|
Table Of Contents
Offering PPPoE Clients a Selection of Services During Call Setup
Prerequisites for Offering PPPoE Clients a Selection of Services During Call Setup
Information About Offering PPPoE Clients a Selection of Services During Call Setup
PPPoE Service Selection Through Service Tags
RADIUS Service Profiles for PPPoE Service Selection
Benefits of PPPoE Service Selection
Attributes Used to Define a RADIUS Service Profile for PPPoE Selection
Attributes Used Configure a Subscriber Profile on the Radius Server for PPPoE Service Selection
How to Offer PPPoE Clients a Selection of Services During Call Setup
Configuring the Subscriber Profile for PPPoE Service Selection
Configuring the PPPoE Profile for PPPoE Service Selection
Verifying PPPoE Service Selection
Monitoring and Maintaining PPPoE Service Selection
Configuration Examples for PPPoE Service Selection
PPPoE Service Selection with ATM QoS and Tunneling Services: Example
PPPoE Service Selection with Tunneling Services: Example
Feature Information for Offering PPPoE Clients a Selection of Services During Call Setup
Offering PPPoE Clients a Selection of Services During Call Setup
First Published: May 2, 2005Last Updated: Januuary 2, 2007The PPPoE Service Selection feature uses service tags to enable a PPP over Ethernet (PPPoE) server to offer PPPoE clients a selection of services during call setup. The customer chooses one of the services offered, and the service is provided when the PPPoE session becomes active. This feature enables service providers to offer a variety of services and to charge customers according to the service chosen.
Finding Feature Information in This Module
Your Cisco IOS software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your Cisco IOS software release. To reach links to specific feature documentation in this module and to see a list of the releases in which each feature is supported, use the "Feature Information for Offering PPPoE Clients a Selection of Services During Call Setup" section.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Contents
•Prerequisites for Offering PPPoE Clients a Selection of Services During Call Setup
•Information About Offering PPPoE Clients a Selection of Services During Call Setup
•How to Offer PPPoE Clients a Selection of Services During Call Setup
•Configuration Examples for PPPoE Service Selection
•Feature Information for Offering PPPoE Clients a Selection of Services During Call Setup
Prerequisites for Offering PPPoE Clients a Selection of Services During Call Setup
•The PPPoE Service Selection feature requires that PPPoE be configured using PPPoE profile configuration rather than virtual private dial-up network (VPDN) group configuration as described in the "Providing Protocol Support for Broadband Aggregation of PPPoE Sessions" module.
•The PPPoE client must support service tags in the PPPoE discovery phase.
•The procedures in this document assume that RADIUS accounting and authentication and PPPoE are configured and working.
•If you are going to use PPPoE service selection to offer tunneling services, the procedures in this document assume that you already have tunneling configured and working.
Information About Offering PPPoE Clients a Selection of Services During Call Setup
To configure PPPoE service selection, you should understand the following concepts:
•PPPoE Service Selection Through Service Tags
•RADIUS Service Profiles for PPPoE Service Selection
•Benefits of PPPoE Service Selection
•Attributes Used to Define a RADIUS Service Profile for PPPoE Selection
•Attributes Used Configure a Subscriber Profile on the Radius Server for PPPoE Service Selection
PPPoE Service Selection Through Service Tags
PPPoE service selection enables a PPPoE server to offer clients a selection of services during call setup. The PPPoE client chooses one of the services offered, and that service is provided when the PPPoE session becomes active.
PPPoE service selection works through the exchange of service tags during the PPPoE discovery phase. When a client initiates a call with a PPPoE Active Discovery Initiation (PADI) packet, the PPPoE server responds with a PPPoE Active Discovery Offer (PADO) packet that advertises a list of available services. The client selects a service and sends a PPPoE Active Discovery Request (PADR) packet that indicates the service name that was selected.
When the PPPoE server receives the PADR packet that indicates the chosen service, the PPPoE server handles the service name as it would a domain name. The service profile for the service name is retrieved from a RADIUS server, and the attributes within that service profile are applied to the call.
PPPoE Service Names
Each PPPoE service has a service name, which can be defined as a set of characteristics that are applied to a PPPoE connection when that service name is selected during call setup.
When you configure PPPoE service selection, you will define a RADIUS service profile for each service name, list in a subscriber profile the service names that you want to advertise, and then assign the subscriber profile to a PPPoE profile. The PPPoE server will advertise the service names that are listed in the subscriber profile to each PPPoE client connection that uses the configured PPPoE profile.
If a subscriber profile is not assigned to a PPPoE profile, the PPPoE connections that use that PPPoE profile will be established without the additional service tags in the discovery packets. If a port is configured with a static service name (using the vpn service command), the static service name takes precedence, and no services will be advertised to the client.
