The contents of this document are subject to revision without notice due to
continued progress in methodology, design and manufacturing. Ericsson shall
have no liability for any error or damage of any kind resulting from the use
of this document.
Trademark List
SmartEdge
is a registered trademark of Telefonaktiebolaget LM
Ericsson.
61/1543-CRA 119 1170/1 Uen L | 2012-12-04
Contents
Contents
1Overview1
1.1Authentication1
1.2Authorization and Reauthorization5
1.3Accounting5
1.4AAA Route Download Overview7
2Configuration and Operations9
2.1Configuring Global AAA9
2.2Configuring Authentication11
2.3Configuring Authorization and Reauthorization17
2.4Configuring Accounting19
2.5Performing Operation Tasks24
2.6Configuring AAA Route Download25
3Configuration Examples27
3.1Configuring Administrator Authentication27
3.2Configuring Administrator Accounting27
3.3Defining the Administrator Structured Username27
3.4Authenticating Subscribers27
3.5Reauthorizing Subscribers28
61/1543-CRA 119 1170/1 Uen L | 2012-12-04
Configuring Authentication, Authorization, and Accounting
61/1543-CRA 119 1170/1 Uen L | 2012-12-04
1Overview
This document applies to both the Ericsson SmartEdge®and SM family routers.
However, the software that applies to the SM family of systems is a subset of
the SmartEdge OS; some of the functionality described in this document may
not apply to SM family routers.
For information specific to the SM family chassis, including line cards, refer to
the SM family chassis documentation.
For specific information about the differences between the SmartEdge and SM
family routers, refer to the Technical Product Description SM Family of Systems
(part number 5/221 02-CRA 119 1170/1) in the Product Overview folder of
this Customer Product Information library.
Overview
This document provides an overview of the authentication, authorization, and
accounting (AAA) features of the Ericsson SmartEdge and SM family routers
and describes the tasks used to configure, monitor, and administer AAA. This
document also provides AAA configuration examples.
Note:In the following sections, the term controller card refers to the
Cross-Connect Route Processor (XCRP4) Controller card. The term
controller carrier card refers to the controller functions on the carrier
card in the SmartEdge100 chassis.
1.1Authentication
The following sections describe the authentication features for administrators
and subscribers.
1.1.1Administrators
By default, router configuration authenticates the administrators. You can also
authenticate administrators through database records on a RADIUS server, on
a Terminal Access Controller Access Control System Plus (TACACS+) server,
or on both the servers sequentially.
You must configure the IP address of a reachable RADIUS or TACACS+
server (or both) in the context in which the administrator is configured. You
can set a maximum limit on the number of administrator sessions that can be
simultaneously active in each context. For information about RADIUS and
TACACS+, see Configuring RADIUS and Configuring TACACS+ respectively.
61/1543-CRA 119 1170/1 Uen L | 2012-12-04
1
Configuring Authentication, Authorization, and Accounting
1.1.2Subscribers
Authentication of Point-to-Point Protocol (PPP) subscribers now includes
support for IPv4, IPv6, and dual-stack subscribers. Dual-stack subscribers run
both IPv4 and IPv6. For information on IPv6 subscribers, refer to ConfiguringIPv6 Subscriber Services. Authentication requests do not indicate if a session
is single or dual stack, but authentication responses do indicate.
An IPv6 subscriber must be authorized through AAA before PPP negotiates
connectivity and ND processes packets. If a protocol is not authorized, PPP
does not negotiate that protocol with a client, even when the PPP negotiation
process is initiated by a client.
1.1.2.1Authentication Options
By default, operating system configuration authenticates the subscriber. You
can also authenticate subscribers through database records on a RADIUS
server.
When the IP address or hostname of the RADIUS server is configured in the
operating system local context, global RADIUS authentication is performed.
That is, although the subscribers are configured in a nonlocal context, they are
authenticated through the RADIUS server configured in the local context. With
global RADIUS authentication, the RADIUS server returns the Context-Name
vendor-specific attribute (VSA), indicating the name of the particular context to
which subscribers are bound.
When the IP address or the hostname of the RADIUS server is configured in a
context other than the local context, context-specific RADIUS authentication is
performed. This means that only subscribers bound to the context in which the
RADIUS server’s IP address or hostname is configured are authenticated.
