JUNOSe™ Software
for E Series™ Broadband Services Routers
Broadband Access
Configuration Guide
Release 11.0.x
Juniper Networks, Inc.
1194 North Mathilda Avenue
Sunnyvale, California 94089
USA
408-745-2000
www.juniper.net
Published: 2010-01-04
Page 2
Juniper Networks, the Juniper Networks logo, JUNOS, NetScreen, ScreenOS, and Steel-Belted Radius are registered trademarks of Juniper Networks, Inc. in
the United States and other countries. JUNOSe is a trademark of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or
registered service marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or
otherwise revise this publication without notice.
Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed
to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347,
6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785.
JUNOSe™ Software for E Series™ Broadband Services Routers Broadband Access Configuration Guide
Writing: Mark Barnard, Diane Florio, Bruce Gillham, Sarah Lesway-Ball, Brian Wesley Simmons, Fran Singer, Poornima Goswami, Chander Aima, Hema
Priya J, Krupa Chandrashekar, Subash Babu Asokan, Sairam Venugopalan
Editing: Benjamin Mann
Illustration: Nathaniel Woodward
Cover Design: Edmonds Design
Revision History
January 2010—FRS JUNOSe 11.0.x
The information in this document is current as of the date listed in the revision history.
YEAR 2000 NOTICE
Juniper Networks hardware and software products are Year 2000 compliant. The JUNOS Software has no known time-related limitations through the year
2038. However, the NTP application is known to have some difficulty in the year 2036.
ii■
Page 3
END USER LICENSE AGREEMENT
READ THIS END USER LICENSE AGREEMENT (“AGREEMENT”) BEFORE DOWNLOADING, INSTALLING, OR USING THE SOFTWARE. BY DOWNLOADING,
INSTALLING, OR USING THE SOFTWARE OR OTHERWISE EXPRESSING YOUR AGREEMENT TO THE TERMS CONTAINED HEREIN, YOU (AS CUSTOMER
OR IF YOU ARE NOT THE CUSTOMER, AS A REPRESENTATIVE/AGENT AUTHORIZED TO BIND THE CUSTOMER) CONSENT TO BE BOUND BY THIS
AGREEMENT. IF YOU DO NOT OR CANNOT AGREE TO THE TERMS CONTAINED HEREIN, THEN (A) DO NOT DOWNLOAD, INSTALL, OR USE THE SOFTWARE,
AND (B) YOU MAY CONTACT JUNIPER NETWORKS REGARDING LICENSE TERMS.
1. The Parties. The parties to this Agreement are (i) Juniper Networks, Inc. (if the Customer’s principal office is located in the Americas) or Juniper Networks
(Cayman) Limited (if the Customer’s principal office is located outside the Americas) (such applicable entity being referred to herein as “Juniper”), and (ii)
the person or organization that originally purchased from Juniper or an authorized Juniper reseller the applicable license(s) for use of the Software (“Customer”)
(collectively, the “Parties”).
2. The Software. In this Agreement, “Software” means the program modules and features of the Juniper or Juniper-supplied software, for which Customer
has paid the applicable license or support fees to Juniper or an authorized Juniper reseller, or which was embedded by Juniper in equipment which Customer
purchased from Juniper or an authorized Juniper reseller. “Software” also includes updates, upgrades and new releases of such software. “Embedded
Software” means Software which Juniper has embedded in or loaded onto the Juniper equipment and any updates, upgrades, additions or replacements
which are subsequently embedded in or loaded onto the equipment.
3. License Grant. Subject to payment of the applicable fees and the limitations and restrictions set forth herein, Juniper grants to Customer a non-exclusive
and non-transferable license, without right to sublicense, to use the Software, in executable form only, subject to the following use restrictions:
a. Customer shall use Embedded Software solely as embedded in, and for execution on, Juniper equipment originally purchased by Customer from Juniper
or an authorized Juniper reseller.
b. Customer shall use the Software on a single hardware chassis having a single processing unit, or as many chassis or processing units for which Customer
has paid the applicable license fees; provided, however, with respect to the Steel-Belted Radius or Odyssey Access Client software only, Customer shall use
such Software on a single computer containing a single physical random access memory space and containing any number of processors. Use of the
Steel-Belted Radius or IMS AAA software on multiple computers or virtual machines (e.g., Solaris zones) requires multiple licenses, regardless of whether
such computers or virtualizations are physically contained on a single chassis.
c. Product purchase documents, paper or electronic user documentation, and/or the particular licenses purchased by Customer may specify limits to
Customer’s use of the Software. Such limits may restrict use to a maximum number of seats, registered endpoints, concurrent users, sessions, calls,
connections, subscribers, clusters, nodes, realms, devices, links, ports or transactions, or require the purchase of separate licenses to use particular features,
functionalities, services, applications, operations, or capabilities, or provide throughput, performance, configuration, bandwidth, interface, processing,
temporal, or geographical limits. In addition, such limits may restrict the use of the Software to managing certain kinds of networks or require the Software
to be used only in conjunction with other specific Software. Customer’s use of the Software shall be subject to all such limitations and purchase of all applicable
licenses.
d. For any trial copy of the Software, Customer’s right to use the Software expires 30 days after download, installation or use of the Software. Customer
may operate the Software after the 30-day trial period only if Customer pays for a license to do so. Customer may not extend or create an additional trial
period by re-installing the Software after the 30-day trial period.
e. The Global Enterprise Edition of the Steel-Belted Radius software may be used by Customer only to manage access to Customer’s enterprise network.
Specifically, service provider customers are expressly prohibited from using the Global Enterprise Edition of the Steel-Belted Radius software to support any
commercial network access services.
The foregoing license is not transferable or assignable by Customer. No license is granted herein to any user who did not originally purchase the applicable
license(s) for the Software from Juniper or an authorized Juniper reseller.
4. Use Prohibitions. Notwithstanding the foregoing, the license provided herein does not permit the Customer to, and Customer agrees not to and shall
not: (a) modify, unbundle, reverse engineer, or create derivative works based on the Software; (b) make unauthorized copies of the Software (except as
necessary for backup purposes); (c) rent, sell, transfer, or grant any rights in and to any copy of the Software, in any form, to any third party; (d) remove
any proprietary notices, labels, or marks on or in any copy of the Software or any product in which the Software is embedded; (e) distribute any copy of
the Software to any third party, including as may be embedded in Juniper equipment sold in the secondhand market; (f) use any ‘locked’ or key-restricted
feature, function, service, application, operation, or capability without first purchasing the applicable license(s) and obtaining a valid key from Juniper, even
if such feature, function, service, application, operation, or capability is enabled without a key; (g) distribute any key for the Software provided by Juniper
to any third party; (h) use the Software in any manner that extends or is broader than the uses purchased by Customer from Juniper or an authorized Juniper
reseller; (i) use Embedded Software on non-Juniper equipment; (j) use Embedded Software (or make it available for use) on Juniper equipment that the
Customer did not originally purchase from Juniper or an authorized Juniper reseller; (k) disclose the results of testing or benchmarking of the Software to
any third party without the prior written consent of Juniper; or (l) use the Software in any manner other than as expressly provided herein.
5. Audit. Customer shall maintain accurate records as necessary to verify compliance with this Agreement. Upon request by Juniper, Customer shall furnish
such records to Juniper and certify its compliance with this Agreement.
■iii
Page 4
6. Confidentiality. The Parties agree that aspects of the Software and associated documentation are the confidential property of Juniper. As such, Customer
shall exercise all reasonable commercial efforts to maintain the Software and associated documentation in confidence, which at a minimum includes
restricting access to the Software to Customer employees and contractors having a need to use the Software for Customer’s internal business purposes.
7. Ownership. Juniper and Juniper’s licensors, respectively, retain ownership of all right, title, and interest (including copyright) in and to the Software,
associated documentation, and all copies of the Software. Nothing in this Agreement constitutes a transfer or conveyance of any right, title, or interest in
the Software or associated documentation, or a sale of the Software, associated documentation, or copies of the Software.
8. Warranty, Limitation of Liability, Disclaimer of Warranty. The warranty applicable to the Software shall be as set forth in the warranty statement that
accompanies the Software (the “Warranty Statement”). Nothing in this Agreement shall give rise to any obligation to support the Software. Support services
may be purchased separately. Any such support shall be governed by a separate, written support services agreement. TO THE MAXIMUM EXTENT PERMITTED
BY LAW, JUNIPER SHALL NOT BE LIABLE FOR ANY LOST PROFITS, LOSS OF DATA, OR COSTS OR PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES,
OR FOR ANY SPECIAL, INDIRECT, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, THE SOFTWARE, OR ANY JUNIPER OR
JUNIPER-SUPPLIED SOFTWARE. IN NO EVENT SHALL JUNIPER BE LIABLE FOR DAMAGES ARISING FROM UNAUTHORIZED OR IMPROPER USE OF ANY
JUNIPER OR JUNIPER-SUPPLIED SOFTWARE. EXCEPT AS EXPRESSLY PROVIDED IN THE WARRANTY STATEMENT TO THE EXTENT PERMITTED BY LAW,
JUNIPER DISCLAIMS ANY AND ALL WARRANTIES IN AND TO THE SOFTWARE (WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE), INCLUDING
ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT DOES JUNIPER
WARRANT THAT THE SOFTWARE, OR ANY EQUIPMENT OR NETWORK RUNNING THE SOFTWARE, WILL OPERATE WITHOUT ERROR OR INTERRUPTION,
OR WILL BE FREE OF VULNERABILITY TO INTRUSION OR ATTACK. In no event shall Juniper’s or its suppliers’ or licensors’ liability to Customer, whether
in contract, tort (including negligence), breach of warranty, or otherwise, exceed the price paid by Customer for the Software that gave rise to the claim, or
if the Software is embedded in another Juniper product, the price paid by Customer for such other product. Customer acknowledges and agrees that Juniper
has set its prices and entered into this Agreement in reliance upon the disclaimers of warranty and the limitations of liability set forth herein, that the same
reflect an allocation of risk between the Parties (including the risk that a contract remedy may fail of its essential purpose and cause consequential loss),
and that the same form an essential basis of the bargain between the Parties.
9. Termination. Any breach of this Agreement or failure by Customer to pay any applicable fees due shall result in automatic termination of the license
granted herein. Upon such termination, Customer shall destroy or return to Juniper all copies of the Software and related documentation in Customer’s
possession or control.
10. Taxes. All license fees payable under this agreement are exclusive of tax. Customer shall be responsible for paying Taxes arising from the purchase of
the license, or importation or use of the Software. If applicable, valid exemption documentation for each taxing jurisdiction shall be provided to Juniper prior
to invoicing, and Customer shall promptly notify Juniper if their exemption is revoked or modified. All payments made by Customer shall be net of any
applicable withholding tax. Customer will provide reasonable assistance to Juniper in connection with such withholding taxes by promptly: providing Juniper
with valid tax receipts and other required documentation showing Customer’s payment of any withholding taxes; completing appropriate applications that
would reduce the amount of withholding tax to be paid; and notifying and assisting Juniper in any audit or tax proceeding related to transactions hereunder.
