💾 Archived View for gemini.bortzmeyer.org › rfc-mirror › rfc3169.txt captured on 2023-09-28 at 21:18:33.

View Raw

More Information

⬅️ Previous capture (2021-11-30)

-=-=-=-=-=-=-







Network Working Group                                         M. Beadles
Request for Comments: 3169                              SmartPipes, Inc.
Category: Informational                                        D. Mitton
                                                         Nortel Networks
                                                          September 2001


        Criteria for Evaluating Network Access Server Protocols

Status of this Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2001).  All Rights Reserved.

Abstract

   This document defines requirements for protocols used by Network
   Access Servers (NAS).

1.  Requirements language

   In this document, the key words "MAY", "MUST, "MUST NOT", "optional",
   "recommended", "SHOULD", and "SHOULD NOT", are to be interpreted as
   described in [KEYWORDS].

2.  Introduction

   This document defines requirements for protocols used by Network
   Access Servers (NAS).  Protocols used by NAS's may be divided into
   four spaces:  Access protocols, Network protocols, AAA protocols, and
   Device Management protocols.  The primary focus of this document is
   on AAA protocols.

   The reference model of a NAS used by this document, and the analysis
   of the functions of a NAS which led to the development of these
   requirements, may be found in [NAS-MODEL].

3.  Access Protocol Requirements

   There are three basic types of access protocols used by NAS's.  First
   are the traditional telephony-based access protocols, which interface
   to the NAS via a modem or terminal adapter or similar device.  These
   protocols typically support asynchronous or synchronous PPP [PPP]



Beadles & Mitton             Informational                      [Page 1]

RFC 3169         Criteria for Evaluating NAS Protocols    September 2001


   carried over a telephony protocol.  Second are broadband pseudo-
   telephony access protocols, which are carried over xDSL or cable
   modems, for example.  These protocols typically support an
   encapsulation method such as PPP over Ethernet [PPPOE].  Finally are
   the virtual access protocols used by NAS's that terminate tunnels.
   One example of this type of protocol is L2TP [L2TP].

   It is a central assumption of the NAS model used here that a NAS
   accepts multiple point-to-point links via one of the above access
   protocols.  Therefore, at a minimum, any NAS access protocol MUST be
   able to carry PPP.  The exception to this requirement is for NAS's
   that support legacy text login methods such as telnet [TELNET],
   rlogin, or LAT.  Only these access protocols are exempt from the
   requirement to support PPP.

4.  Network Protocol Requirements

   The network protocols supported by a NAS depend entirely on the kind
   of network to which a NAS is providing access.  This document does
   not impose any additional requirements on network protocols beyond
   the protocol specifications themselves.  For example, if a NAS that
   serves a routed network includes internet routing functionality, then
   that NAS must adhere to [ROUTING-REQUIREMENTS], but there are no
   additional protocol requirements imposed by virtue of the device
   being a NAS.

5.  AAA Protocol Requirements

5.1.  General protocol characteristics

   There are certain general characteristics that any AAA protocol used
   by NAS's must meet.  Note that the transport requirements for
   authentication/authorization are not necessarily the same as those
   for accounting/auditing.  An AAA protocol suite MAY use the same
   transport and protocol for both functions, but this is not strictly
   required.

5.1.1.  Transport requirements

5.1.1.1.  Transport independence

   The design of the AAA protocol MUST be transport independent.
   Existing infrastructures use UDP-based protocols [RADIUS], gateways
   to new protocols must be practical to encourage migration.  The
   design MUST comply with congestion control recommendations in RFC
   2914 [CONGEST].





Beadles & Mitton             Informational                      [Page 2]

RFC 3169         Criteria for Evaluating NAS Protocols    September 2001


5.1.1.2.  Scalability

   Very large scale NAS's that serve up to thousands of simultaneous
   sessions are now being deployed.  And a single server system may
   service a large number of ports.  This means that, in the extreme,
   there may be an almost constant exchange of many small packets
   between the NASes and the AAA server.  An AAA protocol transport
   SHOULD support being optimized for a long-term exchange of small
   packets in a stream between a pair of hosts.

