

    Users FileA RADIUS users file contains an entry for each user that the RADIUS server authenticates; each entry,which is also referred to as a user profile, establishes an attribute the user can access.

    The first line in any user profile is always a “user access” line; that is, the server must check the attributeson the first line before it can grant access to the user. The first line contains the name of the user, which canbe up to 252 characters, followed by authentication information such as the password of the user.

    Additional lines, which are associated with the user access line, indicate the attribute reply that is sent tothe requesting client or server. The attributes sent in the reply must be defined in the dictionary file.

    When looking at a user file, please note the the data to the left of the equal (=) character is an attributedefined in the dictionary file, and the data to the right of the equal character is the configuration data.

    Note A blank line cannot appear anywhere within a user profile.

    The following is an example of a RADIUS user profile (Merit Daemon format). In this example, the username is cisco.com, the password is cisco, and the user can access five tunnel attributes.

    # This user profile includes RADIUS tunneling attributescisco.com Password="cisco" Service-Type=Outbound Tunnel-Type = :1:L2TP Tunnel-Medium-Type = :1:IP Tunnel-Server-Endpoint = :1:10.0.0.1 Tunnel-Password = :1:"welcome" Tunnel-Assignment-ID = :1:"nas"

    RADIUS Attributes Overview and RADIUS IETF Attributes Clients File

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.44

  • RADIUS IETF Attributes

    Note In the Cisco IOS Release 12.2 for RADIUS tunnel attributes, 32 tagged tunnel sets are supported for L2TP.

    • Supported RADIUS IETF Attributes, page 5

    • Comprehensive List of RADIUS Attribute Descriptions, page 11

    Supported RADIUS IETF AttributesTable 1 lists Cisco-supported IETF RADIUS attributes and the Cisco IOS release in which they areimplemented. In cases where the attribute has a security server-specific format, the format is specified.

    Refer to Table 2 for a description of each listed attribute.

    Note Attributes implemented in special (AA) or early development (T) releases are added to the next mainlineimage.

    Table 1 Supported RADIUS IETF Attributes

    Number IETFAttribute

    11.1 11.2 11.3 11.3 AA 11.3T 12.0 12.1 12.2

    1 User-Name

    yes yes yes yes yes yes yes yes

    2 User-Password

    yes yes yes yes yes yes yes yes

    3 CHAP-Password

    yes yes yes yes yes yes yes yes

    4 NAS-IPAddress

    yes yes yes yes yes yes yes yes

    5 NAS-Port

    yes yes yes yes yes yes yes yes

    6 Service-Type

    yes yes yes yes yes yes yes yes

    7 Framed-Protocol

    yes yes yes yes yes yes yes yes

    RADIUS IETF AttributesSupported RADIUS IETF Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 5

  • Number IETFAttribute

    11.1 11.2 11.3 11.3 AA 11.3T 12.0 12.1 12.2

    8 Framed-IP-Address

    yes yes yes yes yes yes yes yes

    9 Framed-IP-Netmask

    yes yes yes yes yes yes yes yes

    10 Framed-Routing

    yes yes yes yes yes yes yes yes

    11 Filter-Id yes yes yes yes yes yes yes yes

    12 Framed-MTU

    yes yes yes yes yes yes yes yes

    13 Framed-Compression

    yes yes yes yes yes yes yes yes

    14 Login-IP-Host

    yes yes yes yes yes yes yes yes

    15 Login-Service

    yes yes yes yes yes yes yes yes

    16 Login-TCP-Port

    yes yes yes yes yes yes yes yes

    18 Reply-Message

    yes yes yes yes yes yes yes yes

    19 Callback-Number

    no no no no no no yes yes

    20 Callback-ID

    no no no no no no no no

    22 Framed-Route

    yes yes yes yes yes yes yes yes

    23 Framed-IPX-Network

    no no no no no no no no

    24 State yes yes yes yes yes yes yes yes

    25 Class yes yes yes yes yes yes yes yes

    26 Vendor-Specific

    yes yes yes yes yes yes yes yes

    RADIUS Attributes Overview and RADIUS IETF Attributes Supported RADIUS IETF Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.46

  • Number IETFAttribute

    11.1 11.2 11.3 11.3 AA 11.3T 12.0 12.1 12.2

    27 Session-Timeout

    yes yes yes yes yes yes yes yes

    28 Idle-Timeout

    yes yes yes yes yes yes yes yes

    29 Termination-Action

    no no no no no no no no

    30 Called-Station-Id

    yes yes yes yes yes yes yes yes

    31 Calling-Station-Id

    yes yes yes yes yes yes yes yes

    32 NAS-Identifier

    no no no no no no no yes

    33 Proxy-State

    no no no no no no no no

    34 Login-LAT-Service

    yes yes yes yes yes yes yes yes

    35 Login-LAT-Node

    no no no no no no no yes

    36 Login-LAT-Group

    no no no no no no no no

    37 Framed-AppleTalk-Link

    no no no no no no no no

    38 Framed-AppleTalk-Network

    no no no no no no no no

    39 Framed-AppleTalk-Zone

    no no no no no no no no

    RADIUS Attributes Overview and RADIUS IETF AttributesSupported RADIUS IETF Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 7

  • Number IETFAttribute

    11.1 11.2 11.3 11.3 AA 11.3T 12.0 12.1 12.2

    40 Acct-Status-Type

    yes yes yes yes yes yes yes yes

    41 Acct-Delay-Time

    yes yes yes yes yes yes yes yes

    42 Acct-Input-Octets

    yes yes yes yes yes yes yes yes

    43 Acct-Output-Octets

    yes yes yes yes yes yes yes yes

    44 Acct-Session-Id

    yes yes yes yes yes yes yes yes

    45 Acct-Authentic

    yes yes yes yes yes yes yes yes

    46 Acct-Session-Time

    yes yes yes yes yes yes yes yes

    47 Acct-Input-Packets

    yes yes yes yes yes yes yes yes

    48 Acct-Output-Packets

    yes yes yes yes yes yes yes yes

    49 Acct-Terminate-Cause

    no no no yes yes yes yes yes

    50 Acct-Multi-Session-Id

    no yes yes yes yes yes yes yes

    51 Acct-Link-Count

    no yes yes yes yes yes yes yes

    RADIUS Attributes Overview and RADIUS IETF Attributes Supported RADIUS IETF Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.48

  • Number IETFAttribute

    11.1 11.2 11.3 11.3 AA 11.3T 12.0 12.1 12.2

    52 Acct-Input-Gigawords

    no no no no no no no no

    53 Acct-Output-Gigawords

    no no no no no no no no

    55 Event-Timestamp

    no no no no no no no yes

    60 CHAP-Challenge

    yes yes yes yes yes yes yes yes

    61 NAS-Port-Type

    yes yes yes yes yes yes yes yes

    62 Port-Limit

    yes yes yes yes yes yes yes yes

    63 Login-LAT-Port

    no no no no no no no no

    64 Tunnel-Type1

    no no no no no no yes yes

    65 Tunnel-Medium-Type 1

    no no no no no no yes yes

    66 Tunnel-Client-Endpoint

    no no no no no no yes yes

    67 Tunnel-Server-Endpoint 1

    no no no no no no yes yes

    1 This RADIUS attribute complies with the following two draft IETF documents: RFC 2868 RADIUS Attributes for Tunnel Protocol Support and RFC 2867RADIUS Accounting Modifications for Tunnel Protocol Support.