Customer shall comply with all applicable tax laws and regulations, and Customer will promptly pay or reimburse Juniper for all costs and damages related
to any liability incurred by Juniper as a result of Customer’s non-compliance or delay with its responsibilities herein. Customer’s obligations under this
Section shall survive termination or expiration of this Agreement.
11. Export. Customer agrees to comply with all applicable export laws and restrictions and regulations of any United States and any applicable foreign
agency or authority, and not to export or re-export the Software or any direct product thereof in violation of any such restrictions, laws or regulations, or
without all necessary approvals. Customer shall be liable for any such violations. The version of the Software supplied to Customer may contain encryption
or other capabilities restricting Customer’s ability to export the Software without an export license.
12. Commercial Computer Software. The Software is “commercial computer software” and is provided with restricted rights. Use, duplication, or disclosure
by the United States government is subject to restrictions set forth in this Agreement and as provided in DFARS 227.7201 through 227.7202-4, FAR 12.212,
FAR 27.405(b)(2), FAR 52.227-19, or FAR 52.227-14(ALT III) as applicable.
13. Interface Information. To the extent required by applicable law, and at Customer's written request, Juniper shall provide Customer with the interface
information needed to achieve interoperability between the Software and another independently created program, on payment of applicable fee, if any.
Customer shall observe strict obligations of confidentiality with respect to such information and shall use such information in compliance with any applicable
terms and conditions upon which Juniper makes such information available.
14. Third Party Software. Any licensor of Juniper whose software is embedded in the Software and any supplier of Juniper whose products or technology
are embedded in (or services are accessed by) the Software shall be a third party beneficiary with respect to this Agreement, and such licensor or vendor
shall have the right to enforce this Agreement in its own name as if it were Juniper. In addition, certain third party software may be provided with the
Software and is subject to the accompanying license(s), if any, of its respective owner(s). To the extent portions of the Software are distributed under and
subject to open source licenses obligating Juniper to make the source code for such portions publicly available (such as the GNU General Public License
(“GPL”) or the GNU Library General Public License (“LGPL”)), Juniper will make such source code portions (including Juniper modifications, as appropriate)
available upon request for a period of up to three years from the date of distribution. Such request can be made in writing to Juniper Networks, Inc., 1194
N. Mathilda Ave., Sunnyvale, CA 94089, ATTN: General Counsel. You may obtain a copy of the GPL at http://www.gnu.org/licenses/gpl.html, and
a copy of the LGPL at http://www.gnu.org/licenses/lgpl.html.
15. Miscellaneous. This Agreement shall be governed by the laws of the State of California without reference to its conflicts of laws principles. The provisions
of the U.N. Convention for the International Sale of Goods shall not apply to this Agreement. For any disputes arising under this Agreement, the Parties
hereby consent to the personal and exclusive jurisdiction of, and venue in, the state and federal courts within Santa Clara County, California. This Agreement
constitutes the entire and sole agreement between Juniper and the Customer with respect to the Software, and supersedes all prior and contemporaneous
iv■
Page 5
agreements relating to the Software, whether oral or written (including any inconsistent terms contained in a purchase order), except that the terms of a
separate written agreement executed by an authorized Juniper representative and Customer shall govern to the extent such terms are inconsistent or conflict
with terms contained herein. No modification to this Agreement nor any waiver of any rights hereunder shall be effective unless expressly assented to in
writing by the party to be charged. If any portion of this Agreement is held invalid, the Parties agree that such invalidity shall not affect the validity of the
remainder of this Agreement. This Agreement and associated documentation has been written in the English language, and the Parties agree that the English
version will govern. (For Canada: Les parties aux présentés confirment leur volonté que cette convention de même que tous les documents y compris tout
avis qui s'y rattaché, soient redigés en langue anglaise. (Translation: The parties confirm that this Agreement and all related documentation is and will be
in the English language)).
■v
Page 6
vi■
Page 7
Abbreviated Table of Contents
About the Documentationxxxvii
Part 1Managing Remote Access
Chapter 1Configuring Remote Access3
Chapter 2Monitoring and Troubleshooting Remote Access109
If the information in the latest release notes differs from the information in the
documentation, follow the JUNOSe Release Notes.
To obtain the most current version of all Juniper Networks® technical documentation,
see the product documentation page on the Juniper Networks website at
http://www.juniper.net/techpubs/.
Audience
This guide is intended for experienced system and network specialists working with
Juniper Networks E Series Broadband Services Routers in an Internet access
environment.
E Series and JUNOSe Text and Syntax Conventions
Table 1 on page xxxviii defines notice icons used in this documentation.
E Series and JUNOSe Documentation and Release Notes■xxxvii
Table 2 on page xxxviii defines text and syntax conventions that we use throughout the
E Series and JUNOSe documentation.
DescriptionMeaningIcon
Indicates important features or instructions.Informational note
Indicates a situation that might result in loss of data or hardware damage.Caution
Alerts you to the risk of personal injury or death.Warning
Alerts you to the risk of personal injury from a laser.Laser warning
Table 2: Text and Syntax Conventions
Represents commands and keywords in text.Bold text like this
Bold text like this
Fixed-width text like this
Represents text that the user must type.
Represents information as displayed on your
terminal’s screen.
Italic text like this
Emphasizes words.
■
Identifies variables.
■
Identifies chapter, appendix, and book
■
names.
Plus sign (+) linking key names
keys simultaneously.
Syntax Conventions in the Command Reference Guide
ExamplesDescriptionConvention
Issue the clock source command.
■
Specify the keyword exp-msg.
■
host1(config)#traffic class low-loss1
host1#show ip ospf 2
Routing Process OSPF 2 with Router
ID 5.5.0.250
Router is an Area Border Router
(ABR)
There are two levels of access: user and
■
privileged.
clusterId, ipAddress.
■
Appendix A, System Specifications
■
Press Ctrl + b.Indicates that you must press two or more
terminal lengthRepresents keywords.Plain text like this
| (pipe symbol)
xxxviii■E Series and JUNOSe Text and Syntax Conventions
mask, accessListNameRepresents variables.Italic text like this
diagnostic | lineRepresents a choice to select one keyword
or variable to the left or to the right of this
symbol. (The keyword or variable can be
either optional or required.)
Represent required keywords or variables.{ } (braces)
Obtaining Documentation
To obtain the most current version of all Juniper Networks technical documentation,
see the products documentation page on the Juniper Networks Web site at
http://www.juniper.net/.
To download complete sets of technical documentation to create your own
documentation CD-ROMs or DVD-ROMs, see the CD-ROM and DVD-ROM
Documentation page at
We encourage you to provide feedback, comments, and suggestions so that we can
improve the documentation to better meet your needs. Send your comments to
techpubs-comments@juniper.net, or fill out the documentation feedback form at
https://www.juniper.net/cgi-bin/docbugreport/. If you are using e-mail, be sure to include
the following information with your comments:
■Document or topic name
■URL or page number
■Software release version
Requesting Technical Support
Technical product support is available through the Juniper Networks Technical
Assistance Center (JTAC). If you are a customer with an active J-Care or JNASC support
contract, or are covered under warranty, and need post-sales technical support, you
can access our tools and resources online or open a case with JTAC.
■JTAC policies—For a complete understanding of our JTAC procedures and policies,
■JTAC hours of operation—The JTAC centers have resources available 24 hours a
day, 7 days a week, 365 days a year.
Self-Help Online Tools and Resources
For quick and easy problem resolution, Juniper Networks has designed an online
self-service portal called the Customer Support Center (CSC) that provides you with
the following features:
■Find solutions and answer questions using our Knowledge Base:
http://kb.juniper.net/
■Download the latest versions of software and review release notes:
http://www.juniper.net/customers/csc/software/
■Search technical bulletins for relevant hardware and software notifications:
https://www.juniper.net/alerts/
■Join and participate in the Juniper Networks Community Forum:
http://www.juniper.net/company/communities/
■
Open a case online in the CSC Case Management tool: http://www.juniper.net/cm/
To verify service entitlement by product serial number, use our Serial Number
Entitlement (SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
Opening a Case with JTAC
You can open a case with JTAC on the Web or by telephone.
■
Use the Case Management tool in the CSC at http://www.juniper.net/cm/ .
■Call 1-888-314-JTAC (1-888-314-5822 toll-free in the USA, Canada, and Mexico).
For international or direct-dial options in countries without toll-free numbers, see
This chapter describes how to configure remote access to an Juniper Networks E
Series Broadband Services Router. This chapter discusses the following topics:
■Remote Access Overview on page 4
■Remote Access Platform Considerations on page 5
■Remote Access References on page 6
■Before You Configure B-RAS on page 6
■Remote Access Configuration Tasks on page 6
■Configuring a B-RAS License on page 7
■Mapping a User Domain Name to a Virtual Router on page 8
■Setting Up Domain Name and Realm Name Usage on page 12
■Specifying a Single Name for Users from a Domain on page 16
■Configuring RADIUS Authentication and Accounting Servers on page 18
■Configuring Local Authentication Servers on page 40
■Configuring Tunnel Subscriber Authentication on page 50
■Configuring Name Server Addresses on page 51
■Configuring Local Address Servers on page 54
■Configuring DHCP Features on page 60
■Creating an IP Interface on page 61
■Configuring AAA Profiles on page 63
■Using RADIUS Route-Download Server to Distribute Routes on page 71
■Using the AAA Logical Line Identifier to Track Subscribers on page 76
■Using VSAs for Dynamic IP Interfaces on page 82
■Mapping Application Terminate Reasons to RADIUS Terminate Codes on page 84
■Configuring Timeout on page 88
■Limiting Active Subscribers on page 89
■Notifying RADIUS of AAA Failure on page 90
■Configuring Standard RADIUS IPv6 Attributes for IPv6 Neighbor Discovery Router
Advertisements and DHCPv6 Prefix Delegation on page 90
■Propagation of LAG Subscriber Information to AAA and RADIUS on page 92
■DHCPv6 Local Address Pools for Allocation of IPv6 Prefixes Overview on page 101
■Configuring the DHCPv6 Local Address Pools on page 104
■Using DHCPv6 Local Address Pools for Prefix Delegation over non-PPP Links
Example on page 107
Remote Access Overview
Broadband Remote Access Server (B-RAS) is an application running on your router
that:
■Aggregates the output from digital subscriber line access multiplexers (DSLAMs)
■Provides user Point-to-Point Protocol (PPP) sessions or IP-over-Asynchronous
Transfer Mode (ATM) sessions
■Enforces quality of service (QoS) policies
B-RAS Data Flow
■Routes traffic into an Internet service provider’s (ISP’s) backbone network
A DSLAM collects data traffic from multiple subscribers into a centralized point so
that it can be uploaded to the router over an ATM connection via a DS3, OC3, E3,
or OC12 link.
The router provides the logical termination for PPP sessions, as well as the interface
to authentication and accounting systems.
The router performs several tasks for a digital subscriber line (DSL) PPP user to
establish a PPP connection. This is an example of the way B-RAS data might flow:
1.Authenticate the subscriber using RADIUS authentication.
