- play_arrow Configuring Dynamic VLANs for Subscriber Access Networks
- play_arrow Dynamic VLAN Overview
- Subscriber Management VLAN Architecture Overview
- Dynamic 802.1Q VLAN Overview
- Static Subscriber Interfaces and VLAN Overview
- Pseudowire Termination: Explicit Notifications for Pseudowire Down Status
- Configuring an Access Pseudowire That Terminates into VRF on the Service Node
- Configuring an Access Pseudowire That Terminates into a VPLS Routing Instance
- play_arrow Configuring Dynamic Profiles and Interfaces Used to Create Dynamic VLANs
- Configuring a Dynamic Profile Used to Create Single-Tag VLANs
- Configuring an Interface to Use the Dynamic Profile Configured to Create Single-Tag VLANs
- Configuring a Dynamic Profile Used to Create Stacked VLANs
- Configuring an Interface to Use the Dynamic Profile Configured to Create Stacked VLANs
- Configuring Interfaces to Support Both Single and Stacked VLANs
- Overriding the Dynamic Profile Used for an Individual VLAN
- Configuring a VLAN Dynamic Profile That Associates VLANs with Separate Routing Instances
- Automatically Removing VLANs with No Subscribers
- Verifying and Managing Dynamic VLAN Configuration
- play_arrow Configuring Subscriber Authentication for Dynamic VLANs
- Configuring an Authentication Password for VLAN or Stacked VLAN Ranges
- Configuring Dynamic Authentication for VLAN Interfaces
- Subscriber Packet Type Authentication Triggers for Dynamic VLANs
- Configuring Subscriber Packet Types to Trigger VLAN Authentication
- Configuring VLAN Interface Username Information for AAA Authentication
- Using DHCP Option 82 Suboptions in Authentication Usernames for Autosense VLANs
- Using DHCP Option 18 and Option 37 in Authentication Usernames for DHCPv6 Autosense VLANs
- play_arrow Configuring VLANs for Households or Individual Subscribers Using ACI-Based Dynamic VLANs
- Agent Circuit Identifier-Based Dynamic VLANs Overview
- Configuring Dynamic VLANs Based on Agent Circuit Identifier Information
- Defining ACI Interface Sets
- Configuring Dynamic Underlying VLAN Interfaces to Use Agent Circuit Identifier Information
- Configuring Static Underlying VLAN Interfaces to Use Agent Circuit Identifier Information
- Configuring Dynamic VLAN Subscriber Interfaces Based on Agent Circuit Identifier Information
- Verifying and Managing Agent Circuit Identifier-Based Dynamic VLAN Configuration
- Clearing Agent Circuit Identifier Interface Sets
- play_arrow Configuring VLANs for Households or Individual Subscribers Using Access-Line-Identifier Dynamic VLANs
- Access-Line-Identifier-Based Dynamic VLANs Overview
- Configuring Dynamic VLANs Based on Access-Line Identifiers
- Defining Access-Line-Identifier Interface Sets
- Configuring Dynamic Underlying VLAN Interfaces to Use Access-Line Identifiers
- Configuring Static Underlying VLAN Interfaces to Use Access-Line Identifiers
- Configuring Dynamic VLAN Subscriber Interfaces Based on Access-Line Identifiers
- Verifying and Managing Configurations for Dynamic VLANs Based on Access-Line Identifiers
- Clearing Access-Line-Identifier Interface Sets
- play_arrow High Availability for Service VLANs
-
- play_arrow Configuring DHCP Subscriber Interfaces
- play_arrow VLAN and Demux Subscriber Interfaces Overview
- play_arrow Configuring Sets of Demux Interfaces to Provide Services to a Group of Subscribers
- play_arrow Configuring Dynamic Demux Interfaces That are Created by DHCP
- play_arrow Configuring DHCP Subscriber Interfaces over Aggregated Ethernet
- Static and Dynamic VLAN Subscriber Interfaces over Aggregated Ethernet Overview
- Static or Dynamic Demux Subscriber Interfaces over Aggregated Ethernet Overview
- Configuring a Static or Dynamic VLAN Subscriber Interface over Aggregated Ethernet
