- Read Me First
- Overview of ISG
- Configuring ISG Control Policies
- Configuring ISG Access for PPP Sessions
- Configuring ISG Access for IP Subscriber Sessions
- Configuring ISG IPv6 Support
- Configuring MQC Support for IP Sessions
- Configuring ISG Port-Bundle Host Key
- Configuring ISG as a RADIUS Proxy
- Configuring ISG as a RADIUS Proxy in Passthrough Mode
- ISG RADIUS Proxy Support for Mobile Users—Hotspot Roaming and Accounting Start Filtering
- Walk-By User Support in ISG
- ISG L2 Subscriber Roaming
- Configuring RADIUS-Based Policing
- Overview for Framed Route
- ISG Dynamic VLAN Interface Provisioning
- Ambiguous VLAN Support for IP sessions over ISG
- Configuring ISG Policies for Automatic Subscriber Logon
- Configuring DHCP Option 60 and Option 82 with VPN-ID Support for Transparent Automatic Logon
- Enabling ISG to Interact with External Policy Servers
- Configuring ISG Subscriber Services
- Configuring ISG Network Forwarding Policies
- Configuring ISG Accounting
- Configuring ISG Support for Prepaid Billing
- Configuring ISG Policies for Session Maintenance
- Redirecting Subscriber Traffic Using ISG Layer 4 Redirect
- Configuring Layer 4 Redirect Logging
- Configuring ISG Policies for Regulating Network Access
- Configuring ISG Integration with SCE
- Service Gateway Interface
- ISG MIB
- ISG SSO and ISSU
- ISG Debuggability
- Troubleshooting ISG with Session Monitoring and Distributed Conditional Debugging
- Configuring ISG Troubleshooting Enhancements
- Gx Diameter Support for ISG sessions
- DHCPv6 Support for ISG
- Finding Feature Information
- Prerequisites for RADIUS-Based Policing
- Restrictions for RADIUS-Based Policing
- Information About RADIUS-Based Policing
- Parameterized QoS Policy as VSA 1
- Parameterization of QoS ACLs
- HA Support for RADIUS-Based Policing
Configuring RADIUS-Based Policing
The RADIUS-Based Policing feature enables Intelligent Services Gateway (ISG) to make automatic changes to the policing rate of specific sessions and services.
- Finding Feature Information
- Prerequisites for RADIUS-Based Policing
- Restrictions for RADIUS-Based Policing
- Information About RADIUS-Based Policing
- How to Configure RADIUS-Based Policing
- Configuration Examples for RADIUS-Based Policing
- Additional References
- Feature Information for RADIUS-Based Policing
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for RADIUS-Based Policing
You must configure all traffic classes on the ISG before referencing the classes in policy maps.
You must configure and apply QoS policy maps on the ISG before the ISG can construct and apply an ANCP-based dynamic service policy.
Restrictions for RADIUS-Based Policing
-
Per-service policing cannot be configured on the class-default class at the parent level of a hierarchical policy. You can configure per-service policing on class-default classes at the child or grandchild level.
-
Transient policies are not visible in the running-configuration file. Only the original policy configuration is visible.
-
The parameterized Access Control List (pACL) name is limited to 80 characters. The pACL name is formed by concatenating the ACL entries in the RADIUS CoA or Access-Accept message to the ACL name configured on the ISG. If the pACL name exceeds 80 characters the parameterization operation fails and an error message displays. For a CoA message, the ISG also sends a negative Ack (Nack) response to the RADIUS server.
-
The RADIUS-Based Policing feature is supported only on PPP Termination and Aggregation (PTA) sessions in Cisco IOS Release XE 3.1 and earlier releases; it is supported on L2TP access concentrator (LAC) or L2TP network server (LNS) sessions in Cisco IOS Release XE 3.2 and later releases.
-
If there is a concatenated service-activation push, QoS policies are applied first and then service activation occurs. If a concatenated service activation fails, any QoS policies applied are not rolled back.
-
Ensure that the classmap name specified for a policy-map configuration used to create pACL and class-map does not contain an hyphen (-) character.