    RADIUS Attributes Overview and RADIUS IETF AttributesSupported RADIUS IETF Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 9

  • Number IETFAttribute

    11.1 11.2 11.3 11.3 AA 11.3T 12.0 12.1 12.2

    68 Acct-Tunnel-Connection-ID

    no no no no no no yes yes

    69 Tunnel-Password 1

    no no no no no no yes yes

    70 ARAP-Password

    no no no no no no no no

    71 ARAP-Features

    no no no no no no no no

    72 ARAP-Zone-Access

    no no no no no no no no

    73 ARAP-Security

    no no no no no no no no

    74 ARAP-Security-Data

    no no no no no no no no

    75 Password-Retry

    no no no no no no no no

    76 Prompt no no no no no no yes yes

    77 Connect-Info

    no no no no no no no yes

    78 Configuration-Token

    no no no no no no no no

    79 EAP-Message

    no no no no no no no no

    80 Message-Authenticator

    no no no no no no no no

    81 Tunnel-Private-Group-ID

    no no no no no no no no

    RADIUS Attributes Overview and RADIUS IETF Attributes Supported RADIUS IETF Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.410

  • Number IETFAttribute

    11.1 11.2 11.3 11.3 AA 11.3T 12.0 12.1 12.2

    82 Tunnel-Assignment-ID 1

    no no no no no no yes yes

    83 Tunnel-Preference

    no no no no no no no yes

    84 ARAP-Challenge-Response

    no no no no no no no no

    85 Acct-Interim-Interval

    no no no no no no yes yes

    86 Acct-Tunnel-Packets-Lost

    no no no no no no no no

    87 NAS-Port-ID

    no no no no no no no no

    88 Framed-Pool

    no no no no no no no no

    90 Tunnel-Client-Auth-ID2

    no no no no no no no yes

    91 Tunnel-Server-Auth-ID

    no no no no no no no yes

    200 IETF-Token-Immediate

    no no no no no no no no

    Comprehensive List of RADIUS Attribute DescriptionsThe table below lists and describes IETF RADIUS attributes. In cases where the attribute has a securityserver-specific format, the format is specified.

    2 This RADIUS attribute complies withRFC 2865 and RFC 2868.

    RADIUS Attributes Overview and RADIUS IETF AttributesComprehensive List of RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 11

  • Table 2 RADIUS IETF Attributes

    Number IETF Attribute Description

    1 User-Name Indicates the name of the user beingauthenticated by the RADIUS server.

    2 User-Password Indicates the user’s password or theuser’s input following an Access-Challenge. Passwords longer than 16characters are encrypted using RFC 2865specifications.

    3 CHAP-Password Indicates the response value provided bya PPP Challenge-HandshakeAuthentication Protocol (CHAP) user inresponse to an Access-Challenge.

    4 NAS-IP Address Specifies the IP address of the networkaccess server that is requestingauthentication. The default value is0.0.0.0/0.

    5 NAS-Port Indicates the physical port number of thenetwork access server that isauthenticating the user. The NAS-Portvalue (32 bits) consists of one or two 16-bit values (depending on the setting of theradius-server extended-portnamescommand). Each 16-bit number shouldbe viewed as a 5-digit decimal integer forinterpretation as follows:

    For asynchronous terminal lines, asyncnetwork interfaces, and virtual asyncinterfaces, the value is 00ttt, where ttt isthe line number or async interface unitnumber.

    For ordinary synchronous networkinterface, the value is 10xxx.

    For channels on a primary rate ISDNinterface, the value is 2ppcc.

    For channels on a basic rate ISDNinterface, the value is 3bb0c.

    For other types of interfaces, the value is6nnss.

    RADIUS Attributes Overview and RADIUS IETF Attributes Comprehensive List of RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.412

    http://www.ietf.org/rfc/rfc2865.txt

  • Number IETF Attribute Description

    6 Service-Type Indicates the type of service requested orthe type of service to be provided.

    • In a request:

    Framed for known PPP or SLIPconnection. Administrative-user forenable command.

    • In response:

    Login--Make a connection. Framed--StartSLIP or PPP. Administrative User--Startan EXEC or enable ok.

    Exec User--Start an EXEC session.

    Service type is indicated by a particularnumeric value as follows:

    • 1: Login• 2: Framed• 3: Callback-Login• 4: Callback-Framed• 5: Outbound• 6: Administrative• 7: NAS-Prompt• 8: Authenticate Only• 9: Callback-NAS-Prompt

    7 Framed-Protocol Indicates the framing to be used forframed access. No other framing isallowed.

    Framing is indicated by a numeric valueas follows:

    • 1: PPP• 2: SLIP• 3: ARA• 4: Gandalf-proprietary single-link/

    multilink protocol• 5: Xylogics-proprietary IPX/SLIP

    8 Framed-IP-Address Indicates the IP address to be configuredfor the user, by sending the IP address ofa user to the RADIUS server in theaccess-request. To enable this command,use the radius-server attribute 8include-in-access-req command inglobal configuration mode.

    RADIUS Attributes Overview and RADIUS IETF AttributesComprehensive List of RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 13

  • Number IETF Attribute Description

    9 Framed-IP-Netmask Indicates the IP netmask to be configuredfor the user when the user is a router to anetwork. This attribute value results in astatic route being added for Framed-IP-Address with the mask specified.

    10 Framed-Routing Indicates the routing method for the userwhen the user is a router to a network.Only “None” and “Send and Listen”values are supported for this attribute.

    Routing method is indicated by a numericvalue as follows:

    • 0: None• 1: Send routing packets• 2: Listen for routing packets• 3: Send routing packets and listen

    for routing packets

    11 Filter-Id Indicates the name of the filter list for theuser and is formatted as follows: %d,%d.in, or %d.out. This attribute isassociated with the most recent service-type command. For login and EXEC, use%d or %d.out as the line access list valuefrom 0 to 199. For Framed service, use%d or %d.out as interface output accesslist, and %d.in for input access list. Thenumbers are self-encoding to the protocolto which they refer.

    12 Framed-MTU Indicates the maximum transmission unit(MTU) that can be configured for theuser when the MTU is not negotiated byPPP or some other means.

    13 Framed-Compression Indicates a compression protocol used forthe link. This attribute results in a “/compress” being added to the PPP orSLIP autocommand generated duringEXEC authorization. Not currentlyimplemented for non-EXECauthorization.

    Compression protocol is indicated by anumeric value as follows:

    • 0: None• 1: VJ-TCP/IP header compression• 2: IPX header compression

    RADIUS Attributes Overview and RADIUS IETF Attributes Comprehensive List of RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.414

  • Number IETF Attribute Description

    14 Login-IP-Host Indicates the host to which the user willconnect when the Login-Service attributeis included. (This begins immediatelyafter login.)

    15 Login-Service Indicates the service that should be usedto connect the user to the login host.

    Service is indicated by a numeric value asfollows:

    • 0: Telnet• 1: Rlogin• 2: TCP-Clear• 3: PortMaster• 4: LAT

    16 Login-TCP-Port Defines the TCP port with which the useris to be connected when the Login-Service attribute is also present.

    18 Reply-Message Indicates text that might be displayed tothe user via the RADIUS server. You caninclude this attribute in user files;however, you cannot exceed a maximumof 16 Replyp-Message entries per profile.

    19 Callback-Number Defines a dialing string to be used forcallback.

    20 Callback-ID Defines the name (consisting of one ormore octets) of a place to be called, to beinterpreted by the network access server.

    22 Framed-Route Provides routing information to beconfigured for the user on this networkaccess server. The RADIUS RFC format(net/bits [router [metric]]) and the oldstyle dotted mask (net mask [router[metric]]) are supported. If the routerfield is omitted or 0, the peer IP addressis used. Metrics are currently ignored.This attribute is access-request packets.

