Guest

Cisco IOS Software Releases 12.3 Special and Early Deployments

Release Notes for SSG-MWAM Release 1.1 with Cisco IOS Release 12.3(3)B

  • Viewing Options

  • PDF (575.5 KB)
  • Feedback
Release Notes for SSG-MWAM Release 1.1 with Cisco IOS Release 12.3(3)B

Table Of Contents

Release Notes for SSG-MWAM Release 1.1 with Cisco IOS Release 12.3(3)B

Contents

Introduction

Multi-processor WAN Application Module

Service Selection Gateway

System Requirements

Hardware

Software

Memory

Determining the Software Version

Upgrading to a New Software Release

New and Changed Information

New Hardware Features in Cisco IOS Release 12.3(3)B

New Software Features in Cisco IOS Release 12.3(3)B

Attribute Screening for Access Requests

RADIUS NAS-IP-Address Attribute Configurability

SSG Default DNS Redirection

SSG Enhancements

SSG Permanent TCP Redirection

SSG TCP Redirect Enhancements

SSG Transparent Auto-Logon

New Hardware Features in Cisco IOS Release 12.3(1a)BW

MWAM on Catalyst 6500/Cisco 7600 Platform

New Software Features in Cisco IOS Release 12.3(1a)BW

EAP SIM Enhancements

IP Pool Backup

Multilink PPP Minimum Links Mandatory

PPPoE Session Limit Per NAS Port

RFC-2867 RADIUS Tunnel Accounting

Service Selection Gateway

SSG Autologoff Enhancement

SSG Complete ID

SSG EAP Transparency

SSG Open Garden Configuration Enhancements

SSG L2TP Dialout

SSG Prepaid Enhancements

SSG Prepaid Idle Timeout

SSG Proxy for CDMA2000

SSG PTA-MD Exclusion Lists

SSG Range Command for Bind Statements

SSG Service Profile Caching

SSG Support of NAS Port ID

SSG Suppression of Unused Accounting Records

SSG Unconfig

SSG Unique Session ID

Performance

External Interfaces

IP Address Management

Reliability/Availability

RADIUS Load Balancer

Firewall Load Balancer

System Modules

Configuration Options

Installation and Configuration Notes

Limitations, Restrictions, and Important Notes

Caveats

Open Caveats—Cisco IOS Release 12.3(3)B

Resolved Caveats—Cisco IOS Release 12.3(3)B

Open MWAM Caveats for Cisco IOS Release 12.3(3)B

Resolved MWAM Caveats for Cisco IOS Release 12.3(3)B

MIBs

Related Documentation

Release-Specific Documents

Platform-Specific Documents

Feature Modules

Cisco IOS Software Documentation Set

Documentation Modules

Release 12.3 Documentation Set

Obtaining Documentation

World Wide Web

Documentation CD-ROM

Ordering Documentation

Documentation Feedback

Obtaining Technical Assistance

Cisco.com

Technical Assistance Center

Cisco TAC Web Site

Cisco TAC Escalation Center

Service Selection Gateway

System Requirements

Hardware


Release Notes for SSG-MWAM Release 1.1 with Cisco IOS Release 12.3(3)B


December 1, 2003

Product Numbers:

SC-SVC-SS10—Cisco MWAM Series Service Selection Gateway - Mobile Wireless

SC-SVC-SSP-10=—Service Selection Gateway with Prepaid license

SC-SVC-SSD-10=—Service Selection Gateway Layer 2 Tunneling Protocol dial out license

These release notes include important information and caveats for Cisco SSG-MWAM Release 1.1, which provides the Service Selection Gateway (SSG) feature on the Multi-processor WAN Application Module (MWAM) using Cisco IOS Release 12.3(3)B.

Caveats for Cisco IOS Releases 12.3 can be found on CCO at:

http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123relnt/xprn123/123mcavs.htm

Contents

This release note includes the following topics:

Introduction

System Requirements

New and Changed Information

Performance

External Interfaces

IP Address Management

Reliability/Availability

Installation and Configuration Notes

Limitations, Restrictions, and Important Notes

Caveats

MIBs

Related Documentation

Obtaining Documentation

Obtaining Technical Assistance

Introduction

Cisco SSG-MWAM Release 1.1 implements the SSG on the Multi-processor WAN Application Module (MWAM). Cisco SSG-MWAM Release 1.1 increases session density and enhances interoperability with other products based on the Catalyst 6500/Cisco 7600 series platform.

Multi-processor WAN Application Module

The MWAM provides three processor complexes with dual processors used in two of the complexes and a single processor used in the remaining processor complex. This architecture provides five SSGs (see Figure 1) on one module. In addition, each Catalyst 6500/Cisco 7600 chassis can be populated with multiple MWAMs to enable a large number of subscribers to access network services under SSG control.

Figure 1 MWAM Architecture

The MWAM does not provide external ports but is connected to the switch fabric in the Catalyst 6500/Cisco 7600 chassis. An internal Gigabit Ethernet port provides an interface between each processor complex and the Supervisor module. Virtual Local Area Networks (VLANs) direct traffic from external ports via the Supervisor module to each SSG instance.

The MWAM provides an interface to the IOS image on the Supervisor module. The Supervisor module software enables a single session to be established to each SSG on the MWAM(s) in the chassis. Each session is used for configuring, monitoring, and troubleshooting the SSG. For information on establishing sessions to SSG instances on the MWAM, refer to the Cisco Multi-Processor WAN Application Module Installation and Configuration Notes:

http://www.cisco.com/univercd/cc/td/doc/product/core/cis7600/cfgnotes/mwam_icn.htm

The software image that provides the SSG feature is downloaded through the Supervisor module and distributed to each processor complex on the MWAM(s). The same image is installed on all the processors in the MWAM.


Note In this release, each SSG on the MWAM must be configured individually.


Service Selection Gateway

The SSG is a Cisco IOS software feature module that enables service providers to create new revenue-generating opportunities by offering on-demand services. The SSG provides Remote Authentication Dial-in User Service (RADIUS) authentication and accounting for user-interactive policy routing to different IP destinations. This improves flexibility and convenience for subscribers, including the ability to log on to multiple services simultaneously, and enables service providers to bill subscribers based on connection time and services used, rather than charging a flat rate.

Traffic from the mobile user is addressed to an SSG on the MWAM. The request for access is forwarded to the Authentication, Authorization, and Accounting (AAA) server, and the user is authenticated and authorized to access the services defined in a user profile. Then data traffic is exchanged between the user and servers in the service network. Each network is defined with its own VLAN, and all SSGs on the MWAM access the same VLANs to receive and send data.

For more information about the features available in the SSG, refer to the following URL:

http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123newft/123limit/index.htm

http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/wan_vcg.htm#1000988

http://www.cisco.com/en/US/products/sw/iosswrel/ps5413/products_feature_guides_list.html

System Requirements

This section describes system requirements for SSG-MWAM Release 1.1.

Hardware

The SSG-MWAM Release 1.1 requires the following hardware components:

Catalyst 6500/Cisco 7600 series platform

Supervisor Engine 2 module with MSFC 2 daughter card

MWAM

A Hardware-Software Compatibility Matrix is available on CCO for users with CCO login accounts. This matrix allows users to search for supported hardware components by entering a Cisco platform and IOS Release. The Hardware-Software Compatibility Matrix tool is available at the following URL:

http://www.cisco.com/cgi-bin/front.x/Support/HWSWmatrix/hwswmatrix.cgi

Software

The SSG-MWAM Release 1.1 requires the following software components:

Cisco IOS 12.2(14)ZA2 release (or higher) on the Supervisor module

MWAM software, which includes:

MWAM platform software

Cisco IOS 12.3(3)B release

Memory

The MWAM provides two complexes that are equipped with 1 GB memory shared between two processors (512 MB each). The remaining processor complex, the one with only one processor, is equipped with 512 MB memory. The total memory capacity for the MWAM is 2.5 GB.

The MWAM memory cannot be configured.

Determining the Software Version

To determine the version of Cisco IOS software running on your MWAM, log in to the router on one of the MWAM processors and enter the show version EXEC command:

Router# show version
Cisco Internetwork Operating System Software 
IOS (tm) MWAM Software (MWAM-G4JS-M), Version 12.3(3)B, RELEASE SOFTWARE (fc1)
TAC Support: http://www.cisco.com/tac 
Copyright (c) 1986-2002 by cisco Systems, Inc. 

Upgrading to a New Software Release

For information on upgrading to a new software release, see the product bulletin Cisco IOS Software Upgrade Ordering Instructions located at:

http://www.cisco.com/warp/public/cc/pd/iosw/prodlit/957_pp.htm

Upgrading IOS Image on MWAM

For information on upgrading SSG images on the MWAM, refer to the Cisco Multi-Processor WAN Application Module Installation and Configuration Notes:

http://www.cisco.com/univercd/cc/td/doc/product/core/cis7600/cfgnotes/mwam_icn.htm


Note The image download process loads the IOS image onto the three processor complexes on the MWAM.


Upgrading ROMMON Software

The SSG-MWAM R1.1 with Cisco IOS Release 12.3(3)B requires a ROMMON software upgrade. To perform the ROMMON software upgrade, use the procedure provided in the Cisco Multi-Processor WAN Application Module Installation and Configuration Notes.

New and Changed Information

The following is a list of the new hardware and software features supported by the MWAM on the Catalyst 6500/Cisco 7600 family for Cisco IOS Release 12.3 B.

New Hardware Features in Cisco IOS Release 12.3(3)B

There are no new hardware features supported by the Catalyst 6500/Cisco 7600 family for Cisco IOS Release 12.3(3)B.