- Configuring a Static or Dynamic IP Demux Subscriber Interface over Aggregated Ethernet
- Configuring a Static or Dynamic VLAN Demux Subscriber Interface over Aggregated Ethernet
- Example: Configuring a Static Subscriber Interface on a VLAN Interface over Aggregated Ethernet
- Example: Configuring a Static Subscriber Interface on an IP Demux Interface over Aggregated Ethernet
- Example: Configuring IPv4 Static VLAN Demux Interfaces over an Aggregated Ethernet Underlying Interface with DHCP Local Server
- Example: Configuring IPv4 Dynamic VLAN Demux Interfaces over an Aggregated Ethernet Underlying Interface with DHCP Local Server
- Example: Configuring IPv6 Dynamic VLAN Demux Interfaces over an Aggregated Ethernet Underlying Interface with DHCP Local Server
- Example: Configuring IPv4 Dynamic Stacked VLAN Demux Interfaces over an Aggregated Ethernet Underlying Interface with DHCP Local Server
- play_arrow Using Dynamic Profiles to Apply Services to DHCP Subscriber Interfaces
- play_arrow Configuring DHCP IP Demux and PPPoE Demux Interfaces Over the Same VLAN
- play_arrow Providing Security for DHCP Interfaces Using MAC Address Validation
- play_arrow RADIUS-Sourced Weights for Targeted Distribution
- play_arrow Verifying Configuration and Status of Dynamic Subscribers
-
- play_arrow Configuring MLPPP for Subscriber Access
- play_arrow MLPPP Support for LNS and PPPoE Subscribers Overview
- MLPPP Overview
- MLPPP Support for LNS and PPPoE Subscribers Overview
- Supported Features for MLPPP LNS and PPPoE Subscribers on the MX Series
- Mixed Mode Support for MLPPP and PPP Subscribers Overview
- Understanding DVLAN (Single/Dual tag) for Subscriber Services Scaling (Junos Evolved for ACX7100-48L Devices)
- play_arrow Configuring MLPPP Link Fragmentation and Interleaving
- play_arrow Configuring Inline Service Interfaces for LNS and PPPoE Subscribers
- play_arrow Configuring L2TP Access Client for MLPPP Subscribers
- play_arrow Configuring Static MLPPP Subscribers for MX Series
- play_arrow Configuring Dynamic MLPPP Subscribers for MX Series
- play_arrow Configuring Dynamic PPP Subscriber Services
- Dynamic PPP Subscriber Services for Static MLPPP Interfaces Overview
- Hardware Requirements for PPP Subscriber Services on Non-Ethernet Interfaces
- Configuring PPP Subscriber Services for MLPPP Bundles
- Enabling PPP Subscriber Services for Static Non-Ethernet Interfaces
- Attaching Dynamic Profiles to MLPPP Bundles
- Example: Minimum MLPPP Dynamic Profile
- Example: Configuring CoS on Static LSQ MLPPP Bundle Interfaces
- play_arrow Monitoring and Managing MLPPP for Subscriber Access
-
- play_arrow Configuring ATM for Subscriber Access
- play_arrow Configuring ATM to Deliver Subscriber-Based Services
- play_arrow Configuring PPPoE Subscriber Interfaces Over ATM
- play_arrow Configuring ATM Virtual Path Shaping on ATM MICs with SFP
- play_arrow Configuring Static Subscriber Interfaces over ATM
- play_arrow Verifying and Managing ATM Configurations
-
- play_arrow Troubleshooting
- play_arrow Contacting Juniper Networks Technical Support
- play_arrow Knowledge Base
-
- play_arrow Configuration Statements and Operational Commands
Example: Configuring a PPPoE Service Name Table
This example shows how you can configure a PPPoE service name
table on an MX Series router with service entries that correspond
to different client services. By configuring the appropriate actions
(delay
, terminate
, or drop
) and agent
circuit identifier/agent remote identifier (ACI/ARI) pairs for the
service entries, you can provide load balancing and redundancy across
a set of remote access concentrators (ACs) in a mesh topology, and
determine how best to allocate service requests from PPPoE clients
to the servers in your network.
