For feedback and comments:
documentation.feedback@alcatel-lucent.com

Table of Contents Previous Next Index PDF


RADIUS Attributes Reference
In This Section
This document provides an overview of all supported RADIUS Authentication, Authorization and Accounting attributes in Alcatel-Lucent’s 7750 SR OS R13.0 R4.
Topics include:
RADIUS Authentication Attributes
 
Subscriber Host Identification
Attributes related to subscriber-host configuration included in RADIUS authentication request and response.
 
Refers to the user to be authenticated in the Access-Request. The format for IPoE/PPPoE hosts depends on configuration parameters pppoe-access-method, ppp-user-name or user-name-format in the CLI context configure subscriber-mgmt authentication-policy <name>. The format for ARP-hosts is not configurable and always the host IPv4-address.The RADIUS User-Name specified in an Access-Accept or CoA is reflected in the corresponding accounting messages. The attribute is omitted in authentication/accounting via configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute no user-name.
Provided by a PPPoE CHAP user in response to the CHAP challenge. The CHAP challenge sent by the NAS to a PPPoE CHAP user is part of the CHAP authentication sequence RFC 1994, PPP Challenge Handshake Authentication Protocol (CHAP), (Challenge, Response, Success, Failure). The user generated CHAP password length is equal to the defined Limits and contains a one byte CHAP-Identifier from the user's CHAP Response followed by the CHAP Response from the user.
“Base” or “VPRN” — the ipv4 address of the system interface (configure router interface system address <address>).
The address can be overwritten with the configured source-address (configure aaa radius-server-policy <policy-name> servers source-address <ip-address>).
The physical access-circuit on the NAS which is used for the Authentication or Accounting of the user. The format of this attribute is configurable on the NAS as a fixed 32 bit value or a parameterized 32 bit value. The parameters can be a combination of outer-vlan-id(o), inner-vlan-id(i), slot number(s), MDA number(m), port number or lag-id(p), ATM VPI(v) and ATM VCI(c), fixed bit values zero (0) or one (1) but cannot exceed 32 bit. The format can be configured for following applications: configure aaa l2tp-accounting-policy <name> include-radius-attribute nas-port, configure router l2tp cisco-nas-port, configure service vprn <service-id> l2tp cisco-nas-port, configure subscriber-mgmt authentication-policy <name> include-radius-attribute nas-port, configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute nas-port.
If an identical managed route is associated with different routed subscriber hosts in the context of the same IES/VPRN service up to <max-ecmp-routes> managed routes are installed in the routing table (configured as ecmp <max-ecmp-routes> in the routing instance). Candidate ECMP Framed-Routes have identical prefix, equal lowest preference and equal lowest metric. The “lowest ip next-hop” is the tie breaker if more candidate ECMP Framed-Routes are available than the configured <max-ecmp-routes>. Other identical managed routes are shadowed (not installed in the routing table) and an event is logged. An alternative to RADIUS managed routes are managed routes via host dynamic BGP peering.
Valid RADIUS learned managed routes can be included in RADIUS accounting messages with following configuration: configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute framed-route. Associated managed routes for an instantiated routed subscriber host are included in RADIUS accounting messages independent of the state of the managed route (Installed, Shadowed or HostInactive).
Allows the NAS to send in an Access Request and/or Accounting Request information with respect to the user called. Attribute is omitted in authentication/accounting via: configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute no called-station-id.
Allows the NAS to send unique information identifying the user who requested the service. This format is driven by configuration (configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute calling-station-id <llid|mac|remote-id|sap-id|sap-string>). The LLID (logical link identifier) is the mapping from a physical to logical identification of a subscriber line and supplied by a RADIUS llid-server. The sap-string maps to configure service <service-id> subscriber-interface <ip-int-name> group-interface <ip-int-name> sap <sap-id> calling-station-id <sap-string>. A [31] Calling-Station-Id attribute value longer than the allowed maximum is treated as a setup failure. The attribute is omitted in authentication/accounting via configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute no calling-station-id.
A string (configure system name <system-name>) identifying the NAS originating the Authentication or Accounting requests and sent when nas-identifier is included for the corresponding application: configure subscriber-mgmt authentication-policy (ESM authentication), configure subscriber-mgmt radius-accounting-policy (ESM accounting), configure aaa isa-radius-policy (LSN accounting, WLAN-GW) and configure aaa l2tp-accounting-policy (L2TP accounting).
A unique identifier that represents the subscriber host or session that is authenticated. This attribute can be used as CoA or Disconnect Message key to target the host or session and is reflected in the accounting messages for this host or session.The attribute is included/excluded based on configure subscriber-mgmt authentication-policy <name> include-radius-attribute acct-session-id [host|session]. For PPPoE, either the host acct-session-id (default) or the session acct-session-id is included.
The CHAP challenge sent by the NAS to a PPPoE CHAP user as part of the chap authentication sequence RFC 1994 (Challenge, Response, Success, Failure). The generated challenge length for each new pppoe session is by default a random value between [32..64] bytes unless configured different under configure subscriber-mgmt ppp-policy <ppp-policy-name> ppp-chap-challenge-length [8..64] or configure router l2tp group <tunnel-group-name> ppp chap-challenge-length [8..64] for LNS. The CHAP challenge value is copied into the request-authenticator field of the RADIUS Access-Request message if the minimum and maximum value is configured at exact 16 (RFC 2865, Remote Authentication Dial In User Service (RADIUS), section 2.2, Interoperation with PAP and CHAP). Attribute CHAP-Password is provided by a PPPoE CHAP user in response to the [60] CHAP-challenge.
The type of the physical port of the NAS which is authenticating the user and value automatically determined from subscriber SAP encapsulation. It can be overruled by configuration. Included only if include-radius-attribute nas-port-type is added per application: configure subscriber-mgmt authentication-policy (ESM authentication), configure subscriber-mgmt radius-accounting-policy (ESM accounting), configure aaa isa-radius-policy (LSN accounting, WLAN-GW) and configure aaa l2tp-accounting-policy (L2TP accounting). Checked for correctness if returned in CoA.
The NAS-Port-Type attribute is always included when the Nas-Port-Id is also included.
A text string which identifies the physical/logical port of the NAS which is authenticating the user and/or reported for accounting. Attribute is also used in CoA and Disconnect Message (part of the user identification-key). The nas-port-id for physical ports usually contains <slot>/<mda>/<port>/<vlan|vpi>.<vlan|vci>. The physical port can have an optional prefix-string (max 8 chars) and suffix-string (max 64 chars) added for Authorization and Accounting (configure subscriber-mgmt radius-accounting-policy | authentication-policy <name> include-radius-attribute nas-port-id [prefix-string <string>] [suffix <circuit-id|remote-id>]). For logical access circuits (LNS) the nas-port-id is a fixed concatenation (delimiter #) of routing instance, tunnel-server-endpoint, tunnel-client-endpoint, local-tunnel-id, remote-tunnel-id, local-session-id, remote-session-id and call sequence number.
Included only if include-radius-attribute nas-port-id is added per application: configure subscriber-mgmt authentication-policy (ESM authentication), configure subscriber-mgmt radius-accounting-policy (ESM accounting), configure aaa isa-radius-policy (LSN accounting, WLAN-GW) and configure aaa l2tp-accounting-policy (L2TP accounting). For a capture-sap, the nas-port-id attribute is always included in authentication requests.
The name of one address pool or the name of a primary and secondary address pool separated with a one character configurable delimiter (configure router/service vprn <service-id> dhcp local-dhcp-server <server-name> use-pool-from-client delimiter <delimiter>) that should be used to assign an address for the user and maps to either:
1) dhcpv4 option [82] vendor-specific-option [9] sub-option [13] dhcpPool if option is enabled on the node (configure service ies/vprn <service-id> subscriber-interface <ip-int-name> group-interface <ip-int-name> dhcp option vendor-specific-option pool-name) or
2) used directly as pool-name in the local configured dhcp server when local-address-assignment is used and client-application is ppp-v4 (configure service ies/vprn <service-id> subscriber-interface ip-int-name group-interface ip-int-name local-address-assignment). Alternative to [26-2352-36] Ip-Address-Pool-Name and [26-4874-2] ERX-Address-Pool-Name. Framed-Pool names longer than the allowed maximum are treated as host setup failures. Simultaneous returned attributes [88] Framed-Pool and [8] Framed-IP-Address are also handled as host setup failures.
“Base” or “VPRN” — The ipv6 address of the system interface (configure router interface system ipv6 address <ipv6-address>).
The address can be overwritten with the configured ipv6-source-address (configure aaa radius-server-policy <policy-name> servers ipv6-source-address <ipv6-address>).
Routing information (ipv6 managed route) to be configured on the NAS for a v6 wan host (IPoE or PPPoE) that operates as a router. The functionality is comparable with offering multiple PD prefixes for a single host. The route included in the Framed-IPv6-Route attribute is accepted as a managed route only if it's next-hop is a wan-host (DHCPv6 IA-NA or SLAAC) or if the next-hop address equals ::. As a consequence, Framed-IPv6-Routes with explicit configured gateway prefix of a pd-host (DHCPv6 IA-PD) will not be installed. A Framed-Route attribute is also ignored if the SAP does not have anti-spoof configured to nh-mac (the host will be installed as a standalone host without managed route). Number of Routes above Limits are silently ignored. Optionally, a metric, tag and/or protocol preference can be specified for the managed route. If the metrics are not specified or specified in a wrong format or specified with out of range values then default values are used for all metrics: metric=0, no tag and preference=0. If an identical managed route is associated with different routed subscriber hosts in the context of the same IES/VPRN service up to <max-ecmp-routes> managed routes are installed in the routing table (configured as ecmp <max-ecmp-routes> in the routing instance). Candidate ECMP Framed-IPv6-Routes have identical prefix, equal lowest preference and equal lowest metric. “lowest ip next-hop” is the tie breaker if more candidate ECMP Framed-IPv6-Routes are available than the configured <max-ecmp-routes>. Other identical managed routes are shadowed (not installed in the routing table) and an event is logged. Valid RADIUS learned managed routes can be included in RADIUS accounting messages with following configuration: configure subscriber-mgmt radius-accounting-policy name include-radius-attribute framed-ipv6-route. Associated managed routes for an instantiated routed subscriber host are included in RADIUS accounting messages independent of the state of the managed route (Installed, Shadowed or HostInactive).
Attribute that carries the Prefix (ipv6-prefix/prefix-length) to be delegated via DHCPv6 (IA-PD) for the LAN side of the user (IPoE, PPPoE). Maps to DHCPv6 option IA-PD [25] sub-option IA-Prefix [26] Prefix. An exact Delegated-prefix-Length [DPL] match with configure service <service-id> subscriber-interface <ip-int-name> ipv6 delegated-prefix-length [48..64] is required with the received attribute prefix-length unless a variable DPL is configured (configure service <service-id> subscriber-interface <ip-int-name> ipv6 delegated-prefix-length variable). In the latter case multiple hosts for the same group-interface having different prefix-length [48..64] per host are supported. Simultaneous returned attributes [123] Delegated-IPv6-Prefix and [26-6527-131] Alc-Delegated-IPv6-Pool are handled as host setup failures. Attribute is also used in CoA and Disconnect Message (part of the ESM or AA user identification-key). Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no delegated-ipv6-prefix.
A IPv4 address of the secondary DNS server for this subscribers connection and maps to 'PPPoE IPCP option 131 Secondary DNS Server address or DHCPv4 option 6 Domain Server. Is an alternative for 26-4874-5 ERX-Secondary-Dns or 26-6527-10 Alc-Secondary-Dns.
The name of an assigned address pool that should be used to assign an address for the user and maps to dhcpv4 option[82] vendor-specific-option [9] sub-option [13] dhcpPool if option is enabled on the node (configure service <service-id> subscriber-interface <ip-int-name> group-interface <ip-int-name> dhcp option vendor-specific-option pool-name). Alternative to [88] Pool-Name and [26-4874-2] ERX-Address-Pool-Name. Framed-Pool names longer than the allowed maximum are treated as host setup failures. Simultaneous returned attributes Pool-Names [8] and Framed-IP-Address are also handled as host setup failures.
The subscriber's operator-configured minimum upstream data rate (coded in bits per second) and maps to values received during PPPoE discovery (tag 0x0105) or DHCP (opt-82). Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy 7x50_PRD_Multicast_MVPN_sender_receiver_only_v0.2.doc include-radius-attribute access-loop-options.
The last mile encapsulation used by the subscriber on the DSL access loop and maps to values received during PPPoE discovery Tags (tag 0x0105) or DHCP Tags (opt-82). Attribute is included/excluded in RADIUS/Accounting-Request based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. Last mile encapsulation information can be used to adjust automatically the egress aggregate rate for this subscriber. Pre-configured encapsulation types are used if PPP/IPoE access loop information (tags) is not available (configure subscriber-mgmt sub-profile <subscriber-profile-name> egress encap-offset <type> or configure subscriber-mgmt local-user-db <local-user-db-name> ppp host access-loop encap-offset <type>). [26-6527-133] Alc-Access-Loop-Encap-Offset when returned in Access-Accept is taken into account (overrules received tags and pre-configured encapsulation types) for ALE adjust (last mile aware shaping) but is not reflected in access-loop-options send to RADIUS. Alc-Access-Loop-Encap from ANCP are currently not taken into account for ALE adjust.
The name of an assigned address pool that should be used to assign an address for the user and maps to dhcpv4 option[82] vendor-specific-option [9] sub-option [13] dhcpPool if option is enabled on the node (configure service <service-id> subscriber-interface <ip-int-name> group-interface <ip-int-name> dhcp option vendor-specific-option pool-name). Alternative to [88] Pool-Name and [26-2352-36] Ip-Address-Pool-Name. Framed-Pool names longer than the allowed maximum are treated as host setup failures. Simultaneous returned attributes Pool-Names [8] and Framed-IP-Address are also handled as host setup failures.
The subscriber profile is a template which contains settings (accounting, igmp, HQoS,...) which are applicable to all hosts belonging to the same subscriber were [26-6527-12] Alc-Subsc-Prof-Str is the string that maps (configure subscriber-mgmt sub-ident-policy sub-profile-map) to such an subscriber profile (configure subscriber-mgmt sub-profile <subscriber-profile-name>). Strings longer than the allowed maximum are treated as setup failures. Unreferenced strings (string does not map to a policy) are silently ignored and a fallback to pre-configured defaults is done. Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no sub-profile.
The SLA profile is a template which contains settings (filter, QoS, host-limit...) which are applicable to individual hosts were [26-6527-13] Alc-SLA-Prof-Str is the string that maps (configure subscriber-mgmt sub-ident-policy <sub-ident-policy-name> sla-profile-map) to such a sla profile (configure subscriber-mgmt sla-profile <sla-profile-name>). Strings longer than the allowed maximum are treated as setup failures. Unreferenced strings (string does not map to a policy) are silently ignored and a fallback to pre-configured defaults is done. Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no sla-profile.
MAC address from a user that requests a service and included in CoA, Authentication or Accounting (configure subscriber-mgmt authentication-policy/radius-accounting-policy include-radius-attribute mac-address).
A string representing an aggregation point (for example, Access Node) and interpreted as the intermediate destination id. Subscribers connected to the same aggregation point should get the same int-dest-id string assigned. The int-dest-id is used in mc-ring access redundancy to identify subscribers behind a ring node (configure redundancy multi-chassis peer <ip-address> mc-ring ring/l3-ring <name> ring-node <ring-node-name>). The int-dest-id can be used in QoS to shape the egress traffic of a group of subscribers to an aggregate rate using vports (configure port <port-id> ethernet access egress vport <name> host-match dest <destination-string>) or secondary shapers on HS-MDAv2 (configure port <port-id> ethernet egress exp-secondary-shaper <secondary-shaper-name>). For egress policed subscriber traffic, the inter-dest-id can be used to select the egress queue-group for forwarding (configure port <port-id> ethernet access egress queue-group <name> host-match dest <destination-string>). Strings longer than the allowed maximum are treated as setup failures.
Maps to PADI field PPPoE tags [0x0101] service-name and is sent in the Access-Request if enabled under configure subscriber-mgmt authentication-policy <name> include-radius-attribute pppoe-service-name. A PPPoE-Service-Name above the allowed maximum length is handled as a PPPOE session setup failure.
Initiated by DHCP clients via option 60 [Class-id] and reflected in Authentication. (configure subscriber-mgmt authentication-policy <name> include-radius-attribute dhcp-vendor-class-id or configure aaa isa-radius-policy <name> auth-include-attributes dhcp-vendor-class-id). DHCP option [60] Class-ID can also be used as User-name in RADIUS requests. (configure subscriber-mgmt authentication-policy <name> user-name-format dhcp-client-vendor-opts).
Application Assurance for residential, business or transit-AA subscribers is enabled through the assignment of an application profile as part of either enhanced subscriber management or static configuration. [26-6527-45] Alc-App-Prof-is is a string that maps (configure subscriber-mgmt sub-ident-policy <sub-ident-policy-name> app-profile-map) to such an application profile (configure application-assurance group <aa-group-id:partition-id> policy app-profile <app-profile-name>). This attribute is used in access-accept (to assign an application profile during esm host creation) and CoA (to change the application profile of a AA-subscriber or to create transit AA-subscriber). Strings longer than the allowed maximum are treated as setup failures. Unreferenced strings (strings not mapping to an application profile) will silently trigger a fallback to pre-configured default values if allowed. If no default value is pre-configured, the subscriber's application profile is silently disabled for esm AA-subscriber; in case of a transit AA-subscriber creation the CoA will be rejected. The change of an application profile to one configured under a different group/partition or the modification of the application profile of a static AA-subscriber is not allowed and will be treated as setup failures.
The ATM Traffic Descriptor override for a PPPoA or PPPoEoA host and refers to the pre-configured traffic description QoS profile applied on the ingress ATM Virtual Circuit (configure qos atm-td-profile <traffic-desc-profile-id>). All subscriber hosts on a given ATM VC must have same ATM traffic descriptors and this attribute is ignored if it specifies an ATM Traffic Descriptor override while it has already specified another one for another host on the same ATM Virtual Circuit. A pre-configured description profile per ATM Virtual Circuit is used when this attribute is omitted. (configure subscriber-mgmt msap-policy <msap-policy-name> atm egress/ingress traffic-desc or configure service vprn <service-id> subscriber-interface <ip-int-name> group-interface <ip-int-name> sap <sap-id> atm egress/ingress traffic-desc). A Traffic Descriptor profile above the Limit is treated as a setup failure. Unreferenced Traffic Descriptor profiles within the Limit, or a Traffic Descriptor profile for a non ATM host are silently ignored.
The ATM Traffic Descriptor override for a PPPoA or PPPoEoA host and refers to the pre-configured traffic description QoS profile applied on the egress ATM Virtual Circuit (configure qos atm-td-profile <traffic-desc-profile-id>). All subscriber hosts on a given ATM VC must have same ATM traffic descriptors and this attribute is ignored if it specifies an ATM Traffic Descriptor override while it has already specified another one for another host on the same ATM Virtual Circuit. A pre-configured description profile per ATM Virtual Circuit is used when this attribute is omitted (configure subscriber-mgmt msap-policy atm egress/ingress traffic-desc or configure service vprn <service-id> subscriber-interface <ip-int-name> group-interface <ip-int-name> sap <sap-id> atm egress/ingress traffic-desc). A Traffic Descriptor profile above the Limits is treated as a setup failure. Unreferenced Traffic Descriptor profiles within the Limits, or a Traffic Descriptor profile for a non ATM host are silently ignored.
Defines the IA-PD length information [DPL] and only applicable together with [26-6527-131] Alc-Delegated-IPv6-Pool (silently ignored if received in RADIUS Accept without Alc-Delegated-IPv6-Pool). Maps to DHCPv6 vendor-option[17] ,sub-option[3] pfx-len. The [26-6527-161] Alc-Delegated-IPv6-Prefix-Length has priority over other possible sources of DPL. (As a fixed or variable DPL under configure service ies/vprn <service-id> subscriber-interface <ip-int-name> ipv6 delegated-prefix-length or on the dhcpv6 server configure router dhcp6 local-dhcp-server <server-name pool <pool-name> delegated-prefix-length). DPL values outside the limits are treated as setup failures.
Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options.
Attribute is included/excluded based on configure subscriber-mgmt authentication-policy <name> include-radius-attribute dhcp6-options
Overrides the configured policy in the sub-profile for the subscriber: configure subscriber-mgmt sub-profile <name> upnp-policy <policy-name>.
 