New Software Features in Cisco IOS Release 12.3(3)B

The following new software features are supported by the Catalyst 6500/Cisco 7600 family for Cisco IOS Release 12.3(3)B:

Attribute Screening for Access Requests

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

Attribute Screening for Access Requests features allows you to configure your network access server (NAS) to filter attributes in outbound Access Requests to the RADIUS server for purposes of authentication or authorization.

RADIUS NAS-IP-Address Attribute Configurability

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

The RADIUS NAS-IP-Address Attribute Configurability feature allows you to configure an arbitrary IP address to be used as RADIUS attribute 4, NAS-IP-Address, without changing the source IP address in the IP header of the RADIUS packets. This feature may be used for situations in which service providers are using a cluster of small network access servers (NASs) to simulate a large NAS to improve scalability. This feature allows the NASs to behave as a single RADIUS client from the perspective of the RADIUS server.

SSG Default DNS Redirection

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

The SSG Default DNS Redirection feature allows a default Domain Name System (DNS) domain to be configured in a service profile. When a default DNS domain is configured, all DNS queries that do not match a service with a specific domain name will be redirected to the DNS server for a default service.

SSG Enhancements

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

SSG Enhancements describes Layer 2 Tunneling Protocol (L2TP) enhancements for authentication, service logon, and the interface between the Service Selection Gateway (SSG) and the Subscriber Edge Services Manager (SESM). For Release 12.3(3)B, SSG enhancements include a new Account-Info vendor specific attribute (VSA), Account-Accept VSA, and Service-Accept VSA.

The SSG interacts with the SESM, through a Remote Authentication Dial-in User Service (RADIUS) interface. SSG Enhancements describe the enhancements to the RADIUS interface to allow a separate Mobile Station ISDN Number (MSISDN) and Challenge Handshake Authentication Protocol (CHAP) for service logon. The SSG Enhancements documentation also describes error codes in the SSG response to the SESM.

For more information, see the SSG Enhancements feature at the following URL:

http://www.cisco.com/univercd//cc/td/doc/product/software/ios123/123newft/123limit/1231abw/ssgenhn.htm

SSG Permanent TCP Redirection

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

The SSG Permanent TCP Redirection feature enables Service Selection Gateway (SSG), in conjunction with Cisco Subscriber Edge Services Manager (SESM), to provide service selection support to users whose web browsers are configured with HTTP proxy servers. This feature supports plug-and-play functionality in Public Wireless LANs.

SSG TCP Redirect Enhancements

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

The TCP Redirect feature is enhanced to allow access lists to be associated with server groups. This enhancement can be used to limit the kind of traffic that is redirected based on the source or destination IP address and/or TCP ports. It can also be used to redirect different sets of users to different dashboards for unauthenticated user and unauthorized service redirection.

For more information, see the SSG TCP Redirect Enhancements feature at the following URL:

http://www.cisco.com/univercd//cc/td/doc/product/software/ios123/123newft/123limit/1231abw/tcprdrct.htm

SSG Transparent Auto-Logon

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

The SSG Transparent Auto-Logon (TAL) feature enables the Service Selection Gateway (SSG) to authenticate/authorize users based on IP packets received from the user. SSG authorizes users by using information from the Authentication, Authorization, and Accounting (AAA) server when a first IP packet is received from the user.

Users can be activated on SSG through Web-based login procedures using Service Edge Subscriber Management (SESM), RADIUS Proxy, and PPP session termination. The Transparent Auto-Logon feature provides an additional activation method. Transparent Auto-Logon provides SSG services to a user who is authorized based on the source IP address of packets received on a downlink interface of SSG, without any previous authentication phase.

For more information on the Transparent Auto-Logon feature, see the following URL:

http://www.cisco.com/univercd//cc/td/doc/product/software/ios123/123newft/123limit/1231abw/autologn.htm

New Hardware Features in Cisco IOS Release 12.3(1a)BW

The following new hardware feature is supported by the Catalyst 6500/Cisco 7600 family for Cisco IOS Release 12.3(3)B:

MWAM on Catalyst 6500/Cisco 7600 Platform

The MWAM is built on a base card-to-daughter card configuration (Figure 1). It provides three SiByte (700MHz) processor complexes. Two of the processor complexes enable dual processors while the third processor complex enables only one processor because of the memory configuration.

Each SiByte complex has a 1 Gigabit Ethernet (GE) interface to the switch fabric. This connection appears as a GE interface from the Supervisor module.

The MWAM connects to the Catalyst 6500/Cisco 7600 bus for data and control traffic.

More information about the MWAM platform is available at the following URL:

http://www.cisco.com/univercd/cc/td/doc/product/core/cis7600/cfgnotes/mwam_icn.htm

New Software Features in Cisco IOS Release 12.3(1a)BW

The following new software features are supported by the Catalyst 6500/Cisco 7600 family for Cisco IOS Release 12.3(1a)BW:

EAP SIM Enhancements

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

Two EAP-SIM enhancements for Pebble Beach 1.1 solution:

AZR issue: SSG to cleanup the active hosts (EAP-SIM and SESM) users on receiving an Accounting On/Off from AZR due to a reboot. This is needed to close a security hole where an illegal user can hijack the session of a valid user by using the IP address of the valid user after the AZR reboot.

SESM reconnect for EAP-SIM users: This requires that EAP-SIM users access the SESM and perform an Account Logoff. Subsequent to the logoff they can access the SESM and do an account logon again.

IP Pool Backup

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

The IP Pool Backup feature introduces two new interface configuration commands, peer pool backup and peer pool static, which allow you to define alternate sources for IP address pools in the event the original address pool is not present or is exhausted.

The peer pool backup command is useful in large-scale dial-out environments with large numbers of independently controlled authentication, authorization, and accounting (AAA) servers that can make it difficult for the network access server (NAS) to provide proper IP address pool resolution in the following cases:

A new pool name is introduced by one of the AAA servers before that pool is set up on the NAS.

An existing local pool becomes exhausted, but the owner of that AAA server has other pools that would be acceptable as an IP address source.

The peer pool backup command uses the local pool names configured with the peer default ip address pool interface configuration command to supplement the pool names supplied by AAA. The problems of pool name resolution and specific local pool exhaustion can be solved by configuring backup pool names on a per-interface basis using the peer default ip address pool and peer pool backup interface configuration commands.

The peer pool static command controls attempts by the pool software to load dynamic pools in response to a pool request from a specific interface. These dynamic pools are loaded at system startup and refreshed whenever a pool name not configured on the NAS is specified for IP address allocation. Because the behavior of the NAS in response to a missing pool name can be changed using the peer pool backup interface configuration command, you can use the peer pool static command to control attempts to load all dynamic pools when the AAA-supplied pool name is not an existing local pool name.

Multilink PPP Minimum Links Mandatory

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

Multilink PPP allows multiple PPP links to be established in parallel to the same destination. Multilink PPP is often used with dialup lines or ISDN connections to easily increase the amount of bandwidth between points.

With the introduction of the Multilink PPP Minimum Links Mandatory feature, you can configure the minimum number of links in a Multilink PPP (MLP) bundle required to keep that bundle active by entering the ppp multilink min-links links mandatory command. When you configure this command, all Network Control Protocols (NCPs) for an MLP bundle are disabled until the MLP bundle has the required minimum number of links. When a new link is added to the MLP bundle that brings the number of links up to the required minimum number of links, the NCPs are activated for the MLP bundle. When a link is removed from an MLP bundle, and the number of links falls below the required minimum number of links for that MLP bundle, the NCPs are disabled for that MLP bundle.

PPPoE Session Limit Per NAS Port

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

Using the PPPoE Session Limit Per NAS Port feature, you can limit the number of sessions on a specific virtual circuit (VC) or VLAN configured on an L2TP access concentrator (LAC). The NAS port is either an ATM VC or a configured VLAN ID.

The PPPoE session limit per NAS port is maintained in a RADIUS server customer profile database. This customer profile database is connected to a LAC and is separate from the RADIUS server that the LAC and L2TP Network Server (LNS) use for the authentication and authorization of incoming users. When the customer profile database receives a pre-authorization request from the LAC, it sends the PPPoE per NAS port session limit to the LAC.

The LAC sends a pre-authorization request to the customer profile database when the LAC is configured for Subscriber Service Switch (SSS) pre-authorization. Configure the LAC for SSS pre-authorization using the sss-subscriber access pppoe pre-authorizecommand. When the LAC receives the PPPoE per NAS port session limit from the customer profile database, the LAC compares the PPPoE per NAS port session limit to the number of sessions currently on the NAS port. The LAC then decides whether to accept or reject the current call based upon the configured PPoE per NAS port session limit and the number of calls currently on the NAS port.

You can configure other types of session limits on the LAC including session limit per VC, per VLAN, per MAC, or a global session limit for the LAC. When PPPoE Session Limit Per NAS Port is enabled (that is, when you have enabled SSS pre-authorization on the LAC), local configurations for session limit per VC and per VLAN are overwritten by the PPPoE per NAS port session limit downloaded from the customer profile database. Configured session limits per VC and per VLAN serve as backups in case of a PPPoE per NAS port session limit download failure.

The customer profile database consists of user profiles for each user connected to the LAC. Each user profile contains the NAS-IP-Address (Attribute #4) and the NAS-Port-ID (Attribute #5.) When the LAC is configured for SSS pre-authorization, it queries the customer profile database using the username. When a match is found in the customer profile database, the customer profile database sends the PPPoE per NAS port session limit in the user profile. The PPPoE per NAS port session limit is defined in the username as a Cisco AVpair.

