- IGMP Profile Configuration Mode Commands
- IKEv2 Security Association Configuration Mode Commands
- IMEI Profile Configuration Mode
- IMEI-TAC-Group Configuration Mode Commands
- IMS Authorization Service Configuration Mode Commands
- IMS Sh Service Configuration Mode Commands
- IPMS Client Configuration Mode Commands
- IPNE Endpoint Configuration Mode Commands
- IPNE Service Configuration Mode Commands
- IPSec Transform Set Configuration Mode Commands
- IPSG RADIUS Snoop Configuration Mode Commands
- IPSG RADIUS Server Configuration Mode Commands
- IPSP Configuration Mode Commands
- IPv6 ACL Configuration Mode Commands
- IPv6 to IPv4 Tunnel Interface Configuration Mode Commands
- IP VRF Context Configuration Mode Commands
- ISAKMP Configuration Mode Commands
- IuPS Service Configuration Mode Commands
- LAC Service Configuration Mode Commands
- Line Configuration Mode Commands
- Link Configuration Mode Commands
- Linkset Configuration Mode Commands
- LMA Service Configuration Mode Commands
- LNS Service Configuration Mode Commands
- Local Policy Actiondef Configuration Mode Commands
- Local Policy Eventbase Configuration Mode Commands
- Local Policy Ruledef Configuration Mode Commands
- Local Policy Service Configuration Mode Commands
- Location Service Configuration Mode Commands
- Logical eNode Configuration Mode Commands
- Loopback Interface Configuration Mode Commands
- LTE Custom TAI List Configuration Mode Commands
- LTE Emergency Profile Configuration Mode Commands
- LTE Forbidden Location Area Configuration Mode Commands
- LTE Forbidden Tracking Area Configuration Mode Commands
- LTE Foreign PLMN GUTI Management Database Configuration Mode Commands
- LTE HeNBGW MME Pool Configuration Mode Commands
- LTE Handover Restriction List Configuration Mode Commands
- LTE MME HeNB-GW Management Database Configuration Mode Commands
- LTE Network Global MME ID Management Database Configuration Mode Commands
- LTE Paging Map Configuration Mode Commands
- LTE Paging Profile Configuration Mode Commands
- LTE Peer Map Configuration Mode Commands
- LTE Policy Configuration Mode Commands
- LTE Subscriber Map Configuration Mode Commands
- LTE TAI Management Database Configuration Mode Commands
- LTE TAI Management Object Configuration Mode Commands
- MAG Service Configuration Mode Commands
- MAP Service Configuration Mode Commands
- MIP HA Assignment Table Configuration Mode Commands
- MPLS-LDP Configuration Mode Commands
- MIPv6 HA Service Configuration Mode Commands
- MME-eMBMS Service Configuration Mode Commands
- MME LAC Pool Area Configuration Mode Commands
- MME MSC Pool Area Configuration Mode
- MME SGs Service Configuration Mode Commands
- MME Service Configuration Mode Commands
- MPLS-IP Configuration Mode Commands
- MRME Service Configuration Mode Commands
- Network Service Entity- IP Local Configuration Mode Commands
- Network Service Entity - Peer NSEI Configuration Mode Commands
- Network Service Virtual Connection Configuration Mode Commands
- Network Service Virtual Link Configuration Mode Commands
- NTP Configuration Mode Commands
- NTSR Pool Configuration Mode Commands
- Operator Policy Configuration Mode
- ORBEM Configuration Mode Commands
- OSPF Configuration Mode Commands
- OSPFv3 Configuration Mode Commands
- OSPF VRF Configuration Mode Commands
- Out-Address Configuration Mode Commands
- P2P Advertisement Server Group Configuration Mode Commands
- PCC-Action-Set Configuration Mode Commands
- PCC-AF-Service Configuration Mode Commands
- PCC-Condition-Group Configuration Mode Commands
- PCC-Data-Service Configuration Mode Commands
- PCC-Event-Notification-Interface-Endpoint Configuration Mode Commands
- PCC-Policy-Service Configuration Mode Commands
- PCC-Service-Profile Configuration Mode Commands
- PCC-QoS-Profile Configuration Mode Commands
- PCC-Quota Service Configuration Mode Commands
- PCC-Sp-Endpoint Configuration Mode Commands
- PCC-Service Addon Configuration Mode Commands
- PCC-TimeDef Configuration Mode Commands
- PCP Configuration Mode Commands
- PCP Policy Control Configuration Mode Commands
- PDIF Service Configuration Mode Commands
- PDG Service Configuration Mode Commands
- PDSN Service Configuration Mode Commands
- PDSN Service RoHC Configuration Mode Commands
- Peer List Configuration Mode Commands
- Peer Profile Configuration Mode Commands
- Peer-Server Configuration Mode Commands
- P-GW Service Configuration Mode Commands
- Policy Control Configuration Mode Commands
- Plugin Configuration Mode Commands
- PVC Configuration Mode Commands
- PVC Interface Configuration Mode Commands
- QCI - QoS Mapping Configuration Mode Commands
- QCI - RAN ID Mapping Configuration Mode Commands
- QoS L2 Mapping Configuration Mode Commands
- QoS Profile Configuration Mode Commands
- Index
IPSG RADIUS Snoop
Configuration Mode Commands
The IP Services Gateway (IPSG) RADIUS Snoop Configuration Mode is used to create and configure IPSG services within the current context. The IPSG RADIUS Snoop Mode configures the system to inspect RADIUS accounting requests on the way to the RADIUS accounting server and extract user information.