The Cisco RADIUS vendor-specific attribute (VSA) "service-name" will be used in RADIUS accounting records to log the service name that was selected by the client. This attribute is also used to download the service names from the subscriber profile when the subscriber profile is defined on the RADIUS server.
RADIUS Service Profiles for PPPoE Service Selection
A service profile must be created on the RADIUS server for each service name. The service profile contains attributes that define how the call will be handled. Currently, two sets of attributes are available for defining service profiles: attributes that define tunneling and attributes that define the quality of service (QoS) that will be applied to the permanent virtual circuit (PVC) on which the PPPoE call is coming in.
The "Configuring the Subscriber Profile for PPPoE Service Selection" section lists some of the attributes that are supported in RADIUS service profiles for PPPoE service selection.
Benefits of PPPoE Service Selection
PPPoE service selection enables a service provider to use PPPoE to offer a selection of services to customers and to charge customers according to the service selected. For example, a wholesaler could offer different levels of service by defining multiple service profiles for the same tunnel but with different levels of QoS for the ATM PVC. The wholesaler would be able to charge customers according to the level of service provided.
PPPoE service selection could also be used by access providers to avoid link control protocol (LCP) negotiation at the Layer 2 Tunnel Protocol (L2TP) access concentrator (LAC) for sessions that are to be forwarded to tunnels. Avoiding LCP negotiation at the LAC can improve scalability of the LAC during call setup and help alleviate the load on the LAC while all the sessions on the LAC are reconnecting after an outage.
Attributes Used to Define a RADIUS Service Profile for PPPoE Selection
Table 1 lists some of the attributes that can be used to define a RADIUS service profile for PPPoE service selection. These attributes are defined when setting up the RADIUS server.
Attributes Used Configure a Subscriber Profile on the Radius Server for PPPoE Service Selection
Table 2 lists the attributes that can be used to configure a RADIUS subscriber profile to support PPPoE service selection.
Prerequisites
The default AAA authorization method list determines where the policy manager looks for the subscriber profile. When the subscriber profile is configured remotely, the aaa authorization network default group radius command must be included in the AAA configuration so the policy manager knows to look for the subscriber policy on a AAA server. These attributes are defined while configuring the RADIUS server. Refer to the RADIUS server documentation for information about how to perform this configuration.
How to Offer PPPoE Clients a Selection of Services During Call Setup
This section contains the following procedures:
•Configuring the Subscriber Profile for PPPoE Service Selection (required)
•Configuring the Subscriber Profile for PPPoE Service Selection (required)
•Configuring the PPPoE Profile for PPPoE Service Selection (required)
•Verifying PPPoE Service Selection (optional)
•Monitoring and Maintaining PPPoE Service Selection (optional)
Configuring the Subscriber Profile for PPPoE Service Selection
The subscriber profile contains the list of services that will be advertised to PPPoE clients. You can configure the subscriber profile locally on the router or on the RADIUS server. Perform this task to configure a local subscriber profile for PPPoE service selection.
Prerequisites
The default AAA authorization method list determines where the policy manager looks for the subscriber profile. When the subscriber profile is configured locally, the aaa authorization network default local command must be included in the AAA configuration so the policy manager knows to look for the subscriber policy locally.
SUMMARY STEPS
1. enable
2. configure terminal
3. subscriber profile profile-name
4. pppoe service service-name
5. Repeat Step 4 for each service name that you want to add to the subscriber profile.
6. end
DETAILED STEPS
Configuring the PPPoE Profile for PPPoE Service Selection
Perform this task to associate a subscriber profile with a PPPoE profile.
SUMMARY STEPS
1. enable
2. configure terminal
3. bba-group pppoe {group-name | global}
4. virtual-template template-number
5. service profile subscriber-profile-name [refresh minutes]
6. end
DETAILED STEPS
Troubleshooting Tips
Use the show pppoe session and debug pppoe commands to troubleshoot PPPoE sessions.
What to Do Next
Once a PPPoE profile has been defined, it must be assigned to a PPPoE port (Ethernet interface, virtual LAN [VLAN], or PVC), a virtual circuit (VC) class, or an ATM PVC range. For more information about how to configure PPPoE profiles, refer to the "Providing Protocol Support for Broadband Access Aggregation of PPPoE Sessions" module.
Verifying PPPoE Service Selection
Perform this task to verify PPPoE service selection configuration and performance. Steps 2 through 3 are optional and do not have to be performed in a particular order.
SUMMARY STEPS
1. show pppoe derived group group-name
2. show vpdn [session [all | packets | sequence | state] | tunnel [all | packets | summary | state | transport]]
3. show atm pvc [vpi/vci | name | interface atm interface-number[.subinterface-number multipoint]] [ppp]
DETAILED STEPS
Step 1 show pppoe derived group group-name
(Optional) Displays the cached PPPoE configuration that is derived from the subscriber profile for a specified PPPoE profile.
