Date post: | 14-Apr-2018 |
Category: |
Documents |
Upload: | thanhstore |
View: | 219 times |
Download: | 0 times |
7/30/2019 Broadband Access Configuration Guide
1/341
Juniper Networks, Inc.
1194 North Mathilda Avenue
Sunnyvale, CA 94089
USA
408-745-2000
www.juniper.net
Part Number: 162-01068-00, Revision A00
JUNOSe
Internet Softwarefor E-series Routing Platforms
Broadband Access
Configuration Guide
Release 6.1.x
7/30/2019 Broadband Access Configuration Guide
2/341
Juniper Networks, the Juniper Networks logo, NetScreen, NetScreen Technologies, the NetScreen logo, NetScreen-Global Pro, ScreenOS, and GigaScreen areregistered trademarks of Juniper Networks, Inc. in the United States and other countries.
The following are trademarks of Juniper Networks, Inc.: ERX, ESP, E-series, Instant Virtual Extranet, Internet Processor, J2300, J4300, J6300, J-Protect,J-series, J-Web, JUNOS, JUNOScope, JUNOScript, JUNOSe, M5, M7i, M10, M10i, M20, M40, M40e, M160, M320, M-series, MMD, NetScreen-5GT,NetScreen-5XP, NetScreen-5XT, NetScreen-25, NetScreen-50, NetScreen-204, NetScreen-208, NetScreen-500, NetScreen-5200, NetScreen-5400,NetScreen-IDP 10, NetScreen-IDP 100, NetScreen-IDP 500, NetScreen-Remote Security Client, NetScreen-Remote VPN Client, NetScreen-SA 1000 Series,NetScreen-SA 3000 Series, NetScreen-SA 5000 Series, NetScreen-SA Central Manager, NetScreen Secure Access, NetScreen-SM 3000, NetScreen-SecurityManager, NMC-RX, SDX, Stateful Signature, T320, T640, and T-series. All other trademarks, service marks, registered trademarks, or registered servicemarks are the property of their respective owners. All specifications are subject to change without notice.
Products made or sold by Juniper Networks (including the ERX-310, ERX-705, ERX-710, ERX-1410, ERX-1440, M5, M7i, M10, M10i, M20, M40, M40e,M160, M320, and T320 routers, T640 routing node, and the JUNOS, JUNOSe, and SDX-300 software) or components thereof might be covered by one ormore of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650,6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785.
Copyright 2005, Juniper Networks, Inc.All rights reserved. Printed in USA.
JUNOSeInternet Software for E-seriesRouting PlatformsBroadband Access Configuration Guide, Release 6.1.xWriting: Bruce Gillham, Justine Kangas, Sarah Lesway-Ball, Fran Singer, Michael TaillonEditing: Ben Mann, Tony Mauro, Fran MuesIllustration: Nathaniel WoodwardCover Design: Edmonds Design
Revision History
7 March 2005Revision 1The information in this document is current as of the date listed in the revision history.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer orotherwise revise this publication without notice.
Software License
The terms and conditions for using this software are described in the software license contained in the acknowledgment to your purchase order or, to theextent applicable, to any reseller agreement or end-user purchase agreement executed between you and Juniper Networks. By using this software, youindicate that you understand and agree to be bound by those terms and conditions.
Generally speaking, the software license restricts the manner in which you are permitted to use the software and may contain prohibitions against certainuses. The software license may state conditions under which the license is automatically terminated. You should consult the license for further details.
For complete product documentation, please see the Juniper Networks Web site at www.juniper.net/techpubs.
End User License Agreement
READ THIS END USER LICENSE AGREEMENT ("AGREEMENT") BEFORE DOWNLOADING, INSTALLING, OR USING THE SOFTWARE. BYDOWNLOADING, INSTALLING, OR USING THE SOFTWARE OR OTHERWISE EXPRESSING YOUR AGREEMENT TO THE TERMS CONTAINED HEREIN, YOU(AS CUSTOMER OR IF YOU ARE NOT THE CUSTOMER, AS A REPRESENTATIVE/AGENT AUTHORIZED TO BIND THE CUSTOMER) CONSENT TO BE BOUNDBY THIS AGREEMENT. IF YOU DO NOT OR CANNOT AGREE TO THE TERMS CONTAINED HEREIN, THEN (A) DO NOT DOWNLOAD, INSTALL, OR USE THESOFTWARE, AND (B) YOU MAY CONTACT JUNIPER NETWORKS REGARDING LICENSE TERMS.
1. The Parties. The parties to this Agreement are Juniper Networks, Inc. and its subsidiaries (collectively "Juniper"), and the person or organization thatoriginally purchased from Juniper or an authorized Juniper reseller the applicable license(s) for use of the Software ("Customer") (collectively, the "Parties").
2. The Software. In this Agreement, "Software" means the program modules and features of the Juniper or Juniper-supplied software, and updates andreleases of such software, for which Customer has paid the applicable license or support fees to Juniper or an authorized Juniper reseller.
3. License Grant. Subject to payment of the applicable fees and the limitations and restrictions set forth herein, Juniper grants to Customer a non-exclusiveand non-transferable license, without right to sublicense, to use the Software, in executable form only, subject to the following use restrictions:
a. Customer shall use the Software solely as embedded in, and for execution on, Juniper equipment originally purchased by Customer from Juniper or anauthorized Juniper reseller, unless the applicable Juniper documentation expressly permits installation on non-Juniper equipment.
b. Customer shall use the Software on a single hardware chassis having a single processing unit, or as many chassis or processing units for which Customerhas paid the applicable license fees.
c. Other Juniper documentation for the Software (such as product purchase documents, documents accompanying the product, the Software usermanual(s), Juniper's website for the Software, or messages displayed by the Software) may specify limits to Customer's use of the Software. Such limits mayrestrict use to a maximum number of seats, concurrent users, sessions, subscribers, nodes, or transactions, or require the purchase of separate licenses touse particular features, functionalities, or capabilities, or provide temporal or geographical limits. Customer's use of the Software shall be subject to all suchlimitations and purchase of all applicable licenses.
The foregoing license is not transferable or assignable by Customer. No license is granted herein to any user who did not originally purchase the applicablelicense(s) for the Software from Juniper or an authorized Juniper reseller.
7/30/2019 Broadband Access Configuration Guide
3/341
4. Use Prohibitions. Notwithstanding the foregoing, the license provided herein does not permit the Customer to, and Customer agrees not to and shall not:(a) modify, unbundle, reverse engineer, or create derivative works based on the Software; (b) make unauthorized copies of the Software (except as necessaryfor backup purposes); (c) rent, transfer, or grant any rights in and to any copy of the Software, in any form, to any third party; (d) remove any proprietarynotices, labels, or marks on or in any copy of the Software; (e) distribute any copy of the Software to any third party, including as may be embedded inJuniper equipment sold in the secondhand market; (f) use any 'locked' or key-restricted feature, function, or capability without first purchasing theapplicable license(s) and obtaining a valid key from Juniper, even if such feature, function, or capability is enabled without a key; (g) distribute any key forthe Software provided by Juniper to any third party; (h) use the Software in any manner that extends or is broader than the uses purchased by Customerfrom Juniper or an authorized Juniper reseller; (i) use the Software on non-Juniper equipment where the Juniper documentation does not expressly permitinstallation on non-Juniper equipment; (j) use the Software (or make it available for use) on Juniper equipment that the Customer did not originally purchasefrom Juniper or an authorized Juniper reseller; or (k) use the Software in any manner other than as expressly provided herein.