You can also configure the router to authenticate through a RADIUS server
configured in the nonlocal context, and then through a RADIUS server
configured in the local context, if the previous server is unavailable; else,
proceed to router configuration.
AAA includes the following Layer 2 Tunneling Protocol (L2TP) attribute-value
pairs (AVPs), RADIUS standard attributes, and vendor-specific attributes
(VSAs) provided by Ericsson in RADIUS Access-Request messages for L2TP
network server (LNS) subscribers that are authenticated using RADIUS:
•Tunnel-Client-Endpoint (66)
•Tunnel-Server-Endpoint (67)
•Acct-Tunnel-Connection (68)
•Tunnel-Assignment-ID (82)
•Tunnel-Client-Auth-ID (90)
2
61/1543-CRA 119 1170/1 Uen L | 2012-12-04
Overview
•Tunnel-Server-Auth-ID (91)
•Tunnel-Function (VSA 18)
•Tx-Connect-Speed (L2TP AVP 24)
•Rx-Connect-Speed (L2TP AVP 38)
If you have IPv6 PPP subscriber sessions, the following standard RADIUS
attributes and Ericsson VSAs are supported:
•NAS-IPv6-Address (95)
•Framed-Interface-Id (96)
•Framed-IPv6-Prefix (97)
•Framed-IPv6-Route (99)
•Framed-IPv6-Pool (100)
•Delegated-IPv6-Prefix (123)
•RB-IPv6-DNS (207)
•RB-IPv6-Option (208)
•Delegated-Max-Prefix (212)
For more information about RADIUS standard attributes and vendor VSAs
provided by Ericsson AB, see RADIUS Attributes. For more information about
L2TP AVPs, see Configuring L2TP.
1.1.2.2Maximum Subscriber Sessions
You can set a maximum limit on the number of subscriber sessions that can be
simultaneously active in a given context and for all configured contexts.
1.1.2.3Limited Subscriber Services
You can limit the services provided to subscribers based on volume of traffic.
You can monitor volume-based services in the upstream and downstream
directions independently, separately, or aggregated in both directions.
However, you cannot simultaneously monitor aggregated traffic and either
upstream or downstream traffic.
Volume limits are imposed by the RADIUS VSA 113 in Access-Accept and
Accounting-Request messages.
AAA supports inbound and outbound traffic counters, as well as an aggregated
counter of both incoming and outgoing traffic. If the aggregated counter
exceeds the configured value for aggregated traffic limit, AAA sends a RADIUS
61/1543-CRA 119 1170/1 Uen L | 2012-12-04
3
Configuring Authentication, Authorization, and Accounting
accounting message or tears down the subscriber session, depending on the
configured action to perform.
If the RADIUS attribute does not include the direction to which the limit is
applied, the downstream direction is assumed. If no limit is included, the traffic
volume is unlimited in both the directions and is not monitored. If a limit of 0
is configured for a direction, traffic is treated as unlimited in that direction and
is not monitored.
VSA 113 is also supported in a subscriber reauthorize Access-Accept message.
1.1.2.4Binding Order
If a subscriber circuit has been configured with a dynamic binding, using the
bind authentication command (in the circuit’s configuration mode),
AAA uses subscriber attributes in messages received during subscriber
authentication to determine which IPv4 address (and the associated interface)
to use when binding the subscriber circuit.
By default, the router considers L2TP attributes before considering RADIUS
attributes. You can reverse this order so that the IPv4 address provided in the
RADIUS record is used before one provided by L2TP.
1.1.2.5IP Address Assignment
By default, the router uses a round-robin algorithm to allocate subscriber
IPv4 addresses from the IP pool. You can also configure the router to use a
first-available algorithm.
AAA typically assigns an IPv4 address to a PPP subscriber from an IP pool
after receiving an Access-Accept packet from a RADIUS server. However,
you can configure AAA to provide an IPv4 address from an IP pool in the
Framed-IP-Address attribute in the RADIUS Access-Request packet. This IPV4
IP address is provided to the RADIUS server as a preferred address. If there
are no unassigned IPv4 addresses in the pool, the authentication request is
sent without an IPv4 address.
The RADIUS server may or may not accept the address ; Table 1 lists the
RADIUS server responses and the corresponding router actions.
