NPM Configuration Guide
NPM Configuration Guide
Corporate Headquarters Redback Networks Inc. 100 Headquarters Drive San Jose, CA 95134-1362 USA http://www.redback.com Tel: +1 408 750 5000
2009, Ericsson AB. All rights reserved. Redback and SmartEdge are trademarks registered at the U.S. Patent & Trademark Office and in other countries. AOS, NetOp, SMS, and User Intelligent Networks are trademarks or service marks of Telefonaktiebolaget LM Ericsson. All other products or services mentioned are the trademarks, service marks, registered trademarks or registered service marks of their respective owners. All rights in copyright are reserved to the copyright owner. Company and product names are trademarks or registered trademarks of their respective owners. Neither the name of any third party software developer nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission of such third party.
Disclaimer
No part of this document may be reproduced in any form without the written permission of the copyright owner. The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Redback or Ericsson shall have no liability for any error or damage of any kind resulting from the use of this document.
Contents
Chapter 1: Initial Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 Configure the NetOp PM Components to Automatically Restart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 Configure the External DHCP Server to Automatically Restart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2 View SNMP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2 Modify the Number of SNMP Retries or SNMP Timeout Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4 Configure NTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4 Configure NTP on SmartEdge Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5 Configure NTP on Solaris Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5 Change the IP Address of an Existing NetOp PM Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6 Configure the NetOp PM Components to Use a Remote Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6 Configure the NetOp PM Service Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7 Start the NetOp PM Service Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7 Stop the NetOp PM Service Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8 Configure Communications for the NetOp Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8 Configure Drop-Down Selection Lists for RADIUS Attributes in the NetOp Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10 Add, View, Remove, and Update Node Information in the NetOp PM System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-11 Chapter 2: Configure the NetOp PM API Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1 Start and Stop the NetOp PM API Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1 Start the NetOp PM API Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2 Stop the NetOp PM API Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2 Change the Default NetOp PM API Server Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2 Manage the NetOp PM API Server Load Balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4 Enable and Disable Load Balancing on the NetOp PM API Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4 Define the Hosts in a NetOp PM API Server Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5 Change the RADIUS Authentication Type for the NetOp PM API Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5 Chapter 3: Configure the Node for the NetOp PM System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1 Access Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2 PPP Circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2 PPP over L2TP Circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3 Dynamic and Static CLIPS Circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4 Configure EAP Authentication for Mobile IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4 Wireless Authorization for Mobile IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4 Configure NAT Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5 Dynamic IP Address Service Attribute Variation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5 IP Redirect Service Attribute Variation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5 Lawful Intercept Service Attribute Variation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6 Bandwidth Service Attribute Variation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
Contents
iii
Video Service Attribute Variation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6 Volume Service Variation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7 Service Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7 RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7 CoA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9 AAA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9 Contexts and Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11 External DHCP Server (Dynamic CLIPS or DHCP-Based RFC 1483 Bridged Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-15 Border Gateway Protocol (BGP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17 Ports, Cards, and Circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-20 ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25 Forward Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-26 HTTP Redirect Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-27 Hotline Redirect Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-28 SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-29 NAT Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31 QoS Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31 IGMP Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-34 Lawful Intercept Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-35 Chapter 4: Configure RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1 View Default NetOp PM RADIUS Server Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1 Start the NetOp PM RADIUS Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3 Stop the NetOp PM RADIUS Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4 Reinitialize the NetOp PM RADIUS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5 Change the RADIUS Default Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5 Modify the Port Configuration for NetOp PM RADIUS Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5 Modify the Node Configuration for NetOp PM RADIUS Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6 Change Restart Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7 Configure the RADIUS Server for EAP Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7 View the List of Supported RADIUS Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7 Configuring Custom Behavior for RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8 Customize RADIUS Server Hooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8 Customize EAP Hooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-11 Chapter 5: Configure External RADIUS and LDAP Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1 Forward RADIUS Requests to External RADIUS Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1 Configure RADIUS Servers External to the NetOp PM System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2 Forward RADIUS Authentication Requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-3 Forward RADIUS Accounting Requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4 Authenticate Subscribers with an External LDAP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-5 Configure External LDAP Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-5 Query External LDAP Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-6 Change the Algorithm Used When Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-7 Configure RADIUS Attributes to Flow Through the NetOp PM System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-7 RADIUS Attribute Flow-Through Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-8 Add RADIUS Attributes to Flow Through the NetOp PM System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9 Configure the RB-NPM-Service-Id Attribute to Flow Through the NetOp PM System . . . . . . . . . . . . . . . . . . . . . . 5-10 Configure the Framed-IP-Address Attribute to Flow Through the NetOp PM System . . . . . . . . . . . . . . . . . . . . . . . 5-10 Map External RADIUS or LDAP Attributes to NetOp PM RADIUS Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-11 Map an External Attribute Name and Value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-11 Map an External Attribute Name with Any Value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-11 Map Any External Attribute Name and Value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12 Rename an External Attribute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12
iv
Chapter 6: Manage Policies with External Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1 Manage Policies with External Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2 Chapter 7: Configure Additional RADIUS Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1 Configure Additional RADIUS Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1 Verify or Add Additional RADIUS Attributes to the dictionary_redback.cfg File . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3 NetOp PM API Methods for Managing Additional RADIUS Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3 Add Support for Additional RADIUS Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6 Retrieve Information About an Additional RADIUS Attribute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7 Modify the Support of an Additional RADIUS Attribute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8 Remove Support for an Additional RADIUS Attribute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9 Create a New Service Attribute Variation Using the New NAS Type with the NetOp Client . . . . . . . . . . . . . . . . . . . . . . . 7-9 Add Third-Party RADIUS Attributes to the dictionary_redback.cfg File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10 Add Third-Party RADIUS Attributes to the NetOp PM System Using a SOAP Client . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11 Apply Services by Configuring Additional RADIUS Attributes and VSAs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11 Calculate Multiple Values to Configure WiMAX Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11 Redirect a Subscriber using EAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-12 Support for NAS-Filter-Rules Exceeding the Character Limit for an Inline SAV . . . . . . . . . . . . . . . . . . . . . . . . 7-13 Chapter 8: Configuring NetOp PM Third Party Vendor Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1 Add Third-Party Device (NAS) Types Using a SOAP Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1 Add Third-Party Devices to Communicate with the NetOp PM System Using a SOAP Client . . . . . . . . . . . . . . . . . . . . . 8-2 Chapter 9: Service Offerings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1 View Service Offerings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1 Create Service Offerings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1 Create an Access Service Offering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4 Create a Custom Service Offering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-5 Modify Service Offerings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-5 Delete Service Offerings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-6 Make a Service Unavailable to Subscribers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7 Configure the Offering Period to Hide a Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7 Immediately Remove a Service from the List of Available Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7 Chapter 10: Service Attribute Variations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-1 View Service Attribute Variations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-1 Create Service Attribute Variations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-1 Variation Instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-4 Define a Single Instance of a Single Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-4 Define Multiple Instances of a Single Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-4 Define a Single Instance of Multiple Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-5 Define Multiple Instances of a Single Type and Multiple Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-5 Create and Remove Variation Instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-6 Automatic Naming of Location-Specific Service Attribute Variation Instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-7 Use Additional RADIUS Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-8 Modify Service Attribute Variations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-9 Delete Service Attribute Variations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-9 Chapter 11: Complex Time and Volume Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-1 Scheduled Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-1 Absolute and Relative Times in Scheduled Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-2 Examples: Valid Formats for Absolute and Relative Times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-4 Create a Scheduled Variation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-5
Contents
Metered Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-7 Tiered Quota Service Bundles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-8 Real-Time Billing Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-9 Tracking Time Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-11 Tracking Volume Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-11 Create a Metered Variation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-13 Create a Quota Exceeded Variation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-14 Tiered Quota Service Bundles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-15 Create Tiered Volume Quota Service Bundles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-16 Chapter 12: Online Charging for Prepaid Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-1 Configure Online Charging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-4 Define Additional AVPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-5 Configure the Diameter Peer Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-5 Configure Communication with the Credit-Control Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-6 Manage the Credit-Control Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-7 Configure the Subscriber For Prepaid Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-7 Configure a Prepaid Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-7 Credit-Control Variations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-8 Configure a Credit-Control Variation with the NetOp Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-9 Configure a Credit-Control Variation with the NetOp PM API . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-9 Override RADIUS Attributes with Diameter Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-10 Configure a Prepaid Service Offering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-12 Configure a Prepaid Service Offering with the NetOp Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-12 Configure a Prepaid Service Offering with the NetOp PM API . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-13 Credit-Control Service Errors and Failures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-14 Chapter 13: Configure Admission Control Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure the Admission Control Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Populate the resource_config Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure Resource Admission Control Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure Admission Control for Multicast Video Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 14: Configure NetOp PM to Support Wireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . NetOp PM EAP Authentication Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure EAP-Aware Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure Support for EAP Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Local EAP Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Forward EAP Authentication Requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . EAP TLS Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Locally Authenticate EAP TLS Requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Forward EAP TLS Requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Issue Certificates for EAP TLS Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . EAP TTLS Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Forward EAP TTLS Requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Locally Authenticate Tunneled and Inner Authentication Requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Locally Authenticate Outer EAP TTLS Requests and Forward Inner EAP Requests . . . . . . . . . . . . . . . . . . . . EAP-MD5 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Locally Authenticate EAP-MD5 Requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Forward EAP-MD5 Requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wireless Authorization Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wireless Web Login Through a Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Simple IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deploy a NetOp PM System for Simple IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-1 13-1 13-2 13-3 13-3 14-1 14-1 14-2 14-2 14-2 14-3 14-3 14-3 14-3 14-4 14-5 14-5 14-6 14-6 14-7 14-7 14-7 14-7 14-8 14-8 14-9
vi
Mobile IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-10 Mobile IP with Static Keys Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-11 Deploy a NetOp PM System for Mobile IP with Static Keys Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-11 Mobile IP with Dynamic Keys Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-13 Deploy the NetOp PM System for Mobile IP with Dynamic Keys Authorization . . . . . . . . . . . . . . . . . . . . . . 14-13 Configuration Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-15 Configure RADIUS Attributes for ASN Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-16 ASN Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-16 Home Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-18 WiMAX Outer Identity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-18 Configure the NetOp PM System and the ASN Gateway to Authenticate Subscribers with WiMAX Outer Identity . . . 14-19 EAP TLS/TTLS Authentication with WiMAX Outer Identity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-19 EAP TLS/TTLS Request Routing with WiMAX Outer Identity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-19 Define a Mobile IP Home Agent Hotline Service Offering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-20 Overview of Redirecting a Mobile IP Subscriber Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-20 Hotline Mobile IP Subscribers at Session Startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-22 Configure Support for Mobile IP Third-Party Device Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-24 Chapter 15: Configure the NetOp PM Lightweight Web Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-1 Configure the NetOp PM Lightweight Web Portal After Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-1 Configure the NetOp PM Lightweight Web Portal to Communicate with a Secure NetOp PM API Server . . . . . . . . . . . 15-4 Start the NetOp PM Lightweight Web Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-4 Stop the NetOp PM Lightweight Web Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-5 Change the Language Displayed by the NetOp PM Lightweight Web Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-5 Modify the Service Model Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-6 Enable Web Proxy Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-6 Customizing the NetOp PM Lightweight Web Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-7 Understand the NetOp PM Lightweight Web Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-8 Integrate the NetOp PM System with Your Corporate Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-9 Customize the NetOp PM Lightweight Web Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-10 Modify the NetOp PM Lightweight Web Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-10 Do Not Modify These <input> and <img> Tags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-12 Customize Sample XSL Stylesheets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-13 Customize the Inactive Account Login Redirect Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-21 Customize the Invalid Location Login Redirect Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-22 Customize the Invalid Login Redirect Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-22 Customize the Quota Exceeded Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-23 Customize the Help Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-23 Chapter 16: Manage Subscribers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-1 View Subscriber Account and Active Session Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-1 View Subscriber Circuit AttributesQoS Hierarchical Node and Node Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-3 View Framed Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-3 View Logon Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-3 View Pre-Authentication Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-4 View Service Order History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-5 View Static Framed IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-5 View Current Subscribed Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-5 Add Subscriber Accounts to the NetOp PM System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-7 Restrict Subscriber Logon Location with Location Lock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-7 Configure Authentication Using DHCP Option 82 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-8 Modify Existing Subscriber Account Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-10 Configure Subscriber Circuit Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-11
Contents
vii
Hierarchical Nodes and Node Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add a QoS Reference to a Subscriber Circuit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Remove a QoS Reference from a Subscriber Circuit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add a QoS Reference to a Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add or Remove Framed Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add a Framed Route to a Subscriber Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Remove a Framed Route from a Subscriber Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure Pre-authentication for Subscribers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Pre-authenticate a Subscriber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Remove Pre-authentication from a Subscriber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change Subscriber Logon Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change Subscriber Logon Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Remove Subscriber Logon Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add or Remove Static IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add Static IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Remove Static IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add Subscribed Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Remove Subscribed Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Remove Subscriber Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16-11 16-12 16-13 16-14 16-14 16-14 16-16 16-16 16-16 16-18 16-18 16-18 16-19 16-20 16-20 16-21 16-21 16-22 16-23
viii
Chapter 1
Initial Configuration
This chapter describes how to perform initial basic configuration of the NetOp Policy Manager in the following sections: Configure the NetOp PM Components to Automatically Restart Configure the External DHCP Server to Automatically Restart View SNMP Settings Modify the Number of SNMP Retries or SNMP Timeout Setting Configure NTP Change the IP Address of an Existing NetOp PM Host Configure the NetOp PM Components to Use a Remote Database Configure the NetOp PM Service Manager Configure Communications for the NetOp Client Configure Drop-Down Selection Lists for RADIUS Attributes in the NetOp Client Add, View, Remove, and Update Node Information in the NetOp PM System
Initial Configuration
1-1
To activate the automatic restart of the NetOp PM API server when the NetOp PM host reboots: ./config_api.sh -auto_start
To disable the automatic restart of the NetOp PM API server when the NetOp PM host reboots: ./config_api.sh -noauto_start
Table 5-3 on page 5-12 describes the syntax and usage guidelines for this script.
To configure an external DHCP server to automatically restart if its Solaris host is rebooted, perform the following steps: 1. Log on as root. 2. Open a terminal window and navigate to the /etc directory: cd /etc 3. In a text editor, such as vi, create the /etc/rc3.d/S99npm_dhcpd file. 4. Add the following lines to the file:
#!/bin/ksh # # Automatically start DHCP Server # /usr/sbin/dhcpd <interface-to-router>
5. Save and close the file. 6. Ensure that the script can run by entering the following command: chmod u+rx /etc/rc3.d/S99npm_dhcpd
1-2
Table 1-1
Attribute Community
The following SNMP settings for the SmartEdge router are required to enable SNMP operations:
snmp server snmp community npm_community all-contexts view npm_view read-write
The following SNMP settings for the SmartEdge platform are required to accept SNMP bounce, clear, and reauth operations:
snmp snmp snmp snmp view view view view npm_view npm_view npm_view npm_view rbnSubsBounceSessionId included rbnSubsClearReason included rbnSubsClearSessionId included rbnSubsReauthSessionId included
Caution Risk of communication loss. To reduce the risk of nodes rejecting SNMP requests sent by the NetOp PM software, ensure that the following commands are included in the node configuration files. The following SNMP settings are required to run the synch_npm_with_node.sh script:
snmp snmp snmp snmp snmp snmp view view view view view view npm_view npm_view npm_view npm_view npm_view npm_view rbnSubsActiveAddr included rbnSubsActiveCircuitDescr included rbnSubsActiveResend included sysDescr included sysName included vacmMIBObjects included
The following SNMP settings are required to determine the current volume usage for subscribers on the SmartEdge router:
snmp view npm_view rbnSubsOctetsReceived included snmp view npm_view rbnSubsOctetsSent included
The following SNMP settings are required for the admission control function feature:
snmp view npm_view ifHighSpeed included snmp view npm_view ifName included snmp view npm_view ifType included
Initial Configuration
1-3
The following SNMP setting is required for the admission control function feature to get class volume counter information for a service subscription:
snmp view npm_view rbnQosSubscriberRLClassStatsTable included
When sending an SNMP request, the NetOp PM system attempts to notify the node up to three times. If the SNMP request has not been delivered successfully after three attempts, the system notifies the subscriber that the web logon or service change has failed. For a detailed matrix showing SNMP messages for dynamic clientless IP service selection (CLIPS), static CLIPS, Point-to-Point Protocol (PPP), and RFC 1483 bridged encapsulations on SmartEdge routers and SMS devices, see the Supported Encapsulation Types section on page 1-11 in the NetOp Policy Manager Product Overview.
Configure NTP
For time-metering services to function correctly, the time-of-day clock on the Solaris hosts must be synchronized to the clock on the SmartEdge routers. To enable this, we recommend that all hosts and nodes in your network have access to an NTP server that keeps accurate time. You must configure all hosts and nodes to periodically contact the NTP server and adjust their clocks as required to synchronize with the time on the server.
1-4
Configure NTP
2. Start the xntpd client by entering the following command: /etc/init.d/xntpd start Note The NTP client automatically restarts when the Solaris host reboots, so you do not need to use this command more than once.
After the xntpd client starts, verify that the Solaris time-of-day clock is synchronized between the NTP server and the SmartEdge routers in your network.
Initial Configuration
1-5
To enable the NetOp PM components to use a remotely located database, perform the following steps: 1. On each components host, log on as root. 2. Open a terminal window and navigate to the NetOp PM installation directory: cd /usr/local/npm 3. Run the config_npm.sh script with the following syntax: config_npm.sh -db_host database_host Where the database_host argument is the hostname or IP address of the remote Solaris workstation hosting the NetOp PM database.
Table 1-2
Syntax -db database_name -db_acct database_account_name -db_admin new_database_admin_account_name -db_admin_passwd database_admin_account_password -db_host database_host, [database_host]
Optional. New NetOp PM database account password. Optional. Database encryption and decryption key for subscriber passwords.
1-6
Table 1-2
Syntax
For information about configuring the NetOp PM database, see the NetOp Database Administration Guide and the NetOp Policy Manager Database Redundancy and Recovery Guide.
-noauto_start -f -h
Initial Configuration
1-7
Note
The NetOp PM Service Manager automatically restarts when the Solaris host reboots.
To start the NetOp PM service manager, perform the following steps: 1. Log onto the NetOp PM service manager host as root. 2. Open a terminal window and navigate to the NetOp PM service manager directory: cd /usr/local/npm/service_manager 3. Run the start_service_manager.sh script according to the following syntax: ./start_service_manager.sh [-f] [-h] The following message appears:
NetOp Service Manager Server Database Name: npm Database Server: localhost Do you wish to start the server? [N]:
4. At the prompt, type y and press Enter. A message displays that the startup is complete.
1-8
Using SolarisLog on to the machine as netop, open a terminal window, navigate to the /opt/Redback/NetOpClt/releaseID directory, and run the NetOpClt.sh script. The NetOp client appears.
3. Click the Host/IP field and type the hostname or IP address of the NetOp Policy Manager (PM) host running the NetOp PM application programming interface (API) server. If a hostname is used, ensure that it is defined in the /etc/hosts file. The Version field automatically shows the correct version. 4. If the NetOp client communicates with a secure NetOp PM API server that uses SSL, or to require users to log on to the NetOp client with a username and password, click to select the Enable Security check box. Note The NetOp clients security setting must match the setting for the NetOp PM API server; otherwise, the NetOp client is unable to connect to the NetOp PM API server. For example, if the NetOp client is configured with security enabled, the NetOp client is unable to connect to a non-secure NetOp PM API server.
5. Click OK. If security is enabled, the NetOp PM system prompts for the Username and Password.
Initial Configuration
1-9
Configure Drop-Down Selection Lists for RADIUS Attributes in the NetOp Client
If you are logging on to a secure NetOp PM API server, perform the following steps: 1. Click the Username field and type the username that the NetOp client uses to authenticate with the NetOp PM API server. 2. Click the Password field and type the password that the NetOp client uses to authenticate with the NetOp PM API server. 3. Click OK.
Configure Drop-Down Selection Lists for RADIUS Attributes in the NetOp Client
You can create drop-down selection lists for fields in the NetOp Client that are associated with RADIUS attributes. You create drop-down selection lists by using the ConfigRADIUSAttributes XML document to associate the names in the drop-down selection list (called enumerations in the XML document) with the actual values of the RADIUS attributes. When you inject the ConfigRADIUSAttributes XML document containing the enumerations for a specific RADIUS attribute, the enumerations appear in the drop-down selection list in the associated field in the NetOp client. Selecting a value from a drop-down selection list, instead of entering the actual system value, reduces the risk of entering incorrect values when you create service attribute variations. A scenario in which you would use a drop-down selection list: Instead of manually entering the IP address of a node located in a specific city into the required RADIUS attribute field, use the ConfigRADIUSAttributes XML document to associate the IP address with the name of the city. You can then select the city name from the drop-down selection list instead of typing in the IP address. The NetOp PM system still uses the system value of the IP address. The following example displays the ConfigRADIUSAttributes XML document where the enumeration Boston is associated with the IP address 10.10.10.10 and the enumeration New York is associated with the IP address 12.12.12.12:
<Enums> <Enum> <Name>Boston</Name>
1-10
Add, View, Remove, and Update Node Information in the NetOp PM System
For detailed instructions on how to configure the NetOp PM system using XML documents, see Chapter 4, PERL SOAP Client and XML Documents in the NetOp Policy Manager API Guide.
Add, View, Remove, and Update Node Information in the NetOp PM System
For each node you want to add to the NetOp PM system, use the NASMgmt.addNASXML.pl script. Perform the following steps to add a node to the NetOp PM system: 1. Create an XML file describing the node, in the following format:
<NASRecords> <NAS> <Id>nas-id</Id> <IPAddress>10.192.100.8</IPAddress> <Secret>my-secret</Secret> <SoftwareVersion>ver-num</SoftwareVersion> </NAS> </NASRecords>
This XML structure describes the ID, IP address, password (secret), and software version for the node. 2. To add a new node to the NetOp PM system, run the following script: /usr/local/npm/soap_client/perl/NASMgmt.addNASXML.pl -file sampleNAS.xml Here the sampleNAS argument is the path and filename of the XML file containing the node description. To manage nodes in the NetOp PM system, you can also perform the following tasks: To view a node in the NetOp PM system, run the NasMgmt.getNASXML.pl script. To view a list of nodes in the NetOp PM system, run the NASMgmt.getAIINASXML.pl script. To remove a node from the NetOp PM system, run the NASMgmt.removeNAS.pl script To update the node information in the NetOp PM system, run the NASMgmt.updateNASXML.pl script.
The NAS.xsd file describes the structure for defining how to add and update a node. For information about the XML file, look in the -/user/local/npm/docs directory.
Initial Configuration
1-11
Add, View, Remove, and Update Node Information in the NetOp PM System
1-12
Chapter 2
This section describes how to configure NetOp PM API servers after deployment, in the following topics: Start and Stop the NetOp PM API Server Change the Default NetOp PM API Server Configuration Manage the NetOp PM API Server Load Balancing Change the RADIUS Authentication Type for the NetOp PM API Server
For more information about the components that directly and indirectly interact with the NetOp PM API, the component roles, interrelationships, and flow of information through the NetOp PM API servers, see Chapter 2, NetOp PM Architecture in the NetOp Policy Manager API Guide. For procedures to install multiple NetOp PM API servers, see Chapter 8, Configure, Deploy, and Start the NetOp PM Components in the NetOp Policy Manager Installation Guide. Note To configure the NetOp PM API server in secure mode to use Secure Sockets Layer (SSL), you must perform the following tasks: Use the -secure keyword when you run the deploy_api.sh or config_api.sh script to provide a secure connection between the NetOp PM API server and a Simple Object Access Protocol (SOAP) client. Generate an SSL keystore file.
The secure mode of the NetOp PM API server uses an SSL keystore to provide public key encryption between SOAP clients and the NetOp PM API server. The NetOp PM software includes a sample.keystore file already installed that you can use. However, to ensure a more secure system, we recommend that you generate your own keystore file before production deployment. For instructions on generating your own keystore file, see the Generate an SSL Keystore File section on page 3-8 in the NetOp Policy Manager API Guide.
2-1
To start the NetOp PM API server, perform the following steps: 1. Log onto the NetOp PM API server host as root. 2. Open a terminal window and navigate to the NetOp PM API server directory: cd /usr/local/npm/api 3. Run the start_api.sh script according to the following syntax: ./start_api.sh [-h] If you include the optional -h keyword, the script prints usage information and exits. If you do not include it, the script starts the NetOp PM API server, and a message displays indicating that the startup is complete.
2-2
Note
For specific instructions on how to use this script to enable and disable load balancing on groups of NetOp PM API servers, see the Enable and Disable Load Balancing on the NetOp PM API Servers section on page 2-4. For instructions on modifying the default restart settings, see the Configure the NetOp PM Components to Automatically Restart section on page 1-1 and the Configure the External DHCP Server to Automatically Restart section on page 1-2. For instructions on modifying the default SNMP retry and timeout settings, see the View SNMP Settings section on page 1-2 and the Modify the Number of SNMP Retries or SNMP Timeout Setting section on page 1-4.
Note
To configure a NetOp PM API server during installation, run the deploy_api.sh script; see Chapter 8, Configure, Deploy, and Start the NetOp PM Components in the NetOp Policy Manager Installation Guide. The deploy_api.sh script is used the first time you install; thereafter use the config_api.sh script.
On the Solaris servers on which the NetOp PM API servers are installed, perform the following steps: 1. Stop the NetOp PM API server; see the Start and Stop the NetOp PM API Server section on page 2-1. 2. Navigate to the NetOp PM installation directory: cd /usr/local/npm 3. Run the config_api.sh script; see Table 2-1 on page 2-3 for the full script syntax: ./config_api.sh The NetOp PM API server is installed into the /usr/local/apache-tomcat-n.n.n directory, where n.n.n is the latest release of the Tomcat software. 4. Start the NetOp PM API server; see the Start the NetOp PM API Server section on page 2-2. The full syntax for the config_api.sh script is: config_api.sh [-auto_start | -noauto_start] [-db_charset character_set] [-f] [-h] [-load_balance | -noload_balance] [-radius_auth auth_type] [-secure | -nosecure] Table 2-1 describes the syntax and usage guidelines for the config_api.sh and deploy_api.sh scripts; for the procedure to run the deploy_api.sh script, see Chapter 8, Configure, Deploy, and Start the NetOp PM Components in the NetOp Policy Manager Installation Guide.
Table 2-1
Syntax -auto_start
2-3
Table 2-1
Syntax -f -h
-load_balance
-secure -nosecure
2-4
Change the RADIUS Authentication Type for the NetOp PM API Server
2. Open a terminal window and navigate to the NetOp PM installation directory: cd /usr/local/npm 3. Run the config_api.sh script according to the following syntax: ./config_api.sh [-load_balance | -noload_balance] Use the -load_balance keyword to enable load balancing. To disable load balancing, use the -noload_balance keyword. For complete syntax of the config_api.sh script, see Table 2-1 on page 2-3.
Change the RADIUS Authentication Type for the NetOp PM API Server
By default, the NetOp PM API server uses the Password Authentication Protocol (PAP) to communicate with all external RADIUS servers. The NetOp PM API server uses the same RADIUS authentication type in communicating with all external RADIUS servers, regardless of their realm; use the config_api.sh script to change this authentication type.
2-5
Change the RADIUS Authentication Type for the NetOp PM API Server
Note
This script does not change the authentication type used by the NetOp PM RADIUS server. The NetOp PM RADIUS server supports PAP, CHAP, MSCHAP, and MSCHAPV2 simultaneously.
To change the RADIUS authentication type for the NetOp PM API server perform the following steps: 1. Log on as root. 2. Open a terminal window and navigate to the NetOp PM installation directory by entering the following command: cd /usr/local/npm 3. Run the config_api.sh script according to the following syntax: ./config_api.sh -radius_auth {PAP | CHAP | MSCHAP | MSCHAPV2} Table 2-3 describes the syntax and usage guidelines for this script.
Table 2-3
Syntax -radius_auth PAP -radius_auth CHAP -radius_auth MSCHAP -radius_auth MSCHAPV2
For information on modifying the default restart or SNMP settings for the NetOp PM API servers, see the Modify the Number of SNMP Retries or SNMP Timeout Setting section on page 1-4.
