Table Of Contents
Initial Configuration
Software Requirements
Hardware Compatibility
Network Interface Cards
Initial Configuration
Cisco 6400 Configuration
Cisco Provisioning Center Server Configuration
RADIUS Server Configuration (Optional)
Cisco 6400 Configuration
Running-Config Autosave
Configuring the NRP
Event Logger Requirements
Configuring Tunnel Awareness
Configuring NRP Redundancy
Configuring Username Authentication
Matching VC Traffic Parameters for CNX
Robust CNX Provisioning
Configuring the NSP
Configuring Username Authentication
RADIUS Configuration (Optional)
Configuring RADIUS Awareness
Configuring RADIUS Access
Configuring Additional IOS Commands
Cisco Provisioning Center Server Configuration
Receiving Traps (Optional)
Event Logger Daemon
Workstation Upload Configuration
Enabling TFTP on the Cisco Provisioning Center Server
FTP/TFTP Access Configuration File
Setting the Maximum Number of Network Interface Executors
Configuring CNX VC Class Autogeneration
Setting the Maximum Number of Concurrent Getter Processes
Setting Getter Timeout Time
Merit RADIUS Configuration
Merit RADIUS Installation
Installing the RADIUS Server
Starting the RADIUS Daemon
Testing the RADIUS Server
Automating RADIUS Server Startup
Installing the Cisco 6400 Equipment Module Utility Package
Configuring the RADIUS Clients File
Initial Configuration
The Cisco 6400 Equipment Module supports the Cisco 6400 Universal Access Concentrator (UAC). The Cisco 6400 UAC is a multi-technology access concentrator that offers conventional ATM switching functions with full support for different QoS classes as well as a unique set of aggregation and routing capabilities, including:
•
Convergence
•
Aggregation
•
Multiplexing
•
Mapping
•
Routing
•
Bridging
•
NRP SSG
•
ATM PVC Range
The Equipment Module works directly with the Cisco 6400 UAC through FTP (or Telnet) and SNMP or TFTP and SNMP.
The Equipment Module provides an event logging daemon to track event log changes from the Cisco 6400. The daemon is started/stopped in the workstation boot and runs independently of Cisco Provisioning Center.
To configure this Equipment Module for use with Cisco Provisioning Center, you must complete the following steps.
Table 1-1 Cisco 6400 Equipment Module Configuration Task List
Task
|
Page Reference
|
Verify the software requirements
|
page 2
|
Verify hardware compatibility
|
page 2
|
Perform Cisco 6400 configuration
|
page 3
|
Perform Cisco Provisioning Center server configuration
|
page 12
|
Perform RADIUS server configuration
|
page 17
|
Software Requirements
This section outlines the software requirements that must be fulfilled for the correct operation of the Cisco 6400 Equipment Module. All software included in this section must be acquired independently of the Cisco 6400 Equipment Module.
Table 1-2 outlines the software requirements for the Cisco 6400 Equipment Module.
Table 1-2 Required Software
Vendor
|
Software
|
Version
|
Cisco
|
IOS (NRP-1)
|
12.1(1) to 12.2(2)B5
|
IOS (NRP-2)
|
12.1(5) to 12.2(2)B2
|
IOS (NRP-2SV)
|
12.2B to 12.2(4)B3
|
IOS (NSP)
|
12.1(1) to 12.2(2)B5
|
Merit
|
RADIUS server
|
3.6B1
|
Hardware Compatibility
This section provides information about hardware compatible with the Cisco 6400 Equipment Module.
Network Interface Cards
The following network interface cards (referred to as "line cards") are supported by the Cisco 6400 Equipment Module.
Table 1-3 Compatible Hardware
Chassis
|
Part Number
|
Card Type
|
Description
|
Cisco 6400 UAC
|
NLC-2DS3-BNC
|
DS3
|
2 port DS3 line card
|
NLC-2OC3-SM
|
OC3
|
2 port OC-3/STM-1 Single Mode
|
NLC-2OC3-MM
|
OC3
|
2 port OC-3/STM-1 Multi Mode
|
NLC-1OC12-SM
|
OC12
|
1 Port OC12/STM-4 Single Mode
|
Initial Configuration
The Cisco 6400 UAC, and the Cisco Provisioning Center server must be initially configured to make the Cisco 6400 Equipment Module fully operational. The initial configuration required for this Equipment Module involves the following steps:
Cisco 6400 Configuration
The following steps must be completed by logging into the NRP and NSP on the Cisco 6400 and manually configuring the hardware via IOS.