2.Assign an IP address to the PPP/IP session via RADIUS, local address pools, or
Dynamic Host Configuration Protocol (DHCP).
3.Terminate the PPP encapsulation or tunnel a PPP session.
4.Provide user accounting via RADIUS.
NOTE: For information about configuring RADIUS attributes see “Configuring RADIUS
Attributes” on page 165.
Configuring IP Addresses for Remote Clients
A remote client can obtain an IP address from one of the following:
■RADIUS server
■Local address server
4■Remote Access Overview
Page 45
AAA Overview
Chapter 1: Configuring Remote Access
■DHCP proxy client and server
■DHCP relay agent (Bridged IP only)
■DHCP local server
■DHCP external server
For information about configuring DHCP support on the E Series router, see “DHCP
Overview” on page 455.
For information about how to configure a RADIUS server, see your RADIUS server
documentation.
Collectively, authentication, authorization, and accounting are referred to as AAA.
Each has an important but separate function.
■Authentication—Determines who the user is, then determines whether that user
should be granted access to the network. The primary purpose is to prevent
intruders from networks. It uses a database of users and passwords.
■Authorization—Determines what the user is allowed to do by giving network
managers the ability to limit network services to different users.
■Accounting—Tracks what the user did and when they did it. You can use
accounting for an audit trail or for billing for connection time or resources used.
Central management of AAA means the information is in a single, centralized, secure
database, which is much easier to administer than information distributed across
numerous devices.
Remote Access Platform Considerations
B-RAS services are supported on all E Series routers.
For information about the modules supported on E Series routers:
■See the ERX Module Guide for modules supported on ERX7xx models, ERX14xx
models, and the ERX310 Broadband Services Router.
■See the E120 and E320 Module Guide for modules supported on the Juniper
Networks E120 and E320 Broadband Services Routers.
B-RAS Protocol Support
The E Series router supports the following protocols for B-RAS services:
■Layer 2 Tunneling Protocol (L2TP), both L2TP access concentrator (LAC) and
L2TP network server (LNS)
Remote Access References
For more information about the topics covered in this chapter, see the following
documents:
■RFC 2748—The COPS (Common Open Policy Service) Protocol (January 2000)
■RFC 2865—Remote Authentication Dial In User Service (RADIUS) (June 2000)
■RFC 3084—COPS Usage for Policy Provisioning (COPS-PR) (March 2001)
■RFC 3159—Structure of Policy Provisioning Information (SPPI) (August 2001)
■RFC 3198—Terminology for Policy-Based Management (November 2001)
■RFC 3317—Differentiated Services Quality of Service Policy Information Base
(DIFFSERV-PIB)
■RFC 3318—Framework Policy Information Base (March 2003)
JUNOSe Release Notes, Appendix A, System Maximums—Refer to the Release Notes
corresponding to your software release for information about the number of
concurrent RADIUS requests that the router supports for authentication and accounting
servers.
Before You Configure B-RAS
Before you begin to configure B-RAS, you need to collect the following information
for the RADIUS authentication and accounting servers:
■IP addresses
■User Datagram Protocol (UDP) port numbers
■Secret keys
Remote Access Configuration Tasks
Each configuration task is presented in a separate section in this chapter. Most of
the B-RAS configuration tasks are optional.
To configure B-RAS, perform the following tasks:
1.Configure a B-RAS license.
2.(Optional) Map a user domain name to a virtual router. By default, all requests
go through a default router.
3.(Optional) Set up domain name and realm name usage.
4.(Optional) Specify a single name for users from a domain.
6■Remote Access References
Page 47
Chapter 1: Configuring Remote Access
5.Configure an authentication server on the router.
6.(Optional) Configure UDP checksums.
7.(Optional) Configure an accounting server on the router.
8.(Optional) Configure Domain Name System (DNS) and Windows Internet Name
Service (WINS) name server addresses.
9.(Optional) Configure a local address pool for remote clients.
10. (Optional) Configure one or more DHCP servers.
11. Create a PPP interface on which the router can dynamically create an IP interface.
12. (Optional) Configure AAA profiles.
13. (Optional) Use vendor-specific attributes (VSAs) for Dynamic Interfaces.
14. (Optional) Set idle or session timeout.
15. (Optional) Limit the number of active subscribers on a virtual router (VR) or port.
16. (Optional) Set up the router to notify RADIUS when a user fails AAA.
17. (Optional) Configure a RADIUS download server on the router.
18. (Optional) Configure the Session and Resource Control (SRC) client (formerly the
SDX client).
19. (Optional) Set baselines for AAA statistics or RADIUS authentication and
accounting statistics.
Configuring a B-RAS License
From Global Configuration mode, configure a B-RAS license:
host1(config)#license b-ras k3n91s6gvtj
B-RAS licenses are available in various sizes to enable subscriber access for up to
one of the following maximum number of simultaneous active IP, LAC, and bridged
Ethernet interfaces:
■4000
■8000
■16,000
■32,000
■48,000
NOTE: To use a B-RAS license for 16,000 or more interfaces, each of your SRP
modules must have 1 gigabyte (GB) of memory.
■The license is a unique string of up to 15 alphanumeric characters.
NOTE: Acquire the license from Juniper Networks Customer Service or your Juniper
Networks sales representative.
■You can purchase licenses that allow up to 2,000, 4,000, 8,000, 16,000, 32,000,
or 48,000 simultaneous active IP, LAC, and bridged Ethernet interfaces.
■Example
host1(config)#license b-ras jwmR4k8D
■Use the no version to disable the license.
■See license b-ras
Mapping a User Domain Name to a Virtual Router
You can configure RADIUS authentication, accounting, and local address pools for a
specific virtual router and then map a user domain to that virtual router.
The router keeps track of the mapping between domain names and virtual-routers.
Use the aaa domain-map command to map a user domain to a virtual router.
NOTE: This domain name is not the NT domain sometimes found on the Dialup
Networking dialog box.
When the router is configured to require authentication of a PPP user, the router
checks for the appropriate user domain-name-to-virtual-router mapping. If it finds a
match, the router sends a RADIUS authentication request to the RADIUS server
configured for the specific virtual router.
Mapping User Requests Without a Valid Domain Name
You can create a mapping between a domain name called default and a specific
virtual router so that the router can map user names that contain a domain name
that does not have an explicit map.
If a user request is submitted with a domain name for which the router cannot find
a match, the router looks for a mapping between the domain name default and a
virtual router. If a match is found, the user’s request is processed according to the
RADIUS server configured for the named virtual router. If no entry is found that maps
default to a specific virtual router, the router sends the request to the RADIUS server
configured on the default virtual router.
8■Mapping a User Domain Name to a Virtual Router
Page 49
Mapping User Requests Without a Configured Domain Name
You can map a domain name called none to a specific virtual router so that the router
can map user names that do not contain a domain name.
If a user request is submitted without a domain name, the router looks for a mapping
between the domain name none and a virtual router. If a match is found, the user’s
request is processed according to the RADIUS server configured for the named virtual
router. If the router does not find the domain name none, it checks for the domain
name default. If no matching entries are found, the router sends the request to the
server configured on the default virtual router.
Using DNIS
The E Series router supports dialed number identification service (DNIS). With DNIS,
if users have a called number associated with them, the router searches the domain
map for the called number. If it finds a match, the router uses the matching domain
map entry information to authenticate the user. If the router does not find a match,
it searches the domain map using normal processing.
Chapter 1: Configuring Remote Access
NOTE: For DNIS to work, the router must be acting as the LNS. Also, the phone
number configured in the aaa domain-map command must be an exact match to
the value passed by L2TP in the called number AVP (AVP 21).
For example, as specified in the following sequence, a user calling 9785551212
would be terminated in vrouter_88, while a user calling 8005554433 is terminated
in vrouter_100.
Redirected authentication provides a way to offload AAA activity on the router, by
providing the domain-mapping-like feature remotely on the RADIUS server. Redirected
authentication works as follows:
1.The router sends an authentication request (in the form of a RADIUS
access-request message) to the RADIUS server that is configured in the default
VR.
2.The RADIUS server determines the user’s AAA VR context and returns this
information in a RADIUS response message to the router.
3.The router then behaves in similar fashion as if it had received the VR context
from the local domain map.
To maintain local control, the only VR allowed to redirect authentication is the default
VR. Also, to prevent loopbacks, the redirection may occur only once to a non-default
VR.
To maintain flexibility, the redirection response may include idle time or session
attributes that are considered as default unless the redirected authentication server
overrides them. For example, if the RADIUS server returns the VR context along with
an idle timeout attribute with the value set to 20 minutes, the router uses this idle
timeout value unless the RADIUS server configured in the VR context returns a
different value.
Since the router supports the RADIUS User-Name attribute [1] in the RADIUS response
message, the default VR RADIUS server may override the user’s name (this can be
a stripped name or an entirely different name). Overriding is useful for the case when
the user enters a login name containing a domain name that is significant only to
the RADIUS server in the default VR.
IP Hinting
You can allocate an address before authentication of PPP sessions. This address is
included in the Access-Request sent to the authentication server as an IP address
hint.
aaa domain-map
ip-hint
■Use to map a user domain name to a virtual router or a loopback interface.
■When you specify only the domain name, the command sets the mode to Domain
To provide flexibility in how the router handles different types of usernames, the
software lets you specify the part of a username to use as the domain name, how
the domain name is designated, and how the router parses names. It also allows you
to set whether or not the router strips the domain name from the username before
it sends the username to the RADIUS server.
By default, the router parses usernames as follows:
realmName/personalName@domainName
The string to the left of the forward slash (/) is the realm name, and the string to the
right of the at-symbol (@) is the domain name. For example, in the username
juniper/jill@abc.com, juniper is the realm name and abc.com is the domain name.
The router allows you to:
■Use the realm name as the domain name.
■Use delimiters other than / to designate the realm name.
■Use delimiters other than @ to designate the domain name.
■Use either the domain or the realm as the domain name when the username
contains both a realm and domain name.
■Change the direction in which the router searches for the domain name or the
realm name.
To provide these features, the router allows you to specify delimiters for the domain
name and realm name. You can use up to eight one-character delimiters each for
domain and realm names. The router also lets you specify how it parses usernames
to determine which part of a username to use as the domain name.
Using the Realm Name as the Domain Name
Typically, a realm appears before the user field and is separated with the / character;
for example, usEast/jill@abc.com. To use the realm name usEast rather than abc.com
as the domain name, set the realm name delimiter to /. For example:
host1(config)#aaa delimiter realmName /
This command causes the router to use the string to the left of the / as the domain
name. If the realm name delimiter is null (the default), the router will not search for
the realm name.
Using Delimiters Other Than @
You can set up the router to recognize delimiters other than @ to designate the
domain name. Suppose there are two users: bob@abc.com and pete!xyz.com, and
you want to use both of their domain names. In this case you would set the domain
name delimiter to @ and !. For example:
12■Setting Up Domain Name and Realm Name Usage
Page 53
host1(config)#aaa delimiter domainName @!