5. Audit. Customer shall maintain accurate records as necessary to verify compliance with this Agreement. Upon request by Juniper, Customer shall furnishsuch records to Juniper and certify its compliance with this Agreement.
6. Confidentiality. The Parties agree that aspects of the Software and associated documentation are the confidential property of Juniper. As such, Customershall exercise all reasonable commercial efforts to maintain the Software and associated documentation in confidence, which at a minimum includesrestricting access to the Software to Customer employees and contractors having a need to use the Software.
7. Ownership. Juniper and Juniper's licensors, respectively, retain ownership of all right, title, and interest (including copyright) in and to the Software,associated documentation, and all copies of the Software. Nothing in this Agreement constitutes a transfer or conveyance of any right, title, or interest in theSoftware or associated documentation, or a sale of the Software, associated documentation, or copies of the Software.
8. Warranty, Limitation of Liability, Disclaimer of Warranty. If the Software is distributed on physical media (such as CD), Juniper warrants for 90 daysfrom delivery that the media on which the Software is delivered will be free of defects in material and workmanship under normal use. This limitedwarranty extends only to the Customer. Except as may be expressly provided in separate documentation from Juniper, no other warranties apply to theSoftware, and the Software is otherwise provided AS IS. Customer assumes all risks arising from use of the Software. Customer's sole remedy and Juniper's
entire liability under this limited warranty is that Juniper, at its option, will repair or replace the media containing the Software, or provide a refund,provided that Customer makes a proper warranty claim to Juniper, in writing, within the warranty period. Nothing in this Agreement shall give rise to anyobligation to support the Software. Any such support shall be governed by a separate, written agreement. To the maximum extent permitted by law, Junipershall not be liable for any liabili ty for lost profits, loss of data or costs or procurement of substitute goods or services, or for any special, indirect, orconsequential damages arising out of this Agreement, the Software, or any Juniper or Juniper-supplied software. In no event shall Juniper be liable fordamages arising from unauthorized or improper use of any Juniper or Juniper-supplied software.
EXCEPT AS EXPRESSLY PROVIDED HEREIN OR IN SEPARATE DOCUMENTATION PROVIDED FROM JUNIPER AND TO THE EXTENT PERMITTED BY LAW,JUNIPER DISCLAIMS ANY AND ALL WARRANTIES IN AND TO THE SOFTWARE (WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE), INCLUDINGANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT DOES JUNIPERWARRANT THAT THE SOFTWARE, OR ANY EQUIPMENT OR NETWORK RUNNING THE SOFTWARE, WILL OPERATE WITHOUT ERROR ORINTERRUPTION, OR WILL BE FREE OF VULNERABILITY TO INTRUSION OR ATTACK.
9. Termination. Any breach of this Agreement or failure by Customer to pay any applicable fees due shall result in automatic termination of the licensegranted herein. Upon such termination, Customer shall destroy or return to Juniper all copies of the Software and related documentation in Customer'spossession or control.
10. Taxes. All license fees for the Software are exclusive of taxes, withholdings, duties, or levies (collectively "Taxes"). Customer shall be responsible forpaying Taxes arising from the purchase of the license, or importation or use of the Software.
11. Export. Customer agrees to comply with all applicable export laws and restrictions and regulations of any United States and any applicable foreign
agency or authority, and not to export or re-export the Software or any direct product thereof in violation of any such restrictions, laws or regulations, orwithout all necessary approvals. Customer shall be liable for any such violations. The version of the Software supplied to you may contain encryption orother capabilities restricting your ability to export the Software without an export license.
12. Commercial Computer Software. The Software is "commercial computer software" and is provided with restricted rights. Use, duplication, ordisclosure by the United States government is subject to restrictions set forth in this Agreement and as provided in DFARS 227.7201 through 227.7202-4,FAR 12.212, FAR 27.405(b)(2), FAR 52.227-19, or FAR 52.227-14(ALT III) as applicable.
13. Miscellaneous. This Agreement shall be governed by the laws of the State of California without reference to its conflicts of laws principles. For anydisputes arising under this Agreement, the Parties hereby consent to the personal and exclusive jurisdiction of, and venue in, the state and federal courtswithin Santa Clara County, California. This Agreement constitutes the entire and sole agreement between Juniper and the Customer with respect to theSoftware, and supersedes all prior and contemporaneous agreements relating to the Software, whether oral or written (including any inconsistent termscontained in a purchase order), except that the terms of a separate written agreement executed by an authorized Juniper representative and Customer shallgovern to the extent such terms are inconsistent or conflict with terms contained herein. No modification to this Agreement nor any waiver of any rightshereunder shall be effective unless expressly assented to in writing by the party to be charged. If any portion of this Agreement is held invalid, the Partiesagree that such invalidity shall not affect the validity of the remainder of this Agreement.
If you have any questions about this agreement, contact Juniper Networks at the following address:
Juniper Networks, Inc.1194 North Mathilda AvenueSunnyvale, CA 94089 USAAttn: Contracts Administrator
7/30/2019 Broadband Access Configuration Guide
4/341
7/30/2019 Broadband Access Configuration Guide
5/341
Table of Contents ! v
Table of Contents
About This Guide xi
Objectives.......................................................................................................xiE-series Routers .............................................................................................xiiAudience........................................................................................................ xiiDocumentation Conventions.......................................................................... xiiRelated Juniper Networks Documentation..................................................... xiii
Obtaining Documentation..............................................................................xvDocumentation Feedback .............................................................................. xvRequesting Support........................................................................................ xv
Chapter 1 Configuring Remote Access 1
Overview .........................................................................................................2B-RAS Protocol Support .............................................................................2B-RAS Data Flow........................................................................................3Configuring IP Addresses for Remote Clients.............................................3AAA Overview ...........................................................................................3
References .......................................................................................................4Before You Configure B-RAS ............................................................................4Configuration Tasks .........................................................................................4
Configuring a B-RAS License ............................................................................5Mapping a User Domain Name to a Virtual Router...........................................6
Mapping User Requests Without a Valid Domain Name ............................6Mapping User Requests Without a Configured Domain Name...................7Using DNIS ................................................................................................7Redirected Authentication ........................................................................7IP Hinting ..................................................................................................8
Setting Up Domain Name and Realm Name Usage........................................10Using the Realm Name as the Domain Name..........................................10Using Delimiters Other Than @...............................................................10Using Either the Domain or the Realm as the Domain Name ..................11Specifying the Domain Name or Realm Name Parse Direction................11Stripping the Domain Name....................................................................12
Domain Name and Realm Name Examples.............................................13Specifying a Single Name for Users from a Domain.......................................14Configuring RADIUS Authentication and Accounting Servers .........................15
Server Access ..........................................................................................16Server Request Processing Limit..............................................................16Authentication and Accounting Methods .................................................17Immediate Accounting Updates...............................................................18Duplicate and Broadcast Accounting .......................................................18
Configuring AAA Duplicate Accounting .............................................18Configuring AAA Broadcast Accounting.............................................19Overriding AAA Accounting NAS Information ...................................19
7/30/2019 Broadband Access Configuration Guide
6/341
vi!
