For feedback and comments: |
documentation.feedback@alcatel-lucent.com |
![]() |
![]() |
![]() |
![]() |
![]() |
Refers to the user to be authenticated in the Access-Request. The format for IPoE/PPPoE hosts depends on configuration parameters pppoe-access-method, ppp-user-name or user-name-format in the CLI context configure subscriber-mgmt authentication-policy <name>. The format for ARP-hosts is not configurable and always the host IPv4-address.The RADIUS User-Name specified in an Access-Accept or CoA is reflected in the corresponding accounting messages. The attribute is omitted in authentication/accounting via configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute no user-name. The password of the user to be authenticated, or the user's input following an Access-Challenge. For PPPoE users it indirectly maps to the password provided by a PPPoE PAP user in response to the PAP Authenticate-Request. For IPoE/ARP hosts it indirectly maps to a pre-configured password (configure subscriber-mgmt authentication-policy <name> password <password> or configure aaa isa-radius-policy <name> password <password>). Provided by a PPPoE CHAP user in response to the CHAP challenge. The CHAP challenge sent by the NAS to a PPPoE CHAP user is part of the CHAP authentication sequence RFC 1994, PPP Challenge Handshake Authentication Protocol (CHAP), (Challenge, Response, Success, Failure). The user generated CHAP password length is equal to the defined Limits and contains a one byte CHAP-Identifier from the user's CHAP Response followed by the CHAP Response from the user. “Base” or “VPRN” — the ipv4 address of the system interface (configure router interface system address <address>).The address can be overwritten with the configured source-address (configure aaa radius-server-policy <policy-name> servers source-address <ip-address>). The physical access-circuit on the NAS which is used for the Authentication or Accounting of the user. The format of this attribute is configurable on the NAS as a fixed 32 bit value or a parameterized 32 bit value. The parameters can be a combination of outer-vlan-id(o), inner-vlan-id(i), slot number(s), MDA number(m), port number or lag-id(p), ATM VPI(v) and ATM VCI(c), fixed bit values zero (0) or one (1) but cannot exceed 32 bit. The format can be configured for following applications: configure aaa l2tp-accounting-policy <name> include-radius-attribute nas-port, configure router l2tp cisco-nas-port, configure service vprn <service-id> l2tp cisco-nas-port, configure subscriber-mgmt authentication-policy <name> include-radius-attribute nas-port, configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute nas-port. The IPv4 address to be configured for the host via DHCPv4 (radius proxy) or IPCP (PPPoE). Simultaneous returned attributes [88] Framed-Pool and [8] Framed-IP-Address (RADIUS Access-Accept) are handled as host setup failures. Attribute is also used in CoA and Disconnect Message (part of the ESM or AA user identification-key). Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no framed-ip-addr. The IP netmask to be configured for the user when the user is a router to a network. For DHCPv4 users, the attribute maps to DHCPv4 option [1] Subnet mask and is mandatory if [8] Framed-IP-Address is also returned. For PPPoE residential access, the attribute should be set to 255.255.255.255 (also the default value if the attribute is omitted). For PPPoE business access, the attribute maps to PPPoE IPCP option [144] Subnet-Mask only when the user requests this option and if the node parameter configure subscriber-mgmt ppp-policy <ppp-policy-name> ipcp-subnet-negotiation is set. Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no framed-ip-netmask. If an identical managed route is associated with different routed subscriber hosts in the context of the same IES/VPRN service up to <max-ecmp-routes> managed routes are installed in the routing table (configured as ecmp <max-ecmp-routes> in the routing instance). Candidate ECMP Framed-Routes have identical prefix, equal lowest preference and equal lowest metric. The “lowest ip next-hop” is the tie breaker if more candidate ECMP Framed-Routes are available than the configured <max-ecmp-routes>. Other identical managed routes are shadowed (not installed in the routing table) and an event is logged. An alternative to RADIUS managed routes are managed routes via host dynamic BGP peering.Valid RADIUS learned managed routes can be included in RADIUS accounting messages with following configuration: configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute framed-route. Associated managed routes for an instantiated routed subscriber host are included in RADIUS accounting messages independent of the state of the managed route (Installed, Shadowed or HostInactive). Sets the maximum number of consecutive seconds of idle connection allowed to the user before termination of the session (IPoE/PPPoE) or a connectivity check is triggered (IPoE). Values outside the allowed Limits are accepted but rounded to these boundaries. A value of zero is treated as an infinite idle-timeout. The idle-timeout handling on the node is implemented via category-maps (configure subscriber-mgmt category-map <category-map-name> and configure subscriber-mgmt sla-profile <sla-profile-name> category-map <category-map-name>). Allows the NAS to send in an Access Request and/or Accounting Request information with respect to the user called. Attribute is omitted in authentication/accounting via: configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute no called-station-id. Allows the NAS to send unique information identifying the user who requested the service. This format is driven by configuration (configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute calling-station-id <llid|mac|remote-id|sap-id|sap-string>). The LLID (logical link identifier) is the mapping from a physical to logical identification of a subscriber line and supplied by a RADIUS llid-server. The sap-string maps to configure service <service-id> subscriber-interface <ip-int-name> group-interface <ip-int-name> sap <sap-id> calling-station-id <sap-string>. A [31] Calling-Station-Id attribute value longer than the allowed maximum is treated as a setup failure. The attribute is omitted in authentication/accounting via configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute no calling-station-id. A string (configure system name <system-name>) identifying the NAS originating the Authentication or Accounting requests and sent when nas-identifier is included for the corresponding application: configure subscriber-mgmt authentication-policy (ESM authentication), configure subscriber-mgmt radius-accounting-policy (ESM accounting), configure aaa isa-radius-policy (LSN accounting, WLAN-GW) and configure aaa l2tp-accounting-policy (L2TP accounting). A unique identifier that represents the subscriber host or session that is authenticated. This attribute can be used as CoA or Disconnect Message key to target the host or session and is reflected in the accounting messages for this host or session.The attribute is included/excluded based on configure subscriber-mgmt authentication-policy <name> include-radius-attribute acct-session-id [host|session]. For PPPoE, either the host acct-session-id (default) or the session acct-session-id is included. The CHAP challenge sent by the NAS to a PPPoE CHAP user as part of the chap authentication sequence RFC 1994 (Challenge, Response, Success, Failure). The generated challenge length for each new pppoe session is by default a random value between [32..64] bytes unless configured different under configure subscriber-mgmt ppp-policy <ppp-policy-name> ppp-chap-challenge-length [8..64] or configure router l2tp group <tunnel-group-name> ppp chap-challenge-length [8..64] for LNS. The CHAP challenge value is copied into the request-authenticator field of the RADIUS Access-Request message if the minimum and maximum value is configured at exact 16 (RFC 2865, Remote Authentication Dial In User Service (RADIUS), section 2.2, Interoperation with PAP and CHAP). Attribute CHAP-Password is provided by a PPPoE CHAP user in response to the [60] CHAP-challenge. The type of the physical port of the NAS which is authenticating the user and value automatically determined from subscriber SAP encapsulation. It can be overruled by configuration. Included only if include-radius-attribute nas-port-type is added per application: configure subscriber-mgmt authentication-policy (ESM authentication), configure subscriber-mgmt radius-accounting-policy (ESM accounting), configure aaa isa-radius-policy (LSN accounting, WLAN-GW) and configure aaa l2tp-accounting-policy (L2TP accounting). Checked for correctness if returned in CoA. A text string which identifies the physical/logical port of the NAS which is authenticating the user and/or reported for accounting. Attribute is also used in CoA and Disconnect Message (part of the user identification-key). The nas-port-id for physical ports usually contains <slot>/<mda>/<port>/<vlan|vpi>.