- play_arrow DHCP and DHCPv6 for Subscriber Management
- play_arrow DHCP for Subscriber Management
- DHCP Overview
- DHCP Access Profiles for Subscriber Authentication and Accounting Parameters
- Overrides for Default DHCP Local Server and DHCP Relay Configuration Settings
- Delaying DHCP Offer and Advertise Responses to Load Balance DHCP Servers
- DHCP Options and Selective Traffic Processing
- Using DHCP Option 82 Information
- Default Services for DHCP Subscribers
- DHCP Client Attribute and Address Assignment
- DHCP Lease Times for IP Addresses
- DHCP Leasequery Methods
- DHCP Client Authentication With An External AAA Authentication Service
- Receiving DHCP Options From a RADIUS Server
- Common DHCP Configuration for Interface Groups and Server Groups
- Number of DHCP Clients Per Interface
- Maintaining DHCP Subscribers During Interface Delete Events
- Dynamic Reconfiguration of Clients From a DHCP Local Server
- Understanding Deferred NACK on DHCP Reconfigure Abort
- Conserving IP Addresses Using DHCP Auto Logout
- DHCP Short Cycle Protection
- DHCP Monitoring and Management
-
- play_arrow IPv6 for Subscriber Management
- play_arrow IPv6 for Subscriber Management
- Introduction to IPv6 Addresses
- Migration to IPv6 Using IPv4 and IPv6 Dual Stack
- IPv6 WAN Link Addressing with NDRA
- IPv6 WAN Link Addressing with DHCPv6 IA_NA
- Subscriber LAN Addressing with DHCPv6 Prefix Delegation
- WAN and LAN Addressing Using DHCPv6 IA_NA and DHCPv6 Prefix Delegation
- Designs for IPv6 Addressing in a Subscriber Access Network
- Dual-Stack Access Models in a DHCP Network
- Dual-Stack Access Models in a PPPoE Network
- Best Practices for Configuring IPv4 and IPv6 Dual Stack in a PPPoE Access Network
- Dual Stack for PPPoE Access Networks Using DHCP
- Dual Stack for PPPoE Access Networks Using NDRA
- IP Demultiplexing Interfaces on Packet-Triggered Subscriber Services
- Conservation of IPv4 Addresses for Dual-Stack PPP Subscribers Using On-Demand IPv4 Address Allocation
- Dual Stack Subscribers Monitoring and Management
-
- play_arrow DHCPv6 for Subscriber Management
- play_arrow Packet Triggered Subscriber Services
- play_arrow Packet Triggered Subscriber Services
-
- play_arrow Address-Assignment Pools for Subscriber Management
- play_arrow Address-Assignment Pools for Subscriber Management
-
- play_arrow DNS Addresses for Subscriber Management
- play_arrow DNS Addresses for Subscriber Management
-
- play_arrow M:N Subscriber Redundancy
- play_arrow Access Node Control Protocol and the ANCP Agent for Subscriber Services
- play_arrow Access Node Control Protocol and the ANCP Agent for Subscriber Services
-
- play_arrow Diameter Base Protocol and its Applications
- play_arrow Diameter Base Protocol and its Applications
- Diameter Base Protocol
- Gx-Plus for Provisioning Subscribers
- 3GPP Policy and Charging Control for Wireline Provisioning and Accounting
- NASREQ for Authentication and Authorization
- JSRC for Subscriber Provisioning and Accounting
- JSRC and Subscribers on Static Interfaces
- Monitoring and Management Diameter Information
- Tracing Diameter Base Protocol Events for Troubleshooting
- Troubleshooting Diameter Networks
- Monitoring and Managing Static Subscriber Information
- Tracing Static Subscriber Events for Troubleshooting
-
- play_arrow Configuration Statements and Operational Commands
ON THIS PAGE
RADIUS Logical Line Identification
RADIUS Logical Line Identifier (LLID) Overview
The logical line identification (LLID) feature helps service providers maintain a reliable and up-to-date customer database for those subscribers who frequently move from one physical line to another. The LLID is designed to provide the service provider with a configurable calling station ID for the subscriber access line. A calling station ID is derived from the physical line location and the subscriber client’s information. The line information derived from the facility of the service provider is not friendly for the access line wholesaler to manage access line ownership when subscribers frequently move physical locations. The LLID feature is based on a virtual port — the LLID — rather than the physical line used by the subscriber. The LLID provides AAA driven line information management with a service provider (usually a wholesaler).
