- DHCP Overview
- Configuring the Cisco IOS DHCP Server
- DHCP Server MIB
- Configuring the DHCP Server On-Demand Address Pool Manager
- DHCP Server RADIUS Proxy
- Configuring the Cisco IOS DHCP Relay Agent
- Configuring the Cisco IOS DHCP Client
- DHCP Option 82 Configurable Circuit ID and Remote ID
- Configuring DHCP Services for Accounting and Security
- Configuring DHCP Enhancements for Edge Session Management
- ISSU and SSO--DHCP High Availability Features
- DHCP Option 82 Support for Routed Bridge Encapsulation
- DHCPv6 Bulk-Lease Query
- DHCPv6 Relay and Server - MPLS VPN Support
- DHCPv6 Relay Source Configuration
- IPv6 Access Services: DHCPv6 Relay Agent
- DHCPv6 Server Stateless Autoconfiguration
- IPv6 Access Services: Stateless DHCPv6
- DHCPv6 Repackaging
- IPv6 Access Services: DHCPv6 Prefix Delegation
- DHCPv6 Guard
- Finding Feature Information
- Prerequisites for DHCP Server RADIUS Proxy
- Restrictions for DHCP Server RADIUS Proxy
- Information About DHCP Server RADIUS Proxy
- DHCP Server RADIUS Proxy Overview
- DHCP Server RADIUS Proxy Enhancement
- DHCP Server RADIUS Proxy Architecture
- DHCP Server RADIUS Proxy Enhancement Architecture
- DHCP Server and RADIUS Translations
- RADIUS Profiles for the DHCP Server RADIUS Proxy
- RADIUS Profiles for the DHCP Server RADIUS Proxy Enhancement
- How to Configure DHCP Server RADIUS Proxy
- Configuration Examples for DHCP Server Radius Proxy
- Additional References
- Technical Assistance
- Feature Information for DHCP Server RADIUS Proxy
- Glossary
DHCP Server RADIUS Proxy
The DHCP Server RADIUS Proxy feature is a RADIUS-based address assignment mechanism in which a Dynamic Host Configuration Protocol (DHCP) server authorizes remote clients and allocates addresses based on replies from a RADIUS server.
- Finding Feature Information
- Prerequisites for DHCP Server RADIUS Proxy
- Restrictions for DHCP Server RADIUS Proxy
- Information About DHCP Server RADIUS Proxy
- How to Configure DHCP Server RADIUS Proxy
- Configuration Examples for DHCP Server Radius Proxy
- Additional References
- Technical Assistance
- Feature Information for DHCP Server RADIUS Proxy
- Glossary
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for DHCP Server RADIUS Proxy
Before you can configure the DHCP Server RADIUS Proxy feature, you must be running DHCPv4 or a later version. For information about release and platform support, see the Feature Information for DHCP Server RADIUS Proxy.
Restrictions for DHCP Server RADIUS Proxy
The DHCP Server RADIUS Proxy supports only one address authorization pool on the router.
Information About DHCP Server RADIUS Proxy
- DHCP Server RADIUS Proxy Overview
- DHCP Server RADIUS Proxy Enhancement
- DHCP Server RADIUS Proxy Architecture
- DHCP Server RADIUS Proxy Enhancement Architecture
- DHCP Server and RADIUS Translations
- RADIUS Profiles for the DHCP Server RADIUS Proxy
- RADIUS Profiles for the DHCP Server RADIUS Proxy Enhancement
DHCP Server RADIUS Proxy Overview
The DHCP Server RADIUS Proxy feature is an address allocation mechanism for RADIUS-based authorization of DHCP leases. This feature supports DHCP options 60 and 121.
The process of authorizing the client using the RADIUS server is as follows:
- The DHCP server passes client information to a RADIUS server.
- The RADIUS server returns all required information to the DHCP server as RADIUS attributes.
- The DHCP server translates the RADIUS attributes into DHCP options and sends this information back to RADIUS in a DHCP OFFER message.
- DHCP binding is synchronized after the RADIUS server authorizes the client session.
If a local pool and an authorization pool are configured on the router, the DHCP server can assign addresses from both pools for different client interfaces.
