Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation

Example: Configuring Static Ascend-Data-Filter Support for Subscriber Access

This example shows how to configure support for static Ascend-Data-Filter policies. In a static configuration, you manually configure the Ascend-Data-Filter as part of the dynamic profile configuration. This procedure differs from dynamic configuration, in which the Ascend-Data-Filter is defined on the RADIUS server and then subscriber management uses a predefined variable to map the Ascend-Data-Filter rules to Junos OS filter functionality. Because creating a static Ascend-Data-Filter configuration can be labor-intensive, you might typically use this method for testing purposes.

Requirements

Overview

Ascend-Data-Filters contain rules that create policies. Subscriber management uses a dynamic profile to apply the policy to a subscriber session. You manually configure the Ascend-Data-Filter as part of the dynamic policy.

  • Specify the dynamic profile to use to apply the Ascend-Data-Filter policy to the subscriber session.
  • Configure the Ascend-Data-Filter.
  • Configure optional settings, which include counting the rule usage and setting the precedence for received and transmitted traffic.

Configuration

Step-by-Step Procedure

To configure static Ascend-Data-Filter support:

  1. Specify the dynamic profile in which you want to create the Ascend-Data-Filter, and configure the interface, the logical unit number, and the family type.
    [edit] user@host# edit dynamic-profiles adf-profile-v4 interfaces $junos-interface-ifd-name unit $junos-underlying-interface-unit family inet
  2. Configure the Ascend-Data-Filter. Enclose the filter values within quotation marks. You can configure multiple Ascend-Data-Filter rules in the same dynamic profile.
    [edit dynamic-profiles adf-profile-v4 interfaces “$junos-interface-ifd-name” unit “$junos-underlying-interface-unit” family inet] user@host# set filter adf rule “01000100 0A020100 00000000 18000000 00000000 00000000”
  3. Enable the counter for the rule.
    [edit dynamic-profiles adf-profile-v4 interfaces “$junos-interface-ifd-name” unit “$junos-underlying-interface-unit” family inet] user@host# set filter adf counter
  4. Specify the precedence for received packets on the interface.
    [edit dynamic-profiles adf-profile-v4 interfaces “$junos-interface-ifd-name” unit “$junos-underlying-interface-unit” family inet] user@host# set filter adf input-precedence 80
  5. Specify the precedence for transmitted packets on the interface.
    [edit dynamic-profiles adf-profile-v4 interfaces “$junos-interface-ifd-name” unit “$junos-underlying-interface-unit” family inet] user@host# set filter adf output precedence 85

Results

From configuration mode, confirm your configuration by entering the show dynamic-profiles command. If the output does not display the intended configuration, repeat the configuration instructions in this example to correct it.

[edit]user@host# show dynamic-profiles...
adf-profile-v4 {interfaces {"$junos-interface-ifd-name" {unit "$junos-underlying-interface-unit" {family inet {filter {adf {rule "01000100 0A020100 00000000 18000000 00000000 00000000";counter;input-precedence 80;output-precedence 85;...

If you are done configuring the device, enter commit from configuration mode.

Results

The Ascend-Data-Filter rule defined in Step 2 of the procedure configures an input policy that filters all packets from network 10.2.1.0 with wildcard mask 255.255.255.0 to any destination.

Table 1 lists the values specified in the Ascend-Data-Filter rule.

Table 1: Ascend-Data-Filter Rule

Action or Classifier

Hex Value

Junos OS Filter Function

Type

01

IPv4

Forward

00

Forward

Indirection

01

Ingress

Spare

00

None

Source IP address

0a020100

10.2.1.0

Destination IP address

00000000

Any

Source IP mask

18

24 (255.255.255.0)

Destination IP mask

00

0 (0.0.0.0)

Protocol

00

None

Established

00

None

Source port

0000

None

Destination port

0000

None

Source port qualifier

00

None

Destination port qualifier

00

None

Reserved

0000

None

Verification

To confirm that the configuration is working properly, perform these tasks:

Verifying that Static Ascend-Data-Filter Rules are Applied to Subscriber Sessions

Purpose

Verify that the Ascend-Data-Filter rules you manually configured were attached to the subscriber.

Action

From operational mode, enter the show subscribers extensive command.

user@host>show subscriber extensive
Type: DHCP
User Name: user1-adf
IP Address: 192.168.1.10
IP Netmask: 255.255.255.0
Logical System: default
Routing Instance: default
Interface: ge-1/0/0.0
Interface type: Static
Dynamic Profile Name: adf-profile-v4
MAC Address: 00:10:94:00:00:01
State: Active
Radius Accounting ID: 5
Login Time: 2010-08-12 14:06:27 PDT
ADF IPv4 Input Filter Name: __junos_adf_5-ge-1/0/0.0-inet-in
                    Rule 0: 010001000A02010000000000180000000000000000000000
                            from {
                                destination-address 10.2.1.0/24;
                            }
                            then {
                                accept;
                            }

Meaning

The output shows the information for the dynamic profile, including Ascend-Data-Filter rules. Verify the following information:

  • The User Name field indicates the correct subscriber.
  • The Dynamic Profile Name field is correct for the subscriber.
  • The correct static Ascend-Data-Filter rule is applied to the subscriber.

Verifying Static Ascend-Data-Filter Usage

Purpose

Verify usage of the static Ascend-Data-Filter. Counter statistics are displayed when the counter option is configured for the adf command in the dynamic profile.

Action

From operational mode, enter the show firewall command.

user@host> show firewall
Filter: __junos_adf_5-ge-1/0/0.0-inet-in
Counters:
Name                         Bytes              Packets
t0-cnt                       32758                   22

Meaning

The output shows the name of the filter and the lists counter activity. If the counter option is not configured, the output displays only the filter name.

Published: 2013-02-11