The LLID is an alphanumeric string that is based on the subscriber user name and circuit ID. The LLID logically identifies the subscriber line, and is mapped to the subscriber’s physical line in the service provider customer database. When the subscriber moves to a different location and different physical line, the database is updated to map the LLID to the new physical line. Because the subscriber’s LLID remains constant, it provides service providers with a secure and reliable means for tracking subscribers and maintaining an accurate customer database. Subscriber management supports the LLID feature for PPP subscribers over PPPoE, PPPoA, and LAC.
To assign an LLID to a subscriber, the router issues two RADIUS access requests. The first request is a preauthentication request, which obtains the LLID from a RADIUS preauthentication server. The second request is the standard authentication request sent to the RADIUS authentication server.
The following sequence of steps describes how subscriber management obtains and uses the LLID. The procedure assumes that preauthentication is enabled on the router and that the RADIUS preauthentication and authentication servers are configured.
The PPP subscriber sends an Authentication-Request message to the router.
The router sends an Access-Request message to the RADIUS preauthentication server to obtain an LLID for the subscriber.
The preauthentication server returns the LLID to the router in the Calling-Station-Id attribute (RADIUS attribute 31) in the Access-Accept message.
Note:This step includes a non-standard use of the Calling-Station-Id attribute. This attribute is typically present in RADIUS request messages, such as an Access-Request, not in response messages. Also, the router ignores all RADIUS attributes, other than the Calling-Station-Id, that are returned in the preauthentication Access-Accept message. In addition, any radius options that are configured on the router, such as calling-station-id-format, have no effect on the Calling-Station-Id attribute in the preauthentication request.
The router encodes the Calling-Station-Id (the LLID) in a second Access-Request message and sends the message to the RADIUS authentication server. This authentication request is the standard use of the Calling-Station-Id attribute.
The RADIUS authentication server returns an Access-Accept message to the router. The Access-Accept message includes attributes for the subscriber session.
Note:Once the preauthenticated subscriber has been successfully authenticated by the RADIUS authentication server, all subsequent RADIUS request messages, such as Accounting-Request messages, will include the LLID in the Calling-Station-Id attribute.
For tunneled PPP subscribers, the router, acting as an L2TP access concentrator (LAC), encodes the LLID into Calling Number AVP (L2TP attribute 22) and sends the attribute to the L2TP network server (LNS) in an Incoming-Call-Request (ICRQ) packet. After a successful preauthentication request, the router always encodes the LLID in the L2TP Calling Number AVP.
RADIUS Attributes for LLID Preauthentication Requests
Table 1 lists the RADIUS IETF attributes used in a preauthentication request to obtain a subscriber’s LLID, and describes the information that is included in the attributes. In some cases, preauthentication uses an attribute for information that is different than the IETF description—the table indicates any non-standard use of RADIUS attributes.
Attribute Number | Attribute Name | Description |
---|---|---|
1 | User-Name | (Non-standard use of attribute.) Identifying information for the user associated with the LLID, in the following format.
Example: Note: The router strips any dynamically generated information from the User-Name attribute during preauthentication. |
2 | User-Password | (Non-standard use of attribute.) Password of the user to be authenticated. Example: Always set to |
4 | NAS-IP-Address | IP address of the network access server (NAS) that is requesting authentication of the user Example: |
5 | NAS-Port | Physical port number of the NAS that is authenticating the user. Always interpreted as a bit field |
6 | Service-Type | Type of service the user requested or the type of service to be provided. Example: |
61 | NAS-Port-Type | Type of physical port the NAS is using to authenticate
the user. You can use the |
77 | Connect-Info | (Non-standard use of attribute.) The user name. Example: |
87 | NAS-Port-Id | Text string that identifies the physical interface of the NAS that is authenticating the user. Includes any dynamically generated information. Example: |
Configuring Logical Line Identification (LLID) Preauthentication
The logical line identification (LLID) feature enables service providers to track subscribers on the basis of a virtual port — the LLID — rather than by the physical port used by the subscriber. The LLID is assigned by a RADIUS preauthentication server, which you configure in an access profile.