1.
Setting up the NRP
2.
Setting up the NSP
3.
RADIUS configuration
4.
IOS Command Support Configuration
Cisco Provisioning Center Server Configuration
The following procedures should be completed by logging into the Cisco Provisioning Center server host machine and configuring the Cisco Provisioning Center server via a terminal window.
1.
Receiving traps (optional)
2.
Event logger daemon (optional)
3.
Workstation upload configuration (required)
4.
RADIUS configuration (optional)
RADIUS Server Configuration (Optional)
The following procedures are completed by logging into the RADIUS server host machine and configuring the RADIUS server via a terminal window.
1.
Installing the RADIUS server
2.
Starting the RADIUS daemon
3.
Installing the Cisco 6400 Equipment Module Utility Package
4.
Configuring the RADIUS clients file (for NRPs)
Cisco 6400 Configuration
Some initial configuration must be done for each Node Router Processor (NRP) and Node Switch Processor (NSP) individually in order to facilitate the creation, modification, deletion and management of DSL services using the Cisco 6400 Equipment Module. Before upload and provisioning functions of the NSP and NRP can occur, each NSP and NRP must have the following parameters configured:
•
Management IP address for NRP and NSP. For the NRP2 card, you do not have to provide an IP address.
•
Login name
•
Login password
•
Enable password
•
SNMP agent enabled
•
SNMP community strings
For more information on configuring the above parameters, refer to the appropriate Cisco 6400 user documentation.
Running-Config Autosave
You can configure the Cisco 6400 Equipment Module to automatically save the IOS running-config file of the Cisco 6400. By default, the running-config autosave feature is disabled.
To enable autosave, follow these steps:
Step 1
Navigate to the $CCP_CONFIG directory on the server.
Step 2
Open the syavconfig.site file with a text editor.
Step 3
Locate the following line:
Step 4
To enable autosave, change the value of the C4.WriteNVRAM variable to 1:
Step 5
Save and exit the file.
Step 6
Have the Cisco Provisioning Center server read the configuration file:
Note
The running-config autosave feature can have a performance impact on heavily loaded NRP cards.
Configuring the NRP
Each NRP requires initial configuration in order to communicate with the Cisco Provisioning Center server. An NRP must be configured to enable the following features:
•
single hop and multihop tunneling (optional)
•
event logging (optional)
•
authentication (required)
Optionally, you can configure a first generation NRP card (NRP) as redundant for failure protection. Second generation NRP cards (NRP2) do not support redundancy.
Event Logger Requirements
You must set up each Cisco 6400 NRP before launching the event logger. For more information on configuring the NRP, refer to the appropriate Cisco 6400 user documentation. The following procedure uses an NRP and NRP2 to illustrate the configuration process. The procedure for configuring each NRP is identical but the method for accessing NRPs and NRP2s is different (these procedures are outlined in the following two sections). Configuration requires a thorough understanding of Cisco IOS software.
If you are configuring an NRP, follow the procedure outlined in "Accessing the NRP" to access it. If you are configuring an NRP2, follow the procedure outlined in "Accessing the NRP2" to access it. After you have accessed the NRP, continue with the NRP configuration by following the procedure outlined in "Configuring the NRP".
Accessing the NRP
Perform the following procedure to access the NRP.
Step 1
Log in to the Cisco 6400 by using telnet and the management IP address of the NRP:
Step 2
Enter the username and password.
Step 3
The user EXEC prompt (Router>) will appear. Configuration changes must be made from enable mode. To enter enable mode from the user EXEC prompt, issue the following commands:
Accessing the NRP2
NRP2 cards do not have an IP address assigned to them and must be accessed through the NSP. Perform the following procedure to access the NRP2.
Step 1
Log in to the Cisco 6400 by using telnet and the management IP address of the NSP:
Step 2
Enter the username and password.
Step 3
The user EXEC prompt (Router>) will appear. Configuration changes must be made from enable mode. To enter enable mode from the user EXEC prompt, issue the following commands:
Step 4
Enter the following command to access the NRP2 through the NSP:
where:
Slot_Number—The slot number of the NRP2.
Configuring the NRP
To configure the NRP, perform the following procedure.
Step 1
Enter configuration mode.
Step 2
Enable Event Logger requirements by entering the following IOS commands:
snmp-server community PUBLIC RO
snmp-server community PRIVATE RW
snmp-server trap-timeout 10
snmp-server enable traps config
snmp-server enable traps snmp
snmp-server host <IP Address> traps version 2c PUBLIC udp-port 5999
|
where:
IP Address—The IP address of the Cisco Provisioning Center server host.