In this example, the PPPoE service name table, Table1, contains the following service entries:
user1-service
—Named service representing the subscriber service for user1.user2-service
—Named service representing the subscriber service for user2.empty
service—Represents an unspecified service.
To configure a PPPoE service name table with service entries that correspond to different subscriber services:
Create the PPPoE service name table and define the services and associated actions.
content_copy zoom_out_map[edit protocols pppoe] service-name-tables Table1 { service empty { drop; } service user1-service { terminate; agent-specifier { aci “east*” ari “wfd*” delay 10; aci “west*” ari “svl*” delay 10; } } service user2-service { delay 20; } }
This example creates a PPPoE service name table named Table1 with three service entries, as follows:
The
empty
service is configured with thedrop
action. This action prohibits the router (AC) from responding to PADI packets from the client that contain empty service name tags.The
user1-service
named service is configured with both theterminate
action, and two ACI/ARI (agent-specifier) pairs:The
terminate
action directs the router to immediately respond to PADI packets from the client that contain theuser1-service
tag, and is the default action for named services.The 10-second delay configured for each ACI/ARI pair applies only to PADI packets from the client that contains a vendor-specific tag with matching ACI and ARI information. In this example, configuring the
delay
action indicates that theeast
orwest
server is considered the backup AC for handling these client requests, and that you expect an AC other thaneast
orwest
to handle the request as the primary server. If the primary AC does not respond to the client with a PADO packet within 10 seconds, then theeast
orwest
backup AC sends the PADO packet after the 10-second delay expires.
The
user2-service
named service is configured with a 20-second delay, indicating that you expect an AC other than the one on which this PPPoE service name table is configured to be the primary AC for handling this client request. If the primary AC does not respond to the client with a PADO packet within 20 seconds, then the backup AC (that is, the router on which you are configuring the service name table) sends the PADO packet after the 20-second delay expires.
Assign the PPPoE service name table to a PPPoE underlying interface configured with PPPoE encapsulation.
content_copy zoom_out_map[edit interfaces] ge-2/0/3 { vlan-tagging; unit 0 { vlan-id 100; encapsulation ppp-over-ethernet; pppoe-underlying-options { service-name-table Table1; } } }
(Optional) Verify the PPPoE service name table configuration.
content_copy zoom_out_mapuser@host> show pppoe service-name-tables Table1 Service Name Table: Table1 Service Name: <empty> Service Action: Drop Service Name: user1–service Service Action: Terminate ACI: east* ARI: wfd* ACI/ARI Action: Delay 10 seconds ACI: west* ARI: svl* ACI/ARI Action: Delay 10 seconds Service Name: user2–service Service Action: Delay 20 seconds
(Optional) Verify whether the PPPoE service name table has been properly assigned to the underlying PPPoE interface, and whether packet transfer between the router (AC) and PPPoE client is working correctly.
content_copy zoom_out_mapuser@host>show pppoe underlying-interfaces ge-2/0/3.0 extensive ge-2/0/3.0 Index 72 State: Static, Dynamic Profile: None, Max Sessions: 4000, Active Sessions: 2, Service Name Table: Table1, Duplicate Protection: Off, AC Name: east PacketType Sent Received PADI 0 2 PADO 2 0 PADR 0 2 PADS 2 0 PADT 0 1 Service name error 0 0 AC system error 0 0 Generic error 0 0 Malformed packets 0 0 Unknown packets 0 0
Examine the command output to ensure the following:
The
Service Name Table
field displays the name of the correct PPPoE service name table. This field displaysnone
if no service name table has been associated with the specified interface.The
Sent
andReceived
values for theService name error
field are 0 (zero). For example, a nonzero value in theReceived
field forService name error
indicates that there are errors in the control packets received from PPPoE clients, such as a PADI packet that does not contain a service name tag.