[an error occurred while processing this directive]

Networking Software (IOS & NX-OS)

Establishing PPPoE Session Limits per NAS Port

 Feedback

Table Of Contents

Establishing PPPoE Session Limits per NAS Port

Finding Feature Information

Contents

Prerequisites for Establishing PPPoE Session Limits per NAS Port

Restrictions for Establishing PPPoE Session Limits per NAS Port

Information About Establishing PPPoE Session Limits per NAS Port

How PPPoE per-NAS-Port Session Limits Work

Relationship Between the Per-NAS-Port Session Limit and Other Types of Session Limits

Benefits of PPPoE Session Limits per NAS Port

How to Establish PPPoE Session Limits per NAS Port

Enabling Subscriber Service Switch Preauthorization

Configuring the RADIUS User Profile for PPPoE Session Limits per NAS Port

Verifying PPPoE Session Limit per NAS Port

Configuration Examples for Establishing PPPoE Session Limits per NAS Port

Configuring the LAC for per-NAS-Port Session Limits for PPPoE over ATM: Example

Configuring the LAC for per-NAS-Port Session Limits for PPPoE over VLAN: Example

Configuring the User Profile for PPPoE Session Limits per NAS Port: Example

Where to Go Next

Additional References

Related Documents

Standards

MIBs

RFCs

Technical Assistance

Feature Information for Establishing PPPoE Session Limits per NAS Port


Establishing PPPoE Session Limits per NAS Port


First Published: May 2, 2005
Last Updated: February 18, 2009

The PPPoE Session Limits per NAS Port feature enables you to limit the number of PPP over Ethernet (PPPoE) sessions on a specific permanent virtual circuit (PVC) or VLAN configured on an L2TP access concentrator (LAC). The network access server (NAS) port is either an ATM PVC or a configured VLAN ID. PPPoE per-NAS-port session limits are maintained in a RADIUS server customer profile database and are downloaded during Subscriber Service Switch (SSS) preauthorization.

Finding Feature Information

Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the "Feature Information for Establishing PPPoE Session Limits per NAS Port" section.

Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.

Contents

Prerequisites for Establishing PPPoE Session Limits per NAS Port

Restrictions for Establishing PPPoE Session Limits per NAS Port

Information About Establishing PPPoE Session Limits per NAS Port

How to Establish PPPoE Session Limits per NAS Port

Configuration Examples for Establishing PPPoE Session Limits per NAS Port

Additional References

Where to Go Next

Feature Information for Establishing PPPoE Session Limits per NAS Port

Prerequisites for Establishing PPPoE Session Limits per NAS Port

You must understand the concepts described in the "Preparing for Broadband Access Aggregation" module.

Both the LAC and the L2TP Network Server (LNS) must be running a Cisco IOS image that supports the PPPoE Session Limit Per NAS Port feature.

Protocol support for broadband access aggregation must be established using the procedures in the "Providing Protocol Support for Broadband Access Aggregation of PPPoE Sessions" module.

Restrictions for Establishing PPPoE Session Limits per NAS Port

Do not configure the PPPoE per-NAS-port session limit to zero.

PPPoE Session Limit per NAS Port does not support TACACS+.

PPPoE Session Limit per NAS Port applies only to PVCs and VLANs.

Information About Establishing PPPoE Session Limits per NAS Port

To establish PPPoE session limits per NAS port, you should understand the following concepts:

How PPPoE per-NAS-Port Session Limits Work

Relationship Between the Per-NAS-Port Session Limit and Other Types of Session Limits

Benefits of PPPoE Session Limits per NAS Port

How PPPoE per-NAS-Port Session Limits Work

The PPPoE Session Limits Per NAS Port feature limits the number of PPPoE sessions on a specific PVC or VLAN configured on an LAC. The NAS port is either an ATM PVC or a configured VLAN ID.

The PPPoE per-NAS-port session limit is maintained in a RADIUS server customer profile database. This customer profile database is connected to an LAC and is separate from the RADIUS server that the LAC and LNS use for the authentication and authorization of incoming users. See for a sample network topology. When the customer profile database receives a preauthorization request from the LAC, it sends the PPPoE per-NAS-port session limit to the LAC.

The LAC sends a preauthorization request to the customer profile database when the LAC is configured for SSS preauthorization. When the LAC receives the PPPoE per-NAS-port session limit from the customer profile database, the LAC compares the PPPoE per-NAS-port session limit with the number of sessions currently on the NAS port. The LAC then decides whether to accept or reject the current call, depending upon the configured PPPoE per NAS port-session-limit and the number of calls currently on the NAS port. PPPoE Session Limit per NAS Port Sample Topology

The customer profile database consists of a user profile for each user that is connected to the LAC. Each user profile contains the NAS-IP-Address (attribute 4) and the NAS-Port-ID (attribute 5.) When the LAC is configured for SSS preauthorization, it queries the customer profile database using the username. When a match is found in the customer profile database, the customer profile database sends the PPPoE per-NAS-port session limit in the user profile. The PPPoE per-NAS-port session limit is defined in the username as a Cisco attribute-value (AV) pair.

