The following sections in the config file can be used to configure authentication.
The section defines the authentication mechanism for the gatekeeper.
authrule=actions
<authrule> := SimplePasswordAuth | AliasAuth | FileIPAuth | PrefixAuth | RadAuth | RadAliasAuth | SQLAuth | SQLAliasAuth | SQLPasswordAuth | CapacityControl | ...
<actions> := <control>[;<ras>|<q931>,<ras>|<q931>,...]
<control> := optional | required | sufficient | alternative
<ras> := GRQ | RRQ | URQ | ARQ | BRQ | DRQ | LRQ | IRQ
<q931> := Setup | SetupUnreg
ok
- The request is authenticated by this module.fail
- The authentication fails and should be rejected.next
- The rule cannot determine the request.optional
- If the rule cannot determine the request or accepts it, it is passed to next rule. Otherwise processing stops and the request is rejectedrequired
- The requests should be authenticated by this module, or it would be rejected. The authenticated request would then be passed to next rule.sufficient
- If the request is authenticated, it is accepted, or it would be rejected. That is, the rule determines the fate of the request. No rule should be put after a sufficient rule, since it won't take effect.alternative
- similar to the sufficient
rule, except that if the module cannot determine request fate, the request is passed to a next module.Currently supported modules: (most of them only support a subset of the ras or q931 actions)
SimplePasswordAuth/SQLPasswordAuth/H350PasswordAuth
These modules check the tokens or cryptoTokens fields of RAS message.
The tokens should contain at least generalID and password.
For cryptoTokens, cryptoEPPwdHash tokens hashed by simple MD5 and
nestedcryptoToken tokens hashed by HMAC-SHA1-96 (libssl must be installed!)
are supported now. For tokens tokens hashed by CAT (Cisco Access Token)
and a clear text username/password are supported now.
The ID and password are read from
[SimplePasswordAuth] section,
an SQL database for SimplePasswordAuth
and SQLPasswordAuth
modules. MySQLPasswordAuth
module is supported for backward compatibility. For H.350.2 authentication ie.
H350PasswordAuth
the GkH350::Settings
section connection information must be completed.
AliasAuth/SQLAliasAuth
The module can only be used to authenticate RegistrationRequest (RRQ).
The IP of an endpoint with a given alias should match a specified pattern.
For AliasAuth
the pattern is defined in
[RasSrv::RRQAuth] section.
For SQLAliasAuth
, the pattern is retrieved from an SQL database,
defined in
[SQLAliasAuth] section.
FileIPAuth
This module provides a simple way to restrict access to the gatekeeper based on caller's IP/network.
PrefixAuth
The IP or aliases of a request with a given prefix must match a specified pattern. See section [PrefixAuth] for details. Currently the module can only authorize AdmissionRequest (ARQ) and LocationRequest (LRQ).
RadAuth
Provides authentication based on H.235 username/password
security scheme. Authenticates RRQ, ARQ and Q.931 Setup through remote
RADIUS servers. It passes to RADIUS servers usernames and passwords
extracted from CAT (Cisco Access Tokens) tokens carried
inside RRQ, ARQ or Setup packets. Therefore if your endpoints do not
support CATs or you do not need authentication scheme based on
individually assigned usernames/password - this module will not
work for you (but you may check RadAliasAuth
module).
See section
[RadAuth] for details.
RadAliasAuth
Provides authentication based on endpoint aliases
and/or call signaling IP addresses with remote RADIUS servers.
It does not need any H.235 tokens inside RAS messages,
so it can be used on a wider range of systems as compared to RadAuth
.
RRQ, ARQ and Q.931 Setup messages can be authenticated using this module.
See section
[RadAliasAuth] for details.
SQLAuth
A powerful module to authenticate and authorize RRQ, ARQ, LRQ and Setup messages. It can perform checks based on various parameters, like caller's number, destination number, username and more. It also supports enforcing call duration limit, number rewriting, call routing, alias verification and assignment. See section [SQLAuth] for more details.
CapacityControl
A flexible module to control inbound call volume with ability to configure
various conditions. IMPORTANT: It has to be used in conjunction with CapacityControl
accounting module. See section
[CapacityControl] for more details.