<vlan|vci>. The physical port can have an optional prefix-string (max 8 chars) and suffix-string (max 64 chars) added for Authorization and Accounting (configure subscriber-mgmt radius-accounting-policy | authentication-policy <name> include-radius-attribute nas-port-id [prefix-string <string>] [suffix <circuit-id|remote-id>]). For logical access circuits (LNS) the nas-port-id is a fixed concatenation (delimiter #) of routing instance, tunnel-server-endpoint, tunnel-client-endpoint, local-tunnel-id, remote-tunnel-id, local-session-id, remote-session-id and call sequence number.Included only if include-radius-attribute nas-port-id is added per application: configure subscriber-mgmt authentication-policy (ESM authentication), configure subscriber-mgmt radius-accounting-policy (ESM accounting), configure aaa isa-radius-policy (LSN accounting, WLAN-GW) and configure aaa l2tp-accounting-policy (L2TP accounting). For a capture-sap, the nas-port-id attribute is always included in authentication requests. The name of one address pool or the name of a primary and secondary address pool separated with a one character configurable delimiter (configure router/service vprn <service-id> dhcp local-dhcp-server <server-name> use-pool-from-client delimiter <delimiter>) that should be used to assign an address for the user and maps to either:1) dhcpv4 option [82] vendor-specific-option [9] sub-option [13] dhcpPool if option is enabled on the node (configure service ies/vprn <service-id> subscriber-interface <ip-int-name> group-interface <ip-int-name> dhcp option vendor-specific-option pool-name) or2) used directly as pool-name in the local configured dhcp server when local-address-assignment is used and client-application is ppp-v4 (configure service ies/vprn <service-id> subscriber-interface ip-int-name group-interface ip-int-name local-address-assignment). Alternative to [26-2352-36] Ip-Address-Pool-Name and [26-4874-2] ERX-Address-Pool-Name. Framed-Pool names longer than the allowed maximum are treated as host setup failures. Simultaneous returned attributes [88] Framed-Pool and [8] Framed-IP-Address are also handled as host setup failures. “Base” or “VPRN” — The ipv6 address of the system interface (configure router interface system ipv6 address <ipv6-address>).The address can be overwritten with the configured ipv6-source-address (configure aaa radius-server-policy <policy-name> servers ipv6-source-address <ipv6-address>). ipv6-prefix/prefix-length to be configured via SLAAC (Router Advertisement) to the WAN side of the user. Any non /64 prefix-length for SLAAC host creation is treated as a session setup failure for this host. This attribute is an alternative to [100] Framed-IPv6-Pool and [26-6527-99] Alc-IPv6-Address, which assigns IPv6 addressing to the wan-side of a host via DHCPv6 IA-NA. Attribute is also used in CoA and Disconnect Message (part of the ESM or AA user identification-key). Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no framed-ipv6-prefix. Routing information (ipv6 managed route) to be configured on the NAS for a v6 wan host (IPoE or PPPoE) that operates as a router. The functionality is comparable with offering multiple PD prefixes for a single host. The route included in the Framed-IPv6-Route attribute is accepted as a managed route only if it's next-hop is a wan-host (DHCPv6 IA-NA or SLAAC) or if the next-hop address equals ::. As a consequence, Framed-IPv6-Routes with explicit configured gateway prefix of a pd-host (DHCPv6 IA-PD) will not be installed. A Framed-Route attribute is also ignored if the SAP does not have anti-spoof configured to nh-mac (the host will be installed as a standalone host without managed route). Number of Routes above Limits are silently ignored. Optionally, a metric, tag and/or protocol preference can be specified for the managed route. If the metrics are not specified or specified in a wrong format or specified with out of range values then default values are used for all metrics: metric=0, no tag and preference=0. If an identical managed route is associated with different routed subscriber hosts in the context of the same IES/VPRN service up to <max-ecmp-routes> managed routes are installed in the routing table (configured as ecmp <max-ecmp-routes> in the routing instance). Candidate ECMP Framed-IPv6-Routes have identical prefix, equal lowest preference and equal lowest metric. “lowest ip next-hop” is the tie breaker if more candidate ECMP Framed-IPv6-Routes are available than the configured <max-ecmp-routes>. Other identical managed routes are shadowed (not installed in the routing table) and an event is logged. Valid RADIUS learned managed routes can be included in RADIUS accounting messages with following configuration: configure subscriber-mgmt radius-accounting-policy name include-radius-attribute framed-ipv6-route. Associated managed routes for an instantiated routed subscriber host are included in RADIUS accounting messages independent of the state of the managed route (Installed, Shadowed or HostInactive). Attribute that carries the Prefix (ipv6-prefix/prefix-length) to be delegated via DHCPv6 (IA-PD) for the LAN side of the user (IPoE, PPPoE). Maps to DHCPv6 option IA-PD [25] sub-option IA-Prefix [26] Prefix. An exact Delegated-prefix-Length [DPL] match with configure service <service-id> subscriber-interface <ip-int-name> ipv6 delegated-prefix-length [48..64] is required with the received attribute prefix-length unless a variable DPL is configured (configure service <service-id> subscriber-interface <ip-int-name> ipv6 delegated-prefix-length variable). In the latter case multiple hosts for the same group-interface having different prefix-length [48..64] per host are supported. Simultaneous returned attributes [123] Delegated-IPv6-Prefix and [26-6527-131] Alc-Delegated-IPv6-Pool are handled as host setup failures. Attribute is also used in CoA and Disconnect Message (part of the ESM or AA user identification-key). Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no delegated-ipv6-prefix. A IPv4 address of the secondary DNS server for this subscribers connection and maps to 'PPPoE IPCP option 131 Secondary DNS Server address or DHCPv4 option 6 Domain Server. Is an alternative for 26-4874-5 ERX-Secondary-Dns or 26-6527-10 Alc-Secondary-Dns. The name of an assigned address pool that should be used to assign an address for the user and maps to dhcpv4 option[82] vendor-specific-option [9] sub-option [13] dhcpPool if option is enabled on the node (configure service <service-id> subscriber-interface <ip-int-name> group-interface <ip-int-name> dhcp option vendor-specific-option pool-name). Alternative to [88] Pool-Name and [26-4874-2] ERX-Address-Pool-Name. Framed-Pool names longer than the allowed maximum are treated as host setup failures. Simultaneous returned attributes Pool-Names [8] and Framed-IP-Address are also handled as host setup failures. Information describing the subscriber agent circuit identifier corresponding to the logical access loop port of the Access Node/DSLAM from which a subscriber's requests are initiated. Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute circuit-id. An operator-specific, statically configured string that uniquely identifies the subscriber on the associated access loop of the Access Node/DSLAM. Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute remote-id. The actual upstream train rate (coded in bits per second) of a subscriber's synchronized DSL link and maps to values received during PPPoE discovery (tag 0x0105) or DHCP (opt-82). Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. Actual downstream train rate (coded in bits per second) of a subscriber's synchronized DSL link and maps to values received during PPPoE discovery (tag 0x0105) or DHCP (opt-82). Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. The subscriber's operator-configured minimum upstream data rate (coded in bits per second) and maps to values received during PPPoE discovery (tag 0x0105) or DHCP (opt-82). Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy 7x50_PRD_Multicast_MVPN_sender_receiver_only_v0.2.doc include-radius-attribute access-loop-options. The subscriber's operator-configured minimum downstream data rate (coded in bits per second) and maps to values received during PPPoE discovery (tag 0x0105) or DHCP (opt-82). Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. The subscriber's attainable upstream data rate (coded in bits per second) and maps to values received during PPPoE discovery (tag 0x0105) or DHCP (opt-82). Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. The subscriber's attainable downstream data rate (coded in bits per second) and maps to values received during PPPoE discovery (tag 0x0105) or DHCP (opt-82). Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. The subscriber's maximum upstream data rate (coded in bits per second), as configured by the operator and maps to values received during PPPoE discovery (tag 0x0105) or DHCP (opt-82). Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. The subscriber's maximum downstream data rate (coded in bits per second), as configured by the operator and maps to values received during PPPoE discovery (tag 0x0105) or DHCP (opt-82). Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. The subscriber's minimum upstream data rate (coded in bits per second) in low power state, as configured by the operator and maps to values received during PPPoE discovery (tag 0x0105) or DHCP (opt-82). Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. The subscriber's minimum downstream data rate (coded in bits per second) in low power state, as configured by the operator and maps to values received during PPPoE discovery (tag 0x0105) or DHCP (opt-82). Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. The subscriber's maximum one-way upstream interleaving delay in milliseconds, as configured by the operator and maps to values received during PPPoE discovery (tag 0x0105) or DHCP (opt-82). Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. The subscriber's actual one-way upstream interleaving delay in milliseconds and maps to values received during PPPoE discovery (tag 0x0105) or DHCP (opt-82). Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. The subscriber’s maximum one-way downstream interleaving delay in milliseconds, as configured by the operator and maps to values received during PPPoE discovery (tag 0x0105) or DHCP (opt-82). Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. The subscriber's actual one-way downstream interleaving delay in milliseconds and maps to values received during PPPoE discovery (tag 0x0105) or DHCP (opt-82). Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. The last mile encapsulation used by the subscriber on the DSL access loop and maps to values received during PPPoE discovery Tags (tag 0x0105) or DHCP Tags (opt-82). Attribute is included/excluded in RADIUS/Accounting-Request based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. Last mile encapsulation information can be used to adjust automatically the egress aggregate rate for this subscriber. Pre-configured encapsulation types are used if PPP/IPoE access loop information (tags) is not available (configure subscriber-mgmt sub-profile <subscriber-profile-name> egress encap-offset <type> or configure subscriber-mgmt local-user-db <local-user-db-name> ppp host access-loop encap-offset <type>). [26-6527-133] Alc-Access-Loop-Encap-Offset when returned in Access-Accept is taken into account (overrules received tags and pre-configured encapsulation types) for ALE adjust (last mile aware shaping) but is not reflected in access-loop-options send to RADIUS. Alc-Access-Loop-Encap from ANCP are currently not taken into account for ALE adjust. The presence of this Attribute indicates that the IWF has been performed with respect to the subscriber's session. IWF is utilized to enable the carriage of PPP over ATM (PPPoA) traffic over PPPoE. The Access Node inserts the PPPoE Tag 0x0105, vendor-id 0x0de9 with sub-option code 0xFE, length field is set to 0x00 into the PPPoE Discovery packets when it is performing an IWF functionality. Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. The name of an assigned address pool that should be used to assign an address for the user and maps to dhcpv4 option[82] vendor-specific-option [9] sub-option [13] dhcpPool if option is enabled on the node (configure service <service-id> subscriber-interface <ip-int-name> group-interface <ip-int-name> dhcp option vendor-specific-option pool-name). Alternative to [88] Pool-Name and [26-2352-36] Ip-Address-Pool-Name. Framed-Pool names longer than the allowed maximum are treated as host setup failures. Simultaneous returned attributes Pool-Names [8] and Framed-IP-Address are also handled as host setup failures. A subscriber is a collection of subscriber-hosts (typically represented by IP-MAC combination) and is uniquely identified by a subscriber string. Subscriber-hosts queues/policers belonging to the same subscriber (residing on the same forwarding complex) can be treated under one aggregate scheduling QoS mechanism. Fallback to pre-configured values if attribute is omitted. Attribute values longer than the allowed string value are treated as setup failures. Can be used as key in CoA and Disconnect Message. Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no subscriber-id. The subscriber profile is a template which contains settings (accounting, igmp, HQoS,...) which are applicable to all hosts belonging to the same subscriber were [26-6527-12] Alc-Subsc-Prof-Str is the string that maps (configure subscriber-mgmt sub-ident-policy sub-profile-map) to such an subscriber profile (configure subscriber-mgmt sub-profile <subscriber-profile-name>). Strings longer than the allowed maximum are treated as setup failures. Unreferenced strings (string does not map to a policy) are silently ignored and a fallback to pre-configured defaults is done. Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no sub-profile. The SLA profile is a template which contains settings (filter, QoS, host-limit...) which are applicable to individual hosts were [26-6527-13] Alc-SLA-Prof-Str is the string that maps (configure subscriber-mgmt sub-ident-policy <sub-ident-policy-name> sla-profile-map) to such a sla profile (configure subscriber-mgmt sla-profile <sla-profile-name>). Strings longer than the allowed maximum are treated as setup failures. Unreferenced strings (string does not map to a policy) are silently ignored and a fallback to pre-configured defaults is done. Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no sla-profile. Information describing the subscriber agent circuit identifier corresponding to the logical access loop port of the Access Node/DSLAM from which a subscriber's requests are initiated and used to associate the ANCP Circuit-Id (info received via ANCP Port Up and Port Down) with the PPPoE/IPoE Circuit-Id (info received via [26-6527-16] Alc-ANCP-Str and [26-3561-1] Agent-Circuit-Id). An subscriber is ANCP associated when both strings are equal and for associated subscribers the ingress/egress ANCP QoS rules apply (configure subscriber-mgmt ancp ancp-policy <policy-name> and configure subscriber-mgmt sub-profile ancp ancp-policy <policy-name>. MAC address from a user that requests a service and included in CoA, Authentication or Accounting (configure subscriber-mgmt authentication-policy/radius-accounting-policy include-radius-attribute mac-address). A string representing an aggregation point (for example, Access Node) and interpreted as the intermediate destination id. Subscribers connected to the same aggregation point should get the same int-dest-id string assigned. The int-dest-id is used in mc-ring access redundancy to identify subscribers behind a ring node (configure redundancy multi-chassis peer <ip-address> mc-ring ring/l3-ring <name> ring-node <ring-node-name>). The int-dest-id can be used in QoS to shape the egress traffic of a group of subscribers to an aggregate rate using vports (configure port <port-id> ethernet access egress vport <name> host-match dest <destination-string>) or secondary shapers on HS-MDAv2 (configure port <port-id> ethernet egress exp-secondary-shaper <secondary-shaper-name>). For egress policed subscriber traffic, the inter-dest-id can be used to select the egress queue-group for forwarding (configure port <port-id> ethernet access egress queue-group <name> host-match dest <destination-string>). Strings longer than the allowed maximum are treated as setup failures. Specifies the number in deci-seconds that the PPPoE protocol stack on the NAS waits before sending a PADO packet in response to a PADI request. In dual homed topologies, you may want to designate a primary NAS and a backup NAS for handling a particular service request. In such a scenario, you can configure a delay for the backup NAS to allow sufficient time for the primary NAS to respond to the client with a PADO packet. If the primary NAS does not send the PADO packet within this delay period, then the backup NAS sends the PADO packet after the delay period expires. This attribute is only applicable if RADIUS PADI authentication is used (configure subscriber-mgmt authentication-policy <ppp-policy-name> pppoe-access-method padi). Values above the allowed Limits are truncated at the Limits boundary. There is no PADO delay if the attribute is omitted or if the attribute is received with a value of zero. Maps to PADI field PPPoE tags [0x0101] service-name and is sent in the Access-Request if enabled under configure subscriber-mgmt authentication-policy <name> include-radius-attribute pppoe-service-name. A PPPoE-Service-Name above the allowed maximum length is handled as a PPPOE session setup failure. Initiated by DHCP clients via option 60 [Class-id] and reflected in Authentication. (configure subscriber-mgmt authentication-policy <name> include-radius-attribute dhcp-vendor-class-id or configure aaa isa-radius-policy <name> auth-include-attributes dhcp-vendor-class-id). DHCP option [60] Class-ID can also be used as User-name in RADIUS requests. (configure subscriber-mgmt authentication-policy <name> user-name-format dhcp-client-vendor-opts). Application Assurance for residential, business or transit-AA subscribers is enabled through the assignment of an application profile as part of either enhanced subscriber management or static configuration. [26-6527-45] Alc-App-Prof-is is a string that maps (configure subscriber-mgmt sub-ident-policy <sub-ident-policy-name> app-profile-map) to such an application profile (configure application-assurance group <aa-group-id:partition-id> policy app-profile <app-profile-name>). This attribute is used in access-accept (to assign an application profile during esm host creation) and CoA (to change the application profile of a AA-subscriber or to create transit AA-subscriber). Strings longer than the allowed maximum are treated as setup failures. Unreferenced strings (strings not mapping to an application profile) will silently trigger a fallback to pre-configured default values if allowed. If no default value is pre-configured, the subscriber's application profile is silently disabled for esm AA-subscriber; in case of a transit AA-subscriber creation the CoA will be rejected. The change of an application profile to one configured under a different group/partition or the modification of the application profile of a static AA-subscriber is not allowed and will be treated as setup failures. The ipv6 address to be configured to the WAN side of the user (IPoE,PPPoE) via DHCPv6 (IA-NA). Maps to DHCPv6 option IA-NA[3] sub-option IA-Address[5] address. This attribute is an alternative to [97] Framed-IPv6-Prefix and [100] Framed-IPv6-Pool, which also assigns IPv6 addressing to the wan-side of a host via SLAAC or DHCPv6 IA-NA. Attribute is also used in CoA and Disconnect Message (part of the ESM or AA user identification-key). Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no ipv6-address.For data-triggered authentication of an IPv6 UE in Distributed Subscriber Management (DSM) context, this attribute contains the IPv6 address that triggered the request. Inclusion of this attribute is configured under configure aaa isa-radius-policy <policy-name> auth-include-attributes ipv6-address. Send to RADIUS all DHCPv4 options received in a DHCPv4 message triggering authentication. The dhcpv4 options are concatenated in the attribute up to maximum length per attribute (see limits). If more space is needed, an additional attribute is included. If the total dhcp options space requires more than the total maximum length (see limits), then no attributes are included. (configure subscriber-mgmt authentication-policy <name> include-radius-attribute dhcp-options, configure aaa isa-radius-policy <name> auth-include-attributes dhcp-options). The ATM Traffic Descriptor override for a PPPoA or PPPoEoA host and refers to the pre-configured traffic description QoS profile applied on the ingress ATM Virtual Circuit (configure qos atm-td-profile <traffic-desc-profile-id>). All subscriber hosts on a given ATM VC must have same ATM traffic descriptors and this attribute is ignored if it specifies an ATM Traffic Descriptor override while it has already specified another one for another host on the same ATM Virtual Circuit. A pre-configured description profile per ATM Virtual Circuit is used when this attribute is omitted. (configure subscriber-mgmt msap-policy <msap-policy-name> atm egress/ingress traffic-desc or configure service vprn <service-id> subscriber-interface <ip-int-name> group-interface <ip-int-name> sap <sap-id> atm egress/ingress traffic-desc). A Traffic Descriptor profile above the Limit is treated as a setup failure. Unreferenced Traffic Descriptor profiles within the Limit, or a Traffic Descriptor profile for a non ATM host are