Note
You can enable other traps in addition to the ones specified in the above example. For a complete list of traps, refer to the appropriate Cisco 6400 user documentation.
Step 3
Verify the NRP configuration by issuing the following command:
Step 4
Save the configuration by entering the following command:
If you have enabled the running-config autosave feature, you do not need to perform this step. For more information on running-config autosave, see the "Running-Config Autosave" section.
Configuring Tunnel Awareness
You can configure each NRP to be aware of single hop and multihop tunnels. Tunnels that are created using L2TP are used by Virtual Private Dial-Up Networking (VPDN) to extend a PPP session across a wide area network. NRPs must be configured to look for tunnel definitions on a L2TP Network Server (LNS). Perform the following procedure at the privileged EXEC prompt to enable VPDN:
Step 1
Enter global configuration mode:
Step 2
Enable VPDN and inform a router to look for tunnel definitions on an LNS:
Step 3
Enable multihop tunneling:
Step 4
Specify how the NAS is to perform VPDN tunnel authorization searches:
vpdn search-order multihop-hostname domain
Configuring NRP Redundancy
As a failure prevention measure, NRPs can operate in redundant mode. In redundant mode, one NRP is configured as the primary NRP and a second NRP is configured as the secondary. Redundant NRP cards must occupy adjacent slots (i.e.: 1 and 2, or 3 and 4). Redundancy is transparent since both NRPs share the same IP address. In redundant mode, when a connection is provisioned on the primary NRP, it will be mirrored on the secondary NRP in case the primary card fails. It is also possible to swap the roles of each NRP between primary and secondary.
If you require a pair of NRPs to operate in redundant mode, you must do so using the following IOS commands on the NRP.
Change to Redundancy mode from Global mode using the following IOS command:
In redundancy mode, configure a redundant pair using the following command:
associate subslot <slot_number_1>/0 <slot_number_2>/0
Where:
<slot_number_1>—the slot number of the primary NRP
<slot_number_2>—the slot number of the secondary NRP
For example, the following IOS command will configure slots one and two on the NRP as a redundant pair:
redundancy
associate subslot 1/0 2/0
For NRP redundancy to work properly, you must configure Cisco Provisioning Center to autosave to memory the IOS running-config file that the Cisco 6400 Equipment Module uses. For more information on configuring Cisco Provisioning Center to automatically save the IOS running-config file, see the ""Running-Config Autosave" section."
For more information on NRP redundancy, consult the appropriate Cisco documentation.
Note
NRP2 cards cannot be configured to operate in redundant mode.
Note
When the primary NRP becomes inactive, services are moved to the backup NRP. However, once the primary NRP is re-activated, Cisco Provisioning Center does not move services back to the primary NRP from the backup NRP. The primary NRP does not act as a backup NRP in this case. For more information, consult the appropriate Cisco documentation.
Configuring Username Authentication
Configuration of the username authentication system is optional when logging into the NRP. The NRP acts as a client NAS (Network Access Server). The NAS is the aggregation point of PPP sessions into an L2TP tunnel. To configure the username authentication system for the NAS, enter the following IOS commands at the privileged EXEC prompt:
Step 1
Enter global configuration mode:
Step 2
Specify the host name or user name and a password in the following format:
username <name> [ no password | password <encryption type>
<password>]
|
where:
name—A username or the machine name
encryption type—A number that represents a certain encryption type - 0 indicates a cleartext password
password—A unique password
for example:
username C4 password 0 ABCPassword
Note
For more information on configuring an NRP as a NAS, refer to the appropriate Cisco user documentation.
Matching VC Traffic Parameters for CNX
The Cisco 6400 Equipment Module will reuse existing VC Class traffic parameters when the C4_vcclassname attribute is null and the given traffic parameters match an existing VC Class. To enable the Cisco 6400 Equipment Module to compare given VC class parameters with existing VC Classes, the C4.CompareCNX_VCClass configuration flag in the syavconfig.site file must be set to a value of 1. Setting this value to 0 (zero) disables this comparison functionality and tells Cisco Provisioning Center to use the VC class provided by name.
To set the C4.CompareCNX_VCClass configuration flag, follow these steps:
Step 1
Ensure that the Cisco Provisioning Center server environment is sourced and the server is not running.
Step 2
Navigate to the $CCP_CONFIG directory on the server.
Step 3
Open the syavconfig.site file with a text editor.
