LNS Service Operation
As mentioned previously, LNS functionality on the system is configured via context-level services. LNS services can be configured in the same context as other services supported on the system or in its own context. Each context can support multiple LNS services.
The source context facilitates the LNS service(s) and the PDN and AAA interfaces. The PDN interface is bound to the LNS service and connects L2TP tunnels and sessions from one or more peer LACs. The source context is also be configured to provide AAA functionality for subscriber sessions. The destination context facilitates the packet data network interface(s) and can optionally be configured with pools of IP addresses for assignment to subscriber sessions.
In this configuration, the LNS service in the source context terminates L2TP tunnels from peer LACs and routes the subscriber session data through the destination context to and from a packet data network such as the Internet or a home network.
Information Required
Prior to configuring the system as shown in figure above, a minimum amount of information is required. The following sections describe the information required to configure the source and destination contexts.
Source Context Configuration
The following table lists the information that is required to configure the source context.
Required Information | Description | ||
---|---|---|---|
Source context name |
This is an identification string between 1 and 79 characters (alpha and/or numeric) by which the source context will be recognized by the system. |
||
PDN Interface Configuration |
|||
PDN interface name |
This is an identification string between 1 and 79 characters (alpha and/or numeric) by which the interface will be recognized by the system. Multiple names are needed if multiple interfaces will be configured. These PDN interfaces facilitates the L2TP tunnels/sessions from the LAC and are configured in the source context. |
||
IP address and subnet |
These will be assigned to the PDN interface. Multiple addresses and/or subnets are needed if multiple interfaces will be configured. |
||
Physical port number |
This specifies the physical port to which the interface will be bound. Ports are identified by the chassis slot number where the line card resides in, followed by the number of the physical connector on the line card. For example, port 17/1 identifies connector number 1 on the card in slot 17. A single physical port can facilitate multiple interfaces. |
||
Physical port description |
This is an identification string between 1 and 79 characters (alpha and/or numeric) by which the physical port will be recognized by the system. Multiple descriptions are needed if multiple ports will be used. Physical ports are configured within the source context and are used to bind logical PDN interfaces. |
||
Gateway IP address |
Used when configuring static routes from the PDN interface(s) to a specific network. |
||
LNS service Configuration |
|||
LNS service name |
This is an identification string between 1 and 63 characters (alpha and/or numeric) by which the LNS service will be recognized by the system. Multiple names are needed if multiple LNS services will be used. LNS services are configured in the source context. |
||
Authentication protocols used |
Specifies how the system handles authentication: using a protocol (such as CHAP, PAP, or MSCHAP), or not requiring any authentication. |
||
Domain alias for NAI-construction |
Specifies a context name for the system to use to provide accounting functionality for a subscriber session. This parameter is needed only if the system is configured to support no authentication. |
||
Maximum number of sessions per tunnel |
This defines the maximum number of sessions supported by each tunnel facilitated by the LNS service. The number can be configured to any integer value from 1 to 65535. The default is 65535. |
||
Maximum number of tunnels |
This defines the maximum number of tunnels supported by the LNS service. The number can be configured to any integer value from 1 to 32000. The default is 32000. |
||
Peer LAC |
IP address or network prefix and mask: The IP address of a specific peer LAC for which the LNS service terminates L2TP tunnels. The IP address must be expressed in dotted decimal notation. Multiple peer LACs can be configured. Alternately, to simplify configuration, a group of peer LACs can be specified by entering a network prefix and a mask. |
||
Secret: The shared secret used by the LNS to authenticate the peer LAC. The secret can be from 1 to 256 alpha and/or numeric characters and is case sensitive. |
|||
AAA Interface Configuration |
|||
AAA interface name |
This is an identification string between 1 and 79 characters (alpha and/or numeric) by which the interface will be recognized by the system. Multiple names are needed if multiple interfaces will be configured. AAA interfaces will be configured in the source context. |
||
IP address and subnet |
These will be assigned to the AAA interface. Multiple addresses and/or subnets are needed if multiple interfaces will be configured. |
||
Physical port number |
A single physical port can facilitate multiple interfaces. |
||
Physical port description |
This is an identification string between 1 and 79 characters (alpha and/or numeric) by which the physical port will be recognized by the system. Multiple descriptions are needed if multiple ports will be used. Physical ports are configured within the source context and are used to bind logical AAA interfaces. |
||
Gateway IP address |
Used when configuring static routes from the AAA interface(s) to a specific network. |
||
RADIUS Server Configuration |
|||
RADIUS Authentication server |
IP Address: Specifies the IP address of the RADIUS authentication server the source context will communicate with to provide subscriber authentication functions. Multiple addresses are needed if multiple RADIUS servers will be configured. RADIUS authentication servers are configured within the source context. Multiple servers can be configured and each assigned a priority. |
