- Any Transport over MPLS
- L2VPN Interworking
- L2VPN Pseudowire Preferential Forwarding
- L2VPN Multisegment Pseudowires
- QoS Policy Support on L2VPN ATM PVPs
- MPLS Pseudowire Status Signaling
- IEEE 802.1Q Tunneling QinQ for AToM
- Configuring the Managed IPv6 Layer 2 Tunnel Protocol Network Server
- L2VPN Pseudowire Switching
- H VPLS N PE Redundancy for QinQ and MPLS Access
- Configuring Virtual Private LAN Services
- Finding Feature Information
- Prerequisites for Configuring the Managed IPv6 LNS
- Restrictions for Configuring the Managed IPv6 LNS
- Information About Configuring the Managed IPv6 LNS
- How to Configure the Managed LNS
- Configuring a VRF on the LNS
- Configuring a Virtual Template Interface
- Assigning a VRF via the RADIUS Server
- Configuring the LNS to Initiate and Receive L2TP Traffic
- Limiting the Number of Sessions per Tunnel
- Configuring RADIUS Attribute Accept or Reject Lists
- Configuring AAA Accounting Using Named Method Lists
- Configuring RADIUS Tunnel Authentication Method Lists on the LNS
- Configuring the LNS for RADIUS Tunnel Authentication
- Configuring RADIUS Tunnel Authentication Method Lists on the LNS
- Configuring AAA Authentication Methods
- Configuration Examples for the Managed IPv6 Layer 2 Tunnel Protocol Network Server
- Additional References
- Feature Information for Configuring Managed IPv6 Layer 2 Tunnel Protocol Network Server
Configuring the Managed IPv6 Layer 2 Tunnel Protocol Network Server
This document describes how to enable the Managed IPv6 Layer 2 Tunnel Protocol Network Server feature.
- Finding Feature Information
- Prerequisites for Configuring the Managed IPv6 LNS
- Restrictions for Configuring the Managed IPv6 LNS
- Information About Configuring the Managed IPv6 LNS
- How to Configure the Managed LNS
- Configuration Examples for the Managed IPv6 Layer 2 Tunnel Protocol Network Server
- Additional References
- Feature Information for Configuring Managed IPv6 Layer 2 Tunnel Protocol Network Server
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring the Managed IPv6 LNS
For the router to function as an LNS, you must enable Authentication, Authorization, and Accounting (AAA) on the Layer 2 Tunnel Protocol Network Server (LNS) and the Layer 2 Access Concentrator (LAC), by entering the aaanew-model global configuration command. For more information, see the " Authentication, Authorization, and Accounting " chapter in the Cisco IOS XE Security: Securing User Services Configuration Guide .
Restrictions for Configuring the Managed IPv6 LNS
Only PPP session termination into Virtual Routing and Forwarding (VRF)-lite is supported. PPP session termination into an Multiprotocol Label Switching (MPLS)-VPN is not supported.
Information About Configuring the Managed IPv6 LNS
L2TP Network Server
The router can function as an LNS. The LNS is a peer to the LAC and sits on one side of an L2TP tunnel. The LNS routes packets to and from the LAC and a destination network. When the router functions as an LNS, you can configure the router to terminate the PPP sessions and route the client IP packets onto the ISP or corporate network toward their final destination (see the figure below). The router can use the Managed IPv6 LNS feature to terminate L2TP sessions from the LAC and place each session into the appropriate IPv6 VRF instance based on the VRF applied to the virtual template interface or alternatively, based on the VRF received for the user through AAA. The router then routes each session within the VRF to the destination network.
Figure 1 | Terminating and Forwarding Sessions from the LAC |
Tunnel Accounting
The tunnel accounting feature enhances AAA accounting by adding the ability to include tunnel-related statistics in the RADIUS information. Before you can collect tunnel usage information, you must configure the following attributes on the RADIUS server:
- Acct-Tunnel-Connection--Specifies the identifier assigned to the tunnel session. This attribute and the Tunnel-Client-Endpoint and Tunnel-Server-Endpoint attributes provide a way to uniquely identify a tunnel session for auditing purposes.
- Acct-Tunnel-Packets-Lost--Specifies the number of packets lost on a given link.
The table below describes the values for the Acct-Status-Type attribute that support tunnel accounting on the RADIUS server.
