Table of Contents
Cisco Prime Access Registrar 8.0.1 Release Notes
Co-Existence With Other Network Management Applications
New and Enhanced Features in Cisco Prime Access Registrar 8.0.1
Diameter Multiple Proxy Support
Support for Packet Tracing per User
Enhancements in Cisco Prime Access Registrar 8.0.1
Monitoring Diameter Stale Sessions in Prime Access Registrar
Additional Counters for RAR Messages
User Data Caching Option in Resource Manager
Cisco Prime Access Registrar 8.0.1 Bugs
Fixed Anomalies in Cisco Prime Access Registrar 8.0.1.5
Fixed Anomalies in Cisco Prime Access Registrar8.0.1.4
Fixed Anomalies in Cisco Prime Access Registrar8.0.1.3
Fixed Anomalies in Cisco Prime Access Registrar 8.0.1.2
Fixed Anomalies in Cisco Prime Access Registrar8.0.1.1
Additional Traps for Server Monitor
Cisco Prime Access Registrar 8.0.1
Release Notes
Cisco Prime Access Registrar (Prime Access Registrar) is a high performance, carrier class, 3GPP-compliant, 64-bit RADIUS/Diameter solution that provides scalable, flexible, intelligent authentication, authorization, and accounting (AAA) services.
Prime Access Registrar comprises a RADIUS/Diameter server designed from the ground up for performance, scalability, and extensibility for deployment in complex service provider environments including integration with external data stores and systems. Session and resource management tools track user sessions and allocate dynamic resources to support new subscriber service introductions.
Note Prime Access Registrar can be used with Red Hat Enterprise Linux (RHEL) 6.6/7.0/7.2/7.4 and CentOS 6.5 64-bit operating systems using kernel and Glibc.
System Requirements
This section describes the system requirements to install and use the Prime Access Registrar software.
Table 1 lists the system requirements for Prime Access Registrar 8.0.1.
Prime Access Registrar supports JDK versions 1.7 and 1.8 from release 7.3 onwards.
Co-Existence With Other Network Management Applications
To achieve optimal performance, Prime Access Registrar should be the only application running on a given server. In certain cases, when you choose to run collaborative applications such as a SNMP agent, you must configure Prime Access Registrar to avoid UDP port conflicts. The most common conflicts occur when other applications also use ports 2785 and 2786. For more information on SNMP configuration, see the “Configuring SNMP” section in the “Configuring Cisco Prime Access Registrar” chapter of the Cisco Prime Access Registrar 8.0 Administrator Guide.
New and Enhanced Features in Cisco Prime Access Registrar 8.0.1
Cisco Prime Access Registrar 8.0.1 provides the following features:
- Diameter Multiple Proxy Support
- Support for Packet Tracing per User
- Enhancements in Cisco Prime Access Registrar 8.0.1
Diameter Multiple Proxy Support
Prime Access Registrar supports Diameter client configurations in multiple proxy mode. As part of this functionality, client-based Diameter connections can be established from multiple peers with the same IP address but with different source ports and origin-hosts.
The Origin-Host AVP is of type Diameter Identity and must be present in all Diameter messages. This AVP is unique to a host and indicates the endpoint that originated the Diameter message.
When Prime Access Registrar gets a connection from any peer, initially Capabilities Exchange messages (CER-CEA) are exchanged with the client. These messages allow the discovery of peer's identity and its capabilities.
After successful Capabilities exchange with the client, Prime Access Registrar selects the exact client object from the CLI, based on the Origin-Host in CER packet.
A new attribute EnableMultiProxyMode is added to the Diameter client configuration to support this feature. To use this feature, you must configure at least two clients in multiple proxy mode, with the same source IP. Note the following:
- For all the clients configured in multiple proxy mode, the host name must be some name and not an IP address.
- The current implementation of this feature supports only Diameter TCP and TLS connections. It does not support Diameter Routing Agent (DRA) and SCTP connections.
- The maximum number of clients that can be configured in multiple proxy mode with the same IP is 15.
- All the clients configured in multiple proxy mode must have one and the same connection type; either TCP or TLS.
The following CLIs are sample configurations of two clients with same IP Address. host-1 and host-2 mentioned in the following samples are host names referring to the same IP address.
Support for Packet Tracing per User
Prime Access Registrar enables tracing packet flow for a single user or a particular set of users. You can also trace packet flow for an AVP. This feature is applicable for both RADIUS and Diameter packets and supports packet flows to remote servers as well.
Table 2 lists the CLI configuration options to support this feature.
Enhancements in Cisco Prime Access Registrar 8.0.1
Following enhancements are available for Prime Access Registrar 8.0.1:
- Support for Replication via REST API—While configuring Prime Access Registrar via REST interface, supported objects will be replicated.
- Monitoring Diameter Stale Sessions in Prime Access Registrar
- Additional Counters for RAR Messages
- User Data Caching Option in Resource Manager
Monitoring Diameter Stale Sessions in Prime Access Registrar
Prime Access Registrar allows you to monitor the number of Diameter stale sessions. Table 3 lists the parameters introduced in Diameter Statistics (dia-stats) to support this feature.
Additional Counters for RAR Messages
Separate stats counters are introduced for Re-Auth-Request (RAR), Re-Auth-Answer (RAA) and failed RAR messages triggered during the session restoration process.
You can monitor these counters in the Diameter Statistics (dia-stats) of the client before and after the restoration process.
User Data Caching Option in Resource Manager
During 3GPP call flows, Prime Access Registrar provides an option of caching all Access Point Names (APNs) or only a specific APN based on the CLI configuration in the resource manager.