    23 Framed-IPX-Network Defines the IPX network numberconfigured for the user.

    RADIUS Attributes Overview and RADIUS IETF AttributesComprehensive List of RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 15

  • Number IETF Attribute Description

    24 State Allows state information to bemaintained between the network accessserver and the RADIUS server. Thisattribute is applicable only to CHAPchallenges.

    25 Class (Accounting) Arbitrary value that thenetwork access server includes in allaccounting packets for this user ifsupplied by the RADIUS server.

    RADIUS Attributes Overview and RADIUS IETF Attributes Comprehensive List of RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.416

  • Number IETF Attribute Description

    26 Vendor-Specific Allows vendors to support their ownextended attributes not suitable forgeneral use. The Cisco RADIUSimplementation supports one vendor-specific option using the formatrecommended in the specification.Cisco's vendor-ID is 9, and the supportedoption has vendor-type 1, which is named“cisco-avpair.” The value is a string ofthe format:

    protocol : attribute sep value

    “Protocol” is a value of the Cisco“protocol” attribute for a particular typeof authorization. “Attribute” and “value”are an appropriate AV pair defined in theCisco TACACS+ specification, and “sep”is “=” for mandatory attributes and “*”for optional attributes. This allows thefull set of features available for TACACS+ authorization to also be used forRADIUS. For example:

    cisco-avpair= ”ip:addr-pool=first“cisco-avpair= ”shell:priv-lvl=15“

    The first example causes Cisco’s“multiple named ip address pools”feature to be activated during IPauthorization (during PPP’s IPCP addressassignment). The second example causesa user logging in from a network accessserver to have immediate access to EXECcommands.

    Table 1 lists supported vendor-specificRADIUS attributes (IETF attribute 26).The “TACACS+ Attribute-Value Pairs”module provides a complete list ofsupported TACACS+ attribute-value(AV) pairs that can be used with IETFattribute 26. ( RFC 2865 )

    27 Session-Timeout Sets the maximum number of seconds ofservice to be provided to the user beforethe session terminates. This attributevalue becomes the per-user “absolutetimeout.”

    RADIUS Attributes Overview and RADIUS IETF AttributesComprehensive List of RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 17

    http://www.ietf.org/rfc/rfc2865.txt

  • Number IETF Attribute Description

    28 Idle-Timeout Sets the maximum number of consecutiveseconds of idle connection allowed to theuser before the session terminates. Thisattribute value becomes the per-user“session-timeout.”

    29 Termination-Action Termination is indicated by a numericvalue as follows:

    • 0: Default• 1: RADIUS request

    30 Called-Station-Id (Accounting) Allows the network accessserver to send the telephone number theuser called as part of the Access-Requestpacket (using Dialed NumberIdentification Service [DNIS] or similartechnology). This attribute is onlysupported on ISDN, and modem calls onthe Cisco AS5200 if used with PRI.

    31 Calling-Station-Id (Accounting) Allows the network accessserver to send the telephone number thecall came from as part of the Access-Request packet (using AutomaticNumber Identification or similartechnology). This attribute has the samevalue as “remote-addr” from TACACS+.This attribute is only supported on ISDN,and modem calls on the Cisco AS5200 ifused with PRI.

    32 NAS-Identifier String identifying the network accessserver originating the Access-Request.Use the radius-server attribute 32include-in-access-req globalconfiguration command to send RADIUSattribute 32 in an Access-Request orAccounting-Request. By default, theFQDN is sent in the attribute when theformat is not specified.

    33 Proxy-State Attribute that can be sent by a proxyserver to another server when forwardingAccess-Requests; this must be returnedunmodified in the Access-Accept,Access-Reject or Access-Challenge andremoved by the proxy server beforesending the response to the networkaccess server.

    RADIUS Attributes Overview and RADIUS IETF Attributes Comprehensive List of RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.418

  • Number IETF Attribute Description

    34 Login-LAT-Service Indicates the system with which the useris to be connected by LAT. This attributeis only available in the EXEC mode.

    35 Login-LAT-Node Indicates the node with which the user isto be automatically connected by LAT.

    36 Login-LAT-Group Identifies the LAT group codes that thisuser is authorized to use.

    37 Framed-AppleTalk-Link Indicates the AppleTalk network numberthat should be used for serial links to theuser, which is another AppleTalk router.

    38 Framed-AppleTalk- Network Indicates the AppleTalk network numberthat the network access server uses toallocate an AppleTalk node for the user.

    39 Framed-AppleTalk-Zone Indicates the AppleTalk Default Zone tobe used for this user.

    40 Acct-Status-Type (Accounting) Indicates whether thisAccounting-Request marks the beginningof the user service (start) or the end(stop).

    41 Acct-Delay-Time (Accounting) Indicates how manyseconds the client has been trying to senda particular record.

    42 Acct-Input-Octets (Accounting) Indicates how many octetshave been received from the port over thecourse of this service being provided.

    43 Acct-Output-Octets (Accounting) Indicates how many octetshave been sent to the port in the course ofdelivering this service.

    44 Acct-Session-Id (Accounting) A unique accountingidentifier that makes it easy to match startand stop records in a log file. Acct-Session ID numbers restart at 1 each timethe router is power cycled or the softwareis reloaded. To send this attribute inaccess-request packets, use the radius-server attribute 44 include-in-access-req command in global configurationmode.

    RADIUS Attributes Overview and RADIUS IETF AttributesComprehensive List of RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 19

  • Number IETF Attribute Description

    45 Acct-Authentic (Accounting) Indicates how the user wasauthenticated, whether by RADIUS, thenetwork access server itself, or anotherremote authentication protocol. Thisattribute is set to “radius” for usersauthenticated by RADIUS; “remote” forTACACS+ and Kerberos; or “local” forlocal, enable, line, and if-neededmethods. For all other methods, theattribute is omitted.

    46 Acct-Session-Time (Accounting) Indicates how long (inseconds) the user has received service.

    47 Acct-Input-Packets (Accounting) Indicates how manypackets have been received from the portover the course of this service beingprovided to a framed user.

    48 Acct-Output-Packets (Accounting) Indicates how manypackets have been sent to the port in thecourse of delivering this service to aframed user.

    RADIUS Attributes Overview and RADIUS IETF Attributes Comprehensive List of RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.420

  • Number IETF Attribute Description

    49 Acct-Terminate-Cause (Accounting) Reports details on why theconnection was terminated. Terminationcauses are indicated by a numeric valueas follows:

    1 User request2 Lost carrier3 Lost service4 Idle timeout5 Session timeout6 Admin reset7 Admin reboot8 Port error9 NAS error10 NAS request11 NAS reboot12 Port unneeded13 Port pre-empted14 Port suspended15 Service unavailable16 Callback17 User error18 Host request

    Note For attribute 49, Cisco IOSsupports values 1 to 6, 9, 12, and15 to 18.

    50 Acct-Multi-Session-Id (Accounting) A unique accountingidentifier used to link multiple relatedsessions in a log file.

    Each linked session in a multilink sessionhas a unique Acct-Session-Id value, butshares the same Acct-Multi-Session-Id.

    51 Acct-Link-Count (Accounting) Indicates the number oflinks known in a given multilink sessionat the time an accounting record isgenerated. The network access server caninclude this attribute in any accountingrequest that might have multiple links.

    52 Acct-Input-Gigawords Indicates how many times the Acct-Input-Octets counter has wrapped around2^32 over the course of the providedservice.

    RADIUS Attributes Overview and RADIUS IETF AttributesComprehensive List of RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 21

  • Number IETF Attribute Description

    53 Acct-Output-Gigawords Indicates how many times the Acct-Output-Octets counter has wrappedaround 2^32 while delivering service.

