- ssg default-network
- ssg dfp ip
- ssg dfp weight
- ssg dial-out
- ssg direction
- ssg enable
- ssg intercept dhcp
- ssg local-forwarding
- ssg login transparent
- ssg maximum host
- ssg maximum service
- ssg maxservice
- ssg multidomain ppp
- ssg next-hop download
- ssg open-garden
- ssg pass-through
- ssg port-map
- ssg port-map destination access-list
- ssg port-map destination range
- ssg port-map enable
- ssg port-map length
- ssg port-map source ip
- ssg prepaid reauthorization drop-packet
- ssg prepaid threshold
- ssg profile-cache
- ssg qos police
- ssg query mac dhcp
- ssg radius-helper
- ssg radius-proxy
- ssg service-cache
- ssg service-cache refresh
- ssg service-password
- ssg service-search-order
- ssg tcp-redirect
- ssg vc-service-map
- ssg wlan reconnect
- timeouts (SSG-radius-proxy)
- user passthrough maximum
- user suspect maximum
- user suspect timeout
- user unidentified timeout
- user unidentified traffic permit
- username mac
ssg default-network
Note Effective with Cisco IOS Release 15.0(1)M, the ssg default-network command is not available in Cisco IOS software.
To specify the default network IP address or subnet and mask, use the ssg default-network command in global configuration mode. To disable the default network IP address and mask, use the no form of this command.
ssg default-network ip-address mask
no ssg default-network ip-address mask
Syntax Description
ip-address |
Service Selection Gateway (SSG) default IP address or subnet. |
mask |
SSG default network destination mask. |
Command Default
No default behavior or values.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
Use this command to specify the first IP address or subnet that users will be able to access without authentication. This is the address where the Cisco Service Selection Dashboard (SSD) resides. After users enter the URL for the Cisco SSD, they will be prompted for a username and password. A mask provided with the IP address specifies the range of IP addresses that users will be able to access without authentication.
Examples
The following example shows a default network IP address, 192.168.1.2, and mask 255.255.255.255:
configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
ssg default-network 192.168.1.2 255.255.255.255
ssg dfp ip
Note Effective with Cisco IOS Release 15.0(1)M, the ssg dfp ip command is not available in Cisco IOS software.
To specify the interface between Service Selection Gateway (SSG) and a load-balancing device, use the ssg dfp ip command in global configuration mode. To remove this specification, use the no form of this command.
ssg dfp ip {interface | ip-address}
no ssg dfp ip {interface | ip-address}
Syntax Description
interface |
Type and number of the interface between SSG and the load balancer. |
ip-address |
IP address of the SSG interface to the load balancer. |
Command Default
An interface between SSG and the load balancer is not specified.
Command Modes
Global configuration (config)
Command History
|
|
---|---|
12.3(11)T |
This command was introduced. |
12.4 |
This command was integrated into Cisco IOS Release 12.4. |
15.0(1)M |
This command was removed. |
Usage Guidelines
The interface between the load balancer and SSG must be configured on SSG, or SSG will not be able to hand load-balancing weights to the DFP agent.
The interface or the IP address configured with this command must be the same as the interface or IP address configured on the load balancer under the server configuration. The interface or IP address is sent in the DFP packet along with the weight to the load balancer. The load balancer uses this information to identify the server from which the weight was received. If the interface or IP address is not the same as that configured on the load balancer, the weight information will not be associated with the correct SSG.
The interface specified by the ssg dfp ip command should be a downlink interface.
Examples
The following examples show the configuration of the interface between SSG and load balancer and the corresponding configuration on the load-balancing device:
Configuration on SSG Device: Example
ssg enable
ssg dfp weight 25
ssg dfp ip Ethernet1/0
!
!
interface Ethernet1/0
ip address 10.0.0.20 255.0.0.0
duplex half
pppoe enable
ssg direction downlink
!
Configuration on Cisco IOS Server Load Balancing Device: Example
!
ip slb serverfarm SSGFARM
real 10.0.0.20
inservice
!
ip slb vserver VSSG
virtual 10.8.8.8 tcp 0
serverfarm SSGFARM
inservice
!
ip slb dfp
agent 10.0.0.20 655
!
Related Commands
|
|
---|---|
ssg dfp weight |
Specifies the DFP weight, which will be used to calculate load balancing among SSGs, for an SSG device. |
ssg dfp weight
Note Effective with Cisco IOS Release 15.0(1)M, the ssg dfp weight command is not available in Cisco IOS software.
To specify the Dynamic Feedback Protocol (DFP) weight used to calculate load balancing for a Service Selection Gateway (SSG) device, use the ssg dfp weight command in global configuration mode. To reset the weight to the default value of 100, use the no form of this command.
ssg dfp weight weight
no ssg dfp weight
Syntax Description
Command Default
The default DFP weight is 100.
Command Modes
Global configuration (config)
Command History
|
|
---|---|
12.3(11)T |
This command was introduced. |
12.4 |
This command was integrated into Cisco IOS Release 12.4. |
15.0(1)M |
This command was removed. |
Usage Guidelines
The DFP weight is used to calculate load balancing among SSGs.
You can use the ssg dfp weight command to prioritize SSGs that are being load-balanced. A higher weight indicates that the device can accept a heavier load.
Every time the DFP weight is changed by using the ssg dfp weight command, SSG sends the new weight to the DFP agent.
SSG calculates the weight that it hands over to the DFP agent on the basis of three factors:
•The DFP weight configured for the SSG
•CPU load
•Memory utilization
The DFP agent forwards the calculated weight to the load balancer.
Examples
The following example shows how to configure SSG with a DFP weight of 25:
ssg dfp weight 25
Related Commands
|
|
---|---|
ssg dfp ip |
Specifies the interface between SSG and the load-balancing device. |
ssg dial-out
Note Effective with Cisco IOS Release 15.0(1)M, the ssg dial-out command is not available in Cisco IOS software.
To enable the SSG L2TP Dial-Out feature and enter SSG dial-out configuration mode, use the ssg dial-out command in global configuration mode. To remove all SSG dial-out configurations, use the no form of this command.
ssg dial-out
no ssg dial-out
Syntax Description
This command has no arguments or keywords.
Command Default
The SSG L2TP Dial-Out feature is not enabled.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
Use this command to enter SSG dial-out configuration mode to configure the SSG L2TP Dial-Out feature. Use the no form of this command to remove all Service Selection Gateway (SSG) L2TP dial-out configurations.
Examples
The following example shows how to enable the SSG L2TP Dial-Out feature and enter SSG dial-out configuration mode:
Router(config)# ssg dial-out
Router(config-dial-out)#
Related Commands
ssg direction
Note Effective with Cisco IOS Release 15.0(1)M, the ssg direction command is not available in Cisco IOS software.
To configure an interface or range of subinterfaces as downlink or uplink, use the ssg direction command in interface configuration mode or subinterface configuration mode. To clear the directional specification, use the no form of this command.
ssg direction {downlink | uplink [member group-name]}
no ssg direction
Syntax Description
Command Default
An interface is neither uplink nor downlink.
Command Modes
Interface configuration (config-if)
Subinterface configuration (config-subif)
Command History
Usage Guidelines
Service Selection Gateway (SSG) applies the concept of an interface direction, either uplink or downlink. It uses this direction when determining the forwarding path of an incoming packet. The ssg direction command allows you to specify a direction for an interface or a range of subinterfaces.
The ssg direction command allows you to configure the direction for a range of permanent virtual circuits (PVCs). All members of a range must have the same direction.