DHCP Server RADIUS Proxy Enhancement
The DHCP Server RADIUS Proxy Enhancement feature is an enhancement to the DHCP Server RADIUS Proxy feature introduced in Cisco IOS Release 15.0(1)S. This feature supports DHCP options 60 and 121.
The process of authorizing the client using the RADIUS server is as follows:
- The DHCP server passes client information to a RADIUS server.
- The RADIUS server returns classname information and other optional information (Session-Timeout and Session-Duration) to the DHCP server as RADIUS attributes.
- The DHCP server assigns the IP address from the specified class, if it is available, and translates any other optional attributes received from the RADIUS server into DHCP options. The information is sent to the DHCP client as a DHCP OFFER message.
- DHCP binding is synchronized after the RADIUS server authorizes the client session.
DHCP Server RADIUS Proxy Architecture
The allocation of addresses in a DHCP and RADIUS proxy architecture occurs in the following sequence:
- The client accesses the network from a residential gateway and sends a DHCP DISCOVER broadcast message to the relay agent. The DHCP DISCOVER message contains the client IP address, hostname, vendor class identifier, and client identifier.
- The relay agent sends a DHCP DISCOVER unicast message with the following information to the router:
- Relay agent information (option 82) with the remote ID suboption containing the inner and outer VLAN IDs.
- Client information in the DHCP DISCOVER packet.
The router determines the address of the DHCP server from the IP helper address on the interface that receives the DHCP packet.
- RADIUS receives an access-request message to translate the DHCP options to RADIUS attributes.
- RADIUS responds with an access-accept message, and delivers the following attributes to the DHCP server:
- Framed-IP-Address
- Framed-IP-Netmask
- Session-Timeout
- Session-Duration
- The DHCP server sends an OFFER unicast message with the following translations from the RADIUS server access-accept message to the client:
- Framed-IP-Address inserted into the DHCP header.
- Framed-IP-Netmask inserted into DHCP option 1 (subnet mask).
- Session-Timeout inserted into DHCP option 51 (IP address lease time).
- Framed-Route that is translated from the standard Cisco Framed-Route format into DHCP option 121 or the DHCP default gateway option (if the network and netmask are appropriate for a default route).
- A copy of relay agent information (option 82). Before the DHCP client receives the packet, the relay removes option 82.
- T1 time set to the Session-Timeout and T2 time set to the Session-Duration.
- The client returns a formal request for the offered IP address to the DHCP server in a DHCP REQUEST broadcast message.
- The DHCP confirms that the IP address is allocated to the client by returning a DHCP ACK unicast message containing the lease information and the DHCP options to the client.
- A RADIUS server accounting request starts, followed by a RADIUS server accounting response that is used by the authentication, authorization, and accounting (AAA) subsystem.
When a RADIUS server attribute is not present in an access-accept message, the corresponding DHCP option is not sent to the DHCP client. If the required information to produce a particular RADIUS server attribute is not available to the DHCP server, the DHCP server does not include information in the RADIUS packet. Noninclusion can be in the form of not sending an attribute (if there is no information at all), or omitting information from the attribute (in the case of CLI-based format strings).
If a DHCP option is provided to the DHCP server but is invalid, the DHCP server may not transmit the corresponding RADIUS attribute in the access-request, or may transmit an invalid RADIUS server attribute.
DHCP Server RADIUS Proxy Enhancement Architecture
The allocation of addresses in a DHCP and RADIUS proxy enhancement architecture occurs in the following sequence:
- The client accesses the network from a residential gateway and sends a DHCP DISCOVER broadcast message to the relay agent. The DHCP DISCOVER message contains the client IP address, hostname, vendor class identifier, and client identifier.
- The relay agent sends a DHCP DISCOVER unicast message with the following information to the router:
- Relay agent information (option 82) with the remote ID suboption containing the inner and outer VLAN IDs.
- Client information in the DHCP DISCOVER packet.
The router determines the address of the DHCP server from the IP helper address on the interface that receives the DHCP packet.
- The RADIUS server receives an access-request message to translate the DHCP options to RADIUS attributes.
- The RADIUS server responds with an access-accept message and delivers the following attributes to the DHCP server:
- Classname
- Session-Timeout (optional)
- Session-Duration (optional)
- The DHCP server identifies the addresses configured under the specified classname and assigns an address to the client.