    55 Event-Timestamp Records the time that the event occurredon the NAS; the timestamp sent inattribute 55 is in seconds since January 1,1970 00:00 UTC. To send RADIUSattribute 55 in accounting packets, use theradius-server attribute 55 include-in-acct-req command.

    Note Before the Event-Timestampattribute can be sent in accountingpackets, you must configure theclock on the router. (Forinformation on setting the clockon your router, refer to the CiscoIOS Configuration FundamentalsConfiguration Guide , Release12.4T.) To avoid configuring theclock on the router every time therouter is reloaded, you can enablethe clock calendar-validcommand. See the Cisco IOSConfiguration FundamentalsCommand Reference for moreinformation on this command.

    60 CHAP-Challenge Contains the Challenge HandshakeAuthentication Protocol challenge sent bythe network access server to a PPP CHAPuser.

    61 NAS-Port-Type Indicates the type of physical port thenetwork access server is using toauthenticate the user. Physical ports areindicated by a numeric value as follows:

    • 0: Asynchronous• 1: Synchronous• 2: ISDN-Synchronous• 3: ISDN-Asynchronous (V.120)• 4: ISDN-Asynchronous (V.110)• 5: Virtual

    62 Port-Limit Sets the maximum number of portsprovided to the user by the NAS.

    RADIUS Attributes Overview and RADIUS IETF Attributes Comprehensive List of RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.422

  • Number IETF Attribute Description

    63 Login-LAT-Port Defines the port with which the user is tobe connected by LAT.

    64 Tunnel-Type3 Indicates the tunneling protocol(s) used.Cisco IOS software supports two possiblevalues for this attribute: L2TP and L2F.If this attribute is not set, L2F is used as adefault.

    65 Tunnel-Medium-Type1 Indicates the transport medium type touse to create a tunnel. This attribute hasonly one available value for this release:IP. If no value is set for this attribute, IPis used as the default.

    3 This RADIUS attribute complies with the following two IETF documents: RFC 2868 , RADIUS Attributes for Tunnel Protocol Support and RFC 2867 ,RADIUS Accounting Modifications for Tunnel Protocol Support .

    RADIUS Attributes Overview and RADIUS IETF AttributesComprehensive List of RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 23

  • Number IETF Attribute Description

    66 Tunnel-Client-Endpoint Contains the address of the initiator endof the tunnel. It may be included in bothAccess-Request and Access-Acceptpackets to indicate the address fromwhich a new tunnel is to be initiated. Ifthe Tunnel-Client-Endpoint attribute isincluded in an Access-Request packet,the RADIUS server should take the valueas a hint; the server is not obligated tohonor the hint, however. This attributeshould be included in Accounting-Request packets that contain Acct-Status-Type attributes with values of either Startor Stop, in which case it indicates theaddress from which the tunnel wasinitiated. This attribute, along with theTunnel-Server-Endpoint and Acct-Tunnel-Connection-ID attributes, may beused to provide a globally unique meansto identify a tunnel for accounting andauditing purposes.

    An enhancement has been added for thenetwork access server to accept a value of127.0.0.X for this attribute such that:

    127.0.0.0 would indicate that loopback0IP address is to be used 127.0.0.1 wouldindicate that loopback1 IP address is tobe used ... 127.0.0.X would indicate thatloopbackX IP address is to be used

    for the actual tunnel client endpoint IPaddress. This enhancement addsscalability across multiple network accessservers.

    67 Tunnel-Server-Endpoint1 Indicates the address of the server end ofthe tunnel. The format of this attributevaries depending on the value of Tunnel-Medium-Type. Because this release onlysupports IP as a tunnel medium type, theIP address or the host name of LNS isvalid for this attribute.

    RADIUS Attributes Overview and RADIUS IETF Attributes Comprehensive List of RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.424

  • Number IETF Attribute Description

    68 Acct-Tunnel-Connection-ID Indicates the identifier assigned to thetunnel session. This attribute should beincluded in Accounting-Request packetsthat contain an Acct-Status-Type attributehaving the value Start, Stop, or any of thevalues described above. This attribute,along with the Tunnel-Client-Endpointand Tunnel-Server-Endpoint attributes,may be used to provide a means touniquely identify a tunnel session forauditing purposes.

    69 Tunnel-Password1 Defines the password to be used toauthenticate to a remote server. Thisattribute is converted into different AAAattributes based on the value of Tunnel-Type: AAA_ATTR_l2tp_tunnel_pw(L2TP), AAA_ATTR_nas_password(L2F), and AAA_ATTR_gw_password(L2F).

    By default, all passwords received areencrypted, which can cause authorizationfailures when a NAS attempts to decrypta non-encrypted password. To enableattribute 69 to receive non-encryptedpasswords, use the radius-serverattribute 69 clearglobal configurationcommand.

    70 ARAP-Password Identifies an Access-Request packetcontaining a Framed-Protocol of ARAP.

    71 ARAP-Features Includes password information that theNAS should send to the user in an ARAP"feature flags" packet.

    72 ARAP-Zone-Access Indicates how the ARAP zone list for theuser should be used.

    73 ARAP-Security Identifies the ARAP Security Module tobe used in an Access-Challenge packet.

    74 ARAP-Security-Data Contains the actual security modulechallenge or response. It can be found inAccess-Challenge and Access-Requestpackets.

    75 Password-Retry Indicates how many times a user mayattempt authentication before beingdisconnected.

    RADIUS Attributes Overview and RADIUS IETF AttributesComprehensive List of RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 25

  • Number IETF Attribute Description

    76 Prompt Indicates to the NAS whether it shouldecho the user’s response as it is enteredor not echo it. (0=no echo, 1=echo)

    77 Connect-Info Provides additional call information formodem calls. This attribute is generatedin start and stop accounting records.

    78 Configuration-Token Indicates a type of user profile to be used.This attribute should be used in largedistributed authentication networks basedon proxy. It is sent from a RADIUSProxy Server to a RADIUS Proxy Clientin an Access-Accept; it should not be sentto a NAS.

    79 EAP-Message Encapsulates Extended Access Protocol(EAP) packets that allow the NAS toauthenticate dial-in users via EAPwithout having to understand the EAPprotocol.

    80 Message-Authenticator Prevents spoofing Access-Requests usingCHAP, ARAP, or EAP authenticationmethods.

    81 Tunnel-Private-Group-ID Indicates the group ID for a particulartunneled session.

    82 Tunnel-Assignment-ID1 Indicates to the tunnel initiator theparticular tunnel to which a session isassigned.

    83 Tunnel-Preference Indicates the relative preference assignedto each tunnel. This attribute should beincluded if more than one set of tunnelingattributes is returned by the RADIUSserver to the tunnel initiator.

    84 ARAP-Challenge-Response Contains the response to the challenge ofthe dial-in client.

    85 Acct-Interim-Interval Indicates the number of seconds betweeneach interim update in seconds for thisspecific session. This value can onlyappear in the Access-Accept message.

    RADIUS Attributes Overview and RADIUS IETF Attributes Comprehensive List of RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.426

  • Number IETF Attribute Description

    86 Acct-Tunnel-Packets-Lost Indicates the number of packets lost on agiven link. This attribute should beincluded in Accounting-Request packetsthat contain an Acct-Status-Type attributehaving the value Tunnel-Link-Stop.

    87 NAS-Port-ID Contains a text string which identifies theport of the NAS that is authenticating theuser.

    88 Framed-Pool Contains the name of an assigned addresspool that should be used to assign anaddress for the user. If a NAS does notsupport multiple address pools, the NASshould ignore this attribute.

    90 Tunnel-Client-Auth-ID Specifies the name used by the tunnelinitiator (also known as the NAS) whenauthenticating tunnel setup with thetunnel terminator. Supports L2F andL2TP protocols.