Step 4
Locate the following line:
C4.CompareCNX_VCClass = 0
Step 5
Set the value of the C4.CompareCNX_VCClass flag to 1 to enable the matching feature. Set the value to 0 (zero) to disable the feature.
Step 6
Save and exit the file.
Step 7
Start the Cisco Provisioning Center server:
SYnpt -sS
Robust CNX Provisioning
When you create a PVC on the NRP, the Cisco 6400 Equipment Module performs a test in the network interface to detect if the PVC already exists in the NRP, but is not present in the Cisco 6400 Equipment Module database. When this out-of-sync condition occurs, Cisco Provisioning Center sends an error message, and forces a rollback of the transaction.
This test uses the IOS command show atm pvc <vpi>/<vci> | include exist which detects the IOS response that the PVC does not exist. When it does exist, no response is sent. The error message is in the following format:
"Failed to create CNX <vpi>/<vci> on subinterface ATM0/0/0.<subif>. Reason: the CNX exists but was not uploaded"
Configuring the NSP
You must configure the Cisco 6400 NSP before launching the event logger. For more information on configuring the NSP, refer to the appropriate Cisco 6400 user documentation. The following procedure uses an NSP to illustrate the configuration process. Configuration requires a thorough understanding of Cisco IOS software.
To configure the NSP:
Step 1
Log in to the Cisco 6400 by using telnet and the IP address of the NSP:
Step 2
Enter the username and password.
Step 3
The user EXEC prompt (Switch>) will appear. Configuration changes must be made from enable mode. To enter enable mode from the user EXEC prompt, issue the following commands:
Step 4
Enter configuration mode.
Step 5
Enable Upload and Event Logger requirements by entering the following IOS commands in succession:
snmp-server community PUBLIC RO
snmp-server community PRIVATE RW
snmp-server trap-timeout 10
snmp-server enable traps config
snmp-server enable traps entity
snmp-server enable traps chassis-fail
snmp-server enable traps chassis-change
snmp-server host <IP Address> traps version 2c PUBLIC udp-port 5999
|
where:
IP Address—The IP address of the Cisco Provisioning Center server host with Event Logger.
Step 6
Verify the NSP configuration by issuing the following command:
Step 7
Save the configuration by entering the following command:
If you have enabled the running-config autosave feature, you do not need to perform this step. For more information on running-config autosave, see the "Running-Config Autosave" section.
Note
You can enable other traps in addition to the ones specified in the above example. For a complete list of traps, refer to the appropriate Cisco 6400 user documentation.
Configuring Username Authentication
Configuration of the username authentication system is recommended when logging into the NSP. The NSP acts as a client NAS (Network Access Server). To configure the username authentication system for the NAS, enter the following IOS commands at the privileged EXEC prompt:
Step 1
Enter global configuration mode:
Step 2
Specify the host name or user name and a password in the following format:
username <name> [ no password | password <encryption type>
<password>]
|
where:
name—A username or the machine name
encryption type—A number that represents a certain encryption type - 0 indicates a cleartext password
password—A unique password
for example:
username C4 password 0 ABCPassword
Note
For more information on configuring an NSP as a NAS, refer to the appropriate Cisco User Documentation.
RADIUS Configuration (Optional)
Before the provisioning of services can occur, you individually configure each NRP to recognize and communicate with the RADIUS server. Configuration of each NRP involves three steps:
1.
New model identification—Enable the AAA access control model on each NRP.
2.
Default authentication—Specify the default authentication protocol to be used in order to authenticate users.
3.
Network Access Server (NAS) port format—Specify the ATM VC extended format for the NAS port field. This format is denoted by the letter "d".
Configuring RADIUS Awareness
An awareness of the RADIUS server must be established on the Cisco 6400 to allow the exchange of authorization and authentication information. This process must be done for each NRP within the Cisco 6400. The configuration is implemented using Cisco IOS commands on the router. To configure an NRP to be aware of a RADIUS server, issue the following IOS commands at the privileged EXEC prompt:
aaa authentication ppp default group radius
radius-server attribute nas-port format d
|
Configuring RADIUS Access
Once each NRP installed with the Cisco 6400 has been configured to be aware of a RADIUS server, further configuration must be done to specify the location of the RADIUS server host, the authentication and accounting port addresses on the server host, and the RADIUS password. These steps are required for the NRP to recognize a specific RADIUS server and where it is located. To configure RADIUS access, issue the following IOS commands at the privileged EXEC prompt:
radius-server host <ip address> auth-port 1645 act-port 1646
|
where:
ip address—The IP address of the RADIUS server
key—The encryption key used on the RADIUS server. This encryption key must be identical in IOS and in the RADIUS server clients file. For more information, consult your RADIUS documentation.