2-6
Chapter 3
The following node configurations must be completed to enable the following NetOp PM services and service attribute variations: Access Services Dynamic IP Address Service Attribute Variation IP Redirect Service Attribute Variation Lawful Intercept Service Attribute Variation Bandwidth Service Attribute Variation Volume Service Variation Video Service Attribute Variation
See the following sections for the tasks to configure nodes to support NetOp PM service offerings: Service Options RADIUS CoA AAA Contexts and Interfaces External DHCP Server (Dynamic CLIPS or DHCP-Based RFC 1483 Bridged Only) Border Gateway Protocol (BGP) Ports, Cards, and Circuits ACLs
3-1
Access Services
Forward Policies HTTP Redirect Profiles Hotline Redirect Profiles SNMP NAT Policies QoS Policies IGMP Profiles Lawful Intercept Profiles Note For complete syntax descriptions and usage guidelines for the commands used, see the SmartEdge OS documentation.
Access Services
When you create Access service offerings, you can use the various types of service attribute variations. All subscribers must have at least one Access service offering and can have other types of service offerings as well. You must configure your SmartEdge routers for subscriber access. To enable PPP, PPP over L2TP, CLIPS, third-party vendor circuits, and EAP authentication and wireless authorization, complete the configurations listed in the following sections: PPP Circuits PPP over L2TP Circuits Dynamic and Static CLIPS Circuits Configure EAP Authentication for Mobile IP Wireless Authorization for Mobile IP Configure NAT Policies Note Optional. To identify subscribers locations for the Location Lock feature, you can enable the Calling-Station-Id attribute to be sent in RADIUS access requests. You can also use the Nas-Port-Id attribute for this purpose, but you do not need to enable it; it is sent by default. Do not change the format or separator used by these attributes. For the command to enable the Calling-Station-Id attribute, see the RADIUS section on page 3-7.
PPP Circuits
To enable PPP access, complete the following configurations: In each context where subscribers will be bound, define an interface to which PPP subscribers are bound. Configure ports and circuits on which PPP traffic arrives.
3-2
Access Services
Enable contexts to be advertised for use by PPP clients. In each context to be used for PPP subscribers, advertise the context to PPP clients with the domain command in context configuration mode. Enable RADIUS to manage subscriber reauthorization events. Enable notification of PPP reauthorization events to the NetOp PM system.
3-3
Access Services
3-4
Enable this NetOp PM system service by completing the following configuration on the node: Forward policies to control subscriber traffic; for example, to force subscribers to the NetOp PM lightweight web portal to log on.
3-5
ACLs to limit classes of traffic; for example, to permit DNS and DHCP traffic, and subscriber traffic, but deny other traffic. HTTP redirect profiles leading to the URLs where subscribers are directed. Hotline redirect profiles leading to the URLS where subscribers are directed. Enable PPP over L2TP circuits for the L2TP URL Filtering service offering; see the Access Services section on page 3-2.
The metering and policing policies must include the rate command in metering or policing policy configuration mode, and they must specify values for the rate kbps and optionally for the burst bytes and excess-burst bytes constructs, which identify the burst tolerance and excess burst tolerance, respectively. The PWFQ policies must include the rate kbps command in PWFQ policy configuration mode.
3-6
Define an Internet Group Management Protocol (IGMP) profile, which allows subscribers access to the multicast video server. Define the rendezvous point, which has been configured for the entire multicast network.
Service Options
This section describes how to configure service options required for the node to work with the NetOp PM software. It describes how to enable multiple contexts for all configurations. For syntax and usage guidelines for the SmartEdge OS commands used, see the Configuring Contexts and Interfaces, Configuring PPP and PPPoE, and Configuring Basic IP Routing documents in the SmartEdge OS Library.
Table 3-1
Task Configure the node to allow the creation of multiple contexts. Dynamic CLIPS only (if you plan to have subscriber sessions change contexts). Enable distributing subscriber routes between contexts using BGP.
RADIUS
Required. In the local context, configure RADIUS on each SmartEdge router to interoperate with the NetOp PM system. RADIUS configuration is the same for PPP or CLIPS. For complete syntax and usage guidelines for the SmartEdge OS commands used, see the Configuring RADIUS document in the SmartEdge OS Library.
3-7
RADIUS
Caution Risk of function loss. Do not modify the default format of the NAS-Port-Id attribute. By default, SmartEdge routers generate both the physical and logical specifications for a circuit, and send the NAS-Port-Id attribute in the RADIUS Access-Request and Accounting-Request. To maintain the functionality of the NetOp PM system, do not use the radius attribute nas-port-id format physical command because it truncates the logical specifications from the NAS-Port-Id attribute and returns only the physical specifications for the circuit. To prevent this, do not change the default format; leave it as all.
Table 3-2
Task In the local context, enable the NAS-IP-Address attribute to be included in the RADIUS Access-Request and Accounting-Request. In the local context, enable the Account-Session-Id attribute in the RADIUS Access-Request. Optional. In the local context, enable the Calling-Station-Id attribute in the RADIUS Access-Request. Note: Do not change the separator used by the attribute. In the local context, configure the round-robin load balancing algorithm for sending RADIUS packets to authorization and accounting servers. radius algorithm radius accounting algorithm radius context context radius algorithm round-robin radius accounting algorithm round-robin
context context
In the local context, enable flow control between the node and the RADIUS servers, and minimize the number of unnecessary retransmissions from the node. In the local context, configure the RADIUS authentication servers.1 The sample configuration files include the IP addresses and port numbers in the example.
radius server
context
radius server 10.192.100.10 key my-secret port 1812 radius server10.192.100.11 key my-secret port 1812 radius server 10.192.100.10 key my-secret port 1814 radius server 10.192.100.11 key my-secret port 1814 radius server 10.192.100.10 key my-secret port 1816
In the local context, configure the RADIUS accounting servers.1 The sample configuration files include the IP addresses and port numbers given in the example.
context
radius accounting server 10.192.100.10 key my-secret port 1813 radius accounting server 10.192.100.11 key my-secret port 1813 radius accounting server 10.192.100.10 key my-secret port 1815 radius accounting server 10.192.100.11 key my-secret port 1815 radius accounting server 10.192.100.11 key my-secret port 1817
1. For maximum performance and reliability, we recommend that you configure five authentication servers and five accounting servers on at least two NetOp PM hosts. In the sample configuration files, the UDP ports for RADIUS authorization and accounting servers default to the standard RADIUS ports, 1812 and 1813, and must be unique on the same NetOp PM host.
3-8
CoA
Optional. You can use RADIUS Change of Authorization (CoA) to reauthorize subscriber sessions. RADIUS CoA supports change of service requests for PPP, DHCP CLIPS, Simple IP, and Mobile IP circuit types. For PPP, DHCP, and Simple IP circuit types, RADIUS CoA requires SmartEdge OS, Release 5.0.7.1 or later. For Mobile IP circuit types, you must use SmartEdge OS, Release 6.1.1.2 or later. By default, if you do not configure CoA, the NetOp PM system uses SNMP to communicate with the node. Note The NetOp Policy Manager Lawful Intercept and Hotlining features function only when RADIUS CoA is used. If NetOp Policy Manager is configured for SNMP communication, CoA-dependent features fail, and do not generate an explicit error message.
RADIUS CoA can be used to apply basic tiered bandwidth services, as well as Time- or Volume-metered and Scheduled services for PPP, DHCP CLIPS, and Simple IP circuit types. You can configure RADIUS CoA for Simple IP or Mobile IP circuit types. For more information, see the Simple IP section on page 14-8 and the Mobile IP section on page 14-10. To enable CoA so the node can accept CoA and Disconnect requests from the NetOp PM system, verify that a CoA server is enabled on the node by configuring an IP address, a CoA server port number, and CoA server password. The CoA port number and CoA password must match the one used in the NAS definition on the NetOp PM system.
Table 3-3
Task Enable the RADIUS CoA server in the local context.
AAA
Required. Configure AAA to enable subscriber access, accounting, and authorization. For complete syntax and usage guidelines for the SmartEdge OS commands used, see Configuring AAA in the SmartEdge OS Library.
CoA
AAA
Table 3-4
Task
Configure AAA globally to use the RADIUS servers configured in the local context. Configure AAA globally to use the RADIUS servers configured in the local context for reauthorization accounting. Dynamic CLIPS and DHCP-based Bridged 1483 only. Enable notifying the NetOp PM system of the IP addresses that have been assigned to a subscriber session using DHCP. Enable notifying the NetOp PM system of reauthorization events. Enable AAA accounting in RADIUS In the local context. Enable AAA authentication In each context. Enable the Framed-IP-Netmask attribute for PPPoE subscribers in each context. Enable the default subscriber profile to send Accounting-Alive RADIUS messages when the traffic limit is reached by adding the following configuration in all contexts. By default, the SmartEdge router drops the subscriber session when the quota allocation is exceeded. If you use this command to configure the SmartEdge router to generate an Accounting Alive message instead of dropping the subscriber session, the NetOp PM system handles the over-quota action. Optional. PPP over L2TP only (both LAC and LNS). Configure AAA authentication and accounting for L2TP sessions in the local context.
global
aaa global accounting event aaa accounting subscriber aaa authentication subscriber aaa provision route subscriber session-action
aaa global accounting event reauthorization aaa accounting subscriber radius aaa authentication subscriber global aaa provision route ip-netmask encapsulation ppp pppoe subscriber default session-action traffic-limit acct-alive
global
Table 3-4
Task
Optional. PPP over L2TP only (both LAC and LNS). Enable AAA L2TP accounting in the local context.
For complete syntax and usage guidelines for the SmartEdge OS commands used, see the following documents in the SmartEdge OS Library: Configuring Contexts and Interfaces Configuring L2TP Configuring DHCP
Contexts and Interfaces
For the IP addresses used in the sample configurations, see Table 3-2 on page 3-4.
Table 3-5
Task
Access the local context. Add an interface leading to the NetOp PM RADIUS server. Add an IP address for the interface. Ensure the hostname and IP address is configured in the NetOp PM system; see Chapter 4, PERL SOAP Client and XML Documents in the NetOp Policy Manager API Guide.
Table 3-6
Task
Create the SECURE context. PPP only. Advertise the context for PPP clients. Add an interface leading to the NetOp PM lightweight web portal. Add an IP address for the interface. Add an interface leading to the URL Filtering service server host. Add an IP address for the interface. Configure ARP for the interface. Define a default route to the Internet via the URL Filtering service server. Dynamic CLIPS only. Add an interface to which dynamic CLIPS subscribers are bound, and that provides IP addresses to subscribers. Dynamic CLIPS only. Add an IP address for the interface. Dynamic CLIPS and DHCP-based Bridged 1483 only. Enable the use of the internal DHCP server. Dynamic CLIPS and DHCP-based Bridged 1483 only. Configure the internal DHCP server. PPP only. Add an interface to which PPP subscribers are bound. PPP only. Add an IP address for the interface.
Table 3-6
Task
PPP only. Add an IP address pool from which subscribers are assigned IP addresses. Static CLIPS only. Add an interface to which static CLIPS subscribers are bound. Static CLIPS only. Add an IP address for the interface. Static CLIPS only. Add an IP address pool from which subscribers are assigned IP addresses. Static CLIPS only. Add an interface to bind static CLIPS circuits that got their IP address from the BASIC context; required to support change of context for static CLIPS circuits. Static CLIPS only. Add an IP address for the interface
ip address
interface
ip address 10.192.45.1/24
Table 3-7
Task
Create the BASIC context. PPP only. Advertise the context for PPP clients. Add an interface that leads to the NetOp PM lightweight web portal. Add an IP address for the interface. Enable multicast traffic through the interface. Add an interface that has access to the Internet directly and through the URL Filtering service server host. Add an IP address for the interface. Enable ARP on the interface. Define a default route to the Internet directly. PPP over L2TP only (LNS). Define a loopback interface to be used for the LNS. Add an IP address for the interface.
Table 3-7
Task
PPP over L2TP only (LNS). Define an interface to the LAC. Add an IP address for the interface. Define a route to the LAC. PPP over L2TP only (LNS). Define the tunnel to the LAC with CHAP PAP authentication.
PPP over L2TP only (LAC). Define a loopback interface to be used for the LAC. Add an IP address for the interface. PPP over L2TP only (LAC). Define an interface to the LNS. Add an IP address for the interface. Define a route to the LNS. PPP over L2TP only (LAC). Define the tunnel to the LNS with CHAP PAP authentication.
context interface context interface context context L2TP peer L2TP peer L2TP peer context interface interface interface interface context
interface l2tp_if loopback ip address 10.10.10.10/24 interface lac-to-lns ip address 100.2.2.1/24 ip route 20.20.20.0/24 100.2.2.2 l2tp-peer name lns media udp-ip remote ip 20.20.20.20 local 10.10.10.10 session-auth chap pap context BASIC function lac-only local-name lac interface pool_clips multibindip address 10.192.45.1/24 interface pim sparse-mode passive dhcp server policy interface pool_ppp multibind
Dynamic CLIPS only. Add an interface to which dynamic CLIPS subscribers are bound, that provides IP addresses for subscribers. Dynamic CLIPS and DHCP-based Bridged 1483 only. Enable the use of internal DHCP server. CLIPS only. Enable multicast traffic through the interface. CLIPS only. Configure the internal DHCP server. PPP only. Add an interface to which PPP subscribers are bound.
Table 3-7
Task
PPP only. Add an IP address for the interface. PPP only. Add an IP address pool from which IP addresses are assigned to subscribers. PPP only. Enable multicast on the interface. Static CLIPS only. Add an interface to which static CLIPS subscribers are bound. Static CLIPS only. Add an IP address for the interface. Static CLIPS only. Add an IP address pool from which IP addresses are assigned to subscribers. Static CLIPS only. Enable multicast on the interface. Static CLIPS only. Add an interface to bind static CLIPS circuits that got their IP address from the SECURE context; required to support change of context for static CLIPS circuits. Static CLIPS only. Add an IP address for the interface.
External DHCP Server (Dynamic CLIPS or DHCP-Based RFC 1483 Bridged Only)
ip address 10.192.45.1/24 ip pool 10.192.45.0/24 pim sparse-mode passive interface static_clips_from _SECURE multibind
ip address
interface
ip address 10.192.44.1/24
External DHCP Server (Dynamic CLIPS or DHCP-Based RFC 1483 Bridged Only)
Optional. By default, the NetOp PM is configured to use the internal DHCP server present in the node. Alternatively, you can configure the system to use an external DHCP server. Use an external DHCP server when: A DHCP server already exists in your network. Your deployment requires that subscribers are allowed to change from one context to another.
For examples, see the tables in this section that summarize the tasks required to configure the use of a external DHCP server in the following contexts: Table 3-8 summarizes the tasks to configure an external DHCP server in the local context. Table 3-9 summarizes the tasks to configure an external DHCP server in the SECURE context.
Table 3-10 summarizes the tasks to configure an external DHCP server in the BASIC context. Note The subnet assigned to the multibind pool interfaces must be the same for all contexts if subscribers are allowed to switch between contexts.
3-16
Table 3-8
Task
External DHCP Server (Dynamic CLIPS or DHCP-Based RFC 1483 Bridged Only)
Access the local context. Add an interface leading to the NetOp PM RADIUS server. Add an IP address for the interface. Enable the interface to act as a proxy between subscribers and the external DHCP server. Set the number of IP addresses allowed on the interface to the maximum (65,535). Ensure the hostname and IP address are configured in the NetOp PM system. Add an interface that will accept responses from the external DHCP server. Add an IP address for the interface. Enable the interface to act as a proxy between subscribers and the external DHCP server; set the number of IP addresses allowed on the interface to the maximum (66,535). Identify the location of the external DHCP server.
context
Table 3-9
Task
Access the SECURE context. Add an interface to which dynamic CLIPS subscribers are bound and that provides IP addresses to subscribers. Add an IP address to the interface. Enable the interface to act as a proxy between subscribers and the external DHCP server; set the number of IP addresses allowed on the interface to the maximum (65,535). Identify the location of the external DHCP server.
context
Table 3-10
Task
Create the BASIC context. Add an interface to which dynamic CLIPS subscribers are bound and that provides IP addresses to subscribers Add an IP address for the interface. Enable the interface to act as a proxy between subscribers and the external DHCP server; set the number of IP addresses allowed on the interface to the maximum (65,535). Identify the location of the external DHCP server.
context
For complete syntax and usage guidelines for the commands used, see Configuring DHCP in the SmartEdge OS Library.
For complete syntax and usage guidelines for these SmartEdge OS commands, see the Configuring BGP document in the SmartEdge OS Library.
Table 3-11
Task Enable distribution of subscriber routes between contexts using BGP.
Table 3-11
Task
Add an interface in the local context to receive subscriber routes from other contexts. Add an IP address for the interface. Configure BGP to distribute subscriber routes in the preceding interface.
ip route ip route
Table 3-12
Task
Add an IP address for the interface. In the interface above, configure BGP to distribute subscriber routes.
ip address 3.3.3.3/32 router bgp 64514 address-family ipv4 unicast redistribute subscriber
Table 3-12
Task
ip route ip route
Enable the distribution of routes to the local context if consolidating the traffic from the node to the NetOp PM hosts through a single Gigabit Ethernet port.
ip route
Table 3-13
Task
Add an interface to receive subscriber routes from other contexts. Add an IP address for the interface. In the interface above, configure BGP to distribute subscriber routes.
ip address 2.2.2.2/32 router bgp 64513 address-family ipv4 unicast redistribute subscriber neighbor 1.1.1.1 external remote-as 64512 advertisement-interval 1 ebgp-multihop 3 update-source BGPIF address-family ipv4 unicast
Table 3-13
Task
ip route ip route
Enable the distribution of routes to the local context if consolidating the traffic from the node to the NetOp PM hosts through a single Gigabit Ethernet port.
ip route
Table 3-14
Encapsulation Type DHCP-based RFC 1483 bridged Static RFC 1483 bridged Mobile IP
For examples, see the tables in this section, which summarize the tasks to configure ATM and Ethernet ports and circuits, with examples from the sample configurations: Table 3-15 on page 3-22 summarizes the tasks to configure ATM profiles, ports, and circuits for PPP access. Table 3-16 on page 3-22 summarizes the tasks to configure Ethernet ports for PPP access. Table 3-17 on page 3-22 summarizes the tasks to configure Ethernet ports for PPP access using L2TP tunnels. Table 3-18 on page 3-23 summarizes the tasks to configure Ethernet ports for static CLIPS circuits. Table 3-19 on page 3-23 summarizes the tasks to configure Ethernet ports for dynamic CLIPS circuits. Table 3-20 on page 3-23 summarizes the tasks to configure Ethernet media interface cards (MICs) on SmartEdge 100 routers. Table 3-21 on page 3-24 summarizes the tasks to configure Ethernet ports that lead to NetOp PM components.
For syntax descriptions and usage guidelines for the SmartEdge OS commands used, see the following documents in the SmartEdge OS Library: Configuring ATM Ethernet and POS Ports Configuring Circuits Configuring CLIPS Note Starting in SmartEdge OS, Release 4.0.7, you can create CLIPS groups, or groups of ports and PVCs on which dynamic CLIPS circuits are created. These CLIPS groups provide port and PVC redundancy for the subscriber sessions initiated on those ports and PVCs. For information about configuring CLIPS groups for redundancy for the SmartEdge OS, see Configuring CLIPS in the SmartEdge OS Library.
Table 3-15
Task
Tasks to Configure ATM Profiles, Cards, Ports, and Circuits for PPP
Root Command atm profile shaping ubr Configuration Mode global ATM profile global global port ATM PVC ATM PVC Example from Sample Configurations atm profile profile-ubr shaping ubr card atm-oc12-1-port 6 port atm 6/1 no shutdown atm pvc explicit 1:31 through 1:100 profile profile-ubr encapsulation pppoe bind authentication pap chap context BASIC maximum 5
Configure an ATM card. Configure an ATM port to be operational, and configure a range of static ATM PVCs on the port on which PPP traffic arrives. Specify the ATM profile you previously created with PPPoE encapsulation. Bind the circuit to the BASIC context with authentication binding and set the maximum number of sessions in a single ATM PVC to 5.
card atm port atm no shutdown atm pvc explicit bind authentication
Table 3-16
Task
Configure an Ethernet card. Configure an Ethernet port on which PPPoE traffic arrives, configure it to be operational, and specify it to use PPPoE encapsulation. Bind the port to the BASIC context with authentication binding, and set the maximum number of PPP circuits to be bound to port 8,000.
Table 3-17
Task
For an LNS, configure an Ethernet port to the LAC. Set the port to be operational. Bind the port with interface binding to the interface to the LAC. For a LAC, configure an Ethernet port to the LNS. Set the port to be operational. Bind the port with interface binding to the interface to the LNS.
Table 3-18
Task
Configure an Ethernet card (optional). Configure an Ethernet port on which CLIPS traffic arrives. Set the port to be operational. Enable static CLIPS on the Ethernet port to use DHCP with subscribers authenticated in the local context; to configure only static CLIPS, do not include the dhcp keyword. Configure a range of static CLIPS circuits. Bind the circuits with auto-subscriber binding.1 This automatically generates a bind subscriber command with a unique subscriber name for each CLIPS static circuit in the range. The auto-subscriber binding appends the static CLIPS circuit number to the end of the subscriber name template.
1. The subscriber name must be globally unique in the NetOp PM system. We recommend formatting the subscriber names as follows: node_name_card num_port num_circuit-num
Table 3-19
Task
Configure an Ethernet card (optional). Configure an Ethernet port on which CLIPS traffic arrives, and configure the port to be operational. Enable dynamic CLIPS on the port. Include the dhcp keyword. The context specified is the context where subscribers are authenticated.
Table 3-20
Task
Configure an Ethernet card. Configure an Ethernet MIC port on which traffic arrives.
Table 3-21
Task
Configure an Ethernet port leading to the RADIUS server. Configure the port to be operational. Bind it to the server interface in the local context, with interface binding. Optional if using BGP to consolidate a single port leading to the NetOp PM components. Configure an Ethernet port leading to the NetOp PM lightweight web portal server (in this example, for BASIC service). Configure the port to be operational. Bind it to the server interface in the BASIC context, with interface binding.
Configure an Ethernet port to the Internet gateway server and URL Filtering Service server (in this example, for BASIC service). Configure the port to be operational. Bind it to the Internet interface in the BASIC context, with interface binding. Optional if using BGP to consolidate a single port leading to the NetOp PM components. Configure an Ethernet port to the NetOp PM lightweight web portal server (in this example, for SECURE service). Configure the port to be operational. Bind it to the Internet interface in the SECURE context, with interface binding.
port ethernet 12/6 no shutdown bind interface server SECURE port ethernet 12/7 no shutdown bind interface internet SECURE
Configure an Ethernet port to the Internet via the URL Filtering service server (for the SECURE service). Configure the port to be operational. Bind it to the Internet interface in the SECURE context, with interface binding.
ACLs
Required to classify subscriber traffic. Configure access control lists (ACLs) in the BASIC context (required by the IP Redirect service attribute variation and optional with the Video service attribute variation). All bandwidth service attribute variations (SAV) require the default_traffic_acl. Table 3-22 summarizes the tasks to configure ACLs for subscriber web portal traffic, with examples from the sample configurations; all tasks are for all circuit types except where otherwise noted. Table 3-23 summarizes the tasks to configure ACLs for subscriber URL filtering traffic, with examples from the sample configurations; all tasks are for all circuit types except where otherwise noted. Table 3-24 summarizes the tasks to configure ACLs for subscriber multicast video traffic, with examples from the sample configurations; all tasks are for all circuit types except where otherwise noted. Note ACLs are for classification purposes only. You cannot use them for redirection.
For syntax and usage guidelines for the commands used, see Configuring ACLs in the SmartEdge OS Library.
Table 3-22
Task Add an ACL for subscriber web logon traffic sent to the web portal. Dynamic CLIPS and DHCP-based Bridged 1483. Permit DHCP traffic to flow from the subscriber to the router; required so that the router can receive a DHCP release for a subscriber who has not used web logon. Permit DNS traffic to flow from the subscriber to the router; required so that the browser can resolve web site names. Permit HTTP packets to access the URL specified in the http-redirect profile prof-name command in context configuration. The IP address is the address of the network web server host hosting the URL. Permit HTTP traffic to flow from subscriber to the web portal. Classify all other IP traffic to drop it.
seq 20 permit udp any any eq domain class DNS seq 30 permit udp any any eq netbios-ns class DNS seq 35 permit tcp any host 10.192.100.20 eq www class WEB seq 40 permit tcp any any eq www class CAPTIVE_PORTAL seq 60 permit ip any class IP
ACLs
Forward Policies
Table 3-23
Task
Define an ACL for web traffic sent to a URL Filtering service server host. Dynamic CLIPS and DHCP-based Bridged 1483. Permit DHCP traffic to flow from the subscriber to the router; required so that the router can receive a DHCP release for a subscriber who is redirected to the URL Filtering service server host. Permit DNS traffic to flow from subscriber to the router; required so the browser can resolve domain names. Do not redirect traffic that should go to the captive portal. Classify all web (port 80) traffic sent to the URL filtering server host.
Table 3-24
Task
Add an ACL that permits a subscriber access to the multicast video server. Restrict subscriber membership to this multicast group.
Table 3-25
Task
Forward Policies
Required by the IP Redirect service attribute variation. Forward policies are defined in conjunction with ACLs. The ACLs are used to classify the different types of subscriber traffic, and the forward policies redirect or drop each of the different classes of traffic. Configure forward policies that will support the NetOp PM software in redirecting subscriber traffic.
For syntax and usage guidelines for the SmartEdge OS commands used, see Configuring Forward Policies in the SmartEdge OS Library.
Table 3-26
Task Add a forward policy that forces a subscribers browser traffic to the web portal server. The HTTP packets are redirected locally to the HTTP server running on the controller card and then to the URL for the web portal server specified in the HTTP redirect profile with the name matching the profile name received from VSA 107, RB-HTTP-Redirect-Profile-Name.
Add a forward policy that forces subscribers browser traffic to the URL Filtering service server (except for traffic to the captive portal).
Table 3-27
Task
In the BASIC context, add an HTTP redirect profile to direct subscribers (who attempt to log on to inactive accounts) to the Inactive Account Login page. In the BASIC context, add an HTTP redirect profile to direct subscribers (who attempt to log on from the wrong location) to the Invalid Location Login page. PPP only. In the BASIC context, add an HTTP redirect profile to direct subscribers (who attempt to log on with the wrong username or password) to the Invalid Login page. In the BASIC context, add an HTTP redirect profile to direct subscribers (whose service has expired) to the Quota Exceeded page. In the BASIC context, add an HTTP redirect profile to direct subscribers to the Usage page where they can top up quota. In the BASIC context, add an HTTP redirect profile to direct subscribers (who have not yet been authenticated) to the portal to log on. In the BASIC context, for each chain of stores to which you want to redirect subscribers, add an HTTP redirect profile to direct subscribers to the chains portal.1 Globally, enable the HTTP redirect server running on the XCRP controller card and listening on port 80 (by default).
1. The example redirects subscribers to the wireless page in the sample NetOp PM lightweight web portal.
Table 3-28
Task
In the BASIC context, add a hotline-profile-id to direct subscribers who are hotlined to the account redirect web page, if appropriate.
In the BASIC context, add a hotline-profile-id to direct subscribers who are hotlined to the account login web page, if appropriate.
context
radius service profile mobile_inactive_account_redirect accounting in circuit accounting out circuit seq 10 attribute Forward-Policy in captiveportal seq 20 attribute HTTP-Redirect-url http://10.192.100.10/NPM-6.1.4.2/inactive_account.php
SNMP
Required. By default, the sample configurations include the Simple Network Management Protocol (SNMP) objects required to work with the NetOp PM system. To enable SNMP so that the node can accept SNMP messages from the NetOp PM system verify that the SNMP server is enabled and that the configuration includes an snmp view command for each SNMP object listed in Table 3-29. This table summarizes the tasks to configure SNMP and provides examples from the sample configurations. For syntax descriptions and usage guidelines for the SmartEdge OS commands used, see the Configuring RMON and SNMP document in the SmartEdge OS Library. For SNMP attributes used by the NetOp PM software, see the section View SNMP Settings on page 1-2.
