Table Of Contents
Configuring RADIUS Features
RADIUS Attribute Screening
Feature History for RADIUS Attribute Screening
Restrictions for RADIUS Attribute Screening
Prerequisites for RADIUS Attribute Screening
Configuration Tasks for RADIUS Attribute Screening
Configuration Examples for RADIUS Attribute Screening
Authorization Accept Configuration Example
Accounting Reject Configuration Example
Authorization Reject and Accounting Accept Configuration Example
Rejecting Required Attributes Configuration Example
RADIUS Transmit Retries
Feature History for RADIUS Transmit Retries
Restrictions for RADIUS Transmit Retries
Configuring RADIUS Transmit Retries
Configuration Example for RADIUS Transmit Retries
Monitoring and Troubleshooting RADIUS Transmit Retries
Extended NAS-Port-Type and NAS-Port Support
Feature History for Extended NAS-Port-Type and NAS-Port Support
NAS-Port-Type (RADIUS Attribute 61)
NAS-Port (RADIUS Attribute 5)
NAS-Port-ID (RADIUS Attribute 87)
Prerequisites for Extended NAS-Port-Type and NAS-Port Attributes Support
Configuring Extended NAS-Port-Type and NAS-Port Attributes Support
Verifying Extended NAS-Port-Type and NAS-Port-ID Attributes Support
Configuration Examples for Extended NAS-Port-Type Attribute Support
RADIUS Attribute 31: PPPoX Calling Station ID
Feature History for PPPoX Calling Station ID
Calling-Station-ID Formats
Restrictions for PPPoX Calling Station ID
Related Documents for PPPoX Calling Station ID
Configuration Tasks for PPPoX Calling Station ID
Configuring the Calling-Station-ID Format
Verifying the Calling-Station-ID
Configuration Example for PPPoX Calling Station ID
Related Commands for PPPoX Calling Station ID
RADIUS Packet of Disconnect
Feature History for RADIUS Packet of Disconnect
Benefits for RADIUS Packet of Disconnect
Restrictions for RADIUS Packet of Disconnect
Related Documents for RADIUS Packet of Disconnect
Prerequisites for RADIUS Packet of Disconnect
Configuration Tasks for RADIUS Packet of Disconnect
Configuring AAA POD Server
Verifying AAA POD Server
Monitoring and Maintaining AAA POD Server
Configuration Example for RADIUS Packet of Disconnect
Configuring RADIUS Features
This chapter describes the following features:
•
RADIUS Attribute Screening
•
RADIUS Transmit Retries
•
Extended NAS-Port-Type and NAS-Port Support
•
RADIUS Attribute 31: PPPoX Calling Station ID
•
RADIUS Packet of Disconnect
RADIUS Attribute Screening
The RADIUS Attribute Screening feature allows you to configure a list of "accept" or "reject" RADIUS attributes on the Cisco 10000 router for authorization and accounting purposes. Based on the accept or reject list you configure for a particular purpose, the Cisco 10000 series router:
•
Accepts and processes all standard RADIUS attributes
•
Rejects all standard RADIUS attributes
Before you configure a RADIUS accept or reject list, enable AAA using the aaa new-model command in global configuration mode. For more information, see the Cisco IOS Command Summary, Volume 2 of 3, Release 12.2.
The Cisco 10000 series router supports the RADIUS Attribute Screening feature in the following deployment models:
•
Managed L2TP Network Server
•
PPP Terminated Aggregation (PTA) to VRF
•
Remote Access (RA) to MPLS VPN
Note
For more information about RADIUS attribute screening, see the RADIUS Attribute Screening feature module.
The RADIUS Attribute Screening feature is described in the following topics:
•
Feature History for RADIUS Attribute Screening
•
Restrictions for RADIUS Attribute Screening
•
Prerequisites for RADIUS Attribute Screening
•
Configuration Tasks for RADIUS Attribute Screening
•
Configuration Examples for RADIUS Attribute Screening
Feature History for RADIUS Attribute Screening
Cisco IOS Release
|
Description
|
Required PRE
|
12.2(16)BX3
|
This feature was introduced on the Cisco 10000 series router.
|
PRE2
|
12.3(7)XI6
|
This feature was integrated into Cisco IOS Release 12.3(7) XI6.
|
PRE2
|
12.2(28)SB
|
This feature was integrated into Cisco IOS Release 12.2(28)SB.
|
PRE2
|
Restrictions for RADIUS Attribute Screening
The following restrictions apply to the RADIUS Attribute Screening feature:
•
Network Access Server (NAS) Requirement
To enable the RADIUS Attribute Screening feature, you should configure the Cisco 10000 router, acting as the NAS, for authorization with RADIUS groups.
•
Accept or Reject Lists Limitations
The two filters used to configure accept or reject lists are mutually exclusive; therefore, you can configure only one accept list or one reject list for each purpose and for each server group.
•
Vendor-Specific Attributes
The RADIUS Attribute Screening feature does not support vendor-specific attribute (VSA) screening. However, you can specify attribute 26 (Vendor-Specific) in an accept or reject list, which will accept or reject all VSAs.
