/diameter/dictionary.xml

https://bitbucket.org/stevexiao/wireshark · XML · 5824 lines · 4791 code · 42 blank · 991 comment · 0 complexity · 12fb609067cfa028f1968eb6d2ee1d0a MD5 · raw file

Large files are truncated click here to view the full file

  1. <?xml version="1.0" encoding="UTF-8"?>
  2. <!-- $Id: dictionary.xml 38835 2011-09-01 04:39:42Z etxrab $ -->
  3. <?type-proto key="MIPRegistrationRequest" value="mip" ?>
  4. <?avp-proto key="Example-AVP" value="data" ?>
  5. <!DOCTYPE dictionary SYSTEM "dictionary.dtd" [
  6. <!ENTITY nasreq SYSTEM "nasreq.xml">
  7. <!ENTITY eap SYSTEM "eap.xml">
  8. <!ENTITY mobileipv4 SYSTEM "mobileipv4.xml">
  9. <!ENTITY chargecontrol SYSTEM "chargecontrol.xml">
  10. <!ENTITY sunping SYSTEM "sunping.xml">
  11. <!ENTITY imscxdx SYSTEM "imscxdx.xml">
  12. <!ENTITY TGPPGmb SYSTEM "TGPPGmb.xml">
  13. <!ENTITY TGPPSh SYSTEM "TGPPSh.xml">
  14. <!ENTITY TGPPRx SYSTEM "TGPPRx.xml">
  15. <!ENTITY sip SYSTEM "sip.xml">
  16. <!ENTITY gqpolicy SYSTEM "gqpolicy.xml">
  17. <!ENTITY etsie2e4 SYSTEM "etsie2e4.xml">
  18. <!ENTITY Ericsson SYSTEM "Ericsson.xml">
  19. <!ENTITY Tango SYSTEM "Tango.xml">
  20. <!ENTITY mobileipv6 SYSTEM "mobileipv6.xml">
  21. <!ENTITY Cisco SYSTEM "Cisco.xml">
  22. <!ENTITY Vodafone SYSTEM "Vodafone.xml">
  23. ]>
  24. <dictionary>
  25. <base uri="http://www.ietf.org/rfc/rfc3588.txt">
  26. <!--
  27. $Log: dictionary.xml,v $
  28. Revision 1.1 2001/11/01 21:52:44 guy
  29. From David Frascone: duUpdate to Diameter dissector to load the
  30. dictionary as an XML file rather than building it in, and various
  31. Diameter updates.
  32. Revision 1.8 2008/01/06 02:49:24 grzegorz Added missing RFC 3588
  33. AVP 299 by Grzegorz Szczytowski
  34. Revision 1.7 2001/08/24 18:03:24 chaos
  35. Mark's Changes
  36. Revision 1.6 2001/07/31 19:13:55 chaos
  37. Missed a couple of MIP AVPs
  38. Revision 1.5 2001/07/31 19:09:22 chaos
  39. Added Mobile-Ip and Sun Ping Extension
  40. Revision 1.4 2001/07/31 17:43:25 chaos
  41. Oops, forgot to turn on validity checking. Fixed some errors found with validity checking turned on
  42. Revision 1.3 2001/07/31 16:56:31 chaos
  43. Added commands, and validated with xmllint
  44. Revision 1.2 2001/07/31 16:29:34 chaos
  45. Checking in some changes to verify log and ident strings
  46. -->
  47. <!-- *********************** Commands ***************************** -->
  48. <!-- Diameter Base Protocol Command Codes -->
  49. <!-- 0-255 RADIUS compatibility codes [http://www.iana.org/assignments/radius-types] -->
  50. <!--256 Unassigned -->
  51. <command name="Capabilities-Exchange" code="257" vendor-id="None"/>
  52. <command name="Re-Auth" code="258" vendor-id="None"/>
  53. <!-- 259 Unassigned
  54. 260 AMR / AMA [RFC4004] mobileipv4.xml
  55. 261 Unassigned
  56. 262 HAR / HAA [RFC4004] mobileipv4.xml
  57. 263-264 Unassigned
  58. 265 AAR / AAA [RFC4005] nasreq.xml
  59. 266-267 Unassigned
  60. 268 DER / DEA [RFC4072] eap.xml
  61. 269-270 Unassigned
  62. -->
  63. <command name="Accounting" code="271" vendor-id="None"/>
  64. <!-- 272 CCR / CCA [RFC4006] chargecontrol.xml
  65. 273 Unassigned
  66. -->
  67. <command name="Abort-Session" code="274" vendor-id="None"/>
  68. <command name="Session-Termination" code="275" vendor-id="None"/>
  69. <!--276-279 Unassigned -->
  70. <command name="Device-Watchdog" code="280" vendor-id="None"/>
  71. <command name="Disconnect-Peer" code="282" vendor-id="None"/>
  72. <!--283 UAR / UAA [RFC4740] sip.xml
  73. 284 SAR / SAA [RFC4740] sip.xml
  74. 285 LIR / LIA [RFC4740] sip.xml
  75. 286 MAR / MAA [RFC4740] sip.xml
  76. 287 RTR / RTA [RFC4740] sip.xml
  77. 288 PPR / PPA [RFC4740] sip.xml
  78. 289-299 Unassigned
  79. 300-313 Allocated for 3GPP [RFC3589]
  80. imscxdx.xml ( 300 - 305 )
  81. 300 User-Authorization-Request/-Answer UAR/UAA 29.229 [2]
  82. 301 Server-Assignment-Request/-Answer SAR/SAA
  83. 302 Location-Info-Request/-Answer LIR/LIA
  84. 303 Multimedia-Auth-Request/-Answer MAR/MAA
  85. 304 Registration-Termination-Request/-Answer RTR/RTA
  86. 305 Push-Profile-Request/-Answer PPR/PPA
  87. TGPPSh.xml ( 306 - 309 )
  88. 306 User-Data-Request/-Answer UDR/UDA
  89. 307 Profile-Update-Request/-Answer PUR/PUA
  90. 308 Subscribe-Notifications-Request/-Answer SNR/SNA
  91. 309 Push-Notification-Request/-Answer PNR/PNA
  92. -->
  93. <command name="Boostrapping-Info" code="310" vendor-id="None"/> <!-- BIR/BIA 29.109 [7] -->
  94. <command name="Message-Process" code="311" vendor-id="None"/> <!-- MPR/MPA 29.140 [16] -->
  95. <command name="GBAPush-Info" code="312" vendor-id="None"/> <!-- GPR/GPI 29.109 [7] -->
  96. <!-- 313 (Not used yet) -->
  97. <command name="Policy-Data" code="314" vendor-id="None"/> <!-- PDR / PDA [RFC5224] -->
  98. <command name="Policy-Install" code="315" vendor-id="None"/> <!-- (PIA) [ITU-T Rec. Q.3303.3][RFC5431] -->
  99. <!-- http://www.3gpp.org/ftp/Specs/html-info/29272.htm -->
  100. <command name="3GPP-Update-Location" code="316" vendor-id="None"/>
  101. <command name="3GPP-Cancel-Location" code="317" vendor-id="None"/> <!--[3GPP TS 29.272][RFC5516] -->
  102. <command name="3GPP-Authentication-Information" code="318" vendor-id="None"/> <!--[3GPP TS 29.272][RFC5516] -->