- The DHCP server sends an OFFER unicast message containing the following translations from the RADIUS server access-accept message to the client:
- Session-Timeout inserted into DHCP option 51 (IP address lease time).
- Framed-Route that is translated from the standard Cisco Framed-Route format into DHCP option 121 or the DHCP default gateway option
- A copy of relay agent information (option 82). Before the DHCP client receives the packet, the relay removes option 82.
- T1 time set to the Session-Timeout and T2 time set to the Session-Duration.
- The client returns a formal request for the offered IP address to the DHCP server in a DHCP REQUEST broadcast message.
- The DHCP server confirms the IP address allocation by sending a DHCP ACK unicast message containing the lease information and the DHCP options to the client.
- A RADIUS server accounting request starts, followed by a RADIUS server accounting response that is used by the AAA subsystem.
Note |
If the classname attribute is not present in the access-accept message received, the DHCP server assumes a default classname and tries to assign the IP address from a default class. The IP address is assigned to the client only if the IP address is available for a default class. |
- If the Framed-IP-Address, Framed-IP-Netmask, Session-Timeout, and Session-Duration attributes are present in the access-accept message, then the classname attribute is ignored and the DHCP server assigns the IP address received in the Framed-IP-Address attribute to the client.
DHCP Server and RADIUS Translations
The table below lists the translations of DHCP options in a DHCP DISCOVER message to attributes in a RADIUS server access-request message.
Table 1 | DCHP DISCOVER to RADIUS Access-Request Translations |
DHCP DISCOVER |
RADIUS Access-Request |
---|---|
Client identifier |
Cisco attribute-value (AV) pair dhcp-client-id that equals the hexadecimal-encoded value of DHCP option 61 |
DHCP relay information option that can contain a VLAN parameter on the D-router |
Cisco AV pair dhcp-relay-info that equals the hexadecimal-encoded value of DHCP option 82 |
Gateway address of the relay agent (giaddr field of a DHCP packet) |
NAS-identifier |
Hostname |
Cisco AV pair client-hostname that equals the value of DHCP option 12 |
Not Applicable |
User-Password as configured on the DHCP server |
Vendor class |
Cisco AV pair dhcp-vendor-class that equals a hexadecimal-encoded value of DHCP option 60 |
Virtual MAC address of the residential gateway |
User-Name |
The table below lists the translations of attributes in a RADIUS server access-accept message to DHCP options in a DHCP OFFER message.
Table 2 | RADIUS Access-Accept to DHCP OFFER Translations |
RADIUS Access-Accept |
DHCP OFFER |
---|---|
Cisco AV pair session-duration in seconds, where seconds is greater than or equal to the number of seconds in the Session-Timeout attribute |
Provides session control on the DHCP server. This attribute is not transmitted to the DHCP client. |
Classname |
Contains a string that specifies the class to be used by the DHCP server in the an address allocation. |
Framed-IP-Address |
IP address of the residential gateway. |
Framed-IP-Netmask |
Subnet mask (option 1). |
Framed-Route (RADIUS attribute 22). One route for each DHCP option is allowed with a maximum of 16 Framed-Route options for a RADIUS packet |
Contains up to 16 classless routes in one option (option 121). |
Session-Timeout |
IP address lease time (option 51). |
RADIUS Profiles for the DHCP Server RADIUS Proxy
When you configure the RADIUS server user profiles for the DHCP server RADIUS proxy, use the following guidelines:
- The Session-Timeout attribute must contain a value, in seconds. If this attribute is not present, the DHCP OFFER is not sent to the client.
- A RADIUS user profile must contain the following attributes:
- Framed-IP-Address
- Framed-IP-Netmask
- Framed-Route
- Session-Timeout
- Session-Duration--Session-Duration is the Cisco AV pair session-duration = seconds, where seconds is the maximum time for the duration of a lease including all renewals. The value for Session-Duration must be greater than or equal to the Session-Timeout attribute value, and it cannot be zero.
- Additional RADIUS server attributes are allowed but are not required. The DHCP server ignores additional attributes that it does not understand. If a RADIUS server user profile contains a required attribute that is empty, the DHCP server does not generate the DHCP options.
RADIUS Profiles for the DHCP Server RADIUS Proxy Enhancement
When you configure the RADIUS server user profiles for the DHCP server RADIUS proxy enhancement for a classname, use the following guidelines:
- The Session-Timeout attribute (if present) must contain a value, in seconds.