Using Either the Domain or the Realm as the Domain Name
If the username contains both a realm name and a domain name delimiter, you can
use either the domain name or the realm name as the domain name. As previously
mentioned, the router treats usernames with multiple delimiters as though the realm
name is to the left of the realm delimiter and the domain name is to the right of the
domain delimiter.
If you set the parse order to:
■domain-first—The router searches for a domain name first. For example, for
username usEast/lori@abc.com, the domain name is abc.com.
■realm-first—The router searches for a realm name first and uses the realm name
as the user’s domain name. For username usEast/lori@abc.com, the domain is
usEast.
Chapter 1: Configuring Remote Access
For example, if you set the delimiter for the realm name to / and set the delimiter
for the domain name to @, the router parses the realm first by default. The username
usEast/lori@abc.com results in a domain name of usEast. To cause the parsing to
return abc.com as the domain, enter the aaa parse-order domain-first command.
Specifying the Domain Name or Realm Name Parse Direction
You can specify the direction—either left to right or right to left—in which the router
performs the parsing operation when identifying the realm name or domain name.
This feature is particularly useful if the username contains nested realm or domain
names. For example, for a username of userjohn@abc.com@xyz.com, you can
identify the domain as either abc.com@xyz.com or as xyz.com, depending on the
parse direction that you specify.
You use either the left-to-right or right-to-left keywords with one of the following
keywords to specify the type of search and parsing that the router performs:
■domainName—The router searches for the next domain delimiter value in the
direction specified. When it reaches a delimiter, the router uses anything to the
right of the delimiter as the domain name. Domain parsing is from right to left
by default.
■realmName—The router searches for the next realm delimiter value in the
direction specified. When it reaches a delimiter, the router uses anything to the
left of the delimiter as the realm name. Realm parsing is from left to right by
default.
The router provides feature that strips the domain name from the username before
it sends the name to the RADIUS server in an Access-Request message. You can
enable or disable this feature using the strip-domain command.
By default, the domain name is the text after the last @ character. However, if you
changed the domain name parsing using the aaa delimiter, aaa parse-order, or aaaparse direction commands, the router strips the domain name and delimiter that
result from the parsing.
aaa delimiter
Use to configure delimiters for the domain and realm names. Specify one of the
■
following keywords:
■domainName—Configures domain name delimiters. The default domain
name delimiter is @.
aaa parse-direction
■realmName—Configures realm name delimiters. The default realm name
delimiter is NULL (no character). In this case, realm parsing is disabled
(having no delimiter disables realm parsing).
■You can specify up to eight delimiters each for domain name and realm name.
■Example
host1(config)#aaa delimiter domainName @*/
■Use the no version to return to the default.
■See aaa delimiter
Use to specify the direction the router uses to parse the username for the domain
■
or realm name.
■domainName—Specifies that the domain name is parsed. The router
performs domain parsing from right to left by default.
■realmName—Specifies that the realm name is parsed. The router performs
realm parsing from left to right by default.
■left-to-right—Router searches from the left-most character. When the router
reaches a realm delimiter, it uses anything to the left of the delimiter as the
domain. When the router reaches a domain delimiter, it uses anything to
the right of the delimiter as the domain.
■right-to-left—Router searches from the right-most character. When the
■Example
14■Setting Up Domain Name and Realm Name Usage
router reaches a realm delimiter, it uses anything to the left of the delimiter
as the domain. When the router reaches a domain delimiter, it uses anything
to the right of the delimiter as the domain.
■Use the no version to return to the default: right-to-left parsing for domain names
and left-to-right parsing for realm names.
■See aaa parse-direction
Use to specify which part of a username the router uses as the domain name. If
■
a user’s name contains both a realm name and a domain name, you can configure
the router to use either name as the domain name.
■domain-first—Router searches for a domain name first. When the router
reaches a domain delimiter, it uses anything to the right of the delimiter as
the domain name. For example, if the username is usEast/lori@abc.com,
the domain name is abc.com. If the router does not find a domain name, it
then searches for a realm name if the realm delimiter is specified.
■realm-first—Router searches for a realm name first. When the router reaches
a realm delimiter, it uses anything to the left of the delimiter as the domain.
For example, if the username is usEast/lori@abc.com, the domain name is
usEast. If no realm name is found, the router searches for a domain name.
strip-domain
■Example
host1(config)#aaa parse-order domain-first
■Use the no version to return to the default, realm first.
■See aaa parse-order
■Use to strip the domain name from the username before sending an
access-request message to the RADIUS server.
■By default, the domain name is the text after the last @ character. However, if
you change the domain name parsing by using the aaa delimiter, aaa
parse-order, or parse-direction command, the router strips the domain name
and delimiter that result from the parsing.
■To stop stripping the username, use the disable keyword.
■Use the no version to return to the default, disabled.
■See strip-domain
Domain Name and Realm Name Examples
This section provides examples of possible domain or realm name results that you
might obtain, depending on the commands and options you specify. This example
uses the following username:
Assigning a single username and a single password for all users associated with a
domain provides better compatibility with some RADIUS servers. You can use this
feature for domains that require the router to tunnel, but not terminate, PPP sessions.
When users request a PPP session, they specify usernames and passwords. During
the negotiations for the PPP session, the router authenticates legitimate users.
NOTE: This feature works only for users authenticated by Password Authentication
Protocol (PAP) and not by Challenge Handshake Authentication Protocol (CHAP).
If you configure this feature, the router substitutes the specified username and
password for all authenticated usernames and passwords associated with that domain.
There are two options for this feature. The router can:
■Substitute the domain name for each username and one new password for each
existing password.
16■Specifying a Single Name for Users from a Domain
Page 57
aaa domain-map
Chapter 1: Configuring Remote Access
For example, if the domain name is xyz.com and you specify the password
xyz_domain, the router associates the username xyz.com and the password
xyz_domain with all users from xyz.com.
■Substitute one new username for each username and one new password for
each existing password.
For example, if the domain name is xyz.com and you specify the username
xyz_group and the password xyz_domain, the router associates these identifiers
with all users from xyz.com.
To use a single username and a single password for all users from a domain:
1.Access Domain Map Configuration mode using the aaa domain-map command.
2.Specify the new username and password using the override-user command.
■Use to map a domain name to a virtual router or to access Domain Map
■Use to specify a single username and single password for all users from a domain
in place of the values received from the remote client.
■Use only for domains that require the router to tunnel and not terminate PPP
sessions.
■If you specify a password only, the router substitutes the domain name for the
username and associates the new password with the user. If you specify a
password only and you have configured the domain name none with the aaa
domain-map command, the router rejects any users without domain names.
■If you specify a name and password, the router associates both the new name
and password with the user.
■Example
host1(config-domain-map)#override-user name boston password abc
■Use the no version to revert to the original username.
■See override-user
Specifying a Single Name for Users from a Domain■17
Configuring RADIUS Authentication and Accounting Servers
The number of RADIUS servers you can configure depends on available memory.
The order in which you configure servers determines the order in which the router
contacts those servers on behalf of clients.
Initially, a RADIUS client sends a request to a RADIUS authentication or accounting
server. The RADIUS server uses the configured IP address, the UDP port number,
and the secret key to make the connection. The RADIUS client waits for a response
for a configurable timeout period and then retransmits the request. The RADIUS
client retransmits the request for a user-configurable retry limit.
■If there is no response from the primary RADIUS server, the RADIUS client
submits the request to the secondary RADIUS server using the timeout period
and retry limit configured for the secondary RADIUS server.
■If the connection attempt fails for the secondary RADIUS server, the router
submits the request to the tertiary server and so on until it either is granted
access on behalf of the client or there are no more configured servers.
Server Access
■If another authentication server is not configured, the router attempts the next
method in the method list; for accounting server requests, the information is
dropped.
For example, suppose that you have configured the following authentication servers:
Auth1, Auth2, Auth3, Auth4, and Auth5. Your router attempts to send an
authentication request to Auth1. If Auth1 is unavailable, the router submits the request
to Auth2, then Auth3, and so on until an available server is found. If Auth5, the last
configured authentication server, is not available, the router attempts the next method
in the methods list. If the only method configured is RADIUS, then the router notifies
the client that the request has been denied.
The router offers two options by which servers are accessed:
■Direct—The first authentication or accounting server that you configure is treated
as the primary authentication or accounting server, the next server configured
is the secondary, and so on.
■Round-robin—The first configured server is treated as a primary for the first
request, the second server configured as primary for the second request, and so
on. When the router reaches the end of the list of servers, it starts again at the
top of the list until it comes full cycle through the list.
Use the radius algorithm command to specify the server access method.
When you configure the first RADIUS accounting server, a RADIUS Acct-On message
is sent. When you delete the last accounting server, a RADIUS Acct-Off message is
sent.
18■Configuring RADIUS Authentication and Accounting Servers
Page 59
Server Request Processing Limit
You can configure RADIUS authentication servers and accounting servers to use
different UDP ports on the router. This enables the same IP address to be used for
both an authentication server and an accounting server. However, you cannot use
the same IP address for multiple authentication servers or for multiple accounting
servers.rs.
NOTE: For information about the number of concurrent RADIUS requests that the
router supports for authentication and accounting servers, see JUNOSe Release Notes,
Appendix A, System Maximums.
The E Series router listens to a range of UDP source (or local) ports for RADIUS
responses. Each UDP source port supports a maximum of 255 RADIUS requests.
When the 255 per-port limit is reached, the router opens the next source port. When
the max-sessions command limit is reached, the router submits the request to the
next configured server.
Chapter 1: Configuring Remote Access
Table 4 on page 19 lists the range of UDP ports the router uses for each type of
RADIUS request.
Table 4: Local UDP Port Ranges by RADIUS Request Type
Authentication and Accounting Methods
When you configure AAA authentication and accounting services for your B-RAS
environment, one important task is to specify the authentication and accounting
method used. The JUNOSe software gives you the flexibility to configure authentication
or accounting methods based on the type of subscriber. This feature allows you to
enable RADIUS authentication for some subscribers, while disabling authentication
completely for other subscribers. Similarly, you can enable RADIUS accounting for
some subscribers, but no accounting for others. For example, you might use RADIUS
authentication for ATM 1483 subscribers, while granting IP subscriber management
interfaces access without authentication (using the none keyword).
ERX310, ERX710, ERX1410, and
E120 Broadband Services
RoutersRADIUS Request Type
ERX1440 and E320
Broadband Services Routers
50000–5012450000–50124RADIUS authentication
50125–5049950125–50249RADIUS accounting
50500–5062450250–50374RADIUS preauthentication
50625–5074950375–50500RADIUS route-download
You can specify the authentication or accounting method you want to use, or you
can specify multiple methods in the order in which you want them used. For example,
Configuring RADIUS Authentication and Accounting Servers■19
if you specify the radius keyword followed by the none keyword when configuring
authentication, AAA initially attempts to use RADIUS authentication. If no RADIUS
servers are available, AAA uses no authentication. The JUNOSe software currently
supports radius and none as accounting methods and radius, none, and local as
authentication methods. See “Configuring Local Authentication Servers” on page 40
for information about local authentication.