Information About RADIUS-Based Policing
- RADIUS Attributes
- Parameterized QoS Policy as VSA 1
- Parameterization of QoS ACLs
- HA Support for RADIUS-Based Policing
RADIUS Attributes
RADIUS communicates with ISG by embedding specific attributes in Access-Accept and change of authentication (CoA) messages. RADIUS-based shaping and policing employs this exchange of attributes to activate and deactivate services and to modify the active quality of service (QoS) policy applied to a session. The RADIUS server determines the new shaping or policing rate based on vendor-specific attributes (VSAs) configured in a subscriber’s user profile on RADIUS and on the Advanced Node Control Protocol (ANCP)-signaled rate received from ISG.
After receiving the Access-Accept or CoA message, ISG copies the original policy map applied to the session and changes the shaping or policing rate of the copied, transient policy as indicated by RADIUS. ISG does not change the shaping rate of the original policy. After changing the transient policy, ISG applies the transient policy to the subscriber service.
The following sections describe the RADIUS attributes used in RADIUS-based policing:
RADIUS Attributes 250 and 252
RADIUS uses attribute 250 in Access-Accept messages and attribute 252 in CoA messages to activate and deactivate parameterized services. ISG services are configured locally on the ISG device; RADIUS sends only the service name.
Attributes 250 and 252 have the following syntax for service activation:
Access-Accept Messages
250 "Aservice(parameter1=value,parameter2=value,...)"
CoA Messages
252 0b "service(parameter1=value,parameter2=value,...)"
RADIUS uses only Attribute 252 in a CoA message when deactivating a service. RADIUS sends the same information in Attribute 252 that was used for service activation, except that service deactivation uses 0c in the syntax instead of the 0b parameter used for service activation.
252 0xC "service(parameter1=value,parameter2=value,...)"
VSA 252 has the above syntax for service deactivation.
Cisco VSA 1
RADIUS uses a vendor-specific attribute (VSA) 1 command to modify the active QoS policy on a session. This VSA has the following format:
av-pair = "policy-type=command 9 parameter1 ,...,parametern"
Use the following Cisco VSA 1 format to add and remove classes and QoS actions to and from the QoS policy that is currently active on a session:
qos-policy-in=add-class(target,(class-list),qos-actions-list) qos-policy-out=add-class(target,(class-list),qos-actions-list) qos-policy-in=remove-class(target,(class-list)) qos-policy-out=remove-class(target,(class-list))
Before the ISG can construct a policy using the policing parameters specified in the RADIUS message, a QoS policy must be active on the session. If a QoS policy is not active in the specified direction, the ISG does not create the policy.
When implementing the changes specified in the Cisco VSA, the ISG does not make the changes to the originally configured QoS policy on the ISG device. Instead, the ISG copies the active QoS policy for the session and then makes the required changes to the policy copy, which is referred to as a transient policy . The originally configured QoS policy on the ISG device is not changed.
The following sections describe the Cisco VSA 1 commands used to automatically modify policing parameters of active policies:
Add-Class Primitive
To add or modify QoS actions to a traffic class, use the add-class primitive. This attribute has the following format:
qos-policy-in=add-class(target,(class-list),qos-actions-list) qos-policy-out=add-class(target,(class-list),qos-actions-list)
target field—Indicates the QoS policy to be modified. The only valid value for this field is sub, which indicates the active QoS policy attached to the subscriber session. The Access-Accept or CoA message that includes this attribute must be targeting a subscriber session.
class-list field—A list of class names enclosed in parentheses that identifies the traffic class to which the specified QoS action applies. The class names you specify must be either user-configured class maps or the system-generated class-default class. The order in which you specify the class names indicates the hierarchical level of the class within the QoS policy.
For example, the following class list identifies the class named “voip”, which gets added to a nested policy. The VoIP class is configured in a nested child policy that is applied to the parent class-default class.
(class-default, voip)
ISG Configuration
policy-map child class voip police 8000 policy-map parent class class-default service-policy child
The following class list specifies the voip-2 class, which is configured in a nested policy that is applied to the voip-aggregate class of another nested child policy. The policy containing the voip-aggregate class is in turn nested under the class-default class of the QoS policy attached to the target session.