•
Required Attributes
Required attributes in a reject list are allowed to pass through. Do not reject the following required attributes:
–
Authorization—6 (Service-Type) and 7 (Framed-Protocol)
–
Accounting—4 (NAS-IP-Address), 40 (Acct-Status-Type), 41 (Acct-Delay-Time), and44 (Acct-Session-ID)
Note
When you configure a reject list with required attributes, an error message does not appear because the list does not specify a purpose (authorization or accounting). The server determines if an attribute is required when the attribute's purpose is known.
Prerequisites for RADIUS Attribute Screening
Before you configure a RADIUS accept or reject list, enable AAA using the aaa new-model command in global configuration mode. For more information, see the Cisco IOS Command Summary, Volume 2 of 3, Release 12.2.
Configuration Tasks for RADIUS Attribute Screening
To configure and verify the RADIUS Attribute Screening feature, see the "Configuring RADIUS Attribute Accept or Reject Lists" section on page 5-37.
Configuration Examples for RADIUS Attribute Screening
This section provides the following configuration examples:
•
Authorization Accept Configuration Example
•
Accounting Reject Configuration Example
•
Authorization Reject and Accounting Accept Configuration Example
•
Rejecting Required Attributes Configuration Example
Authorization Accept Configuration Example
The following example shows how to configure an accept list for attribute 6 (Service-Type) and attribute 7(Framed-Protocol). All other attributes (including VSAs) are rejected for RADIUS authorization.
aaa authentication ppp default group radius-sg
aaa authorization network default group radius-sg
aaa group server radius radius-sg
authorization accept min-author
radius-server host 10.1.1.1 key mykey1
radius-server attribute list min-author
Accounting Reject Configuration Example
The following example shows how to configure a reject list for attribute 66 (Tunnel-Client-Endpoint) and attribute 67 (Tunnel-Server-Endpoint). All other attributes (including VSAs) are accepted for RADIUS accounting.
aaa authentication ppp default group radius-sg
aaa authorization network default group radius-sg
aaa group server radius radius-sg
accounting reject tnl-x-endpoint
radius-server host 10.1.1.1 key mykey1
radius-server attribute list tnl-x-endpoint
Authorization Reject and Accounting Accept Configuration Example
The following example shows how to configure a reject list for RADIUS authorization and configure an accept list for RADIUS accounting. Although you cannot configure more than one accept or reject list per server group for authorization or accounting, you can configure one list for authorization and one list for accounting per server group.
aaa authentication ppp default group radius-sg
aaa authorization network default group radius-sg
aaa group server radius radius-sg
authorization reject bad-author
accounting accept usage-only
radius-server host 10.1.1.1 key mykey1
radius-server attribute list usage-only
radius-server attribute list bad-author
Rejecting Required Attributes Configuration Example
The following example shows debug output for the debug aaa accounting command. In this example, required attributes 44, 40, and 41 have been added to the reject list:
Router# debug aaa authorization
AAA/ACCT(6): Accounting method=radius-sg (radius)
RADIUS: attribute 44 cannot be rejected
RADIUS: attribute 61 rejected
RADIUS: attribute 31 rejected
RADIUS: attribute 40 cannot be rejected
RADIUS: attribute 41 cannot be rejected
Caution 
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
RADIUS Transmit Retries
The Cisco 10000 router supports an extended RADIUS transmit retries range. Extending the range of RADIUS transmit retries can protect against lost records if the RADIUS server goes down or communication to it is lost.
You use the radius-server command to specify the number of times you want the router to retry transmitting to the RADIUS server. The extended range of values is from 1 to a value higher than 17280.
The RADIUS Transmit Retries feature is described in the following topics:
•
Feature History for RADIUS Transmit Retries
•
Restrictions for RADIUS Transmit Retries
•
Configuring RADIUS Transmit Retries
•
Configuration Example for RADIUS Transmit Retries
•
Monitoring and Troubleshooting RADIUS Transmit Retries
Feature History for RADIUS Transmit Retries
Cisco IOS Release
|
Description
|
Required PRE
|
12.3(7)XI1
|
This feature was integrated into Cisco IOS Release 12.3(7) XI1.
|
PRE2
|
12.2(28)SB
|
This feature was integrated into Cisco IOS Release 12.2(28)SB.
|
PRE2
|
Restrictions for RADIUS Transmit Retries
The extended range of RADIUS transmit retries has the following restrictions:
•
Using a value at the upper limits of the range of RADIUS transmit retries can force the router to retry for up to 24 hours.
•
Using an extended value for RADIUS transmit retries can exhaust the amount of available and allocated buffers.
Configuring RADIUS Transmit Retries
To configure RADIUS transmit retries, enter the following command in global configuration mode:
Command
|
Purpose
|
Router(config)# radius-server host {hostname |
ip-address} retransmit retries
|
Specifies the number of times the router retransmits to the RADIUS server.
The retries option is a value from 1 to a number greater than 17280.
|
Note
For more information about available options for the radius-server command, see the Cisco IOS Command Reference documentation for Cisco IOS Release 12.2.