Before you can change a direction from uplink to downlink or vice versa, you must use the no ssg direction command to clear the direction.
The ssg direction command replaces the ssg bind direction command. If you reboot a router that uses an old configuration, the ssg bind direction commands will be converted to ssg direction commands until the ssg bind direction command is made obsolete. In a later release, the ssg bind direction command may no longer be supported.
Note An interface that does not exist will not be created as a result of the ssg direction command.
In cases where a service has a single next-hop IP address, the ssg direction uplink command can be used with the member keyword and group-name argument to group together uplink interfaces that share a common service and enable the interfaces to be treated similarly.
The group setting for an uplink interface cannot be changed when there are active services bound to that interface.
The no form of the ssg direction command can be used only when there are no active services bound to the uplink interface.
The command operates on a variety of interfaces, including async, group async, ATM, extended tag ATM (XTagATM), bridge group virtual (BVI), CTunnel, tunnel, dialer, IEEE 802.3 Ethernet, IEEE 802.3 Fast Ethernet, IEEE 802.3z GigabitEthernet, loopback, multilink Frame Relay (MFR) bundle, multilink group, Pragmatic General Multicast (PGM) Host (Vif), virtual access, virtual template, and virtual Token Ring.
Examples
The following example sets the direction of a Fast Ethernet interface to downlink while in interface configuration mode:
ssg enable
interface FastEthernet 1/0
ssg direction downlink
The next example creates a range called "MyRange" and sets the direction of all subinterfaces in the range to downlink while in subinterface configuration mode:
ssg enable
interface ATM 1/0.1 point-to-point
range MyRange pvc 1/32 1/42
ssg direction downlink
Related Commands
ssg enable
Note Effective with Cisco IOS Release 15.0(1)M, the ssg enable command is not available in Cisco IOS software.
To enable SSG, use the ssg enable command in global configuration mode. To disable SSG, use the no form of this command.
ssg enable
no ssg enable [force-cleanup]
Syntax Description
force-cleanup |
(Optional) Unconfigures SSG and releases all resources that were acquired by SSG. |
Command Default
SSG is disabled.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
Use this command to enable SSG. If you enter the ssg enable command while the system is in the process of unconfiguring SSG, you will see a warning message, and the command will have no effect.
Use the no ssg enable force-cleanup command to unconfigure SSG and release all system resources for SSG.
Examples
The following example shows how to enable SSG:
Router(config)# ssg enable
The following example shows how to stop SSG packet processing and control events:
Router(config)# no ssg enable
The following example shows how to stop SSG packet processing and control events, unconfigure SSG, and release all SSG resources:
Router(config)# no ssg enable force-cleanup
ssg intercept dhcp
Note Effective with Cisco IOS Release 15.0(1)M, the ssg intercept dhcp command is not available in Cisco IOS software.
To configure the Service Selection Gateway (SSG) to force subscribers to get IP addresses from their ISPs using Dynamic Host Configuration Protocol (DHCP), use the ssg intercept dhcp command in global configuration mode. To disable IP address assignment from the ISP via DHCP, use the no form of this command.
ssg intercept dhcp
no ssg intercept dhcp
Syntax Description
This command has no arguments or keywords.
Command Default
SSG performs Network Address Translation (NAT) between the IP address assigned by the ISP with the original IP address of the subscriber.
Command Modes
Global configuration (config)
Command History
|
|
---|---|
12.3(14)T |
This command was introduced. |
12.4 |
This command was integrated into Cisco IOS Release 12.4. |
15.0(1)M |
This command was removed. |
Usage Guidelines
Use the ssg intercept dhcp command to force subscribers to request IP addresses from their ISPs using DHCP.
When a subscriber's router acts either as an IOS DHCP server or an IOS DHCP relay agent and the subscriber is a DHCP client, then configuring SSG/DHCP Awareness will remove the SSG host object. When an active host object receives a DHCPRELEASE or when the DHCP lease for an active host object expires, the SSG host object is removed.
For more information on the ssg intercept dhcp command, see the Cisco IOS Intelligent Service Gateway Configuration Guide.
Examples
The following example shows how to enable the IP address assignment from the ISP via DHCP:
ssg intercept dhcp
Related Commands
|
|
---|---|
debug ssg dhcp |
Enables the display of control errors and events related to SSG-DHCP IP address allocation. |
ssg local-forwarding
Note Effective with Cisco IOS Release 15.0(1)M, the ssg local-forwarding command is not available in Cisco IOS software.
To enable Service Selection Gateway (SSG) to forward packets locally, use the ssg local-forwarding command in global configuration mode. To disable local forwarding, use the no form of this command.
ssg local-forwarding
no ssg local-forwarding
Syntax Description
This command has no arguments or keywords.
Command Default
Disabled
Command Modes
Global configuration (config)
Command History
Examples
The following example enables local forwarding:
ssg local-forwarding
ssg login transparent
Note Effective with Cisco IOS Release 15.0(1)M, the ssg login transparent command is not available in Cisco IOS software.
To enable the Service Selection Gateway (SSG) Transparent Autologon feature and enable transparent auto-logon configuration mode, use the ssg login transparent command in global configuration mode. To disable the Transparent Autologon feature, remove all the commands that were configured under transparent auto-logon mode, log off all the transparent autologon users, and refuse new logons, use the no form of this command.
ssg login transparent
no ssg login transparent
Syntax Description
This command has no arguments or keywords.
Command Default
The SSG Transparent Autologon feature is disabled by default.
Command Modes
Global configuration (config)
Command History
Examples
The following example enables the SSG Transparent Autologon feature:
ssg login transparent
Related Commands
|
|
---|---|
show ssg user transparent |
Displays a list of all the SSG transparent autologon users. |
ssg maximum host
Note Effective with Cisco IOS Release 15.0(1)M, the ssg maximum host command is not available in Cisco IOS software.
To limit the number of user connections (hosts) allowed on a Service Selection Gateway (SSG) device, use the ssg maximum host command in global configuration mode. To remove the limitation on the number of hosts, use the no form of this command.
ssg maximum host number-of-hosts
no ssg maximum host number-of-hosts
Syntax Description
number-of-hosts |
Limits the number of host objects allowed on an SSG device. Range: 1 to 2147483647. |
Command Default
Unlimited hosts are allowed on an SSG device.
Command Modes
Global configuration (config)
Command History
|
|
---|---|
12.4(2)T |
This command was introduced. |
15.0(1)M |
This command was removed. |
Usage Guidelines
This command prevents resource exhaustion on a router by limiting the number of host connections. When the router reaches the maximum number of connections, it refuses any new connections. As users log out, new users are allowed to connect.
This command limits only the number of host connections; it does not limit the number of services available to users.
Examples
The following example limits the number of host connections to 1,000:
Router(config)# ssg maximum host 1000
Related Commands
|
|
---|---|
ssg maximum service |
Limits the number of services available to SSG users. |
user passthrough maximum |
Limits the number of SSG transparent autologon users on an SSG device. |
ssg maximum service
Note Effective with Cisco IOS Release 15.0(1)M, the ssg maximum service command is not available in Cisco IOS software.
To limit the number of services available to a user on a Service Selection Gateway (SSG) device, use the ssg maximum service command in global configuration mode. To remove the limitation on the number of services, use the no form of this command.
ssg maximum service number-of-services
no ssg maximum service number-of-services
Syntax Description
number-of-services |
Limits the number of services available to a user on an SSG device. The valid range of services is 1 to 20. |
Command Default
Users have up to 20 services available.
