All rights reserved. Pr inted in the USA. October 1998.
The information in this document is subject to change without notice. The statements, confi gurations, technica l data,
and recomm endations in this docum ent are believed to be accurate and reliable, but are presented without express or
implied warranty. U sers must take full respons ibility for their applications of any products specified in this do cum ent.
The information in this document is proprietary to Bay Networks, Inc.
The software described in this document is furnished under a license agreement and may only be used in accordance
with the te rms of that license. A summary of the Soft w are License is include d in this docum ent.
Trademarks
AN, BCN, BLN, BN, FRE, Optivity, PPX , and Bay Networks are registered trademarks a nd A dvanced Remote No de,
ANH, ARN, ASN, BayRS, BaySecur e, BayStac k, BaySt ream, BCC, SP EX, Syst em 5000, and th e Bay Netw ork s logo
are trademarks of Bay Net w orks, Inc.
Microsoft , MS, MS-DOS, Win32, Windows, Inter net Explorer, and Windows NT are reg istered trademarks of
Microsoft Corporation.
All other trademarks and registered trademarks are the property of their respective owners .
Restricted Rights Legend
Use, duplication, or disclosure by the United States Government is subject to restrict ions as set forth in subparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013.
Notwithstanding any other license agreement th at may pertain to, or accompany the delivery of, this computer
software, the ri ghts of the Un ited States Gove rnment re garding its use, reproduction, and disclosure are as set forth in
the Commercial Computer Software-Restricted Rights clause at FAR 52.227-19.
Statement of Conditions
In the interest of improving internal design, operational function, and/or reliability, Bay Networks, Inc. reserves the
right to make changes to the products described in this document without notice.
Bay Networks, Inc. does not assume an y liability that may occur due to the use or applic ation of the product(s) or
circuit layout(s) described herein.
SUCH PORTIONS OF THE SOFTWARE ARE PROVIDED “AS IS” AND WITHOUT ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, WITHOUT LI MITATION, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
In additi on, the program and information contained herein are li censed only pursuant to a license agreement that
contains restrictions on use and disclosu re (that may incorporate by reference cert ain limitations and not ices imposed
by thir d pa rt ie s).
ii
303509-A Rev 00
Page 3
Bay Networks, Inc. Software License Agreement
NOTICE: Please carefully read this license agreement before copying or using the acco m p anying software or
instal ling the hardware unit with pre-enabled software (e ach of whic h is referred to as “Software” in this Agreement).
BY COPYING OR USING THE SOFTWARE, YOU ACCEPT ALL OF THE TERMS AND CONDITIONS OF
THIS LICENSE AGREEMENT. THE TERMS EXPRESSED IN THIS AGREEMENT ARE THE ONLY TERMS
UNDER WHICH BAY NETWORKS WILL PERMIT YOU TO USE THE SOFTWARE. If you do not accept these
terms and conditions , return the product, unu sed and in the original shi pping container, w ithin 30 days of purchase to
obtain a credit for the f ull purchase price.
1. License Grant. Bay Networks, Inc. (“Bay Networ ks”) grants the end user of the Software (“Lice nsee”) a personal,
nonexcl usive, nontransferable license: a) to use the Software either on a single computer or, if applicable, on a single
authori zed de vi ce ide ntified by hos t ID, fo r whi ch it was ori gi nally acq uir ed ; b) to cop y th e Sof tw are so le ly f or bac kup
purposes in support of authorized us e of the Software; and c) to use and copy the associat ed user manual solely in
support of authorized use of the Soft w are by Licensee. This li cense applies to the Software only and does not extend
to Bay Networks Agent software or other Bay Netw orks software products. Bay Networks Agent software or other
Bay Networks software products are licensed for use under the terms of the applicable Bay Networks, Inc. So ftware
License Agreement that accompanies such software and upon payment b y the end user of the applicable licen se fees
for such software.
2. Restrictions on use; reservation of rights. The Software and user manuals are prote cted under copyright laws.
Bay Networks and/or its licensors retain all title and ownership in both the Software and user manuals, including any
revis ions made by Bay N etworks or its licensors. The cop yright notice must be reproduced and included with any
copy of any por tion of the Sof tw are or use r manua ls . Licens ee may not modif y, transla te, dec ompi le , disas se mble , use
for any compe ti ti v e an al ysis, r e v erse e ngi ne er , dis tr ib ute , o r c rea te der i vati v e w ork s fro m the Sof twa re or u se r man uals
or any copy, in whole or in part. Except as expressly provided in this Agreement, Licensee may not copy or transfer
the Softw are or user man uals, in whole or in part. The Software and user manuals embody Bay Ne tworks’ and its
licenso rs’ confidential and proprietary intell ectual property. Licensee shall not sublicense, assig n, or otherwise
disclos e to any third party the Software, or any informatio n about the operation, design, performance, or
implementation of the Software and user manuals that is confidential to Bay Networks and its li censors; howe ver,
Licensee m ay grant permission to its consul tants, subcontractors, and agents to use the Software at Licensee’ s facility,
provided they have agreed to use the Software only in accordance with the terms of t his license.
3. Limited warranty. Bay Networks warrants each item of Software, as d elivered by Bay Ne tw orks and properly
installed and operated on Bay Networks hardware or other equipment it is original ly licensed for, to function
substantially as described in i ts accompan ying user manual during its warranty period, wh ich begins on the date
Softwar e is fi r st shi pped to Licen see . If any it em of Soft war e fai ls to so func ti on du ring i ts warr anty pe ri od, as t he so le
remedy Bay Ne tworks wil l at its discretion provide a suitable f ix, patch, or workaround for the problem tha t m ay be
included in a future Softwar e releas e. Bay Networks further warrants to Licensee that the media on which the
Softwar e is provided will be fr ee from d efects in materials and workmanship under normal use for a period of 90 days
from the date Software is first shipped to Licensee. B ay Networks will replace defectiv e media at no charge if it is
returned to Bay Netw orks during the warra nty period along with proof of the date of shipmen t. This warran ty does not
apply i f the media has been damaged as a result of acci dent, mi suse, or abuse. The Licensee assumes all re sponsibility
for selection of the Software to achieve Licensee’s intended results and for the installation, use, and results obtained
from the Software. Bay Networks does not warrant a) that the functions cont ained in the software w ill meet the
Licensee ’s requirements, b) that the Software will operate in the har dw are or software combinat ions that the License e
may select, c) that the operati on of the Softw are will be uninterrupted or error free, or d) that all defects in the
operati on of the Software wi ll be corrected. Bay Network s is not obligated to remedy any Software defect that cannot
be repro duced with the latest Software release. Thes e warranties do not apply t o the Software if it has be en (i) altered,
except by Bay Networks or in accordance with its instructions; (ii) used in conjunction with another vendor’s product,
resulting in the defect; or (iii) damaged by im proper environment, abuse, misuse, accident , or neglige n ce. THE
FOREGOING WARRANTIES AND LIMITATIONS ARE EXCLUSIVE REMEDIES AND ARE IN LIEU OF ALL
OTHER WARRANTIES EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMIT ATION ANY W ARRANTY OF
MERCHANTABILITY OR FITN ESS FOR A PARTICULAR PURPOSE. Licensee is responsible for the security of
303509-A Rev 00
iii
Page 4
its own data and information and for maint aining adequate procedures apa rt from the Software t o reconstruct lost or
altered files, data, or programs.
4. Limitation of liability. IN NO EVENT WILL BAY NETWORKS OR ITS LICENSORS BE LIABLE FOR ANY
COST OF SUBSTITUTE PROCUREMENT; SPECIAL, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL
DAMAGES ; OR ANY DAMAGES RESULTING FROM INACCURATE OR LOST DATA OR LOSS OF USE OR
PROFITS ARISING OUT OF OR IN CONNECTION WITH THE PERFORMANCE OF THE SOFTWARE, EVEN
IF BAY NETWORKS HAS BEEN AD VISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT
SHALL THE LIABILITY OF BAY NETWORKS RELATING TO THE SOFTWARE OR THIS AGREEMENT
EXCEED THE PRICE PAID TO BAY NETWORKS FOR THE SOFTWARE LI CENSE.
5. Governmen t L icensees. This provision applies to all Softw are and documentation acquired directly o r indirectly
by or on behalf of the United States Government. The Software and documentation are commercial products, licensed
on the open market at market prices, and were developed entirely at private expense and without the use of an y U .S.
Government funds. The licens e to the U.S. Governmen t is granted only with restricted rights, and use, duplication, or
disclos ure by the U. S. Govern m ent is subject to the restricti ons set forth in subparagraph (c)(1) of the Comm ercial
Computer So ftware––Restricted Rights cla use of FAR 52.227-19 and the limitations set out in this license for civilian
agencies , and subpar agraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause of DFARS
252.227-7013, for agencies of t he D e partmen t of Defense or their successors, whichever is applicable.
6. Use of Software in the European Communi ty. This provision applies to all Software acquired for use within the
European Comm unity. If Lice nsee uses the Software within a countr y in the European Community, the Software
Directive enacted by the Counc il of European Communities Dir ective dated 14 May, 1991, w ill apply to the
examination of the Software to facilitate interoperability. License e agrees to notify Bay Networks of any such
intended examination of the Software and may procure support and assistance from Bay Networks.
7. Term and termination. This license is effective until terminated; however, all of the restrictions with respect to
Bay Networks’ copyright in the Software and user manuals will cease being effective at the date of expiration of the
Bay Networks copyright; those r estricti ons relatin g to use and disclosure of Bay Networks’ confidential info rm ation
shall continue in effect. Licensee may terminate this license at any time. The license will automatically terminate if
Licensee fails to co m ply with an y of the terms and conditions of the license. Upon terminat ion for any reason,
Licensee will immediately destroy or return to Bay Networks the Software, user manuals, and all copies. Bay
Networks is not liable to Licensee for damages in any form solely by reason of the termination of this license.
8. Export and Re-export. Licen see agrees not to export, directly or indirectly, the Software or related technical data
or information without first obtaining any required export licenses or other governmental approvals. Without limiting
the fore going, Licensee, on behalf of itself and its subsidia ries and affili ates, agrees that it will not, without fi rst
obtaining all export licenses and appro vals required by the U.S. Government: (i) export , re-export, trans fer, or d ivert
any such Sof tware or technical data, or any direct product thereof, to any coun try to which such exports or re-exports
are rest ricted or embargoed under United S tates export control laws and regulations, or to any national or resident of
such rest ricted or em bargoed countries; or (ii) provide the Software or related technical data or inf ormation to any
military end user or for any military end use, including the design, development, or prod uction of any chemical,
nuclear, or biological weapons.
9. General. If any provision of this Agreement is held to be invalid or unenforceable by a court of competent
jurisdiction, the remainder of the provisions of this Agreement shall remain in full force and effect. This Agreement
will be governed by the laws of the state of California.
Should you have any questions concerning this Agreement, contact Bay Networks, Inc., 440 1 G reat Americ a
Parkway, P.O. Box 58185, Santa Clara, Califor nia 95054-8185.
LICENSEE ACKNOW LEDGES THAT LICENSEE HAS READ THIS AGREEMENT, UNDERSTANDS IT, AND
AGREES TO BE BOUND BY ITS TERMS AND CONDITIONS. LICENSEE FUR THER AGREES THAT THIS
AGREEMENT IS THE ENTIRE AND EXCLUSIVE AGREEMENT BETWEEN BAY NETWORKS AND
LICENSEE, WHICH SUPERSEDES ALL PRIOR ORAL AND WRITTEN AGREEMENTS AND
COMMUNICATIONS BETWEEN THE PARTIES PERTAINING TO THE SUBJECT MATTER OF THIS
AGREEMENT. NO DIFFERENT OR ADDITIONAL TERMS WILL BE ENFORCEABLE AGAINST BAY
NETWORKS UNLESS BAY NETWORKS GIVES ITS EXPRESS WRITTEN CONSENT, INCLUDING AN
EXPRESS WAIVER OF THE TERMS OF THIS A G REEMEN T.
iv
303509-A Rev 00
Page 5
Contents
Preface
Before You Begin ............................................................................................................. xv
Text Convent ion s .......... ....................................................................... ............................xv
Acronyms ........................................................................................................................ x vi i
Bay Networks Technical Publications ..............................................................................xix
How to Get Help ..............................................................................................................xix
Chapter 1
Tunneling Overview
Bay Dial VPN Overview .................................................................................................. 1-1
What Is Tunneling? .........................................................................................................1-2
This guide de scribes Bay Networks Dial Virtual Privat e Network (VPN) and what
you do to start and customize Bay Dial VPN services on a Bay Networ ks® router.
Before You Begin
Make sure that you are running the latest version of Bay Networks BayRS™ and
Site Manager software. For information about upgrading BayRS and Site
Manager, see the upgrading guide for your version of BayRS.
Preface
Text Con ve ntions
This guide uses the following text conventions:
angle brackets (< >)Indicate that you choose the text to enter based on the
bold text
303509-A Rev 00
description inside the brackets. Do not type the
brackets when entering the command.
Example: If the command syntax is:
<ip_address>
ping
ping 192.32.10.12
Indicates text tha t you need to enter and command
names and options.
Example: Enter
Example: Use the
, you enter:
show ip {alerts | routes
command.
dinfo
}
xv
Page 16
Configuring and Troubleshooting Bay Dial VPN Services
braces ({})Indicate required elements in syntax descriptions
where there is more than one option. You must choose
only one of the options. Do not type the braces when
entering the command.
Example: If the command syntax is:
show ip {alerts | routes}
show ip alerts or show ip routes
, you must enter either:
.
brackets ([ ])Indicate optional elements in syntax descriptions. Do
not type the brackets when entering the command.
Example: If the command syntax is:
show ip interfaces [-alerts]
show ip interfaces
or
, you can enter either:
show ip interfaces -alerts
.
ellipsis points (. . . )Indicate that you repeat the last element of the
comman d as need ed .
Example: If the command syntax is:
ethernet/2/1 [<
ethernet/2/1
and as many parameter-value pairs as
parameter> <value>
] . . .
, you enter
needed.
italic textIndicates file and directory names, new terms, book
titles, and variables in command syntax descriptions.
Where a variable is two or more words, the words are
connected by an underscore.
Example: If the command syntax is:
show at <
valid_route
valid_route>
is one va riable and you subs titu te one value
for it.
xvi
screen textIndicates system output , fo r exa mple, prompts and
system messages.
Example:
Set Ba y Netw orks Tr ap Mo nito r Fil ters
303509-A Re v 00
Page 17
Acronyms
separator ( > )Shows menu paths.
Example: Protocol s > IP identifies the IP option on the
Protocols menu.
|
vertical line (
)Separates choices for command keywords and
arguments. Enter only one of the choices. Do not type
the vertical line when entering the command.
Example: If the command syntax is:
, you enter either:
show ip {alerts | rou tes
show ip alerts
or
}
show ip routes
, but not both.
ACPAccess Control Protocol
BRIBasic Rate Interface
CHAPChallenge Handshake Authentication Protocol
Preface
CLIcommand line interface
CPEcustomer premise equipment
DLCIData Link Control Interface
DNISdomain name information server
DTEdata terminal equipment
erpcdexpedited r emote procedure call daemon
FTPFile Tra nsfer Protocol
GREGeneric Routing Encapsulation
GUIgraphical user interface
IETFInternet Enginee ring T ask Force
IPInternet Protocol
IPCPInternet Protocol Control Protocol
IPXInternet Packe t Exchange
IPXCPInternet Packet Exchange Control Protocol
ISDNIntegra ted Services Digital Network
303509-A Rev 00
xvii
Page 18
Configuring and Troubleshooting Bay Dial VPN Services
ISOInternational Organization for Standardiza tion
ISPInternet Servic e Provider
LACLayer 2 Tunneling Protocol access concentrator
L2TPLayer 2 Tunneling Protocol
LANlocal area networ k
LNSLayer 2 Tunneling Protocol networ k server
MACmedia access control
NASnetwork access server
OSIOpen Systems Interconnection
PAPPassword Authentica tion Protocol
POPpoint of presence
PPPPoint-to-Point Protocol
PRIPrimary Rate Interface
PSTNpublic-switche d telephone network
PVCpermanent virtual c ircuit
xviii
RADIUSRemote Authentication Dial-In User Service
RIPRouti ng Information Protocol
SAPService Advertising Protocol
SMDSSwitched Multime gabit Data Service
SNMPSimple Network Management Protocol
SPBsession parameter block
SPIsecurity parameter index
TCPTra nsmission Control Protocol
TMStunnel management server
UNIuser network interface
VPNvirtual private network
WANwide area network
303509-A Re v 00
Page 19
Bay Netwo rks Technical Publicati o ns
You can no w print Bay Networks technical manuals and release notes free,
directly from the Int ernet. Go to support.bayn etworks.com/libr ary/tpubs/. Fi nd the
Bay Networks product for which you need doc umenta tion. Then locate the
specific category and model or version for your hardwa re or software product.
