![]() |
||||||||||||||||||||||||||||||||||||||||||||||||||
Define Interface Policy-Map AV Pairs AAA
![]() |
||||||||||||||||||||||||||||||||||||||||||||||||||
Contents
Define Interface Policy-Map AV Pairs AAALast Updated: August 21, 2012
The Define Interface Policy-Map AV Pairs AAA feature introduces two Cisco RADIUS vendor-specific attributes (VSAs) that allow a new policy map to be applied or an existing policy map to be modified, without affecting its session, during a Point-to-Point Protocol over ATM (PPPoA) or Point-to-Point Protocol over Ethernet over ATM (PPPoEoA) session establishment. The process occurs on the ATM virtual circuit (VC) level. The Define Interface Policy-Map AV Pairs AAA has the following benefits:
The QoS policy map is used to define the subscriber user experience for broadband service and can facilitate delivery of higher value services such as VoIP and video.
Finding Feature InformationYour software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Define Interface Policy-Map AV Pairs AAA
Restrictions for Define Interface Policy-Map AV Pairs AAAInformation About Define Interface Policy-Map AV Pairs AAADynamically Applying and Modifying a Policy MapThe Define Interface Policy-Map AV Pairs AAA feature introduces two Cisco VSAs that allow you to dynamically apply a policy map and modify a policy map applied to a session, without session reauthentication, at the ATM VC level using RADIUS. The purpose of the Cisco VSA (attribute 26) is to communicate vendor-specific information between the network access server (NAS) and the RADIUS server. The Cisco VSA encapsulates vendor-specific attributes that allow vendors such as Cisco to support their own extended attributes. The Define Interface Policy-Map AV Pairs AAA feature allows the two new Cisco VSAs to be installed on an ATM VC after a PPPoA or PPPoEoA session establishment. Using RADIUS, this feature allows a policy map to be applied ("pulled") and then modified by specific events ("pushed" by the policy server) while that session remains active. Previously, a policy map could only be configured on a VC or ATM point-to-point subinterface by using the modular QoS CLI (MQC) or manually with the virtual template. Also previously, a service policy on a VC could be modified in the session but that session was dropped and reauthenticated. Currently for a PPPoA or PPPoEoA session, the pull part of the feature uses RADIUS to dynamically apply policy maps on an ATM VC and eliminates the need to statically configure a policy map on each VC. After a policy map is applied directly on the interface, certain events can signal the policy server to push a policy map onto a specific VC without the need for session reauthentication.
Two new Cisco AV pairs for service policy are set up in the user file on the RADIUS server. When the router requests the policy map name, the policy map name in the user file is pulled to the VC on the router when the PPPoA or PPPoEoA session is established. The Cisco AV pairs identify a "service policy-output" and "service policy-input" to identify QoS policies configured on the router from a RADIUS server. The Cisco AV pairs apply the appropriate policy map directly on the interface. Service policies are only applied at this time when the subscriber first authenticates the VC. The "push" functionality of the feature allows you to modify an existing QoS profile (a policy map) applied to a session while that session remains active, thus allowing QoS policies to be applied as required without session reauthentication disruption. Specific events, including time-of-day, byte count, and user request, can signal the policy server to push a policy map onto a specific VC. The policy server has the ability to send a Change of Authorization (CoA), which is the ability to change authorization of active sessions on the fly. The push functionality requires that CoA is enabled on the AAA server. One of the session attributes CoA pushes is the policy map, in an input