You can configure authentication and accounting methods based on the following
types of subscribers:
■ATM 1483
■Tunnels (for example, L2TP tunnels)
■PPP
■RADIUS relay server
■IP subscriber management interfaces
NOTE: IP subscriber management interfaces are static or dynamic interfaces that
are created or managed by the JUNOSe software’s subscriber management feature.
Supporting Exchange of Extensible Authentication Protocol Messages
Extensible Authentication Protocol (EAP) is a protocol that supports multiple methods
for authenticating a peer before allowing network layer protocols to transmit over
the link. JUNOSe software supports the exchange of EAP messages between JUNOSe
applications, such as PPP, and an external RADIUS authentication server.
The JUNOSe software’s AAA service accepts and passes EAP messages between the
JUNOSe application and the router’s internal RADIUS authentication server. The
internal RADIUS authentication server, which is a RADIUS client, provides EAP
pass-through—the RADIUS client accepts the EAP messages from AAA, and sends
the messages to the external RADIUS server for authentication. The RADIUS client
then passes the response from the external RADIUS authentication server back to
the AAA service, which then sends a response to the JUNOSe application. The AAA
service and the internal RADIUS authentication service do not process EAP
information—both simply act as pass-through devices for the EAP message.
The router’s local authentication server and TACACS+ authentication servers do not
support the exchange of EAP messages. These type of servers deny access if they
receive an authentication request from AAA that includes an EAP message. EAP
messages do not affect the none authentication configuration, which always grants
access.
The local RADIUS authentication server uses the following RADIUS attributes when
exchanging EAP messages with the external RADIUS authentication server:
20■Configuring RADIUS Authentication and Accounting Servers
Page 61
■Framed-MTU (attribute 12)—Used if AAA passes an MTU value to the internal
RADIUS client
■State (attribute 24)—Used in Challenge-Response messages from the external
server and returned to the external server on the subsequent Access-Request
■Session-Timeout (attribute 27)—Used in Challenge-Response messages from the
external server
■EAP-Message (attribute 79)—Used to fragment EAP strings into 253-byte
fragments (the RADIUS limit)
■Message-Authenticator (attribute 80)—Used to authenticate messages that include
an EAP-Message attribute
For additional information on configuring PPP to use EAP authentication, see JUNOSeLink Layer Configuration Guide .
Immediate Accounting Updates
Chapter 1: Configuring Remote Access
You can use the aaa accounting immediate-update command to configure immediate
accounting updates on a per-VR basis. If you enable this feature, the E Series router
sends an Acct-Update message to the accounting server immediately on receipt of
a response (ACK or timeout) to the Acct-Start message.
This feature is disabled by default. Use the enable keyword to enable immediate
updates and the disable keyword to halt them.
The accounting update contains 0 (zero) values for the input/output octets/packets
and 0 (zero) for uptime. If you have enabled duplicate or broadcast accounting, the
accounting update goes to both the primary virtual router context and the duplicate
or broadcast virtual router context.
Duplicate and Broadcast Accounting
Normally, the JUNOSe software sends subscriber-related AAA accounting information
to the virtual router that authenticates the subscriber. If an operational virtual router
is configured that is different from the authentication router, it also receives the
accounting information. You can optionally configure duplicate or broadcast AAA
accounting, which sends the accounting information to additional virtual routers
simultaneously. The accounting information continues to be sent to the authenticating
virtual router, but not to the operational virtual router.
Both the duplicate and broadcast accounting features are supported on a per-virtual
router context, and enable you to specify particular accounting servers that you want
to receive the accounting information.
For example, you might use broadcast accounting to send accounting information
to a group of your private accounting servers. Or you might use duplicate accounting
to send the accounting information to a customer’s accounting server.
■Duplicate accounting—Sends the accounting information to a particular virtual
router
Configuring RADIUS Authentication and Accounting Servers■21
■Broadcast accounting—Sends the accounting information to a group of virtual
routers. An accounting virtual router group can contain up to four virtual routers
and the E Series router supports a maximum of 100 virtual router groups. The
accounting information continues to be sent to the duplicate accounting virtual
router, if one is configured.
Configuring AAA Duplicate Accounting
To configure and enable duplicate accounting on a virtual router, you use the aaa
accounting duplication command with the name of the accounting server that will
receive the information. For example, to enable duplicate accounting for the default
virtual router:
AAA accounting packets normally include two RADIUS attributes—NAS-IP-Address
[4] and NAS-Identifier [32]—of the virtual router that generates the accounting
information. You can override the default configuration and specify that accounting
packets from particular broadcast virtual routers instead include the NAS-IP-Address
and NAS-Identifier attributes of the authenticating virtual router.
To override the normal AAA accounting NAS information, access the correct virtual
router context, and use the radius override nas-info command. For example:
Each virtual router on which you configure B-RAS is enabled to perform UDP
checksums by default. You can disable and reenable UDP checksums.
Collecting Accounting Statistics
You can use the aaa accounting statistics command to specify how the AAA server
collects statistics on the sessions it manages. Use the volume-time keyword to specify
that AAA notifies applications to collect a full set of statistics from each of their
connections. Use the time keyword to specify that only the uptime status is collected
for each connection. Collecting only uptime information reduces the amount of data
sent to AAA and is a more efficient use of system resources for customers that do
not need a full set of statistics. The router collects a full set of statistics by default.
Chapter 1: Configuring Remote Access
Configuring RADIUS AAA Servers
The number of RADIUS servers you cansure configure depends on available memory.
The router has an embedded RADIUS client for authentication and accounting.
NOTE: You can configure B-RAS with RADIUS accounting, but without RADIUS
authentication. In this configuration, the username and password on the remote end
are not authenticated and can be set to any value.
You must assign an IP address to a RADIUS authentication or accounting server to
configure it.
If you do not configure a primary authentication or accounting server, all
authentication and accounting requests will fail. You can configure other servers as
backup in the event that the primary server cannot be reached. Configure each server
individually.
To configure an authentication or accounting RADIUS server:
1.Specify the authentication or accounting server address.
host1(config)#radius authentication server 10.10.10.1
host1(config-radius)#
or
host1(config)#radius accounting server 10.10.10.6
host1(config-radius)#
2.(Optional) Specify a UDP port for RADIUS authentication or accounting server
requests.
host1(config-radius)#udp-port 1645
Configuring RADIUS Authentication and Accounting Servers■23
■Use the no version to disable the AAA broadcast accounting.
■See aaa accounting broadcast
■Use to specify the accounting method used for a particular type of subscriber.
■Specify one of the following types of subscribers:
■atm1483; this keyword is not supported
■tunnel
■ppp
■radius-relay
■ipsec
■ip (IP subscriber management interfaces)
NOTE: IP subscriber management interfaces are static or dynamic interfaces that
are created or managed by the JUNOSe software’s subscriber management feature.
Although the atm1483 keyword is available in the CLI for this command, that
subscriber type is not supported. The router does not support accounting for ATM
1483 subscribers.
■Specify one of the following types of accounting methods:
Configuring RADIUS Authentication and Accounting Servers■25
■Use the no version to restore the default condition, disabling immediate updates.
■See aaa accounting immediate-update
aaa accounting interval
26■Configuring RADIUS Authentication and Accounting Servers
Page 67
Chapter 1: Configuring Remote Access
■Use to specify the default interval between updates for user and service interim
accounting.
NOTE: This command is deprecated and might be removed completely in a future
release. Use the aaa user accounting interval command to specify the default interval
for user accounting. Use the aaa service accounting interval command to specify
the default interim accounting interval used for services created by the Service
Manager application. See “Configuring Service Manager” on page 635.
■Select an interval in the range 10–1440 minutes. The default is 0, which means
that the feature is disabled.
■Example
host1(config)#aaa accounting interval 60
■Use the no version to turn off interim accounting for both users and services.
aaa accounting statistics
aaa accounting vr-group
■See aaa accounting interval
■Use to specify how the AAA server collects statistics on the sessions it manages.
■Use the volume-time keyword to collect all statistics for the sessions.
■Use the time keyword to collect only the uptime status of the sessions. Collecting
only uptime information is more efficient because less data is sent to AAA.
■Example
host1(config)#aaa accounting statistics time
■Use the no version to restore the default, in which all statistics are collected.
■See aaa accounting statistics
■Use to create an accounting virtual router group and enter VR Group Configuration
mode. Virtual routing groups are used for AAA broadcast accounting.
■A virtual router group can have up to four virtual routers. The accounting servers
of the virtual routers in the group receive broadcast accounting records that are
forwarded to the group.
■The E Series router supports a maximum of 100 virtual router groups.
■When creating a virtual router group, you must add at least one virtual router to
the group; otherwise, the group is not created.
■A virtual router group can be used in any virtual router context, not just the
■Use the no version to delete the accounting virtual router group.
■See aaa accounting vr-group
aaa authentication default
■Use to specify the authentication method used for a particular type of subscriber.
■Specify one of the following types of subscribers:
■atm1483
■tunnel
■ppp
■radius-relay
■ipsec
■ip (IP subscriber management interfaces)
NOTE: IP subscriber management interfaces are static or dynamic interfaces that
are created or managed by the JUNOSe software’s subscriber management feature.
■Specify one of the following types of accounting methods:
■Example
■Use the no version to set the authentication protocol to the default, radius.
■See aaa authentication default
aaa duplicate-address-check
■Use to enable or disable routing table address lookup or duplicate address check.
■radius—RADIUS authentication for the specified subscribers.
■none—Grants the specified subscribers access without authentication.
■radius none—Multiple types of authentication; used in the order specified.
For example, radius none specifies that RADIUS authentication is initially
used; however, if RADIUS servers are not available, users are granted access
without authentication.
host1(config)#aaa authentication ip default radius
By default, this command is enabled.
■The router checks the routing table for returned addresses for PPP users. If the
address existed, then the user was denied access.
■You can disable this routing table address lookup or duplicate address check
with the aaa duplicate-address-check command.
■Example
28■Configuring RADIUS Authentication and Accounting Servers
Page 69
■There is no no version.
■See aaa duplicate-address-check
aaa user accounting interval
■Use to specify the default interval between user accounting updates. The router
■This command and the aaa service accounting interval command replace the
■The default interval is applied on a virtual router basis—this setting is used for
■Specify the user accounting interval in the range 10–1440 minutes. The default
Chapter 1: Configuring Remote Access
host1(config)#aaa duplicate-address-check enable
uses the default interval when no value is specified in the RADIUS
Acct-Interim-Interval attribute (RADIUS attribute 85).
aaa accounting interval command, which is deprecated and might be removed
in a future release. For information about setting the default interim accounting
interval for services, see “Configuring Service Manager” on page 635.
all users who attach to the corresponding virtual router.
setting is 0, which disables the feature.
aaa virtual-router
■Example
host1(config)#aaa user accounting interval 20
■Use the no version to reset the accounting interval to 0, which turns off interim
user accounting when no value is specified in the RADIUS Acct-Interim-Interval
attribute.