RFC-2867 RADIUS Tunnel Accounting

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

The RFC-2867 RADIUS Tunnel Accounting feature introduces six new RADIUS accounting types that are used with the RADIUS accounting attribute Acct-Status-Type (attribute 40), which indicates whether an accounting request marks the beginning of user service (start) or the end (stop). These new accounting types are designed to support the provision of compulsory tunneling in dialup networks; that is, these attribute types allow you to better track tunnel status changes.

This feature also introduces two new commands—vpdn session accounting network (tunnel-link-type records) and vpdn tunnel accounting network (tunnel-type records)—that help identify the following events:

A virtual private dialup network (VPDN) tunnel is brought up or destroyed

A request to create a VPDN tunnel is rejected

A user session within a VPDN tunnel is brought up or brought down

A user session create request is rejected


Note The first two events are tunnel-type accounting records: authentication, authorization, and accounting (AAA) sends Tunnel-Start, Tunnel-Stop, or Tunnel-Reject accounting records to the RADIUS server. The next two events are tunnel-link-type accounting records: AAA sends Tunnel-Link-Start, Tunnel-Link-Stop, or Tunnel-Link-Reject accounting records to the RADIUS server.



Note The accounting types are divided into two separate tunnel types so users can decide if they want tunnel type, tunnel-link type, or both types of accounting.


Service Selection Gateway

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

Service Selection Gateway (SSG) is a switching solution for service providers who offer intranet, extranet, and Internet connections to subscribers using broadband access technology such as xDSL, cable modems, or wireless to allow simultaneous access to network services.

For more information about SSG, refer to the Service Selection Gateway document.

SSG Autologoff Enhancement

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

The SSG Autologoff Enhancement feature configures Service Selection Gateway (SSG) to check the MAC address of a host each time that SSG performs an Address Resolution Protocol (ARP) ping. If SSG finds that the MAC address of the host has changed, SSG automatically initiates the logoff of that host. This prevents unauthorized reuse of IP addresses (spoofing). SSG MAC address checking also detects the assignment of a host IP address to a different host before the original hosts initiates a logoff and clears its host object. This prevents session reuse by a second host.

ARP Ping

The ARP is an Internet protocol used to map IP addresses to MAC addresses in directly connected devices. A router that uses ARP will broadcast ARP requests for IP address information. When an IP address is successfully associated with a MAC address, the router stores the information in the ARP cache.

When SSG Autologoff is configured to use ARP ping, SSG periodically checks the ARP cache tables. If a table entry for a host is found, SSG forces ARP to refresh the entry and checks the entry again after a configured interval. If a table entry is not found, SSG initiates autologoff for the host. However, if any data traffic to or from the host occurred during the interval, SSG does not ping the host because the reachability of the host during that interval was established by the data traffic.

When SSG MAC address checking is configured, SSG checks the MAC address of a host when an ARP ping is performed. If SSG detects a different host MAC address, it initiates an automatic logoff of that host.


Note ARP ping should be used only in deployment scenarios in which all hosts are directly connected to SSG through a broadcast interface such as an Ethernet interface or a bridged interface such as a routed bridge encapsulation (RBE) or integrated routing and bridging (IRB) interface.


ARP request packets are smaller than Internet Control Message Protocol (ICMP) ping packets, so it is recommended that you configure SSG Autologoff to use ARP ping in scenarios where hosts are directly connected.

SSG Complete ID

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

SSG Complete ID provides enhancements to the current interaction mechanism that is used between SSG and SESM, allowing SSG to pass along the following additional information:

Client IP Address

Client MAC Address

Subinterface

VPI/VCI

MSISDN

This allows SESM to offer greater customization of Web portals, specifically by locations. Each hotspot can now have its own branded portal.

SSG EAP Transparency

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

The SSG EAP Transparency feature allows SSG to transparently pass EAP-SIM, EAP-TLS and Cisco LEAP authentication.

SSG Open Garden Configuration Enhancements

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

The Service Selection Gateway (SSG) is an IOS feature and implements layer 3 service selection through selective routing of IP packets to destination networks on a per subscriber basis. Out of the many features SSG has, Open Garden is one of the features, which is very useful for service providers to provide trial-based services to the customers.

An open garden is a collection of web sites that a user can access as long as the user has physical access to the network. The user doesn't need to provide any authentication information before accessing the Web sites in the open garden.

Currently, SSG open garden services can be configured/managed on the router itself, even though they are similar to normal SSG (subscribed) services. The modifications being proposed will allow open garden services to be defined and managed on the RADIUS server as well.

SSG L2TP Dialout

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

The SSG L2TP Dialout feature enhances SSG tunnel services and provides a dialout facility to users. Many Small Office Home Offices (SOHOs) use the Public Switched Telephone Network (PSTN) to access their intranet. SSG L2TP provides mobile users with a way to securely connect to their SOHO through the PSTN.

To provide SSG L2TP Dialout, SSG requires a digital number identification service (DNIS) number for the SOHO to which the user wants to connect, the address of the L2TP Access Concentrator (LAC) closest to the SOHO, and configured tunnel parameters to establish a tunnel to the LAC.

Users can access SSG L2TP Dialout by selecting the dialout service using Cisco Subscriber Edge Services Manager (SESM) from the list of subscribed services or by using a structured username. The user must provide the DNIS number when using either method of connecting to the dialout service.

SSG Prepaid Enhancements

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

SSG Prepaid

The SSG Prepaid feature allows SSG to check a subscriber's available credit to determine whether to connect the subscriber to a service and how long the connection can last. The subscriber's credit is administered by the billing server as a series of quotas representing either a duration of use (in seconds) or an allowable data volume (in bytes). A quota is an allotment of available credit.

To obtain the first quota for a connection, SSG submits an authorization request to the authentication, authorization, and accounting (AAA) server. The AAA server contacts the prepaid billing server, which forwards the quota values to SSG. SSG then monitors the connection to track the quota usage. When the quota runs out, SSG performs reauthorization. During reauthorization, the billing server may provide SSG with an additional quota if there is available credit. If no further quota is provided, SSG logs off the user.

For more information refer to the SSG Prepaid document.

SSG Prepaid Enhancements

SSG Prepaid Enhancements introduces prepaid tariff switching, simultaneous volume and time based prepaid billing, and postpaid tariff Switching.

SSG Prepaid Idle Timeout

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

The SSG Prepaid Idle Timeout feature enhances the SSG Prepaid feature by enabling SSG to return residual quota to the billing server from services that a user is logged into but not actively using. The quota that is returned to the billing center can be applied to the quota for the services the user is actively using.

When SSG is configured for SSG Prepaid Idle Timeout, a user's connection to services can be open even when the billing server returns a zero quota, but the connection's status is dependent on the combination of the quota and the idle timeout value returned. Depending on the connection service, SSG requests the quota for a connection from the billing server once the user starts using a particular service, when the user runs out of quota, or after the configured idle timeout value has expired.

The SSG Prepaid Idle Timeout feature enhances handling of a returned zero quota from the billing server. If a billing server returns a zero quota, and non-zero idle timeout, this indicates that a user has run out of credit for a service. When a user runs out of credit for a service, the user is redirected to the billing server to replenish the quota. When the user is redirected to the billing server, the user's connection to the original service or services is retained. Although the connection remains up, any traffic passing through the connection is dropped. This enables a user to replenish quota on the billing server without losing connections to services or having to perform additional service logons.

Using the SSG Prepaid Idle Timeout feature, you can configure SSG to reauthorize a user before the user completely consumes the allocated quota. You can also configure SSG to not pass traffic during reauthorization. This prevents revenue leaks in the event that the billing server returns a zero quota for the user. Without the SSG Prepaid Idle Timeout feature, traffic passed during reauthorization represents a revenue leak if the billing server returns a zero quota for the user. You can prevent this type of revenue leak by configuring a threshold value, causing SSG to reauthorize a user's connection before the user completely consumes the allocated quota for a service.

SSG Prepaid Idle Timeout enhances SSG to inform the billing server upon any connection failure. This enables the billing server to free quota that was reserved for the connection that failed and to apply this quota immediately to some other active connection.

SSG Proxy for CDMA2000

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

The SSG Proxy for CDMA2000 extends the functionality of the existing SSG RADIUS Proxy so that it may be used in CDMA2000 networks.

When used in a CDMA2000 network, SSG provides RADIUS proxy services to the Packet Data Serving Node (PDSN) and the Home Agent (HA) for both Simple IP and Mobile IP authentication. SSG also provides service selection management and policy-based traffic direction for subscribers.

SSG Proxy for CDMA2000, used with Cisco Subscriber Edge Services Manager (SESM), provides users with on-demand services and service providers with service management and subscriber management.

SSG Proxy for CDMA2000 supports time- and volume-based usage accounting for Simple IP and Mobile IP sessions. Prepaid and postpaid services are supported. Host accounting records can be sent to multiple network elements including Content Service Gateways (CSGs), Content Optimization Engines (COEs), and Wireless Application Protocol (WAP) gateways.

CDMA

Code Division Multiple Access (CDMA) is a digital spread-spectrum modulation technique used mainly with personal communications devices such as mobile phones. CDMA digitizes the conversation and tags it with a special frequency code. The data is then scattered across the frequency band in a pseudorandom pattern. The receiving device is instructed to decipher only the data corresponding to a particular code to reconstruct the signal.

For more information about CDMA, see the "CDMA Overview" knowledge byte on the Mobile Wireless Knowledge Bytes web page.

CDMA2000

CDMA2000 Radius Transmission Technology (RTT) is a wideband, spread-spectrum radio interface that uses CDMA technology to satisfy the needs of Third generation (3G) wireless communication systems. CDMA2000 is backward compatible with CDMA.

For more information about CDMA2000, refer to the "CDMA2000 Overview" knowledge byte on the Mobile Wireless Knowledge Bytes web page.