    91 Tunnel-Server-Auth-ID Specifies the name used by the tunnelterminator (also known as the HomeGateway) when authenticating tunnelsetup with the tunnel initiator. SupportsL2F and L2TP protocols.

    200 IETF-Token-Immediate Determines how RADIUS treatspasswords received from login-userswhen their file entry specifies a hand-held security card server.

    The value for this attribute is indicated bya numeric value as follows:

    • 0: No, meaning that the password isignored.

    • 1: Yes, meaning that the password isused for authentication.

    Additional ReferencesThe following sections provide references related to RADIUS IETF attributes.

    RADIUS Attributes Overview and RADIUS IETF AttributesAdditional References

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 27

  • Related Documents

    Related Topic Document Title

    RADIUS “ Configuring RADIUS ” module.

    Authentication “ Configuring Authentication ” module.

    Authorization “ Configuring Authorization ” module.

    Accounting “ Configuring Accounting ” module.

    RADIUS Vendor-Specific Attributes “ RADIUS Vendor-Proprietary Attributes ”module.

    Standards

    Standard Title

    None. --

    MIBs

    MIB MIBs Link

    None. To locate and download MIBs for selectedplatforms, Cisco IOS releases, and feature sets, useCisco MIB Locator found at the following URL:

    http://www.cisco.com/go/mibs

    RFCs

    RFC Title

    RFC 2865 Remote Authentication Dial In User Service(RADIUS)

    RFC 2866 RADIUS Accounting

    RFC 2867 RADIUS Accounting Modifications for TunnelProtocol Support

    RFC 2868 RADIUS Attributes for Tunnel Protocol Support

    RFC 2869 RADIUS Extensions

    RADIUS Attributes Overview and RADIUS IETF Attributes Additional References

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.428

    http://www.cisco.com/go/mibshttp://www.ietf.org/rfc/rfc2865.txthttp://www.ietf.org/rfc/rfc2866.txthttp://www.ietf.org/rfc/rfc2867.txthttp://www.ietf.org/rfc/rfc2868.txthttp://www.ietf.org/rfc/rfc2869.txt

  • Technical Assistance

    Description Link

    The Cisco Support website provides extensiveonline resources, including documentation and toolsfor troubleshooting and resolving technical issueswith Cisco products and technologies.

    To receive security and technical information aboutyour products, you can subscribe to variousservices, such as the Product Alert Tool (accessedfrom Field Notices), the Cisco Technical ServicesNewsletter, and Really Simple Syndication (RSS)Feeds.

    Access to most tools on the Cisco Support websiterequires a Cisco.com user ID and password.

    http://www.cisco.com/techsupport

    Feature Information for RADIUS Attributes Overview andRADIUS IETF Attributes

    The following table provides release information about the feature or features described in this module.This table lists only the software release that introduced support for a given feature in a given softwarerelease train. Unless noted otherwise, subsequent releases of that software release train also support thatfeature.

    Use Cisco Feature Navigator to find information about platform support and Cisco software image support.To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.

    Table 3 Feature Information for RADIUS Attributes Overview and RADIUS IETF Attributes

    Feature Name Releases Feature Information

    RADIUS IETF Attributes Cisco IOS Release 11.1 This feature was introduced inCisco IOS Release 11.1.

    Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.Third-party trademarks mentioned are the property of their respective owners. The use of the word partnerdoes not imply a partnership relationship between Cisco and any other company. (1110R)

    Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to beactual addresses and phone numbers. Any examples, command display output, network topology diagrams,and other figures included in the document are shown for illustrative purposes only. Any use of actual IPaddresses or phone numbers in illustrative content is unintentional and coincidental.

    RADIUS Attributes Overview and RADIUS IETF AttributesFeature Information for RADIUS Attributes Overview and RADIUS IETF Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 29

    http://www.cisco.com/public/support/tac/home.shtmlhttp://www.cisco.com/go/cfnhttp://www.cisco.com/go/trademarks

  • RADIUS IETF Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.430

  • RADIUS Vendor-Proprietary Attributes

    The IETF draft standard for RADIUS specifies a method for communicating vendor-proprietaryinformation between the network access server and the RADIUS server. However, some vendors haveextended the RADIUS attribute set for specific applications. This document provides Cisco IOS supportinformation for these vendor-proprietary RADIUS attrubutes.

    • Finding Feature Information, page 31• Supported Vendor-Proprietary RADIUS Attributes, page 31• Comprehensive List of Vendor-Proprietary RADIUS Attribute Descriptions, page 45• Feature Information for RADIUS Vendor-Proprietary Attributes, page 56

    Finding Feature InformationYour software release may not support all the features documented in this module. For the latest featureinformation and caveats, see the release notes for your platform and software release. To find informationabout the features documented in this module, and to see a list of the releases in which each feature issupported, see the Feature Information Table at the end of this document.

    Use Cisco Feature Navigator to find information about platform support and Cisco software image support.To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.

    Supported Vendor-Proprietary RADIUS AttributesThe table below lists Cisco-supported vendor-proprietary RADIUS attributes and the Cisco IOS release inwhich they are implemented. In cases where the attribute has a security server-specific format, the format isspecified. Refer to Vendor-Proprietary RADIUS Attributes table for a list of descriptions.

    Note Attributes implemented in special (AA) or early development (T) releases will be added to the nextmainline image.

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 31

    http://www.cisco.com/go/cfn

  • Table 4 Supported Vendor-Proprietary RADIUS Attributes

    Number

    Vendor-ProprietaryAttribute

    11.1 11.2 11.3 11.3AA 11.3T 12.0 12.1 12.2 12.3 12.4

    17 Change-Password

    no no yes yes yes yes yes yes no no

    21 Password-Expiration

    no no yes yes yes yes yes yes no no

    68 Tunnel-ID

    no no no no no no no yes yes yes

    108 My-Endpoint-Disc-Alias

    no no no no no no no no no no

    109 My-Name-Alias

    no no no no no no no no no no

    110 Remote-FW

    no no no no no no no no no no

    111 Multicast-GLeave-Delay

    no no no no no no no no no no

    112 CBCP-Enable

    no no no no no no no no no no

    113 CBCP-Mode

    no no no no no no no no no no

    114 CBCP-Delay

    no no no no no no no no no no

    115 CBCP-Trunk-Group

    no no no no no no no no no no

    RADIUS Vendor-Proprietary Attributes Supported Vendor-Proprietary RADIUS Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.432

  • Number

    Vendor-ProprietaryAttribute

    11.1 11.2 11.3 11.3AA 11.3T 12.0 12.1 12.2 12.3 12.4

    116 Appletalk-Route

    no no no no no no no no no no

    117 Appletalk-Peer-Mode

    no no no no no no no no no no

    118 Route-Appletalk

    no no no no no no no no no no

    119 FCP-Parameter

    no no no no no no no no no no

    120 Modem-PortNo

    no no no no no no no no no no

    121 Modem-SlotNo

    no no no no no no no no no no

    122 Modem-ShelfNo

    no no no no no no no no no no

    123 Call-Attempt-Limit

    no no no no no no no no no no

    124 Call-Block-Duration

    no no no no no no no no no no

    125 Maximum-Call-Duration

    no no no no no no no no no no

    RADIUS Vendor-Proprietary AttributesSupported Vendor-Proprietary RADIUS Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 33