You can also configure a rule to check only for some particular RAS messages.
The following example configures SimplePasswordAuth
as an optional rule
to check RRQ and ARQ. If an RRQ is not checked (not contains
tokens or cryptoTokens fields), it is checked by AliasAuth
.
The default is to accept all requests.
SimplePasswordAuth=alternative;RRQ,ARQ
AliasAuth=sufficient;RRQ
The example below authenticates all calls, checking signaling Setup message details, using RadAliasAuth module.
RadAliasAuth=required;Setup
default=allow
This example checks endpoint registrations (RRQ) and call admissions (ARQ) either by means of username/password (RadAuth) or alias/IP (RadAliasAuth). Additionally, if the call is from an unregistered endpoint (and therefore no RRQ or ARQ authentication has been performed), Setup message authentication using RadAliasAuth takes place (SetupUnreg).
RadAuth=alternative;RRQ,ARQ
RadAliasAuth=alternative;RRQ,ARQ,SetupUnreg
default=reject
This section defines a list of IP addresses/networks which are allowed
to access gatekeeper resources. A list of allowed prefixes can be specified
together with an IP address. Supported Gatekeeper::Auth events are:
GRQ
, RRQ
, LRQ
, Setup
and SetupUnreg
. Format
of a single entry is:
IP=[allow | reject][;prefix[,prefix...]]
where IP is a single IP address, a network address (in A.B.C.D/M.M.M.M or A.B.C.D/LENGTH format) or a string 'any'
or '*'
to match any address.
The access list can also be loaded from an external file using include
directive. During authentication, network mask length defines a priority for each
entry, so rule 192.168.1.1=allow takes precedence over 192.168.1.0/24=reject.
[Gatekeeper::Auth]
FileIPAuth=required;RRQ,LRQ,Setup
[FileIPAuth]
192.168.1.240=reject
192.168.1.0/24=allow
192.168.2.0/255.255.255.0=allow;48,49,44
any=reject
[Gatekeeper::Auth]
FileIPAuth=required;Setup
[FileIPAuth]
include=/etc/gnugk/accesslist.ini
(EOF)
Contents of /etc/gnugk/accesslist.ini:
[FileIPAuth]
192.168.1.1=allow
192.168.1.100=allow
any=reject
The section defines the userid and password pairs used by
SimplePasswordAuth
module. All passwords are encrypted
using the addpasswd
utility.
Usage:
addpasswd config section userid password
Example:
addpasswd config.ini SimplePasswordAuth frank secret
Options:
KeyFilled=123
0
Default value to use as a padding byte during password encryption/decryption.
CheckID=1
0
Check if the aliases match the ID in the tokens.
PasswordTimeout=120
-1
The module SimplePasswordAuth
and all its descendants will cache an
authenticated password. This field define the cache timeout value in second.
0
means never cache the password, while a negative value
means the cache never expires.
Authenticate H.235 enabled endpoints using passwords stored in the SQL database. This section defines SQL driver to use, SQL database connection parameters and the query to use to retrieve passwords.
Driver=MySQL | PostgreSQL | Firebird
N/A
SQL database driver to use. Currently, MySQL
, PostgreSQL
and Firebird
drivers
are implemented.
Host=DNS[:PORT] | IP[:PORT]
localhost
SQL server host address. Can be in the form of DNS[:PORT]
or IP[:PORT]
.
Like sql.mycompany.com
or sql.mycompany.com:3306
or 192.168.3.100
.
Database=billing
billing
The database name to connect to.
Username=gnugk
The username used to connect to the database.
Password=secret
The password used to connect to the database.
If the password is not specified, a database connection attempt
without any password will be made.
If EncryptAllPasswords
is enabled, or a KeyFilled
variable is defined
in this section, the password is in an encrypted form and should be created using
the addpasswd
utility.
CacheTimeout=120
0
This field defines how long (alias;password) pairs retrieved from the database
will be cached in the local memory. The cache timeout value is expressed in seconds.
0
means to not cache passwords, while a negative value
means the cache never expires (only reload
command will refresh the cache).