Using Adobe Acrobat Reader, you can open the manuals and re lease notes, search
for the sections you need, and print them on most standard printers. You can
download Acrobat Reader free from the Adobe Systems Web site,
www.adobe.com.
You can purchase Bay Networks documentation se ts, CDs, and selected technical
publications through the Bay Networks Collateral Catalog. The catalog is located
on the World Wi de W eb at support.baynetworks.com/c atalog.html and is divided
into sections arran ged alpha betically:
•The “CD ROMs” section lists available CDs.
•The “Guides/Books” section lis ts books on technical topics.
•The “Technical Manuals” section lists av ailable printed documentati on sets.
Preface
Make a note of the part numbers and prices of the items that you want to order.
Use the “Marketing Collateral Catalog description” link to place an order and to
print the order form.
How to Get Help
For product assista nce, support contracts, or information about educational
services, go to the following URL:
http://www.baynetworks.com/corporate/contacts/
Or telephone the Bay Networks Technical Solutions Center at:
800-2LANWAN
303509-A Rev 00
xix
Page 20
Page 21
Bay Networks Dial Virtual Private Network Services provides secure dial-access
services for corpora te telecommuters, mobile professionals, and users in remote
branch offices. Dial VPN provides switched connectivity to virtual private
networks (VPNs), based on Internet Engineering Task For ce (IETF)
specific ations. Corporate customers can subscribe to this service for remote dia l
access to virtual private net wor ks or to the Internet over tel ephone lines.
Bay Dial VPN Overview
Chapter 1
Tunneling Overview
Dial VPN offers remote users simple and secure access to virtual private networks
and the Internet through a mechani sm kno wn as a tunnel. A tunnel is a secure,
virtual, direct path between two end points. The process of encapsul ating,
sending, and decapsulating the datagram is called tunnel ing, and the encapsulator
and decapsulator are considered the end points of the tunnel. Dial VPN
dynamically establ ishe s and removes tunnels as needed. Dial VPN supports both
Layer 3 and Layer 2 tunneling (referring to the ISO model) on the same Internet
Service Provider (ISP) network.
Dial VPN lets ISPs offer a remote acce ss outsourcing service to their ent erprise
customers. Multiple enterprise customers share the same resources in the service
provider’s networ k or Internet. Because a given user’s data is tunneled, it is
inherently secured from the ISP’s other customers, similar to PVCs in a frame
relay network. Each enterprise customer is responsible fo r authenticating
individual dial-in users and assigning network addresses.
Using Dial VPN, an ISP’ s enterprise customers can dial in to a loca l ISP
point-of-prese nce (POP) rather than potentiall y making a long dist ance call to a
Remote Access Concentrator located at the home network. Dial VPN can also
eliminate costs asso ciated with maintaining the remote access equipment.
303509-A Rev 001-1
Page 22
Configuring and Troubleshooting Bay Dial VPN Services
Dial VPN encapsulates multiprotoc ol data within an IP datagram. It then sends the
encapsulated packets through bidirectional IP tunnels over the service provider’s
IP routed backbone to the user’s home network.
Dial VPN implements concepts from IETF working groups, draft specifications,
and standards such as Mobile IP and Remote Authentication Dial-In User Service
(RADIUS), in addition to IP routing, frame relay, and Point-to-Point Protocol
(PPP).
Dial VPN runs on a variety of Bay Networks hardware platforms. The Dial VPN
network access server (NAS) function runs on the Remote Access Concentrator
(RAC) Model 8000, and the 5399 RAC module for the System 5000™ MSX™.
Platforms running BayRS, such as the Access St ack Node (ASN™), the
Backbone Node (BN
BLN-2, and BCN®), and the Model 5380 module for the System 5000 MSX, can
function as the Dial VPN gate way (for Layer 3 Dial VPN), or as the L2TP
network server (LNS, for Layer 2 Dial VPN) or CPE (Layer 3) router on the
customer’s home network.
You configure Dial VPN using the same tools that you use to configure the
Remote Access C oncentrator and the BayRS platf or m (that is, the Remote Access
Concentrator comma nd line interface, CLI, and Site Manager). All the features of
Remote Access Concentrators and of BayRS are a vailable on your Dial VPN
system.
What Is Tunneling?
Tunneling is a way of f orwarding multiprot ocol traffic and addresses fr om remote
nodes to a corporate network thr ough a n Internet Service Provider ’s IP backbone
network. Encapsulation is the tunneling mechanism. It takes an incoming packet
of any protocol, wraps that packet’s contents in a tunnel packet, then routes the
encapsulated packe t over the Dial VPN IP network.
®
) family of high performanc e switch/routers (BLN®,
1-2303509-A Re v 00
Page 23
Tunneling Overview
Dial VPN dynamically creates a tunnel whe n it conn ects to the remote node’ s
home network. One end point of the tunnel is the acc ess concentrator. The other
end point is either the gateway router on the ISP’s network (for a Layer 3 tunnel)
or the L2TP network serve r (fo r a Layer 2 tunnel). Once the tunnel is created,
packets from the remote node and the corpor ate home network flow through the
tunnel. In a Layer 3 connection, each tunn el supports one user . The tunnel exists
as long as the user remains connected. In a Layer 2 connection, each user is a
session. A tunnel is established only once between a LAC and an LNS.
After establishing a conne ct ion, the N AS receives a PPP packet (or payload) fr om
the remote node. The packet mo ves fr om the N AS, through the tunnel to the home
network.
Dial VPN supports both Layer 3 and Layer 2 tunnels on the same ISP network.
Figure 1-1
shows a Dial VPN network with both Layer 3 and Layer 2 (L2TP)
tunnels.
WAN
(PPP or
Frame rela y)
Remote
node
PPP
Remote
node
PPP
RAC
Layer 3 Tunnel
IP Network
L2TP T unnel
GW
Customer Premise
Router
Authentication
Accounting
Authorization
IP Management
Server
Customer Premise
TMS
Router
Authentication
Accounting
Authorization
IP Management
Server
Figure 1-1.Dial VPN Network with Layer 3 and Layer 2 Tunnel s
303509-A Rev 001-3
Page 24
Configuring and Troubleshooting Bay Dial VPN Services
Layer 3 Tunneling
In Layer 3 tunneling , the tunnel exi sts between t he Net work Ac cess S erve r (N AS ),
which is a Remote Access Concentrator (RAC), and a gateway router. Both end
points of the tunnel are withi n the ISP netw ork.
Layer 2 Tunneling
In Layer 2 tunneling, the tunnel exists between the Layer 2 Tunneling Protocol
(L2TP) access concentra tor (LAC), usually a remote access concentrator on the
ISP network, and the L2TP network server (LNS), a router or extrane t access
switch on the customer’s home network. Rather than terminating at the remote
access concentrator, the IP tunnel extends the PPP session to the LNS, which acts
as a virtual remote access conc ent rator.
In this guide, the term LAC refers to a remote access server with L2TP
Note:
capabilitie s. The term RAS refers to a remote access server without L2TP
capabilities.
Other features of L2TP include using the In ternet infrastructur e to support
multiple protoc ols a nd unre giste red IP addre sses. Because the dia l-in user ’s data i s
tunneled at Layer 2 and above (in the ISO model), the L2TP protocol is
independent of Layer 3 information. Enterprise customers with unregistered IP
addressing schemes can also use L2TP to reach their home network.
Comparing Layer 3 and Layer 2 Features
Dial VPN supports both Layer 3 and Layer 2 tunneling on the same ISP network.
Both provide secur e network access for dial-in users to their home net works.
Table 1-1
Layer 2 tunneling.
1-4303509-A Re v 00
briefly compares the most significant features of both Layer 3 and
Page 25
Tunneling Overview
Table 1-1.Layer 3 and Layer 2 Dial VPN Feature Implementation
Dial VPN FeatureLayer 3Layer 2
erpcd
Tunnel management
ProtocolMobile IPL2TP
EncapsulationGREL2TP
Tunnel end pointsNAS and gatewayLAC and LNS
Dynamic IP address
allocation
Layer 3 protocols
supported
, ACP, or
RADIUS (BSAC)
IP pooling or DHCPIP pooling
IP, IP XIP
How a Dial VPN Network Functions
Any authorized remote user (u sing a PC or dial-up router) who has access to a
phone line and a modem can dial into your network through Dial VPN. A remote
node can be an individua l user dia ling in or a dial-up router (using IP) through a
public-switche d telephone network (PSTN) or an ISDN connection. A remote
user can dial in to a Dial VPN network to connect either to a corporate or home
network or to a third-party ISP. Dial VPN regar ds these as function ally equivalent.
Figure 1-2
configura tion. In reality, a Dial VPN service pro vide r’s network might include
seve ral remote access servers to service a variety of dial-in users, with both Layer
3 and Layer 2 tunnels serving dif ferent types of net works. You can configure Dial
VPN so that its operation is transparent both to users and applications. You may
find it useful to dr aw a map of your own configuration and label the interfaces
with their IP and, if appropriate , frame relay Data Link Connection Identifier
(DLCI) addresses.
is a simplified ill ustration of one possible Layer 3 Dial VPN
erpcd
, ACP, or RADIUS
(BSAC)
303509-A Rev 001-5
Page 26
Configuring and Troubleshooting Bay Dial VPN Services
Tunnel
domain
Service
provider network
data
Third-party
Internet
service
provider
network
Customer
network
CPE
CPE
LAN
Customer
RADIUS
Internet
CPE
Third-party
server
Remote
node
PPP
connection
PSTN
Network
access
server (NAS
TMS /erpcd
server
Gateway
T unnel
Frame relay
or PPP
Figure 1-2.Dial VPN Network with Connections to Different Destination Types
Figure 1-2 shows a Dial VPN service provide r netw ork with a Layer 3 tunnel. The
gateway provides connection services both to a corporate LAN and to a
third-party ISP netw ork. This figure shows only one tunnel, but in reality Dial
VPN creates one tunnel for each dial-in connection.
User
data
ISP
RADIUS
server
DVS0012A
In this illustration, a user at a remote node can dial in to a corporate or home
network or a third-par ty ISP b y calling a local phone number associated with that
destination networ k. The network access server handles the call. The service
provider’s networ k uses a standard IP connection between the network access
server, shown here as a 5399 module in a 5000 MSX chassis, and the gateway. A
PPP connection or a frame relay PVC and a static route must exist between the
gatew ay and the customer premise equipment (CPE) router to provide a path for
packets to return to the remote node.
1-6303509-A Re v 00
Page 27
For Bay Networks route rs used with a Layer 3 Dial VPN tunnel, you must specify
an adjacent host and a static rout e betwe en the gateway and the CPE, and also
between the CPE router and the remot e node. (The adjacent host and static rout es
do not appear in this diagram.) For an illustration of Layer 3 tunneli ng, se e
Chapter 3.
The rest of this guide describ es ho w to install and configur e a Dial VPN service
provider network. It also indicates the requirements for the remote node and the
RADIUS and DHCP servers, with references to the documentation that explains
how to do the configuration.
Dial VPN Network Components
Installing and configuring a Dial VPN service provider network involves several
tasks, some of which you may already have completed. You must:
•Plan the network.
•Install and connect the networ k hardware.
•Install and configure the network software.
Tunneling Overview
•Verify that the elements outsi de the Dial VPN network, specifically the
remote server or servers, the router on the home network, and the remote
dial-in nodes, are proper ly configured.
•Power up, test, and troubleshoot your network.
See the documentation for each of these entities for information on how to install
and configure the m.
This guide deals specifically with how you combine these elements into a Bay
Dial VPN network. The following sections summarize the ele ments of Dial VPN
networks.
Remote Dial-In Nodes
Remote nodes can be PCs (portable hosts) or dial-up routers, using PPP for
dial-up connections. The portable host must hav e PPP client sof tware and a
TCP/IP or IPX protocol stack loaded.
Dial VPN supports dial-up IP (and, for Laye r 3, IPX) over PPP for dial-in PC
clients and IP ove r PPP for dial-in routers connected to LANs.
303509-A Rev 001-7
Page 28
Configuring and Troubleshooting Bay Dial VPN Services
The following considerations apply only to Layer 2 (L2TP) tunnels:
•If the PC or router does not have built-in L2TP software capabilities, it dials
into a LAC, which provides a tunnel across the Internet to the c orporate LNS.
This type of connection is the primary focus of this guide.
•If the PC or router is an L2TP client, that is, it has built-in L2TP capability,
the L2TP client software provides a tunnel through a network access server
across the Interne t to the corpora te LNS. A LA C is unnec essary with an L2TP
client.
The main differe nce between connecting an L2TP client and a nonclient is the
starting point of the tunn el. For an L2TP client, the tunnel begins at the PC or
router; for a non-L2TP client, the tunnel be gins at the LAC. All tunnels end at the
LNS.
ISP Network Components for Layer 3 Tunnels
The device s that make up the Dial VPN service provider network can be all at the
same site or can be separated by several “hops” within the same network. A
network with Layer 3 Dial VPN tunnels can consist of a network access server
(NAS), a gateway router that serves as the tunnel end point, and a tunnel
management server.
Network Access Server (NAS)
A network access serv er ( NAS) can be a Remote Access Concentrator
Model 8000 or a System 5000 chassis with one or more Model 5399 Remote
Access Concentra tor modules. Each module is c onfigured with a network address
belonging to the service provider’s address domain. The Remote Access
Concentrator 8000/5 399 includes a dual WAN server, which can support both
analog calls and digita l calls carried over ISDN. The N AS receives and processes
calls from remote nodes and routes data to remote nodes.
This guide uses the term network access server (NAS) to refer to the
Note:
device that performs network access functions, such as answering dial-in user
calls, authenticating tunnel users, building tunnels, and so on. In the Dial VPN
context, this device is usually a Remote Access Conce ntrator (RAC). Other
documents may refer to this same device as a remote access server (RAS).
Essentially, all three terms (NAS, RAS, and RAC) refer to functionally the
same device.
1-8303509-A Re v 00
Page 29
Tunneling Overview
Gateway
Used only in Layer 3 networks, the gateway can be an ASN, BLN, BLN-2, BCN,
or System 5000 MSX equipped with a Model 5380 module running BayRS
software.
The gateway connects the Dial VPN service provider’s network and the CPE
router on the remote user’s home networ k. The gateway performs con ventional IP
routing functions con figured on interfaces connected to the IP network, through
which the network access servers can be reached.
The gatewa y is the end point of the IP-routed tunnels that tra nsport packets
originated by remo te nodes an d encapsulated by the NAS. The gateway also
connects to the CPE router on the user’s home network. The gateway is the data
terminal equipment (DTE) for frame relay PVCs or PPP connections connecting
to multive ndor RFC 1490-compliant routers on the custo mer premises.
For a frame relay network, the connection is through a frame relay user network
interface (UNI). The gateway forwards traffic between a remote node and the
corresponding node in its home net work by forwar ding packet s ove r a frame relay
PVC connecting the UNI to the IP tunnel. Thus, the gateway uses the IP tunnel
and the frame relay PVC as two links through which it can send the user traffic
from one side to the other.
The PPP connection between the gateway and the customer’s home network
functions in a sim ilar way, except that the co nn ecti on i s thro ugh a PPP int erfac e
instead of a frame relay interface.
In Layer 3 tunneli ng, the gateway may al so act as a RADIUS cli ent to a uthenti cate
the remote user based on information provided from the NAS. The RADIUS
client on the gateway se nds an a uthent ication r eque st to t he RADIUS serv er on the
home network, which either grants or denies the request in a message to the
gatew ay. The gateway then returns this information to the NAS to continue the
process.
303509-A Rev 001-9
Page 30
Configuring and Troubleshooting Bay Dial VPN Services
Tunnel Management Server (TMS)
The mechanism for identifyi ng tunneled users is the tunnel management server
(TMS) that resides on a tunnel management server.
For Layer 3 tunne ls, the NAS retr ieves the tunnel configur ation attributes from its
TMS database resid ing on the tunnel management se rver and uses them to build a
tunnel into the customer’s network. Once the tunnel is open, the user can be
authenticated at the customer’s network. Tunnel management can be either
RADIUS or erpcd-based.