This command is useful for viewing the subscriber profile configuration when the subscriber profile is configured on a remote AAA server.
Router# show pppoe derived group sp-group-aDerived configuration from subscriber profile 'abc':Service names:isp-xyz, gold-isp-A, silver-isp-AStep 2 show vpdn [session [all | packets | sequence | state] | tunnel [all | packets | summary | state | transport]]
(Optional) Displays information about active L2TP or Layer 2 Forwarding (L2F) Protocol tunnel and message identifiers in a VPDN.
Use this command to display tunneling parameters for the services configured for tunneling.
Router# show vpdnActive L2F tunnelsNAS Name Gateway Name NAS CLID Gateway CLID Statenas gateway 4 2 openL2F MIDsName NAS Name Interface MID Staterouter1@cisco.com nas As7 1 openrouter2@cisco.com nas As8 2 openStep 3 show atm pvc [vpi/vci | name | interface atm interface-number[.subinterface-number multipoint]] [ppp]
(Optional) Displays all ATM PVCs and traffic information.
Use this command to display ATM QoS parameters for the services configured for ATM QoS.
Router# show atm pvcVCD/ Peak Avg/Min BurstInterface Name VPI VCI Type Encaps Kbps Kbps Cells Sts2/0 1 0 5 PVC SAAL 155000 155000 UP2/0 2 0 16 PVC ILMI 155000 155000 UP2/0.2 101 0 50 PVC SNAP 155000 155000 UP2/0.2 102 0 60 PVC SNAP 155000 155000 DOWN2/0.2 104 0 80 PVC SNAP 155000 155000 UP2/0 hello 0 99 PVC SNAP 1000
Monitoring and Maintaining PPPoE Service Selection
To monitor and maintain PPPoE service selection, perform the following steps.
SUMMARY STEPS
1. clear pppoe derived group group-name
2. debug pppoe events [rmac remote-mac-address | interface type number [vc {[vpi/]vci | vc-name}] [vlan vlan-id]]
3. debug radius [brief | hex]
DETAILED STEPS
Step 1 clear pppoe derived group group-name
Clears the cached PPPoE configuration of a PPPoE profile and forces the PPPoE profile to reread the configuration from the assigned subscriber profile.
Router# clear pppoe derived group group1Step 2 debug pppoe events [rmac remote-mac-address | interface type number [vc {[vpi/]vci | vc-name}] [vlan vlan-id]]
(Optional) Displays PPPoE protocol messages about events that are part of normal session establishment or shutdown.
Use this command to monitor the exchange of PPPoE service names during call setup.
Router# debug pppoe events interface atm 1/0.10 vc 101PPPoE protocol events debugging is onRouter#00:41:55:PPPoE 0:I PADI R:00b0.c2e9.c470 L:ffff.ffff.ffff 0/101 ATM1/0.1000:41:55:PPPoE 0:O PADO, R:00b0.c2e9.c470 L:0001.c9f0.0c1c 0/101 ATM1/0.1000:41:55:PPPoE 0:I PADR R:00b0.c2e9.c470 L:0001.c9f0.0c1c 0/101 ATM1/0.1000:41:55:PPPoE :encap string prepared00:41:55:[3]PPPoE 3:Access IE handle allocated00:41:55:[3]PPPoE 3:pppoe SSS switch updated00:41:55:[3]PPPoE 3:AAA unique ID allocated00:41:55:[3]PPPoE 3:No AAA accounting method list00:41:55:[3]PPPoE 3:Service request sent to SSS00:41:55:[3]PPPoE 3:Created R:0001.c9f0.0c1c L:00b0.c2e9.c470 0/101 ATM1/0.1000:41:55:[3]PPPoE 3:State REQ_NASPORT Event MORE_KEYS00:41:55:[3]PPPoE 3:O PADS R:00b0.c2e9.c470 L:0001.c9f0.0c1c 0/101 ATM1/0.1000:41:55:[3]PPPoE 3:State START_PPP Event DYN_BIND00:41:55:[3]PPPoE 3:data path set to PPP00:41:57:[3]PPPoE 3:State LCP_NEGO Event PPP_LOCAL00:41:57:PPPoE 3/SB:Sent vtemplate request on base Vi200:41:57:[3]PPPoE 3:State CREATE_VA Event VA_RESP00:41:57:[3]PPPoE 3:Vi2.1 interface obtained00:41:57:[3]PPPoE 3:State PTA_BIND Event STAT_BIND00:41:57:[3]PPPoE 3:data path set to Virtual Acess00:41:57:[3]PPPoE 3:Connected PTAStep 3 debug radius [brief | hex]
(Optional) Displays information associated with RADIUS.