- A RADIUS user profile may contain the following attributes:
- Classname (default classname is considered, if this attribute is not present)
- Framed-Route
- Session-Timeout
- Session-Duration--Session-Duration is the Cisco AV pair session-duration = seconds, where "seconds" is the maximum time for the duration of a lease including all renewals. The value for Session-Duration should be greater than or equal to the Session-Timeout attribute value, and it cannot be zero.
- Additional RADIUS server attributes are allowed but are not required. The DHCP server ignores additional attributes that it does not understand.
How to Configure DHCP Server RADIUS Proxy
- Configuring AAA-Related Commands for DHCP Server RADIUS Proxy
- Configuring the DHCP Server for RADIUS Proxy Authorization
- Configuring the DHCP Server Proxy Enhancement
- Monitoring and Maintaining the DHCP Server
Configuring AAA-Related Commands for DHCP Server RADIUS Proxy
Perform this task to configure AAA-related commands required to configure the DHCP Server RADIUS Proxy and DHCP Server RADIUS Proxy Enhancement features.
DETAILED STEPS
Configuring the DHCP Server for RADIUS Proxy Authorization
Perform this task to configure the DHCP Server for RADIUS Proxy feature.
Configure the AAA configuration before configuring the DHCP Server for RADIUS Proxy feature.
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
||
|
Example: Router# configure terminal |
Enters global configuration mode. |
||
|
Example: Router(config)# ip dhcp use class aaa |
Configures the DHCP server to use the AAA server to get the class name. |
||
|
Example: Router(config)# ip dhcp pool pool1 |
Specifies a name for the DHCP server address pool, and enters DHCP pool configuration mode.
|
||
|
Example: Router(dhcp-config)# accounting acct1 |
Enables DHCP accounting.
|
||
|
Example: Router(dhcp-config)# authorization method auth1 |
Enables DHCP authorization.
|
||
|
Example: Router(dhcp-config)# authorization shared-password password1 |
Specifies the password that is configured in the RADIUS user profile. |
||
|
Example: Router(dhcp-config)# authorization username %c-user1 |
Specifies the parameters that RADIUS sends to a DHCP server when downloading configuration information for a DHCP client.
|
||
|
Example: Router(dhcp-config)# exit |
Exits DHCP pool configuration mode. |
Configuring the DHCP Server Proxy Enhancement
Perform this task to configure the DHCP Server Proxy Enhancement feature.
Configure the AAA configuration before configuring the DHCP Server for RADIUS Proxy feature.
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
|
Example: Router# configure terminal |
Enters global configuration mode. |
|
Example: Router(config)# ip dhcp use class aaa |
Specifies to use the AAA server to get class name. |
|
Example: Router(config)# ip dhcp pool pool1 |
Configures a DHCP address pool on a DHCP server and enters DHCP pool configuration mode. |
|
Example: Router(dhcp-config)# accounting list1 |
Enables DHCP accounting on a server group. |
|
Example: Router(dhcp-config)# authorization method list1 |
Specifies a method list to be used for address allocation using RADIUS for DHCP. |
|
Example: Router(dhcp-config)# authorization shared-password password1 |
Specifies the password that RADIUS sends to a DHCP or RADIUS server when downloading configuration information for a DHCP client. |
|
Example: Router(dhcp-config)# authorization username user1 |
Specifies the parameters that RADIUS sends to a DHCP server when downloading configuration information for a DHCP client. |
|
Example: Router(dhcp-config)# exit |
Exits DHCP pool configuration mode and returns to global configuration mode. |
|
Example: Router(config)# ip dhcp pool name2 |
Configures a DHCP address pool on a DHCP server and enters DHCP pool configuration mode. |
|
Example: Router(config)# network 10.0.0.1 255.255.255.0 |
Configures the network number and mask for a DHCP address pool primary or secondary subnet on a Cisco IOS DHCP server. |
|
Example: Router(config)# class name1 |
Associates a class with a DHCP address pool and enters DHCP pool class configuration mode. |
|
Example: Router(config-dhcp-pool-class)# address range 10.0.0.1 10.0.0.5 |
Sets an address range for a DHCP class in a DHCP server address pool. |
Monitoring and Maintaining the DHCP Server
Perform this task to verify and monitor DHCP server information. Once the router is in privileged EXEC mode, you can enter the commands in any order.