•In the RADIUS method, a RADIUS server resides at the service provider site
and manages the TMS database. The NAS and the RADIUS server
communicate using IP over the service provider network. Only Layer 3
tunnels can use this method.
•In the erpcd-based method, the TMS hosts a database application (the Tunnel
Management System) that controls the IP tunnel establishment attempt f rom
the NAS. The TMS runs on the same UNIX host as the Access Control
Protocol (ACP) softwar e. The NAS and the TMS communicate using the Bay
Networks proprietary Expedited Remote Procedure Call Daemon (erpcd or
Secure erpcd). Both Layer 3 and Layer 2 tunnels can use this method.
In either method, the NAS queries the TMS database for the addressing
information it needs to constr uct the IP tunnel. This query is based on the user
domain name and on the policy and state information of the enterprise customer
account when the r emote user dials in. As a Dial VPN networ k a dministrator, you
must provide the user domai n and tunnel ad dressing information to the TMS
database for each enterprise customer. Chapter 5and Chapter 6describe the
commands you can use to provision the default TMS database.
ISP Network Components for Layer 2 Tunnels
The followin g sections describe the components of a network with Layer 2
tunnels. A network with Layer 2 Dial VPN tunnels also has a NAS (which may
function as either a LAC or a RAS) and a tunnel management server. The edge
router, however, does not functio n as a ga teway; rather, the tunnel end point is the
CPE router on the customer’s home network. The network itself can have
additional comp onents. This description pertains only to those relevant to Layer 2
tunneling.
1-10303509-A Re v 00
Page 31
Tunneling Overview
L2TP Access Concentrator (LAC)
The L2TP access concentrator (LAC) resides at the ISP networ k. The LAC
establishes the L2TP tunnel between itself and the LNS. When the remote user
places a call to the ISP network, the call goes to the LAC. The LAC then
negotiates the acti vation of an L2TP tunnel with the LNS. This tunnel carries data
from the remote user to the corporate network.
For more information about the Bay Networks implementation of the LAC in an
L2TP network, refer to Configuring L2TP Services.
Remote Access Server (RAS)
The remote access serve r (RAS) resides at the ISP network. If the remote host is
an L2TP client, the tunnel is established from the remote client through a RAS to
an LNS at the corporate network. In this situation, there is no need for a LAC.
The RAS does not establish the tunnel; it only forwa rds already tunneled data to
the destination.
Tunnel Management Server (TMS)
The ISP network must hav e a mechanism for identifying L2TP tunneled users so
that the LAC can construct the L2TP tunnel. Dial VPN uses a mechanism called a
tunnel management server (TMS); other vendors may use a different method. The
TMS has the same function as for Layer 3 tunnels.
Customer/Home/Internet Service Provider Network
The Dial VPN network interacts with the customer premise equipment (CPE) and
the RADIUS authenticatio n server and the RADIUS accounting serve r on the
customer’s destination network.
Customer Premise Equipment (CPE)
The CPE is a router or extranet switch that connects to the Dial VPN network by
means of frame rel ay PV C s or a PPP connection. The CPE routes traff ic from the
remote nodes to hosts on the home network and from the home network hosts
back to remote nodes.
303509-A Rev 001-11
Page 32
Configuring and Troubleshooting Bay Dial VPN Services
Enterprise subscr ibers of this service must configure the CPE router to allow
routing to oc cur be tween the remote nod es and the h osts on t he home netw ork. For
a Layer 3 frame relay circuit, a frame relay PVC, a static route, and (for a Bay
Networks or other non-Cisco router), adjacent host designation must exist
between the CPE and the gate way router on the Dial VPN network. For frame
relay, all Dial VPN circuits must be in the same service record. PPP circuits have
similar requirements, except for the PVC and service record.
L2TP Network Server (LNS)
The L2TP network server (LNS) is a router that resides at the customer’s home
network and serve s as the termination point for Layer 2 (L2TP) tunnels and
sessions.
The LNS authenticates PPP connection requests and allows end-to-end PPP
tunneled connections. An LNS may also work in conjunction with a RADIUS
server to authen ticate dial-in users.
An LNS can accommodate multipl e users, each with hi s or her own L2TP sessio n.
The L2TP session is the virtual end-to-end connection over which the LAC sends
data to the LNS.
In Layer 2 tunneling, the CPE router is also the LNS. For more information about
the Bay Networks LNS, see Configuring L2TP Services.
RADIUS Authentication Server
The RADIUS authenticat ion serve r on the customer’s network is a networ k access
security system. It uses a locally stored and maintained database that contains all
user authentica tion and network ser vice access information to authenticate dial-in
user access requests.
The Dial VPN RADIUS server for Layer 3 tunnels must be on a
Note:
separate physic al device from any RADIUS serv er for Lay er 2 tunnel s or for
switched services . The RADIUS serv er for Layer 2 tunnels can be the same
physical device as for any dial services RAD IUS server.
The RADIUS server has three main funct ions in a Dial VPN L2TP network:
•Authenticating remote users
•Assigning IP addresses to remote users
1-12303509-A Re v 00
Page 33
Tunneling Overview
•Providing account ing services for corporate billi ng
For Layer 3 tunnels, the RADIUS client of this server resides on the gateway.
The RADIUS client on the ISP network generates a RADIUS authentication
request to the appropriate RADIUS server. This request contains the user
authentication information. The CPE receives the authentication request and
forwards it to the RADIUS server.
Once the user is authenticated, the RADIUS server grants access to the remote
node by returning an authentication accept packet with RADIUS authorization
information to the gateway through the CPE.
For a Layer 3 tunnel, the gateway then forwards the user aut hentication to the
NAS, which initiates an IP tunnel to the gate way using Mobile IP protocol
mechanisms.
For an L2TP tunnel, the RADIUS server database centralizes the authentication
function, eliminating the need to configure each LNS with user names and
passwords. It also assigns an IP address to the remote host to identify the host and
ensure that it is part of its own subnet.
For more information about the Bay Networks implementation of RADIUS user
authentication and accounting, see Configuring RADIUS and the BaySecure Access Control Administration Guide.
RADIUS Accounting Server
The RADIUS accounting serve r tra cks when users start and end their dial-in
connections and acquire s statistics about each sessio n. BayS ecur e Access
Control™ fully supports RADIUS accounting and provides the network access
server with RADIUS accoun ting information for e very active dial-in session. The
RADIUS accounting server can provide accounting services for the corporate
network, calculating billing charges. For a full description of BaySecure Access
Control and the RADIUS f unctions it supports, see the BaySecur e Access Control Administrat ion Guide.
303509-A Rev 001-13
Page 34
Configuring and Troubleshooting Bay Dial VPN Services
DHCP Server
If you implement the optiona l Dynamic Host Conf iguration P rotoc ol (DHCP) as a
way of dynamically assigning IP addresses to dial-in users, you must also
configure a DHCP server on the customer’s network . F or a detailed description of
using DHCP, see Chapter 8 in this guide.
Additional Planning Information
Appendix A contains a network planning worksheet that you can use in
determining how to configure the BayRS side of your Dial VPN network. You
may not have enough inf ormation yet to complete this worksheet, but if you fill it
in as you go along, it can provide document ation for your network. You may also
find this info rmat ion useful when changing or troubleshooting your network.
Where to Go Next
For a descriptio n of how a packet moves through a Dial VPN network an d other
background information that can help you visualize the data flow through the
network, go to Chapter 2 for Layer 2 tunneling or Chapter 3 for Layer 3 tunne ling.
For informatio n about configuring Dial VPN, go to Chapter 4.
1-14303509-A Re v 00
Page 35
Chapter 2
Dial VPN Layer 2 Tunneling
This chapter describes how a Layer2 Dial VPN tunnel functions. Among these
concepts are ho w a data packet se nt from a remote node using PPP moves thr ough
a Dial VPN service provider’s network to a corporate or “home” netw ork via a
frame relay or PPP connection. It also explains how the Dial VPN tunnel forms a
path to move data quickly and eff ic iently to and from the remote node through the
Dial VPN service provide r’s IP backbone network.
Dial VPN uses encapsulation technologies and the Layer 2 Tunn eling Protocol
(L2TP) to provide a secure pathw ay for remote users to exchange data with their
corporate hom e network. Regardless of where a remote node is l ocated, it ca n dial
in to its Dial VPN service provider and connect to the home network.
Figure 2-1
an L2TP access concentrator (LAC) and the other tunnel end point is the CPE
router or extr anet switc h on the c ustomer’s home net work. That r outer or switch is
the L2TP network serv er (LNS) , whic h termi nates all L2TP tunnels and sessions
with that network. In this f igure, the dotted line shows the path of the packet
through the tunnel; the Dial VPN service provider network is the ISP networ k.
303509-A Rev 002-1
shows the path of a packet in a Layer 2 tunnel. The NAS functions as
Page 36
Configuring and Troubleshooting Bay Dial VPN Services
ISP network
Frame rela y
Remote
host
PC
No L2TP
functionality
PPP
connection
LAC
T unnel
Data
TMS
connection
Figure 2-1.Layer 2 Tu nnel Pac ket Path
Note:
If the dial-in node is conf igured with an L2TP client, that client se rves
as the LAC, and the RAC serves the functi on of a normal network access
server. In this guide, most of the descr iptions use the Remote Access
Concentrator as the LAC for Layer 2 tunnels.
Buildi ng a Netw ork for Layer 2 Tunneli ng
The steps that follow provide a suggested order for configuring your network for
Dial VPN Layer 2 tunneling. For detailed information about each of these steps,
see Chapters 4 through 10.
Corporate network
LNS
RADIUS
server
At the ISP network , co nfigu re the followin g:
1.
•Remote Access Concentrator, serving as the L2TP access concentrator
(LAC)
•Tunnel management server (TMS) on the erpcd server for the
erpcd-based solution
•Access Control Protocol (ACP) server (only for the erpcd-based solution)
•Edge router capable of connecting to the LNS on the customer’s home
network with fram e rel ay or PPP
2-2303509-A Re v 00
Page 37
Dial VPN Layer 2 Tunneling
Install and configure any intermediate nodes on the WAN .
2.
The WAN can include intermediate nodes. For installation and startup
information, refer to the hardware documentation for each device.
Install the software for the tunnel management server , Remote Access
3.
Concentrator , and (for the
-based solution) Access Control Protocol
erpcd
on the host that serves as the load host for the Remote Access
Concentrator .
For installation instructions, see the Remote Access Concentrator
documentation.
Load the operating software onto the Remote Access Concentrator and
4.
boot the Rem ote A cce ss C o nce ntr a to r.
For detailed descr iptions of the boot procedures, see the Remote Access
Concentrator documenta tion.
Configure the Remote Access Concentrator software, as described in
5.
Chapter 4, to handle PPP dial-in calls from remote nodes, determine
whether they a re tunn el clients, and route the m ap prop ria tel y.
Configure the TMS (i ncluding the aut hen ti ca tio n ty pe ) by addi ng an
6.
entry in the TMS for each domain in the TMS database. See Chapter 5
and Chapter 6 for more information.
When configuri ng the TMS, you can choose either local or remote
authenticati on. Dia l VPN uses a RADIUS serve r on the customer’s home
network to provide authentication and assign IP addresses.
For DHCP address allocat ion, conf igure the TMS with the DHCP parameters,
as described in Chapter 5.
Establish a conne ction between the edge router on the Dial VPN network
7.
and a CPE router (the LNS) on the home network using frame relay or
PPP.
Make sure that the home network is configured to connect to the Dial
8.
VPN network.
Specifica lly, ensure that:
•The RADIUS server on the home network is configured to work with the
RADIUS client on the Dial VPN network. If dynamic IP address
allocation or DHCP is enabled, the RADIUS or DHCP server must have
an allocated pool of addresse s for au thenticated dial-in users an d ha ve
RADIUS accounting enabled.
303509-A Rev 002-3
Page 38
Configuring and Troubleshooting Bay Dial VPN Services
•The CPE router that is the end point of Layer 2 tunnels is configured as
the LNS and is configured with a frame relay or PPP connection to the
ISP network (including a static route and an adjacent host if the CPE
router is not a Cisco device).
For instruct ions on configuring the LNS, see Configuring L2TP Services.
•An y sha red information, such as passwor ds, “secre ts,” or phone numbers,
is consistent across the link.
Individually tes t each network component, then test the entire system.
9.
L2TP Packet Encapsulation
The dial-in user sends PPP packe ts to the LAC, which encapsulates these
incoming packets in an L2TP packe t and sends it across an IP network through a
bidirectional tunnel. After the LNS recei ves the packets, it deca psulates them and
terminates the PPP connection.
Figure 2-2
shows how data is encapsulated for transmission over an L2TP tunnel.
2-4303509-A Re v 00
Page 39
Dial VPN Layer 2 Tunneling
Remote user places a call
PPPIP
Layer 2
protocol
IP/UDP
IPDATA
Data packet moves to the corporate network
LAC
LNS
DATA
PPP
IPL2TP
DATA
L2T0005A
Figure 2-2.L2TP Packet Encapsulation Process
Bay Networks L2TP Implementation
In an L2TP tunnel, the Bay Networks router or extranet switch on the home
network is the LNS. LNS software oper ates on the BLN, BCN, and ASN
platforms.
The Bay Networks LNS has the following characteristics:
•Ea ch slot c an act as an LNS, which means th at one router can ha ve man y LNS
interface s, each with its own address . You can have as man y LNS i nterfaces as
there are available slots on the router.
303509-A Rev 002-5
Page 40
Configuring and Troubleshooting Bay Dial VPN Services
•The LNS performs user authenticati on with a RADIUS server to preve nt
unauthorized user s from accessing the network.
•The LNS accepts only incoming calls; it does not place calls to the LAC.
•The Bay Networks L2TP implementation supp orts only IP traffic through the
L2TP tunnel. The LNS supports only numbered IP addresse s.
•The router interface between the ISP and the home network (see Figure 2-4
a leased line operating with frame relay or PPP (including PPP multilink).
Bay Networks recommends th at you use a high-spe ed link, such as T1, for the
leased connection.
•The LNS terminates PPP multilink and PPP encapsula ted data within an
L2TP packet.
•The LNS operates with the LAC implementa tion configured on the Bay
Networks Model 8000/5399 Remote Access Concentrator.
•The host (PC or router) dialing into the ISP network can be on the same
subnet as the IP inte rface on the LNS.
•The LNS supports RIP. RIP is particularly usef ul when the remote host is a
router, because it enables the LNS to learn routing inf ormation from the
remote router.
For a summary of how to conf igure the LNS, see Chapter 8 of this guide. For
complete instruct ions on how to configure a Bay Networ ks rou ter as an LNS, see
Configuring L2 TP Services.
Tunnel Management in L2TP Tunnels
The Bay Networks tunnel management server (TMS), which resides at the ISP
network, stores the TMS database. This database contains the remote users’
domain name, the IP address informati on of each LNS, and other tunnel
addressing information that the network administrator configures. The LAC
requests this information from the TMS to construct the L2TP tunnel.
) is
2-6303509-A Re v 00
Page 41
When the LAC receives a call, it forw ards the domain name to the TMS. The
domain name is th e por tion of the use r’s add ress that s pecif ies a parti cul ar locati on
in the network. For example, if the user name is jdoe@baynetwor ks.com,
baynetworks.com is the domain name. The TMS looks up the domain name and
verifies that the remote user is an L2TP user. The TMS also provides the LAC
with the addressing information required to establish a tunnel to the correct LNS.
The domain name referred to in this guide is a domain identifier that
Note:
does not foll ow a speci fi c format . It i s not related t o any Domain Na me System
(DNS) protocol requirements.
Security in an L2TP Network
You can configure two layers of security in an L2TP network:
•Tunnel authentication
Tunnel authentication is the process of negotiating the establishment of a
tunnel between the LAC and the LNS.
Dial VPN Layer 2 Tunneling
•User authentication
The network administr ator at the corporate site can configure a RADIUS
server with the names and passwords of authorized users. The server’s
database central izes the authentication funct ion, eliminating the need to
configure each LNS with user names and passwords.
When the LNS receives a call, it forwards the user information to the
RADIUS server, which verif ies whether the user is authorized to access the
network.
You can also co nfigure the LNS to perform user authentication if a RADIUS
server is not part of the network configuration.
The followin g paragraphs describe the Bay Networks implementation of tunnel
and user authentication.
Tunnel Authentication
For Dial VPN Layer 2 tunnel security purposes, you must enable the LNS to
perform tunnel authentication. Tunnel authentication i s the process of negotiating
the establishment of a tunne l.