Table 3-29
Task Enable SNMP so that the SmartEdge router can accept SNMP bounce, reauth, and clear objects from the NetOp PM system. Used to query the node for a list of all the active subscriber sessions present in a configured context on the SmartEdge router.
snmp view
global
SNMP
Table 3-29
Task
SNMP
Used to query the node for all active subscriber sessions in a context configured on the SmartEdge router. Tells the SmartEdge router to resend an accounting start for a specific subscriber session. Tells the SmartEdge router to bounce the specified subscriber session. Tells the SmartEdge router the reason that the NetOp PM software is clearing the specified subscriber session. Tells the SmartEdge router to clear the specified subscriber session. Retrieves the inbound traffic statistics. Retrieves the outbound traffic statistics. Retrieves the system description from a SmartEdge router. Retrieves the hostname from a SmartEdge router. Retrieves the list of contexts configured on the SmartEdge router. Provides an estimate of the interface's current bandwidth in units of 1,000,000 bits per second. Provides the name of the interface. Provides the type of interface, distinguished according to the physical/link protocols immediately below the network layer in the protocol stack. Retrieves the class counters, policy type, policy name, and class id from a SmartEdge router. Create a community string to permit access to Management Information Base (MIB) objects. Use the all-contexts keyword to trigger automatic generation of community names for all managed contexts. Allow the community read-write access to the MIB objects.
snmp view snmp view snmp view snmp view snmp view snmp view snmp view snmp view snmp view
snmp view npm_view rbnSubsClearSessionId included snmp view npm_view rbnSubsOctetsReceived included snmp view npm_view rbnSubsOctetsSent included snmp view npm_view sysDescr included snmp view npm_view sysName included snmp view npm_view vacmMIBObjects included snmp view npm_view ifHighSpeed included snmp view npm_view ifName included snmp view npm_view ifType included
global global
snmp view npm_view rbnQosSubscriberRLClassStatsTable included snmp community npm_community all-contexts view
community
npm_view read-write
NAT Policies
Optional. You can use NAT to map a set of private IP addresses to one or more public-routable IP addresses. NAT is also used by Dynamic IP Address service attribute variations. See Table 3-30 for the tasks to configure a NAT policy. For syntax descriptions and usage guidelines for the SmartEdge OS commands used, see Configuring NAT Policies and Configuring ACLs in the SmartEdge OS Library.
Table 3-30
Task In both the BASIC and SECURE contexts, add an ACL to pass all private traffic to the NetOp PM portal untranslated. In both the BASIC and SECURE contexts, define a NAT pool of public IP addresses for the NAT_DYNAMIC_PRIVATE_IP configuration and assign a range of IP addresses to the pool. In both the BASIC and SECURE contexts, define a NAT policy with dynamic translation.
context NAT policy NAT policy policy ACL policy ACL class
nat policy NAT_DYNAMIC_PRIVATE_IP pool PUBLIC_IP_ADDRESSES BASIC access-group WEB_PORTAL_PASSTHRU_ACL class WEB_PORTAL ignore
ignore
QoS Policies
Required for Bandwidth service attribute variations. Globally configure a set of QoS metering and policing policies which will control the bandwidth of traffic being sent to the subscriber circuit. For more information on the defining Bandwidth service offerings, see Create Service Offerings on page 9-1.
NAT Policies
3-32
Table 3-31
Task
QoS Policies
Note
The NetOp PM software also supports priority queueing (PQ) policies, enhanced deficit round-robin (EDRR) policies, ATM weighted fair queueing (ATMWFQ) policies, and priority weighted fair queueing (PWFQ) policies, although they are not included in the sample configurations used in this guide. For more information about configuring QoS on the SmartEdge platform, see the Configuring Circuits for QoS document in the SmartEdge OS Library. For examples of PWFQ policies documented in Table 3-33, see the sample-ser.cfg (merged) sample configuration file in the /usr/local/npm/config directory.
Table 3-31 summarizes the tasks to configure QoS metering and policing policies, with examples from the sample configurations; all tasks apply to all circuit types except where otherwise noted. Table 3-32 summarizes the tasks to configure QoS metering, policing, and PWFQ policies to support the RB-Qos-Rate-Inbound and RB-Qos-Rate-Outbound RADIUS VSAs. Table 3-33 summarizes the tasks to configure QoS PWFQ policies; all tasks apply to all circuit types except where otherwise noted. QoS PWFQ policies are only supported on Gigabit Ethernet 3 cards. For syntax descriptions and usage guidelines for the SmartEdge OS commands used, see Configuring Circuits for QoS in the SmartEdge OS Library.
Tasks to Configure QoS Metering and Policing Policies
Root Command qos policy metering rate Define a policing policy that restricts the bandwidth of traffic being received from the subscriber circuit to the lowest tier. qos policy policing rate global policing policy qos policy default_qos_policing_policy policing Configuration Mode global metering policy Example from Sample Configurations qos policy default_qos_metering_policy metering
Define a metering policy that restricts the bandwidth of traffic being sent to the subscriber circuit with default values for traffic classes.
Table 3-32
Task
Enable the use of the RB-Qos-Rate-Inbound RADIUS VSA, configure policing or PWFQ policies in your SmartEdge router configuration. Add a QoS metering or PWFQ policy rate.
Enable the use of the RB-QoS-Rate-Outbound RADIUS VSA, configure metering or PWFQ policies in your SmartEdge router configuration. Add a QoS policing or PWFQ policy.
For outbound policies, use one of the following commands: qos policy pol-name metering qos policy pol-name pwfq For QoS policing policies: rate kbps [burst bytes] [excess-burst bytes] For QoS PWFQ queueing policies: rate {minimum | maximum} kbps num-queues num PWFQ policy policing policy global global qos policy bronze_qos_policing_policy policing rate 128 burst 100000 or qos policy triple_play_queuing_policy pwfq num-queues 4 rate maximum 20000
Table 3-33
Task
To support triple-play traffic on a subscriber circuit for voice over IP, in conjunction with video and data traffic, create a QoS PWFQ policy by following these steps. Create the policy name and access PWFQ policy configuration mode. Optional. Specify the number of queues for the policy; the value in the example is 4. The default is 8. Optional. Set the rate and burst tolerance for traffic on the circuit, port, or subscriber record to which the policy is attached. qos policy pwfq num-queues rate global PWFQ policy PWFQ policy qos policy triple_play_queuing_policy pwfq num-queues 4 rate maximum 20000
QoS Policies
Table 3-33
Task
IGMP Profiles
Optional. Assign a priority and relative weight to each queue. In the queue priority command, the weights specify the traffic share for each queue.
To support the RB-QoS-Reference RADIUS attribute associated with access services, add two Qos PWFQ policies following these steps. Define the first QoS PWFQ policy: Create the policy name and access PWFQ policy configuration mode. Set the rate and burst tolerance for traffic on the circuit, port, or subscriber record to which the policy is attached. Specify the number of queues for the policy; the value in the example is 2. The default is 8. Assign a priority and relative weight to each queue. In the queue priority command, the weights specify the traffic share for each queue. qos policy pwfq rate rate num-queues queue priority queue priority queue priority Define the second QoS PWFQ policy: Create the policy name and access PWFQ policy configuration mode. Set the rate and burst tolerance for traffic on the circuit, port, or subscriber record to which the policy is attached. Specify the number of queues for the policy; in the example, 4, the default is 8. Assign a priority and relative weight to each queue. In the queue priority command, the weights specify the traffic share for each queue. qos policy pwfq rate num-queues PWFQ policy queue priority queue priority queue priority queue priority queue priority PWFQ policy PWFQ policy PWFQ policy PWFQ policy PWFQ policy queue 0 priority 0 weight 33 queue 1 priority 0 weight 33 queue 2 priority 0 weight 33 queue 3 priority 1 weight 100 queue priority 0 rate 5000 num-queues 4 global PWFQ policy qos policy 4q pwfq rate maximum 6000 global PWFQ policy PWFQ policy PWFQ policy PWFQ policy PWFQ policy PWFQ policy qos policy 2q-1 pwfq rate maximum 450000 rate minimum 400000 num-queues 2 queue 0 priority 0 weight 100 queue 1 priority 1 weight 100 queue priority 0 rate 400000 exceed
IGMP Profiles
Required by the Video service attribute variation. Configure an IGMP profile, which allows subscriber access to the multicast video server. For syntax descriptions and usage guidelines for the SmartEdge OS commands used, see the Configuring IP Multicast document in the SmartEdge OS Library.
Table 3-34
Task
In the BASIC context, add an IGMP profile, which allows subscribers access to the multicast video server.
Define the rendezvous point that has been configured for the entire multicast network. The sample configuration arbitrarily uses the multicast server-facing interface as the rendezvous point.
Log on as an administrative user. In the local context, create an account with lawful intercept privileges.
Table 3-35
Task
Define an interface to the law enforcement agency (LEA) mediation device (MD) and connect to it. Complete the connection to the MD through context local. In this example, the MD device has an IP address of 10.1.1.2 and is connected to context local through the interface to_lea_md.
1. Use the no form to disable the software license for LI features and functions.
3-37
3-38
Chapter 4
Configure RADIUS
By configuring communication with multiple NetOp PM RADIUS servers, the NetOp PM system can provide load balancing, redundancy, and scalability as the number of nodes in the network increases. The NetOp PM RADIUS servers support both of the following authentication models: Can authenticate RADIUS messages locally or forward them to an external RADIUS server. Can locally authenticate or forward EAP authentication messages to an external EAP-aware RADIUS server.
Load-sharing RADIUS servers can detect RADIUS requests through a single authentication port (1812) and single accounting port (1813) for each Solaris host. This chapter includes the following RADIUS configuration topics: View Default NetOp PM RADIUS Server Settings Start the NetOp PM RADIUS Servers Stop the NetOp PM RADIUS Servers Reinitialize the NetOp PM RADIUS Server Change the RADIUS Default Configuration Configure the RADIUS Server for EAP Authentication View the List of Supported RADIUS Attributes Configuring Custom Behavior for RADIUS Note All references to realm refer to the part of the users logon name that follows the far right @ character, also known as context or domain in the SmartEdge OS documentation. This RADIUS definition of realm should not be confused with the definition of security realm in the context of the NetOp PM API security.
Configure RADIUS
4-1
To view the default NetOp PM RADIUS server settings in the sample configuration files, perform the following steps: 1. Log on as root. 2. Open a terminal window and navigate to the NetOp PM configuration directory: cd /usr/local/npm/config 3. Open a sample configuration file; for example, the sample-ser-ppp.cfg file. 4. Find the RADIUS configuration section, which begins with the line shown in the following excerpt:
! ! Configure radius ! radius attribute nas-ip-address interface server radius attribute acct-session-id access-request
These commands enable the NAS-IP-Address and Acct-Session-ID attributes to be included in the RADIUS Access-Request and Accounting-Request. 5. Find the section to configure the RADIUS servers, which begins with the line shown in the following excerpt:
! Configure the RADIUS authentication servers. ! radius server 10.192.100.10 key my-secret port 1812 radius server 10.192.100.11 key my-secret port 1812 ! ! Configure the RADIUS accounting servers. ! radius accounting server 10.192.100.10 key my-secret port 1813 radius accounting server 10.192.100.11 key my-secret port 1813 !
Note
These commands configure the RADIUS servers to use the specified IP addresses and listening ports. To modify the IP addresses or port numbers, see the Modify the Node Configuration for NetOp PM RADIUS Servers section on page 4-6.
4-2
Note
The NetOp PM system enables you to define service offerings differently for each realm by specifying the Realm attribute in the service definition. When a subscriber logs on with the username@realm form, the NetOp PM system searches the services for that realm and returns those service attributes only to subscribers with that realm. Services configured with the Realm attribute set to ALL are available to all realms. If no realm is specified in the subscriber username, subscribers receive service attributes configured with the Realm attribute set to ALL. If you want to define service offerings that use different RADIUS attributes for various realms, ensure that the command radius strip-domain is not specified in your node configuration because it will remove the realm when the node sends the username@realm to the NetOp PM system. To determine if the command is present and, if so, to disable it, perform the following steps: 1. Start a command-line interface (CLI) session for the SmartEdge OS software. 2. Enter the show configuration command in any mode. In the resulting display, scan for the radius strip-domain command. 3. If the command is present in the configuration, to disable it enter the no radius strip-domain command in context configuration mode (in the context where it is enabled). 4. Enter the save configuration url command in exec (10) mode, where the url argument is the path to and filename of the node configuration file. For syntax and usage guidelines for these commands and for detailed information on loading a file into a node and saving the configuration, see the Managing Files document in the SmartEdge OS Library.
To start the NetOp PM RADIUS server, perform the following steps: 1. Log onto the NetOp PM RADIUS server host as root. 2. Navigate to the NetOp PM RADIUS directory: cd /usr/local/npm/radius 3. Run the start_radius.sh script according to the following syntax: ./start_radius.sh [-f] [-fg] [-h]
Configure RADIUS
4-3
Table 4-1
Syntax
-acct_port port
-auth_port port
-f -fg -h
Note
By default, the config_radius.sh script configures the NetOp PM RADIUS server to automatically restart if the NetOp PM host reboots. To modify this behavior, see the Change Restart Settings section on page 4-7.
By default, the authentication port is 1812 and the accounting port is 1813. You can redefine the RADIUS authentication and accounting ports when you run the config_radius.sh script with the -auth_port and -acct_port keywords.
4-4
Resetting the server statistics enables you to start monitoring the server statistics from a particular point onward. To reinitialize the NetOp PM RADIUS servers, perform the following steps: 1. On each NetOp PM RADIUS server host, log on as root. 2. Open a terminal window and navigate to the NetOp PM RADIUS directory: cd /usr/local/npm/radius 3. Run the reinit_radius.sh script according to the following syntax: ./reinit_radius.sh [-f] [-h]
Table 4-3
Syntax -f -h
Configure RADIUS
4-5
3. Run the config_radius.sh script according to the following syntax: ./config_radius.sh [-acct_port port[,port2]] [-auth_port port[,port2]] [-auto_start | -noauto_start] [-f] [-h] Use the -acct_port port,port2,port3 and -auth_port port,port2,port3 constructs to assign ports for RADIUS and optionally EAP authentication and accounting requests. All ports must be unique on the same host with no spaces between port numbers and commas. The ports you configure for RADIUS authentication must match those configured in the node configuration files. The ports you configure using the config_radius.sh script are used, by default, by the start_radius.sh, stop_radius.sh, reinit_radius.sh, show_radius.sh, and test_radius.sh scripts.
Table 4-4
Syntax -acct_port port
-auth_port port
-auto_start -noauto_start -f -h
4-6
3. In the sample configuration file, modify the commands, using the appropriate port numbers, according to the following syntax: radius server {ip-addr | hostname} key key [oldports | port udp-port] radius accounting server {ip-addr | hostname} key key [oldports | port udp-port] where the ip-addr or hostname argument is IP address or hostname of the NetOp PM RADIUS server, the key key construct sets a password shared by the NetOp PM RADIUS server and the node, and the port udp-port construct sets the port for the RADIUS authentication or accounting server. Note For more information about these commands for the SmartEdge OS, see the Configure RADIUS document in the SmartEdge OS Library.
To authenticate these types of EAP requests using the NetOp PM RADIUS servers, see the Configure Support for EAP Authentication section on page 14-2.
Configure RADIUS
4-7
Caution Risk of communication loss. Modifying attribute names impacts the NetOp PM system functionality. To reduce the risk, do not modify the names of these attributes.
For definitions of attributes supported by the SmartEdge OS, see the RADIUS Attributes document in the SmartEdge OS Library. The NetOp PM software supports a subset of the node-supported vendor-specific attributes (VSAs). For the mapping between the NetOp PM-supported RADIUS attributes and the corresponding columns in the NetOp PM database, as well as attribute descriptions and valid values by node type, see Chapter 1, Filtering Attribute and RADIUS Attribute Descriptions in the NetOp Policy Manager Reference. You can add additional RADIUS attributes to the NetOp PM system using the NetOp PM application programming interface (API) through a Simple Object Access Protocol (SOAP) client; for procedures, see the Configure Additional RADIUS Attributes section on page 7-1.
To specify your own site-specific processing without modifying the standard NetOp PM Radiator code, you create the customhooks.pm file and place it in the /usr/local/npm/radius directory. For a sample customhooks.pm file, see the /usr/local/npm/radius/sample-customhooks.pm file. When customizing Radiator hooks, use the following guidelines: Custom hooks take the same parameters as standard hooks. Compilation errors in your hook code are reported to the log file at startup time. Runtime errors in your hook are reported to the log file when your hook is run. The hook names in the customhooks.pm file is important, but their placement in the file is not. Arguments preceded by \ are passed by reference. You must de-reference them to get at the actual parameter. It is done this way, instead of just passing a handle to the object, to enable switching the object it points to. For example, to reference the first argument in the PreClientHook hook, refer to it as ${$_[0]}, and to reference the second argument, refer to it as ${$_[1]}. To get an attribute from the request in the PreClientHook hook, you would use code similar to the following example:
my $modtype = ${$_[0]}->get_attr(USR-Modulation-Type);
4-8
Table 4-5
Hook Name
nas_info_loaded
post_radius_reply_hook pre_ldap_reply_hook
post_ldap_reply_hook pre_ldap_post_processing_hook
post_ldap_post_processing_hook
flow_through_radius_attributes_loaded proxy_configuration_loaded
nas_software_version_loaded
Configure RADIUS
4-9
Table 4-5
Hook Name
proxy_attribute_mappings_loaded session_circuit_type_hook
In the following example, an external RADIUS server does not support accounting session IDs with more than 20 characters. To inter-operate with the external RADIUS server, the NetOp PM software must truncate the SmartEdge accounting session ID to 20 characters. To customize the accounting session ID, perform the following steps: 1. Copy the /usr/local/npm/radius/sample-customhooks.pm file to the /usr/local/npm/radius/customhooks.pm file. 2. Open the file in a text editor. 3. Choose the appropriate point in the processing of the RADIUS packet to modify the contents of the accounting session ID. The post_pre_auth_hook is a good point since the NetOp PM behavior is still able to use the unmodified accounting session ID, however the RADIUS packet has not yet been sent to the external RADIUS server. 4. Add the following code to the file:
sub post_pre_auth_hook { my $request = ${$_[0]}; my $reply = ${$_[1]}; my $acct_session_id = $request->get_attr('Acct-Session-Id'); my $acct_session_id_len = length($acct_session_id); # # Truncate the accounting session id down to 20 characters so it can # be stored in the external server. # if ($acct_session_id_len > 20) { $acct_session_id = substr($acct_session_id, $acct_session_id_len - 20); $request->change_attr('Acct-Session-Id', $acct_session_id); } }
5. Save the file. 6. Shut down and restart the NetOp PM RADIUS server to incorporate the new code.
4-10
post_radius_reply_hook
In this example, a carrier wants to change the realm for subscribers accessing the NetOp PM system from a particular wireless AP. To customize the realm, perform the following steps: 1. Copy the /usr/local/npm/radius/sample-customeaphooks.pm file to the /usr/local/npm/radius/customeaphooks.pm file. 2. Open the file in a text editor. 3. Choose the appropriate point in the processing of the RADIUS packet to modify the contents of the NAS-Identifier attribute in the Access-Request. The sub pre_pre_eap_client_hook is a good point, since the NetOp PM behavior is still able to use the unmodified NAS-Identifier. 4. Add the following code to the file:
sub pre_pre_eap_client_hook { my $request = ${$_[0]};
Configure RADIUS
4-11
my $code = $request->code; if ($code eq 'Access-Request') { my $nas_id = $request->get_attr('NAS-Identifier'); if ($nas_id eq 'mycoffeeshop') { my $user_name = $request->get_attr('User-Name'); # # Remove current realm name. $user_name ~= s/^(.*?)\@.*$/$1/; $new_user_name = $user_name . " mycoffeeshop.com"; $request->change_attr('User-Name', $new_user_name); } } }
5. Save the file. 6. Shut down and restart the NetOp PM RADIUS server to incorporate the new code.
4-12
Chapter 5
For other RADIUS-related procedures, see the Configuring RADIUS document in the SmartEdge OS Library. For information on how to configure node communications with the NetOp PM RADIUS servers, see the RADIUS section on page 3-7.
5-1
Note
For details on querying external LDAP servers, see the Authenticate Subscribers with an External LDAP Server section on page 5-5.
The NetOp PM system can forward RADIUS requests for all supported circuit types; for the complete list of circuit and encapsulation types, see Appendix A, Subscriber Management Processes in the NetOp Policy Manager Product Overview. When forwarding RADIUS requests, the NetOp PM system attempts to simulate the Point-to-Point Protocol (PPP) model for all circuit types on SmartEdge routers. Note The NetOp PM software does not attempt to simulate the PPP model for Dynamic CLIPS on the SMS platform.
The NetOp PM system generates the RADIUS requests where the User-Name and User-Password attributes are populated with the subscriber accounts name and password. The NetOp PM system mediates the RADIUS requests, and creates the illusion that all subscribers are using PPP clients, even though they may be using other circuit types. When sending Access-Requests to external RADIUS servers, the NetOp PM system simulates the PPP model by replacing the circuit name with the subscriber account name. This correlation between the circuit name and the subscriber account name is helpful to carriers whose RADIUS servers are PPP-based. For subscriber web logon, the Captive Portal service is hidden, and the system does not forward requests related to the Captive Portal service. This section includes the following topics: Configure RADIUS Servers External to the NetOp PM System Forward RADIUS Authentication Requests Forward RADIUS Accounting Requests Note To change the algorithm used when forwarding RADIUS requests, see the Change the Algorithm Used When Forwarding section on page 5-7. To configure RADIUS attributes to flow through the NetOp PM system, see the Configure RADIUS Attributes to Flow Through the NetOp PM System section on page 5-7.
5-2
3. In the host column, type the IP address or hostname of the machine running the external RADIUS server. Note If you use a hostname, ensure that either it is configured in the /etc/hosts file or you have a centralized naming service configured such as Network Information System (NIS), Network Information System Plus (NIS+), LDAP, or Domain Name Server (DNS).
4. In the secret column, specify the shared secretthe authentication key that must be shared with the external RADIUS server. 5. In the auth_port column, type the authentication port number that will receive authentication requests sent to the external RADIUS server. 6. In the acct_port column, type the accounting port number that will receive accounting requests sent to the external RADIUS server. 7. Optional. Change the value in the retries column to configure the maximum number of retriesthe number of retransmissions sent by the NetOp PM system if a RADIUS server sends no acknowledgment within the specified interval. 8. Optional. Change the value in the retry_timeout column to set the maximum amount of time the NetOp PM system is to wait for a response from a RADIUS server before assuming that either a packet is lost, or that the RADIUS server is unreachable (the default is 10 seconds). Note Configure each of the external RADIUS servers specified to accept RADIUS requests from the IP address or hostname of the Solaris server on which the NetOp PM API servers and the NetOp PM RADIUS servers are running.
5-3
c. Change the value in the proxy_login_access_request column to Y to indicate that an authentication for a logon should be forwarded. If you change the value to Y, the NetOp PM RADIUS server forwards Access-Requests to a RADIUS server external to the NetOp PM system, instead of authenticating them with the NetOp PM system. Also, the NetOp PM API server forwards all web logon authentication to the external RADIUS server. d. Change the value in the proxy_srvc_chng_access_request column to Y to indicate that an authentication for a service change should be forwarded. If you change the value to Y, the NetOp PM API server or the NetOp PM RADIUS server forwards access requests for a service change to a RADIUS server external to the NetOp PM system. e. Optional. Change the value in the double_access_suppression column to N to disable the suppression of a second Access-Requests from the NetOp PM system to the external RADIUS server when a subscriber logs on through the web portal. Double Access-Request suppression must be disabled to allow flow-through attributes in the NetOp PM system; for more information, see the Configure RADIUS Attributes to Flow Through the NetOp PM System section on page 5-7. 2. Modify the radius_proxy_server table in the NetOp PM database; for details, see the Configure RADIUS Servers External to the NetOp PM System section on page 5-2. Note Access-Request requests associated with Captive Portal sessions are not forwarded to external RADIUS servers regardless of the settings in the proxy_config table.
5-4
Note
Accounting requests associated with Invalid Redirected sessions are not forwarded to external RADIUS servers regardless of the settings in the proxy_config table. For example, requests such as an Acct-Start request associated with a PPP session that is not yet logged in or an Acct-Stop request sent for bringing down a CLIPS session that is not yet logged in are not forwarded.
2. Modify the radius_proxy_server table in the NetOp PM database; for details, see the Configure RADIUS Servers External to the NetOp PM System section on page 5-2.
This section includes the following topics: Configure External LDAP Servers Query External LDAP Servers
5-5
Note
If you use a hostname, ensure that either it is configured in the /etc/hosts file or you have a centralized naming service configured such as NIS, NIS+, LDAP, or DNS.
4. In the auth_port column, change the port number on which the external LDAP server is listening for bind requests. 5. In the base_dn column, enter the base distinguished name (DN) where searches are initiated. 6. In the username_attr column, enter the name of the LDAP attribute that contains the subscriber username. 7. Change the value in the retries column to configure the maximum number of retriesthe number of additional attempts the NetOp PM system makes to connect to the LDAP server. 8. Change the value in the retry_timeout column to set the maximum amount of time the NetOp PM system is to wait for a response from an LDAP server before assuming that the LDAP server is unreachable (the default is 10 seconds).
b. Change the access_request_proxy_type value to LDAP. c. Change the value in the proxy_login_access_request column to Y to indicate that a query should be performed when an authentication for a logon is received. If you change the value to Y, the NetOp PM RADIUS server queries the external LDAP server instead of authenticating with the local NetOp PM database. Also, the NetOp PM API server queries an external LDAP server for all web logon authentications. d. Change the value in the proxy_srvc_chng_access_request column to Y to indicate that a query should be performed when an authentication for a service change is received. If you change the value to Y, the NetOp PM API server or the NetOp PM RADIUS server queries an external LDAP server when a service change is requested.
5-6
e. To forward accounting requests to an external RADIUS server, change all proxy_accounting_* fields to Y and define a RADIUS server for the specified realm; see the Configure RADIUS Servers External to the NetOp PM System section on page 5-2. If the proxy_accounting_* fields are set to N, no accounting requests are forwarded. 2. Modify the ldap_proxy_server table in the NetOp PM database; see the Configure External LDAP Servers section on page 5-5.
You can configure the algorithm that the NetOp PM API server and the NetOp PM RADIUS servers use for distributing RADIUS or LDAP requests to external RADIUS servers or external LDAP servers. The NetOp PM software supports two algorithms when proxying: Strict priority(the default value for both the NetOp PM API server and the NetOp PM RADIUS server). Requests are always sent first to the specified RADIUS or LDAP server, then if the request fails, it is sent to the next server after that, and so on. Round-robin priorityRequests are sent to the next RADIUS or LDAP server following the one where the last request was sent. If the NetOp PM software receives no response from the server, it sends the request to the next server after that, and so on. Using this algorithm, the NetOp PM RADIUS server is able to distribute RADIUS or LDAP requests across all of the external RADIUS or LDAP servers specified for each realm.
To change the algorithm used when proxying, change the following columns in the proxy_config table of the NetOp PM database: 1. In the realm column, specify the realm associated with this algorithm configuration (algorithms are configured per realm). The NetOp PM RADIUS server and NetOp PM API server use the @realm construct to determine to which set of external servers they should forward request. 2. Change the value in the proxy_algorithm column to either round_robin or first.
5-7
Add RADIUS Attributes to Flow Through the NetOp PM System Configure the RB-NPM-Service-Id Attribute to Flow Through the NetOp PM System Configure the Framed-IP-Address Attribute to Flow Through the NetOp PM System
Note
External RADIUS and LDAP attributes that are mapped are automatically permitted to pass to the node. For more information, see the Map External RADIUS or LDAP Attributes to NetOp PM RADIUS Attributes section on page 5-11.
