All rights reserved. Printed in the USA. September 1999.
The information in this document is subject to change without notice. The statements, configurations, technical data,
and recommendations in this document are believed to be accurate and reliable, but are presented without express or
implied warranty. Users must take full responsibility for their a pplic a tions o f any products specifi ed in th is d ocum ent .
The information in this document is proprietary to Nortel Networks NA Inc.
The software described in this document is furnished under a license agreement and may only be used in accordance
with the terms of that license. A summary of the Software License is included in this document.
NORTEL NETWORKS is a trademark of Nortel Networks.
Bay Networks, BCN, BLN, and BN are registered trademarks and Advanced Remote Node, ANH, ARN, ASN,
Baystream, BayRS, BaySecure Access Control, and System 5000 are trademarks of Nortel Networks.
Microsoft, MS, MS-DOS, Win32, Windows, and Windows NT are registered trademarks of Microsoft Co rporation.
All other trademarks and registered trademarks are t he property of their respective owners.
Restricted Rights Legend
Use, duplication, or disclosure by the United States Government is subject to restrictions as set forth in subparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Sof tware clause at DFARS 252.227-7013.
Notwithstanding any other license agreement that may pertain to, or accompany the delivery of, this computer
software, the rights of the United States Government regarding its use, reproduction, and disclosure are as set forth in
the Commercial Computer Software-Restricted Rights cl ause at FAR 52.227-19.
Statement of Conditions
In the interest of improvi ng internal design, operational func tion , an d/o r re lia bi lity, Nortel Ne tworks NA Inc. re serv e s
the right to make changes to the products described in this document without notice.
Nortel Networks NA Inc. does not assume any liability that may occur due to the use or application of the product(s)
or circuit layout(s) described herein.
SUCH PORTIONS OF THE SOFTWARE ARE PROVIDED “AS IS” AND WITHOUT ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
In addition, the program and information containe d herein are licensed only pursuant to a license agreement that
contains restrictions on use and disclosure (that may incorporate by reference certain limitations and notices imposed
by third parties).
ii
308606-14.00 Rev 00
Nortel Networks NA Inc. Software License Agreement
NOTICE: Please carefully read this license agre ement before copying or using the accompanying software or
installing the hardware unit with pre-enabled software (each of which is referred to as “Software” in this Agreement).
BY COPYING OR USING THE SOFTWARE, YOU ACCEPT ALL OF THE TERMS AND CONDITIONS OF
THIS LICENSE AGREEMENT. THE TERMS EXPRESSED IN THIS AGREEMENT ARE THE ONLY TERMS
UNDER WHICH NORTEL NETWORKS WILL PERMIT YOU TO USE THE SOFTWARE. If you do not accept
these terms and conditions, return the product, unused and in the original shipping container, within 30 days of
purchase to obtain a credit for the full purchase price.
1. License Grant. Nortel Networks NA Inc. (“Nortel Networks”) grants the end user of the Software (“Licensee”) a
personal, nonex clusive, nontransferable license: a) to use the Softw are eit her on a single compute r or, if applicable, on
a single authorized device identified by host ID, for which it was originally acquired; b) to copy the Software solely
for backup purposes in support of authorized use of t he Software; and c) to use and copy the associated user manual
solely in support of authoriz ed use of th e Softwa re b y Licen see. Thi s license applies t o the So ftware o nly and d oes not
extend to Nortel Networks Agent software or other Nortel Networks software products. Nortel Networks Agent
software or other Nortel Networks software products are licensed for use under the terms of the applicable Nortel
Networks NA Inc. Software License Agreement that accompanies such software and upon payment by the end user of
the applicable license fees for such software.
2. Restrictions on use; reservation of rights. The Software and user manuals are protected und er copyright laws.
Nortel Networks and/or its licensors retain all title and ownership in both the Software and user manuals, including
any revisions made by Nortel Networks or it s licensors. The copyright notice must be repr oduced and included wit h
any copy of any portion of the Software or user manuals. Licensee may not modify, translate, decompile, disassemble,
use for any competitive analysis, reverse engineer, distribute, or create derivative works from the Software or user
manuals or any copy, in whole or in part. Except as expressly provided in this Agreement, Licensee may not copy or
transfer the Software or user manuals, in whole or in part. The Software and user manuals embody Nortel Networks’
and its licensors’ confidential and proprietary inte lle ctu al pro p erty. Licensee shall not sublicense, assign, or otherwise
disclose to any third party the Software, or any information about the operation, design, performance, or
implementation of the Software and user manuals that is confidential to Nortel Networks and its licensors; however,
Licensee may grant permission to its consultants, subcontractors, a nd agents to use the Softw are at Licensee’s facility,
provided they have agreed to use the Software only in accordance with the terms of this license.
3. Limited warranty . Nortel Networks warrants each item of Software, as delivered by Nortel Networks and properly
installed and operated on Nortel Networks hardware or other equipment it is originally licensed for, to function
substantially as described in its accompanying user manual during its warranty period, which begins on the date
Software is first shipped to Licensee. If an y item of S oftware f ails to so function d uring its w arranty period, as the sole
remedy Nortel Networks will at its discretion provide a suitable fix, patch, or workaround for the problem that may be
included in a future Software release. Nortel Networks further warrants to Licensee that the media on which the
Software is provided will be free from defec ts in materials and wo rkman ship under no rmal use for a peri od of 90 da ys
from the date Software is first shipped to Licensee. Nortel Networks will replace defective media at no charge if it is
returned to Nortel Netw orks during the warranty period along with proof of the date of ship ment. This warranty does
not apply if the media has been damaged as a result of accident, misuse, or abuse. The Licensee assumes all
responsibility for selection of the Software to achieve Licensee’s intended results and for the installation, use, and
results obtained from the Software. Nortel Networks does not warrant a) that the functions contained in the software
will meet the Licensee’s requirements, b) that the Software will operate in the hardware or software combinations that
the Licensee may select, c) that the operation of the Software will be uninterrupted or error free, or d) that all defects
in the operation of the Softw are will be corrected . Nortel Network s is not obligated to remedy any Software de fect that
cannot be reproduced with the latest Software release. These warranties do not apply to the Software if it has been (i)
altered, except by Nortel Networks or in accordance with i ts instructions; (ii) used in conjunction with another
vendor’s product, resulting in the de fect; or (iii) damage d by improper environment, abuse, misuse, accident, or
negligence. THE FOREGOING WARRANTIES AND LIMITATIONS ARE EXCLUSIVE REMEDIES AND ARE
IN LIEU OF ALL OTHER WARRANTIES EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION ANY
WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Licensee is responsible
308606-14.00 Rev 00
iii
for the security of its own data and information and for maintaining adequate procedures apart from the Software to
reconstruct lost or altered files, data, or programs.
4. Limitation of liability. IN NO EVENT WILL NORTEL NETWORKS OR ITS LICENSORS BE LIABLE FOR
ANY COST OF SUBSTITUTE PROCUREMENT; SPECIAL, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL
DAMAGES; OR ANY DAMAGES RESULTING FROM INACCURATE OR LOST DATA OR LOSS OF USE OR
PROFITS ARISING OUT OF OR IN CONNECTION WITH THE PERFORMANCE OF THE SOFTWARE, EVEN
IF NORTEL NETWORKS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT
SHALL THE LIABILITY OF NORTEL NETWORKS RELATING TO THE SOFTWARE OR THIS AGREEMENT
EXCEED THE PRICE PAID TO NORTEL NETWORKS FOR THE SOFTWARE LICENSE.
5. Government Licensees. This provision applies to a ll Softwa re and docum entation acquired d irectly or i ndirectly by
or on behalf of the United States Government. The Software and documentation are commercial products, licensed on
the open market at market prices, and were developed entirely at private expense and without th e use of any U.S.
Government funds. The license to the U.S. Government is granted only with restricted rights, and use, duplication, or
disclosure by the U.S. Government is subject to the restrictions set forth in subparagraph (c)(1) of the Commercial
Computer Software––Restricte d Rig hts cla u se o f FAR 52.227-19 and the limitations se t o ut in thi s license for civilian
agencies, and subparagraph (c)(1)(ii ) of the Rights in Technical Data and Computer Software clause of DFARS
252.227-7013, for agencies of t he Department of Defense or their successors, whichever is applicable.
6. Use of Software in the European Community. This provision applies to all Software acquired for use within the
European Community. If Licensee uses the Software within a country in the European Community, the Software
Directive enacted by the Council of European Communities Directive dated 14 May, 1991, will apply to the
examination of the Software to facilitate interoperability. Licensee agrees to notify Nortel Networks of any such
intended examination of the Software an d may procure support and assistance from Nortel Networks.
7. Term and termination. This license is effective until terminated; however, all of the restrictions with respect to
Nortel Networks’ copyright in the Software and user manuals will cease being effective at the date of expiration of the
Nortel Networks copyright; those restrictions relating to use and disclosure of Nortel Networks’ confidential
information shall continue in effect. Licensee may terminate this license at any time. The license will automatically
terminate if Licensee fails to comply with any of the terms and conditions of the license. Upon termination for any
reason, Licensee will immediat ely destroy or return to Nortel Networks the Software, user manuals, and all copies.
Nortel Networks is not liable to Licensee for damages in any form solely by reason of the termination of this license.
8. Export and Re-export. Licensee agrees not to export, directly or indirectly, the Software or related technical data
or information without first obtaining any required export licenses or other governmental approvals. Without limiting
the foregoing, Licensee, on behalf of itself and its subsidiaries and affiliates, agrees that it will not, without first
obtaining all export licenses and approvals required by the U.S. Government: (i) export, re-export, transfer, or divert
any such Software or technical data, or any direct product thereof, to any country to which such exports or re-exports
are restricte d or em b argoed under United States export con tr o l la w s an d r egulations, or to an y national or resident of
such restricted or embargoed countries; or (ii) provide the Software or related technical data or information to any
military end user or for any military end use, including the design, development, or production of any chemical,
nuclear, or biological weapons.
9. General. If any provision of this Agreement is held to be invalid or unenforceable by a court of competent
jurisdiction, the remainder of the provisions of this Agreement shall remain in full force and effect. This Agreement
will be governed by the laws of the state of California.
Should you have any questions concerning this Agreement, contact Nortel Networks, 4401 Great America Par kwa y,
P.O. Box 58185, Santa Clara, California 95054-8185.
LICENSEE ACKNOWLEDGES THAT LICENSEE HAS READ THIS AGREEMENT, UNDERSTANDS IT, AND
AGREES TO BE BOUND BY ITS TERMS AND CONDITIONS. LICENSEE FURTHER AGREES THAT THIS
AGREEMENT IS THE ENTIRE AND EXCLUSIVE AGREEMENT BETWEEN NORTEL NETWORKS AND
LICENSEE, WHICH SUPERSEDES ALL PRIOR ORAL AND WRITTEN AGREEMENTS AND
COMMUNICATIONS BETWEEN THE PARTIES PERTAINING TO THE SUBJECT MATTER OF THIS
AGREEMENT. NO DIFFERENT OR ADDITIONAL TERMS WILL BE ENFORCEABLE AGAINST NORT EL
NETWORKS UNLESS NORTEL NETWORKS GIVES ITS EXPRESS WRITTEN CONSENT, INCLUDING AN
EXPRESS WAIVER OF THE TERMS OF THIS AGREEMENT.
iv
308606-14.00 Rev 00
Contents
Preface
Before You Begin ............................................................................................................. xv
Text Conventions .............................................................................................................xvi
This guide describes Bay Networ ks Dial Virtual Private Network (VPN) and what
you do to start and customize Bay Dial VPN services on a Nortel Networks
router.
Before You Begin
Before using this guide, you must complete the following procedures. For a new
router:
•Install the router (see the installation guide that came with your router).
Preface
™
•Connect the router to the network and create a pilot configuration file (see
Make sure that you are runni ng the lates t versio n of Nortel Netw orks BayRS
Site Manager software. For information about upgrading BayRS and Site
Manager, see the upgrading guide for your version of BayRS.
308606-14.00 Rev 00
Quick-Starti ng Router s, Configuring BaySt ac k Remo te Access
ASN Routers to a Network)
.
, or
Connecting
™
and
xv
Configuring and Troubleshooting Bay Dial VPN Services
Text Con ventions
This guide uses the following text conventions:
angle brackets (< >)Indicate that you choose the text to enter based on the
description inside the brackets. Do not type the
brackets when entering the command.
Example: If the command syntax is:
ping
<
ip_address
ping 192.32.10.12
>, you enter:
bold text
Indicates command names and options and text that
you need to enter.
Example: Enter
show ip {alerts | routes
Example: Use the
dinfo
command.
}.
braces ({})Indicate required elements in syntax descriptions
where there is more than one option. You must choose
only one of the options. Do not type the braces when
entering the command.
Example: If the command syntax is:
show ip {alerts | routes
show ip alerts or show ip routes
}
, you must enter either:
, but not both.
brackets ([ ])Indicate optional elements in syntax descriptions. Do
not type the brackets when entering the command.
Example: If the command syntax is:
show ip interfaces [-alerts
show ip interfaces
or
]
, you can enter either:
show ip interfaces -alerts
.
ellipsis points (. . . )Indicate that you repeat the last element of the
command as needed.
xvi
Example: If the command syntax is:
ethernet/2/1
ethernet/2/1
[<
parameter> <value
and as many parameter-value pairs as
needed.
. . .
>]
, you enter
308606-14.00 Rev 00
Preface
italic textIndicates file and directory names, new terms, book
titles, and variables in command syntax descriptions.
Where a variable is two or mor e words, the words are
connected by an underscore.
Example: If the command syntax is:
show at
valid_route
<
valid_route
>
is one variable and you substitute one value
for it.
screen textIndicates system output, for example, prompts and
system messages.
Acronyms
Example:
Set Trap Monitor Filters
separator ( > )Shows menu paths.
Example: Protocols > I P ide nti fies the IP option on the
Protocols menu.
vertical line (
)Separates choices for command keywords and
|
arguments. Enter only one of the choices. Do not type
the vertical line when enteri ng the command.
Example: If the command syntax is:
show ip {alerts | routes
show ip alerts
or
}
, you enter either:
show ip routes
, but not both.
ACPAccess Control Protocol
BRIBasic Rate Interface
CHAPChallenge Handshake Authentication Protocol
CLIcommand line interface
CPEcustomer premise equipment
DLCIData Link Control Interface
DNISdomain name information server
DTEdata terminal equipment
308606-14.00 Rev 00
xvii
Configuring and Troubleshooting Bay Dial VPN Services
erpcdexpedited remote procedure call daemon
FTPFile Transfer Protocol
GREGeneric Routing Encapsulation
GUIgraphical user interface
IETFInternet Engineering Task Force
IPInternet P rotocol
IPCPInternet Protocol Control Protocol
IPXInternet Packet Exchange
IPXCPInternet Packet Exchange Control Protocol
ISDNIntegrated Services Digital Network
ISOInternational Organization for Standardization
ISPInternet Service Provid er
LACLayer 2 Tunneling Protocol access concentrator
L2TPLayer 2 Tunneling Protocol
LANlocal area network
xviii
LNSLayer 2 Tunneling Protocol network server
MACmedia access control
NASnetwork access server
OSIOpen Systems Interconnection
PAPPassword Authentication Protocol
POPpoint of presence
PPPPoint-to-Point Protocol
PRIPrimary Rate Inter face
PSTNpublic-switched telephone network
PVCpermanent virtual circuit
RADIUSRemote Authentication Dial-In User Service
RIPRouting Information Protocol
SAPService Advertising Protocol
SMDSSwitched Multimegabit Data Se rvice
308606-14.00 Rev 00
SNMPSimple Network Management Protocol
SPBsession parameter block
SPIsecurity parameter index
TCPTransmission Control Protocol
TMStunnel management server
UNIuser netw ork interface
VPNvirtual private ne twork
WANwide area network
Hard-Copy Technical Manuals
You can print selected technical manuals and release notes free, directly from the
Internet. Go to support.baynetworks.com/library/tpubs/. Find the product for
which you need documentation. Then locate the specific category and model or
version for your hardw are or soft ware product . Usi ng Adobe Ac robat Re ader, you
can open the manuals and releas e notes, search for the sections you ne ed, and print
them on most standard printers. You can download Acrobat Reader free from the
Adobe Systems Web site, www.adobe.com.
