Configuration AAA English Version
Configuration AAA English Version
and Accounting
Disclaimer
The contents of this document are subject to revision without notice due to
continued progress in methodology, design and manufacturing. Ericsson shall
have no liability for any error or damage of any kind resulting from the use
of this document.
Trademark List
Contents
1 Overview 1
1.1 Authentication 1
1.2 Authorization and Reauthorization 5
1.3 Accounting 5
1.4 AAA Route Download Overview 7
3 Configuration Examples 27
3.1 Configuring Administrator Authentication 27
3.2 Configuring Administrator Accounting 27
3.3 Defining the Administrator Structured Username 27
3.4 Authenticating Subscribers 27
3.5 Reauthorizing Subscribers 28
1 Overview
This document applies to both the Ericsson SmartEdge® and SM family routers.
However, the software that applies to the SM family of systems is a subset of
the SmartEdge OS; some of the functionality described in this document may
not apply to SM family routers.
For information specific to the SM family chassis, including line cards, refer to
the SM family chassis documentation.
For specific information about the differences between the SmartEdge and SM
family routers, refer to the Technical Product Description SM Family of Systems
(part number 5/221 02-CRA 119 1170/1) in the Product Overview folder of
this Customer Product Information library.
Note: In the following sections, the term controller card refers to the
Cross-Connect Route Processor (XCRP4) Controller card. The term
controller carrier card refers to the controller functions on the carrier
card in the SmartEdge100 chassis.
1.1 Authentication
The following sections describe the authentication features for administrators
and subscribers.
1.1.1 Administrators
1.1.2 Subscribers
You can also configure the router to authenticate through a RADIUS server
configured in the nonlocal context, and then through a RADIUS server
configured in the local context, if the previous server is unavailable; else,
proceed to router configuration.
• Tunnel-Client-Endpoint (66)
• Tunnel-Server-Endpoint (67)
• Acct-Tunnel-Connection (68)
• Tunnel-Assignment-ID (82)
• Tunnel-Client-Auth-ID (90)
• Tunnel-Server-Auth-ID (91)
If you have IPv6 PPP subscriber sessions, the following standard RADIUS
attributes and Ericsson VSAs are supported:
• NAS-IPv6-Address (95)
• Framed-Interface-Id (96)
• Framed-IPv6-Prefix (97)
• Framed-IPv6-Route (99)
• Framed-IPv6-Pool (100)
• Delegated-IPv6-Prefix (123)
• RB-IPv6-DNS (207)
• RB-IPv6-Option (208)
• Delegated-Max-Prefix (212)
For more information about RADIUS standard attributes and vendor VSAs
provided by Ericsson AB, see RADIUS Attributes. For more information about
L2TP AVPs, see Configuring L2TP.
You can set a maximum limit on the number of subscriber sessions that can be
simultaneously active in a given context and for all configured contexts.
You can limit the services provided to subscribers based on volume of traffic.
You can monitor volume-based services in the upstream and downstream
directions independently, separately, or aggregated in both directions.
However, you cannot simultaneously monitor aggregated traffic and either
upstream or downstream traffic.
Volume limits are imposed by the RADIUS VSA 113 in Access-Accept and
Accounting-Request messages.
If the RADIUS attribute does not include the direction to which the limit is
applied, the downstream direction is assumed. If no limit is included, the traffic
volume is unlimited in both the directions and is not monitored. If a limit of 0
is configured for a direction, traffic is treated as unlimited in that direction and
is not monitored.
If a subscriber circuit has been configured with a dynamic binding, using the
bind authentication command (in the circuit’s configuration mode),
AAA uses subscriber attributes in messages received during subscriber
authentication to determine which IPv4 address (and the associated interface)
to use when binding the subscriber circuit.
The RADIUS server may or may not accept the address ; Table 1 lists the
RADIUS server responses and the corresponding router actions.
When subscribers request new or modified services during active sessions, the
requests can be translated to changes that are applied during the active session
through dynamic subscriber reauthorization. Reauthentication occurs without
PPP renegotiation and without interrupting or dropping the active session.
1.3 Accounting
The following sections describe the accounting features.
You can configure the router so that accounting messages are sent to a
TACACS+ server whenever an administrator enters commands at the specified
privilege level (or higher).
You can configure two-stage accounting where the router sends accounting
messages to a RADIUS accounting server configured in the non-local context
and to a RADIUS accounting server configured in the local context. For
example, a copy of the accounting data can be sent to both a wholesaler's
and an upstream service provider’s RADIUS accounting server, so that the
end-of-period accounting data can be reconciled and validated by both the
parties.
You can also specify the error conditions for which the router suppresses the
sending of accounting messages to a RADIUS accounting server.
The router sends just a single accounting on message when more than
one type of RADIUS accounting is enabled. For example, if you enable
both subscriber accounting and L2TP accounting, the router sends only one
accounting on message to each RADIUS accounting server, even if you
enable L2TP accounting at a later time. Similarly, the accounting off
message is not sent until you have disabled all types of RADIUS accounting.
Note: Configuring the global keyword with the aaa accounting l2tp
session command allows you to enable global RADIUS accounting
for sessions in L2TP tunnels even without global authentication. For
more information, see the aaa accounting l2tp command.
This feature assumes that the routes downloaded from the RADIUS route
download server have a more specific prefix than the prefix of the subscriber
route. The router does not check for configuration errors in this regard.
Note: The command syntax in the task table displays only the root command.
For the complete command syntax, see Command List.
To configure the algorithm the router uses to assign subscriber IPv4 address,
perform the task described in Table 10.
To change the default order for determining the IP address (and its interface) to
be used for binding a subscriber circuit, perform the task described in Table 12.
Caution!
Risk of security breach. If you disable subscriber authentication, individual
subscriber names and passwords will not be authenticated by the router, and
therefore, IP routes and ARP entries within individual subscriber records are
not installed. To reduce the risk, verify your network security setup before
disabling subscriber authentication.
reauth-1@local
Password="redback"
Reauth-String="ID-type;subID;attr-num;attr-value;attr-num;attr-value...
Reauth-More=1
reauth-2@local
Password="redback"
Reauth-String="ID-type;subID;attr-num;attr-value;attr-num;attr-value...
Reauth_String
Attribute number: 94
Value: String
Format: "xxx"*
Description: (SE)
"type;sub_id;attr#;attr_val;attr#;;attr#;attr_val;..."
(vsa_attr: vid-vsa_attr_#)
Reauth_More
Attribute number: 95
Value: integer
Format: 1
To configure global L2TP accounting, perform the task described in Table 28.
Note: The command syntax in the task table displays only the root command.
For the complete command syntax, see Command List.
3 Configuration Examples