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
|
Example: Router# debug ip dhcp server packet |
(Optional) Enables DHCP server debugging. |
|
Example: Router# debug ip dhcp server events |
(Optional) Reports DHCP server events, such as address assignments and database updates. |
|
Example: Router# show ip dhcp binding |
(Optional) Displays a list of all bindings created on a specific DHCP server.
|
|
Example: Router# show ip dhcp server statistics |
(Optional) Displays count information about server statistics and messages sent and received. |
|
Example: Router# show ip dhcp pool |
(Optional) Displays the routes added to the routing table by the DHCP server and relay agent. |
|
Example: Router# show ip route dhcp [address] |
(Optional) Displays information about DHCP address pools. |
Configuration Examples for DHCP Server Radius Proxy
- Example Configuring the DHCP Server for RADIUS Proxy
- Example Configuring RADIUS Profiles for RADIUS Proxy
- Example Configuring the DHCP Server for RADIUS Proxy Enhancement
- Example Configuring RADIUS Profiles for RADIUS Proxy Enhancement
Example Configuring the DHCP Server for RADIUS Proxy
The following example shows how to configure a DHCP server for RADIUS-based authorization of DHCP leases. In this example, DHCP clients can attach to Ethernet interface 4/0/1 and Ethernet subinterface 4/0/3.10. The username string (%c-user1) specifies that the RADIUS server sends the Ethernet address of DHCP client named user1 to the DHCP server.
Router> enable Router# configure terminal Router(config)# service dhcp Router(config)# aaa new-model Router(config)# aaa group server radius rad1 Router(config-sg)# server 10.1.1.1 Router(config-sg)# server 10.1.5.10 Router(config-sg)# exit Router(config)# aaa authorization network auth1 group group1 Router(config)# aaa accounting network acct1 start-stop group group1 Router(config)# aaa session-id common Router(config)# ip dhcp database tftp://172.16.1.1/router-dhcp write-delay 100 timeout 5 ! Router(config)# ip dhcp pool pool_common Router(config-dhcp)# accounting acct1 Router(config-dhcp)# authorization method auth1 Router(config-dhcp)# authorization shared-password cisco Router(config-dhcp)# authorization username %c-user1 Router(config-dhcp)# exit ! Router(config)# interface ethernet 4/0/1 Router(config-if)# ip address 10.0.0.1 255.255.255.0 Router(config-if)# exit Router(config-if)# interface ethernet 4/0/3.10 Router(config-if)# encapsulation dot1q 100 second-dot1q 200 Router(config-if)# ip address 10.1.1.1 255.255.255.0 Router(config-if)# exit Router(config)# radius-server host 10.1.3.2 Router(config)# radius-server key cisco Router(config)# exit
Example Configuring RADIUS Profiles for RADIUS Proxy
The following example shows how to configure a typical RADIUS user profile to send attributes in an access-accept message to the DHCP server:
DHCP-00059A3C7800 Password = "password" Service-Type = Framed, Framed-Ip-Address = 10.3.4.5, Framed-Netmask = 255.255.255.0, Framed-Route = "0.0.0.0 0.0.0.0 10.3.4.1", Session-Timeout = 3600, Cisco:Cisco-Avpair = "session-duration=7200"
Example Configuring the DHCP Server for RADIUS Proxy Enhancement
The following example shows how to configure a DHCP server for RADIUS-based authorization of classname. In this example, DHCP clients can attach to Ethernet interface 4/0/1 and Ethernet subinterface 4/0/3.10. The username string (%c-user1) specifies that the RADIUS server sends the Ethernet address of DHCP client named user1 to the DHCP server.