silently ignored. The ATM Traffic Descriptor override for a PPPoA or PPPoEoA host and refers to the pre-configured traffic description QoS profile applied on the egress ATM Virtual Circuit (configure qos atm-td-profile <traffic-desc-profile-id>). All subscriber hosts on a given ATM VC must have same ATM traffic descriptors and this attribute is ignored if it specifies an ATM Traffic Descriptor override while it has already specified another one for another host on the same ATM Virtual Circuit. A pre-configured description profile per ATM Virtual Circuit is used when this attribute is omitted (configure subscriber-mgmt msap-policy atm egress/ingress traffic-desc or configure service vprn <service-id> subscriber-interface <ip-int-name> group-interface <ip-int-name> sap <sap-id> atm egress/ingress traffic-desc). A Traffic Descriptor profile above the Limits is treated as a setup failure. Unreferenced Traffic Descriptor profiles within the Limits, or a Traffic Descriptor profile for a non ATM host are silently ignored. The name of an assigned pool that should be used to assign an IPv6 prefix via DHCPv6(IA-PD) to the LAN side of the user (IPoE, PPPoE). Maps to DHCPv6 vendor-option[17],sub-option[2] pfx-pool. Alc-Delegated-ipv6-pool names longer than the allowed maximum are treated as host setup failures. Alternative method for [123] Delegated-IPv6-Prefix so simultaneous returned attributes [123] Delegated-IPv6-Prefix and [26-6527-131] Alc-Delegated-IPv6-Pool are handled as host setup failures. The length information [DPL] can be supplied via [26-6527-161] Alc-Delegated-IPv6-Prefix-Length along with the pool name. The [26-6527-161] Alc-Delegated-IPv6-Prefix-Length has priority over other possible sources of DPL. (As a fixed or variable DPL under configure service ies/vprn subscriber-interface ipv6 delegated-prefix-length or on the dhcpv6 server configure router dhcp6 local-dhcp-server <server-name> pool <pool-name> delegated-prefix-length). Defines the IA-PD length information [DPL] and only applicable together with [26-6527-131] Alc-Delegated-IPv6-Pool (silently ignored if received in RADIUS Accept without Alc-Delegated-IPv6-Pool). Maps to DHCPv6 vendor-option[17] ,sub-option[3] pfx-len. The [26-6527-161] Alc-Delegated-IPv6-Prefix-Length has priority over other possible sources of DPL. (As a fixed or variable DPL under configure service ies/vprn <service-id> subscriber-interface <ip-int-name> ipv6 delegated-prefix-length or on the dhcpv6 server configure router dhcp6 local-dhcp-server <server-name pool <pool-name> delegated-prefix-length). DPL values outside the limits are treated as setup failures. Status of the DSL line obtained via ANCP can be one of three value: SHOWTIME (the modem is ready to transfer data), IDLE (line is idle) or SILENT (line is silent). Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. The URL to which traffic matching the host’s IPv4 filter entry with http-redirect action is redirected to. The URL overrides the configured URL in the redirect filter. Radius overrides must explicitly be enabled: configure filter ip-filter <filter-id> entry <entry-id> action http-redirect <rdr-url-string> allow-radius-override. The URL to which traffic matching the host’s IPv6 filter entry with http-redirect action is redirected to. The URL overrides the configured URL in the redirect filter. RADIUS overrides must explicitly be enabled: configure filter ipv6-filter <filter-id> entry <entry-id> action http-redirect <rdr-url-string> allow-radius-override. Per SAP unique PPPoE or IPoE session index that can be included in RADIUS Access Request messages. The lowest free index is assigned to a new PPPoE or IPoE session. Attribute is included or excluded based on configure subscriber-mgmt authentication-policy <name> include-radius-attribute sap-session-index. Attribute is included/excluded based on configure subscriber-mgmt authentication-policy <name> include-radius-attribute dhcp6-optionsFor DHCPv6 triggered authentication in a Distribute Subscriber Management (DSM) context, this attribute contains the DHCPv6 client options as sent to the WLAN-GW. Inclusion of this attribute is configured via configure aaa isa-radius-policy <policy-name> auth-include-attributes dhcp6-options. Specifies the UPnP policy to use for this l2aware subscriber. The policy must be configured in configure service upnp upnp-policy <policy-name>.Overrides the configured policy in the sub-profile for the subscriber: configure subscriber-mgmt sub-profile <name> upnp-policy <policy-name>.
The service ID of the retailer to which this subscriber host belongs. (configure service ies/vprn <retail-service-id> subscriber-interface retail-interface-id fwd-service <wholesale-service-id> fwd-subscriber-interface wholesale-interface-name>). Returning an IES service ID for an IPoEv4 host is treated as a session setup failure. The service-id (IES/VPRN) where Managed SAP’s are created.(configure service ies/vprn <service-id>). If this attribute is omitted, use msap defaults created under ludb or capture VPLS.(configure subscriber-mgmt local-user-db <local-user-db-name> ppp/dhcp host msap-defaults service <service-id> or configure service vpls <service-id sap <sap-id> msap-defaults service <service-id>). This omitted attribute without explicit created msap-defaults is treated as a setup failure. Managed sap policy-name used to create Managed SAPs and refers to the CLI context configure subscriber-mgmt msap-policy <msap-policy-name>). The policy contains similar parameters that would be configured for a regular subscriber SAP. If this attribute is omitted we have to option to will fall back to msap defaults created under ludb or capture VPLS. (configure subscriber-mgmt local-user-db ppp/dhcp host msap-defaults policy <msap-policy-name> or configure service vpls sap msap-defaults policy <msap-policy-name>).This omitted attribute without explicit created msap-defaults is treated as a setup failure. The group-interface-name where Managed SAPs are created and refers to CLI context configure service ies/vprn subscriber-interface <ip-int-name> group-interface <ip-int-name> policy <msap-policy-name>. If this attribute is omitted we have to option to will fall back to msap defaults created under ludb or capture VPLS. (configure subscriber-mgmt local-user-db <local-user-db-name> ppp/dhcp host msap-defaults group-interface <ip-int-name> or configure service <service-id> vpls sap <sap-id> msap-defaults group-interface <ip-int-name>). Strings above the Limits and an omitted attribute without explicit created msap-defaults are treated as setup failures.
Table 11: Business Access (description) Routing information (IPv4 managed route) to be configured on the NAS for a host (dhcp, pppoe, arp) that operates as a router without NAT (so called routed subscriber host). The route included in the Framed-Route attribute is accepted as a managed route only if it's next-hop points to the hosts ip-address or if the next-hop address equals 0.0.0.0 or if the included route is a valid classful network in case the subnet-mask is omitted. If neither is applicable, this specific framed-route attribute is ignored and the host is instantiated without this specific managed route installed. A Framed-Route attribute is also ignored if the SAP does not have anti-spoof configured to nh-mac (the host will be installed as a standalone host without managed route). Number of routes above Limits are silently ignored. Optionally, a metric, tag and/or protocol preference can be specified for the managed route. If the metrics are not specified or specified in a wrong format or specified with out of range values then default values are used for all metrics: metric=0, no tag and preference=0. If an identical managed route is associated with different routed subscriber hosts in the context of the same IES/VPRN service up to <max-ecmp-routes> managed routes are installed in the routing table (configured as ecmp <max-ecmp-routes> in the routing instance). Candidate ECMP Framed-Routes have identical prefix, equal lowest preference and equal lowest metric. “lowest ip next-hop” is the tie breaker if more candidate ECMP Framed-Routes are available than the configured <max-ecmp-routes>. Other identical managed routes are shadowed (not installed in the routing table) and an event is logged. An alternative to RADIUS managed routes are managed routes via host dynamic BGP peering.Valid RADIUS learned managed routes can be included in RADIUS accounting messages with following configuration: configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute framed-route. Associated managed routes for an instantiated routed subscriber host are included in RADIUS accounting messages independent of the state of the managed route (Installed, Shadowed or HostInactive). Routing information (ipv6 managed route) to be configured on the NAS for a v6 wan host (IPoE or PPPoE) that operates as a router. The functionality is comparable with offering multiple PD prefixes for a single host. The route included in the Framed-IPv6-Route attribute is accepted as a managed route only if it's next-hop is a wan-host (DHCPv6 IA-NA or SLAAC) or if the next-hop address equals ::. As a consequence, Framed-IPv6-Routes with explicit configured gateway prefix of a pd-host (DHCPv6 IA-PD) will not be installed. A Framed-Route attribute is also ignored if the SAP does not have anti-spoof configured to nh-mac (the host will be installed as a standalone host without managed route). Number of Routes above Limits are silently ignored. Optionally, a metric, tag and/or protocol preference can be specified for the managed route. If the metrics are not specified or specified in a wrong format or specified with out of range values then default values are used for all metrics: metric=0, no tag and preference=0. If an identical managed route is associated with different routed subscriber hosts in the context of the same IES/VPRN service up to <max-ecmp-routes> managed routes are installed in the routing table (configured as ecmp <max-ecmp-routes> in the routing instance). Candidate ECMP Framed-IPv6-Routes have identical prefix, equal lowest preference and equal lowest metric. “lowest ip next-hop” is the tie breaker if more candidate ECMP Framed-IPv6-Routes are available than the configured <max-ecmp-routes>. Other