Configuring Additional IOS Commands
You can configure the Cisco 6400 Equipment Module to support the oam-pvc 0 IOS command when provisioning a VC class. To support this IOS command, you set the C4.supportExtraIOSCommands variable in the syavconfig.site file to a value of 1. Setting this variable to a value of 0 (zero) disables the IOS command support.
To configure the Cisco 6400 Equipment Module to support the additional IOS command, complete the following steps:
Step 1
Ensure that the Cisco Provisioning Center server environment is sourced and the server is not running.
Step 2
Navigate to the $CCP_CONFIG directory on the server.
Step 3
Open the syavconfig.site file with a text editor.
Step 4
Locate the following line:
C4.supportExtraIOSCommands = 0
Step 5
Set the value of the C4.supportExtraIOSCommands variable to 1.
If you want to disable the IOS command support, set the value of the C4.supportExtraIOSCommands variable to 0 (zero).
Step 6
Save and exit the file.
Step 7
Start the Cisco Provisioning Center server:
Cisco Provisioning Center Server Configuration
The Cisco Provisioning Center server must be initially configured to communicate with the Cisco 6400 and, optionally, one or more RADIUS servers. This section outlines the procedures required to complete this configuration and enable upload.
Receiving Traps (Optional)
The Cisco Provisioning Center server system file must be configured to receive traps from the Cisco 6400. To configure the Cisco Provisioning Center server for communication with the Cisco 6400, complete the following steps:
Step 1
Log in as the root user on the Cisco Provisioning Center server.
Step 2
Open the /etc/services file with a text editor and add the following line:
This line specifies that when the C4trapd program is running, it uses the port # 5999 and udp protocol for communication with the Cisco 6400.
Step 3
Save and exit the /etc/services file.
Step 4
Find the process ID number for inetd.
Step 5
Kill the inetd process:
where:
pid—the process ID.
Step 6
Restart the inetd process:
Event Logger Daemon
An event logging daemon must be installed on the Cisco Provisioning Center server host for any event logging to become operational. The event logger is distributed through the Cisco 6400 Equipment Module installation procedure. The event logger is a standalone daemon independent of Cisco Provisioning Center functions. Launching Cisco Provisioning Center does not activate the event logger, and shutting down Cisco Provisioning Center does not terminate the event logger. The event logger will continue to log events from the Cisco 6400 if Cisco Provisioning Center is shut down. When Cisco Provisioning Center is restarted, the Cisco Provisioning Center server system file will update the log files by checking in the event log directory.
Step 1
The Cisco 6400 UAC and the Cisco Provisioning Center server system file must be properly configured before the event logger can be used. You must launch the event logger separately by issuing the following command at the command line in the Cisco Provisioning Center runtime environment:
c4trapd -f $CCP_LOG/event/C4eventLog
Workstation Upload Configuration
The Cisco 6400 Equipment Module supports both FTP and TFTP to upload the hardware configuration. By default, FTP is used. If you require TFTP, you must first enable it on the Cisco Provisioning Center server. For both FTP and TFTP clients, you need to set the upload configuration variables in the FTP/TFTP Access Configuration File.
Enabling TFTP on the Cisco Provisioning Center Server
If you require TFTP enabled on the Cisco Provisioning Center server, perform the following procedure. This procedure is not required if you intend to use FTP.
Step 1
Log in as root on the Cisco Provisioning Center server.
Step 2
Ensure that you have write access to /etc/inetd.conf. If not, change the permissions by issuing the following command:
chmod u+w /etc/inetd.conf
Step 3
Edit the /etc/inetd.conf file by changing the following line from:
#tftp dgram udp wait root /usr/sbin/in.tftp in.tftp -s /tftpboot
to:
tftp dgram udp wait root /usr/sbin/in.tftp in.tftp
This will enable the TFTP daemon in insecure mode.
Step 4
Verify the workstation is TFTP enabled by issuing the following command:
If your workstation outputs an inetd process like the following:
root 136 1 0 Apr 17 ? 0:12 /usr/sbin/inetd -s
where the second column (136) is the process ID (PID), then TFTP is already enabled. Force the TFTP daemon to re-read the inetd.conf file by issuing the following command:
where pid is the inetd process ID.