Table of Contents
JUNOSe 6.1.x Broadband Access Configuration Guide
UDP Checksums ......................................................................................19Configuring RADIUS AA Servers ..............................................................20SNMP Traps and System Log Messages ..................................................30
SNMP Traps .....................................................................................30System Log Messages .......................................................................31
Configuring SNMP Traps .........................................................................31Configuring Local Authentication Servers.......................................................34
Creating the Local Authentication Environment.......................................34Creating Local User Databases.................................................................34Adding User Entries to Local User Databases...........................................35
Using the username Command.........................................................35Using the aaa local username Command ..........................................36
Assigning a Local User Database to a Virtual Router ................................ 36Enabling Local Authentication on the Virtual Router................................37Configuration Commands........................................................................37Local Authentication Example .................................................................40
Configuring Name Server Addresses ..............................................................43
Configuration Tasks.................................................................................44DNS Primary and Secondary NMS Configuration ..............................44WINS Primary and Secondary NMS Configuration ............................45
Configuring Local Address Servers .................................................................46Local Address Pool Ranges ......................................................................46Local Address Pool Aliases.......................................................................47SNMP Thresholds ....................................................................................47Configuring a Local Address Server .........................................................47
Configuring DHCP Features............................................................................49Creating an IP Interface .................................................................................50
Single Clients per ATM Subinterface ........................................................50Multiple Clients per ATM Subinterface.....................................................51
Configuring AAA Profiles ...............................................................................52
Allowing or Denying Domain Names ......................................................53Configuration Example .....................................................................53Using Domain Name Aliases ...................................................................54Manually Setting NAS-Port-Type Attribute ...............................................57Setting Profile-Service-Description Attribute ...........................................59
Using VSAs for Dynamic IP Interfaces............................................................60Traffic Shaping for PPP over ATM Interfaces ...........................................61
Configuring Timeout ......................................................................................62Limiting Active Subscribers............................................................................62Notifying RADIUS of AAA Failure ...................................................................63Configuring the SDX Client ............................................................................63Setting Baselines ............................................................................................68Monitoring Remote Access.............................................................................68
Chapter 2 Configuring RADIUS Attributes 91
Overview .......................................................................................................91RADIUS Services......................................................................................92RADIUS Attributes ...................................................................................92
References .....................................................................................................93Subscriber AA Access Messages .....................................................................93
Access-Request Messages ........................................................................94Access-Accept Messages ..........................................................................95Access-Reject Message.............................................................................96
7/30/2019 Broadband Access Configuration Guide
7/341
Table of Contents
Table of Contents ! vi
Subscriber AA Accounting Messages ..............................................................96Acct-Start Messages .................................................................................97Acct-Stop Messages .................................................................................98Interim-Acct Messages.............................................................................99Acct-On Messages..................................................................................100Acct-Off Messages .................................................................................100Acct-Tunnel-Start Messages ...................................................................101Acct-Tunnel-Stop Messages....................................................................101Acct-Tunnel-Reject Messages .................................................................102Acct-Tunnel-Link-Start Messages............................................................102Acct-Tunnel-Link-Stop Messages............................................................103Acct-Tunnel-Link-Reject Messages .........................................................103
CLI AA Messages..........................................................................................104Access-Request Messages ......................................................................104Access-Accept Messages ........................................................................104Access-Challenge Messages ...................................................................105Access-Reject Message...........................................................................105
CLI Commands Used to Modify RADIUS Attributes......................................105
Chapter 3 Configuring RADIUS Dynamic-Request Server 127
Overview ....................................................................................................127References ..................................................................................................128How RADIUS Dynamic-Request Server Works ............................................129RADIUS-Initiated Disconnect........................................................................129
Disconnect Messages ............................................................................129Message Exchange ...............................................................................129Qualifications for Disconnect ................................................................130Security/Authentication ........................................................................130
Configuring RADIUS-Initiated Disconnect.....................................................130RADIUS-Initiated Change of Authorization ...................................................131
Change-of-Authorization Messages .......................................................131Message Exchange ...............................................................................131Error-Cause Attributes ...........................................................................131Qualifications for Change of Authorization ............................................132Security/Authentication ........................................................................132
Configuring RADIUS-Initiated Change of Authorization ...............................132RADIUS Dynamic-Request Server Commands .............................................133Monitoring RADIUS Dynamic-Request Servers.............................................134
Chapter 4 Configuring RADIUS Relay Server 137
Overview .....................................................................................................137References ...................................................................................................138
How RADIUS Relay Server Works ................................................................138Authentication and Addressing..............................................................139Accounting ............................................................................................139Terminating the Wireless Subscribers Connection................................140
RADIUS Relay Server and the SDX Application ............................................140Using the SDX Application for Addressing .............................................140Using the SDX Application for Accounting.............................................141
Configuring RADIUS Relay Server Support...................................................141Monitoring RADIUS Relay Server .................................................................143
7/30/2019 Broadband Access Configuration Guide
8/341
viii!
Table of Contents
JUNOSe 6.1.x Broadband Access Configuration Guide
Chapter 5 Configuring TACACS+ 147
Overview .....................................................................................................147AAA Overview .......................................................................................148
Administrative Login Authentication......................................................149Privilege Authentication.........................................................................149Login Authorization ...............................................................................149Accounting ............................................................................................149
References ...................................................................................................151Before You Configure TACACS+..................................................................151Configuring TACACS+ Support....................................................................152
Configuring Authentication....................................................................152Configuring Accounting .........................................................................153
Monitoring TACACS+..................................................................................158
Chapter 6 Configuring L2TP 161
Overview .....................................................................................................162Terminology ..........................................................................................163Implementing L2TP...............................................................................163
Sequence of Events on the LAC.......................................................164Sequence of Events on the LNS .......................................................164
Packet Fragmentation............................................................................165References ...................................................................................................166Before You Configure the LAC or LNS ..........................................................166Line Module Requirements ..........................................................................167
Sessions and Tunnels Supported ...........................................................167Configuring the LAC.....................................................................................168
Configuring Calling Number AVP Formats.............................................169Configuration Tasks ........................................................................170
Mapping a User Domain Name to an L2TP Tunnel ................................171
Configuring the LNS ....................................................................................177Configuring Maximum LNS Sessions .....................................................179Selecting Tunnel-Service Modules for LNS Sessions Using MLPPP..........181
Overriding All Endpoint Discriminators...........................................183Enabling Tunnel Switching ..........................................................................184Enabling Tunnel Selection............................................................................184
Failover Between Preference Levels ......................................................185Failover Within a Preference Level .......................................................185Maximum Sessions per Tunnel .............................................................186Weighted Load Balancing ......................................................................187
Creating Persistent Tunnels..........................................................................187Testing Tunnel Configuration.......................................................................187Managing L2TP ............................................................................................188
Configuring Disconnect Cause Information..................................................191Configuring the Receive Window Size..........................................................193Configuring the Default RWS.................................................................193Configuring the RWS on the LAC ...........................................................194Configuring the RWS on the LNS ...........................................................195
Monitoring Tunnels and Sessions.................................................................196
7/30/2019 Broadband Access Configuration Guide
9/341
Table of Contents
Table of Contents ! ix
Chapter 7 Configuring L2TP Dial-Out 207
Overview ....................................................................................................207Terms....................................................................................................208
Network Model for Dial-Out ..................................................................208Dial-Out Process ...................................................................................209Dial-Out Operational States ..................................................................210
Chassis ...........................................................................................210Virtual Router .................................................................................210Targets ...........................................................................................210Sessions .........................................................................................211
Outgoing Call Setup Details ..................................................................212Access-Request Message ................................................................212Access-Accept Message ..................................................................213Outgoing Call .................................................................................213Mutual Authentication ....................................................................214Route Installation ...........................................................................214
References ..................................................................................................214Before You Configure L2TP Dial-Out ........................................................... 214Configuring L2TP Dial-Out ...........................................................................215Monitoring L2TP Dial-Out ............................................................................217
Chapter 8 Configuring DHCP 223
Overview .....................................................................................................223Integrated DHCP Access Server .............................................................224Service Deployment System .................................................................224
References ...................................................................................................224Configuring the DHCP Access Model ...........................................................225Configuring DHCP Proxy Clients ..................................................................225Configuring DHCP Relay and BOOTP Relay .................................................227
Trust-All Method....................................................................................227Protecting Against Spoofed Giaddr and Relay Agent Option Values....... 227
Configuring DHCP Relay Proxy ....................................................................231Managing Host Routes...........................................................................231
Selecting the DHCP Server Response ..............................................232Configuring DHCP Local Server ...................................................................233
DHCP Local Server Modes .....................................................................233DHCPv6 Local Server ......................................................................234Equal-Access Mode .........................................................................234Standalone Mode ............................................................................237Linking Local Address Pools............................................................238
DHCP Local Server Event Logs...............................................................238DHCP Local Server SNMP Traps ........................................................... 239
Before You Configure DHCP Local Server ..............................................239Configuration Tasks...............................................................................240Configuring the DHCP Local Server .......................................................240Configuring the DHCPv6 Local Server....................................................246Configuring Cable Modem DHCP Relay .................................................247Configuring the Router to Work with the SDX Application.....................247
Configuring DHCP External Server Application ............................................249Interoperating with Ethernet DSLAMs....................................................250Configuring DHCP External Server Support ...........................................251
Monitoring DHCP.........................................................................................252
7/30/2019 Broadband Access Configuration Guide
10/341
x!