(class-default, voip-aggregate, voip-2)
MSQ Configuration
policy-map child2 class voip-2 police 8000 policy-map child1 class voip-aggregate police 20000 service-policy child2 policy-map parent class class-default shape 512000 service-policy child1
The qos-actions-list field indicates a QoS action such as police, followed by the action parameters enclosed in parentheses and separated by commas. For example, the following sample configuration specifies the police action and defines the parameters bps, burst-normal, burst-max, conform-action, exceed-action, and violate-action. Parentheses enclose the action parameters.
(voip-aggregate police(200000,9216,0,transmit,drop,drop))
Note | The example shows a double-parenthesis at the end, because the syntax of the VSA specifies enclosure of the target, class-list, and qos-actions-list in parentheses. |
Remove-Class Primitive
To remove traffic classes and QoS actions defined in the active QoS policy on a session, use the remove-class primitive. This attribute has the following format:
qos-policy-in=remove-class(target,(class-list)) qos-policy-out=remove-class(target,(class-list))
target field—Indicates the QoS policy to be modified. The only valid value for this field is sub, which indicates the active QoS policy attached to the subscriber session. The Access-Accept or CoA message that includes this attribute must be targeting a subscriber session.
class-list field—A list of class names enclosed in parentheses that identifies the class or classes to be removed. The class names you specify must be either user-configured class maps or the system-generated class-default class. The order in which you specify the class names indicates the hierarchical level of the class within the QoS policy.
For example, the following VSA1 attribute removes the Bronze class and all associated QoS policy actions from the nested child policy that is applied to the parent class-default class:
qos-policy-out=remove-class(sub,(class-default,Bronze))
When you remove a traffic class from a QoS policy, all of the attributes for the class are also removed. To re-add the class with the same attributes, you must reissue the add-class RADIUS attribute and provide the required parameters and values.
Parameterized QoS Policy as VSA 1
Multiple complex strings in a CoA message are not supported because they do not display the correct behavior of VSA 1, as shown in the following example:
vsa cisco 250 S152.1.1.2 vsa cisco generic 252 binary 0b suffix "q-p-out=IPOne1-isg-acct1(1)((c-d,tv)1(10000))" vsa cisco generic 252 binary 0b suffix "q-p-out=IPOne1-isg-acct(1)((c-d,voip)1(10000))"
In the example:
Parameterization of QoS ACLs
The Parameterization of QoS Access Control Lists (ACLs) feature supports multiple ISG and QoS parameterized services in a single Access-Accept or CoA message. This feature allows the authentication, authorization, and accounting (AAA) device to change parameters dynamically.
HA Support for RADIUS-Based Policing
The ISG Policy HA and RADIUS-Based Policing HA feature adds stateful switchover (SSO) and In Service Software Upgrade (ISSU) support to ISG RADIUS-Based Policing for QoS parameterization that is configured through template services.
For information about modifying QoS policy maps by using template services, see the “QoS Policy Accounting” module in the QoS: Policing and Shaping Configuration Guide, Cisco IOS XE Release 3S.
For information about configuring High Availability (HA) on the ISG router, see the High Availability Configuration Guide, Cisco IOS XE Release 3S.
How to Configure RADIUS-Based Policing
Configuring per-Session Shaping
Configuring a QoS Policy with Shaping on ISG
1.
enable
2.
configure
terminal
3.
policy-map
policy-map-name
4.
class
class-default
5.
shape
average
mean-rate
[burst-size] [excess-burst-size] [account {qinq |
dot1q |
user-defined
offset}
aal5
subscriber-encap]
6.
service-policy
policy-map-name
7.
end
DETAILED STEPS
Configuring per-Session Shaping on RADIUS
To use RADIUS to set the shaping rate for a subscriber session, configure the following Cisco VSA in the user profile on RADIUS:
vsa cisco generic 1 string “qos-policy-out=add-class(sub,(class-default), shape(rate))”
When the ISG receives a RADIUS Access-Accept or change of authentication (CoA) message with this VSA included, the ISG copies the currently configured policy map applied on the session and changes the shaping rate of the transient parent class-default class to the shaping rate specified in the VSA. The ISG makes changes only to the transient policy; no changes are made to the original policy map. After changing the transient policy, the ISG applies the transient policy to the subscriber session.
