1 <?xml version="1.0" encoding="UTF-8"?>
2 <!DOCTYPE dictionary SYSTEM "dictionary.dtd" [
3 <!ENTITY nasreq SYSTEM "nasreq.xml">
4 <!ENTITY mobileipv4 SYSTEM "mobileipv4.xml">
5 <!ENTITY sunping SYSTEM "sunping.xml">
6 <!ENTITY imscxdx SYSTEM "imscxdx.xml">
9 <base uri="http://www.ietf.org/rfc/rfc3588.txt">
11 $Log: dictionary.xml,v $
12 Revision 1.1 2001/11/01 21:52:44 guy
13 From David Frascone: duUpdate to Diameter dissector to load the
14 dictionary as an XML file rather than building it in, and various
17 Revision 1.7 2001/08/24 18:03:24 chaos
20 Revision 1.6 2001/07/31 19:13:55 chaos
21 Missed a couple of MIP AVPs
23 Revision 1.5 2001/07/31 19:09:22 chaos
24 Added Mobile-Ip and Sun Ping Extension
26 Revision 1.4 2001/07/31 17:43:25 chaos
27 Oops, forgot to turn on validity checking. Fixed some errors found with validity checking turned on
29 Revision 1.3 2001/07/31 16:56:31 chaos
30 Added commands, and validated with xmllint
32 Revision 1.2 2001/07/31 16:29:34 chaos
33 Checking in some changes to verify log and ident strings
36 <!-- *********************** Commands ***************************** -->
37 <!-- Diameter Base Protocol Command Codes -->
38 <command name="Abort-Session" code="274" vendor-id="None">
39 <!-- Maybe some avp stuff here one day -->
41 <command name="Accounting" code="271" vendor-id="None"/>
42 <command name="Capabilities-Exchange" code="257" vendor-id="None"/>
43 <command name="Device-Watchdog" code="280" vendor-id="None"/>
44 <command name="Disconnect-Peer" code="282" vendor-id="None"/>
45 <command name="Re-Auth" code="258" vendor-id="None"/>
46 <command name="Session-Termination" code="275" vendor-id="None"/>
47 <!-- ********************** End Commands ************************** -->
49 <!-- ************************* Vendors **************************** -->
50 <vendor vendor-id="None" code="0" name="None"/>
51 <vendor vendor-id="HP" code="11" name="Hewlett Packard"/>
52 <vendor vendor-id="Merit" code="61" name="Merit Networks"/>
53 <vendor vendor-id="Sun" code="42" name="Sun Microsystems, Inc."/>
54 <vendor vendor-id="USR" code="429" name="US Robotics Corp."/>
55 <vendor vendor-id="TGPP" code="10415" name="3GPP"/>
56 <!-- *********************** End Vendors ************************** -->
58 <!-- ************************ typedefn's ************************** -->
59 <typedefn type-name="OctetString"/>
61 The data contains arbitrary data of variable length. Unless
62 otherwise noted, the AVP Length field MUST be set to at least 9
63 (13 if the 'V' bit is enabled). Data used to transmit (human
64 readable) character string data uses the UTF-8 [24] character
65 set and is NOT NULL-terminated. The minimum Length field MUST
66 be 9, but can be set to any value up to 65504 bytes. AVP Values
67 of this type that do not align on a 32-bit boundary MUST have
68 the necessary padding.
70 <typedefn type-name="UTF8String" type-parent="OctetString"/>
72 The UTF8String format is derived from the OctetString AVP Base
73 Format. This is a human readable string represented using the
74 ISO/IEC IS 10646-1 character set, encoded as an OctetString
75 using the UTF-8 [29] transformation format described in RFC
78 Since additional code points are added by amendments to the
79 10646 standard from time to time, implementations MUST be
80 prepared to encounter any code point from 0x00000001 to
81 0x7fffffff. Byte sequences that do not correspond to the valid
82 UTF-8 encoding of a code point or are outside this range are
83 prohibited. Note that since a code point of 0x00000000 is
84 prohibited, no octet will contain a value of 0x00.