If your workstation does not output an inetd process, start the inetd process by issuing the following command:
Step 5
Verify that TFTP is enabled by issuing the following command:
Step 6
If TFTP is enabled, you should see the following output:
FTP/TFTP Access Configuration File
To enable FTP upload, you must define three configuration variables: C4_USER, C4_PASSWORD, and C4_FTP. The user and password combination must correspond to a valid UNIX user account on the workstation which has write permission in the /tmp directory. This account enables FTP to retrieve the running configuration from the Cisco 6400.
To enable TFTP upload, you do not uncomment the C4_USER and C4_PASSWORD variables. The C4_FTP variable must be uncommented and set to FALSE.
Optionally, for both FTP and TFTP, you can set the variable C4_IPADDRESS that points to the IP address of the Cisco Provisioning Center host machine. This is required when there are multiple IP addresses for Cisco Provisioning Center servers in the network, or when a firewall is performing IP address translation.
The configuration variables are contained in a configuration file and must be set before the Cisco Provisioning Center server starts.
For example, the C4FTPAccess.config for an FTP configuration may look as follows:
Or, the configuration file for a TFTP configuration may look as follows:
C4_IPADDRESS = <ip_address>
The variables can also be manually set outside of the configuration file. In this case, these variables override the variables set in the configuration file.
To set the Cisco 6400 upload configuration variables, follow the steps:
Step 1
Ensure that the Cisco Provisioning Center server environment is sourced and the server is not running.
Step 2
Navigate to the $CCP_CONFIG directory on the server.
Step 3
Open the C4FTPAccess.config file with a text editor.
Step 4
Uncomment the required Cisco 6400 upload configuration variables, and provide values:
C4_PASSWORD = ftp_user_password
C4_IPADDRESS = ip_address
where:
ftp_user_name—the user name for your FTP account (FTP only)
ftp_user_password —the password for your FTP account (FTP only)
TRUE | FALSE—set to TRUE to enable FTP for upload. Set to FALSE if you want to use TFTP.
ip_address—The IP address of the Cisco Provisioning Center host machine is required when there are multiple IP addresses for Cisco Provisioning Center servers in the network. Otherwise, this attribute is optional.
Step 5
Save and exit the file.
Step 6
Start the Cisco Provisioning Center server:
Setting the Maximum Number of Network Interface Executors
You can set the maximum number of Network interface (NIF) executors in concurrent provisioning on a per site basis by editing the C4.NIFMaxSiteExecutors variable in the syavconfig.site. The default value of this variable is 5. The minimum allowed value is 1. The maximum value is determined by the value of the SYSSR.flowCOntrol variable.
To set the maximum number of NIF executors in concurrent provisioning, complete the following steps:
Step 1
Ensure that the Cisco Provisioning Center server environment is sourced and the server is not running.
Step 2
Navigate to the $CCP_CONFIG directory on the server.
Step 3
Open the syavconfig.site file with a text editor.
Step 4
Locate the following line:
C4.NIFMaxSiteExecutors = 5
Step 5
Set the C4.NIFMaxSiteExecutors variable to the required value.
Step 6
Save and exit the file.
Step 7
Start the Cisco Provisioning Center server:
Configuring CNX VC Class Autogeneration
You can configure CNX VC Class autogeneration by editing the C4.disableVCClassAutogenerate variable in the syavconfig.site. The default value of this variable is 0, which indicates that VC Class autogeneration is enabled. To disable CNX VC Class autogeneration, the variable must be set to 1.
To configure CNX VC Class autogeneration, complete the following steps:
Step 1
Ensure that the Cisco Provisioning Center server environment is sourced and the server is not running.
Step 2
Navigate to the $CCP_CONFIG directory on the server.
Step 3
Open the syavconfig.site file with a text editor.
Step 4
Locate the following line:
C4.disableVCClassAutogenerate = 0
Step 5
To disable the feature, set the C4.disableVCClassAutogenerate variable to a value of 1.
C4.disableVCClassAutogenerate = 1
Step 6
Save and exit the file.
Step 7
Start the Cisco Provisioning Center server:
Setting the Maximum Number of Concurrent Getter Processes
To set the maximum number of concurrent getter processes, you set the C4upl.getterLimit configuration variable to indicate the number of concurrent sessions that Cisco 6400 Equipment Module will use at any one time. The maximum number of concurrent processes that Cisco 6400 EM supports is 100.
To set the maximum number of concurrent getter processes, complete the following steps:
Step 1
Ensure that the Cisco Provisioning Center server environment is sourced and the server is not running.
Step 2
Navigate to the $CCP_CONFIG directory on the server.
Step 3
Open the syavconfig.site file with a text editor.