MinPoolSize=5
1
Define the number of active SQL connections. This allows better performance
under heavy load, because more than 1 concurrent query can be executed
at the same time. MinPoolSize=1
setting simulates old behavior,
when access to the SQL database is serialized (one query at time).
Query=SELECT ...
N/A
Defines SQL query used to retrieve H.235 password from the database. The query
is parameterized - that means parameter replacement is made before each query
is executed. Parameter placeholders are denoted by %1, %2, ... strings.
Specify %% to embed a percent character before a digit into string (like %%1),
specify %{1} to allow expansion inside complex expressions like %{1}123.
For SQLPasswordAuth
two parameters are defined:
%1
- the actual alias to query the password for%2
- the gatekeeper identifierSample query strings:
SELECT h235password FROM users WHERE alias = '%1' AND active
SELECT h235password FROM users WHERE alias = '%1' AND gk = '%2'
Specify the action on RRQ reception (confirm or deny) for AliasAuth
module.
The first alias (this will mostly be an H323ID) of the endpoint to
register is looked up in this section. If a parameter is found the value will
apply as a rule. A rule consists of conditions separated by "&".
A registration is accepted when all conditions apply.
<authrules> := empty | <authrule> "&" <authrules>
<authrule> := <authtype> ":" <authparams>
<authtype> := "sigaddr" | "sigip"
<autparams> := [!&]*
The notation and meaning of <authparams>
depends on
<authtype>
:
sigaddr
- extended regular expression that has to match against the
``PrintOn(ostream)'' representation of the signal address of the request.
Example:
sigaddr:.*ipAddress .* ip = .* c0 a8 e2 a5 .*port = 1720.*
sigip
- specialized form of `sigaddr
'.
Write the signaling IP address using (commonly used) decimal notation:
``byteA.byteB.byteC.byteD:port
''.
Example:
sigip:192.168.242.165:1720
allow
- always accept the alias.
deny
- always reject the alias.
Authenticate endpoints using rules stored in the SQL database (the rules conform to the format defined in the [RasSrv::RRQAuth] section). This section defines SQL driver to use, SQL database connection parameters and the query to use to retrieve the patterns.
Driver=MySQL | PostgreSQL | Firebird
N/A
SQL database driver to use. Currently, MySQL
, PostgreSQL
and Firebird
drivers
are implemented.
Host=DNS[:PORT] | IP[:PORT]
localhost
SQL server host address. Can be in the form of DNS[:PORT]
or IP[:PORT]
.
Like sql.mycompany.com
or sql.mycompany.com:3306
or 192.168.3.100
.
Database=billing
billing
The database name to connect to.
Username=gnugk
The username used to connect to the database.
Password=secret
The password used to connect to the database.
If the password is not specified, a database connection attempt
without any password will be made.
If EncryptAllPasswords
is enabled, or a KeyFilled
variable is defined
in this section, the password is in encrypted form and should be created using
the addpasswd
utility.
CacheTimeout=120
0
This field defines how long (alias;authrule) pairs retrieved from the database
will be cached in the local memory. The cache timeout value is expressed in seconds.
0
means to not cache rules, while a negative value
means the cache never expires (only reload
command will refresh the cache).
MinPoolSize=5
1
Define the number of active SQL connections. This allows better performance
under heave load, because more than 1 concurrent query can be executed
at the same time. MinPoolSize=1
setting simulates old behavior,
when access to the SQL database is serialized (one query at time).
Query=SELECT ...
N/A
Defines SQL query used to retrieve alias rule from the database. The query
is parameterized - that means parameter replacement is made before each query
is executed. Parameter placeholders are denoted by %1, %2, ... strings.
Specify %% to embed a percent character before a digit into string (like %%1),
specify %{1} to allow expansion inside complex expressions like %{1}123.
For SQLAliasAuth
two parameters are defined:
%1
- the actual alias to query the rule for%2
- the gatekeeper identifierSample query strings:
SELECT authrule FROM users WHERE alias = '%1' AND active
SELECT 'sigip:' || host(ip) || port FROM users WHERE alias = '%1'
Authenticate and authorize endpoints/calls using an SQL database. Support for RRQ, ARQ, LRQ and Setup events is provided.
Driver=MySQL | PostgreSQL | Firebird
N/A
SQL database driver to use. Currently, MySQL
, PostgreSQL
and Firebird
drivers
are implemented.