Preface
You can purchase selected documentation sets, CDs, and technical publications
through the collateral catalog. The catalog is located on the World Wide Web at
support.baynetworks.com/catalog.html and is divided into sections arranged
alphabetically:
•The “CD ROMs” section lists available CDs.
•The “Guides/Books” section lists books on technical topics.
•The “Technical Manuals” section lists available printed documentation sets.
308606-14.00 Rev 00
xix
Configuring and Troubleshooting Bay Dial VPN Services
How to Get Help
If you purchased a service contract for your Nortel Networks product from a
distributor or authorized reseller, contact the technical support staff for that
distributor or reseller for assistance.
If you purchased a Nort el Net wor ks s ervice pr ogram, c ontact one of the f ollowing
Nortel Networks Technical Solutions Centers:
Technical Solutions CenterTelephone Number
Billerica, MA800-2LANWAN (800-252-6926)
Santa Clara, CA800-2LANWAN (800-252-6926)
Valbonne, France33-4-92-96-69-68
Sydney, Australia61-2-9927-8800
Tokyo, Japan81-3-5402-7041
xx
308606-14.00 Rev 00
Bay Networks Dial Virtual Private Network Services provides secure dial-access
services for corporate telecommuters, mobile professionals, and users in remote
branch offices. Dial VPN provides switched connectivity to virtual private
networks (VPNs), based on Internet Engineering Task Force (IETF)
specifications. Corporate customers can subscribe to this service for remote dial
access to virtual private networks or to the Internet over telephone lines.
Bay Dial VPN Overview
Chapter 1
Tunneling Overview
Dial VPN offers remot e users si mple and secu re access to virtual pr ivate net works
and the Internet through a mechanism known as a tunnel. A tunnel is a secure,
virtual, direct path between two end points. The process of encapsulating,
sending, and decapsulating the datagram is called tunneling, and the encapsulator
and decapsulator are considered the end points of the tunnel. Dial VPN
dynamically establishes and removes tunnels as needed. Dial VPN supports both
Layer 3 and Layer 2 tunneling (referring to the ISO model) on the same Internet
Service Provider (ISP) network.
Dial VPN lets ISPs offer a remote access outsourcing service to their enterprise
customers. Multiple enterprise customers share the same resources in the service
provider’s network or Internet. Because a given user’s data is tunneled, it is
inherently secured from the ISP’s other customers, similar to PVCs in a frame
relay netw ork. Each en terprise customer is responsible for authenticat ing
individual dial-in users and assigning network addresses.
Using Dial VPN, an ISP’s enterprise customers can dial in to a local ISP
point-of-presence (POP) rather than potentially making a long distance call to a
Remote Access Concentrator located at the home network. Dial VPN can also
eliminate costs associated with maintaining the remote access equipment.
308606-14.00 Rev 00
1-1
Configuring and Troubleshooting Bay Dial VPN Services
Dial VPN encapsulates multiprotocol data within an IP datagram. It then sends the
encapsulated packets through bidirectional IP tunnels over the service provider’s
IP routed backbone to the user’s home network.
Dial VPN implements concepts from IETF working groups, draft specifications,
and standards such as Mobile IP and Remote Authe ntica tion Dial -In User Servi ce
(RADIUS), in addition to IP routing, frame relay, and Point-to-Point Protocol
(PPP).
Dial VPN runs on a variety of Nortel Networks hardware platforms. The Dial
VPN network access server (NAS) function runs on the Remote Access
Concentrator (RAC) Model 8000, and the 5399 RAC module for the System
5000™ MSX™.
Platforms running BayRS, such as the Access Stack Node (ASN™), the
Backbone Node (BN
BLN-2, and BCN
function as the Dial VPN gateway (for Layer 3 Dial VPN), or as the L2TP
network server (LNS, for Layer 2 Dial VPN) or CPE (Layer 3) router on the
customer’s home network.
You configure Dial VPN using the same tools that you use to configure the
Remote Access Concentrato r and t he BayRS pl atfor m (that is, th e Remote Ac cess
Concentrator command l i ne i nt erface, CLI, and Site Manag er) . Al l t he fe at ure s of
Remote Access Concentrators and of BayRS are available on your Dial VPN
system.
What Is Tunneling?
Tunneling is a way of for w ar di ng mul ti pr oto col traffic and a ddr esses from remote
nodes to a corporate network through an Internet Service Provider’s IP backbone
network. Encapsulation is the tunneling mechanism. It takes an incoming packet
of any protocol, wraps that packet’s contents in a tunnel packet, then routes the
encapsulated packet over the Dial VPN IP network.
®
) family of high performance switch/routers (BLN®,
®
), and the Model 5380 module for the System 5000 MSX, can
1-2
308606-14.00 Rev 00
Tunneling Overview
Dial VPN dynamically creates a tunnel when it connects to the remote node’s
home network. One end point of the tunnel is the access concentrator. The other
end point is either the gateway router on the ISP’s network (for a Layer 3 tunnel)
or the L2TP network server (for a Layer 2 tunnel). Once the tunnel is created,
packets from the remote node and the corporate home network flow through the
tunnel. In a Layer 3 connection, each tunnel supports one user. The tunnel exists
as long as the user remains connected. In a Layer 2 connection, each user is a
session. A tunnel is established only once between a LAC and an LNS.
After establishing a conne ction, the NAS rece ives a PPP packet (o r payload) fr om
the remote node. The packet moves fr om the NAS, through t he tunnel to t he home
network.
Dial VPN supports both Layer 3 and Layer 2 tunnels on the same ISP network.
Figure 1-1
shows a Dial VPN network with both Layer 3 and Layer 2 (L2TP)
tunnels.
WAN
(PPP or
Frame rela y)
Remote
node
PPP
Remote
node
PPP
RAC
Layer 3 tunnel
IP Network
L2TP tunnel
GW
Customer Premise
Router
Authentication
accounting
Authorization
IP management
Server
Figure 1-1.Dial VPN Network with Layer 3 and Layer 2 Tunnels
308606-14.00 Rev 00
TMS
Customer Premise
Router
Authentication
Accounting
Authorization
IP Management
Server
DVS0017A
1-3
Configuring and Troubleshooting Bay Dial VPN Services
Layer 3 Tunneling
In Layer 3 tunneling, the tunnel exists between the Network Access Server
(NAS), which is a Remote Access Concentrator (RAC), and a gateway router.
Both end points of the tunnel are within th e ISP network.
Layer 2 Tunneling
In Layer 2 tunneling, the tunnel exists between the Layer 2 Tunneling Protocol
(L2TP) access concentrator (LAC), usually a remote access concentrator on the
ISP network, and the L2TP network server (LNS), a router or extranet access
switch on the customer’s home network. Rath er than terminating at the remote
access concentrator, the IP tunnel extends the PPP session to the LNS, which acts
as a virtual remote access concentrator.
Note:
In this guide, the term LAC refers to a remote access server with L2TP
capabilities. The term RAS refers to a remote access server without L2TP
capabilities.
Other features of L2TP include using the Internet infrastructure to support
multiple protocols a nd unregistered IP addresses. Be cause the dia l-in user’ s data is
tunneled at Layer 2 and above (in the ISO model), the L2TP protocol is
independent of Layer 3 information. Enterprise customers with unregistered IP
addressing schemes can also use L2TP to reach their home network.
Comparing Layer 3 and Layer 2 Features
Dial VPN supports both Layer 3 and Layer 2 tunneling on the same ISP network.
Both provide secure network access for dial-in users to their home networks.
Table 1-1
Layer 2 tunneling.
1-4
briefly compares the most significant features of both Layer 3 and
308606-14.00 Rev 00
Tunneling Overview
Table 1-1.Layer 3 and Layer 2 Dial VPN Feature Implementation
Dial VPN FeatureLayer 3Layer 2
Tunnel management
ProtocolMobile IPL2TP
EncapsulationGREL2TP
Tunnel end pointsNAS and gatewayLAC and LNS
Dynamic IP address
allocation
Layer 3 protocols
supported
, ACP, or
erpcd
RADIUS (BSAC)
IP pooling or DHCPIP pooling
IP, IPXIP
How a Dial VPN Network Functions
Any authorized remote user (using a PC or dial-up router) who has access to a
phone line and a modem can dial into your network through Dial VPN. A remote
node can be an individual user dialing in or a dial-up router (using IP) through a
public-switched telephone network (PSTN) or an ISDN connection. A remote
user can dial in to a Dial VPN network to connect either to a corporate or home
network or to a third-pa rty ISP. Dial VPN regards these as functionally equival ent.
Figure 1-2
configuration. In reality, a Dial VPN service provider’s network might include
several remote acce ss se rvers to service a va ri ety of dial-in users , wit h both Layer
3 and Layer 2 tunn els s erv ing different types of networks. You can configure Di al
VPN so that its operation is transparent both to users and applications. You may
find it useful to draw a map of your own configuration and label the interfaces
with their IP and, if appropriate, frame relay Data Link Connection Identifier
(DLCI) addresses.
is a simplified illustration of one possible Layer 3 Dial VPN
, ACP, or RADIUS
erpcd
(BSAC)
308606-14.00 Rev 00
1-5
Configuring and Troubleshooting Bay Dial VPN Services
Tunnel
domain
Service
provider network
data
Third-party
Internet
service
provider
network
Customer
network
Internet
CPE
CPE
LAN
CPE
Customer
RADIUS
server
Remote
node
PPP
connection
PSTN
Network
access
server (NAS)
TMS /erpcd
server
Gateway
T unnel
Frame relay
or PPP
Figure 1-2.Dial VPN Network with Connections to Different Destination Types
Figure 1-2 shows a Dial VPN serv ice provider network wit h a Layer 3 t unnel. The
gateway provides connection services both to a corporate LAN and to a
third-party ISP network. This figure shows only one tunnel, but in reality Dial
VPN creates one tunnel for each dial-in connection.
User
data
Third-party
ISP
RADIUS
server
DVS0012A
In this illustration, a user at a remote node can dial in to a corporate or home
network or a third-party ISP by calling a local phone number associated with that
destination network. The network access server handles the call. The service
provider’s network uses a standard IP connection between the network access
server, shown here as a 5399 module in a 5000 MSX chassis, and the gateway. A
PPP connection or a frame relay PVC and a static route must exist between the
gateway and the customer premise equipment (CPE) router to provide a path for
packets to return to the remote node.
1-6
308606-14.00 Rev 00
For Nortel Networks routers used with a Layer 3 Dial VPN tunnel, you must
specify an adjacent host and a static route between the gateway and the CPE, and
also between the CPE router and the remote node. (The adjacent host and static
routes do not appear in this diagram.) For an illustration of Layer 3 tunneling, see
Chapter 3
The rest of this guide describes how to install and configure a Dial VPN service
provider network. It also indicates the requirements for the remote node and the
RADIUS and DHCP servers, with references to the documentation that explains
how to do the configuration.
.
Dial VPN Network Components
Installing and configuring a Dial VPN service provider network involves several
tasks, some of which you may already have completed. You must:
•Plan the network.
•Install and connect the network hardware.
•Install and configure the network software.
Tunneling Overview
•Verify that the elements outside the Dial VPN networ k, specifica lly the
remote server or servers, the router on the home network, and the remote
dial-in nodes, are properly configured.
•Power up, test, and troubleshoot your network.
See the docu mentation for each of these en tities for information on how to install
and configure them.
This guide deals specifically with how you combine these elements into a Bay
Dial VPN network. The following sections summarize the elements of Dial VPN
networks.
Remote Dial-In Nodes
Remote nodes can be PCs (portable hosts) or dial-up routers, using PPP for
dial-up connections. The portable host must have PPP client software and a
TCP/IP or IPX protocol stack loaded.
Dial VPN supports dial-up IP (and, for Layer 3, IPX) over PPP for dial-in PC
clients and IP over PPP for dial-in routers connected to LANs.
308606-14.00 Rev 00
1-7
Configuring and Troubleshooting Bay Dial VPN Services
The following considerations apply only to Layer 2 (L2TP) tunnels:
•If the PC or router does not have built-in L2TP software capabilities, it dials
into a LAC, which provi des a tunnel across the Internet to the cor por at e LNS.
This type of connection is the primary focus of this guide.
•If the PC or router is an L2TP client, that is, it has built-in L2TP capability,
the L2TP client software provides a tunnel through a network access server
across the Internet to the corporat e LNS. A LAC is unnecessar y with an L2TP
client.
The main difference between connecting an L2TP client and a nonclient is the
starting point of the tunnel. For an L2TP client, the tunnel begins at the PC or
router; for a non-L2TP client, the tunnel be gins at t he LAC. Al l tunnels end at the
LNS.
ISP Network Components for Layer 3 Tunnels
The devices that make up t he Dial VPN service provider network can be all at the
same site or can be separated by several “hops” within the same network. A
network with Layer 3 Dial VPN tunnels can consist of a network access server
(NAS), a gateway router that serves as the tunnel end point, and a tunnel
management server.
Network Access Server (NAS)
A network access server (NAS) can be a Remote Access Concentrator
Model 8000 or a System 5000 chassis with one or more Model 5399 Remote
Access Concentrator modules . Each module is configur ed with a net work addre ss
belonging to the service provider’s address domain. The Remote Access
Concentrator 8000/5399 includes a dual WAN server, which can support both
analog calls and digital calls carried over ISDN. The NAS receives and processes
calls from remote nodes and routes data to remote nodes.
Note:
This guide uses the term network access server (NAS) to refer to the
device that performs network access functions, such as answering dial-in user
calls, authenticat ing tunne l user s, build ing tunn els, and so on. In the Dial VPN
context, this device is usually a Remote Access Concentrator (RAC). Other
documents may refer to this same device as a remote access server (RAS).
Essentially, all three terms (NAS, RAS, and RAC) refer to functionally the
same device.
1-8
308606-14.00 Rev 00
Tunneling Overview
Gateway
Used only in Layer 3 networks, the gateway can be an ASN, BLN, BLN-2, BCN,
or System 5000 MSX equipped with a Model 5380 module running BayRS
software.
The gateway connects the Dial VPN service provider’s network and the CPE
router on the remot e user’s home network. The gateway performs convent ional IP
routing functions configured on interfaces connected to the IP network, through
which the network access servers can be reached.
The gateway is the end point of the IP-routed tunnels that transport packets
originated by remote nodes and encapsulated by the NAS. The gateway also
connects to the CPE router on the user’s home network. The gateway is the data
terminal equipment (DTE) for frame relay PVCs or PPP connections connecting
to multivendor RFC 1490-compliant routers on the customer premises.
For a frame relay network, the connection is through a frame relay user network
interface (UNI). The gateway forwards traffic between a remote node and the
corresponding node in its h ome network by f orward ing pa ckets over a f rame relay
PVC connecting the UNI to the IP tunnel. Thus, the gateway uses the IP tunnel
and the frame relay PVC as two links through which it can send the user traffic
from one side to the other.
With a frame relay connection, you can also configure up to 10 secondary
gateways for use as backup gateways or as a load-balancing mechanism.
The PPP connection between the gateway and the customer’s home network
functions in a similar way, except that the connection is through a PPP interface
instead of a frame relay interface.
The gateway may also act as a RADIUS client to authenticate the remote user
based on information provi ded from the NAS. The RADIUS client on the gateway
sends an authentication request to the RADIUS server on the home network,
which either grants or denies the request in a message to the gateway. The
gateway the n returns this information to the NAS to continue the proc ess.