Command Modes
Global configuration (config)
Command History
|
|
---|---|
12.4(2)T |
This command was introduced. This command replaces the ssg maxservice command. |
15.0(1)M |
This command was removed. |
Usage Guidelines
This command enables you to limit the number of services available to a user. This command replaces the ssg maxservice command. If you issue the ssg maxservice command and save your configuration, the saved configuration shows the ssg maximum service command.
Examples
The following example limits the number of user services to 10:
Router(config)# ssg maximum service 10
Related Commands
|
|
---|---|
ssg maximum host |
Limits the number of host connections on an SSG device. |
ssg maxservice
Note Effective with Cisco IOS Release 15.0(1)M, the ssg maxservice command is not available in Cisco IOS software.
Note Effective with Cisco IOS Release 12.4(2)T, the ssg maxservice command is replaced by the ssg maximum service command. See the ssg maximum service command for more information.
To set the maximum number of services per user, use the ssg maxservice command in global configuration mode. To reset the maximum number of services per user to the default, use the no form of this command.
ssg maxservice number
no ssg maxservice
Syntax Description
number |
Maximum number of services per user. The minimum value is 0; the maximum is 20. |
Command Default
The default maximum number of services per user is 20.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
Use this command to limit the number of services to which a user can be logged on simultaneously.
Examples
The following example shows how to set the maximum number of services per user to 10:
ssg maxservice 10
ssg multidomain ppp
Note Effective with Cisco IOS Release 15.0(1)M, the ssg multidomain ppp command is not available in Cisco IOS software.
To enter PPP Termination Aggregation-Multidomain (PTA-MD) configuration mode, use the ssg multidomain ppp command in global configuration mode. To disable all PTA-MD configurations, use the no form of this command.
ssg multidomain ppp
no ssg multidomain ppp
Syntax Description
This command has no arguments or keywords.
Command Default
No default behavior or values.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
It is important to note that the no form of this command disables everything configured for PTA-MD. If you want to exit PTA-MD configuration mode, enter the exit command.
Examples
Adding Domains to an Existing PTA-MD Exclusion List
In the following example, a PTA-MD exclusion list that already includes "cisco", "motorola", "nokia", and "voice-stream" is downloaded from the AAA server. After the exclusion list is downloaded, "microsoft" and "sun" are added to the exclusion list.
The exclusion list currently on the AAA server includes "cisco", "motorola", "nokia", and "voice-stream":
user = pta_md{
profile_id = 119
profile_cycle = 2
member = SSG-DEV
radius=6510-SSG-v1.1 {
check_items= {
2=cisco
}
reply_attributes= {
9,253="XPcisco"
9,253="XPmotorola"
9,253="XPnokia"
9,253="XPvoice-stream"
In the following example, the PTA-MD exclusion list is downloaded to the router from the AAA server. The password to download the exclusion list is "cisco". After the PTA-MD exclusion list is downloaded, "microsoft" and "sun" are added to the list using the router CLI:
ssg multidomain ppp download exclude-profile pta_md cisco exclude domain microsoft exclude domain sun
The enhancements to the exclusion list are then verified:
Router# show ssg multidomain ppp exclude-list
Profile name :pta_md
1 cisco
2 motorola
3 nokia
4 voice-stream
Domains added via CLI :
1 microsoft
2 sun
Related Commands
ssg next-hop download
Note Effective with Cisco IOS Release 15.0(1)M, the ssg next-hop download command is not available in Cisco IOS software.
To download the next-hop table from a RADIUS server, use the ssg next-hop download command in global configuration mode. To remove the command from the configuration, use the no form of this command.
ssg next-hop download [profile-name] [profile-password]
no ssg next-hop download [profile-name] [profile-password]
Syntax Description
profile-name |
(Optional) Profile name. |
profile-password |
(Optional) Profile password. |
Command Default
If no profile name and password are provided, the previous profile specified with this command is downloaded. If no previous profile was specified, an error message is generated.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
When this command is used, an entry is made in the running configuration. When the configuration is reloaded, the next-hop table is automatically downloaded. If the no form of this command is used to remove the command from the running configuration, a next-hop table will not be automatically downloaded when the configuration is reloaded.
Examples
The following example shows how to download the next-hop table called "MyProfile" from a RADIUS server:
ssg next-hop download MyProfile MyProfilePassword
Related Commands
|
|
---|---|
clear ssg next-hop |
Removes the next-hop table. |
show ssg next-hop |
Displays the next-hop table. |
ssg open-garden
Note Effective with Cisco IOS Release 15.0(1)M, the ssg open-garden command is not available in Cisco IOS software.
To designate a service as an open garden service, use the ssg open-garden command in global configuration mode. To remove a service from the open garden, use the no form of this command.
ssg open-garden profile-name
no ssg open-garden profile-name
Syntax Description
profile-name |
Local service profile name. |
Command Modes
Global configuration (config)
Command History
Usage Guidelines
Use this command to designate a service, defined in a local service profile, as an open garden service.
Examples
In the following example, the service called "fictitiousname.com" is defined in a local service profile and added to the open garden:
local-profile cisco.com
attribute 26 9 251 "Oopengarden1.com"
attribute 26 9 251 "D10.13.1.5"
attribute 26 9 251 "R10.1.1.0;255.255.255.0"
exit
ssg open-garden fictitiousname.com
Related Commands
ssg pass-through
Note Effective with Cisco IOS Release 15.0(1)M, the ssg pass-through command is not available in Cisco IOS software.
To enable transparent pass-through, use the ssg pass-through command in global configuration mode. To disable transparent pass-through, use the no form of this command
ssg pass-through [filter {ip-access-list | ip-extended-access-list | access-list-name | download [profile-name | profile-name profile-password]} [downlink | uplink]}]
no ssg pass-through [filter {ip-access-list | ip-extended-access-list | access-list-name | download [profile-name | profile-name profile-password]} [downlink | uplink]}]
Syntax Description
Command Default
Transparent pass-through is disabled.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
Use this command to enable transparent pass-through if you want to allow unauthenticated traffic to pass through the Service Selection Gateway (SSG) in either direction without modification. If you want all traffic to be authenticated by the SSG, use this command to disable transparent pass-through. You can use the filter option to prevent pass through traffic from accessing the specified IP address and subnet mask combinations.
Use the no form of this command to remove a transparent pass-through filter that was configured at the command line. This will also remove it from the running configuration.
Examples
The following example shows how to enable SSG transparent pass-through and download a pass-through filter from the AAA server called "filter01":
ssg pass-through
ssg pass-through filter download filter01 cisco
Radius reply received:
Created Upstream acl from it.
Loading default pass-through filter succeeded.
Related Commands
|
|
---|---|
clear ssg pass-through-filter |
Removes the downloaded filter for transparent pass-through. |
show ssg pass-through-filter |
Displays the downloaded filter for transparent pass-through. |
ssg port-map
Note Effective with Cisco IOS Release 15.0(1)M, the ssg port-map command is not available in Cisco IOS software.
To enable the Service Selection Gateway (SSG) Port-Bundle Host Key feature and enter SSG portmap configuration mode, use the ssg port-map command in global configuration mode. To disable the port-bundle host key feature, use the no form of this command.
ssg port-map
no ssg port-map
Syntax Description
This command has no arguments or keywords.
Command Default
The Port-Bundle Host Key feature is not enabled.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
This command will not take effect until the router has reloaded.
The SSG Port-Bundle Host Key feature requires Cisco Service Selection Dashboard (SSD) Release 3.0(1) or Cisco Subscriber Edge Services Manager (SESM) Release 3.1(1).