  • Number

    Vendor-ProprietaryAttribute

    11.1 11.2 11.3 11.3AA 11.3T 12.0 12.1 12.2 12.3 12.4

    126 Router-Preference

    no no no no no no no no no no

    127 Tunneling-Protocol

    no no no no no no no no no no

    128 Shared-Profile-Enable

    no no no no no no no no yes yes

    129 Primary-Home-Agent

    no no no no no no no no no no

    130 Secondary-Home-Agent

    no no no no no no no no no no

    131 Dialout-Allowed

    no no no no no no no no no no

    133 BACP-Enable

    no no no no no no no no no no

    134 DHCP-Maximum-Leases

    no no no no no no no no no no

    135 Primary-DNS-Server

    no no no no yes yes yes yes yes yes

    RADIUS Vendor-Proprietary Attributes Supported Vendor-Proprietary RADIUS Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.434

  • Number

    Vendor-ProprietaryAttribute

    11.1 11.2 11.3 11.3AA 11.3T 12.0 12.1 12.2 12.3 12.4

    136 Secondary-DNS-Server

    no no no no yes yes yes yes yes yes

    137 Ascend-Client-Assign-DNS

    no no no no no no no no yes yes

    138 User-Acct-Type

    no no no no no no no no no no

    139 User-Acct-Host

    no no no no no no no no no no

    140 User-Acct-Port

    no no no no no no no no no no

    141 User-Acct-Key

    no no no no no no no no no no

    142 User-Acct-Base

    no no no no no no no no no no

    143 User-Acct-Time

    no no no no no no no no no no

    144 Assign-IP-Client

    no no no no no no no no no no

    145 Assign-IP-Server

    no no no no no no no no no no

    RADIUS Vendor-Proprietary AttributesSupported Vendor-Proprietary RADIUS Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 35

  • Number

    Vendor-ProprietaryAttribute

    11.1 11.2 11.3 11.3AA 11.3T 12.0 12.1 12.2 12.3 12.4

    146 Assign-IP-Global-Pool

    no no no no no no no no no no

    147 DHCP-Reply

    no no no no no no no no no no

    148 DHCP-Pool-Number

    no no no no no no no no no no

    149 Expect-Callback

    no no no no no no no no no no

    150 Event-Type

    no no no no no no no no no no

    151 Ascend-Session-Svr-Key

    no no no yes no no yes yes yes yes

    152 Ascend-Multicast-Rate-Limit

    no no no yes no no yes yes yes yes

    153 IF-Netmask

    no no no no no no no no no no

    154 h323-Remote-Address

    no no no no no no no no yes yes

    RADIUS Vendor-Proprietary Attributes Supported Vendor-Proprietary RADIUS Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.436

  • Number

    Vendor-ProprietaryAttribute

    11.1 11.2 11.3 11.3AA 11.3T 12.0 12.1 12.2 12.3 12.4

    155 Ascend-Multicast-Client

    no no no yes no no yes yes yes yes

    156 FR-Circuit-Name

    no no no no no no no no no no

    157 FR-LinkUp

    no no no no no no no no no no

    158 FR-Nailed-Grp

    no no no no no no no no no no

    159 FR-Type

    no no no no no no no no no no

    160 FR-Link-Mgt

    no no no no no no no no no no

    161 FR-N391

    no no no no no no no no no no

    162 FR-DCE-N392

    no no no no no no no no no no

    163 FR-DTE-N392

    no no no no no no no no no no

    164 FR-DCE-N393

    no no no no no no no no no no

    165 FR-DTE-N393

    no no no no no no no no no no

    166 FR-T391

    no no no no no no no no no no

    RADIUS Vendor-Proprietary AttributesSupported Vendor-Proprietary RADIUS Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 37

  • Number

    Vendor-ProprietaryAttribute

    11.1 11.2 11.3 11.3AA 11.3T 12.0 12.1 12.2 12.3 12.4

    167 FR-T392

    no no no no no no no no no no

    168 Bridge-Address

    no no no no no no no no no no

    169 TS-Idle-Limit

    no no no no no no no no no no

    170 TS-Idle-Mode

    no no no no no no no no no no

    171 DBA-Monitor

    no no no no no no no no no no

    172 Base-Channel-Count

    no no no no no no no no no no

    173 Minimum-Channels

    no no no no no no no no no no

    174 IPX-Route

    no no no no no no no no no no

    175 FT1-Caller

    no no no no no no no no no no

    176 Ipsec-Backup-Gateway

    no no no no no no no no yes yes

    177 rm-Call-Type

    no no no no no no no no yes yes

    RADIUS Vendor-Proprietary Attributes Supported Vendor-Proprietary RADIUS Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.438

  • Number

    Vendor-ProprietaryAttribute

    11.1 11.2 11.3 11.3AA 11.3T 12.0 12.1 12.2 12.3 12.4

    178 Group no no no no no no no no no no

    179 FR-DLCI

    no no no no no no no no no no

    180 FR-Profile-Name

    no no no no no no no no no no

    181 Ara-PW

    no no no no no no no no no no

    182 IPX-Node-Addr

    no no no no no no no no no no

    183 Home-Agent-IP-Addr

    no no no no no no no no no no

    184 Home-Agent-Password

    no no no no no no no no no no

    185 Home-Network-Name

    no no no no no no no no no no

    186 Home-Agent-UDP-Port

    no no no no no no no no no no

    187 Multilink-ID

    no no no yes yes yes yes yes yes yes

    188 Ascend-Num-In-Multilink

    no no no yes yes yes yes yes yes yes

    RADIUS Vendor-Proprietary AttributesSupported Vendor-Proprietary RADIUS Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 39

  • Number

    Vendor-ProprietaryAttribute

    11.1 11.2 11.3 11.3AA 11.3T 12.0 12.1 12.2 12.3 12.4

    189 First-Dest

    no no no no no no no no no no

    190 Pre-Input-Octets

    no no no yes yes yes yes yes no no

    191 Pre-Output-Octets

    no no no yes yes yes yes yes no no

    192 Pre-Input-Packets

    no no no yes yes yes yes yes no no

    193 Pre-Output-Packets

    no no no yes yes yes yes yes no no

    194 Maximum-Time

    no no yes yes yes yes yes yes no no

    195 Disconnect-Cause

    no no yes yes yes yes yes yes yes yes

    196 Connect-Progress

    no no no no no no yes yes yes yes

    197 Data-Rate

    no no no no yes yes yes yes yes yes

    198 PreSession-Time

    no no no yes yes yes yes yes yes yes

    199 Token-Idle

    no no no no no no no no yes yes

    RADIUS Vendor-Proprietary Attributes Supported Vendor-Proprietary RADIUS Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.440

  • Number

    Vendor-ProprietaryAttribute

    11.1 11.2 11.3 11.3AA 11.3T 12.0 12.1 12.2 12.3 12.4

    201 Require-Auth

    no no no no no no no no yes yes

    202 Number-Sessions

    no no no no no no no no no no

    203 Authen-Alias

    no no no no no no no no no no

    204 Token-Expiry

    no no no no no no no no no no

    205 Menu-Selector

    no no no no no no no no no no

    206 Menu-Item

    no no no no no no no no no no

    207 PW-Warntime

    no no no no no no no no no no

    208 PW-Lifetime

    no no yes yes yes yes yes yes yes yes

    209 IP-Direct

    no no no no yes yes yes yes yes yes

    210 PPP-VJ-Slot-Compression

    no no yes yes yes yes yes yes yes yes

    211 PPP-VJ-1172

    no no no no no no no no no no

    212 PPP-Async-Map

    no no no no no no no no no no

    RADIUS Vendor-Proprietary AttributesSupported Vendor-Proprietary RADIUS Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 41