  103. <command name="3GPP-Insert-Subscriber-Data" code="319" vendor-id="None"/> <!--[3GPP TS 29.272][RFC5516] -->
  104. <command name="3GPP-Delete-Subscriber-Data" code="320" vendor-id="None"/> <!--[3GPP TS 29.272][RFC5516] -->
  105. <command name="3GPP-Purge-UE" code="321" vendor-id="None"/> <!--[3GPP TS 29.272][RFC5516] -->
  106. <command name="3GPP-Reset" code="322" vendor-id="None"/> <!--[3GPP TS 29.272][RFC5516] -->
  107. <command name="3GPP-Notify" code="323" vendor-id="None"/> <!--[3GPP TS 29.272][RFC5516] -->
  108. <command name="3GPP-ME-Identity-Check" code="324" vendor-id="None"/> <!--(ECR/ECA) [3GPP TS 29.272][RFC5516] -->
  109. <command name="MIP6" code="325" vendor-id="None"/> <!--(MIR/MIA) [RFC5778] -->
  110. <command name="QoS-Authorization" code="326" vendor-id="None"/> <!--(QAR/QAA) [RFC-ietf-dime-diameter-qos-15] -->
  111. <command name="QoS-Install" code="327" vendor-id="None"/> <!--(QIR/QIA) [RFC-ietf-dime-diameter-qos-15] -->
  112. <!--
  113. 328-8388607 Unassigned
  114. 8388608 WIMAX-HRPD-SFF Request/Answer [http://www.3gpp2.org/Public_html/specs/tsgx.cfm][3GPP2 X.S0058-0 v1.0][Avi_Lior]
  115. 8388609 WiMAX-Diameter-EAP-Request/Answer (WDER/WDEA) WDE [http://www.wimaxforum.org/resources/documents/technical/T33][WiMAX Release 1.5][Avi_Lior]
  116. 8388610 WiMAX-Change-of-Authorization-Request/Answer (WCAR/WCAA) WCA [http://www.wimaxforum.org/resources/documents/technical/T33][WiMAX Release 1.5][Avi_Lior]
  117. 8388611 WiMAX-Reauthentication-Request/Answer (WRAR/WRAA) WRA [http://www.wimaxforum.org/resources/documents/technical/T33][WiMAX Release 1.5][Avi_Lior]
  118. 8388612 WiMAX-Session-Termination-Request/Answer (WSTR/WSTA) WST [http://www.wimaxforum.org/resources/documents/technical/T33][WiMAX Release 1.5][Avi_Lior]
  119. 8388613 WiMAX-Abort-Session-Request/Answer (WASR/WASA) WAS [http://www.wimaxforum.org/resources/documents/technical/T33][WiMAX Release 1.5][Avi_Lior]
  120. 8388614 WiMAX-Home-Agent-IPv4-Request/Answer (WHA4R/WHA4A) WHA4 [http://www.wimaxforum.org/resources/documents/technical/T33][WiMAX Release 1.5][Avi_Lior]
  121. 8388615 WiMAX-Home-Agent-IPv6-Request/Answer (WHA6R/WHA6A) WHA6 [http://www.wimaxforum.org/resources/documents/technical/T33][WiMAX Release 1.5][Avi_Lior]
  122. 8388616 WiMAX-DHCP-Request/Answer (WDHCPR/WDHCPA) WDHCP [http://www.wimaxforum.org/resources/documents/technical/T33][WiMAX Release 1.5][Avi_Lior]
  123. 8388617 WiMAX-LAA-Request/Answer (WLAAR/WLAA) WLAA [http://www.wimaxforum.org/resources/documents/technical/T33][WiMAX Release 1.5][Avi_Lior]
  124. 8388618 WiMAX-Location-Accounting-Request/Answer (WLACR/WLACA) WLAC [http://www.wimaxforum.org/resources/documents/technical/T33][WiMAX Release 1.5][Avi_Lior]
  125. 8388619 WiMAX-Location-Measurement-Query-Request/Answer (WLMQR/WLMQA) WLMQ [http://www.wimaxforum.org/resources/documents/technical/T33][WiMAX Release 1.5][Avi_Lior]
  126. -->
  127. <command name="3GPP-Provide-Location" code="8388620" vendor-id="None"/> <!--(PLR/PLA) [http://www.3gpp.org/ftp/Specs/][3GPP TS 29.172 -->
  128. <command name="3GPP-Location-Report" code="8388621" vendor-id="None"/> <!--(PLR/PLA) [http://www.3gpp.org/ftp/Specs/][3GPP TS 29.172 -->
  129. <command name="3GPP-LCS-Routing-Info" code="8388622" vendor-id="None"/> <!--(PLR/PLA) [http://www.3gpp.org/ftp/Specs/][3GPP TS 29.172 -->
  130. <!--
  131. 8388623-16777213 Unassigned
  132. 16777214 Experimental code [RFC3588]
  133. 16777215 Experimental code [RFC3588]
  134. -->
  135. <!-- ********************** End Commands ************************** -->
  136. <!-- ************************* Vendors **************************** -->
  137. <vendor vendor-id="None" code="0" name="None"/>
  138. <vendor vendor-id="HP" code="11" name="Hewlett Packard"/>
  139. <vendor vendor-id="Merit" code="61" name="Merit Networks"/>
  140. <vendor vendor-id="Sun" code="42" name="Sun Microsystems, Inc."/>
  141. <vendor vendor-id="USR" code="429" name="US Robotics Corp."/>
  142. <vendor vendor-id="Cisco" code="5771" name="Cisco"/>
  143. <vendor vendor-id="TGPP2" code="5535" name="3GPP2"/>
  144. <vendor vendor-id="TGPP" code="10415" name="3GPP"/>
  145. <vendor vendor-id="TGPPCX" code="16777216" name="3GPP CX/DX"/>
  146. <vendor vendor-id="Ericsson" code="193" name="Ericsson"/>
  147. <vendor vendor-id="ETSI" code="13019" name="ETSI"/>
  148. <vendor vendor-id="Vodafone" code="12645" name="Vodafone"/>
  149. <vendor vendor-id="Deutsche_Telekom_AG" code="2937" name="Deutsche Telekom AG"/>
  150. <vendor vendor-id="Tango" code="13421" name="Tango Telecom Limited"/>
  151. <!-- *********************** End Vendors ************************** -->
  152. <!-- ************************ typedefn's ************************** -->
  153. <typedefn type-name="OctetString"/>
  154. <!--
  155. The data contains arbitrary data of variable length. Unless
  156. otherwise noted, the AVP Length field MUST be set to at least 9
  157. (13 if the 'V' bit is enabled). Data used to transmit (human
  158. readable) character string data uses the UTF-8 [24] character
  159. set and is NOT NULL-terminated. The minimum Length field MUST
  160. be 9, but can be set to any value up to 65504 bytes. AVP Values
  161. of this type that do not align on a 32-bit boundary MUST have
  162. the necessary padding.