To configure the router to support preauthentication for the LLID feature:
You cannot configure the preauthentication statements in this procedure if you have configured the radius attributes exclude
statement to exclude the Calling-Station-ID attribute from RADIUS Access-Request messages.
Specify the access profile you want to use for the subscriber preauthentication support.
content_copy zoom_out_map[edit]
user@host# edit access profile profile-name
Specify the order in which the router uses the supported preauthentication methods. radius is the only supported authentication method.
content_copy zoom_out_map[edit access profile profile-name]
user@host# set preauthentication-order radius
Specify that you want to configure RADIUS support.
Specify the IP address of the RADIUS server used for preauthentication.
content_copy zoom_out_map[edit access profile profile-name radius]
user@host# set preauthentication-server 192.168.100.10
Note:The preauthentication feature uses the
retry
andtimeout
parameters that are configured for the RADIUS authentication server.(Optional) Display AAA preauthentication statistics.
content_copy zoom_out_mapuser@host>
show network-access aaa statistics preauthentication
Preauthentication module statistics Requests received: 2118 Multistack requests: 0 Accepts: 261 Rejects: 975 Challenges: 0 Requests timed out: 882(Optional) Verify configuration of the RADIUS preauthentication server.
content_copy zoom_out_mapuser@host1> show radius pre-authentication servers RADIUS Pre-Authentication Configuration --------------------------------------- Udp Retry Maximum Dead IP Address Port Count Timeout Sessions Time Secret ------------- ---- ----- ------- -------- ---- ------ 203.0.113.168 1812 3 3 255 0 radius
Configuring a Port and Password for LLID Preauthentication Requests
You can configure a router that operates as the RADIUS client to contact a RADIUS server for authentication and preauthentication requests on two different UDP ports and using different secret passwords. Similar to configuring the port numbers for authentication and accounting requests, you can define a unique port number that the router uses to contact the RADIUS server for logical line identification (LLID) preauthentication requests. You can also define a unique password for preauthentication requests. If you do not configure a separate UDP port or secret for preauthentication purposes, the same UDP port and secret that you configure for authentication messages is used.
To configure a unique UDP port number to be used to contact
the RADIUS server for preauthentication requests, include the preauthentication-port port-number
statement
at the [edit access radius-server server-address]
or [edit access profile profile-name radius-server server-address]
hierarchy
level.
To specify the UDP port for all of the access profiles:
content_copy zoom_out_map[edit access] radius-server server-address { preauthentication-port port-number; }
To specify the UDP port for a specific access profile:
content_copy zoom_out_map[edit access] profile profile-name { radius-server server-address { preauthentication-port port-number; } }
To configure the password to be used to contact the RADIUS preauthentication
server, include the preauthentication-secret password
statement at the [edit access radius-server server-address]
or [edit access profile profile-name radius-server server-address]
hierarchy level.
To specify the password for all of the access profiles:
content_copy zoom_out_map[edit access] radius-server server-address { preauthentication-secret password; }
To specify the password for a specific access profile:
content_copy zoom_out_map[edit access] profile profile-name { radius-server server-address { preauthentication-secret password; } }
Verifying and Managing LLID Preauthentication Configuration
Purpose
Display statistics and configuration information related to logical line identification (LLID) preauthenticaion.
Action
To display LLID preauthentication statistics:
content_copy zoom_out_mapuser@host> show network-access aaa statistics preauthentication
To display information about preauthentication servers:
content_copy zoom_out_mapuser@host> show network-access aaa radius-servers