Note
Configure every RADIUS attribute that you want to pass to the node in the radius_proxy_attributes table for a specific realm; for procedures, see the Add RADIUS Attributes to Flow Through the NetOp PM System section on page 5-9. By default, with no entries in the radius_proxy_attributes table for a specific realm, the NetOp PM system does not forward RADIUS attributes received from the external RADIUS server.
For example, an external authentication server might return the RB-NPM-Service-Id attribute in its response to a forwarded authentication request. If this VSA is in an authentication response, it is used by the ISP to inform the NetOp PM system what service to apply to a subscribers circuit. The NetOp PM system removes this attribute from the Access-Accept packet and inserts the appropriate attributes for the specified service. It enables a wholesale carrier to control the service offerings permitted for each ISP, and it gives ISPs the flexibility to specify the services they want. When an ISPs external RADIUS server returns an instance of the RB-NPM-Service-Id attribute in the Access-Accept packet, each instance represents a service ID in the wholesale carriers NetOp PM system. Because the wholesale carrier has complete control over the definitions of service offerings in the NetOp PM system, the carrier can configure which service offerings a specific ISP can apply to subscriber sessions, and which RADIUS attributes are required to implement that service offering on the node types and circuit types supported by the carrier. The service offerings are realm-based, so if an ISP attempts to return an RB-NPM-Service-Id value that has not been enabled for its realm, the service ID is not applied to the subscriber session. If an ISP returns one or more RB-NPM-Service-Id values that have been enabled for its realm, the NetOp PM system merges all the RADIUS attributes associated with each of the service offerings before returning the dynamically constructed list of RADIUS attributes in the Access-Accept packet to the SmartEdge router. If no service ID attribute is returned in an authentication response, the NetOp PM system applies the realms default service to the subscribers circuit. For more details on how the NetOp PM system handles the RB-NPM-Service-Id attribute, see the Configure the RB-NPM-Service-Id Attribute to Flow Through the NetOp PM System section on page 5-10.
5-8
In addition to (or instead of) the service ID the external authentication server might return individual parameters (policy attributes) to be applied to the subscribers circuit; for example, an access control list (ACL) or filter that the ISP sends to the NetOp PM system, and that the NetOp PM system then sends to the node. Another example is that the ISP might send the Framed-IP-Address attribute in a response so the ISP can be responsible for controlling IP addresses. For more details on how the NetOp PM system handles the Framed-IP-Address attribute, see the Configure the Framed-IP-Address Attribute to Flow Through the NetOp PM System section on page 5-10. The flow-through RADIUS attribute capability is available in the EAP authentication scenarios for wireless clients. By default, the State and Class attributes are added for all flow-through requests. For EAP conversations, the NetOp PM system also flows through the EAP-Message, Message-Authenticator and Microsoft Vendor specific attributes.
For the list of supported attributes, see the View the List of Supported RADIUS Attributes section on page 4-7. For more information on wholesale and retail services, and the default service by realm, see Chapter 3, Services in the NetOp Policy Manager Product Overview. To add RADIUS attributes to flow through the NetOp PM system to the node using the radius_proxy_attributes table of the NetOp PM database, change the following columns in the table: 1. In the realm column, specify the realm associated with the RADIUS attribute. Using the realm default defines that the attributes should flow through the NetOp PM system when no subscriber realm is specified. When forwarding EAP authentications, add the prefix eap_ to the realm name to define the realm for which the RADIUS attribute should flow through the NetOp PM system during the EAP conversation. Or, use the eap_default realm when the RADIUS attribute should flow through the NetOp PM system when no subscriber realm is specified in the EAP conversation. 2. In the radius_attribute_name column, specify the name of the RADIUS attribute that is permitted to flow through the NetOp PM system. 3. Repeat for each attribute that is permitted to flow through the NetOp PM system.
5-9
For example, if you configure the Framed-IP-Address attribute to flow through the NetOp PM system, and the external RADIUS server returns the Framed-IP-Address attribute with a value of 210.22.33.11, if the NetOp PM system has a static IP address of 10.192.45.23, the NetOp PM system sends 10.192.45.23 to the node. However, if no static IP address is configured, the NetOp PM system sends 210.22.33.11 to the node.
5-10
5-11
To map an attribute for which any value is received, create a rule where the from_attribute_name is defined (not NULL), but the from_attribute_value is NULL. This NULL value is treated like a wildcard and matches any external attribute value. Based on the rule defined in Table 5-2, for example, when a response arrives with new-attribute as the attribute, the attribute is mapped to RB-NPM-Service-Id Secure.
Table 5-2
priority 2
Note
When defining a wildcard for the attribute name, a wildcard for the attribute value is assumed.
If the NetOp PM system receives a response with the xyz attribute name and the abc attribute value, and only the rules present in Table 5-1 and Table 5-3 are defined, the NetOp PM system applies the rule defined in Table 5-3, mapping the xyz attribute name to the Basic service offering. Note If the Access-Accept packet contains both attributes Tunnel-Type=L2TP and xyz=abc, only the rule defined in Table 5-1 would be applied because it has a higher priority; the rule defined in Table 5-3 would be ignored.
5-12
Table 5-4
priority 10
5-13
5-14
Chapter 6
6-1
global
N/A
context
local
radius server 10.192.100.10 key my-secret port 1812 radius server10.192.100.11 key my-secret port 1812
context
local
radius accounting server 10.192.100.10 key my-secret port 1813 radius accounting server 10.192.100.11 key my-secret port 1813
Authenticate subscribers through the SmartEdge OS configuration or through the service providers RADIUS server. Enable accounting messages for subscriber sessions in the context BASIC to be sent to the NetOp PM RADIUS accounting servers. Enable accounting messages for reauthorization events for subscriber sessions in the BASIC context to be sent to the NetOp PM accounting servers. Configure the IP address of the NetOp PM RADIUS accounting servers in the BASIC context.
aaa authentication subscriber aaa accounting subscriber aaa global accounting event
context
BASIC
context
BASIC
context
BASIC
context
BASIC
radius accounting server 10.192.100.10 key my-secret port 1813 radius accounting server 10.192.100.11 key my-secret port 1813 radius accounting server 10.192.100.10 key my-secret port 1815 radius accounting server 10.192.100.11 key my-secret port 1815 radius accounting server 10.192.100.11 key my-secret port 1817
Table 6-1
Task 1
For detailed information about Configuring RADIUS document in the SmartEdge OS Library. In addition, the NetOp PM system must use RADIUS CoA authentication to manage subscriber policies in this configuration. For more information, see the CoA section on page 3-9. The NetOp PM system automatically creates session records for sessions discovered through RADIUS accounting messages. When the NetOp PM system receives RADIUS accounting messages, it creates a subscriber session record. In a normal scenario where the NetOp PM system is configured as the authentication server, the NetOp PM system matches the subscriber session against the subscriber account. In this scenario where the NetOp PM system is not the authentication server, there is no account to match the session to. Therefore the subscriber session is manually associated with a subscriber account. The following methods associate the subscriber session with the subscriber account in the scenario where the NetOp PM system is not the authentication server: bindSubscriberToSession (String ipAddr, String subAcctName) bindSubscriberToSessionAndApplyServices(String ipAddr, String subAcctName) bindSubscriberToNASUser(String nasUser, String subAcctName) bindSubscriberToNASUserAndApplyServices(String nasUser, String subAcctName)
6-4
Chapter 7
See the following topics on configuring additional RADIUS attributes: Configure Additional RADIUS Attributes Create a New Service Attribute Variation Using the New NAS Type with the NetOp Client Add Third-Party RADIUS Attributes to the dictionary_redback.cfg File Add Third-Party RADIUS Attributes to the NetOp PM System Using a SOAP Client Apply Services by Configuring Additional RADIUS Attributes and VSAs
Overview
Support for additional RADIUS attributes can be added to the NetOp PM system using the NetOp PM API through a SOAP client. You can also view information about the RADIUS attributes, modify their support, and remove support for them. After you add support for new RADIUS attributes to the system using the NetOp PM API, they are available in the NetOp client to add to service attribute variations. Note Because adding and removing support for additional RADIUS attributes affects database tables, we recommend that you configure support for additional RADIUS attributes during off-peak hours.
7-1
Note
For more information on the Redback VSAs and standard RADIUS attributes supported by the SmartEdge router, see the Configuring RADIUS document in the SmartEdge OS Library.
Table 7-1
# 1.
2.
System administrator
Create an XML file specifying the following elements: The service attribute variation that best fits the concept being deployed by the RADIUS attribute. For example, if the RADIUS attribute controls the bandwidth of a subscriber session, then it should be associated with the Bandwidth service attribute variation. The node types that support the RADIUS attribute. The circuit types that support the RADIUS attribute; see NetOp PM API Methods for Managing Additional RADIUS Attributes on page 7-3. Use a SOAP client to pass the XML file in to the NetOp PM API. For details, see the Add Support for Additional RADIUS Attributes section on page 7-6. The system adds support for the RADIUS attribute to the service attribute variation, with the specified values and display parameters.
3.
Service definer
Use the NetOp client to select the service attribute variation and set the value for the additional RADIUS attribute. If you are viewing a service attribute variation when support for an additional RADIUS attribute is added to the system, click Refresh to update the NetOp client.
4.
Bring the session up and the NetOp PM system performs the following: The NetOp PM RADIUS server automatically retrieves the NetOp PM specified attributes and the additional RADIUS attributes for the service attribute variation. The NetOp PM RADIUS server sends the RADIUS attributes to the node. When NetOp PM RADIUS server receives the RADIUS Accounting-Request from the node, the additional RADIUS attributes are recorded in the Accounting table in the NetOp PM database.
Table 7-2
# 1. 2.
3.
Service definer
Use the NetOp client to select the service attribute variation. The NetOp client automatically updates the service attribute variation display with the additional RADIUS attribute removed.
4.
When Joe brings a session up, the NetOp PM RADIUS server retrieves both the NetOp PM and additional RADIUS attributes, and finds that the additional RADIUS attribute was removed.
7-2
To verify the RADIUS attribute is present, or to add a new RADIUS attribute to the file if it is not present, perform the following steps: 1. Open the /usr/local/npm/radius/dictionary_redback.cfg file in a text editor. 2. Verify that the RADIUS attribute you want to support in your NetOp PM system is present in the file. 3. If it is not present, add it to the dictionary_redback.cfg file, including the information about the attribute in Table 7-3, with the attributes names and numbers on one row.
Table 7-3 dictionary_redback.cfg File Structure
Attribute Name Attribute Name; for example Service-Type Attribute the value modifies; for example Service-Type Attribute Number or Value Name Attribute number; for example, 6 Value name; for example, Login-User Attribute Type or Value number Attribute type; for example integer Value number; for example, 1
4. Save and close the file. 5. Copy the file to the /usr/local/npm/radius directory on each NetOp PM host. 6. Reinitialize the NetOp PM RADIUS server.
7-3
getAllRADIUSAttributesXML()Retrieves an XML representation of the all the additional RADIUS attributes in the NetOp PM deployment. updateRADIUSAttributeXML(String radiusAttributeXML)Expects an XML document containing the RADIUS attributes, with new parameters; updates the RADIUS attributes. removeRADIUSAttribute(String radiusAttributeName)Expects the RADIUS attribute name; removes the specified additional RADIUS attributes from the NetOp PM system.
There are five types of additional RADIUS attributes: StringRADIUSAttribute IntegerRADIUSAttribute Integer64RADIUSAttribute IPRADIUSAttribute HexadecimalRADIUSAttribute Note The preceding RADIUS attribute types control the format of the values that can be specified in the service attribute variations. These types do not need to exactly match the RADIUS attribute types defined in the dictionary.
Table 7-4
Name
Name of the RADIUS attribute in the dictionary_redback.cfg file; up to 50 characters. Vendor ID of the RADIUS attribute; one of the following attributes: Standard RADIUS attributesNot specified Redback VSA2352
VendorId
AttributeNumber
Number of the RADIUS attribute in the dictionary_redback.cfg file; valid values are 1 to 255. Parent element of the service attribute variation element. Service attribute variation that a RADIUS attribute should be used with; can be one or more of the following service attribute variation types: Bandwidth Custom DynamicIPAddress IPRedirect Video
Association SAV
X X
X X
X X
MaxOccurs
Maximum number of values that can be specified for a RADIUS attribute. Value can be 1 to 16.
7-4
Table 7-4
NASType
The RADIUS attribute is supported by the specified NASType (name must start with an alphabetic character or underscore and cannot exceed 10 characters). Circuit types for which the RADIUS attribute is supported on the supporting SmartEdge routers or the SMS devices; can be one or more of the following circuit types: For SmartEdge routers: ALL BRIDGED_1483 CLIPS MOBILE_IP PPP STATIC_CLIPS For SMS devices: ALL BRIDGED_1483 CLIPS PPP For third-party devices: ALL BRIDGED_1483 CLIPS EAP MOBILE_IP PPP
CircuitTypes
DBColumn
Database column name that is created in the NetOp PM database; can be up to 30 characters. Display label that is used in the NetOp client; if it is not specified, the RADIUS attribute name is used as the display label; can be up to 50 characters. Tool tip text that is shown in the NetOp client when the mouse cursor passes over the text box; can be up to 255 characters. Minimum value allowed for this RADIUS attribute. Maximum value allowed for this RADIUS attribute. Maximum number of characters allowed for this RADIUS attribute. Regular expressions that govern which pattern of values are allowed for this RADIUS attribute; one or more regular expression can be specified; can be up to 255 characters. Particular set of values that are allowed to be entered for this RADIUS attribute.
DisplayLabel
ToolTipText
X X X X
Enums
7-5
To add support for additional RADIUS attributes to the NetOp PM system, perform the following steps: 1. Create an XML document specifying the additional RADIUS attributes. Table 7-4 describes the elements in the RADIUS attribute XML structures and the types they support. For example, the following XML code displays the elements required to add a RADIUS VSA for a third-party device to the NetOp PM system:
<StringRADIUSAttribute> <Name>vsa-name</Name> <VendorId>vendor-id</VendorId> <AttributeNumber>attr-num</AttributeNumber> <DBColumn>db-col-name</DBColumn> <MaxOccurs>15</MaxOccurs> <Association> <SAV> <DynamicIPAddress> <NASTypes> <NASType> <Name>nas-name</Name> <CircuitTypes> <CircuitType>circuit-type</CircuitType> </CircuitTypes> </NASType> </NASTypes> </DynamicIPAddress> </SAV> </Association> <DisplayLabel>display-label</DisplayLabel> <MaxLength>max-length</MaxLength> </StringRADIUSAttribute>
The following example configures the RB-Source-Validation attribute to be supported by all circuit types on the SmartEdge platform. Also, the RB-Source-Validation attribute is added to the Custom and DynamicIPAddress Service Attribute Variation panels in the NetOp client:
<IntegerRADIUSAttribute> <Name>RB-Source-Validation</Name> <VendorId>2352</VendorId> <AttributeNumber>14</AttributeNumber> <DBColumn>source_validation</DBColumn> <MaxOccurs>1</MaxOccurs> <Association> <SAV> <DynamicIPAddress> <NASTypes>
7-6
<NASType> <Name>SER</Name> <CircuitTypes> <CircuitType>ALL</CircuitType> </CircuitTypes> </NASType> </NASTypes> </DynamicIPAddress> </SAV> </Association> <DisplayLabel>RB-Source-Validation</DisplayLabel> <Enums> <Enum <Name>Enabled</Name> <Value>1</Value> </Enum> <Enum <Name>Disabled</Name> <Value>2</Value> </Enum> </Enums> </IntegerRADIUSAttribute>
To add multiple RADIUS attributes, create an XML document containing a sequence of RADIUS attributes. 2. To pass the XML file to the addRADIUSAttributeXML() API method, run the ConfigRADIUSAttribute.addRADIUSAttributeXML.pl script (in the /usr/local/npm/soap_client/perl/ directory), using the following syntax: ./ConfigRADIUSAttribute.sampleRADIUSAttributeXML.pl -username npmadmin -password redback -file RADIUSAttribute.xml Here, the RADIUSAttribute.xml file is the XML file you previously created. Specify the -username npmadmin -password redback construct only if secure API is enabled. Note If the RADIUS attribute already exists in the NetOp PM system, you will receive an error message, similar to the following example:
A RADIUS attribute with name: theName, vendor id: theVendorId, attribute number: theAttrNum already exists
7-7
Specify the -username npmadmin -password redback construct only if secure API is enabled. The output displays the resulting XML of the RB-Source-Validation RADIUS attribute:
<?xml version="1.0" encoding="UTF-8"?> <IntegerRADIUSAttribute> <Name>RB-Source-Validation</Name> <VendorId>2352</VendorId> <AttributeNumber>14</AttributeNumber> <DBColumn>source_validation</DBColumn> <Association> <SAV> <DynamicIPAddress> <NASTypes> <NASType> <Name>SER></Name> <CircuitTypes> <CircuitType>ALL</CircuitType> </CircuitTypes> </NASType> </NASTypes> </DynamicIPAddress> </SAV> </Association> <DisplayLabel>RB-Source-Validation</DisplayLabel> <Enums> <Enum <Name>Enabled</Name> <Value>1</Value> </Enum> <Enum <Name>Disabled</Name> <Value>2</Value> </Enum> </Enums> </IntegerRADIUSAttribute>
For definitions of the XML elements, see Table 7-4 on page 7-4.
7-8
Create a New Service Attribute Variation Using the New NAS Type with the NetOp Client
2. Pass the XML file to the NetOp PM API by running the ConfigRADIUSAttribute.updateRADIUSAttributeXML.pl script according to the following syntax: ./ConfigRADIUSAttribute.updateRADIUSAttributeXML.pl -username npmadmin -password redback -file RADIUSAttribute.xml Specify the -username npmadmin -password redback construct only if secure API is enabled.
Create a New Service Attribute Variation Using the New NAS Type with the NetOp Client
After enabling the third-party devices and their VSAs in the NetOp PM system, you need to create service attribute variations using the NetOp client. For information about defining service attribute variations, see Chapter 10, Service Attribute Variations. You can create a referenced service attribute variation or you can define an inline service attribute variation. For details on defining a service attribute variation inline and referencing an existing service attribute variation when creating service offerings, see the Create Service Offerings section on page 9-1. After you add the new NAS type to the system, described in the section Add Third-Party Device (NAS) Types Using a SOAP Client on page 8-1, it is displayed on the Service Attribute Variation Properties panels. It is also displayed when defining a new service offering using the variations you have defined. To view the new NAS type, click on the NAS type folder. Third-party RADIUS attributes added by the administrator appear on the NetOp client under the RADIUS attributes that are natively supported by the NetOp PM system. These attributes are also referred to as additional RADIUS attributes. See NetOp PM API Methods for Managing Additional RADIUS Attributes on page 7-3 for information about which third-party circuit types are supported. The label displayed on the NetOp client for individual RADIUS attributes defaults to the name of the RADIUS attribute, though it can be specified at the time of definition. The vendor-specific attributes appear in the list of RADIUS attributes grouped with Additional RADIUS Attributes if you have first added an additional RADIUS attribute for the NAS-type to the NetOp PM system; see Figure 7-1. Note When creating an access service to be used by an EAP-based subscriber, ensure that the service is an explicit login service. The explicit login option ensures that with each new connection, the EAP authentication takes place.
7-9
Figure 7-1
To define service attribute variations that you can add to service offerings, define filtering criteria and enter values for the device-specific RADIUS attribute. For procedures to use the NetOp client to create service attribute variations, see the Create Service Attribute Variations section on page 10-1. Note When subscribers (who are logged on through third-party devices) change services, they must reconnect to pick up the changed services.
7-10
Add Third-Party RADIUS Attributes to the NetOp PM System Using a SOAP Client
For the procedure to add third-party RADIUS vendor support attributes (VSAs) to the file, see the Verify or Add Additional RADIUS Attributes to the dictionary_redback.cfg File section on page 7-3. Note You must reinitialize the NetOp PM RADIUS servers to register these changes. Any attributes added to the dictionary_redback.cfg file must be added again after an upgrade of the NetOp PM system.
Add Third-Party RADIUS Attributes to the NetOp PM System Using a SOAP Client
Before you can use third-party RADIUS VSAs in service attribute variations, which can be applied to subscriber sessions, you must add the third-party VSAs to the NetOp PM system using a SOAP API method. To do so, inject an XML file describing the third-party VSAs into the NetOp PM system using the ConfigRADIUSAttribute.addRADIUSAttributeXML method; for more information, see the Configure Additional RADIUS Attributes section on page 7-1: 1. Create an XML file to describe the RADIUS VSA; for an example, see the Configure Additional RADIUS Attributes section on page 7-1. The XML document must conform to the XML schema as published in the RADIUSAttribute.xsd file in the /usr/local/npm/docs directory. 2. To pass the XML file to the addRADIUSAttributeXML() API method, run the ConfigRADIUSAttribute.addRADIUSAttributeXML.pl script (in the /usr/local/npm/soap_client/perl/ directory) according to the following syntax: ./ConfigRADIUSAttribute.addRADIUSAttributeXML.pl -username npmadmin -password redback -file thirdPartyVSA.xml where the thirdPartyVSA.xml file is the XML file you previously created. Specify the -username npmadmin -password redback constructs only if secure API is enabled.
7-11
To calculate multiple values: 1. Calculate each sub-TLV value and encode in hexadecimal according to type and length. 2. Concatenate the sub-TLV values in the hexadecimal string to form one attribute value. 3. Repeat steps 1 and 2 for each attribute value, and then enter multiple attribute values. The following examples show how to calculate a value for a WiMAX attribute: For a Wimax-Packet-Flow-Descriptor with sub-TLV values PacketDataFLowID=1, ServiceProfileID=1, Direction=3, Activation Trigger=7, TransportType=1Each sub-TLV is encoded in hexadecimal according to its type and length:
PacketFlowID: 01040001 (type 01, length 04, value 0001); ServiceProfileID: 030600000001 (type 03, length 06, value 00000001); Direction: 040303 (type 04, length 06, value 03- bidirectional); ActivationTrigger: 050307 (type 05, length 03, value 07 Provisioned|Admit|Activate); TransportType: 060301 (type 06, length 03, value 01 - IPv4-CS)
For a WiMAX-QoS-Descriptor with sub-TLV values QoSID=1, ScheduleType=2Each sub-TLV is encoded as follows:
QoSID: 010301(type 01, length 03, value 01); Schedule Type: 040302 (type 04, length 03, value 02-Best Effort);
For a WiMAX Time-Of-Day-Time value with sub-TLV values Hour=1, Minute =2, UTCOffset=1:
Hour: 010301 (type 01, length 03, value 01); Minute: 020302 (type 02, length 03, value 02); UTCOffset: 030600000001 (type 03, length 06, value 00000001
7-12
Note
The NetOp PM system does not validate or check if redirection has been applied. Ensure that your values match the appropriate ASNGWs and FAs.
3. Click Apply.
Support for NAS-Filter-Rules Exceeding the Character Limit for an Inline SAV
For strings exceeding 252 characters in a single rule row for a NAS-Filter-Rule, you can use the backslash key (\). When a string exceeds 252 characters: 1. Mouse over the entry field for NAS-Filter-Rule to see the tooltip. 2. Type the string. 3. When your string exceeds 252 characters, type \ as the 253rd character. 4. Continue typing the rest of the string in the next line. 5. Press the Enter key to type another string. You can enter up to 16 strings in the entry field.
7-13
7-14
Chapter 8
You can use the following SOAP API methods to add, retrieve, remove, or update NAS types in the NetOp PM system: ConfigNASType.addNASTypeXML ConfigNASType.getAllNASTypesXML ConfigNASType.getNASTypeXML ConfigNASType.removeNASType ConfigNASType.updateNASTypeXML
To enable support for a third-party NAS type using XML documents with a SOAP client, perform the following steps: 1. Create an XML document defining the NAS type to add to the NetOp PM system, similar to the following:
8-1
Add Third-Party Devices to Communicate with the NetOp PM System Using a SOAP Client
Here the required NASType name is the unique name of the third-party device that you are inserting into the NetOp PM system, and the CircuitTypes element contains the circuits supported by the device. The nas-type-name variable must start with an alphabetic character or underscore, and cannot exceed 10 characters. You can specify the BRIDGED_1483, CLIPS, EAP, MOBILE_IP (wireless authorization), or PPP circuit types. You can add up to five circuit types in repeated CircuitType elements. The XML document must conform to the XML schema as published in the NASType.xsd file in the /usr/local/npm/docs directory. 2. Make the addNASTypeXML SOAP call specifying the location of the XML document. The NetOp PM software includes sample Perl SOAP scripts you can use to invoke the API method. The scripts are in the /usr/local/npm/soap_client/perl directory. For usage guidelines on any of the sample scripts, run the script with the -help keyword: ./script-name -help For example, to add NAS type information to the NetOp PM system with the NAS type defined in the XMLFile.xml document, run the addNASTypeXML.pl script as follows: /usr/local/npm/soap_client/perl/ConfigNASType.addNASTypeXML.pl -static -file newNASType.xml Here the -file newNASType.xml construct specifies the XML file that defines the new NAS type.
Add Third-Party Devices to Communicate with the NetOp PM System Using a SOAP Client
To add a third-party device to the NetOp PM system, you must add it to the NetOp PM system using the NASMgmt.addNASXML.pl SOAP client. To add a third-party device to the NetOp PM system, perform the following steps: 1. Create an XML file describing the third-party device, in the following format:
<NASRecords> <NAS> <Id>nas-id</Id> <IPAddress>10.192.100.8</IPAddress> <Secret>my-secret</Secret> <SoftwareVersion>ver-num</SoftwareVersion> <Type>nas-type</Type>
8-2
Add Third-Party Devices to Communicate with the NetOp PM System Using a SOAP Client
</NAS> </NASRecords>
This XML describes the name, IP address radius secret, password (secret), software version, and NAS type for the device. 2. To inject a new third-party device into the NetOp PM system, run the following script: /usr/local/npm/soap_client/perl/NASMgmt.addNASXML.pl -file thirdPartyDevice.xml Here the thirdPartyDevice argument is the path and filename of the XML file containing the NAS description.
8-3
Add Third-Party Devices to Communicate with the NetOp PM System Using a SOAP Client
8-4
Chapter 9
Service Offerings
This chapter describes how to view, create, modify, and delete service offerings.
To create a new service offering, perform the following steps: 1. On the network navigator, click Service Offering and click one of the following service offering types: Access Offering, Bandwidth Offering, Custom Offering, IP Redirect Offering, Lawful Intercept Offering, or Video Offering. 2. On the management view launch bar, click Properties. 3. On the Properties panel toolbar, click Add Service Offering.
Service Offerings
9-1
4. Click the Adding Service Offering of type field and select the type of service offering to add. To create a service offering based on an existing service offering, view the service offering to replicate, click Add Service Offering, and on the Adding Service Offering of type dialog box, click to select the Use data from currently displayed service check box. You can only use this check box to create the same type of service offering as you are viewing. The ID and name of the service offering must be unique. When you duplicate a service offering with overrides, the overrides are not duplicated. 5. Click OK. The Adding Service Offering of type dialog box appears with an exclamation icon next to the objects that require information. 6. Type the ID and Name of the service offering. The ID and Name must be unique across the NetOp PM system. The web portal displays the Name to the subscriber. 7. Optional. Type a Description of the service offering. 8. Click the Priority field and type a number from 1 to 999. A lower number assigns a higher priority. By configuring a service offering with a higher priority, you instruct the NetOp PM system to apply that service offering to the subscriber session before applying any service offering with a lower priority; conflicting attributes from the lower-priority service offering are ignored. This is especially useful when conflicting attributes are defined in two or more services. When more than one service with conflicting attributes has the same priority, the NetOp PM Remote Authentication Dial-In User Service (RADIUS) server logs the conflict in the NetOp PM RADIUS server log file and selects one of the parameters over the other. Note Any service that increases the subscribers bandwidth must have a higher priority than the underlying access service.