 
 
 
 
Wholesale-Retail — Local Access Mode
 
The service ID of the retailer to which this subscriber host belongs. (configure service ies/vprn <retail-service-id> subscriber-interface retail-interface-id fwd-service <wholesale-service-id> fwd-subscriber-interface wholesale-interface-name>). Returning an IES service ID for an IPoEv4 host is treated as a session setup failure.
The service-id (IES/VPRN) where Managed SAP’s are created.(configure service ies/vprn <service-id>). If this attribute is omitted, use msap defaults created under ludb or capture VPLS.(configure subscriber-mgmt local-user-db <local-user-db-name> ppp/dhcp host msap-defaults service <service-id> or configure service vpls <service-id sap <sap-id> msap-defaults service <service-id>). This omitted attribute without explicit created msap-defaults is treated as a setup failure.
Managed sap policy-name used to create Managed SAPs and refers to the CLI context configure subscriber-mgmt msap-policy <msap-policy-name>). The policy contains similar parameters that would be configured for a regular subscriber SAP. If this attribute is omitted we have to option to will fall back to msap defaults created under ludb or capture VPLS. (configure subscriber-mgmt local-user-db ppp/dhcp host msap-defaults policy <msap-policy-name> or configure service vpls sap msap-defaults policy <msap-policy-name>).This omitted attribute without explicit created msap-defaults is treated as a setup failure.
The group-interface-name where Managed SAPs are created and refers to CLI context configure service ies/vprn subscriber-interface <ip-int-name> group-interface <ip-int-name> policy <msap-policy-name>. If this attribute is omitted we have to option to will fall back to msap defaults created under ludb or capture VPLS. (configure subscriber-mgmt local-user-db <local-user-db-name> ppp/dhcp host msap-defaults group-interface <ip-int-name> or configure service <service-id> vpls sap <sap-id> msap-defaults group-interface <ip-int-name>). Strings above the Limits and an omitted attribute without explicit created msap-defaults are treated as setup failures.
 