Table 1 | Acct-Status-Type Values for RADIUS Tunnel Accounting |
Acct-Status-Type Values |
Value |
Description |
---|---|---|
Tunnel-Link-Reject |
14 |
Marks the rejection of the establishment of a new link in an existing tunnel. |
Tunnel-Link-Start |
12 |
Marks the creation of a tunnel link within an L2TP tunnel that carries multiple links. |
Tunnel-Link-Stop |
13 |
Marks the destruction of a tunnel link within an L2TP tunnel that carries multiple links. |
Tunnel-Reject |
11 |
Marks the rejection of the establishment of a tunnel with another device. |
Tunnel-Start |
9 |
Marks the establishment of a tunnel with another device. |
Tunnel-Stop |
10 |
Marks the destruction of a tunnel to or from another device. |
For more information about the RADIUS tunnel accounting attributes or the Acct-Status-Type values that support RADIUS tunnel accounting, see RFC 2867, RADIUS Accounting Modifications for Tunnel Protocol Support.
For information about RADIUS accounting attributes supported on the Cisco ASR 1000 Series Aggregation Services Routers, see the "RADIUS Attributes" chapter in the Cisco IOS XE Security Configuration Guide: Securing User Services.
For more information on configuring RADIUS, see your RADIUS user documentation.
How to Configure the Managed LNS
- Configuring a VRF on the LNS
- Configuring a Virtual Template Interface
- Assigning a VRF via the RADIUS Server
- Configuring the LNS to Initiate and Receive L2TP Traffic
- Limiting the Number of Sessions per Tunnel
- Configuring RADIUS Attribute Accept or Reject Lists
- Configuring AAA Accounting Using Named Method Lists
- Configuring RADIUS Tunnel Authentication Method Lists on the LNS
- Configuring the LNS for RADIUS Tunnel Authentication
- Configuring RADIUS Tunnel Authentication Method Lists on the LNS
- Configuring AAA Authentication Methods
Configuring a VRF on the LNS
DETAILED STEPS
Configuring a Virtual Template Interface
DETAILED STEPS
Assigning a VRF via the RADIUS Server
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enters privileged EXEC mode. |
|
Example: Router# configure terminal |
Enters global configuration mode. |
|
Example: Router(config)# aaa authorization configuration DHCPv6-PD group DHCPv6-PD-RADIUS |
Downloads configuration information from the AAA server using RADIUS. |
|
Example: Router(config)# ipv6 dhcp pool DHCPv6-PD |
Configures a DHCP for IPv6 configuration information pool and enters DHCP for IPv6 pool configuration mode. |
|
Example: Router(config-dhcpv6)# prefix-delegation aaa method-list DHCPv6-PD |
Specifies that prefixes are to be acquired from AAA servers. |
|
Example: Router(config-dhcpv6)# dns-server 2001:0DB8:3000:3000::42 |
Specifies the Domain Name System (DNS) IPv6 servers available to a DHCP for IPv6 client. |
|
Example: Router(config-dhcpv6)# exit |
Exits DHCP for IPv6 pool configuration mode and enters global configuration mode. |
|
Example: Router(config)# interface virtual-template 1 |
Creates a virtual template interface that can be configured and applied dynamically in creating VAIs, and enters interface configuration mode. |
|
Example: Router(config-if)# ipv6 nd prefix framed-ipv6-prefix |
Adds the prefix in a received RADIUS framed IPv6 prefix attribute to the interface's neighbor discovery prefix queue. |
|
Example: Router(config-if)# ipv6 dhcp server DHCPv6-PD rapid-commit |
Enables DHCPv6 on an interface. |
|
Example: Router(config-if)# end |
Exits interface configuration mode and returns to privileged EXEC mode. |
Configuring the LNS to Initiate and Receive L2TP Traffic
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enters privileged EXEC mode. |
|
Example: Router# configure terminal |
Enters global configuration mode. |
|
Example: Router(config)# vpdn enable |
Enables VPDN networking on the router and informs the router to look for tunnel definitions in a local database and on a remote authorization server (home gateway) if one is present. |
|
Example: Router(config)# vpdn-group group1 |
Defines a local group name for which you can assign other VPDN variables. |
|
Example: Router(config-vpdn)# accept-dialin |
Configures the LNS to accept tunneled PPP connections from the LAC and creates an accept-dialin VPDN subgroup. |
|
Example: Router(config-vpdn-acc-in)# protocol 12tp |
Specifies the Layer 2 Tunnel Protocol. |
|
Example: Router(config-vpdn-acc-in)# virtual-template 1 |
Specifies the virtual template to be used to clone VAIs. |
|
Example: Router(config-vpdn-acc-in)# exit |
Returns to VPDN group configuration mode. |
|
Example: Router(config-vpdn)# terminate-from hostname lac1-vpn1 |