308606-14.00 Rev 00
1-9
Configuring and Troubleshooting Bay Dial VPN Services
Tunnel Management Server (TMS)
The mechanism for identifying tunneled users is the tunnel management server
(TMS) that resides on a tunnel management server.
For Layer 3 tunnels, the NAS re tr ieves t he tunne l confi gurat ion a ttri butes f rom its
TMS database residing o n t he t unnel management server and uses them to build a
tunnel into the customer’s network. Once the tunnel is open, the user can be
authenticated at the customer’s network. Tunnel management can be either
RADIUS or erpcd-based.
•In the RADIUS method, a RADIUS server resid es at the service provider site
and manages the TMS database. The NAS and the RADIUS server
communicate using IP over the service provider network. Backup gateways
and load distribution mode require the use of the RADIUS method.
•In the erpcd-based method, the TMS hosts a datab ase appl ic ati on (the Tunnel
Management System) that controls the IP tunnel establishment attempt from
the NAS. The TMS runs on the same UNIX host as the Access Control
Protocol (ACP) software. The NAS and the TMS communicate using the
Nortel Networks proprietary Expedited Remote Procedure Call Daemon
(erpcd or Secure erpc d). Both Layer 3 and Layer 2 tunnels can use this
method.
In either method, the NAS queries the TMS database for the addressing
information it needs to construct the IP tunnel. This query is based on the user
domain name and on the policy and state information of the enterprise customer
account when the r emot e u ser di al s in. As a Dial VPN network administrator, you
must provide the user domain and tunnel addressing information to the TMS
database for each enterprise customer. Chapter 5
commands you can use to provision the default TMS database.
ISP Network Components for Layer 2 Tunnels
The following sections describe the components of a network with Layer 2
tunnels. A network with Layer 2 Dial VPN tunnels also has a NAS (which may
function as either a LAC or a RAS) and a tunnel management server. The edge
router, however, doe s not function as a ga tewa y; ra ther, the t unne l end point is the
CPE router on the customer’s home network. The network itself can have
additional components. Thi s descr iptio n pertains only to tho se rele vant to Lay er 2
tunneling.
1-10
and Chapter 6describe the
308606-14.00 Rev 00
Tunneling Overview
L2TP Access Concentrator (LAC)
The L2TP access concentrator (LAC) resides at the ISP network. The LAC
establishes the L2TP tunnel between itself and the LNS. When the remote user
places a call to the ISP network, the call goes to the LAC. The LAC then
negotiates the act ivat ion o f an L2TP tunn el with the LNS. Thi s tunne l carr ies dat a
from the remote user to the corporate network.
For more information about the Nortel Networks implementation of the LAC in
an L2TP network, refer to Configuring L2TP Services.
Remote Access Server (RAS)
The remote access server (RAS) resides at the ISP network. If the remote host is
an L2TP client, the tunnel is established from the remote client through a RAS to
an LNS at the corporate n etwork. In t his situation, there is no need for a LAC .
The RAS does not establish the tunnel; it only forwards already tunneled data to
the destination.
Tunnel Management Server (TMS)
The ISP network must have a mechanism for identifying L2TP tunneled users so
that the LAC can construct the L2TP tun nel. Dial VPN uses a mech anism cal led a
tunnel management server (TMS); ot her vend ors may use a dif fe rent met hod. The
TMS has the same function as for Layer 3 tunnels.
Customer/Home/Internet Service Provider Network
The Dial VPN network int er ac ts wit h the customer premis e e qui pment ( C PE) and
the RADIUS authentication server and the RADIUS accounting server on the
customer’s destination network.
Customer Premise Equipment (CPE)
The CPE is a r outer or extranet switch that connects to the Dial VPN networ k by
means of frame relay PVCs or a PPP connection. The CPE routes traffic from the
remote nodes to hosts on the home network and from the home network hosts
back to remote nodes.
308606-14.00 Rev 00
1-11
Configuring and Troubleshooting Bay Dial VPN Services
Enterprise subscribers of this service must configure the CPE router to allow
routing to occur between the remote nodes and the hosts on the home network.
For a Layer 3 frame relay circuit, a frame relay PVC, a static route, and (for a
Nortel Networks or other non-Cisco router), adjacent host designation must exist
between the CPE and the gateway router on the Dial VPN network. For frame
relay, all Dial VPN circuits must be in the same service record. PPP circuits have
similar requirements, except for the PVC and service record.
L2TP Network Server (LNS)
The L2TP network server (LNS) is a router that resides at the customer’s home
network and serves as the termination point for Layer 2 (L2TP) tunnels and
sessions.
The LNS authenticates PPP connection requests and allows end-to-end PPP
tunneled connections. An LNS may also work in conjunction with a RADIUS
server to authenticate dial-in users.
An LNS can accommodate multiple users, each with his or her own L2TP session.
The L2TP session is the virtu al e nd-t o- end connection over which the LAC sends
data to the LNS.
In Layer 2 tunneling, the CPE router is also the LNS. For m or e in for m at ion about
the Nortel Networks LNS, see Configuring L2TP Services.
RADIUS Authentication Server
The RADIUS authenticati on server on the c ustomer’ s net work is a network access
security system. It uses a locally stored and maintained database that contains all
user authentica ti on and network service a cce ss information to auth enticate dial-in
user access requests.
Note:
The Dial VPN RADIUS server for Layer 3 tunnels must be on a
separate physical device from any RADIUS server for Layer 2 tunnels or for
switched services. The RADIUS server for Layer 2 tunnels can be the same
physical device as for any dial services RADIUS server.
1-12
308606-14.00 Rev 00
Tunneling Overview
The RADIUS server has three main functions in a Dial VPN L2TP network:
•Authenticating remote users
•Assigning IP addresses to remote users
•Providing accounting services for corporate billing
For Layer 3 tunnels, the RADIUS client of this server resides on the gateway.
The RADIUS client on the ISP network generates a RADIUS authentication
request to the appropriate RADIUS server. This request contains the user
authentication information. The CPE receives the authentication request and
forwards it to the RADIUS server.
Once the user is authenticated, the RADIUS server grants access to the remote
node by returning an authentication accept packet with RADIUS authorization
information to the gateway through the CPE.
For a Layer 3 tunnel, the gateway then forwards the user authentication to the
NAS, which initiates an IP tunnel to the gateway using Mobile IP protocol
mechanisms.
For an L2TP tunnel, the RADIUS server database centralizes the authentication
function, eliminating the need to configure each LNS with user names and
passwords. It also assigns an IP addres s to the re mote hos t to identi fy the hos t and
ensure that it is part of its own subnet.
For more information about the Nortel Networks implementation of RADIUS
user authentication and accounting, see Configuring RADIUS and the BaySecure Access Control Administration Guide.
RADIUS Accounting Server
The RADIUS accounting server tracks when users start and end their dial-in
connections and acquires statistics about each session. BaySecure Access
Control™ fully supports RADIUS accounting and provides the network access
server with RADIUS accounti ng information for every a ct ive dial-in session. The
RADIUS accounting server can provide accounting services for the corporate
network, calculating billing charges. For a full description of BaySecure Access
Control and the RADIUS funct ions it supports, see the BaySecure Acce ss Co ntrol Administration Guide.
308606-14.00 Rev 00
1-13
Configuring and Troubleshooting Bay Dial VPN Services
DHCP Server
If you implement the optiona l Dynamic Host Confi guratio n Protocol ( DHCP) as a
way of dynamically assigning IP addresses to dial-in users, you must also
configure a DHCP server on t he cust omer’ s ne twork. For a deta iled d escri ption o f
using DHCP, see Chapter 8
in this guide.
Additional Planning Information
Appendix A contains a network planning worksheet that you can use in
determining how to configure the BayRS side of your Dial VPN network. You
may not have enough informati on yet to complete this worksheet , but if you fill it
in as you go along, it can provide documentation for your network. You may also
find this information useful when changing or troubleshooting your network.
Where to Go Next
For a description of how a packet moves through a Dial VPN network and other
background information that can help you visualize the data flow through the
network, go to Chapter 2
for Layer 2 tunneling or Chap ter 3 for Layer 3 tunneling.
For information about configuring Dial VPN, go to Chapter 4
For troubleshooting information, go to Appendix C, “Troubleshooting
For configuration tips and techniques, go to Appendix D, “Tips and Techniques
1-14
.
.”
.”
308606-14.00 Rev 00
Chapter 2
Dial VPN Layer 2 Tunneling
This chapter describes how a Layer2 Dial VPN tunnel functions. Among these
concepts are h ow a d ata packet sent fr om a r emote node u sing PPP moves thr ough
a Dial VPN service provider’s network to a corporate or “home” network via a
frame relay or PPP connection. It also explains how the Dial VPN tunnel forms a
path to move data q uickly and ef f icie ntly t o and f rom th e remote node t hrough the
Dial VPN service provider’s IP backbone network.
Dial VPN uses encapsulation technologies and the Layer 2 Tunneling Protocol
(L2TP) to provide a secure pathway for remote users to exchange data with their
corporate home net work . Regard le ss of where a remote nod e is locat ed, it ca n dial
in to its Dial VPN service provider and connect to the home network.
Figure 2-1
an L2TP access concentrator (LAC) and the other tunnel end point is the CPE
router or extranet switch on t he customer’ s home ne twork. That router or switch is
the L2TP network server (LNS), which terminates all L2TP tunnels and sessions
with that ne twork. In this figure, the dotted line shows the pa th of the packet
through the tunnel; the Dial VPN service provider network is the ISP network.
308606-14.00 Rev 00
shows the path of a packet in a Layer 2 tunnel. The NAS functions as
2-1
Configuring and Troubleshooting Bay Dial VPN Services
ISP network
Frame rela y
Remote
host
PC
No L2TP
functionality
PPP
connection
LAC
T unnel
Data
TMS
connection
Figure 2-1.Layer 2 Tunnel Packet Path
Note:
If the dial-in node is configured with an L2TP client, that client serves
as the LAC, and the RAC serves the function of a normal network access
server. In this guide, most of the descriptions use the Remote Access
Concentrator as the LAC for Layer 2 tunnels.
Building a Network for Layer 2 Tunneling
The steps that follow provide a suggested order for configuring your network for
Dial VPN Layer 2 tunneling. For detailed information about each of these steps,
see Chapters 4 through 10.
Corporate network
LNS
RADIUS
server
At the ISP network, configure the following:
1.
•Remote Access Concentrator, serving as the L2TP access concentrator
(LAC)
•Tunnel management server (TMS) on the erpcd server for the erpcd-bas ed solution
•Access Control Protocol (A CP) server (only for the erpcd-based solution)
•Edge router capable of connecting to the LNS on the customer’s home
network with frame relay or PPP
2-2
308606-14.00 Rev 00
Dial VPN Layer 2 Tunneling
Install and configure any intermediate nodes on the WAN.
2.
The WAN can include intermediate nodes. For installation and startup
information, refer to the hardware documentation for each device.
Install the software for the tunnel management server, Remote Access
3.
Concentrator, and (for the
-based solution) Acce ss Contr o l Pr otocol
erpcd
on the host that serves as the load host for the Remote Access
Concentrator.
For installation instructions, see the Remote Access Concentrator
documentation.
Load the operating software onto the Remote Access Concentrator and
4.
boot the Remote Access Concentrator.
For detailed descriptions of the boot procedures, see the Remote Access
Concentrator documentation.
Configure the Remote Access Concentrator software, as described in
5.
Chapter 4
, to handle PPP dial-in calls from remote nodes, determine
whether they are tunnel clients, and route them appropriately.
Configure the TMS (including the authentication type) by adding an
6.
entry in the TMS for each domain in the TMS database. See Chapter 5
and Chapter 6
for more information.
When configuring the TMS, you can choose either local or remote
authentication. Dial VPN uses a RADIUS server on the customer’s home
network to provide authentication and assign IP addresses.
For DHCP address allocation, confi gure the TMS with the DHCP paramete rs,
as described in Chapter 5
Establish a connection between the edge r outer on the Dia l VPN network
7.
.
and a CPE router (the LNS) on the home network using frame relay or
PPP.
308606-14.00 Rev 00
2-3
Configuring and Troubleshooting Bay Dial VPN Services
Make sure that the home network is configured to connect to the Dial
8.
VPN network.
Specifically, ensure that:
•The RADIUS server on the home network is configured to work with the
RADIUS client on the Dial VPN network. If dynamic IP address
allocation or DHCP is enabled, the RADIUS or DHCP server must have
an allocated pool of addresses for authenticated dial-in users and have
RADIUS accounting enabled.
•The CPE router that is the end point of Layer 2 tunnels is configured as
the LNS and is configured with a frame relay or PPP connection to the
ISP network (including a static route and an adjacent host if the CPE
router is not a Cisco device).
For instructions on configuring the LNS, see Configuring L2TP Services.
•Any shared informat ion, suc h as pa sswo rds, “secr ets,” or phon e nu mbers,
is consistent across the link.
Individually test each network component, then test the entire system.
9.
L2TP Packet Encapsulation
The dial-in user sends PPP packets to the LAC, which encapsulates these
incoming packets in an L2TP packet and sends it across an IP network through a
bidirectional tu nne l . After the LNS receives the packets, it decapsulates them and
terminates the PPP connection.
Figure 2-2
2-4
shows how data is encapsulated for transmission over an L2TP tunnel.
308606-14.00 Rev 00
Dial VPN Layer 2 Tunneling
Remote user places a call
PPPIP
Layer 2
protocol
IP/UDP
IPDATA
Data packet moves to the corporate network
LAC
LNS
DATA
PPP
IPL2TP
DATA
L2T0005A
Figure 2-2.L2TP Packet Encapsulation Process
Nortel Networks L2TP Implementation
In an L2TP tunnel, the Nortel Networks router or extranet switch on the home
network is the LNS. LNS software operates on the BLN, BCN, and ASN
platforms.
The Nortel Networks LNS has the following characteristics:
•Each slot can act as an LNS, wh ich means that one rout er can have many LNS
interfaces, each with its own address. You can have as many LNS interfaces
as there are available slots on the router.
308606-14.00 Rev 00
2-5
Configuring and Troubleshooting Bay Dial VPN Services
•The LNS performs user authentication with a RADIUS server to prevent
unauthorized users from accessing the network.
•The LNS accepts only incoming calls; it does not place calls to the LAC.
•The Nortel Networks L2TP implementation supports only IP traffic through
the L2TP tunnel. The LNS supports only numbered IP addresses.
•The router interface between the ISP and the home network (see Figure 2-4
a leased line operating with frame relay or PPP (including PPP multilink).
Nortel Networks recommends that you use a high-speed link, such as T1, for
the leased connection.
•The LNS terminates PPP multilink and PPP encapsulated data within an
L2TP packet.
•The LNS operates with the LAC implementation configured on the Nortel
Networks Model 8000/5399 Remote Access Concentrator.
•The host (PC or router) dialing into the ISP network can be on the same
subnet as the IP interface on the LNS.
•The LNS supports RIP. RIP is particularly useful when the remote host is a
router, because it enables the LNS to learn routing information from the
remote router.
For a summary of how to configure the LNS, see Chapter 8
complete instructions on how to configure a Nortel Networks router as an LNS,
see Configuring L2TP Services.
Tunnel Management in L2TP Tunnels
) is
of this guide. For
The Nortel Networks tunnel management server (TMS), which resides at the ISP
network, stores the TMS database. This database contains the remote users’
domain name, the IP address information of each LNS, and other tunnel
addressing information that the network administrator configures. The LAC
requests this information from the TMS to construct the L2TP tunnel.