||
Shared Secret: The shared secret is a string between 1 and 15 characters (alpha and/or numeric) that specifies the key that is exchanged between the RADIUS authentication server and the source context. A shared secret is needed for each configured RADIUS server. |
|||
UDP Port Number: Specifies the port used by the source context and the RADIUS authentication server for communications. The UDP port number can be any integer value between 1 and 65535. The default value is 1812. |
|||
RADIUS Accounting server |
IP Address: Specifies the IP address of the RADIUS accounting server that the source context will communicate with to provide subscriber accounting functions. Multiple addresses are needed if multiple RADIUS servers will be configured. RADIUS accounting servers are configured within the source context. Multiple servers can be configured and each assigned a priority. |
||
Shared Secret: The shared secret is a string between 1 and 15 characters (alpha and/or numeric) that specifies the key that is exchanged between the RADIUS accounting server and the source context. A shared secret is needed for each configured RADIUS server. |
|||
UDP Port Number: Specifies the port used by the source context and the RADIUS Accounting server for communications. The UDP port number can be any integer value between 1 and 65535. The default value is 1813. |
|||
RADIUS attribute NAS Identifier |
Specifies the name by which the source context will be identified in the Access-Request message(s) it sends to the RADIUS server. The name must be between 1 and 32 alpha and/or numeric characters and is case sensitive. |
||
RADIUS NAS IP address |
Specifies the IP address of the source context's AAA interface. A secondary IP address interface can optionally be configured. |
||
Default Subscriber Configuration |
|||
"Default" subscriber's IP context name |
Specifies the name of the egress context on the system that facilitates the PDN ports.
|
Destination Context Configuration
The following table lists the information that is required to configure the destination context.
Required Information | Description | ||
---|---|---|---|
Destination context name |
This is an identification string between 1 and 79 characters (alpha and/or numeric) by which the destination context will be recognized by the system.
|
||
PDN Interface Configuration |
|||
PDN interface name |
This is an identification string between 1 and 79 characters (alpha and/or numeric) by which the interface will be recognized by the system. Multiple names are needed if multiple interfaces will be configured. PDN interfaces are used to connect to a packet network and are configured in the destination context. |
||
IP address and subnet |
These will be assigned to the PDN interface. Multiple addresses and/or subnets are needed if multiple interfaces will be configured. |
||
Physical port number |
A single physical port can facilitate multiple interfaces. |
||
Physical port description(s) |
This is an identification string between 1 and 79 characters (alpha and/or numeric) by which the physical port will be recognized by the system. Multiple descriptions will be needed if multiple ports will be used. Physical ports are configured within the destination context and are used to bind logical PDN interfaces. |
||
Gateway IP address(es) |
Used when configuring static routes from the PDN interface(s) to a specific network. |
||
IP Address Pool Configuration (optional) |
|||
IP address pool name(s) |
If IP address pools will be configured in the destination context(s), names or identifiers will be needed for them. The pool name can be between 1 and 31 alpha and/or numeric characters and is case sensitive. |
||
IP pool addresses |
An initial address and a subnet, or a starting address and an ending address, are required for each configured pool. The pool will then consist of every possible address within the subnet, or all addresses from the starting address to the ending address. The pool can be configured as public, private, or static. |
How This Configuration Works
The following figure and the text that follows describe how this LNS service configuration with a single source and destination context would be used by the system to terminate an L2TP tunnel.
- An L2TP tunnel request from a peer LAC is received by the LNS service. The tunnel is to facilitate a subscriber session.
- The LAC and LNS
establish the L2TP tunnel according to the procedures defined in RFC 2661.
Once the L2TP tunnel is established, subscriber L2TP sessions can be established.
- The LNS service
determines which context to use in providing AAA functionality for the
subscriber session if authentication is enabled for the LNS service. For more
information on this process, refer How the System Selects Contexts in System
Administration Guide.
For this example, the result of this process is that LNS service determined that AAA functionality should be provided by the Source context.
- The system communicates with the AAA server specified in the Source context's AAA configuration to authenticate the subscriber.
- Upon successful
authentication, the LNS service terminates the subscriber's PPP datagrams from
the L2TP session and the system determines which egress context to use for the
subscriber session. For more information on egress context selection process,
refer How the System Selects Contexts in System Administration Guide.
The system determines that the egress context is the destination context based on the configuration of either the Default subscriber's ip-context name or from the SN-VPN-NAME or SN1-VPN-NAME attributes that is configured in the subscriber's RADIUS profile.
- Data traffic for the subscriber session is routed through the PDN interface in the Destination context.
- Accounting information for the session is sent to the AAA server over the AAA interface.