Configuration Example for RADIUS Transmit Retries
Example 16-1 configures the router to retransmit up to 5 times to the RADIUS server.
Example 16-1 Configuring RADIUS Transmit Retries
Router(config)# radius-server host 10.16.1.2 retransmit 5
Monitoring and Troubleshooting RADIUS Transmit Retries
To monitor and troubleshoot RADIUS transmit retries, enter any of the following commands in privileged EXEC mode:
Command
|
Purpose
|
Router# show radius statistics
|
Displays the RADIUS statistics for accounting and authentication packets.
The Number of RADIUS Timeouts field indicates the number of times a server did not respond and the RADIUS server resent the packet.
|
Router# debug radius
|
Displays detailed information associated with RADIUS.
|
Router# debug radius brief
|
Displays abbreviated client/server interaction information and abbreviated minimum packet information.
|
Caution 
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Extended NAS-Port-Type and NAS-Port Support
In Cisco IOS Release 12.3(7)XI1, support for NAS-Port-Type (RADIUS attribute 61), NAS-Port (RADIUS attribute 5), and NAS-Port-ID (RADIUS attribute 87) were changed in the The Extended NAS-Port-Type Attribute Support feature.
The Extended NAS-Port-Type Attribute Support feature is described in the following topics:
•
Feature History for Extended NAS-Port-Type and NAS-Port Support
•
NAS-Port-Type (RADIUS Attribute 61)
•
NAS-Port (RADIUS Attribute 5)
•
NAS-Port-ID (RADIUS Attribute 87)
•
Prerequisites for Extended NAS-Port-Type and NAS-Port Attributes Support
•
Configuring Extended NAS-Port-Type and NAS-Port Attributes Support
•
Verifying Extended NAS-Port-Type and NAS-Port-ID Attributes Support
•
Configuration Examples for Extended NAS-Port-Type Attribute Support
Feature History for Extended NAS-Port-Type and NAS-Port Support
Cisco IOS Release
|
Description
|
Required PRE
|
12.3(7)XI1
|
This feature was introduced on the Cisco 10000 series router.
|
PRE2
|
12.2(28)SB
|
This feature was integrated into Cisco IOS Release 12.2(28)SB.
|
PRE2
|
NAS-Port-Type (RADIUS Attribute 61)
Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific Authentication, Authorization, and Accounting (AAA) elements in a user profile, which is stored on the RADIUS daemon. Currently the Internet Engineering Task Force (IETF) RADIUS attributes that are supported include an attribute 61, NAS-Port-Type. NAS-Port-Type indicates the type of physical port the network access server (NAS) is using to authenticate the user.
However there was no method to identify NAS-Port-Type based on a specific broadband service type because the RADIUS RFC does not support extended types that defines these types of ports. Basically all PPPoA, PPPoEoE, and PPPoEoA sessions were identified as being VIRTUAL and all PPPoEoVLAN and PPPoEoQinQ as ETHERNET.
The Extended NAS-Port-Type Attribute Support feature expands NAS-Port-Type, attribute 61, in order that the client can better identify what type of service is taking place on the different types of ports.
One advantage of this feature is that service providers can have their own coding mechanism to track users on given ports differently. Service providers may especially want to track customers using shared resources such as Ethernet or ATM interfaces that have VLANs (or Q-in-Q) and VCs connected to certain customers.
The configuration command radius-server attribute 61 extended enables identifying the following new non-RFC compliant, broadband service port types that are indicated by the following numeric values:
•
Value 30: PPPoA
•
Value 31: PPPoEoA
•
Value 32: PPPoEoE
•
Value 33: PPPoEoVLAN
•
Value 34: PPPoEoQinQ
An additional capability is that subinterfaces such as VLAN, Q-in-Q, VC, or VC ranges are allowed to override the NAS-Port-Type attribute value to be sent on any session that resides on it. This capability provides an extra level of granularity for service providers in managing their end users and allows for further differentiation of different customer usage. This capability is provided with the radius attribute nas-port-type [value] command.
The value for NAS-Port-Type can be any number chosen by the customer. In particular, customizing your own value is useful when you need to differentiate the NAS-Port-Type based on which type of end client is actually using the port. For example if you want to track mobile clients behind a specific PVC, you can define your own NAS-Port-Type for mobile clients.
NAS-Port (RADIUS Attribute 5)
The NAS-Port (RADIUS attribute 5) is a 32 bit value that uniquely represents the physical or logical port the user is attempting to authenticate on. A logical port can be represented by the virtual path identifier (VPI) and virtual channel identifier (VCI) for an ATM interface, or by the VLAN ID or Q-in-Q ID for an Ethernet interface.
Because each platform and service may have different port information which are relevant to their environment, there is no one unique way to populate this attribute. Currently Cisco has 4 hard wired formats (a-d) which are service specific and 1 configurable format (e) which can be tailored to customer and platform-specific needs.