  163. -->
  164. <typedefn type-name="UTF8String" type-parent="OctetString"/>
  165. <!--
  166. The UTF8String format is derived from the OctetString AVP Base
  167. Format. This is a human readable string represented using the
  168. ISO/IEC IS 10646-1 character set, encoded as an OctetString
  169. using the UTF-8 [29] transformation format described in RFC
  170. 2279.
  171. Since additional code points are added by amendments to the
  172. 10646 standard from time to time, implementations MUST be
  173. prepared to encounter any code point from 0x00000001 to
  174. 0x7fffffff. Byte sequences that do not correspond to the valid
  175. UTF-8 encoding of a code point or are outside this range are
  176. prohibited. Note that since a code point of 0x00000000 is
  177. prohibited, no octet will contain a value of 0x00.
  178. The use of control codes SHOULD be avoided. When it is
  179. necessary to represent a newline, the control code sequence CR
  180. LF SHOULD be used.
  181. The use of leading or trailing white space SHOULD be avoided.
  182. For code points not directly supported by user interface
  183. hardware or software, an alternative means of entry and
  184. display, such as hexadecimal, MAY be provided.
  185. For information encoded in 7-bit US-ASCII, the UTF-8 encoding
  186. is identical to the US-ASCII encoding.
  187. UTF-8 may require multiple bytes to represent a single
  188. character / code point; thus the length of a UTF8String in
  189. octets may be different from the number of characters encoded.
  190. Note that the size of an UTF8String is measured in octets, not
  191. characters.
  192. The UTF8String MUST not contain any octets with a value of
  193. zero.
  194. -->
  195. <typedefn type-name="IPAddress" type-parent="OctetString"/>
  196. <!--
  197. The IPAddress format is derived from the OctetString AVP Base
  198. Format. It represents 32 bit (IPv4) [17] or 128 bit (IPv6) [16]
  199. address, most significant octet first. The format of the
  200. address (IPv4 or IPv6) is determined by the length. If the
  201. attribute value is an IPv4 address, the AVP Length field MUST
  202. be 12 (16 if 'V' bit is enabled), otherwise the AVP Length
  203. field MUST be set to 24 (28 if the 'V' bit is enabled) for IPv6
  204. addresses.
  205. -->
  206. <typedefn type-name="DiameterIdentity" type-parent="OctetString"/>
  207. <!--
  208. The DiameterIdentity format is derived from the OctetString AVP
  209. Base Format. It uses the UTF-8 encoding and has the same
  210. requirements as the UTF8String. In addition, it must follow
  211. the Uniform Resource Identifiers (URI) syntax [29] rules
  212. specified below:
  213. Diameter-Identity = fqdn [ port ] [ transport ]
  214. [ protocol ]
  215. aaa-protocol = ( "diameter" | "radius" | "tacacs+" )
  216. protocol = ";protocol=" aaa-protocol
  217. ; If absent, the default AAA protocol
  218. ; is diameter.
  219. fqdn = Fully Qualified Host Name
  220. port = ":" 1*DIGIT
  221. ; One of the ports used to listen for
  222. ; incoming connections. ; If absent,
  223. ; the default Diameter port (TBD) is
  224. ; assumed.
  225. transport-protocol = ( "tcp" | "sctp" | "udp" )
  226. transport = ";transport=" transport-protocol
  227. ; One of the transports used to listen
  228. ; for incoming connections. If absent,
  229. ; the default SCTP [26] protocol is
  230. ; assumed. UDP MUST NOT be used when
  231. ; the aaa-protocol field is set to
  232. ; diameter.
  233. The following are examples of valid Diameter host
  234. identities:
  235. host.abc.com;transport=tcp
  236. host.abc.com:6666;transport=tcp
  237. aaa://host.abc.com;protocol=diameter
  238. aaa://host.abc.com:6666;protocol=diameter
  239. aaa://host.abc.com:6666;transport=tcp;protocol=diameter
  240. aaa://host.abc.com:1813;transport=udp;protocol=radius
  241. Since multiple Diameter processes on a single host cannot
  242. listen for incoming connections on the same port on a given
  243. protocol, the DiameterIdentity is guaranteed to be unique per
  244. host.
  245. A Diameter node MAY advertise different identities on each
  246. connection, via the CER and CEA's Origin-Host AVP, but the same
  247. identity MUST be used throughout the duration of a connection.
  248. When comparing AVPs of this format, it is necessary to add any
  249. absent fields with the default values prior to the comparison.
  250. For example, diameter-host.abc.com would be expanded to
  251. aaa://diameter/diameter-host.abc.com:TBD;protocol=sctp.
  252. -->
  253. <typedefn type-name="IPFilterRule" type-parent="OctetString"/>
  254. <!--
  255. The IPFilterRule format is derived from the OctetString AVP
  256. Base Format. It uses the UTF-8 encoding and has the same
  257. requirements as the UTF8String. Packets may be filtered based
  258. on the following information that is associated with it:
  259. Direction (in or out)
  260. Source and destination IP address (possibly masked)
  261. Protocol
  262. Source and destination port (lists or ranges)
  263. TCP flags
  264. IP fragment flag
  265. IP options
  266. ICMP types
  267. Rules for the appropriate direction are evaluated in order,
  268. with the first matched rule terminating the evaluation. Each
  269. packet is evaluated once. If no rule matches, the packet is
  270. dropped if the last rule evaluated was a permit, and passed if
  271. the last rule was a deny.