 
 
 
 
Wholesale-Retail — L2TP Tunneled Access Mode
 
The dotted-decimal IP address of the initiator end of the tunnel. Pre-configured values are used when attribute is omitted (configure router/service vprn <service-id> l2tp local-address). If omitted in Access Accept on LAC and no local-address configured, then the address is taken from the interface with name system. This attribute is included on LNS in the Access-Request and Acct-Request only if the CLI RADIUS policy include-radius-attribute tunnel-server-attrs is enabled on 7x50 LNS. For L2TP Tunnel/Link Accounting this attribute is always included on LAC and LNS as untagged.
The name of the tunnel group that refers to the CLI created tunnel-group-name context.(configure router <router-name> l2tp group <tunnel-group-name>. Any other RADIUS returned L2TP parameter is ignored and other required info to setup the tunnel will have to come from the CLI created context. Strings above the Limits are treated as a setup failure.
The tunnel-group-name that refers to the CLI created tunnel-group-name context.(configure router <router-name> l2tp group <tunnel-group-name>. Any other RADIUS returned L2TP parameter is ignored and other required info to setup the tunnel will have to come from the CLI created context. Strings above the Limits are treated as a setup failure.
The value existing-first specifies that the first suitable tunnel is used or set up for the first session and re-used for all subsequent sessions.
The weighted-access value specifies that the sessions are equally distributed over the available tunnels; new tunnels are set up until the maximum number is reached; the distribution aims at an equal ratio of the actual number of sessions to the maximum number of sessions. When there are multiple tunnels with an equal number of sessions (equal weight), LAC selects the first tunnel from the candidate list.
The weighted-random value enhances the weighted-access algorithm such that when there are multiple tunnels with an equal number of sessions (equal weight), LAC randomly selects a tunnel.
The period of time in seconds, that an established tunnel with no active sessions (Established-Idle) persists before being disconnected. The value with tag 0 is used as default for the tunnels where the value is not specified. Pre-configured values are used when attribute is omitted (configure router/service vprn <service-id> l2tp idle-timeout). The tunnel is not disconnected (infinite) without local configured idle-timeout or if the attribute has value -1 (16777215). Values above Limits are treated as setup failures.
Defines if tunnel authentication (challenge-response) is to be used or not. L2TP tunnel-authentication is based on RFC1994 CHAP authentication and requires the shared-secret defined in attribute [69] Tunnel-Password. The value with tag 0 is used as default for the tunnels where the value is not specified. When the attribute is omitted and no [69] Tunnel-Password attribute is specified, a pre-configured value is used (configure router/service vprn <service-id> l2tp challenge). When the attribute is omitted and a [69] Tunnel-Password attribute is specified, then the value 'always' is used. When the attribute has the value 'always', no [69] Tunnel-Password attribute is specified and no pre-configured value exists for the password, then the tunnel setup fails. Values outside the Limits are treated as a setup failure.
The ies/vprn <service-id> on LNS node where the PPP sessions are established (configure service ies/vprn <service-id> subscriber-interface <name> group-interface <name>. Pre-configured values are used if attribute is omitted (configure subscriber-mgmt local-user-db ppp host interface <ip-int-name> service-id <service-id> or configure router/service vprn <service-id> l2tp group ppp default-group-interface <ip-int-name> service-id <service-id>). Values above the Limits or unreferenced are treated as a setup failure.
Refers to the group interface <name> on LNS node only where the PPP sessions are established (configure service ies/vprn <service-id> subscriber-interface <ip-int-name> group-interface <ip-int-name>). Pre-configured values are used if the attribute is omitted (configure subscriber-mgmt local-user-db <local-user-db-name> ppp host interface <ip-int-name> service-id <service-id> or configure router/service vprn <service-id> l2tp group ppp default-group-interface <ip-int-name> service-id <service-id>). Alc-interface names longer than the maximum allowed value are treated as session setup failures.
Refers to a pre-configured L2TP tunnel accounting policy-name (configure aaa l2tp-accounting-policy <policy-name>). L2TP tunnel accounting (RFC 2867) can collect usage data based either on L2TP tunnel and/or L2TP session and send these accounting data to a RADIUS server. Different RADIUS attributes like [66] Tunnel-Client-Endpoint, [67] Tunnel-Server-Endpoint, [68] Acct-Tunnel-Connection, [82] Tunnel-Assignment-ID could be used to identify the tunnel or session. The value with tag 0 is used as default for the tunnels where the value is not specified. Pre-configured values are used when attribute is omitted (configure router/service vprn <service-id> l2tp radius-accounting-policy). Unreferenced policy-names or policy-names longer than the allowed maximum are treated as host setup failures.
 
 
 
 
 
Business Service Access
 
Routing information (IPv4 managed route) to be configured on the NAS for a host (dhcp, pppoe, arp) that operates as a router without NAT (so called routed subscriber host). The route included in the Framed-Route attribute is accepted as a managed route only if it's next-hop points to the hosts ip-address or if the next-hop address equals 0.0.0.0 or if the included route is a valid classful network in case the subnet-mask is omitted. If neither is applicable, this specific framed-route attribute is ignored and the host is instantiated without this specific managed route installed. A Framed-Route attribute is also ignored if the SAP does not have anti-spoof configured to nh-mac (the host will be installed as a standalone host without managed route). Number of routes above Limits are silently ignored. Optionally, a metric, tag and/or protocol preference can be specified for the managed route. If the metrics are not specified or specified in a wrong format or specified with out of range values then default values are used for all metrics: metric=0, no tag and preference=0. If an identical managed route is associated with different routed subscriber hosts in the context of the same IES/VPRN service up to <max-ecmp-routes> managed routes are installed in the routing table (configured as ecmp <max-ecmp-routes> in the routing instance). Candidate ECMP Framed-Routes have identical prefix, equal lowest preference and equal lowest metric. “lowest ip next-hop” is the tie breaker if more candidate ECMP Framed-Routes are available than the configured <max-ecmp-routes>. Other identical managed routes are shadowed (not installed in the routing table) and an event is logged. An alternative to RADIUS managed routes are managed routes via host dynamic BGP peering.
Valid RADIUS learned managed routes can be included in RADIUS accounting messages with following configuration: configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute framed-route. Associated managed routes for an instantiated routed subscriber host are included in RADIUS accounting messages independent of the state of the managed route (Installed, Shadowed or HostInactive).
Routing information (ipv6 managed route) to be configured on the NAS for a v6 wan host (IPoE or PPPoE) that operates as a router. The functionality is comparable with offering multiple PD prefixes for a single host. The route included in the Framed-IPv6-Route attribute is accepted as a managed route only if it's next-hop is a wan-host (DHCPv6 IA-NA or SLAAC) or if the next-hop address equals ::. As a consequence, Framed-IPv6-Routes with explicit configured gateway prefix of a pd-host (DHCPv6 IA-PD) will not be installed. A Framed-Route attribute is also ignored if the SAP does not have anti-spoof configured to nh-mac (the host will be installed as a standalone host without managed route). Number of Routes above Limits are silently ignored. Optionally, a metric, tag and/or protocol preference can be specified for the managed route. If the metrics are not specified or specified in a wrong format or specified with out of range values then default values are used for all metrics: metric=0, no tag and preference=0. If an identical managed route is associated with different routed subscriber hosts in the context of the same IES/VPRN service up to <max-ecmp-routes> managed routes are installed in the routing table (configured as ecmp <max-ecmp-routes> in the routing instance). Candidate ECMP Framed-IPv6-Routes have identical prefix, equal lowest preference and equal lowest metric. “lowest ip next-hop” is the tie breaker if more candidate ECMP Framed-IPv6-Routes are available than the configured <max-ecmp-routes>. Other identical managed routes are shadowed (not installed in the routing table) and an event is logged. Valid RADIUS learned managed routes can be included in RADIUS accounting messages with following configuration: configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute framed-ipv6-route. Associated managed routes for an instantiated routed subscriber host are included in RADIUS accounting messages independent of the state of the managed route (Installed, Shadowed or HostInactive).
Refers to a pre-configured policy under configure subscriber-mgmt bgp- peering-policy <policy-name>. Mandatory attribute for dynamic BGPv4 peering. The referenced policy contains all required parameters to setup the dynamic BGPv4 peer. Peer-AS, MD5 key, Authentication-Keychain and import/export policies can be overridden by optional RADIUS attributes. Dynamic BGPv4 peering related attributes are ignored if the session or host does not terminate in a VPRN. Host setup is successful, but without BGPv4 peering if a non existing policy-name is received or if the SAP anti-spoof type is different from nh-mac. Policy names above the maximum length result in a host setup failure.
Optional attribute for dynamic BGPv4 peering. Refers to the keychain parameters (configure system security keychain <keychain-name>) used to sign and/or authenticate the BGP protocol stream via the TCP enhanced authentication option (draft-bonica-tcp-auth). Host setup is successful but without BGPv4 peering if a non existing keychain name is received. Keychain names above the maximum length result in a host setup failure. Alternative for [26-6527-57] Alc-BGP-Auth-Key.
Optional attribute for dynamic BGPv4 peering. Refers to a pre-configured BGP export policy (configure router policy-options policy-statement <name>). The RADIUS received policy is appended to the peer (if pre-configured policies for peer are smaller than 15) or replaces the fifteenth policy (if pre-configured policies for peer are exact 15). Host setup is successful but without export policy applied if a non existing policy-name is received. Policy names above the maximum length result in a host setup failure.
Optional attribute for dynamic BGPv4 peering. Refers to a pre-configured BGP import policy (configure router policy-options policy-statement <name>). The RADIUS received policy is appended to the peer (if pre-configured policies for peer are smaller than 15) or replaces the fifteenth policy (if pre-configured policies for peer are exact 15). Host setup is successful but without import policy applied if a non existing policy-name is received. Policy names above the maximum length result in a host setup failure.
Refers to the pre-configured policy under configure subscriber-mgmt rip-policy <policy-name> and enables the BNG to listen to RIPv1/v2 messages from the host (master SRRP node only in case of a dual-homed BNG). The referenced policy contains the authentication-type and authentication-key used to establish a RIP neighbor with this host. Host setup is successful, but the RIP message from the host are ignored if a non-existing policy name is received or if the SAP anti-spoof type is different from nh-mac. Policy names above the maximum length result in a host setup failure.
Refers to a pre-configured policy under configure subscriber-mgmt bgp- peering-policy <policy-name>. Mandatory attribute for dynamic BGPv6 peering. The referenced policy contains all required parameters to setup the dynamic BGPv6 peer. Peer-AS, MD5 key, Authentication-Keychain and import/export policies can be overridden by optional RADIUS attributes. Dynamic BGPv6 peering related attributes are ignored if the session or host does not terminate in a VPRN. Host setup is successful, but without BGPv6 peering if a non-existing policy name is received or if the SAP anti-spoof type is different from nh-mac. Policy names above the maximum length result in a host setup failure.
Optional attribute for dynamic BGPv6 peering. Refers to the keychain parameters (configure system security keychain <keychain-name>) used to sign and/or authenticate the BGPv6 protocol stream via the TCP enhanced authentication option (draft-bonica-tcp-auth). Host setup is successful but without BGPv6 peering if a non existing keychain name is received. Keychain names above the maximum length result in a host setup failure. Alternative for [26-6527-201] Alc-BGP-IPv6-Auth-Key
Optional attribute for dynamic BGPv6 peering. Refers to a pre-configured BGP export policy (configure router policy-options policy-statement <name>). The RADIUS received policy is appended to the peer (if pre-configured policies for peer are smaller than 15) or replaces the fifteenth policy (if pre-configured policies for peer are exact 15). Host setup is successful but without export policy applied if a non existing policy name is received. Policy names above the maximum length result in a host setup failure.
Optional attribute for dynamic BGPv6 peering. Refers to a pre-configured BGP import policy (configure router policy-options policy-statement <name>). The RADIUS received policy is appended to the peer (if pre-configured policies for peer are smaller than 15) or replaces the fifteenth policy (if pre-configured policies for peer are exact 15). Host setup is successful but without import policy applied if a non existing policy name is received. Policy names above the maximum length result in a host setup failure.
 