Use this command to monitor the transactions between the router and the RADIUS server.
Router# debug radiusRadius protocol debugging is onRadius packet hex dump debugging is offRouter#00:02:50: RADIUS: ustruct sharecount=300:02:50: Radius: radius_port_info() success=0 radius_nas_port=100:02:50: RADIUS: Initial Transmit ISDN 0:D:23 id 0 10.0.0.1:1824, Accounting-Request, len35800:02:50: RADIUS: NAS-IP-Address [4] 6 10.0.0.000:02:50: RADIUS: Vendor, Cisco [26] 19 VT=02 TL=13 ISDN 0:D:2300:02:50: RADIUS: NAS-Port-Type [61] 6 Async00:02:50: RADIUS: User-Name [1] 12 "4085554206"00:02:50: RADIUS: Called-Station-Id [30] 7 "52981"00:02:50: RADIUS: Calling-Station-Id [31] 12 "4085554206"00:02:50: RADIUS: Acct-Status-Type [40] 6 Start00:02:50: RADIUS: Service-Type [6] 6 Login00:02:50: RADIUS: Vendor, Cisco [26] 27 VT=33 TL=21 h323-gw-id=5300_43.00:02:50: RADIUS: Vendor, Cisco [26] 55 VT=01 TL=49h323-incoming-conf-id=8F3A3163 B4980003 0 29BD000:02:50: RADIUS: Vendor, Cisco [26] 31 VT=26 TL=25 h323-call-origin=answer00:02:50: RADIUS: Vendor, Cisco [26] 32 VT=27 TL=26 h323-call-type=Telephony00:02:50: RADIUS: Vendor, Cisco [26] 57 VT=25 TL=51 h323-setup-time=*16:02:48.681PST Fri Dec 31 199900:02:50: RADIUS: Vendor, Cisco [26] 46 VT=24 TL=40 h323-conf-id=8F3A3163B4980003 0 29BD000:02:50: RADIUS: Acct-Session-Id [44] 10 "00000002"00:02:50: RADIUS: Delay-Time [41] 6 000:02:51: RADIUS: Received from id 0 1.7.157.1:1824, Accounting-response, len 2000:02:51: %ISDN-6-CONNECT: Interface Serial0:22 is now connected to 408527420600:03:01: RADIUS: ustruct sharecount=300:03:01: Radius: radius_port_info() success=0 radius_nas_port=100:03:01: RADIUS: Initial Transmit ISDN 0:D:23 id 1 1.7.157.1:1823, Access-Request, len17100:03:01: RADIUS: NAS-IP-Address [4] 6 10.0.0.000:03:01: RADIUS: Vendor, Cisco [26] 19 VT=02 TL=13 ISDN 0:D:2300:03:01: RADIUS: NAS-Port-Type [61] 6 Async00:03:01: RADIUS: User-Name [1] 8 "123456"00:03:01: RADIUS: Vendor, Cisco [26] 46 VT=24 TL=40 h323-conf-id=8F3A3163B4980003 0 29BD000:03:01: RADIUS: Calling-Station-Id [31] 12 "4085554206"00:03:01: RADIUS: User-Password [2] 18 *00:03:01: RADIUS: Vendor, Cisco [26] 36 VT=01 TL=30 h323-ivr-out=transactionID:000:03:01: RADIUS: Received from id 1 1.7.157.1:1823, Access-Accept, len 11500:03:01: RADIUS: Service-Type [6] 6 Login00:03:01: RADIUS: Vendor, Cisco [26] 29 VT=101 TL=23 h323-credit-amount=4500:03:01: RADIUS: Vendor, Cisco [26] 27 VT=102 TL=21 h323-credit-time=3300:03:01: RADIUS: Vendor, Cisco [26] 26 VT=103 TL=20 h323-return-code=000:03:01: RADIUS: Class [25] 7 6C6F63616C00:03:01: RADIUS: saved authorization data for user 62321E14 at 6233D25800:03:13: %ISDN-6-DISCONNECT: Interface Serial0:22 disconnected from 4085274206, calllasted 22 seconds00:03:13: RADIUS: ustruct sharecount=200:03:13: Radius: radius_port_info() success=0 radius_nas_port=100:03:13: RADIUS: Sent class "local" at 6233D2C4 from user 62321E1400:03:13: RADIUS: Initial Transmit ISDN 0:D:23 id 2 1.7.157.1:1824, Accounting-Request,len 77500:03:13: RADIUS: NAS-IP-Address [4] 6 10.0.0.000:03:13: RADIUS: Vendor, Cisco [26] 19 VT=02 TL=13 ISDN 0:D:2300:03:13: RADIUS: NAS-Port-Type [61] 6 Async00:03:13: RADIUS: User-Name [1] 8 "123456"00:03:13: RADIUS: Called-Station-Id [30] 7 "52981"00:03:13: RADIUS: Calling-Station-Id [31] 12 "4085274206"00:03:13: RADIUS: Acct-Status-Type [40] 6 Stop00:03:13: RADIUS: Class [25] 7 6C6F63616C00:03:13: RADIUS: Undebuggable [45] 6 0000000100:03:13: RADIUS: Service-Type [6] 6 Login00:03:13: RADIUS: Vendor, Cisco [26] 27 VT=33 