  272. IPFilterRule filters MUST follow the format:
  273. action dir proto from src to dst [options]
  274. action permit - Allow packets that match the rule.
  275. deny - Drop packets that match the rule.
  276. dir "in" is from the terminal, "out" is to the
  277. terminal.
  278. proto An IP protocol specified by number. The "ip"
  279. keyword means any protocol will match.
  280. src and dst <address/mask> [ports]
  281. The <address/mask> may be specified as:
  282. ipno An IPv4 or IPv6 number in dotted-
  283. quad or canonical IPv6 form. Only
  284. this exact IP number will match the
  285. rule.
  286. ipno/bits An IP number as above with a mask
  287. width of the form 1.2.3.4/24. In
  288. this case all IP numbers from
  289. 1.2.3.0 to 1.2.3.255 will match.
  290. The bit width MUST be valid for the
  291. IP version and the IP number MUST
  292. NOT have bits set beyond the mask.
  293. The sense of the match can be inverted by
  294. preceding an address with the not modifier,
  295. causing all other addresses to be matched
  296. instead. This does not affect the selection of
  297. port numbers.
  298. The keyword "any" is 0.0.0.0/0 or the IPv6
  299. equivalent. The keyword "assigned" is the
  300. address or set of addresses assigned to the
  301. terminal. The first rule SHOULD be "deny in
  302. ip !assigned".
  303. With the TCP, UDP and SCTP protocols, optional
  304. ports may be specified as:
  305. {port|port-port}[,port[,...]]
  306. The `-' notation specifies a range of ports
  307. (including boundaries).
  308. Fragmented packets which have a non-zero offset
  309. (i.e. not the first fragment) will never match
  310. a rule which has one or more port
  311. specifications. See the frag option for
  312. details on matching fragmented packets.
  313. options:
  314. frag Match if the packet is a fragment and this is not
  315. the first fragment of the datagram. frag may not
  316. be used in conjunction with either tcpflags or
  317. TCP/UDP port specifications.
  318. ipoptions spec
  319. Match if the IP header contains the comma
  320. separated list of options specified in spec. The
  321. supported IP options are:
  322. ssrr (strict source route), lsrr (loose source
  323. route), rr (record packet route) and ts
  324. (timestamp). The absence of a particular option
  325. may be denoted with a `!'.
  326. tcpoptions spec
  327. Match if the TCP header contains the comma
  328. separated list of options specified in spec. The
  329. supported TCP options are:
  330. mss (maximum segment size), window (tcp window
  331. advertisement), sack (selective ack), ts (rfc1323
  332. timestamp) and cc (rfc1644 t/tcp connection
  333. count). The absence of a particular option may
  334. be denoted with a `!'.
  335. established
  336. TCP packets only. Match packets that have the RST
  337. or ACK bits set.
  338. setup TCP packets only. Match packets that have the SYN
  339. bit set but no ACK bit.
  340. tcpflags spec
  341. TCP packets only. Match if the TCP header
  342. contains the comma separated list of flags
  343. specified in spec. The supported TCP flags are:
  344. fin, syn, rst, psh, ack and urg. The absence of a
  345. particular flag may be denoted with a `!'. A rule
  346. which contains a tcpflags specification can never
  347. match a fragmented packet which has a non-zero
  348. offset. See the frag option for details on
  349. matching fragmented packets.
  350. icmptypes types
  351. ICMP packets only. Match if the ICMP type is in
  352. the list types. The list may be specified as any
  353. combination of ranges or individual types
  354. separated by commas. The supported ICMP types
  355. are:
  356. echo reply (0), destination unreachable (3),
  357. source quench (4), redirect (5), echo request
  358. (8), router advertisement (9), router
  359. solicitation (10), time-to-live exceeded (11), IP
  360. header bad (12), timestamp request (13),
  361. timestamp reply (14), information request (15),
  362. information reply (16), address mask request (17)
  363. and address mask reply (18).
  364. There is one kind of packet that the access device MUST always
  365. discard, that is an IP fragment with a fragment offset of one.
  366. This is a valid packet, but it only has one use, to try to
  367. circumvent firewalls.
  368. An access device that is unable to interpret or apply a deny
  369. rule MUST terminate the session. An access device that is
  370. unable to interpret or apply a permit rule MAY apply a more
  371. restrictive rule. An access device MAY apply deny rules of
  372. its own before the supplied rules, for example to protect
  373. the access device owner's infrastructure.
  374. The rule syntax is a modified subset of ipfw(8) from FreeBSD,
  375. and the ipfw.c code may provide a useful base for
  376. implementations.
  377. -->
  378. <typedefn type-name="QOSFilterRule" type-parent="OctetString"/>
  379. <!--
  380. The QosFilterRule format is derived from the OctetString AVP
  381. Base Format. It uses the UTF-8 encoding and has the same
  382. requirements as the UTF8String. Packets may be marked or
  383. metered based on the following information that is associated
  384. with it:
  385. Direction (in or out)
  386. Source and destination IP address (possibly masked)
  387. Protocol
  388. Source and destination port (lists or ranges)
  389. DSCP values (no mask or range)
  390. Rules for the appropriate direction are evaluated in order,
  391. with the first matched rule terminating the evaluation. Each
  392. packet is evaluated once. If no rule matches, the packet is
  393. treated as best effort.
  394. QoSFilterRule filters MUST follow the format:
  395. action dir proto from src to dst [options]
  396. tag - Mark packet with a specific DSCP [49].
  397. The DSCP option MUST be included.
  398. meter - Meter traffic. The metering options
  399. MUST be included.
  400. dir "in" is from the terminal, "out" is to the
  401. terminal.
  402. proto An IP protocol specified by number. The "ip"
  403. keyword means any protocol will match.
  404. src and dst <address/mask> [ports]
  405. The <address/mask> may be specified as:
  406. ipno An IPv4 or IPv6 number in dotted-
  407. quad or canonical IPv6 form. Only
  408. this exact IP number will match the
  409. rule.
  410. ipno/bits An IP number as above with a mask
  411. width of the form 1.2.3.4/24. In
  412. this case all IP numbers from
  413. 1.2.3.0 to 1.2.3.255 will match.
  414. The bit width MUST be valid for the
  415. IP version and the IP number MUST
  416. NOT have bits set beyond the mask.
  417. The sense of the match can be inverted by
  418. preceding an address with the not modifier,
  419. causing all other addresses to be matched
  420. instead. This does not affect the selection of
  421. port numbers.
  422. The keyword "any" is 0.0.0.0/0 or the IPv6
  423. equivalent. The keyword "assigned" is the
  424. address or set of addresses assigned to the
  425. terminal. The first rule SHOULD be "deny in
  426. ip !assigned".