Examples
The following example shows how to enable the SSG port-bundle host key and enter SSG portmap configuration mode:
Router(config)# ssg port-map
Router(ssg-port-map)#
Related Commands
ssg port-map destination access-list
Note Effective with Cisco IOS Release 15.0(1)M, the ssg port-map destination access-list command is not available in Cisco IOS software.
Note Effective with Cisco IOS Releases 12.2(16)B and 12.3(4)T, this command is replaced by the destination access-list command. See the destination access-list command page for more information.
To identify packets for port-mapping by specifying an access list to compare against subscriber traffic, use the ssg port-map destination access-list command in global configuration mode. To remove this specification, use the no form of this command.
ssg port-map destination access list access-list-number
no ssg port-map destination access list access-list-number
Syntax Description
access-list-number |
Integer from 100 to 199 that is the number or name of an extended access list. |
Command Default
No default behavior or values.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
When the ssg port-map destination access list command is configured, any traffic going to the default network and matching the access list will be port-mapped.
Note A default network must be configured and routable from SSG in order for this command to be effective.
You can use multiple entries of the ssg port-map destination access-list command. The access lists are checked against the subscriber traffic in the order in which they are defined.
Examples
In the following example, packets permitted by access list 100 will be port-mapped:
ssg port-map enable
ssg port-map destination access-list 100
ssg port-map source ip Ethernet0/0/0
!
....
!
access-list 100 permit ip 10.0.0.0 0.255.255.255 host 70.13.6.100
access-list 100 deny ip any any
Related Commands
|
|
---|---|
ssg port-map destination range |
Identifies packets for port-mapping by specifying the TCP port range to compare against the subscriber traffic. |
ssg port-map destination range
Note Effective with Cisco IOS Release 15.0(1)M, the ssg port-map destination range command is not available in Cisco IOS software.
Note Effective with Cisco IOS Releases 12.2(16)B and 12.3(4)T, this command is replaced by the destination range command. See the destination range command page for more information.
To identify packets for port-mapping by specifying the TCP port range to compare against the subscriber traffic, use the ssg port-map destination range command in global configuration mode. To remove this specification, use the no form of this command.
ssg port-map destination range from port-number-1 to port-number-2 [ip ip-address]
no ssg port-map destination range from port-number-1 to port-number-2 [ip ip-address]
Syntax Description
Command Default
If an IP address is not specified, Service Selection Gateway (SSG) will allow any destination IP address in the subscriber traffic to be port-mapped, as long as the packets match the specified port ranges.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
If the destination IP address is not configured, a default network must be configured and routable from SSG in order for this command to be effective.
If the destination IP address is not configured, any traffic going to the default network with the destination port will fall into the destination port range and will be port mapped.
You can use multiple entries of the ssg port-map destination range command. The port ranges are checked against the subscriber traffic in the order in which they were defined.
Examples
In the following example, packets that are going to the default network and have a destination port within the range from 8080 to 8081 will be port-mapped:
ssg port-map destination range from 8080 to 8081
Related Commands
|
|
---|---|
ssg port-map destination access-list |
Identifies packets for port-mapping by specifying an access list to compare against the subscriber traffic. |
ssg port-map enable
Note Effective with Cisco IOS Release 15.0(1)M, the ssg port-map enable command is not available in Cisco IOS software.
Note Effective with Cisco IOS Releases 12.2(16)B and 12.3(4)T, this command is replaced by the ssg port-map command. See the ssg port-map command page for more information.
To enable the Service Selection Gateway (SSG) port-bundle host key, use the ssg port-map enable command in global configuration mode. To disable the SSG port-bundle host key, use the no form of this command.
ssg port-map enable
no ssg port-map enable
Syntax Description
This command has no arguments or keywords.
Command Default
SSG port-bundle host key is disabled by default.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
This command will not take effect until the router has been reloaded.
The SSG Port-Bundle Host Key feature requires Cisco Service Selection Dashboard (SSD) Release 3.0(1) or CiscoSubscriber Edge Services Manager (SESM) Release 3.1(1). If you are using an earlier release of SSD, use the no ssg port-map enable command to disable the SSG Port-Bundle Host Key feature.
Examples
The following example shows how to enable the SSG port-bundle host key:
ssg port-map enable
Related Commands
ssg port-map length
Note Effective with Cisco IOS Release 15.0(1)M, the ssg port-map length command is not available in Cisco IOS software.
Note Effective with Cisco IOS Releases 12.2(16)B and 12.3(4)T, this command is replaced by the length command. See the length (SSG) command page for more information.
To modify the port-bundle length upon the next Service Selection Gateway (SSG) reload, use the ssg port-map length command in global configuration mode. To return the port-bundle length to the default value, use the no form of this command.
ssg port-map length bits
no ssg port-map length bits
Syntax Description
bits |
Port-bundle length, in bits. The maximum port-bundle length is 10 bits. |
Command Default
4 bits.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
The port-bundle length is used to determine the number of bundles in one group and the number of ports in one bundle. By default, the port-bundle length is 4 bits. The maximum port-bundle length is 10 bits. See Table 19 for available port-bundle length values and the resulting port-per-bundle and bundle-per-group values. Increasing the port-bundle length can be useful when you see frequent error messages about running out of ports in a port bundle, but note that the new value does not take effect until SSG next reloads and Cisco Service Selection Dashboard (SSD) restarts.
Note For each Cisco SSD server, all connected SSGs must have the same port-bundle length.
Examples
The following example results in 64 ports per bundle and 1008 bundles per group:
Router(config)# ssg port-map length 6
Related Commands
|
|
---|---|
show ssg port-map status |
Displays information on port bundles, including the port-bundle length. |
ssg port-map source ip
Note Effective with Cisco IOS Release 15.0(1)M, the ssg port-map source ip command is not available in Cisco IOS software.
Note Effective with Cisco IOS Releases 12.2(16)B and 12.3(4)T, this command is replaced by the source ip command. See the source ip command page for more information.
To specify Service Selection Gateway (SSG) source IP addresses to which to map the destination IP addresses in subscriber traffic, use the ssg port-map source ip command in global configuration mode. To remove this specification, use the no form of this command.
ssg port-map source ip {ip-address | interface}
no ssg port-map source ip {ip-address | interface}
Syntax Description
ip-address |
SSG source IP address. |
interface |
Interface whose main IP address is used as the SSG source IP address. |
Command Default
No default behavior or values.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
With the SSG Port-Bundle Host Key feature, SSG maps the destination IP addresses in subscriber traffic to specified SSG source IP addresses.
All SSG source IP addresses configured with the ssg port-map source ip command must be routable in the management network where the Cisco SSD resides.
If the interface for the source IP address is deleted, the port-map translations will not work correctly.
Because a subscriber can have several simultaneous TCP sessions when accessing a web page, SSG assigns a bundle of ports to each subscriber. Because the number of available port bundles are limited, you can assign multiple SSG source IP addresses (one for each group of port bundles). By default, each group has 4032 bundles, and each bundle has 16 ports. To modify the number of bundles per group and the number of ports per bundle, use the ssg port-map length command in global configuration mode.
Examples
The following example shows the SSG source IP address specified with an IP address and with specific interfaces:
Router(config)# ssg port-map source ip 10.0.50.1
Router(config)# ssg port-map source ip Ethernet0/0/0
Router(config)# ssg port-map source ip Loopback 1
Related Commands
|
|
---|---|
ssg port-map length |
Modifies the port-bundle length upon the next SSG reload. |
ssg prepaid reauthorization drop-packet
Note Effective with Cisco IOS Release 15.0(1)M, the ssg prepaid reauthorization drop-packet command is not available in Cisco IOS software.