SSG Proxy for CDMA2000 for Simple IP

When used in a CDMA2000 environment, SSG acts as a RADIUS proxy to the Packet Data Serving Node (PDSN) and to the Home Agent for Simple IP authentication. SSG sets up a host object for the following three different access modes:

PAP/CHAP authentication. In this mode, Password Authentication Protocol/ Challenge Handshake Authentication Protocol (PAP/CHAP) is performed during PPP setup and the NAI is received from a mobile node (MN).

MSID-Based Access. In this mode, the MN does not negotiate CHAP or PAP and no Network Access Identifier (NAI) is received by the PDSN. The PDSN does not perform additional authentication. PDSN constructs an NAI based on the MSID and generates accounting records. Because a user password is not available from the MN, a globally configured password is used as the service password.

MSID-Based Access-Cisco Variant. In this mode, a Cisco PDSN supports MSID-based access by using a realm retrieved from the RADIUS server. This realm is retrieved during an extra authentication phase with the RADIUS server.

SSG operating in a CDMA2000 network correlates Accounting-Start and Accounting-Stop requests. A PDSN may send out many Accounting-Start and Accounting-Stop requests during a session. These Accounting-Start and Accounting-Stop requests can be generated by PDSN hand-off, Packet Control Function (PCF) hand-off, interim accounting, and time-of-date accounting. SSG terminates a session only when it receives an Accounting-Stop request with the 3GPP2-Session-Continue VSA set to "FALSE" or if a subsequent Accounting-Start request is not received within a configured timeout. PPP renegotiation during a PDSN hand-off is treated as a new session.

In SSG Proxy for CDMA2000 for Simple IP, the end-user IP address may be assigned statically by the PDSN, RADIUS server, or SSG. The end-user IP address can also be assigned directly from the autodomain service.

Network Address Translation (NAT) is automatically performed when necessary. NAT is generally necessary when IP address assignment is performed by any mechanism other than directly from the autodomain service (which may be a VPN). You can also configure SSG to always use NAT.

If the user profile contains Cisco Attribute-Value (AV)-pairs of Virtual Private Dialup Network (VPDN) attributes, SSG initiates Layer 2 Tunneling Protocol (L2TP) VPN.

SSG Proxy for CDMA2000 for Mobile IP

For Mobile IP, SSG functions as the RADIUS proxy for both PDSN and the HA. SSG proxies PPP PAP or CHAP and Mobile Node (MN)/Foreign Agent (FA) CHAP authentication. SSG Proxy for CDMA2000 for Mobile IP can assign IP addresses statically by the PDSN, RADIUS server, or SSG. The end user IP address can also be assigned directly from the autodomain service.

Home Agent-Mobile Node (HA-MN) authentication and reverse tunneling must be enabled so that SSG can create host objects for Mobile IP sessions based on proxied RADIUS packets received from the HA.

The Home Agent must generate RADIUS accounting packets so that SSG can discover the user IP address and detect the termination of the session. Multiple Mobile IP sessions with the same NAI are supported. RADIUS packets must contain the Accounting-Session-ID attribute to be associated with the correct user session. SSG correlates RADIUS packets from the PDSN in order to obtain MSID information for a host object of a Mobile IP session.

SSG can set up a host object either with or without PAP/CHAP performed during the original PPP session.

SSG initiates L2TP VPN according to the SSG tunnel service VSAs in the user's profile. If the user profile contains Cisco AV-pairs of VPDN, SSG sets up the L2TP tunnel per these VPDN attributes. SSG removes these AV-pairs when sending the Access-Accept packet back to the PDSN.

Either the HA or the RADIUS server can assign the user's IP address.

Dynamic Home Agent Assignment

Dynamic HA assignment based on a mobile user's location is supported.

SSG Proxy for CDMA2000 provides three options for dynamic HA assignment:

The RADIUS server selects the local HA or any HA that is configured for session requests. For foreign-user call requests, the AAA server assigns the HA.

SSG modifies the fixed HA address received from the RADIUS server to a local HA address. This method can be implemented without making any changes to the RADIUS server configuration. SSG does not modify the HA address for a foreign user. The foreign-user call request is registered with the HA address assigned by the AAA server.

The PDSN implements dynamic HA assignment based on detection of the PDSN hand-off.

Multiple RADIUS Server Support

SSG Proxy for CDMA2000 provides geographical redundancy by copying host object accounting packets and sending them to multiple RADIUS servers.

SSG PTA-MD Exclusion Lists

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

Beginning in Cisco IOS Release 12.2(8)B, the option of passing the entire structured username in the form `user@service' to PPP for authenticating an SSG request became available. The entire structured username can be passed to PPP through the use of a PTA-MD exclusion list; if an entire structured username should be passed to PPP, the domain (the `@service' portion of the structured username) should be added to a PTA-MD exclusion list. The PTA-MD exclusion list can be configured on the AAA server directly or via the router CLI. Structured usernames are parsed for authentication unless a PTA-MD exclusion list is configured for the particular domain requesting a service.

For additional information on SSG PTA-MD Exclusion Lists, see the Service Selection Gateway feature module.

SSG Range Command for Bind Statements

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

SSG Range Command for Bind Statements creates a A "range" command for SSG BIND statements. This is useful when provisioning RBE subscribers en masse, as it allows for streamlined provisioning and configuration with a decreased CPU load.

SSG Service Profile Caching

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

The SSG Service Profile Caching feature enhances the authentication process for SSG services by allowing users to authenticate a service using the service profile cached in SSG.

When SSG Service Profile Caching is not enabled, an authentication, authorization, and accounting (AAA) transaction is required to download a service profile each time an SSG subscriber logs onto the service. The other SSG subscribers already logged onto the service also have their service parameters automatically refreshed as a result of this AAA transaction. In many cases, this automatic refresh causes unnecessary traffic in SSG and on the AAA server.

The SSG Service Profile Caching feature creates a cache of service profiles in SSG. A service profile is downloaded from the AAA server and then stored in the SSG service profile cache as a service-info object. Subsequent SSG subscribers hoping to use that service are authorized by the SSG service profile cache provided that service profile remains in the cache. To ensure that the service profiles in the SSG service profile cache remain updated, the SSG service profile cache automatically refreshes the service profiles by downloading the service profiles from the AAA server at user-configured intervals (the default is every 120 minutes). SSG service profile caches can also be refreshed manually at any time. Service profiles that are not being used by any SSG subscriber are removed from the SSG service profile cache.

SSG Support of NAS Port ID

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

This feature will carry the NAS-Port attribute in the authentication packet. This will allow the authentication server to use consistent policies while authenticating PPPoX users and RFC1483 users. Currently, NAS-Port attribute is sent only for PPPoX users.

With this feature, SSG will send nas-port information for certain IP users in the authentication-request and accounting-request packets.

SSG Suppression of Unused Accounting Records

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

The SSG Suppression of Ununsed Accounting Records feature provides the ability to turn off those accounting records that are not needed on the router.

SSG Unconfig

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

SSG Unconfig

The SSG Unconfig feature enhances your ability to disable SSG at any time and releases the data structures and system resources created by SSG when SSG is unconfigured.

The SSG Unconfig feature enhances several IOS commands to delete all host objects, delete a range of host objects. You can also delete all service objects or connection objects. The show ssg host command has been enhanced to display information about an interface and its IP address when Host-Key mode is enabled on that interface.

System Resource Cleanup When SSG Is Unconfigured

When you enable SSG, the SSG subsystem in IOS acquires system resources that are never released, even after you disable SSG. The SSG Unconfig feature enables you to release and clean up system resources when SSG is not in use by entering the no ssg enable force-cleanup command.

SSG Unique Session ID

Platforms: MWAM on Catalyst 6500 (Cat6000-MWAM) and Cisco 7600 (7600-MWAM)

SSG does not currently support a totally unique accounting session ID in the RADIUS accounting records. The SSG Unique Session ID feature provides a unique format in the RADIUS accounting records in order to be compatible with a customer's existing backend billing systems.

Performance

Each SSG instance on the MWAM is an individual router. Because the MWAM supports five SSGs, it provides five times the session density (i.e., number of user sessions) of the NPE 400 7200/7400 platform. In addition, the MWAM processors provide twice the throughput of processors used in the NPE 400 7200/7400 platform. Overall, the MWAM improves SSG throughput by 5-10 times that of the NPE 400 7200/7400 platform.

External Interfaces

External physical interfaces provided by the supported platforms are not visible to the SSG software. This is an important advantage of the MWAM implementation when compared to the Cisco 7200/7400 platform. The MWAM implementation protects the SSG from interface and link failures. As long as the platform provides redundant links to other system components (e.g., GGSN, AAA servers), the SSG configuration is not affected and its operation is maintained.

IP Address Management

The IP address management for the SSG on the MWAM is the same as the Cisco 7200/7400 platform with one exception: virtual subinterfaces (VLANs) are required for uplink, downlink, and network management paths.

Each SSG on the MWAM is configured with its own IP addresses including addresses for user traffic, RADIUS client function, and network management.

Reliability/Availability

This section provides analysis of reliability/availability of the SSG on the MWAM in the Catalyst 6500/Cisco 7600 chassis in context with other Cisco features. The following features are considered:

SSG on MWAM

Five SSGs on each MWAM

Multiple MWAM cards installed in one chassis

RLB on Supervisor module

Distributes traffic load among SSGs

Provides SSG switchover

FWLB on Supervisor module or CSM—Provides the return traffic path through the same SSG that forwarded the service request

The Server Load Balancing (SLB) function can be implemented in the Supervisor module to provide RADIUS Load Balancing (RLB) across the SSGs on one or multiple MWAMs. The Content Switching Module (CSM) can be used to provide Firewall Load Balancing (FWLB).


