High Performance Carrier Class RADIUS/Diameter Solution
Product Overview
• Accelerate deployment of access services: Intelligent authentication, authorization, and accounting (AAA) services
• Implement an "end-to-end" solution for multiple access technologies: High performance, scalable, reliable, and flexible
• Reduce operational costs: Centralized management and simplified administration
Highlights
Diameter support
• Supports authentication with the help of a local database or an external database (such as Lightweight Directory Access Protocol [LDAP], Open Database Connectivity [ODBC])
• Does session management and resource management as Cisco Access Registrar currently does for RADIUS packets
• Supports writing the Diameter accounting packet in a local file or proxy to another AAA server
• Supports adding, modifying, or deleting the attribute-value pairs (AVPs) in Diameter packets through extension point scripting only for the local AAA service
• Supports open-ended Diameter applications
IPv6 interface support
• Processing of RADIUS requests originated from an IPv6 RADIUS client (network access server [NAS])
• AAA proxy for remote IPv6 AAA server
• IPv6 or IPv4 as the interface between Cisco Access Registrar and Broadband Remote Access Server (BRAS)/NAS
• IPv6 as per RFC 3162 attributes
EAP-AKA support
• MAP protocol
• Home Location Register (HLR) and Home Subscriber Server (HSS) and the list of compliant Third-Generation Partnership Project (3GPP) standards
• Messages exchanged with the HLR/HSS
• Description of the HLR/HSS
• User profile information
WiMAX NWG stage 3 latest document support
WiMAX provisioning server support along with bootstrap encryption key
• IP, MAC address, and BEK of this unprovisioned device need to be sent to the Open Mobile Alliance Device Management (OMA-DM) server to initiate the provisioning
• Cisco Access Registrar needs to maintain the IP address to MAC address association using the web service until it receives the provisioning complete message from the OMA-DM server
Lawful intercept support in Cisco Access Registrar
• ProvisionTarget: To start monitoring the target user
• DeprovisionTarget: To stop monitoring the target user
• LinkUpdate: To query the target user in monitored list
• ListTarget: To list all the users that are currently being monitored
Session scalability
Interim accounting update support for ODBC server
LDAP accounting write-up
Red Hat Enterprise Linux 5.3 support
GUI revamp
Support for Veritas clustering
VMware support
UCS support
Cisco Access Registrar Director license
Benefits
• Supports multiple access technologies (dial, wholesale dial, broadband, mobile wireless, wireless LAN and public wireless LAN, Service Selection Gateway [SSG], VoIP, cable, WiMAX) with a single AAA platform.
• Gives service providers an off-the-shelf, standards-based RADIUS/Diameter server that offers the flexibility and extensibility previously available only by maintaining internally built versions of public-domain RADIUS/Diameter software.
• Allows service providers to focus their businesses on specific areas of service delivery by supporting additional wholesale, outsourcing, and roaming service scenarios using proxy RADIUS/Diameter.
• Reduces operational costs and speeds service rollout by supporting integration with provisioning, billing, and other service-management components using directory or relational database management system (RDBMS) support and scriptable configuration interfaces.
• Efficiently manages resource use by supporting centralized IP address assignment and session-limit enforcement across access devices spanning multiple geographic regions and across multiple Cisco Access Registrar servers.
• Allows service providers to extend competitive advantages by rapidly deploying the latest wireless technologies.
• Provides multimillion session scalability by off-loading the active session information to an external database like Oracle.
Product Architecture
• Whether authentication against an LDAP directory, Active Directory, or Oracle database is required
• Whether accounting against an LDAP directory or Oracle database is required
• Whether a request should be forwarded to an external RADIUS/Diameter server
• What type of accounting is required
• Whether session limits apply
• Whether an IP address pool has been assigned
Figure 1. Cisco Access Registrar Architecture
Features
Authentication and Authorization
• High-speed internal embedded user database
• Easy, logical grouping of users
• Easy return attributes and check-item configuration
• Ability to enable and disable user access
• Ability to store user information in an external data store
• LDAP directory or Oracle or MySQL database support:
– Store return and check-items attributes
– Data store schema independent
– Ability to add custom logic based on information in user's record
• Authentication to a Windows database Advanced RADIUS/Diameter proxy support for service provider environments
– Includes proxy attributes filtering
• EAP support
– Message Digest Algorithm 5 (MD5), LEAP, PEAP (with Microsoft Challenge Handshake Authentication Protocol [MS-CHAP]) version 2, Generic Token Card (GTC), SIM, TLS, FAST, TLS, TTLS, AKA
– EAP proxy
– EAP-Negotiate: Special service used to select at run time the EAP service to be used to authenticate the client.