TL=21 h323-gw-id=5300_43.00:03:13: RADIUS: Vendor, Cisco [26] 55 VT=01 TL=49h323-incoming-conf-id=8F3A3163 B4980003 0 29BD000:03:13: RADIUS: Vendor, Cisco [26] 31 VT=26 TL=25 h323-call-origin=answer00:03:13: RADIUS: Vendor, Cisco [26] 32 VT=27 TL=26 h323-call-type=Telephony00:03:13: RADIUS: Vendor, Cisco [26] 57 VT=25 TL=51 h323-setup-time=*16:02:48.681PST Fri Dec 31 199900:03:13: RADIUS: Vendor, Cisco [26] 59 VT=28 TL=53h323-connect-time=*16:02:48.946 PST Fri Dec 31 199900:03:13: RADIUS: Vendor, Cisco [26] 62 VT=29 TL=56in=000:03:13: RADIUS: Vendor, Cisco [26] 23 VT=01 TL=17 pre-bytes-out=000:03:13: RADIUS: Vendor, Cisco [26] 21 VT=01 TL=15 pre-paks-in=000:03:13: RADIUS: Vendor, Cisco [26] 22 VT=01 TL=16 pre-paks-out=000:03:13: RADIUS: Vendor, Cisco [26] 22 VT=01 TL=16 nas-rx-speed=000:03:13: RADIUS: Vendor, Cisco [26] 22 VT=01 TL=16 nas-tx-speed=000:03:13: RADIUS: Delay-Time [41] 6 000:03:13: RADIUS: Received from id 2 1.7.157.1:1824, Accounting-response, len 20h323-disconnect-time=*16:03:11.306 PST Fri Dec 31 199900:03:13: RADIUS: Vendor, Cisco [26] 32 VT=30 TL=26 h323-disconnect-cause=1000:03:13: RADIUS: Vendor, Cisco [26] 28 VT=31 TL=22 h323-voice-quality=000:03:13: RADIUS: Vendor, Cisco [26] 46 VT=24 TL=40 h323-conf-id=8F3A3163B4980003 0 29BD000:03:13: RADIUS: Acct-Session-Id [44] 10 "00000002"00:03:13: RADIUS: Acct-Input-Octets [42] 6 000:03:13: RADIUS: Acct-Output-Octets [43] 6 8800000:03:13: RADIUS: Acct-Input-Packets [47] 6 000:03:13: RADIUS: Acct-Output-Packets [48] 6 55000:03:13: RADIUS: Acct-Session-Time [46] 6 2200:03:13: RADIUS: Vendor, Cisco [26] 30 VT=01 TL=24 subscriber=RegularLine00:03:13: RADIUS: Vendor, Cisco [26] 35 VT=01 TL=29 h323-ivr-out=Tariff:Unknown00:03:13: RADIUS: Vendor, Cisco [26] 22 VT=01 TL=16 pre-bytes-The following is sample output from the debug radius brief command:
Router# debug radius briefRadius protocol debugging is onRadius packet hex dump debugging is offRadius protocol in brief format debugging is on00:05:21: RADIUS: Initial Transmit ISDN 0:D:23 id 6 10.0.0.1:1824, Accounting-Request, len35800:05:21: %ISDN-6-CONNECT: Interface Serial0:22 is now connected to 408527420600:05:26: RADIUS: Retransmit id 600:05:31: RADIUS: Tried all servers.00:05:31: RADIUS: No valid server found. Trying any viable server00:05:31: RADIUS: Tried all servers.00:05:31: RADIUS: No response for id 700:05:31: RADIUS: Initial Transmit ISDN 0:D:23 id 8 10.0.0.0:1823, Access-Request, len 17100:05:36: RADIUS: Retransmit id 800:05:36: RADIUS: Received from id 8 1.7.157.1:1823, Access-Accept, len 11500:05:47: %ISDN-6-DISCONNECT: Interface Serial0:22 disconnected from 4085274206, calllasted 26 seconds00:05:47: RADIUS: Initial Transmit ISDN 0:D:23 id 9 10.0.0.1:1824, Accounting-Request, len77500:05:47: RADIUS: Received from id 9 1.7.157.1:1824, Accounting-response, len 20The following example shows debug radius hex command output:
Router# debug radius hexRadius protocol debugging is onRadius packet hex dump debugging is onRouter#17:26:52: RADIUS: ustruct sharecount=317:26:52: Radius: radius_port_info() success=0 radius_nas_port=117:26:52: RADIUS: Initial Transmit ISDN 0:D:23 id 10 10.0.0.1:1824, Accounting-Request,len 36117:26:52: Attribute 4 6 01081D0317:26:52: Attribute 26 19 00000009020D4953444E20303A443A323317:26:52: Attribute 61 6 0000000017:26:52: Attribute 1 12 3430383532373432303617:26:52: Attribute 30 7 353239383117:26:52: Attribute 31 12 3430383532373432303617:26:52: Attribute 40 6 0000000117:26:52: Attribute 6 6 0000000117:26:52: Attribute 