303509-A Rev 002-7
Page 42
Configuring and Troubleshooting Bay Dial VPN Services
During tunnel authenti cation, the LNS identifies the L2TP client or LAC by
comparing the LAC ’s tunnel authentication passw ord with its own password. If
the passwords match, the LNS permit s the LAC to establish a tunnel.
The LAC does not send the tunnel authentication password as a plain-text
message. The exchange of pass words works much like the PPP Challenge
Handshake Authent ication Prot oco l (CHAP). When one side recei v es a cha llenge ,
it responds with a value that is calculated based on the authentication password.
The receiving side matches the value against its own calculation. If the values
match, authentication is successful.
Tunnel authentication occurs in both directions, which means that the LAC and
LNS both try to verify the other’s identity.
You can enable tunnel authentication on the Bay Networks LNS. If tunnel
authenticati on is disabled, which i s the def ault, the LNS sends a default challenge
response to the LA C during the authentication process so that the tunnel can be
established. The LNS cannot send outgoing calls, so it cannot initiate tunnel
authentication.
During tunnel authenti cation, the following exchange of messages takes pla ce:
1.
The LAC sends a tunnel setup message, called the start control connection reque st (SCCRQ) message to the LNS. This message includes a challenge to
the LNS.
2.
The LNS replies with a tunnel response, a chal lenge response, and its own
challenge message. This is called the start contr ol connection r eply (SCCRP)
message .
3.
The LAC repli es with a challenge response that includes its tunnel
authentication password. This is the start control connection connected
(SCCCN) message.
4.
If this same password is configured for the LNS, the LNS grants approval to
the LAC to estab lish a tunnel.
Figure 2-3
2-8303509-A Re v 00
shows tunnel authentication and the control messages.
Page 43
Dial VPN Layer 2 Tunneling
ISP network
LAC
SCCRQ
tunnel request and challenge
SCCCN
challenge response
Figure 2-3.Tunnel Authentication Control Messages
After tunnel authentication is complete, it need not be repeated for other calls to
the same LAC.
RADIUS User Authentication
Corporate network
PPP connection
LNS
SCCRP
tunnel response, challenge response,
and LNS challenge
L2T0006A
RADIUS user authentic ation is ena bled b y defa ult on the Bay Netw orks LNS; you
must configur e this feature so tha t the LNS can validate the remote user’s identity
before allowing access to the network.
The network administr ator at the corporate site must configure a RADIUS server
with the names and pas swords of authorized use rs. When the LNS receives a call,
it forwards an authentic ation request with the user infor mation to the RADIUS
server, which verifies whether the user is author iz ed. If the user is permitted
access to the network, the RADIUS serv er replies with an acknowledgment
message and the appropriate IP address inf ormation for that user to make a
connection.
For more information about configuring Bay Networks routers as RADIUS
servers, see Configuring RADIUS.
303509-A Rev 002-9
Page 44
Configuring and Troubleshooting Bay Dial VPN Services
RADIUS Accounting
The RADIUS server can provide accounting services in addition to its
authentication services. RADIUS accounting is enabled by default on the Bay
Networks LNS.
The RADIUS accounting serve r calculates billing char ge s for an L2TP session
between the remote user and the LNS. To de termine these charges, the se rver uses
information that it rec eives from the LNS, such as the status of each call and the
number of packets sent during the ses sion. Using this data, the RADIUS server
determines billing c harges, which the network administrator can use to manage
network costs.
The primary RADIUS accounting server can be the same server as the
authentication server or it can be a different server.
For more information about RADIUS accounting, refer to Configuring RADIUS.
L2TP IP Interface Addresses
When configuring the Bay Networks LNS, you must configure an IP address for
every slot that has an L2TP interface. This address is referred to as the L2TP IP interface address. The L2TP IP interface can be any valid IP address.
The L2TP IP interface address is internal to the LNS. When communicating with
the remote user , the LNS associa tes the user’s IP addr ess, which is a ssigne d by t he
RADIUS server, with the L2TP IP interface address that you configured.
The L2TP IP interface address and the RA D IUS-assigned IP ad dress do not have
to be in the same subnet.
2-10303509-A Re v 00
Page 45
Remote Router Configuration
If the host at the remote site is a Bay Networks router, you may need to configure
a dial-on-demand circuit for the remote router’s dial-up interface to the LAC at the
ISP network.
Enable RIP on both the dial- on-demand circuit and the attached LAN interface of
the remote router, so that the LNS can learn routing information from the remote
router. To avoid unnecessarily activating the circ u it becau s e o f R I P pa ckets ,
enable dial-optimized routing for the dial-on-demand circuit.
In addition, c onfi gure a de fault or static r oute f or the r emote r outer, which use s the
next-hop address tha t corresponds to the L2TP IP interface address of the LN S.
This de f a u l t o r st a t i c ro ute ena b l e s th e remo t e r o u ter to deliver L2TP packets to
the LNS.
Starting an L2TP Session
The connection process for Layer 2 tunnels is similar to that for Layer 3, but the
end points of t he tunnels a re dif ferent. In L2TP t unneling , th e end point of t he PPP
connection from a LAC or a remote access server (RAS) extends to an L2TP
network server (LNS). Multiple users can communicate through a single tunnel
between the same LAC and LNS pair. Each user transmits and rece ives data in an
individual L2TP session.
Dial VPN Layer 2 Tunneling
Packets flow across an L2TP tunnel during an L2TP session. An L2TP session is
created when an end-to-end WAN connection is established between the remote
host and the LNS.
The L2TP portion of the packets sent thr ough the tunnel contains a header with a
call ID field (also called a session ID) and a tunnel ID field. The call ID field,
which indicate s the sess ion t hat the WAN packet belongs to, is ne goti ated b etween
the LAC and the LNS when the L2TP call is set up. The tunnel ID specifies the
tunnel that the L2TP session is using.
In addition to the fi el ds in the header, the L2TP packet contains a call serial number, which is a unique number for each L2TP call. This number matches the
call to the L2TP session.
303509-A Rev 002-11
Page 46
Configuring and Troubleshooting Bay Dial VPN Services
Examples of L2TP Tunnels
Figure 2-4 shows an L2TP network that uses a LAC to connect to the LNS. The
tunnel is between the LAC and the LNS.
ISP network
Remote
host
PC
No L2TP
functionality
PPP
connection
LAC
T unnel
Data
TMS
Figure 2-4.L2TP Network Using a LAC
Figure 2-5 shows an L2TP network that uses a RAS to connect to the LNS. The
tunnel is between the PC (the L2TP client) and the LNS.
ISP network
Remote
host
PC
T unnel
RAS
Data
Frame rela y
connection
Frame rela y
connection
Corporate network
LNS
RADIUS
server
L2T0003A
Corporate network
LNS
L2TP
client
RADIUS
server
L2T0004A
Figure 2-5.L2TP Network Using a RAS
2-12303509-A Re v 00
Page 47
Dial VPN Layer 2 Tunneling
Making a Connection Across an L2TP Network
The followin g steps explain how a remote user connects across an L2TP network
that includes a Bay Networks LAC, TMS, and LNS. (See Figure 2-4.)
1.
The remote user dials a LAC at the local ISP network to establish a PPP
connection to the corpora te network.
In the call, the user includes any required information, for example, a user
name, including a domain name and a password. When dialing in, the user
enters a name, for example, jdoe@baynetworks.com; jdoe is the use r name
and baynetworks.com is the domain name.
2.
The LAC receives the call and passes the domain name to the TMS.
If the TMS finds a match for the domain name, a tunnel can be created. The
TMS also checks the number of current connections so that they will not
exceed the maximum number allowed.
If the user is not a tunnel candidate, as determined by the domain name, the
LAC assumes that the remote host is making a regular dial-in request and
authenticates the user acc ordingly.
3.
The LAC tries to establish an L2TP tunnel with the LNS.
For the LAC to send a tunnel request to the LNS, it needs the address of the
LNS. The LAC requests the address from the TMS. It then checks for this
address in its own routing table. Aft er obtaining the address, the LAC sends a
tunnel request to the LNS. The LNS may perform tunnel authentication, if
configured to do so. If the LAC and LNS complete tunnel authentication
successfully, the LAC establishes the tunnel.
4.
After the tunnel is established, the LAC forwa rds the remote user’ s name to
the LNS, which ver if ies the user’s identity with the corporate RADIUS serv er.
If the RADIUS server recognizes the user name, it replies with an
acknowledgm ent and an IP address that it assigns to the remote user for the
duration of the call. This IP address identifies the remote user who may not
have an addre ss of his own.
5.
After the remote user is succ essfully au thentica ted, the user ha s an end-to- end
PPP connection to the corporate network over the Internet.
The tunnel can now carry a user session dur ing which the LAC and the LNS
exchange PPP packe ts.
303509-A Rev 002-13
Page 48
Configuring and Troubleshooting Bay Dial VPN Services
When Does Dial VPN Tear Down the Tunnel?
The LAC brings down the tunnel for any one of the following reasons:
•A network failure occur s.
•The LAC or other equipment at the ISP is not operating properl y. If the LAC
fails, all tunnel users are disconnected.
•There are no active sessions inside the tunnel.
An individual se ssion ends when a remote user disconnects the call, but
multiple sessions can ru n inside a single tunnel.
•The system administrator at the ISP ter minates the user connection.
•The LAC is not responding to a Hello packet from the LNS.
For the LAC to rees tablish a tunnel, the remote user must place a new call.
If the LAC fa ils, all tunnel users are disconnect ed and the active us e r counts are
decremented. Ho wev er, there is no quick way to determine when a LA C fails . The
logging connection may not be reset until after new tunnel users have connected.
When a LAC starts, one of the f irst things it does is open its A CP-logging
connection. When a new logging connection opens, TMS decrements the
appropriate co unts for eac h domain t hat had a us er connect ed to the LAC . If thi s is
the first time the LAC has come up, then there will be nothing to decrement.
If you enter the
Note:
reset security
command, a new u ser who tries to make
a connection with the LAC causes the maximum number of users count to
decrement, even though users with exis ting connections are still connec ted.
This means that the maximum number of users count may be exceeded. As
users with existing connections disconnect, the count will synchronize and
correspond to the actual number of users connected.
If the TMS fails, a LAC can detect the failure through the failure of the logging
connection. The LAC falls back to secondary ser vers, if any. Unless the data base
is shared by the TMS servers, the count of current users is lost.
If the TMS database runs out of disk space while tms_dbm is running, the user
sees an error message. The error messa ge may not state what caused the error. If
there is a shortage of disk space and erpcd cannot create a lock file or add a LAC
to the TMS database, TMS generates a syslog message and t he user cannot make a
connection to the LA C.
2-14303509-A Re v 00
Page 49
Chapter 3
Dial VPN Layer 3 Tunneling
This chapter describe s how a Layer 3 Dial VPN tunnel functions. Among these
concepts are ho w a data pack et sent from a remote node using the point-to-point
protocol (PPP) moves through a Dial VPN service provider’s network to a
corporate or “home” network via a frame rela y or PPP connecti on. It also explains
how the Dia l VPN tunnel forms a path to move data quickly and efficiently to and
from the remote node through the Dial VPN service provider’s IP backbone
network.
Dial VPN uses the Generic Routing Encapsulat ion (GRE) protocol and the Mobile
IP protocol to provide a secure pathway for remote users to exchange data with
their corpora te home netwo rk ove r a Layer 3 tunn el. Re gardle ss of whe re a re mote
node is located, it can dial in to its Dial VPN servi ce provider and connect to the
home network.
For example, Figure3-1
from the NAS, through the Layer 3 tunnel to the gatewa y, across a frame relay
connection, and on to the home network. In this figure, the dotted line shows the
path of the packet through the tunne l; the Dial VPN service provider netw ork is
the ISP network.
303509-A Rev 003-1
shows how a packet moves in an erpcd-based network
Page 50
Configuring and Troubleshooting Bay Dial VPN Services
A
BayD VS service
provider network
T unnel
Data
Tunnel
management
server/ACP server
Gateway
Remote
node
PPP
connection
Remote
annex
Figure 3-1.Layer 3 Tu nnel Pac ket Path
Buildi ng a Netw ork for Layer 3 Tunneli ng
Frame rela y
connection
Corporate
"home"
network
DVS0001
The steps that follow p ro vide a suggested order for conf iguring your net work. For
detailed information about each of these steps, see Chapters 4 through 10.
At the ISP network , co nfigu re the followin g:
1.
•Remote Access Concentrator, serving as the network access server (NAS)
•Tunnel Management Server (TMS), either on the UNIX erpcd server for
the erpcd-based solution or on the service provider net work RADIUS
server for the all -RADI US solution
•Access Control Protocol (ACP) server (only for the erpcd-based solution)
•Bay Networks r outer that serves as the gateway to the remote user’s ho me
network
Install and configure any intermediate nodes on the WAN .
2.
The WAN can include intermediate nodes. For installation and startup
information, refer to the hardware documentation for each device.
3-2303509-A Re v 00
Page 51
Dial VPN Layer 3 Tunneling
Install the software for the tunnel management server , Remote Access
3.
Concentrator , and (for the
-based solution) the Access Control
erpcd
Protocol on the UNIX host that serves as the load host for the Remote
Access Concentrator.
For installa tion information, see the Remote Access Concentrator
documentation.
Load the operating software onto the Remote Access Concentrator from
4.
the UNIX load host and boot the Remote Access Concentrator.
For detailed descr iptions of the boot procedures, refer to the Remote Access
Concentrator documenta tion.
Configure the Remote Access Concentrator software, as described in
5.
Chapter 4, to handle PPP dial-in calls from remote nodes, determine
whether they a re tunn el clients, and route the m ap prop ria tel y.
For the all-RADIUS s oluti on, in stall and conf igure the RADIUS server on
6.
the service provider network to support the TMS database.
For more information about installing and configuring RADIUS servers on
the ISP network, see Chapter 6.
Configure the TMS (i ncluding the aut hen ti ca tio n ty pe ) by addi ng an
7.
entry in the TMS for each domain in the TMS database. Refer to
Chapter 5 and Chapter 6 for more information.
When configuri ng the TMS, you can choose either local or remote
authenticati on. F or both the erpcd-based and the all-RADIUS solutions, Dial
VPN uses remote authentication; that is, a RADIUS server on the customer’s
home network provides authentication and assigns IP addresses.
For DHCP address allocat ion, conf igure the TMS with the DHCP parameters,
as described in Chapter 5.
Configure the gateway, including the RADIUS client, using Site Manager ,
8.
then boot the gatewa y.
Configure the gateway with an IP connection to the Dial VPN network and a
frame relay or PPP connection to the CPE router on the remote use r’s home
network. Configure a RADIUS client on the gatew ay. For information on
configuring the gateway, see Chapter 7.
Establish a connection between a gateway on the ISP networ k and a CPE
9.
router on the home network using fra me re lay or PPP.
303509-A Rev 003-3
Page 52
Configuring and Troubleshooting Bay Dial VPN Services
Make sure that the home network is configured to connect to the Dial
10.
VPN network.
Specifica lly, ensure that:
•The RADIUS server on the home network is configured to work with the
RADIUS client on the Dial VPN network. If dynamic IP address
allocation or DHCP is enab led, the RADIUS or DHCP serv er must ha ve a
pool of addre sses all ocate d for a uth enticat ed dial- in users. F or dynamic IP
address allocation, you must have RADIUS accounting enabled.
•The CPE router is c onfigured with a frame relay or PPP connection to the
Dial VPN gateway ( including a static route and an adjacent host if the
CPE router is not a Cisco device), and a separate but similar frame relay
or PPP connection to the RADIUS client on the gateway.
•An y sha red information, such as passwor ds, “secre ts,” or phone numbers,
is consistent across the link.
The Dial VPN RADIUS server for Layer 3 tunnels must be on a
Note:
separate physic al device from any RADIUS serv er for Lay er 2 tunnel s or for
dial services. The RADIUS serv er fo r Layer 2 tunnels can be the same
physical device as any dial services RADIUS server.
Individually tes t each network component, then test the entire system.
11.
How Tunnel Management Works
Tunnel management operates differently on erpcd-based and RADIUS-only
networks, but the end result is the same.
Tunnel Management in an erpcd-Based Network
For an erpcd-based network, the tunnel management server (TMS) runs on the
same host as the Remote Access Concentrator (erpc d) and Access Control
Protocol (A CP) software. The TMS verifies that the user at the remote node is a
Dial VPN user . If the dom ain por tion of th e user name e xis ts in the TMS data base ,
ACP increa ses the number of current users by one and sends a Grant message to
the NAS. The Grant message contains the tunnel addressing inf ormation needed
to send a packet from the remote node to the home network.
