diff --git a/data/templates/accel-ppp/config_chap_secrets_radius.j2 b/data/templates/accel-ppp/config_chap_secrets_radius.j2
index 49af3a228..395e55a14 100644
--- a/data/templates/accel-ppp/config_chap_secrets_radius.j2
+++ b/data/templates/accel-ppp/config_chap_secrets_radius.j2
@@ -1,33 +1,36 @@
 {% if authentication.mode is defined and authentication.mode == 'local' %}
 [chap-secrets]
 chap-secrets={{ chap_secrets_file }}
 {% elif authentication.mode is defined and authentication.mode == 'radius' %}
 [radius]
 verbose=1
 {%   for server, options in authentication.radius.server.items() if not options.disable is defined %}
 server={{ server }},{{ options.key }},auth-port={{ options.port }},acct-port={{ options.acct_port }},req-limit=0,fail-time={{ options.fail_time }}
 {%   endfor %}
+{%     if authentication.radius.accounting_interim_interval is defined and authentication.radius.accounting_interim_interval is not none %}
+acct-interim-interval={{ authentication.radius.accounting_interim_interval }}
+{%     endif %}
 {%   if authentication.radius.acct_interim_jitter is defined and authentication.radius.acct_interim_jitter is not none %}
 acct-interim-jitter={{ authentication.radius.acct_interim_jitter }}
 {%   endif %}
 acct-timeout={{ authentication.radius.acct_timeout }}
 timeout={{ authentication.radius.timeout }}
 max-try={{ authentication.radius.max_try }}
 {%   if authentication.radius.nas_identifier is defined and authentication.radius.nas_identifier is not none %}
 nas-identifier={{ authentication.radius.nas_identifier }}
 {%   endif %}
 {%   if authentication.radius.nas_ip_address is defined and authentication.radius.nas_ip_address is not none %}
 nas-ip-address={{ authentication.radius.nas_ip_address }}
 {%   endif %}
 {%   if authentication.radius.source_address is defined and authentication.radius.source_address is not none %}
 bind={{ authentication.radius.source_address }}
 {%   endif %}
 {%   if authentication.radius.dynamic_author.server is defined and authentication.radius.dynamic_author.server is not none %}
 dae-server={{ authentication.radius.dynamic_author.server }}:{{ authentication.radius.dynamic_author.port }},{{ authentication.radius.dynamic_author.key }}
 {%   endif %}
 {% endif %}
 {# Both chap-secrets and radius block required the gw-ip-address #}
 {% if gateway_address is defined and gateway_address is not none %}
 gw-ip-address={{ gateway_address }}
 {% endif %}
 
diff --git a/interface-definitions/include/accel-ppp/radius-additions.xml.i b/interface-definitions/include/accel-ppp/radius-additions.xml.i
index 44ec64d7f..9e7a089af 100644
--- a/interface-definitions/include/accel-ppp/radius-additions.xml.i
+++ b/interface-definitions/include/accel-ppp/radius-additions.xml.i
@@ -1,153 +1,166 @@
 <!-- include start from accel-ppp/radius-additions.xml.i -->
 <node name="radius">
   <children>
+    <leafNode name="accounting-interim-interval">
+      <properties>
+        <help>Interval in seconds to send accounting information</help>
+        <valueHelp>
+          <format>u32:1-3600</format>
+          <description>Interval in seconds to send accounting information</description>
+        </valueHelp>
+        <constraint>
+          <validator name="numeric" argument="--range 1-3600"/>
+        </constraint>
+        <constraintErrorMessage>Interval value must be between 1 and 3600 seconds</constraintErrorMessage>
+      </properties>
+    </leafNode>
     <leafNode name="acct-interim-jitter">
       <properties>
         <help>Maximum jitter value in seconds to be applied to accounting information interval</help>
         <valueHelp>
           <format>u32:1-60</format>
           <description>Maximum jitter value in seconds</description>
         </valueHelp>
         <constraint>
           <validator name="numeric" argument="--range 1-60"/>
         </constraint>
         <constraintErrorMessage>Jitter value must be between 1 and 60 seconds</constraintErrorMessage>
       </properties>
     </leafNode>
     <tagNode name="server">
       <children>
         <leafNode name="acct-port">
           <properties>
             <help>Accounting port</help>
             <valueHelp>
               <format>u32:1-65535</format>
               <description>Numeric IP port (default: 1813)</description>
             </valueHelp>
             <constraint>
               <validator name="numeric" argument="--range 1-65535"/>
             </constraint>
           </properties>
           <defaultValue>1813</defaultValue>
         </leafNode>