To configure Service Selection Gateway (SSG) to drop prepaid traffic during reauthorization if threshold values are not configured, use the ssg prepaid reauthorization drop-packet command in global configuration mode. To configure SSG to forward traffic during reauthorization and not to drop traffic during reauthorization, use the no form of this command.
ssg prepaid reauthorization drop-packet
no ssg prepaid reauthorization drop-packet
Syntax Description
This command has no arguments or keywords.
Command Default
SSG forwards traffic during reauthorization by default.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
SSG sends a service reauthorization request to the billing server when a prepaid user's quota is consumed or after the configured idle timeout expires. If the billing sever returns a zero quota in the reauthorization response, the connection is terminated, but the data that was in progress during the reauthorization is not counted in the reauthorization.
Use this command to configure how traffic is handled during reauthorization. This command configures SSG to drop all prepaid user traffic during reauthorization when threshold values are not configured. If you configure SSG to drop traffic during reauthorization and a threshold value is configured, traffic is not dropped during reauthorization until the user exhausts the allotted quota. If a user exhausts the allotted quota, traffic gets dropped until SSG receives the reauthorization response. By default, traffic continues during reauthorization.
Use the no ssg prepaid reauthorization drop-packet command to configure SSG not to drop any traffic during reauthorization.
Examples
The following example shows how to configure SSG to drop traffic during reauthorization:
ssg prepaid reauthorization drop-packet
Related Commands
|
|
---|---|
ssg prepaid threshold |
Configures SSG to reauthorize a prepaid user's connection when the user's remaining quota reaches the configured threshold value. |
ssg prepaid threshold
Note Effective with Cisco IOS Release 15.0(1)M, the ssg prepaid threshold command is not available in Cisco IOS software.
To configure a Service Selection Gateway (SSG) prepaid threshold value, use the ssg prepaid threshold command in global configuration mode. To disable the SSG prepaid threshold value, use the no form of this command.
ssg prepaid threshold {volume bytes | time seconds | default-quota number-of-times}
no ssg prepaid threshold {volume bytes | time seconds | default-quota number-of-times}
Syntax Description
Command Default
No SSG prepaid threshold values are configured, and reauthorization happens only after a user has completely exhausted the allotted quota.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
Use this command to configure an SSG prepaid threshold value. By default, SSG reauthorizes a prepaid user's connection only after the user's allotted quota has been consumed. When a prepaid threshold value is configured, SSG reauthorizes a prepaid user's connection before the user has completely consumed the allotted quota for a service.
For a prepaid threshold time configuration, the threshold time is in seconds and should be configured to be at least equal to the connection reauthorization time.
For a prepaid threshold volume configuration, the threshold volume is in bytes and should be at least equal to the user's bandwidth multiplied by the reauthorization time. Calculate the prepaid threshold volume value using the following formula:
(threshold value) >= B * T
where
B (Bps) = user's bandwidth
T (seconds) = reauthorization time
SSG can be configured to allocate a default quota when the prepaid server fails to respond to an authorization or reauthorization request. Use the default-quota keyword to specify the maximum number of times that SSG will allocate the default quota per instance of prepaid billing server unavailability.
Examples
The following example shows how to configure a threshold time value of 10 seconds:
ssg prepaid threshold time 10
The following example shows how to configure a threshold volume value of 2000 bytes:
ssg prepaid threshold volume 2000
The following example shows how to configure a prepaid default quota threshold of 65:
ssg prepaid threshold default-quota 65
Related Commands
|
|
---|---|
ssg prepaid reauthorization drop-packet |
Configures SSG to drop prepaid traffic during reauthorization. |
ssg profile-cache
Note Effective with Cisco IOS Release 15.0(1)M, the ssg profile-cache command is not available in Cisco IOS software.
To enable caching of user profiles for non-PPP users, use the ssg profile-cache command in global configuration mode. To disable caching of user profiles, use the no form of this command.
ssg profile-cache
no ssg profile-cache
Syntax Description
This command has no arguments or keywords.
Command Default
User-profile caching is not enabled.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
The ssg profile-cache command allows Service Selection Gateway (SSG) to cache the user profiles of non-PPP users. User profiles of PPP and RADIUS proxy users are always cached by SSG by default. In situations in which the user profile is not available from other sources, SSG user-profile caching makes the user profile available for RADIUS status queries, providing support for single-sign-on functionality and for failover from one Subscriber Edge Services Manager (SESM) to another.
In order for a user profile to be cached, the ssg profile-cache command must be configured before account login occurs. Once the user authentication has been done (as part of the account login), the host object is created, and the user profile is cached.
Note If you are using SSG with the SESM in Lightweight Directory Access Protocol (LDAP) mode, you may want to disable SSG user-profile caching in order to save memory and improve scalability. SSG user-profile caching is required only when SSG is used with the SESM in RADIUS mode.
Examples
The following example shows how to enable user-profile caching:
ssg profile-cache
ssg qos police
Note Effective with Cisco IOS Release 15.0(1)M, the ssg qos police command is not available in Cisco IOS software.
To enable the limiting transmission rates for an Service Selection Gateway (SSG) subscriber or for a service being used by an SSG subscriber, use the ssg qos police command in global configuration mode. To disable the limiting of transmission rates, use the no form of this command.
ssg qos police [user | session]
no ssg qos police [user | session]
Syntax Description
Command Default
Traffic is forwarded with no SSG policing restrictions if the ssg qos police command is disabled.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
This command enables the SSG Hierarchical Policing feature, which is used to limit the output transmission rate for a subscriber or for a specific SSG service used by a subscriber. The parameters used to police traffic (committed rate, normal burst, and excess burst) are configured in a RADIUS user profile (per-user policing) or a RADIUS service profile (per-session policing) by using the Q option.
Examples
The following is an example of a user profile with the SSG Hierarchical Policing enabled for downstream traffic. In this example, an excess burst size is set at 0 so all dropped packets are tail-dropped. In this particular profile, only downstream traffic is policed (although it is important to note that an upstream token bucket algorithm would operate identically to the downstream policing algorithm).
user = johndoe
radius = 7200-SSG-v1.1
check_items= {
2 = cisco
}
reply_attributes={ 9,250="Nproxy_ser" 9,250="Ntunnel_ser" 9,250="QD8000;2000;0"
Per-user policing must be enabled on the router before the traffic directed to the subscriber is policed. Per-user policing is enabled on the router by entering the following global configuration command:
Router(config)# ssg qos police user
Note The following steps provide an example of how traffic going to the subscriber is treated in the example configuration. Because packet sizes are variable, the packet sizes used in this example are created for the sake of the example.
The token bucket starts at 1000 tokens. Although the committed rate is specified in bits per seconds, the token bucket operates based on bytes. 8000 bits is equal to 1000 bytes, so a full token bucket has 1000 tokens. The normal burst parameter is set at 2000. For the sake of the example, no actual debt has been accrued before the arrival of the first packet.
•The first packet is 500 bytes and arrives 3/4 second after the last packet.
–The packet size is 500 bytes.
–The time difference (td) is 3/4 of a second.
–actual_debt = previous_actual_debt + packet_size = 0 + 500 = 500
–tokens = committed_rate * td = 1000 * 3/4 = 750
–750 > 500. Therefore, the tokens are greater than the actual debt.
Because tokens are greater than the actual debt, the user has been idle for a sufficient amount of time and the packet is transmitted.