3-4303509-A Re v 00
Page 53
Dial VPN Layer 3 Tunneling
The Grant message contains the following information, which is stored in the
TMS database:
•Remote node’s domain name
•Domain name information server (DNIS) -- for Model 8000/5399 platforms,
the DNIS is the called number; for other platforms, it is 0 (zero)
The default value for the DNIS is 0. The NAS administrator can change
Note:
this value .
•Hom e agent’s IP address on the gate w ay (the IP address of the gate w ay end of
the IP tunnel)
•Current number of users
•Type of connection between the ISP network’s edge router or gate way a nd the
CPE router on the remote node’s home network
•Primary and secondary RADIUS server IP addres ses
•Authentication protoc ol information
For each tunnel user, the NAS sends this information to the RADIUS c lient on the
gateway, which in turn sends an authentication and address request to the
RADIUS server on the remote node’s home network. Whe n the RADIUS serve r
responds, authenticating the user, the NAS establishes the tunnel.
Tunnel Management in an All-RADIUS Network
The all-RADIUS solution integrates the TMS database functions into the
RADIUS server that resides on the service provider networ k. This RADIUS
server recogniz es the format of the VPN identifier in the user name and returns
tunnel information to the NAS. The NAS uses the tunnel information to establish
a connection to the gateway. Once the connection is made, the user authentication
information is forw arde d to the indicated authentication se rver.
Refer to Chapter 5 for more information about the contents of the TMS database.
303509-A Rev 003-5
Page 54
Configuring and Troubleshooting Bay Dial VPN Services
How the TMS Database Works
The TMS database (by default, UNIX ndbm) resides on the tunnel management
server, which resid es on the service pro vider’s network. The main f unction of this
database is to v erify the user name (or domain) inf ormation supplied by the NAS.
It also supplies the NAS with the tunnel addressing information (in the Grant
message) that it needs to create a tunnel for a remote user. The Dial VPN
administrator ent ers the domain information and the tunnel addre ssing
information into the dat abase as part of the TMS configuration process.
When the TMS receives a lookup request from the NAS, it parses the user name
into the user and domain name and DNIS, and creates a Domain/0 or
Domain/DNIS key. The TMS database uses this key to f ind a match in the
database with the supplie d user name. If the key matches an existing e ntry, the
TMS checks to make sure that the maximum number of users is less than the
configure d maximum. If so, th e TMS sends a Grant messa ge indica ting that t his is
a Dial VPN user. The Grant message contains the tunnel addressing information.
Since ndbm does not have a locking feature, Bay Networ ks has implemented
application- le vel loc king to pre ve nt users from updati ng the databas e while others
are using it. The lock file s are created in the UNIX install directory.
The erpcd and tms_dbm utilitie s use a common library of functions (in
Note:
tms_lib .c) to access the database. If you repla c e the database and provide
access to it through the same libr ary fu nction interface, as required, the same
commands will work. You can replace the default database engine with a
standard UNIX relational database, such as Sybase, Informix, or Oracle, or
with one you have created yourself. For information about how to replace the
default TMS database, contact the Bay Networks Technical Solutions Center.
Dynamically Allocating IP Addresses
Dial VPN lets you choose betwee n two methods of dynamic IP address allocation:
•Dynamic Host Configurat ion Protocol (DHCP) requires its o wn server and
allocates IP addresse s for a configurable, renewable period, called a lease.
•IP address pooling uses the Dial VPN RADIUS server and allocates an IP
address from a configured pool for the duration of the user’s dial-in session.
The following sections describe each of these methods.
3-6303509-A Re v 00
Page 55
Using DHCP for Dynamic IP Address Allocation
This method requires a DHCP server on the home/co rporate network. This server
communicates with a DHCP client proxy resi ding on the gateway. The server
dynamically allocate s a n IP address for a dial-in user when the client proxy
requests one.
Based on RFC 2131 and its extensions, DHCP provides a scalable method of
dynamically alloc ating IP addr esses to remo te users a nd a way of managing th e IP
addresses dynamically assigned to dial-in users. This implementation supports:
•Standard DHCP operation, as described in RFC 2131
•Interoperation with standard DHCP servers
•Use of both primary and secondary DHCP servers
•DHCP leases with as many users as there are tunnels
•Both Dial VPN (tunneled) and non-tunneled users
•Getting IP addresses through either the local or the remote DHCP client
proxy, in addition to other methods that Dial VPN supports, depending on
how the Dial VPN subscriber is provisioned
Dial VPN Layer 3 Tunneling
How DHCP Works
DHCP implements the concept of IP address leasing. An authenticated dial-in
user receives an exclusive right to use an assigned IP address for a specific,
configurable period of time, called a “lease.” When this lease expires, the DCHP
client proxy c an rene w the lease o r let it l aps e, return ing the I P address t o the pool.
DHCP lets a network manager specify a range of assignable IP addresses without
requiring that each IP addre ss be ti ed to a specific MAC (har dware) address. The
DHCP server leases an IP address to each dial-in user and dynamically maintains
a table that links a user’s IP and MAC addresses. For users who need a fixe d IP
address, a network manager can also specify a permanent assignment. A singl e
NAS can communicate and maintain DHCP leases with as many DHCP servers as
there are ports on the N AS (up to 48 or 62, depending on the model).
When a remote user dials in to a network access server (NAS), Dial VPN
performs the usual authenticat ion function s. When the gate w ay retur ns t he Mobile
IP (MIP) authentication r esponse to the NAS, however, the NAS sends the
gateway a MIP dynamic address allocation (DAA) request. The gateway sends a
303509-A Rev 003-7
Page 56
Configuring and Troubleshooting Bay Dial VPN Services
DHCP discover reque st to the DHCP server on the home network, and the server
responds with an acknowledgment (ACK) if the request is successful. The
gatew ay then sends the MIP DAA response back to the NAS, and the rest of the
negotiation proceeds as usual. Figure 3-2
Each dial-in user retains exclusiv e uses of a unique IP address for the duration of
the dial-in sessio n. Dia l VPN relies on the Bay Secure Access Co ntrol (BSAC)
RADIUS server on the user’s home network to pr o vide th ose addresse s, al locat ing
them either statically or dynamically. In static allocation, the RADIUS
administrator as signs specific addres ses for specific users. In dynamic allocation,
the administrator allocates a pool of IP addres ses from which the RADIUS server
selects an address to assign.
The network administr ator configures the IP address of a RADIUS server on the
home network that uses dynamic addre ss a llocation and also enables dynamic
address allocati on on the gateway for that serv er connection.
When a user dials in to a network using dynamic address allocation, RADIUS
authenticates the user and assigns an IP address from the pool. RADIUS also
maintains a data base of assig ned ad dresses. This pr e vent s dupl icat e assignments if
the server fails.
When the connection ends, the relea sed IP address returns to the pool, at the end
of the assignment queue.
Dial VPN Layer 3 Tunneling
To implement dynamic IP address allocation, Dial VPN requires that the BSAC
software be instal le d on the RADIUS server on the customer’s home network.
BSAC is a robust implementation of the draft IETF RADIUS specif ication,
compliant with RFC 2058 and RFC 2059.
For informatio n about BaySecure, see the BaySecure Access Control Administrat ion Guide.
How Dynamic I P Address Allocati on Works
Dial VPN implements d ynamic IP addr ess a ssignment usi ng the Site Mana ger and
BaySecure Access Control (BSAC). Using Site Manager, the ISP network
administrator f irst enables RADIUS accounting on the gateway.
303509-A Rev 003-9
Page 58
Configuring and Troubleshooting Bay Dial VPN Services
The BSAC (RADIUS) administr ator at the cust omer’s site must ente r one or more
IP address ranges to be used as a pool of assignable addresses. For each remote
user , the RADIUS administr ator can enter either a specif ic IP address or allow the
assignment of an I P address from the pool. The administra tor can, in fact, set up a
standard profile with “assign from pool” specified, and apply this profile to many
users at once.
The Current Users display identifies the active users and their assigned IP
addresses, so that the RADIUS administrator can tell which user has which
address. In addition, the administrator can release any assigned address that is no
longer in use by select ing that address and clicking on Clear. For more
information about assigning and managing IP addresses, see Configuring RADIUS.
Dynamic address assignment is not available for IPX.
Note:
Assigning Addresses
All available IP addresses are in a queue. The first address in the queue is the first
one assigned. Released ad dresses return to the end of the queue for reassignment.
RADIUS saves all current address assignments in a database to prevent duplicate
address assignments if the server fails.
The gateway on the ISP network is a client of the RADIUS server on the
customer’s network; t hat is, it provi des a ser vice to the di al-i n user , such as PPP or
®
Telnet
. The client is responsible for passi ng user information to the designated
RADIUS server. The RADIUS server receives the request and returns a response
to the client that it has successfully received the request.
The client and the RADIUS server authenticate the transactions between them
through the use of a shared secret, which is never sent over the network. Both
must be configured with the same secret for authentication to take place.
Each service that the NAS provides to a dial-in user constitutes a session; the
beginning of the session is the point at which service i s first pro vided, and the e nd
of the session is the point at which the service ends. A user can have multiple
sessions in parallel or in series if the gateway suppor ts that, with each session
generating a separate sta rt and stop record with its own session ID. Figure 3-3
shows the sequenc e of e vents in dynamic IP address assignm ent.
Figure 3-3.Dial VPN Dynamic IP Address Management Sequence
At the start of service delivery, a client configured to use dynamic IP addressing
generates a start packet describing the type of servic e being delivered and the user
to whom it is being delivered. The client sends that information to the RADIUS
303509-A Rev 003-11
Page 60
Configuring and Troubleshooting Bay Dial VPN Services
server, which sends back an ackno wledgment that it has recei ved the packet. At
the end of service delivery, the client sends the RADIUS server a Stop packet
describing the type of serv ic e that was delivered. The se r ver sends back an
acknowledgment that it has received the packet.
The client se nds a start or stop packet o ver the network, persisting until it receive s
an acknowledg ment or times out. The client can also forward the requests to an
alternate server or servers if the primary server is down or unreachable. The
RADIUS server may request other servers to satisfy the request. In this case, it
acts as a client.
If the RADIUS server cannot succ es sfully record the start or stop packet, it does
not send an acknowledgment to the client.
Starting the Connection
When a user at a remote node dials in to a Dial VPN service provider, the NAS
first determines whether t his i s a tunnel c andida te. If so, t he N AS f i rst acce sses the
TMS database and contacts the gateway, which starts the authentication process.
The gateway gets an IP address from the RADIUS server on the user’s home
network, and the Remote Access Concentr ator builds a tunnel to the gateway and
starts sending the GRE-encapsulated packets. The process involves the following
steps.
A user at a remote node dials the phone number of a Dial VPN service
1.
provider. The user also enters the required user information.
User information usually c onsists of a user name and a password.
The remote node sends a PPP packet to start the connection process.
2.
The NAS receives the data packet and passes the user name to the TMS
3.
on the Dial VPN service provider’s network to determine how to process
the packet.
For Dial VPN, the user name must contain one “at” sign (@), f ollowed by at
least one period (.) and at leas t a 3-character extension . F or example, the user
name can be lee@abc.com. In this example, lee is the user name that the NAS
uses for authentication. The string @abc.com is the domain name that Dial
VPN uses to look up this user’s entry in the TMS database.
3-12303509-A Re v 00
Page 61
Dial VPN Layer 3 Tunneling
If the TMS finds a match in its database for both the user and domain names,
it determines that thi s user is a Dial VPN user and a candidate fo r tunnel
creation. The TMS then checks that the number of cur rent c onnections does
not exceed the maximum number of users allowed.
Note:
The system administrator can change the default requirement s for the
Dial VPN user name format as needed.
If the TMS determines that the user is not a tunnel candidate, the NAS first
treats the request as a proxy RADIUS request an d attempt s to authentic ate this
user in the usual way. See the description of proxy RADIUS in the BSAC Administrat ion Guide for your platform.
Note:
The TMS may deny a tunnel request for a number of reasons; for
example, if the maximum number of users has been reached, if the TMS does
not find a match for the domain name in its database, or if the authentication
request fails. If the tunnel request is denied, the connection between the NAS
and the remote node is dropped.
If the dial-in reque st is a tunnel candidate, the NAS starts the
4.
authentication process and builds a tunnel.
Once it determines that thi s reque st is a tunnel candidate, the TMS tells the
NAS to contact the gateway for remote authentication. For a given domain,
authenticati on and address allocati on can take place loca lly, using ACP (in an
erpcd-based netw ork ), or remotely, using RADIUS and DHCP on the
customer’s network. If the reque st is not a tunnel candidate, the NAS uses
local (instead of remote ) authe ntication.
The NAS rece ives the remote node’s address, the source of which depends on
the type of authentication and the type of IP address allocation.
The RADIUS client on t he gateway s ends a request to the RADIUS server
5.
on the home network to authenticate the remote user.
During remote a uthentica tion , the RADIUS authe ntication serv er on t he home
network veri fies that the remote node is author iz ed to access the home
network and de termines whi ch network se rvice s the r emote no de is a llo wed to
use.
The DHCP server or the RADIUS serv er on the home networ k assign s an
6.
IP address and incl u des that a dd ress in the repl y to the gatew ay.
303509-A Rev 003-13
Page 62
Configuring and Troubleshooting Bay Dial VPN Services
If the home network is configured to assign IP addresses dynamically using
DHCP, the DHCP serv er select s an IP addre ss from its pool and issue s the end
user a renewable “lease” on that address. Alternatively, the DHCP
administrator may ass ign a fixed IP address to particular users. In either case,
the DHCP server returns the assigned IP address in its reply to the gateway.
If the home network is configured to assign IP addresses using RADIUS,
either statica lly or dynamically, the RADIUS server perfo rms the address
allocation. If the RADIUS administrator has alloc a ted a pool of assignable IP
addresses for dial- in users, and if the RADIUS client on the gatewa y is
configure d for dyna mic IP address assignment , the RADIUS serv er assi gns an
address from that pool. Alternatively, the RADIUS administrator may have
assigned a specific address for that particular user. In this case, RADIUS uses
that assigned addres s. The RADIUS server reserves the assigne d IP addre ss
for that user until the session terminates.
When authentication and addr ess al locat ion are complete, the NAS st arts
7.
sending packets from the remote node to the gateway via the newly
created tunnel.
A Day in the Life of a Layer 3 Packet
The next sections explain how a packet mov es through a Layer 3 Dial VPN
network and returns to the remote node. Figure 3-4 shows the process.
As the packet move s from the remo te node to the home network, different pieces
of the Dial VPN network must encapsulate (add) and decapsulate (strip of f) the
protocol-specific envelope around the data pack et.
3-14303509-A Re v 00
Page 63
A
Dial VPN Layer 3 Tunneling
PPP packet
FlagFlagAddressControlProtocol Data FCS
GRE packet
CRKSsT FlagControlV ersionProtocol
Frame Rela y packet
Opening
Flag
AddressInformationFCS Data
Control
Remote node
Remote annex
T ype
Gateway
Data T unnel ID
Closing
Flag
CPE Router
Data packet moves onto home netw ork
DVS0003
Figure 3-4.Packet Encapsulation and Decapsulation Process
303509-A Rev 003-15
Page 64
Configuring and Troubleshooting Bay Dial VPN Services
How a Packet Moves Through a Dial VPN Network
A data packet mov es fro m a remote node to the Dial VPN servic e provider’s
network through a tunnel created for the remote node to a gateway, which sends
the data to the remote user’s home network through a frame relay connection.
Here are the steps involved in this process.
The remote node sen ds a PPP packet to the NAS to establ ish a
1.
connecti on.
The PPP packet contains flag f ields to indicate the beginning and end of a
frame, an address fie ld to indicate the device that originated the frame, a
control fie ld to indicate the type of frame (information or administrative), a
protocol fi eld tha t i ndicates the operative n etwork la yer protocol, the da ta, and
the frame check sequence that shows the sequence order of the frame. See the
manual Configur ing PPP Services for more information about the PPP
packet.
The NAS strips off the PPP protocol-specific fields and encapsulates the
2.
data into a GRE packet. The GRE packet moves through the IP tunnel to
the gateway.