9. Click the Retail field and select Y or N to specify the service offering as a retail or wholesale service. A value of Y indicates that the service offering is a retail service, and the service is provided by the owner of the subscriber account; a value of N indicates that the service offering is a wholesale service, and the service is provided by the equipment owner. In a wholesale model, retail services are controlled by the proxy ISP RADIUS server, and wholesale services are permanently associated with the subscriber account. In a non-wholesale model, all services should be defined as Retail and are controlled by the carrier. For details on wholesale versus retail services in the NetOp PM system, see the Retail and Wholesale Deployment section on page 1-5 in the NetOp Policy Manager Product Overview.
9-2
10. Click the Show In List field and select Y or N to specify whether the service should appear on the portal services page for subscriber selection. A service that is unavailable for subscriber selection can still be applied through the application programming interface (API). You cannot explicitly configure a service to be shown for one encapsulation type and not for another; that is, you cannot show a service for clientless IP service selection (CLIPS) circuits, and hide the service for Point-to-Point Protocol (PPP) circuits. During service development and testing phases, you can make a service unavailable to subscribers so that the service cannot be inadvertently selected by a subscriber before the service is fully tested. When the service is fully tested and you want to make the service available for subscribers through the web portal services page, ensure that the value of the Show In List field is Y. Note The Captive Portal and Invalid Login services should never be available to subscribers; the Show In List field should always be N for these services. These services are not offered to subscribers, but are used by the NetOp PM RADIUS server.
11. Optional. Click to select the Offered From check box and type the start date when the service is available for selection to the subscriber through the web portal. If not specified, the service is offered immediately. 12. Optional. Click to select the Offered Until check box and type the end date when the service is no longer available for selection to the subscriber through the web portal. The Offered Until date should not be earlier than the Offered From date. If not specified, the service is always offered. For detailed field descriptions, see Table 4-3 on page 4-3 in the NetOp Policy Manager Reference. Note The Access and Custom service offering types require you to define additional fields; for information, see the Create an Access Service Offering section on page 9-4 and the Create a Custom Service Offering section on page 9-5.
13. Optional. With the exception of Lawful Intercept services, you can create complex services by defining a time or volume variation for any service offering. Access services cannot have a scheduled variation. See Chapter 11, Complex Time and Volume Services. You need to purchase a license to enable the complex services feature. You can create a prepaid service with real-time credit control by defining a credit-control variation for any Access service offering; see Chapter 12, Online Charging for Prepaid Services. You need to purchase a license to enable credit control. 14. Most service offerings require that at least one type of service attribute variation be configured to specify how the service offering should behave. Table 9-1 lists the required and optional service attribute variation types for each service offering type. In defining a service offering, you can: Reference a service attribute variation Double-click to select a service attribute variation type and select Referenced Variation. Browse to the service attribute variation you want to reference and click OK.
Service Offerings
9-3
Define a service attribute variation inline Define any applicable service attribute variations by activating the primary instance and typing the appropriate information for any required and optional filtering attributes or RADIUS attributes. For a list of valid attributes for each service attribute variation type, see Chapter 2, Service Attributes Descriptions in the NetOp Policy Manager Reference. For instructions on creating service attribute variations and instances of services attribute variations, see the Create Service Attribute Variations section on page 10-1.
Note
Service attribute variations defined inline cannot be reused by other service offerings. To use a service attribute variation for more than one service offering, create a service attribute variation and reference the variation from the service offering. For more information, see the Create Service Attribute Variations section on page 10-1.
Required and Optional Service Attribute Variations
Required Service Attribute Variation Dynamic IP Address Bandwidth IP Redirect Bandwidth Dynamic IP Address Optional Service Attribute Variation Bandwidth
Table 9-1
Custom
9-4
Note
The Explicit Logon field does not apply to subscribers authenticated through native PPP logon or 802.1x Extensible Authentication Protocol (EAP) logon.
3. Click the Max. Sessions field and type the number of simultaneous active sessions permitted for the subscriber account name and password. This setting represents the total logons permitted by a subscriber account, through web logon or native PPP logon. Note The Max. Sessions field must be set to 1 if you are assigning static IP addresses to subscriber accounts.
4. Click the Log Off Session on Limit field and select Y or N to specify whether to log off the oldest subscriber session when the session limit is exceeded. If the Log Off Session on Limit field is configured as Y, the NetOp PM system checks the number of active logons per subscriber account when the subscriber logs on and, if the aggregate number of subscriber account logons on all circuit types exceeds the configured Max. Sessions for the service, the NetOp PM system automatically logs off the oldest session.
Service Offerings
9-5
Before you delete service offerings, it is important to be aware of the following: Attempting to delete a service offering that has been configured as a default service offering results in the following error in the NetOp PM Service Offering user interface: Failed to remove Service Offering Unable to remove Service Offering [XXXXX]; referenced in service order history. Attempting to delete a service offering to which a subscriber is currently subscribed causes the following error in the NetOp PM Service Offering user interface: Failed to remove Service Offering Unable to remove Service Offering [XXXXX]; because it is currently being used by subscriptions Instead of deleting the service, remove the service from the list of available services to prevent new subscribers from selecting the service, effectively hiding the service. For more information, see the Make a Service Unavailable to Subscribers section on page 9-7. Attempting to delete a service offering to which a subscriber has ever subscribed causes the following error in the NetOp PM Service Offering user interface: Failed to remove Service Offering Unable to remove Service Offering [XXXXX]; referenced in service order history Use the archive_n_purge.sh- history command to archive and purge all service order history entries for your subscriber accounts. This service offering is no longer referred to and you can now delete it. If no subscribers are subscribed to a service offering, you can delete the service offering. To delete a service offering, perform the following steps: 1. View a service offering; see the View Service Offerings section on page 9-1. 2. Ensure that the service offering you want to delete is unavailable to subscribers. Service offerings that are unavailable to subscribers have a value of N in the Show In List field. 3. On the Properties panel toolbar, click Remove Service Offering. A confirmation dialog box appears. 4. Click Yes to remove the service offering.
9-6
Service Offerings
9-7
9-8
Chapter 10
This chapter describes how to view, create, modify, and delete service attribute variations.
10-1
1. On the network navigator, click Service Attribute Variation. 2. Click one of the following service attribute variation types: Bandwidth Variation, Custom Variation, Dynamic IP Address Variation, IP Redirect Variation, or Video Variation. 3. On the management view launch bar, click Properties. 4. On the Properties panel toolbar, click Add Service Attribute Variation to open the Add Service Attribute Variation dialog box. 5. Click the Adding Attribute Variation of type field and select the type of service attribute variation to add. Note To create a service attribute variation based on an existing service attribute variation, view the service attribute variation you want to replicate (see the View Service Attribute Variations section on page 10-1), click Add Service Attribute Variation, and on the Add Service Attribute Variation dialog box, click to select the Use data from currently displayed variation check box. You can only use this check box to create the same type of service attribute variation as you are viewing.
6. Click OK. An exclamation icon appears next to the objects that require information. 7. Click the service attribute variation type on the service definition navigator; for example, click Bandwidth. 8. Click the ID field and type the ID of the new service attribute variation. The ID must be unique across the NetOp PM system. 9. Click the Name field and type the name of the service attribute variation. The name must be unique across the NetOp PM system. 10. Optional. Click to select the Description check box and type a description of the service attribute variation. 11. Optional. If you are licensed to use the NetOp PM admission control function feature, click to select the Requested Inbound Bandwidth check box and type the amount of inbound bandwidth required, in kbps, to guarantee or conditionally guarantee bandwidth service quality for bandwidth-dependant services, such as Video On Demand and Video On Demand Soft Reservations. For information on Bandwidth service offerings, see Chapter 9, Create Service Offerings. 12. Optional. If you are licensed to use the NetOp PM admission control function feature, click to select the Requested Outbound Bandwidth check box and type the amount of outbound bandwidth required, in kbps, to guarantee or conditionally guarantee bandwidth service quality.
10-2
13. Optional. At this point you can decide whether you want hard reservations (guaranteed bandwidth) or soft reservations (conditionally guaranteed bandwidth) for this service offering. You must set the bandwidth (see steps 11 or 12) before you can designate a soft reservation. If you want this service attribute variation to guarantee bandwidth, leave the check box empty or select N in the Soft Reservation field. This is a hard reservation. If you want this service attribute variation to conditionally guarantee bandwidth, click to select the Soft Reservation check box and select Y from the drop-down list. Click to select the Class of Service check box and from the drop-down list choose the class of service you want monitored if the congestion points become overloaded. Click to select the Activity Threshold check box and enter the activity threshold. This is a soft reservation service attribute. Note It is very important that you use unique names when naming your Class of Service because the NetOp PM system does not track the correlation between Class of Service and policy names, and QoS policy deployed for a particular subscription may not be known.
For more information about soft reservations, see the Hard and Soft Bandwidth Reservations section on page 6-3 in the NetOp Policy Manager Product Overview. For detailed field descriptions, see Table 4-1 on page 4-1 in the NetOp Policy Manager Reference. 14. Define any applicable service attribute variations by activating the primary instance and typing the appropriate information in each field. Activate one or more of the primary instances of the service attribute variation by double-clicking the instance to select the check box, or right-clicking the instance, and clicking Activate. The NetOp client enables you to define multiple instances of service attribute variations, meaning you can specify RADIUS attributes differently based on one or more of the filtering attributes. For example, you can define two instances of a bandwidth variation for the SmartEdge router where the realm is ALL for one instance and ABC for the second. You can then specify a different bandwidth for the ABC realm instance. For more information, see the Variation Instances section on page 10-4. Instances of a service attribute variation appear under the service attribute variation type on the service definition navigator. Depending on the type of service attribute variation, instances are applied based on node type (SER, SMS), or node type and encapsulation type (SER_BRIDGED_1483, SER_CLIPS, and so on). 15. Optional. For unicast (VoD) and multicast (IPTV) service, specify the type of congestion points subject to admission control in the last mile. For unicast service, click to select the Congestion Point check box, and select Default (all) from drop-down list. For multicast service, click to select the Congestion Point check box, and select RG from the drop-down list. 16. Create or remove instances, as appropriate; see the Create and Remove Variation Instances section on page 10-6. For more information on instances, see the Variation Instances section on page 10-4 and the Automatic Naming of Location-Specific Service Attribute Variation Instances section on page 10-7.
10-3
Variation Instances
17. For each instance, type the appropriate information for any required filtering attributes or RADIUS attributes. For optional fields, click to select the check box and type the appropriate information. Some attributes allow multiple values. You can either create additional instances of attributes to enter multiple values, or enter multiple values on separate lines in a single text field. If you enter multiple values on separate lines, the NetOp PM software will convert the separate line entries to create multiple instances. 18. Click OK to save the service attribute variation. Note Existing service attribute variations can be referenced when you create service offerings; see the Create Service Offerings section on page 9-1.
For information on... Valid attributes for each service attribute variation type A description of each service attribute variation type A list of the sample service attribute variations, and a matrix of sample service attribute variations by type Descriptions and valid values of the supported RADIUS attributes and filtering attributes Configuring Diameter overrides to RADIUS attributes for credit-control services
Variation Instances
The NetOp client provides a high degree of flexibility in defining variations. Depending on the type of service you intend to create, you can define instances of the service attribute variation based on node type (SER, SMS), or node type and encapsulation type (SER_BRIDGED_1483, SER_CLIPS, SER_MOBILE_IP, and so on). Credit-control variations and some attributes within service attribute variations also allow multiple instances to be created. The following scenarios describe variation instance creation for service attribute variations only.
10-4
Variation Instances
In this example, the configuration for the SER instance applies to all subscribers except those in the ABC realm. For subscribers in the ABC realm, the attributes specified in the SER_CLIPS and SER_PPP instances override those specified in the SER instance.
Figure 10-1 illustrates this scenario. Note Unique naming is applied to the different instance automatically after the variation is created. For more information on automatic naming, see the Automatic Naming of Location-Specific Service Attribute Variation Instances section on page 10-7.
10-5
Figure 10-1
2. Click New Instance. A new instance of the node type or encapsulation type appears.
10-6
3. In each field, type the appropriate information. For each instance of a single type, at least one of the following fields must be unique: Note Encapsulation Type Port Type Medium Type Software Version Realm You cannot remove the last instance of a variation. The last instance must be deactivated. To deactivate an instance, right-click the instance, and click Deactivate. If you deactivate the primary instance, that is, the instance with the selected check box, the selected check box moves to the next instance, making this instance the new primary instance.
To remove an instance of a variation: 1. Right-click an existing activated instance of a service attribute variation. 2. Click Remove.
Note
Each instance of a service attribute variation must have a unique value for at least one filtering attribute.
For filtering attributes specified as ALL, the NetOp PM system inserts an asterisk (*) character; for example, an instance for the SmartEdge router where all other filtering attributes are specified as ALL, appears as SER-*-*-*-*-*-*-* in the service definition navigator. Note The Software Version filtering attribute is never included in the automatic name.
An instance of an IP redirect variation for the SmartEdge router with a NAS-Identifier value of ser-1 and a NAS-Port-Id value of 12/8 vlan-id 2, where all other filtering attributes are specified as ALL, appears as SER-*-*-*-*-*-ser-1-12/8 vlan-id 2 in the service definition navigator. Similarly, an
10-7
instance of the same IP redirect variation for the SmartEdge router with a NAS-Identifier value of ser-1 and a NAS-Port-Id value of 12/12 vlan-id 3, where all other filtering attributes are specified as ALL, appears as SER-*-*-*-*-*-ser-1-12/12 vlan-id 3 in the service definition navigator. In contrast, an instance of the same IP redirect variation for the SmartEdge router with a Calling-Station-Id value of 00:0E, where all other filtering attributes are specified as ALL, appears as SER-*-*-*-*-00:0E-*-* in the service definition navigator. Figure 10-2 illustrates the automatic naming applied for multiple instances.
Figure 10-2 Automatic Naming for Multiple Instances
10-8
Note
You might need to wait up to 30 seconds for the refresh after the NetOp client is updated.
You may want to delete a service attribute variation from the database; for example, if a realm variation is no longer supported, or if an encapsulation type, software version, port type, or medium type is no longer required. To delete a service attribute variation, perform the following steps: 1. View a service attribute variation; see the View Service Attribute Variations section on page 10-1. 2. On the Properties panel toolbar, click Remove Service Attribute Variation. A confirmation dialog box appears. 3. Click Yes to remove the service attribute variation. Note If a service attribute variation is being referenced by a service offering, an attempt to delete the service attribute variation fails.
10-9
10-10
Chap ter 11
With the exception of Lawful Intercept services, you can create complex services by defining a time or volume variation for any service offering; you can specify the variation as scheduled or metered. Access services cannot have a scheduled variation. Note To define and manage NetOp PM complex services, which includes quota metering, you must have a license for the complex services feature.
The NetOp PM software supports two types of complex time and volume service offering variations: Scheduled Services Metered Services
Scheduled Services
Scheduled services start or stop at a particular time, or after a configured amount of time elapses. You can configure a scheduled service to start or stop at a specified time; for example, a video multicast of a specific event. Alternatively, you can configure the service to start at a specific time and last for a specified duration. Another type of scheduled service is a turbo-button service, which starts immediately on subscription and lasts for a specific duration. For example, you can configure a bandwidth-boost service where the subscriber temporarily has a higher rate of bandwidth for a short amount of time; when the specified amount of time elapses, the bandwidth reverts to the subscribers original bandwidth. The following concepts apply to scheduled service offerings: Active serviceA subscribed service whose RADIUS attributes are applied to the subscribers session. ActivateTime at which the NetOp PM software applies RADIUS attributes to the subscriber session. This value can be absolute or relative. DeactivateTime at which the NetOp PM software removes RADIUS attributes from the subscriber session. The service remains subscribed. The value can only be relative and cannot be a value prior to the activation time.
11-1
Scheduled Services
ExpiresTime at which the NetOp PM software removes RADIUS attributes from the subscriber session and unsubscribes the subscriber from the service. The value can be absolute or relative and cannot be a value prior to the activation time. OccursFrequency with which the service becomes active. The default value is Once.
For possible values for each of these settings, see Chapter 4, NetOp Client Panel Descriptions in the NetOp Policy Manager Reference. Note Access services cannot be defined as scheduled services.
11-2
Scheduled Services
For details on the sample scheduled service offerings provided with the NetOp PM software, see Chapter 3, Sample Service Descriptions in the NetOp Policy Manager Reference. Table 11-1 The following table describes the valid absolute and relative time specifications, and the formats supported for each time-related scheduled service field.
Table 11-1
Field Activate
Deactivate
+ddd [hh:mm] where ddd is a number of days from 1 to 365 and hh:mm is an amount of time from 0:00 to 23:59, relative to the time when the service is activated +hh:mm where hh:mm is an amount of time from 0:00 to 23:59, relative to the time when the service is activated hh:mm where hh:mm is a time on a 24-hour clock from 0:00 (midnight) to 23:59 (11:59 p.m.); the service is deactivated on the next occurrence of hh:mm after the moment the service is activated day_of_week hh:mm
Expires
+ddd [hh:mm] where ddd is a number of days from 1 to 365 and hh:mm is an amount of time from 0:00 to 23:59, relative to the time when the service is activated +hh:mm where hh:mm is an amount of time from 0:00 to 23:59, relative to the time when the service is activated hh:mm where hh:mm is a time on a 24-hour clock from 0:00 (midnight) to 23:59 (11:59 p.m.); the service is deactivated on the next occurrence of hh:mm after the moment the service is activated day_of_week hh:mm
11-3
Scheduled Services
An example of a daily service is a daily bandwidth boost during peak hours. The services attributes are applied to the subscribers session at 8:00 a.m. on the first day the subscriber adds the service. The service remains active until 6:00 p.m. on the same day. During the services offering period, the bandwidth boost is listed in the subscribers subscribed services, but the service offerings attributes are only applied to the subscriber session daily at 8:00 a.m. and remain active on the session until 6:00 p.m. The service repeats daily for as long as the subscriber remains subscribed to the service. The service never expires, meaning the service is not removed from the subscribers list of services until the subscriber explicitly removes it. Single Occurrence Service Valid Formats:
Activate: IMMEDIATE Deactivate: Expires: NEVER Occurs: Once
An example of a single occurrence service is a Basic Internet Access service. The services attributes are applied to the subscribers session immediately when the subscriber adds the service. The service never expires, meaning the service offerings attributes are applied to the subscriber session and the service remains in the subscribers list of services until the subscriber explicitly removes it. Note Do not specify a value for the Deactivate field for single occurrence services where the Occurs field is set to Once.
An example of a weekly service is a pay per view subscription to a TV series. The services attributes are applied to the subscribers session on the first Monday at 7:00 p.m. after the subscriber adds the service. That is, if the subscriber adds the service on a Monday at 6:00 p.m., the services attributes are applied on the same Monday, one hour later; if the subscriber adds the service on a Monday at 9:00 p.m., the services attributes are applied on the following Monday at 7:00 p.m. During the services offering period, the TV
11-4
Scheduled Services
series is listed in the subscribers subscribed services, but the service offerings attributes are only applied to the subscriber session every Monday at 7:00 p.m. and remain active on the session until 9:00 p.m. on the same Monday. The service repeats weekly, meaning the services attributes are active every Monday from 7:00 to 9:00 p.m. until the services expiry on April 30, 2007. At the end of April, when the TV series is over, the service is removed from the list of subscribed services.
5. Optional. Click to select the Deactivate check box and type the time when the service offerings attributes are removed from the subscriber session, relative to activation. The service remains subscribed, even if it is deactivated. The value can only be relative, and cannot be a value prior to the activation time. When you specify a relative time, the service becomes inactive at a point in time relative to the services activation. For example, if the Deactivate field is +3:00 and the service is activated at 11:00 a.m., the service becomes inactive at 2:00 p.m., 3 hours after service activation. Similarly, if the Deactivate field is 03:00 and the service is activated at 11:00 a.m., the service becomes inactive at 3:00 a.m. the next day. Note Do not specify a value for the Deactivate field for non-recurring services, where the Occurs field is set to Once.
11-5
Scheduled Services
6. Optional. Click to select the Expires check box and type a time. The Expires field indicates when the service offerings attributes are removed from the subscriber session, relative to activation, and the NetOp PM software removes the service from the subscribers subscribed services. The value can be absolute or relative, and cannot be a value prior to the activation time. An example of a service offering that uses both the Expires and Deactivate fields is a pay per view subscription to a TV miniseries, which lasts for one month. During the month, the TV miniseries is listed in the subscribers subscribed services, but the service offerings attributes are only applied to the subscriber session every Monday at 7:00 p.m. (Offered From = 2007-04-01 00:00, Activate = Monday 19:00, Occurs = Weekly) for a two-hour period (Deactivate = +02:00). After one month, when the TV miniseries is over, the service is removed from the list of subscribed services (Expires = 2007-04-30 21:00:00). An example of a service offering that uses only the Deactivate field and not the Expires field is a daily bandwidth boost during peak hours. In this case, the service becomes active at 8:00 a.m. on the first day the subscriber adds the service (Activate = 08:00). The service remains active until 6:00 p.m. on the same day, or until 8:00 a.m. the next day if the service is selected after 18:00 (Deactivate=18:00). The 8:00 a.m. activation and 6:00 p.m. deactivation repeats daily for as long as the subscriber remains subscribed to the service (Occurs = Daily). The following example demonstrates the difference between the Offered Until date and the Expires date for a scheduled service. To offer a subscription for a season of Major League Baseball games for a favorite team, you can offer two services: Full Season and Half Season. For this example, assume the baseball season runs from April 3 to October 2 and the World Series runs from October 3 to the end of October. Subscribers who sign up during the first half of the season (to June 30) subscribe to the Full Season service. After June 30, the Full Season service is no longer offered to subscribers on the web portal, but those who subscribed to the service continue to receive the service until its expiry at the end of the World Series. Subscribers who sign up in the last half of the season (after June 30) subscribe to the Half Season service. The Half Season service is offered until the end of the regular season on October 2. After October 2, the Half Season service is no longer offered to subscribers on the web portal, but those who subscribed to the service continue to receive the service until its expiry at the end of the World Series. The Expires date is the same for both services: the last day of the World Series; the Offered Until date is different: June 30 for the Full Season package and October 2 for the Half Season package. 7. Optional. Click to select the Occurs check box and select the frequency with which the service becomes active. Note For non-recurring services, where the Occurs field is set to Once, do not specify a value for the Deactivate field.
8. If all other required information has been defined for the service offering, click OK to create the service offering and close the window, or click Apply to apply changes to an existing service. For detailed field descriptions, see Table 4-4 on page 4-4 in the NetOp Policy Manager Reference. Table 4-5 on page 4-5 in the NetOp Policy Manager Reference describes the valid absolute and relative time specifications and the formats supported for each time-related field.
11-6
Metered Services
Metered Services
Metered services charge the subscriber for the amount of time or bytes (volume) used. For volume-based services, upstream and downstream traffic can be metered separately. Note SMS devices do not support metered services.
One application of metered services is prepaid services. The NetOp PM system can support prepaid scenarios in two modes. In stand-alone deployment scenarios, NetOp PMs service manager handles all time- and volume-metering functions and can redirect a subscribers session when the balance remaining is zero. In an integrated deployment scenario, the NetOp PM system coordinates with an external credit control server. This section describes metered services in stand-alone deployment scenarios using the NetOp PM service manager. For information on prepaid services in an integrated deployment scenario, see Chapter 12, Online Charging for Prepaid Services. The following concepts apply to time-metered and volume-metered service offerings: Active serviceA subscribed service whose RADIUS attributes are applied to the subscribers session. Time quotaAmount of time the subscriber can actively use the service. The default time quota in the service offering definition can be modified for each subscriber at the point of subscription using service subscription overrides; see Chapter 7, Service Subscription Attribute Overrides in the NetOp Policy Manager API Guide for information. Incoming traffic quotaNumber of KB the subscriber can receive. The default incoming traffic quota can be modified for each subscriber at the point of subscription using service subscription overrides; see Chapter 7, Service Subscription Attribute Overrides in the NetOp Policy Manager API Guide for information. Outgoing traffic quotaNumber of KB the subscriber can send. The default outgoing traffic quota can be modified for each subscriber at the point of subscription using service subscription overrides; see Chapter 7, Service Subscription Attribute Overrides in the NetOp Policy Manager API Guide for information. When quota exceededApplies only to the standalone deployment scenario. The action that the NetOp PM system should perform when the subscribers quota is exceeded. You can chose from the following options: Expire Subscription (this is the default) Deactivate Subscription Replace Variation Do Nothing For descriptions of these options, see Chapter 3, Sample Service Descriptions in the NetOp Policy Manager Reference. Reset OccursApplies only to the standalone deployment scenario. Frequency with which the quota is reset. The default value is None. Reset TimeOptional. Applies only to the standalone deployment scenario. The date and time at which the service subscription is reset.
11-7
Metered Services
For possible values for each of these settings, see Chapter 4, NetOp Client Panel Descriptions in the NetOp Policy Manager Reference. Time and volume metering continues until the subscriber logs off or exceeds the subscribed quota. In the case of an implicit logon service, the subscriber must explicitly log off or the DHCP lease must expire; in the case of an explicit logon service, there is no issue because the NetOp PM system logs the subscriber off automatically. For subscribers who are logged on and have been assigned to a captive portalfor example, quota exceeded notificationtime and volume quotas continue to be consumed.
70
Basic Access
99
Not applicable
In the NetOp PM system, all services that make up a Tiered Quota service are applied to the subscriber session. Then, all active subscriptions are charged with session volume usage simultaneously. Therefore, while the subscription consumes the first GB from the first service offeringin the example shown in Table 11-2, Tiered MonthlyFirst 1 GB Goldit is also consuming 1 GB of the next service offeringin the example, Tiered MonthlyNext 1 GB Silver. If the Tiered Quota service bundle has a third tier, it would need to be created with more than 2 GB of volume quota. In the example, there is no third tierthe subscriber uses the Basic Access service offering, which is not a volume metered service. You must set the Priority for each tier to ensure the correct tier service attributes as indicated in Table 11-2 in the Priority column. As shown, the fastest bandwidth (Tiered MonthlyFirst 1 GB Gold) requires the highest priority. For information about setting priorities for service offerings, see the Create Service Offerings section on page 9-1. Based on the example in Table 11-2, when the quota for the Tiered MonthlyFirst 1 GB Gold service is consumed, the NetOp PM system continues consuming the Tiered MonthlyNext 1 GB Silver service offering. Following the example, when the quota for the Tiered MonthlyNext 1 GB Silver service offering is consumed, the subscriber either continues using the Basic Access service offering at a reduced
11-8
Metered Services
bandwidth or is redirected to the Usage web page where more and faster service can be purchased using the Top Up redirect page. See Chapter 7, Service Subscription Attribute Overrides in the NetOp Policy Manager API Guide for more details about these configurations. The decision to provide lower bandwidth or redirect subscribers who exceed their volume quotas to a Usage page is based on how you set the Replace Variation attribute on the Metered Variation pane. Figure 11-1 illustrates what happens as the month progresses to the Tiered Quota service bundle example described in Table 11-2. This monthly volume service bundle is made up of a Tiered MonthlyFirst 1GB Gold service offering, a Tiered MonthlyNext 1GB Silver service offering, and a Basic Internet Access service offering.
Figure 11-1 Example of a Tiered Monthly Volume Quota Service Bundle
11-9
Metered Services
volume-metered services, the session is terminated immediately by default when the quota is reached. To enable the NetOp PM software to keep the circuit up and not terminate the session, add the following configuration in all contexts (in subscriber configuration mode): subscriber default session-action traffic-limit acct-alive The NetOp PM software provides two sample service offerings to illustrate the prepaid payment model; for details, see the Prepaid Internet1 GB Service Offering section on page 3-23 and the Prepaid Internet20 Hours Service Offering section on page 3-24 in the NetOp Policy Manager Reference. Recurring Quota SubscriptionThe subscriber signs up for a recurring daily, weekly, or monthly subscription. The subscriber is entitled to a quota of bytes or minutes for each daily, weekly, or monthly quota period. Any unused bytes or minutes are discarded at the end of each quota period; they are not carried over to the next period. Note Specify the subscription period using the Reset Occurs field.