■See aaa user accounting interval
■Use to add virtual routers to a virtual router group. During AAA broadcast
accounting, accounting records are sent to the accounting servers on the virtual
routers in the named virtual router group.
■You can add up to four virtual routers to a virtual router group. Use the
indexInteger parameter to specify the order (1–4) in which the virtual routers
receive the accounting information. The indexInteger is used with the no version
to delete a specific virtual router from a group (see Example 2).
■A virtual router name consists of 1–32 alphanumeric characters.
■The virtual router names in the group must be unique. An error message appears
■Use the no version of the command with the indexInteger parameter to delete
a specific virtual router from a group. If all virtual routers in a group are deleted,
the group is also deleted; a group must contain at least one virtual router.
■See aaa virtual-router
deadtime
■Use to configure the amount of time (0–1440 minutes) that a server is marked
as unavailable if a request times out for the configured retry count.
■If a server fails to answer a request, the router marks it unavailable. The router
does not send requests to the server until the router receives a response from
the server or until the configured time is reached, whichever occurs first.
■If all servers fail to answer a request, then instead of marking all servers as
unavailable, all servers are marked as available.
■To turn off the deadtime mechanism, specify a value of 0.
■Example
key
host1(config)#radius authentication server 10.10.0.1
host1(config-radius)#deadtime 10
■Use the no version to set the time to the default value, 0
■See deadtime
■Use to configure secrets on the primary, secondary, and tertiary authentication
servers.
■The authentication or accounting server secret is a text string used by RADIUS
to encrypt the client and server authenticator field during exchanges between
the router and a RADIUS authentication server. The router encrypts PPP PAP
passwords using this text string.
■The default is no server secret.
■Example
host1(config)#radius authentication server 10.10.8.1
host1(config-radius)#key gismo
■Use the no version to remove the secret.
NOTE: Authentication fails if no key is specified for the authentication server.
■See key
logout subscribers
30■Configuring RADIUS Authentication and Accounting Servers
Page 71
max-sessions
Chapter 1: Configuring Remote Access
■Use to issue an administrative reset to the user’s connection to disconnect the
user.
■From Privileged Exec mode, you can log out all subscribers, or log out subscribers
by username, domain, virtual-router, port, or icr-partition.
■This command applies to PPP users, as well as to non-PPP DHCP users.
■Example
host1#logout subscribers username bmurphy
■There is no no version.
■See logout subscribers
■Use to configure the number of outstanding requests supported by an
authentication or accounting server.
no radius client
■If the request limit is reached, the router sends the request to the next server.
NOTE: For information about the number of concurrent RADIUS requests that the
router supports for authentication and accounting servers, see JUNOSe Release Notes,
Appendix A, System Maximums.
■The same IP address can be used for both an authentication and accounting
server (but not for multiple servers of the same type). The router uses different
UDP ports for authentication servers and accounting servers.
■For each multiple of 255 requests (the RADIUS protocol limit), the router opens
a new UDP source (or local) port on the server to send and receive RADIUS
requests and responses.
■Example
host1(config)#radius authentication server 10.10.0.1
host1(config-radius)#max-sessions 100
■Use the no version to restore the default value, 255.
■See max-sessions.
■Use to remove all RADIUS servers for the virtual router context and to delete the
E Series RADIUS client for the virtual router context.
■Example
■There is no affirmative version of this command; there is only a no version.
■See no radius client
host1:boston(config)#no radius client
Configuring RADIUS Authentication and Accounting Servers■31
■Use to specify the IP address of authentication and accounting servers.
■Example
host1(config)#radius authentication server 10.10.10.1
host1(config-radius)exit
host1(config)#radius authentication server 10.10.10.2
host1(config-radius)exit
host1(config)#radius authentication server 10.10.10.3
host1(config-radius)exit
host1(config)#radius accounting server 10.10.10.20
host1(config-radius)exit
host1(config)#radius accounting server 10.10.10.30
■Use the no version to delete the instance of the RADIUS server.
■See radius accounting server
radius algorithm
radius override nas-info
■Use to specify the algorithm—either direct or round-robin—that the E Series
RADIUS client uses to contact the RADIUS server.
■The algorithm that you choose impacts the display status of a RADIUS server.
For information on the effect of the algorithm configuration on the display of
the show radius servers command, see “Monitoring RADIUS Server Information”
on page 141
■Example
host1(config)#radius algorithm round-robin
■Use the no version to set the algorithm to the default, direct.
■See radius algorithm
■Use to configure the RADIUS client to include the NAS-IP-Address [4] and
NAS-Identifier [32] RADIUS attributes of the authenticating virtual router in
accounting packets when the client performs AAA broadcast accounting.
Normally, the accounting packets include the NAS-IP-Address and NAS-Identifier
of the virtual router that generated the accounting information.
■This override operation is a per-virtual router specification; use this command
in the correct virtual router context.
■This command is ignored if the authenticating virtual router does not have a
configured RADIUS server.
■Example
32■Configuring RADIUS Authentication and Accounting Servers
■Use the no version to delete the parameter so that the router uses the router ID.
■See radius update-source-addr
retransmit
■Use to set the maximum number of times (0–100) that the router retransmits a
RADIUS packet to an authentication or accounting server.
■If there is no response from the primary RADIUS authentication or accounting
server in the specified number of retries, the client sends the request to the
secondary server. If there is no response from the secondary server, the router
sends the request to the tertiary server, and so on.
■Example
host1(config)#radius authentication server 10.10.8.1
host1(config-radius)#retransmit 2
test aaa
■Use the no version to set the value to the default, 3 retransmits.
■See retransmit
■Use to verify RADIUS authentication and accounting and IP address assignment
setup.
■You must specify either a PPP or Multilink PPP (MLPPP) user. PPP indicates a
regular PPP user. MLPPP simulates Multilink PPP so that if multiple test
commands are issued, all test users are bound by the same address.
■The command uses a username and password and attempts to authenticate a
user, get an address assignment, and issue a start accounting request.
■Optionally, you can specify the virtual router context in which to authenticate
the user.
■The command pauses for several seconds, then terminates the session by issuing
NOTE: Specifying the password to associate with the username is optional. Specifying
a virtual router is optional.
■There is no no version.
■See test aaa
timeout
34■Configuring RADIUS Authentication and Accounting Servers
Page 75
Chapter 1: Configuring Remote Access
■Use to set the number of seconds (1–1000) before the router retransmits a
RADIUS packet to an authentication or accounting server.
■If the interval is reached and there is no response from the primary RADIUS
authentication or accounting server, the router attempts another retry. When
the retry limit is reached, the client sends the request to the secondary server.
When the retry limit for the secondary server is reached, the router attempts to
reach the tertiary server, and so on.
NOTE: After the fourth retransmission, the configured timeout value is ignored, and
the router uses a backoff algorithm that increases the timeout between each
succeeding transmission.
The backoff algorithm is:
udp-port
■Example
host1(config)#radius authentication server 10.10.0.1
host1(config-radius)#timeout 5
■Use the no version to restore the default value, 3 seconds.
NOTE: When a RADIUS server times out or when it has no available RADIUS identifier
values, the router removes the RADIUS server from the list of available servers for
a period of time. The router restores all configured servers to the list if it is about to
remove the last server. Restoring the servers avoids having an empty server list.
■See timeout
■Use to configure the UDP port on the router where the RADIUS authentication,
accounting, preauthentication, and route-download servers reside. The router
uses this port to communicate with the RADIUS authentication servers.
■Specify a port number in the range 0–65536. For authentication,
preauthentication, or route-download servers, the default UDP port is 1812. For
accounting servers, the default is 1813.
■For an accounting server, specify a port number in the range 0–65536. The
default is 1813.
■Example
host1(config)#radius authentication server 10.10.9.1
host1(config-radius)#udp-port 1645
Configuring RADIUS Authentication and Accounting Servers■35
■Use the no version to set the port number to the default value.
■See udp-port
SNMP Traps and System Log Messages
The router can send Simple Network Management Protocol (SNMP) traps to alert
network managers when:
■A RADIUS server fails to respond to a request.
■A RADIUS server that previously failed to respond to a request (and was
consequently removed from the list of active servers) returns to active service.
Returning to active service means that the E Series RADIUS client receives a
valid response to an outstanding RADIUS request after the server is marked
unavailable.
■All RADIUS servers within a VR context fail to respond to a request.
The router also generates system log messages when RADIUS servers fail to respond
or when they return to active service; no configuration is required for system log
messages.
SNMP Traps
The router generates SNMP traps and system log messages as follows:
■If the first RADIUS server fails to respond to the RADIUS request, the E Series
RADIUS client issues a system log message and, if configured, an SNMP trap
indicating that the RADIUS server timed out. The E Series RADIUS client will not
issue another system log message or SNMP trap regarding this RADIUS server
until the deadtime expires, if configured, or for 3 minutes if deadtime is not
configured.
■The E Series RADIUS client then sends the RADIUS request to the second
configured RADIUS server. If the second RADIUS server fails to respond to the
RADIUS request, the E Series RADIUS client again issues a system log message
and, if configured, an SNMP trap indicating that the RADIUS server timed out.
■This process continues until either the E Series RADIUS client receives a valid
response from a RADIUS server or the list of configured RADIUS servers is
exhausted. If the list of RADIUS servers is exhausted, the E Series RADIUS client
issues a system log message and, if configured, an SNMP trap indicating that all
RADIUS servers have timed out.
If the E Series RADIUS client receives a RADIUS response from a “dead” RADIUS
server during the deadtime period, the RADIUS server is restored to active status.
If the router receives a valid RADIUS response to an outstanding RADIUS request,
the E Series client issues a system log message and, if configured, an SNMP trap
indicating that the RADIUS server is now available.
36■Configuring RADIUS Authentication and Accounting Servers
Page 77
System Log Messages
You do not need to configure system log messages. The router automatically sends
them when individual servers do not respond to RADIUS requests and when all
servers on a VR fail to respond to requests. The following are the formats of the
warning level system log messages:
RADIUS [ authentication | accounting ] server serverAddress unavailable in VR
RADIUS no [ authentication | accounting ] servers responding in VR virtualRouterName
RADIUS [ authentication | accounting ] server serverAddress available in VR
Configuring SNMP Traps
This section describes how to configure the router to send traps to SNMP when
RADIUS servers fail to respond to messages, and how to configure SNMP to receive
the traps.
Chapter 1: Configuring Remote Access
virtualRouterName [; trying nextServerAddress]
virtualRouterName
To set up the router to send traps:
1.(Optional) Enable SNMP traps when a particular RADIUS authentication server
host1(config)#snmp-server community admin view everything rw
host1(config)#snmp-server community private view user rw
host1(config)#snmp-server community public view everything ro
2.Specify the interface whose IP address is the source address for SNMP traps.
The AAA local authentication server enables the E Series router to provide local PAP
and CHAP user authentication for subscribers. The router also provides limited
authorization, using the IP address, IP address pool, and operational virtual router
parameters. When a subscriber logs on to the E Series router that is using local
authentication, the subscriber is authenticated against user entries in a local user
database; the optional parameters are assigned to subscribers after the subscriber
is authenticated.
