|
Table Of Contents
Establishing PPPoE Session Limits per NAS Port
Prerequisites for Establishing PPPoE Session Limits per NAS Port
Restrictions for Establishing PPPoE Session Limits per NAS Port
Information About Establishing PPPoE Session Limits per NAS Port
How PPPoE per-NAS-Port Session Limits Work
Relationship Between the Per-NAS-Port Session Limit and Other Types of Session Limits
Benefits of PPPoE Session Limits per NAS Port
How to Establish PPPoE Session Limits per NAS Port
Enabling Subscriber Service Switch Preauthorization
Configuring the RADIUS User Profile for PPPoE Session Limits per NAS Port
Verifying PPPoE Session Limit per NAS Port
Configuration Examples for Establishing PPPoE Session Limits per NAS Port
Configuring the LAC for per-NAS-Port Session Limits for PPPoE over ATM: Example
Configuring the LAC for per-NAS-Port Session Limits for PPPoE over VLAN: Example
Configuring the User Profile for PPPoE Session Limits per NAS Port: Example
Feature Information for Establishing PPPoE Session Limits per NAS Port
Establishing PPPoE Session Limits per NAS Port
First Published: May 2, 2005Last Updated: February 18, 2009The PPPoE Session Limits per NAS Port feature enables you to limit the number of PPP over Ethernet (PPPoE) sessions on a specific permanent virtual circuit (PVC) or VLAN configured on an L2TP access concentrator (LAC). The network access server (NAS) port is either an ATM PVC or a configured VLAN ID. PPPoE per-NAS-port session limits are maintained in a RADIUS server customer profile database and are downloaded during Subscriber Service Switch (SSS) preauthorization.
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the "Feature Information for Establishing PPPoE Session Limits per NAS Port" section.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Contents
•Prerequisites for Establishing PPPoE Session Limits per NAS Port
•Restrictions for Establishing PPPoE Session Limits per NAS Port
•Information About Establishing PPPoE Session Limits per NAS Port
•How to Establish PPPoE Session Limits per NAS Port
•Configuration Examples for Establishing PPPoE Session Limits per NAS Port
•Feature Information for Establishing PPPoE Session Limits per NAS Port
Prerequisites for Establishing PPPoE Session Limits per NAS Port
You must understand the concepts described in the "Preparing for Broadband Access Aggregation" module.
Both the LAC and the L2TP Network Server (LNS) must be running a Cisco IOS image that supports the PPPoE Session Limit Per NAS Port feature.
Protocol support for broadband access aggregation must be established using the procedures in the "Providing Protocol Support for Broadband Access Aggregation of PPPoE Sessions" module.
Restrictions for Establishing PPPoE Session Limits per NAS Port
•Do not configure the PPPoE per-NAS-port session limit to zero.
•PPPoE Session Limit per NAS Port does not support TACACS+.
•PPPoE Session Limit per NAS Port applies only to PVCs and VLANs.
Information About Establishing PPPoE Session Limits per NAS Port
To establish PPPoE session limits per NAS port, you should understand the following concepts:
•How PPPoE per-NAS-Port Session Limits Work
•Relationship Between the Per-NAS-Port Session Limit and Other Types of Session Limits
•Benefits of PPPoE Session Limits per NAS Port
How PPPoE per-NAS-Port Session Limits Work
The PPPoE Session Limits Per NAS Port feature limits the number of PPPoE sessions on a specific PVC or VLAN configured on an LAC. The NAS port is either an ATM PVC or a configured VLAN ID.
The PPPoE per-NAS-port session limit is maintained in a RADIUS server customer profile database. This customer profile database is connected to an LAC and is separate from the RADIUS server that the LAC and LNS use for the authentication and authorization of incoming users. See for a sample network topology. When the customer profile database receives a preauthorization request from the LAC, it sends the PPPoE per-NAS-port session limit to the LAC.
The LAC sends a preauthorization request to the customer profile database when the LAC is configured for SSS preauthorization. When the LAC receives the PPPoE per-NAS-port session limit from the customer profile database, the LAC compares the PPPoE per-NAS-port session limit with the number of sessions currently on the NAS port. The LAC then decides whether to accept or reject the current call, depending upon the configured PPPoE per NAS port-session-limit and the number of calls currently on the NAS port. PPPoE Session Limit per NAS Port Sample Topology
The customer profile database consists of a user profile for each user that is connected to the LAC. Each user profile contains the NAS-IP-Address (attribute 4) and the NAS-Port-ID (attribute 5.) When the LAC is configured for SSS preauthorization, it queries the customer profile database using the username. When a match is found in the customer profile database, the customer profile database sends the PPPoE per-NAS-port session limit in the user profile. The PPPoE per-NAS-port session limit is defined in the username as a Cisco attribute-value (AV) pair.