Configuring per-Service Shaping and Policing
Configuring a Hierarchical QoS Child Policy with Shaping and Policing on ISG
1.
enable
2.
configure
terminal
3.
policy-map
policy-map-name
4.
class
class-name
5.
shape
average
mean-rate
[burst-size] [excess-burst-size] [account {qinq |
dot1q |
user-defined
offset}
aal5
subscriber-encap]
6.
police
bps
[burst-normal] [burst-max]
conform-action
action
exceed-action
action [violate-action
action]
7.
end
DETAILED STEPS
Configuring a Hierarchical QoS Parent Policy with Shaping and Policing on ISG
1.
enable
2.
configure
terminal
3.
policy-map
policy-map-name
4.
class
class-default
5.
shape
average
mean-rate
[burst-size] [excess-burst-size] [account {qinq |
dot1q |
user-defined
offset }
aal5
subscriber-encap ]
6.
service-policy
policy-map-name
7.
exit
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable
Example: Router> enable |
Enables privileged EXEC mode. |
Step 2 |
configure
terminal
Example: Router# configure terminal |
Enters global configuration mode. |
Step 3 |
policy-map
policy-map-name
Example: Router(config-pmap)# policy-map parent |
Creates or modifies a policy map. |
Step 4 |
class
class-default
Example: Router(config-pmap)# class class-default |
Modifies the class-default traffic class and enters policy-map class configuration mode. |
Step 5 |
shape
average
mean-rate
[burst-size] [excess-burst-size] [account {qinq |
dot1q |
user-defined
offset }
aal5
subscriber-encap ]
Example: Router(config-pmap-c)# shape average 10000 |
Shapes traffic to the indicated bit rate. |
Step 6 |
service-policy
policy-map-name
Example: Router(config-pmap-c)# service-policy child |
Applies the child policy map to the parent class-default class. |
Step 7 |
exit
Example: Router(config-pmap-c)# exit |
Exits policy-map class configuration mode. |
Configuring per-Service Shaping and Policing on RADIUS
To use RADIUS to set the shaping and policing rate for a subscriber service, configure the following Cisco VSAs in the service profile on RADIUS:
vsa cisco generic 1 string "qos-policy-out=add-class(sub,(class-list), shape(rate))" vsa cisco generic 1 string "qos-policy-out=add-class(sub,(class-list), police(rate))"
When the ISG receives a RADIUS Access-Accept or CoA message with these VSAs included, the ISG copies the originally configured policy map that is active on the session and changes the shaping or policing rate of the traffic class specified in the class-list field. The ISG makes changes only to the transient policy and applies the transient policy to the subscriber service; no changes are made to the original policy map.
Note | Per-service shaping and policing do not apply to the parent class-default class. |
For more information, see the “RADIUS Attributes” section.
Verifying RADIUS-Based Policing
To verify the configuration of RADIUS-based policing on the ISG, use any of the following commands in privileged EXEC mode.
Command |
Purpose |
---|---|
show policy-map interface |
Displays the configuration of all classes configured for all policy maps attached to all interfaces. |
show policy-map interface interface [input | output]] |
Displays the configuration of all classes configured for all inbound or outbound policy maps attached to the specified interface.
|
show policy-map policy-map-name |
Displays the configuration of all of the traffic classes contained in the policy map you specify. |
show policy-map policy-map-name class class-name |
Displays the configuration of the class you specify. The policy map you specify includes this class.