26 27 000000092115683332332D67772D69643D353330305F34332E17:26:52: Attribute 26 57000000090133683332332D696E636F6D696E672D636F6E662D69643D38463341333136332042343938303030462030203342453731423817:26:52: Attribute 26 31000000091A19683332332D63616C6C2D6F726967696E3D616E7377657217:26:52: Attribute 26 32000000091B1A683332332D63616C6C2D747970653D54656C6570686F6E7917:26:52: Attribute 26 56000000091932683332332D73657475702D74696D653D2A30393A32363A35322E3838302050535420536174204A616E2031203230303017:26:52: Attribute 26 4800000009182A683332332D636F6E662D69643D38463341333136332042343938303030462030203342453731423817:26:52: Attribute 44 10 303030303030303517:26:52: Attribute 41 6 0000000017:26:52: %ISDN-6-CONNECT: Interface Serial0:22 is now connected to 408527420617:26:52: RADIUS: Received from id 10 10.0.0.1:1824, Accounting-response, len 2017:27:01: RADIUS: ustruct sharecount=317:27:01: Radius: radius_port_info() success=0 radius_nas_port=117:27:01: RADIUS: Initial Transmit ISDN 0:D:23 id 11 10.0.0.0:1823, Access-Request, len17317:27:01: Attribute 4 6 01081D0317:27:01: Attribute 26 19 00000009020D4953444E20303A443A323317:27:01: Attribute 61 6 0000000017:27:01: Attribute 1 8 31323334353617:27:01: Attribute 26 4800000009182A683332332D636F6E662D69643D38463341333136332042343938303030462030203342453731423817:27:01: Attribute 31 12 3430383532373432303617:27:01: Attribute 2 18 C980D8D0E9A061B3D783C61AA6F2721417:27:01: Attribute 26 3600000009011E683332332D6976722D6F75743D7472616E73616374696F6E49443A3317:27:01: RADIUS: Received from id 11 1.7.157.1:1823, Access-Accept, len 11517:27:01: Attribute 6 6 0000000117:27:01: Attribute 26 29 000000096517683332332D6372656469742D616D6F756E743D343517:27:01: Attribute 26 27 000000096615683332332D6372656469742D74696D653D333317:27:01: Attribute 26 26 000000096714683332332D72657475726E2D636F64653D3017:27:01: Attribute 25 7 6C6F63616C17:27:01: RADIUS: saved authorization data for user 61AA0698 at 6215087C17:27:09: %ISDN-6-DISCONNECT: Interface Serial0:22 disconnected from 4085554206, calllasted 17 seconds17:27:09: RADIUS: ustruct sharecount=217:27:09: Radius: radius_port_info() success=0 radius_nas_port=117:27:09: RADIUS: Sent class "local" at 621508E8 from user 61AA069817:27:09: RADIUS: Initial Transmit ISDN 0:D:23 id 12 1.7.157.1:1824, Accounting-Request,len 77617:27:09: Attribute 4 6 01081D0317:27:09: Attribute 26 19 00000009020D4953444E20303A443A323317:27:09: Attribute 61 6 0000000017:27:09: Attribute 1 8 31323334353617:27:09: Attribute 30 7 353239383117:27:09: Attribute 31 12 3430383532373432303617:27:09: Attribute 40 6 0000000217:27:09: Attribute 25 7 6C6F63616C17:27:09: Attribute 45 6 0000000117:27:09: Attribute 6 6 0000000117:27:09: Attribute 26 27 000000092115683332332D67772D69643D353330305F34332E17:27:09: Attribute 26 57000000090133683332332D696E636F6D696E672D636F6E662D69643D38463341333136332042343938303030462030203342453731423817:27:09: Attribute 26 31000000091A19683332332D63616C6C2D6F726967696E3D616E7377657217:27:09: Attribute 26 32000000091B1A683332332D63616C6C2D747970653D54656C6570686F6E7917:27:09: Attribute 26 56000000091932683332332D73657475702D74696D653D2A30393A32363A35322E3838302050535420536174204A616E2031203230303017:27:09: Attribute 26 58000000091C34683332332D636F6E6E6563742D74696D653D2A30393A32363A35322E3930372050535420536174204A616E2031203230303017:27:09: Attribute 26 61000000091D37683332332D646973636F6E6E6563742D74696D653D2A30393A32373A31302E3133372050535420536174204A616E2031203230303017:27:09: Attribute 26 