identical managed routes are shadowed (not installed in the routing table) and an event is logged. Valid RADIUS learned managed routes can be included in RADIUS accounting messages with following configuration: configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute framed-ipv6-route. Associated managed routes for an instantiated routed subscriber host are included in RADIUS accounting messages independent of the state of the managed route (Installed, Shadowed or HostInactive). Refers to a pre-configured policy under configure subscriber-mgmt bgp- peering-policy <policy-name>. Mandatory attribute for dynamic BGPv4 peering. The referenced policy contains all required parameters to setup the dynamic BGPv4 peer. Peer-AS, MD5 key, Authentication-Keychain and import/export policies can be overridden by optional RADIUS attributes. Dynamic BGPv4 peering related attributes are ignored if the session or host does not terminate in a VPRN. Host setup is successful, but without BGPv4 peering if a non existing policy-name is received or if the SAP anti-spoof type is different from nh-mac. Policy names above the maximum length result in a host setup failure. Optional attribute for dynamic BGPv4 peering. Refers to the keychain parameters (configure system security keychain <keychain-name>) used to sign and/or authenticate the BGP protocol stream via the TCP enhanced authentication option (draft-bonica-tcp-auth). Host setup is successful but without BGPv4 peering if a non existing keychain name is received. Keychain names above the maximum length result in a host setup failure. Alternative for [26-6527-57] Alc-BGP-Auth-Key. Optional attribute for dynamic BGPv4 peering. Refers to a pre-configured BGP export policy (configure router policy-options policy-statement <name>). The RADIUS received policy is appended to the peer (if pre-configured policies for peer are smaller than 15) or replaces the fifteenth policy (if pre-configured policies for peer are exact 15). Host setup is successful but without export policy applied if a non existing policy-name is received. Policy names above the maximum length result in a host setup failure. Optional attribute for dynamic BGPv4 peering. Refers to a pre-configured BGP import policy (configure router policy-options policy-statement <name>). The RADIUS received policy is appended to the peer (if pre-configured policies for peer are smaller than 15) or replaces the fifteenth policy (if pre-configured policies for peer are exact 15). Host setup is successful but without import policy applied if a non existing policy-name is received. Policy names above the maximum length result in a host setup failure. Refers to the pre-configured policy under configure subscriber-mgmt rip-policy <policy-name> and enables the BNG to listen to RIPv1/v2 messages from the host (master SRRP node only in case of a dual-homed BNG). The referenced policy contains the authentication-type and authentication-key used to establish a RIP neighbor with this host. Host setup is successful, but the RIP message from the host are ignored if a non-existing policy name is received or if the SAP anti-spoof type is different from nh-mac. Policy names above the maximum length result in a host setup failure. Refers to a pre-configured policy under configure subscriber-mgmt bgp- peering-policy <policy-name>. Mandatory attribute for dynamic BGPv6 peering. The referenced policy contains all required parameters to setup the dynamic BGPv6 peer. Peer-AS, MD5 key, Authentication-Keychain and import/export policies can be overridden by optional RADIUS attributes. Dynamic BGPv6 peering related attributes are ignored if the session or host does not terminate in a VPRN. Host setup is successful, but without BGPv6 peering if a non-existing policy name is received or if the SAP anti-spoof type is different from nh-mac. Policy names above the maximum length result in a host setup failure. Optional attribute for dynamic BGPv6 peering. Refers to the keychain parameters (configure system security keychain <keychain-name>) used to sign and/or authenticate the BGPv6 protocol stream via the TCP enhanced authentication option (draft-bonica-tcp-auth). Host setup is successful but without BGPv6 peering if a non existing keychain name is received. Keychain names above the maximum length result in a host setup failure. Alternative for [26-6527-201] Alc-BGP-IPv6-Auth-Key Optional attribute for dynamic BGPv6 peering. Refers to a pre-configured BGP export policy (configure router policy-options policy-statement <name>). The RADIUS received policy is appended to the peer (if pre-configured policies for peer are smaller than 15) or replaces the fifteenth policy (if pre-configured policies for peer are exact 15). Host setup is successful but without export policy applied if a non existing policy name is received. Policy names above the maximum length result in a host setup failure. Optional attribute for dynamic BGPv6 peering. Refers to a pre-configured BGP import policy (configure router policy-options policy-statement <name>). The RADIUS received policy is appended to the peer (if pre-configured policies for peer are smaller than 15) or replaces the fifteenth policy (if pre-configured policies for peer are exact 15). Host setup is successful but without import policy applied if a non existing policy name is received. Policy names above the maximum length result in a host setup failure.
Table 12: Business Access (limits)
Table 13: Business Access (applicability)
Refers to a pre-configured category-map (configure subscriber-mgmt category-map <category-map-name>) that holds the credit-type (volume or time) and information for maximum three pre-defined categories (for example: category-names data in and out, video+data, etc.), their mappings to individual forwarding queues/policers, out-of-credit-actions and alike. The category-map-name can also be assigned via the ludb, or credit-control-policy if the attribute is omitted. This attribute is ignored if the host has no credit-control-policy defined in its sla-profile instance. Strings with length above the Limits are treated as a setup failure.
Table 15: Accounting: On-line Charging (limits)
Table 19: IP and IPv6 Filters (applicability) The format for [92] Nas-Filter-Rule and [26-6527-158] Alc-Nas-Filter-Rule-Shared is a string formatted as: <action> <direction> <protocol> from <source> to <destination> <options>. Table 20 displays details on the respective fields.
Table 20: [92] Nas-Filter-Rule Attribute Format The format for [242] Ascend-Data-Filter and [26-6527-159] Alc-Ascend-Data-Filter-Host-Spec is an octet string with fixed length fields. Table 21 displays details on the respective fields.
Table 23: Subscriber Host Creation (limits)
Table 24: Subscriber host creation (applicability)
Table 25: Subscriber Services (description)
Table 26: Subscriber Services (limits)
Table 27: Subscriber Services (applicability)
Table 28: WLAN Gateway (description) Calling-station-id contains the MAC address of the UE, if it is configured for inclusion in isa-radius-policy for authentication generated from the ISA (for a UE in migrant state), or in authentication and accounting policy for messages generated from the CPM. For CPM generated authentication or accounting, the inclusion of calling-station-id MUST explicitly specify the format of the calling-station-id as MAC: configure subscriber-mgmt authentication-policy | radius-accounting-policy name include-radius-attribute calling-station-id mac. Used when authenticating migrant hosts. When an access-accept contains this attribute, the host will stay in migrant phase, but will have limited forwarding capabilities. All filtered (not allowed) http-traffic will be redirected to a specified portal URL. This attribute must contain the name of a redirect policy configured under subscriber-mgmt http-redirect-policy <policy-name> which will specify a set of forwarding filters.
It is also allowed to just send an empty Alc- Wlan-Portal-Redirect VSA to force a redirect with the configured policy and url. If a migrant host is redirected, specifies the URL it has to be redirected to, takes precedence over the URL configured in the redirect policy under subscriber-mgmt http-redirect-policy <policy-name>. Specifies if part of the UE traffic is allowed to be locally broken out (such as, NAT’ed and routed), subject to matching a filter with gtp-local-breakout action, associated with the UE. If a one-time redirect is enabled for a distributed subscriber management host, specifies the URL it has to be redirected to. This URL overrides the configured URL under configure service ies/vprn <svc-id> subscriber-interface <subscriber-interface-name> group-interface <group-interface-name> wlan-gw vlan-tag-ranges range start <starting-vlan> end <ending-vlan> distributed-sub-mgmt one-time-redirect. Specifies the name of a distributed subscriber management (DSM) ip filter configured under configure subscriber-mgmt wlan-gw distributed-sub-mgmt dsm-ip-filter <ip-filter-name>. This filter will be applied to the DSM UE. This overrides the value configured under configure service ies/vprn <svc-id> subscriber-interface <subscriber-interface-name> group-interface <group-interface-name> wlan-gw vlan-tag-ranges range start <starting-vlan> end <ending-vlan> distributed-sub-mgmt dsm-ip-filter. Specifies the name of a distributed subscriber management (DSM) ingress policer configured under configure subscriber-mgmt wlan-gw distributed-sub-mgmt dsm-policer <policer-name>. This policer will be applied to the DSM UE. This overrides the value configured under configure service ies/vprn <svc-id> subscriber-interface <subscriber-interface-name> group-interface <group-interface-name> wlan-gw vlan-tag-ranges range start <starting-vlan> end <ending-vlan> distributed-sub-mgmt ingress-policer. Specifies the name of a distributed subscriber management (DSM) egress policer configured under configure subscriber-mgmt wlan-gw distributed-sub-mgmt dsm-policer <policer-name>. This policer will be applied to the DSM UE. This overrides the value configured under configure service ies/vprn <svc-id> subscriber-interface <subscriber-interface-name> group-interface <group-interface-name> wlan-gw vlan-tag-ranges range start <starting-vlan> end <ending-vlan> distributed-sub-mgmt egress-policer.