Relationship Between the Per-NAS-Port Session Limit and Other Types of Session Limits

You can configure types of session limits other than per-NAS-sort sessions on the LAC, including session limit per VC, per VLAN, per MAC, and a global session limit for the LAC. When PPPoE session limits for a NAS port are enabled (that is, when you have enabled SSS preauthorization on the LAC), local configurations for session limits per VC and per VLAN are overwritten by the PPPoE per-NAS-port session limit downloaded from the customer profile database. Configured session limits per VC and per VLAN serve as backups in case of a download failure of the PPPoE per-NAS-port session limit. Global session limits and per-MAC session limits, if configured on the router, will take effect as other means of limiting PPPoE sessions.

Benefits of PPPoE Session Limits per NAS Port

PPPoE session limits per NAS port provides flexibility and simplifies router configuration by allowing you to download the per-VC and per-VLAN session limits from a RADIUS server in addition to being able to configure them on the router.

How to Establish PPPoE Session Limits per NAS Port

This section contains the following procedures:

Enabling Subscriber Service Switch Preauthorization (required)

Configuring the RADIUS User Profile for PPPoE Session Limits per NAS Port (required)

Verifying PPPoE Session Limit per NAS Port (optional)

Enabling Subscriber Service Switch Preauthorization

When SSS preauthorization is enabled on an LAC, local configurations for session limit per VC and per VLAN are overwritten by the per-NAS-port session limit downloaded from the server. Perform this task to enable SSS preauthorization:

SUMMARY STEPS

1. enable

2. configure terminal

3. subscriber access pppoe pre-authorize nas-port-id [aaa-method-list]

4. exit

DETAILED STEPS

 
Command or Action
Purpose

Step 1 

enable

Example:

Router> enable

Enables privileged EXEC mode.

Enter your password if prompted.

Step 2 

configure terminal

Example:

Router# configure terminal

Enters global configuration mode.

Step 3 

subscriber access pppoe pre-authorize nas-port-id [aaa-method-list]

Example:

Router(config)# subscriber access pppoe pre-authorize nas-port-id mlist-llid


Enables SSS preauthorization.

aaa-method-list—Name of an authentication, authorization and accounting (AAA) list configured on the LAC.

Note During SSS preauthorization, per-NAS-port session limits are downloaded to the LAC.

Step 4 

exit

Example:

Router(config)# exit

Exits global configuration mode.

Configuring the RADIUS User Profile for PPPoE Session Limits per NAS Port

Perform the following steps to enable per-NAS-port PPPoE session limits in a RADIUS user profile for the customer profile database. Refer to the Cisco IOS Security Configuration Guide for information about creating a RADIUS user profile.

DETAILED STEPS

 
Command or Action
Purpose

Step 1 

User-Name = nas-port:ip-address:slot/subslot/port/vpi.vci

Configures the NAS port username for a PPPoE over ATM NAS port user.

ip-address—IP address of the LAC interface that connects to the customer profile database.

slot/subslot/port—ATM interface.

vpi.vci—Virtual path identifier (VPI) and virtual channel identifier (VCI) values for the PVC.

Step 2 

User-Name = nas-port:ip-address:slot/subslot/port/vlan-id

Configures the NAS port username for a PPPoE over ATM NAS port user.

ip-address—IP address of the LAC interface that connects to the customer profile database.

slot/subslot/port—ATM interface.

vpi.vci—Virtual path identifier (VPI) and virtual channel identifier (VCI) values for the PVC.

Step 3 

User-Name = nas-port:ip-address:slot/subslot/port/vlan-id


Configures the NAS port username for a PPPoE over VLAN NAS port user.

ip-address—IP address of the LAC interface that connects to the customer profile database.

slot/subslot/port—ATM interface.

vlan-id—VLAN identifier.

Step 4 

Password = "cisco"


Sets the fixed password.

Step 5 

cisco-avpair = "pppoe:session-limit-session-limit-per-NAS-port"

Adds the PPPoE session limit per NAS port cisco AVpair to the user profile.

session-limit-per-NAS-port—per-NAS-port PPPoE session limit.

Verifying PPPoE Session Limit per NAS Port

Perform this task to verify per-NAS-port session limit performance.

SUMMARY STEPS

1. enable

2. debug aaa authorization

3. debug radius [brief | hex]

DETAILED STEPS

 
Command or Action
Purpose

Step 1 

enable

Example:

Router> enable

Enables privileged EXEC mode.

Enter your password if prompted.