Host=DNS[:PORT] | IP[:PORT]
localhost
SQL server host address. Can be in the form of DNS[:PORT]
or IP[:PORT]
.
Like sql.mycompany.com
or sql.mycompany.com:3306
or 192.168.3.100
.
Database=billing
billing
The database name to connect to.
Username=gnugk
The username used to connect to the database.
Password=secret
The password used to connect to the database.
If the password is not specified, a database connection attempt
without any password will be made.
If EncryptAllPasswords
is enabled, or a KeyFilled
variable is defined
in this section, the password is in encrypted form and should be created using
the addpasswd
utility.
MinPoolSize=5
1
Define the number of active SQL connections. This allows better performance
under heave load, because more than 1 concurrent query can be executed
at the same time. MinPoolSize=1
setting simulates old behavior,
when access to the SQL database is serialized (one query at time).
RegQuery=SELECT ...
N/A
Define an SQL query to be used to perform authentication and authorization of endpoint registrations. The query is parameterized - that means parameter replacement is made before each query is executed. The following parameters are defined:
%g
- the gatekeeper identifier%{gkip}
- a gatekeeper IP the request has been received on%u
- username associated with an endpoint (usually an H.323 ID)%{callerip}
- caller's IP (the request has been received from - NAT IP for natted endpoints)%{aliases}
- a comma separated list of endpoint aliasesIf the query returns no rows, the result is undefined, which basically
means failure for required
rules and "try next" for optional rules.
Otherwise, the first result row is examined to determine authentication
result and get additional information:
'aliases'
, replace original endpoint
aliases with these new ones'billingmode'
, set a billing mode
associated with the endpoint (0 - credit, 'creditamount'
, set account balance
associated with the endpoint (this is an arbitrary string)Query string examples:
SELECT 1, 0 AS billingmode, '12.00 USD' AS creditamount
SELECT NOT disabled, assignaliases AS aliases, balance FROM users WHERE h323id = '%u'
SELECT * FROM get_registration_auth('%g', '%u', '%{callerip}', '%{aliases}') AS result(accept, aliases, billingmode, creditamount)
NbQuery=SELECT ...
N/A
Define an SQL query to be used to perform authentication and authorization of location requests sent from neighbors. The query is parameterized - that means parameter replacement is made before each query is executed. The following parameters are defined:
%g
- the gatekeeper identifier%{gkip}
- a gatekeeper IP the request has been received on%{nbid
- neighbor identifier from the config%{nbip}
- neighbor IP (the request has been received from)%{Calling-Station-Id}
- caller's number, if available%{src-info}
- content of sourceInfo LRQ field, if available%{Called-Station-Id}
- destination number%{dest-info}
- content of destinationInfo LRQ field%{bandwidth}
- requested bandwidth, if present in the LRQIf the query returns no rows, the result is undefined, which basically
means failure for required
rules and "try next" for optional rules.
Otherwise, the first result row is examined to determine authentication
result and get additional information:
'destination'
, populate the original
destinationInfo field with these new aliases - this may affect routing
decision, which is made after auth stepQuery string examples:
SELECT active FROM neighbors WHERE name = '%{nbid}' AND ip = '%{nbip}' UNION SELECT 0
CallQuery=SELECT ...
N/A
Define an SQL query to be used to perform authentication and authorization of calls (ARQ and Setup). The query is parameterized - that means parameter replacement is made before each query is executed. The following parameters are defined:
%g
- the gatekeeper identifier%{gkip}
- a gatekeeper IP the request has been received on%u
- an username associated with the caller%{callerip}
- caller's IP (the request has been received from - NAT IP for natted endpoints)%{Calling-Station-Id}
- caller's number, if available%{Called-Station-Id}
- destination number%{Dialed-Number}
- original destination number (before rewrite)%{CallId}
- H.323 call identifier (16 hex 8-bit digits)%{bandwidth}
- requested bandwidth, if present in the ARQ%{answer}
- 1, if the request is an answering ARQ%{arq}
- 1 for ARQ triggered query, 0 for Setup triggered queryIf the query returns no rows, the result is undefined, which basically
means failure for required
rules and "try next" for optional rules.