  427. With the TCP, UDP and SCTP protocols, optional
  428. ports may be specified as:
  429. {port|port-port}[,port[,...]]
  430. The `-' notation specifies a range of ports
  431. (including boundaries).
  432. options:
  433. DSCP <color>
  434. color values as defined in [49]. Exact matching
  435. of DSCP values is required (no masks or ranges).
  436. the "deny" can replace the color_under or
  437. color_over values in the meter action for rate-
  438. dependent packet drop.
  439. metering <rate> <color_under> <color_over>
  440. The metering option provides Assured Forwarding,
  441. as defined in [50], and MUST be present if the
  442. action is set to meter. The rate option is the
  443. throughput, in bits per second, which is used by
  444. the access device to mark packets. Traffic above
  445. the rate is marked with the color_over codepoint,
  446. while traffic under the rate is marked with the
  447. color_under codepoint. The color_under and
  448. color_over options contain the drop preferences,
  449. and MUST conform to the recommended codepoint
  450. keywords described in [50] (e.g. AF13).
  451. The metering option also supports the strict
  452. limit on traffic required by Expedited
  453. Forwarding, as defined in [51]. The color_over
  454. option may contain the keyword "drop" to prevent
  455. forwarding of traffic that exceeds the rate
  456. parameter.
  457. The rule syntax is a modified subset of ipfw(8) from FreeBSD,
  458. and the ipfw.c code may provide a useful base for
  459. implementations.
  460. -->
  461. <typedefn type-name="MIPRegistrationRequest" type-parent="OctetString"/>
  462. <typedefn type-name="Integer32"/>
  463. <!--
  464. 32 bit signed value, in network byte order. The AVP Length
  465. field MUST be set to 12 (16 if the 'V' bit is enabled).
  466. -->
  467. <typedefn type-name="VendorId" type-parent="Unsigned32"/>
  468. <typedefn type-name="AppId" type-parent="Integer32"/>
  469. <typedefn type-name="Integer64"/>
  470. <!--
  471. 64 bit signed value, in network byte order. The AVP Length
  472. field MUST be set to 16 (20 if the 'V' bit is enabled).
  473. -->
  474. <typedefn type-name="Unsigned32"/>
  475. <!--
  476. 32 bit unsigned value, in network byte order. The AVP Length
  477. field MUST be set to 12 (16 if the 'V' bit is enabled).
  478. Unsigned32 values used to transmit time data contains the four
  479. most significant octets returned from NTP [18], in network byte
  480. order.
  481. -->
  482. <typedefn type-name="Time"/>
  483. <!--
  484. The Time format is derived from the Unsigned32 AVP Base Format.
  485. This is 32 bit unsigned value containing the four most
  486. significant octets returned from NTP [18], in network byte
  487. order.
  488. This represent the number of seconds since 0h on 1 January 1900
  489. with respect to the Coordinated Universal Time (UTC).
  490. On 6h 28m 16s UTC, 7 February 2036 the time value will
  491. overflow. NTP [18] describes a procedure to extend the time to
  492. 2104.
  493. -->
  494. <typedefn type-name="Unsigned64"/>
  495. <!--
  496. 64 bit unsigned value, in network byte order. The AVP Length
  497. field MUST be set to 16 (20 if the 'V' bit is enabled).
  498. -->
  499. <typedefn type-name="Enumerated" type-parent="Integer32"/>
  500. <typedefn type-name="DiameterURI" type-parent="UTF8String"/>
  501. <!-- ************************* End Typedefns ************************ -->
  502. <!-- ******************* RADIUS AVPS ************************ -->
  503. <!-- http://www.iana.org/assignments/aaa-parameters -->
  504. <!-- 1-255 Radius attributes [RAD-IANA] -->
  505. <avp name="User-Name" code="1" mandatory="must">
  506. <type type-name="UTF8String"/>
  507. </avp>
  508. <avp name="User-Password" code="2" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  509. <type type-name="OctetString"/>
  510. </avp>
  511. <avp name="CHAP-Password" code="3" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  512. <type type-name="OctetString"/>
  513. </avp>
  514. <avp name="NAS-IP-Address" code="4" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  515. <type type-name="OctetString"/>
  516. </avp>
  517. <avp name="NAS-Port" code="5" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  518. <type type-name="Unsigned32"/>
  519. </avp>
  520. <avp name="Service-Type" code="6" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  521. <type type-name="Enumerated"/>
  522. <enum name="Unknown" code="0"/>
  523. <enum name="Login" code="1"/>
  524. <enum name="Framed" code="2"/>
  525. <enum name="Callback-Login" code="3"/>
  526. <enum name="Callback-Framed" code="4"/>
  527. <enum name="Outbound" code="5"/>
  528. <enum name="Administrative" code="6"/>
  529. <enum name="NAS-Prompt" code="7"/>
  530. <enum name="Authenticate-Only" code="8"/>
  531. <enum name="Callback-NAS-Prompt" code="9"/>
  532. <enum name="Call Check" code="10"/>
  533. <enum name="Callback Administrative" code="11"/>
  534. <enum name="Voice" code="12"/>
  535. <enum name="Fax" code="13"/>
  536. <enum name="Modem Relay" code="14"/>
  537. <enum name="IAPP-Register" code="15"/>
  538. <enum name="IAPP-AP-Check" code="16"/>
  539. <enum name="Authorize Only" code="17"/>
  540. <enum name="Framed-Management" code="18"/>
  541. </avp>
  542. <avp name="Framed-Protocol" code="7" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  543. <type type-name="Enumerated"/>
  544. <enum name="PPP" code="1"/>
  545. <enum name="SLIP" code="2"/>
  546. <enum name="ARAP" code="3"/>
  547. <enum name="Gandalf" code="4"/>
  548. <enum name="Xylogics" code="5"/>
  549. <enum name="X.75" code="6"/>
  550. <enum name="GPRS PDP Context" code="7"/>
  551. <enum name="Ascend-ARA" code="255"/>
  552. <enum name="MPP" code="256"/>
  553. <enum name="EURAW" code="257"/>
  554. <enum name="EUUI" code="258"/>
  555. <enum name="X25" code="259"/>
  556. <enum name="COMB" code="260"/>
  557. <enum name="FR" code="261"/>
  558. </avp>
  559. <avp name="Framed-IP-Address" code="8" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  560. <type type-name="IPAddress"/>
  561. </avp>
  562. <avp name="Framed-IP-Netmask" code="9" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  563. <type type-name="IPAddress"/>
  564. </avp>
  565. <avp name="Framed-Routing" code="10" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  566. <type type-name="Enumerated"/>