The GRE packet contains checksum information and flag bits to indicate that
a routing and a key field are present; a control field to indicate the type of
frame; a tunnel flag to i ndicat e that there is a tunne l ID present; a version f ield
to indicate th e ve rsion of IP ( or IPX) r unni ng on the Inte rnet; the proto col type
used (IP or IPX); the tunnel identifier; and the original data from the data
packet. Refer to IETF RFC 1701 or R FC 1490 for more information about the
GRE packet.
The checksum, control, tunnel flag, and version fields should be 0.
Note:
The gateway decapsulates the GRE pac ket information and puts the data
3.
into a frame relay or PPP packet.
The frame relay or PPP packe t follows the str uctural conventions for a packe t
of that type. For more information about the frame relay or PPP packet
structure, see Configuring Fr ame Relay Services, Configuring Dial Services,
or Configurin g PPP Services.
The gateway sends the frame relay or PPP packet to the CPE router on
4.
the home network.
3-16303509-A Re v 00
Page 65
The CPE router decapsulates the frame relay or PPP packet and routes
5.
the data to the intended recipient on the home network.
How a Packet Returns to the Remote Node
To send packets fro m the home netwo rk to a remote node, Dial VPN reverses the
process descr ibed i n the pre vi ous secti on. The tunn el e nsures tha t packet s from the
home network reach the remote node, regardless of where it is located.
The Dial VPN gate w ay inte rcept s and for ward s packe ts t o the re mote node us ing a
care-of address that is specified to the gateway during the connection process.
This address, which is usually the address of the Dial VPN Remote Access
Concentrator, is the IP address of the other end point of the tunnel. When the
gateway encapsulates the frame relay packet in a GRE packet, it includes the
Remote
node
care-of addres s. Figure 3-5
from the home network to a remote node through an erpcd-based network.
provider network
Network access
PPP
connection
server (NAS)
shows a simplified view of how a data packet moves
Service
T unnel
Data
Gateway
Tunnel
management
server
Dial VPN Layer 3 Tunneling
Frame rela y
connection
Customer
"home"
network
Static routes
The gateway sends the packet to the
NAS's
care-of address
decapsulates the GRE information
and then encapsulates the data with
PPP information. The NAS
sends the PPP packet to the
remote node.
. The NAS
The packet moves from the CPE
router to the gateway via static routes.
The gateway decapsulates the frame
relay information and then encapsulates
the data with GRE information. The gateway
sends the GRE packet to the care of address.
DVS0013A
Figure 3-5.Sending a Packet to a Remote Node
303509-A Rev 003-17
Page 66
Configuring and Troubleshooting Bay Dial VPN Services
The data packe t travels from the home networ k to the remote node using a similar
process of encapsulat ion and decapsulation to respond to the format required at
various points throughout the Dial VPN network. The differences are:
•The data packet must return from the CPE router on the home network to the
gateway on the Dial VPN network via a static route. Figure 3-6
static routes us ed to return da ta from a home net work to a gat ew ay on the Dial
VPN network.
•If the CPE router is a Bay Networks (or similar) router, a nonexistent,
“dummy” adjacent host must be configured on the same IP subnet as the
frame relay interface of the CPE router. This fulfills an addressing format
requirement, but has no effect on the actual packet routing.
•The gateway se n ds the GR E pac ket to the remo t e node’s care-of address on
the NAS, and the NAS forwards the packet to the remote node.
shows the
1.1.1.2
Adjacent host/
next hop
Frame rela y
PVC
Static route
Dial-up
user
3.1.1.X
RAC
BayD VS service
provider's network
T unnel
Gateway
RADIUS
client
DLCI = 101
2.2.2.1
Frame relay
port on gateway
Static route
Figure 3-6.Static Routes from a CPE Router to a Dial VPN Gateway
Data packets m ove bac k and for th betwe en the r emot e node and the home network
through the established tunnel until the remote node disconnects from the Dial
VPN network or an error occurs. When either situation occurs, Dial VPN tears
down the tunnel.
3.1.1.0
Home/
corporate LAN
1.1.1.1
CPE
RADIUS
server
DVS0007A
3-18303509-A Re v 00
Page 67
When Does Dial VPN Tear Down the Tunnel?
Dial VPN tears down the tunnel whe n an y of the following situations occurs:
•The remote node using that tunnel disconnects.
•Either the NAS or the TMS is not operating properly.
•Tunnel renewal fails.
•The administrator terminates the user co nnection.
If the NAS fai ls, all tunnel users are disconnected a nd the active user counts are
decremented. Ho wev er, there is no quick wa y to determine when a NAS fails . The
logging connection may not be reset until after new tunnel users have connected.
When a NAS starts, one of the f irst things it does is open its A CP-logging
connection. When a new logging connection opens, TMS decrements the
appropriate co unts for eac h domain that had a us er connect ed to the NAS . If thi s is
the first time the NAS has come up, then there will be nothing to decrement .
Dial VPN Layer 3 Tunneling
If you enter the
Note:
reset security
command, a new u ser who tries to make
a connection with the NAS causes the maximum number of users count to
decrement, even though users with exis ting connections are still connec ted.
This means that the maximum number of users count may be exceeded. As
users with existing connections disconnect, the count will synchronize and
correspond to the actual number of users connected.
If the TMS fails, a NAS can detect the failure through the failure of the logging
connection. The NAS falls back to secondary serv e rs, if any. Unless the database
is shared by the TMS servers, the count of current users is lost.
If the TMS database runs out of disk space while tms_dbm is running, the user
sees an error message. The error messa ge may not state what caused the error. If
there is a shortage of disk space and erpcd cannot create a lock file or add a NAS
to the TMS database, TMS generates a syslog message and t he user cannot make a
connection to the N AS.
303509-A Rev 003-19
Page 68
Page 69
Chapter 4
Configuring the Remote Access Concentrator
This chapter describes how to use the command line interface (CLI) commands to
configure a Remote Access Concentrator as a network access server (NAS) for
Dial VPN. For details regarding your specific device, see the docume ntation for
the particular model you are conf iguring (Table 4-1
Table 4-1.Wh ere to Fi nd C o nf ig uration Informat i on
For Informati on AboutSee This Guide
).
Using the V ersalar Config Utility with
Remote Access Concentrators
Remote Access Concentrator configuration
and administra ti on procedures, incl uding a
detailed description of all na and
commands and parameters
admin
Managing Remote Access Concentrators
Using the Versalar Config Utility
•Quick-Start Guide for Remot e Access
Concentrators
•Managing Remote Access
Concentrators Using Command Line
Interfaces
You configure the Remote Access Concentrator by attaching a PC in terminal
emulation mode or an ASCII terminal to the console port of the device.
Installing and Configuring the RAC Software
This section provides an overview of the installation and configuration process,
highlighting area s of part icular concern.
T o f aci litate tr oubleshoot ing, test each element of your syste m after you
Note:
configure it and before proceeding to the next phase of the configuration.
303509-A Rev 004-1
Page 70
Configuring and Troubleshooting Bay Dial VPN Services
Install the RAC software.
1.
Use the installati on script supplied for the RA C, as described in the
documentation for the particular device you are insta lling.
As part of the hardware insta llation, you may have issued ROM monitor
commands through a terminal connected to the console port located on the
RAC. These commands let you set a subset of the configuration (EEPROM)
parameters, including the unit’s IP address, required for booting the RAC.
You can also spe cify parameter value s that are required if the network
configura tion differs from the default values. See th e hard wa re installation
guide for the Remote Access Concentr ator you are installing for the list o f the
ROM Monitor commands and their defa ult values.
Boot the RAC software (standard installation).
2.
The Remote Access Concentrator get s its operational code by downloading it
over t he network from (among ot her sources) a UNIX host tha t runs RAC file
server softwa re. The RAC boots each time it is powered up and whenever it
boot
receives a
command. You specify the source of the boo t image b y sett ing
the preferred load host.
Set up the dial-in port on the RAC for dial-in and enable ACP or
3.
RADIUS (BSAC) security for PPP on all ports.
Configure security on the RAC using either ACP (for an erpcd-based
network) or BSAC (for a RADIUS-only network), and configure the dial-in
ports. To display the cur rent port settings, enter:
show port ppp
To change a particular setting, enter the
set po rt
command along with the
parameters you want to change. The settings relevant to Dial VPN are:
set port mode auto_detect
set port type dial_in
set port slip_ppp_sec urity y
set port ppp_security_pr otocol chap (<--- This could be chap, pap, or
pap-chap.)
For erpcd-based networ ks, include the following command:
set port address_origin auth_ser ver
If running IPX (Layer 3 only), include the following command:
4-2303509-A Re v 00
Page 71
Configuring the Remote Access Concentrator
set port pp p_ n c p al l
The
slip_ppp_security
or RADIUS for PPP and protocol security. The
(<---This could be set to ipcp and ipxcp.)
parameter controls dial-in PPP access and use of ACP
ppp_sec_protocol
parameter
specifie s the local authenticat ion protocol; in this case, CHAP . A client dialing
in has to get a remote IP add ress. For Dial VPN, the
must be set to
auth_server
. For information o n BS AC security, refer to the
address_origin
parameter
BaySecure Access Control Administration Guide.
The annex
show port ppp
on one screen. Make sure that th e
command shows several configuration parameters
ppp_ncp
parameter is set to all or IPCP and
IPXCP.
For information on the settings of the remaining port parameters, refer to
Managing Remote Access Concentrators Using Command Line Interfaces.
Set the primary preferred security host to the address of the primary TMS
server. You can also designate the secondary TMS server (if any) as the
secondary p ref erre d secur ity host. Accept the default value if the optional
secondary security host is not in use.
Enable security on t he RA C , b ut di sable the s ecurity broad cast feature . Setti ng
the security broadca st para meter to N ensures that the security information
comes from one of the defined TMS servers.
For the Remote Access Concentrator Model 8000/5399, enter the following
configura tion command sequence from the
na
or
admin
prompt:
set annex enable_security y
set annex pref_secure1_hos t
#
<ip_address_of_TMS/security host---acp_or_BSAC>
#
set annex pref_secure2_hos t
#
<ip_address_of_secondary_TMS_security_host>
#
set annex security_broadca st N
set annex auth_protocol
#
set port mode auto_detect
set port type dial_in
set port slip_ppp_security y
set port ppp_security_protocol chap
# This could be chap, pap, or pap-chap.
303509-A Rev 004-3
<acp_or_RADIUS>
Page 72
Configuring and Troubleshooting Bay Dial VPN Services
Note:
Dial VP N work s only f o r native PP P (you cannot dial in as CLI, then
convert to PPP to use Dial VPN).
Enable the appropriate options.
4.
To display the options that are enabled, use the CLI
stats -o
comman d.
For a PRI connection on a Remote Access Concentrator, create Session
Parameter Bloc ks in t he config file, as shown in the following example.
Configuring the "%w an" se ction o f the conf ig fi le this way l ets a n y user dia l in
to the device. (By default, the path to the config file is
/usr/spool/erpcd/bfs/config.annex.)
The followin g sample session parameter blocks (SPBs) set configuration
parameters for sessi ons (ca lls) based on dialed number, calling number, and
call type. Each incoming call is compared against each SPB, in order, until
there is a match. If no match exists , the RAC rejects the call.
%wan
#
# The following SPB causes the RAC to answer all “voice” bearer calls
# with a modem.
#
begin_session modem
bearer voice
call_action modem
set mode auto_detect
end_session
# The following SPBs are possible templates for handling V.120 and
# sync PPP calls. To enable these SPBs, edit the “called_no.” line
# in each to include the telephone numbers specific to your PRI line.
# Use different numbers for each service (that is, V.120 or sync). You
# must also remove the comment (#) characters at the start of each line.
#
# It is not always necessary to discriminate calls based on called
# number. If all data calls will be V.120, for example, and never sync PPP,
# such a distinction is unnecessary.
#
4-4303509-A Re v 00
Page 73
Configuring the Remote Access Concentrator
begin_session v120
bearer data
called_no
call_action v.120
set mode auto_detect
end_session
#
begin_session sync
bearer data
called_no
call_action sync
set mode ppp
#
# The following line applies the subnet mask to the remote device’s IP address.
set subnet_mask 255.255.255.0
end_session
<called_number>
<called_number>
After making these changes to the config.annex file, enter
session
recognized these changes, issue the
Enable Syslogging.
5.
from the
prompt of the RAC. To verify that the RAC has
admin
session
command at the
reset annex
annex
This is not required, but it is very useful in troubleshooting. Appendix B,
“Syslog Messages,” contains information on syslogs.
From the
set annex syslog_mask debug
set annex syslog_host
na
or
admin
prompt, enter the following commands:
<ip_address_of_syslogging_host>
To enable logging in an erpcd-based system, enable erpcd syslogging and
create the appr opriate lo g f iles on the host , t hen rest art the sysl og dae mon. See
Managing Remote Access Concentrators Using Command Line Interfaces for
information on these functions. Refer to your UNIX system documentation
for how to perform the se tasks for applications running under UNIX. The
erpcd utility uses the aut h facility.
Ensure that the RAC can communicate with the gateway so that a tunnel
6.
can be established.
The RAC can learn a route to the gateway by means of RIP (V ersion 1 or 2) or
by means of a static route. For a static route, defin e the sta tic route at the
bottom of the config .annex file. The syntax is:
prompt.
route add
303509-A Rev 004-5
<destination_network> <mask> <next_hop> <metric>
Page 74
Configuring and Troubleshooting Bay Dial VPN Services
For a default route , the syntax is:
route add
<default> <next_hop> <metric>
Managing Remote Access Concentrators Using Command Line Interfaces
lists the syntax and options f or all RIP configuration param eters. Before you
change any default settings, read the relevant sections that explain the reasons
for and consequences of making such changes.
Reboot the RA C.
7.
ping
After booting the RA C, en ter the
command at the RAC prompt to ensur e
that connectivity to the gateway exists. If not, check the routing table (using
netstat -r
the
command) and your configuration.
Loading Software and Booting the RAC
To set the preferred load host, enter the following sequence of commands.
Note:
The actual installa tion procedures are dif fer ent for a self-booting RAC
(which already has an image loaded into it). See the readme file in the setup
subdirectory of the RAC Host Tools install directory for a complete
description of ho w to install RAC softwa re.
In this example, the IP address of the preferred load host is 132.245.44.80:
set annex image_name "oper.46.I9336"
set annex load_broadcast N
quit
boot
image_name
parameter specifies the name of the image file that contains the
load_broadcast
parameter to N directs the RAC
to look for the load image only on the specified load host.
If a load host has a different netw or k or subnet a ddress, you must de f ine a gate wa y
through which the RA C can reac h the host. The
load_dump_gateway
parameter
specifies the IP address for that gateway.
4-6303509-A Re v 00
Page 75
During the initial boot of the ope rational code, the ROM monitor requires the
address of a gateway if the specified load host is on another network or has a
different subnet address. In this case, enter the gateway’s address using the ROM
Monitor
addr
command. The RAC automatically adds this gatew ay to its routing
table.
Configuring Active RIP
The followin g section assumes that you have rea d the sec tions on active and
passive RIP in Managing Remote Access Concentrators Using Command Line Interfaces. Active RIP is enabled by default. Once active RIP is enabled, both
passive and active RIP are running on all operational interfaces.
Defining Routes
Once you enable acti ve RIP, you do not need to define the defaul t and static routes
in most configurations. The network nodes learn about the routes to each other
and to other ne tworks through RIP updates they e xchange, provided that all of the
following c onditions are met:
Configuring the Remote Access Concentrator
•For subnetted networks, the
(the default).
Y
rip_sub_advertise
parameter on the RAC is set to
•You have configured subnet masks cor rectly.
•The gateway is configured to handle the same type of RIP updates.
Although the rou tes required for passive RIP ne ed not be defined after you enable
activ e RIP, you may want to define a default route and one or more static routes
for other purposes. For example, a default route can act as a bottleneck through
which all traffic to and from a network must pass. Y ou can also use sta tic rout es to
reach routers that are not running active RIP.
T o de f ine de fa ult an d stati c ro utes th at r emain aft er the RA C r eboots, enter them i n
the config.annex file. You can define routes anywher e in the confi gur ation f ile , but
routes not defined in an “annex...end” or “subnet...end” block are discarded and
not cached if the ir interfaces are not operational when the RAC is booted.
Typically, the Ethernet interfac e is ope ra tional immediately, but SLIP and PPP
interfaces may take longer to come up.
