- RADIUS Attributes Overview and RADIUS IETF Attributes
- RADIUS Vendor-Proprietary Attributes
- Connect-Info RADIUS Attribute 77
- Encrypted Vendor Specific Attributes
- RADIUS Attribute 5 (NAS-Port) Format Specified on a Per-Server Group Level
- RADIUS Attribute 8 (Framed-IP-Address) in Access Requests
- RADIUS Attribute 82: Tunnel Assignment ID
- RADIUS Attribute 104
- RADIUS Tunnel Attribute Extensions
- V.92 Reporting Using RADIUS Attribute v.92-info
- RADIUS Attribute 66 (Tunnel-Client-Endpoint) Enhancements
- RADIUS Attribute Screening
- RADIUS NAS-IP-Address Attribute Configurability
- Vendor-Specific Attributes (VSA) and RADIUS Disconnect-Cause Attribute Values
- AAA Per VC QoS Policy Support
- Finding Feature Information
- Contents
- Prerequisites for RADIUS Attribute 82: Tunnel Assignment ID
- Restrictions for RADIUS Attribute 82: Tunnel Assignment ID
- Information About RADIUS Attribute 82: Tunnel Assignment ID
- How to Verify if RADIUS Attribute 82 is Being Used by the LAC
- Configuration Examples for RADIUS Attribute 82: Tunnel Assignment ID
- Additional References
- Feature Information for RADIUS Attribute 82: Tunnel Assignment ID
RADIUS Attribute 82: Tunnel Assignment ID
The RADIUS Attribute 82: Tunnel Assignment ID feature allows the Layer 2 Transport Protocol access concentrator (LAC) to group users from different per-user or domain RADIUS profiles into the same active tunnel. Previously, Cisco IOS software assigned a separate virtual private dialup network (VPDN) tunnel for each per-user or domain RADIUS profile, even if tunnels with identical endpoints already existed.
This feature improves LAC and L2TP network server (LNS) performance by reducing memory usage, because fewer tunnel data structures must be maintained. This feature allows the LAC and LNS to handle a higher volume of users without negatively impacting router performance.
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the "Feature Information for RADIUS Attribute 82: Tunnel Assignment ID" section.
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS software image support. To access Cisco Feature Navigator, go to http://tools.cisco.com/ITDIT/CFN/jsp/index.jsp. An account on Cisco.com is not required.
Contents
•
Prerequisites for RADIUS Attribute 82: Tunnel Assignment ID
•
Restrictions for RADIUS Attribute 82: Tunnel Assignment ID
•
Information About RADIUS Attribute 82: Tunnel Assignment ID
•
How to Verify if RADIUS Attribute 82 is Being Used by the LAC
•
Configuration Examples for RADIUS Attribute 82: Tunnel Assignment ID
•
Feature Information for RADIUS Attribute 82: Tunnel Assignment ID
Prerequisites for RADIUS Attribute 82: Tunnel Assignment ID
You must be using a Cisco platform that supports VPDN to use this feature.
Restrictions for RADIUS Attribute 82: Tunnel Assignment ID
This feature is designed only for VPDN dial-in applications. It does not support VPDN dial-out.
Information About RADIUS Attribute 82: Tunnel Assignment ID
The RADIUS Attribute 82: Tunnel Assignment ID feature defines a new avpair, Tunnel-Assignment-ID, which allows the LAC to group users from different RADIUS profiles into the same tunnel if the chosen endpoint, tunnel type, and Tunnel-Assignment-ID are identical.
How to Verify if RADIUS Attribute 82 is Being Used by the LAC
There are no configuration steps for the RADIUS Attribute 82: Tunnel Assignment ID feature. This task verifies the RADIUS attribute 82 used by the LAC during tunnel authorization.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
debug radius
DETAILED STEPS
Configuration Examples for RADIUS Attribute 82: Tunnel Assignment ID
This section provides the following configuration examples:
•
RADIUS Configuration: Example
LAC Configuration: Example
The following example configures VPDN on the LAC:
hostname lac
aaa new-model
aaa authentication ppp default group radius
aaa authorization network default group radius
vpdn enable
vpdn authen-before-forward
interface Serial2/0:23
no ip address
encapsulation ppp
dialer-group 1
isdn switch-type primary-5ess
no fair-queue
dialer-list 1 protocol ip permit
radius-server host lac-radiusd auth-port 1645 acct-port 1646
radius-server retransmit 3
radius-server key rad123
LNS Configuration: Example
The following example configures VPDN on the LNS:
hostname lns
aaa new-model
aaa authentication ppp default group radius
aaa authorization network default group radius
vpdn enable
vpdn-group 1
accept-dialin
protocol any
virtual-template 1
interface Loopback0
ip address 10.1.1.3 255.255.255.0
interface Virtual-Template1
ip unnumbered Loopback0
no keepalive
peer default ip address pool mypool
ppp authentication chap
ip local pool mypool 10.1.1.10 10.1.1.50
radius-server host lns-radiusd auth-port 1645 acct-port 1646
radius-server retransmit 3
radius-server key cisco
RADIUS Configuration: Example
The following examples configure the RADIUS server to group sessions in a tunnel:
Per-User Configuration
user@router.com Password = "cisco" Service-Type = Outbound,
Tunnel-Type = :1:L2TP,
Tunnel-Server-Endpoint = :1:"10.14.10.54",
Tunnel-Assignment-Id = :1:"router"
client@router.com Password = "cisco" Service-Type = Outbound,
Tunnel-Type = :1:L2TP,
Tunnel-Server-Endpoint = :1:"10.14.10.54",
Tunnel-Assignment-Id = :1:"router"
Domain Configuration
eng.router.com Password = "cisco" Service-Type = Outbound,
Tunnel-Type = :1:L2TP,
Tunnel-Server-Endpoint = :1:"10.14.10.54",
Tunnel-Assignment-Id = :1:"router"
sales.router.com Password = "cisco" Service-Type = Outbound,
Tunnel-Type = :1:L2TP,
Tunnel-Server-Endpoint = :1:"10.14.10.54",
Tunnel-Assignment-Id = :1:"router"
Additional References
The following sections provide references related to the RADIUS Attribute 82: Tunnel Assignment ID feature.
Related Documents
|
|
|
|---|---|
Dial Technologies |
Cisco IOS Dial Technologies Configuration Guide, Release 12.4T |
Wide Area Networks |
Cisco IOS Wide-Area Networking Configuration Guide, Release 12.4T |
Standards
|
|
|
|---|---|
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature. |
— |
MIBs
RFCs
|
|
|
|---|---|
No new or modified RFCs are supported by this feature. |
— |
Technical Assistance
Feature Information for RADIUS Attribute 82: Tunnel Assignment ID
Table 1 lists the release history for this feature.
Not all commands may be available in your Cisco IOS software release. For release information about a specific command, see the command reference documentation.
Use Cisco Feature Navigator to find information about platform support and software image support. Cisco Feature Navigator enables you to determine which Cisco IOS and Catalyst OS software images support a specific software release, feature set, or platform. To access Cisco Feature Navigator, go to http://tools.cisco.com/ITDIT/CFN/jsp/index.jsp. An account on Cisco.com is not required.
Note
Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS software release train also support that feature.
Feedback