Note While the RLB and FWLB features are not part of the SSG-MWAM Release 1.1, they are described here to demonstrate their use in mobile wireless solutions that include MWAM-based SSGs.


RADIUS Load Balancer

The RLB feature is implemented in the Supervisor module. The RLB feature provides one virtual IP address for all users accessing services and keeps the list of real IP addresses of all SSGs. The RLB feature distributes the upstream traffic between SSGs by using the load-balancing mechanism. It keeps the information about SSG assignment for each user session. When the RLB detects an SSG failure, it directs traffic to another available SSG.

Firewall Load Balancer

The FWLB feature ensures that the downstream traffic to the user is sent to the same SSG that handled the upstream traffic. The FWLB feature tracks all upstream traffic from an SSG to a network server and links the SSG address with the user session. This information is used when the downstream traffic from the server is received. The FWLB feature determines which SSG is handling the user traffic.

The FWLB feature can be implemented in the CSM in the same chassis or in the Supervisor module in different chassis.

System Modules

Each system module in the configuration provides its own degree of reliability/availability.

Supervisor Module

Two redundant Supervisor modules can be equipped in the same chassis using the Route Processor Redundancy Plus (RPR+) protocol and the RLB. However, the RLB does not provide stateful failover in this configuration (i.e., user sessions are lost).

If equipping redundant Supervisor modules in two chassis, the RLB can be configured with Hot Standby Router Protocol (HSRP) between the two RLBs to provide stateful failover (i.e., user sessions are maintained).

When configuring the Supervisor module for the FWLB feature, it must be equipped on a different chassis than the one providing the RLB feature. If two chassis are used, the FWLB feature can be configured with HSRP and provide stateful failover.

MWAM

One or more MWAMs can be equipped using stateless failover (provided by the RLB feature) between SSGs. In a stateless failover, when user sessions are lost, the user must re-authenticate, but service access is not denied.

CSM

Two redundant CSMs can be equipped. The FWLB feature is configured with HSRP to provide stateful failover. No user sessions or data packets are lost.

Other Modules

Other service modules can be installed in the same Catalyst 6500/Cisco 7600 chassis that contains the MWAM. For example, to provide advanced content billing, install the Content Services Gateway (CSG).

Configuration Options

The SSG-MWAM Release 1.1 can be implemented in a redundant configuration using one or two chassis with the RLB feature providing the failover mechanism. The MWAM supports the Supervisor module RPR+ feature. This feature enables the MWAM to continue to operate after the active Supervisor fails and the secondary Supervisor takes over.

One Chassis Configuration

The following components are used in a typical one-chassis configuration:

Multiple MWAMs in the chassis, each module with five SSGs

Redundant Supervisor modules (Sup2) running RPR+

RLB feature on the Supervisor module to distribute load and provide failover for SSGs

Redundant FWLBs on CSMs running CSRP

Figure 2 shows an example of the one-chassis configuration.

Figure 2 Basic Configuration—One Chassis

Failure scenarios for the one-chassis configuration include the following:

Failed SSG or MWAM—User sessions are lost, but the traffic is redirected to active SSGs and users can reactivate their sessions

Failed Supervisor module—User sessions are lost because the active RLB does not synchronize its state with its backup

Failed FWLB—Stateful failover maintains user sessions

Two Chassis Configuration

For deployments requiring high reliability/availability, multiple MWAMs in two chassis can be used. The two-chassis configuration uses the following components:

Two Supervisor modules in each chassis, configured for RLB

Multiple SSGs on multiple MWAMs

One FWLB/CSM on each chassis

Redundancy practices:

HSRP between RLBs

CSRP between FWLBs

RPR+ between Supervisor modules in each chassis

RLB failover for SSGs between modules in the same chassis or in two chassis

Figure 3 shows this configuration.

Figure 3 High Availability Configuration—Two-chassis Solution

Failure scenarios for the two-chassis configuration include the following:

If one SSG fails, the RLB feature provides failover to another SSG; all sessions on the failed SSG are lost and users must log in again.


Note The end user may be required to reset the user application.


Failure of the Supervisor on the active chassis causes:

Supervisor switchover to the standby Supervisor (using RPR+) in the same chassis

MWAMs remain active

RLB switchover to the standby RLB (using HSRP) in the second chassis

All user sessions on MWAMs remain active

Failure of active FWLB causes stateful failover to the standby FWLB, maintaining user sessions

Installation and Configuration Notes

For information on installing the MWAM, configuring it through the Command Line Interface (CLI), and loading or upgrading IOS images on the MWAM, refer to the Cisco Multi-Processor WAN Application Module Installation and Configuration Notes:

http://www.cisco.com/univercd/cc/td/doc/product/core/cis7600/cfgnotes/mwam_icn.htm

Limitations, Restrictions, and Important Notes

When working with the MWAM, observe the following limitations, restrictions, and important notes:

Only five instances of the Cisco IOS image 12.3(3)B can be loaded onto the MWAM.

The same Cisco IOS image is loaded onto all processor complexes on the MWAM.

Session console is provided by TCP connection from the Supervisor module (no direct console).

Available memory for bootflash for saving crash information files is 500 KB.

Only five files can be stored in the bootflash file system.

If one processor in a processor complex fails, the second processor also fails, and both processors must be reset.

Cisco IOS image 12.3(3)B contains a feature that is not fully functional unless you upgrade the Supervisor image to 12.2(14)ZA5. This new feature will provide two configuration modes, local mode and Supervisor mode.

The new feature is documented in the MWAM Installation and Configuration Note:

http://www.cisco.com/univercd/cc/td/doc/product/core/cis7600/cfgnotes/mwam_icn.htm

Caveats

Caveats describe unexpected behavior in Cisco IOS software releases. Severity 1 caveats are the most serious caveats; severity 2 caveats are less serious.

Caveats for Cisco IOS Releases 12.3 can be found on CCO at:

http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123relnt/xprn123/123mcavs.htm


Note If you have an account with CCO, you can use Bug Navigator II to find caveats of any severity for any release. You can reach Bug Navigator II on CCO at Software Center: Cisco IOS Software: Cisco Bug Toolkit: Cisco Bugtool Navigator II, or at http://www.cisco.com/support/bugtools.


Caveats for 12.2(14)ZA2 (and higher)

For a list of caveats for 12.2(14)ZA2 (and higher), see the release notes at the following URL:

http://www.cisco.com/en/US/products/sw/iosswrel/ps5012/prod_release_note09186a0080145494.html

Open Caveats—Cisco IOS Release 12.3(3)B

This section documents possible unexpected behavior by Cisco IOS Release 12.3(3)B and describes only severity 1 and 2 caveats and select severity 3 caveats.

CSCec67873

SSG system shows tracebacks and reloads with unexpected exception, CPU signal 10, PC = 0x613F1C10.

This problem occurs when a user is cleared by CLI or disconnects by switching CPE off. Exact cause not yet known.

There are no known workarounds.

CSCin61028

Unable to login to Service on SSG.

This problem occurs when SSG Service logon has failed form service profile having an AC Attribute.

There are no known workarounds.

CSCin61156

SSG Service re-authorization failure with after Quota Time expiry.

This problem occurs when SSG does not send re-authorization request after Quota Time expiry for connection with QT60, QV0 and Idle 0.

There are no known workarounds.

CSCin61296

Unable to logon to tunnel and proxy service.

This problem occurs with CHAP Host logon and PAP service logon are unable to activate the service on SSG.

There are no known workarounds.

CSCin61757

SSG unexpectedly reloads when logging in HO with chap authentication.

Workaround: Use only PAP authentication.

CSCin61934

SSG unexpectedly reloads for proxy service authorization.

This problem occrus when SSG trys to allocate memory for proxy service authorization packet.

There are no known workarounds.

Resolved Caveats—Cisco IOS Release 12.3(3)B

All the caveats listed in this section are resolved in Cisco IOS Release 12.3(3)B. This section describes only severity 1 and 2 caveats and select severity 3 caveats.

CSCea22552

GRE implementation of Cisco IOS is compliant with RFC2784 and RFC2890 and backward compatible with RFC1701.

As an RFC compliancy this DDTS adds the check for bits 4-5 (0 being the most significant) of GRE header.

This issue does not cause any problem for router operation.

CSCea66267

SSG makes authorization requests towards a prepaid server even though the connection cannot be activated.

SSG makes a service authorization request towards OCS for a prepaid service, before it checks whether this service can be activated or not. The service authorization request causes the OCS (prepaid server) to deliver a quota, but if the quota cannot be used by the SSG, this unused quota will not be returned to OCS for other active services. One reason why a service cannot be activated could be that the service is pointing to the same network as another service.

Workaround: Mark services with overlapping service networks as sequential or part of the a mutually exclusive service group so that user cannot log into both of them simultaneously.

CSCeb35210

A Cisco router that has a Quality of Service (QoS) service policy attached to an interface may generate memory alignment errors or reload unexpectedly because of a bus error during normal mode of operation.

This problem is observed when the policy map of the service policy has a set action configuration and when traffic is being processed.

Workaround: Remove the set action configuration from the policy map.

CSCeb47098

When VPDN session is terminated by PPP authentication failure, no VPDN syslog message (%VPDN-6-AUTHENFAIL) and history failure table are logged.

Cisco IOS software version 12.2(16)B, 12.3(1) VPDN logging is enable

There are no known workarounds.

CSCeb60723

SSG forwards accounting retransmits from radius-clients to the AAA server and also does additional retransmits for each forwarded request.