Otherwise, the first result row is examined to determine authentication
result and get additional information:
'billingmode'
, set a billing mode
associated with the endpoint (0 - credit, 'creditamount'
, set account balance
associated with the endpoint (this is an arbitrary string)'credittime'
, use its integer
value to set call duration limit'redirectnumber'
, replace
the original destination number with this one'redirectip'
, force the call
to be sent to the specified IP (one can put multiple destinations
separated by a semicolon)'proxy'
, force the gatekeeper
to enable/disable (depends on the 'proxy' column value) RTP proxy
for this callQuery string examples:
SELECT 1, 360 AS credittime, 0 AS proxy
SELECT * FROM auth_call('%g', '%u', '%{Calling-Station-Id}', '%{callerip}', '%{Called-Station-Id}') AS result(accept, credittime)
SELECT 1, '1234' AS redirectnumber, '192.168.1.1' AS redirectip
The section defines the authentication rule for PrefixAuth
module.
Currently, only ARQs and LRQs can be authorized by this module.
First, a most specific prefix is selected according to the destinationInfo
field of the received request. Then the request is accepted or rejected
according to the matched rules with most specific netmask.
If no matched prefix is found,
and the default
option is specified, the request is accepted
or rejected according to that. Otherwise
it is rejected or passed to next authentication module
according to the module requirement.
prefix=authrule[|authrule|...]
<authrule> := <result> <authrule>
<result> := deny | allow
<authrule> := [!]ipv4:<iprule> | [!]alias:<aliasrule>
<iprule>
can be specified in decimal dot notation or
CIDR notation, <aliasrule>
is expressed in regular expression.
If the `!
' flag precedes the rule, the sense is inverted.
555=deny ipv4:10.0.0.0/27|allow ipv4:0/0
5555=allow ipv4:192.168.1.1|deny ipv4:192.168.1.0/255.255.255.0
86=deny !ipv4:172.16.0.0/24
09=deny alias:^188884.*
ALL=allow ipv4:ALL
In this configuration, all endpoints except from network 10.0.0.0/27
are allow to call prefix 555 (except 5555).
Endpoints from 192.168.1.0/24
are not allowed to call prefix 5555,
except 192.168.1.1
.
Endpoints not from 172.16.0.0/24
are denied to call prefix 86.
Endpoints having an alias beginning with 188884 are not allowed to call
prefix 09. All other situations are allowed.
This section defines configuration settings that enable RADIUS authentication based on H.235 CATs (Cisco Access Tokens) present in RRQ, ARQ RAS requests and Q.931 Setup messages.
Servers=SERVER1[:AUTH_PORT[:ACCT_PORT[:SECRET]]];SERVER2[:AUTH_PORT[:ACCT_PORT[:SECRET]]];...
N/A
RADIUS servers to be used for authentication. The list can contain an arbitrary
number of servers. The order of servers is important, because servers will
be queried by the RADIUS module in the given order. If no port information
is provided, port number from DefaultAuthPort
will be used. If no secret is set,
the default shared secret from SharedSecret
is taken.
Servers names can be IP addresses or DNS names.
Servers
lines:Servers=192.168.1.1
Servers=192.168.1.1:1645
Servers=192.168.1.1:1645:1646:secret1
Servers=radius1.mycompany.com:1812
Servers=radius1.mycompany.com;radius2.mycompany.com
Servers=radius1.mycompany.com:1812:1813:secret1;radius2.mycompany.com:1812:1813:secret2
LocalInterface=IP_OR_FQDN
N/A
Particular local network interface that RADIUS client should use in order to communicate with RADIUS servers. This parameter can be useful on NAT machines to restrict number of network interfaces used for RADIUS communication. By default this value is empty and allows RADIUS requests to be sent on any (best suitable) network interface. If you are not sure what you are doing, it is better to leave this option unset.
RadiusPortRange=10000-11000
N/A
By default (if this option is not set) RADIUS client allocates ports dynamically as specified by the operating system. If you want to restrict RADIUS client to use ports from a particular range only - set this parameter.