86 The use of control codes SHOULD be avoided. When it is
87 necessary to represent a newline, the control code sequence CR
90 The use of leading or trailing white space SHOULD be avoided.
92 For code points not directly supported by user interface
93 hardware or software, an alternative means of entry and
94 display, such as hexadecimal, MAY be provided.
96 For information encoded in 7-bit US-ASCII, the UTF-8 encoding
97 is identical to the US-ASCII encoding.
99 UTF-8 may require multiple bytes to represent a single
100 character / code point; thus the length of a UTF8String in
101 octets may be different from the number of characters encoded.
103 Note that the size of an UTF8String is measured in octets, not
106 The UTF8String MUST not contain any octets with a value of
109 <typedefn type-name="IPAddress" type-parent="OctetString"/>
111 The IPAddress format is derived from the OctetString AVP Base
112 Format. It represents 32 bit (IPv4) [17] or 128 bit (IPv6) [16]
113 address, most significant octet first. The format of the
114 address (IPv4 or IPv6) is determined by the length. If the
115 attribute value is an IPv4 address, the AVP Length field MUST
116 be 12 (16 if 'V' bit is enabled), otherwise the AVP Length
117 field MUST be set to 24 (28 if the 'V' bit is enabled) for IPv6
120 <typedefn type-name="DiameterIdentity" type-parent="OctetString"/>
122 The DiameterIdentity format is derived from the OctetString AVP
123 Base Format. It uses the UTF-8 encoding and has the same
124 requirements as the UTF8String. In addition, it must follow
125 the Uniform Resource Identifiers (URI) syntax [29] rules
128 Diameter-Identity = fqdn [ port ] [ transport ]
131 aaa-protocol = ( "diameter" | "radius" | "tacacs+" )
133 protocol = ";protocol=" aaa-protocol
134 ; If absent, the default AAA protocol
137 fqdn = Fully Qualified Host Name
140 ; One of the ports used to listen for
141 ; incoming connections. ; If absent,
142 ; the default Diameter port (TBD) is
145 transport-protocol = ( "tcp" | "sctp" | "udp" )
147 transport = ";transport=" transport-protocol
149 ; One of the transports used to listen
150 ; for incoming connections. If absent,
151 ; the default SCTP [26] protocol is
152 ; assumed. UDP MUST NOT be used when
153 ; the aaa-protocol field is set to
156 The following are examples of valid Diameter host
159 host.abc.com;transport=tcp
160 host.abc.com:6666;transport=tcp
161 aaa://host.abc.com;protocol=diameter
162 aaa://host.abc.com:6666;protocol=diameter
163 aaa://host.abc.com:6666;transport=tcp;protocol=diameter
164 aaa://host.abc.com:1813;transport=udp;protocol=radius
166 Since multiple Diameter processes on a single host cannot
167 listen for incoming connections on the same port on a given
168 protocol, the DiameterIdentity is guaranteed to be unique per
171 A Diameter node MAY advertise different identities on each
172 connection, via the CER and CEA's Origin-Host AVP, but the same
173 identity MUST be used throughout the duration of a connection.
175 When comparing AVPs of this format, it is necessary to add any
176 absent fields with the default values prior to the comparison.
177 For example, diameter-host.abc.com would be expanded to
178 aaa://diameter/diameter-host.abc.com:TBD;protocol=sctp.
180 <typedefn type-name="IPFilterRule" type-parent="OctetString"/>
182 The IPFilterRule format is derived from the OctetString AVP
183 Base Format. It uses the UTF-8 encoding and has the same
184 requirements as the UTF8String. Packets may be filtered based
185 on the following information that is associated with it:
187 Direction (in or out)
188 Source and destination IP address (possibly masked)
190 Source and destination port (lists or ranges)
196 Rules for the appropriate direction are evaluated in order,
197 with the first matched rule terminating the evaluation. Each
198 packet is evaluated once. If no rule matches, the packet is
199 dropped if the last rule evaluated was a permit, and passed if
200 the last rule was a deny.
202 IPFilterRule filters MUST follow the format:
204 action dir proto from src to dst [options]
206 action permit - Allow packets that match the rule.
207 deny - Drop packets that match the rule.
209 dir "in" is from the terminal, "out" is to the
212 proto An IP protocol specified by number. The "ip"
213 keyword means any protocol will match.