Specifies the hostname of the remote LAC that is required when accepting a VPDN tunnel. |
|
Example: Router(config-vpdn)# end |
Exits VPDN configuration mode and returns to privileged EXEC mode. |
Limiting the Number of Sessions per Tunnel
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enters privileged EXEC mode. |
|
Example: Router# configure terminal |
Enters global configuration mode. |
|
Example: Router(config)# vpdn-group group1 |
Defines a local group name for which you can assign other VPDN variables. |
|
Example: Router(config-vpdn)# accept-dialin |
Configures the LNS to accept tunneled PPP connections from the LAC and creates an accept-dialin VPDN subgroup. |
|
Example: Router(config-vpdn-acc-in)# protocol 12tp |
Specifies the Layer 2 Tunnel Protocol. |
|
Example: Router(config-vpdn-acc-in)# virtual-template 1 |
Specifies the virtual template to be used to clone VAIs. |
|
Example: Router(config-vpdn-acc-in)# exit |
Returns to VPDN group configuration mode. |
|
Example: Router(config-vpdn)# terminate-from hostname test_LAC |
Specifies the hostname of the remote LAC that is required when accepting a VPDN tunnel. |
|
Example: Router(config-vpdn)# session-limit 100 |
Specifies the maximum number of sessions per tunnel. |
|
Example: Router(config-vpdn)# exit |
Exits VPDN configuration mode and returns to privileged EXEC mode. |
Configuring RADIUS Attribute Accept or Reject Lists
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enters privileged EXEC mode. |
|
Example: Router# configure terminal |
Enters global configuration mode. |
|
Example: Router(config)# aaa authentication ppp default group radius_authen1 |
Specifies one or more AAA authentication methods for use on serial interfaces running PPP. |
|
Example: Router(config)# aaa authorization network group group radius_authen1 |
Sets the parameters that restrict network access to the user. |
|
Example: Router(config)# aaa group server radius VPDN-Group |
Groups different RADIUS server hosts into distinct lists and distinct methods and enters server group RADIUS configuration mode. |
|
Example: Router(config-sg-radius)# server-private 10.1.1.2 acct-port 0 timeout 7 retransmit 3 key cisco1 |
Configures the IP address of the private RADIUS server for the group server.
|
|
Example: Router(config-sg-radius)# authorization accept vpn1-autho-list |
Specifies a filter for the attributes that are returned in an Access-Accept packet from the RADIUS server. |
|
Example: Router(config-sg-radius)# exit |
Exits server group RADIUS configuration mode and enters global configuration mode. |
|
Example: Router(config)# radius-server attribute list vpn1-autho-list |
Defines the list name given to the set of attributes defined using the attribute command and enters RADIUS attribute list configuration mode. |
|
Example: Router(config-radius-attrl)# attribute 26,200 |
Adds attributes to the configured accept or reject list. |
|
Example: Router(config-radius-attrl)# end |
Exits RADIUS attribute list configuration mode and returns to privileged EXEC mode. |
|
Example: Router# show accounting |
Displays accounting records for users currently logged in. |
Configuring AAA Accounting Using Named Method Lists
Note |
System accounting does not use named method lists. For system accounting you can define only the default method list. For more information, see the "Configuring Accounting " chapter in the Cisco IOS XE Security Configuration Guide: Securing User Services. |
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enters privileged EXEC mode. |
|
Example: Router# configure terminal |
Enters global configuration mode. |
|
Example: Router(config)# aaa accounting network methodlist start-stop group radius |
Creates an accounting method list and enables accounting. |
|
Example: Router(config)# line console 0 |
Enters line configuration mode for the line to which you want to apply the accounting method list. |
|
Example: Router(config-line)# accounting commands 15 list1 |
Applies the accounting method list to a line or a set of lines. |
|
Example: Router(config-line)# end |
Exits line configuration mode and returns to privileged EXEC mode. |
|
Example: Router# debug aaa accounting |
Displays information on accountable events as they occur. |
Configuring RADIUS Tunnel Authentication Method Lists on the LNS
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
|
Example: Router> enable |
Enters privileged EXEC mode. |
||
|
Example: Router# configure terminal |
Enters global configuration mode. |
||
|
Example: Router(config)# aaa authorization network mymethodlist group VPDN-Group |
Sets parameters that restrict user access to a network.