Previously format e only allowed customizing 1 global format for all call types on a device, which limited its usefulness on devices that contained multiple services. With the extended NAS-port support, you can now configure a custom format e string for any and all service types based on the value of the NAS-Port-Type (RADIUS attribute 61). That is, when building the RADIUS Access or Accounting request, the encoding routine will pick the specific format e string defined for the session's NAS-Port-Type value and use that first instead of using the default global format e string.
The only relationship between NAS-Port-Type extensions and NAS-Port extension is that the format e string chosen by the encoding routine will depend on the value of the NAS-Port-Type for the session. Therefore if you use the extended NAS-Port-Type values (values 30-34), you should also configure format e to use them. If you do not use the extended NAS-Port-Type support, then you should use the old values, specifically, value 5 for Virtual and value 15 for Ethernet service port types. Configuring back to these port types can also allow the user to revert to previous behavior for certain interfaces.
The radius-server attribute nas-port format e command was enhanced to support the custom format e string with the [type nas-port-type] keyword and option. The type option allows you to specify different format strings to represent different physical types of ports on the Cisco 10000 for any of the extended NAS-Port-Type values. For example, you can specify the string "SSSSAAAAPPPPIIIIIIIICCCCCCCCCCCC" for type 30 (all PPPoA ports), yet you can also specify the string "SSSSAAAAPPPPVVVVVVVVVVVVVVVVVVVV" for type 33 (all PPPoAoVLAN ports). In this case, the service provider can track VPI/VCI-specific information for a PPPoA user and VLAN-specific information for a PPPoEoVLAN user.
NAS-Port-ID (RADIUS Attribute 87)
The NAS-Port-ID (RADIUS attribute 87) contains the character text string identifier of the NAS port that is authenticating the user. This text string typically matches the interface description found under the CLI configuration. This attribute was previously available under Cisco Vendor Specific Attribute (VSA) "cisco-nas-port". But it is now sent by default under the IETF attribute 87 as per customer demand.
Prerequisites for Extended NAS-Port-Type and NAS-Port Attributes Support
Authentication, Authorization, and Accounting (AAA) must be enabled and already set up to use RADIUS.
Configuring Extended NAS-Port-Type and NAS-Port Attributes Support
To configure Extended NAS-Port-Type and NAS-Port Attributes Support, enter the following commands in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# radius-server attribute
61 extended
|
Enables extended, non-RFC compliant NAS-Port-Type values, which will identify new broadband service port types, such as PPPoA, PPPoEoA, PPPoEoE, PPPoEoVLAN, and PPPoEoQinQ, and sends the appropriate value to the AAA records.
|
Step 2
|
Router(config)# radius-server attribute
nas-port format e [string] [type
{nas-port-type}]
Example:
Router(config)# radius-server attribute
nas-port format e
SSSSAPPPUUUUUUUUUUUUUUUUUUUUUUUU
|
First configure a default NAS-Port format e string that will be used as the default format by a session that has a NAS-Port-Type which is not customized for a specific service port type value.
Specify a format string in configurable format e. Format e requires you to explicitly define the usage of the 32 bits of attribute 5 (NAS-Port). The usage is defined with a given parser character for each NAS-Port field of interest for a given bit field.
For string, the characters supported are:
• Zero : 0
• One : 1
• DS0 shelf : f
• DS0 slot : s
• DS0 adapter : a
• DS0 port : p
• DS0 subinterface : i
• DS0 channel : c
• Async shelf : F
• Async slot : S
• Async port : P
• Async Line : L
• PPPoX slot : S
• PPPoX adapter : A
• PPPoX port : P
• PPPoX VLAN Id : V
• PPPoX VPI : I
• PPPoX VCI : C
• Session-Id : U
• PPPoX Inner VLAN ID: Q
For more information on how to define string, see the Cisco IOS Security Command Reference, Release 12.3T.
|
Step 3
|
Router(config)# radius-server attribute
nas-port format e [string] [type
{nas-port-type}]
Example:
Router(config)# radius-server attribute
nas-port format e
SSSSAAAAPPPPIIIIIIIICCCCCCCCCCCC type 30
|
Configures a specific service port type for extended NAS-Port-Type support.
The type option allows you to specify different format strings to represent different physical types of ports on the Cisco 10000 for any of the extended NAS-Port-Type values. For example, you can specify the string "SSSSAAAAPPPPIIIIIIIICCCCCCCCCCCC" for type 30 (all PPPoA ports), yet you can also specify string "SSSSAAAAPPPPVVVVVVVVVVVVVVVVVVVV" for type 33 (all PPPoAoVLAN ports). In this case, the service provider can track VPI/VCI-specific information for a PPPoA user and VLAN-specific information for a PPPoEoVLAN user.
nas-port-type can be one of the extended NAS-Port-Type values:
• Value 30: PPPoA
• Value 31: PPPoEoA
• Value 32: PPPoEoE
• Value 33: PPPoEoVLAN
• Value 34: PPPoEoQinQ
|
You can override the NAS-Port-Type configured globally on the router at an interface or subinterface level. To override all global options on how the Extended NAS-Port-Type attribute is sent on any interfaces or subinterfaces such as for Ethernet, VLAN, Q-in-Q, VC, or VC ranges, enter the following commands in the PVC submode or Ethernet subinterface mode (beginning in global configuration mode):
|
Command
|
Purpose
|
Step 1
|
Router(config)# interface atm 5/0/0.1
|
Enters ATM subinterface mode.
|
Step 2
|
Router(config-subif)# pvc 1/33
|
Enters PVC subinterface mode.
|
Step 3
|
Router(config-if-atm-vc)# radius
attribute nas-port-type [value]
|
To set a different extended NAS-Port-Type value for an interface or subinterface, select a value for a port type to override the NAS-Port type configured globally. This feature allows for further differentiation of different customer usage.