and output direction. The figure below shows that a CoA request is sent from the policy server to a broadband rate access server (BRAS), which causes a policy map change on PPPoA sessions set up between the BRAS and the routing gateway (RG). For clarification, a policy map defines QoS actions and rules and associates these to a class map. In a policy map, you can define QoS actions for such things as policing and class-based weighted fair queuing (CBWFQ). After a policy map is configured on the router with the policy-map command, using the service-policy command attaches the configured policy map to a VC interface and specifies the direction (inbound or outbound) that the policy should be applied. When a service policy is configured on the VC (or ATM point-to-point subinterface), the service policy is applied to all sessions that use that VC. New Cisco VSAsTo support the Define Interface Policy-Map AV Pairs AAA feature, the following two new Cisco AV pairs for policy map are defined at the ATM VC level:
They are formatted as:
To further support the Define Interface Policy-Map AV Pairs AAA feature, two existing Cisco Generic RADIUS VSAs will replace and deprecate two others that do not correctly follow the Cisco VSA naming guidelines. The two replacement VSAs are:
The replacement VSAs replace the following existing VSAs:
We recommend using the new VSAs. However, the replaced attributes are currently still supported. Policy Map Troubleshooting Scenarios
How to Configure Define Interface Policy-Map AV Pairs AAA
Configuring AV Pairs Dynamic Authorization and the Policy Map on the RADIUS ServerTo configure the Define Interface Policy-Map AV Pairs AAA feature, follow the steps on the RADIUS server. PrerequisitesAAA must be enabled and already set up to use RADIUS. A PPPoEoA or PPPoA session is established. The CoA functionality is enabled--required for the push functionality. The dbs enable CLI is configured on the VC. The policy map is configured on the router. DETAILED STEPS Configuring AV Pairs Dynamic Authorization and the Policy Map on the AAA ServerOn the local AAA server, configure dynamic authorization that supports CoA in global configuration mode. DETAILED STEPS Configuring AV Pairs Dynamic Authorization and the Policy Map on the RouterSUMMARY STEPS
DETAILED STEPS
Verifying Define Interface Policy-Map AV Pairs AAAPerform this optional task to verify the configuration of the Define Interface Policy-Map AV Pairs AAA feature. DETAILED STEPS
Configuration Examples for Define Interface Policy-Map AV Pairs AAA
Service-Policy Map Already Configured ExampleThe following example shows the existing MQC used to attach policy maps voice and outname under PVC 4/103. Using the show policy-map interfacecommand shows that MQC-configured policy maps voice and outname are installed on the VC:
!
interface ATM4/0.3 multipoint
no atm enable-ilmi-trap
pvc 4/103
service-policy input voice
service-policy output outname
!
Router# show policy-map interface atm 4/0.3
ATM4/0.3: VC 4/103 -
Service-policy input: voice
Class-map: class-default (match-any)
0 packets, 0 bytes
5 minute offered rate 0 bps, drop rate 0 bps
Match: any
0 packets, 0 bytes
5 minute rate 0 bps
Service-policy output: outname
Class-map: class-default (match-any)
0 packets, 0 bytes
5 minute offered rate 0 bps, drop rate 0 bps
Match: any
0 packets, 0 bytes
5 minute rate 0 bps
Router#
The following example shows MQC used to establish a PPPoEoA session, which causes the policy maps (test_vc and dyn_out) set up on the RADIUS server to be downloaded or "pulled" to the VC. The policy maps downloaded from the RADIUS server have higher precedence than the MQC service-policy maps (voice and outname) configured on the PVC. Using the show policy-map interfacecommand shows that the pulled policy maps are installed on the VC:
!
interface ATM4/0.3 multipoint
no atm enable-ilmi-trap
pvc 4/103
dbs enable
encapsulation aal5autoppp Virtual-Template1
service-policy input voice
service-policy output outname
!