Table 1RADIUS Server Response and Router Actions
RADIUS Server ResponseCorresponding Router Action
Framed-IP-Address attribute
The router assigns preferred IPv4 address.
contains 255.255.255.254,
0.0.0.0, or is missing.
Framed-IP-Address attribute
contains a different IPv4
address.
The router assigns the IPv4 address in the
Framed-IP-Address attribute and returns the
preferred IPv4 address to its pool.
461/1543-CRA 119 1170/1 Uen L | 2012-12-04
1.2Authorization and Reauthorization
The following sections describe the authorization and reauthorization features.
1.2.1CLI Commands Authorization
You can specify that commands with a matching privilege level (or higher)
require authorization through TACACS+.
1.2.2Dynamic Subscriber Reauthorization
When subscribers request new or modified services during active sessions, the
requests can be translated to changes that are applied during the active session
through dynamic subscriber reauthorization. Reauthentication occurs without
PPP renegotiation and without interrupting or dropping the active session.
Overview
1.3Accounting
The following sections describe the accounting features.
1.3.1CLI Commands Accounting
You can configure the router so that accounting messages are sent to a
TACACS+ server whenever an administrator enters commands at the specified
privilege level (or higher).
1.3.2Administrator Accounting
You can configure administrator accounting, which tracks messages for the
administrator sessions; the messages are sent to a RADIUS or TACACS+
server.
1.3.3Subscriber Accounting
You can configure subscriber accounting, which tracks messages for subscriber
sessions; the messages are sent to a RADIUS accounting server. Use the
aaa accounting subscriber command with the radius keyword to
configure subscriber accounting. When the IP address or hostname of the
RADIUS accounting server is configured in the router local context, global
authentication is performed. That is, although the subscribers are configured
in a non-local context, accounting messages for subscribers sessions in the
context are sent through the RADIUS accounting server configured in the local
context. When using global RADIUS subscriber accounting, configuring global
RADIUS subscriber authentication is required.
61/1543-CRA 119 1170/1 Uen L | 2012-12-04
5
Configuring Authentication, Authorization, and Accounting
Note:Configuring the global keyword with the aaa accounting
subscriber command allows you to enable global RADIUS
subscriber accounting even without global authentication. For more
information, refer to the Command Description document.
When the IP address or hostname of the RADIUS accounting server is
configured in a context other than the local context, context-specific accounting
is performed; accounting messages are sent only for subscribers bound to
the context in which the RADIUS accounting server IP address or hostname
is configured.
You can configure two-stage accounting where the router sends accounting
messages to a RADIUS accounting server configured in the non-local context
and to a RADIUS accounting server configured in the local context. For
example, a copy of the accounting data can be sent to both a wholesaler's
and an upstream service provider’s RADIUS accounting server, so that the
end-of-period accounting data can be reconciled and validated by both the
parties.
You can also specify the error conditions for which the router suppresses the
sending of accounting messages to a RADIUS accounting server.
1.3.4L2TP Accounting
You can configure L2TP accounting that tracks messages for L2TP tunnels or
sessions in L2TP tunnels; the messages are sent to a RADIUS accounting
server. When the IP address or hostname of the RADIUS accounting server is
configured in the router local context, global accounting is performed. When
the IP address or hostname of the RADIUS accounting server is configured in a
context other than the local context, context-specific accounting is performed.
You can also configure two-stage accounting.
The router sends just a single accounting on message when more than
one type of RADIUS accounting is enabled. For example, if you enable
both subscriber accounting and L2TP accounting, the router sends only one
accounting on message to each RADIUS accounting server, even if you
enable L2TP accounting at a later time. Similarly, the accounting off
message is not sent until you have disabled all types of RADIUS accounting.
Note:Configuring the global keyword with the aaa accounting l2tp
session command allows you to enable global RADIUS accounting
for sessions in L2TP tunnels even without global authentication. For
more information, see the aaa accounting l2tp command.
If a subscriber session cannot be tunneled to a specific L2TP network server
(LNS) or to an LNS in a group of L2TP peers, or if the router has received a
Link Control Protocol (LCP) termination request from the subscriber before the
session establishment is complete, the Acct-Session-Time attribute is set to 0.
6
61/1543-CRA 119 1170/1 Uen L | 2012-12-04
Loading...
+ 22 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.