|
show policy-map session [output | output | uid] |
Displays the inbound or outbound policy maps configured per session. Also displays the dynamic policy map that is applied to the subscriber session. If you do not specify any arguments, the command shows all sessions with configured policy maps, which might impact performance. |
show running-config |
Displays the running-configuration file, which contains the current configuration of the router, including the default QoS policy. |
show running-config interface interface |
Displays the configuration of the interface you specify that is currently configured in the running-config file, including any service policies attached to the interface. |
Configuration Examples for RADIUS-Based Policing
- Example: Adding Parameterization of QoS ACLs
- Example: Setting the Shaping Rate Using an Access-Accept Message
- Example: Setting the Shaping Rate Using a CoA Message
- Example: Setting the Policing Rate Using an Access-Accept Message
- Example: Setting the Policing Rate Using a CoA Message
Example: Adding Parameterization of QoS ACLs
The following example shows how to parameterize the set source IP address and destination IP address parameter, set-src-dst-ip-in-acl, through CoA or Access-Accept messages. The QoS parameterized service is added in the parameterized QoS service RADIUS form:
VSA252 0b q-p-out=IPOne(1)((c-d,voip)13(10.10.1.0/28,10.3.20/29)) ! The above command activates the service in a CoA message. vsa cisco generic 1 string "qos-policy-out=add-class(sub,(class-default,voip),set-src-dst-ip-in-acl(10.10.1.0/28,10.3.20/29))" ! The above command activates the service in a Access-Accept message.
The router is configured as follows:
ip access-list extended IPOne-acl remark Voice-GW permit ip host 10.0.1.40 any ! class-map match-any voip match access-group name IPOne-acl ! class-map type traffic match-any IPOne match access-group output name IPOne-acl match access-group input name IPOne-acl ! ! policy-map type service IPOne 10 class type traffic IPOne accounting aaa list default ! ! policy-map output_parent class class-default police 32000 32000 32000 conform-action transmit exceed-action drop violate-action drop service-policy output_child ! ! policy-map output_child class voip police 32000 32000 32000 conform-action transmit exceed-action drop violate-action drop ! ! ! ! RADIUS relays the string for service activation. After the VSA is received, a new ACL is created. ip access-list extended IPOne-acl-10.10.1.0/28,10.3.20/29 remark Voice-GW permit ip host 10.0.1.40 any permit ip 10.10.1.0 0.0.0.15 any permit ip any 10.10.1.0 0.0.0.15 permit ip 10.3.2.0 0.0.0.7 any permit ip any 10.3.2.0 0.0.0.7 ! ! A new class map is created. class-map match-any voip-10.10.1.0/28,10.3.20/29 match access-group name IPOne-acl-10.10.1.0/28,10.3.20/29 ! ! The old class is replaced with the new class in the output QoS policy of the subscriber, along with any other attributes.
Adding Parameterization of QoS ACLs with ISG Service Accounting
The following example shows how to add QoS accounting by configuring the ISG accounting service:
policy-map type service IPOne 10 class type traffic IPOne accounting aaa list default ! class type traffic default in-out ! ! ! After the VSA is received, a new traffic class map is created on the service. class-map type traffic match-any IPOne-10.10.1.0/28,10.3.2.0/29 match access-group output name IPOne-acl-10.10.1.0/28$10.3.2.0/29 match access-group input name IPOne-acl-10.10.1.0/28$10.3.2.0/29 ! ! A new ISG service is created. policy-map type service IPOne(tc_in=IPOne-acl-10.10.1.0/28$10.3.2.0/29) 10 class type traffic IPOne-10.10.1.0/28,10.3.2.0/29 accounting aaa list default ! class type traffic default in-out !
Example: Setting the Shaping Rate Using an Access-Accept Message
The examples in this section illustrate how to set the shaping rate of a session using an access-accept message.
ISG Original Policy
This configuration example uses a RADIUS Access-Accept message to change the shaping rate of a session:
class-map match-any Premium match access-group name Premium_Dest ! policy-map Child class Premium shape average 5000 ! policy-map Parent class class-default shape average 10000 service-policy Child ! ip access-list extended Premium_Dest permit ip any 192.168.6.0 0.0.0.255 permit ip any 192.168.5.7 0.0.0.64
RADIUS Configuration
The following Cisco VSA is configured in a user profile on RADIUS. This VSA adds the class-default class to the QoS policy attached to the subscriber session for outbound traffic and shapes the class-default class to 120,000 bps.
radius subscriber 6 framed protocol ppp service framed vsa cisco generic 1 string "qos-policy-out=add-class(sub,(class-default), shape(120000))" [New shaping rate]
RADIUS Access-Accept Message
The ISG receives the following RADIUS Access-Accept message. Notice that the above Cisco VSA configured in the user’s profile is present in the Access-Accept message and that the parent shaping rate has changed to 120,000.