Table of Contents
JUNOSe 6.1.x Broadband Access Configuration Guide
Chapter 9 Configuring Subscriber Interfaces 269
Overview .....................................................................................................269Relationship to Shared IP Interfaces ......................................................270
Relationship to Primary IP Interfaces ....................................................270Ethernet Interfaces and VLANs..............................................................271Moving Interfaces..................................................................................271Preventing IP Spoofing..........................................................................271Routing Protocols ..................................................................................271Policies and QoS....................................................................................271Applications...........................................................................................271
Directing Traffic Toward Special Local Content...............................272Differentiating Traffic for VPNs .......................................................273
Dynamic Creation of Subscriber Interfaces............................................274How Dynamic Subscriber Interfaces Are Created............................274DHCP Local Server and Address Allocation .....................................274Supported Configurations................................................................274
Designating Traffic for the Primary IP Interface .............................. 275References ...................................................................................................275Configuring Static Subscriber Interfaces.......................................................276
Using a Destination Address to Demultiplex Traffic...............................276Using a Source Address to Demultiplex Traffic ......................................278
Configuring Dynamic Subscriber Interfaces .................................................281Configuring Dynamic Subscriber Interfaces over Ethernet.....................281Configuring Dynamic Subscriber Interfaces over VLANs........................282Configuring Dynamic Subscriber Interfaces over Bridged Ethernet........284Dynamic Subscriber Interface Configuration Example...........................285
Monitoring Subscriber Interfaces .................................................................291
Chapter 10 Configuring Subscriber Management 293
Overview .....................................................................................................293Subscriber Management Attributes ..............................................................294
Dynamic IP Subscriber Interfaces..........................................................294Subscriber Management Example................................................................295
Subscriber PC..................................................................................296E-series Router................................................................................296SDX Application..............................................................................296
Configuring Subscriber Management with an External DHCP Server.....297Subscriber Management Commands............................................................298Monitoring Subscriber Management ............................................................301
Appendix A RADIUS Attribute Descriptions 303
Appendix B L2TP Disconnect Cause Codes 313
Index 317
7/30/2019 Broadband Access Configuration Guide
11/341
Objectives ! x
About This Guide
This preface provides the following guidelines for using theJUNOSe InternetSoftware for E-series Routing Platforms Broadband Access Configuration Guide:
! Objectives on page xi
!
E-series Routers on page xii! Audience on page xii
! Documentation Conventions on page xii
! Related Juniper Networks Documentation on page xiii
! Obtaining Documentation on page xv
! Documentation Feedback on page xv
! Requesting Support on page xv
Objectives
This guide provides the information you will need to configure routing and remoteaccess on your E-series router.
An E-series router is shipped with the latest system software installed. If you needto install a future release or reinstall the system software, refer to the procedures intheE-series Hardware Guide, Appendix B, Installing JUNOSe Software.
NOTE: If the information in the latestJUNOSe Release Notes differs from theinformation in this guide, follow theJUNOSe Release Notes.
7/30/2019 Broadband Access Configuration Guide
12/341
JUNOSe 6.1.x Broadband Access Configuration Guide
xii ! E-series Routers
E-series Routers
Five models of E-series routers are available:
! ERX-1440 router
! ERX-1410 router
! ERX-710 router
! ERX-705 router
! ERX-310 router
All models use the same software. For information about the differences betweenthe models, seeE-series Hardware Guide, Chapter 1, E-series Overview.
In the E-series documentation, the term ERX-14xx models refers to both theERX-1440 router and the ERX-1410 router. Similarly, the term ERX-7xx modelsrefers to both the ERX-710 router and the ERX-705 router. The terms ERX-1440router, ERX-1410 router, ERX-710 router, ERX-705 router, and ERX-310 router referto the specific models.
Audience
This guide is intended for experienced system and network specialists working withE-series routers in an Internet access environment.
Documentation Conventions
Table 1 defines notice icons used in this guide. Table 2 defines text conventionsused in this guide and the syntax conventions used primarily in the JUNOSeCommand Reference Guide. For more information about command syntax, seeJUNOSe System Basics Configuration Guide, Chapter 2, Command-Line Interface.
Table 1: Notice Icons
Icon Meaning Description
Informational note Indicates important features or instructions.
Caution Indicates a situation that might result in loss of data or
hardware damage.
Warning Alerts you to the risk of personal injury.
http://../swconfig-system-basics/cli-using.pdfhttp://../swconfig-system-basics/cli-using.pdf7/30/2019 Broadband Access Configuration Guide
13/341
Related Juniper Networks Documentation ! xii
About This Guide
Related Juniper Networks Documentation
TheE-seriesInstallation Quick Startposter is shipped in the box with all new routers.This poster provides the basic procedures to help you get the router up and runningquickly.
Table 3 lists and describes the E-series document set. A complete list ofabbreviations used in this document set, along with their spelled-out terms, isprovided in theJUNOSe System Basics Configuration Guide, Appendix A, Abbreviationsand Acronyms.
Table 2: Text and Syntax Conventions
Convention Description Examples
Text Conventions
Bold typeface Represents commands and keywords intext.
! Issue the clock source command.
! Specify the keyword exp-msg.
Bold sans serif typeface Represents text that the user must type. host1(config)#traffic class low-loss1
Fixed-width font Represents information as displayed onyour terminals screen.
host1#show ip ospf 2
Routing Process OSPF 2 with Router ID5.5.0.250
Router is an Area Border Router (ABR)
Italic typeface ! Emphasizes words.
! Identifies variables.
! Identifies chapter, appendix, and
book names.
! There are two levels of access, user andprivileged.
! clusterId, ipAddress.
! Appendix A, System Specifications.Plus sign (+) linking key names Indicates that you must press two or
more keys simultaneously.Press Ctrl+b.