   The protocol MUST be designed to support a large number of ports,
   clients, and concurrent sessions.  Examples of poor design would
   include message identifiers which values are so small that queues and
   reception windows wrap under load, unique session identifier ranges
   that are so small that they wrap within the lifetime of potential
   long sessions, counter values that cannot accommodate reasonable
   current and future bandwidth usage, and computational processes with
   high overhead that must be performed frequently.

5.1.1.3.  Support for Multiple AAA Servers and Failure Recovery

   In order to operationally support large loads, load balancing and
   fail-over to multiple AAA servers will be required.  The AAA protocol
   MUST provide for NAS's to balance individual AAA requests between two
   or more AAA servers.  The load balancing mechanism SHOULD be built in
   to the AAA protocol itself.

   The AAA protocol MUST be able to detect a failure of the transport
   protocol to deliver a message or messages within a known and
   controllable time period, so it can engage retransmission or server
   fail-over processes.  The reliability and robustness of
   authentication requests MUST be predictable and configurable.

   The AAA protocol design MUST NOT introduce a single point of failure
   during the AAA process.  The AAA protocol MUST allow any sessions
   between a NAS and a given AAA server to fail-over to a secondary
   server without loss of state information.  This fail-over mechanism
   SHOULD be built in to the AAA protocol itself.

5.1.1.4.  Support for Multiple Administrative Domains

   NAS's operated by one authority provide network access services for
   clients operated by another authority, to network destinations
   operated by yet another authority.  This type of arrangement is of
   growing importance; for example, dial roaming is now a nearly
   ubiquitous service.  Therefore, the AAA protocol MUST support AAA





Beadles & Mitton             Informational                      [Page 3]

RFC 3169         Criteria for Evaluating NAS Protocols    September 2001


   services that travel between multiple domains of authority.  The AAA
   protocol MUST NOT use a model that assumes a single domain of
   authority.

   The AAA protocol MUST NOT dictate particular business models for the
   relationship between the administrative domains.  The AAA protocol
   MUST support proxy, and in addition SHOULD support other multi-domain
   relationships such as brokering and referral.

   The AAA protocol MUST also meet the protocol requirements specified
   in [ROAMING-REQUIREMENTS].

5.1.2.  Attribute-Value Protocol Model

   Years of operational experience with AAA protocols and NAS's has
   proven that the Attribute-Value protocol model is an optimal
   representation of AAA data.  The protocol SHOULD use an Attribute-
   Value representation for AAA data.  This document will assume such a
   model.  Even if the AAA protocol does not use this as an on-the-wire
   data representation, Attribute-Value can serve as abstraction for
   discussing AAA information.

   Experience has also shown that attribute space tends to run out
   quickly.  In order to provide room for expansion in the attribute
   space, the AAA protocol MUST support a minimum of 64K Attributes (16
   bits), each with a minimum length of 64K (16 bits).

5.1.2.1.  Attribute Data Types

   The AAA protocol MUST support simple attribute data types, including
   integer, enumeration, text string, IP address, and date/time.  The
   AAA protocol MUST also provide some support for complex structured
   data types.  Wherever IP addresses are carried within the AAA
   protocol, the protocol MUST support both IPv4 and IPv6 [IPV6]
   addresses.  Wherever text information is carried within the AAA
   protocol, the protocol MUST comply with the IETF Policy on Character
   Sets and Languages [RFC 2277].

5.1.2.2.  Minimum Set of Attributes

   At a minimum, the AAA protocol MUST support, or be easily extended to
   support, the set of attributes supported by RADIUS [RADIUS] and
   RADIUS Accounting [RADIUS-ACCOUNTING].  If the base AAA protocol does
   not support this complete set of attributes, then an extension to
   that protocol MUST be defined which supports this set.






Beadles & Mitton             Informational                      [Page 4]

RFC 3169         Criteria for Evaluating NAS Protocols    September 2001


5.1.2.3.  Attribute Extensibility

   NAS and AAA development is always progressing.  In order to prevent
   the AAA protocol from being a limiting factor in NAS and AAA Server
   development, the AAA protocol MUST provide a built-in extensibility
   mechanism, which MUST include a means for adding new standard
   attribute extensions.  This MUST include a method for registering or
   requesting extensions through IANA, so that long-term working group
   involvement is not required to create new attribute types.  Ideally,
   the AAA protocol SHOULD separate specification of the transport from
   specification of the attributes.