 
 
Accounting On-Line Charging
 
Refers to a pre-configured category-map (configure subscriber-mgmt category-map <category-map-name>) that holds the credit-type (volume or time) and information for maximum three pre-defined categories (for example: category-names data in and out, video+data, etc.), their mappings to individual forwarding queues/policers, out-of-credit-actions and alike. The category-map-name can also be assigned via the ludb, or credit-control-policy if the attribute is omitted. This attribute is ignored if the host has no credit-control-policy defined in its sla-profile instance. Strings with length above the Limits are treated as a setup failure.
 
 
 
 
 
 
 
 
 
 
 
IP and IPv6 Filters
 
Subscriber host specific filter entry. The match criteria are automatically extended with the subscriber host ip- or ipv6-address as source (ingress) or destination (egress) ip. They represent a per host customization of a generic filter policy: only traffic to/from the subscriber host will match against these entries.
A range of entries must be reserved for subscriber host specific entries in a filter policy:
config>filter>ip-filter# sub-insert-radius
Subscriber host specific filter entries are moved if the subscriber host filter policy is changed (new SLA profile or ip filter policy override) and if the new filter policy contains enough free reserved entries.
When the subscriber host session terminates or is disconnected, then the corresponding subscriber host specific filter entries are also deleted.
The function of the attribute is identical to [26-6527-159] Alc-Ascend-Data-Filter-Host-Spec but it has a different format. The format used to specify host specific filter entries (NAS-Filter-Rule format or Alc-Ascend-Data-Filter-Host-Spec format) cannot change during the lifetime of the subscriber host.
Subscriber host specific filter entry. The match criteria is automatically extended with the subscriber host ip- or ipv6-address as source (ingress) or destination (egress) ip. They represent a per host customization of a generic filter policy: only traffic to/from the subscriber host will match against these entries. A range of entries must be reserved for subscriber host specific entries in a filter policy: config>filter>ip-filter# sub-insert-radius. Subscriber host specific filter entries are moved if the subscriber host filter policy is changed (new SLA profile or ip filter policy override) and if the new filter policy contains enough free reserved entries. When the subscriber host session terminates or is disconnected, then the corresponding subscriber host specific filter entries are also deleted. The function of the attribute is identical to [92] Nas-Filter-Rule but it has a different format. The format used to specify host-specific filter entries (NAS-Filer-Rule format or Alc-Ascend-Data-Filter-Host-Spec format) cannot change during the lifetime of the subscriber host. Mixing formats in a single RADIUS message results in a failure.
 
The format of a NAS-Filter-Rule is defined in RFC 3588, Diameter Base Protocol, section-4.3, Derived AVP Data Formats. A single filter rule is a string of format <action> <direction> <protocol> from <source> to <destination> <options> Multiple rules should be separated by a NUL (0x00). A NAS-Filter-Rule attribute may contain a partial rule, one rule, or more than one rule. Filter rules may be continued across attribute boundaries.
A RADIUS message with NAS-Filter-Rule attribute value equal to 0x00 or “ “ (a space) removes all host specific filter entries for that host.
See also IP Filter Attribute Details .
For example: Nas-Filter-Rule = permit in ip from any to 10.1.1.1/32
A string of octets with fixed field lengths (type (ipv4/ipv6), direction (ingress/egress), src-ip, dst-ip, etc. Each attribute represents a single filter entry. See IP Filter Attribute Details for a description of the format.
For example:# permit in ip from any to 10.1.1.1/32
Ascend-Data-Filter = 0x01010100000000000a01010100200000000000000000
A string of octets with fixed field length (type (ipv4/ipv6), direction (ingress/egress), src-ip, dst-ip,...). Each attribute represents a single filter entry. See IP Filter Attribute Details for a description of the format.
For example:# permit in ip from any to 10.1.1.1/32
Alc-Ascend-Data-Filter-Host-Spec = 0x01010100000000000a01010100200000000000000000
 
 
 
IP Filter Attribute Details
[92] Nas-Filter-Rule and [26-6527-158] Alc-Nas-Filter-Rule-Shared
The format for [92] Nas-Filter-Rule and [26-6527-158] Alc-Nas-Filter-Rule-Shared is a string formatted as: <action> <direction> <protocol> from <source> to <destination> <options>. Table 20 displays details on the respective fields.
 
 
 
[242] Ascend-Data-Filter and [26-6527-159] Alc-Ascend-Data-Filter-Host-Spec
The format for [242] Ascend-Data-Filter and [26-6527-159] Alc-Ascend-Data-Filter-Host-Spec is an octet string with fixed length fields. Table 21 displays details on the respective fields.
 
Subscriber Host Creation
A text string which identifies the physical/logical port of the NAS which is authenticating the user and/or reported for accounting. Attribute is also used in CoA and Disconnect Message (part of the user identification-key). The nas-port-id for physical ports usually contains <slot>/<mda>/<port>/<vlan|vpi>.<vlan|vci>. The physical port can have an optional prefix-string(max 8 chars) and suffix-string (max 64 chars) added for Accounting (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute nas-port-id [prefix-string <string>] [suffix <circuit-id|remote-id>]). For logical access circuits (LNS) the nas-port-id is a fixed concatenation (delimiter #) of routing instance, tunnel-server-endpoint, tunnel-client-endpoint, local-tunnel-id, remote-tunnel-id, local-session-id, remote-session-id and call sequence number.
MAC address from a user that requests a service and included in CoA, Authentication or Accounting (configure subscriber-mgmt authentication-policy/radius-accounting-policy include-radius-attribute mac-address)
 
 
 
 
 
 
 
Subscriber Services
 
 
 
 
 
 
 
 
 
WLAN Gateway
In this section, WLAN gateway application specific attributes are detailed, including generic Enhanced Subscriber Management (ESM) attributes that have different semantics when used in WLAN gateway scenarios.
 
config aaa isa-radius-policy name nas-ip-address-origin {isa-ip | system-ip}
Used when authenticating migrant hosts. When an access-accept contains this attribute, the host will stay in migrant phase, but will have limited forwarding capabilities. All filtered (not allowed) http-traffic will be redirected to a specified portal URL. This attribute must contain the name of a redirect policy configured under subscriber-mgmt http-redirect-policy <policy-name> which will specify a set of forwarding filters.
It is also allowed to just send an empty Alc- Wlan-Portal-Redirect VSA to force a redirect with the configured policy and url.
If a one-time redirect is enabled for a distributed subscriber management host, specifies the URL it has to be redirected to. This URL overrides the configured URL under configure service ies/vprn <svc-id> subscriber-interface <subscriber-interface-name> group-interface <group-interface-name> wlan-gw vlan-tag-ranges range start <starting-vlan> end <ending-vlan> distributed-sub-mgmt one-time-redirect.
Specifies the name of a distributed subscriber management (DSM) ip filter configured under configure subscriber-mgmt wlan-gw distributed-sub-mgmt dsm-ip-filter <ip-filter-name>. This filter will be applied to the DSM UE. This overrides the value configured under configure service ies/vprn <svc-id> subscriber-interface <subscriber-interface-name> group-interface <group-interface-name> wlan-gw vlan-tag-ranges range start <starting-vlan> end <ending-vlan> distributed-sub-mgmt dsm-ip-filter.
Specifies the name of a distributed subscriber management (DSM) ingress policer configured under configure subscriber-mgmt wlan-gw distributed-sub-mgmt dsm-policer <policer-name>. This policer will be applied to the DSM UE. This overrides the value configured under configure service ies/vprn <svc-id> subscriber-interface <subscriber-interface-name> group-interface <group-interface-name> wlan-gw vlan-tag-ranges range start <starting-vlan> end <ending-vlan> distributed-sub-mgmt ingress-policer.
Specifies the name of a distributed subscriber management (DSM) egress policer configured under configure subscriber-mgmt wlan-gw distributed-sub-mgmt dsm-policer <policer-name>. This policer will be applied to the DSM UE. This overrides the value configured under configure service ies/vprn <svc-id> subscriber-interface <subscriber-interface-name> group-interface <group-interface-name> wlan-gw vlan-tag-ranges range start <starting-vlan> end <ending-vlan> distributed-sub-mgmt egress-policer.
 
 
 
 
 
 
Dynamic Data Services
 
 
 
 
 
 
Table 34 lists the mandatory/optional attributes in CoA messages to the control channel.
 
 
 
 
Lawful Intercept
 
Specifies the <service-id> that holds the mirror details (configure mirror mirror-dest <service-id>). Values above the Limits or unreferenced are treated as a setup failure.
Used when clearing all radius li triggered sources from a mirror destination via CoA ([26-6527-122 Alc-LI-Action = 'clear-dest-service'). The policy defined in this attribute is used to authenticate the CoA and refers to configure subscriber-mgmt authentication-policy <name>. The attribute is mandatory if the RADIUS CoA server is configured in the authentication policy (config>subscr-mgmt>auth-plcy>radius-auth-server). The attribute is ignored if the RADIUS CoA server is configured in the radius-server context of the routing instance (config>router>radius-server or config>service>vprn>radius-server). Values above the Limits or unreferenced policies are treated as a setup failure.
 
 
 
 
IPSEC
 
configure service ies/vprn <svc-id> interface <interface-name> sap <sap-id> ipsec-gw <gw-name> pre-shared-key
configure service vprn <svc-id> interface <interface-name> sap <sap-id> ipsec-tunnel <tnl-name> dynamic-keying pre-shared-key
The local gateway address of IKEv2 remote-access tunnel. The attribute can be included/excluded with configure ipsec radius-authentication-policy <policy-name> include-radius-attribute called-station-id or configure ipsec radius-accounting-policy <policy-name> include-radius-attribute called-station-id.
The peer’s address and port of IKEv2 remote-access tunnel. The format is “address:port”, for example, “10.1.1.1:1546”. he attribute can be included/excluded with configure ipsec radius-authentication-policy <policy-name> include-radius-attribute calling-station-id or configure ipsec radius-accounting-policy <policy-name> include-radius-attribute caling-station-id.
The public SAP ID of IKEv2 remote-access tunnel. The attribute can be included/excluded with configure ipsec radius-authentication-policy <policy-name> include-radius-attribute nas-port-id or configure ipsec radius-accounting-policy <policy-name> include-radius-attribute nas-port-id.
IPSec private service id, used by IKEv1/v2 remote-access tunnel, referring to the preconfigured VPRN where the IPSec tunnel terminates (configure service vprn <service-id>). A default private service is used when this attribute is omitted (configure service vprn interface sap ipsec-gw default-secure-service). If the returned service id doesn't exist/out-of limits or exists but not a VPRN service, the tunnel setup will fail.
Private IPSec interface name, used by IKEv1/v2 remote-access tunnel, refers to a preconfigured private ipsec interface the IPSec tunnel terminates (config>service>vprn>interface <int-name> tunnel). A default private interface is used when this attribute is omitted (config>service>ies>if>sap>ipsec-gw>default-secure-service <service-id> interface <ip-int-name>); the maximum length is 32 bytes; if the returned interface doesn't exist/exceed the maximum length or exists but is not a private ipsec interface, the tunnel setup will fail.
IPSec tunnel-template id, used by IKEv1/v2 remote-access tunnel, refers to a preconfigured ipsec tunnel-template (configure ipsec tunnel-template <ipsec template identifier>). A default tunnel-template is used when this attribute is omitted (configure service vprn interface sap ipsec-gw default-tunnel-template <template-id>). If the returned template does not exist or exceeds the limits, the tunnel setup will fail.
IPSec phase2 SA lifetime in seconds, used by IKEv1/v2 remote-access tunnel. A pre-configured value is used when this attribute is omitted (configure ipsec ike-policy ipsec-lifetime <ipsec-lifetime>). Values outside the Limits are treated as a tunnel setup failure.
IPSec PFS group id, used by IKEv1/v2 remote-access tunnel. The PFS group in ike-policy is used when this attribute is omitted (configure ipsec ike-policy 1 pfs dh-group <grp-id>); if the returned value is not one of the allowed value, the tunnel setup will fail.
IPSec phase2 SA Encryption Algorithm, used by IKEv1/v2 remote-access tunnel. The esp-encryption-algorithm in ipsec-transform is used when this attribute is omitted (configure ipsec ipsec-transform esp-encryption-algorithm <algo>). This attribute must be used along with Alc-IPsec-SA-Auth-Algorithm, otherwise tunnel setup will fail. Values different then the Limits are treated as a setup failure.
IPSec phase2 SA Authentication Algorithm, used by IKEv1/v2 remote-access tunnel. The esp-auth-algorithm in ipsec-transform is used when this attribute is omitted (configure ipsec ipsec-transform esp-auth-algorithm <algo>). Values different than the Limits are treated as a tunnel setup failure. This attribute must be used along with Alc-IPsec-SA-Encr-Algorithm, otherwise tunnel setup will fail.
IPSec anti-replay window size, used by IKEv1/v2 remote-access tunnel. The replay-window size in tunnel-template is used when this attribute is omitted (configure ipsec tunnel-template replay-window <size>). Values different than the Limits are treated as a tunnel setup failure
 