Mode
Exec > Global Configuration > Context Configuration > IPSG RADIUS Snoop Configuration
configure > context context_name > ipsg-service service_name mode radius-snoop
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipsg-service-radius-snoop)#
The commands or keywords/variables that are available are dependent on platform type, product version, and installed license(s).
bind
This command allows you to configure the service to accept data on any interface configured in the context. Optionally, you can also configure the system to limit the number of sessions processed by this service.
Product
IPSG
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPSG RADIUS Snoop Configuration
configure > context context_name > ipsg-service service_name mode radius-snoop
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipsg-service-radius-snoop)#
Syntax
Syntax Description
bind [ max-subscribers max_sessions ] no bind
no
If previously configured, deletes the binding configuration for the service.
max-subscribers max_sessions
Specifies the maximum number of subscriber sessions allowed for the service. If this option is not configured, the system defaults to the license limit.
In StarOS 9.0 and later releases, max_sessions must be an integer from 0 through 4000000.
In StarOS 8.3 and earlier releases, max_sessions must be an integer from 0 through 3000000.
Usage Guidelines
Use this command to initiate the service and begin accepting data on any interface configured in the context.
Examples
bind max-subscribers 10000
connection authorization
This command allows you to configure the RADIUS authorization password that must be matched by the RADIUS accounting requests "snooped" by this service.
Product
IPSG
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPSG RADIUS Snoop Configuration
configure > context context_name > ipsg-service service_name mode radius-snoop
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipsg-service-radius-snoop)#
Syntax
Syntax Description
connection authorization [ encrypted ] password password no connection authorization
no
Deletes the RADIUS connection authorization configuration from the current IPSG RADIUS snoop service.
[ encrypted ] password password
encrypted: Specifies that the received RADIUS authorization password is encrypted.
password password: Specifies the password that must be matched by incoming RADIUS accounting requests.
In StarOS 12.2 and later releases, password with encryption must be an alphanumeric string of 1 through 132 characters, and without encryption an alphanumeric string of 1 through 63 characters.
In StarOS 12.1 and earlier releases, password must be an alphanumeric string of 1 through 63 characters.
Usage Guidelines
RADIUS accounting requests being examined by the IPSG RADIUS snoop service are destined for a RADIUS Accounting Server. Since the "snoop" service does not terminate user authentication, the user password is unknown.
Use this command to configure the authorization password that the RADIUS accounting requests must match in order for the service to examine and extract user information.
Examples
connection authorization encrypted password secret
end
Exits the current configuration mode and returns to the Exec mode.
Product
All
Privilege
Security Administrator, Administrator
Syntax
Syntax Description
end
Usage Guidelines
Use this command to return to the Exec mode.
exit
Exits the current mode and returns to the parent configuration mode.
Product
All
Privilege
Security Administrator, Administrator
Syntax
Syntax Description
exit
Usage Guidelines
Use this command to return to the parent configuration mode.
profile
This command allows you to configure the service to use APN or subscriber profile.
Product
IPSG
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPSG RADIUS Snoop Configuration
configure > context context_name > ipsg-service service_name mode radius-snoop
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipsg-service-radius-snoop)#
Syntax
Syntax Description
profile { APN | subscriber } default profile
default
Configures this command with its default setting.
APN
Specifies the service to support APN configuration required to enable Gx support.
subscriber
Specifies the service to support subscriber profile lookup.
Usage Guidelines
Use this command to set the service to support APN profiles (supporting Gx through the enabling of ims-auth-service) or for basic subscriber profile lookup.
Examples
profile subscriber
radius
This command allows you to specify the RADIUS accounting servers where accounting requests are sent after being "inspected" by this service.
Product
IPSG
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPSG RADIUS Snoop Configuration
configure > context context_name > ipsg-service service_name mode radius-snoop
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipsg-service-radius-snoop)#
Syntax
Syntax Description
radius { accounting server ipv4_address [ port port_number | source-context context_name ] | dictionary { 3gpp2 | 3gpp2-835 | customXX | standard | starent | starent-835 | starent-vsa1 | starent-vsa1-835 } } [ no ] radius accounting server ipv4_address [ port port_number | source-context context_name ]
no
Removes the RADIUS accounting server identifier from this service.
radius accounting server ipv4_address
Specifies the IP address of a RADIUS accounting server where accounting requests are sent after being "snooped" by this service in IPv4 dotted-decimal notation.