1d21h: RADIUS: Received from id 1645/3 192.168.1.6:1812, Access-Accept, len 100 1d21h: RADIUS: authenticator 4A 2C F7 05 4B 88 38 64 - DE 60 69 5A 4B EE 43 E1 1d21h: RADIUS: Framed-Protocol [7] 6 PPP [1] 1d21h: RADIUS: Service-Type [6] 6 Framed [2] 1d21h: RADIUS: Vendor, Cisco [26] 68 1d21h: RADIUS: Cisco AVpair [1] 62 "qos-policy-out=add-class(sub,(class-default), shape(120000))" 1d21h: RADIUS(0000000D): Received from id 1645/3 1d21h: SSS PM [uid:4][65ADE2E8]: SERVICE: Adding Service attachment to event 1d21h: RADIUS/ENCODE(0000000D):Orig. component type = PPoE 1d21h: RADIUS(0000000D): Config NAS IP: 0.0.0.0 1d21h: RADIUS(0000000D): sending
ISG Transient Policy
The ISG copies the service policy named Parent currently applied to the session and creates a transient copy named New_Parent. While the parent shaping rate, as previously shown, changes to 120,000, the shaping rate displayed in the transient New_Parent policy is the old rate of 10,000, as seen in the following example. The child policy remains unchanged.
policy-map New_Parent [New cloned parent policy] class class-default shape average 10000 service-policy Child
Example: Setting the Shaping Rate Using a CoA Message
The examples in this section illustrate how to set the shaping rate of a session using a CoA message.
ISG Original Policy
This configuration example uses a RADIUS CoA message to change the shaping rate of a session:
class-map match-any Premium match access-group name Premium_Dest ! policy-map Child class Premium shape average 5000 ! policy-map Parent class class-default shape average 10000 service-policy Child ! ip access-list extended Premium_Dest permit ip any 192.168.6.0 0.0.0.255 permit ip any 192.168.5.7 0.0.0.64
RADIUS Configuration
The following Cisco VSA is configured in a user profile on RADIUS. This VSA adds the class-default class to the QoS policy attached to the subscriber session for outbound traffic and shapes the class-default class to 120,000 bps.
radius subscriber 1047 vsa cisco 250 S192.168.1.2 vsa cisco generic 1 string "qos-policy-out=add-class(sub,(class-default), shape(120000))" [New shaping rate]
RADIUS CoA Message
The ISG receives the following RADIUS CoA message. Notice that the Cisco VSA configured in the user’s profile above is present in the CoA message.
1d21h: RADIUS: COA received from id 0 192.168.1.6:1700, CoA Request, len 106 1d21h: COA: 192.168.1.6 request queued 1d21h: RADIUS: authenticator FF A2 6B 63 06 F0 E6 A3 - 0D 04 6C DC 01 0A BE F1 1d21h: RADIUS: Vendor, Cisco [26] 18 1d21h: RADIUS: ssg-account-info [250] 12 "S192.168.1.2" 1d21h: RADIUS: Vendor, Cisco [26] 68 1d21h: RADIUS: Cisco AVpair [1] 62 "qos-policy-out=add-class(sub,(class-default), shape(120000))" 1d21h: ++++++ CoA Attribute List ++++++ 1d21h: 63C829B0 0 00000009 ssg-account-info(427) 10 S192.168.1.2 1d21h: 63C82A18 0 00000009 qos-policy-out(378) 45 add-class(sub,(class-default), shape(120000)) 1d21h: ISG# 1d21h: RADIUS(00000000): sending 1d21h: RADIUS(00000000): Send CoA Ack Response to 192.168.1.6:1700 id 0, len 65 1d21h: RADIUS: authenticator 62 B4 B0 1A 90 10 01 01 - F6 C8 CD 17 79 15 C7 A7 1d21h: RADIUS: Vendor, Cisco [26] 18 1d21h: RADIUS: ssg-account-info [250] 12 "S192.168.1.2" 1d21h: RADIUS: Vendor, Cisco [26] 27 1d21h: RADIUS: ssg-account-info [250] 21 "$IVirtual-Access2.2"
ISG Transient Policy
The ISG copies the service policy named Parent currently applied to the session and creates a transient copy named New_Parent to which it makes the appropriate changes. Based on the Cisco VSA included in the CoA message, the ISG changes the shaping rate of the parent class-default class to 120,000 bps. However, the shaping rate displayed in the transient New_Parent policy is the old rate of 10,000, as seen in the following example. The child policy remains unchanged.