|
||
|
Example: Router(config)# vpdn tunnel authorization network mymethodlist |
Specifies the AAA method list to use for VPDN remote tunnel hostname-based authorization. |
||
|
Example: Router(config)# vpdn tunnel authorization virtual-template 10 |
Specifies the default virtual template interface used to clone a VAI. |
||
|
Example: Router(config)# vpdn tunnel authorization password mypassword |
Specifies the password to use for the RADIUS authorization request to retrieve the tunnel configuration based on the remote tunnel hostname. |
||
|
Example: Router# debug aaa authorization |
Displays information on AAA authorization. |
Configuring the LNS for RADIUS Tunnel Authentication
Perform the following tasks to configure LNS for RADIUS Tunnel Authentication:
Note |
Cisco ASR 1000 Series Aggregation Services Routers supports L2TP tunnel authorization. However, RADIUS does not provide attributes for such parameter values as L2TP tunnel timeouts, L2TP tunnel hello intervals, and L2TP tunnel receive window size. When the Cisco ASR 1000 Series Aggregation Services Router does not receive a RADIUS attribute for a parameter, the router uses the default value. |
Configuring RADIUS Tunnel Authentication Method Lists on the LNS
To configure method lists on the LNS for RADIUS tunnel authentication, perform the following task.
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
|
Example: Router> enable |
Enters privileged EXEC mode. |
||
|
Example: Router# configure terminal |
Enters global configuration mode. |
||
|
Example: Router(config)# aaa authorization network mymethodlist group VPDN-Group |
Sets parameters that restrict user access to a network
|
||
|
Example: Router(config)# vpdn tunnel authorization network mymethodlist |
Specifies the AAA method list to use for VPDN remote tunnel hostname-based authorization. |
||
|
Example: Router(config)# vpdn tunnel authorization virtual-template 10 |
Specifies the default virtual template interface used to clone a VAI.
|
||
|
Example: Router(config)# vpdn tunnel authorization password mypassword |
Specifies the password to use for the RADIUS authorization request to retrieve the tunnel configuration based on the remote tunnel hostname.
|
||
|
Example: Router(config)# end |
Exits global configuration mode and returns to privileged EXEC mode. |
||
|
Example: Router# debug aaa authorization |
Displays information on AAA authorization. |
Configuring AAA Authentication Methods
DETAILED STEPS
Step 1 |
enable |
Step 2 |
configure terminal |
Step 3 |
aaa new-model Enter this command in global configuration mode to enable AAA. |
Step 4 | Configure RADIUS security protocol parameters. For more information about RADIUS, see the "Configuring RADIUS" chapter in the Cisco IOS XE Security Configuration Guide: Securing User Services . |
Step 5 |
aaa authentication Enter this command to define the authentication method lists. |
Step 6 | Apply the authentication method lists to an interface, a line, or a set of lines as required. For more information about authentication method lists, see the " Configuring Authentication " chapter in the Cisco IOS XE Security Configuration Guide: Securing User Services . |
Step 7 |
end |
Configuration Examples for the Managed IPv6 Layer 2 Tunnel Protocol Network Server
- Example Managed IPv6 LNS Configuration
- Example LNS Tunnel Accounting Configuration
- Example Verifying the User Profile on the RADIUS Server
Example Managed IPv6 LNS Configuration
The following example shows how to configure Managed IPv6 LNS features on the router. In this example, the router terminates the tunnel from the LAC and associates the VRFs with the interfaces and the virtual template interfaces. This configuration also shows how to configure RADIUS attribute screening and AAA accounting for the VRFs.