Up to 16 addresses can be configured.
port port_number
Specifies the port number of the RADIUS Accounting Server where accounting requests are sent after being "snooped" by this service.
port_number must be an integer from 1 through 65535.
Default: 1813
source-context context_name
Specifies the source context where RADIUS accounting requests are received.
context_name must be an alphanumeric string of 1 through 79 characters.
If this keyword is not configured, the system will default to the context in which the IPSG service is configured.
dictionary { 3gpp2 | 3gpp2-835 | custom XX | standard | starent | starent-835 | starent-vsa1 | starent-vsa1-835 }
Specifies what dictionary to use. The possible values are described in the following table:
| Dictionary | Description |
|---|---|
3gpp |
This dictionary consists not only of all of the attributes in the standard dictionary, but also all of the attributes specified in 3GPP 32.015. |
3gpp2 |
This dictionary consists not only of all of the attributes in the standard dictionary, but also all of the attributes specified in IS-835-A. |
3gpp2-835 |
This dictionary consists not only of all of the attributes in the standard dictionary, but also all of the attributes specified in IS-835. |
customXX |
These are customized dictionaries. For information on custom dictionaries, please contact your Cisco account representative. XX is the integer value of the custom dictionary. |
standard |
This dictionary consists only of the attributes specified in RFC 2865, RFC 2866, and RFC 2869. |
starent |
This dictionary consists of all of the attributes in the starent-vsa1 dictionary and incorporates additional Starent Networks VSAs by using a two-byte VSA Type field. This dictionary is the master-set of all of the attributes in all of the dictionaries supported by the system. |
starent-835 |
This dictionary consists of all of the attributes in the starent-vsa1-835 dictionary and incorporates additional Starent Networks VSAs by using a two-byte VSA Type field. This dictionary is the master-set of all of the attributes in all of the -835 dictionaries supported by the system. |
starent-vsa1 |
This dictionary consists not only of the 3gpp2 dictionary, but also includes Starent Networks vendor-specific attributes (VSAs) as well. The VSAs in this dictionary support a one-byte wide VSA Type field in order to support certain RADIUS applications. The one-byte limit allows support for only 256 VSAs (0–255). This is the default dictionary. |
starent-vsa1-835 |
This dictionary consists not only of the 3gpp2-835 dictionary, but also includes Starent Networks vendor-specific attributes (VSAs) as well. The VSAs in this dictionary support a one-byte wide VSA Type field in order to support certain RADIUS applications. The one-byte limit allows support for only 256 VSAs (0–255). This is the default dictionary. |
Usage Guidelines
Use this command to specify the RADIUS Accounting Servers where accounting requests are sent after being snooped by this service.
Examples
The following command specifies the IP address (10.2.3.4) of a RADIUS Accounting Server whose accounting requests are to be "snooped", and the source context (aaa_ingress) where the requests are received on the system:
radius accounting server 10.2.3.4 source-context aaa_ingress
sess-replacement
This command allows you to enable/disable session replacement.
This command is not supported in this release. The Session Replacement feature is under development for future use.
Product
IPSG
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPSG RADIUS Snoop Configuration
configure > context context_name > ipsg-service service_name mode radius-snoop
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipsg-service-radius-snoop)#
Syntax
Syntax Description
sess-replacement { with-diff-acct-sess-id | with-diff-ip | with-diff-key } { default | no } sess-replacement
default
Configures this command with its default setting.
Default: Disabled.
no
If previously configured, deletes the configuration.
with-diff-acct-sess-id
Specifies to replace current session when a new session request comes with same IP address and same user name/IMSI but different accounting session ID.
with-diff-ip
Specifies to replace current session when a new session request comes with same user name/IMSI but different IP address.
with-diff-key
Specifies to replace current session when a new session request comes with same IP address but different user name/IMSI.
Usage Guidelines
Use this command to enable/disable session replacement. By default, session replacement is disabled.
Examples
sess-replacement with-diff-ip
setup-timeout
This command allows you to configure the timeout value for IPSG session setup attempts.
Product
IPSG
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPSG RADIUS Snoop Configuration
configure > context context_name > ipsg-service service_name mode radius-snoop
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipsg-service-radius-snoop)#
Syntax
Syntax Description
setup-timeout setup_timeout default setup-timeout
setup_timeout
Specifies the period of time (in seconds) the IPSG session setup is allowed to continue before the setup attempt is terminated.
setup_timeout must be an integer from 1 through 1000000.
Default: 60
Usage Guidelines
Use this command to prevent IPSG session setup attempts from continuing without termination.
Examples
setup-timeout 20
Feedback