The service provider has a number of options for managing subscribers who exceed quotas. The service provider can redirect the subscriber to a custom captive portal web page to inform the subscriber that the quota has been exceeded and to make a selection about how to continue. Depending on the configuration, the custom captive portal page could offer one or more of the following actions for those subscribers who exceed the assigned quota: Continue at a reduced access rate (for example, 64 kbps) at no extra charge. Continue at full-access rate where over-quota bytes are billed at a premium pay-as-you-go rate. Redirect the subscriber to purchase more prepaid quota (for example, another 10 GB) and continue at full-access rate.
11-10
Metered Services
Terminate access for the rest of the day, week, or month; at the start of the next day, week, or month, the subscribers account is reset with a new full quota at full-access rate. The service provider can enable the subscriber to purchase more prepaid quota using the NetOp PM softwares top up feature. Subscribers can top up the time quota, and incoming and outgoing traffic quotas for a particular service subscription through the NetOp PM API. The NetOp PM system recognizes quota top ups as quota overrides and continues to provide the subscriber Internet service even though the service offerings predefined quotas have been exceeded. By default, the quota top up remains in effect for the remainder of the current quota period (day, week, or month). The actual quota values applied to a specific service subscription are displayed on the Subscribed Services tab of the Subscriber Account panel. For more information on quota top up, see Chapter 7, Service Subscription Attribute Overrides of the NetOp Policy Manager API Guide. The NetOp PM software includes a sample web page to demonstrate how a subscriber can supplement time and volume quotas for metered services. For information on how to customize this sample web page, see Chapter 15, Configure the NetOp PM Lightweight Web Portal. To bill the subscriber for usage, you can use the generated RADIUS accounting messages, generate a report from the NetOp PM service order usage tables, or query for up-to-the-second accurate usage information using the NetOp PM SOAP API. The external system can use the NetOp PM API to query the subscriber usage at the appropriate point in the billing cycle. For recurring subscriptions, in addition to enabling you to reset subscriber quotas automatically on a daily, weekly, or monthly basis, the NetOp PM software includes scripts that you can use to reset time and volume quotas manually at custom intervals. To reset quotas manually, the value of the Reset Occurs field must be Custom. For instructions on running the reset scripts, see the NetOp Database Administration Guide.
11-11
Metered Services
Subscribers can start and stop sessions as often as they want; the NetOp PM software tracks subscriber usage across multiple sessions and sets the limits for each new session. Subscribers can obtain their current traffic usage through the Usage web page, described in Chapter 7, Service Subscription Attribute Overrides of the NetOp Policy Manager API Guide. The NetOp PM software tracks two usage types: Per sessionThe NetOp PM software tracks subscriber traffic usage per session. The NetOp PM software then uses this information to determine the per-subscriber usage. Per serviceA NetOp PM current usage record exists for each service subscription. The NetOp PM service manager compares the value of the current usage record to the incoming traffic quota and outgoing traffic quota configured on the Service Offering view when a session starts. If the subscribers current subscription usage does not exceed the quota, a new traffic limit is calculated and sent to the SmartEdge router in the RB-Session-Traffic-Limit attribute. You can configure the NetOp PM software to take one of the following actions if the quota is reached: Expire the servicethe service does not appear as a subscribed service Change the RADIUS attributes for the service; service remains subscribed Note For time-metered services, the change in RADIUS attributes is made immediately when the quota is reached. For volume-metered services, by default the session is dropped and the new attributes are applied when the subscriber restarts the session. To enable the NetOp PM system to not drop the session, add the following configuration in all contexts (in subscriber configuration mode): subscriber default session-action traffic-limit acct-alive This command enables the default subscriber profile to send Accounting-Alive RADIUS messages when the traffic limit is reached. Deactivate the servicethe services attributes are removed from the subscriber but the service remains subscribed Replace variationthe service stays up and based on what you set as the Quota Exceeded Variation, you determine the action the system takes. If set to Quota Exceeded Redirect, the subscriber is redirected to a Quota Exceeded web page that provides contact information for continuing subscriber service when quota is exceeded. If set to Top Up Redirect, the subscriber is redirected to the Usage web page where more time or volume can be purchased using the Top Up redirect page. Do nothingthe service remains subscribed and the attributes continue to be applied to the subscriber The SmartEdge router monitors subscriber session usage when it receives a quota from the NetOp PM software. The SmartEdge router has no knowledge of the overall quota for a subscriber; it is aware only of traffic limits on a particular session. Depending on the SmartEdge router configuration, when a session limit is reached the SmartEdge router drops the session or generates an Accounting-Alive message; the accounting packets permit the NetOp PM software to recognize that the quota has been exceeded and performs the action defined for the service.
11-12
Metered Services
To create a service offering as a metered service, perform the following steps: 1. Create a service offering; see the Create Service Offerings section on page 9-1. 2. On the service definition navigator, double-click to select the Time/Volume Variation check box and then double-click the Metered Variation option. 3. Optional. Click to select the Time Quota check box and type the amount of time the subscriber can actively use the service, using one of the following formats: ddd [hh:mm[:ss]] where ddd is a number of days from 0 to 365 and hh:mm:ss is an amount of time from 0:00:00 to 23:59:59 hh:mm[:ss]
4. Optional. Click to select the Incoming Traffic Quota check box and type the number of kilobytes the subscriber can receive. The maximum quota is 2,147,483,647. 5. Optional. Click to select the Outgoing Traffic Quota check box and type the number of kilobytes the subscriber can send. The maximum quota is 2,147,483,647. You can update or top off the time quota, and incoming and outgoing traffic quotas for a particular service subscription through the NetOp PM API. As a result, the applied quotas for a subscriber session may not be the same as the predefined quotas. The applied values in effect for a specific service subscription are displayed on the Subscribed Services tab of the Subscriber Account panel; see the View Current Subscribed Services section on page 16-6. For more information on quota updates and top-ups, see Chapter 7, Service Subscription Attribute Overrides, and Chapter 6, Define Services Using the NetOp PM API of the NetOp Policy Manager API Guide. 6. Click the When Quota Exceeded field and select the action that the NetOp PM system should perform when the subscribers quota is exceeded. You can choose from the following options: Expire Subscription (this is the default) Deactivate Subscription Replace Variation Do Nothing
For descriptions of these options, see the Metered Variation Field Descriptions section on page 4-5 in the NetOp Policy Manager Reference. You can specify only one action if both time and volume quotas are defined. When either the time quota or volume quota is reached, the specified action is performed. Note For Access service offerings configured with a time or volume quota, you cannot configure the subscription to expire or deactivate. For services configured to reset (daily, weekly, monthly, or custom), you cannot configure the subscription to expire.
11-13
Metered Services
Note
If you select Replace Variation, you must define at least one variation to apply to the subscriber session when the quota is exceeded; for details, see the Create a Quota Exceeded Variation section on page 11-14.
7. Optional. Click to select the Reset Occurs check box and select the frequency with which the quota gets reset. If you set the Reset Occurs field to Custom, the administrator should use the reset APIs provided with the NetOp PM software to control the frequency of the reset. If you set the Reset Occurs field to None, Daily, Weekly, or Monthly, the reset scripts cannot be used to control the frequency of the reset. For more information, see the section on resetting time and volume quotas for recurring services in the NetOp Administration Guide. By default, the quota top-up remains in effect for the remainder of the current quota period (day, week, or month). For more information on quota top-up, see Chapter 7, Service Subscription Attribute Overrides, in the NetOp Policy Manager API Guide. 8. Optional. Click to select the Reset Time check box and enter the date and time at which the service subscription will be reset. 9. If all other required information has been defined for the service offering, click OK to create the service offering and close the window, or click Apply to apply changes to an existing service. Note If the value in the Max. Sessions field for the service offering is greater than one, each session receives the same quota; that is, if the subscriber sessions are long-lived, the effective quota for the subscriber could be multiplied by the maximum number of sessions.
Note
Time and volume metering continues until the subscriber logs off, or until the subscriber shuts down the session. In the case of an implicit logon service, the subscriber must explicitly log off, or until the subscriber shuts down the session; in the case of an explicit logon service, there is no issue because the NetOp PM system automatically logs off the subscriber. For subscribers who are logged on and have been assigned to a captive portal, for example, quota exceeded notification, time and volume quotas are consumed.
For detailed field descriptions, see Table 4-4 on page 4-4 in the NetOp Policy Manager Reference, which describes the valid absolute and relative time specifications and their formats supported for each time- and volume-related field.
11-14
Metered Services
4. Click to select the relevant variation name check boxes and browse to the name of an existing service attribute variation. For instructions, see the Create Service Attribute Variations section on page 10-1. If the When Quota Exceeded field for the metered variation is set to Replace Variation, you must specify at least one of the fields on the Quota Exceeded Variation panel. By default, you have two options for the IP Redirect variation: Quota Exceeded RedirectSends subscribers to the Quota Exceeded redirect page, which instructs them to contact their service provider. Top Up RedirectSends subscribers who have exceeded their quota to the Usage web page, where they can open the Top Up redirect page to purchase more time or volume.
By default, you have several options for Bandwidth, such as: 128 Kbps bandwidth 512 Kbps bandwidth 1 Mbps bandwidth
When a replacement variation is applied, attributes from the original service offering are permanently removed from the subscriber session and only the attributes specified by the Quota Exceeded Variation are applied. If no replacement is specified for the Dynamic IP Address Variation, the subscriber session may drop when the quota is exceeded. If you reference a particular variation in the main definition of the service offering and want the same variation to apply in the replacement variation, you must explicitly reference the variation again in the Quota Exceeded Variation definition. Note For Access service offerings configured with a time or volume quota, you cannot set the When Quota Exceeded field to Expire Subscription or Deactivate Subscription.
5. If all other required information has been defined for the service offering, click OK to create the service offering and close the window, or click Apply to apply changes to an existing service.
11-15
Metered Services
Redirect to a captive portal where they cannot use the Internet until the beginning of the next month For further information on configuring your system for this feature, see the HTTP Redirect Profiles section on page 3-27.
The NetOp PM software includes a sample monthly recurring Tiered Volume Quota service bundle which provides the subscriber with 1 GB at Gold bandwidth (1 Mbps), 1 GB at Silver bandwidth (512 kbps), and Top Up Redirect when the quota is exceeded. The sample service bundle requires two bandwidth service offerings: Tiered MonthlyFirst 1GB Gold provides the first tier of the service bundle. Tiered MonthlyNext 1GB Silver provides the second tier of the service bundle and the quota exceeded action for the service bundle. Note A Tiered Quota service requires that all service subscriptions in the service bundle be assigned to a subscriber account.
11-16
Chapter 12
Prepaid services ensure revenue by verifying that the subscribers account balance is not zero and can cover the requested service before initiating the service. When the balance in the subscribers account is exhausted or expired, the subscriber is redirected to a captive portal to purchase additional quota or take another action. The NetOp PM system can support prepaid scenarios in a stand-alone deployment scenario using NetOp PMs service manager, or in an integrated deployment scenario, coordinating with an external credit-control server. The NetOp PM system interacts with a credit-control server through the Diameter Ro interface and uses the Diameter Credit Control Application (DCCA) to provide real-time credit control, or online charging. This chapter describes online charging. Note You must purchase a license for NetOp PM Credit Control to use the Diameter Credit-Control Application (DCCA) to provide credit authorization for prepaid users.
The NetOp PM system supports real-time credit-control based on IETF RFC 4006: Diameter Credit-Control Application. For details on compliance to the RFC 4006 and 3GPP TS 32.299 technical specifications, see the Statement of Compliance, Ro Interface for the NetOp PM system.
Figure 12-1 Typical Architecture for Online Charging in an Integrated Deployment
The NetOp PM system acts as the credit-control client in interactions with the credit-control server. Deployed on the NetOp PM application server, the credit-control client manages the quota provided by the credit-control server and uses RADIUS CoA to reauthenticate the subscriber session on the node. The client communicates with the server using the Diameter protocol Credit-Control-Request (CCR) messages; responses from the server are sent in Credit-Control-Answer (CCA) messages.
12-1
Figure 12-2
When real-time credit control is required, the NetOp PM system acts as the credit-control client and contacts the credit-control server with information about the requested service. The credit-control process determines potential charges and verifies whether the subscribers account balance covers the cost of the requested service. The server grants credit resources in the form of units (for example, data volume or time), and the units are metered by the client. The NetOp PM system supports time metering only; any other units returned (volume, currency, and so on) are ignored. The NetOp PM implementation of online charging supports credit authorization with Session Charging with Unit Reservation (SCUR) as defined in RFC 4006. SCUR is session-based and requires multiple interrogations between the credit-control client and the credit-control server: Initial interrogation to reserve units before initiating the service. Terminate interrogation to report the units used when the service terminates. (Optional) Intermediate update interrogations to report units used, and to reserve additional units if required.
Figure 12-3 illustrates the component interactions when a prepaid subscriber requests a time-based service:
Figure 12-3 Component Interactions During Credit-Control Service Initiation
Figure 12-4 illustrates the component interactions when an intermediate balance update is requested for a time-based service:
12-2
Figure 12-4
Figure 12-5 illustrates the component interactions when the prepaid subscriber terminates the time-based service; for example, by logging off:
Figure 12-5 Component Interactions During Subscriber-Initiated Service Termination
Figure 12-6 illustrates the component interactions when the NetOp PM system detects that the prepaid subscribers time-based quota is exceeded, and the quota-exceeded action is to terminate the session:
12-3
Figure 12-6
Figure 12-7 illustrates the component interactions when the node terminates the session:
Figure 12-7 Component Interactions During Service Termination From Node
12-4
4. Configure the NetOp PM credit-control client to communicate with the Diameter credit-control server; see the Configure Communication with the Credit-Control Server section on page 12-6.
12-5
For example, the following XML document configures a Diameter peer type that includes the Diameter AVP Service-Identifier in the initial interrogation:
12-6
12-7
2. Create service attribute variations; see the Override RADIUS Attributes with Diameter Attributes section on page 12-10. 3. Create the service offering; see the Configure a Prepaid Service Offering section on page 12-12.
Credit-Control Variations
An access service offering with credit control references a credit-control variation. The credit-control variation defines Diameter attribute values that are sent in a CCR to the credit-control server. Figure 12-8 illustrates the relationship between an access service offering, credit-control variation, and service attribute variations.
Figure 12-8 Credit-Control Variation Referenced by Access Service Offering
Diameter attribute values can only be defined in the credit-control variation if the Diameter peer type definition indicates that an AVP is configured in the credit-control variation (configuredIn=Variation):
Figure 12-9 Credit-Control Variation Defines Values for Attributes Configured in Diameter Peer Type as configuredIn=Variation
12-8
When a subscriber adds a prepaid service (or an update or terminate interrogation is initiated), the credit-control client sends a CCR to the credit-control server, including any Diameter AVPs specific to the subscriber service. The values sent to the credit-control server are based on the attribute values defined by the NetOp PM system, and in the referenced credit-control variation. A credit-control variation can apply to multiple Diameter peer types and can define multiple interrogations. Different credit-control variations can be defined for different realms. If the Diameter peer type definition indicates that an AVP is configured in the credit-control variation (configuredIn=Variation), the variation can specify the values of Diameter attributes for each interrogation defined in the Diameter peer type; different values can be configured for different realms by creating realm-specific variations. If no value is specified in the credit-control variation, the default value configured for the attribute is sent to the credit-control server.
Note
12-9
2. Pass the XML document to the addDiameterRequestVariationXML method. The following example shows an XML document used to inject a credit-control variation named 1 Day Prepaid Credit using the NetOp PM API:
12-10
Figure 12-10
To override RADIUS attributes with Diameter attributes in the CoA packet sent to the node, in the NetOp client: 1. Create or modify a service attribute variation. 2. Activate one or more Diameter peer type instances under a node type or encapsulation type instance. 3. Specify static override values for RADIUS attributes in the Diameter Attributes section, or write Java code to dynamically generate values. Static override values do not require any special formatting. Dynamic override values should be written as Java code and must conform to correct Java syntax, enclosed in braces {}, and return a String value. {return (String) context.get(Diameter-Attribute);} where Diameter-Attribute is the name of an attribute received in the CCA. For example, enter the following code in the RB-HTTP-Redirect-URL field to override the RB-HTTP-Redirect-URL RADIUS attribute with the Redirect-Server-Address Diameter attribute:
{ return (String) context.get(Redirect-Server-Address);}
12-11
12-12
The following example shows credit-control variation attributes in an XML document used to inject a credit-control service offering:
12-13
12-14
Chapter 13
To configure the NetOp PM admission control function , you must first install the license key; for information on installing NetOp PM licenses, see Chapter 7, Install NetOp PM Software Licenses in the NetOp Policy Manager Installation Guide. Before operating the NetOp PM system and activating a service requiring a guaranteed bandwidth reservation, the resource_config table in the NetOp PM database must be configured. This is done by both manual and automatic prepopulation. See the Populate the resource_config Table section on page 13-2 for instructions on manual population. The resource_config table is prepopulated with default filtering examples. Use the default filtering examples to manually define filters you want the resource_config table to use for information on maximum bandwidth, background bandwidth, and usage at the residential gateway level and the access node level. Reference the PWFQ policy information when defining the templates in the resource_config table. For sessions terminating on ATM, or terminating on Fast Ethernet (FE) cards where PWFQ is not supported, reference the metering and policing policies to derive the values for templates. The first time a service requiring a bandwidth reservation is requested for a card, the admission control function feature learns the capacity of the card and all its ports from the network, and automatically creates a resource defaults template (see Resource Defaults Template on page 6-4) for each port-level congestion point. The ports inherit the background and utilization characteristics from any template that is less specific and that uses wildcards. This function is achieved through an SNMP interface. Note To support the admission control function feature, the SmartEdge OS provides hierarchical QoS. It is important to configure the node hierarchical QoS policies to model the subscriber access network. The bandwidth minimums and maximums in the hierarchy should be used as the basis for populating the resource defaults template. For information on configuring QoS policies, see the QoS Policies section on page 3-31.
Note
Do not manually populate the port level capacity information in the resource_config table, and do not manually populate the congestion_point table, as it is done dynamically by the NetOp PM system.
When the admission control function adds a new congestion point to the congestion_point table, it scans the resource_config table for a match. The admission control function also applies node auditing to periodically assess node capacity at the port level. This allows the NetOp PM system to update port template information thereby ensuring that node capacity information is always up to date. By default, a node audit takes place every four hours. You can change the four-hour default setting in the npm.cfg file located in the /usr/local/apache-tomcat-n.n.n/webapps/NPM_API-x.x.x.x/WEB-INF/classes/ directory.
13-1
4. In the in_background column, specify the inbound background bandwidth as a percentage (%). The default value is 0. 5. In the out_background column, specify the inbound background bandwidth as a percentage (%). The default value is 0. 6. In the in_utilization column, specify the inbound usage factor as a percentage (%). The default value is 100. Values greater than 100 represent oversubscription. 7. In the out_utilization column, specify the outbound usage factor as a percentage (%). The default value is 100. Values greater than 100 represent oversubscription. Note Manually changing the capacity, utilization, and background bandwidth resource attributes does not affect existing congestion points. New attributes only apply to new congestion points created due to a bandwidth reservation request. If you want an attribute change to apply to an existing congestion point, modify the existing congestion point derived from the resource_config item.
For information on defining the admission control function services, see the Bandwidth Service Offerings section on page 3-28 in the NetOp Policy Manager Reference.
13-2
Chapter 14
EAP authentication must be configured to use mobile IP. You must also install the required additional RADIUS attributes and support for third-party devices, such as external RADIUS servers.
14-1
Enable the NetOp PM system to communicate with and support the third-party device. For more information on this topic, see Chapter 5, Configure External RADIUS and LDAP Servers.
14-2
To locally authenticate realm-specific EAP requests, create a record in the proxy_config table for the realm eap_realmname (where realmname is the username realm) and set the proxy_login_access_request field value to N. If the eap_realmname realm is not specifically defined in the proxy-config table, the eap_default realm defines how to handle the EAP request. Note Service providers can configure EAP authentication with a single layer of security using the MSCHAPv2, EAP-MD5, or EAP transport layer security (TLS) protocols. EAP tunneled transport layer security (TTLS) lets you add a second layer of security when locally authenticating EAP-MSCHAPv2, MSCHAPv2, and EAP-MD5 protocols.
14-3
3. Create a record for each EAP-aware RADIUS server in the radius_proxy_server table for the eap_default realm. For more information, see the Configure RADIUS Servers External to the NetOp PM System section on page 5-2. 4. Optional. Create a record in the radius_proxy_attributes table for the eap_default realm. For more information, see the Configure RADIUS Attributes to Flow Through the NetOp PM System section on page 5-7. This can also be done when you are enabling forwarding to an external RADIUS server. Note The NetOp PM system does not support forwarding EAP requests using the round-robin algorithm.
14-4
For more information about the NetOp PM RADIUS server certificates, see the /usr/local/Radiator-4.3.1/certificates/README file. Note When configuring EAP TLS authentication, the subscriber account name must match the subscriber certificate user name. For information on adding a subscriber account to the NetOp PM system, see the Add Subscriber Accounts to the NetOp PM System section on page 16-7.
14-5
4. Optional. Create a record in the radius_proxy_attributes table for the eap_default realm. For more information see the Configure RADIUS Attributes to Flow Through the NetOp PM System section on page 5-7. This can also be done when you are enabling forwarding to an external RADIUS server. Note The NetOp PM system does not support forwarding EAP requests using the round-robin algorithm.
Locally Authenticate Outer EAP TTLS Requests and Forward Inner EAP Requests
To locally authenticate outer TTLS requests and forward inner EAP requests to external EAP-aware RADIUS servers, perform the following steps: 1. Configure the wireless AP to send EAP TTLS requests with usernames such as anonymous or anonymous@realm. 2. Create a record in the proxy_config table for the eap_default realm and set the proxy_login_access_request field value to N for the outer TTLS authentication requests. For more information, see the Forward RADIUS Authentication Requests section on page 5-3. 3. Create a record in the proxy_config table for the default realm and set the proxy_login_access_request field value to Y for the inner EAP authentication requests. For more information, see the Forward RADIUS Authentication Requests section on page 5-3. 4. Create one record for each external RADIUS server in the radius_proxy_server table for the default realm for the inner EAP authentication requests. For more information, see the Configure RADIUS Servers External to the NetOp PM System section on page 5-2.
14-6
5. Optional. Create a record in the radius_proxy_attributes table for the default realm. For more information, see the Configure RADIUS Attributes to Flow Through the NetOp PM System section on page 5-7. This can also be done when you are enabling the NetOp PM system to forward requests to an external RADIUS server. Note The NetOp PM system does not support forwarding inner EAP authentication requests to external RADIUS servers using the round-robin algorithm.
EAP-MD5 Authentication
EAP-MD5 performs local authentication or forward authentication requests to external RADIUS servers.
14-7
Authentication takes place whether subscribers access their service subscriptions from a fixed address, such as their home computer (Simple IP), or use wireless access to connect from a location other than their home location (Mobile IP), such as a PC, PDA, or phone.
Figure 14-1 NetOp PM WiMAX Home Agent-Based Authentication
Simple IP
Using Simple IPalso known as Fixed Mobile IPa wireless device must obtain a new IP address and lose its existing connections every time it changes its point of attachment. Deploy this NetOp PM solution with EAP authentication and SER DHCP CLIPS authorization.
14-8
Simple IP
Simple IP provides EAP authentication and authorizes a DHCP CLIPS subscriber session., which is fixed to one base station in a service provider network. Simple IP also provides support for both WiFi and WiMAX. For information on how subscribers are authenticated and granted Internet access, see Appendix B, Subscriber Session Processes in the NetOp Policy Manager Product Overview. For more information about deploying Simple IP, see the Deploy a NetOp PM System for Simple IP section on page 14-9.
You can either terminate subscribers logging on from a wireless AP or forward EAP requests to an external EAP-capable RADIUS server. The legacy component, NetOp PM EAP proxy server, is no longer distributed. This functionality is incorporated into the new NetOp PM RADIUS server. For information on configuring the NetOp PM RADIUS servers to support wireless authentication, see the Configure Support for EAP Authentication section on page 14-2. To forward EAP requests to external EAP-aware RADIUS servers, see Chapter 5, Configure External RADIUS and LDAP Servers. Service providers can install, configure, and define services that deliver Simple IP service to their subscribers by following the steps in the order they are shown in Table 14-1. All references are to sections in this guide, unless otherwise noted.
Table 14-1
Task Install NetOP PM for Simple IP
14-9
Mobile IP
Table 14-1
Task
Verify the following for a typical SER configuration enabling Simple IP services: Required SmartEdge node configuration Sample node configurations If not set up already, configure the SmartEdge router and NetOP PM hosts to run NTP client. Enable EAP authentication for Simple IP services.
Chapter 3, Configure the Node for the NetOp PM System Appendix 1, Sample Configurations,
Chapter 14, NetOp PM EAP Authentication Overview Chapter 14, Configure RADIUS Attributes for ASN Gateways Note: See also the NetOp Policy Manager Product Overview.
Determine what services you want to offer for the Simple IP deployment. Configure the ASNGW-EAP variation for each service attribute variation referenced by those services. Configure the SER-CLIPS variation for each service attribute referenced by those services.
Authenticating mobile subscribers for Simple IP is based on individual carriers business rules. Consult your local Redback technical support team for further assistance if required.
Mobile IP
Mobile IP allows mobile nodes (MNs) to maintain their existing IP sessions regardless of the location from which they attempt to connect. You can enable the NetOp client to support configurations for Mobile IP circuit types and EAP authentication types. Mobile IP services enable subscribers with MNs to roam across multiple networks without having to reconnect their sessions. This roaming is done by allowing a mobile node (MN) to retain its IP address and thereby maintain its existing IP session.
14-10
Mobile IP
You can install, configure, and define services that deliver Mobile IP with static keys service to subscribers by following the steps in the order they are shown in Table 14-2. All references are to sections in this guide, unless otherwise noted.
Table 14-2
Task Install NetOP PM for Mobile IP with static keys
Steps to Set Up your NetOp PM System to Provide Services for Mobile IP with Static Keys
What do you need to know? Determine what type of system you require, including the following: Required hardware Required software Verify you are set up to use NTP client service on Solaris 10. If not set up already, configure the SmartEdge router and NetOP PM hosts to run NTP client. Configure NTP on page 1-4 Information can be found here NetOp Policy Manager Installation Guide
14-11
Mobile IP
Table 14-2
Task
Steps to Set Up your NetOp PM System to Provide Services for Mobile IP with Static Keys
What do you need to know? You need these licenses: Third-party device types require the NetOp PM Multi-Vendor Support license. EAP requires the NetOp PM EAP Support license. If you are installing the NetOp PM system for the first time, do the following: Review the RADIUS dictionary file and add any required additional RADIUS attributes to it. Add the ASNGW and SmartEdge Home Agent nodes being used in the Mobile IP deployment to the NetOp PM system. If you are upgrading the NetOp PM system, do the following: Stop the RADIUS and API servers. Migrate your dictionary customizations to the new dictionary. Start the RADIUS and API servers. Chapter 4, Configure RADIUS. Chapter 2, Configure the NetOp PM API Servers.. Chapter 4, Configure RADIUS. Chapter 2, Configure the NetOp PM API Servers. Configure RADIUS Attributes for ASN Gateways on page 14-16. Verify or Add Additional RADIUS Attributes to the dictionary_redback.cfg File on page 7-3. Information can be found here NetOp Policy Manager Installation Guide
Verify the following for a typical SmartEdge router configuration enabling Mobile IP with static keys services: Required SmartEdge node configuration Sample node configurations Typical HA and FA SER configuration files Enable EAP authentication for Mobile IP with static keys.
Chapter 14, NetOp PM EAP Authentication Overview Chapter 14, Configure RADIUS Attributes for ASN Gateways
Do the following: Inject the appropriate sampleMobileIP3GPP2StaticKeyRadius Attributes.xml or sampleMobileIPWiMAXStaticKeyRadius Attributes.xml sample XML file from the /usr/local/npm/soap_client/perl/ directory. Configure the static keys in the appropriate Dynamic IP Address service attribute variations. Change of Authentication (CoA) for mobile subscribers; SER command.