Table 29: WLAN Gateway (limits)
Table 30: WLAN Gateway (applicability)
Table 31: Dynamic Data Services (description)
Table 32: Dynamic Data Services (limits)
Table 33: Dynamic Data Services (applicability) Table 34 lists the mandatory/optional attributes in CoA messages to the control channel.
Table 35: Lawful Intercept (description) Specifies the <service-id> that holds the mirror details (configure mirror mirror-dest <service-id>). Values above the Limits or unreferenced are treated as a setup failure. Used when clearing all radius li triggered sources from a mirror destination via CoA ([26-6527-122 Alc-LI-Action = 'clear-dest-service'). The policy defined in this attribute is used to authenticate the CoA and refers to configure subscriber-mgmt authentication-policy <name>. The attribute is mandatory if the RADIUS CoA server is configured in the authentication policy (config>subscr-mgmt>auth-plcy>radius-auth-server). The attribute is ignored if the RADIUS CoA server is configured in the radius-server context of the routing instance (config>router>radius-server or config>service>vprn>radius-server). Values above the Limits or unreferenced policies are treated as a setup failure.
Table 36: Lawful Intercept (limits)
Table 37: Lawful Intercept (applicability)
Table 38: IPSEC (description) configure service ies/vprn <svc-id> interface <interface-name> sap <sap-id> ipsec-gw <gw-name> pre-shared-keyconfigure service vprn <svc-id> interface <interface-name> sap <sap-id> ipsec-tunnel <tnl-name> dynamic-keying pre-shared-key The local gateway address of IKEv2 remote-access tunnel. The attribute can be included/excluded with configure ipsec radius-authentication-policy <policy-name> include-radius-attribute called-station-id or configure ipsec radius-accounting-policy <policy-name> include-radius-attribute called-station-id. The peer’s address and port of IKEv2 remote-access tunnel. The format is “address:port”, for example, “10.1.1.1:1546”. he attribute can be included/excluded with configure ipsec radius-authentication-policy <policy-name> include-radius-attribute calling-station-id or configure ipsec radius-accounting-policy <policy-name> include-radius-attribute caling-station-id. The public SAP ID of IKEv2 remote-access tunnel. The attribute can be included/excluded with configure ipsec radius-authentication-policy <policy-name> include-radius-attribute nas-port-id or configure ipsec radius-accounting-policy <policy-name> include-radius-attribute nas-port-id. IPSec private service id, used by IKEv1/v2 remote-access tunnel, referring to the preconfigured VPRN where the IPSec tunnel terminates (configure service vprn <service-id>). A default private service is used when this attribute is omitted (configure service vprn interface sap ipsec-gw default-secure-service). If the returned service id doesn't exist/out-of limits or exists but not a VPRN service, the tunnel setup will fail. Private IPSec interface name, used by IKEv1/v2 remote-access tunnel, refers to a preconfigured private ipsec interface the IPSec tunnel terminates (config>service>vprn>interface <int-name> tunnel). A default private interface is used when this attribute is omitted (config>service>ies>if>sap>ipsec-gw>default-secure-service <service-id> interface <ip-int-name>); the maximum length is 32 bytes; if the returned interface doesn't exist/exceed the maximum length or exists but is not a private ipsec interface, the tunnel setup will fail. IPSec tunnel-template id, used by IKEv1/v2 remote-access tunnel, refers to a preconfigured ipsec tunnel-template (configure ipsec tunnel-template <ipsec template identifier>). A default tunnel-template is used when this attribute is omitted (configure service vprn interface sap ipsec-gw default-tunnel-template <template-id>). If the returned template does not exist or exceeds the limits, the tunnel setup will fail. IPSec phase2 SA lifetime in seconds, used by IKEv1/v2 remote-access tunnel. A pre-configured value is used when this attribute is omitted (configure ipsec ike-policy ipsec-lifetime <ipsec-lifetime>). Values outside the Limits are treated as a tunnel setup failure. IPSec PFS group id, used by IKEv1/v2 remote-access tunnel. The PFS group in ike-policy is used when this attribute is omitted (configure ipsec ike-policy 1 pfs dh-group <grp-id>); if the returned value is not one of the allowed value, the tunnel setup will fail. IPSec phase2 SA Encryption Algorithm, used by IKEv1/v2 remote-access tunnel. The esp-encryption-algorithm in ipsec-transform is used when this attribute is omitted (configure ipsec ipsec-transform esp-encryption-algorithm <algo>). This attribute must be used along with Alc-IPsec-SA-Auth-Algorithm, otherwise tunnel setup will fail. Values different then the Limits are treated as a setup failure. IPSec phase2 SA Authentication Algorithm, used by IKEv1/v2 remote-access tunnel. The esp-auth-algorithm in ipsec-transform is used when this attribute is omitted (configure ipsec ipsec-transform esp-auth-algorithm <algo>). Values different than the Limits are treated as a tunnel setup failure. This attribute must be used along with Alc-IPsec-SA-Encr-Algorithm, otherwise tunnel setup will fail. IPSec anti-replay window size, used by IKEv1/v2 remote-access tunnel. The replay-window size in tunnel-template is used when this attribute is omitted (configure ipsec tunnel-template replay-window <size>). Values different than the Limits are treated as a tunnel setup failure
Table 39: IPSEC (limits)
Table 40: IPSEC (applicability)
Table 41: Application Assurance (description) Application Assurance for residential, business or transit-AA subscribers is enabled through the assignment of an application profile as part of either enhanced subscriber management or static configuration. [26-6527-45] Alc-App-Prof-is is a string that maps (configure subscriber-mgmt sub-ident-policy <sub-ident-policy-name> app-profile-map) to such an application profile (configure application-assurance group <aa-group-id:partition-id> policy app-profile <app-profile-name>). This attribute is used in access-accept (to assign an application profile during esm host creation) and CoA (to change the application profile of a AA-subscriber or to create transit AA-subscriber). Strings longer than the allowed maximum are treated as setup failures. Unreferenced strings (strings not mapping to an application profile) will silently trigger a fallback to pre-configured default values if allowed. If no default value is pre-configured, the subscriber's application profile is silently disabled for esm AA-subscriber; in case of a transit AA-subscriber creation the CoA will be rejected. The change of an application profile to one configured under a different group/partition or the modification of the application profile of a static AA-subscriber is not allowed and will be treated as setup failures.
Table 42: Application Assurance (limits) Format charteristic=value,
Table 43: Application Assurance (applicability)
“Base” — The ipv4 address of the system interface (configure router interface system address <address>). The address can be overwritten with the configured source-address (configure system security source-address application radius <ip-int-name|ip-address>) “Base” — The IPv6 address of the system interface (configure router interface system ipv6 address <ipv6-address>). The address can be overwritten with the configured ipv6-source-address (configure system security source-address application6 radius <ipv6-address>) The user profile(s) that the user has access to and refers to pre-configured user-profile-name's (configure system security profile <user-profile-name>). These pre-configured profiles hold a default-action, a match command-string and a command-action. Unreferenced profiles names are silently ignored. If the maximum number of profile strings is violated, or if a string is too long, processing the input is stopped but authorization continues and too long profile string (and all strings followed by that) are ignored. Each user can have multiple profiles and the order is important. The first user profile has highest precedence, followed by the second and so on. Note: For each authenticated RADIUS user a temporary profile with name [1]User-Name is always created (show system security profile) and executed as last profile. This temporary profile is build from the mandatory attribute [26-6527-5]Timetra-Default-Action and optional attributes [26-6527-6] Timetra-Cmd, [26-6527-7] Timetra-Action.
Table 47: AAA Route Downloader (description) Maps to configure aaa route-downloader <name> base-user-name <user-name> were the base-user-name sets the prefix for the username that shall be used in access requests. The actual name used will be a concatenation of this string, a “ -” (hyphen) character and a monotonically increasing integer. Consecutive Access-Requests with incrementing User-Name are repeated until the aaa route download application receives an Access-Reject. Default is system-name. Maps to configure aaa route-downloader <name> password <password> in the RADIUS-Access request. Default is empty string. The RADIUS route-download application periodically sends a RADIUS Access-Request message to the RADIUS server to request that ipv4/ipv6 routes be downloaded. The RADIUS server responds with an Access-Accept message and downloads the configured ipv4/ipv6 routes. When the download operation is complete, the route-download application installs the ipv4/ipv6 routes in the routing table as black-hole routes with protocol Periodic and with fixed preference 255. A default metric (configure aaa route-downloader <name> default-metric [0..254]) is installed when the metric value is omitted in the formatted attribute. A default tag (configure aaa route-downloader <name> default-tag [0..4294967295]) is installed when the tag value is omitted in the formatted attribute. The complete RADIUS Access Accept is ignored (failed to parse route) if at least one route has the wrong format. Only the individual route is silently ignored (not seen as a process download failure) if the formatted vprn service or service-name is invalid. Routes no longer present in the download will be removed from the routing table and new routes are added, same routes are not replaced. Routes with different tags or metrics are seen as new routes. If the AAA server responds with an Access-Reject for the first username, then all routes will be removed from the routing table (implicit empty route-download table). The route-download application accepts downloaded ipv4 routes in either [22] Framed-Route or [26-1] Cisco-AVpair attribute format.