215 src and dst <address/mask> [ports]
217 The <address/mask> may be specified as:
218 ipno An IPv4 or IPv6 number in dotted-
219 quad or canonical IPv6 form. Only
220 this exact IP number will match the
222 ipno/bits An IP number as above with a mask
223 width of the form 1.2.3.4/24. In
224 this case all IP numbers from
225 1.2.3.0 to 1.2.3.255 will match.
226 The bit width MUST be valid for the
227 IP version and the IP number MUST
228 NOT have bits set beyond the mask.
230 The sense of the match can be inverted by
231 preceding an address with the not modifier,
232 causing all other addresses to be matched
233 instead. This does not affect the selection of
236 The keyword "any" is 0.0.0.0/0 or the IPv6
237 equivalent. The keyword "assigned" is the
238 address or set of addresses assigned to the
239 terminal. The first rule SHOULD be "deny in
242 With the TCP, UDP and SCTP protocols, optional
243 ports may be specified as:
245 {port|port-port}[,port[,...]]
247 The `-' notation specifies a range of ports
248 (including boundaries).
250 Fragmented packets which have a non-zero offset
251 (i.e. not the first fragment) will never match
252 a rule which has one or more port
253 specifications. See the frag option for
254 details on matching fragmented packets.
257 frag Match if the packet is a fragment and this is not
258 the first fragment of the datagram. frag may not
259 be used in conjunction with either tcpflags or
260 TCP/UDP port specifications.
263 Match if the IP header contains the comma
264 separated list of options specified in spec. The
265 supported IP options are:
267 ssrr (strict source route), lsrr (loose source
268 route), rr (record packet route) and ts
269 (timestamp). The absence of a particular option
270 may be denoted with a `!'.
273 Match if the TCP header contains the comma
274 separated list of options specified in spec. The
275 supported TCP options are:
277 mss (maximum segment size), window (tcp window
278 advertisement), sack (selective ack), ts (rfc1323
279 timestamp) and cc (rfc1644 t/tcp connection
280 count). The absence of a particular option may
281 be denoted with a `!'.
284 TCP packets only. Match packets that have the RST
287 setup TCP packets only. Match packets that have the SYN
288 bit set but no ACK bit.
291 TCP packets only. Match if the TCP header
292 contains the comma separated list of flags
293 specified in spec. The supported TCP flags are:
295 fin, syn, rst, psh, ack and urg. The absence of a
296 particular flag may be denoted with a `!'. A rule
297 which contains a tcpflags specification can never
298 match a fragmented packet which has a non-zero
299 offset. See the frag option for details on
300 matching fragmented packets.
303 ICMP packets only. Match if the ICMP type is in
304 the list types. The list may be specified as any
305 combination of ranges or individual types
306 separated by commas. The supported ICMP types
309 echo reply (0), destination unreachable (3),
310 source quench (4), redirect (5), echo request
311 (8), router advertisement (9), router
312 solicitation (10), time-to-live exceeded (11), IP
313 header bad (12), timestamp request (13),
314 timestamp reply (14), information request (15),
315 information reply (16), address mask request (17)
316 and address mask reply (18).
318 There is one kind of packet that the access device MUST always
319 discard, that is an IP fragment with a fragment offset of one.
320 This is a valid packet, but it only has one use, to try to
321 circumvent firewalls.
323 An access device that is unable to interpret or apply a deny
324 rule MUST terminate the session. An access device that is
325 unable to interpret or apply a permit rule MAY apply a more
326 restrictive rule. An access device MAY apply deny rules of
327 its own before the supplied rules, for example to protect
328 the access device owner's infrastructure.
330 The rule syntax is a modified subset of ipfw(8) from FreeBSD,
331 and the ipfw.c code may provide a useful base for
334 <typedefn type-name="QOSFilterRule" type-parent="OctetString"/>
336 The QosFilterRule format is derived from the OctetString AVP
337 Base Format. It uses the UTF-8 encoding and has the same
338 requirements as the UTF8String. Packets may be marked or
339 metered based on the following information that is associated
342 Direction (in or out)
343 Source and destination IP address (possibly masked)
345 Source and destination port (lists or ranges)
346 DSCP values (no mask or range)
348 Rules for the appropriate direction are evaluated in order,
349 with the first matched rule terminating the evaluation. Each
350 packet is evaluated once. If no rule matches, the packet is
351 treated as best effort.