CoA on page 3-9 Chapter 14, Configure RADIUS Attributes for ASN Gateways Note: See also the NetOp Policy Manager Product Overview.
Determine what services you want to offer for the Mobile IP deployment. Configure the ASNGW-EAP variation for each service attribute variation referenced by those services. Configure the SER-MOBILE_IP variation for each service attribute referenced by those services.
14-12
Mobile IP
Deploy the NetOp PM System for Mobile IP with Dynamic Keys Authorization
Wireless authorization services allow you to offer subscribers access to uninterrupted service regardless from where subscribers establish their sessions. For example, a subscriber may establish service from a home-based PC and, without losing connection, move through the day with the same established circuit. Mobile IP with dynamic WiMAX keys service provides the most secure method of Mobile IP and it supports the WiMAX forum for WiMAX third-party devices. A Mobile IP session can move between Foreign Agents (FAs) within a single access network or across multiple access networks. The NetOp PM system supports dynamic WiMAX keys for Home Agent (HA), EAP TLS, EAP TTLS, EAP-MSCHAPv2, and EAP-MD5. The NetOp PM system generates the following WiMAX forum RADIUS attributes: WiMAX-FA-RK-Key WiMAX-FA-RK-SPI WiMAX-HA-RK-Key WiMAX-HA-RK-SPI WiMAX-MN-HA-MIP4-Key WiMAX-MN-HA-MIP4-SPI
These keys and their security parameter indexes (SPIs) are dynamically generated during network access authentication and are returned to the HA during Mobile IP registration on request through a matching SPI. The default HA-RK lifetime for all HA-RK keys is 24 hours. Note The NetOp PM system does not support the user of both static WiMAX keys and dynamic WiMAX keys in the same deployment.
For information on WiMAX Forum NWG Release 1.1.2 specifications, visit the WiMAX Forum web site at http://www.wimaxforum.org/home/. Service providers can install, configure, and define services that deliver Mobile IP service to their subscribers by following the steps in the order they are shown in Table 14-3. All references are to sections in this guide, unless otherwise noted. Be aware that deploying a service for Mobile IP with dynamic keys means that static keys are not defined in the service attribute variations.
14-13
Mobile IP
Table 14-3
Steps to Set Up your NetOp PM System to Provide Services for Mobile IP with Dynamic Keys
What do you need to know? Determine what type of system you require, including the following: Required hardware Required software Verify you are set up to use NTP client service on Solaris 10. You need these licenses: Third-party device types require the NetOp PM Multi-Vendor Support license. EAP requires the NetOp PM EAP Support license. If you are installing the NetOp PM system for the first time, do the following: Review the RADIUS dictionary file and add any required additional RADIUS attributes to it. Add the ASNGW and SmartEdge Home Agent nodes being used in the Mobile IP deployment to the NetOp PM system. If you are upgrading the NetOp PM system, do the following: Stop the RADIUS and API servers. Migrate your dictionary customizations to the new dictionary. Start the RADIUS and API Servers. Chapter 4, Configure RADIUS. Chapter 2, Configure the NetOp PM API Servers. Chapter 4, Configure RADIUS. Chapter 2, Configure the NetOp PM API Servers. Chapter 14, Configure RADIUS Attributes for ASN Gateways Verify or Add Additional RADIUS Attributes to the dictionary_redback.cfg File on page 7-3 Configure NTP on page 1-4 NetOp Policy Manager Installation Guide Information can be found here NetOp Policy Manager Installation Guide
Verify the following for a typical SER configuration enabling Mobile IP services: Required SmartEdge node configuration Sample node configurations If not set up already, configure the SmartEdge router and NetOP PM hosts to run NTP client. Enable EAP authentication for Mobile IP services.
Required SmartEdge node configuration and sample node configurations for Mobile IP services. Typical HA, FA, and MN-HA SER configuration files. Change of Authentication (CoA) for mobile subscribers; SER command. Configure SER for CoA, LI, Hotline, and HA.
CoA on page 3-9 Note: For HA, see the Configuring Hotlining for a Home Agent document in the SmartEdge OS Library.
14-14
Configuration Tasks
Table 14-3
Steps to Set Up your NetOp PM System to Provide Services for Mobile IP with Dynamic Keys (continued)
What do you need to know? Configure DNS. Information can be found here Chapter 4, Configure RADIUS. Note: See also the Configuring DNS document in the SmartEdge OS Library.
Task
Determine what services you want to offer for the Mobile IP deployment. Configure the ASNGW-EAP variation for each service attribute variation referenced by those services. Configure the SER-MOBILE_IP variation for each service attribute referenced by those services.
Configuration Tasks
Mobile IP services require that you configure your NetOp PM system for EAP authentication. This configuration enables the NetOp PM system to recognize third-party devices (NAS types) that support EAP circuit types. After you have configured EAP authentication, you can enable Mobile IP services. Service providers can craft Mobile IP with static keys services and configure the NetOp PM system to support Mobile IP services for home agents (HA) configured on the SmartEdge router or third-party devices. To configure EAP authentication for Mobile IP services, perform the following steps: 1. Install the EAP Support and the Third-party Vendor Support licenses. 2. Configure the NetOp PM RADIUS server to support EAP authentication 3. Configure EAP authentication to return additional RADIUS attributes. For instructions on how to configure EAP authentication to return additional RADIUS attributes, see the Configure Support for Mobile IP Third-Party Device Types section on page 14-24. 4. Configure the HA on the SmartEdge router or third-party device. For detailed instructions on how to configure an HA on a SmartEdge router, see the Configuring Mobile IP for a Home Agent document in the SmartEdge OS Library. 5. Using the NetOp client, define an ASNGW-EAP and a SER-MOBILE_IP service attribute variation for the Dynamic IP Address service attribute by performing the following steps: a. Navigate to the Service Attribute Variation Properties panel and select the Dynamic IP Address Variation folder. The Dynamic IP Address Variation summary is displayed. b. Select Dynamic IP Address in Context BASIC from the summary and then select the ASNGW-EAP and then the SER-MOBILE_IP from the list of variations that appear. c. Enter the appropriate attribute values for the ASNGW-EAP and SER-MOBILE_IP service attribute variations.
14-15
d. Click Apply to save your changes. For detailed instructions on how to define service attribute variations, see the Create Service Attribute Variations section on page 10-1. The following SAV types are supported by the SER-MOBILE_IP circuit type: Dynamic IP Address IP Redirect Lawful Intercept
In the NetOp client, the ASNGW-EAP variation is associated with the Bandwidth, Custom, and Dynamic IP Address service attribute variations. To configure WiMAX Forum-compliant RADIUS attributes for ASN gateways that support EAP authentication for Mobile IP, perform the following steps: 1. Install the NetOp PM EAP Support and NetOp PM Third-party Vendor Support licences. For information on installing NetOp PM licenses, see Chapter 7, Install NetOp PM Software Licenses in the NetOp Policy Manager Installation Guide. 2. Add NWG-compliant additional RADIUS attributes to the NetOp PM system by using the ConfigRADIUSAttribute.addRADIUSAttributeXML.pl script. For detailed information on how to add additional RADIUS attributes, see Chapter 7, Configure Additional RADIUS Attributes.
14-16
Note
If you have existing non-WiMAX-NWG compliant ASN gateways that you want to upgrade to be WiMAX-NWG compliant, you must add the ASNGW NAS type and the EAP circuit type to each existing additional RADIUS attribute; for example:
<NASType> <Name>ASNGW</Name> <CircuitTypes> <CircuitType>EAP</CircuitType> </CircuitTypes> </NASType>
3. Activate the ASNGW-EAP variation in the NetOp client: a. Navigate to the Service Attribute Variation Properties panel and select the Dynamic IP Address Variation folder. The Dynamic IP Address Variation summary is displayed. b. Select the Dynamic IP Address variation that you want to configure for ASN gateway with EAP authentication. The list of options associated with the Dynamic IP Address variations are displayed in the navigator. c. Right-click on the grayed ASNGW-EAP variation check box and select Activate. d. The ASN gateway RADIUS attributes are displayed in the management view panel. Figure 14-2 shows the ASNGW-EAP variation with its Filtering and RADIUS attributes:
Figure 14-2 Configuring Support for ASN Gateway RADIUS Attributes
14-17
4. Enter the values for the RADIUS, additional RADIUS, and filtering attributes. For descriptions and valid values of the supported RADIUS attributes and filtering attributes, see Chapter 1, Filtering Attribute and RADIUS Attribute Descriptions in the NetOp Policy Manager Reference. 5. Use the NASMgmt.addNASXML API method to add each WiMAX-NWG compliant ASN gateway you want to deploy on the network. For more information on adding a NAS type, see the Add, View, Remove, and Update Node Information in the NetOp PM System section on page 1-11. Note If you have pre-existing nodes that are NWG-compliant ASN gateways, update the NAS type for these nodes to ASNGW by using the ConfigNASType.updateNASTypeXML API method.
The NetOp PM services are configured for use with an ASN gateway.
Home Agent
A SmartEdge router or third-party device can act as a Mobile IP home agent (HA); see Figure 14-1. The HA is the anchor component in a Mobile IP network that provides seamless mobility to the mobile node (MN). When an MN is attached to its home network, it does not use Mobile IP services because it communicates directly using normal IP routing. When an MN is roaming and is not connected to its home network, its HA authenticates the MN through the NetOp PM system and verifies that the IP Mobile services should be provided. Mobile IP services enable the SmartEdge router to act as one or more HA instances. Each instance communicates with its MNs. When an MN moves outside the network for the HA, it connects to the HA through a foreign agent (FA), which then communicates with the HA. In a typical deployment, MNs connect wirelessly to base transceiver stations (BTSs), which connect to the SmartEdge router FA through Ethernet. The EAP access point can be at the BTS or the access point controller.
14-18
Configure the NetOp PM System and the ASN Gateway to Authenticate Subscribers with WiMAX Outer Identity
Configure the NetOp PM system and the ASN gateway to authenticate a subscriber using WiMAX outer identity. Configure the ASN gateway to send WiMAX capability in the EAP access-request and provision the WiMAX-HA-IP VSA to send WiMAX attributes in the EAP access-accept. Provisioning these attributes determines whether the subscriber session is mobile IP or simple IP. Table 14-4 shows the outcomes of an EAP access-accept, depending on which attributes are configured and if WiMAX capability is present in the EAP access-request sent by the ASN gateway.
Table 14-4 WiMAX Access-Accept Sent by Configuring Attributes
WiMAX-HA-IP VSA Configured Yes No Yes No WiMAX Attributes sent in Access-Accept No No Yes No Type of Subscriber Session Simple IP Simple IP Mobile IP Simple IP
WiMAX Capability sent by ASN Gateway Not Present Not Present Present Present
Note
To authenticate WiMAX outer identity for EAP access-requests without WiMAX capability, contact your customer support representative.
14-19
3. Create a record for each EAP-aware RADIUS server in the radius_proxy_server table for eap_realm.
14-20
The sample service offering Account Registration Login, which is an IP Redirect service type, has been created (see Hotline Mobile IP Subscribers at Session Startup on page 14-22 for instructions) and added to the subscriber along with the appropriate Access service offering (see Create an Access Service Offering on page 9-4 for instructions). Note To hotline subscribers, you need to configure Mobile IP with Dynamic keys plus ASNGW-EAP. For more information, see the Mobile IP with Dynamic Keys Authorization section on page 14-13.
The hotline redirect profile mobile-account-registration-redirect, which is used by the Account Registration Login service offering, has been configured on the SmartEdge Home Agent with an http redirect URL defined as http://10.192.100.238/NPM-6.n.n.n/newaccount.htm. With this set up, when new Mobile IP subscribers log in, they are redirected to the newaccount.htm web page where they enter or obtain their permanent username and password. Service providers need to bring the subscribers out of the redirect page by stopping the hotline redirect service. One way to achieve this is to issue the addSubscriberAccount() API method to add the new subscriber account with the permanent username and password for the default service, followed by logOffSubSession() API method. The subscriber would now have to reconnect with the permanent username and password.
14-21
In the middle pane, under IP Redirect Variation, the SER-MOBILE-IP circuit is checked.
14-22
5. Define the inline IP Redirect service attribute variation type by clicking the Defined Variation option under the IPRedirect Variation service attribute variation. In this sample service offering, the SER-MOBILE-IP circuit has been defined inline. For a list of valid attributes for defining an IP Redirect service attribute variation for SmartEdge routers, see Table 2-3 on page 2-4 in the NetOp Policy Manager Reference. For further information, see Define a service attribute variation inline on page 9-4. 6. Double-click the SER-MOBILE-IP circuit to see the filtering attributes and radius attributes for the SER-MOBILE-IP circuit. The following figure shows the defined inline service attribute variation sample that comes with the NetOp PM system:
7. In the Filtering Attributes pane at the far right of the panel, set the software version field to the same version number as the SmartEdge OS running on the SmartEdge router; that is, if this field is set to ALL you may not get the results you intended. 8. In the Filtering Attributes pane, set the WiMAX -Protocol-Version field to 1.0. 9. In the RADIUS Attributes pane, enter the WiMAX-Hotline-Profile-ID RADIUS attribute that matches the RADIUS service profile name configured on the SmartEdge router. In the sample Account Registration Login service offering, it is defined as mobile_account_registration_redirect. 10. When you have set the SER-MOBILE-IP circuit to your satisfaction, click the Apply button.
14-23
Service providers need to bring the subscribers out of the redirect page by stopping a hotline redirect service. One way to achieve this is to issue the addSubscriberAccount() API method to add the new subscriber account with the permanent username and password for the default service, followed by the logOffSubSession() API method. The subscriber would now have to reconnect with the permanent username and password.
For detailed instructions on how to configure third-party vendor support, see Chapter 8, Configuring NetOp PM Third-Party Vendor Support. 2. If required by the third-party device, use a SOAP client to configure an additional RADIUS attribute. The sampleMobileIP3GPP2StaticKeyRadiusAttributes.xml sample XML file located in the /usr/local/npm/soap_client/perl/ directory demonstrates the configuration of third-party vendor RADIUS attributes for an Mobile IP third-party device, which supports Mobile IP with static 3GPP keys. For detailed instructions on how to configure an additional RADIUS attribute, see the Configure Additional RADIUS Attributes section on page 7-1.
14-24
Chapter 15
The following browsers are supported for viewing the NetOp PM lightweight web portal: Microsoft Internet Explorer 6 or later Mozilla Firefox 2.0 or later Note To install and configure the NetOp PM lightweight web portal for the first time, run the deploy_portal.sh script; see the Chapter 6, Install the NetOp PM Components in the NetOp Policy Manager Installation Guide. Thereafter use the config_portal.sh script.
For more information about the sample NetOp PM lightweight web portal provided with the NetOp PM software, how to customize it to fulfill your corporate requirements, and how to integrate the NetOp PM system with your corporate portal see the Customizing the NetOp PM Lightweight Web Portal section on page 15-7
2. Open a terminal window and navigate to the NetOp PM installation directory: cd /usr/local/npm 3. Run the config_portal.sh script: ./config_portal.sh Note For specific instructions on configuring the NetOp PM lightweight web portal to communicate with a secure NetOp PM API server, see the Configure the NetOp PM Lightweight Web Portal to Communicate with a Secure NetOp PM API Server section on page 15-4. For specific instructions on modifying the service model and the language displayed by the NetOp PM lightweight web portal, see the Change the Language Displayed by the NetOp PM Lightweight Web Portal section on page 15-5 and the Modify the Service Model Configuration section on page 15-6. For specific instructions on enabling web proxy support, see the Enable Web Proxy Support section on page 15-6.
4. If you modify any of the arguments in the following syntax constructs, you must stop and restart the Apache HTTP server for changes to take effect: -apache_user apache_server_username -apache_group apache_server_group See the Configure the NetOp PM Lightweight Web Portal to Communicate with a Secure NetOp PM API Server section on page 15-4. The full syntax for the config_portal.sh script is: config_portal.sh [-apache_group apache_server_group] [-apache_user apache_server_username] [-auto_start | -noauto_start] [-f] [-h] [-http_charset character_set] [-npmapi_host api_host] [-npmapi_passwd api_password] [-npmapi_ssl | -nonpmapi_ssl] [-npmapi_username api_username] [-service_model {RETAIL | WHOLESALE}] [-web_proxy web_proxy_server[,web_proxy_server2,web_proxy_server3...] | none] To install and configure the NetOp PM lightweight web portal for the first time, run the deploy_portal.sh script; see Table 8-4 in the Chapter 8, Configure, Deploy, and Start the NetOp PM Components in the NetOp Policy Manager Installation Guide. Thereafter use the config_portal.sh script. Table 15-1 describes the syntax and usage guidelines for the config_portal.sh and deploy_portal.sh scripts. For details on running the deploy_portal.sh script, see Chapter 6, Install the NetOp PM Components in the NetOp Policy Manager Installation Guide.
Table 15-1
Syntax -apache_groupapache_server_gro up -apache_userapache_server_usern ame
-auto_start
Optional. Activates the automatic shutdown and startup of the NetOp PM lightweight web portal when the web server host reboots. The default value is this keyword.
15-2
Table 15-1
Syntax -noauto_start -f -h -http_charset character_set
-npmapi_host api_host
Optional. NetOp PM API client password. Optional. Uses an SSL connection to connect to the NetOp PM API server. Optional. Does not use an SSL connection to connect to the NetOp PM API server. This is the default value. Optional. NetOp PM API client username. Optional. Assumes that the carrier attempting to provide services also owns the subscriber accounts. By default, the NetOp PM lightweight web portal is configured to run in the retail model. If you create a custom portal based on the NetOp PM lightweight web portal and you run the portal in the wholesale model, you must modify the service model for the portal to display the correct services to the subscriber.
-service_model WHOLESALE
Optional. Assumes that the carrier attempting to provide services does not own the subscriber accounts. By default, the NetOp PM lightweight web portal is configured to run in the retail model. If you create a custom portal based on the NetOp PM lightweight web portal and you run the portal in the wholesale model, you must modify the service model for the portal to display the correct services to the subscriber.
Optional. Comma-separated list of IP addresses of trusted web proxy servers. The default value is none. To specify additional web proxy servers, use the optional web_proxy_server2 and web_proxy_server3 arguments. Optional. Specifies that no web proxy servers are trusted.
15-3
Configure the NetOp PM Lightweight Web Portal to Communicate with a Secure NetOp PM API Server
Configure the NetOp PM Lightweight Web Portal to Communicate with a Secure NetOp PM API Server
To configure the NetOp PM lightweight web portal to communicate with a secure NetOp PM API server, perform the following steps: 1. Log on as root. 2. Open a terminal window and navigate to the NetOp PM installation directory: cd /usr/local/npm 3. Run the config_portal.sh script: ./config_portal.sh -npmapi_passwd api_password -npmapi_username api_username -npmapi_ssl Table 8-4 in the Deploy and Start the NetOp PM Lightweight Web Portal section on page 8-8 in the NetOp Policy Manager Installation Guide describes the syntax and usage guidelines for the config_portal.sh and deploy_portal.sh scripts and provides details on running the deploy_portal.sh script. The deploy_portal.sh script is used for the first installation; thereafter use the config_portal.sh script.
To start the NetOp PM lightweight web portal, perform the following steps: 1. Log onto the NetOp PM lightweight web portal host as root. 2. Open a terminal window and navigate to the NetOp PM lightweight web portal directory: cd /usr/local/npm/portal 3. Run the start_portal.sh script according to the following syntax: ./start_portal.sh [-h] If you include the optional -h keyword, the script prints usage information and exits. If you do not include it, the script starts the NetOp PM lightweight web portal and a message displays indicating that the startup is complete. Note By default, the config_portal.sh script configures the NetOp PM lightweight web portal to automatically restart if the Solaris host reboots. To modify this behavior, run the config_portal.sh script using the optional -auto_start or -noauto_start keyword; see the Configure the NetOp PM Lightweight Web Portal After Deployment section on page 15-1.
15-4
15-5
You must run the config_portal.sh script with the IP addresses of all trusted web proxy servers. To enable web proxy support, perform the following steps: 1. Log on as root. 2. Open a terminal window and navigate to the NetOp PM installation directory: cd /usr/local/npm
15-6
3. Run the config_portal.sh script according to the following syntax: ./config_portal.sh -web_proxy {web_proxy_server | none} where the web_proxy_server argument is a comma-separated list of IP addresses; for example: ./config_portal.sh -web_proxy 1.1.1.1,1.1.1.2 Note Use the none keyword to remove the configured web proxy servers; for example: ./config_portal.sh -web_proxy none For syntax descriptions and usage guidelines for this script, see Table 8-4 in the Deploy and Start the NetOp PM Lightweight Web Portal section on page 8-8 in the NetOp Policy Manager Installation Guide .
Before modifying the NetOp PM lightweight web portal, you should be familiar with the following standards: Extensible HTML (XHTML) Extensible Markup Language (XML) Extensible Stylesheet Language (XSL) Simple Object Access Protocol (SOAP) Hypertext Preprocessor (PHP) NetOp PM Application Programming Interface (API)
15-7
The Apache HTTP server runs the NetOp PM lightweight web portal and its PHP pages as shown in Figure 15-1.
Figure 15-1 Apache HTTP Server
This illustration represents the following operations: 1. The Apache HTTP server accepts data from the subscribers browser through HTTP. 2. The Apache HTTP server recognizes that the requested web page has been implemented using PHP. Depending on the page requested, the Apache HTTP server forwards the appropriate API request to the API server. 3. The PHP page processes the request using SOAP, and encapsulates any results to be returned, as an XML document. 4. The PHP page loads the appropriate XSL stylesheet and XML document. 5. The XML data and XSL stylesheets are transformed into HTML. 6. The resulting HTML is returned to the subscribers browser.
15-8
The following NetOp PM API server calls can be used to perform various high level portal functions: To determine if a subscriber account is already logged on:
AuthenticationIfc.subSessionIsLoggedOn(<ip Address>); // // If the IP address is logged on, get the subscriber account name // UserMgmtIfc.getSubAcctName(<ip Address>);
15-9
To modify the NetOp PM lightweight web portal before deployment, modify the XSL stylesheets in the /usr/local/lib/php/redback/NPM-releaseID/xsl/ directory and modify the graphics in the /usr/local/npm/portal/htdocs/NPM-releaseID/images/ directory. To modify the NetOp PM lightweight web portal after deployment, perform the following steps: 1. Back up the files you want to modify. 2. Modify the XSL stylesheets in the /usr/local/lib/php/redback/NPM-releaseID/xsl directory and the graphics in the /usr/local/apache2/htdocs/NPM-releaseID/images/ directory.
15-10
3. Stop and restart the NetOp PM lightweight web portal. For more details, see the Configure the NetOp PM Lightweight Web Portal to Communicate with a Secure NetOp PM API Server section on page 15-4. Note If you create a custom portal based on the NetOp PM lightweight web portal provided with the NetOp PM software, and you run the portal in the wholesale model, you must modify the service model configuration for the portal to display the correct services to the subscriber. For more information, see the Modify the Service Model Configuration section on page 15-6.
The sample XSL stylesheets contain XSL and XHTML tags that work with the provided XML documents to create XHTML pages. You can modify any of the XHTML tags, including specific images, table colors, font selections, background, text, and link colors. To ensure that your customized web portal functions as expected, follow these general guidelines when modifying the XSL stylesheets provided with the NetOp PM software: Do not modify the XSL, <select>, or <option> tags. XSL tags appear as <xsl:tag>. Figure 15-2 displays a portion of the services/bodyservices.xsl file that should not be modified.
Figure 15-2 Do Not Modify XSL Tags
Do not modify the order of the XSL tags. Do not modify the XHTML <input> and <img> tags described in the Do Not Modify These <input> and <img> Tags section on page 15-12. Note Links to images within the <input> and <img> tags can be replaced with custom images. You can modify size and border settings within tags. Certain images, such as help.jpg and login.jpg, provide links to various NetOp PM lightweight web portal pages. If you remove these images, you may remove access to these web pages.
15-11
Do not make modifications to the XSL stylesheets that would result in any invalid XHTML markup within the generated pages. Creating invalid XHTML markup generates inoperable web pages. For example, tags such as <hr>, <br>, and <img> are considered invalid XHTML, because they do not have end tags, such as <h1></h1> and <p></p>. In XHTML, you must use well-formed XHTML tags: <hr/>, <br/>, and <img.../>.
services/bodyservices.xsl:
<img src="images/add.jpg" name="addServicesButton" alt="[ >> ]" title="Add the highlighted services" onclick="javascript:addServices();" /> <img src="images/remove.jpg" name="removeServicesButton" alt="[ << ]" title="Remove the highlighted services" onclick="javascript:removeServices();" /> <input type="password" name="url_userpassword" onkeypress="javascript:enterPressed(event, this.form, this.form.selectedServices);" /> <input name="todo" type="hidden" value="Modify" /> <input name="modifyServicesValues" type="hidden" /> <input name="submit" type="image" src="images/modify.jpg" alt="[modify]" title="Change your service subscriptions to the services currently selected" onclick= "javascript:modifyServices(this.form,this.form.selectedServices);" border="0" />
wireless/bodywireless.xsl:
<input name="url_username" type="text" size="15" /> <input name="url_userpassword" type="password" size="15" />
15-12
<input type="hidden" value="loginSubmit" name="loginSubmit" /> <input name="todo" type="image" src="images/go.jpg" value="Login" width="22" height="17" border="0" />
top_up/bodytop_up.xsl
<input type="password" name="url_userpassword" /> <input name="todo" type="hidden" value="Topup" /> <input type="hidden" name="serviceId"> <input type="hidden" name="serviceName"> <input name="submit" type="image" src="images/go.jpg" alt="[Go]" title="Top up the service with selected value" border="0" />
Figure 15-3 displays one of the <input> tags that you should not modify.
Figure 15-3 Do Not Modify <input> Tags
15-13
common/header.xsl Figure 15-4 displays a portion of the XHTML code that controls the common/header.xsl page included in all web pages in the NetOp PM lightweight web portal. You can customize aspects such as the background image and color, the welcome image, and web page references. You can modify or replace the common/header.xsl file, but to provide the ability for subscribers to log off, ensure that the following link exists either in common/header.xsl or in one of the body XSL stylesheets (portal/bodyportal.xsl or services/bodyservices.xsl): portal.php?todo=Logout. To provide a link to the NetOp PM lightweight web portal services page, one of the XSL stylesheets should contain the following link: <a href=service.php>. To provide a link to the Help page, one of the XSL stylesheets should contain the following link: <a href=help.php>. Note The common/header.xsl stylesheet displays the Services and Logout links only when the subscriber is logged on. The Invalid Login Redirect page and the Help page never display the Services or Logout links.
Portion of common/header.xsl Stylesheet
Figure 15-4
common/footer/.xsl Figure 15-5 displays the XHTML code that controls the common/footer.xsl page included in all web pages in the NetOp PM lightweight web portal.
15-14
Figure 15-5
common/footer.xsl Stylesheet
Each of these files contains XHTML tags that you can modify to create a custom portal logon page. Alternatively, you can create custom files, as long as the filename is the same. Figure 15-4 on page 15-14 and Figure 15-5 on page 15-15 display the XHTML tags that control the various sections of the portal logon page. Note The wireless/bodywireless.xsl stylesheet does not include any of the common XSL stylesheets.
15-15
Figure 15-6 displays the NetOp PM lightweight web portal logon page as provided with the NetOp PM software.
Figure 15-6 NetOp PM Lightweight Web Portal Logon Page
Figure 15-7 displays portions of the XHTML code in the portal/bodyportal.xsl stylesheet that controls the NetOp PM lightweight web portal logon page.
Figure 15-7 Portions of portal/bodyportal.xsl Stylesheet
15-16
Caution Risk of functionality loss. The services/headtagservices.xsl stylesheet enables the JavaScript code that provides the ability for a subscriber to select multiple services before posting a request. Modifying this XSL stylesheet may disable this functionality. To reduce this risk, we recommend that you do not modify the services/headtagservices.xsl stylesheet. Like the portal/bodyportal.xsl stylesheet, the services/bodyservices.xsl file contains XHTML tags that you can modify to create a custom services page; it also contains XSL tags that you should not modify. Figure 15-8 displays the NetOp PM lightweight web portal services page as provided with the NetOp PM software.