Syntax Conventions in the Command Reference Guide
Plain typeface Represents keywords. terminal length
Italic typeface Represents variables. mask, accessListName
| (pipe symbol) Represents a choice to select onekeyword or variable to the left or rightof this symbol. (The keyword orvariable can be either optional orrequired.)
diagnostic | line
[ ] (brackets) Represent optional keywords or
variables.
[ internal | external ]
[ ]* (brackets and asterisk) Represent optional keywords orvariables that can be entered more thanonce.
[ level1 | level2 | l1 ]*
{ } (braces) Represent required keywords orvariables.
{ permit | deny } { in | out }{ clusterId| ipAddress }
http://../swconfig-system-basics/appendix-abbreviations.pdfhttp://../swconfig-system-basics/appendix-abbreviations.pdfhttp://../swconfig-system-basics/appendix-abbreviations.pdfhttp://../swconfig-system-basics/appendix-abbreviations.pdf7/30/2019 Broadband Access Configuration Guide
14/341
JUNOSe 6.1.x Broadband Access Configuration Guide
xiv ! Related Juniper Networks Documentation
Table 3: Juniper Networks E-series Technical Publications
Document Description
E-series Hardware Guide Provides the necessary procedures for getting the router operational, including
information about installing, cabling, powering up, configuring the router formanagement access, and general troubleshooting. Describes SRP modules, linemodules, and I/O modules available for the E-series routers.
E-series Module Guide Provides detailed specifications for line modules and I/O modules, andinformation about the compatibility of these modules with JUNOSe softwarereleases. Lists the layer 2 protocols, layer 3 protocols, and applications that linemodules and their corresponding I/O modules support. Provides module LEDinformation.
JUNOSe System Basics Configuration Guide Describes planning and configuring your network, managing the router,configuring passwords and security, configuring the router clock, and configuringvirtual routers. Includes a list of references that provide information about theprotocols and features supported by the router.
JUNOSe Physical Layer Configuration Guide Describes configuring physical layer interfaces.
JUNOSe Link Layer Configuration Guide Describes configuring link-layer interfaces.
JUNOSe Routing Protocols Configuration
Guide, Vol. 1
Provides information about configuring routing policy and configuring IP, IProuting, and IP security.
JUNOSe Routing Protocols Configuration
Guide, Vol. 2
Describes BGP routing, MPLS, BGP-MPLS VPNs, and encapsulation of layer 2services.
JUNOSe Policy and QoS Configuration Guide Provides information about configuring policy management and quality of service(QoS).
JUNOSe Broadband Access Configuration
Guide
Provides information about configuring remote access.
JUNOSeCommand Reference Guide A to M;JUNOSeCommand Reference Guide N to Z
Together constitute theJUNOSe Command Reference Guide. Contain importantinformation about commands implemented in the system software. Use to lookup command descriptions, command syntax, a commands related mode, or adescription of a commands parameters. Use with the JUNOSe configurationguides.
Release Notes
JUNOSe Release Notes In theRelease Notes, you will find the latest information about features, changes,known problems, resolved problems, and system maximum values. If theinformation in theRelease Notes differs from the information found in thedocumentation set, follow theRelease Notes.
Release notes are included on the corresponding software CD and are available onthe Web.
7/30/2019 Broadband Access Configuration Guide
15/341
Obtaining Documentation ! xv
About This Guide
Obtaining Documentation
To obtain the most current version of all Juniper Networks technical documentation,see the products documentation page on the Juniper Networks Web site athttp://www.juniper.net/.
To order printed copies of this manual and other Juniper Networks technicaldocuments, or to order a documentation CD, which contains this manual, contactyour sales representative.
Copies of the Management Information Bases (MIBs) available in a software releaseare included on the documentation CDs and at http://www.juniper.net/.
Documentation Feedback
We encourage you to provide feedback, comments, and suggestions so that we can
improve the documentation to better meet your needs. You can send yourcomments to [email protected], or fill out the documentationfeedback form at http://www.juniper.net/techpubs/docbug/docbugreport.html. Ifyou are using e-mail, be sure to include the following information with yourcomments:
! Document name
! Document part number
! Page number
! Software release version
Requesting Support
For technical support, open a support case using the Case Manager link athttp://www.juniper.net/support/ or call 1-888-314-JTAC (within the United States) or1-408-745-9500 (outside the United States).
7/30/2019 Broadband Access Configuration Guide
16/341
JUNOSe 6.1.x Broadband Access Configuration Guide
xvi ! Requesting Support
7/30/2019 Broadband Access Configuration Guide
17/341
! 1
Chapter 1
Configuring Remote Access
This chapter describes how to configure remote access to an E-series router. Thischapter discusses the following topics:
! Overview on page 2
! References on page 4
! Before You Configure B-RAS on page 4
! Configuration Tasks on page 4
! Configuring a B-RAS License on page 5
! Mapping a User Domain Name to a Virtual Router on page 6
! Setting Up Domain Name and Realm Name Usage on page 10
! Specifying a Single Name for Users from a Domain on page 14
! Configuring RADIUS Authentication and Accounting Servers on page 15
! Configuring Local Authentication Servers on page 34
! Configuring Name Server Addresses on page 43
! Configuring Local Address Servers on page 46
! Configuring DHCP Features on page 49
! Creating an IP Interface on page 50
! Configuring AAA Profiles on page 52
! Using VSAs for Dynamic IP Interfaces on page 60
! Configuring Timeout on page 62
! Limiting Active Subscribers on page 62
! Notifying RADIUS of AAA Failure on page 63
7/30/2019 Broadband Access Configuration Guide
18/341
JUNOSe 6.1.x Broadband Access Configuration Guide
2 ! Overview
! Configuring the SDX Client on page 63
! Setting Baselines on page 68
! Monitoring Remote Access on page 68
Overview
Broadband Remote Access Server (B-RAS) is an application running on your routerthat:
! Aggregates the output from digital subscriber line access multiplexers (DSLAMs)
! Provides user Point-to-Point Protocol (PPP) sessions or IP-over-AsynchronousTransfer Mode (ATM) sessions
! Enforces quality of service (QoS) policies
! Routes traffic into an Internet service providers (ISPs) backbone network
A DSLAM collects data traffic from multiple subscribers into a centralized point sothat it can be uploaded to the router over an ATM connection via a DS3, OC3, E3, orOC12 link.
The router provides the logical termination for PPP sessions, as well as the interfaceto authentication and accounting systems.
B-RAS Protocol Support
The E-series router supports the following protocols for B-RAS services:
! PPP
! PPP over Ethernet (PPPoE)
! Bridged Ethernet
! Layer 2 Tunneling Protocol (L2TP), both L2TP access concentrator (LAC) andL2TP network server (LNS)
7/30/2019 Broadband Access Configuration Guide
19/341
Overview ! 3
Chapter 1: Configuring Remote Access
B-RAS Data Flow
The router performs several tasks for a digital subscriber line (DSL) PPP user toestablish a PPP connection. This is an example of the way B-RAS data might flow:
1. Authenticate the subscriber using RADIUS authentication.
2. Assign an IP address to the PPP/IP session via RADIUS, local address pools, orDynamic Host Configuration Protocol (DHCP).
3. Terminate the PPP encapsulation or tunnel a PPP session.
4. Provide user accounting via RADIUS.
Configuring IP Addresses for Remote Clients
A remote client can obtain an IP address from one of the following:
! RADIUS server
! Local address server
! DHCP proxy client and server
! DHCP relay agent (Bridged IP only)
! DHCP local server
! DHCP external server
For information about configuring DHCP support on the E-series router, seeChapter 8, Configuring DHCP.