   The AAA protocol MUST include a means for individual vendors to add
   value through vendor-specific attributes and SHOULD include support
   for vendor-specific data types.

5.1.3.  Security Requirements

5.1.3.1.  Mutual Authentication

   It is poor security practice for a NAS to communicate with an AAA
   server that is not trusted, and vice versa.  The AAA protocol MUST
   provide mutual authentication between AAA server and NAS.

5.1.3.2.  Shared Secrets

   At a minimum, the AAA protocol SHOULD support use of a secret shared
   pairwise between each NAS and AAA server to mutually verify identity.
   This is intended for small-scale deployments.  The protocol MAY
   provide stronger mutual security techniques.

5.1.3.3.  Public Key Security

   AAA server/NAS identity verification based solely on shared secrets
   can be difficult to deploy properly at large scale, and it can be
   tempting for NAS operators to use a single shared secret (that rarely
   changes) across all NAS's.  This can lead to an easy compromise of
   the secret.  Therefore, the AAA protocol MUST also support mutual
   verification of identity using a public-key infrastructure that
   supports expiration and revocation of keys.

5.1.3.4.  Encryption of Attributes

   Some attributes are more operationally sensitive than others.  Also,
   in a multi-domain scenario, attributes may be inserted by servers
   from different administrative domains.  Therefore, the AAA protocol





Beadles & Mitton             Informational                      [Page 5]

RFC 3169         Criteria for Evaluating NAS Protocols    September 2001


   MUST support selective encryption of attributes on an attribute-by-
   attribute basis, even within the same message.  This requirement
   applies equally to Authentication, Authorization, and Accounting
   data.

5.2.  Authentication and User Security Requirements

5.2.1.  Authentication protocol requirements

   End users who are requesting network access through a NAS will
   present various types of credentials.  It is the purpose of the AAA
   protocol to transport these credentials between the NAS and the AAA
   server.

5.2.1.1.  Bi-directional Authentication

   The AAA protocol MUST support transport of credentials from the AAA
   server to the NAS, between the User and the NAS, and between the NAS
   and the AAA server.

5.2.1.2.  Periodic Re-Authentication

   The AAA protocol MUST support re-authentication at any time during
   the course of a session, initiated from either the NAS or the AAA
   server.  This is a requirement of CHAP [CHAP].

5.2.1.3.  Multi-phase Authentication

   The AAA protocol MUST be able to support multi-phase authentication
   methods, including but not limited to support for:

      -  Text prompting from the NAS to the user

      -  A series of binary challenges and responses of arbitrary length

      -  An authentication failure reason to be transmitted from the NAS
         to the user

      -  Callback to a pre-determined phone number

5.2.1.4.  Extensible Authentication Types

   Security protocol development is going on constantly as new threats
   are identified and better cracking methods are developed.  Today's
   secure authentication methods may be proven insecure tomorrow.  The
   AAA protocol MUST provide some support for addition of new
   authentication credential types.




Beadles & Mitton             Informational                      [Page 6]

RFC 3169         Criteria for Evaluating NAS Protocols    September 2001


5.2.2.  Authentication Attribute Requirements

   In addition to the minimum attribute set, the AAA protocol must
   support and define attributes that provide the following functions:

5.2.2.1.  PPP Authentication protocols

   Many authentication protocols are defined within the framework of
   PPP.  The AAA protocol MUST be able to act as an intermediary
   protocol between the authenticate and the authenticator for the
   following authentication protocols:

      -  PPP Password Authentication Protocol [PPP]

      -  PPP Challenge Handshake Authentication Protocol [CHAP]

      -  PPP Extensible Authentication Protocol [EAP]

5.2.2.2.  User Identification

   The following are common types of credentials used for user
   identification.  The AAA protocol MUST be able to carry the following
   types of identity credentials:

      -  A user name in the form of a Network Access Identifier [NAI].

      -  An Extensible Authentication Protocol [EAP] Identity Request
         Type packet.