353 QoSFilterRule filters MUST follow the format:
355 action dir proto from src to dst [options]
357 tag - Mark packet with a specific DSCP [49].
358 The DSCP option MUST be included.
360 meter - Meter traffic. The metering options
363 dir "in" is from the terminal, "out" is to the
366 proto An IP protocol specified by number. The "ip"
367 keyword means any protocol will match.
369 src and dst <address/mask> [ports]
371 The <address/mask> may be specified as:
372 ipno An IPv4 or IPv6 number in dotted-
373 quad or canonical IPv6 form. Only
374 this exact IP number will match the
376 ipno/bits An IP number as above with a mask
377 width of the form 1.2.3.4/24. In
378 this case all IP numbers from
379 1.2.3.0 to 1.2.3.255 will match.
380 The bit width MUST be valid for the
381 IP version and the IP number MUST
382 NOT have bits set beyond the mask.
384 The sense of the match can be inverted by
385 preceding an address with the not modifier,
386 causing all other addresses to be matched
387 instead. This does not affect the selection of
390 The keyword "any" is 0.0.0.0/0 or the IPv6
391 equivalent. The keyword "assigned" is the
392 address or set of addresses assigned to the
393 terminal. The first rule SHOULD be "deny in
396 With the TCP, UDP and SCTP protocols, optional
397 ports may be specified as:
399 {port|port-port}[,port[,...]]
401 The `-' notation specifies a range of ports
402 (including boundaries).
407 color values as defined in [49]. Exact matching
408 of DSCP values is required (no masks or ranges).
409 the "deny" can replace the color_under or
410 color_over values in the meter action for rate-
411 dependent packet drop.
413 metering <rate> <color_under> <color_over>
414 The metering option provides Assured Forwarding,
415 as defined in [50], and MUST be present if the
416 action is set to meter. The rate option is the
417 throughput, in bits per second, which is used by
418 the access device to mark packets. Traffic above
419 the rate is marked with the color_over codepoint,
420 while traffic under the rate is marked with the
421 color_under codepoint. The color_under and
422 color_over options contain the drop preferences,
423 and MUST conform to the recommended codepoint
424 keywords described in [50] (e.g. AF13).
426 The metering option also supports the strict
427 limit on traffic required by Expedited
428 Forwarding, as defined in [51]. The color_over
429 option may contain the keyword "drop" to prevent
430 forwarding of traffic that exceeds the rate
433 The rule syntax is a modified subset of ipfw(8) from FreeBSD,
434 and the ipfw.c code may provide a useful base for
438 <typedefn type-name="MIPRegistrationRequest" type-parent="OctetString"/>
440 <typedefn type-name="Integer32"/>
442 32 bit signed value, in network byte order. The AVP Length
443 field MUST be set to 12 (16 if the 'V' bit is enabled).
445 <typedefn type-name="VendorId" type-parent="Integer32"/>
446 <typedefn type-name="AppId" type-parent="Integer32"/>
447 <typedefn type-name="Integer64"/>
449 64 bit signed value, in network byte order. The AVP Length
450 field MUST be set to 16 (20 if the 'V' bit is enabled).
452 <typedefn type-name="Unsigned32"/>
454 32 bit unsigned value, in network byte order. The AVP Length
455 field MUST be set to 12 (16 if the 'V' bit is enabled).
456 Unsigned32 values used to transmit time data contains the four
457 most significant octets returned from NTP [18], in network byte
460 <typedefn type-name="Time"/>
462 The Time format is derived from the Unsigned32 AVP Base Format.
463 This is 32 bit unsigned value containing the four most
464 significant octets returned from NTP [18], in network byte
467 This represent the number of seconds since 0h on 1 January 1900
468 with respect to the Coordinated Universal Time (UTC).