303509-A Rev 004-7
Page 76
Configuring and Troubleshooting Bay Dial VPN Services
Configuring the RAC to Advertise RIP 1 and/or RIP 2 Updates
By default , active RIP sends RIP Version 2 updates to the IP broadcast address, so
that both RIP 1 and RIP 2 systems can receive them. This assumes that
rip_send_version
the routers on your network acc ep t both RIP 1 and RIP 2 updates. Although
discarding RIP 2 updates violates the RIP 1 RFC (RFC 1058), some RIP
implementations written before this RFC still do so. If you have both RIP 1 and
RIP 2 nodes on your network, make sure that ther e are no RIP 1 implement ations
that discard RIP 2 packets. If there are, use the
rip_send_version
is set to compatibility, which is the default. It also assumes that
na or admin mode to set the
parameter to 1, as shown in the following example:
You ma y need to reset the appropr iate port or RAC subsystem, or reboot the RAC
for changes to ta ke effect:
admin:
annex#
The
quit
boot
command is required in the preceding example because you are setting
boot
en0. If en0 is not among the interface s, you c an substitute the admin command
reset interface
for the
boot
command.
4-8303509-A Re v 00
Page 77
Chapter 5
Configuring TMS and Security
for erpcd Networks
In a Dial VPN network, tunnel users are auth enticated by a RADIUS server
running BaySecure Access Control (BSAC) on the remote networ k, a lthough the
tunnel management database resides at the service provider network.
All administrati on and conf iguration of the tunnel happen s at the service
provider’s sit e. An administr ator at the service provid er site must configure the
tunnel with various attributes: its destination IP address, the security protocols it
supports, its password, and so on. These attributes are stored in the tunnel
management system (TMS) database.
Dial VPN offers tw o ways of managing and using the TMS database:
erpcd-based, desc ribe d in this c hapter, and RADIUS-only, described in Chapt er6
In both of these methods, the TMS database resi des on the service provider
network and specifies:
•Where dial-in user authentication takes place
•Which servers authenticate dia l-in users
•Where the other end point of the tunnel is (the NAS is the f irst end point) --
either the gate way router for a Layer 3 tunnel or the LNS at the home network
for a Layer 2 tunne l
303509-A Rev 005-1
.
Page 78
Configuring and Troubleshooting Bay Dial VPN Services
Managing TMS Using the TMS Default Database
Tunnel management in an erpcd-based network is an extension of the Expedit ed
Remote Procedure Call Da em o n (erpcd) that allows use r s dialing in to the Dial
VPN system to be authenticated by the ir destination sites, rat her than by an
authenticati on server residing on the Dial VPN service provider’s network. The
destination sit e, therefore, retains the authentication information, providing an
extra measure of secur ity. The TMS communicates with the NAS and establishes
tunnels based on the information that you enter into the TMS database.
You tell the NAS where the TMS resides when you confi gure the following RA C
parameter:
set annex pref_secure1_host
<ip_address_of_TMS_hos t>
TMS tells the NAS how to a uthenticate the user , either locally or remotely (with
RADIUS). You create TM S ent ri es on the U N IX workstation that serves as the
TMS/ACP s erver. By default, you use the t ms_dbm progra m to c reate the se e ntries
as a file in /usr/annex, the “secur ity” director y. Alterna ti ve ly, you can create a tex t
file of entrie s using the syntax format that follows. These entries are really TMS
commands. You can either type them at the UNIX command line prompt or copy
them from a text file and paste them at the UNIX command line prompt.
Create one TMS entry for each domain name that you want to authenticate/serve.
The follo wing is a sample TMS co mmand that adds an entry to the TMS database :
In this syntax description, square brackets [ ] indicate optional
<domain> <dnis>
<hardware_link_address_from_home_agent_to_CPE>
<length_of_hardware_link_address>
[acctp=accounting protocol] \
te=
<ip_addr_of_the_gateway>
[hwtype=
] [passw=
<authentication_key_value(hex, 256_bits)>
<fr_or_ppp>
]]\
\
<password>
\
]]\
] [tatype=kmd5-128\
parameters.
The dialed number parameter
products. By default,
is set to 0 for all Remote Access Concentrators.
dnis
is avai lable only for the Model 8000/5399
dnis
\
\
\
\
\
]]\
]
The
hwalen
specify the
parameter is set to 0 for PPP and optional for frame relay. If you do
hwalen
parameter, use the actual length in bytes of the he xa decimal
value of the DLCI number (the hardware address). For example, if the DLCI is
101 (that is, 0x65), the hardware address length is 1 byte. For a hardware address
of 400 (0x190), the hardware address length is 2 bytes.
If you omit the
the
hwaddr
parameter. If, for the
hwalen
parameter, tms_dbm derives the length from the va lue of
hwaddr
parameter, you spec ify a decimal value
that is smaller than 4 bytes (that is, from 0 through 231), TMS converts that value
to hexadecimal. To specify a hexadecimal value, prefix the number with the
characters 0x; for e xample, to expre ss 64 (decimal ), speci fy 0x40. For PPP, set the
hwaddr
Note:
parameter to 0.
The ha (home agent) parameter used in pre vious versions is still
recognized, but the te (tunnel end point) paramete r requ ired in the current
version has tak en over its function.
303509-A Rev 005-3
Page 80
Configuring and Troubleshooting Bay Dial VPN Services
Table 5-1 lists the tunnel management (
tms_dbm
the arguments for eac h of the TMS command elements.
Using Tunnel Management Commands
The followin g sections describe the syntax of the command line interface
tms_dbm
commands that you use to provision and manage the TMS default
database. Enter these commands at the workstation on which the TMS resides.
All of these tunnel management commands begin with
blank character, then a keyword defining the command’s action; for example,
tms_dbm add
. In most cases, a string of arguments can follow the action
keywor d. TMS commands, keywords, and arguments are case-sensitive.
Tunnel Management Commands
The action keywords following
management commands. Table 5-1
Table 5-1.tms_ db m Tunnel Manag em ent C om m ands
CommandDescription
tms_dbm
constitute the actual tunn el
summarizes these commands.
) commands, and Table 5-2 lists
tms_dbm
, followed by a
add
clear
delete
help
list
modify
5-4303509-A Re v 00
Creates a new TMS database entry. Returns an error if the entry
already exists.
Removes the specified information. Using
argument sets the cur rent user counts to 0 and deletes the
remote/network access server (RAS) list. Using
argument
entry exists, but not if you cl ear an already cleared ent ry.
Removes an existing data base entry , but does not cause acti ve users
to be disconnected. Returns an error if no matching entry exists.
Displays a det ailed explanation of a specified com ma nd or a brie f
explanation of all
arguments.
Lists all the domain/DNIS pairs, optionally sorted alphabetically by
domain, then by DNIS .
Changes the specifi ed parameters of an existing database entry .
Returns an error if no matching entry exists.
clears the RASes and stats . Ret urns an err or if no matchi ng
tms_dbm
commands, action keywords, and
clear
with the
clear
rases
with the
(continued)
all
Page 81
Configuring TMS and Security for erpcd Networks
Table 5-1.tms_ db m Tunnel Manag em ent C om m ands
CommandDescription
rekey
remove
show
All commands except
Changes the database key associated with an existi ng entry and
retains all of the parameter values for the entry. Returns an error if no
matching entry exists.
Removes f rom the database the IP address of a NAS that is no longer
in use. Decrements the total active user count for each domain/DNIS
pair for which there is an activ e user count for the specified NAS. Use
this command if you remove a NAS from service.
Displays t he specified database information; r eturns an error if no
matching entry exists.
add
and
help
return an error if the entry is not found.
(continued)
303509-A Rev 005-5
Page 82
Configuring and Troubleshooting Bay Dial VPN Services
Command Arguments
The tunnel management commands use common arguments to specify what the
command is to act upon. Table 5-2 describes each of the arguments. Any ar gument
can appear with the
Tabl e 5-2.tms_dbm Comma nd Argu m ents
ArgumentFunction
help
command.
Used with These
Commands
domain=<
dnis=<
new_dnis>
te
te_addr>
=<
new_domain>
Together,
an entry’s key.
domain
domain name, which may also inc lude a
subdomain name.
48 characters long and m ust not include
the slash (/ ) char acter. The a ctual length
depends on the user’s application. The
RAC allows up t o 32 characters.
dnis
dnis
If
can be up to 20 chara cters l ong and has
the format: *.* (.*). * By default,
turned off for all platforms . To turn
on, change the
rebuild.
Specifies the IP address of the frame
relay port on the gateway on which the
tunnel end point (te ) resides. The
address 0.0.0.0 is not valid. This is the
tunnel end point nearest the remote
user’s home network.
For DVS (Layer 3) tunnels, this is the
home agent, which tunn els packet s for
delivery to the remote node and
maintains current location information
for the remot e node.
For La yer 2 tunnels, this is the IP
address of the LNS (interface) on the
home network.
domain
specifies the customer’s
specifies t he dial ed phone num ber.
is not in use, this must be 0.
erpcd
dnis
and
domain
constitute
can be up to
source code and
dnis
dnis
is
dnis
Required for all but
for which it is optional.
rekey
With
specify
domain
and
dnis
along with the original
domain
Required for
modify
other commands .
, you must
new_domain>
=<
new_dnis>
=<
dnis.
and
add
. Not used for
(continued)
help
,
and
,
5-6303509-A Re v 00
Page 83
Configuring TMS and Security for erpcd Networks
Tabl e 5-2.tms_dbm Comma nd Argu m ents
ArgumentFunction
ha
ha_addr>
=<
maxu
max_users> |
=[<
unlimited
Not used in Dial VPN. Supported only
for compatibility with pr evious ver sions.
Specifies the IP address of the frame
relay port on the gateway in whi ch the
home agent (ha) resi des. The address
0.0.0.0 is not valid.
]Specifies the maximum number of
concurrent user s allowed on the system.
A value of unlim it ed m eans that any
number of concurrent users is allowed.
A value of 0 indicates that no users are
allowed on the system.
For the
this val ue to di sable a domain without
deleting it. If you reset the
parameter to a value below the cur rent
number of users, additional (new) users
must wait unt il the count drops below the
new maximum. Excess users, however,
are not arbitrari ly dropped.
modify
(continued)
command, you can use
maxu
Used with These
Commands
For compatibility with
previous versions, Dial
VPN recognizes thi s
parameter as equivalent
to tunnel end point (te),
but it is no longer a valid
syntactical element.
Required for
modify
other commands .
add
and
. Not used for
(continued)
303509-A Rev 005-7
Page 84
Configuring and Troubleshooting Bay Dial VPN Services
Tabl e 5-2.tms_dbm Comma nd Argu m ents
ArgumentFunction
hwtype
hwaddr
hwalen
srvloc
hw_type>
=<
hw_addr>
=<
hw_addr_len>
=<
servers_location>
=<
hwtype
connection between the gateway and
the CPE router. For Dial VPN,
must be fr (frame relay) or ppp. If not
specified for a Layer 3 tunnel, the
gateway is the CPE router.
hwaddr
with the network. If
less, you can specify it as a decimal
number. TMS converts it to a
hexadecimal number. To specify this
value as a hexadecimal number, prefix
the number with 0x. For a frame relay
connection, this argument is requir ed; it
specifies the DLCI. For a PPP
connection, set this value to 0.
hwalen
specifies the length in octet s of the
address. If you omit this par ameter , TMS
calculates its value based on the value
of the
if
be 1 byte. If
bytes. Unless the actual
requires i t, y ou sh oul d accept t he def a ult
length, 1 byte. For a PPP connection,
set this value to 0.
Specifies whether the authenticat ion,
accounting, and dynamic allocation
servers are
VPN service provider’s network) or
remote
home network). The default is
when the
protocol) parameter is set to
remote
set to
indicates the type of network
is a link address associated
is an optional parameter that
hwaddr
hwaddr
radius
parameter. For example,
is less than 256,
hwaddr
local
(that is, on the remote user’s
authp
when the
.
(continued)
hwtype
hwalen
is 4 bytes or
hwalen
is 400,
(that is, on the Dial
(authentication
authp
hwalen
hwaddr
parameter is
local
acp
length
and
Used with These
Commands
All parts of this argument
are required for
modify
will
is 2
for a frame relay
connection. No t used for
other commands .
Required for
modify
. Not used for
other commands .
add
and
add
and
(continued)
5-8303509-A Re v 00
Page 85
Configuring TMS and Security for erpcd Networks
Tabl e 5-2.tms_dbm Comma nd Argu m ents
ArgumentFunction
tutype
pauth
server_addr>
sauth
server_addr>
pacct
server_addr>
sacct
server_addr>
paddr
assignment_server_addr>
saddr
address_assignment_server_a ddr>
authp
tunnel_type>
=<
primary_authentication_
=<
secondary_authenti cation_
=<
primary_accountin g_
=<
secondary_accou nting_
=<
primary_dynamic_address_
=<
secondary_dyna mic_
=<
authenticat ion_protocol>
=<
Specifies the type of tunnel to estab lish.
For a Layer 3 tunnel, specify
default). For a Layer 2 tunnel, specify
l2tp
.
Specifies the IP address of the primary
authentication server. This is usually th e
address of the RADIUS server on the
corporate (destination) network.
Specifies the IP address of the
secondary authentication server. You
must not specify a secondary server
without specifying a primary server.
Specifies the IP address of the primary
accounting serv er. Thi s is usually the
address of the RADIUS server on the
corporate (destination) network.
Specifies the IP address of the
secondary accounting server. You must
not specify a secon dary server without
specifying a primary server.
Specifies the IP address of the primary
dynamic address assignment server.
This is usually the address of the
RADIUS server on the corporate
(destination ) network. F or DHCP, set this
value to the add ress of t he DHCP serve r
at the cust omer site.
Specifies the IP address of the
secondary dynamic address assi gnment
server. You must not specify a
secondary server without specifying a
primary server.
Specifies the authentication protocol
used between the gateway and the
authentication server. For remote
authentication, this value must be
radius
. For local authentication , thi s
value ca n be
acp
(continued)
.
dvs
(the
Used with These
Commands
Required for
modify
other commands .
Required for
modify
other commands .
Optional f or
modify
other commands .
Required for
modify
other commands .
Optional f or
modify
other commands .
Required for
modify
addrp
none
to
other commands .
Optional f or
modify
other commands .
Required for
modify
other commands .
add
. Not used for
add
. Not used for
add
and
. Not used for
add
. Not used for
add
and
. Not used for
add
, but on ly if the
argument is not se t
. Not used for
add
and
. Not used for
add
. Not used for
(continued)
and
and
and
and
and
303509-A Rev 005-9
Page 86
Configuring and Troubleshooting Bay Dial VPN Services
Tabl e 5-2.tms_dbm Comma nd Argu m ents
ArgumentFunction
acctp
addrp
allocation_protocol>
spi
tatype
tamode
takey
accounting_protocol>
=<
dynamic_add ress_
=<
security_protocol_index>
=<
tun_auth_type>
=<
tun_auth_mode >
=<
tun_auth_key>
=<
Specifies the accounting protocol used
between the gateway and the
accounting serv er. The onl y valid value
radius
is
accounting.
If you specify radius, you must also
specify a primary server.
Specifies the dynam ic address
allocation protocol used between the
gatew ay and the dynamic addr ess
allocation server. Specify
enable dynamic allocation or
disable it.
If you specify this protocol, you must
also specify a primary server.
spi
through 65535 that the gateway uses to
determine the tunnel authentication
type, mode , an d ke y. You must c onfigu re
these values on the gateway using Site
Manager , as well as configuring them in
TMS. The def ault value is 0 (no
authenticat ion).
tatype
algorithm used to encrypt tunnel
registr ation messages betw een the NAS
and the gateway. This value must be
MD5 encryption.
tamode
authentication algorithm. This value
must be pref-suff (prefix/suffix).
takey
algorithm uses. It can be up to 64
hexade cimal characters (0-9, A-F, a-f) in
length.
. Specify
defines an i dentif ier in t he r ange 256
is the type of authenti cation
is the operating mode of the
is the key that the authenticati on
(continued)
none
to disable
dhcp
to
none
Used with These
Commands
Required for
modify
. Not used for
other commands .
Required for
modify
. Not used for
other commands .
to
spi
is optiona l for
modify
. Not used for
other commands .
If you specify
tunnel authent ication, all
three ta arguments are
required f or
modify
.
If you specify the ta
arguments , y ou m ust also
specify th e
spi/takey
the TMS database mus t
match the
on the gateway, or the
authentication will fail . I t
will look lik e a bad
passwo r d , not an
incorrectly matched
encrypti o n key.