2-6
308606-14.00 Rev 00
When the LAC receives a call, it forwards the domain name to the TMS. The
domain name is the portion of the user’s address that specifies a particular
location in the network. For examp le , i f the user name is j doe@a bc.c om, abc.com
is the domain name. The TMS looks up the domain name and verifies that the
remote user is an L2TP u ser. The TMS also provides the LAC with t he addres sin g
information required to establish a tunnel to the correct LNS.
Note:
The domain name referred to in this guide is a domain identifier that
does not follow a specific format. It is not related to any Domain Name System
(DNS) protocol requirements.
Security in an L2TP Network
You can configure two layers of security in an L2TP network:
•Tunnel authentication
Tunnel authentication is the process of negotiating the establishment of a
tunnel between the LAC and the LNS.
Dial VPN Layer 2 Tunneling
•User authe ntication
The network administrator at the corporate site can configure a RADIUS
server with the names and passwords of authorized users. The server’s
database centralizes the authentication function, eliminating the need to
configure each LNS with user names and passwords.
When the LNS receives a call, it forwards the user information to the
RADIUS server, which verifies whether the user is authorized to access the
network.
You can also configure the LNS to perform user authentication if a RADIUS
server is not part of the network configuration.
The following paragraphs de scri be the No rtel Networks imp lementa tion of tunnel
and user authentication.
Tunnel Authentic ation
For Dial VPN Layer 2 tunnel security purposes, you must enable the LNS to
perform tu nnel aut henti cation. Tunnel aut henti ca tion is the proce ss of negot iati ng
the establishment of a tunnel.
308606-14.00 Rev 00
2-7
Configuring and Troubleshooting Bay Dial VPN Services
During tunn el authentication, the LNS identifies the L2TP client or LAC by
comparing the LAC’s tunnel authentication password with its own password. If
the passwords match, the LNS permits the LAC to establish a tunnel.
The LAC does not send the tunnel authentication password as a plain-text
message. The exchange of passwords works much like the PPP Challenge
Handshake Authenticati on Protoc ol (CHAP). Whe n one side re ceives a challenge ,
it responds with a value that is calculated based on the authentication password.
The receiving side matches the value against its own calculation. If the values
match, authentication is successful.
Tunnel authentication occurs in both directions, which means that the LAC and
LNS both try to verify the other’s identity.
You can enable tunnel authentication on the Nortel Networks LNS. If tunnel
authentication is dis abl ed, which is the defaul t, t he LNS se nds a default challenge
response to the LAC during the authentication process so that the tunnel can be
established. The LNS cannot send outgoing calls, so it cannot initiate tunnel
authentication.
During tunnel authentication, the following exchange of messages takes place:
1.
The LAC sends a tunnel setup message, called the start control connection request (SCCRQ) message to the LNS. This message includes a challenge to
the LNS.
2.
The LNS replies with a tunnel response, a challenge response, and its own
challenge message. This is called the start control connection reply (SCCRP)
message.
3.
The LAC replies with a challenge response that includes its tunnel
authentication password. This is the start control connection connected
(SCCCN) message.
4.
If this same password is configured for the LNS, the LNS grants approval to
the LAC to establish a tunne l.
Figure 2-3
2-8
shows tunnel authentication and the control messages.
308606-14.00 Rev 00
Dial VPN Layer 2 Tunneling
ISP network
LAC
SCCRQ
tunnel request and challenge
SCCCN
challenge response
Figure 2-3.Tunnel Authentication Control Messages
After tunnel authentication is complete, it need not be repeated for other calls to
the same LAC.
RADIUS User Authentication
Corporate network
PPP connection
LNS
SCCRP
tunnel response, challenge response,
and LNS challenge
L2T0006A
RADIUS user authentication is enabled by default on the Nortel Networks LNS;
you must configure this feature so that the LNS can validate the remote user’s
identity before allowing access to the network.
The network administrator at the corporate site must configure a RADIUS server
with the names and pa ss words of authorized users. When the LNS receives a call,
it forwards an authentication request with the user information to the RADIUS
server, which verifies whether the user is authorized. If the user is permitted
access to the network, the RADIUS server replies with an acknowledgment
message and th e appropriate IP address information for that user to make a
connection.
For more information about configuring Nortel Networks routers as RADIUS
servers, see Configuring RADIUS.
308606-14.00 Rev 00
2-9
Configuring and Troubleshooting Bay Dial VPN Services
RADIUS Accounting
The RADIUS server can provide accounting services in addition to its
authentication services. RADIUS accounting is enabled by default on the Nortel
Networks LNS.
The RADIUS accounting server calculates billing charges for an L2TP session
between the remote user and the LNS. To determine these char ges, t he serv er use s
information that it receives from the LNS, such as the status of each call and the
number of packets sent during the session. Using this data, the RADIUS server
determines billing charges, which the network administrator can use to manage
network costs.
The primary RADIUS accounting server can be the same server as the
authentication server or it can be a different server.
For more information about RADIUS accounting, refer to Configuring RADIUS.
L2TP IP Interface Addresses
When configuring the Nortel Networks LNS, you must configure an IP address
for every slot that has an L2TP interface. This address is referred to as the L2TP IP interface address. The L2TP IP interface can be any valid IP address.
The L2TP IP interface address is internal to the LNS. When communicating with
the remote user , the L NS associat es the user’ s IP address , which is as signed by the
RADIUS server, with the L2TP IP interface address that you configured.
The L2TP IP interface address and the RADIUS-assigned IP address do not have
to be in the same subnet.
2-10
308606-14.00 Rev 00
Remote Router Configuration
If the host at the remote site is a Nortel Networks router, you may need to
configure a dial-on-demand circuit for the remote router’s dial-up interface to the
LAC at the ISP network.
Enable RIP on both the dial-on- de mand ci rc uit and t he at tached LAN interface of
the remote router, so that the LNS can learn routing information from the remote
router. To avoid unnecessarily activating the circuit because of RIP packets,
enable dial-optimized routing for the dial-on-demand circuit.
In addition, confi gure a de fault o r stati c route f or th e remote rout er , whi ch uses the
next-hop address that corresponds to the L2TP IP interface address of the LNS.
This default or static route enables the remote router to deliver L2TP packets to
the LNS.
Starting an L2TP Ses sion
The connection process for Layer 2 tunnels is similar to that for Layer 3, but the
end points of the tu nnels are dif ferent. In L2TP t unneling , the end po int of t he PPP
connection from a LAC or a remote access server (RAS) extends to an L2TP
network server (LNS). Multiple users can communicate through a single tunnel
between the same LAC and LNS pair. Each user transmits and receives data i n an
individual L2TP session.
Dial VPN Layer 2 Tunneling
Packets flo w across an L 2TP tunnel during an L2TP session. An L2TP session is
created when an end-to-end WAN connection is established between the remote
host and the LNS.
The L2TP portion of the packets sent through the tunnel contains a header with a
call ID field (also called a session ID) and a tunnel ID field. The call ID field,
which indicates t he sess ion that the WAN packet belongs to, is negot iated b etween
the LAC and the LNS when the L2TP call is set up. The tunnel ID specifies the
tunnel that the L2TP session is using.
In addition to the fields in the header, the L2TP packet contains a call serial number, which is a unique number for each L2TP call. This number matches the
call to the L2TP session.
308606-14.00 Rev 00
2-11
Configuring and Troubleshooting Bay Dial VPN Services
Examples of L2TP Tunnels
Figure 2-4 shows an L2TP network that uses a LAC to connect to the LNS. The
tunnel is between the LAC and the LNS.
ISP network
Remote
host
PC
No L2TP
functionality
PPP
connection
LAC
T unnel
Data
TMS
Figure 2-4.L2TP Network Using a LAC
Figure 2-5 shows an L2TP network that uses a RAS to connect to the LNS. The
tunnel is between the PC (the L2TP client) and the LNS.
ISP network
Remote
host
PC
T unnel
RAS
Data
Frame rela y
connection
Frame rela y
connection
Corporate network
LNS
RADIUS
server
L2T0003A
Corporate network
LNS
L2TP
client
Figure 2-5.L2TP Network Using a RAS
2-12
RADIUS
server
L2T0004A
308606-14.00 Rev 00
Dial VPN Layer 2 Tunneling
Making a Connection Acros s an L2TP Network
The following steps explain how a remote user connects across an L2TP network
that includes a Nortel Networks LAC, TMS, and LNS. (See Figure 2-4
1.
The remote user dials a LAC at the local ISP network to establish a PPP
connection to the corporate network.
In the call, the user includes any required information, for example, a user
name, including a domain name and a password. When dialing in, the user
enters a name, for example, jdoe@abc.com; jdoe is the user name and abc.com is the domain name.
2.
The LAC receives the call and passes the domain name to the TMS.
If the TMS finds a match for the domain name, a tunnel can be created. The
TMS also checks the number of current connections so that they will not
exceed the maximum number allowed.
If the user is not a tunnel candidate, as determined by the domain name, the
LAC assumes that the remote host is making a regular dial-in request and
authenticates the user accordingly.
.)
3.
4.
5.
308606-14.00 Rev 00
The LAC tries to establish an L2TP tunnel with the LNS.
For the LAC to send a tunnel request to the LNS, it needs the address of the
LNS. The LAC requests the address from the TMS. It then checks for this
address in its own rout in g t abl e. Af ter obt ai ni ng t he a ddr ess , the LAC sends a
tunnel request to the LNS. The LNS may perform tunnel authentication, if
configured to do so. If the LAC and LNS complete tunnel authentication
successfully, the LAC establishes the tunnel.
After the tunnel is established, the LAC forwards the remote user’s name to
the LNS, which verifies the user’ s identit y with the corpora te RADIUS server .
If the RADIUS server recognizes the user name, it replies with an
acknowledgment and an IP address that it assigns to the remote user fo r the
duration of the call. This IP address identifies the remote user who may not
have an address of his own.
After the remote user i s succ essfu ll y auth entic ate d, the user h as an e nd- to-en d
PPP connection to the corporate network over the Internet.
The tunnel can now carry a user session during which the LAC and the LNS
exchange PPP packets.
2-13
Configuring and Troubleshooting Bay Dial VPN Services
When Does Dial VPN Tear Down the Tunnel?
The LAC brings down the tunnel for any one of the following reasons:
•A network failure occurs.
•The LAC or other equipment at the ISP is not operating properly. If the LAC
fails, all tunnel users are disconnected.
•There are no active sessions inside the tunnel.
An individual session ends when a remote user disconnects the call, but
multiple sessions can run inside a single tunnel.
•The system administrator at the ISP terminates the user connection.
•The LAC is not responding to a Hello packet from the LNS.
For the LAC to reestablish a tunnel, the remote user must place a new call.
If the LAC fails, all tunnel users are disconnected and the active user counts are
decremented. However, there is no quick way to determine when a LAC fai ls. The
logging connection may not be reset until after new tunnel users have connected.
When a LAC starts, one of the first things it does is open its ACP-logging
connection. When a new logging connection opens, TMS decrements the
appropriate counts for each d omain that had a user connected to the LAC. If this i s
the first time the LAC has come up, then ther e will be nothing to decrement.
Note:
If you enter the
reset security
a connection with the LAC causes the maximum number of users count to
decrement, even though users with existing connections are still connected.
This means that the maximum numbe r of users count may be exceeded. As
users with existing connections disconnect, the count will synchronize and
correspond to the actual number of users connected.
If the TMS fails, a LAC can detect the failure through the failure of the logging
connection. The LAC falls back to secondary servers, if any. Unless the database
is shared by the TMS servers, the count of current users is lost.
If the TMS database runs out of disk space while tms_dbm is running, the user
sees an error message. The error message may not state what caused the error. If
there is a shortage of disk space and erpcd cannot create a lock file or add a LAC
to the TMS database, TMS generates a sys log message and the use r cannot make a
connection to the LAC.
2-14
command, a new user who t ri es to make
308606-14.00 Rev 00
Chapter 3
Dial VPN Layer 3 Tunneling
This chapter describes how a Layer 3 Dial VPN tunnel functions. Among these
concepts are how a data packet sent from a remote node using the point-to-point
protocol (PPP) moves through a Dial VPN service provider’s network to a
corporate or “home” networ k via a frame relay or PPP connec tion. It al so explai ns
how the Dial VPN tunnel form s a pat h to move dat a quic kly and e f fici ently to and
from the remote node through the Dial VPN service provider’s IP backbone
network.
Dial VPN uses the Generi c Routing Encapsu lation (GRE) proto col and the Mob ile
IP protocol to provide a secure pathway for remote users to exchange data with
their corporate home networ k over a Layer 3 tunnel. Regardl ess of where a remote
node is located, it can dial in to its Dial VPN service provider and connect to the
home network.
For example, Figure 3-1
from the NAS, through the Layer 3 tunnel to the gateway, across a frame relay
connection, and on to the home network. In this figure, the dotted line shows the
path of the packet through the tunnel; the Dial VPN service provider network is
the ISP network.
308606-14.00 Rev 00
shows how a packet moves in an erpcd-based network
3-1
Configuring and Troubleshooting Bay Dial VPN Services
BayD VS service
provider network
PPP
connection
Remote
node
NAS
T unnel
Data
Tunnel
management
server/ACP server
Gateway
Figure 3-1.Layer 3 Tunnel Packet Path
Building a Network for Layer 3 Tunneling
Frame rela y
connection
Corporate
"home"
network
The steps that follow suggest an order for configuring your network. For detailed
information about each of these steps, see Chapters 4 through 9.
At the ISP network, configure the following:
1.
•Remote Access Concentrator, serving as the network access server ( NAS )
•Tunnel Management Server (TMS), either on the UNIX erpcd server for
the erpcd-based solution or on the service provider network RADIUS
server for the all-RADIUS solution
•Access Control Protocol (A CP) server (only for the erpcd-based solution)
•Nortel Networks router that serves as the gateway to the remote user’s
home network
3-2
308606-14.00 Rev 00
Dial VPN Layer 3 Tunneling
Install and configure any intermediate nodes on the WAN.
2.
The WAN can include intermediate nodes. For installation and startup
information, refer to the hardware documentation for each device.
Install the software for the tunnel management server, Remote Access
3.
Concentrator, and (for the
-based solution) the Access Control
erpcd
Protocol on the UNIX host that serves as the load host for the Remote
Access Concentrator.
For installation information, see the Remote Access Concentrator
documentation.
Load the operating software onto the Remote Access Concentrator from
4.
the UNIX load host and boot the Remote Access Concentrator.
For detailed descriptions of the boot procedures, refer to the Remote Access
Concentrator documentation.
Configure the Remote Access Concentrator software, as described in
5.
Chapter 4
, to handle PPP dial-in calls from remote nodes, determine
whether they are tunnel clients, and route them appropriately.
For the all-RADIUS solution, install and configure the RADIUS server
6.
on the service provider network to support the TMS database.
For more information about installing and configuring RADIUS servers on
the ISP network, see Chapter 6
Configure the TMS (including the authentication type) by adding an
7.
.
entry in the TMS for each domain in the TMS database. Refer to
Chapter 5
and Chapter 6 for more information.
When configuring the TMS, you can choose either local or remote
authentication. For both the erpcd-based and the all-RADIUS solutions, Dial
VPN uses remote authentication; that is, a RADIUS server on the customer’s
home network provides authentication and assigns IP addresses.
For DHCP address allocation, confi gure the TMS with the DHCP paramete rs,
as described in Chapter 5
.
308606-14.00 Rev 00
3-3
Configuring and Troubleshooting Bay Dial VPN Services
Configure the gat eway , includin g the RADIUS client, using Site Manager,
8.
then boot the gateway.
Configure the gateway with an IP connection to the Dial VPN network and a
frame relay or PPP connection to the CPE router on the remote user’s home
network. Configure a RADIUS client on the gateway. For information on
configuring the gateway, see Chapter 7
Establish a connection betwe en a gate way on the ISP network and a CPE
9.
router on the home network using frame relay or PPP.
Make sure that the home network is configured to connect to the Dial
10.
VPN network.
