radext-3----Page:5
1  2  3  4  5  6  7  8  9 

Requirements (1/4)
Proposals are not restricted to utilizing technology described in existing RFCs.
Proposals MUST support the negotiation of cryptographic algorithms for per-packet integrity/authentication protection.
Support for confidentiality of entire RADIUS packets is OPTIONAL.
However, proposals MUST support the negotiation of algorithms for encryption (sometimes referred to as "hiding") of RADIUS attributes.
It is desirable for proposals to provide for the encryption of existing attributes.

PPT Version