Creating the Local Authentication Environment
To create your local authentication environment:
1.Create local user databases—Create the default database or a named database.
2.Add entries to local user databases—Add user entries to the database. A database
can contain information for multiple users.
3.Assign a local user database to the virtual router—Specify the database that the
virtual router will use to authenticate subscribers.
4.Enable local authentication on the virtual router—Specify the local method as
an AAA authentication method used by the virtual router.
Creating Local User Databases
When a subscriber connects to an E Series router that is using local authentication,
the local authentication server uses the entries in the local user database selected by
the virtual router to authenticate the subscriber.
A local authentication server can have multiple local user databases, and each
database can have entries for multiple subscribers. The default local user database,
if it exists, is used for local authentication by default. The E Series router supports a
maximum of 100 user entries. A maximum of 100 databases can be configured.
To create a local user database, use the aaa local database command and the name
of the database; use the name default to create the default local user database:
host1(config)#aaa local database westLocal40
Adding User Entries to Local User Databases
The local authentication server uses the information in a local user database to
authenticate a subscriber. A local user database can contain information for multiple
users.
The E Series router provides two commands for adding entries to local user databases:
the username command and the aaa local username command. You can specify
the following parameters:
40■Configuring Local Authentication Servers
Page 81
Chapter 1: Configuring Remote Access
■Username—Name associated with the subscriber.
■Passwords and secrets—Single words that can be encrypted or unencrypted.
Passwords use two-way encryption, and secrets use one-way encryption. Both
passwords and secrets can be used with PAP authentication; however, only
passwords can be used with CHAP authentication.
■IP address—The IP address to assign to the subscriber (aaa local username
command only).
■IP address pool—The IP address pool used to assign the subscriber’s IP address
(aaa local username command only).
■Operational virtual router—The virtual router to which the subscriber is assigned.
This parameter is applicable only if the subscriber is authenticated by the default
virtual router (aaa local username command only).
Using the username Command
The username command is similar to the command used by some third-party
vendors. The command can be used to add entries in the default local user database;
it is not supported for named local user databases. The IP address, IP address pool,
and operational virtual router parameters are not supported in the username
command. However, after the user is added to the default local user database, you
can use the aaa local username command with a database name default to enter
Local User Configuration mode and add the additional parameters.
NOTE: If the default local user database does not exist, the username command
creates this database and adds the user entry to the database.
To add a subscriber and password or secret to the default local user database,
complete the following step:
Assigning a Local User Database to a Virtual Router
Use the procedure in this section to assign a local user database to a virtual router.
The virtual router uses the database for local authentication when the subscriber
connects to the E Series router. Use the following commands in Global Configuration
mode:
NOTE: If you do not specify a local user database, the virtual router selects the default
database by default. This applies to all virtual routers.
1.Specify the virtual router name.
host1(config)# virtual-router cleveland
2.Specify the database to use for authentication on this virtual router.
host1:cleveland(config)# aaa local select database westLocal40
Enabling Local Authentication on the Virtual Router
On the E Series router, RADIUS is the default AAA authentication method for PPP
subscribers. Use the commands in this section to specify that the local authentication
method is used.
To enable local authentication on the default router, use the following command:
host1(config)# aaa authentication ppp default local
To enable local authentication on a specific virtual router, first select the virtual router:
host1(config)# virtual-router cleveland
host1:cleveland(config)# aaa authentication ppp default local
42■Configuring Local Authentication Servers
Page 83
Configuration Commands
Use the following commands to configure the local authentication server.
aaa authentication default
■Use to specify that the local authentication method is used to authenticate PPP
NOTE: You can specify multiple authentication methods; for example, aaa
authentication ppp default local radius. If, during local authentication, the matching
user entry is not found in a populated database or if it is found and rejected, the
authentication procedure terminates. However, if the specified local user database
is empty or if it does not exist, the authentication process uses the next authentication
method specified (RADIUS in this case).
Chapter 1: Configuring Remote Access
subscribers on the default virtual router or on the selected virtual router.
aaa local database
aaa local select database
■Example
host1(config)#aaa authentication ppp default local radius
■Use the no version to restore the default authentication method of radius.
■See aaa authentication default
■Use to create a local user database.
■Use the database name default to specify the default local user database, or
enter a name for the specific local user database.
■Example
host1(config)#aaa local database westLocal40
■Use the no version to delete the specified database and all entries in the database.
■See aaa local database
■Use to assign the local user database that the virtual router uses for local
authentication.
■Example
■Use the no version to restore the default setting, which uses the default local
user database for local authentication.
■See aaa local select database
host1(config)#virtual-router cleveland
host1:cleveland(config)#aaa local select database westLocal40
■Use to configure a user entry in the specified local user database and to enter
Local User Configuration mode.
■The username must be unique within a particular database; however, the same
username can be used in different databases.
■Use the database name default to configure the username in the default local
user database.
NOTE: The router supports usernames up to 64 characters long; however, PAP and
CHAP support is limited to 31-character usernames.
■Example
host1(config)#aaa local username cksmith database westLocal40
ip address
ip address-pool
■Use the no version to delete the user entry from the specified local user database.
Use the database name default to delete the user entry from the default local
user database.
■See aaa local username
■Use to specify the IP address parameter for a user entry in the local user database.
The address is negotiated with the subscriber after the subscriber is authenticated.
■Example
host1(config-local-user)#ip-address 192.168.42.6
■Use the no version to delete the IP address parameter from the user entry in the
local user database.
■See ip address
■Use to specify the IP address pool parameter for a user entry in the local user
database. The address pool is used to assign an IP address to the subscriber; the
address is negotiated with the subscriber after the subscriber is authenticated.
■Example
■Use the no version to delete the IP address pool parameter from the user entry
in the local user database.
■See ip address-pool
operational-virtual-router
44■Configuring Local Authentication Servers
host1(config-local-user)#ip-address-pool svPool2
Page 85
password
Chapter 1: Configuring Remote Access
■Use to specify the virtual router parameter for a user entry in the local user
database. The subscriber is assigned to the operational virtual router only if the
default virtual router performs the authentication.
■If authentication is performed by a non-default virtual router, then the subscriber
is assigned to the same virtual router that performs authentication, regardless
of this parameter setting.
■Use the no version to delete the operational virtual router parameter from the
user entry in the local user database.
■See operational-virtual-router
■Use to add a password to a user entry in the local user database. The password
is used to authenticate a subscriber, and is encrypted by means of a two-way
encryption algorithm.
secret
NOTE: CHAP authentication requires that passwords and secrets be stored in clear
text or use two-way encryption. Two-way encryption is not supported for the secret
command. Therefore, use the password command if you want to enable encryption
for subscribers that use CHAP authentication.
■The new password replaces any current password or secret.
■Specify one of the following encryption algorithms, followed by the password:
■0—An unencrypted password; this is the default
■8—A two-way encrypted password
■Example
host1(config-local-user)#password 0 myPassword
■Use the no version to delete the password or secret from the user entry in the
■Use to add a secret to a user entry in the local user database. The secret is used
to authenticate a subscriber, and is encrypted by means of the Message Digest
5 (MD5) encryption algorithm.
NOTE: CHAP authentication requires that passwords and secrets be stored in clear
text or use two-way encryption. Two-way encryption is not supported for the secret
command. Therefore, use the password command if you want to enable encryption
for subscribers that use CHAP authentication.
■The new secret replaces any current password or secret.
■Specify one of the following encryption algorithms, followed by the secret:
■Use the no version to delete the secret or password from the user entry in the
local user database.
■See secret
■Use to configure a user entry and optional password or secret in the default local
user database. This command creates the database if it does not already exist.
■Optionally, specify a password or secret that is assigned to the user in the default
local user database, or specify that no password is required for the particular
username.
■Specify one of the following encryption algorithms, followed by the password:
■0—An unencrypted password; this is the default
■8—A two-way encrypted password
■Specify one of the following encryption algorithms, followed by the secret:
■0—An unencrypted secret; this is the default
■5—An MD5-encrypted secret
■Use the nopassword keyword to remove the password or secret
NOTE: CHAP authentication requires that passwords and secrets be stored in clear
text or use two-way encryption. Two-way encryption is not supported for the secret
command. Therefore, use the password command if you want to enable encryption
for subscribers that use CHAP authentication.
host1(config)#aaa authentication ppp default local none
Example 2This example verifies that local authentication is configured on the router.
host1#show aaa authentication ppp default
local none
Example 3This example uses the show configuration category aaa local-authentication
command with the databases keyword to show the local user databases that are
configured on the router.
host1# show configuration category aaa local-authentication databases
! Configuration script being generated on TUE NOV 09 2004 12:50:18 UTC
! Juniper Edge Routing Switch ERX-1400
! Version: 6.1.0 (November 8, 2004 18:31)
! Copyright (c) 1999-2004 Juniper Networks, Inc. All rights reserved.
!
! Commands displayed are limited to those available at privilege level 15
!
! NOTE: This script represents only a subset of the full system configuration.
! The category displayed is: aaa local-authentication databases
!
hostname host1
aaa new-model
aaa local database default
aaa local database westfordLocal40
Example 4This example uses the local-authentication users keywords to show the configured
users and their parameters. The password for username cksmith is displayed
unencrypted because the default setting of disabled or no for the servicepassword-encryption command is used for the example. Secrets are always displayed
encrypted.
host1# show configuration category aaa local-authentication users
! Configuration script being generated on THU NOV 11 2004 13:40:41 UTC
! Juniper Edge Routing Switch ERX-1400
! Version: 6.1.0 (November 10, 2004 21:15)
! Copyright (c) 1999-2004 Juniper Networks, Inc. All rights reserved.
!
! Commands displayed are limited to those available at privilege level 15
!
! NOTE: This script represents only a subset of the full system configuration.
! The category displayed is: aaa local-authentication users
!
hostname host1
aaa new-model
aaa local username cksmith database default
password yourPassword1
operational-virtual-router boston2
ip-address-pool addressPoolA
!
aaa local username btjones database westfordLocal40
secret 5 }9s7-4N<WK2)2=)^!6~#
operational-virtual-router boston2
ip-address-pool addressPoolA
!
aaa local username maryrdavis database westfordLocal40
secret 5 E@A:nDXJJ<irb\`mF#[j
Example 5This example uses the users include-defaults keywords to show the configured users
and their parameters, including the default parameters no-ip-address and no
ip-address-pool.
host1# show configuration category aaa local-authentication users include-defaults
! Configuration script being generated on TUE NOV 09 2004 13:09:03 UTC
! Juniper Edge Routing Switch ERX-1400
! Version: 6.1.0 (November 8, 2004 18:31)
! Copyright (c) 1999-2004 Juniper Networks, Inc. All rights reserved.
!
! Commands displayed are limited to those available at privilege level 15
!
! NOTE: This script represents only a subset of the full system configuration.