When SSG is configured to forward accounting requests from radius-clients, if the AAA server responds slowly, radius clients will retransmit the accounting requests. SSG forwards the accounting requests even though it is waiting for a response from the AAA server. However, for access-requests from radius-clients, SSG does not forward retransmitted access-requests while waiting for a response from AAA server.

Workaround is to make the radius-client (Radius timeout*Retry) time greater than SSG (Radius timeout*Retry) time.

CSCeb64180

The bug was reported on Catalyst 6000. Other platforms also may have this issue. In hybrid mode, when a reset [15/16] is issued from SP (CatOS, hybrid mode), the reload time displayed is very large.

The reload time displayed is right when a reload is issued from RP console.

There are no known workarounds.

CSCeb87286

Enhanced Interior Gateway Routing Protocol (EIGRP) hello messages may be sent from a virtual-access interface when they should not be sent.

This problem is observed on a Cisco router that has the passive-interface default or passive-interface virtual-template interface-number router configuration command enabled.

There are no known workarounds.

CSCec04016

Auto-domain radius-proxy user logon can crash the box.

This problem occurs if the primary service logon fails because of authentication. Any wrong tunnel parameters in the tunnel profile can crash the box.

Workaround: Configure correct tunnel parameters.

CSCec06617

Configure the router to send accounting start and stop records for a exec connection and configure the following command: aaa accounting send stop-record authen fail.

Do a telnet to the router from any other router. Do not enter anything when it prompts to enter a username. After some time it timesout and will say "[Connection to <IP Addr> closed by foreign host]"

When the telnet connection timesout, two accounting stop records are generated.

There are no known workarounds.

CSCec12911

If the Connection to the LNS fails (due to LNS Reboot or redundant LNS-Failover) the SSG needs a long time to send L2TP HELLO packets to tear down control connection and re-establish tunnel to redundant LNS.

During this period quite a few L2TP-HELLOs are sent to LNS.

There are no known workarounds.

CSCec15964

RADIUS server is marked dead and does not show as "UP" after the deadtime interval has expired.

Two RADIUS servers are configured on LNS, one of them is marked as Dead during the bootup process because it was not able to respond to system accounting request.

When PPP sessions come up, LNS is still trying to send RADIUS request to dead RADIUS server but now it can access that AAA server because LNS builds up the routing information. LNS is getting responses back from the RADIUS server.

LNS is not changing the status of that RADIUS server to UP even after the elapse of configured dead time.

There are no known workarounds.

CSCec24098

When SSG control error debugs are enabled, "Stale network routes" error message is displayed.

This will happen if there are exclude networks ("E") configured in the service profile and if the user logon to this service and does a account logoff.

There are no known workarounds.

CSCec27942

Virtual-access interface not freed when client session torn down.

Client session was momentarily disconnected and then re-connected.

There are no known workarounds.

CSCec30789

The router unexpectedly reloads at sb_timer_intr_handler.

There are no known workarounds.

CSCec31355

In Cisco IOS 12.3 B releases with CSCeb30098 integrated, LCP renegotiation at the L2TP Network Server after authentication has already completed will cause the session to enter the wt-sss state (as seen in "show vpdn"). Unless the LAC tears down the session, the session may get stuck in the wt-sss state.

Workaround: Clear the L2TP tunnel that the stuck sessions are part of.

CSCec32135

The set commands that are used with a service policy can cause a router to reload in some circumstances. The set cos policy-map class configuration command can cause reloads in addition to other set commands.

This problem may be observed with configurations that have a service policy with the set command on the interface.

There are no known workarounds.

CSCec44985

User does not get connection to service, for a PPPoE user when logs in second time.

This problem is seen with the PBHK enabled and the PPP session is created as a non SSG PPP user session.

This problem is seen only in 12.3(3)B.

There are no known workarounds.

CSCec45012

SSG hosts are not cleared when the PPP session for that user goes down.

Also the show ssg host command shows an error message that prints that memory is low. The show ssg host count shows that host count is -ve.

This happens under the following circumstances:

1. SSG binds the PPPoX interface dynamically as downlink (because "ssg direction downlink" has been configured under virtual-template interface mode)

2. user behind the PPPoX interface logs in through the web dashboard (SESM)

SSG host is not deleted when the PPP session goes down. Also when the host is deleted using "clear ssg host all", the host count becomes -ve.

Work-Around: Make sure that the condition#1 does not occur. This can be done by inserting a dummy ssg-account-info attribute in the access-accept of the PPPoX user. This dummy attribute can be: ssg-account-info "Nabracadabra"

CSCec47146

A Cisco router terminating both PPPoE and PPPoA sessions may fail to CEF switch traffic downstream toward the user when different vtemplates are used for the two types of sessions and sub-interfaces are enabled. This problem may affect only a portion of the subscribers.

Workaround: Use one vtemplate for both types of sessions, disable sub-interfaces or disable CEF.

CSCec48087

The input queue of the Gi0/0 interface on MWAM module, used by a sibyte processor running the SSG application, becomes full if a AAA server failure occurs. From that point on, no traffic is forwarded between the MSFC and the subinterfaces configured on Gi0/0 from within the SSG application on the sibyte (pings between MSFC and subinterfaces on Gi0/0 fail, etc.).

Workaround: Reset the MWAM module.

CSCec67336

The router produces the error message:

 %AAA-3-BADMETHODERROR: Cannot process authorization method SERVER_GROUP

or the error message:

 %AAA-3-BADMETHODERROR: Cannot process accounting method SERVER_GROUP

followed by:

-Process= "AAA Server", ipl= XXX, pid= YYY

where XXX and YYY are arbitrary integers greater than or equal to zero. The router then produces a traceback.

This problem is observed when you configure and then attempt to use an authorization or accounting method list which refers to a server group which contains no servers, and which has never contained any servers since the router booted.

For example, if you configured:

aaa authorization network default group radius but did not configure any RADIUS servers globally, you would see the error message every time a user attempted to perform network authorization.

Only 12.2B and 12.3B releases are affected.

Workaround: Make sure that the server group contains at least one server. To add a RADIUS server to the global group "radius", configure:

radius-server host <ipv4 address>

To add a tacacs+ server to the global group "tacacs+", configure:

tacacs-server host <ipv4 address>

To add a server to a RADIUS server group named "foo", configure:

aaa group server radius foo

server <ipv4 address>

To add a server to a tacacs+ server group named "bar", configure:

aaa group server tacacs+ bar

server <ipv4 address>

There are no known workarounds.

CSCin24965

PPPoE sessions does not come up when some debugs are enabled in the LAC. This could possibly due to the additional time lag introduced by enabling the debugs in the LAC.

This will not happen when "lcp re-negotiation" is not configured in the virtual-template in the LNS side.

There are no known workarounds.

CSCin38040

SSG misbehaves (and often crashes) after total number of connections on the box become 64K.

This problem occurs when the number of connections on the box is 64K+.

Workaround: Keep the number of connections to less than 64K.

CSCin45858

SSG does not forward user traffic to service for certain networks.

When a user is connected to a service with certain networks, upstream packets from user towards service will be dropped.

The following error message will be displayed if "debug ssg data" is enabled:

SSG-DATA: CEF-UPST: Unable to find adjacency. Punt (FastEthernet0/0 : 
10.0.1.1->10.1.1.1)
SSG-DATA: PROC-UPST : IDB is NULL. Drop (FastEthernet0/0 : 10.0.1.1->10.1.1.1)
This happens when the destination address falls into a service network of
0.0.0.0 with a non-zero netmask.

Workaround: Replace the service network so that atleast one bit matches the destination address.

CSCin50030

While using SSG, executing show align< indicates that a spurious memory access has occurred.

There are no known workarounds.

CSCin54101

Some sessions may not come up with aa15snap encap.

There are no known workarounds.

CSCin54739

Abnormal termination of "show vpdn" output results in spurious access.

Normal config and unconfig does not result in spurious access

There are no known workarounds.

CSCin54802

AVP 31 (Calling-station-id) is missing from accounting records to prepaid server when SSG radius-proxy users are accessing prepaid service. It happens only when no explicit calling station id is available to SSG.

This problem happens only if:

SSG users are radius-proxy users and accessing prepaid service.

No Calling station id is received in account logon and service logon.

Downlink interface is not a route bridged interface.

This problem was first reported on cisco 7200 platform but same exists on all Cisco platforms supporting SSG functionality.

There are no known workarounds.

CSCin56557

The accounting of input and output bytes/packets for a service connection is not correct. Only upstream traffic is accounted for that service access whereas downstream traffic from that service would be accounted for another service connection.

Could be seen when a user does autologon to 2 no-NAT/passthrough services.

There are no known workarounds.

CSCin57846

SSG Crashes at ssg_search_conn.

Downstream traffic to a ssg host logged onto a proxy NATed service. This happens after a host logs off a service and immediately same/another host with same NATed IP address logs on to the proxy NATed service.

There are no known workarounds.

CSCin58372

Memory leak was observed on 3745 platform.

Mem-leak is seen when SSG subscriber access his SOHO and the user is logged on to a Tunnel service.

There are no known workarounds.

CSCin55922

For each authorization retry in timeout quota in SSG traceback at ServiceAuthorize() is seen.

There are no known workarounds.

CSCin56817

Traceback is noticed for each login/logout of SSG user.

There are no known workarounds.

CSCin57018

Spurious memory access when user logoff from the prepaid service.

This problem is seen only in the 12.3(3)B image.

There are no known workarounds.

CSCin57036

SSG box crashes with __terminate trace.

This can happen if the box is running out of memory and TCP-Redirect is configured.

There are no known workarounds.

CSCin57718

Real IP assigned by service for an ssg connection is sent as framed-ip attribute in the access-accept to SESM.

