@misc{rfc7499, series = {Request for Comments}, number = 7499, howpublished = {RFC 7499}, publisher = {RFC Editor}, doi = {10.17487/RFC7499}, url = {https://www.rfc-editor.org/info/rfc7499}, author = {Alejandro Pérez-Méndez and Rafael Marin-Lopez and Fernando Pereniguez-Garcia and Gabriel Lopez-Millan and Diego R. Lopez and Alan DeKok}, title = {{Support of Fragmentation of RADIUS Packets}}, pagetotal = 38, year = 2015, month = apr, abstract = {The Remote Authentication Dial-In User Service (RADIUS) protocol is limited to a total packet size of 4096 bytes. Provisions exist for fragmenting large amounts of authentication data across multiple packets, via Access-Challenge packets. No similar provisions exist for fragmenting large amounts of authorization data. This document specifies how existing RADIUS mechanisms can be leveraged to provide that functionality. These mechanisms are largely compatible with existing implementations, and they are designed to be invisible to proxies and "fail-safe" to legacy RADIUS Clients and Servers.}, }