Relationship Between the Per-NAS-Port Session Limit and Other Types of Session Limits
You can configure types of session limits other than per-NAS-sort sessions on the LAC, including session limit per VC, per VLAN, per MAC, and a global session limit for the LAC. When PPPoE session limits for a NAS port are enabled (that is, when you have enabled SSS preauthorization on the LAC), local configurations for session limits per VC and per VLAN are overwritten by the PPPoE per-NAS-port session limit downloaded from the customer profile database. Configured session limits per VC and per VLAN serve as backups in case of a download failure of the PPPoE per-NAS-port session limit. Global session limits and per-MAC session limits, if configured on the router, will take effect as other means of limiting PPPoE sessions.
Benefits of PPPoE Session Limits per NAS Port
PPPoE session limits per NAS port provides flexibility and simplifies router configuration by allowing you to download the per-VC and per-VLAN session limits from a RADIUS server in addition to being able to configure them on the router.
How to Establish PPPoE Session Limits per NAS Port
This section contains the following procedures:
•Enabling Subscriber Service Switch Preauthorization (required)
•Configuring the RADIUS User Profile for PPPoE Session Limits per NAS Port (required)
•Verifying PPPoE Session Limit per NAS Port (optional)
Enabling Subscriber Service Switch Preauthorization
When SSS preauthorization is enabled on an LAC, local configurations for session limit per VC and per VLAN are overwritten by the per-NAS-port session limit downloaded from the server. Perform this task to enable SSS preauthorization:
SUMMARY STEPS
1. enable
2. configure terminal
3. subscriber access pppoe pre-authorize nas-port-id [aaa-method-list]
4. exit
DETAILED STEPS
Configuring the RADIUS User Profile for PPPoE Session Limits per NAS Port
Perform the following steps to enable per-NAS-port PPPoE session limits in a RADIUS user profile for the customer profile database. Refer to the Cisco IOS Security Configuration Guide for information about creating a RADIUS user profile.
DETAILED STEPS
Verifying PPPoE Session Limit per NAS Port
Perform this task to verify per-NAS-port session limit performance.
SUMMARY STEPS
1. enable
2. debug aaa authorization
3. debug radius [brief | hex]
DETAILED STEPS
Configuration Examples for Establishing PPPoE Session Limits per NAS Port
This section contains the following configuration examples:
•Configuring the LAC for per-NAS-Port Session Limits for PPPoE over ATM: Example
•Configuring the LAC for per-NAS-Port Session Limits for PPPoE over VLAN: Example
•Configuring the User Profile for PPPoE Session Limits per NAS Port: Example
Configuring the LAC for per-NAS-Port Session Limits for PPPoE over ATM: Example
Note Effective with Cisco IOS Release 12.2(28)SB, the pppoe limit per-mac, pppoe limit per-vc, and pppoe limit per-vlan commands are replaced by the sessions per-mac limit, sessions per-vc limit, and sessions per-vlan limit commands, respectively, in bba-group configuration mode. See the sessions per-mac limit, sessions per-vc limit, and sessions per-vlan limit commands for more information.
The following example shows how to configure per-NAS-port session limits for PPPoE over ATM on the LAC:
!username lac password 0 labusername lns password 0 labaaa new-model!aaa authentication ppp default group radius localaaa authentication ppp mlist-nasport group radiusaaa authorization network mlist-nasport group radiusaaa session-id commonip subnet-zero!no ip domain lookupip host abrick 209.165.200.225!ip cefsubscriber access pppoe pre-authorize nas-port-id mlist-nasportvpdn enable!vpdn-group l2tp-initiatorrequest-dialinprotocol l2tpdomain example.cominitiate-to ip 10.1.1.2local name lac!vpdn-group pppoe-terminateaccept-dialinprotocol pppoevirtual-template 1pppoe limit per-mac 10pppoe limit per-vc 10pppoe limit per-vlan 10!vc-class atm pppoeprotocol pppoeubr 155000encapsulation aal5snap!interface ATM2/0no ip addressno ip mroute-cacheno atm ilmi-keepalive!interface ATM2/0.1 point-to-pointclass-int pppoepvc 1/100encapsulation aal5snap!!interface FastEthernet4/0ip address 10.1.1.1 255.255.255.0no ip mroute-cacheduplex full!interface FastEthernet6/0ip address 10.165.200.225 255.255.255.0no ip mroute-cacheduplex full!interface Virtual-Template1ip unnumbered Loopback0no peer default ip addressppp authentication chap mlist-nasport!ip default-gateway 10.3.0.1ip classlessip route 0.0.0.0 0.0.0.0 10.3.0.1!!ip radius source-interface FastEthernet6/0!radius-server host 10.1.1.2 auth-port 1645 acct-port 1646radius-server key ciscoradius-server authorization permit missing Service-Type!Configuring the LAC for per-NAS-Port Session Limits for PPPoE over VLAN: Example
Note Effective with Cisco IOS Release 12.2(28)SB, the pppoe limit per-mac, pppoe limit per-vc, and pppoe limit per-vlan commands are replaced by the sessions per-mac limit, sessions per-vc limit, and sessions per-vlan limit commands, respectively, in bba-group configuration mode. See the sessions per-mac limit, sessions per-vc limit, and sessions per-vlan limit commands for more information.