policy-map Child class Premium shape average 5000 policy-map New_Parent [New cloned parent policy] class class-default shape average 10000 service-policy Child
Example: Setting the Policing Rate Using an Access-Accept Message
The examples in this section illustrate how to set the policing rate of a traffic class using an access-accept message.
ISG Original Policy
This configuration example uses a RADIUS Access-Accept message to change the policing rate of a traffic class at the child level of a hierarchical policy:
class-map match-any Premium match access-group name Premium_Dest ! policy-map Child class Premium shape average 5000 ! policy-map Parent class class-default shape average 10000 service-policy Child ! ip access-list extended Premium_Dest permit ip any 192.168.6.0 0.0.0.255 permit ip any 192.168.5.7 0.0.0.64
RADIUS Configuration
The following Cisco VSA is configured in a user profile on RADIUS. This VSA changes the policing rate of the Premium class in the Child policy. The Child policy is applied to the class-default class of the Parent policy.
radius subscriber 6 framed protocol ppp service framed vsa cisco generic 1 string "qos-policy-out=add-class(sub,(class-default, Premium), police(200000))"
RADIUS Access-Accept Message
The ISG receives the following RADIUS Access-Accept message. Notice that the above Cisco VSA configured in the user’s profile is present in the Access-Accept message.
1d21h: RADIUS: Received from id 1645/3 192.168.1.6:1812, Access-Accept, len 100 1d21h: RADIUS: authenticator 4A 2C F7 05 4B 88 38 64 - DE 60 69 5A 4B EE 43 E1 1d21h: RADIUS: Framed-Protocol [7] 6 PPP [1] 1d21h: RADIUS: Service-Type [6] 6 Framed [2] 1d21h: RADIUS: Vendor, Cisco [26] 68 1d21h: RADIUS: Cisco AVpair [1] 62 "qos-policy-out=add-class(sub,(class-default, Premium), police(200000))" 1d21h: RADIUS(0000000D): Received from id 1645/3 1d21h: SSS PM [uid:4][65ADE2E8]: SERVICE: Adding Service attachment to event 1d21h: RADIUS/ENCODE(0000000D):Orig. component type = PPoE 1d21h: RADIUS(0000000D): Config NAS IP: 0.0.0.0 1d21h: RADIUS(0000000D): sending
ISG Transient Policy
The ISG copies the service policy that is currently applied to the session and creates a transient policy named New_Parent to which it makes the appropriate changes. Based on the Cisco VSA included in the Access-Accept message, the ISG adds the policing rate to the Premium traffic class. The Premium class is configured in the transient New_Child policy, which is applied to the New_Parent class-default class.
policy-map New_Child [New cloned child policy] class Premium police 200000 [New policing rate] shape average 5000 ! policy-map New_Parent [New cloned parent policy] class class-default shape average 10000 service-policy New_Child [New cloned child policy attached to the new cloned parent policy]
Example: Setting the Policing Rate Using a CoA Message
The examples in this section illustrate how to set the policing rate of a service using a CoA message.
ISG Original Policy
This configuration example uses a RADIUS CoA message to change the policing rate of a service and is based on the following ISG configuration:
policy-map Child class Premium police 12000 ! policy-map Parent class class-default shape average 10000 service-policy Child
RADIUS Configuration
The following Cisco VSA is configured in a user’s profile on RADIUS. This VSA modifies the Premium class of the Child policy, which is applied to the class-default class of the Parent policy.
radius subscriber 1048 vsa cisco 250 S192.168.1.10 vsa cisco generic 1 string "qos-policy-out=add-class(sub,(class-default, Premium), police(200000))"
RADIUS CoA Message
The ISG receives the following RADIUS CoA message. Notice that the Cisco VSA configured in the user profile above is present in the CoA message.