         #include <include/accel-ppp/radius-additions-disable-accounting.xml.i>
         <leafNode name="fail-time">
           <properties>
             <help>Mark server unavailable for &lt;n&gt; seconds on failure</help>
             <valueHelp>
               <format>u32:0-600</format>
               <description>Fail time penalty</description>
             </valueHelp>
             <constraint>
               <validator name="numeric" argument="--range 0-600"/>
             </constraint>
             <constraintErrorMessage>Fail time must be between 0 and 600 seconds</constraintErrorMessage>
           </properties>
           <defaultValue>0</defaultValue>
         </leafNode>
       </children>
     </tagNode>
     <leafNode name="timeout">
       <properties>
         <help>Timeout in seconds to wait response from RADIUS server</help>
         <valueHelp>
           <format>u32:1-60</format>
           <description>Timeout in seconds</description>
         </valueHelp>
         <constraint>
           <validator name="numeric" argument="--range 1-60"/>
         </constraint>
         <constraintErrorMessage>Timeout must be between 1 and 60 seconds</constraintErrorMessage>
       </properties>
       <defaultValue>3</defaultValue>
     </leafNode>
     <leafNode name="acct-timeout">
       <properties>
         <help>Timeout for Interim-Update packets, terminate session afterwards (default 3 seconds)</help>
         <valueHelp>
           <format>u32:0-60</format>
           <description>Timeout in seconds, 0 to keep active</description>
         </valueHelp>
         <constraint>
           <validator name="numeric" argument="--range 0-60"/>
         </constraint>
         <constraintErrorMessage>Timeout must be between 0 and 60 seconds</constraintErrorMessage>
       </properties>
       <defaultValue>3</defaultValue>
     </leafNode>
     <leafNode name="max-try">
       <properties>
         <help>Number of tries to send Access-Request/Accounting-Request queries</help>
         <valueHelp>
           <format>u32:1-20</format>
           <description>Maximum tries</description>
         </valueHelp>
         <constraint>
           <validator name="numeric" argument="--range 1-20"/>
         </constraint>
         <constraintErrorMessage>Maximum tries must be between 1 and 20</constraintErrorMessage>
       </properties>
       <defaultValue>3</defaultValue>
     </leafNode>
     <leafNode name="nas-identifier">
       <properties>
         <help>NAS-Identifier attribute sent to RADIUS</help>
       </properties>
     </leafNode>
     <leafNode name="nas-ip-address">
       <properties>
         <help>NAS-IP-Address attribute sent to RADIUS</help>
          <constraint>
           <validator name="ipv4-address"/>
         </constraint>
         <valueHelp>
           <format>ipv4</format>
           <description>NAS-IP-Address attribute</description>
         </valueHelp>
        </properties>
      </leafNode>
     <leafNode name="preallocate-vif">
       <properties>
         <help>Enable attribute NAS-Port-Id in Access-Request</help>
         <valueless/>
       </properties>
     </leafNode>
     <node name="dynamic-author">
       <properties>
         <help>Dynamic Authorization Extension/Change of Authorization server</help>
       </properties>
       <children>
         <leafNode name="server">
           <properties>
             <help>IP address for Dynamic Authorization Extension server (DM/CoA)</help>
             <constraint>
               <validator name="ipv4-address"/>
             </constraint>
             <valueHelp>
               <format>ipv4</format>
               <description>IPv4 address for aynamic authorization server</description>
             </valueHelp>
           </properties>
         </leafNode>
         <leafNode name="port">
           <properties>
             <help>Port for Dynamic Authorization Extension server (DM/CoA) (default: 1700)</help>
             <valueHelp>
               <format>u32:1-65535</format>
               <description>TCP port</description>
             </valueHelp>
             <constraint>
               <validator name="numeric" argument="--range 1-65535"/>
             </constraint>
           </properties>
           <defaultValue>1700</defaultValue>
         </leafNode>
         <leafNode name="key">
           <properties>
             <help>Shared secret for Dynamic Authorization Extension server</help>
           </properties>
         </leafNode>
       </children>
     </node>
   </children>
 </node>
 <!-- include end -->