Not used for other
commands.
add
and
add
and
add
and
spi
for
add
and
spi
value. The
combination in
spi/takey
pair
(continued)
5-10303509-A Re v 00
Page 87
Configuring TMS and Security for erpcd Networks
Tabl e 5-2.tms_dbm Comma nd Argu m ents
ArgumentFunction
passwd
config
rases
ordered
stats
all
password>
=<
Relevant only for Layer 2 tun nels, this
parameter specifies the L2TP password
between the LAC and the LNS. It can be
up to 40 character s long. Setting the
password to ““ (null) disables password
protectio n.
Used on ly with t h e
config
displays the configuration
information (entered with an
modify
command) fo r the entry.
When used with the
rases
displays the current list of remote
access servers that have active
connections to the specified domain,
and the number of users connected to
each RAS. When used with the
command,
counts and RAS list to 0.
When used with the
stats
and DENYs. When used with the
command,
DENY counters to 0.
rases
displays the nu m ber of GR A N Ts
stats
(continued)
show
command,
add
or
show
command,
clear
sets the current user
show
command,
clear
resets the GRANT and
Used with These
Commands
Not used for Layer 3
tunnels.
show
requires ex actly
one of these arguments,
along with
dnis
clear
of these arguments , along
with
list
ordered
domain/D N I S pa irs
alphabetic ally, by domain,
then by DNIS.
domain
.
requires e xactly o ne
domain
can optionally use
and
to sort the list of
and
dnis
.
When used with the
ordered
remote access servers sorted in
ascending order.
When used wi th t he
displays
information. When used with the
command,
stats.
An error is returned if the entry is not
found, but it is not an error to clear an
already clear ed entry .
303509-A Rev 005-11
displays the current list of
config, ordered
all
show
command,
show
command,
stats
, and
clear
clears both users and
all
Page 88
Configuring and Troubleshooting Bay Dial VPN Services
In addition to the parameters listed in Table 5-2, the
Note:
show
also displays accounting parameters.
Configuring Local Authentication Using the ACP
Dial VPN relies on the remote authentication (RADIUS) server at the destina tion
site to authenticate dia l-in users. If you are configuring an erpcd-based network
and you want to use local authentic at ion (that is, within the Dial VPN service
provider network), the acp_regime f ile must contain the line
<path> /acp_passwd
(ACP) authentication server, as follows:
Using CHAP for local ACP authentication , create an ACP file called
1.
acp_userinfo
acp_userinfo for CHAP
The following is a sample entry for the acp_userinfo:
user sample1
chap_secret annex
end
Similarly, if you are using PAP, you create a file called
2.
PAP:
. You must also configure the Access Control Protoc ol
(by default in the
/usr/annex
directory):
command
acp_passwd
for
acp_passwd for PAP
If you are using CHAP as your a uthentication protoc ol, set the PAP pas sword
only if you enable CHAP with PAP fallback. The following sample entry
shows an encrypt ed ACP password for PAP:
The user cannot enter a password directly. To enter a password, use the
ch_passwd
utility. The acp_password file uses the same format as the
/etc/passwd file.
Set the dialup a dd resses in the
3.
acp_dialup
file for IP and IPX addresse s,
as shown in the following sample entry:
sample1 * 128.128.129.181<---- IP Address
sample1 *013ABC0:~<---- IP Network Address
5-12303509-A Re v 00
Page 89
Configuring TMS and Security for erpcd Networks
For IPX, use the network and node addre ss combination; for example:
0013ABC0:001234560000
The first eight hexadecimal digits represent the IPX network address; the last
12 hexadecimal digi ts represent the IPX node address.
ACP security includes:
•acp_userinfo information
•acp_password information
•Security for CHAP and PAP
•acp_dialup information for IP and IPX addresses
For a complete description of ACP security, see Managing Remote Access
Concentrators Using Command Line Interfaces.
Alternatives to th e Default Database
You can subs titute another relational da tabase for the default ndbms database
supplied with Dial VPN. If you do so, use that database’s command language to
manage the database cont ents. The da tabase must cont ain the same infor mation as
the default datab ase. For information about how to replace the default database,
contact the Bay Networks Tec hnic al Solutions Center.
TMS System Log (Syslog) Messages
The TMS, like the other elements of Dial VPN, wri tes its system and error
messages to the system log f ile, syslog. These messages are interspersed with
other syslog messages in chronological order of occurrenc e. TMS on an
erpcd-based network uses the auth facility. For the complete list of syslog
messages , refe r to Appendix B
303509-A Rev 005-13
.
Page 90
Page 91
Chapter 6
Configuring the TMS Using Local RADIUS
You can configure the TMS database to use a RADIUS server on the servi ce
provider (ISP) network, instead of using erpcd between the Netw ork Access
Server (N AS) and the local authentication se rver , as described in Chapter 5.
In the all-RADIUS solution, TMS database functions reside on an enhanced
RADIUS server on th e servic e pr ovide r’s netwo rk. Thi s allo ws the element s of the
domain/tunnel decision to reside on the same server as the normal authentication
policies. If no tunnel identifier match e xists, the RADIUS server can also be used
to authenticate nontunne led users.
Managing RADIUS-Based TMS
The RADIUS server on the service provider network includes a TMS database ,
indexe d by the do main name-DNIS pair. The f ields in the databa se are the same as
those described for TMS in Chapter 5.
The RADIUS server parses the domain and DNIS identifier from the Username
field in the access r equest message and matches these fields a gainst the same
fields in the RADIUS TMS database .
The RADIUS server also maintai ns an active count of the number of sessions or
links to a particular user from a partic ular RADIUS client. If this count excee ds
the specifi ed limit, the RADIUS server rejects the aut hent ication request.
Resource tracki ng starts with the auth entic ation requ est. The se rver uses RADIUS
accounting information to confirm and decrement the count.
The NAS recogniz es the retur ned tunnel attributes of the authentication req uest
and passes the in formation to i ts in ternal TM S client. The TMS clie nt ret riev es th e
tunnel information it ne eds from the RADIUS attri butes it receives in the access
acceptance message.
303509-A Rev 006-1
Page 92
Configuring and Troubleshooting Bay Dial VPN Services
The NAS uses RADIUS ac counting messages to determi ne when the TMS tunnel
to the local RADIUS s erver starts an d stops. The N AS logs these occurrences and
uses the information to conf irm and decrement tunnel usage counts .
The NAS security pa rameter settings that control RADIUS also co ntrol RADIUS
support for tunneling.
For TMS and local authentic at ion to work, the BSAC RADIUS clients
Note:
and the shared secrets between the client and the BSAC server must be
defined.
Tunnel Negotiation Message Sequence
Figure 6-1 shows the flow of messages for a Layer 3 tunnel between the remote
node and the customer’s home network when the RADIUS server on the service
provider’s networ k maintains the TMS database.
When it receives an incoming call, the NAS issue s a standard access-request
message to the RADIUS server . The serve r determines tha t this is a tunnel user b y
processing the Username and Called-Number attributes. If no match exists for the
domain or user name in the TMS database, the serve r returns an access-reject
message to the NAS.
If the server finds a match in its TMS database, it returns an access-accept
message. This message contains the following attributes for the RADIUS
message:
•Username -- the original contents of the user f ield
•Tunnel-type -- DVS (Layer 3) or L2TP (required)
•Tunnel-media-type -- IP
•Tunnel-server-end point -- the server address and outbound line identifier
•Authentication-server -- the remote authentication server(s) for this user
•Accounting-server -- the remot e accounting server(s) fo r this user
The user session’s authoriz at ion information flows from the remote customer
RADIUS return message. The local tunnel cl ient does not have the v alidated user
identif ication until after the tunnel is form ed.
Configuring and Troubleshooting Bay Dial VPN Services
Using RADIUS Accounting
The NAS logs the tunnel-bound link sessions to the service provider’s RADIUS
server. This information reflects the usage of the NAS ports, but it is different
from the home networ k informati on in t hat it m ay not refle ct li nk aggr ega tion, a nd
it is not based on remote user information.
The gatew ay ge nerate s its o wn ac counting infor mation, ba sed o n the t raf f ic seen a t
the gatewa y and reports this data to the customer’s RADIUS server.
The RADIUS server that authenticates the tunnel also tracks resource usage
through the accounting messa ge s it receives. The RADIUS client also preserves
the Class attribute and sends it in accounting start and stop messages to identify
allocated sessions. The user session’s authorization inf ormation flows from the
customer RADIUS server retur n messa ge. The local tunnel client does not have
the validate d user identification until after the tunnel is formed.
Service Provider Accounting Messages
In general, the NAS logs sessions based on user connections just as it does for
normal session logging, but with the addition of tunnel information. Tunnel setup
exchanges that c arry their o wn authentic ation infor mati on (administ rati ve account
names and passwords) or that are not bound to dial-in ports generate separate
accounting messages. To distinguish these log messages from chargeable user
sessions, these messages carry start and stop designat ors fo r Servi ce -Type of
Tun nel and Accounting-Status-Type of Tunnel.
Table 6-1
summarizes the user start messages that the NAS sends to the service
provider’s RADIUS serve r.
Table 6-1.Servi ce P rovider User Start Accou nting Messag es
Field NameContents
Acct-Status-TypeStart
NAS-IP-Address, Port,
Port-T ype
UsernameThe original contents of the user field
Calling-Station-ID
Called-Station-ID
6-4303509-A Re v 00
Connection origination of call
Either or both, if applicable
(continued)
Page 95
Configuring the TMS Using Local RADIUS
Table 6-1.Servi ce P rovider User Start Accou nting Messag es
Field NameContents
Service-TypeAs user authorized
Tunnel-TypeDVS (Layer 3) or L2TP (L ayer 2)
Tunnel-Media-Ty peIP
Acct-Client-End poi ntA string containi ng the I P addr ess of t he account ing cl ient
system and possibly other system -specific identifiers
Tunnel-Server-EndpointA string containing the IP address of the tunnel server,
the circuit type, and an optional identi fier
Acct-Tunnel-Connection-IDA unique identifier ge nerat ed on eac h end of the t unnel t o
identify thi s particular user tunnel sessi on; typ icall y, this is
a numeric string encoding a tunnel identifier and/or
sequence number
(continued)
Table 6-2 summarizes the user stop messages that the NAS sends to the pro vid er’s
RADIUS server.
Table 6-2.Servi ce P rovider User Stop Accounting Messages
User Stop MessageContents
Acct-Status-TypeStop
NAS-IP-Address, Port,
Port-T ype
UsernameThe original contents of the user field
Calling-Station-ID
Called-Station-ID
Service-TypeAs user authorized
Tunnel-TypeDVS (Layer 3) or L2TP (L ayer 2)
Tunnel-Media-Ty peIP
Acct-Client-End poi ntA string containi ng the I P addr ess o f the ac counti ng cli ent
Tunnel-Server-EndpointA string containing the IP address of the tunnel server,
Acct-Tunnel-Connection-IDA unique identifier generated on each end of the session
StatisticsConnect time, bytes , messages in, messages out
Connection origination of call
Either or both, if applicable
system and possibly other system -specific identifiers
the circuit type, and an optional identi fier
to identify this particular user tunnel sess ion; typical ly , this
is a numeric string encoding a tunnel identifier and/or
sequence number
303509-A Rev 006-5
Page 96
Configuring and Troubleshooting Bay Dial VPN Services
RADIUS Attributes That Support Tunneling
The RADIUS attrib utes that support TMS come from tw o groups: those currently
in use for simple Lay er 2 tunneling, and the additional ones needed to suppor t the
TMS data for the remote gateway. Table6-3 summarizes the general tunneling
attributes.
Table 6-3.General T unneling Attributes
Field NameContents
Acct-Status-TypeStop
NAS-IP-Address, Port,
Port-T ype
UsernameThe original contents of the user field
Calling-Station-ID
Called-Station-ID
Service-TypeAs user authorized
Tunnel-TypeDVS (Layer 3) or L2TP (L ayer 2)
Tunnel-Media-Ty peIP
Acct-Client-End poi ntA string containi ng the I P addr ess o f the ac counti ng cli ent
Tunnel-Server-EndpointA string containing the IP address of the tunnel server,
Acct-Tunnel-Connection-IDA unique identifier generated on each end of the session
StatisticsConnect time, bytes , messages in, messages out
Connection origination of call
Either or both, if applicable
system and possibly other system -specific identifiers
the circuit type, and an optional identi fier
to identify this particular user tunnel sess ion; typical ly , this
is a numeric string encoding a tunnel identifier and/or
sequence number
6-6303509-A Re v 00
Page 97
Configuring the TMS Using Local RADIUS
Table 6-4 lists the RADIUS attributes that the Layer 3 gateway supports.
Table 6 -4.RADIUS Attributes That the Gateway Supports
Packet TypeAttribute Name
Authentication
request
Authentication
response
Accounting•ACCT_STATUS_TYPE (start or stop)
StopAdditional attributes:
•USER_NAME
•USER_PASSWD
•CHAP_PASSWD
•CHAP_CHALLENGE
•NAS_IP_ADDRESS
•SERVICE_TYPE
•FRAMED_IP_ADDRESS (optional - comes from NAS)
•FRAMED_IP_NETMASK (optional - comes from NAS)
•FRAMED_IP_ADDRESS
•FRAMED_IP_NETMASK
•FRAMED_IPX_NETWORK
•CLASS (optional from server)
Note
(
: The response RADIUS attributes are sent to the NAS for
additional processing.)
•NAS_IP_ADDRESS
•ACCT_SESSION_ID
•USER_NAME
•FRAMED_IP_ADDRESS (if applicable)
•FRAMED_IP_NETMASK (if applicable)
•FRAMED_IPX_NETWORK (if applicable)
•CLASS (if applicabl e)
•ACCT_INPUT_OCTETS
•ACCT_OUTPUT_OCTETS
•ACCT_SESSION_TIME
•ACCT_INPUT_PACKETS
•ACCT_OUTPUT_PACKETS
303509-A Rev 006-7
Page 98
Configuring and Troubleshooting Bay Dial VPN Services
TMS Parameters for erpcd-Based and All-RADIUS Tunnels
While TMS operation is similar in both erpcd-based and all-RADIUS networks,
the TMS parameters differ. Table 6-5 lists the corresponding TMS parameters for
erpcd-based and all-RADIUS networks. In this table, the paramet er name is in
bold, and a sample value for it is in plain text.
T able 6-5.TMS Parameter Equivalents
RADIUS/BSAC Parametererpcd ParameterNotes
T unnel Name
dhcpbsac.rem
Called station id
555-1212
Maximum open tunnels
unlimited
T unnel-Type
dvs
T unnel-Server-Endpoint
200.11.11.11 fr:0x0070
200.11.11.11 fr:120
Annex-User-Server-Locatio n
remote
local
Annex-Au then-Servers
146.146.146.2
Annex-Acct-Server s
146.146.146.2
Annex-Addr-Resolution-Pr otocol
DHCP
| <
integer
>
domain
dhcpbsac. rem
dnis
555-1212
maxu
unlimited
tutype
dvs
te, hwtype, hwaddr
(hwalen no longer needed)
200.11.11.11, fr, 0x0070
200.11.11.11, fr, 0x0120
srvloc
remote
local
pauth, sauth
146.146.146.2
pacct, sacct
146.146.146.2
addrp
dhcp
ID should be unique to the tunnel
definition.
Default is unlimited.
BSAC recognizes the hardwar e
address in vari ous hexadecimal
lengths or in decimal.
For multiple se r ve r s, use th e forma t
IPad dr1, IPaddr2.
For multiple se r ve r s, use th e forma t
IPad dr1, IPaddr2.
pref-suff
(no TMS equivalent)Required for all tunnel s (l ocally and
(no TMS equivalent)Do not use. Reserved for future use.
(no TMS equivalent)Not required, but specif y IP if used.
(continued)
•For multiple servers, use the
•If Annex-User-Server-Location
•This attribute is not used if the IP
Make sure dictionary is set for HEX
values on this at t ribute.
If no
tamode, takey,
equivalents are not needed.
remotely authenticated).
format IPaddr1, IPaddr2.
is local,
Annex-Addr-Resolution-Servers
should be locally avail able (same
network as the BSAC server).
pooling feature on the
authenticat ion server is active for
same tunnel (BSAC only, and
only for non-MP calls).
spi
spi
(or
=0), then
or their RADIUS
tatype
,
TMS System Log (Syslog) Messages
TMS writes its system and error messages to the system log file, syslo g. The se
messages are interspe rs ed with other syslog messages in chronological order of
occurrence. For the complete list of syslog messages, see Appendix B, “Syslog
Messages.”
303509-A Rev 006-9
Page 100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.