 
 
Application Assurance
 
Application Assurance for residential, business or transit-AA subscribers is enabled through the assignment of an application profile as part of either enhanced subscriber management or static configuration. [26-6527-45] Alc-App-Prof-is is a string that maps (configure subscriber-mgmt sub-ident-policy <sub-ident-policy-name> app-profile-map) to such an application profile (configure application-assurance group <aa-group-id:partition-id> policy app-profile <app-profile-name>). This attribute is used in access-accept (to assign an application profile during esm host creation) and CoA (to change the application profile of a AA-subscriber or to create transit AA-subscriber). Strings longer than the allowed maximum are treated as setup failures. Unreferenced strings (strings not mapping to an application profile) will silently trigger a fallback to pre-configured default values if allowed. If no default value is pre-configured, the subscriber's application profile is silently disabled for esm AA-subscriber; in case of a transit AA-subscriber creation the CoA will be rejected. The change of an application profile to one configured under a different group/partition or the modification of the application profile of a static AA-subscriber is not allowed and will be treated as setup failures.
Format charteristic=value,
 
CLI User Authentication and Authorization
 
“Base” — The ipv4 address of the system interface (configure router interface system address <address>). The address can be overwritten with the configured source-address (configure system security source-address application radius <ip-int-name|ip-address>)
“Base” — The IPv6 address of the system interface (configure router interface system ipv6 address <ipv6-address>). The address can be overwritten with the configured ipv6-source-address (configure system security source-address application6 radius <ipv6-address>)
The user profile(s) that the user has access to and refers to pre-configured user-profile-name's (configure system security profile <user-profile-name>). These pre-configured profiles hold a default-action, a match command-string and a command-action. Unreferenced profiles names are silently ignored. If the maximum number of profile strings is violated, or if a string is too long, processing the input is stopped but authorization continues and too long profile string (and all strings followed by that) are ignored. Each user can have multiple profiles and the order is important. The first user profile has highest precedence, followed by the second and so on. Note: For each authenticated RADIUS user a temporary profile with name [1]User-Name is always created (show system security profile) and executed as last profile. This temporary profile is build from the mandatory attribute [26-6527-5]Timetra-Default-Action and optional attributes [26-6527-6] Timetra-Cmd, [26-6527-7] Timetra-Action.
 
 
 
 
 
 
AAA Route Downloader
 
Maps to configure aaa route-downloader <name> base-user-name <user-name> were the base-user-name sets the prefix for the username that shall be used in access requests. The actual name used will be a concatenation of this string, a “ -” (hyphen) character and a monotonically increasing integer. Consecutive Access-Requests with incrementing User-Name are repeated until the aaa route download application receives an Access-Reject. Default is system-name.
Maps to configure aaa route-downloader <name> password <password> in the RADIUS-Access request. Default is empty string.
The RADIUS route-download application periodically sends a RADIUS Access-Request message to the RADIUS server to request that ipv4/ipv6 routes be downloaded. The RADIUS server responds with an Access-Accept message and downloads the configured ipv4/ipv6 routes. When the download operation is complete, the route-download application installs the ipv4/ipv6 routes in the routing table as black-hole routes with protocol Periodic and with fixed preference 255. A default metric (configure aaa route-downloader <name> default-metric [0..254]) is installed when the metric value is omitted in the formatted attribute. A default tag (configure aaa route-downloader <name> default-tag [0..4294967295]) is installed when the tag value is omitted in the formatted attribute. The complete RADIUS Access Accept is ignored (failed to parse route) if at least one route has the wrong format. Only the individual route is silently ignored (not seen as a process download failure) if the formatted vprn service or service-name is invalid. Routes no longer present in the download will be removed from the routing table and new routes are added, same routes are not replaced. Routes with different tags or metrics are seen as new routes. If the AAA server responds with an Access-Reject for the first username, then all routes will be removed from the routing table (implicit empty route-download table). The route-download application accepts downloaded ipv4 routes in either [22] Framed-Route or [26-1] Cisco-AVpair attribute format.
 
 
 
 
 
RADIUS Accounting Attributes
 
Enhanced Subscriber Management (ESM) Accounting
There are currently three accounting modes in Enhanced Subscriber Management accounting:
A single host can have up to two simultaneously active accounting modes.
The Acct Reporting Level column in Table 54 shows the accounting mode messages that report the attribute:
Each accounting mode has a dedicated accounting session id. The accounting session id (number format) has a fixed length format of 22 bytes and is unique.
show service id <svc-id> subscriber-hosts detail
 
Acct-Session-Id : 241AFF000000204FE9D801
show service id <svc-id> ppp session detail
show service id <svc-id> ipoe session detail
 
Acct-Session-Id : 241AFF000000214FE9D801
 
show service id <svc-id> subscriber-hosts detail
 
Acct-Q-Inst-Session-Id: 241AFF000000224FE9D801
 
The Host or Session accounting session id can be included in a RADIUS Access Request:
configure
    subscriber-mgmt
        authentication-policy <policy-name> 
            include-radius-attribute acct-session-id [host|session]
 
The accounting session ID format that appears in RADIUS accounting messages can be configured to a fixed 22 byte hexadecimal number format or a variable length description format:
configure
    subscriber-mgmt
        radius-accounting-policy <policy-name> 
            session-id-format {description|number}
 
An Acct-Multi-Session-Id is included in all RADIUS accounting messages (start/stop/interim):
The reporting of volume counters in accounting is coupled to the sending of periodic or host triggered Accounting Interim Updates messages. Volume based accounting is therefore enabled via the interim-update CLI parameter for all accounting modes and/or by the host-update CLI parameter in session accounting mode as shown in Table 51.
 
The different sets of volume accounting attributes that can be included in the Accounting Interim and Stop messages are controlled via include-radius-attribute CLI commands. Multiple volume reporting types can be enabled simultaneously:
configure
  subscriber-mgmt
    radius-accounting-policy <name>
      include-radius-attribute
        [no] detailed-acct-attributes  # 64 bit per queue/policer counters
        [no] std-acct-attributes       # 32 bit aggregate counters (v4+v6)
        [no] v6-aggregate-stats        # 32 bit aggregate counters (v6 only) 
 
 
 