DefaultAuthPort=PORT_NO
1812
Default port number to be used for RADIUS authentication requests
(Access-Request packets), if not overridden by Servers
attribute.
SharedSecret=SECRET
N/A (empty string)
Secret used to authenticate this GnuGk (NAS client) to RADIUS
server. It should be a cryptographically strong password. This is the default
value used, if no server-specific secret is set in the Servers
.
If EncryptAllPasswords
is enabled, or a KeyFilled
variable is defined
in this section, the password is in encrypted form and should be created using
the addpasswd
utility.
RequestTimeout=TIMEOUT_MS
2000
(milliseconds)Timeout (milliseconds) for RADIUS server response to a request sent by GnuGk. If no response is received within this time period, next RADIUS server is queried.
IdCacheTimeout=TIMEOUT_MS
9000
(milliseconds)Timeout (milliseconds) for RADIUS request 8-bit identifiers to be unique. If all 8-bit identifier range is exhausted within this period, new client socket (UDP socket) is allocation by RADIUS module. Let's take the example: we have approximately 60 RRQs/sec - after ca. 4 seconds 8-bit identifiers range gets exhausted - new socket allocated - after next 4 seconds the second 8-bit identifiers range gets exhausted - third socket allocated - after 9th second identifiers from the pool 1 are available again - ... . In general, too long timeout - too much resources consumed, too short timeout - RADIUS server may take incoming packets as duplicated and therefore drop it.
SocketDeleteTimeout=TIMEOUT_MS
60000
(milliseconds) - 60 sTimeout for unused RADIUS sockets to be closed. It is used
in conjunction with IdCacheTimeout
- additional sockets
created during heavy GK load time periods for serving incoming
requests are closed during idle periods.
RequestRetransmissions=NUMBER
2
How many times a single RADIUS request is transmitted to every
configured RADIUS server (if no response is received). 1 means
no retransmission, 2 - single retransmission, ... . Exact retransmission
method is defined by RoundRobinServers
attribute.
RoundRobinServers=BOOLEAN
1
RADIUS requests retransmission method.
If set to 1, RADIUS request is transmitted in the following way (until response is received):
Server #1 Attempt #1, Server #2 Attempt #1, ..., Server #N Attempt #1
...
Server #1 Attempt #RequestRetransmissions, ..., Server #1 Attempt #RequestRetransmissions
If set to 0, the following sequence is preserved:
Server #1 Attempt #1, ..., Server #1 Attempt #RequestRetransmissions
...
Server #N Attempt #1, ..., Server #N Attempt #RequestRetransmissions
AppendCiscoAttributes=BOOLEAN
0
If set, Cisco Vendor Specific RADIUS attributes are included in RADIUS requests (h323-conf-id,h323-call-origin,h323-call-type).
IncludeTerminalAliases=BOOLEAN
1
If set, Cisco VSA 'h323-ivr-out' attribute is sent with a list of aliases the endpoint is registering (RRQ.m_terminalAlias). This attribute is provided in order to provide fine control over the list of aliases the endpoint is allowed to register with. Format of this attribute is:
Cisco-AV-Pair = "h323-ivr-out=terminal-alias:" alias [,alias] [;]
Example:
Cisco-AV-Pair = "h323-ivr-out=terminal-alias:helpdesk,support,77771;"
UseDialedNumber=BOOLEAN
0
Select Called-Station-Id number type between the original one (as dialed
by the user) - UseDialedNumber=1
- and the rewritten one - UseDialedNumber=0
.
This section defines configuration settings that enable RADIUS authentication based on endpoint aliases and/or IP addresses present in RRQ RAS requests, ARQ RAS request or Q.931 Setup request. This authentication scheme is useful both for endpoints registered at the gatekeeper (ARQ,RRQ) and calls from unregistered endpoints (Setup).
Servers=SERVER1[:AUTH_PORT[:ACCT_PORT[:SECRET]]];SERVER2[:AUTH_PORT[:ACCT_PORT[:SECRET]]];...
N/A
RADIUS servers to be used for RAS requests authentication.
This list can contain an arbitrary number of servers. The order of servers
is important, because servers will be queried by the RADIUS module
in the given order. If no port information is specified, port number from
DefaultAuthPort
will be used. If no secret is set,
the default shared secret from SharedSecret
is used.