      -  Telephony dialing information such as Dialed Number
         Identification Service (DNIS) and Caller ID.

   If a particular type of authentication credential is not needed for a
   particular user session, the AAA protocol MUST NOT require that dummy
   credentials be filled in.  That is, the AAA protocol MUST support
   authorization by identification or assertion only.

5.2.2.3.  Authentication Credentials

   The following are common types of credentials used for
   authentication.  The AAA protocol MUST be able to carry the following
   types of authenticating credentials at a minimum:

      -  A secret or password.

      -  A response to a challenge presented by the NAS to the user

      -  A one-time password



Beadles & Mitton             Informational                      [Page 7]

RFC 3169         Criteria for Evaluating NAS Protocols    September 2001


      -  An X.509 digital certificate [X.509]

      -  A Kerberos v5 ticket [KERBEROS]

5.2.3.  Authentication Protocol Security Requirements

5.2.3.1.  End-to-End Hiding of Credentials

   Where passwords are used as authentication credentials, the AAA
   protocol MUST provide a secure means of hiding the password from
   intermediates in the AAA conversation.  Where challenge/response
   mechanisms are used, the AAA protocol MUST also prevent against
   replay attacks.

5.3.  Authorization, Policy, and Resource management

5.3.1.  Authorization Protocol Requirements

   In all cases, the protocol MUST specify that authorization data sent
   from the NAS to the AAA server is to be regarded as information or
   "hints", and not directives.  The AAA protocol MUST be designed so
   that the AAA server makes all final authorization decisions and does
   not depend on a certain state being expected by the NAS.

5.3.1.1.  Dynamic Authorization

   The AAA protocol MUST support dynamic re-authorization at any time
   during a user session.  This re-authorization may be initiated in
   either direction.  This dynamic re-authorization capability MUST
   include the capability to request a NAS to disconnect a user on
   demand.

5.3.1.2.  Resource Management

   Resource Management MUST be supported on demand by the NAS or AAA
   Server at any time during the course of a user session.  This would
   be the ability for the NAS to allocate and deallocate shared
   resources from a AAA server servicing multiple NASes.  These
   resources may include, but are not limited to; IP addresses,
   concurrent usage limits, port usage limits, and tunnel limits.  This
   capability should have error detection and synchronization features
   that will recover state after network and system failures.  This may
   be accomplished by session information timeouts and explicit interim
   status and disconnect messages.  There should not be any dependencies
   on the Accounting message stream, as per current practices.






Beadles & Mitton             Informational                      [Page 8]

RFC 3169         Criteria for Evaluating NAS Protocols    September 2001


   This feature is primarily intended for NAS-local network resources.
   In a proxy or multi-domain environment, resource information should
   only be retained by the server doing the allocation, and perhaps it's
   backups.  Authorization resources in remote domains should use the
   dynamic authorization features to change and revoke authorization
   status.

5.3.2.  Authorization Attribute Requirements

5.3.2.1.  Authorization Attribute Requirements - Access Restrictions

   The AAA protocol serves as a primary means of gathering data used for
   making Policy decisions for network access.  Therefore, the AAA
   protocol MUST allow network operators to make policy decisions based
   on the following parameters:

      -  Time/day restrictions.  The AAA protocol MUST be able to
         provide an unambiguous time stamp, NAS time zone indication,
         and date indication to the AAA server in the Authorization
         information.

      -  Location restrictions:  The AAA protocol MUST be able to
         provide an unambiguous location code that reflects the
         geographic location of the NAS.  Note that this is not the same
         type of thing as either the dialing or dialed station.

      -  Dialing restrictions:  The AAA protocol MUST be able to provide
         accurate dialed and dialing station indications.

      -  Concurrent login limitations:  The AAA protocol MUST allow an
         AAA Server to limit concurrent logins by a particular user or
         group of users.  This mechanism does not need to be explicitly
         built into the AAA protocol, but the AAA protocol must provide
         sufficient authorization  information for an AAA server to make
         that determination through an out-of-band mechanism.