Specifically, ensure that:
•The RADIUS server on the home network is configured to work with the
RADIUS client on the Dial VPN network. If dynamic IP address
allocation or DHCP is enabled, the RADI US or DHCP server must hav e a
pool of addresses al located for a uthenticate d dial-in use rs. For dynamic IP
address allocation, you must have RADIUS accounting enabled.
•The CPE router i s conf ig ured with a frame r el ay or PPP connection to the
Dial VPN gateway (including a static route and an adjacent host if the
CPE router is not a Cisco device), and a separate but similar frame relay
or PPP connection to the RADIUS client on the gateway.
.
•Any shared informat ion, suc h as pa sswo rds, “secr ets,” or phon e nu mbers,
is consistent across the link.
Note: The Dial VPN RADIUS server for Layer 3 tunnels must be on a
separate physical device from any RADIUS server for Layer 2 tunnels or for
dial services. The RADIUS server for Layer 2 tunnels can be the same
physical device as any dial services RADIUS server.
Individually test each network component, then test the entire system.
11.
3-4
308606-14.00 Rev 00
How Tunnel Management Works
Tunnel management operates differently on erpcd-based and RADIUS-only
networks, but the end result is the same.
Tunnel Management in an erpcd-Based Network
For an erpcd-based network, the tunnel management server (TMS) runs on the
same host as the Remote Access Concentrator (erpcd) and Access Control
Protocol (ACP) software. T he TMS verifies that the use r at the remote node is a
Dial VPN user . I f the domain portion of the user n ame exists in the TMS data base,
ACP increases the number of current users by one and sends a Grant message to
the NAS. The Grant message contains the tunnel addressing information needed
to send a packet from the remote node to the home network.
The Grant message contains the following information, which is stored in the
TMS database:
•Remote node’s domain name
Dial VPN Layer 3 Tunneling
•Domain name information server (DNIS) -- for Model 8000/5399 platforms,
the DNIS is the called number; for other platforms, it is 0 (zero)
Note:
The default value for the DNIS is 0. The NAS administrator can change
this value.
•Home agent’s IP address on the gateway (the IP address of the gate way end of
the IP tunnel)
•Current number of users
•T ype of con nection bet ween the ISP net work’s edge router or gateway and the
CPE router on the remote node’s home network
•Primary and secondary RADIUS server IP addresses
•Authentication protocol information
For each tunnel user, the NAS sends this information to the RADIUS client on the
gateway, which in turn sends an authentication and address request to the
RADIUS server on the remote node’s home network. When the RADIUS server
responds, authenticating the user, the NAS establishes the tunnel.
308606-14.00 Rev 00
3-5
Configuring and Troubleshooting Bay Dial VPN Services
Tunnel Management in an All-RADIUS Network
The all-RADIUS solution integrates the TMS database functions into the
RADIUS server that resides on the service provider network. This RADIUS
server recognizes the format of the VPN identifier in the user name and returns
tunnel information to the NAS. The NAS uses the tunnel information to establish
a connection to th e gateway. Once the connection is made, t he user authentication
information is forwarded to the indicated authentication server.
Refer to Chapter 5
for more information about th e contents of the TMS database.
How the TMS Database Works
The TMS database (by default, UNIX ndbm) resides on the tunnel management
server , which res ides on the ser vice prov ider’ s netwo rk. The main functi on of this
database is to verif y t he u ser na me (or doma in) in formation supplied by th e NAS.
It also supp l ies the NAS w i th the tunnel addressin g information (in the Grant
message) that it needs to create a tunnel for a remote user. The Dial VPN
administrator enters the domain information and the tunnel addressing
information into the database as part of the TMS configuration process.
When the TMS receives a lookup request from the NAS, it parses the user name
into the user and domain name and DNIS, and creates a Domain/0 or
Domain/DNIS key. The TMS database uses this key to find a match in the
database with the supplied user name. If the key matches an existing entry, the
TMS checks to make sure that the maximum number of users is less than the
configured maximum. If so, th e TMS sends a Gr ant message indi cati ng tha t t his i s
a Dial VPN user. The Grant message contains the tunnel addressing information.
3-6
308606-14.00 Rev 00
Since ndbm does not have a locking feature, Nortel Networks has implemented
application-le vel lockin g to prevent us ers from updat ing the d atabase whi le others
are using it. The lock files are created in the UNIX install directory.
Note:
The erpcd and tms_dbm utilities use a common library of functions (in
tms_lib.c) to access the database. If you replace the database and provide
access to it through the same library function interface, as required, the same
commands will work. You can replace the default database engine with a
standard UNIX relational database, such as Sybase, Informix, or Oracle, or
with one you have created yourself. For information about how to replace the
default TMS database, contact the Nortel Networks Technical Solutions
Center.
Dynamically Allocating IP Addresses
Dial VPN lets you choose betwee n two method s of dynami c IP addr ess al locat ion:
•Dynamic Host Configuration Protocol (DHCP) requires its own server and
allocates IP addresses for a configurable, renewable period, called a lease.
Dial VPN Layer 3 Tunneling
•IP address pooling uses the Dial VPN RADIUS server and allocates an IP
address from a configured pool for the duration of the user’s dial-in session.
The following sections describe each of these methods.
Using DHCP for Dynamic IP Address Allocation
This method requires a DHCP server on the home/corporate network. This server
communicates with a DHCP client proxy residing on the gateway. The server
dynamically allocates an IP address for a dial-in user when the client proxy
requests one.
Based on RFC 2131 and its extensions, DHCP provides a scalable method of
dynamically allocati ng IP address es to remote users and a way of managing t he IP
addresses dynamically assigned to dial-in users. This implementation supports:
•Standard DHCP operation, as described in RFC 2131
•Interoperation with standard DHCP servers
•Use of both primary and secondary DHCP servers
•DHCP leases with as many users as there are tunnels
308606-14.00 Rev 00
3-7
Configuring and Troubleshooting Bay Dial VPN Services
•Both Dial VPN (tunneled) and non-tunneled users
•Getting IP addresses through either the local or the remote DHCP client
proxy, in addition to other methods that Dial VPN supports, depending on
how the Dial VPN subscriber is provisioned
How DHCP Works
DHCP implements the concept of IP address leasing. An authenticated dial-in
user receives an exclusive right to use an assigned IP address for a specific,
configurable period of time, called a “lease.” When this lease expires, the DCHP
client proxy can re new the le ase or l et it laps e, retur ning the I P address to the p ool.
DHCP lets a network manager specify a range of assignable IP addresses without
requiring that each IP address be tied to a specific MAC (hardware) address. The
DHCP server leases an IP address to each dial-in user and dynamically maintains
a table that links a user’s IP and MAC addresses. For users who need a fixed IP
address, a network manager can also specify a permanent assignment. A single
NAS can communicate and main tain DHCP lea ses with as many DHCP servers a s
there are ports on the NAS (up to 48 or 62, depending on the model).
When a remote user dials in to a network access server (NAS), Dial VPN
performs the usual authen tication func tions. When the gate way returns the Mobile
IP (MIP) authentication response to the NAS, however, the NAS sends the
gateway a MIP dynamic address allocation (DAA) request. The gateway sends a
DHCP discover request to the DHCP server on the home network, and the server
responds with an acknowledgment (ACK) if the request is successful. The
gateway then sends the MIP DAA response back to the NAS, and the rest of the
negotiation proceeds as usual. Figure 3-2
Configuring and Troubleshooting Bay Dial VPN Services
Using RADIUS for Dynamic IP Address Allocation
Each dial-in user retains exclusive uses of a unique IP address for the duration of
the dial-in session. Dial VPN relies on the Nortel Secure Access Control (BSAC)
RADIUS server on the user’s home network to provide those addresses , allocating
them either statically or dynamically. In static allocation, the RADIUS
administrator assigns specific addresses for specific users. In dynamic allocation,
the administrator all oc ates a pool of IP addresses from which the RADIUS se rver
selects an address to assign.
The network administrator configures the IP address of a RADIUS server on the
home network that uses dynamic address allocation and also enables dynamic
address allocation on the gateway for that server connection.
When a user dials in to a network using dynamic address allocation, RADIUS
authenticates the user and assigns an IP address from the pool. RADIUS also
maintains a database of assigned addresse s. This prevent s duplicate assi gnments if
the server fails.
When the connection ends, the released IP address returns to the pool, at the end
of the assignment queue.
To implement dynamic IP address allocation, Dial VPN requires that the BSAC
software be installed on the RADIUS server on the customer’s home network.
BSAC is a robust implementation of the draft IETF RADIUS specification,
compliant with RFC 2058 and RFC 2059.
For information about BaySecure, see the BaySecure Access Control Administration Guide.
How Dynamic IP Address Allocation Works
Dial VPN implements dynamic I P address assignment using the Site Manage r and
BaySecure Access Control (BSAC). Using Site Manager, the ISP network
administrator first enables RADIUS accounting on the gateway.
3-10
308606-14.00 Rev 00
The BSAC (RADIUS) administrator at the customer’ s site must ent er one or more
IP address ranges to be used as a pool of assignable addresses. For each remote
user, the RADI US admini stra tor ca n enter eithe r a spec ific I P addres s or al low the
assignment of an IP address from the pool. The administrator can, in f act , s et up a
standard profile with “as si gn fr om pool ” spec if ied, and apply this profile to many
users at once.
The Current Users display identifies the active users and their assigned IP
addresses, so that the RADIUS administrator can tell which user has which
address. In addition, the administrator can release any assigned address that is no
longer in use by selecting that address and clicking on Clear. For more
information about assigning and managing IP addresses, see Configuring RADIUS.
Note:
Dynamic address assignment is not available for IPX.
Assigning Addresses
Dial VPN Layer 3 Tunneling
All available IP a ddr esses are in a queue. The first addres s i n t he queue is the first
one assigned. Released addresses return to the end of the queue for reassignment.
RADIUS saves all current address assignments in a database to prevent duplicate
address assignments if the server fails.
The gateway on the ISP network is a client of the RADIUS server on the
customer’s networ k; that i s, it provide s a servic e to the di al-in us er , such a s PPP or
Telnet
RADIUS server. The RADIUS server receives the request and returns a response
to the client that it has successfully received the request.
The client and the RADIUS server authenticate the transactions between them
through the use of a shared secret, which is never sent over the network. Both
must be configured with the same secret for authentication to take place.
Each service that the NAS provides to a dial-in user constitutes a session; the
beginning of the ses sion is the poi nt at whi ch ser vic e is fi rst pr ovided , and t he end
of the session is the point at which the service ends. A user can have multiple
sessions in parallel or in series if the gateway supports that, with each session
generating a separate start and stop record with its own session ID. Figure 3-3
shows the sequence of events in dynamic IP address assignment.
308606-14.00 Rev 00
®
. The client is responsible for passing user information to the designated
3-11
Configuring and Troubleshooting Bay Dial VPN Services
Figure 3-3.Dial VPN Dynamic IP Address Management Sequence
At the start of service delivery, a client configured to use dynamic IP addressing
generates a sta rt pa cket d escri bing t he type o f ser vic e bein g deli vered and the u ser
to whom it is being delivered. The client sends that information to the RADIUS
3-12
Address
release
DVS0018A
308606-14.00 Rev 00
server, which sends back an acknowledgment that it has received the packet. At
the end of service delivery, the client sends the RADIUS server a Stop packet
describing the type of service that was delivered. The server sends back an
acknowledgment that it has received the packet.
The client sends a star t or s top packet over the ne twor k, pers isti ng unti l it re ceive s
an acknowledgment or times out. The client can also forward the requests to an
alternate server or servers if the primary server is down or unreachable. The
RADIUS server may request other servers to satisfy the request. In this case, it
acts as a client.
If the RADIUS server cannot successfully record the start or stop packet, it does
not send an acknowledgment to the client.
Using Secondary Gateways
For situations that require high availability or traffic load balancing, you can
configure additional Dial VPN gateways for frame relay connections. In addition
to the primary gateway for a tunnel user, you can configure a pool of up to 10
secondary gateways. You can configure Dial VPN to use these as backup
gateways if the primary gateway fails. Alternatively, to improve traffic flow, you
can specify load distribution mode, in which Dial VPN randomly distributes
tunnel traff ic amon g the second ary ga te ways in the pool. You configure backup or
load distribution mode by setting TMS parameters in BaySecure Access Control
(BSAC). You specify which mode to use for gateway selection during tunnel
establishment on the RAC by setting the BSAC Annex-Gwy-Selection-Mode
parameter.
Dial VPN Layer 3 Tunneling
Figure 3-4
secondary gateways connecting through the frame relay cloud to the CPE router
on the customer’s network.
308606-14.00 Rev 00
shows a Dial VPN network with a frame relay network that has three
3-13
Configuring and Troubleshooting Bay Dial VPN Services
Figure 3-4.Dial VPN Network with Secondary Gateways on the Frame Relay Connection
3-14
308606-14.00 Rev 00
Using a Backup Gateway
When you have configured Di al VPN to u se a ba ckup gateway, the NAS first tries
to establish a Dial VPN tunnel to the primary gateway. If this connection attempt
fails, the RAS attempts connections to up to two of the configured secondary
gateways. Although you can configure up to 10 secondary gateways, this limit of
three gateway attempts reduces the pote ntial for timeouts on the dial-in
connection.
Using Load Distribution
In load distribution mode, all gateways are equally eligible to route tunnel
packets. You configure a pool of gateways over which Dial VPN can randomly
distribute tunnels. In this case, the Tunnel-Server-Endpoint parameter and the
Annex-Secondary-Srv-Endpoint parameter both represent tunnel gateway
addresses and make up the gateway pool.
Configuring Secondary Gateways
Dial VPN Layer 3 Tunneling
To configure the primary gateway for backup or load distribution mode:
1.
2.
3.
4.
For information on configuring the RADIUS tunnel management parameters to
use secondary gateways, see Chapter 6, “Configuring the TMS Using RADIUS
For complete Layer 3 gateway configuration information, see Chapter 7,
“Configuring Layer 3 Gateways.”
308606-14.00 Rev 00
Set the BSAC Annex-GW-Selection-Mode parameter for either backup
or distribution.
Specify the primary gateway by setting the BSAC TMS parameter
Tunnel-Server-Endpoint, just as you would for normal mode Dial VPN.
Configure the list of secondary gateways using the BSAC TMS
parameter Annex-Secondary-Srv-Endpoint.
You can configure up to 10 secondary gateway addresses.
Enable the BSAC parameters for RIP Version 2 route injection.
.”
3-15
Configuring and Troubleshooting Bay Dial VPN Services
Starting the Conne ction
When a user at a remote node dials in to a Dial VPN service provider, the NAS
first determines whether t his is a tunnel ca ndidate. If so, the NAS fi rst accesses the
TMS database and contacts the gateway, which starts the authentication process.
The gateway gets an IP address from the RADIUS server on the user’s home
network, and the Remote Access Concentrator builds a tunnel to the gateway and
starts sending the GRE-encapsulated packets. The process involves the following
steps.
A user at a remote node dials the phone number of a Dial VPN service
1.
provider. The user also enters the required user information.
User information usually consists of a user name and a password.
The remote node sends a PPP packet to start the connection process.
2.
The NAS receives the data packet and passes the user name to the TMS
3.
on the Dial VPN service provider’s network to determine how to process
the packet.
For Dial VPN, the user name must contain one “at” sign (@), followed by at
least one period (.) and at leas t a 3-c har act er exte nsi on. For exampl e, the user
name can be lee@abc.com. In this exampl e, lee is the u ser na me th at the NAS
uses for authentication. The string @abc.com is the domain name that Dial
VPN uses to look up this user’s entry in the TMS database.
If the TMS finds a match in its database for both the user and domain names,
it determines that this user is a Dial VPN user and a candidate for tunnel
creation. The TMS then checks that the number of current connections does
not exceed the maximum number of users allowed.