! ! vrf definition Mgmt-intf ! address-family ipv4 exit-address-family ! address-family ipv6 exit-address-family ! vrf definition user_vrf1 rd 1:1 route-target export 1:1 route-target import 1:1 ! address-family ipv6 exit-address-family ! logging buffered 10000000 enable password lab ! aaa new-model ! ! aaa group server radius radius_authen1 server-private 10.1.1.2 acct-port 0 timeout 7 retransmit 3 key cisco1 ip radius source-interface Loopback20000 ! aaa authentication login default none aaa authentication ppp default group radius_authen1 aaa authorization network default group radius_authen1 aaa authorization configuration DHCPv6-PD group radius_authen1 ! ! ! ! ! aaa session-id common aaa policy interface-config allow-subinterface ppp hold-queue 80000 clock timezone EST -5 0 ip source-route no ip gratuitous-arps ! ! ! ! ! ! ! no ip domain lookup ip host mcp-matrix 10.0.0.2 ip host mcp-sun-2 10.0.0.2 ! ! ipv6 unicast-routing ipv6 dhcp binding track ppp ipv6 dhcp pool ipv6_dhcp_pool1 prefix-delegation aaa method-list DHCPv6-PD ! ! ! ! multilink bundle-name authenticated vpdn enable ! vpdn-group VPDN_LNS1 accept-dialin protocol l2tp virtual-template 1 terminate-from hostname test_LAC1 source-ip 10.0.0.2 local name test_LNS1 l2tp tunnel password 0 tunnel1 l2tp tunnel receive-window 100 l2tp tunnel timeout no-session 30 l2tp tunnel retransmit retries 7 l2tp tunnel retransmit timeout min 2 ! ! no virtual-template snmp ! ! ! ! ! ! ! ! ! username asifp1@test1 password 0 hello1 ! redundancy notification-timer 30000 mode none ! ! ! ! ! ip tftp source-interface GigabitEthernet 0 ! ! ! ! ! ! ! ! interface Loopback1 no ip address ! interface Loopback20000 ip address 209.165.202.131 255.255.255.224 ! interface GigabitEthernet1/1/0 mac-address 8888.8888.8888 no ip address load-interval 30 negotiation auto hold-queue 4096 in hold-queue 4096 out ! interface GigabitEthernet1/1/0.1 encapsulation dot1Q 3 ip address 209.165.202.132 255.255.255.224 ! interface GigabitEthernet1/1/1 mac-address 4444.4444.4444 no ip address load-interval 30 no negotiation auto hold-queue 4096 in hold-queue 4096 out ! interface GigabitEthernet1/1/1.1 vrf forwarding user_vrf1 encapsulation dot1Q 2 ipv6 address 12::1/72 ! interface GigabitEthernet1/1/2 no ip address negotiation auto ! interface GigabitEthernet1/1/3 no ip address negotiation auto ! interface GigabitEthernet1/1/4 no ip address negotiation auto ! interface GigabitEthernet1/1/5 no ip address negotiation auto ! interface GigabitEthernet1/1/6 no ip address negotiation auto ! interface GigabitEthernet1/1/7 description Connected to RADIUS ip address 209.165.201.1 255.255.255.224 negotiation auto ! interface GigabitEthernet1/3/0 no ip address media-type sfp negotiation auto ! interface GigabitEthernet1/3/1 no ip address media-type sfp negotiation auto ! interface GigabitEthernet 0 vrf forwarding Mgmt-intf ip address 209.165.201.1 255.255.255.224 negotiation auto ! interface Virtual-Template 1 no ip address no logging event link-status ipv6 dhcp server ipv6_dhcp_pool1 rapid-commit keepalive 30 ppp mtu adaptive ppp authentication pap ! ip default-gateway 10.1.0.5 ip forward-protocol nd ! no ip http server no ip http secure-server ip route vrf Mgmt-intf 209.165.201.1 255.255.255.254 172.16.1.1 ip route vrf Mgmt-intf 209.165.201.29 255.255.255.224 172.16.0.1 ! ip radius source-interface GigabitEthernet1/1/7 logging esm config cdp run ipv6 route vrf user_vrf1 ::/0 12::2 ! ipv6 neighbor 12::2 GigabitEthernet1/1/1.1 2222.2222.2222 ! ! ! control-plane ! call admission limit 90 ! ! ! alias exec call show caller summ alias exec caller show caller summ alias exec palt show plat alias exec plat show platform alias exec evsi sho plat hard cpp act feat ess stat ! line con 0 exec-timeout 0 0 stopbits 1 line vty 0 4 exec-timeout 0 0 password password1 ! exception data-corruption buffer truncate end
Example LNS Tunnel Accounting Configuration
The following example shows how to configure the LNS to send tunnel accounting records to the RADIUS server:
aaa new-model ! ! aaa accounting network m1 start-stop group radius aaa accounting network m2 stop-only group radius aaa session-id common enable secret 5 $1$ftf.$wE6Q5Yv6hmQiwL9pizPCg1 ! username ENT_LNS password 0 tunnelpass username user1@example.com password 0 lab username user2@example.com password 0 lab spe 1/0 1/7 firmware location system:/ucode/mica_port_firmware spe 2/0 2/9 firmware location system:/ucode/mica_port_firmware ! ! resource-pool disable clock timezone est 2 ! ip subnet-zero no ip domain-lookup ip host CALLGEN-SECURITY-V2 10.24.80.28 10.47.0.0 ip host dirt 172.16.1.129 ! vpdn enable vpdn tunnel accounting network m1 vpdn session accounting network m1 ! vpdn-group 1 accept-dialin protocol l2tp virtual-template 1 terminate-from hostname ISP_LAC local name ENT_LNS ! isdn switch-type primary-5ess ! ! fax interface-type modem mta receive maximum-recipients 0 ! interface Loopback 0 ip address 172.16.0.101 255.255.255.0 ! interface Loopback 1 ip address 192.168.0.101 255.255.255.0 ! interface Ethernet 0 ip address 10.1.26.71 255.255.255.0 no ip mroute-cache no cdp enable ! interface virtual-template 1 ip unnumbered Loopback 0 peer default ip address pool vpdn-pool1 ppp authentication chap ! interface virtual-template 2 ip unnumbered Loopback1 peer default ip address pool vpdn-pool2 ppp authentication chap ! interface fastethernet 0 no ip address no ip mroute-cache shutdown duplex auto speed auto no cdp enable ! ip local pool vpdn-pool1 172.16.5.1 172.16.128.100 ip local pool vpdn-pool2 10.0.0.1 10.0.0.100 ip default-gateway 10.1.26.254 ip classless ip route 0.0.0.0 0.0.0.0 10.1.26.254 ip route 192.168.1.2 255.255.255.255 10.1.26.254 no ip http server ip pim bidir-enable ! ! dialer-list 1 protocol ip permit no cdp run ! ! radius-server host 172.16.192.80 auth-port 1645 acct-port 1646 key rad123 radius-server retransmit 3 call rsvp-sync end
Note |
For additional accounting examples, see the "Configuring Accounting" chapter in the Cisco IOS XE Security: Secure Services Configuration Guide . |
Example Verifying the User Profile on the RADIUS Server
The following is an example user profile on the RADIUS server. The Cisco ASR 1000 Series Aggregation Services Routers retrieves the information in the user profile from the RADIUS server.
Radius Profile "user1" Auth-Type = Local, User-Password = "pwd" User-Service-Type = Framed-User Framed-Protocol = PPP cisco-avpair = "lcp:interface-config=vrf forwarding VRF01" cisco-avpair = "lcp:interface-config=ipv6 unnumbered loopback1" Framed-IPv6-Prefix = "2001:DB8:4567:1234::/64" Delegated-IPv6-Prefix = "2001:DB8:AAAA::/48"
Additional References
Related Documents
Related Topic |
Document Title |
---|---|
Cisco IOS commands |
|
Cisco IOS XE MPLS commands |
Cisco IOS MPLS Command Reference |
Authentication, authorization and accounting |
Authentication, Authorization, and Accounting (AAA) |
Configuring RADIUS |
Configuring RADIUS |
Configuring accounting |
Configuring Accounting |
RADIUS attributes |
"RADIUS Attributes Overview and RADIUS IETF Attributes" module in the Cisco IOS XE Security Configuration Guide: Securing User Services |
Standards
Standard |
Title |
---|---|
No new or modified standards are supported, and support for existing standards has not been modified. |
-- |
MIBs
MIB |
MIBs Link |
---|---|
No new or modified MIBs are supported, and support for existing MIBs has not been modified. |
To locate and download MIBs for selected platforms, Cisco software releases, and feature sets, use Cisco MIB Locator found at the following URL: |
RFCs
RFC |
Title |
---|---|
RFC 2867 |
RADIUS Accounting Modifications for Tunnel Protocol Support |
Technical Assistance
Description |
Link |
---|---|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
Feature Information for Configuring Managed IPv6 Layer 2 Tunnel Protocol Network Server
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 2 | Feature Information for Managed IPv6 Layer 2 Tunnel Protocol Network Server |
Feature Name |
Releases |
Feature Information |
---|---|---|
Managed IPv6 Layer 2 Tunnel Protocol Network Server |
Cisco IOS XE Release 3.3S |
The Managed IPv6 LNS feature allows the service provider to offer a scalable end-to-end VPN of both IPv4 and IPv6 service to remote users. This feature integrates the Multiprotocol Label Switching (MPLS)-enabled backbone with broadband access capabilities. The following commands were introduced or modified: atm pppatm passive, radius-server attribute list, radius-server key, radius-server retransmit, radius-server vsa send. |
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.