Select a value for NAS-Port-Type. Value can be any number, 0-2147483647, chosen by the customer. In particular, customizing your own value is useful when you need to differentiate the NAS-Port-Type based on which type of end client is actually using the port. For example if you want to track mobile clients behind a specific PVC, you can define your own NAS-Port-Type for mobile clients.
Note You must choose a number within the range 1-40 for value if you wish to set a different customized extended NAS-Port-Type value and do that in conjunction with configuring an extended specific service port type (using the "format e type" command). Choosing a number outside that range will cause the default NAS-port format e string to be used to configure the NAS-Port value that is sent for that session.
|
Verifying Extended NAS-Port-Type and NAS-Port-ID Attributes Support
To verify the Extended NAS-Port-Type and NAS-Port-ID Attributes Support feature, enter the following command in privileged EXEC mode:
Command
|
Purpose
|
Router# show running-config
|
Displays the current configuration of the router. Check the output of this command to confirm the configuration.
|
The following example displays the current configuration of RADIUS command output, where you have enabled the extended NAS-Port-Types. You can use delimiting characters to display only the relevant parts of the configuration.
Router# show run | inc radius
aaa authentication ppp default group radius
aaa authorization network default group radius
aaa accounting network default start-stop group radius
radius-server attribute 61 extended
radius-server attribute nas-port format e SSSSAPPPUUUUUUUUUUUUUUUUUUUUUUUU
radius-server attribute nas-port format e SSSSAPPPIIIIIIIICCCCCCCCCCCCCCCC type 30
radius-server attribute nas-port format e SSSSAPPPIIIIIIIICCCCCCCCCCCCCCCC type 31
radius-server attribute nas-port format e SSSSAAAAPPPPVVVVVVVVVVVVVVVVVVVV type 32
radius-server attribute nas-port format e SSSSAPPPVVVVVVVVVVVVVVVVVVVVVVVV type 33
radius-server attribute nas-port format e SSSSAPPPQQQQQQQQQQQQVVVVVVVVVVVV type 34
radius-server host 10.76.86.91 auth-port 1645 acct-port 1646
The following example displays the current configuration of RADIUS command output, where you have globally specified the format e string for all PPPoA ports (type 30).
Router# show run | inc radius
aaa authentication ppp default group radius
aaa authorization network default group radius
aaa accounting network default start-stop group radius
radius-server attribute nas-port format e SSSSSSSSAAAAAAAAPPPPPPPPIIIIIIII
radius-server attribute nas-port format e SSSSAAAAPPPPIIIIIIIICCCCCCCCCCCC type 30
radius-server host 10.76.86.91 auth-port 1645 acct-port 1646
Configuration Examples for Extended NAS-Port-Type Attribute Support
The following examples show how to configure global support for Extended NAS-Port-Type ports, and to specify two separate e format strings globally but for two different types of ports (type 30 which is PPPoA and type 33 which is PPPoEoVLAN):
Router# configure terminal
Router(config)# radius-server attribute 61 extended
Router(config)# radius-server attribute nas-port format e
SSSSAPPPIIIIIIIICCCCCCCCCCCCCCCC type 30
Router(config)# radius-server attribute nas-port format e
SSSSAPPPVVVVVVVVVVVVVVVVVVVVVVVV type 33
The following example shows you first how to customize a format e string and port type for an ATM interface and then how to override the global value set for an extended NAS-Port-Type by applying the customer-customized NAS-Port-Type value of 36 on the ATM interface:
Router# configure terminal
Router(config)# radius-server attribute nas-port format e SSSSAPPPIIIIIIIICCCCCCCCCCCCCCCC
type 36
Router(config)# interface atm 5/0/0.1
Router(config-subif)# pvc 1/33
Router(config-if-atm-vc)#
Router(config-if-atm-vc)# radius attribute nas-port-type 36
RADIUS Attribute 31: PPPoX Calling Station ID
The RADIUS Attribute 31: PPPoX Calling Station ID feature enables service providers to provide more information about the call originator to the RADIUS server in a DSL environment, such as the physical lines on which customer calls originate. Specifically, this feature allows operators to track customers through the physical lines on which customer calls originate. Service providers can better maintain the profile database of their customers as they move from one physical line to another.