•The second packet is 1500 bytes and arrives 1/2 second after the previous packet.
–The packet size is 1500 bytes.
–The td is 1/2 of a second.
–actual_debt = 0 + 1500 = 1500
–tokens = 1000 * 1/2 = 500
–500 < 1500. Therefore, the tokens are less than the actual debt. Because the tokens are less than the actual debt, an updated actual debt must be calculated and compared to the normal burst size.
–New actual_debt = previous_actual_debt - tokens = 1500 - 500 = 1000
–Normal burst is configured at 2000.
–1000 < 2000. Because the actual debt is less than the normal burst size, the packet is forwarded.
•The next packet is 4000 bytes and it arrives 1/2 second later.
–The packet size is 4000 bytes.
–The td is 1/2 second.
–actual_debt = previous_actual_debt + packet_size = 1000 + 4000 = 5000
–tokens = 1000 * 1/2 = 500
–500 < 5000. The tokens are less than the actual debt, so the new actual debt must be computed.
–actual_debt = previous_actual_debt - tokens = 5000 - 500 = 4500
–4500 > 2000. Because the actual debt is greater than the normal burst size, the packet is dropped.
Future packets will be policed similarly on the basis of this algorithm.
Related Commands
ssg query mac dhcp
Note Effective with Cisco IOS Release 15.0(1)M, the ssg query mac dhcp command is not available in Cisco IOS software.
To configure the Service Selection Gateway (SSG) to send a Dynamic Host Control Protocol (DHCP) lease query request to the configured DHCP server when a subscriber's Media Access Control (MAC) address is not already known, use the ssg query mac dhcp command in global configuration mode. To disable the sending of DHCP lease query requests, use the no form of this command.
ssg query mac dhcp
no ssg query mac dhcp
Syntax Description
This command has no arguments or keywords.
Command Default
SSG does not send DHCP lease query requests.
Command Modes
Global configuration (config)
Command History
|
|
---|---|
12.3(14)T |
This command was introduced. |
12.4 |
This command was integrated into Cisco IOS Release 12.4. |
15.0(1)M |
This command was removed. |
Usage Guidelines
SSG can be configured to authenticate a subscriber on the basis of the subscriber's MAC address. Use the ssg query mac dhcp command to configure SSG to request a subscriber's MAC address when the MAC address is not already present in a subscriber's user profile.
Examples
The following example enables SSG to send a DHCP lease query request to determine the MAC address of a subscriber:
ssg query mac dhcp
Related Commands
ssg radius-helper
Note Effective with Cisco IOS Release 15.0(1)M, the ssg radius-helper command is not available in Cisco IOS software.
To enable communications with the Cisco Service Selection Dashboard (SSD) and specify port numbers and secret keys for receiving packets, use the ssg radius-helper command in global configuration mode. To disable communications with the Cisco SSD, use the no form of this command.
ssg radius-helper [acct-port port-number | auth-port port-number | key key |
access-list acl-id | validate]
no ssg radius-helper [acct-port port-number | auth-port port-number | key key |
access-list acl-id | validate]
Syntax Description
acct-port port-number |
(Optional) UDP1 destination port for RADIUS accounting requests; the host is not used for accounting if set to 0. The default is 1646. |
auth-port port-number |
(Optional) UDP destination port for RADIUS authentication requests; the host is not used for authentication if set to 0. The default is 1645. |
key key |
(Optional) Key shared with the RADIUS clients. |
access-list acl-id |
(Optional) Specifies the access list to be applied to traffic from the Subscriber Edge Services Manager (SESM). •acl-id specifies the IP access list number (or list name) for packets from radius clients. The number range is 1 to 99 (or 1300 to 2699 for an expanded range of RADIUS clients). Note The acl-id argument also allows you to enter the IP access list name for packets from RADIUS clients. |
validate |
(Optional) Enables the validation of SESM IP addresses. Note The Service Selection Gateway (SSG) accepts commands only from validated IP addresses. |
1 UDP = User Datagram Protocol |
Command Default
Communications with the Cisco SSD is not enabled.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
You must use this command to specify a key so that SSG can communicate with the Cisco SSD.
Examples
The following example shows how to enable communications with the Cisco SSD:
router(config)# ssg radius-helper acct-port 1646 auth-port 1645
router(config)# ssg radius-helper key MyKey
router(config)# ssg radius-helper access-list 98
router(config)# ssg radius-helper validate
ssg radius-proxy
Note Effective with Cisco IOS Release 15.0(1)M, the ssg radius-proxy command is not available in Cisco IOS software.
To enable SSG RADIUS Proxy, use the ssg radius-proxy command in global configuration mode. To prevent further connection of proxy users, use the no form of this command
ssg radius-proxy
no ssg radius-proxy
Syntax Description
This command has no arguments or keywords.
Command Default
SSG RADIUS Proxy is not enabled by default.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
Use this command to enable SSG RADIUS Proxy.
This command also enables SSG-radius-proxy configuration mode. You must enable SSG with the ssg enable command before you can enter the ssg radius-proxy command. If you do not enter the ssg radius-proxy command, SSG continues to proxy RADIUS packets containing SSG vendor-specific attributes (VSAs) received from the Service Selection Dashboard (SSD), but does not act as a generic RADIUS proxy.
The no ssg radius-proxy command does not log off RADIUS client hosts that are already logged in.
If you configure the no ssg radius-proxy command, no further connections of proxy users are allowed, but hosts from already configured RADIUS clients remain connected. If you subsequently configure the ssg radius-proxy command, the previous RADIUS proxy configuration is restored.
Examples
The following example enables SSG RADIUS Proxy:
ssg enable
ssg radius-proxy
Related Commands
ssg service-cache
Note Effective with Cisco IOS Release 15.0(1)M, the ssg service-cache command is not available in Cisco IOS software.
To enable the Service Selection Gateway (SSG) Service Profile Caching feature, or to change the refresh interval for services in the service profile cache, use the ssg service-cache command in global configuration mode. To disable Service Selection Gateway (SSG) service profile caching, use the no form of this command.
ssg service-cache [refresh-interval minutes]
no ssg service-cache [refresh-interval minutes]
Syntax Description
Command Default
SSG service profile caching is enabled by default.
The default refresh interval for the SSG service profile cache is every 120 minutes.
Command Modes
Global configuration (config)
Command History
|
|
---|---|
12.2(15)B |
This command was introduced. |
12.3(4)T |
This command was integrated into Cisco IOS Release 12.3(4)T. |
15.0(1)M |
This command was removed. |
Usage Guidelines
The ssg service-cache command is used to enable SSG service profile caching. A refresh interval does not have to be specified (the default of 120 minutes will be used if no refresh interval is configured).
If the refresh interval is set at 180, the SSG service profile cache will check the AAA server for the service profiles in the cache every 180 minutes.
This command enhances the authentication process for SSG service logon by allowing users to authorize to a service using a service profile cached in SSG instead of downloading the service profile from the AAA server.
When this command is entered, all of the service profiles currently in use in SSG are immediately cached.
Examples
In the following example, SSG service profile caching is enabled:
ssg service-cache enable
In the following example, the service profiles in the SSG service profile cache will be updated from the AAA server every 240 minutes:
ssg service-cache refresh-interval 240
Related Commands
ssg service-cache refresh
Note Effective with Cisco IOS Release 15.0(1)M, the ssg service-cache refresh command is not available in Cisco IOS software.