end
Router# show policy-map interface atm 4/0.3
ATM4/0.3: VC 4/103 -
Service-policy input: test_vc
Class-map: class-default (match-any)
0 packets, 0 bytes
5 minute offered rate 0 bps, drop rate 0 bps
Match: any
0 packets, 0 bytes
5 minute rate 0 bps
Service-policy output: dyn_out
Class-map: class-default (match-any)
5 packets, 370 bytes
5 minute offered rate 0 bps, drop rate 0 bps
Match: any
5 packets, 370 bytes
5 minute rate 0 bps
Router#
PPPoE Session Information
Uniq ID PPPoE RemMAC Port VT VA State
SID LocMAC VA-st
2 2 0010.1436.bc70 ATM4/0.3 1 Vi3.1 PTA
0010.1436.b070 VC: 4/103 UP
Router#
Service-Policy Map Pulled ExampleThe following example shows a policy named voice configured for input service policy on the RADIUS server. The router is already configured for PPPoA and AAA. The PPPoA session pulls the service policy name from the RADIUS server. The show policy-map interfacecommand displays the input service policy named voice attached to the ATM interface:
Router# show policy-map interface atm 4/0.1
ATM4/0: VC 1/101 -
Service-policy input: voice
Class-map: class-default (match-any)
0 packets, 0 bytes
5 minute offered rate 0 bps, drop rate 0 bps
Match: any
Using the show run interfacecommand displays the currently running configuration, but not the pulled service policy:
Router# show run interface atm 4/0.1
Building configuration...
Current configuration : 107 bytes
!
interface ATM 4/0.1
pvc 1/101
dbs enable
encapsulation aal5mux ppp Virtual-Template 1
!
!
end
Service-Policy Map Pushed ExampleThis configuration example has five parts that show that PPPoA sessions are established between a broadband remote access server (BRAS) and a routing gateway (RG), the change of authorization (CoA push request) that passes between a policy server and the BRAS, and how the pulled policy maps are replaced by pushed policy maps after the CoA request. The five parts are: BRAS PPPoA configuration, RG PPPoA configuration, session information on BRAS prior to a push, debug on BRAS after receiving the CoA request, and session information on BRAS after a CoA push request has taken place. The following example shows the current PPPoA configuration on BRAS: aaa new-model ! aaa authentication ppp default group radius aaa authorization network default group radius ! aaa server radius dynamic-author client <address> server-key <key> ! aaa session-id common ! ip routing ! policy-map DefaultIn class class-default set ip precedence 0 policy-map DefaultOut class class-default set ip precedence 0 ! policy-map PullMapIn class class-default set ip precedence 0 policy-map PullMapOut class class-default set ip precedence 0 ! policy-map 7up class class-default fair-queue policy-map Sprite class class-default bandwidth 1000 ! policy-map PushMapIn class class-default set ip precedence 0 policy-map PushMapOut class class-default set ip precedence 0 ! ! vc-class atm xyz protocol ppp Virtual-Template1 encapsulation aal5snap ! interface Loopback0 ip address 10.1.1.2 255.255.255.0 ! interface ATM4/0 no ip address no atm ilmi-keepalive no atm enable-ilmi-trap no clns route-cache no shutdown ! interface ATM4/0.1 point-to-point no atm enable-ilmi-trap pvc 0/101 class-vc xyz vbr-nrt 400 300 50 dbs enable service-policy in DefaultIn service-policy out DefaultOut ! ! interface Virtual-Template1 ip unnumbered Loopback0 ppp authentication chap ! radius-server host <address> auth-port <port> acct-port <port> radius-server key <key> radius-server vsa send authentication The following example shows the PPPoA configuration set up on the RG: aaa new-model ! aaa session-id common ! ip routing ! interface Loopback0 ip address 10.1.1.1 255.255.255.0 ! interface ATM2/0/0 no ip address no atm ilmi-keepalive no atm enable-ilmi-trap no clns route-cache no shutdown ! interface ATM2/0/0.1 point-to-point pvc 0/101 protocol ppp Virtual-Template1 ! ! interface Virtual-Template1 ip unnumbered Loopback0 no peer default ip address ppp chap hostname InOut ppp chap password 0 <password> The following example uses the show subscriber session all command to display session information on BRAS prior to policy maps being pushed. PullMapIn and PullMapOut are the profiles pulled from the AAA server. The CoA request pushes the BRAS to change its input policy map (PullMapIn) and output policy map (PullMapOut) to PushMapIn and PushMapOut respectively.