Step 2 

debug aaa authorization

Example:

Router# debug aaa authorization

Displays information about AAA authorization.

Step 3 

debug radius [brief | hex]

Example:

Router(config)# debug radius

Displays information about RADIUS.

Configuration Examples for Establishing PPPoE Session Limits per NAS Port

This section contains the following configuration examples:

Configuring the LAC for per-NAS-Port Session Limits for PPPoE over ATM: Example

Configuring the LAC for per-NAS-Port Session Limits for PPPoE over VLAN: Example

Configuring the User Profile for PPPoE Session Limits per NAS Port: Example

Configuring the LAC for per-NAS-Port Session Limits for PPPoE over ATM: Example


Note Effective with Cisco IOS Release 12.2(28)SB, the pppoe limit per-mac, pppoe limit per-vc, and pppoe limit per-vlan commands are replaced by the sessions per-mac limit, sessions per-vc limit, and sessions per-vlan limit commands, respectively, in bba-group configuration mode. See the sessions per-mac limit, sessions per-vc limit, and sessions per-vlan limit commands for more information.


The following example shows how to configure per-NAS-port session limits for PPPoE over ATM on the LAC:

! 
username lac password 0 lab 
username lns password 0 lab 
aaa new-model 
! 
aaa authentication ppp default group radius local 
aaa authentication ppp mlist-nasport group radius 
aaa authorization network mlist-nasport group radius  
aaa session-id common 
ip subnet-zero 
! 
no ip domain lookup 
ip host abrick 209.165.200.225 
! 
ip cef 
subscriber access pppoe pre-authorize nas-port-id mlist-nasport 
vpdn enable 
! 
vpdn-group l2tp-initiator 
 request-dialin 
  protocol l2tp 
  domain example.com 
 initiate-to ip 10.1.1.2  
 local name lac 
! 
vpdn-group pppoe-terminate 
 accept-dialin 
  protocol pppoe 
  virtual-template 1 
 pppoe limit per-mac 10 
 pppoe limit per-vc 10 
 pppoe limit per-vlan 10 
! 
vc-class atm pppoe 
  protocol pppoe 
  ubr 155000 
  encapsulation aal5snap 
! 
interface ATM2/0 
 no ip address 
 no ip mroute-cache 
 no atm ilmi-keepalive 
! 
interface ATM2/0.1 point-to-point 
 class-int pppoe 
 pvc 1/100  
  encapsulation aal5snap 
 ! 
! 
interface FastEthernet4/0 
 ip address 10.1.1.1 255.255.255.0 
 no ip mroute-cache 
 duplex full 
! 
interface FastEthernet6/0 
 ip address 10.165.200.225 255.255.255.0 
 no ip mroute-cache 
 duplex full 
! 
interface Virtual-Template1 
 ip unnumbered Loopback0 
 no peer default ip address 
 ppp authentication chap mlist-nasport 
! 
ip default-gateway 10.3.0.1 
ip classless 
ip route 0.0.0.0 0.0.0.0 10.3.0.1 
! 
! 
ip radius source-interface FastEthernet6/0  
! 
radius-server host 10.1.1.2 auth-port 1645 acct-port 1646 
radius-server key cisco 
radius-server authorization permit missing Service-Type 
! 

Configuring the LAC for per-NAS-Port Session Limits for PPPoE over VLAN: Example


Note Effective with Cisco IOS Release 12.2(28)SB, the pppoe limit per-mac, pppoe limit per-vc, and pppoe limit per-vlan commands are replaced by the sessions per-mac limit, sessions per-vc limit, and sessions per-vlan limit commands, respectively, in bba-group configuration mode. See the sessions per-mac limit, sessions per-vc limit, and sessions per-vlan limit commands for more information.


The following example shows how to configure per-NAS-port session limits for PPPoE over VLAN on the LAC:

! 
username lac password 0 lab 
username lns password 0 lab 
aaa new-model 
! 
! 
aaa authentication ppp default group radius local 
aaa authentication ppp mlist-nasport group radius 
aaa authorization network mlist-nasport group radius  
aaa session-id common 
ip subnet-zero 
! 
! 
no ip domain lookup 
ip host abrick 192.0.2.0 
! 
ip cef 
subscriber access pppoe pre-authorize nas-port-id mlist-nasport 
vpdn enable 
! 
vpdn-group l2tp_initiator 
 request-dialin 
  protocol l2tp 
  domain example.com 
 initiate-to ip 10.1.1.2  
 local name lac 
! 
vpdn-group pppoe-terminate 
 accept-dialin 
  protocol pppoe 
  virtual-template 1 
 pppoe limit per-mac 10 
 pppoe limit per-vc 10 
 pppoe limit per-vlan 10 
! 
vc-class atm pppoe 
  protocol pppoe 
  ubr 155000 
  encapsulation aal5snap 
! 
interface ATM2/0 
 no ip address 
 no ip mroute-cache 
 shutdown 
 no atm ilmi-keepalive 
! 
interface FastEthernet4/0 
 ip address 10.1.1.1 255.255.255.0 
 no ip mroute-cache 
 duplex full 
! 
interface FastEthernet6/0 
 ip address 224.0.0.0 255.255.255.0 
 no ip mroute-cache 
 duplex full 
! 
interface Virtual-Template1 
 ip unnumbered Loopback0 
 no peer default ip address 
 ppp authentication chap mlist-nasport 
! 
ip default-gateway 224.0.0.0 
ip classless 
ip route 0.0.0.0 0.0.0.0 224.0.0.0 
! 
! 
ip radius source-interface FastEthernet6/0  
! 
! 
! 
radius-server host 10.1.1.2 auth-port 1645 acct-port 1646 
radius-server key cisco 
radius-server authorization permit missing Service-Type 
! 

Configuring the User Profile for PPPoE Session Limits per NAS Port: Example

The following example shows how to configure the user profile for PPPoE session limits per NAS port. In this example, the user has a PVC with a VPI of 1 and a VCI of 100 on ATM interface 4/0/0 of the LAC with an IP address of 10.10.10.10:


Username=nas_port:10.10.10.10:4/0/0/1.100 
Password = "password1" 
cisco-avpair= "pppoe:session-limit=<session limit per NAS-port>" 

Where to Go Next

If you want to use service tags to enable a PPPoE server to offer PPPoE clients a selection of services during call setup, refer to the "Offering PPPoE Clients a Selection of Services During Call Setup" module.

If you want to enable an L2TP access concentrator to relay active discovery and service selection functionality for PPPoE over an L2TP control channel to an LNS or tunnel switch, refer to the "Enabling PPPoE Relay Discovery and Service Selection Functionality" module.

If you want to configure the transfer upstream of the PPPoX session speed value, refer to the "Configuring Upstream Connections Speed Transfer" module.

If you want to use the Simple Network Management Protocol (SNMP) to monitor PPPoE sessions, refer to the "Monitoring PPPoE Sessions with SNMP" module.

If you want to identify a physical subscribe line for RADIUS communication with a RADIUS server, refer to the "Identifying a Physical Subscriber Line for RADIUS Access and Accounting" module.

If you want to configure a Cisco Subscriber Service Switch, refer to the "Configuring Cisco Subscriber Service Switch Policies" module.

Additional References

Related Documents

Related Topic
Document Title

Broadband access commands: complete command syntax, command mode, command history, defaults, usage guidelines, and examples

"Wide-Area Networking Commands" chapter in the Cisco IOS Wide-Area Networking Command Reference

Broadband access aggregation concepts

"Understanding Broadband Access Aggregation"

Task for preparing for broadband access aggregation

"Preparing for Broadband Access Aggregation"

Broadband access aggregation support

"Providing Protocol Support for Broadband Access Aggregation of PPPoE Sessions"


Standards

Standard
Title

No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.


MIBs

MIB
MIBs Link

No new or modified MIBs are supported by this feature, and support for existing MIBs has not been modified by this feature.

To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:

http://www.cisco.com/go/mibs


RFCs

RFC
Title

RFC 2516

A Method for Transmitting PPP over Ethernet (PPPoE)

RFC 2684

Multiprotocol Encapsulation over ATM Adaptation Layer 5


Technical Assistance

Description
Link

The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

http://www.cisco.com/techsupport


Feature Information for Establishing PPPoE Session Limits per NAS Port

Table 1 lists the release history for this feature.

Table 1 lists the features in this module and provides links to specific configuration information. Only features that were introduced or modified in Cisco IOS Release 12.2(1) or Cisco IOS Releases 12.2(1) or 12.0(3)S or a later release appear in the table.

For information on a feature in this technology that is not documented here, see the other available documentation for your Cisco IOS release.


Note Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS software release train also support that feature.


Table 1 Feature Information for PPoE Session Limit per NAS Port. 

Feature Name
Releases
Feature Information

PPPoE Session Limit per NAS Port

12.2(31)SRC
12.2(15)B
12.3(4)T

The PPPoE Session Limit per NAS Port feature enables you to limit the number of PPP over Ethernet (PPPoE) sessions on a specific permanent virtual circuit (PVC) or VLAN configured on an L2TP access concentrator (LAC).

The following sections provide information about this feature:

"Information About Establishing PPPoE Session Limits per NAS Port" section

"How to Establish PPPoE Session Limits per NAS Port" section

In Cisco IOS Release 12.2(15)B, this feature was introduced.

In Cisco IOS Release 12.3(4)T, this feature was integrated into the T train.



[an error occurred while processing this directive]