For information about how to configure a RADIUS server, see your RADIUS serverdocumentation.
AAA Overview
Collectively, authentication, authorization, and accounting are referred to as AAA.Each has an important but separate function.
! AuthenticationDetermines who the user is, then determines whether thatuser should be granted access to the network. The primary purpose is toprevent intruders from networks. It uses a database of users and passwords.
! AuthorizationDetermines what the user is allowed to do by giving networkmanagers the ability to limit network services to different users.
! AccountingTracks what the user did and when they did it. You can useaccounting for an audit trail or for billing for connection time or resources used.
NOTE: For information about configuring RADIUS attributes see Chapter 2,Configuring RADIUS Attributes.
7/30/2019 Broadband Access Configuration Guide
20/341
JUNOSe 6.1.x Broadband Access Configuration Guide
4 ! References
Central management of AAA means the information is in a single, centralized,secure database, which is much easier to administer than information distributedacross numerous devices.
References
For more information about the topics covered in this chapter, see the followingdocuments:
RFC 2748The COPS (Common Open Policy Service) Protocol (January 2000)
RFC 2865Remote Authentication Dial In User Service (RADIUS) (June 2000)
RFC 3084COPS Usage for Policy Provisioning (COPS-PR) (March 2001)
RFC 3159Structure of Policy Provisioning Information (SPPI) (August 2001)
RFC 3198Terminology for Policy-Based Management (November 2001)
RFC 3318Framework Policy Information Base (March 2003)
Before You Configure B-RAS
Before you begin to configure B-RAS, you need to collect the following informationfor the RADIUS authentication and accounting servers:
! IP addresses
! User Datagram Protocol (UDP) port numbers
! Secret keys
Configuration Tasks
Each configuration task is presented in a separate section in this chapter. Most ofthe B-RAS configuration tasks are optional.
To configure B-RAS, perform the following tasks:
! Configure a B-RAS license.
! (Optional) Map a user domain name to a virtual router. By default, all requestsgo through a default router.
! (Optional) Set up domain name and realm name usage.
! (Optional) Specify a single name for users from a domain.
! Configure an authentication server on the router.
! (Optional) Configure UDP checksums.
http://../swconfig-system-basics/references.pdfhttp://../swconfig-system-basics/references.pdfhttp://../swconfig-system-basics/references.pdfhttp://../swconfig-system-basics/references.pdfhttp://../swconfig-system-basics/references.pdfhttp://../swconfig-system-basics/references.pdfhttp://../swconfig-system-basics/references.pdfhttp://../swconfig-system-basics/references.pdfhttp://../swconfig-system-basics/references.pdfhttp://../swconfig-system-basics/references.pdfhttp://../swconfig-system-basics/references.pdfhttp://../swconfig-system-basics/references.pdf7/30/2019 Broadband Access Configuration Guide
21/341
Configuring a B-RAS License ! 5
Chapter 1: Configuring Remote Access
! (Optional) Configure an accounting server on the router.
! (Optional) Configure Domain Name System (DNS) and Windows Internet NameService (WINS) name server addresses.
! (Optional) Configure a local address pool for remote clients.
! (Optional) Configure one or more DHCP servers.
! Create a PPP interface on which the router can dynamically create an IPinterface.
! (Optional) Configure AAA profiles.
! (Optional) Use vendor-specific attributes (VSAs) for Dynamic Interfaces.
! (Optional) Set idle or session timeout.
! (Optional) Limit the number of active subscribers on a virtual router (VR) orport.
! (Optional) Set up the router to notify RADIUS if a user fails AAA.
! (Optional) Configure the Service Deployment System (SDX) client.
! (Optional) Set baselines for AAA statistics or RADIUS authentication andaccounting statistics.
Configuring a B-RAS License
From Global Configuration mode, configure a B-RAS license:
host1(config)#license b-ras k3n91s6gvtj
You can configure up to 48,000 PPP and SDX interfaces for the router when youconfigure it for B-RAS. However, depending on the B-RAS license you purchased, nomore than 2,000, 4,000, 8,000, 16,000, 32,000, or 48,000 authenticated PPPsessions can be active at any one time.
The license key limits only the number of active subscribers; it does not limit thecommand set available on the command-line interface (CLI). When the limit ofsubscribers specified by the license is exceeded, the router issues warning logmessages:
Subscriber limit has been exceeded - please contact Juniper Networks to upgradeyour Subscriber Management Feature Pack license to support additional users.
If the limit is further exceeded, subscribers are denied authentication.
NOTE: To use a B-RAS license for 16,000 or more interfaces, each of your SRPmodules must have 1 gigabyte (GB) of memory.
7/30/2019 Broadband Access Configuration Guide
22/341
JUNOSe 6.1.x Broadband Access Configuration Guide
6 ! Mapping a User Domain Name to a Virtual Router
license b-ras
! Use to specify the B-RAS license.
! The license is a unique string of up to 15 alphanumeric characters.
! You can purchase licenses that allow up to 2,000, 4,000, 8,000, 16,000,32,000, or 48,000 authenticated PPP sessions.
! Example
host1(config)#license b-ras jwmR4k8D
! Use the no version to disable the license.
Mapping a User Domain Name to a Virtual Router
You can configure RADIUS authentication, accounting, and local address pools for aspecific virtual router and then map a user domain to that virtual router.
The router keeps track of the mapping between domain names and virtual-routers.Use the aaa domain-map command to map a user domain to a virtual router.
When the router is configured to require authentication of a PPP user, the router
checks for the appropriate user domain-name-to-virtual-router mapping. If it finds amatch, the router sends a RADIUS authentication request to the RADIUS serverconfigured for the specific virtual router.
Mapping User Requests Without a Valid Domain Name
You can create a mapping between a domain name called defaultand a specificvirtual router so that the router can map user names that contain a domain namethat does not have an explicit map.
If a user request is submitted with a domain name for which the router cannot finda match, the router looks for a mapping between the domain name defaultand avirtual router. If a match is found, the users request is processed according to the
RADIUS server configured for the named virtual router. If no entry is found thatmaps defaultto a specific virtual router, the router sends the request to the RADIUSserver configured on the default virtual router.
NOTE: Acquire the license from Juniper Networks Customer Service or your JuniperNetworks sales representative.
NOTE: This domain name is not the NT domain sometimes found on the DialupNetworkingdialog box.
http://../swcmdref/jkl-commands.pdfhttp://../swcmdref/jkl-commands.pdf7/30/2019 Broadband Access Configuration Guide
23/341
Mapping a User Domain Name to a Virtual Router ! 7
Chapter 1: Configuring Remote Access
Mapping User Requests Without a Configured Domain Name
You can map a domain name called none to a specific virtual router so that therouter can map user names that do not contain a domain name.
If a user request is submitted without a domain name, the router looks for amapping between the domain name none and a virtual router. If a match is found,the users request is processed according to the RADIUS server configured for thenamed virtual router. If the router does not find the domain name none, it checksfor the domain name default. If no matching entries are found, the router sends therequest to the server configured on the default virtual router.
Using DNIS
The E-series router supports dialed number identification service (DNIS). WithDNIS, if users have a called number associated with them, the router searches thedomain map for the called number. If it finds a match, the router uses the matching
domain map entry information to authenticate the user. If the router does not find amatch, it searches the domain map using normal processing.
