Configuring RADIUS AAA Functionality
RADIUS-based AAA functionality must be configured at the context and system levels. This section describes how to configure the RADIUS-based AAA parameters at the context and system levels.
To configure RADIUS AAA functionality:
Procedure
Step 1 |
Configure RADIUS AAA functionality at context level as described in the Configuring RADIUS AAA Functionality section. |
||
Step 2 |
Configure system-level AAA parameters as described in the Configuring System-Level AAA Functionality section. |
||
Step 3 |
Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode command save configuration . For additional information on how to verify and save configuration files, refer to the System Administration Guide and the Command Line Interface Reference.
|
Configuring RADIUS AAA Functionality at Context Level
This section describes how to configure context-level RADIUS parameters for subscriber authentication and accounting (optional). As noted in this reference, RADIUS-based AAA functionality can be configured within any context, even its own.
Note |
This section provides minimum instructions to configure context-level AAA functionality that allows the system to process data sessions. Commands that configure additional context-level AAA properties are described in the Understanding the System Operation and Configuration chapter of the System Administration Guide. |
Note |
Commands except change-authorize-nas-ip , accounting prepaid , accounting prepaid custom , and accounting unestablished-sessions used in this section, or in the Understanding the System Operation and Configuration chapter, are also applicable to support AAA server group for AAA functionality. For details on AAA server group functionality, see the Configuring AAA Server Group for AAA Functionality section. |
configure
context <context_name>
radius server <ipv4/ipv6_address> key <shared_secret> [ max <value> ] [ oldports | port <tcp_port> ] [ priority <priority> ]
radius [ mediation-device ] accounting server <ipv4/ipv6_address> key <shared_secret> [ acct-on { enable | disable } ] [ acct-off { enable | disable } ] [ max <msgs> ] [ oldports ] [ port <port_number> ] [ priority <priority> ] [ type standard ]
radius attribute nas-identifier <identifier>
radius attribute nas-ip-address address <primary_ipv4/ipv6_address> [ backup <secondary_ipv4/ipv6_address> ]
radius strip-domain [ authentication-only | accounting-only ]
end
Notes:
-
Optional. If you want to support more than 320 server configurations system-wide, in the Global Configuration Mode, use the following command:
aaa large-configuration
Important
After you configure this command, you must save the configuration and then reload the chassis for the command to take effect. For information on saving the configuration file and reloading the chassis, refer to the System Administration Guide for your deployment.
-
<context_name> must be the system context designated for AAA configuration.
-
For information on GGSN-specific additional configurations using RADIUS accounting see the Creating and Configuring APNs section of the GGSN Administration Guide.
-
In this release, the configuration of NAS IP address with IPv6 prefix is currently not supported.
-
<identifier> must be the name designated to identify the system in the Access Request message(s) it sends to the RADIUS server.
-
Optional. Multiple RADIUS attribute dictionaries have been created for the system. Each dictionary consists of a set of attributes that can be used in conjunction with the system. As a result, users could take advantage of all of the supported attributes or only a subset. To specify the RADIUS attribute dictionary that you want to implement, in the Context Configuration Mode, use the following command:
radius dictionary { 3gpp | 3gpp2 | 3gpp2-835 | custom XX | standard | starent | starent-835 | starent-vsa1 | starent-vsa1-835 }
-
Optional. Configure the system to support NAI-based authentication in the event that the system cannot authenticate the subscriber using a supported authentication protocol. To enable NAI-construction, in the Context Configuration Mode, use the following command:
aaa constructed-nai authentication [ encrypted ] password <password>
-
Optional. If RADIUS is configured for GGSN service, the system can be configured to support NAI-based authentication to use RADIUS shared secret as password. To enable, in the Context Configuration Mode, use the following command:
aaa constructed-nai authentication use-shared-secret-password
If authentication type is set to allow-noauth or msid-auth and aaa constructed-nai authentication use-shared-secret-password is issued then the system will use RADIUS shared secret as password. In case the authentication type is msid-auth it will always send RADIUS shared secret as password by default in ACCESS-REQUEST.
-
Optional. To configure the system to allow a user session even when all authentication servers are unreachable, in the Context Configuration Mode, use the following command. When enabled, the session is allowed without authentication. However, the accounting information is still sent to the RADIUS accounting server, if it is reachable.
radius allow authentication-down
-
Optional. To configure the maximum number of times RADIUS authentication requests must be re-transmitted, in the Context Configuration Mode, use the following command:
radius max-transmissions <transmissions>
-
Optional. If RADIUS is configured for PDSN service, to configure the accounting trigger options for R-P originated calls to generate STOP immediately or to wait for active-stop from old PCF on handoff, in the Context Configuration Mode, use the following command:
radius accounting rp handoff-stop { immediate | wait-active-stop }
For more information on configuring additional accounting trigger options for R-P generated calls for a PDSN service, refer to the radius accounting rp command in the Command Line Interface Reference.
-
Optional. To configure the system to check for failed RADIUS AAA servers, in the Context Configuration Mode, use the following command:
radius detect-dead-server { consecutive-failures <count> | keepalive | response-timeout <seconds> }
After a server's state is changed to "Down", the deadtime timer is started. When the timer expires, the server's state is returned to "Active". If both consecutive-failures and response-timeout are configured, then both parameters have to be met before a server's state is changed to "Down". For a complete explanation of RADIUS server states, refer to RADIUS Server State Behavior appendix.
-
Optional. To configure the system to check for failed RADIUS accounting servers, in the Context Configuration Mode, use the following command:
radius accounting detect-dead-server { consecutive-failures <count> | response-timeout <seconds> }
After a server's state is changed to "Down", the deadtime timer is started. When the timer expires, the server's state is returned to "Active". If both consecutive-failures and response-timeout are configured, then both parameters have to be met before a server's state is changed to "Down". For a complete explanation of RADIUS server states, refer to RADIUS Server State Behavior.
-
Optional. If required, users can configure the dynamic redundancy for HA as described in the HA Redundancy for Dynamic Home Agent Assignment chapter of the Home Agent Administration Guide.
Verifying your configuration
To verify your configuration:
In the Exec mode, enter the following command:
show configuration context <context_name>
In the output, verify the AAA settings that you have configured in this user session.