32000000091E1A683332332D646973636F6E6E6563742D63617573653D313017:27:09: Attribute 26 28 000000091F16683332332D766F6963652D7175616C6974793D3017:27:09: Attribute 26 4800000009182A683332332D636F6E662D69643D38463341333136332042343938303030462030203342453731423817:27:09: Attribute 44 10 303030303030303517:27:09: Attribute 42 6 0000000017:27:09: Attribute 43 6 00012CA017:27:09: Attribute 47 6 0000000017:27:09: Attribute 48 6 000001E117:27:09: Attribute 46 6 0000001117:27:09: Attribute 26 30 000000090118737562736372696265723D526567756C61724C696E6517:27:09: Attribute 26 3500000009011D683332332D6976722D6F75743D5461726966663A556E6B6E6F776E17:27:09: Attribute 26 22 0000000901107072652D62797465732D696E3D3017:27:09: Attribute 26 23 0000000901117072652D62797465732D6F75743D3017:27:09: Attribute 26 21 00000009010F7072652D70616B732D696E3D3017:27:09: Attribute 26 22 0000000901107072652D70616B732D6F75743D3017:27:09: Attribute 26 22 0000000901106E61732D72782D73706565643D3017:27:09: Attribute 26 22 0000000901106E61732D74782D73706565643D3017:27:09: Attribute 41 6 0000000017:27:09: RADIUS: Received from id 12 10.0.0.1:1824, Accounting-response, len 20
Configuration Examples for PPPoE Service Selection
This section provides the following configuration examples:
•PPPoE Service Selection with ATM QoS and Tunneling Services: Example
•PPPoE Service Selection with Tunneling Services: Example
PPPoE Service Selection with ATM QoS and Tunneling Services: Example
In the following example, three services are configured: gold-isp-A, silver-isp-A, and isp-xyz. The gold and silver services are forwarded onto the same tunnel, but the ATM PVCs between the LAC and DSLAM will be set up with different QoS parameters depending on the level of service chosen. The isp-xyz service offers users access to the services of the xyz Internet service provider.
In this example, the subscriber profile is configured locally on the PPPoE server.
RADIUS Service Profile Configuration
gold-isp-A Password = "cisco", User-Service-type = Outbound-UserTunnel-Assignment-Id = nrp1-3,Cisco-Avpair = "vpdn:tunnel-id=nrp1-3",Cisco-Avpair = "vpdn:tunnel-type=l2tp",Cisco-Avpair = "vpdn:ip-addresses=10.1.1.4",Cisco-Avpair = "atm:peak-cell-rate =2500",Cisco:Cisco-Avpair = "atm:sustainable-cell-rate =400"silver-isp-A Password = "cisco", User-Service-type = Outbound-UserCisco-Avpair = "vpdn:tunnel-id=nrp1-3",Cisco-Avpair = "vpdn:tunnel-type=l2tp",Cisco-Avpair = "vpdn:ip-addresses=10.1.1.4",Cisco:Cisco-Avpair = "atm:peak-cell-rate =1500",Cisco:Cisco-Avpair = "atm:sustainable-cell-rate =200"isp-xyz Password = "cisco", User-Service-type = Outbound-UserCisco-Avpair = "vpdn:tunnel-id=aol",Cisco-Avpair = "vpdn:tunnel-type=l2tp",Cisco-Avpair = "vpdn:ip-addresses=10.1.1.5",Cisco:Cisco-Avpair = "atm:peak-cell-rate =1000",Cisco:Cisco-Avpair = "atm:sustainable-cell-rate =150"PPPoE Server Configuration
!! Configure the AAA default authorization methodaaa new-modelaaa authorization network default local!! Configure the subscriber profilesubscriber profile listApppoe service gold-isp-Apppoe service silver-isp-Apppoe service isp-xyz!! Configure the PPPoE profilebba-group pppoe group-Avirtual-template 1sessions per-vc 5service profile listA!! Attach the PPPoE profile to a PVCinterface atm1/0.1pvc 2/200protocol PPPoE group group-A!PPPoE Service Selection with Tunneling Services: Example
In the following example, PPPoE service selection is used to provide tunneling services only. In this example, the subscriber profile is configured on the RADIUS server.