To trigger an update to the Service Selection Gateway (SSG) service profile cache with the service profiles available on the authentication, authorization, and accounting (AAA) server, use the ssg service-cache refresh command in privileged EXEC mode.
ssg service-cache refresh [service-name | all]
no ssg service-cache refresh [service-name | all]
Syntax Description
Command Default
The SSG service profile cache, if enabled, is refreshed at intervals based on the ssg service-cache refresh-interval configuration. If an ssg service-cache refresh-interval is not specified, the default refresh rate is every 120 minutes.
Command Modes
Privileged EXEC (#)
Command History
Usage Guidelines
This command is used to refresh the profiles in the SSG service profile cache manually from the AAA server. The service profiles in the SSG service profile cache are automatically refreshed with the profiles from the AAA server at user-configurable intervals using the ssg service-cache refresh-interval command. The user can trigger a refresh at any time by issuing this command.
If an SSG service cache refresh fails for any reason (for instance, the AAA server is unreachable or down), the service profile caching for that service is disabled. Once a user is able to download the service successfully, caching for the service begins again.
Examples
In the following example, all of the service profiles in the SSG service profile cache will be retrieved from the AAA server and will replace the service profiles in the SSG service profile cache:
ssg service-cache refresh all
In the following example, service profile "service1" will be retrieved from the AAA server and will replace the current "service1" profile in the SSG service profile cache:
ssg service-cache refresh service1
Related Commands
|
|
---|---|
ssg service-cache |
Enables SSG service profile caching. |
ssg service-password
Note Effective with Cisco IOS Release 15.0(1)M, the ssg service-password command is not available in Cisco IOS software.
To specify the password for downloading a service profile, use the ssg service-password command in global configuration mode. To disable the password, use the no form of this command.
ssg service-password password
no ssg service-password password
Syntax Description
password |
Service profile password. |
Command Default
No default behavior or values.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
This command sets the password required to authenticate with the authentication, authorization, and accounting (AAA) server and download a service profile.
Examples
The following example shows how to set the password for downloading a service profile:
ssg service-password MyPassword
ssg service-search-order
Note Effective with Cisco IOS Release 15.0(1)M, the ssg service-search-order command is not available in Cisco IOS software.
To specify the order in which Service Selection Gateway (SSG) searches for a service profile, use the ssg service-search-order command in global configuration mode. To disable the search order, use the no form of this command.
ssg service-search-order {local | remote | local remote | remote local}
no ssg service-search-order {local | remote | local remote | remote local}
Syntax Description
Command Default
The default search order is remote; that is, SSG searches for service profiles on the RADIUS server.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
SSG can search for service profiles in local Flash memory, on a remote RADIUS server, or both. The possible search orders are:
•Local—search only in Flash memory
•Remote—search only on the RADIUS server
•Local remote—search in Flash memory first, then on the RADIUS server
•Remote local—search on the RADIUS server, then in Flash memory
Examples
The following example shows how to set the search order to local remote, so that SSG will always look for service in Flash memory first, then on the RADIUS server:
ssg service-search-order local remote
Related Commands
|
|
---|---|
show ssg binding |
Configures a local RADIUS service profile. |
ssg tcp-redirect
Note Effective with Cisco IOS Release 15.0(1)M, the ssg tcp-redirect command is not available in Cisco IOS software.
To enable SSG TCP redirection and SSG-redirect mode, use the ssg tcp-redirect command in global configuration mode. To disable SSG TCP redirection, use the no form of this command.
ssg tcp-redirect
no ssg tcp-redirect
Syntax Description
SSG TCP redirect is not enabled.
Command Default
This command has no default behavior.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
Use this command to enable SSG TCP redirection. This command also enables SSG-redirect mode. The no ssg tcp-redirect command disables SSG TCP Redirect and removes all configurations created in the SSG-redirect mode. You must enable SSG by issuing the ssg enable command before you can configure SSG TCP redirect.
Examples
The following example shows how to select a captive portal group for redirection of traffic from unauthorized users. In the following example, traffic from unauthorized users is redirected to the captive portal group named "RedirectServer":
ssg enable
ssg tcp-redirect
redirect unauthenticated-user to RedirectServer
The following example shows how to define a port list named "WebPorts" and adds TCP ports 80 and 8080 to the port list. Port 8080 is configured to be redirected by the captive portal group named "Redirect Server":
ssg enable
ssg tcp-redirect
port-list WebPorts
port 80
port 8080
exit
redirect port 8080 to RedirectServer
Related Commands
ssg vc-service-map
Note Effective with Cisco IOS Release 15.0(1)M, the ssg vc-service-map command is not available in Cisco IOS software.
To map virtual circuits (VCs) to service names, use the ssg vc-service-map command in global configuration mode. To disable VC-to-service-name mapping, use the no form of this command.
ssg vc-service-map service-name [interface interface-number] start-vpi | start-vpi/vci [end-vpi | end-vpi/vci] exclusive | non-exclusive
no ssg vc-service-map service-name [interface slot-module-port] start-vpi | start-vpi/vci [end-vpi | end-vpi/vci] exclusive | non-exclusive
Syntax Description
Command Default
The service mapping is non-exclusive by default.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
Use this command to map VCs to service names. If you specify a VC-to-service-name mapping as exclusive, specifying a username will log you in to the mapped service. However, specifying username@service will not log you in. If you specify a mapping as nonexclusive, specifying a username will log you in to the mapped service. However, username@service1 will log you in to service1.
Examples
The following example shows how to map all users coming into SSG on VPI/VCI 3/33 to the service "Worldwide" exclusively:
ssg vc-service-map Worldwide 3/33 exclusive
Related Commands
|
|
---|---|
ssg vc-service-map |
Displays VC-to-service-name mappings. |
ssg wlan reconnect
Note Effective with Cisco IOS Release 15.0(1)M, the ssg wlan reconnect command is not available in Cisco IOS software.
To enable Extensible Authentication Protocol (EAP) users to reconnect after logging off or after idle timeout has occurred, use the ssg wlan reconnect command in global configuration mode. To disable the ability of EAP users to reconnect, use the no form of this command.
ssg wlan reconnect
no ssg wlan reconnect
Syntax Description
This command has no arguments or keywords.
Command Default
EAP users cannot reconnect.
Command Modes
Global configuration (config)
Command History
Usage Guidelines
EAP users do not have a username and password. If they access Subscriber Edge Services Manager (SESM), log off, and try to reconnect to the service later, SESM presents them with a logon page, which they cannot use. To allow users to reconnect without being asked to log on again, enable the user reconnect feature with the ssg wlan reconnect command.
If a user logs off through SESM, when the Service Selection Gateway (SSG) EAP transparency user reconnect functionality has been enabled, SSG inactivates the host. If the user tries to access the service again, SESM queries SSG, and SSG activates the host and enables autologon services.
The SSG host, whether active or inactive, is deleted when the Access Zone Router (AZR) sends an Accounting Stop packet to SSG (when the user walks out of the private wireless LAN (PWLAN) or the Dynamic Host Configuration Protocol (DHCP) address is released).
Note If user reconnect is enabled and a user refreshes or reloads the SESM page after an account logoff, SESM sends a query to SSG, which causes SSG to activate the host. It is recommended that users be made aware of this behavior so they do not accidentally activate the host.
Examples
The following example enables EAP users to reconnect after logging off:
ssg wlan reconnect
timeouts (SSG-radius-proxy)
Note Effective with Cisco IOS Release 15.0(1)M, the timeouts (SSG-radius-proxy) command is not available in Cisco IOS software.