Note:
The system administrator can change the default requirements for the
Dial VPN user name format as needed.
3-16
308606-14.00 Rev 00
Dial VPN Layer 3 Tunneling
If the TMS determines that the user is not a tunnel candidate, the NAS first
treats the request as a proxy RADIUS re quest and attempt s to authenticat e this
user in the usual way. See the description of proxy RADIUS in the BSAC Administration Guide for your platform.
Note: The TMS may deny a tunnel request for a number of reasons; for
example, if the maximum number of users has been reached, if the TMS does
not find a match for the domain name in its database, or if the authentication
request fails. If the tunnel request is denied, the connection between the NAS
and the remote node is dropped.
If the dial-in request is a tunnel candidate, the NAS starts the
4.
authentication process and builds a tunnel.
Once it determines that th is request is a tunnel candida te, the TMS tells the
NAS to contact the gateway for remote authentication. For a given domain,
authentication and address allocation can take place loca ll y, using ACP (in an
erpcd-based network), or remotely, using RADIUS and DHCP on the
customer’s network. If the request is not a tunnel candidate, the NAS uses
local (instead of remote) authentication.
5.
6.
308606-14.00 Rev 00
The NAS receives the remote node’s address, the source of which depends on
the type of authentication and the type of IP address allocation.
The RADIUS client on the gateway sends a request to the RADIUS server
on the home network to authenticate the remote user.
During remote authentica tion, the RADIUS authenti cation serve r on the home
network verifies that the remote node is authorized to access the home
network and determines which network se rvices th e remote node i s allowed to
use.
The DHCP server or the RADIUS server on the home networ k assigns an
IP address and includes that address in the reply to the gateway.
If the home network is configured to assign IP addresses dynamically using
DHCP, the DHCP server selects an IP address from its pool and issues th e end
user a renewable “lease” on that address. Alternatively, the DHCP
administrator may assign a fixed IP address to particular users. In either case,
the DHCP server returns the assigned IP address in its reply to the gateway.
3-17
Configuring and Troubleshooting Bay Dial VPN Services
If the home network is configured to assign IP addresses using RADIUS,
either statically or dynamically, the RADIUS server performs the address
allocation. If the RADIUS administrator has allocated a pool of assignable IP
addresses for dial-in users, and if the RADIUS client on the gateway is
configured for dynamic IP addr ess assignment , the RADIUS server assig ns an
address from that pool. Alternatively, the RADIUS administrator may have
assigned a specifi c a ddr ess f or that particular us er. In this case, RADIUS uses
that assigned address. The RADIUS server reserves the assigned IP address
for that user until the session terminates.
When authentication and addr ess al locatio n are co mplete, the NAS st arts
7.
sending packets from the remote node to the gateway via the newly
created tunnel.
A Day in the Life of a Layer 3 Packet
The next sections explain how a packet moves through a Layer 3 Dial VPN
network and returns to the remote node. Figure 3-5
As the packet moves from the remote node to the home network, different pieces
of the Dial VPN network must encapsulate (add) and decapsulate (strip off) the
protocol-specific envelope around the data packet.
shows the process.
3-18
308606-14.00 Rev 00
Dial VPN Layer 3 Tunneling
PPP packet
FlagFlagAddressControlProtocol Data FCS
GRE packet
CRKSsT FlagControlV ersionProtocol
Frame Rela y packet
Opening
flag
AddressInformationFCS
Control
Remote node
Remote annex
type
Gateway
Closing
flag
Data T unnel ID
Data
Figure 3-5.Packet Encapsulation and Decapsulation Process
308606-14.00 Rev 00
CPE router
Data packet moves onto home netw ork
DVS0003A
3-19
Configuring and Troubleshooting Bay Dial VPN Services
How a Packet Moves Through a Dial VPN Network
A data packet moves from a remote node to the Dial VPN service provider’s
network through a tunnel created for the remote node to a gateway, which sends
the data to the remote user’s home network through a frame relay connection.
Here are the steps involved in this process.
The remote node sends a PPP packet to the NAS to establish a
1.
connection.
The PPP packet contains flag fields to indicate the beginning and end of a
frame, an address field to indicate the device that originated the frame, a
control field to indicate the type of frame (information or administrative), a
protocol field that i ndicates the oper ative network l ayer protocol, the data, and
the frame check sequence t hat shows th e sequenc e ord er of the fr ame. See the
manual Configuring PPP Services for more information about the PPP
packet.
The NAS strips off the PPP protocol-specific fields and encapsulates the
2.
data into a GRE packet. The GRE pack et moves thr o ugh the I P tunnel to
the gateway.
The GRE packet contains checksum information and flag bits to indicate that
a routing and a key field are present; a control field to indicate the type of
frame; a tunnel fla g to indicat e that the re is a tunn el ID pre sent; a ver sion fiel d
to indicate t he versi on of I P (or IPX) runn ing on the In terne t; the protocol type
used (IP or IPX); the tunnel identifier; and the original data from the data
packet. Refer to IETF RFC 1701 or RFC 1490 for more informati on about the
GRE packet.
Note:
The checksum, control, tunnel flag, and version fields should be 0.
The gateway decapsulates the GRE packet infor mation and puts the data
3.
into a frame relay or PPP packet.
The frame relay or PPP packet follows the structural con vent ions for a packet
of that type. For more information about the frame relay or PPP packet
structure, see Configuring Frame Relay Services, Configuring Dial Services,
or Configuring PPP Services.
The gateway sends the frame relay or PPP packet to the CPE router on
4.
the home network.
3-20
308606-14.00 Rev 00
The CPE router decapsulates the frame relay or PPP packet and routes
5.
the data to the intended recipient on the home network.
How a Packet Returns to the Remote Node
To send packets from the home network to a remote node, Dial VPN reverses the
process described in the previous section. The tunnel ensures that packets from
the home network reach the remote node, regardless of where it is located.
The Dial VPN gateway intercept s and forwards pac kets to the remote nod e using a
care-of address that is specified to the gateway during the connection process.
This address, which is usually the address of the Dial VPN Remote Access
Concentrator, is the IP address of the other end point of the tunnel. When the
gateway encapsulates the frame relay packet in a GRE packet, it includes the
Remote
node
care-of address. Figure 3-6
from the home network to a remote node through an erpcd-based network.
provider network
Network access
PPP
connection
server (NAS)
shows a simplified view of how a data packet moves
Service
T unnel
Data
Gateway
Tunnel
management
server
Dial VPN Layer 3 Tunneling
Frame rela y
connection
Customer
"home"
network
Static routes
The gateway sends the packet to the
NAS's
care-of address
decapsulates the GRE information
and then encapsulates the data with
PPP information. The NAS
sends the PPP packet to the
remote node.
. The NAS
Figure 3-6.Sending a Packet to a Remote Node
308606-14.00 Rev 00
3-21
The packet moves from the CPE
router to the gateway via static routes.
The gateway decapsulates the frame
relay information and then encapsulates
the data with GRE information. The gateway
sends the GRE packet to the care of address.
DVS0013A
Configuring and Troubleshooting Bay Dial VPN Services
The data packet travels from the home netw ork to the remote node usi ng a simil ar
process of encapsulation and decapsulation to respond to the format required at
various points throughout the Dial VPN network. The differences are:
•The data packet must return from the CPE router on the home network to the
gateway on the Dial VPN network via a static route. Figure 3 -7
static routes used to return data fr om a home network t o a gateway on the Dia l
VPN network.
•If the CPE router is a Nortel Networks (or similar) router, a nonexistent,
“dummy” adjacent host must be configured on the same IP subnet as the
frame relay interface of the CPE router. This fulfills an addressing format
requirement, but has no effect on the actual packet routing.
•The gateway sends the GRE packet to the remote node’s care-of address on
the NAS, and the NAS forwards the packet to the remote node.
shows the
1.1.1.2
Adjacent host/
next hop
Frame rela y
PVC
Static route
Dial-up
user
3.1.1.X
RAC
BayD VS service
provider's network
T unnel
Gateway
RADIUS
client
DLCI = 101
2.2.2.1
Frame relay
port on gateway
Static route
Figure 3-7.Static Routes from a CPE Router to a Dial VPN Gateway
Data packets move back and fort h between the remote nod e and the home network
through the established tunnel until the remote node disconnects from the Dial
VPN network or an error occurs. When either situation occurs, Dial VPN tears
down the tunnel.
3.1.1.0
Home/
corporate LAN
1.1.1.1
CPE
RADIUS
server
DVS0007A
3-22
308606-14.00 Rev 00
When Does Dial VPN Tear Down the Tunnel?
Dial VPN tears down the tunnel when any of the following situations occurs:
•The remote node using that tunnel disconnects.
•Either the NAS or the TMS is not operating properly.
•Tunnel renewal fails.
•The administrator terminates the user connection.
If the NAS fails, all tunnel users are disconnected and the active user counts are
decremented. However, there is no quick way to determine when a NAS fai ls. The
logging connection may not be reset until after new tunnel users have connected.
When a NAS starts, one of the first things it does is open its ACP-logging
connection. When a new logging connection opens, TMS decrements the
appropriate counts for each d omain that had a user connected to the NAS. If this i s
the first time the NAS has come up, then ther e will be nothing to decrement.
Dial VPN Layer 3 Tunneling
Note:
If you enter the
reset security
command, a new user who t ri es to make
a connection with the NAS causes the maximum number of users count to
decrement, even though users with existing connections are still connected.
This means that the maximum numbe r of users count may be exceeded. As
users with existing connections disconnect, the count will synchronize and
correspond to the actual number of users connected.
If the TMS fails, a NAS can detect the failure through the failure of the logging
connection. The NAS falls back to secondary servers, if any. Unless the database
is shared by the TMS servers, the count of current users is lost.
If the TMS database runs out of disk space while tms_dbm is running, the user
sees an error message. The error message may not state what caused the error. If
there is a shortage of disk space and erpcd cannot create a lock file or add a NAS
to the TMS database, TMS generates a sys log message and the use r cannot make a
connection to the NAS.
308606-14.00 Rev 00
3-23
Chapter 4
Configuring the Remote Access Concentrator
This chapter describes how to use the command li ne interfa ce (CLI) commands to
configure a Remote Access Concentrator as a network access server (NAS) for
Dial VPN. For details regarding your specific device, see the documentation for
the particular model you are configuring (Table 4-1)
Table 4-1.Where to Find Configuration Information
For Information AboutSee This Guide
.
Using the Versalar Config Utility with
Remote Access Concentrators
Remote Access Concentrator configuration
and administration procedures, including a
detailed description of all na and
commands and parameters
admin
Managing Remote Access Concentrators
Using the Versalar Config Utility
•Quick-Start Guide for Remote Access
Concentrators
•Managing Remote Access
Concentrat ors Using Command Line
Interfaces
You configure the Remote Access Concentrator by attaching a PC in terminal
emulation mode or an ASCII terminal to the console port of the device.
Installing and Configuring the RAC Software
This section provides an overview of the installation and configuration process,
highlighting areas of particul ar concern.
Note:
T o facil itat e tr oubles hootin g, test e ach el ement of your sys tem aft er yo u
configure it and before proceeding to the next phase of the configuration.
308606-14.00 Rev 00
4-1
Configuring and Troubleshooting Bay Dial VPN Services
Install the RAC software.
1.
Use the installation script supplied for the RAC, as described in the
documentation for the particular device you are installing.
As part of the hardware installation, you may have issued ROM monitor
commands through a terminal connected to the console port located on the
RAC. These commands let you set a subset of the configuration (EEPROM)
parameters, including the unit’s IP address, required for booting the RAC.
You can also specify parameter values that are required if the network
configuration differs from the default values. See the hardware installation
guide for the Remote Access Conc entra tor you ar e inst alling fo r t he list of t he
ROM Monitor commands and their default values.
Boot the RAC software (standard installation).
2.
The Remote Access Concentrator gets its operational code by downloading it
over the network from (among ot her sour ces) a UNIX ho st that runs RAC fil e
server software. The RAC boots each time it is powered up and whenever it
receives a
boot command. You specify the source of the boot imag e by setting
the preferred load host.
Set up the dial-in port on the RAC for dial-in and enable ACP or
3.
RADIUS (BSAC) security for PPP on all ports.
Configure security on the RAC using either ACP (for an erpcd-based
network) or BSAC (for a RADIUS-only network), and configure the dial-in
ports. To display the current port settings, enter:
show port ppp
To change a particular setting, enter the set port command along with the
parameters you want to change. The settings relevant to Dial VPN are:
set port mode auto_detect
set port type dial_in
set port slip_ppp_security y
set port ppp_security_protocol chap (<--- This could be chap, pap, or
For erpcd-based networks, include the following command:
set port address_origin auth_server
4-2
pap-chap.)
308606-14.00 Rev 00
Configuring the Remote Access Concentrator
If running IPX (Layer 3 only), include the following command:
set port ppp_ncp all (<---This could be set to ipcp and ipxcp.)
The
slip_ppp_security parameter controls dial-in PPP access and use of ACP
or RADIUS for PPP and protocol security. The
ppp_sec_protocol parameter
specifies the local authentication protocol; in this case, CHAP. A client
dialing in has to get a remote IP address. For Dial VPN, the
parameter must be set to
auth_server. For inform ation on BSAC s ecurity,
address_origin
refer to the BaySecure Access Control Administration Guide.
The annex
on one screen. Make sur e t ha t t he
show port ppp command shows severa l c onf iguration parameters
ppp_ncp parameter is set to all or IPCP and
IPXCP.
For information on the settings of the remaining p ort parameters, refer to
Managing Remote Access Concentrators Using Command Line Interfaces.
Set the primary preferred security host to the address of the primary TMS
server. You can also designate the secondary TMS server (if any) as the
secondary preferred security host. Accept the default value if the optional
secondary security host is not in use.
Enable security on the RAC, but disable the security broadcast feature.
Setting the security broadcast parameter to N ensures that the security
information comes from one of the defined TMS servers.
For the Remote Access Concentrator Model 8000/5399, enter the following
na
configuration command sequence from the
set annex enable_security y
set annex pref_secure1_host
<ip_address_of_TMS/security host---acp_or_BSAC>
#
#
set annex pref_secure2_host
<ip_address_of_secondary_TMS_security_host>
#
#
set annex security_broadcast N
set annex auth_protocol
#
set port mode auto_detect
set port type dial_in
set port slip_ppp_security y
set port ppp_security_protocol chap
# This could be chap, pap, or pap-chap.
<acp_or_RADIUS>
or
admin
prompt:
308606-14.00 Rev 00
4-3
Configuring and Troubleshooting Bay Dial VPN Services
Note:
Dial VPN works only for native PPP (you cannot dial in as CLI, then
convert to PPP to use Dial VPN).
Enable the appropriate options.
4.
To display the options that are enabled, use the CLI
stats -o command.
For a PRI connection on a Remote Access Concentrator, create Session
Parameter Blocks in the config file, as shown in the following example.
Configuringthe “%wan” se ction of the c onfig file th is way l ets any u ser dial in
to the devi ce. (By default, the path to the config file is
/usr/spool/erpcd/bfs/config.annex.)
The following sample session parameter blocks (SPBs) set configuration
parameters for sessions (calls) based on dialed number, calling number, and
call type. Each incoming call is compared against each SPB, in order, until
there is a match. If no match exists, the RAC rejects the call.