Step 4
Locate the following line:
Step 5
Edit the file to set the C4upl.getterLimit variable to the appropriate value.
Step 6
Save and exit the file.
Step 7
Start the Cisco Provisioning Center server:
Setting Getter Timeout Time
To set the getter timeout time, you set the C4.getterTimeout configuration variable to indicate the amount of time (in seconds) the Cisco 6400 Equipment Module will wait before individual getters (both Fabric and Service) will time out. The default value is 60.
To set the getter timeout time, complete the following steps:
Step 1
Ensure that the Cisco Provisioning Center server environment is sourced and the server is not running.
Step 2
Navigate to the $CCP_CONFIG directory on the server.
Step 3
Open the syavconfig.site file with a text editor.
Step 4
Locate the following line:
Step 5
Edit the file to set the C4.getterTimeout variable to the appropriate value.
Step 6
Save and exit the file.
Step 7
Start the Cisco Provisioning Center server:
Merit RADIUS Configuration
Configuration of the Merit RADIUS server is an integral part of provisioning Layer Two Tunneling Protocol (L2TP) single hop services on Cisco 6400 UAC equipment. The RADIUS server carries information on subscriber service lists and L2TP tunnels. The server acts as a repository of tunnels. Each tunnel has a Service Name key used to bind subscribers to the tunnel.
The Cisco 6400 Equipment Module uses a Merit RADIUS server for service pre-authorization. Data transfer between the Cisco Provisioning Center server host and the Merit server host is accomplished through FTP and TELNET sessions.
Merit RADIUS Installation
Installing the RADIUS Server
To install the Merit RADIUS server, perform the following steps on the host where the RADIUS server is to be installed. It is assumed that you have obtained a copy of the Merit RADIUS server software independently of Cisco Provisioning Center.
Step 1
Log in as root.
Step 2
Display the admintool interface by entering
Step 3
Select Groups from the Browse pull-down menu.
Step 4
Select Add from the Edit pull-down menu
Step 5
Table 1-4 specifies the values that should be entered during the setup of the group account.
Table 1-4 Group Attribute Values
Attribute
|
Description
|
Sample Value
|
Group Name
|
Required.
Specifies a name used by the system to identify a user's group. A group name is a text string composed of lowercase alphabetical characters (a-z) and digits (0-9). A group name can be 1-8 characters.
|
staff
|
Group ID
|
Required.
Specifies a group identification number used by the system to create a user's primary group. By default the next available number displays here.
|
102, 103
|
Members List
|
Optional.
Specifies users or groups who belong to this group. If there is more than one member in the list, then separate names with a comma but do not use any spaces.
|
bill,bob,barney
|
Step 6
Select Users from the Browse pull-down menu.
Step 7
Select Add from the Edit pull-down menu. Table 1-5 specifies the values that should be entered during the setup of the group account.
Table 1-5 User Attribute Values
Attribute
|
Description
|
Sample Value
|
User Name
|
Required.
Specifies the login name the operating system will use to identify this user. The user name must be a unique name composed of uppercase or lowercase alphabetical characters (a-z) or digits (0-9). A user name can be 1-8 characters long.
|
meritP
|
User ID
|
Required.
Specifies a number by which the operating system can identify a user. The user's UID is typically a number between 100 and 60000.
|
1003, 1004
|
Primary Group
|
Required.
Specifies a group number or a group name.The operating system will assign the group number to files created by the user.
|
staff
|
Secondary Groups
|
Optional.
Specifies other groups this user will belong to.
|
|
Comment
|
Optional.
Specifies notes about this user account.
|
|
Login Shell
|
Required.
Specifies a login shell for the user. The Korn shell is mandatory.
|
Korn
|
Password
|
Required.
Specifies the means by which a user sets up a password.
|
Select Normal Password from the drop-down menu and enter a password for the user.
|
Min Change
|
Optional.
Specifies the minimum number of days allowed between password changes.
|
|
Max Change
|
Optional.
Specifies the maximum number of days a user can go without having to set up a new password.
|
|
Max Inactive
|
Optional.
Specifies the maximum number of days the user account can be inactive before the user must set up a new password.
|
|
Expiration Date
|
Optional.
Specifies the expiration day, month, and year for a user's password.
|
|
Warning
|
Optional.
Specifies when users will start receiving warning messages about their password expiring.
|
|
Create Home Dir
|
Required.
Specifies whether or not the user's home directory is to be set up automatically. By default, the user's home directory is set up automatically.
|
/usr/private/etc/raddb
|
Path
|
Required.