1d21h: RADIUS: COA received from id 0 192.168.1.6:1700, CoA Request, len 106 1d21h: COA: 192.168.1.6 request queued 1d21h: RADIUS: authenticator FF A2 6B 63 06 F0 E6 A3 - 0D 04 6C DC 01 0A BE F1 1d21h: RADIUS: Vendor, Cisco [26] 18 1d21h: RADIUS: ssg-account-info [250] 12 "S192.168.1.10" 1d21h: RADIUS: Vendor, Cisco [26] 68 1d21h: RADIUS: Cisco AVpair [1] 62 "qos-policy-out=add-class(sub,(class-default, Premium), police(200000))" 1d21h: ++++++ CoA Attribute List ++++++ 1d21h: 63C829B0 0 00000009 ssg-account-info(427) 10 S192.168.1.10 1d21h: 63C82A18 0 00000009 qos-policy-out(378) 45 add-class(sub,(class-default, Premium), police(200000)) 1d21h: ISG# 1d21h: RADIUS(00000000): sending 1d21h: RADIUS(00000000): Send CoA Ack Response to 192.168.1.6:1700 id 0, len 65 1d21h: RADIUS: authenticator 62 B4 B0 1A 90 10 01 01 - F6 C8 CD 17 79 15 C7 A7 1d21h: RADIUS: Vendor, Cisco [26] 18 1d21h: RADIUS: ssg-account-info [250] 12 "S192.168.1.10" 1d21h: RADIUS: Vendor, Cisco [26] 27 1d21h: RADIUS: ssg-account-info [250] 21 "$IVirtual-Access2.2"
ISG Transient Policy
The ISG copies the service policy named Parent currently applied to the session and creates a transient copy named New_Parent to which it makes the appropriate changes. Based on the Cisco VSA included in the Access-Accept message, the ISG changes the policing rate of the Premium traffic class from 5000 bps to 200,000 bps. The Premium class is configured in the New_Child policy, which is applied to the New_Parent class-default class.
policy-map New_Child [New cloned child policy] class Premium police 200000 [New policing rate] ! policy-map New_Parent [New cloned parent policy] class class-default shape average 10000 service-policy New_Child [New cloned child policy attached to the new cloned parent policy]
Additional References
Related Documents
Related Topic |
Document Title |
---|---|
Cisco IOS commands |
|
ISG commands |
|
HA commands |
|
HA configuration |
High Availability Configuration Guide |
QoS Policy Configuration |
QoS: Policing and Shaping Configuration Guide |
Technical Assistance
Description |
Link |
---|---|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
Feature Information for RADIUS-Based Policing
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Feature Name |
Releases |
Feature Information |
---|---|---|
ISG: Policy Control: Policy Server: RADIUS-Based Policing |
Cisco IOS XE Release 2.4 |
The RADIUS-Based Policing feature extends ISG functionality to allow the use of a RADIUS server to provide subscriber policy information. In Cisco IOS XE Release 2.4, support was added for the Cisco ASR 1000 Series Router. |
RADIUS-Based Policing Attribute Modifications |
Cisco IOS XE Release 2.4 |
The RADIUS-Based Policing Attribute Modifications feature allows the RADIUS server to communicate with the ISG by embedding specific attributes in Access-Accept and CoA messages. RADIUS-based shaping and policing employs this exchange of attributes to activate and deactivate services, and to modify the active QoS policy applied to a session. In Cisco IOS XE Release 2.4, support was added for the Cisco ASR 1000 Series Router. |
Parameterization of QoS ACLs |
Cisco IOS XE Release 2.4 |
The Parameterization of QoS ACLs feature provides enhancements for QoS ACLs. This feature allows the AAA device to change parameters dynamically. In Cisco IOS XE Release 2.4, support was added for the Cisco ASR 1000 Series Router. |
ISG Policy HA and RaBaPol HA |
Cisco IOS XE Release 3.5S |
Adds SSO and ISSU support to ISG RADIUS-based policing. |