%wan
#
# The following SPB causes the RAC to answer all “voice” bearer calls
# with a modem.
#
begin_session modem
bearer voice
call_action modem
set mode auto_detect
end_session
# The following SPBs are possible templates for handling V.120 and
# sync PPP calls. To enable these SPBs, edit the “called_no.” line
# in each to include the telephone numbers specific to your PRI line.
# Use different numbers for each service (that is, V.120 or sync). You
# must also remove the comment (#) characters at the start of each line.
#
# It is not always necessary to discriminate calls based on called
# number. If all data calls will be V.120, for example, and never sync PPP,
# such a distinction is unnecessary.
#
4-4
308606-14.00 Rev 00
Configuring the Remote Access Concentrator
begin_session v120
bearer data
called_no
call_action v.120
set mode auto_detect
end_session
#
begin_session sync
bearer data
called_no
call_action sync
set mode ppp
#
# The following line applies the subnet mask to the remote device’s IP address.
set subnet_mask 255.255.255.0
end_session
<called_number>
<called_number>
After making these changes to the config.annex file, enter reset annex
session
from the
recognized these changes, issue the
Enable Syslogging.
5.
admin
prompt of the RAC. To verify that the RAC has
session command at the
annex
prompt.
This is not required, but it is very useful in troubleshooting. Appendix B,
“Syslog Messages,” contains information on syslogs.
6.
308606-14.00 Rev 00
na
admin
From the
set annex syslog_mask debug
set annex syslog_host
or
prompt, enter the following commands:
<ip_address_of_syslogging_host>
To enable logging in an erpcd-based system, enable erpcd syslogging and
create the appropri ate log files on the host, then rest art the syslog dae mon. See
Managing Remote Access Concent rators Usin g Command Line Int erface s for
information on these functions. Refer to your UNIX system documentation
for how to perform these tasks for applications running under UNIX. The
erpcd utility uses the auth facility.
Ensure that the RAC can communi cat e wi th t he gat eway s o t hat a t unnel
can be established.
The RAC can learn a route to the ga teway by means of RIP (Version 1 or 2) or
by means of a static route. For a static route, define the static route at the
bottom of the config.annex file. The syntax is:
route add
<destination_network> <mask> <next_hop> <metric>
4-5
Configuring and Troubleshooting Bay Dial VPN Services
For a default route, the syntax is:
route add
<default> <next_hop> <metric>
Managing Remote Access Concentrators Using Command Line Interfaces
lists the syntax and options for all RIP configuration parameters. Before you
change any default sett ings, re ad the re levant sect ions t ha t expl ain t he rea sons
for and consequences of making such changes.
Reboot the RAC.
7.
After booting the RAC, enter the
ping command at the RAC prompt to ensure
that connectivity to the ga teway exists. If not, check the routing tab le (using
the
netstat -r command) and your configuration.
Loading Software and Booting the RAC
To set the preferred load host, enter the following sequence of commands.
Note:
The actual installation procedures are different for a self-booting RAC
(which already has an image loaded into it). See the readme file in the setup
subdirectory of the RAC Host Tools install directory for a complete
description of how to install RAC software.
In this example, the IP address of the preferred load host is 132.245.44.80:
annex: su
password:
annex#
RAC administration Remote RAC R15.0
admin:
admin: set annex image_name "oper.46.I9336"
admin: set annex load_broadcast N
admin: quit
command: boot
admin
set annex pref_load_addr 132.245.44.80
The image_name parameter specifies the name of the image file that contains the
RAC operational code. Setting the
RAC to look for the load image only on the specified load host.
If a load host has a dif ferent network or subnet address , you must define a gateway
through which the RAC can reach the host. The
specifies the IP address for that gateway.
4-6
load_broadcast parameter to N directs the
load_dump_gateway parameter
308606-14.00 Rev 00
During the initial boot of the operational code, the ROM monitor requires the
address of a gateway if the specified load host is on another network or has a
different subnet address. In this case, enter the gateway’s address using the ROM
Monitor
addr command. The RAC automatically adds this gateway to its routing
table.
Configuring Active RIP
The following section assumes that you have read the sections on active and
passive RIP in Managing Remote Access Concentrators Using Command Line Interfaces. Active RIP is enabled by default. Once active RIP is enabled, both
passive and active RIP are running on all operational interfaces.
Defining Routes
Once you enable active RIP, you do not need to define the default and static r outes
in most configurations. The network nodes learn about the routes to each other
and to other networks thro ugh RIP updates the y exchange , pro vided t hat all of t he
following conditions are met:
Configuring the Remote Access Concentrator
•For subnetted networks, the
•You have configured subnet masks correctly.
•The gateway is configured to handle the same type of RIP updates.
Although the routes requ ired fo r pas sive RIP nee d not be defi ned aft er you en able
active RIP, you may want to define a default route and one or more static routes
for other purposes. For example, a default route can act as a bottleneck through
which all traf f ic t o and from a ne twork must pass. You can also u se stat ic r outes to
reach routers that are not running active RIP.
To define default and static routes that remain after the RAC reboots, enter them
in the config.annex file. You can define routes anywhere in the configuration file,
but routes not defined in an “annex...end” or “subnet...end” block are discarded
and not cached if their interfaces are not operational when the RAC is booted.
Typically, the Ethernet interface is operational immediately, but SLIP and PPP
interfaces may take longer to come up.
308606-14.00 Rev 00
rip_sub_advertise parameter on the RAC is set to
Y (the default).
4-7
Configuring and Troubleshooting Bay Dial VPN Services
Configuring the RAC to Advertise RIP 1 and/or RIP 2 Updates
By default, active RIP sends RI P Version 2 upda tes t o the IP broadc ast a ddress , so
that both RIP 1 and RIP 2 systems can receive them. This assumes that
rip_send_version is set to compatibility, which is the default. It also assumes that
the routers on your network accept both RIP 1 and RIP 2 updates. Although
discarding RIP 2 updates violates the RIP 1 RFC (RFC 1058), some RIP
implementations written before this RFC still do so. If you have both RIP 1 and
RIP 2 nodes on your network, make sure that there are no RIP 1 implementations
that discard RIP 2 packets. If there are, use the
rip_send_vers ion parameter to 1, as shown in the following example:
You may need to reset the appr opr iate port or RAC su bsys te m, or reboot the RAC
for changes to take effect:
admin:
annex#
The
quit
boot
boot
command is required in the preceding example because you are setting
en0. If en0 is not among the interfaces, you can substitute the admin command
reset interface
Note:
If you are configuring backup gateways or load distribution mode, you
for the
boot
command.
must allow RIP Version 2 updates.
4-8
308606-14.00 Rev 00
Chapter 5
Configuring TMS and Security for erpcd Networks
In a Dial VPN network, tunnel users are authenticated by a RADIUS server
running BaySecure Access Control (BSAC) on the remote network, although the
tunnel management database resides at the service provider network.
All administration and configuration of the tunnel happens at the service
provider’s site. An administrator at the service provider site must configure the
tunnel with various attributes: its destination IP address, the security protocols it
supports, its password, and so on. These attributes are stored in the tunnel
management system (TMS) database.
Dial VPN offers two ways of managing and using the TMS database:
erpcd-based, described in this chapte r , and RADIUS-only, described in Chapt e r 6
In both of these methods, the TMS database resides on the service provider
network and specifies:
•Where dial-in user authentication takes place
•Which servers authenticate dial-in users
•Where the other end point of the tunnel is (the NAS is the first end point) --
308606-14.00 Rev 00
.
either the gatewa y rout er f or a Layer 3 tunn el or the LNS at th e home network
for a Layer 2 tunnel
5-1
Configuring and Troubleshooting Bay Dial VPN Services
Managing TMS Using the TMS Default Database
Tunnel management in an erpcd-based network is an extension of the Expedited
Remote Procedure Call Daemon (erpcd) that allows users dialing in to the Dial
VPN system to be authenticated by their destination sites, rather than by an
authentication server residing on the Dial VPN service provider’s network. The
destination site, therefore, retains the authentication information, providing an
extra measure of security. The TMS communicates with the NAS and establishes
tunnels based on the information that you enter into the TMS database.
You tell the NAS where the TMS resides when you configure the following RAC
parameter:
set annex pref_secure1_host
<ip_address_of_TMS_host>
TMS tells the NAS how to authenticate the user, either locally or remotely (with
RADIUS). You create TMS entries on the UNIX workstation that serves as the
TMS/ACP server . By defaul t, you use the tms_dbm progr am to create these entrie s
as a file in /usr/annex, the “secu rity” dire ctory. Alternatively, you can create a text
file of entries using the syntax format that follows. These entries are really TMS
commands. You can either type them at the UNIX command line prompt or copy
them from a text file and paste them at the UNIX command line prompt.
Create one TMS entry for each domain name that you want to authenticate/serve.
The following is a sample TMS command that adds an entry to the TMS database:
The value that you specify for the tunnel authentication key parameter (takey)
must match the value of the key associated with the specified security parameter
index (
spi) value; in this cas e, the spi valu e is 25 6, an d the takey value i s a 1 28-bit
key, represented as 32 hexadecimal digits.
5-2
308606-14.00 Rev 00
Configuring TMS and Security for erpcd Networks
The syntax of the command that creates a TMS entry is:
In this syntax description , brackets [ ] indicate optional parameters.
<domain> <dnis>
<hardware_link_address_from_home_agent_to_CPE>
<length_of_hardware_link_address>
[acctp=accounting protocol] \
te=
<ip_addr_of_the_gateway>
[hwtype=
] [passw=
<authentication_key_value(hex, 256_bits)>
<fr_or_ppp>
]]\
\
<password>
\
\
\
]]\
\
]]\
] [tatype=kmd5-128\
\
\
]
The dialed number parameter dnis is available only for the Model 8000/5399
products. By default,
dnis is set to 0 for all Remote Access Concentrators.
The
with previous versions. Now, tms_dbm derives the length from the value of the
hwaddr parameter. If, for the hwaddr parameter, you specify a decimal value that
is smaller than 4 bytes (that is, from 0 through 2
hexadecimal. To specify a hexadecimal value, prefix the number with the
characters 0x; for example, to express 64 (decimal), specify 0x40. For PPP, omit
the
Note:
recognized, but the
version has taken over its function.
Table 5-1
the arguments for each of the TMS comma nd elements .
308606-14.00 Rev 00
hwalen parameter is no longer required. It is included here for compatibility
31
), TMS converts that value to
hwaddr parameter.
The ha (home agent) parameter used in previous versions is still
te (tunnel end point) parameter required in the current
lists the tunnel mana geme nt (tms_dbm) commands, and Table 5-2 lists
5-3
Configuring and Troubleshooting Bay Dial VPN Services
Using Tunnel Management Comm ands
The following sections describe the syntax of the command line interface
tms_dbm
database. Enter these commands at the workstat ion on which the TMS resides.
commands that you use to provision and manage the TMS default
All of these tunnel management commands begin with
blank character, then a keyword defining the command’s action; for example,
tms_dbm add
. In most cases, a string of arguments can follow the action
keyword. TMS commands, keywords, and arguments are case-sensitive.
Tunnel Management Commands
The action keywords following
management commands. Table 5-1
Table 5-1.tms_dbm Tunnel Management Commands
CommandDescription
add
clear
delete
help
list
modify
rekey
Creates a new TMS database entry. Returns an error if the entry
already exists.
Removes the specified information. Using
argument sets the current user counts to 0 and deletes the
remote/network access server (RAS) list. Using
argument
entry exists, but not if you clear an already cleared entry.
Removes an existing database entry, but does not cause active users
to be disconnected. Returns an error if no matching entry exists.
Displays a detailed explanation of a specified command or a brief
explanation of all
arguments.
Lists all the domain/DNIS pairs, optionally sorted alphabetically by
domain, then by DNIS.
Changes the specified parameters of an existing database entry.
Returns an error if no matching entry exists.
Changes the database key associated with an existing entry and
retains all of the parameter values for the entry. Returns an error if no
matching entry exists.
tms_dbm
clears the RASes and stats . Returns an e rror if no matching
tms_dbm
tms_dbm
constitute the actual tunnel
summarizes these commands.
clear
with the
clear
commands, action keywords, and
, followed by a
rases
with the
all
(continued)
5-4
308606-14.00 Rev 00
Configuring TMS and Security for erpcd Networks
Table 5-1.tms_dbm Tunnel Management Commands
CommandDescription
remove
show
Removes from the database the IP address of a NAS that is no longe r
in use. Decrements the total active user count for each domain/DNIS
pair for which there is an active user count for the specified NAS. Use
this command if you remove a NAS from service.
Displays the specified database information; returns an error if no
matching entry exists.
(continued)
All comman ds except add and help ret urn an error if the entry is not found.
308606-14.00 Rev 00
5-5
Configuring and Troubleshooting Bay Dial VPN Services
Command Arguments
The tunnel management commands use common arguments to specify what the
command is to act upon. Table 5-2
argument can appear with t he
Table 5-2.tms_dbm Command Arguments
ArgumentFunction
describes each of the arguments. Any
command.
help
Used with These
Commands
domain=<
dnis=<
new_dnis>
te
=<
te_addr>
new_domain>
Together,
an entry’s key.
domain
domain name, which may also include a
subdomain name.
48 characters long an d must not incl ude
the slash (/) character. The actual length
depends on the user’s application. The
RAC allows up to 32 characters.
dnis
dnis
If
can be up to 20 chara cters lon g and ha s
the format: *.* (.*).* By default,
turned off for all platforms. To turn
on, change the
rebuild.
Specifies the IP address of the frame
relay port on the gateway on which the
tunnel end point (te) resides. The
address 0.0.0.0 is not valid. This is the
tunnel end point nearest the remote
user’s home network.
For DVS (Layer 3) tunnels, this is the
home agent, which tunnels packets for
delivery to the remote node and
maintains current locati on information
for the remote node.
For Layer 2 tunnels, this is the IP
address of the LNS (interface) on the
home network.
domain
specifies the customer’s
specifies the diale d phone numbe r .
is not in use, this must be 0.
dnis
and
domain
source code and
erpcd
constitute
can be up to
dnis
dnis
is
dnis
Required for all but
for which it is optional.
rekey
With
specify
domain
and
dnis
along with the original
domain
Required for
modify
other commands.
, you must
=<
new_domain>
=<
new_dnis>
dnis.
and
add
. Not used for
(continued)
help
,
and
,
5-6
308606-14.00 Rev 00
Configuring TMS and Security for erpcd Networks
Table 5-2.tms_dbm Command Arguments
ArgumentFunction
=<
ha
maxu
ha_addr>
=[<
max_users> |
unlimited
Not used in Dial VPN. Supported only
for compatibility with previous versions.
Specifies the IP address of the frame
relay port on the gateway in which the
home agent (ha) resides. The address
0.0.0.0 is not valid.
]Specifies the maximum number of
concurrent users a llowed on the system.
A value of unlimited means that any
number of concurrent users is all owed .
A value of 0 indicates that no users are
allowed on the system.
For the
this value to disable a domain without
deleting it. If you reset the
parameter to a value below t he current
number of users, additional (new) users
must wait until the count drops below
the new maximum. Excess users,
however , are not arbi trari ly droppe d.
modify
(continued)
command, you can use
maxu
Used with These
Commands
For compatibility with
previous versions, Dial
VPN recognizes this
parameter as equivalent
to tunnel end point (te),
but it is no longer a valid
syntactical element.
Required for
. Not used for
modify
other commands.
add
and
(continued)
308606-14.00 Rev 00
5-7
Configuring and Troubleshooting Bay Dial VPN Services
Table 5-2.tms_dbm Command Arguments
ArgumentFunction
hwtype
hwaddr
hwalen
srvloc
tutype
=<
hw_type>
=<
hw_addr>
=<
hw_addr_len>
=<
servers_location>
=<
tunnel_type>
hwtype
connection between the gateway and
the CPE router. For Dial VPN,
must be fr (frame relay) or ppp. If not
specified for a Layer 3 tunnel, the
gateway is the CPE router.
hwaddr
with the network. If
less, you can specify it as a decimal
number. TMS converts it to a
hexadecimal number. To specify this
value as a hexadecimal number, prefix
the number with 0x. For a frame relay
connection, this argument is required; it
specifies the DLCI. For a PPP
connection, omit this v alue.
hwalen
included for compatibility with previous
versions. TMS calculates its value
based on the value of the
parameter.