For example, as specified in the following sequence, a user calling 9785551212would be terminated in vrouter_88, while a user calling 8005554433 is terminatedin vrouter_100.
host1(config)#aaa domain-map 9785551212 vrouter_88host1(config)#aaa domain-map 8005554433 vrouter_100
Redirected Authentication
Redirected authentication provides a way to offload AAA activity on the router, byproviding the domain-mapping-like feature remotely on the RADIUS server.Redirected authentication works as follows:
1. The router sends an authentication request (in the form of a RADIUSaccess-request message) to the RADIUS server that is configured in the defaultVR.
2. The RADIUS server determines the users AAA VR context and returns thisinformation in a RADIUS response message to the router.
3. The router then behaves in similar fashion as if it had received the VR contextfrom the local domain map.
To maintain local control, the only VR allowed to redirect authentication is thedefault VR. Also, to prevent loopbacks, the redirection may occur only once to anon-default VR.
NOTE: For DNIS to work, the router must be acting as the LNS. Also, the phonenumber configured in the aaa domain-map command must be an exact match tothe value passed by L2TP in the called number AVP (AVP 21).
NOTE: If the default VR does not exist, authentication fails.
7/30/2019 Broadband Access Configuration Guide
24/341
JUNOSe 6.1.x Broadband Access Configuration Guide
8 ! Mapping a User Domain Name to a Virtual Router
To maintain flexibility, the redirection response may include idle time or sessionattributes that are considered as default unless the redirected authentication serveroverrides them. For example, if the RADIUS server returns the VR context alongwith an idle timeout attribute with the value set to 20 minutes, the router uses thisidle timeout value unless the RADIUS server configured in the VR context returns adifferent value.
Since the router supports the RADIUS User-Name attribute [1] in the RADIUSresponse message, the default VR RADIUS server may override the users name(this can be a stripped name or an entirely different name). Overriding is useful forthe case when the user enters a login name containing a domain name that issignificant only to the RADIUS server in the default VR.
IP Hinting
You can allocate an address before authentication of PPP sessions. This address isincluded in the Access-Request sent to the authentication server as an IP address
hint.
aaa domain-map
! Use to map a user domain name to a virtual router or a loopback interface.
! When you specify only the domain name, the command sets the mode toDomain Map Configuration.
! Example
host1(config)#aaa domain-map juniper.net vrouter_1host1(config)#aaa domain-map none vrouter_all_purposehost1(config)#aaa domain-map default vrouter_all_purposehost1(config)#aaa domain-map 8005558934 vrouter_78
host1(config)#aaa domain-map westford.comhost1(config-domain-map)#
! Use the no version to delete the map entry.
ip-hint
! Use to preallocate an IP address for the remote B-RAS user beforeauthenticating the remote user.
! The address is passed as a hintin the authentication request.
! Example
host1(config-domain-map)#ip-hint enable
! Use the no version to disable the feature.
http://../swcmdref/a-commands.pdfhttp://../swcmdref/i-commands.pdfhttp://../swcmdref/a-commands.pdfhttp://../swcmdref/i-commands.pdf7/30/2019 Broadband Access Configuration Guide
25/341
Mapping a User Domain Name to a Virtual Router ! 9
Chapter 1: Configuring Remote Access
ipv6-local-interface
! Use to map a user domain name to an IP version 6 (IPv6) loopback interface.
! The local interface identifies the interface information to use on the local
(E-series) side of the subscribers interface.! Example
host1(config)#aaa domain-map westford.comhost1(config-domain-map)#ipv6-local-interface 2001:db8::8000
! Use the no version to delete the entry.
ipv6-router-name
! Use to map a user domain name to an IPv6 virtual router in Domain MapConfiguration mode.
! Example
host1(config)#aaa domain-map westford.comhost1(config-domain-map)#ipv6-router-name vroutv6
! Use the no version to delete the entry.
local-interface
! Use to map a user domain name to a loopback interface.
! The local interface identifies the interface information to use on the local(E-series) side of the subscribers interface.
! Example
host1(config)#aaa domain-map westford.com
host1(config-domain-map)#local-interface 10.10.5.30
! Use the no version to delete the entry.
router-name
! Use to map a user domain name to a virtual router.
! Example
host1(config)#aaa domain-map westford.comhost1(config-domain-map)#router-name vrout
! Use the no version to delete the entry.
http://../swcmdref/i-commands.pdfhttp://../swcmdref/i-commands.pdfhttp://../swcmdref/jkl-commands.pdfhttp://../swcmdref/opqr-commands.pdfhttp://../swcmdref/i-commands.pdfhttp://../swcmdref/i-commands.pdfhttp://../swcmdref/jkl-commands.pdfhttp://../swcmdref/opqr-commands.pdf7/30/2019 Broadband Access Configuration Guide
26/341
JUNOSe 6.1.x Broadband Access Configuration Guide
10 ! Setting Up Domain Name and Realm Name Usage
Setting Up Domain Name and Realm Name Usage
To provide flexibility in how the router handles different types of usernames, thesoftware lets you specify the part of a username to use as the domain name, howthe domain name is designated, and how the router parses names. It also allowsyou to set whether or not the router strips the domain name from the usernamebefore it sends the username to the RADIUS server.
By default, the router parses usernames as follows:
realmName/personalName@domainName
The string to the left of the forward slash (/) is the realm name, and the string to theright of the at-symbol (@) is the domain name. For example, in the usernamejuniper/[email protected], juniper is the realm name and abc.com is the domain name.
The router allows you to:
! Use the realm name as the domain name.
! Use delimiters other than / to designate the realm name.
! Use delimiters other than @ to designate the domain name.
! Use either the domain or the realm as the domain name when the usernamecontains both a realm and domain name.
! Change the direction in which the router searches for the domain name or therealm name.
To provide these features, the router allows you to specify delimiters for the domainname and realm name. You can use up to eight one-character delimiters each fordomain and realm names. The router also lets you specify how it parses usernamesto determine which part of a username to use as the domain name.
Using the Realm Name as the Domain Name
Typically, a realm appears before the user field and is separated with the / character;for example, usEast/[email protected]. To use the realm name usEast rather thanabc.com as the domain name, set the realm name delimiter to /. For example:
host1(config)#aaa delimiter realmName /
This command causes the router to use the string to the left of the / as the domain
name. If the realm name delimiter is null (the default), the router will not search forthe realm name.
Using Delimiters Other Than @
You can set up the router to recognize delimiters other than @ to designate thedomain name. Suppose there are two users: [email protected] and pete!xyz.com, andyou want to use both of their domain names. In this case you would set the domainname delimiter to @ and !. For example:
host1(config)#aaa delimiter domainName @!
7/30/2019 Broadband Access Configuration Guide
27/341
Setting Up Domain Name and Realm Name Usage ! 11
Chapter 1: Configuring Remote Access
Using Either the Domain or the Realm as the Domain Name
If the username contains both a realm name and a domain name delimiter, you canuse either the domain name or the realm name as the domain name. As previously
mentioned, the router treats usernames with multiple delimiters as though therealm name is to the left of the realm delimiter and the domain name is to the rightof the domain delimiter.
If you set the parse order to:
! domain-firstThe router searches for a domain name first. For example, forusername usEast/[email protected], the domain name is abc.com.
! realm-firstThe router searches for a realm name first and uses the realmname as the users domain name. For username usEast/[email protected], thedomain is usEast.