470 On 6h 28m 16s UTC, 7 February 2036 the time value will
471 overflow. NTP [18] describes a procedure to extend the time to
474 <typedefn type-name="Unsigned64"/>
476 64 bit unsigned value, in network byte order. The AVP Length
477 field MUST be set to 16 (20 if the 'V' bit is enabled).
479 <!-- ************************* End Typedefns ************************ -->
480 <!-- ******************* DIAMETER BASE PROTOCOL AVPS ************************ -->
481 <avp name="Accounting-Interim-Interval" code="482" mandatory="must" may-encrypt="yes" vendor-bit="mustnot">
482 <type type-name="Unsigned32"/>
484 <avp name="Accounting-Multi-Session-Id" code="50" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
485 <type type-name="Unsigned32"/>
487 <avp name="Accounting-Record-Number" code="485" mandatory="must" may-encrypt="yes" vendor-bit="mustnot">
488 <type type-name="Unsigned32"/>
490 <avp name="Accounting-Record-Type" code="480" mandatory="must" may-encrypt="yes" vendor-bit="mustnot">
491 <type type-name="Unsigned32"/>
492 <enum name="Event Record" code="1"/>
493 <enum name="Start Record" code="2"/>
494 <enum name="Interim Record" code="3"/>
495 <enum name="Stop Record" code="4"/>
497 <avp name="Accounting-Session-Id" code="44" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
498 <type type-name="Unsigned32"/>
500 <avp name="Acct-Application-Id" code="259" mandatory="must" protected="mustnot" may-encrypt="no" vendor-bit="mustnot">
501 <type type-name="AppId"/>
503 <avp name="Alternate-Peer" code="275" mandatory="must" protected="mustnot" may-encrypt="no" vendor-bit="mustnot">
504 <type type-name="DiameterIdentity"/>
506 <avp name="Auth-Application-Id" code="258" mandatory="must" protected="mustnot" may-encrypt="no" vendor-bit="mustnot">
507 <type type-name="AppId"/>
509 <avp name="Auth-Request-Type" code="274" mandatory="must" protected="mustnot" may-encrypt="no" vendor-bit="mustnot">
510 <type type-name="Unsigned32"/>
511 <enum name="Authenticate Only" code="1"/>
512 <enum name="Authorize Only" code="2"/>
513 <enum name="Authorize Authenticate" code="3"/>
515 <avp name="Authorization-Lifetime" code="291" mandatory="must" may-encrypt="no" vendor-bit="mustnot">
516 <type type-name="Integer32"/>
518 <avp name="Auth-Grace-Period" code="276" mandatory="must" may-encrypt="no" vendor-bit="mustnot">
519 <type type-name="Unsigned32"/>
521 <avp name="Auth-Session-State" code="277" mandatory="must" may-encrypt="no" vendor-bit="mustnot">
522 <type type-name="Unsigned32"/>
523 <enum name="State Maintained" code="0"/>
524 <enum name="No State Maintained" code="1"/>
526 <avp name="Re-Auth-Request-Type" code="285" mandatory="must" may-encrypt="no" vendor-bit="mustnot">
527 <type type-name="Unsigned32"/>
528 <enum name="Authorize Only" code="0"/>
529 <enum name="Authorize Authenticate" code="1"/>
531 <avp name="Destination-Host" code="293" mandatory="must" protected="mustnot" may-encrypt="no" vendor-bit="mustnot">
532 <type type-name="DiameterIdentity"/>
534 <avp name="Destination-Realm" code="283" mandatory="must" protected="mustnot" may-encrypt="no" vendor-bit="mustnot">
535 <type type-name="UTF8String"/>
537 <avp name="Disconnect-Cause" code="273" mandatory="must" protected="mustnot" may-encrypt="no" vendor-bit="mustnot">
538 <type type-name="Unsigned32"/>
539 <enum name="Rebooting" code="0"/>
540 <enum name="Busy" code="1"/>
541 <enum name="Do not want to talk to you" code="2"/>
543 <avp name="Error-Message" code="281" mandatory="must" protected="mustnot" may-encrypt="no" vendor-bit="mustnot">
544 <type type-name="UTF8String"/>