When a service (proxy or tunnel) assings an IP Address for a connection SSG send it to the SESM in response to the service logon request in the framed-ip attribute. This hides the framed-ip of the host in the access-accept.

There are no known workarounds.

CSCin57902

Any new Access Requests from NAS(GGSN) are not processed by SSG when SSG_dummy_pool fills up.

SSG_dummy_pool fills up when SSG is honoring an Acct-on/Accounting Off along with an accounting stop throttle configuration. Any new Access-Requests from NAS(GGSN) can create this condition.

Workaround: Unconfig and config "ssg radius-proxy" OR a Reload of SSG will clean up this pool.

Open MWAM Caveats for Cisco IOS Release 12.3(3)B

The following is a list of MWAM caveats that are open for Cisco IOS Release 12.3(3)B:

CSCeb38142

MWAM VLAN interfaces stop responding when the Cisco 7609 router is rebooted. Ping packets sent from the Supervisor to the MWAM fail.

Workaround: Reset the MWAM from the Supervisor using the hw-module module slot reset command.

CSCeb58650

When multiple MWAMs are reset at the same time using the hw-module module slot_number reset command, on rare occasions the MWAM will fail to boot (remain in a PwrDown state) and the following message will display on the Supervisor console:

SP: oir_disable_notice: slot12: lcp failed to go online

Workaround: If this condition should occur, bring the MWAM back to an operational state by issuing the hw-module module slot_number reset command.

CSCin51015

SNMP query for CISCO-FLASH-MIB does not populate values. The fields of the CISCO-FLASH-MIB are currently not populated for the flash devices dedicated to each of the processors of the MWAM. When the CISCO-FLASH-MIB of a MWAM processor is queried, the fields of this MIB will incorrectly appear as if there is no flash device for this processor.

Workaround: There is currently no known workaround.

CSCeb48018

MWAM processors are reloaded when receiving traffic at 100 % processor capacity. The condition occurs when sending downstream traffic on processors configured in a cluster.

Workaround: Reduce the CPU from 100 % to 90 %.

CSCec37579

The processor control (PC) in the MWAM may become unreachable when packets are sent through one of the Sibyte processors at a very high rate.

CSCec79587

After reloading a switch containing ten MWAMs, it is no longer possible to upgrade the MP or AP images. All attempts fail with the following message:

stress-6500a#copy tftp: pclc#6-fs: Address or name of remote host [64.102.16.25]? 
Source filename [users/gferris/mwam/c6svcmwam-js-mz.geo_t_030924.1-2-2-1.dev.bin]? 
Destination filename 
[users/gferris/mwam/c6svcmwam-js-mz.geo_t_030924.1-2-2-1.dev.bin]? Accessing 
tftp://64.102.16.25/users/gferris/mwam/c6svcmwam-js-mz.geo_t_030924.1-2-2-1.dev.bin... 
Loading users/gferris/mwam/c6svcmwam-js-mz.geo_t_030924.1-2-2-1.dev.bin from 
64.102.16.25 (via Vlan111): ! %Error opening 
pclc#6-fs:users/gferris/mwam/c6svcmwam-js-mz.geo_t_030924.1-2-2-1.dev.bin (Error 
Sending Request) stress-6500a# 

Workaround: If all MWAMs are configured to boot to the MP (cf:1) on start-up, and the Catalyst 6500/Cisco 7600 is reloaded, then you are able to upgrade MP and AP images.

CSCec88045

The IOS on MWAM processors does not support NTP and other clock commands. The processors synchronize their clocks from the PC, which in turn synchronizes with the Supervisor clock. The Supervisor clock is linked to an NTP clock source.

When the clock value is displayed with show clock command both on the Supervisor and an MWAM processor, the values between the Supervisor and the processor clocks is off by a couple of seconds.

There are no known workarounds.

CSCec75351

The PC may occasionally hang without any error message on the console, preventing session establishment to any of the MWAM processors.

There are no known workarounds.

CSCeb81367

Occasionally, the MWAM processors hang and the khamd command does not reset them.

Workaround: Use the kmp_global_reset command to reset the processor complex.

CSCec46213

When simultaneous hw-module reset commands are issued from the Supervisor, some of the MWAMs don not respond correctly. When the reset is issued, the following message displays:

Oct 1 01:49:20: SP: The PC in slot 7 is shutting down. Please wait ... If the problem 
occurs, the following messages are displayed: Oct 1 01:52:20: SP: 
shutdown_pc_process:No response from module 7 Oct 1 01:52:20: %C6KPWR-SP-4-DISABLED: 
power to module in slot 7 set off (Reset) *Oct 1 01:52:19: 
%C6KPWR-SP-STDBY-4-DISABLED: power to module in slot 7 set off (Reset) 

CSCec61049

Under certain circumstances a processor may reload when deleting a file from the bootflash partition.

Workaround: Before deleting a file from the bootflash, issue a dir command on the bootflash (dir bootflash:). Verify that the sum of the size of the files and the amount of free space add up to approximately 524068 bytes. If the calculated sum is more than 1000 bytes different from 524068 or the crash/reload has already occurred because of a file delete operation, reformat the bootflash partition. After the partition has been formatted, the crash no longer occurs.

CSCec75023

The boot process for the centralized MWAM configuration storage feature on the Supervisor takes too long. For a chassis with four MWAMs, the reboot duration to load the centralized configuration from the Supervisor bootflash takes seven minutes.

There are no known workarounds.

CSCec79096

The MWAM processor/complex may reload when many VRFs are being configured/unconfigured and data flows to these networks are on.

There are no known workarounds.

CSCeb46687

Copying a file from bootflash: to bootflash: does not work on the MWAM.

Workaround: Copy to nvram: or tftp:.

Resolved MWAM Caveats for Cisco IOS Release 12.3(3)B

CSCeb01237

Unable to display the name of the MWAM image from the Supervisor console.

Workaround: Use the show version command to view the IOS image from the MWAM processor.

CSCeb39264

Cannot copy a file to the bootflash of MWAM CPU with an existing name.

An attempt to copy a file to the bootflash:partition of an MWAM processor with a destination filename that already exists on this partition will fail. A copy cannot be made to a file that already exists. The following error message is displayed:

%Error opening bootflash:/running-config (File exists)

Workaround: Delete the file before attempting to overwrite an existing file.

CSCeb59614

MWAM traffic shaping does not function with MWAM Gigabit Ethernet interfaces. Traffic shaping configurations on MWAM gig0/0 interface has no effect. The driver for MWAM gig0/0 interface does not support traffic shaping.

Workaround: There is currently no known workaround.

CSCeb01522

When an MWAM is removed from a slot, the MWAM configuration files remain with the MWAM. A replacement MWAM in the same slot must then be fully reconfigured. Also, when an MWAM is moved from one slot to another, the configuration files move with the MWAM instead of being associated with the original slot.

Workaround: Follow the steps provided below:

a. Whenever you perform the copy running-config startup-config or write memory operation from an MWAM console, always use the copy startup-config tftp://server_name/file_name to copy the MWAM configuration file to an external server. Perform this operation for each MWAM processor.

b. Before moving the MWAM, issue the write erase command at the console of each MWAM image.

c. After installing the MWAM in its new slot, issue the following commands at the consoles of each MWAM processor:

copy tftp://server_name/file_name running-config
copy running-config startup-config 


Note If a TFTP server is unavailable, any bootflash device (slot0: or disk0:) on the Supervisor module can store the MWAM configuration files. This alternative requires configuring the Supervisor for RCP only (not TFTP). It also requires creating empty (i.e., dummy) configuration files on the Supervisor module. The MWAM configuration files are addressed to the Supervisor module using the address:128.0.0.x where x is the Supervisor slot (e.g., 128.0.0.1). The bootflash then becomes the preferred device. Use the file naming convention SLOTxPCy.cfg, where x is the MWAM slot and y is the MWAM processor number. This convention facilitates migration to a future MWAM feature that resolves this problem.


CSCin51016

SNMP query for variable chassisType(1.3.6.1.4.1.9.3.6.1) returns -1 for MWAM module.

Workaround: There is currently no known workaround.

CSCin56742

Issuing the copy running-config startup-config command from the MWAM console fails to write the configuration to the standby Supervisor module.

Workaround: Two workarounds are available:

a. Issue the mwam bootflash access command from the Supervisor console. If a switch-over occurs or if you reload the standby Supervisor module, you must re-issue the mwam bootflash access command.

b. Generate the startup-config file, copy it (TFTP) to a location for editing, and add the line mwam bootflash access. Then copy the file back to startup-config and reload the Supervisor modules. This action enables mwam bootflash access on reloading. However, if you copy the running-config to startup-config on the Supervisor, you remove this configuration and must repeat this workaround.

CSCec36798

When a chassis is reloaded and contains multiple MWAMs that are running in the Supervisor configuration mode (i.e., MWAM configurations stored on the Supervisor bootflash), some of MWAM processors may not receive their configurations from the Supervisor bootflash.

Workaround: Two workarounds are available:

a. Reset the MWAM from the Supervisor console and verify the configuration on each processor. If a processor is found to have no configuration file, reload only that processor.

b. Use local configuration mode on the MWAM instead of the Supervisor configuration mode.

MIBs

No new or modified MIBs are supported by the SSG-MWAM Release 1.1 feature.

To obtain lists of supported MIBs by platform and Cisco IOS release, and to download MIB modules, go to the Cisco MIB website on Cisco.com at the following URL:

http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml

Related Documentation

Except for feature modules, documentation is available as printed manuals or electronic documents. Feature modules are available online on CCO and the Documentation CD-ROM.