Router> enable Router# configure terminal Router(config)# service dhcp Router(config)# aaa new-model Router(config)# aaa group server radius rad1 Router(config-sg)# server 10.1.1.1 Router(config-sg)# server 10.1.5.10 Router(config-sg)# exit Router(config)# aaa authorization network auth1 group group1 Router(config)# aaa accounting network acct1 start-stop group group1 Router(config)# aaa session-id commo n Router(config)# ip dhcp database tftp://172.0.2.1/router-dhcp write-delay 100 timeout 5 ! Router(config)# ip dhcp pool pool_common Router(config-dhcp)# accounting acct1 Router(config-dhcp)# authorization method auth1 Router(config-dhcp)# authorization shared-password password1 Router(config-dhcp)# authorization username %c-user1 Router(config-dhcp)# exit ! Router(config)# ip dhcp pool pool_subnet Router(config-dhcp)# network 10.3.4.0 255.255.255.0 Router(config-dhcp)# class class-1 Router(config-dhcp)# address range 10.3.4.1 10.3.4.10 Router(config-dhcp)# exit ! Router(config)# interface ethernet 4/0/1 Router(config-if)# ip address 10.0.0.1 255.255.255.0 Router(config-if)# exit Router(config-if)# interface ethernet 4/0/3.10 Router(config-if)# encapsulation dot1q 100 second-dot1q 200 Router(config-if)# ip address 10.1.1.1 255.255.255.0 Router(config-if)# exit Router(config)# radius-server host 10.1.3.2 Router(config)# radius-server key cisco Router(config)# exit
Example Configuring RADIUS Profiles for RADIUS Proxy Enhancement
The following example shows how to configure a typical RADIUS user profile to send attributes in an access-accept message to the DHCP server:
DHCP-00059A3C7800 Password = "password" Service-Type = Framed, Classname = "class-1" Framed-Route = "0.0.0.0 0.0.0.0 10.3.4.1", Session-Timeout = 3600, Cisco:Cisco-Avpair = "session-duration=7200"
Additional References
Related Documents
Related Topic |
Document Title |
---|---|
Cisco IOS commands |
|
DHCP relay configuration |
Configuring the Cisco IOS DHCP Relay Agent |
DHCP commands: complete command syntax, command mode, command history, defaults, usage guidelines, and examples |
Cisco IOS IP Addressing Services Command Reference |
Standards
Standards |
Title |
---|---|
No new or modified standards are supported, and support for existing standards has not been modified. |
-- |
MIBs
MIBs |
MIBs Link |
---|---|
No new or modified MIBs are supported, and support for existing MIBs has not been modified. |
To locate and download MIBs for selected platforms, Cisco software releases, and feature sets, use Cisco MIB Locator found at the following URL: |
RFCs
RFCs |
Title |
---|---|
No new or modified RFCs are supported, and support for existing RFCs has not been modified. |
-- |
Technical Assistance
Description |
Link |
---|---|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
Feature Information for DHCP Server RADIUS Proxy
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 3 | Feature Information for Cisco IOS DHCP Server Radius Proxy |
Feature Name |
Releases |
Feature Information |
---|---|---|
DHCP Server RADIUS Proxy |
12.2(31)ZV1 12.2(34)SB 12.2(33)XNE 15.0(1)S |
The DHCP Server RADIUS Proxy feature enables a server to authorize remote clients and allocate addresses based on replies from the server. The following commands were modified by this feature: authorization method (DHCP), authorization shared-password , authorization username (DHCP). |
DHCP Radius Proxy Enhancement |
15.0(1)S |
The DHCP Radius Proxy Enhancement feature provides an option to configure the DHCP server to accept either the class name or an IP address to assign to the client. The following commands were introduced or modified: accounting (DHCP), address range, authorization method (DHCP), authorization shared-password, authorization username (DHCP), class (DHCP), network (DHCP). |
Glossary
client --A host trying to configure its interface (obtain an IP address) using DHCP or BOOTP protocols.
DHCP --Dynamic Host Configuration Protocol.
giaddr --gateway IP address. The giaddr field of the DHCP message provides the DHCP server with information about the IP address subnet on which the client is to reside. It also provides the DHCP server with an IP address where the response messages are to be sent.
MPLS --Multiprotocol Label Switching.
relay agent --A router that forwards DHCP and BOOTP messages between a server and a client on different subnets.
server --DHCP or BOOTP server.
VPN --Virtual Private Network. Enables IP traffic to use tunneling to travel securely over a public TCP/IP network.
VRF --VPN routing and forwarding instance. A VRF consists of an IP routing table, a derived forwarding table, a set of interfaces that use the forwarding table, and a set of rules and routing protocols that determine what goes into the forwarding table. In general, a VRF includes the routing information that defines a customer VPN site that is attached to a PE router. Each VPN instantiated on the PE router has its own VRF.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.