The following example shows how to configure per-NAS-port session limits for PPPoE over VLAN on the LAC:
!username lac password 0 labusername lns password 0 labaaa new-model!!aaa authentication ppp default group radius localaaa authentication ppp mlist-nasport group radiusaaa authorization network mlist-nasport group radiusaaa session-id commonip subnet-zero!!no ip domain lookupip host abrick 192.0.2.0!ip cefsubscriber access pppoe pre-authorize nas-port-id mlist-nasportvpdn enable!vpdn-group l2tp_initiatorrequest-dialinprotocol l2tpdomain example.cominitiate-to ip 10.1.1.2local name lac!vpdn-group pppoe-terminateaccept-dialinprotocol pppoevirtual-template 1pppoe limit per-mac 10pppoe limit per-vc 10pppoe limit per-vlan 10!vc-class atm pppoeprotocol pppoeubr 155000encapsulation aal5snap!interface ATM2/0no ip addressno ip mroute-cacheshutdownno atm ilmi-keepalive!interface FastEthernet4/0ip address 10.1.1.1 255.255.255.0no ip mroute-cacheduplex full!interface FastEthernet6/0ip address 224.0.0.0 255.255.255.0no ip mroute-cacheduplex full!interface Virtual-Template1ip unnumbered Loopback0no peer default ip addressppp authentication chap mlist-nasport!ip default-gateway 224.0.0.0ip classlessip route 0.0.0.0 0.0.0.0 224.0.0.0!!ip radius source-interface FastEthernet6/0!!!radius-server host 10.1.1.2 auth-port 1645 acct-port 1646radius-server key ciscoradius-server authorization permit missing Service-Type!Configuring the User Profile for PPPoE Session Limits per NAS Port: Example
The following example shows how to configure the user profile for PPPoE session limits per NAS port. In this example, the user has a PVC with a VPI of 1 and a VCI of 100 on ATM interface 4/0/0 of the LAC with an IP address of 10.10.10.10:
Username=nas_port:10.10.10.10:4/0/0/1.100Password = "password1"cisco-avpair= "pppoe:session-limit=<session limit per NAS-port>"Where to Go Next
•If you want to use service tags to enable a PPPoE server to offer PPPoE clients a selection of services during call setup, refer to the "Offering PPPoE Clients a Selection of Services During Call Setup" module.
•If you want to enable an L2TP access concentrator to relay active discovery and service selection functionality for PPPoE over an L2TP control channel to an LNS or tunnel switch, refer to the "Enabling PPPoE Relay Discovery and Service Selection Functionality" module.
•If you want to configure the transfer upstream of the PPPoX session speed value, refer to the "Configuring Upstream Connections Speed Transfer" module.
•If you want to use the Simple Network Management Protocol (SNMP) to monitor PPPoE sessions, refer to the "Monitoring PPPoE Sessions with SNMP" module.
•If you want to identify a physical subscribe line for RADIUS communication with a RADIUS server, refer to the "Identifying a Physical Subscriber Line for RADIUS Access and Accounting" module.
•If you want to configure a Cisco Subscriber Service Switch, refer to the "Configuring Cisco Subscriber Service Switch Policies" module.
Additional References
Related Documents
Related Topic Document TitleBroadband access commands: complete command syntax, command mode, command history, defaults, usage guidelines, and examples
"Wide-Area Networking Commands" chapter in the Cisco IOS Wide-Area Networking Command Reference
Broadband access aggregation concepts
"Understanding Broadband Access Aggregation"
Task for preparing for broadband access aggregation
"Preparing for Broadband Access Aggregation"
Broadband access aggregation support
"Providing Protocol Support for Broadband Access Aggregation of PPPoE Sessions"
Standards
Standard TitleNo new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
—
MIBs
RFCs
RFC TitleRFC 2516
A Method for Transmitting PPP over Ethernet (PPPoE)
RFC 2684
Multiprotocol Encapsulation over ATM Adaptation Layer 5
Technical Assistance
Feature Information for Establishing PPPoE Session Limits per NAS Port
Table 1 lists the release history for this feature.
Table 1 lists the features in this module and provides links to specific configuration information. Only features that were introduced or modified in Cisco IOS Release 12.2(1) or Cisco IOS Releases 12.2(1) or 12.0(3)S or a later release appear in the table.
For information on a feature in this technology that is not documented here, see the other available documentation for your Cisco IOS release.
Note Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS software release train also support that feature.
Table 1 Feature Information for PPoE Session Limit per NAS Port.
Feature Name Releases Feature InformationPPPoE Session Limit per NAS Port
12.2(31)SRC
12.2(15)B
12.3(4)TThe PPPoE Session Limit per NAS Port feature enables you to limit the number of PPP over Ethernet (PPPoE) sessions on a specific permanent virtual circuit (PVC) or VLAN configured on an L2TP access concentrator (LAC).
The following sections provide information about this feature:
•"Information About Establishing PPPoE Session Limits per NAS Port" section
•"How to Establish PPPoE Session Limits per NAS Port" section
In Cisco IOS Release 12.2(15)B, this feature was introduced.
In Cisco IOS Release 12.3(4)T, this feature was integrated into the T train.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
© 2005-2009 Cisco Systems, Inc. All rights reserved.