![]() |
|||||||||||||||||||||||||||
Tunnel Authentication via RADIUS on Tunnel Terminator
![]() |
|||||||||||||||||||||||||||
Contents
Tunnel Authentication via RADIUS on Tunnel TerminatorLast Updated: July 04, 2011
The Tunnel Authentication via RADIUS on Tunnel Terminator feature allows tunnel authentication and authorization to occur through a remote RADIUS server instead of local configuration on the tunnel terminator. Thus, users no longer have to configure L2TP access concentrator (LAC) or Layer 2 Tunneling Protocol (L2TP) network server (LNS) data in a virtual private dialup network (VPDN) group when an LNS or LAC is configured for incoming dialin or dialout L2TP tunnel termination; this information can now be added to a remote RADIUS server, providing a more manageable and scalable solution for L2TP tunnel authentication and authorization on the tunnel terminator.
Finding Feature InformationYour software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Tunnel Authentication via RADIUS on Tunnel TerminatorBefore configuring this feature, you should define a RADIUS server group. For information on completing this task, refer to the chapter âConfiguring RADIUS â in the Cisco IOS Security Configuration Guide: Securing User Services
Restrictions for Tunnel Authentication via RADIUS on Tunnel TerminatorThe Tunnel Authentication via RADIUS on Tunnel Terminator feature is applicable only to L2TP; that is, protocols such as (Layer 2 Forwarding) L2F and Point-to-Point Tunneling Protocol (PPTP) are not supported. Information About Tunnel Authentication via RADIUS on Tunnel TerminatorThe Tunnel Authentication via RADIUS on Tunnel Terminator feature allows the LNS to perform remote authentication and authorization with RADIUS on incoming LAC dialin connection requests. This feature also allows the L2TP LAC to perform remote authentication and authorization with RADIUS on incoming L2TP LNS dialout connection requests. Before the introduction of this feature, the LNS could only perform L2TP tunnel authentication and authorization locally. These processes can be difficult to maintain across numerous LNSs, especially if the number of VPDN groups is large, because the LAC information must be configured under the VPDN group configurations of the LNS. Remote RADIUS authentication and authorization allows users to store the LAC configurations on the RADIUS server, thereby avoiding the need to store information locally. Thus, the new LAC information can be added to the RADIUS server as necessary, and the group of LNSs can authenticate and authorize by using a common user database on RADIUS. The figure below and the corresponding steps explain how this feature works.
New RADIUS AttributesTo help implement this feature, the following two new Cisco-specific RADIUS attributes have been introduced:
How to Configure Tunnel Authentication via RADIUS on Tunnel Terminator
Configuring the LNS or LAC for Remote RADIUS Tunnel Authentication and AuthorizationThe following task is used to configure an LNS or LAC for incoming dialin or dialout L2TP tunnel termination. DETAILED STEPS Verifying Remote RADIUS Tunnel Authentication and Authorization ConfigurationsTo verify that the L2TP tunnel is up, use the show vpdn tunnel command in EXEC mode. One tunnel and one session must be set up.
Router# show vpdn tunnel
L2TP Tunnel and Session Information Total tunnels 1 sessions 1
LocID RemID Remote Name State Remote Address Port Sessions VPDN Group
4571 61568 csidtw13 est 10.0.195.4 1701 1 ?
LocID RemID TunID Intf Username State Last Chg
4 11 4571 Vi4.1 csidtw9@cisco.com est 00:02:29
%No active L2F tunnels
%No active PPTP tunnels
%No active PPPoE tunnels
To verify that the AAA authorization RADIUS server is configured on the LNS and that the LNS can receive attributes 90 and 69 from the RADIUS server, perform the following steps:
DETAILED STEPS
Verifying Remote RADIUS Tunnel Authentication and Authorization ConfigurationsTo verify that the L2TP tunnel has been established and that the LNS can perform PPP negotiation and authentication with the remote client, perform the following steps: DETAILED STEPS
Configuration Examples for Tunnel Authentication via RADIUS on Tunnel Terminator
L2TP Network Server Configuration ExampleThe following example shows how to configure the LNS to enable remote RADIUS tunnel authentication and authorization: ! Define a RADIUS server group aaa group server radius VPDN-group server 64.102.48.91 auth-port 1645 acct-port 1646 ! ! RADIUS configurations only aaa authorization network mymethodlist group VPDN-Group vpdn tunnel authorization network mymethodlist vpdn tunnel authorization virtual-template 10 RADIUS User Profile for Remote RADIUS Tunnel Authentication ExampleThe following are examples of RADIUS user profiles for the LNS to terminate L2TP tunnels from a LAC. In the first user profile, the final line is optional if the vpdn tunnel authorization virtual-template command is used. Also, the first RADIUS user profile is for L2TP dialin, and the second RADIUS user profile is for L2TP dialout. The service-type in the RADIUS userâs profile for the tunnel initiator should always be set to âOutbound.â csidtw13 Password = "cisco" Service-Type = Outbound, Tunnel-Type = :0:L2TP, Tunnel-Medium-Type = :0:IP, Tunnel-Client-Auth-ID = :0:"csidtw13", Tunnel-Password = :0:"cisco" Cisco:Cisco-Avpair = "vpdn:vpdn-vtemplate=1" csidtw1 Password = âciscoâ Service-Type = Outbound, Tunnel-Type = :0:L2TP, Tunnel-Medium-Type = :0:IP, Tunnel-Client-Auth-ID = :0:"csidtw1", Tunnel-Password = :0:"cisco" Cisco:Cisco-Avpair = "vpdn:dout-dialer=2" Additional ReferencesThe following sections provide references related to the Tunnel Authentication via RADIUS on Tunnel Terminator feature. MIBsTechnical Assistance
Feature Information for Tunnel Authentication via RADIUS on Tunnel TerminatorThe following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
GlossaryL2TP --Layer 2 Tunnel Protocol. A Layer 2 tunneling protocol that enables an ISP or other access service to create a virtual tunnel to link customer remote sites or remote users with corporate home networks. In particular, a network access server (NAS) at the ISP point of presence (POP) exchanges PPP messages with the remote users and communicates by L2F or L2TP requests and responses with the customer tunnel server to set up tunnels. LAC --L2TP access concentrator. A network access server (NAS) to which the client directly connects and through which PPP frames are tunneled to the L2TP network server (LNS). The LAC need only implement the media over which L2TP is to operate to pass traffic to one or more LNSs. The LAC may tunnel any protocol carried within PPP. The LAC initiates incoming calls and receives outgoing calls. A LAC is analogous to an L2F network access server. LNS --L2TP network server. A termination point for L2TP tunnels and an access point where PPP frames are processed and passed to higher layer protocols. An LNS can operate on any platform that terminates PPP. The LNS handles the server side of the L2TP protocol. L2TP relies only on the single medium over which L2TP tunnels arrive. The LNS initiates outgoing calls and receives incoming calls. An LNS is analogous to a home gateway in L2F technology. Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R) Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. |
|||||||||||||||||||||||||||