public class DiameterAvpType
extends java.lang.Object
implements java.io.Serializable
Modifier and Type | Field and Description |
---|---|
static int |
_ADDRESS |
static int |
_DIAMETER_IDENTITY |
static int |
_DIAMETER_URI |
static int |
_ENUMERATED |
static int |
_FLOAT_32 |
static int |
_FLOAT_64 |
static int |
_GROUPED |
static int |
_INTEGER_32 |
static int |
_INTEGER_64 |
static int |
_IP_FILTER_RULE |
static int |
_OCTET_STRING |
static int |
_QOS_FILTER_RULE |
static int |
_TIME |
static int |
_UNDEFINED |
static int |
_UNSIGNED_32 |
static int |
_UNSIGNED_64 |
static int |
_UTF8_STRING |
static DiameterAvpType |
ADDRESS
The Address format is derived from the OctetString AVP Base
Format.
|
static DiameterAvpType |
DIAMETER_IDENTITY
The DiameterIdentity format is derived from the OctetString AVP
Base Format.
|
static DiameterAvpType |
DIAMETER_URI
The DiameterURI MUST follow the Uniform Resource Identifiers (URI)
syntax [URI] rules specified below.
|
static DiameterAvpType |
ENUMERATED
Enumerated is derived from the Integer32 AVP Base Format.
|
static DiameterAvpType |
FLOAT_32
This represents floating point values of single precision as
described by [FLOATPOINT].
|
static DiameterAvpType |
FLOAT_64
This represents floating point values of double precision as
described by [FLOATPOINT].
|
static DiameterAvpType |
GROUPED
The Data field is specified as a sequence of AVPs.
|
static DiameterAvpType |
INTEGER_32
32 bit signed value, in network byte order.
|
static DiameterAvpType |
INTEGER_64
64 bit signed value, in network byte order.
|
static DiameterAvpType |
IP_FILTER_RULE
The IPFilterRule format is derived from the OctetString AVP Base
Format.
|
static DiameterAvpType |
OCTET_STRING
The data contains arbitrary data of variable length.
|
static DiameterAvpType |
QOS_FILTER_RULE
The QosFilterRule format is derived from the OctetString AVP Base
Format.
|
static DiameterAvpType |
TIME
The Time format is derived from the OctetString AVP Base Format.
|
static DiameterAvpType |
UNDEFINED
This type is returned for AVPs that are not known to the Diameter stack,
so their type cannot be determined.
|
static DiameterAvpType |
UNSIGNED_32
32 bit unsigned value, in network byte order.
|
static DiameterAvpType |
UNSIGNED_64
64 bit unsigned value, in network byte order.
|
static DiameterAvpType |
UTF8_STRING
The UTF8String format is derived from the OctetString AVP Base
Format.
|
Modifier and Type | Method and Description |
---|---|
static DiameterAvpType |
fromInt(int i) |
static DiameterAvpType |
fromString(java.lang.String s) |
int |
getType() |
java.lang.String |
toString() |
public static final int _OCTET_STRING
public static final int _INTEGER_32
public static final int _INTEGER_64
public static final int _UNSIGNED_32
public static final int _UNSIGNED_64
public static final int _FLOAT_32
public static final int _FLOAT_64
public static final int _GROUPED
public static final int _ADDRESS
public static final int _TIME
public static final int _UTF8_STRING
public static final int _DIAMETER_IDENTITY
public static final int _DIAMETER_URI
public static final int _ENUMERATED
public static final int _IP_FILTER_RULE
public static final int _QOS_FILTER_RULE
public static final int _UNDEFINED
public static final DiameterAvpType OCTET_STRING
public static final DiameterAvpType INTEGER_32
public static final DiameterAvpType INTEGER_64
public static final DiameterAvpType UNSIGNED_32
public static final DiameterAvpType UNSIGNED_64
public static final DiameterAvpType FLOAT_32
public static final DiameterAvpType FLOAT_64
public static final DiameterAvpType GROUPED
public static final DiameterAvpType ADDRESS
public static final DiameterAvpType TIME
public static final DiameterAvpType UTF8_STRING
public static final DiameterAvpType DIAMETER_IDENTITY
DiameterIdentity = FQDNDiameterIdentity value is used to uniquely identify a Diameter node for purposes of duplicate connection and routing loop detection. The contents of the string MUST be the FQDN of the Diameter node. If multiple Diameter nodes run on the same host, each Diameter node MUST be assigned a unique DiameterIdentity. If a Diameter node can be identified by several FQDNs, a single FQDN should be picked at startup, and used as the only DiameterIdentity for that node, whatever the connection it is sent on.