To enter SSG-radius-proxy-timers configuration mode, use the timeouts command in SSG-radius-proxy configuration mode. To restore all timeouts, use the no form of this command.
timeouts
no timeouts
Syntax Description
This command has no arguments or keywords.
Command Default
No default behavior or values.
Command Modes
SSG-radius-proxy configuration
Command History
|
|
---|---|
12.2(15)B |
This command was introduced. |
12.3(4)T |
This command was integrated into Cisco IOS Release 12.3(4)T. |
15.0(1)M |
This command was removed. |
Usage Guidelines
Use this command to enter SSG-radius-proxy-timeouts configuration mode to configure SSG RADIUS proxy handoff, idle, IP address, and Mobile Station ID (MSID) timeouts.
Examples
The following example shows how to enter SSG-radius-proxy-timeouts mode:
ssg radius-proxy
timeouts
user passthrough maximum
Note Effective with Cisco IOS Release 15.0(1)M, the user passthrough maximum command is not available in Cisco IOS software.
To limit the number of Service Selection Gateway (SSG) transparent autologon (TAL) users on an SSG device, use the user passthrough maximum command in SSG login transparent submode. To remove the limitation on the number of SSG TAL users, use the no form of this command.
user passthrough maximum number-of-users
no user passthrough maximum number-of-users
Syntax Description
number-of-users |
Limits the number of SSG TAL users on an SSG device. Range: 1 to 2147483647. |
Command Default
Unlimited TAL users can access an SSG device.
Command Modes
SSG login transparent submode
Command History
|
|
---|---|
12.4(2)T |
This command was introduced. |
15.0(1)M |
This command was removed. |
Usage Guidelines
This command prevents resource exhaustion on a router by limiting the number of SSG TAL users on a device. When the router reaches the maximum number of users, it refuses any new connections.
Examples
The following example limits the number of SSG TAL users to 400:
Router(config)# ssg logon transparent
Router(config-login-transparent)# user passthrough maximum 400
Related Commands
|
|
---|---|
ssg maximum host |
Limits the number of host connections on an SSG device. |
ssg maximum service |
Limits the number of services available to a user on an SSG device. |
user suspect maximum
Note Effective with Cisco IOS Release 15.0(1)M, the user suspect maximum command is not available in Cisco IOS software.
To specify the maximum number of Service Selection Gateway (SSG) transparent autologon suspect (SP) users that can be added to the suspect user list, use the user suspect maximum command in transparent auto-logon configuration mode. To remove the specification, use the no form of this command.
user suspect maximum value
no user suspect maximum value
Syntax Description
value |
Maximum number of suspect users that can be added to the SP list. Valid range is from 10 to 5000. |
Command Default
5000 suspect users.
Command Modes
Transparent auto-logon configuration
Command History
Usage Guidelines
An SSG transparent autologon user becomes suspect when the user's authentication, authorization, and accounting (AAA) attempt is rejected.
If the number of suspect users exceeds the maximum value configured, SSG sends a system logging message and does not add any further users to the SP list.
Examples
The following example specifies that the maximum number of suspect users that can be added to the SP list is 200:
Router(config-login-transparent)# user suspect maximum 200
Related Commands
|
|
---|---|
ssg login transparent |
Enables the SSG Transparent Autologon feature. |
user suspect timeout
Note Effective with Cisco IOS Release 15.0(1)M, the user suspect timeout command is not available in Cisco IOS software.
To specify the maximum length of time for which a Service Selection Gateway (SSG) transparent autologon suspect (SP) user remains in the suspect user list, use the user suspect timeout command in transparent auto-logon configuration mode. To return to the default length of time, use the no form of this command.
user suspect timeout timeout
no user suspect timeout timeout
Syntax Description
timeout |
Maximum length of time (in minutes) that a suspect user remains in the suspect user list. Range is from 1 to 34560. |
Command Default
60 minutes.
Command Modes
Transparent auto-logon configuration
Command History
Usage Guidelines
If a packet is received for a user who is marked as an SP user, packets to or from this user are dropped or TCP-redirected until the timeout value is reached. When the timeout value is reached, any new traffic received by SSG from the user triggers the transparent autologon procedure.
Examples
The following example specifies that a suspect user will remain in the suspect user list for 30 minutes:
Router(config-login-transparent)# user suspect timeout 30
Related Commands
|
|
---|---|
ssg login transparent |
Enables the SSG Transparent Auto-Logon feature. |
user unidentified timeout
Note Effective with Cisco IOS Release 15.0(1)M, the user unidentified timeout command is not available in Cisco IOS software.
To specify the maximum length of time for which a Service Selection Gateway (SSG) transparent autologon unidentified user remains marked as no response (NR), use the user unidentified timeout command in transparent auto-logon configuration mode. To return to the default timeout value, use the no form of this command.
user unidentified timeout timeout
no user unidentified timeout timeout
Syntax Description
timeout |
Length of time (in minutes) that a user remains marked as NR. Range is from 1 to 34560. |
Command Default
10 minutes.
Command Modes
Transparent auto-logon
Command History
Usage Guidelines
An unidentified user is marked NR if there is no response from the authentication, authorization, and accounting (AAA) server to an authorization request and the authorization request times out.
If a packet is received for a user who is marked as an NR user, packets to or from this user are dropped or TCP-redirected until the timeout value is reached. When the timeout value is reached, any new traffic received by SSG from the user triggers the transparent logon procedure.
Examples
The following example sets the user-unidentified timeout to 5 minutes:
Router(config-login-transparent)# user unidentified timeout 5
Related Commands
|
|
---|---|
ssg login transparent |
Enables the SSG Transparent Auto-Logon feature. |
user unidentified traffic permit
Note Effective with Cisco IOS Release 15.0(1)M, the user unidentified traffic permit command is not available in Cisco IOS software.
To specify that packets received from a Service Selection Gateway (SSG) transparent autologon user whose authorization request has timed out will be forwarded or received, use the user unidentified traffic permit command in transparent auto-logon configuration mode. To return to the default, use the no form of this command.
user unidentified traffic permit
no user unidentified traffic permit
Syntax Description
This command has no arguments or keywords.
Command Default
Packets received from a user whose authorization request has timed out are dropped.
Command Modes
Transparent auto-logon configuration
Command History
Usage Guidelines
Configuring this command allows traffic flow for NR users toward the service network.
Examples
The following example specifies that packets received from a user whose authorization request has timed out will be forwarded or received:
Router(config-login-transparent)# user unidentified traffic permit
Related Commands
|
|
---|---|
ssg login transparent |
Enables the SSG Transparent Auto-Logon feature. |
username mac
Note Effective with Cisco IOS Release 15.0(1)M, the username mac command is not available in Cisco IOS software.
To configure the Service Selection Gateway (SSG) to send a subscriber's MAC address as the username (RADIUS attribute 1) in transparent autologon (TAL) authorization requests, use the username mac command in SSG login transparent submode. To disable the sending of the subscriber's MAC address and send the subscriber's IP address instead, use the no form of this command.
username mac
no username mac
Syntax Description
This command has no arguments or keywords.
Command Default
SSG sends the subscriber's IP address as the username (RADIUS attribute 1).
Command Modes
SSG login transparent submode
Command History
|
|
---|---|
12.3(14)T |
This command was introduced. |
12.4 |
This command was integrated into Cisco IOS Release 12.4. |
15.0(1)M |
This command was removed. |
Usage Guidelines
Use the username mac command to configure SSG to send a subscriber's MAC address as the username in TAL authorization requests.
Examples
The following example enables SSG to send a subscriber's MAC address as the username in TAL authorization requests:
username mac