Chapter 4. RADIUS Accounting
ISPs often manage points of presence over several locations, most
likely geographically dispersed. All of these points of presence
require protection to guard against unauthorized use of the expensive
network to which they allow access. Although the front line of
defense may (and should) be a robust and extensible form of
authentication (to verify a user's declared
identity) and authorization (to provide a user with only the services
to which he is entitled), much valuable information can be gleaned
from data collected about users' activities on the
network. Which user logged on? When did she do so? What services was
he granted?
The data becomes even more useful when it is compiled to analyze a
group of users. What is the average call time for a user? How much
data does that user transfer? Do I, as a system administrator, need
to set a time limit for a single session so as to protect limited
dial-in resources? Do I have users that are abusing an on-demand
connection? All of these questions can be answered using information
mined from the accounting process.
RADIUS supports a full-featured accounting protocol subset, which
allows it to satisfy all requirements of the AAA model. This chapter
describes the design, operation, packets, and attributes that are
specific and germane to RADIUS accounting.
|