public static final DiameterAvpType DIAMETER_URI
"aaa://" FQDN [ port ] [ transport ] [ protocol ] ; No transport security "aaas://" FQDN [ port ] [ transport ] [ protocol ] ; Transport security used FQDN = Fully Qualified Host Name port = ":" 1*DIGIT ; One of the ports used to listen for ; incoming connections. ; If absent, ; the default Diameter port (3868) is ; assumed. transport = ";transport=" transport-protocol ; One of the transports used to listen ; for incoming connections. If absent, ; the default SCTP [SCTP] protocol is ; assumed. UDP MUST NOT be used when ; the aaa-protocol field is set to ; diameter. transport-protocol = ( "tcp" / "sctp" / "udp" ) protocol = ";protocol=" aaa-protocol ; If absent, the default AAA protocol ; is diameter. aaa-protocol = ( "diameter" / "radius" / "tacacs+" ) The following are examples of valid Diameter host identities: aaa://host.example.com;transport=tcp aaa://host.example.com:6666;transport=tcp aaa://host.example.com;protocol=diameter aaa://host.example.com:6666;protocol=diameter aaa://host.example.com:6666;transport=tcp;protocol=diameter aaa://host.example.com:1813;transport=udp;protocol=radius
public static final DiameterAvpType ENUMERATED
public static final DiameterAvpType IP_FILTER_RULE
Direction (in or out) Source and destination IP address (possibly masked) Protocol Source and destination port (lists or ranges) TCP flags IP fragment flag IP options ICMP typesRules for the appropriate direction are evaluated in order, with the first matched rule terminating the evaluation. Each packet is evaluated once. If no rule matches, the packet is dropped if the last rule evaluated was a permit, and passed if the last rule was a deny. IPFilterRule filters MUST follow the format:
action dir proto from src to dst [options] action permit - Allow packets that match the rule. deny - Drop packets that match the rule. dir "in" is from the terminal, "out" is to the terminal. proto An IP protocol specified by number. The "ip" keyword means any protocol will match. src and dst <address/mask> [ports] The <address/mask> may be specified as: ipno An IPv4 or IPv6 number in dotted- quad or canonical IPv6 form. Only this exact IP number will match the rule. ipno/bits An IP number as above with a mask width of the form 1.2.3.4/24. In this case, all IP numbers from 1.2.3.0 to 1.2.3.255 will match. The bit width MUST be valid for the IP version and the IP number MUST NOT have bits set beyond the mask. For a match to occur, the same IP version must be present in the packet that was used in describing the IP address. To test for a particular IP version, the bits part can be set to zero. The keyword "any" is 0.0.0.0/0 or the IPv6 equivalent. The keyword "assigned" is the address or set of addresses assigned to the terminal. For IPv4, a typical first rule is often "deny in ip! assigned" The sense of the match can be inverted by preceding an address with the not modifier (!), causing all other addresses to be matched instead. This does not affect the selection of port numbers. With the TCP, UDP and SCTP protocols, optional ports may be specified as: {port/port-port}[,ports[,...]] The '-' notation specifies a range of ports (including boundaries). Fragmented packets that have a non-zero offset (i.e., not the first fragment) will never match a rule that has one or more port specifications. See the frag option for details on matching fragmented packets. options: frag Match if the packet is a fragment and this is not the first fragment of the datagram. frag may not be used in conjunction with either tcpflags or TCP/UDP port specifications. ipoptions spec Match if the IP header contains the comma separated list of options specified in spec. The supported IP options are: ssrr (strict source route), lsrr (loose source route), rr (record packet route) and ts (timestamp). The absence of a particular option may be denoted with a '!'. tcpoptions spec Match if the TCP header contains the comma separated list of options specified in spec. The supported TCP options are: mss (maximum segment size), window (tcp window advertisement), sack (selective ack), ts (rfc1323 timestamp) and cc (rfc1644 t/tcp connection count). The absence of a particular option may be denoted with a '!'. established TCP packets only. Match packets that have the RST or ACK bits set. setup TCP packets only. Match packets that have the SYN bit set but no ACK bit. tcpflags spec TCP packets only. Match if the TCP header contains the comma separated list of flags specified in spec. The supported TCP flags are: fin, syn, rst, psh, ack and urg. The absence of a particular flag may be denoted with a '!'. A rule that contains a tcpflags specification can never match a fragmented packet that has a non-zero offset. See the frag option for details on matching fragmented packets. icmptypes types ICMP packets only. Match if the ICMP type is in the list types. The list may be specified as any combination of ranges or individual types separated by commas. Both the numeric values and the symbolic values listed below can be used. The supported ICMP types are: echo reply (0), destination unreachable (3), source quench (4), redirect (5), echo request (8), router advertisement (9), router solicitation (10), time-to-live exceeded (11), IP header bad (12), timestamp request (13), timestamp reply (14), information request (15), information reply (16), address mask request (17) and address mask reply (18).There is one kind of packet that the access device MUST always discard, that is an IP fragment with a fragment offset of one. This is a valid packet, but it only has one use, to try to circumvent firewalls. An access device that is unable to interpret or apply a deny rule MUST terminate the session. An access device that is unable to interpret or apply a permit rule MAY apply a more restrictive rule. An access device MAY apply deny rules of its own before the supplied rules, for example to protect the access device owner's infrastructure. The rule syntax is a modified subset of ipfw(8) from FreeBSD, and the ipfw.c code may provide a useful base for implementations.
public static final DiameterAvpType QOS_FILTER_RULE
Direction (in or out) Source and destination IP address (possibly masked) Protocol Source and destination port (lists or ranges) DSCP values (no mask or range)Rules for the appropriate direction are evaluated in order, with the first matched rule terminating the evaluation. Each packet is evaluated once. If no rule matches, the packet is treated as best effort. An access device that is unable to interpret or apply a QoS rule SHOULD NOT terminate the session. QoSFilterRule filters MUST follow the format:
action dir proto from src to dst [options] tag - Mark packet with a specific DSCP [DIFFSERV]. The DSCP option MUST be included. meter - Meter traffic. The metering options MUST be included. dir The format is as described under IPFilterRule. proto The format is as described under IPFilterRule. src and dst The format is as described under IPFilterRule.
public static final DiameterAvpType UNDEFINED
public java.lang.String toString()
toString
in class java.lang.Object
public static DiameterAvpType fromString(java.lang.String s)
public int getType()
public static DiameterAvpType fromInt(int i)