 
Refers to the user to be authenticated in the Access-Request. The format for IPoE/PPPoE hosts depends on configuration parameters pppoe-access-method, ppp-user-name or user-name-format in the CLI context configure subscriber-mgmt authentication-policy <name>. The format for ARP-hosts is not configurable and always the host IPv4-address. The RADIUS User-Name specified in an Access-Accept or CoA is reflected in the corresponding accounting messages. The attribute is omitted in authentication/accounting via configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute no user-name.
“Base” or “VPRN”— The the IPv4 address of the system interface (configure router interface system address <address>).
ESM: configure aaa radius-server-policy <policy-name> servers source-address <ip- address>
DSM: configure aaa isa-radius-policy <name> nas-ip-address-origin {isa-ip|system-ip}
The physical access-circuit on the NAS which is used for the Authentication or Accounting of the user. The format of this attribute is configurable on the NAS as a fixed 32 bit value or a parameterized 32 bit value. The parameters can be a combination of outer-vlan-id(o), inner-vlan-id(i), slot number(s), MDA number(m), port number or lag-id(p), ATM VPI(v) and ATM VCI(c), fixed bit values zero (0) or one (1) but cannot exceed 32 bit. The format can be configured for following applications: configure aaa l2tp-accounting-policy <name> include-radius-attribute nas-port, configure router l2tp cisco-nas-port, configure service vprn <service-id> l2tp cisco-nas-port, configure subscriber-mgmt authentication-policy <name> include-radius-attribute nas-port, configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute nas-port.
The routing information (IPv4 managed route) to be configured on the NAS for a host (dhcp, pppoe, arp) that operates as a router without NAT (so called Routed subscriber host). Valid RADIUS learned managed routes can be included in RADIUS accounting messages with following configuration: configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute framed-route. Associated managed routes for an instantiated routed subscriber host are included in RADIUS accounting messages independent of the state of the managed route (Installed, Shadowed or HostInactive). In case of a PPP session, when a Framed-Route is available while the corresponding routed subscriber host is not yet instantiated, the managed route is in the state “notYetInstalled” and will not be included in RADIUS accounting messages.
Allows the NAS to send in an Access Request and/or Accounting Request information with respect to the user called. Attribute is omitted in authentication/accounting via: configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute no called-station-id.
Allows the NAS to send unique information identifying the user who requested the service. This format is driven by configuration (configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute calling-station-id <llid|mac|remote-id|sap-id|sap-string>). The LLID (logical link identifier) is the mapping from a physical to logical identification of a subscriber line and supplied by a RADIUS llid-server. The sap-string maps to configure service <service-id> subscriber-interface <ip-int-name> group-interface <ip-int-name> sap <sap-id> calling-station-id <sap-string>. A [31] Calling-Station-Id attribute value longer than the allowed maximum is treated as a setup failure. The attribute is omitted in authentication/accounting via configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute no calling-station-id.
A string (configure system name <system-name>) identifying the NAS originating the Authentication or Accounting requests and sent when nas-identifier is included for the corresponding application: configure subscriber-mgmt authentication-policy (ESM authentication), configure subscriber-mgmt radius-accounting-policy (ESM accounting), configure aaa isa-radius-policy (LSN accounting, WLAN-GW) and configure aaa l2tp-accounting-policy (L2TP accounting).
Indicates how many octets have been received from the user over the course of this service being provided and included when standard accounting attributes are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute std-acct-attributes). [52] Acct-Input-Gigawords indicates how many times (if greater than zero) the [42] Acct-Input-Octets counter has wrapped around 2^32.
Indicates how many octets have been send from the user over the course of this service being provided and included when standard accounting attributes are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute std-acct-attributes). [53] Acct-Output-Gigawords indicates how many times (if greater than zero) the [43] Acct-Output-Octets counter has wrapped around 2^32.
A unique identifier that represents a subscriber host, a set of subscriber hosts that belong to the same queue-instance or a set of hosts that belong to a PPPoE or IPoE session. The attribute can have a fixed 22 byte hexadecimal number format or a variable length description format (configure subscriber-mgmt radius-accounting-policy <policy-name> session-id-format {number|description}). For DSM the attribute has a fixed 10 byte hexadecimal number format with each byte separated by a hyphen.
Indicates how the user was authenticated. Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no acct-authentic.
Indicates how many packets have been received from the user over the course of this service being provided and included when standard accounting attributes are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute std-acct-attributes). There is no overflow attribute when attribute wraps around 2^32.
Indicates how many packets have been send to the user over the course of this service being provided and included when standard accounting attributes are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute std-acct-attributes). There is no overflow attribute when attribute wraps around 2^32.
The type of the physical port of the NAS which is authenticating the user and value automatically determined from subscriber SAP encapsulation. It can be overruled by configuration. Included only if include-radius-attribute nas-port-type is added per application: configure subscriber-mgmt authentication-policy (ESM authentication), configure subscriber-mgmt radius-accounting-policy (ESM accounting), configure aaa isa-radius-policy (LSN accounting, WLAN-GW) and configure aaa l2tp-accounting-policy (L2TP accounting). Checked for correctness if returned in CoA.
A text string which identifies the physical/logical port of the NAS which is authenticating the user and/or reported for accounting. Attribute is also used in CoA and Disconnect Message (part of the user identification-key). The nas-port-id for physical ports usually contains <slot>/<mda>/<port>/<vlan|vpi>.<vlan|vci>. The physical port can have an optional prefix-string (max 8 chars) and suffix-string (max 64 chars) added for Accounting (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute nas-port-id [prefix-string <string>] [suffix <circuit-id|remote-id>]). For logical access circuits (LNS) the nas-port-id is a fixed concatenation (delimiter #) of routing instance, tunnel-server-endpoint, tunnel-client-endpoint, local-tunnel-id, remote-tunnel-id, local-session-id, remote-session-id and call sequence number.
The address can be overwritten with the configured ipv6-source-address (configure aaa radius-server-policy <policy-name> servers ipv6-source-address <ipv6-address>).
Contains the IPv6 interface ID from the user. The attribute can optionally be included in Accounting messages (configure subscriber-mgmt radius-accounting-policy include-radius-attribute framed-interface-id). The Framed-Interface-Id attribute is not sent in RADIUS Authentication and silently ignored in RADIUS Accept.
The routing information (IPv6 managed route) to be configured on the NAS for a v6 wan-host (IPoE or PPPoE) that operates as a router. Valid RADIUS learned managed routes can be included in RADIUS accounting messages with following configuration: configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute framed-ipv6-route. Associated managed routes for an instantiated routed subscriber host are included in RADIUS accounting messages independent of the state of the managed route (Installed, Shadowed or HostInactive). In case of a PPP session, when a Framed-IPv6-Route is available while the corresponding routed subscriber host is not yet instantiated, the managed route is in the state “notYetInstalled” and will not be included in RADIUS accounting messages.
Attribute that carries the Prefix (ipv6-prefix/prefix-length) to be delegated via DHCPv6 (IA-PD) for the LAN side of the user (IPoE, PPPoE). Maps to DHCPv6 option IA-PD [25] sub-option IA-Prefix [26] Prefix. An exact Delegated-prefix-Length [DPL] match with configure service <service-id> subscriber-interface <ip-int-name> ipv6 delegated-prefix-length [48..64] is required with the received attribute prefix-length unless a variable DPL is configured (configure service <service-id> subscriber-interface <ip-int-name> ipv6 delegated-prefix-length variable).In the latter case we support multiple hosts for the same group-interface having different prefix-length [48..64] per host. Simultaneous returned attributes [123] Delegated-IPv6-Prefix and [26-6527-131] Alc-Delegated-IPv6-Pool are handled as host setup failures. Attribute is also used in CoA and Disconnect Message (part of the ESM or AA user identification-key). Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no delegated-ipv6-prefix.
The last mile encapsulation used by the subscriber on the DSL access loop and maps to values received during PPPoE discovery Tags (tag 0x0105) or DHCP Tags (opt-82). Attribute is included/excluded in RADIUS/Accounting-Request based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options. Last mile encapsulation information can be used to adjust automatically the egress aggregate rate for this subscriber. Pre-configured encapsulation types are used if PPP/IPoE access loop information (tags) is not available (configure subscriber-mgmt sub-profile <subscriber-profile-name> egress encap-offset <type> or configure subscriber-mgmt local-user-db <local-user-db-name> ppp host access-loop encap-offset <type>). [26-6527-133] Alc-Access-Loop-Encap-Offset when returned in Access-Accept is taken into account (overrules received tags and pre-configured encapsulation types) for ALE adjust (last mile aware shaping) but is not reflected in access-loop-options send to RADIUS. Alc-Access-Loop-Encap from ANCP are currently not taken into account for ALE adjust.
The subscriber profile is a template which contains settings (accounting, igmp, HQoS, etc.) which are applicable to all hosts belonging to the same subscriber were [26-6527-12] Alc-Subsc-Prof-Str is the string that maps (configure subscriber-mgmt sub-ident-policy sub-profile-map) to such an subscriber profile (configure subscriber-mgmt sub-profile <subscriber-profile-name>). Strings longer than the allowed maximum are treated as setup failures. Unreferenced strings (string does not map to a policy) are silently ignored and a fallback to pre-configured defaults is done. Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no sub-profile.
The SLA profile is a template which contains settings (filter, QoS, host-limit...) which are applicable to individual hosts were [26-6527-13] Alc-SLA-Prof-Str is the string that maps (configure subscriber-mgmt sub-ident-policy <sub-ident-policy-name> sla-profile-map) to such a sla profile (configure subscriber-mgmt sla-profile <sla-profile-name>). Strings longer than the allowed maximum are treated as setup failures. Unreferenced strings (string does not map to a policy) are silently ignored and a fallback to pre-configured defaults is done. Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no sla-profile.
The attribute is included when detailed queue/policer statistics VSAs are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes).
The attribute is included when detailed queue/policer statistics VSAs are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes).
The attribute is included when detailed queue/policer statistics VSAs are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes).
The attribute is included when detailed queue/policer statistics VSAs are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes).
The attribute is included when detailed queue/policer statistics VSAs are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes).
The attribute is included when detailed queue/policer statistics VSAs are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes).
The attribute is included when detailed queue/policer statistics VSAs are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes).
The attribute is included when detailed queue/policer statistics VSAs are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes).
The MAC address from a user that requests a service and included in CoA, Authentication or Accounting (configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute mac-address).
Initiated by DHCP clients via option 60 [Class-id] and reflected in Accounting. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute dhcp-vendor-class-id).
Up to eight hsmda- counter-override counters can be specified in CLI (configure qos sap-egress <policy-id> prec|dscp|ip-criteria|ipv6-criteria).
Up to eight hsmda- counter-override counters can be specified in CLI (configure qos sap-egress <policy-id> prec|dscp|ip-criteria|ipv6-criteria).
Up to eight hsmda- counter-override counters can be specified in CLI (configure qos sap-egress <policy-id> prec|dscp|ip-criteria|ipv6-criteria).
Up to eight hsmda- counter-override counters can be specified in CLI (configure qos sap-egress <policy-id> prec|dscp|ip-criteria|ipv6-criteria).
A customized record and provides the flexibility to reduce the volume of data generated, network operators can define the record that needs to be collected. This attribute is generated when configure subscriber-mgmt radius-accounting-policy <name> custom-record queue <queue-id> i-counters high-octets-discarded-count is enabled. Customized records are available for queues, not for policers.
A customized record and provides the flexibility to reduce the volume of data generated, network operators can define the record that needs to be collected. This attribute is generated when configure subscriber-mgmt radius-accounting-policy <name> custom-record queue <queue-id> i-counters low-octets-discarded-count is enabled. Customized records are available for queues, not for policers.
A customized record and provides the flexibility to reduce the volume of data generated, network operators can define the record that needs to be collected. This attribute is generated when configure subscriber-mgmt radius-accounting-policy <name> custom-record queue <queue-id> i-counters high-packets-discarded-count is enabled. Customized records are available for queues, not for policers.
A customized record and provides the flexibility to reduce the volume of data generated, network operators can define the record that needs to be collected. This attribute is generated when configure subscriber-mgmt radius-accounting-policy <name> custom-record queue <queue-id> i-counters low-packets-discarded-count is enabled. Customized records are available for queues, not for policers.
A customized record and provides the flexibility to reduce the volume of data generated, network operators can define the record that needs to be collected. This attribute is generated when configure subscriber-mgmt radius-accounting-policy <name> custom-record queue <queue-id> i-counters high-octets-offered-count is enabled. Customized records are available for queues, not for policers.
A customized record and provides the flexibility to reduce the volume of data generated, network operators can define the record that needs to be collected. This attribute is generated when configure subscriber-mgmt radius-accounting-policy <name> custom-record queue <queue-id> i-counters low-octets-offered-count is enabled. Customized records are available for queues, not for policers.
A customized record and provides the flexibility to reduce the volume of data generated, network operators can define the record that needs to be collected. This attribute is generated when configure subscriber-mgmt radius-accounting-policy <name> custom-record queue <queue-id> i-counters high-packets-offered-count is enabled. Customized records are available for queues, not for policers.
A customized record and provides the flexibility to reduce the volume of data generated, network operators can define the record that needs to be collected. This attribute is generated when configure subscriber-mgmt radius-accounting-policy <name> custom-record queue <queue-id> i-counters low-packets-offered-count is enabled. Customized records are available for queues, not for policers.
A customized record and provides the flexibility to reduce the volume of data generated, network operators can define the record that needs to be collected. This attribute is generated when configure subscriber-mgmt radius-accounting-policy <name> custom-record queue <queue-id> i-counters uncolored-octets-offered-count is enabled.Customized records are available for queues, not for policers.
A customized record and provides the flexibility to reduce the volume of data generated, network operators can define the record that needs to be collected. This attribute is generated when configure subscriber-mgmt radius-accounting-policy <name> custom-record queue <queue-id> i-counters uncolored-packets-offered-count is enabled. Customized records are available for queues, not for policers.
A customized record and provides the flexibility to reduce the volume of data generated, network operators can define the record that needs to be collected. This attribute is generated when configure subscriber-mgmt radius-accounting-policy <name> custom-record queue <queue-id> e-counters in-profile-packets-discarded-count is enabled. Customized records are available for queues, not for policers.
A customized record and provides the flexibility to reduce the volume of data generated, network operators can define the record that needs to be collected. This attribute is generated when configure subscriber-mgmt radius-accounting-policy <name> custom-record queue <queue-id> e-counters in-profile-octets-forwarded-count is enabled. Customized records are available for queues, not for policers.
A customized record and provides the flexibility to reduce the volume of data generated, network operators can define the record that needs to be collected. This attribute is generated when configure subscriber-mgmt radius-accounting-policy <name> custom-record queue <queue-id> e-counters out-profile-octets-discarded-count is enabled. Customized records are available for queues, not for policers.
Up to eight hsmda-counter-override counters can be specified in CLI (configure qos sap- egress <policy-id> prec|dscp|ip-criteria|ipv6-criteria).
Up to eight hsmda-counter-override counters can be specified in CLI (configure qos sap- egress <policy-id> prec|dscp|ip-criteria|ipv6-criteria).
Up to eight hsmda-counter-override counters can be specified in CLI (configure qos sap- egress <policy-id> prec|dscp|ip-criteria|ipv6-criteria).
Up to eight hsmda-counter-override counters can be specified in CLI (configure qos sap- egress <policy-id> prec|dscp|ip-criteria|ipv6-criteria).
Identifies what ingress counters the operator wishes to maintain for the policer and defined by configure qos sap-ingress <policy-id> policer <policer-id> stat-mode <stat-mode>. The default stat-mode is minimal and the current stats-modes are: no-stats, minimal, offered-profile-no-cir, offered-priority-no- cir, offered-profile-cir, offered-priority-cir, offered-total-cir, offered-limited- profile-cir, offered-profile-capped-cir and offered-limited-capped-cir.
For both policers and queues, the ingress stat-mode can be configured to v4-v6 at the sla-profile or sub-profile (hsmda) CLI context. For example: configure subscriber-mgmt sla-profile <sla-profile-name> ingress qos <policy-id> queue <queue-id> stat-mode v4-v6
Policer-specific counter. Indicates how many policer ingress-high-priority-forwarded-bytes have been handled for this user over the course of this service being provided. The attribute is included in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes for specific policer stat-mode only.
Policer-specific counter. Indicates how many policer ingress-low-priority-forwarded-bytes have been handled for this user over the course of this service being provided. The attribute is included in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes for specific policer stat-mode only.
Policer-specific counter. Indicates how many policer egress-high-priority-forwarded-bytes have been handled for this user over the course of this service being provided. The attribute is included in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes for specific policer stat-mode only.
Policer-specific counter. Indicates how many policer egress-low-priority-forwarded-bytes have been handled for this user over the course of this service being provided. The attribute is included in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes for specific policer stat-mode only.
Policer-specific counter. Indicates how many policer ingress-low-priority-forwarded-packets have been handled for this user over the course of this service being provided. The attribute is included in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes for specific policer stat-mode only.
Policer-specific counter. Indicates how many policer egress-high-priority-forwarded-packets have been handled for this user over the course of this service being provided. The attribute is included in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes for specific policer stat-mode only.
Policer-specific counter. ndicates how many policer egress-low-priority-forwarded-packets have been handled for this user over the course of this service being provided. The attribute is included in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes for specific policer stat-mode only.
Policer-specific counter. Indicates how many policer ingress-forwarded-bytes have been handled for this user over the course of this service being provided. The attribute is included in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes for specific policer stat-mode only.
Policer-specific counter. Indicates how many policer egress-forwarded-bytes have been handled for this user over the course of this service being provided. The attribute is included in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes for specific policer stat-mode only.
Policer-specific counter. Indicates how many policer ingress-forwarded-packets have been handled for this user over the course of this service being provided. The attribute is included in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes for specific policer stat-mode only.
Policer-specific counter. Indicates how many policer egress-forwarded-packets have been handled for this user over the course of this service being provided. The attribute is included in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute detailed-acct-attributes for specific policer stat-mode only.
Holds for the NAT user his public outside ipv4 address, his assigned outside public port range(s) and the outside routing instance. For LSN accounting, the attribute is sent when port-range-block is included under configure aaa isa-radius-policy.
The attribute is also sent for ESM subscriber accounting if NAT is enabled and if configured in configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute nat-port-range.
Identifies what egress counters the operator wishes to maintain for the policer and defined by configure qos sap-egress <policy-id> policer <policer-id> stat-mode <stat-mode>. The default stat-mode is minimal and the current stats-modes are: no-stats, minimal, offered-profile-no-cir, offered-profile-cir, offered-total-cir, offered-limited-capped-cir and offered-profile-capped-cir
For both policers and queues, the egress stat-mode can be configured to v4-v6 at the sla-profile or sub-profile (hsmda queues only) CLI context. For example: configure subscriber-mgmt sla-profile <sla-profile-name> egress qos <policy-id> queue <queue-id> stat-mode v4-v6
A reason attribute included in Acct-Interim messages to specify the reason for the interim update. Attribute is omitted in accounting via configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute no alc-acct-triggered-reason.
Attribute is included/excluded based on configure subscriber-mgmt authentication-policy/radius-accounting-policy <name> include-radius-attribute access-loop-options.
Aggregate of all ingress forwarded IPv6 packet counters for policers and queues that have stat-mode v4-v6 enabled (for example: configure subscriber-mgmt sla-profile <sla-profile-name> ingress qos <policy-id> queue|policer <id> stat-mode v4-v6).
Included when IPv6 aggregated accounting attributes are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute v6-aggregate-stats). There is no overflow attribute when counter wraps around 2^32.
Aggregate of all ingress forwarded IPv6 octet counters for policers and queues that have stat-mode v4-v6 enabled (for example: configure subscriber-mgmt sla-profile <sla-profile-name> ingress qos <policy-id> queue|policer <id> stat-mode v4-v6).
Included when IPv6 aggregated accounting attributes are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute v6-aggregate-stats).
Included when IPv6 aggregated accounting attributes are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute v6-aggregate-stats).
Aggregate of all egress forwarded IPv6 packet counters for policers and queues that have stat-mode v4-v6 enabled (for example: configure subscriber-mgmt sla-profile <sla-profile-name> egress qos <policy-id> queue|policer <id> stat-mode v4-v6).
Included when IPv6 aggregated accounting attributes are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute v6-aggregate-stats). There is no overflow attribute when counter wraps around 2^32.
Aggregate of all egress forwarded IPv6 octet counters for policers and queues that have stat-mode v4-v6 enabled (for example: configure subscriber-mgmt sla-profile <sla-profile-name> egress qos <policy-id> queue|policer <id> stat-mode v4-v6).
Included when IPv6 aggregated accounting attributes are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute v6-aggregate-stats).
Included when IPv6 aggregated accounting attributes are configured. (configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute v6-aggregate-stats).
(configure subscriber-mgmt radius-accounting-policy <name> include- radius-attribute wifi-ssid-vlan).
 