The following CLIs show sample configurations of 3GPP and Session Cache resource managers with the new parameter:
By default, the EnableNon3GPPUserDataCaching option is TRUE, which indicates that all APNs are cached. Set this option to FALSE, to cache only specific APN(s) based on the requirement.
Cisco Prime Access Registrar 8.0.1 Bugs
For information on a specific bug or to search all bugs in a particular Prime Access Registrar release, see Using the Bug Search Tool.
Fixed Anomalies in Cisco Prime Access Registrar 8.0.1.5
Table 4 lists the anomaly fixed in Prime Access Registrar 8.0.1.5 release.
Agent Server stopped working during Nessus vulnerability scanner.
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Fixed Anomalies in Cisco Prime Access Registrar 8.0.1.4
Table 5 lists the anomaly fixed in Prime Access Registrar 8.0.1.4 release.
Fixed Anomalies in Cisco Prime Access Registrar 8.0.1.3
Table 6 lists the enhancements done in Prime Access Registrar 8.0.1.3 release.
Cisco Prime Access Registrar additional traps implementation for server monitor. For more information, see Additional Traps for Server Monitor.
Cisco Prime Access Registrar SSL connection handler enhancement for better resilience. For more information, see SSL Connection Handler.
TCP Options default values update in Radius-TLS Client for Cisco Prime Access Registrar. For more information, see TCP Option Default Values.
Fixed Anomalies in Cisco Prime Access Registrar 8.0.1.2
Table 7 lists the anomalies fixed in Prime Access Registrar 8.0.1.2 release.
Fixed Anomalies in Cisco Prime Access Registrar 8.0.1.1
Table 8 lists the anomalies fixed in Prime Access Registrar 8.0.1.1 release.
Additional Traps for Server Monitor
CPAR supports Server Monitoring using which High and Low TPS thresholds can be monitored. For more details, see the Cisco Prime Access Registrar User Guide, Cisco Prime Access Registrar Administrator Guide.
A new attribute ServerMonitorAltApproach is introduced in aregcmd CLI under //localhost/Radius/Advanced. When SNMP is enabled, this attribute to set to true, and TPSHighThreshold, TPSLowThreshold, and ServerMonitorLogFreqInsecs in //localhost/Radius/Advanced/ServerMonitor are set to non zero values the four traps will be sent by Prime Access Registrar server in the following conditions:
- If the incoming TPS is maintained above configured TPSHighThreshold for a steady state period of five minutes, Prime Access Registrar sends the carTPSCapacityFull trap.
- If the incoming TPS is maintained below configured TPSLowThreshold for a steady state period of five minutes, Prime Access Registrar sends the carTPSCapacityNotFull trap.
- After reaching above TPSHighThreshold, if the incoming TPS decreases below TPSHighThreshold, Prime Access Registrar sends carTPSCapacityFullResetTrap trap.
- After reaching below TPSLowThreshold, if the incoming TPS increases above TPSLowThreshold, Prime Access Registrar sends carTPSCapacityNotFullResetTrap trap.
The traps have the following MIB objects.
Note When ServerMonitorAltApproach attribute is set to TRUE, the TPSLowThreshold, TPSHighThreshold, and ServerMonitorLogFreqInsecs in server monitor configuration should be greater than zero. However; the lowest value for the TPSLowThreshold is one and TPSHighThreshold value should be higher than the TPSLowThreshold value.
SSL Connection Handler
SSL connection handler has been enhanced for better resilience. Changes include:
- The parallel thread handling mechanism that is already available for established TLS connection has been extended to the SSL connection establishment phase itself.
- A socket receive time out has been introduced before SSL accept in order to have a mechanism to close the SSL connection in the event of any problem during connection establishment.
- A configurable parameter called SocketReceiveTimeout has been introduced with a default value of five seconds for the socket receive timeout.
TCP Option Default Values
In /radius/clients/ under TCP Options of RADIUS-TLS type client default values for the TCP Keep Alive parameters are modified as:
KeepAliveIntervalTime and TCPConnectionIdleTime are measured in seconds.
Using the Bug Search Tool
Use the Bug Search tool (BST) to get the latest information about Cisco Prime Access Registrar bugs. BST allows partners and customers to search for software bugs based on product, release, and keyword, and it aggregates key data such as bug details, product, and version.
- Quickly scan bug content
- Configure e-mail notifications for updates on selected bugs
- Start or join community discussions about bugs
- Save your search criteria so you can use it later
When you open the Bug Search page, check the interactive tour to familiarize yourself with these and other Bug Search features.
Step 1 Log into the Bug Search Tool.
a. Go to https://tools.cisco.com/bugsearch.
b. At the Log In screen, enter your registered Cisco.com username and password; then, click Log In. The Bug Search page opens.
Note If you do not have a Cisco.com username and password, you can register for them at http://tools.cisco.com/RPF/register/register.do.
Step 2 To search for a specific bug, enter the bug ID in the Search For field and press Return.
Step 3 To search for bugs in a particular release:
a. In the Search For field, enter the product name and the release version, e.g. Cisco Prime Access Registrar 8.0.1, and press Return. (Leave the other fields empty.)
b. When the search results are displayed, use the filter and sort tools to find the types of bugs you are looking for. You can search for bugs by severity, by status, how recently they were modified, according to the number of support cases associated with them, and so forth.
Related Documentation
For a complete list of Cisco Prime Access Registrar documentation, see the Cisco Prime Access Registrar 8.0 Documentation Overview.
Note We sometimes update the documentation after original publication. Therefore, you should also review the documentation on Cisco.com for any updates.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.