Table 48: AAA Route Downloader (limits)
Table 49: AAA Route Downloader (applicability) The Acct Reporting Level column in Table 54 shows the accounting mode messages that report the attribute:configuresubscriber-mgmtauthentication-policy <policy-name>include-radius-attribute acct-session-id [host|session]configuresubscriber-mgmtradius-accounting-policy <policy-name>session-id-format {description|number}
The reporting of volume counters in accounting is coupled to the sending of periodic or host triggered Accounting Interim Updates messages. Volume based accounting is therefore enabled via the interim-update CLI parameter for all accounting modes and/or by the host-update CLI parameter in session accounting mode as shown in Table 51.
Table 51: Accounting Statistics Type The different sets of volume accounting attributes that can be included in the Accounting Interim and Stop messages are controlled via include-radius-attribute CLI commands. Multiple volume reporting types can be enabled simultaneously:configuresubscriber-mgmtradius-accounting-policy <name>include-radius-attribute[no] detailed-acct-attributes # 64 bit per queue/policer counters[no] std-acct-attributes # 32 bit aggregate counters (v4+v6)[no] v6-aggregate-stats # 32 bit aggregate counters (v6 only)
(*) Note on acct-on/off: The table represents the acct-on-off attributes for an accounting server configured via a radius-server-policy (configure subscriber-mgmt radius-accounting-policy <name> radius-server-policy <radius-server-policy-name> and with acct-on-off enabled. If the accounting server is configured direct under the radius-accounting-server (configure subscriber-mgmt radius-accounting-policy <name> radius-accounting-server server <server-index>, then the following attributes are not sent in acct-on/off messages: [44] Acct-Session-Id, [45] Acct-Authentic and [49] Acct-Terminate-Cause; and attribute [26-6527-12] Alc-Subsc-Prof-Str is sent.Acct-Status-Type and Acct-Session-Id are always included by default. The presence of all other attributes is dictated by configuration (configure>aaa>isa-radius-policy <name>>acct-include-attributes). The attribute description and limits are the same as for Enhanced Subscriber Management (ESM) Accounting (Table 52 and Table 53), Table 55 below provides an overview of the applicability of the attributes in DSM accounting messages.Accounting On and Accounting Off messages are generated when a server is enabled or disabled in an isa-radius-policy (configure>aaa>isa-radius-policy <name> servers <id>>[no] shutdown). An accounting-On will also be generated every 5 minutes for a RADIUS server that is unresponsive.
This section specifies the attributes for RADIUS accounting on subscriber service instances. The attributes included in the subscriber service accounting messages are identical to the attributes that are included in the associated parent subscriber host accounting session (Host accounting mode for IPoE and Session accounting mode for PPPoE). Volume counters are always reported in standard attributes. Differences for attribute content and additional attributes are detailed in Table 56.
Accounting session id of the parent PPPoE/IPoE session (session acct-session-id) or IPoE host (host acct-session-id). The format (variable length description or fixed 22B hexadecimal number) is identical to the parent PPPoE/IPoE session or IPoE host and determined by session-id-format in the radius-accounting- policy (configure subscriber-mgmt radius-accounting-policy <policy-name> session-id-format {number|description}).
Table 57: Subscriber Service Accounting (limits)
Table 59: LSN Accounting (description) Refers to the user-name reported in Accounting for subscriber-aware or subscriber-unaware Large Scale NAT users. The reported format for subscriber-unaware users is LSN44@, DS-lite@ or NAT64@ followed by the users inside ipv4 or ipv6 address. The reported format and length for subscriber-aware users is configured and driven by configure router nat inside subscriber-identification and send when user-name is included under configure aaa isa-radius-policy <name>. This attribute has the same content as [26-6527-11] Alc-Subsc-ID-Str for subscriber-unaware Large Scale NAT users. The identifying IP Address of the NAS requesting the Authentication or Accounting and maps to the ipv4 address from the system interface (configure router interface system address <ip-address>). Refers to the inside private IP address of the user (LSN44) and send when framed-ip-addr is included in configure aaa isa-radius-policy <name>. Holds information to which nat-group and nat-member the NAT user belongs. The format of this attribute is a string 00-00-00-00-<NatGroup>-<NatMember>. The command show isa nat-group holds the link between ms-isa mda, NatGroup and NatMember. Optionally sent when called-station-id is included under configure aaa isa-radius-policy <name>. A string (configure system name <system-name>) identifying the NAS originating the Authentication or Accounting requests and sent when nas-identifier is included for the corresponding application: configure subscriber-mgmt authentication-policy (ESM authentication), configure subscriber-mgmt radius-accounting-policy (ESM accounting), configure aaa isa-radius-policy (LSN accounting, WLAN-GW) and configure aaa l2tp-accounting-policy (L2TP accounting). This unique 16 bytes attribute has two different behaviors. If multi-session-id is not included under configure aaa isa-radius-policy <name> then multiple port-ranges for the same user are all reported with a common 16 bytes [44] Acct-Session-id for the different port-ranges and reported via start, interim and stop accounting messages and without attribute [50] Acct-Multi-Session-Id. If multi-session-id is configured under configure aaa isa-radius-policy <name> then multiple port-ranges for the same user are reported with different 16 bytes [44] Acct-Session-id via start and stop accounting messages with an additional common 16 bytes attribute [50] Acct-Multi-Session-Id. For an accounting-on and accounting-off the first 8 bytes from the 16 bytes are put to zero. This unique 16 bytes attribute has two different behaviors. If multi-session-id is not included under configure aaa isa-radius-policy <name> then multiple port-ranges for the same user are all reported with a common 16 bytes [44] Acct-Session-id for the different port-ranges and reported via start, interim and stop accounting messages and without attribute [50] Acct-Multi-Session-Id. If multi-session-id is yes included under configure aaa isa-radius-policy <name> then multiple port-ranges for the same user are reported with different 16 bytes [44] Acct-Session-id via start and stop accounting messages with an additional common 16 bytes attribute [50] Acct-Multi-Session-Id. Indicates how many times (zero or more) the [42] Acct-Input-Octets counter has wrapped around 2^32 in the course of delivering this service and send together with [42] Acct-Input-Octets, [43] Acct-Output-Octets and [53] Acct-Output-Gigawords when octet-counters is included under configure aaa isa-radius-policy <name. Indicates how many times (zero or more) the [43] Acct-Output-Octets counter has wrapped around 2^32 in the course of delivering this service and send together with [42] Acct-Input-Octets, [43] Acct-Output-Octets and [52] Acct-Input-Gigawords when octet-counters is included under configure aaa isa-radius-policy <name>. Record the time that this event occurred on the NAS, in seconds since January 1, 1970 00:00 UTC and send when hardware-timestamp is included under configure aaa isa-radius-policy <name>. Inside private ipv6address of the user (NAT64,DSLITE) and send when framed-ip-addr is included under configure aaa isa-radius-policy <name>. The reported format is LSN44@, DS-lite@ and NAT64@ followed by the users inside ipv4 or ipv6 address and send when nat-subscriber-string is included under configure aaa isa-radius-policy <name>. This attribute has the same content as [1]User-Name for subscriber-unaware Large Scale NAT users. Refers in the Accounting-Request to the inside VRF used for LSN subscribers using RADIUS LSN accounting (configure aaa isa-radius-policy nat acct-include-attributes inside-service-id). The outside VRF is reported via [26-6527-140] Alc-Nat-Outside-Serv-Id and both attributes are not included if instance's are Base. Holds for the NAT user his public outside ipv4 address, his assigned outside public port range and the outside routing instance. For LSN accounting, the attribute is sent when port-range-block is included under configure aaa isa-radius-policy.
The attribute is also sent for ESM subscriber accounting if NAT is enabled and if configured in configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute nat-port-range. Refers to the public outside service-id and send when outside-service-id is included under configure aaa isa-radius-policy and the service-id is different than the base instance. Holds for the NAT user his public outside ipv4 address and send when outside-ip is included under configure aaa isa-radius-policy <name>. The content of this attribute is identical to the outside ipv4 address in [26-6527-121] Alc-Nat-Port-Range.