  567. <enum name="None" code="0"/>
  568. <enum name="Send routing packets" code="1"/>
  569. <enum name="Listen for routing packets" code="2"/>
  570. <enum name="Send and Listen " code="3"/>
  571. </avp>
  572. <avp name="Filter-Id" code="11" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  573. <type type-name="UTF8String"/>
  574. </avp>
  575. <avp name="Framed-MTU" code="12" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  576. <type type-name="Unsigned32"/>
  577. </avp>
  578. <avp name="Framed-Compression" code="13" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  579. <type type-name="Enumerated"/>
  580. <enum name="None" code="0"/>
  581. <enum name="Van Jacobson TCP/IP header compression" code="1"/>
  582. <enum name="IPX header compression" code="2"/>
  583. <enum name="Stac-LZS compression" code="3"/>
  584. </avp>
  585. <avp name="Login-IP-Host" code="14" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  586. <type type-name="IPAddress"/>
  587. </avp>
  588. <avp name="Login-Service" code="15" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  589. <type type-name="Enumerated"/>
  590. <enum name="Telnet" code="0"/>
  591. <enum name="Rlogin" code="1"/>
  592. <enum name="TCP-Clear" code="2"/>
  593. <enum name="PortMaster" code="3"/>
  594. <enum name="LAT" code="4"/>
  595. <enum name="X25-PAD" code="5"/>
  596. <enum name="X25-T3POS" code="6"/>
  597. <enum name="Unassigned" code="7"/>
  598. <enum name="TCP Clear Quiet (suppresses any NAS-generated connect string)" code="8"/>
  599. </avp>
  600. <avp name="Login-TCP-Port" code="16" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  601. <type type-name="Unsigned32"/>
  602. </avp>
  603. <!-- 17 Unassigned -->
  604. <avp name="Unassigned" code="17" mandatory="may">
  605. <type type-name="OctetString"/>
  606. </avp>
  607. <avp name="Reply-Message" code="18" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  608. <type type-name="UTF8String"/>
  609. </avp>
  610. <avp name="Callback-Number" code="19" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  611. <type type-name="UTF8String"/>
  612. </avp>
  613. <avp name="Callback-Id" code="20" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  614. <type type-name="UTF8String"/>
  615. </avp>
  616. <!-- 21 Unassigned -->
  617. <avp name="Unassigned" code="21" mandatory="may">
  618. <type type-name="OctetString"/>
  619. </avp>
  620. <avp name="Framed-Route" code="22" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  621. <type type-name="UTF8String"/>
  622. </avp>
  623. <avp name="Framed-IPX-Network" code="23" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  624. <type type-name="UTF8String"/>
  625. </avp>
  626. <avp name="State" code="24" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  627. <type type-name="OctetString"/>
  628. </avp>
  629. <avp name="Class" code="25" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  630. <type type-name="OctetString"/>
  631. </avp>
  632. <avp name="Vendor-Specific" code="26" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  633. <type type-name="Unsigned32"/>
  634. <!-- Should vendors be enum'ed? -->
  635. </avp>
  636. <avp name="Session-Timeout" code="27" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  637. <type type-name="Unsigned32"/>
  638. </avp>
  639. <avp name="Idle-Timeout" code="28" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  640. <type type-name="Unsigned32"/>
  641. </avp>
  642. <avp name="Termination-Action" code="29" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  643. <type type-name="Unsigned32"/>
  644. <enum name="Default" code="0"/>
  645. <enum name="RADIUS-Request" code="1"/>
  646. </avp>
  647. <avp name="Called-Station-Id" code="30" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  648. <type type-name="UTF8String"/>
  649. </avp>
  650. <avp name="Calling-Station-Id" code="31" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  651. <type type-name="UTF8String"/>
  652. </avp>
  653. <avp name="NAS-Identifier" code="32" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  654. <type type-name="OctetString"/>
  655. </avp>
  656. <avp name="Proxy-State" code="33" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  657. <type type-name="OctetString"/>
  658. </avp>
  659. <avp name="Login-LAT-Service" code="34" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  660. <type type-name="OctetString"/>
  661. </avp>
  662. <avp name="Login-LAT-Node" code="35" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  663. <type type-name="OctetString"/>
  664. </avp>
  665. <avp name="Login-LAT-Group" code="36" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  666. <type type-name="OctetString"/>
  667. </avp>
  668. <avp name="Framed-AppleTalk-Link" code="37" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  669. <type type-name="Unsigned32"/>
  670. </avp>
  671. <avp name="Framed-AppleTalk-Network" code="38" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  672. <type type-name="Unsigned32"/>
  673. </avp>
  674. <avp name="Framed-AppleTalk-Zone" code="39" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  675. <type type-name="OctetString"/>
  676. </avp>
  677. <avp name="Acct-Status-Type" code="40">
  678. <type type-name="Unsigned32"/>
  679. <enum name="Start" code="1"/>
  680. <enum name="Stop" code="2"/>
  681. <enum name="Interim-Update" code="3"/>
  682. <enum name="Modem-Start" code="4"/>
  683. <enum name="Modem-Stop" code="5"/>
  684. <enum name="Cancel" code="6"/>
  685. <enum name="Accounting-On" code="7"/>
  686. <enum name="Accounting-Off" code="8"/>
  687. <!-- 9-14 Reserved for Tunnel Accounting -->
  688. <enum name="Tunnel-Start" code="9"/>
  689. <enum name="Tunnel-Stop" code="10"/>
  690. <enum name="Tunnel-Reject" code="11"/>
  691. <enum name="Tunnel-Link-Start" code="12"/>
  692. <enum name="Tunnel-Link-Stop" code="13"/>
  693. <enum name="Tunnel-Link-Rejectf" code="14"/>
  694. <!-- 15 Reserved for Tunnel Failed -->
  695. <enum name="Failed" code="15"/>
  696. </avp>
  697. <avp name="Acct-Delay-Time" code="41" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  698. <type type-name="Unsigned32"/>
  699. </avp>
  700. <avp name="Acct-Input-Octets" code="42" mandatory="may">
  701. <type type-name="Unsigned32"/>
  702. </avp>
  703. <avp name="Acct-Output-Octets" code="43" mandatory="may">