Servers can be IP addresses or DNS names.
Servers=192.168.3.1:1645;192.168.3.2:1812:1813:mysecret;radius.mycompany.com
LocalInterface=IP_OR_FQDN
N/A
Particular local network interface that RADIUS client should use in order to communicate with RADIUS servers. This parameter can be useful on NAT machines to restrict number of network interfaces used for RADIUS communication. By default this value is empty and allows RADIUS requests to be sent on any (best suitable) network interface. If you are not sure what you are doing, it is better to leave this option unset.
RadiusPortRange=10000-11000
N/A
By default (if this option is not set) RADIUS client allocates ports dynamically as specified by the operating system. If you want to restrict RADIUS client to use ports from a particular range only - set this parameter.
DefaultAuthPort=PORT_NO
1812
Default port number to be used for RADIUS authentication requests
(Access-Request packets), if not overridden by Servers
attribute.
SharedSecret=SECRET
N/A (empty string)
Secret used to authenticate this GnuGk (NAS client) to RADIUS
server. It should be a cryptographically strong password. This is the default
value used, if no server-specific secret is set in the Servers
.
If EncryptAllPasswords
is enabled, or a KeyFilled
variable is defined
in this section, the password is in encrypted form and should be created using
the addpasswd
utility.
RequestTimeout=TIMEOUT_MS
2000
(milliseconds)Timeout (milliseconds) for RADIUS server response to a request sent by GnuGk. If no response is received within this time period, next RADIUS server is queried.
IdCacheTimeout=TIMEOUT_MS
9000
(milliseconds)Timeout (milliseconds) for RADIUS request 8-bit identifiers to be unique. If all 8-bit identifier range is exhausted within this period, new client socket (UDP socket) is allocation by RADIUS module. Let's take the example: we have approximately 60 RRQs/sec - after ca. 4 seconds 8-bit identifiers range gets exhausted - new socket allocated - after next 4 seconds the second 8-bit identifiers range gets exhausted - third socket allocated - after 9th second identifiers from the pool 1 are available again - ... . In general, too long timeout - too much resources consumed, too short timeout - RADIUS server may take incoming packets as duplicated and therefore drop it.
SocketDeleteTimeout=TIMEOUT_MS
60000
(milliseconds) - 60 sTimeout for unused RADIUS sockets to be closed. It is used
in conjunction with IdCacheTimeout
- additional sockets
created during heavy GK load time periods for serving incoming
requests are closed during idle periods.
RequestRetransmissions=NUMBER
2
How many times a single RADIUS request is transmitted to every
configured RADIUS server (if no response is received). 1 means
no retransmission, 2 - single retransmission, ... . Exact retransmission
method is defined by RoundRobinServers
attribute.
RoundRobinServers=BOOLEAN
1
RADIUS requests retransmission method.
If set to 1, RADIUS request is transmitted in the following way (until response is received):
Server #1 Attempt #1, Server #2 Attempt #1, ..., Server #N Attempt #1
...
Server #1 Attempt #RequestRetransmissions, ..., Server #1 Attempt #RequestRetransmissions
If set to 0, the following sequence is preserved:
Server #1 Attempt #1, ..., Server #1 Attempt #RequestRetransmissions
...
Server #N Attempt #1, ..., Server #N Attempt #RequestRetransmissions
AppendCiscoAttributes=BOOLEAN
1
If set, Cisco Vendor Specific RADIUS attributes are included in RADIUS requests (h323-conf-id,h323-call-origin,h323-call-type).
IncludeTerminalAliases=BOOLEAN
1
If set, Cisco VSA 'h323-ivr-out' attribute is sent with a list of aliases the endpoint is registering (RRQ.m_terminalAlias). This attribute is provided in order to provide fine control over the list of aliases the endpoint is allowed to register with. Format of this attribute is:
Cisco-AV-Pair = "h323-ivr-out=terminal-alias:" alias [,alias] [;]
Example:
Cisco-AV-Pair = "h323-ivr-out=terminal-alias:helpdesk,support,77771;"
FixedUsername
N/A
If this parameter is set, it overwrites a value of User-Name RADIUS attribute
for outgoing RADIUS request. That means every Access-Request will be
authenticated as for user FixedUsername
.
