Proxy Chaining and Policy Implementation in Roaming
نویسندگان
چکیده
Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. 1. Abstract This document describes how proxy chaining and policy implementation can be supported in roaming systems. The mechanisms described in this document are in current use. However, as noted in the security considerations section, the techniques outlined in this document are vulnerable to attack from external parties as well as susceptible to fraud perpetrated by the roaming partners themselves. As a result, such methods are not suitable for wide-scale deployment on the Internet. Network Access Server The Network Access Server (NAS) is the device that clients contact in order to get access to the network. RADIUS server This is a server which provides for authentication/authorization via the protocol described in [3], and for accounting as described in [4]. Aboba & Vollbrecht Informational [Page 1]
منابع مشابه
RFC 2607 Proxy Chaining and Policy in Roaming June 1999 4 . 1
Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. 1. Abstract This document describes how proxy chaining and policy implementation can be supported in roaming systems. The mechanisms described in this document are in current use. However, as noted in the security considerat...
متن کاملProxy Chaining and Policy in Roaming June 1999 4
Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. 1. Abstract This document describes how proxy chaining and policy implementation can be supported in roaming systems. The mechanisms described in this document are in current use. However, as noted in the security considerat...
متن کاملProxy war and US's smart power strategy (the case of Syria, 2011-2016)
Frequent application of the term “proxy war” indicates its prominent place in academic researches on international relations. Separate implementation of soft power and hard power proved to be unsuccessful in recent years. Accordingly, great failures in classic wars increased tendencies towards proxy wars. By the outbreak of Arab Springs in the early 2011, Syria was devastated by different oppo...
متن کاملFree roaming dogs: a threat to public health
Free roaming dogs are increasing in numbers. They live in unhygienic conditions and are not vaccinated mostly. They create several problems in the community, particularly health threats to human. Dog biting is a commonly reported case in some hospitals in Bangladesh. Rabies is one of the killers of people in Bangladesh and transmission occurs mostly due the dog biting. Death commonly occurs in ...
متن کاملInter-Domain Roaming Mechanism Transparent to Mobile Nodes among PMIPv6 Networks
In Proxy Mobile IPv6 (PMIPv6), when a Mobile Node (MN) enters a PMIPv6 domain and attaches to an access link, the router on the access link detects attachment of the MN by the link-layer access. All elements of PMIPv6 including the router then provide network-based mobility management service for the MN. If the MN moves to another router in this PMIPv6 domain, the new router emulates attachment...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- RFC
دوره 2607 شماره
صفحات -
تاریخ انتشار 1999