  704. <type type-name="Unsigned32"/>
  705. </avp>
  706. <avp name="Acct-Session-Id" code="44" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  707. <type type-name="OctetString"/>
  708. <!-- See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5411 -->
  709. </avp>
  710. <avp name="Acct-Authentic" code="45" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  711. <type type-name="Enumerated"/>
  712. <enum name="None" code="0"/>
  713. <enum name="RADIUS" code="1"/>
  714. <enum name="Local" code="2"/>
  715. <enum name="Remote" code="3"/>
  716. <enum name="Diameter" code="4"/>
  717. </avp>
  718. <avp name="Acct-Session-Time" code="46" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  719. <type type-name="Unsigned32"/>
  720. </avp>
  721. <avp name="Acct-Input-Packets" code="47" mandatory="may">
  722. <type type-name="Integer32"/>
  723. </avp>
  724. <avp name="Acct-Output-Packets" code="48" mandatory="may">
  725. <type type-name="Integer32"/>
  726. </avp>
  727. <avp name="Acct-Terminate-Cause" code="49">
  728. <type type-name="Unsigned32"/>
  729. <enum name="User-Request" code="1"/>
  730. <enum name="Lost-Carrier" code="2"/>
  731. <enum name="Lost-Service" code="3"/>
  732. <enum name="Idle-Timeout" code="4"/>
  733. <enum name="Session-Timeout" code="5"/>
  734. <enum name="Admin-Reset" code="6"/>
  735. <enum name="Admin-Reboot" code="7"/>
  736. <enum name="Port-Error" code="8"/>
  737. <enum name="NAS-Error" code="9"/>
  738. <enum name="NAS-Request" code="10"/>
  739. <enum name="NAS-Reboot" code="11"/>
  740. <enum name="Port-Unneeded" code="12"/>
  741. <enum name="Port-Preempted" code="13"/>
  742. <enum name="Port-Suspended" code="14"/>
  743. <enum name="Service-Unavailable" code="15"/>
  744. <enum name="Callback" code="16"/>
  745. <enum name="User-Error" code="17"/>
  746. <enum name="Host-Request" code="18"/>
  747. <enum name="Supplicant Restart" code="19"/>
  748. <enum name="Reauthentication Failure" code="20"/>
  749. <enum name="Port Reinitialized" code="21"/>
  750. <enum name="Port Administratively Disabled" code="22"/>
  751. </avp>
  752. <avp name="Accounting-Multi-Session-Id" code="50" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  753. <type type-name="OctetString"/>
  754. </avp>
  755. <avp name="Acct-Link-Count" code="51" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  756. <type type-name="Unsigned32"/>
  757. </avp>
  758. <avp name="Acct-Input-Gigawords" code="52" mandatory="may">
  759. <type type-name="Integer32"/>
  760. </avp>
  761. <avp name="Acct-Output-Gigawords" code="53" mandatory="may">
  762. <type type-name="Integer32"/>
  763. </avp>
  764. <!-- 54 Unassigned -->
  765. <avp name="Unassigned" code="54" mandatory="may">
  766. <type type-name="OctetString"/>
  767. </avp>
  768. <avp name="Event-Timestamp" code="55" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
  769. <type type-name="Time"/>
  770. </avp>
  771. <avp name="Egress-VLANID" code="56" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  772. <type type-name="OctetString"/>
  773. </avp>
  774. <avp name="Ingress-Filters" code="57" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  775. <type type-name="Enumerated"/>
  776. <enum name="Enabled" code="1"/>
  777. <enum name="Disabled" code="2"/>
  778. </avp>
  779. <avp name="Egress-VLAN-Name" code="58" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  780. <type type-name="UTF8String"/>
  781. </avp>
  782. <avp name="User-Priority-Table" code="59" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
  783. <type type-name="OctetString"/>
  784. </avp>
  785. <avp name="CHAP-Challenge" code="60" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  786. <type type-name="OctetString"/>
  787. </avp>
  788. <avp name="NAS-Port-Type" code="61" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  789. <type type-name="Enumerated"/>
  790. <enum name="Async" code="0"/>
  791. <enum name="Sync" code="1"/>
  792. <enum name="ISDN-Sync" code="2"/>
  793. <enum name="ISDN-Async-v120" code="3"/>
  794. <enum name="ISDN-Async-v110" code="4"/>
  795. <enum name="Virtual" code="5"/>
  796. <enum name="PIAFS" code="6"/>
  797. <enum name="HDLC-Clear-Channel" code="7"/>
  798. <enum name="X25" code="8"/>
  799. <enum name="X75" code="9"/>
  800. <enum name="G.3 Fax" code="10"/>
  801. <enum name="SDSL - Symmetric DSL" code="11"/>
  802. <enum name="ADSL-CAP - Asymmetric DSL, Carrierless Amplitude Phase Modulation" code="12"/>
  803. <enum name="ADSL-DMT - Asymmetric DSL, Discrete Multi-Tone" code="13"/>
  804. <enum name="IDSL - ISDN Digital Subscriber Line" code="14"/>
  805. <enum name="Ethernet" code="15"/>
  806. <enum name="xDSL - Digital Subscriber Line of unknown type" code="16"/>
  807. <enum name="Cable" code="17"/>
  808. <enum name="Wireless - Other" code="18"/>
  809. <enum name="Wireless - IEEE 802.11" code="19"/>
  810. <enum name="Token-Ring" code="20"/>
  811. <enum name="FDDI" code="21"/>
  812. <enum name="Wireless - CDMA2000" code="22"/>
  813. <enum name="Wireless - UMTS" code="23"/>
  814. <enum name="Wireless - 1X-EV" code="24"/>
  815. <enum name="IAPP" code="25"/>
  816. <enum name="FTTP - Fiber to the Premises" code="26"/>
  817. <enum name="Wireless - IEEE 802.16" code="27"/>
  818. <enum name="Wireless - IEEE 802.20" code="28"/>
  819. <enum name="Wireless - IEEE 802.22" code="29"/>
  820. <enum name="PPPoA - PPP over ATM" code="30"/>
  821. <enum name="PPPoEoA - PPP over Ethernet over ATM" code="31"/>
  822. <enum name="PPPoEoE - PPP over Ethernet over Ethernet" code="32"/>
  823. <enum name="PPPoEoVLAN - PPP over Ethernet over VLAN" code="33"/>
  824. <enum name="PPPoEoQinQ - PPP over Ethernet over IEEE 802.1QinQ" code="34"/>
  825. <enum name="xPON - Passive Optical Network" code="35"/>
  826. <enum name="Wireless - XGP" code="36"/>
  827. </avp>
  828. <avp name="Port-Limit" code="62" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  829. <type type-name="Unsigned32"/>
  830. </avp>
  831. <avp name="Login-LAT-Port" code="63" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  832. <type type-name="OctetString"/>
  833. </avp>
  834. <avp name="Tunnel-Type" code="64" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  835. <type type-name="Enumerated"/>
  836. <enum name="PPTP" code="1"/>
  837. <enum name="L2F" code="2"/>
  838. <enum name="L2TP" code="3"/>
  839. <enum name="ATMP" code="4"/>