Table 60: LSN Accounting (limits)
Table 61: LSN Accounting (applicability)
Table 62: L2TP Tunnel Accounting (description) “Base” or “VPRN” — The ipv4 address of the system interface (configure router interface system address <address>).The address can be overwritten with the configured source-address (configure aaa radius-server-policy <policy-name> servers source-address <ip-address>). The physical access-circuit on the NAS which is used for the Authentication or Accounting of the user. The format of this attribute is configurable on the NAS as a fixed 32 bit value or a parameterized 32 bit value. The parameters can be a combination of outer-vlan-id(o), inner-vlan-id(i), slot number(s), MDA number(m), port number or lag-id(p), ATM VPI(v) and ATM VCI(c), fixed bit values zero (0) or one (1) but cannot exceed 32 bit. The format can be configured for following applications: configure aaa l2tp-accounting-policy <name> include-radius-attribute nas-port, configure router l2tp cisco-nas-port, configure service vprn <service-id> l2tp cisco-nas-port, configure subscriber-mgmt authentication-policy <name> include-radius-attribute nas-port, configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute nas-port. A string (configure system name <system-name>) identifying the NAS originating the Authentication or Accounting requests and sent when nas-identifier is included for the corresponding application: configure subscriber-mgmt authentication-policy (ESM authentication), configure subscriber-mgmt radius-accounting-policy (ESM accounting), configure aaa isa-radius-policy (LSN accounting, WLAN-GW) and configure aaa l2tp-accounting-policy (L2TP accounting). Indicates how many seconds the client has been trying to send this accounting record for. This attribute is included with value 0 in all initial accounting messages. Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no acct-delay-time. The type of the physical port of the NAS which is authenticating the user and value automatically determined from subscriber SAP encapsulation. It can be overruled by configuration. Included only if include-radius-attribute nas-port-type is added per application: configure subscriber-mgmt authentication-policy (ESM authentication), configure subscriber-mgmt radius-accounting-policy (ESM accounting), configure aaa isa-radius-policy (LSN accounting, WLAN-GW) and configure aaa l2tp-accounting-policy (L2TP accounting). Checked for correctness if returned in CoA. The dotted-decimal IP address of the initiator end of the tunnel. Pre-configured values are used when attribute is omitted (configure router/service vprn <service-id> l2tp local-address). If omitted in Access Accept on LAC and no local-address configured, then the address is taken from the interface with name system. This attribute is included on LNS in the Access-Request and Acct-Request only if the CLI RADIUS policy include-radius-attribute tunnel-server-attrs is enabled on 7x50 LNS. For L2TP Tunnel/Link Accounting this attribute is always included on LAC and LNS as untagged. LAC : a text string identifying the physical access circuit (slot/mda/port/outer-vlan.inner-vlan) of the user that requested the Authentication and/or Accounting. The physical port on LAC can have an optional prefix-string (max 8 chars) and suffix-string (max 64 chars) added (configure aaa l2tp-accounting-policy <policy-name> include-radius-attribute nas-port-id prefix-string <string> suffix(circuit-id|remote-id )). LNS: a text string identifying the logical access circuit of the user that requested the Authentication and/or Accounting. This logical access circuit is a fixed concatenation (delimiter #) of routing instance, tunnel-server-endpoint, tunnel-client-endpoint, local-tunnel-id, remote-tunnel-id, local-session-id, remote-session-id and call sequence number. Used during the authentication phase of tunnel establishment and copied by the LAC in L2TP SCCRQ AVP 7 Host Name. Reported in L2TP Tunnel/Link accounting when length is different from zero. The value with tag 0 is used as default for the tunnels where the value is not specified. Pre-configured values are used when the attribute is omitted (configure router/service vprn <service-id> l2tp local-name). The Node system-name is copied in AVP Host Name if this attribute is omitted and no local-name is configured. “Base” or “VPRN” — The ipv6 address of the system interface (configure router interface system ipv6 address <ipv6-address>).The address can be overwritten with the configured ipv6-source-address (configure aaa radius-server-policy <policy-name> servers ipv6-source-address <ipv6-address>).
Table 63: L2TP Tunnel Accounting (limits)
Table 64: L2TP Tunnel Accounting (applicability)
The identifying IP Address of the NAS requesting the Accounting and maps to the ipv4 address from the system interface (configure router interface system address <ip-address>). Allows to monitor node redundancy activity switch. A string (configure system name <system-name>) identifying the NAS originating the AA Accounting requests. It is sent in all accounting messages. Allows to monitor node redundancy activity switch. Indicates AA Acct request type. Acct On is sent each time a RADIUS accounting policy (configure application-assurance radius-accounting-policy <rad-acct-plcy-name>) is enabled under a partition (configure application-assurance group <aa-group-id:partition-id> statistics aa-sub radius-accounting-policy <rad-acct-plcy-name>) or after a node reboot. An Acct Start is sent for each new AA-subscriber created under a partition were radius accounting is enabled. An Acct Interim will be sent every configured interval time (configure application-assurance radius-accounting-policy <rad-acct-plcy-name> interim-update-interval <minutes>) for each AA-subscriber under a partition with the radius-accounting policy applied. An Acct Stop is sent at AA-subscriber removal. An application-profile change or an Application-Service-Options [ASO] override against a subscriber will not trigger Acct Start/Stop messages and do not affect the AA RADIUS Acct session.
“Base” or “VPRN” — The ipv4 address of the system interface (configure router interface system address <address>).The address can be overwritten with the configured source-address (configure aaa radius-server-policy <policy-name> servers source-address <ip-address>) A string (configure system name <system-name>) identifying the NAS originating the Accounting requests. Indicates how many seconds the client has been trying to send this accounting record for. This attribute is included with value 0 in all initial accounting messages. Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no acct-delay-time. “Base” or “VPRN”— The ipv6 address of the system interface (configure router interface system ipv6 address <ipv6-address>).The address can be overwritten with the configured ipv6-source-address (configure aaa radius-server-policy <policy-name> servers ipv6-source-address <ipv6-address> )
Table 69: Dynamic Data Service Accounting (limits)
Table 71: CLI User Access Accounting (description) “Base” — The IPv4 address of the system interface (configure router interface system address <address>). The address can be overwritten with the configured source-address (configure system security source-address application radius <ip-int-name|ip-address>) “Base” — The IPv6 address of the system interface (configure router interface system ipv6 address <ipv6-address>). The address can be overwritten with the configured ipv6-source-address (configure system security source-address application6 radius <ipv6-address>)
Table 72: CLI User Access Accounting (limits)
Table 74 specifies the different Terminate Causes generated by the SR OS in [49] Acct-Terminate-Cause attribute.
Table 74: Accounting Terminate Causes subscriber-mgmtradius-accounting-policy "acct-policy-1" createhost-accounting interim-update # maximum two accountingqueue-instance-accounting interim-update # modes can be enabledsession-accounting interim-update # simultaneaouslyinclude-radius-attributealc-acct-triggered-reasonexitexitAccounting Triggered Reason specifies the different Accounting Triggered Reason values generated by SR OS in [26-6527-163] Alc-Acct-Triggered-Reason attribute.
Table 75: Accounting Triggered Reason DSM: configure service vprn|ies svc-id subscriber-interface sub-itf group-interface grp-itf wlan-gw vlan-tag-ranges range start start end end distributed-sub-mgmt accounting-update-interval X(2) X(2) X(2) X(2) X(2) X(2) X(2) X(2) Generated when mobility triggered accounting is enabled (configure router|service vprn <id> wlan-gw mobility-triggered-acct interim-update) and when a mobility event is detected (re-authentication, accounting start, accounting interim-update, data or Inter Access Point Protocol (IAPP)). (2) requires host-update to be configured for session-accounting mode (configure subscriber-mgmt radius-accounting-policy <name> session-accounting interim-update host-update)Table 76 details the different attributes that can be used in a CoA and Disconnect Message to identify one or multiple subscriber host(s).
Single host (2) Single IPv4 host (2) Single host (2) Change of Authorization(43) id 224 len 81 from 192.168.1.1:32772 vrid 1SESSION ID [44] 22 24ADFF0000003D5107AB80 # priority 2NAS PORT ID [87] 12 lag-1:10.300 # priority 1FRAMED IP ADDRESS [8] 4 172.1.2.251 # priority 1VSA [26] 15 Alcatel(6527)SLA PROF STR [13] 13 sla-profile-1Table 77 details the attribute that can be used in a CoA and Disconnect Message to target migrant users. A Disconnect Message removes any existing migrant state for the specified UE. A CoA can only be sent for a UE in portal state to trigger the creation of an ESM or DSM user. In contrast to most CoA’s this update is not incremental: the CoA must include all required authentication attributes to create the user. The applicability of attributes is the same as for an Access-Accept message in an authentication procedure.
Table 78 details the different attributes that can be used in a CoA and Disconnect Message to identify a single DSM UE.
Table 79 details the different attributes that can be used in a Disconnect Message to identify one or multiple IKEv2 remote-access tunnel(s).
Table 80 provides an overview of all attributes that are supported in a RADIUS Change of Authorization (CoA) message. For attribute details, refer to the other sections in this document.
Table 80: RADIUS CoA Message Supported Attributes Table 81 provides an overview of the [101] Error-Cause attribute values as defined in RFC 5176 and lists if they are generated in SR OS.
Table 82 lists the possible [101] Error-Cause attribute values generated in SR OS in response to a Disconnect Message targeting an IPsec tunnel.