  • Number

    Vendor-ProprietaryAttribute

    11.1 11.2 11.3 11.3AA 11.3T 12.0 12.1 12.2 12.3 12.4

    213 Third-Prompt

    no no no no no no no no no no

    214 Send-Secret

    no no no no no no yes yes yes yes

    215 Receive-Secret

    no no no no no no no no no no

    216 IPX-Peer-Mode

    no no no no no no no no no no

    217 IP-Pool

    no no yes yes yes yes yes yes yes yes

    218 Static-Addr-Pool

    no no yes yes yes yes yes yes yes yes

    219 FR-Direct

    no no no no no no no no no no

    220 FR-Direct-Profile

    no no no no no no no no no no

    221 FR-Direct-DLCI

    no no no no no no no no no no

    222 Handle-IPX

    no no no no no no no no no no

    223 Netware-Timeout

    no no no no no no no no no no

    224 IPX-Alias

    no no no no no no no no no no

    225 Metric no no no no no no no no no no

    RADIUS Vendor-Proprietary Attributes Supported Vendor-Proprietary RADIUS Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.442

  • Number

    Vendor-ProprietaryAttribute

    11.1 11.2 11.3 11.3AA 11.3T 12.0 12.1 12.2 12.3 12.4

    226 PRI-Number-Type

    no no no no no no no no no no

    227 Dial-Number

    no no no no no no yes yes yes yes

    228 Route-IP

    no no yes yes yes yes yes yes yes yes

    229 Route-IPX

    no no no no no no no no no no

    230 Bridge no no no no no no no no no no

    231 Send-Auth

    no no no no no no yes yes yes yes

    232 Send-Passwd

    no no no no no no no no no no

    233 Link-Compression

    no no yes yes yes yes yes yes yes yes

    234 Target-Util

    no no no yes no yes yes yes yes yes

    235 Maximum-Channels

    no no yes yes yes yes yes yes yes yes

    236 Inc-Channel-Count

    no no no no no no no no no no

    237 Dec-Channel-Count

    no no no no no no no no no no

    RADIUS Vendor-Proprietary AttributesSupported Vendor-Proprietary RADIUS Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 43

  • Number

    Vendor-ProprietaryAttribute

    11.1 11.2 11.3 11.3AA 11.3T 12.0 12.1 12.2 12.3 12.4

    238 Seconds-of-History

    no no no no no no no no no no

    239 History-Weigh-Type

    no no no no no no no no no no

    240 Add-Seconds

    no no no no no no no no no no

    241 Remove-Seconds

    no no no no no no no no no no

    242 Data-Filter

    no no yes yes yes yes yes yes yes yes

    243 Call-Filter

    no no no no no no no no yes yes

    244 Idle-Limit

    no no yes yes yes yes yes yes yes yes

    245 Preempt-Limit

    no no no no no no no no no no

    246 Callback

    no no no no no no no no yes yes

    247 Data-Service

    no no no no no no yes yes yes yes

    248 Force-56

    no no no no no no yes yes yes yes

    249 BillingNumber

    no no no no no no no no no no

    RADIUS Vendor-Proprietary Attributes Supported Vendor-Proprietary RADIUS Attributes

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.444

  • Number

    Vendor-ProprietaryAttribute

    11.1 11.2 11.3 11.3AA 11.3T 12.0 12.1 12.2 12.3 12.4

    250 Call-By-Call

    no no no no no no no no no no

    251 Transit-Number

    no no no no no no no no no no

    252 Host-Info

    no no no no no no no no no no

    253 PPP-Address

    no no no no no no no no no no

    254 MPP-Idle-Percent

    no no no no no no no no no no

    255 Xmit-Rate

    no no no yes yes yes yes yes yes yes

    Comprehensive List of Vendor-Proprietary RADIUS AttributeDescriptions

    The table below lists and describes the known vendor-proprietary RADIUS attributes:

    Table 5 Vendor-Proprietary RADIUS Attributes

    Number Vendor-Proprietary Attribute Description

    17 Change-Password Specifies a request to change thepassword of a user.

    21 Password-Expiration Specifies an expiration date for auser’s password in the user’s fileentry.

    RADIUS Vendor-Proprietary AttributesComprehensive List of Vendor-Proprietary RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 45

  • Number Vendor-Proprietary Attribute Description

    68 Tunnel-ID (Ascend 5) Specifies the stringassigned by RADIUS for eachsession using CLID or DNIStunneling. When accounting isimplemented, this value is usedfor accoutning.

    108 My-Endpoint-Disc-Alias (Ascend 5) No descriptionavailable.

    109 My-Name-Alias (Ascend 5) No descriptionavailable.

    110 Remote-FW (Ascend 5) No descriptionavailable.

    111 Multicast-GLeave-Delay (Ascend 5) No descriptionavailable.

    112 CBCP-Enable (Ascend 5) No descriptionavailable.

    113 CBCP-Mode (Ascend 5) No descriptionavailable.

    114 CBCP-Delay (Ascend 5) No descriptionavailable.

    115 CBCP-Trunk-Group (Ascend 5) No descriptionavailable.

    116 Appletalk-Route (Ascend 5) No descriptionavailable.

    117 Appletalk-Peer-Mode (Ascend 5) No descriptionavailable.

    118 Route-Appletalk (Ascend 5) No descriptionavailable.

    119 FCP-Parameter (Ascend 5) No descriptionavailable.

    120 Modem-PortNo (Ascend 5) No descriptionavailable.

    121 Modem-SlotNo (Ascend 5) No descriptionavailable.

    122 Modem-ShelfNo (Ascend 5) No descriptionavailable.

    RADIUS Vendor-Proprietary Attributes Comprehensive List of Vendor-Proprietary RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.446

  • Number Vendor-Proprietary Attribute Description

    123 Call-Attempt-Limit (Ascend 5) No descriptionavailable.

    124 Call-Block-Duration (Ascend 5) No descriptionavailable.

    125 Maximum-Call-Duration (Ascend 5) No descriptionavailable.

    126 Router-Preference (Ascend 5) No descriptionavailable.

    127 Tunneling-Protocol (Ascend 5) No descriptionavailable.

    128 Shared-Profile-Enable (Ascend 5) No descriptionavailable.

    129 Primary-Home-Agent (Ascend 5) No descriptionavailable.

    130 Secondary-Home-Agent (Ascend 5) No descriptionavailable.

    131 Dialout-Allowed (Ascend 5) No descriptionavailable.

    133 BACP-Enable (Ascend 5) No descriptionavailable.

    134 DHCP-Maximum-Leases (Ascend 5) No descriptionavailable.

    135 Primary-DNS-Server Identifies a primary DNS serverthat can be requested byMicrosoft PPP clients from thenetwork access server duringIPCP negotiation.

    136 Secondary-DNS-Server Identifies a secondary DNSserver that can be requested byMicrosoft PPP clients from thenetwork access server duringIPCP negotiation.