Specifies the path for the user's home directory. The path is where admintool will place the user's initialization files. If Create Home Dir is selected you must specify a path.
|
/usr/private/etc
|
Step 8
Exit the admintool interface and login as the user you just created (i.e.: meritP):
Step 9
Change to the directory where the Merit RADIUS server is to be installed.
Step 10
Copy the Merit RADIUS server file (c4MeritRadius3.6B.tar) from the $CCP_MNG/utility directory into the current directory.
Step 11
Extract the Merit RADIUS server according to the directions in the Merit RADIUS README file (RadiusInstall.README) found in the $CCP_MNG/utility directory. This will install the software.
Starting the RADIUS Daemon
Step 1
Ensure that you are in the directory where the Merit RADIUS server is installed.
Step 2
Start the Merit daemon:
Testing the RADIUS Server
It is recommended that you test the Merit RADIUS server to determine whether the server is operational and to determine if the server will correctly authenticate a user.
Step 1
Login as the user meritP:
Step 2
Navigate to the directory containing the Merit server installation:
Step 3
Issue the radcheck command to determine whether the Merit server is operational:
radcheck -p 1645 -r 1 <hostname>
The server is working if a similar output to the following is displayed:
MF: vp=1703/1692 auth=2/1 waldo=1/1 redo=0/0
DNS-MF: client=2/0 addr=78/78 name=78/77
CLIENT-MF: vendor=10/0 vendor_list=158/157 (found=1)
auth queue: 1/1/(1/0), acct queue: 0/0/(0/0), maxtime: 0
(000107.143023)
auth stats: 2/0/0, acct stats: 0/0/0
authfile: 2, clients: 1, users: 1, 000107.143022
fsmid: STD, dictid: 1.14, vendid: 1.4
cleanup_delay: 6, avg-delay 1 (of 100)
"hostname(1645)" is responding
|
Step 4
Authenticate a sample user by using the radpwtst command:
radpwtst -p 1645 -s <hostname> -r 1 -w smart -u ppp smartuser
If authentication is successful, the server will prompt:
"smartuser" authentication OK
Automating RADIUS Server Startup
You can enable the RADIUS server to start up automatically when the system is booted. To automate the Merit RADIUS server startup process, follow the following procedure on the RADIUS server host:
Step 1
Add the following entries into the /etc/services file on the Merit RADIUS server host:
Step 2
Add the following entry in the /etc/inetd.conf file on the Merit RADIUS server host:
radius dgram udp wait meritP /usr/private/etc/radiusd radiusd
Installing the Cisco 6400 Equipment Module Utility Package
The Cisco 6400 Equipment Module includes a utilities package that must be installed separately on the RADIUS server host if you are doing your own installation of a RADIUS server. This package must be installed in the utility directory under the database directory. The package includes the C4buildDBM, C4userFilter, and C4userMerge executables.
To install the package, complete the following procedure:
Step 1
Navigate to the database directory on the RADIUS server host:
Step 2
Copy the C4buildDBM, C4userFilter, and C4userMerge executables from the Cisco Provisioning Center server host. These files are contained in the c4Utils.tar file located in the $CCP_BIN directory on the Cisco Provisioning Center server host. Copy the tar file over to the RADIUS server host.
cp /net/host/disk2/SY/Activator/Server/sys/bin/c4Utils.tar.
Step 3
Extract the utilities.
Note
Ensure that the RADIUS server database directory is the login directory for RADIUS server user accounts. By doing this, you avoid having to modify scripts to change from the working directory to the database directory when an FTP or TELNET session is initialized.
Configuring the RADIUS Clients File
In order to enable the RADIUS server to allow an NRP authorization request from the Cisco 6400, the NRP must be recognized as a client of the RADIUS server. The clients file must specify the IP address of each NRP that intends to use the RADIUS server for user authorization and authentication. The structure of the clients file will be similar to the following dialog:
#Client Name Key [type] [version] [prefix]
#---------------- --------------- --------------- --------- --------
192.1.10.151 password type = Merit:PROXY
#10.1.2.3:256 test type = nas v2 pfx
#pm1 %^$%#*(&!(*&)+ type=nas pm1.
|
Note
The key specified in the RADIUS clients file must be identical to the key specified for the RADIUS server in the NRP IOS as outlined in the section "Configuring RADIUS Access".
For more information on configuring the Merit RADIUS server clients file, visit the Merit Server AAA Configuration clients file page at http://www.merit.edu/aaa/clients.html.