5.3.2.2.  Authorization Attribute Requirements - Authorization Profiles

   The AAA protocol is used to enforce policy at the NAS.  Essentially,
   on granting of access, a particular access profile is applied to the
   user's session.  The AAA protocol MUST at a minimum provide a means
   of applying profiles containing the following types of information:

      -  IP Address assignment: The AAA protocol MUST provide a means of
         assigning an IPv4 or IPv6 address to an incoming user.






Beadles & Mitton             Informational                      [Page 9]

RFC 3169         Criteria for Evaluating NAS Protocols    September 2001


      -  Protocol Filter application:  The AAA protocol MUST provide a
         means of applying IP protocol filters to user sessions.  Two
         different methods MUST be supported.

         First, the AAA protocol MUST provide a means of selecting a
         protocol filter by reference to an identifier, with the details
         of the filter action being specified out of band.  The AAA
         protocol SHOULD define this out-of-band reference mechanism.

         Second, the AAA protocol MUST provide a means of passing a
         protocol filter by value.  This means explicit passing of
         pass/block information by address range, TCP/UDP port number,
         and IP protocol number at a minimum.

      -  Compulsory Tunneling:  The AAA protocol MUST provide a means of
         directing a NAS to build a tunnel or tunnels to a specified
         end- point.  It MUST support creation of multiple simultaneous
         tunnels in a specified order.  The protocol MUST allow, at a
         minimum, specification of the tunnel endpoints, tunneling
         protocol type, underlying tunnel media type, and tunnel
         authentication credentials (if required by the tunnel type).
         The AAA protocol MUST support at least the creation of tunnels
         using the L2TP [L2TP], ESP [ESP], and AH [AH] protocols.  The
         protocol MUST provide means of adding new tunnel types as they
         are standardized.

      -  Routing:  The AAA protocol MUST provide a means of assigning a
         particular static route to an incoming user session.

      -  Expirations/timeouts:  The AAA protocol MUST provide a means of
         communication session expiration information to a NAS.  Types
         of expirations that MUST be supported are:  total session time,
         idle time, total bytes transmitted, and total bytes received.

      -  Quality of Service:  The AAA protocol MUST provide a means for
         supplying Quality of Service parameters to the NAS for
         individual user sessions.

5.3.2.3.  Resource Management Requirements

   The AAA protocol is a means for network operators to perform
   management of network resources.  The AAA protocol MUST provide a
   means of collecting resource state information, and controlling
   resource allocation for the following types of network resources.

      -  Network bandwidth usage per session, including multilink
         sessions.




Beadles & Mitton             Informational                     [Page 10]

RFC 3169         Criteria for Evaluating NAS Protocols    September 2001


      -  Access port usage, including concurrent usage and usage pools.

      -  Connect time.

      -  IP Addresses and pools.

      -  Compulsory tunnel limits.

5.3.3.  Authorization Protocol Security Requirements

5.3.3.1.  Security of Compulsory Tunnel Credentials

   When an AAA protocol passes credentials that will be used to
   authenticate compulsory tunnels, the AAA protocol MUST provide a
   means of securing the credentials from end-to-end of the AAA
   conversation.  The AAA protocol MUST also provide protection against
   replay attacks in this situation.

5.4.  Accounting and Auditing Requirements

5.4.1.  Accounting Protocol Requirements

5.4.1.1.  Guaranteed Delivery

   The accounting and auditing functions of the AAA protocol are used
   for network planning, resource management, policy decisions, and
   other functions that require accurate knowledge of the state of the
   NAS.  NAS operators need to be able to engineer their network usage
   measurement systems to a predictable level of accuracy.  Therefore,
   an AAA protocol MUST provide a means of guaranteed delivery of
   accounting information between the NAS and the AAA Server(s).

5.4.1.2.  Real Time Accounting

   NAS operators often require a real time view onto the status of
   sessions served by a NAS.  Therefore, the AAA protocol MUST support
   real-time delivery of accounting and auditing information.  In this
   context, real time is defined as accounting information delivery
   beginning within one second of the triggering event.

5.4.1.3.  Batch Accounting

   The AAA protocol SHOULD also support delivery of stored accounting
   and auditing information in batches (non-real time).