Use these release notes with these documents:

Release-Specific Documents

Platform-Specific Documents

Feature Modules

Cisco IOS Software Documentation Set

Release-Specific Documents

The following documents are specific to Release 12.3 and are located on CCO and the Documentation CD-ROM:

Release Notes for Cisco IOS Release 12.2(14)ZA4 on the Catalyst 6500 Series and Cisco 7600 Series Supervisor Engine and MSFC

Cross-Platform Release Notes for Cisco IOS Release 12.3

On CCO at:

Technical Documents: Cisco IOS Software Configuration: Cisco IOS Release 12.3: Release Notes: Cross-Platform Release Notes


Note If you have an account with CCO, you can use Bug Navigator II to find caveats of any severity for any release. You can reach Bug Navigator II on CCO at Software Center: Cisco IOS Software: Cisco Bug Toolkit: Cisco Bugtool Navigator II, or at http://www.cisco.com/support/bugtools.


Product bulletins, field notices, and other release-specific documents on CCO at:

Technical Documents

Platform-Specific Documents

These documents are available for the Catalyst 6500/Cisco 7600 series platforms on Cisco.com and the Documentation CD-ROM:

Cisco Multi-Processor WAN Application Module Installation and Configuration Notes

Catalyst 6500 Series Switch Documentation:

Catalyst 6500 Series Switch Module Installation Guide

Catalyst 6500 Series Switch Installation Guide

Multi-processor WAN Application Module Installation and Configuration Note

Cisco 7600 Series Routers Documentation:

Cisco 7600 Series Internet Router Installation Guide

Cisco 7600 Series Internet Router Module Installation Guide

Cisco 7609 Internet Router Installation Guide

Catalyst 6500 Series Switch Documentation is available at the following URL:

http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/index.htm

Cisco 7600 Series Routers Documentation is available at the following URL:

http://www.cisco.com/en/US/products/hw/routers/ps368/prod_technical_documentation.html

Feature Modules

Feature modules describe new features and are updates to the Cisco IOS documentation set. A feature module consists of a brief overview of the feature, benefits, configuration tasks, and a command reference. As updates, the feature modules are available online only. Feature module information is incorporated in the next printing of the Cisco IOS documentation set.

For more information about SSG, refer to the Service Selection Gateway document. Also refer to the Cisco IOS Wide-Area Networking Configuration Guide, Release 12.3 (chapter on Service Selection Gateway).

Cisco IOS Software Documentation Set

The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents that are shipped with your order in electronic form on the Documentation CD-ROM, unless you specifically ordered the printed versions.

Documentation Modules

Each module in the Cisco IOS documentation set consists of two books: a configuration guide and a corresponding command reference. Chapters in a configuration guide describe protocols, configuration tasks, Cisco IOS software functionality, and contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Use each configuration guide with its corresponding command reference.

On CCO and the Documentation CD-ROM, two master hot-linked documents provide information for the Cisco IOS software documentation set.

On CCO at:

Technical Documents: Cisco IOS Software Configuration: Cisco IOS Release 12.3: Configuration Guides and Command References

Release 12.3 Documentation Set

You can find the most current Cisco IOS documentation on CCO and the Documentation CD-ROM. These electronic documents may contain updates and modifications made after the hard-copy documents were printed.

On CCO at:

Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.3


Note Cisco Management Information Base (MIB) User Quick Reference is no longer published. If you have an account with CCO, you can find the current list of MIBs supported by Cisco. To reach the Cisco Network Management Toolkit, go to CCO, press Login: Technical Support: Software Center: Network Mgmt Software: Cisco Network Management Toolkit: Cisco MIBs.


Obtaining Documentation

These sections explain how to obtain documentation from Cisco Systems.

World Wide Web

You can access the most current Cisco documentation on the World Wide Web at this URL:

http://www.cisco.com

Translated documentation is available at this URL:

http://www.cisco.com/public/countries_languages.shtml

Documentation CD-ROM

Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM package, which is shipped with your product. The Documentation CD-ROM is updated monthly and may be more current than printed documentation. The CD-ROM package is available as a single unit or through an annual subscription.

Ordering Documentation

You can order Cisco documentation in these ways:

Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Networking Products MarketPlace:

http://www.cisco.com/cgi-bin/order/order_root.pl

Registered Cisco.com users can order the Documentation CD-ROM through the online Subscription Store:

http://www.cisco.com/go/subscription

Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, U.S.A.) at 408 526-7208 or, elsewhere in North America, by calling 800 553-NETS (6387).

Documentation Feedback

You can submit comments electronically on Cisco.com. In the Cisco Documentation home page, click the Fax or Email option in the "Leave Feedback" section at the bottom of the page.

You can e-mail your comments to bug-doc@cisco.com.

You can submit your comments by mail by using the response card behind the front cover of your document or by writing to the following address:

Cisco Systems
Attn: Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883

We appreciate your comments.

Obtaining Technical Assistance

Cisco provides Cisco.com as a starting point for all technical assistance. Customers and partners can obtain online documentation, troubleshooting tips, and sample configurations from online tools by using the Cisco Technical Assistance Center (TAC) Web Site. Cisco.com registered users have complete access to the technical support resources on the Cisco TAC Web Site.

Cisco.com

Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information, networking solutions, services, programs, and resources at any time, from anywhere in the world.

Cisco.com is a highly integrated Internet application and a powerful, easy-to-use tool that provides a broad range of features and services to help you with these tasks:

Streamline business processes and improve productivity

Resolve technical issues with online support

Download and test software packages

Order Cisco learning materials and merchandise

Register for online skill assessment, training, and certification programs

If you want to obtain customized information and service, you can self-register on Cisco.com. To access Cisco.com, go to this URL:

http://www.cisco.com

Technical Assistance Center

The Cisco Technical Assistance Center (TAC) is available to all customers who need technical assistance with a Cisco product, technology, or solution. Two levels of support are available: the Cisco TAC Web Site and the Cisco TAC Escalation Center.

Cisco TAC inquiries are categorized according to the urgency of the issue:

Priority level 4 (P4)—You need information or assistance concerning Cisco product capabilities, product installation, or basic product configuration.

Priority level 3 (P3)—Your network performance is degraded. Network functionality is noticeably impaired, but most business operations continue.

Priority level 2 (P2)—Your production network is severely degraded, affecting significant aspects of business operations. No workaround is available.

Priority level 1 (P1)—Your production network is down, and a critical impact to business operations will occur if service is not restored quickly. No workaround is available.

The Cisco TAC resource that you choose is based on the priority of the problem and the conditions of service contracts, when applicable.

Cisco TAC Web Site

You can use the Cisco TAC Web Site to resolve P3 and P4 issues yourself, saving both cost and time. The site provides around-the-clock access to online tools, knowledge bases, and software. To access the Cisco TAC Web Site, go to this URL:

http://www.cisco.com/tac

All customers, partners, and resellers who have a valid Cisco service contract have complete access to the technical support resources on the Cisco TAC Web Site. The Cisco TAC Web Site requires a Cisco.com login ID and password. If you have a valid service contract but do not have a login ID or password, go to this URL to register:

http://www.cisco.com/register/

If you are a Cisco.com registered user, and you cannot resolve your technical issues by using the Cisco TAC Web Site, you can open a case online by using the TAC Case Open tool at this URL:

http://www.cisco.com/tac/caseopen

If you have Internet access, we recommend that you open P3 and P4 cases through the Cisco TAC Web Site.

Cisco TAC Escalation Center

The Cisco TAC Escalation Center addresses priority level 1 or priority level 2 issues. These classifications are assigned when severe network degradation significantly impacts business operations. When you contact the TAC Escalation Center with a P1 or P2 problem, a Cisco TAC engineer automatically opens a case.

To obtain a directory of toll-free Cisco TAC telephone numbers for your country, go to this URL:

http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml

Before calling, please check with your network operations center to determine the level of Cisco support services to which your company is entitled: for example, SMARTnet, SMARTnet Onsite, or Network Supported Accounts (NSA). When you call the center, please have available your service agreement number and your product serial number.


Note In this release, each SSG on the MWAM must be configured individually.


Service Selection Gateway

The SSG is a Cisco IOS software feature module that enables service providers to create new revenue-generating opportunities by offering on-demand services. The SSG provides Remote Authentication Dial-in User Service (RADIUS) authentication and accounting for user-interactive policy routing to different IP destinations. This improves flexibility and convenience for subscribers, including the ability to log on to multiple services simultaneously, and enables service providers to bill subscribers based on connection time and services used, rather than charging a flat rate.

Traffic from the mobile user is addressed to an SSG on the MWAM. The request for access is forwarded to the Authentication, Authorization, and Accounting (AAA) server, and the user is authenticated and authorized to access the services defined in a user profile. Then data traffic is exchanged between the user and servers in the service network. Each network is defined with its own VLAN, and all SSGs on the MWAM access the same VLANs to receive and send data.

For more information about the features available in the SSG, refer to the following URL:

http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/wan_vcg.htm#1000988

http://www.cisco.com/en/US/products/sw/iosswrel/ps5413/products_feature_guides_list.html

System Requirements

This section describes system requirements for SSG-MWAM Release 1.1.

Hardware

The SSG-MWAM Release 1.1 requires the following hardware components:

Catalyst 6500/Cisco 7600 series platform

Supervisor module with MSFC 2 daughter card

MWAM

A Hardware-Software Compatibility Matrix is available on CCO for users with CCO login accounts. This matrix allows users to search for supported hardware components by entering a Cisco platform and IOS Release. The Hardware-Software Compatibility Matrix tool is available at the following URL:

http://www.cisco.com/cgi-bin/front.x/Support/HWSWmatrix/hwswmatrix.cgi