FixedPassword
N/A
If not set, User-Password is a copy of User-Name. For example, if User-Name
is 'john' then User-Password will also be set to 'john'. Setting this
parameter overrides this behavior and User-Password attribute will be
always set to the value of FixedPassword
.
If EncryptAllPasswords
is enabled, or a KeyFilled
variable is defined
in this section, the password is in encrypted form and should be created using
the addpasswd
utility.
(Neither FixedUsername nor FixedPassword set)
All endpoints will be authenticated using their alias as the username
and the password. That means, for example, endpoint 'EP1' will be authenticated
with the username 'EP1 and the password 'EP1'.
(FixedUsername not set)
FixedPassword=ppp
All endpoints will be authenticated using their alias and the password 'ppp'.
FixedUsername=ppp
FixedPassword=ppp
All endpoints will be authenticated using the username 'ppp'
and the password 'ppp'.
UseDialedNumber=BOOLEAN
0
Select Called-Station-Id number type between the original one (as dialed
by the user) - UseDialedNumber=1
- and the rewritten one - UseDialedNumber=0
.
This section contains a set of rules for controlling inbound call volume depending on various conditions. In order this module to work, CapacityControl authentication and accounting modules have to be enabled like this:
[Gatekeeper::Auth]
CapacityControl=required;Setup
[Gatekeeper::Acct]
CapacityControl=required;start,stop
A capacity rule can be matched by a caller's IP, caller's H.323 ID and/or
caller's number (CLI) - in the order specified. In addition, the match can
be narrowed by specifying a called number pattern. This module works by keeping
lists of current call volume for each inbound route (rule) - this is done
by having CapacityControl
accounting module configured to add/remove
active calls from matching routes. CapacityControl
authentication module
checks rules and accepts/rejects a call based on current/max call volume
for a matching inbound route.
[ip:CALLER_IP|h323id:CALLER_H323ID|cli:CALLER_NUMBER]=[CALLED NUMBER REGEX PATTERN] MAX_CAPACITY
ip:
, h323id:
and cli:
prefixes define rule type. An inbound call
will be matched either by caller's IP, H.323ID or CLI. The optional CALLED NUMBER REGEX PATTERN
is a regular expression that the called number should match to apply this rule to.
MAX_CAPACITY
is maximum number of active calls for this route.
[CapacityControl]
ip:192.168.1.0/24=30
ip:any=120
These rules tell that the 192.168.1.0/24 subnet can send up to 30 concurrent calls, while all other IPs can send up to 120 concurrent calls.
[CapacityControl]
%r1% cli:1001=30
%r2% cli:1001=^48(50|51) 5
These rules limit caller with CLI 1001 to send up to 5 calls to 4850/4851
destinations and up to 30 calls to other destinations. %r1% and %r2% are
special constructs to allow having the same cli:1001
config key more
than once.
This section defines the LDAP server and standard H.350 directory operating parameters to be used.
ServerName
127.0.0.1
The LDAP server IP address.
ServerPort
389
The LDAP server's TCP port (usually 389).
SearchBaseDN
N/A
Entry point into the server's H.350 directory structure. Searches are only made below this root node.
BindUserDN
N/A
The distinguished name the gatekeeper uses to bind to the LDAP server. Leave empty if you want to access the LDAP server anonymously.
BindUserPW
N/A
If you specified BindUserDN
, then specify the corresponding
password to be used for binding here.
If EncryptAllPasswords
is enabled, or a KeyFilled
variable is defined
in this section, the password is in an encrypted form and should be created
using the addpasswd
utility.
BindAuthMode
simple
Bind Authentication method choices are simple,sasl,kerberos
ServiceControl=BOOLEAN
0
Use RRQ/RCF service control field to advise an endpoint of the H.350 directory and searchDN to use for white page lookups.
AssignedAliases=BOOLEAN
0
Use H.350.1 to advise endpoints of their assigned aliases.
GatekeeperDiscovery=BOOLEAN
0
Use H.350.1 to resolve on GRQ/GCF the registering endpoints assigned gatekeeper (h323IdentityGKDomain).