Specifies whether the authentication,
accounting, and dynamic allocation
servers are
VPN service provider’s network) or
remote
home network). The default is
when the
protocol) parameter is set to
remote
set to
Specifies the type of tunnel to establish.
For a Layer 3 tunnel, specify
default). For a Layer 2 tunnel, specify
l2tp
indicates the type of network
is a link address associated
is no longer used, but it is
local
(that is, on the remote user’s
authp
when the
.
radius
.
(continued)
hwtype
is 4 bytes or
hwalen
hwaddr
(that is, on the Dial
local
(authentication
and
acp
parameter is
authp
dvs
(the
Used with These
Commands
All parts of this argument
are required for
for a frame relay
modify
connection. Not used for
other commands.
Required for
. Not used for
modify
other commands.
Required for
. Not used for
modify
other commands.
add
add
add
(continued)
and
and
and
5-8
308606-14.00 Rev 00
Configuring TMS and Security for erpcd Networks
Table 5-2.tms_dbm Command Arguments
ArgumentFunction
=<
pauth
primary_authentication_
server_addr>
=<
sauth
secondary_authentication_
server_addr>
=<
pacct
primary_accounting_
server_addr>
=<
sacct
secondary_accounting_
server_addr>
=<
paddr
primary_dynamic_address_
assignment_server_addr>
=<
saddr
secondary_dynamic_
address_assignment_server_addr>
=<
authp
authentication_protocol>
Specifies the IP address of the primary
authentication se rver. This is usually the
address of the RADIUS ser ver on the
corporate (destination) network.
Specifies the IP address of the
secondary authentication server. You
must not specify a secondary server
without specifying a primary server.
Specifies the IP address of the primary
accounting server. This is usually the
address of the RADIUS ser ver on the
corporate (destination) network.
Specifies the IP address of the
secondary accounting server. You must
not specify a secondary server without
specifying a primary server.
Specifies the IP address of the primary
dynamic address assignment server.
This is usually the address of the
RADIUS server on the corporate
(destination) network. For DHCP, set
this value to the address of the DHCP
server at the customer site.
Specifies the IP address of the
secondary dynamic address assignm ent
server. You must not specify a
secondary server without specifying a
primary server.
Specifies the authentic ati on pr oto co l
used between the gateway and the
authentication server. For remote
authentication, this value must be
. For local authentication, this
radius
value can be
acp
(continued)
.
Used with These
Commands
Required for
modify
other commands.
Optional for
modify
other commands.
Required for
modify
other commands.
Optional for
modify
other commands.
Required for
modify
addrp
to
none
other commands.
Optional for
modify
other commands.
Required for
modify
other commands.
add
. Not used for
and
add
. Not used for
add
. Not used for
and
add
. Not used for
add
, but only if the
argument is not set
. Not used for
and
add
. Not used for
add
. Not used for
(continued)
and
and
and
and
308606-14.00 Rev 00
5-9
Configuring and Troubleshooting Bay Dial VPN Services
Table 5-2.tms_dbm Command Arguments
ArgumentFunction
=<
acctp
addrp
accounting_protocol>
=<
dynamic_address_
allocation_protocol>
=<
security_protocol_index>
spi
=<
tatype
tamode
takey
tun_auth_type>
=<
tun_auth_mode>
=<
tun_auth_key>
Specifies the accounting protocol used
between the gateway and the
accounting server. The only valid value
is
accounting.
If you specify radius, you must also
specify a primary server.
Specifies the dynamic addres s
allocation protocol used between the
gateway and the dynamic address
allocation server. Specify
enable dynamic allocation or
disable it.
If you specify this protocol, you must
also specify a primary server.
spi
through 65535 that the gateway uses to
determine the tunnel authentication
type, mode, and key . Y ou must co nfigure
these values on the gateway using Site
Manager, as well as configuring them in
TMS. The default value is 0 (no
authentication).
tatype
algorithm used to encrypt tunnel
registration mess ages between the NAS
and the gateway. This value must be
MD5 encryption.
tamode
authentication algorithm. This value
must be pref-suff (prefix/suffix).
takey
algorithm uses. It can be up to 64
hexadecimal characters (0-9, A-F, a-f) in
length.
. Specify
radius
defines an identifier in the range 256
is the type of authentication
is the operating mode of the
is the key that the authentication
(continued)
to disable
none
dhcp
to
none
Used with These
Commands
Required for
. Not used for
modify
other commands.
Required for
. Not used for
modify
other commands.
to
is optional for
spi
and
modify
other commands.
If you specify
tunnel authentication, all
three ta arguments are
required for
.
modify
If you specify the ta
arguments, you mus t also
specify the
spi/takey
the TMS database must
match the
on the gateway, or the
authentication will fail. It
will look like a bad
password, not an
incorrectly match ed
encryption key.
Not used for other
commands.
and
add
and
add
add
. Not used for
for
spi
and
add
value. The
spi
combination in
spi/takey
pair
(continued)
5-10
308606-14.00 Rev 00
Configuring TMS and Security for erpcd Networks
Table 5-2.tms_dbm Command Arguments
ArgumentFunction
passwd
config
rases
ordered
stats
all
=<
password>
Relevant only for Layer 2 tunnels, this
parameter specifies the L2TP password
between the LAC and the LNS. It c an be
up to 40 characters long. Setting the
password to ““ (null) disables password
protection.
Used only with the
displays the configuration
config
information (enter ed with an
command) for the entry.
modify
When used with the
displays the current list of remote
rases
access serve rs that have active
connections to the specified domain,
and the number of users connected to
each RAS. When used with the
command,
counts and RAS list to 0.
When used with the
stats
and DENYs. When used with the
command,
DENY counters to 0.
rases
displays the number of GRANTs
stats
(continued)
command,
show
or
add
command,
show
clear
sets the current user
command,
show
clear
resets the GRANT a nd
Used with These
Commands
Not used for Layer 3
tunnels.
requires exactly
show
one of these arguments,
along with
dnis
clear
of these arguments , along
with
can optionally use
list
ordered
domain/DNIS pairs
alphabetically , by domain,
then by DNIS.
domain
.
requires exactly one
domain
and
dnis
to sort the list of
and
.
308606-14.00 Rev 00
When used with the
ordered
remote access servers sorted in
ascending order.
When used with the
displays
information. When used with the
command,
stats.
An error is returned if the entry is not
found, but it is not an error to clear an
already cleared entry.
displays the current list of
config, ordered
clears both users and
all
show
show
command,
command,
, and
stats
clear
5-11
all
Configuring and Troubleshooting Bay Dial VPN Services
Note:
In addition to the parameters listed in Table 5-2, the
show
also displays accounting parameters.
Configuring Local Authentication Using the ACP
Dial VPN relies on the remote authentication (RADIUS) server at the destination
site to authenticate dial-in users. If you are configuring an erpcd-based network
and you want to use local authentication (that is, within the Dial VPN service
provider network), the acp_regime file must contain the line
<path> /acp_passwd. You must also configure the Access Control Protocol
(ACP) authentication server, as follows:
Using CHAP for local ACP authentication, create an ACP file called
1.
acp_userinfo
acp_userinfo for CHAP
(by default in the
/usr/annex
The following is a sample entry for the acp_userinfo:
directory):
command
user sample1
chap_secret annex
end
Similarly, if you are using PAP, yo u create a file called
2.
PAP:
acp_passwd for PAP
If you are using CHAP as your aut hent i cat ion protocol, set the PAP password
only if you enable CHAP with PAP fallback. The following sample entry
shows an encrypted ACP password for PAP:
The user cannot enter a password directly. To enter a password, use the
ch_passwd
utility. The acp_password file uses the same format as the
/etc/passwd file.
Set the dialup addresses in the
3.
as shown in th e following sa mple entry:
sample1 * 128.128.129.181<---- IP Address
sample1 *013ABC0:~<---- IP Network Address
5-12
acp_dialup
acp_passwd
for
file for IP and IPX addresses,
308606-14.00 Rev 00
Configuring TMS and Security for erpcd Networks
For IPX, use the network and node address combination; for example:
0013ABC0:001234560000
The first eight hexadecimal digits represent the IPX network addres s; the last
12 hexadecimal digits represent the IPX node address.
ACP security includes:
•acp_userinfo information
•acp_password informat ion
•Security for CHAP and PAP
•acp_dialup information for IP and IPX addresses
For a complete description of ACP security, see Managing Remote Access
Concentrators Using Command Line Interfaces.
Alternatives to the Default Database
You can substitute another relational d atabase for the default ndbms database
supplied with Dial VPN. If you do so, use that database’s command language to
manage the database conten ts. The databas e must conta in the same in formation as
the default database. For information about how to replace the default database,
contact the Nortel Networks Technical Solutions Center.
TMS System Log (Syslog) Messages
The TMS, like the other elements of Dial VPN, writes its system and error
messages to the system log file, syslog. These messages are interspersed with
other syslog messages in chronological order of occurrence. TMS on an
erpcd-based network uses the auth facility. For the complete list of syslog
messages, refer to Appendix B
308606-14.00 Rev 00
.
5-13
Chapter 6
Configuring the TMS Using RADIUS
You can configure the TMS database to use a RADIUS server on the service
provider (ISP) network, instead of using erpcd between the Network Access
Server (NAS) and the local authentication server, as described in Chapter 5
In the all-RADIUS solution, TMS database functions reside on an enhanced
RADIUS server on the service provider’ s network. Thi s allows the elemen ts of the
domain/tunnel decision to reside on the same server as the normal authentication
policies. If no tunnel identifier match exists, the RADIUS server can also be used
to authenticate nontunneled users.
.
If you are configuring secondary gateways for backup or load distribution, you
must use RADIUS to configure TMS. See “
Gateways” on page 6-10.
Managing RADIUS-Based TMS
The RADIUS server on the service provider network includes a TMS database,
indexed by the domain na me-DNIS pai r . The field s in the d atabase are the same a s
those described for TMS in Chapter 5
The RADIUS server parses the domain and DNIS identifier from the Username
field in the access request message and matches these fields against the same
fields in the RADIUS TMS database.
The RADIUS server also maintains an active count of the number of sessions or
links to a particular user from a particular RADIUS client. If this count exceeds
the specified limit, the RADIUS server rejects the authentication request.
Resource tracking sta rts with the au thentica tion request . The server uses RADIUS
accounting information to confirm and decrement the count.
308606-14.00 Rev 00
BSAC TMS Attributes for Secondary
.
6-1
Configuring and Troubleshooting Bay Dial VPN Services
The NAS recognizes the returned tunnel attributes of the authentication request
and passes the in format ion to it s inter nal TMS cl ient. The TMS clie nt retr ieves the
tunnel information it needs from the RADIUS attributes it receives in the access
acceptance message.
The NAS uses RADIUS accounting me ssa ges to determine when the TMS tunnel
to the local RADIUS se rve r st art s and stops. The NAS log s t he se occurrences and
uses the information to confirm and decrement tunnel usage counts.
The NAS security parameter settings that control RADIUS also control RADIUS
support for tunneling.
Note:
For TMS and local authentication to work, the BSAC RADIUS clients
and the shared secrets between the client and the BSAC server must be
defined.
Tunne l Negotiation Message Sequence
Figure 6-1 shows the flow of messages for a Layer 3 tunnel between the remote
node and the customer’s home network when the RADIUS server on the service
provider’s network maintains the TMS database.
When it receives an incoming call, the NAS issues a standard access-request
message to the RADIUS serve r. The server determines that this is a tunnel user b y
processing the Username and Cal led-Numbe r attr ibute s. If no matc h exists for the
domain or user name in the TMS database, the server returns an access-reject
message to the NAS.
If the server finds a match in its TMS database, it returns an access-accept
message. This message contains the following attributes for the RADIUS
message:
•Username -- the original contents of the user field
•Tunnel-type -- DVS (Layer 3) or L2TP (required)
•Tunnel-media-type -- IP
•Tunnel-server-end point -- the server address and outbound line identifier
•Authentic ation-server -- the remote authentication server(s) for this user
•Accounting-server -- the remote accounting server(s) for this user
Configuring and Troubleshooting Bay Dial VPN Services
The user session’s authorization information flows from the remote customer
RADIUS return message. The local tunnel client does not have the validated user
identification until after the tunnel is formed.
Note:
If you have configured one or more bac kup gate ways and t he att empt at
connecting to the primary gateway fails, the RAS attempts connections to up
to two of the configured secondary gateways. This limit of three gateway
connection attempts reduces the potential for timeouts on the dial-in
connection.
Using RADIUS Accounting
The NAS logs the tunnel-bound link sessions to the service provider’s RADIUS
server. This information reflects the usage of the NAS ports, but it is different
from the home network inform ation in that it may not re flect link ag gregation , and
it is not based on remote user information.
The gateway generates its own accounting information, based on the traffic seen
at the gatew ay and repor t s this data to the customer’s RADIUS ser ver.
The RADIUS server that authenticates the tunnel also tracks resource usage
through the accounting messages it receives. The RADIUS client also preserves
the Class attribute and sends it in accounting start and stop messages to identify
allocated sessions. The user session’s authorization information flows from the
customer RADIUS server return message. The local tunnel client does not have
the validated user identification until after the tunnel is formed.
Service Provider Accounting Messages
In general, the NAS logs sessions based on user connections just as it does for
normal session logging, but with the addition of tunnel information. Tunnel setup
exchanges that ca rry thei r own auth entic ation in formation (admini strativ e account
names and passwords) or that are not bound to dial-in ports generate separate
accounting messages. To distinguish these log messages from chargeable user
sessions, these messages carry start and stop designators for Service-Type of
Tunnel and Accounting-Status-Type of Tunnel.
6-4
308606-14.00 Rev 00
Configuring the TMS Using RADIUS
Table 6-1 summarizes the user start messages that the NAS sends to the service
provider’s RADIUS server.
Table 6-1.Service Provider User Start Accounting Messages
Field NameCon tents
Acct-Status-T yp eStart
NAS-IP-Address, Port,
Port-Type
UsernameThe original contents of the user field
Calling-Station-ID
Called-Station-ID
Service-TypeAs user authorized
Tunnel-TypeDVS (Layer 3) or L2TP (Layer 2)
Tunnel-Media-TypeIP
Acct-Client-EndpointA string containing the IP add ress of the a ccountin g client
Tunnel-Server-EndpointA string containing the IP address of the tunnel server,
Acct-Tunn el-Connect ion-IDA unique identifie r generated on each end of the tunne l to
Connection origination of call
Either or both, if applicable
system and possibly other system-specific identifiers
the circuit type, and an optional identifier
identify this particular user tunnel session; typically, this is
a numeric string encoding a tunnel identifier and/or
sequence number
308606-14.00 Rev 00
6-5
Configuring and Troubleshooting Bay Dial VPN Services
Table 6-2 summarizes th e user st op messages t hat the NAS sends to the provider’ s
RADIUS server.
Table 6-2.Service Provider User Stop Accounting Messages
User Stop MessageContents
Acct-Status-TypeStop
NAS-IP-Address, Port,
Port-Type
UsernameThe original contents of the user field
Calling-Station-ID
Called-Station-ID
Service-TypeAs user authorized
Tunnel-TypeDVS (Layer 3) or L2TP (Layer 2)
Tunnel-Media-TypeIP
Acct-Client-EndpointA string containing the IP add ress of the a ccountin g client
Tunnel-Server-EndpointA string containing the IP address of the tunnel server,
Acct-Tunnel-Connection-IDA unique identifier generated on each end of the session
StatisticsConnect time, bytes, messages in, messages out
Connection origination of call
Either or both, if applicable
system and possibly other system-specific identifiers
the circuit type, and an optional identifier
to identify this pa rticular user tu nnel session; ty pically, this
is a numeric string encoding a tunnel identifier and/or
sequence number
6-6
308606-14.00 Rev 00
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.