 
 
See Table 75 for a description of Accounting Triggered Reason values.
 
(*) Note on acct-on/off: The table represents the acct-on-off attributes for an accounting server configured via a radius-server-policy (configure subscriber-mgmt radius-accounting-policy <name> radius-server-policy <radius-server-policy-name> and with acct-on-off enabled. If the accounting server is configured direct under the radius-accounting-server (configure subscriber-mgmt radius-accounting-policy <name> radius-accounting-server server <server-index>, then the following attributes are not sent in acct-on/off messages: [44] Acct-Session-Id, [45] Acct-Authentic and [49] Acct-Terminate-Cause; and attribute [26-6527-12] Alc-Subsc-Prof-Str is sent.
 
Distributed Subscriber Management (DSM) Accounting
In Distributed Subscriber Management (DSM), a single accounting session per UE is started. A unique Accounting-Session-ID per UE is generated. An Acct-Multi-Session-Id is also generated but currently not used to link any accounting sessions.
Acct-Status-Type and Acct-Session-Id are always included by default. The presence of all other attributes is dictated by configuration (configure>aaa>isa-radius-policy <name>>acct-include-attributes). The attribute description and limits are the same as for Enhanced Subscriber Management (ESM) Accounting (Table 52 and Table 53), Table 55 below provides an overview of the applicability of the attributes in DSM accounting messages.
Accounting On and Accounting Off messages are generated when a server is enabled or disabled in an isa-radius-policy (configure>aaa>isa-radius-policy <name> servers <id>>[no] shutdown). An accounting-On will also be generated every 5 minutes for a RADIUS server that is unresponsive.
 
 
 
 
Subscriber Service Accounting
This section specifies the attributes for RADIUS accounting on subscriber service instances. The attributes included in the subscriber service accounting messages are identical to the attributes that are included in the associated parent subscriber host accounting session (Host accounting mode for IPoE and Session accounting mode for PPPoE). Volume counters are always reported in standard attributes. Differences for attribute content and additional attributes are detailed in Table 56.
 
 
 
 
 
Large Scale NAT (LSN) Accounting
 
Refers to the user-name reported in Accounting for subscriber-aware or subscriber-unaware Large Scale NAT users. The reported format for subscriber-unaware users is LSN44@, DS-lite@ or NAT64@ followed by the users inside ipv4 or ipv6 address. The reported format and length for subscriber-aware users is configured and driven by configure router nat inside subscriber-identification and send when user-name is included under configure aaa isa-radius-policy <name>. This attribute has the same content as [26-6527-11] Alc-Subsc-ID-Str for subscriber-unaware Large Scale NAT users.
Holds information to which nat-group and nat-member the NAT user belongs. The format of this attribute is a string 00-00-00-00-<NatGroup>-<NatMember>. The command show isa nat-group holds the link between ms-isa mda, NatGroup and NatMember. Optionally sent when called-station-id is included under configure aaa isa-radius-policy <name>.
A string (configure system name <system-name>) identifying the NAS originating the Authentication or Accounting requests and sent when nas-identifier is included for the corresponding application: configure subscriber-mgmt authentication-policy (ESM authentication), configure subscriber-mgmt radius-accounting-policy (ESM accounting), configure aaa isa-radius-policy (LSN accounting, WLAN-GW) and configure aaa l2tp-accounting-policy (L2TP accounting).
This unique 16 bytes attribute has two different behaviors. If multi-session-id is not included under configure aaa isa-radius-policy <name> then multiple port-ranges for the same user are all reported with a common 16 bytes [44] Acct-Session-id for the different port-ranges and reported via start, interim and stop accounting messages and without attribute [50] Acct-Multi-Session-Id. If multi-session-id is configured under configure aaa isa-radius-policy <name> then multiple port-ranges for the same user are reported with different 16 bytes [44] Acct-Session-id via start and stop accounting messages with an additional common 16 bytes attribute [50] Acct-Multi-Session-Id. For an accounting-on and accounting-off the first 8 bytes from the 16 bytes are put to zero.
This unique 16 bytes attribute has two different behaviors. If multi-session-id is not included under configure aaa isa-radius-policy <name> then multiple port-ranges for the same user are all reported with a common 16 bytes [44] Acct-Session-id for the different port-ranges and reported via start, interim and stop accounting messages and without attribute [50] Acct-Multi-Session-Id. If multi-session-id is yes included under configure aaa isa-radius-policy <name> then multiple port-ranges for the same user are reported with different 16 bytes [44] Acct-Session-id via start and stop accounting messages with an additional common 16 bytes attribute [50] Acct-Multi-Session-Id.
The reported format is LSN44@, DS-lite@ and NAT64@ followed by the users inside ipv4 or ipv6 address and send when nat-subscriber-string is included under configure aaa isa-radius-policy <name>. This attribute has the same content as [1]User-Name for subscriber-unaware Large Scale NAT users.
Refers in the Accounting-Request to the inside VRF used for LSN subscribers using RADIUS LSN accounting (configure aaa isa-radius-policy nat acct-include-attributes inside-service-id). The outside VRF is reported via [26-6527-140] Alc-Nat-Outside-Serv-Id and both attributes are not included if instance's are Base.
Holds for the NAT user his public outside ipv4 address, his assigned outside public port range and the outside routing instance. For LSN accounting, the attribute is sent when port-range-block is included under configure aaa isa-radius-policy.
The attribute is also sent for ESM subscriber accounting if NAT is enabled and if configured in configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute nat-port-range.
Refers to the public outside service-id and send when outside-service-id is included under configure aaa isa-radius-policy and the service-id is different than the base instance.
Holds for the NAT user his public outside ipv4 address and send when outside-ip is included under configure aaa isa-radius-policy <name>. The content of this attribute is identical to the outside ipv4 address in [26-6527-121] Alc-Nat-Port-Range.
 