Router# show subscriber session all
Current Subscriber Information:Total sessions 1
--------------------------------------------------
Unique Session ID:54
Identifier:InOut
SIP subscriber access type(s):PPPoA/PPP
Current SIP options:Req Fwding/Req Fwded
Session Up-time:00:00:32, Last Changed:00:00:12
AAA unique ID:55
Interface:Virtual-Access1.1
Policy information:
Context 6531F6AC:Handle C700008A
Authentication status:authen
User profile, excluding services:
Framed-Protocol 1 [PPP]
service-type 2 [Framed]
ssg-account-info "S10.1.1.1"
vc-qos-policy-in "PullMapIn"
vc-qos-policy-out "PullMapOut"
Prepaid context:not present
Configuration sources associated with this session:
Interface:Virtual-Template1, Active Time = 00:00:32
The following example displays the output of the debug aaa coa and debug pppatm eventcommands to show that the input policy map, PushMapIn, and output policy map, PushMapOut, have been applied or pushed on the BRAS after the BRAS received the CoA push request from the policy server: 2d20h:RADIUS:COA received from id 41 10.0.56.145:1700, CoA Request, len 122 2d20h:COA:10.0.56.145 request queued 2d20h: ++++++ CoA Attribute List ++++++ 2d20h:6523AE20 0 00000001 service-type(276) 4 Framed 2d20h:6523AF4C 0 00000009 ssg-account-info(392) 9 S10.1.1.1 2d20h:6523AF5C 0 00000009 ssg-command-code(394) 1 17 2d20h:6523AF6C 0 00000009 vc-qos-policy-in(342) 7 PushMapIn 2d20h:6523AF7C 0 00000009 vc-qos-policy-out(343) 4 PushMapOut 2d20h: 2d20h: PPPATM:Received VALID vc policy PushMapIn 2d20h: PPPATM:Received VALID vc policy PushMapOut 2d20h:PPPATM:ATM4/0.1 0/101 [54], Event = SSS Msg Received = 5 2d20h:Service policy input PushMapIn policy output PushMapOut applied on 0/101 2d20h: PPPATM:Applied VALID vc policy PushMapIn and PushMapOut 2d20h:RADIUS(00000000):sending 2d20h:RADIUS(00000000):Send CoA Ack Response to 10.0.56.145:1700 id 41, len 20 2d20h:RADIUS: authenticator 04 D5 05 E2 FE A3 A6 E5 - B2 07 C0 A1 53 89 E0 FF The following example uses the show subscriber session all command to display session information on the BRAS after the BRAS received the CoA push request from the policy server. The policy information shows that PushMapIn and PushMapOut are the current policy maps on the BRAS that were pushed by the CoA request:
Router# show subscriber session all
Current Subscriber Information:Total sessions 1
--------------------------------------------------
Unique Session ID:54
Identifier:InOut
SIP subscriber access type(s):PPPoA/PPP
Current SIP options:Req Fwding/Req Fwded
Session Up-time:00:00:44, Last Changed:00:00:22
AAA unique ID:55
Interface:Virtual-Access1.1
Policy information:
Context 6531F6AC:Handle C700008A
Authentication status:authen
User profile, excluding services:
Framed-Protocol 1 [PPP]
service-type 2 [Framed]
ssg-account-info "S10.1.1.1"
vc-qos-policy-in "PushMapIn"
vc-qos-policy-out "PushMapOut"
Prepaid context:not present
Configuration sources associated with this session:
Interface:Virtual-Template1, Active Time = 00:00:44
Additional ReferencesThe following sections provide references related to the Define Interface Policy-Map AV Pairs AAA feature. MIBsTechnical Assistance
Feature Information for Define Interface Policy-Map AV Pairs AAAThe following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. © 2012 Cisco Systems, Inc. All rights reserved.
|
||||||||||||||||||||||||||||||||||||||||||||||||||