546 <avp name="Error-Reporting-Host" code="294" mandatory="must" protected="mustnot" may-encrypt="no" vendor-bit="mustnot">
547 <type type-name="DiameterIdentity"/>
549 <avp name="Failed-AVP" code="279" mandatory="must" may-encrypt="no" vendor-bit="mustnot">
550 <type type-name="OctetString"/>
552 <avp name="Firmware-Revision" code="267" mandatory="must" protected="mustnot" may-encrypt="no" vendor-bit="mustnot">
553 <type type-name="Unsigned32"/>
555 <avp name="Host-IP-Address" code="257" mandatory="must" protected="mustnot" may-encrypt="no" vendor-bit="mustnot">
556 <type type-name="IPAddress"/>
558 <avp name="Multi-Round-Time-Out" code="272" mandatory="must" may-encrypt="yes" vendor-bit="mustnot">
559 <type type-name="Unsigned32"/>
561 <avp name="Origin-Host" code="264" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
562 <type type-name="DiameterIdentity"/>
564 <avp name="Origin-Realm" code="296" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
565 <type type-name="UTF8String"/>
567 <avp name="Origin-State-Id" code="278" mandatory="must" protected="mustnot" vendor-bit="mustnot">
568 <type type-name="Unsigned32"/>
570 <avp name="Product-Name" code="269" mandatory="mustnot" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
571 <type type-name="UTF8String"/>
573 <avp name="Proxy-Host" code="280" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
574 <type type-name="DiameterIdentity"/>
576 <avp name="Proxy-Info" code="284" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
577 <type type-name="OctetString"/>
579 <avp name="Redirect-Host" code="292" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
580 <type type-name="DiameterIdentity"/>
582 <avp name="Redirect-Host-Usage" code="261" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
583 <type type-name="Unsigned32"/>
584 <enum name="Don't Care" code="0"/>
585 <enum name="All Session" code="1"/>
586 <enum name="All Realm" code="2"/>
587 <enum name="Realm and Application" code="3"/>
588 <enum name="All Application" code="4"/>
589 <enum name="All Host" code="5"/>
591 <avp name="Redirect-Max-Cache-Time" code="262" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
592 <type type-name="Unsigned32"/>
594 <avp name="Result-Code" code="268" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
595 <type type-name="Unsigned32"/>
596 <enum name="DIAMETER_MULTI_ROUND_AUTH" code="1001"/>
597 <enum name="DIAMETER_SUCCESS" code="2001"/>
598 <enum name="DIAMETER_LIMITED_SUCCESS" code="2002"/>
599 <enum name="DIAMETER_COMMAND_UNSUPPORTED" code="3001"/>
600 <enum name="DIAMETER_UNABLE_TO_DELIVER" code="3002"/>
601 <enum name="DIAMETER_REALM_NOT_SERVED" code="3003"/>
602 <enum name="DIAMETER_TOO_BUSY" code="3004"/>
603 <enum name="DIAMETER_LOOP_DETECTED" code="3005"/>
604 <enum name="DIAMETER_REDIRECT_INDICATION" code="3006"/>
605 <enum name="DIAMETER_APPLICATION_UNSUPPORTED" code="3007"/>
606 <enum name="DIAMETER_INVALID_HDR_BITS" code="3008"/>
607 <enum name="DIAMETER_INVALID_AVP_BITS" code="3009"/>
608 <enum name="DIAMETER_UNKNOWN_PEER" code="3010"/>
609 <enum name="DIAMETER_AUTHENTICATION_REJECTED" code="4001"/>
610 <enum name="DIAMETER_OUT_OF_SPACE" code="4002"/>
611 <enum name="DIAMETER_ELECTION_LOST" code="4003"/>
612 <enum name="DIAMETER_AVP_UNSUPPORTED" code="5001"/>
613 <enum name="DIAMETER_UNKNOWN_SESSION_ID" code="5002"/>
614 <enum name="DIAMETER_AUTHORIZATION_REJECTED" code="5003"/>
615 <enum name="DIAMETER_INVALID_AVP_VALUE" code="5004"/>
616 <enum name="DIAMETER_MISSING_AVP" code="5005"/>
617 <enum name="DIAMETER_RESOURCES_EXCEEDED" code="5006"/>
618 <enum name="DIAMETER_CONTRADICTING_AVPS" code="5007"/>