Because this feature provides a virtual port that does not change as customers move from one physical line to another, RADIUS attribute 31 (Calling-Station-ID) can also be used for additional security checks. The Calling-Station-ID attribute is included in both ACCESS-REQUEST and ACCOUNTING-REQUEST messages.
The PPPoX Calling Station ID feature is described in the following topics:
•
Feature History for PPPoX Calling Station ID
•
Calling-Station-ID Formats
•
Restrictions for PPPoX Calling Station ID
•
Related Documents for PPPoX Calling Station ID
•
Configuration Tasks for PPPoX Calling Station ID
•
Configuration Example for PPPoX Calling Station ID
•
Related Commands for PPPoX Calling Station ID
Feature History for PPPoX Calling Station ID
Cisco IOS Release
|
Description
|
Required PRE
|
12.3(7)XI2
|
This feature was introduced on the Cisco 10000 series router.
|
PRE2
|
Calling-Station-ID Formats
The Calling-Station-ID attribute has 2 formats: Nas-Port and MAC-only. For Nas-Port, the system provides to the RADIUS server the host name and domain name of the node, an interface description, and VPI/VCI information (when the session is ATM-based, such as PPPoA or PPPoEoA). The MAC address is provided for PPPoEoE sessions instead of the VPI and VCI information that is provided for ATM-based sessions. For MAC-only, only the MAC address is specified for PPPoEoE sessions.
Table 16-1 summarizes the enabled Calling-Station-ID formats by session type. Notice that if both the MAC-only and Nas-Port types of Calling-Station-ID are enabled, the system provides only the MAC address to the RADIUS server for PPPoEoE sessions.
Table 16-1 Enabled Calling-Station-ID Formats by Session Type
|
Enabled Calling-Station ID Format
|
Session Type
|
MAC-only
|
Nas-Port
|
MAC-only and Nas-Port
|
PPPoA
|
Not applicable
|
hostname.domainname:int_desc:vpi:vci
|
hostname.domainname:int_desc:vpi:vci
|
PPPoEoA
|
Not applicable
|
hostname.domainname:int_desc:vpi:vci
|
hostname.domainname:int_desc:vpi:vci
|
PPPoEoE
|
macaddr
|
hostname.domainname:int_desc:macaddr
|
macaddr
|
Table 16-2 describes the Calling-Station-ID attribute fields.
Table 16-2 Calling-Station-ID Attribute Fields
Field
|
Description
|
domainname
|
Configured domain name of the local router
|
hostname
|
Configured host name of the local router
|
int_desc
|
Description specified for the configured ATM interface
|
macaddr
|
MAC address received from the client
|
vci
|
Virtual channel identifier (VCI) for the configured ATM interface
|
vpi
|
Virtual path identifier (VPI) for the configured ATM interface
|
Note
The RADIUS logical line ID allows operators to download the Calling-Station-ID from RADIUS during the preauthentication phase. The RADIUS Logical Line ID feature allows a download of the attribute at session start time. You should not use the RADIUS Logical Line ID feature with the RADIUS Attribute 31: PPPoX Calling Station ID feature; using both features causes two instances of the attribute in the RADIUS IOS database for a particular user.
Restrictions for PPPoX Calling Station ID
The following restrictions apply to the RADIUS Attribute 31: PPPoX Calling Station ID feature:
•
Do not use the RADIUS Logical Line ID feature with the RADIUS Attribute 31: PPPoX Calling Station ID feature. Using both features causes two instances of the attribute in the RADIUS IOS database for a particular user.
•
While this feature can be used with any vendor's RADIUS server, some RADIUS servers can require modifications to their dictionary files to allow the Calling-Station-ID attribute to be presented correctly in the RADIUS logs.
•
This feature supports only RADIUS; TACACS+ is not supported.
•
Currently, PPPoEoVLAN and PPPoEoQinQ do not provide information on VLAN tags; only the MAC address is provided to the RADIUS server.
•
RADIUS attribute 31 (Calling-Station-ID) is not supported for L2TP Network Server (LNS) environments. If you enable this attribute on an LNS, the attribute is not sent to the RADIUS server.
Related Documents for PPPoX Calling Station ID
•
RADIUS Logical Line ID feature guide
•
"Configuring Broadband Access: PPP and Routed Bridge Encapsulation" in the Cisco IOS Wide-Area Networking Configuration Guide, Release 12.2
•
Cisco IOS Dial Technologies Configuration Guide, Release 12.2
Configuration Tasks for PPPoX Calling Station ID
To configure the RADIUS Attribute 31: PPPoX Calling Station ID feature, perform the following configuration tasks:
•
Configuring the Calling-Station-ID Format
•
Verifying the Calling-Station-ID
Configuring the Calling-Station-ID Format
To configure the Calling-Station-ID format, perform the following task in global configuration mode:
To verify the Extended NAS-Port-Type and NAS-Port-ID Attributes Support feature, enter the following command in privileged EXEC mode:
Command
|
Purpose
|
Router(config)# radius-server attribute 31 pppox
format
|
format—Specifies the type of Calling-Station-ID
• nas-port—Enables the Nas-Port format of the Calling-Station-ID attribute.