RADIUS Service Profile Configuration
tunnel-to-cust1 Password = "cisco", User-Service-type = Outbound-UserTunnel-Assignment-Id = nrp1-3,Cisco-Avpair = "vpdn:tunnel-id=nrp1-3",Cisco-Avpair = "vpdn:tunnel-type=l2tp",Cisco-Avpair = "vpdn:ip-addresses=10.1.1.4",tunnel-to-cust2 Password = "cisco", User-Service-type = Outbound-UserCisco-Avpair = "vpdn:tunnel-id=xyz",Cisco-Avpair = "vpdn:tunnel-type=l2tp",Cisco-Avpair = "vpdn:ip-addresses=10.1.1.5",tunnel-to-cust3 Password = "cisco", User-Service-type = Outbound-UserCisco-Avpair = "vpdn:tunnel-id=aol",Cisco-Avpair = "vpdn:tunnel-type=l2tp",Cisco-Avpair = "vpdn:ip-addresses=10.1.1.6",RADIUS Subscriber Profile Configuration
customer-tunnels Password = "cisco", User-Service-type = Outbound-UserCisco:Cisco-Avpair = "pppoe:service-name=tunnel-to-cust1",Cisco:Cisco-Avpair = "pppoe:service-name=tunnel-to-cust2",Cisco:Cisco-Avpair = "pppoe:service-name=tunnel-to-cust3"PPPoE Server Configuration
!! Configure the AAA default authorization methodaaa new-modelaaa authorization network default group radius!! Configure the PPPoE profilebba-group pppoe group-Avirtual-template 1sessions per-vc 5service profile customer-tunnels!! Attach the PPPoE profile to PVCsinterface atm1/0.1pvc 2/200protocol PPPoE group pppoe-group-A!interface atm1/0.2pvc 3/300protocol PPPoE group pppoe-group-AWhere to Go Next
•If you want to establish PPPoE sessions limits for sessions on a specific permanent virtual circuit or VLAN configured on an L2TP access concentrator, refer to the "Establishing PPPoE Session Limits per NAS Port" module.
•If you want to enable an L2TP access concentrator to relay active discovery and service selection functionality for PPPoE over an L2TP control channel to an LNS or tunnel switch, refer to the "Enabling PPPoE Relay Discovery and Service Selection Functionality" module.
•If you want to configure the transfer upstream of the PPPoX session speed value, refer to the "Configuring Upstream Connections Speed Transfer" module.
•If you want to use the Simple Network Management Protocol (SNMP) to monitor PPPoE sessions, refer to the "Monitoring PPPoE Sessions with SNMP." module.
•If you want to identify a physical subscribe line for RADIUS communication with a RADIUS server, refer to the "Identifying a Physical Subscriber Line for RADIUS Access and Accounting" module.
•If you want to configure a Cisco Subscriber Service Switch, refer to the "Configuring Cisco Subscriber Service Switch Policies" module.
Additional References
The following sections provide references related to PPPoE service selection.
Related Documents
Related Topic Document TitleRADIUS configuration
"Configuring RADIUS" chapter of the Cisco IOS Security Configuration Guide, Release 12.3
RADIUS attributes
"RADIUS Attributes" appendix to the Cisco IOS Security Configuration Guide, Release 12.3
Tunneling configuration
"Configuring Virtual Private Networks" chapter of the Cisco IOS Dial Technologies Configuration Guide, Release 12.3
Broadband access aggregation concepts
Understanding Broadband Access Aggregation
Task for preparing for broadband access aggregation.
Preparing for Broadband Access Aggregation
Broadband access commands: complete command syntax, command mode, command history, defaults, usage guidelines, and examples
"Wide-Area Networking Commands chapter in the Cisco IOS Wide-Area Networking Command Reference, Release 12.3
Configuring PPPoE sessions
Providing Protocol Support for Broadband Access Aggregation of PPPoE Sessions
Standards
Standards TitleNo new or modified standards are supported by this feature. Support for existing standards has not been modified by this feature.
—
MIBs
RFCs
Technical Assistance
Feature Information for Offering PPPoE Clients a Selection of Services During Call Setup
Table 3 lists the history of this feature.
Not all commands may be available in your Cisco IOS software release. For details on when support for specific commands was introduced, see the command reference documents.
If you are looking for information on a feature in this technology that is not documented here, see the "Configuring Broadband Access Aggregation Features Roadmap."
Use Cisco Feature Navigator to find information about platform support and software image support. Cisco Feature Navigator enables you to determine which Cisco IOS and Catalyst OS software images support a specific software release, feature set, or platform. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Note Table 3 lists only the Cisco IOS software release that introduced support for a given feature in a given Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS software release train also support that feature.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
© 2008 Cisco Systems, Inc. All rights reserved.