Beadles & Mitton             Informational                     [Page 11]

RFC 3169         Criteria for Evaluating NAS Protocols    September 2001


5.4.1.4.  Accounting Time Stamps

   There may be delays associated with the delivery of accounting
   information.  The NAS operator will desire to know the time an event
   actually occurred, rather than simply the time when notification of
   the event was received.  Therefore, the AAA protocol MUST carry an
   unambiguous time stamp associated with each accounting event.  This
   time stamp MUST be unambiguous with regard to time zone.  Note that
   this assumes that the NAS has access to a reliable time source.

5.4.1.5.  Accounting Events

   At a minimum, the AAA protocol MUST support delivery of accounting
   information triggered by the following events:

      -  Start of a user session

      -  End of a user session

      -  Expiration of a predetermined repeating time interval during a
         user session.  The AAA protocol MUST provide a means for the
         AAA server to request that a NAS use a certain interval
         accounting time.

      -  Dynamic re-authorization during a user session (e.g., new
         resources being delivered to the user)

      -  Dynamic re-authentication during a user session

5.4.1.6.  On-Demand Accounting

   NAS operators need to maintain an accurate view onto the status of
   sessions served by a NAS, even through failure of an AAA server.
   Therefore, the AAA protocol MUST support a means of requesting
   current session state and accounting from the NAS on demand.

5.4.2.  Accounting Attribute Requirements

   At a minimum, the AAA protocol MUST support delivery of the following
   types of accounting/auditing data:

      -  All parameters used to authenticate a session.

      -  Details of the authorization profile that was applied to the
         session.

      -  The duration of the session.




Beadles & Mitton             Informational                     [Page 12]

RFC 3169         Criteria for Evaluating NAS Protocols    September 2001


      -  The cumulative number of bytes sent by the user during the
         session.

      -  The cumulative number of bytes received by the user during the
         session.

      -  The cumulative number of packets sent by the user during the
         session.

      -  The cumulative number of packets received by the user during
         the session.

      -  Details of the access protocol used during the session (port
         type, connect speeds, etc.)

5.4.3.  Accounting Protocol Security Requirements

5.4.3.1.  Integrity and Confidentiality

   Note that accounting and auditing data are operationally sensitive
   information.  The AAA protocol MUST provide a means to assure end-
   to-end integrity of this data.  The AAA protocol SHOULD provide a
   means of assuring the end-to-end confidentiality of this data.

5.4.3.2.  Auditibility

   Network operators use accounting data for network planning, resource
   management, and other business-critical functions that require
   confidence in the correctness of this data.  The AAA protocol SHOULD
   provide a mechanism to ensure that the source of accounting data
   cannot easily repudiate this data after transmission.

6.  Device Management Protocols

   This document does not specify any requirements for device management
   protocols.

7.  Acknowledgments

   Many of the requirements in this document first took form in Glen
   Zorn's, "Yet Another Authentication Protocol (YAAP)" document, for
   which grateful acknowledgment is made.

8.  Security Considerations

   See above for security requirements for the NAS AAA protocol.





Beadles & Mitton             Informational                     [Page 13]

RFC 3169         Criteria for Evaluating NAS Protocols    September 2001


   Where an AAA architecture spans multiple domains of authority, AAA
   information may need to cross trust boundaries.  In this situation, a
   NAS might operate as a shared device that services multiple
   administrative domains.  Network operators are advised take this into
   consideration when deploying NAS's and AAA Servers.

9.  IANA Considerations

   This document does not directly specify any IANA considerations.
   However, the following recommendations are made:

   Future development and extension of an AAA protocol will be made much
   easier if new attributes and values can be requested or registered
   directly through IANA, rather than through an IETF Standardization
   process.

   The AAA protocol might use enumerated values for some attributes,
   which enumerate already-defined IANA types (such as protocol number).
   In these cases, the AAA protocol SHOULD use the IANA assigned numbers
   as the enumerated values.

10.  References

   [AH]                    Kent, S. and R. Atkinson, "IP Authentication
                           Header (AH)", RFC 2402, November 1998.

   [CHAP]                  Simpson, J.,  "PPP Challenge Handshake
                           Authentication Protocol (CHAP)", RFC 1994,
                           August 1996.

   [CONGEST]               Floyd, S., "Congestion Control Principles",
                           RFC 2914, Sept. 2000.