  840. <enum name="VTP" code="5"/>
  841. <enum name="AH" code="6"/>
  842. <enum name="IP-IP-Encap" code="7"/>
  843. <enum name="MIN-IP-IP" code="8"/>
  844. <enum name="ESP" code="9"/>
  845. <enum name="GRE" code="10"/>
  846. <enum name="DVS" code="11"/>
  847. <enum name="IP-in-IP Tunneling" code="12"/>
  848. <enum name="VLAN" code="13"/>
  849. </avp>
  850. <avp name="Tunnel-Medium-Type" code="65" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  851. <type type-name="Enumerated"/>
  852. <enum name="IPv4" code="1"/>
  853. <enum name="IPv6" code="2"/>
  854. <enum name="NSAP" code="3"/>
  855. <enum name="HDLC" code="4"/>
  856. <enum name="BBN" code="5"/>
  857. <enum name="IEEE-802" code="6"/>
  858. <enum name="E-163" code="7"/>
  859. <enum name="E-164" code="8"/>
  860. <enum name="F-69" code="9"/>
  861. <enum name="X-121" code="10"/>
  862. <enum name="IPX" code="11"/>
  863. <enum name="Appletalk-802" code="12"/>
  864. <enum name="Decnet4" code="13"/>
  865. <enum name="Vines" code="14"/>
  866. <enum name="E-164-NSAP" code="15"/>
  867. </avp>
  868. <avp name="Acct-Tunnel-Client-Endpoint" code="66" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  869. <type type-name="UTF8String"/>
  870. </avp>
  871. <avp name="Tunnel-Server-Endpoint" code="67" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  872. <type type-name="UTF8String"/>
  873. </avp>
  874. <avp name="Acct-Tunnel-Connection-ID" code="68" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  875. <type type-name="OctetString"/>
  876. </avp>
  877. <avp name="Tunnel-Password" code="69" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  878. <type type-name="OctetString"/>
  879. </avp>
  880. <avp name="ARAP-Password" code="70" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  881. <type type-name="OctetString"/>
  882. </avp>
  883. <avp name="ARAP-Features" code="71" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  884. <type type-name="OctetString"/>
  885. </avp>
  886. <avp name="ARAP-Zone-Access" code="72" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  887. <type type-name="Enumerated"/>
  888. <enum name="Only allow access to default zone" code="1"/>
  889. <enum name="Use zone filter inclusively" code="2"/>
  890. <enum name="Use zone filter exclusively" code="3"/>
  891. </avp>
  892. <avp name="ARAP-Security" code="73" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  893. <type type-name="Unsigned32"/>
  894. </avp>
  895. <avp name="ARAP-Security-Data" code="74" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  896. <type type-name="OctetString"/>
  897. </avp>
  898. <avp name="Password-Retry" code="75" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  899. <type type-name="Unsigned32"/>
  900. </avp>
  901. <avp name="Prompt" code="76" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  902. <type type-name="Enumerated"/>
  903. <enum name="No Echo" code="0"/>
  904. <enum name="Echo" code="1"/>
  905. </avp>
  906. <avp name="Connect-Info" code="77" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  907. <type type-name="UTF8String"/>
  908. </avp>
  909. <avp name="Configuration-Token" code="78" mandatory="must" protected="mustnot" vendor-bit="mustnot">
  910. <type type-name="OctetString"/>
  911. </avp>
  912. <avp name="EAP-Message" code="79" mandatory="may">
  913. <type type-name="OctetString"/>
  914. </avp>
  915. <avp name="Signature" code="80" mandatory="may">
  916. <type type-name="OctetString"/>
  917. </avp>
  918. <avp name="Tunnel-Private-Group-Id" code="81" mandatory="must" protected="mustnot" vendor-bit="mustnot">
  919. <type type-name="OctetString"/>
  920. </avp>
  921. <avp name="Tunnel-Assignment-Id" code="82" mandatory="must" protected="mustnot" vendor-bit="mustnot">
  922. <type type-name="OctetString"/>
  923. </avp>
  924. <avp name="Tunnel-Preference" code="83" mandatory="must" protected="mustnot" vendor-bit="mustnot">
  925. <type type-name="Unsigned32"/>
  926. </avp>
  927. <avp name="ARAP-Challenge-Response" code="84" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  928. <type type-name="OctetString"/>
  929. </avp>
  930. <avp name="Acct-Interim-Interval" code="85" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
  931. <type type-name="Unsigned32"/>
  932. </avp>
  933. <avp name="Acct-Tunnel-Packets-Lost" code="86" mandatory="must" protected="mustnot" vendor-bit="mustnot">
  934. <type type-name="Unsigned32"/>
  935. </avp>
  936. <avp name="NAS-Port-Id" code="87" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  937. <type type-name="UTF8String"/>
  938. </avp>
  939. <avp name="Framed-Pool" code="88" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  940. <type type-name="OctetString"/>
  941. </avp>
  942. <avp name="CUI" code="89" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  943. <type type-name="UTF8String"/>
  944. </avp>
  945. <avp name="Tunnel-Client-Auth-Id" code="90" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  946. <type type-name="UTF8String"/>
  947. </avp>
  948. <avp name="Tunnel-Server-Auth-Id" code="91" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  949. <type type-name="UTF8String"/>
  950. </avp>
  951. <avp name="NAS-Filter-Rule" code="92" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  952. <type type-name="UTF8String"/>
  953. </avp>
  954. <!-- 93 (unassigned) -->
  955. <avp name="Unassigned" code="93" mandatory="may">
  956. <type type-name="OctetString"/>
  957. </avp>
  958. <avp name="Originating-Line-Info" code="94" mandatory="may" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  959. <type type-name="OctetString"/>
  960. </avp>
  961. <avp name="NAS-IPv6-Address" code="95" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  962. <type type-name="OctetString"/>
  963. </avp>
  964. <avp name="Framed-Interface-Id" code="96" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  965. <type type-name="Unsigned64"/>
  966. </avp>
  967. <avp name="Framed-IPv6-Prefix" code="97" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  968. <type type-name="OctetString"/>
  969. </avp>
  970. <avp name="Login-IPv6-Host" code="98" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  971. <type type-name="OctetString"/>
  972. </avp>
  973. <avp name="Framed-IPv6-Route" code="99" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="mustnot">
  974. <type type-na…