 
 
 
L2TP Tunnel Accounting
 
 
“Base” or “VPRN” — The ipv4 address of the system interface (configure router interface system address <address>).
The address can be overwritten with the configured source-address (configure aaa radius-server-policy <policy-name> servers source-address <ip-address>).
The physical access-circuit on the NAS which is used for the Authentication or Accounting of the user. The format of this attribute is configurable on the NAS as a fixed 32 bit value or a parameterized 32 bit value. The parameters can be a combination of outer-vlan-id(o), inner-vlan-id(i), slot number(s), MDA number(m), port number or lag-id(p), ATM VPI(v) and ATM VCI(c), fixed bit values zero (0) or one (1) but cannot exceed 32 bit. The format can be configured for following applications: configure aaa l2tp-accounting-policy <name> include-radius-attribute nas-port, configure router l2tp cisco-nas-port, configure service vprn <service-id> l2tp cisco-nas-port, configure subscriber-mgmt authentication-policy <name> include-radius-attribute nas-port, configure subscriber-mgmt radius-accounting-policy <name> include-radius-attribute nas-port.
A string (configure system name <system-name>) identifying the NAS originating the Authentication or Accounting requests and sent when nas-identifier is included for the corresponding application: configure subscriber-mgmt authentication-policy (ESM authentication), configure subscriber-mgmt radius-accounting-policy (ESM accounting), configure aaa isa-radius-policy (LSN accounting, WLAN-GW) and configure aaa l2tp-accounting-policy (L2TP accounting).
The type of the physical port of the NAS which is authenticating the user and value automatically determined from subscriber SAP encapsulation. It can be overruled by configuration. Included only if include-radius-attribute nas-port-type is added per application: configure subscriber-mgmt authentication-policy (ESM authentication), configure subscriber-mgmt radius-accounting-policy (ESM accounting), configure aaa isa-radius-policy (LSN accounting, WLAN-GW) and configure aaa l2tp-accounting-policy (L2TP accounting). Checked for correctness if returned in CoA.
The dotted-decimal IP address of the initiator end of the tunnel. Pre-configured values are used when attribute is omitted (configure router/service vprn <service-id> l2tp local-address). If omitted in Access Accept on LAC and no local-address configured, then the address is taken from the interface with name system. This attribute is included on LNS in the Access-Request and Acct-Request only if the CLI RADIUS policy include-radius-attribute tunnel-server-attrs is enabled on 7x50 LNS. For L2TP Tunnel/Link Accounting this attribute is always included on LAC and LNS as untagged.
LAC : a text string identifying the physical access circuit (slot/mda/port/outer-vlan.inner-vlan) of the user that requested the Authentication and/or Accounting. The physical port on LAC can have an optional prefix-string (max 8 chars) and suffix-string (max 64 chars) added (configure aaa l2tp-accounting-policy <policy-name> include-radius-attribute nas-port-id prefix-string <string> suffix(circuit-id|remote-id )). LNS: a text string identifying the logical access circuit of the user that requested the Authentication and/or Accounting. This logical access circuit is a fixed concatenation (delimiter #) of routing instance, tunnel-server-endpoint, tunnel-client-endpoint, local-tunnel-id, remote-tunnel-id, local-session-id, remote-session-id and call sequence number.
“Base” or “VPRN” — The ipv6 address of the system interface (configure router interface system ipv6 address <ipv6-address>).
The address can be overwritten with the configured ipv6-source-address (configure aaa radius-server-policy <policy-name> servers ipv6-source-address <ipv6-address>).
 
 
 
 
Application Assurance (AA) Accounting
 
The identifying IP Address of the NAS requesting the Accounting and maps to the ipv4 address from the system interface (configure router interface system address <ip-address>). Allows to monitor node redundancy activity switch.
A string (configure system name <system-name>) identifying the NAS originating the AA Accounting requests. It is sent in all accounting messages. Allows to monitor node redundancy activity switch.
Indicates AA Acct request type. Acct On is sent each time a RADIUS accounting policy (configure application-assurance radius-accounting-policy <rad-acct-plcy-name>) is enabled under a partition (configure application-assurance group <aa-group-id:partition-id> statistics aa-sub radius-accounting-policy <rad-acct-plcy-name>) or after a node reboot. An Acct Start is sent for each new AA-subscriber created under a partition were radius accounting is enabled. An Acct Interim will be sent every configured interval time (configure application-assurance radius-accounting-policy <rad-acct-plcy-name> interim-update-interval <minutes>) for each AA-subscriber under a partition with the radius-accounting policy applied. An Acct Stop is sent at AA-subscriber removal. An application-profile change or an Application-Service-Options [ASO] override against a subscriber will not trigger Acct Start/Stop messages and do not affect the AA RADIUS Acct session.
 
 
 
 
 
 
 
 
Dynamic Data Service accounting
This section specifies the attributes for RADIUS accounting on dynamic data service SAPs. The attributes for RADIUS accounting of the associated control channel is identical as the ESM accounting case (see section Enhanced Subscriber Management (ESM) accounting.
 
“Base” or “VPRN” — The ipv4 address of the system interface (configure router interface system address <address>).
The address can be overwritten with the configured source-address (configure aaa radius-server-policy <policy-name> servers source-address <ip-address>)
A string (configure system name <system-name>) identifying the NAS originating the Accounting requests.
“Base” or “VPRN”— The ipv6 address of the system interface (configure router interface system ipv6 address <ipv6-address>).
The address can be overwritten with the configured ipv6-source-address (configure aaa radius-server-policy <policy-name> servers ipv6-source-address <ipv6-address> )
 
 
 
 
 
 
 
CLI User Access Accounting
 
“Base” — The IPv4 address of the system interface (configure router interface system address <address>). The address can be overwritten with the configured source-address (configure system security source-address application radius <ip-int-name|ip-address>)
“Base” — The IPv6 address of the system interface (configure router interface system ipv6 address <ipv6-address>). The address can be overwritten with the configured ipv6-source-address (configure system security source-address application6 radius <ipv6-address>)
 
 
 
 
 
Accounting Terminate Causes
Table 74 specifies the different Terminate Causes generated by the SR OS in [49] Acct-Terminate-Cause attribute.
 
Accounting Triggered Reason VSA Values
Enhanced Subscriber Management (ESM) and Distributed Subscriber Management (DSM) accounting generate Accounting Interim Update messages periodically or triggered by an event. The reason for the Accounting Interim Update message is included in the [26-6527-163] Alc-Acct-Triggered-Reason attribute.
For ESM, sending of Accounting Interim Updates and inclusion of the [26-6527-163] Alc-Acct-Triggered-Reason attribute must be enabled explicitly via following configuration:
subscriber-mgmt
        radius-accounting-policy "acct-policy-1" create
            host-accounting interim-update              # maximum two accounting
            queue-instance-accounting interim-update    # modes can be enabled
            session-accounting interim-update           # simultaneaously
            include-radius-attribute
                alc-acct-triggered-reason
            exit
        exit
 
Accounting Triggered Reason specifies the different Accounting Triggered Reason values generated by SR OS in [26-6527-163] Alc-Acct-Triggered-Reason attribute.
 
ESM: configure subscriber-mgmt radius-accounting-policy name update-interval.
DSM: configure service vprn|ies svc-id subscriber-interface sub-itf group-interface grp-itf wlan-gw vlan-tag-ranges range start start end end distributed-sub-mgmt accounting-update-interval
X(2)
X(2)
X(2)
X(2)
X(2)
X(2)
X(2)
X(2)
Generated when mobility triggered accounting is enabled (configure router|service vprn <id> wlan-gw mobility-triggered-acct interim-update) and when a mobility event is detected (re-authentication, accounting start, accounting interim-update, data or Inter Access Point Protocol (IAPP)).
(1) IP address/prefix tracking: a triggered Accounting Interim Update message notifies the RADIUS accounting server of the acquisition or release of an IP address or prefix during the lifetime of a session.
 
(2) requires host-update to be configured for session-accounting mode (configure subscriber-mgmt radius-accounting-policy <name> session-accounting interim-update host-update)
 
RADIUS CoA and Disconnect Message Attributes
 
Subscriber Host Identification Attributes
Table 76 details the different attributes that can be used in a CoA and Disconnect Message to identify one or multiple subscriber host(s).
 
(1) To target a subscriber host in a retail service it is mandatory to include the [26-6527-17] Alc-Retail-Serv-Id attribute. Omitting this attribute results in a CoA NAK with [101] Error-Cause attribute value 503 (Session Context Not Found).
(2) Although a single host is identified, the CoA or Disconnect Message will apply to all hosts of a dual stack PPPoE session or IPoE session (if enabled).
(3) Maximum 32 hosts can be targeted in a single CoA or Disconnect Message. When more than 32 hosts are identified, the CoA and Disconnect Message is rejected with [101] Error-Cause attribute value 501 (Administratively Prohibited).
Typically only a single (set of) attribute(s) is used to target a host or a number of hosts: “NAS-Port-Id + IP” or “Acct-Session-Id” or “Alc-Subsc-ID-Str”. In case that both “NAS-Port-Id + IP” and “Acct-Session-Id” attributes are specified to identify subscriber hosts, only the host identified by “NAS-Port-Id + IP” will be targeted. If the identified host is not part of the hosts that would be identified by the “Acct-Session-Id” attribute, then the CoA will be NAKed with [101] Error-Cause attribute value 503 Session Context Not Found.
For example:
Change of Authorization(43) id 224 len 81 from 192.168.1.1:32772 vrid 1
    SESSION ID [44] 22 24ADFF0000003D5107AB80   # priority 2
    NAS PORT ID [87] 12 lag-1:10.300            # priority 1
    FRAMED IP ADDRESS [8] 4 172.1.2.251         # priority 1
    VSA [26] 15 Alcatel(6527)
      SLA PROF STR [13] 13 sla-profile-1
The CoA targets the host identified with the combination of [87] NAS-Port-Id and [8] Framed-IP-Address (prio 1) only if the host is also identified by [44] Acct-Session-Id (prio 2), else the CoA is NAKed.
Following attributes are accepted only if the CoA is targeted to a single host:
 
WLAN-GW migrant users Identification Attributes
Table 77 details the attribute that can be used in a CoA and Disconnect Message to target migrant users. A Disconnect Message removes any existing migrant state for the specified UE. A CoA can only be sent for a UE in portal state to trigger the creation of an ESM or DSM user. In contrast to most CoA’s this update is not incremental: the CoA must include all required authentication attributes to create the user. The applicability of attributes is the same as for an Access-Accept message in an authentication procedure.
 
Distributed Subscriber Management (DSM) UE Identification Attributes
Table 78 details the different attributes that can be used in a CoA and Disconnect Message to identify a single DSM UE.
 
 
IPSec Tunnel Identification Attributes
Table 79 details the different attributes that can be used in a Disconnect Message to identify one or multiple IKEv2 remote-access tunnel(s).
 
1. Only one of the three identification methods should be used in a Disconnect Request, otherwise the system will reject it by sending a Disconnect-NAK with [101] Error-Cause value set to 404 (Invalid Request).
2. If there are multiple tunnels having the specified IDi, then all these tunnels will be terminated.
 
 
Overview of CoA Attributes
Table 80 provides an overview of all attributes that are supported in a RADIUS Change of Authorization (CoA) message. For attribute details, refer to the other sections in this document.
 
 
[101] Error-Cause Attribute Values
Table 81 provides an overview of the [101] Error-Cause attribute values as defined in RFC 5176 and lists if they are generated in SR OS.
 
 
Table 82 lists the possible [101] Error-Cause attribute values generated in SR OS in response to a Disconnect Message targeting an IPsec tunnel.