   [EAP]                   Blunk, L. and J. Vollbrecht, "PPP Extensible
                           Authentication Protocol (EAP)", RFC 2284,
                           March 1998.

   [ESP]                   Kent, S. and R. Atkinson, "IP Encapsulating
                           Security Payload (ESP)", RFC 2406, November
                           1998.

   [KEYWORDS]              Bradner, S., "Key words for use in RFCs to
                           Indicate Requirement Levels", BCP 14, RFC
                           2119, March 1997.

   [KERBEROS]              Kohl, J. and C. Neuman, "The Kerberos Network
                           Authentication Service (V5)", RFC 1510,
                           September 1993.



Beadles & Mitton             Informational                     [Page 14]

RFC 3169         Criteria for Evaluating NAS Protocols    September 2001


   [IPV6]                  Deering, S. and R. Hinden, "Internet
                           Protocol, Version 6 (IPv6) Specification",
                           RFC 2460, December 1998.

   [L2TP]                  Townsley, W., Valencia, A., Rubens, A., Pall,
                           G., Zorn, G. and B. Plater, "Layer Two
                           Tunneling Protocol (L2TP)", RFC 2661, August
                           1999.

   [NAI]                   Aboba, B. and M. Beadles, "The Network Access
                           Identifier", RFC 2486, January 1999.

   [NAS-MODEL]             Mitton, D. and M. Beadles, "Network Access
                           Server Requirements Next Generation
                           (NASREQNG) NAS Model", RFC 2881, July 2000.

   [NAS-EXT]               Mitton, D., "Network Access Servers
                           Requirements: Extended RADIUS Practices", RFC
                           2882, July 2000.

   [PPP]                   Simpson, W., "The Point-to-Point Protocol
                           (PPP)", STD 51, RFC 1661, July 1994.

   [PPPOE]                 Mamakos, L., Lidl, K., Evarts, J., Carrel,
                           D., Simone, D. and R. Wheeler, "A Method for
                           Transmitting PPP Over Ethernet (PPPoE)", RFC
                           2516, February 1999.

   [ROUTING-REQUIREMENTS]  Baker, F., "Requirements for IP Version 4
                           Routers", RFC 1812, June 1995.

   [TELNET]                Postel, J. and J. Reynolds, "Telnet Protocol
                           Specification", STD 8, RFC 854, May 1983.

   [RFC 2277]              Alvestrand, H., "IETF Policy on Character
                           Sets and Languages", BCP 18, RFC 2277,
                           January 1998.

   [X.509]                 ITU-T Recommendation X.509 (1997 E):
                           Information Technology - Open Systems
                           Interconnection - The Directory:
                           Authentication Framework, June 1997.

   [RADIUS]                Rigney, C., Rubens. A., Simpson, W. and S.
                           Willens, "Remote Authentication Dial In User
                           Service (RADIUS)", RFC 2138, April 1997.





Beadles & Mitton             Informational                     [Page 15]

RFC 3169         Criteria for Evaluating NAS Protocols    September 2001


   [RADIUS-ACCOUNTING]     Rigney, C., "RADIUS Accounting", RFC 2139,
                           April 1997.

   [ROAMING-REQUIREMENTS]  Aboba, B. and G. Zorn, "Criteria for
                           Evaluating Roaming Protocols", RFC 2477,
                           January 1999.

11.  Authors' Addresses

   Mark Anthony Beadles
   SmartPipes, Inc.
   565 Metro Place South Suite 300
   Dublin, OH 43017

   Phone: 614-923-6200


   David Mitton
   Nortel Networks
   880 Technology Park Drive
   Billerica, MA 01821

   Phone: 978-288-4570
   EMail: dmitton@nortelnetworks.com



























Beadles & Mitton             Informational                     [Page 16]

RFC 3169         Criteria for Evaluating NAS Protocols    September 2001


12.  Full Copyright Statement

   Copyright (C) The Internet Society (2001).  All Rights Reserved.

   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph are
   included on all such copies and derivative works.  However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assigns.

   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Acknowledgement

   Funding for the RFC Editor function is currently provided by the
   Internet Society.



















Beadles & Mitton             Informational                     [Page 17]