– CRL support
• HTTP digest authentication for Session Initiation Protocol (SIP) and web servers
• IETF RADIUS tunnel support (RFC 2867, RFC 2868)
• Automatic and customizable reply-message generation
• Chaining of authentication and authorization service through the environment attributes
• LDAP remote server's bind-based authentication
Accounting
• Local file
– Store accounting records in a single file or multiple files
– Automatic file rollover based on file age, size, or specific time
• Proxy
– Option to ignore acknowledgements and continue processing
• Database
– Write accounting records directly to an Oracle or MySQL database or LDAP directory
– Schema independent
– Buffering option for higher throughput and fault tolerance
• Chaining of accounting service through the environment attributes
Proxy, Database, and LDAP Configuration
• Define a list of remote systems to be used in failover or round-robin modes
• Accept All, Reject All, and Drop Packet outage policies available when no remote systems are available
• Define the individual characteristics of each remote system, for example, ports, timeouts, retries, or reactivate timers
• Sophisticated algorithms to detect status of remote systems
Request Processing Decisions Based on Rules and Policy Engine
• Process requests using different methods; for example, use LDAP for some access requests, the internal database for others
• Process requests using a combination of these methods; for example, store an accounting request to a local file and proxy it to a number of remote RADIUS/Diameter servers, in series or in parallel
• Split authentication and authorization by selecting one method for authentication and another for authorization (One-Time Password [OTP] server and Oracle database, for example)
• Decide which method to use based on attributes in the request or on Cisco Access Registrar's environment variables, such as source or destination IP address or User Datagram Protocol (UDP) port
• Decide which service needs to be chained based on attributes on the Cisco Access Registrar's environment variables, such as the reauthentication service, reauthorization service, and reaccounting service
• Easy method selection based on DNS domain, username prefix, dialed number, calling number, or NAS, using the Cisco Access Registrar policy engine
Resource Allocation and Session Management
• Built-in feature to track user sessions and allocate resources
• Options to store active session information to an external database like Oracle
• Enforcement of session limits per user and per group
• Allocation of addresses from IP pools
• Allocation of home agents and on-demand address pools
• Real-time query of the session table using the command-line interface (CLI), XML over UDP, or RADIUS
• Ability to add custom information to the session table
• Ability to configure which attributes to store in the session table
• Manual release of sessions and resources
• Query and release sessions based on session age, username, NAS, and other criteria
• Release sessions and generate Packet of Disconnect (PoD)
• Automatic session release when accounting stop is lost (inactivity timeout)
• Automatic session release when accounting on/off is detected (system accounting)
• In an environment with multiple Cisco Access Registrars, ability to designate one Cisco Access Registrar to manage all sessions to avoid bypass of session limits and to allocate IP addresses and other resources centrally
• Session information not lost even if Cisco Access Registrar or the system is restarted
• Session tracking for accounting-only servers
• Configurable session key based on any attributes present in the incoming request
• Ability to send Change of Authorization (CoA) request
• Ability to count the number of user sessions
• Ability to query cached attributes through the query session
System Tuning and System Configuration
• Configure Cisco Access Registrar to listen on multiple UDP ports
• Specify which network interfaces to use
• Set the number of simultaneous requests to be processed
• Regular and advanced duplicate detection features
• Extensible attribute dictionary
– Populated with latest attribute definitions, including third-party, vendor-specific attributes
– Easy addition of new attributes (add/modify/delete)
– Variable-length vendor type in vendor-specific attributes
• Specify log file rollover rules
Troubleshooting and Monitoring
• Multilevel debugging output
• Real-time query of processing counters
• Reset processing counters without restarting Cisco Access Registrar
• Query status of all Cisco Access Registrar processes and utilities
• Log files for each Cisco Access Registrar process
• Audit log of all configuration changes
• Direct logs to a syslog server
• RADIUS Simple Network Management Protocol (SNMP) RFC 2618-21 support
• SNMP traps generated for critical events
• Utility to generate RADIUS requests
Configuration
• Powerful command-line configuration utility with interactive/noninteractive full and view-only modes
• Noninteractive modes allow for configuration automation and operations support system (OSS) integration
• Dynamic configuration feature allows configuration changes to take effect without a server restart
• Command and value recall, inline editing, autocommand completion, and a context-sensitive list of options
• Revamped web-based interface for configuring most of the objects in Cisco Access Registrar
• Specify multiple RADIUS clients with a single definition
Resilience
• Automatic configuration replication to other Cisco Access Registrar servers (server redundancy)
• Specify lists of alternate remote systems for each processing method (remote-system redundancy)
• Specify multiple methods to process a request (processing-method redundancy)
• Automatic server restart
Customization
• Add custom logic to the request processing flow using Tcl, C or C++, or Java
– Access request and response packets
– Modify processing decisions in real time
– Target specific requests with multiple callout points
• Create custom processing methods
Solutions
• Cisco PDSN for CDMA2000 mobile wireless
– Home agent allocation for balanced home agent access
– Null password support
– Multiple accounting start/stop detection for roaming users
– CDMA2000 vendor-specific attribute support
– Prepaid billing
– Quality of service (QoS) and remote address accounting attributes support
– PoD during packet data serving node (PDSN) handoff
– Mobile Node-Home Agent (MN-HA) shared key distribution for mobile IP
– Domain Name System (DNS) update for IP reach ability
– Change of Authorization (CoA)
• Public wireless LAN solution for service providers
• Cisco IOS® Software On-Demand Address Pool Manager
• Dynamic, variable-size address pool assignment for Multiprotocol Label Switching (MPLS) VPNs
• Broadband aggregation
• Trusted-ID authorization for transparent autologon
• WiMAX support based on NWG stage 3 document
• Other solutions
– Cisco Gateway GPRS Support Node (GGSN) for GPRS mobile wireless
– Cisco Any Service, Any Port (ASAP) solutions
System Requirements
Table 1. Server System Requirements: Large Service Provider Network
Table 2. Server System Requirements: Small Service Provider Network
Note: Service providers with subscriber bases of more than 300,000 fall under the larger service provider network.
Download the Software
Service and Support
For More Information