Figure 15-8 NetOp PM Lightweight Web Portal Services Page
Note
Figure 15-9 displays a portion of the XHTML code in the services/bodyservices.xsl stylesheet that controls the NetOp PM lightweight web portal services page.
Figure 15-9 Portions of the services/bodyservices.xsl Stylesheet
15-17
Figure 15-11 displays a portion of the XHTML code in the wireless/bodywireless.xsl stylesheet that controls the NetOp PM lightweight web portal wireless page.
15-18
Figure 15-11
Figure 15-12 displays the NetOp PM lightweight web portal Usage page provided with the NetOp PM software.
Figure 15-12 NetOp PM Lightweight Web Portal Usage Page
15-19
For information on working with the Usage web page, see Chapter 7, Service Subscription Attribute Overrides in the NetOp Policy Manager API Guide.
15-20
Figure 15-14
For information on working with the Top Up redirect pages, see Chapter 7, Service Subscription Attribute Overrides in the NetOp Policy Manager API Guide.
15-21
15-22
15-23
Figure 15-19
Help Page
15-24
Chapter 16
Manage Subscribers
Note
You cannot use the NetOp PM client to modify the subscriber account password if the NetOp PM system is configured to proxy Access-Request packets. For information on proxying authentication messages, see Chapter 5, Configure External RADIUS and LDAP Servers.
Manage Subscribers
16-1
2. Search for an object by typing search criteria in the Search field and clicking Search. To stop a search in progress, click Stop. For example, type * to search for all entities. The NetOp client software accepts DOS command line standard expressions in searches for subscriber accounts. Matching search results are displayed on the object navigator. If the search returns too many results, a Too many objects message appears. Refine the search criteria and click Search again. When you narrow your search, the matching results are shown as follows: 3. Click the subscriber account that you want to work with. 4. On the management view launch bar, click Properties to display the subscriber account details and active session information on the Subscriber Account Active Sessions tab. The Active Sessions tab records all active wireline and wireless sessions on a node. A record in the Active Sessions section represents one subscriber session. A record is added when the subscriber session comes up; that is, when an Accounting-Start packet is received. The record is removed when the subscriber session ends; that is, when an Accounting-Stop packet is received. Use the Disconnect button to clear a subscriber session from the node. You may want to do this, for example, if a subscriber has an overdue payment. You can set up the Captive Portal service offering to redirect the disconnected subscriber to a web page that provides information on the overdue account. For information about the Captive Portal service offering, see the Captive Portal Service Offering section on page 3-37 in the NetOp Policy Manager Reference. Table 4-7 on page 4-6 in the NetOp Policy Manager Reference describes the fields displayed on the Subscriber Account Properties Panel. Table 4-8 on page 4-7 in the NetOp Policy Manager Reference describes the fields displayed on the Active Sessions tab.
16-2
Manage Subscribers
16-3
In the case of explicit logon access services, the Authenticated column will toggle between Y and N based on the subscribers current state of authentication. To view the logon status of a subscriber, perform the following steps: 1. View a specific subscriber account; see the View Subscriber Account and Active Session Information section on page 16-1. 2. Click the Logon Status tab. The Session Name column reflects the subscribers Point-to-Point Protocol (PPP) username, subscriber PCs media access control (MAC) address, or the subscriber name bound to static CLIPS or RFC 1483 bridged-encapsulated circuits (using the bind subscriber command in ATM PVC or CLIPS configuration mode). The Authenticated column reflects the NetOp PM softwares understanding of who is associated with the session. Note The Authenticated column reflects whether the session is really authenticated. For information about whether a subscriber is pre-authenticated for the next session, see the Configure Pre-authentication for Subscribers section on page 16-17.
To change a subscribers logon status, see the Change Subscriber Logon Status section on page 16-19. Table 4-11 on page 4-11 in the NetOp Policy Manager Reference describes the fields displayed in the Logon Status tab of the Subscriber Account Properties panel.
16-4
Calling-Station-Id column can be the identifying string configured as DHCP Option 82 if the SmartEdge router is configured to insert this into the Calling-Station-Id. The Network-Circuit-Id columns shows the subscribers NAS-Identifier and the NAS-Port-Id. For information about how to pre-authenticate a subscriber, see the Configure Pre-authentication for Subscribers section on page 16-17. To change subscriber pre-authentication information and session filtering, see the Configure Pre-authentication for Subscribers section on page 16-17. Table 4-12 on page 4-11 in the NetOp Policy Manager Reference describes the fields displayed in the Pre-Authentication tab of the Subscriber Account Properties panel.
Manage Subscribers
16-5
3. To view the details of a subscribed service, select a service. A summary of the service details appears on the Service Information panel.
16-6
Note
The Overrides section of the Service Information panel lists any service subscription overrides in effect, such as Time Quota, Incoming Traffic Quota, Outgoing Traffic Quota, Requested Inbound Bandwidth, and Requested Outbound Bandwidth. This section enables you to view any quota top-up that subscribers purchased for metering services. For more information on overrides, see Chapter 7, Service Subscription Attribute Overrides and Chapter 6, Define Services Using the NetOp PM API in the NetOp Policy Manager API Guide.
4. To view full details of the service offering, click Details. The Service Offering Properties panel appears in a new NetOp client window. For information on working with services in the NetOp. Table 4-15 on page 4-13 in the NetOp Policy Manager Reference describes the fields displayed in the Subscribed Services tab of the Subscriber Account Properties panel.
7. Click the Activated field and select either True or False to indicate whether the subscriber is able to log on.
Manage Subscribers
16-7
8. Click OK to add the subscriber to the NetOp PM database. To modify subscriber account details such as subscribed services, see the Modify Existing Subscriber Account Details section on page 16-11. Note The NetOp PM system does not validate the location lock that is associated with a subscriber account on input; this must be a manual process.
The location lock is determined to match a location attribute if the location lock is a substring of the location attributes value. For example, a location lock value of 5/1 or vpi-vci 1 123 matches a location attribute value for NAS-Port-Id of 5/1 vpi-vci 1 123. Similarly, a location lock value of host.host#12/1 matches a location attribute value for Calling-Station-Id of #host.host#12/1#0#. If the NetOp PM system includes an instance of a service attribute variation that specifies a matching value for the NAS-Identifier and NAS-Port-Id attributes, or a matching value for the Calling-Station-Id attribute, the NetOp PM system applies the location-specific instance of the service attribute variation to the subscriber session.
16-8
Note
Location lock is ignored on the L2TP network server (LNS). In cases where PPP packets are tunneled between a Layer 2 Tunneling Protocol (L2TP) access concentrator (LAC) and an LNS, in addition to the regular network access server (NAS) session initiated by the PPP connection on the LAC, an extra virtual NAS session is created on the LNS. As a result, the node sends two Access-Request packets to the NetOp PM system. The NetOp PM system receives an Access-Request packet from the LAC and verifies that the location lock and location attribute match, and that the username and password match. The NetOp PM system also receives an Access-Request packet from the LNS; the NetOp PM system bypasses location verification and performs only username and password authentication because the NAS-Port-Id value for the second Access-Request identifies the Access-Request packet as coming from an LNS.
Manage Subscribers
16-9
Caution When you configure any combination of the Pre-Authentication, Static IP Addresses, Circuit Attributes, or Framed-Route tabs, ensure that the Session Filter information for each tab matches. For example, if you provision the Pre-Authentication tab and the Circuit Attributes tab for a specific circuit, you must ensure that the Session Filter information matches. Failure to match the Session Filter information for each of these tabs could cause unexpected behavior that could impact your service. You must enter at least one of the options described in steps c. through e., or enter a combination of these options based on the results you want. c. Optional. Click the Session Name check box and type or select the subscriber record name associated with the session. The Session Name field reflects the subscribers PPP username, subscriber PCs MAC address, or the subscriber name bound to static CLIPS or RFC 1483 bridged-encapsulated circuits (using the bind subscriber command in ATM PVC or CLIPS configuration mode). d. Optional. Click the Calling-Station-Id check box and type the calling station identifier. e. Optional. Click the Network Circuit ID check box to enable and enter the NAS-Identifier and NAS-Port-Id fields: Click the NAS-Identifier field and type the name of the node associated with the subscriber circuit. Click the NAS-Port-Id field and type the node port ID that identifies the subscriber circuit. The default format is slot/port <vpi-vci vpi vci | vlan-id [tunl-vlan-id:]pvc-vlan-id>. The only accepted separator character is the space character. For example, 4/1 vpi-vci 207 138. When matching, the NetOp PM system ignores the session identifierwhich would be pppoe 5 in 12/2 pppoe 5. The information in the NAS-Port-Id field must be an exact match of the circuit identifier on which the subscriber traffic is present. No wild cards, substrings, or filters are supported for this value.
f. Click OK. g. On the Subscriber Account Properties panel, click Apply, or click Apply & Reauth. When you click Apply, changes do not take effect until the subscriber logs off and logs back on; when you click Apply & Reauth, changes take effect immediately, without requiring the subscriber to log off and log on again. Reauthorizing the subscribers session applies the selected service subscriptions, and may remove subscriptions that are actively being used. For more information, see the Configure Pre-authentication for Subscribers section on page 16-17. The Pre-Authentication tab reflects the override applied by the administrator, and may not accurately reflect whether the subscriber is assigned to the captive portal; rather, it reflects whether the subscriber is pre-authenticated for the next session. Alternatively, to prevent having to record the MAC address of the customers equipment, (for example, if the customers PC or home router is subject to change when the customer purchases new equipment), you can program the digital subscriber line-access multiplexer (DSLAM) with an Option 82 suboption 2 string on active customer DSLAM ports, and then use subscriber location lock to enable and disable the
16-10
NetOp PM systems recognition of the port, based on the suboption 2 string. If pre-authentication is enabled for the subscriber session, the billing system will bill a specific house, independent of whose PC is connected, since pre-authentication is tied to a specific subscriber account.
To modify the details of an existing subscriber account, perform the following steps: 1. View a subscriber account; see the View Subscriber Account and Active Session Information section on page 16-1. 2. Modify subscriber account details as appropriate; details are provided in the subsections that follow. 3. On the Subscriber Account Properties panel, click Apply, or click Apply & Reauth. When you click Apply, changes do not take effect until the subscriber logs off and logs back on; when you click Apply & Reauth, changes take effect immediately, without requiring the subscriber to log off and log on again. Reauthorizing the subscribers session applies the selected service subscriptions, and may remove subscriptions that are actively being used.
Note
The NetOp PM system cannot determine whether the session traverses a GE3 or GE1020 traffic cards, and as such, cannot decide when to send a QoS reference. The SmartEdge router ignores the QoS reference attribute for non-GE3 or non-GE1020 ports.
Manage Subscribers
16-11
A hierarchical node functions as an individual circuit, such as an 802.1Q permanent virtual circuit (PVC); you can assign a traffic rate and attach a PWFQ policy to it. In addition, you can specify the scheduling mode for the queues defined by the PWFQ policy, either strict or weighted round-robin (WRR). Each node is a member of a node group. Like the individual nodes within it, a node group functions as a circuit, such as an 802.1Q tunnel. You can assign a traffic rate and a scheduling mode (which might not be the same traffic rate or scheduling mode assigned to any of the nodes within the group) to a node group; node groups do not support PWFQ policies. When you configure a subscriber record or profile to reference a hierarchical node, all sessions for that subscriber are governed by the QoS PWFQ policy attached to that node and to the hierarchical scheduling for the node and for the node group. Note You can also attach a PWFQ policy directly to a subscriber record or profile. However, if you attach a PWFQ policy to the subscriber record and another PWFQ policy to the hierarchical node, the policy that you attach to the subscriber record supersedes the policy that you attach to the hierarchical node.
To add an association between a QoS hierarchical node and node group, and a subscriber circuit, perform the following steps: 1. View a subscriber account and circuit QoS hierarchical node and node group settings; see the View Subscriber Circuit AttributesQoS Hierarchical Node and Node Group section on page 16-3. 2. Click Add to open the Add Circuit Attributes dialog box. At least one of the options presented in steps 3, 4 and 5 must be specified. Note When you configure any combination of the Pre-Authentication, Static IP Addresses, Circuit Attributes, or Framed-Route tabs, ensure that the Session Filter information for each tab matches. For example if you provision the Pre-Authentication tab and the Circuit Attributes tab for a specific circuit, you must ensure that the Session Filter information matches.
16-12
3. Optional. Click the Session Name check box and type or select the name of the node associated with the subscriber circuit. 4. Optional. Click the Calling-Station-Id check box and type the name of calling station identifier. 5. Optional. Click the Network Circuit ID check box to enable the NAS-Identifier and NAS-Port-Id fields. You must complete steps 6 and 7 if you selected this option. 6. Click the NAS-Identifier field and type the name of the node associated with the subscriber circuit. 7. Click the NAS-Port-Id field and type the node port ID that identifies the subscriber circuit. The default format is slot/port <vpi-vci vpi vci | vlan-id [tunl-vlan-id:]pvc-vlan-id>. The only accepted separator character is the space character. For example, 4/1 vpi-vci 207 138. When matching, the NetOp PM system ignores the session identifierwhich would be pppoe 5 in 12/2 pppoe 5. The information in the NAS-Port-Id field must be an exact match of the circuit identifier on which the subscriber traffic is present. No wild cards, substrings, or filters are supported for this value. 8. Click the RB-Qos-Reference field and type the QoS hierarchical node and node group to associate with the subscriber circuit in the following format: node-name node-idx:group-name group-idx, where node-name node-idx is the name of the node and the node index number, and group-name group-idx is the name of the node group and the node group index number on the SmartEdge router; for more information, see the Hierarchical Nodes and Node Groups section on page 16-12. When a subscriber connects through a node and port that match the values specified in the NAS-Identifier and NAS-Port-Id fields, the corresponding RB-Qos-Reference attribute is sent to the node, indicating the QoS hierarchical node and node group to apply to the subscriber circuit. If no match is found, the RB-Qos-Reference attribute will not be sent. 9. Click OK. Note Each unique node-node group combination represents a single set of queues so should only be assigned to a single subscribers sessions; another subscribers session could be added, but their traffic will consume a portion of the bandwidth.
Manage Subscribers
16-13
10. On the Subscriber Account Properties panel, click Apply, or click Apply & Reauth. When you click Apply, changes do not take effect until the subscriber logs off and logs back on; when you click Apply & Reauth, changes take effect immediately, without requiring the subscriber to log off and log on again. Reauthorizing the subscribers session applies the selected service subscriptions, and may remove subscriptions that are actively being used. The NetOp PM system adds the QoS reference to the subscriber circuit. If you close or navigate away from the Subscriber Account Properties panel, or click Refresh without clicking applying changes, the changes you made are discarded.
Note
An entry that specifies a subscriber takes priority over an entry that does not specify a subscriber.
To associate a location with a QoS hierarchical node and node group, independent of the specific subscriber connected to the location, perform the following steps: 1. Log on to a database management tool, such as the DbVisualizer application or SQL*Plus, and connect to the NetOp PM database. 2. Add a record to the circuit_radius_attributes table. 3. In the nas_identifier field, type the name of the node.
16-14
4. In the nas_port_id field, type the node port ID. The default format is slot/port [vpi-vci vpi vci | vlan-id [tunl-vlan-id:]pvc-vlan-id]. The only accepted separator character is the space character. For example, 4/1 vpi-vci 207 138. When matching, the NetOp PM system ignores the session identifierwhich would be pppoe 5 in 12/2 pppoe 5. 5. In the RB-Qos-Reference field, type the QoS hierarchical node and node group to associate with the nas_identifier and nas_port_id in the following format: node-name node-idx:group-name group-idx, where node-name node-idx is the name of the node and the node index number, and group-name group-idx is the name of the node group and the node group index number on the SmartEdge router; for more information, see the Hierarchical Nodes and Node Groups section on page 16-12. When any subscriber connects through a node and port that match the values specified in the nas_identifier and nas_port_ids fields, the corresponding RB-Qos-Reference attribute is sent to the node, indicating the QoS hierarchical node and node group to apply to the subscriber. If no match is found, the RB-Qos-Reference attribute will not be sent.
Manage Subscribers
16-15
3. Optional. Click the Session Name check box and type or select the name of the node associated with the subscriber circuit. 4. Optional. Click the Calling-Station-Id check box and type the name of calling station identifier. 5. Optional. Click the Network Circuit ID check box to enable the NAS-Identifier and NAS-Port-Id fields. You must complete steps 7 and 8 if you selected this option. 6. Click the NAS-Identifier field and type the name of the node associated with the subscriber circuit. 7. Click the NAS-Port-Id field and type the node port ID that identifies the subscriber circuit. The default format is slot/port <vpi-vci vpi vci | vlan-id [tunl-vlan-id:]pvc-vlan-id>. The only accepted separator character is the space character. For example, 4/1 vpi-vci 207 138. When matching, the NetOp PM system ignores the session identifierwhich would be pppoe 5 in 12/2 pppoe 5. The information in the NAS-Port-Id field must be an exact match of the circuit identifier on which the subscriber traffic is present. No wild cards, substrings, or filters are supported for this value. 8. Click the Destination field and type the IP address of the destination host or network. The format is h.h.h.h[/nn] where h.h.h.h is the IP address of destination host or network and nn is the netmask size in bits (if not present, defaults to 32). 9. Click the Gateway field and type the IP address of the gateway. 10. Click the Metric field and type the number of hops for this route. 11. Click OK. 12. On the Subscriber Account Properties panel, click Apply, or click Apply & Reauth. When you click Apply, changes do not take effect until the subscriber logs off and logs back on; when you click Apply & Reauth, changes take effect immediately, without requiring the subscriber to log off and log on again. Reauthorizing the subscribers session applies the selected service subscriptions, and may remove subscriptions that are actively being used. The NetOp PM system adds the framed route to the subscriber session. If you close or navigate away from the Subscriber Account Properties panel, or click Refresh without applying changes, the changes you made are discarded.
16-16
Note
If the session name specified in the Add Framed Route dialog box does not match a NAS username already defined in the NetOp PM database, the new session also appears on the Logon Status tab. When you remove the session from the Logon Status tab, the session name is also removed from the Framed Route Tab.
Pre-authenticate a Subscriber
To pre-authenticate a subscriber session, perform the following steps: 1. View the subscriber account you want to pre-authenticate, following the steps in the View Pre-Authentication Information section on page 16-4. 2. Click the Pre-Authentication tab and click Add. The Add Pre-Authentication dialog box appears. You must specify at least one of the options described in steps 3, 4, and 5.
Manage Subscribers
16-17
Note
When you configure any combination of Static IP Addresses or Framed-Route by using the associated tabs, ensure that the Session Filter information for each tab matches. If you want both Static IP Address and Framed-Route to be applied, configure the same Session Filter information for each of the tabs and make sure they match. For example, if you want both Static IP Address and Framed-Route to be applied to a circuit, you can configure the following entries in the Static IP Address and Framed-Route tabs for the subscriber account joe: Calling-Station-Id = ser-1 12/1 vlan 1; Static IP Address = 10.192.45.20 Calling-Station-Id = ser-1 12/1 vlan 1; Framed-Route = 200.10.10.1 10.192.168.1 1 When the circuit comes up with the Calling-Station-Id = ser-1 12/1 vlan 1, the circuit will have Static IP Address = 10.192.45.20 and Framed-Route = 200.10.10.1 10.192.168.1 1 applied. If you only want either the Static IP Address or the Framed-Route to be applied, configure the Session Filter differently for each of the tabs. For example, if you want only the Static IP Address to match, you can configure the following entries in the Static IP Address and Framed-Route tabs for subscriber account joe: Session Name = 00:01:a2:3b:4c:d5; Calling-Station-Id = ser-1 12/1 vlan 1; Static IP Address = 10.92.45.20 Calling Station = ser-1 12/1 vlan 1; Framed-Route = 200.10.10.1 10.192.168.1 1 When the circuit comes up with Session Name = 00:01:a2:3b:4c:d5 and Calling-Station-Id = ser-1 12/1 vlan 1, the circuit will have Static IP Address = 10.192.45.20 applied. The circuit will not have Framed-Route = 200.10.10.1 10.192.168.1 1 applied since the Session Filter for Static IP Address is the best match for the circuit. When the circuit comes up with Session Name = 00:01:a2:3b:4c:d6 and Calling-Station-Id = ser-1 12/1 vlan 1, the circuit will have Framed Route = 200.10.10.1 10.192.168.1 1 applied. The circuit will not have Static IP Address = 10.192.45.20 applied since the Session Filter for Framed-Route is the best match for the circuit.
3. Optional. Click the Session Name check box and type or select the name of the node associated with the subscriber circuit. 4. Optional. Click the Calling-Station-Id check box and type the name of calling station identifier. 5. Optional. Click the Network-Circuit-ID check box to enable the NAS-Identifier and NAS-Port-Id fields: a. Click the NAS-Identifier field and type the name of the node associated with the subscriber circuit.
16-18
b. Click the NAS-Port-Id field and type the node port ID that identifies the subscriber circuit. The default format is slot/port <vpi-vci vpi vci | vlan-id [tunl-vlan-id:]pvc-vlan-id>; for example, 4/1 vpi-vci 207 138. The only accepted separator character is the space character. When matching, the NetOp PM system ignores the session identifier, which is pppoe 5 in 12/2 pppoe 5. The information in the NAS-Port-Id field must be an exact match of the circuit identifier of the circuit carrying the subscriber traffic. This value cannot include wild cards, substrings, or filters. When a subscriber is pre-authenticated, the Pre-Authentication tab reflects the override applied by the administrator and may not accurately reflect whether the subscriber is assigned to the captive portal; instead, it reflects whether the subscriber is pre-authenticated for the next session. 6. Click OK. 7. On the Subscriber Account Properties panel, click Apply, or click Apply & Reauth. When you click Apply, changes do not take effect until the subscriber logs off and logs back on; when you click Apply & Reauth, changes take effect immediately. Reauthorizing the subscriber session applies the selected service subscriptions and may remove other active subscriptions. If you close or navigate away from the Subscriber Account Properties panel, or click Refresh without applying changes, the changes you made are lost.
Manage Subscribers
16-19
2. Select the subscriber session to change logon status. 3. Click Edit to open the Edit Logon Status dialog box. 4. Click the Authenticated field and select YES or NO. Note If you select NO and do not remove the pre-authentication attributes according to the instructions provided in the Remove Pre-authentication from a Subscriber section on page 16-19, the next subscriber session continues to be pre-authenticated.
5. Click OK. 6. On the Subscriber Account Properties panel, click Apply, or click Apply & Reauth. When you click Apply, changes do not take effect until the subscriber logs off and logs back on; when you click Apply & Reauth, changes take effect immediately, without requiring the subscriber to log off and log on again. Reauthorizing the subscribers session applies the selected service subscriptions, and may remove subscriptions that are actively being used. The NetOp PM system changes the logon status of the subscriber session. If you close or navigate away from the Subscriber Account Properties panel, or click Refresh without applying changes, the changes you made are discarded.
Note
If the session name specified in the Add Framed Route dialog box does not match a NAS username already defined in the NetOp PM database, the new session also appears on the Logon Status tab. When you remove the session from the Logon Status tab, the session name is also removed from the Framed Route tab.
4. On the Subscriber Account Properties panel, click Apply, or click Apply & Reauth. When you click Apply, changes do not take effect until the subscriber logs off and logs back on; when you click Apply & Reauth, changes take effect immediately, without requiring the subscriber to log off and log on again. Reauthorizing the subscribers session applies the selected service subscriptions, and may remove subscriptions that are actively being used. The NetOp PM system removes the subscriber session. If you close or navigate away from the Subscriber Account Properties panel, or click Refresh without applying changes, the changes you made are discarded.
16-20
To add a static framed IP address with a subscriber session on a static PPP circuit, perform the following steps: 1. View a subscriber account and static IP addresses; see the View Static Framed IP Addresses section on page 16-5. 2. Click Add to open the Add Static IP Address dialog box. At least one of the options presented in steps 3, 4, and 5 must be specified. Note When you configure any combination of the Pre-Authentication, Static IP Addresses, Circuit Attributes, or Framed-Route tabs, ensure that the Session Filter information for each tab matches. For example if you provision the Pre-Authentication tab and the Circuit Attributes tab for a specific circuit, you must ensure that the Session Filter information matches. 3. Optional. Click the Session Name check box and type or select the name of the node associated with the subscriber circuit. 4. Optional. Click the Calling-Station-Id check box and type the name of calling station identifier. 5. Optional. Click the Network Circuit ID check box to enable the NAS-Identifier and NAS-Port-Id fields. You must complete steps 7 and 8 if you selected this option. 6. Click the NAS-Identifier field and type the name of the node associated with the subscriber circuit. 7. Click the NAS-Port-Id field and type the node port ID that identifies the subscriber circuit. The default format is slot/port <vpi-vci vpi vci | vlan-id [tunl-vlan-id:]pvc-vlan-id>. The only accepted separator character is the space character. For example, 4/1 vpi-vci 207 138. When matching, the NetOp PM system ignores the session identifierwhich would be pppoe 5 in 12/2 pppoe 5. The information in the NAS-Port-Id field must be an exact match of the circuit identifier on which the subscriber traffic is present. No wild cards, substrings, or filters are supported for this value. 8. Click the IP Address field and type the IP address statically assigned to the subscribers circuit, returned in the Access-Accept packet. 9. Click OK.
Manage Subscribers
16-21
10. On the Subscriber Account Properties panel, click Apply, or click Apply & Reauth. When you click Apply, changes do not take effect until the subscriber logs off and logs back on; when you click Apply & Reauth, changes take effect immediately, without requiring the subscriber to log off and log on again. Reauthorizing the subscribers session applies the selected service subscriptions, and may remove subscriptions that are actively being used. The NetOp PM system adds the static IP address to the subscriber session. If you close or navigate away from the Subscriber Account Properties panel, or click Refresh without applying changes, the changes you made are discarded. Note If you specify multiple IP addresses using the Classless InterDomain Routing (CIDR) format (h.h.h.h/nn) for the same session name, all static IP addresses must be present on the same subnet of the interface that the subscriber gets bound to.
To add services to a subscriber account, perform the following steps: 1. View a subscribers subscribed services; see the View Current Subscribed Services section on page 16-6.
16-22
2. In the Subscribed Services section, click Add to open the Select Service Offering dialog box. 3. Click the name of the retail, wholesale, visible, or invisible service offering to add to the subscriber account and then click OK. Note The NetOp client enables you to add services that are not available to the subscriber on the web portal services page.
4. On the Subscriber Account Properties panel, click Apply, or click Apply & Reauth. When you click Apply, changes do not take effect until the subscriber logs off and logs back on; when you click Apply & Reauth, changes take effect immediately, without requiring the subscriber to log off and log on again. Reauthorizing the subscribers session applies the selected service subscriptions, and may remove subscriptions that are actively being used. The NetOp PM system implements the service on the node. If you close or navigate away from the Subscriber Account Properties panel, or click Refresh without applying changes, the changes you made are discarded. Table 4-15 on page 4-13 in the NetOp Policy Manager Reference describes the fields displayed in the Subscribed Services section in the Subscriber Account Properties panel.
To remove services from a subscriber account, perform the following steps: 1. View a subscribers subscribed services; see the View Current Subscribed Services section on page 16-6. 2. In the Subscribed Services section, click the service you want to remove from the subscriber account. 3. Click Remove. 4. On the Subscriber Account Properties panel, click Apply, or click Apply & Reauth. When you click Apply, changes do not take effect until the subscriber logs off and logs back on; when you click Apply & Reauth, changes take effect immediately, without requiring the subscriber to log off and log on again. Reauthorizing the subscribers session applies the selected service subscriptions, and may remove subscriptions that are actively being used. The NetOp PM system removes the service on the node. If you close or navigate away from the Subscriber Account Properties panel, or click Refresh without applying changes, the changes you made are discarded.
Manage Subscribers
16-23
16-24