• mac-addr—Enables the Mac-only format of the Calling-Station-ID attribute.
You can enable one or both types of Calling-Station ID. If both the MAC-only and Nas-Port types of Calling-Station-ID are enabled, the system provides only the MAC address to the RADIUS server for PPPoEoE sessions. See Table 16-1 for a summary of enabled Calling-Station-ID formats by session type.
|
Verifying the Calling-Station-ID
To verify the Calling-Station-ID, perform the following task in EXEC mode use the debug radius command in privileged EXEC mode. The debug radius command verifies that RADIUS attribute 31, Calling-Station-ID, is in the ACCESS-REQUEST and ACCOUNTING-REQUEST. Example 16-2 shows sample output of the debug radius command.
Caution 
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Example 16-2 debug radius Command Output
*Sep 14 14:54:43.259: RADIUS(00000008): Send Access-Request to 10.0.0.8:1645 id1645/34,
len 121
*Sep 14 14:54:43.259: RADIUS: authenticator C3 81 6B 7A F8 38 F9 FE - E6 82 A6 91 92 54 44
66
*Sep 14 14:54:43.259: RADIUS: Framed-Protocol [7] 6 PPP [1]
*Sep 14 14:54:43.259: RADIUS: User-Name [1] 8 "johndoe"
*Sep 14 14:54:43.259: RADIUS: CHAP-Password [3] 19 *
*Sep 14 14:54:43.259: RADIUS: NAS-Port-Type [61] 6 Virtual [5]
*Sep 14 14:54:43.259: RADIUS: NAS-Port [5] 6 0
*Sep 14 14:54:43.259: RADIUS: NAS-Port-Id [87] 9 "8/0/0/0"
*Sep 14 14:54:43.259: RADIUS: Calling-Station-Id [31] 35
":c10k.xtnet.com:my_interface:00b0.c2ef.8400"
*Sep 14 14:54:43.259: RADIUS: Service-Type [6] 6 Framed [2]
*Sep 14 14:54:43.259: RADIUS: NAS-IP-Address [4] 6 10.0.0.119
Configuration Example for PPPoX Calling Station ID
The following PPP termination aggregation (PTA) and L2TP access concentrator (LAC) example shows how to configure your LAC for preauthorization by downloading the Logical Line ID:
aaa authentication ppp default group radius
aaa authorization network default group radius
!-------- hostname and domain name are included in the nas-port type CSID---
vc-class atm ppp_auto1200
vpn service service_control
protocol pppoe group PPPOETEST
encapsulation aal5autoppp Virtual-Template1 group PPPOETEST
ip address 1.1.1.1 255.255.255.255
ip address 172.16.1.1 255.255.255.0
interface FastEthernet0/0/0
ip address 10.0.0.119 255.255.255.0
no atm auto-configuration
no atm address-registration
interface ATM1/0/1.111 multipoint
! -----This description is used in the calling-station-id ------
interface GigabitEthernet8/0/0
ip address 10.10.0.1 255.255.255.0
pppoe enable group PPPOETEST
interface Virtual-Template1
peer default ip address pool default
ppp authentication chap callin
ip local pool default 3.3.3.1 3.3.3.10
radius-server attribute 31 pppox nas-port
radius-server attribute 31 pppox mac-addr
radius-server attribute 32 include-in-access-req
radius-server host 10.0.0.8 auth-port 1645 acct-port 1646 key cisco
Related Commands for PPPoX Calling Station ID
Command
|
Description
|
ip radius source-interface
|
Requires RADIUS to use the IP address of a specified interface for all outgoing RADIUS packets
|
RADIUS Packet of Disconnect
The RADIUS Packet of Disconnect feature consists of a method for terminating a session that has already been connected. This packet of disconnect (POD) is a RADIUS access_request packet and is intended to be used in situations where the authenticating agent server wants to disconnect the user after the session has been accepted by the RADIUS access_accept packet. This may be needed in at least two situations:
•
Detection of fraudulent use, which cannot be performed before accepting the session. A price structure so complex that the maximum session duration cannot be estimated before accepting the session. This may be the case when certain types of discounts are applied or when multiple users use the same subscription simultaneously.
•
To prevent unauthorized servers from disconnecting users, the authorizing agent that issues the POD packet must include three parameters in its packet of disconnect request. For a session to be disconnected, all parameters must match their expected values at the router. If the parameters do not match, the router discards the packet of disconnect packet and sends a NACK (negative acknowledgement message) to the agent.
The data parameters are the following RADIUS attributes:
•
User- Name (RADIUS IETF attribute 1)
•
Framed-IP-Address (RADIUS IETF attribute 8)
•
Acct-Session-Id (RADIUS IETF attribute 44)
•
Session-Svr-Key (vendor-proprietary RADIUS attribute 151)
For information about RADIUS attributes, see Appendix A, "RADIUS Attributes".