619 <enum name="DIAMETER_AVP_NOT_ALLOWED" code="5008"/>
620 <enum name="DIAMETER_AVP_OCCURS_TOO_MANY_TIMES" code="5009"/>
621 <enum name="DIAMETER_NO_COMMON_APPLICATION " code="5010"/>
622 <enum name="DIAMETER_UNSUPPORTED_VERSION" code="5011"/>
623 <enum name="DIAMETER_UNABLE_TO_COMPLY" code="5012"/>
624 <enum name="DIAMETER_INVALID_BIT_IN_HEADER" code="5013"/>
625 <enum name="DIAMETER_INVALID_AVP_LENGTH" code="5014"/>
626 <enum name="DIAMETER_INVALID_MESSAGE_LENGTH" code="5015"/>
627 <enum name="DIAMETER_INVALID_AVP_BIT_COMBO" code="5016"/>
628 <enum name="DIAMETER_NO_COMMON_SECURITY" code="5017"/>
630 <avp name="Experimental-Result" code="297" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
632 <gavp name="Vendor-Id"/>
633 <gavp name="Experimental-Result-Code"/>
636 <avp name="Experimental-Result-Code" code="298" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
637 <type type-name="Unsigned32"/>
638 <enum name="First Registration" code="2001"/>
639 <enum name="Subsequent Registration" code="2002"/>
640 <enum name="Unregistered Service" code="2003"/>
641 <enum name="Success Server Name Not Stored" code="2004"/>
642 <enum name="Server Selection" code="2005"/>
643 <enum name="Error User Unknown" code="5001"/>
644 <enum name="Error Identities Dont Match" code="5002"/>
645 <enum name="Error Identity Not Registered" code="5003"/>
646 <enum name="Error Roaming Not Allowed" code="5004"/>
647 <enum name="Error Roaming Identity Already Registered" code="5005"/>
648 <enum name="Error Roaming Auth Scheme Not Supported" code="5006"/>
649 <enum name="Error In Assignment Type" code="5007"/>
650 <enum name="Error Too Much Data" code="5008"/>
651 <enum name="Error Not Supported User Data" code="5009"/>
653 <avp name="Route-Record" code="282" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
654 <type type-name="DiameterIdentity"/>
656 <avp name="Session-Id" code="263" mandatory="must" protected="mustnot" vendor-bit="mustnot">
657 <type type-name="UTF8String"/>
659 <avp name="Session-Binding" code="270" mandatory="must" protected="mustnot" vendor-bit="mustnot">
660 <type type-name="Unsigned32"/>
662 <avp name="Session-Server-Failover" code="271" mandatory="must" protected="mustnot" vendor-bit="mustnot">
663 <type type-name="Unsigned32"/>
664 <enum name="Refuse Service" code="0"/>
665 <enum name="Try Again" code="1"/>
666 <enum name="Allow Service" code="2"/>
667 <enum name="Try Again / Allow Service" code="3"/>
669 <avp name="Source-Route" code="286" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
670 <type type-name="DiameterIdentity"/>
672 <avp name="Supported-Vendor-Id" code="265" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
673 <type type-name="VendorId"/>
675 <avp name="Termination-Cause" code="295" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
676 <type type-name="Unsigned32"/>
677 <enum name="Logout" code="1"/>
678 <enum name="Service Not Provided" code="2"/>
679 <enum name="Bad Answer" code="3"/>
680 <enum name="Administrative" code="4"/>
681 <enum name="Link Broken" code="5"/>
683 <avp name="Vendor-Id" code="266" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
684 <type type-name="VendorId"/>
686 <avp name="Vendor-Specific-Application-Id" code="260" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="mustnot">
688 <gavp name="Vendor-Id"/>
689 <gavp name="Auth-Application-Id"/>
690 <gavp name="Acct-Application-Id"/>
693 <avp name="Example-AVP" code="999999" mandatory="mustnot" vendor-bit="may">
695 <gavp name="Origin-Host"/>
696 <gavp name="Host-IP-Address"/>
699 <!-- ************************ END DIAMETER BASE PROTOCOL AVPS ******************* -->