    137 Client-Assign-DNS No description available.

    138 User-Acct-Type No description available.

    139 User-Acct-Host No description available.

    140 User-Acct-Port No description available.

    RADIUS Vendor-Proprietary AttributesComprehensive List of Vendor-Proprietary RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 47

  • Number Vendor-Proprietary Attribute Description

    141 User-Acct-Key No description available.

    142 User-Acct-Base No description available.

    143 User-Acct-Time No description available.

    144 Assign-IP-Client No description available.

    145 Assign-IP-Server No description available.

    146 Assign-IP-Global-Pool No description available.

    147 DHCP-Reply No description available.

    148 DHCP-Pool-Number No description available.

    149 Expect-Callback No description available.

    150 Event-Type No description available.

    151 Session-Svr-Key No description available.

    152 Multicast-Rate-Limit No description available.

    153 IF-Netmask No description available.

    154 Remote-Addr No description available.

    155 Multicast-Client No description available.

    156 FR-Circuit-Name No description available.

    157 FR-LinkUp No description available.

    158 FR-Nailed-Grp No description available.

    159 FR-Type No description available.

    160 FR-Link-Mgt No description available.

    161 FR-N391 No description available.

    162 FR-DCE-N392 No description available.

    163 FR-DTE-N392 No description available.

    164 FR-DCE-N393 No description available.

    165 FR-DTE-N393 No description available.

    166 FR-T391 No description available.

    167 FR-T392 No description available.

    168 Bridge-Address No description available.

    RADIUS Vendor-Proprietary Attributes Comprehensive List of Vendor-Proprietary RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.448

  • Number Vendor-Proprietary Attribute Description

    169 TS-Idle-Limit No description available.

    170 TS-Idle-Mode No description available.

    171 DBA-Monitor No description available.

    172 Base-Channel-Count No description available.

    173 Minimum-Channels No description available.

    174 IPX-Route No description available.

    175 FT1-Caller No description available.

    176 Backup No description available.

    177 Call-Type No description available.

    178 Group No description available.

    179 FR-DLCI No description available.

    180 FR-Profile-Name No description available.

    181 Ara-PW No description available.

    182 IPX-Node-Addr No description available.

    183 Home-Agent-IP-Addr Indicates the home agent’s IPaddress (in dotted decimalformat) when using AscendTunnel Management Protocol(ATMP).

    184 Home-Agent-Password With ATMP, specifies thepassword that the foreign agentuses to authenticate itself.

    185 Home-Network-Name With ATMP, indicates the nameof the connection profile to whichthe home agent sends all packets.

    186 Home-Agent-UDP-Port Indicates the UDP port numberthe foreign agent uses to sendATMP messages to the homeagent.

    RADIUS Vendor-Proprietary AttributesComprehensive List of Vendor-Proprietary RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 49

  • Number Vendor-Proprietary Attribute Description

    187 Multilink-ID Reports the identification numberof the multilink bundle when thesession closes. This attributeapplies to sessions that are part ofa multilink bundle. TheMultilink-ID attribute is sent inauthentication-response packets.

    188 Num-In-Multilink Reports the number of sessionsremaining in a multilink bundlewhen the session reported in anaccounting-stop packet closes.This attribute applies to sessionsthat are part of a multilink bundle.The Num-In-Multilink attribute issent in authentication-responsepackets and in some accounting-request packets.

    189 First-Dest Records the destination IPaddress of the first packetreceived after authentication.

    190 Pre-Input-Octets Records the number of inputoctets before authentication. ThePre-Input-Octets attribute is sentin accounting-stop records.

    191 Pre-Output-Octets Records the number of outputoctets before authentication. ThePre-Output-Octets attribute is sentin accounting-stop records.

    192 Pre-Input-Packets Records the number of inputpackets before authentication.The Pre-Input-Packets attribute issent in accounting-stop records.

    193 Pre-Output-Packets Records the number of outputpackets before authentication.The Pre-Output-Packets attributeis sent in accounting-stop records.

    194 Maximum-Time Specifies the maximum length oftime (in seconds) allowed for anysession. After the session reachesthe time limit, its connection isdropped.

    RADIUS Vendor-Proprietary Attributes Comprehensive List of Vendor-Proprietary RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.450

  • Number Vendor-Proprietary Attribute Description

    195 Disconnect-Cause Specifies the reason a connectionwas taken offline. TheDisconnect-Cause attribute is sentin accounting-stop records. Thisattribute also causes stop recordsto be generated without firstgenerating start records ifdisconnection occurs beforeauthentication is performed. Formore information, refer to thetable of Disconnect-CauseAttribute Values and theirmeanings.

    196 Connect-Progress Indicates the connection statebefore the connection isdisconnected.

    197 Data-Rate Specifies the average number ofbits per second over the course ofthe connection’s lifetime. TheData-Rate attribute is sent inaccounting-stop records.

    198 PreSession-Time Specifies the length of time, inseconds, from when a call firstconnects to when it completesauthentication. The PreSession-Time attribute is sent inaccounting-stop records.

    199 Token-Idle Indicates the maximum amountof time (in minutes) a cachedtoken can remain alive betweenauthentications.

    201 Require-Auth Defines whether additionalauthentication is required forclass that has been CLIDauthenticated.

    202 Number-Sessions Specifies the number of activesessions (per class) reported tothe RADIUS accounting server.

    203 Authen-Alias Defines the RADIUS server’slogin name during PPPauthentication.

    204 Token-Expiry Defines the lifetime of a cachedtoken.

    RADIUS Vendor-Proprietary AttributesComprehensive List of Vendor-Proprietary RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 51

  • Number Vendor-Proprietary Attribute Description

    205 Menu-Selector Defines a string to be used to cuea user to input data.

    206 Menu-Item Specifies a single menu-item for auser-profile. Up to 20 menu itemscan be assigned per profile.

    207 PW-Warntime (Ascend 5) No descriptionavailable.

    208 PW-Lifetime Enables you to specify on a per-user basis the number of days thata password is valid.

    209 IP-Direct When you include this attribute ina user’s file entry, a framed routeis installed to the routing andbridging tables.

    Note Packet routing isdependent upon the entiretable, not just this newlyinstalled entry. Theinclusion of this attributedoes not guarantee that allpackets should be sent tothe specified IP address;thus, this attribute is notfully supported. Theseattribute limitations occurbecause the Cisco routercannot bypass all internalrouting and bridging tablesand send packets to aspecified IP address.

    210 PPP-VJ-Slot-Comp Instructs the Cisco router not touse slot compression whensending VJ-compressed packetsover a PPP link.

    211 PPP-VJ-1172 Instructs PPP to use the 0x0037value for VJ compression.

    212 PPP-Async-Map Gives the Cisco router theasynchronous control charactermap for the PPP session. Thespecified control characters arepassed through the PPP link asdata and used by applicationsrunning over the link.

    RADIUS Vendor-Proprietary Attributes Comprehensive List of Vendor-Proprietary RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.452

  • Number Vendor-Proprietary Attribute Description

    213 Third-Prompt Defines a third prompt (afterusername and password) foradditional user input.

    214 Send-Secret Enables an encrypted password tobe used in place of a regularpassword in outdial profiles.

    215 Receive-Secret Enables an encrypted password tobe verified by the RADIUSserver.

    216 IPX-Peer-Mode (Ascend 5) No descriptionavailable.

    217 IP-Pool-Definition Defines a pool of addresses usingthe following format: X a.b.c Z;where X is the pool indexnumber, a.b.c is the pool’sstarting IP address, and Z is thenumber of IP addresses in thepool. For example, 3 10.0.0.1 5allocates 10.0.0.1 through10.0.0.5 for dynamic assignment.

    218 Assign-IP-Pool Tells the router to assign the userand IP address from the IP pool.

    219 FR-Direct Defines whether the connectionprofile operates in Frame Relayredirect mode.

    220 FR-Direct-Profile Defines the name of the FrameRelay profile carrying thisconnection to the Frame Relayswitch.

    221 FR-Direct-DLCI Indicates the DLCI carrying thisconnection to the Frame Relayswitch.

    222 Handle-IPX Indicates how NCP watchdogrequests will be handled.

    223 Netware-Timeout Defines, in minutes, how long theRADIUS server responds to NCPwatchdog packets.

    224 IPX-Alias Allows you to define an alias forIPX routers requiring numberedinterfaces.

    RADIUS Vendor-Proprietary AttributesComprehensive List of Vendor-Proprietary RADIUS Attribute Descriptions

    RADIUS Attributes Configuration Guide Cisco IOS Release 12.4 53

  • Number Vendor-Proprietary Att