! The category displayed is: aaa local-authentication users
!
hostname host1
aaa new-model
aaa local username cksmith database default
password yourPassword1
operational-virtual-router boston2
no ip-address
ip-address-pool addressPoolA
!
aaa local username btjones database westfordLocal40
secret 5 }9s7-4N<WK2)2=)^!6~#
operational-virtual-router boston2
no ip-address
ip-address-pool addressPoolA
!
aaa local username maryrdavis database westfordLocal40
secret 5 E@A:nDXJJ<irb\`mF#[j
operational-virtual-router boston1
ip-address 192.168.20.106
no ip-address-pool
Example 6This example uses the virtual-router keyword with the default specification to show
the local user database that is used by the default virtual router.
host1# show configuration category aaa local-authentication virtual-router default
! Configuration script being generated on TUE NOV 09 2004 13:09:45 UTC
! Juniper Edge Routing Switch ERX-1400
! Version: 6.1.0 (November 8, 2004 18:31)
! Copyright (c) 1999-2004 Juniper Networks, Inc. All rights reserved.
!
! Commands displayed are limited to those available at privilege level 15
!
! NOTE: This script represents only a subset of the full system configuration.
! The category displayed is: aaa local-authentication
!
virtual-router default
aaa local select database westfordLocal40
Example 7This example uses the virtual-router keyword with a named virtual router. The
include-defaults keyword shows the default configuration, including the line showing
that there is no named local user database selected.
host1# show configuration category aaa local-authentication virtual-router cleveland include-defaults
! Configuration script being generated on TUE NOV 09 2004 13:09:25 UTC
! Juniper Edge Routing Switch ERX-1400
! Version: 6.1.0 (November 8, 2004 18:31)
! Copyright (c) 1999-2004 Juniper Networks, Inc. All rights reserved.
!
! Commands displayed are limited to those available at privilege level 15
!
! NOTE: This script represents only a subset of the full system configuration.
! The category displayed is: aaa local-authentication
!
virtual-router cleveland
no aaa local select
Configuring Tunnel Subscriber Authentication
When a AAA domain map includes any tunnel configuration, users in this domain
are considered to be tunnel subscribers. By default, any such subscriber is granted
access without being authenticated by the authentication server. Access is granted
even when the user provides an invalid username and password. The tunnel
configuration for the subscriber comes from the AAA domain map.
For example, if the authentication protocol for a AAA domain map is RADIUS, AAA
grants access to subscribers from this domain immediately without sending access
requests to the configured RADIUS server. Because of this behavior, these subscribers
cannot get any additional control attributes from the authentication server. This
reduces your ability to manage the tunnel subscribers.
In this default situation, if you want the domain subscribers to be managed by the
authentication server for any control attribute, then that domain map cannot have
any tunnel configuration. Typically, this means you must configure the subscriber
individually.
You can use the tunnel-subscriber authentication command to get around this
limitation. When you enable authentication with this command, access requests for
the tunnel subscribers in the domain are sent to the configured authentication server.
When the access replies from authentication server are processed, various user
attributes from the server can be applied to the subscribers.
When the authentication server returns tunnel attributes, these returned values take
precedence over the corresponding local tunnel configuration values in the AAA
domain map. If the server does not return any tunnel attributes, then the tunnel
subscriber’s tunnel settings are configured according to the domain map’s tunnel
settings.
If the authentication server returns a redirect VSA and the corresponding AAA domain
map has local tunnel configurations, the VSA is ignored. Access is denied to the user
when the authentication server rejects the access request.
50■Configuring Tunnel Subscriber Authentication
Page 91
Chapter 1: Configuring Remote Access
The tunnel-subscriber authentication command has no effect on subscribers in a
domain with no tunnel configuration. When a AAA domain map has no tunnel
configuration, subscribers in the domain are authenticated by the authentication
server. If the server grants access, then the subscribers get their tunnel settings only
from the authentication server.
By default, tunnel subscribers in the domain are granted access with no external
authentication. Use the enable keyword to enable authentication. Use the disable
keyword to restore disable user authentication.
To configure authentication of tunnel subscribers within a AAA domain by an external
authentication server.
■Mapping a User Domain Name to a Virtual Router on page 8
Configuring Name Server Addresses
You can assign IP or IPv6 addresses for DNS and IP addresses for WINS name servers.
During setup negotiations between the router and remote PC clients using PPP
(Internet Protocol Control Protocol [IPCP] specifically), the remote client may request
the DNS and WINS server IP addresses. If the IP addresses passed to the router by
the remote PC client are different from the ones configured on your router, the router
returns the values that you configured as the correct values to the remote PC client.
This behavior is controlled by the ppp peer dns and ppp peer wins interface
commands.
If a PPP client request contains address values of 0.0.0.0 for the name servers, the
router considers that the remote PC client is not configured and returns the configured
values as the correct values to the remote PC client.
The DNS and WINS addresses are considered as part of the PPP user information.
These addresses are provided to the PPP client as part of the IPCP negotiations
between PPP peers. For details, see RFC 1877—PPP Internet Protocol Control Protocol
Extensions for Name Server Addresses (December 1995).
NOTE: All name server address parameters are defined in the context of a virtual
router.
Configuration Tasks
This section contains procedures for configuring the DNS and WINS primary and
secondary name server addresses.
The local address server allocates IP addresses from a pool of addresses stored locally
on the router. You can optionally configure shared local address pools to obtain
addresses from a DHCP local address pool that is in the same virtual router. Addresses
are provided automatically to client sessions requiring an IP address from a virtual
router that is configured to use a local address pool.
A local address server is defined in the context of a virtual router. You create a local
address server when you configure the first local pool. Local address servers exist
as long as the virtual router exists or until you remove them by deleting all configured
pools.
Figure 1 on page 54 illustrates the local address pool hierarchy. Multiple local address
server instances, one per virtual router. can exist. Each local address server can have
one or more local address pools. Each pool can contain a number of IP addresses
that are available for allocation and used by clients, such as PPP sessions.
Figure 1: Local Address Pool Hierarchy
Local Address Pool Ranges
As shown in Figure 1 on page 54, each local address pool is named and contains
ranges of sequentially ordered IP addresses. These addresses are allocated when the
AAA server makes a request for an IP address.
If a local address pool range is exhausted, the next range of addresses is used. If all
pool ranges are exhausted, you can configure a new range to extend or supplement
the existing range of addresses, or you can create a new pool. The newly created
pool range is then used for future address allocation. If addresses allocated from the
first pool range are released, then subsequent requests for addresses are taken from
the first pool range.
Addresses are assigned sequentially from a range within a pool. If a range has no
addresses available, the next range within that pool is used. If a pool has no addresses
available, the next configured pool is used, unless a specific pool is indicated.
54■Configuring Local Address Servers
Page 95
Local Address Pool Aliases
An alias is an alternate name for an existing local address pool. It comprises an alias
name and a pool name.
When the AAA server requests an IP address from a specific local address pool, the
local address server first verifies whether an alias exists for the requested pool. If an
alias exists, the IP address is allocated from the pool specified by the alias. If no alias
exists, the IP address is allocated from the pool originally specified in the request.
The use of aliases simplifies management of subscribers. For example, you can use
an alias to migrate subscribers from one local address pool to another. Instead of
having to modify countless subscriber records on the AAA server, you create an alias
to make the configuration change.
Shared Local Address Pools
Chapter 1: Configuring Remote Access
Typically, the local address server allocates IP addresses from a pool of addresses
that is stored locally on the router. However, shared local address pools enable a local
address server to hand out addresses that are allocated from DHCP local server
address pools within the same virtual router. The addresses are configured and
managed within DHCP. Therefore, thresholds are not configured on the shared pool,
but are instead managed by the referenced DHCP local server pool.
A shared local address pool references one DHCP address pool. The shared local
address pool can then obtain addresses from the referenced DHCP address pool and
from any DHCP address pools that are linked to the referenced DHCP address pool.
Figure 2 on page 55 illustrates a shared local address pool environment that includes
four linked DHCP address pools. In the figure, both Shared_LAS_Pool_A and
Shared_LAS_Pool_B reference DHCP_Pool_1, and can therefore obtain addresses
from all four DHCP address pools. Shared_LAS_Pool_C references DHCP_Pool_3 and
can get addresses from DHCP_Pool_3 and DHCP_Pool_4.
Figure 2: Shared Local Address Pools
When the local address server requests an address from a shared address pool, the
address is returned from the referenced DHCP pool or a subsequent linked pool. If
no address is available, DHCP notifies the local address server and the search is
ended.
Keep the following guidelines in mind when using shared local address pools:
■The DHCP attributes do not apply to shared local address pools; for example,
the lease time for shared local address pools is infinite.
■When you delete the referenced DHCP address pool, DHCP notifies the local
address server and logs out all subscribers that are using addresses from the
deleted pool.
■When you delete a shared local address pool, the local address server logs out
the subscribers that are using addresses from the deleted pool, then notifies
DHCP and releases the addresses.
■If the chain of linked DHCP address pools is broken, no action is taken and the
existing subscribers retain their address. However, the DHCP local address pools
that are no longer part of the chain are now unable to provide any new addresses.
ExampleThis following commands create the shared address pools in Figure 2 on page 55:
host1(config)#ip local shared-pool Shared_LAS_Pool_A DHCP_Pool_1
host1(config)#ip local shared-pool Shared_LAS_Pool_B DHCP_Pool_1
host1(config)#ip local shared-pool Shared_LAS_Pool_C DHCP_Pool_3
SNMP Thresholds
An address pool has SNMP thresholds associated with it that enable the local address
server to signal SNMP traps when certain conditions exist. These thresholds include
high utilization threshold and abated utilization threshold. If a pool’s outstanding
addresses exceed the high utilization threshold and the SNMP trap signaling is enabled,
SNMP is notified. Likewise, when a pool’s utilization drops below the abated threshold
utilization threshold, SNMP is notified.
Configuring a Local Address Server
You can create, modify, and delete address pools. You can display address pool
information or status with the show ip local pool command. The following are
examples of tasks you can configure:
■Specify an addressing scheme.
host1(config)#ip address-pool local
■Map an address pool name to a range of local addresses. You can also use this
command to add additional ranges to a pool.
host1(config)#ip local pool addrpool_10 192.168.56.10 192.168.56.15
■Map a primary local address pool name to a domain name.
■(Optional) Map a backup address pool to a domain name, which is used for
address allocation if the primary local address pool is fully allocated.
56■Configuring Local Address Servers
host1(config)#aaa domain-map westford.com
host1(config-domain-map)#address-pool-name poolA
■(Optional) Map the domain name to the IPv6 local address pool, which is used
for prefix delegation. If the authentication server returns the prefix pool name
in the Framed-Ipv6-Pool attribute of the RADIUS-Accept-Request message, this
value overrides the IPv6 local pool configured using the ipv6-prefix-pool-name
command.
■Use the no version to remove the IPv6 local address pool name from the domain
map.
■See ipv6-prefix-pool-name.
Configuring DHCP Features
DHCP provides a mechanism through which computers using Transmission Control
Protocol/IP (TCP/IP) can obtain an IP address and protocol configuration parameters
automatically from a DHCP server on the network.
The E Series router provides support for the following DHCP features:
■DHCP proxy client
■DHCP relay agent
60■Configuring DHCP Features
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.