The RADIUS Packet of Disconnect feature is discussed in the following topics:
•
Feature History for RADIUS Packet of Disconnect
•
Benefits for RADIUS Packet of Disconnect
•
Restrictions for RADIUS Packet of Disconnect
•
Related Documents for RADIUS Packet of Disconnect
•
Prerequisites for RADIUS Packet of Disconnect
•
Configuration Tasks for RADIUS Packet of Disconnect
•
Monitoring and Maintaining AAA POD Server
•
Configuration Example for RADIUS Packet of Disconnect
Feature History for RADIUS Packet of Disconnect
Cisco IOS Release
|
Description
|
Required PRE
|
12.3(7)XI1
|
This feature was introduced on the Cisco 10000 series router.
|
PRE2
|
12.2(28)SB
|
This feature was integrated into Cisco IOS Release 12.2(28)SB.
|
PRE2
|
Benefits for RADIUS Packet of Disconnect
•
Ability to terminate an established session
Restrictions for RADIUS Packet of Disconnect
Proper matching identification information must be communicated by the:
•
Billing server and router configuration
•
Router's original accounting start request
•
Server's POD request
Related Documents for RADIUS Packet of Disconnect
•
Cisco IOS Security Configuration Guide, Release 12.2
•
Cisco IOS Configuration Fundamentals Configuration Guide, Release 12.2
•
Cisco Access Registrar 3.5 Installation and Configuration Guide
•
RFC 2865, Remote Authentication Dial-in User Service
Prerequisites for RADIUS Packet of Disconnect
•
Configure AAA as described in Cisco IOS Security Configuration Guide, Cisco IOS Release 12.2.
Configuration Tasks for RADIUS Packet of Disconnect
To configure the RADIUS Packet of Disconnect feature, perform the following configuration tasks:
•
Configuring AAA POD Server
•
Verifying AAA POD Server
Configuring AAA POD Server
To configure the Calling-Station-ID format, perform the following task in global configuration mode:
Command
|
Purpose
|
Router(config)# aaa pod server clients [client ip
address] port [port-number] [auth-type {any| all|
session-key}] [ignore {session-key | server-key}]
server-key string
|
Enables inbound user sessions to be disconnected when specific session attributes are presented.
client ip-address—(Optional) Registers the IP address of all the clients who can send POD requests. If not set, it can receive a POD request from any client.
port-number—(Optional) The network access server User Datagram Protocol (UDP) port to use for POD requests. Default value is 1700.
auth-type—(Optional) The type of authorization required for disconnecting sessions.
• any—Session that matches all of the attributes sent in the POD packet is disconnected. The POD packet may contain one or more of four key attributes (user-name, framed-IP-address, session-ID, and session-key).
• all—Only a session that matches all four key attributes is disconnected. All is the default.
• session-key—Session with a matching session-key attribute is disconnected. All other attributes are ignored.
ignore—(Optional) Ignore the session key or the server key received in the POD packet for session matching.
server-key—Configures the shared-secret text string.
• string—The shared-secret text string that is shared between the network access server and the client workstation. This shared-secret string must be the same on both systems.
|
Verifying AAA POD Server
To verify that the router is configured correctly to performs an AAA POD server, enter the show running-configuration command in privileged EXEC mode to display the command settings for the router.
Router# show running-configuration
aaa authentication ppp default group radius
aaa authorization network default group radius
aaa accounting network default start-stop group radius
aaa pod server clients <ip address> port <port number> auth-type [all/ any/ session-key]
server-key cisco
Monitoring and Maintaining AAA POD Server
To monitor an AAA POD server and troubleshoot problems:
•
Ensure that the POD port is configured correctly in both the router (using aaa pod server command) and the RADIUS server. Both should be the same.
•
Ensure that the shared-secret key configured in the router (using aaa pod server command) and in the AAA server are the same.
•
Use debug commands:
–
debug aaa pod—displays debug messages for POD packets
–
debug aaa authentication—displays debug messages for authentication
–
debug aaa accounting—displays debug messages for accounting records
–
debug radius—displays debug messages for RADIUS packets
The following example shows output from the debug aaa pod command and indicates a successful POD request.
AAA POD packet processing debugging is on
AAA POD packet processing debugging is on
4d18h: ++++++ POD Attribute List ++++++
4d18h: 6291C598 0 00000009 username(336) 8 pod_user
4d18h: 7085EE1C 0 00000001 nas-ip-address(439) 4 23.3.7.3
4d18h: POD: 2.0.0.210 user pod_user 0.0.0.0 sessid 0x0 key 0x0
4d18h: POD: Line User IDB Session Id Key
4d18h: POD: Skip <NULL> 0.0.0.0 0x363 0x0
4d18h: POD: KILL Virtual- pod_user 104.1.2.38 0x421A 0xD4105397
4d18h: POD: Skip Virtual- <NULL> 0.0.0.0 0x421B 0x0
4d18h: POD: Sending ACK from port 3799 to 2.0.0.210/64917
Caution 
Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Configuration Example for RADIUS Packet of Disconnect
Example 16-3 provides a configuration example for a router performing as an AAA POD server:
Example 16-3 Configuring a Router as an AAA POD Server
Router(config)# aaa pod server server-key xyz123