For example, if you set the delimiter for the realm name to / and set the delimiterfor the domain name to @, the router parses the realm first by default. Theusername usEast/[email protected] results in a domain name of usEast. To cause theparsing to return abc.com as the domain, enter the aaa parse-order domain-firstcommand.
Specifying the Domain Name or Realm Name Parse Direction
You can specify the directioneither left to right or right to leftin which the routerperforms the parsing operation when identifying the realm name or domain name.This feature is particularly useful if the username contains nested realm or domainnames. For example, for a username of [email protected]@xyz.com, you canidentify the domain as either [email protected] or as xyz.com, depending on theparse direction that you specify.
You use either the left-to-rightor right-to-leftkeywords with one of the followingkeywords to specify the type of search and parsing that the router performs:
! domainNameThe router searches for the next domain delimiter value in thedirection specified. When it reaches a delimiter, the router uses anything to theright of the delimiter as the domain name. Domain parsing is from right to leftby default.
! realmNameThe router searches for the next realm delimiter value in thedirection specified. When it reaches a delimiter, the router uses anything to theleft of the delimiter as the realm name. Realm parsing is from left to right bydefault.
! Example
host1(config)#aaa parse-direction domainName left-to-right
7/30/2019 Broadband Access Configuration Guide
28/341
JUNOSe 6.1.x Broadband Access Configuration Guide
12 ! Setting Up Domain Name and Realm Name Usage
Stripping the Domain Name
The router provides feature that strips the domain name from the username beforeit sends the name to the RADIUS server in an Access-Request message. You can
enable or disable this feature using the strip-domain command.
By default, the domain name is the text after the last @ character. However, if youchanged the domain name parsing using the aaa delimiter, aaa parse-order, or aaaparse direction commands, the router strips the domain name and delimiter thatresult from the parsing.
aaa delimiter
! Use to configure delimiters for the domain and realm names. Specify one of thefollowing keywords:
! domainNameConfigures domain name delimiters. The default domainname delimiter is @.
! realmNameConfigures realm name delimiters. The default realm namedelimiter is NULL (no character). In this case, realm parsing is disabled(having no delimiter disables realm parsing).
! You can specify up to eight delimiters each for domain name and realm name.
! Example
host1(config)#aaa delimiter domainName @*/
! Use the no version to return to the default.
aaa parse-direction
! Use to specify the direction the router uses to parse the username for the
domain or realm name.! domainNameSpecifies that the domain name is parsed. The router
performs domain parsing from right to left by default.
! realmNameSpecifies that the realm name is parsed. The router performsrealm parsing from left to right by default.
! left-to-rightRouter searches from the left-most character. When therouter reaches a realm delimiter, it uses anything to the left of the delimiteras the domain. When the router reaches a domain delimiter, it usesanything to the right of the delimiter as the domain.
! right-to-leftRouter searches from the right-most character. When therouter reaches a realm delimiter, it uses anything to the left of the delimiter
as the domain. When the router reaches a domain delimiter, it usesanything to the right of the delimiter as the domain.
! Example
host1(config)#aaa parse-direction domainName left-to-right
! Use the no version to return to the default: right-to-left parsing for domainnames and left-to-right parsing for realm names.
http://../swcmdref/a-commands.pdfhttp://../swcmdref/a-commands.pdfhttp://../swcmdref/a-commands.pdfhttp://../swcmdref/a-commands.pdf7/30/2019 Broadband Access Configuration Guide
29/341
Setting Up Domain Name and Realm Name Usage ! 13
Chapter 1: Configuring Remote Access
aaa parse-order
! Use to specify which part of a username the router uses as the domain name. Ifa users name contains both a realm name and a domain name, you can
configure the router to use either name as the domain name.! domain-firstRouter searches for a domain name first. When the router
reaches a domain delimiter, it uses anything to the right of the delimiter asthe domain name. For example, if the username is usEast/[email protected],the domain name is abc.com. If the router does not find a domain name, itthen searches for a realm name if the realm delimiter is specified.
! realm-firstRouter searches for a realm name first. When the routerreaches a realm delimiter, it uses anything to the left of the delimiter as thedomain. For example, if the username is usEast/[email protected], the domainname is usEast. If no realm name is found, the router searches for adomain name.
! Example
host1(config)#aaa parse-order domain-first
! Use the no version to return to the default, realm first.
strip-domain
! Use to strip the domain name from the username before sending anaccess-request message to the RADIUS server.
! By default, the domain name is the text after the last @ character. However, ifyou change the domain name parsing by using the aaa delimiter, aaaparse-order, or parse-direction command, the router strips the domain nameand delimiter that result from the parsing.
!
To stop stripping the username, use the disable keyword.! Example
host1(config)#aaa domain-map xyz.comhost1(config-domain-map)#strip-domain enable
! Use the no version to return to the default, disabled.
Domain Name and Realm Name Examples
This section provides examples of possible domain or realm name results that youmight obtain, depending on the commands and options you specify. This exampleuses the following username:
username: usEast/[email protected]@xyz.com
The router is configured with the following commands:
host1(config)#aaa delimiter domainName @!host1(config)#aaa delimiter realmName /
http://../swcmdref/a-commands.pdfhttp://../swcmdref/s-commands.pdfhttp://../swcmdref/s-commands.pdfhttp://../swcmdref/a-commands.pdf7/30/2019 Broadband Access Configuration Guide
30/341
JUNOSe 6.1.x Broadband Access Configuration Guide
14 ! Specifying a Single Name for Users from a Domain
Table 4 shows the username and domain name that result from the parsing actionof the various commands.
Specifying a Single Name for Users from a Domain
Assigning a single username and a single password for all users associated with adomain provides better compatibility with some RADIUS servers. You can use thisfeature for domains that require the router to tunnel, but not terminate, PPPsessions.
When users request a PPP session, they specify usernames and passwords. Duringthe negotiations for the PPP session, the router authenticates legitimate users.
If you configure this feature, the router substitutes the specified username andpassword for all authenticated usernames and passwords associated with thatdomain.
There are two options for this feature. The router can:
! Substitute the domain name for each username and one new password foreach existing password.
For example, if the domain name is xyz.com and you specify the passwordxyz_domain, the router associates the username xyz.com and the passwordxyz_domain with all users from xyz.com.
! Substitute one new username for each username and one new password for
each existing password.
For example, if the domain name is xyz.com and you specify the usernamexyz_group and the password xyz_domain, the router associates theseidentifiers with all users from xyz.com.
Table 4: Username and Domain Name Examples
Command Resulting Username Resulting Domain Name
aaa parse-order realm-first [email protected]@xyz.com usEast
aaa parse-order domain-first [email protected] xyz.com
aaa parse-direction domainName right-to-left [email protected] xyz.com
aaa parse-direction domainName left-to-right userjohn [email protected]
aaa parse-direction realmName right-to-left [email protected]@xyz.com usEast
aaa parse-direction realmName left-to-right [email protected]@xyz.com usEast
NOTE: This feature works only for users authenticated by Password AuthenticationProtocol (PAP) and not by Challenge Handshake Authentication Protocol (CHAP).
7/30/2019 Broadband Access Configuration Guide
31/341
Configuring RADIUS Authentication and Accounting Servers ! 15
Chapter 1: Configuring Remote Access
To use a single username and a single password for all users from a domain:
1. Access Domain Map Configuration mode using the aaa domain-mapcommand.
2. Specify the new username and password using the override-user command.
aaa domain-map
! Use to map a domain name to a virtual router or to access Domain MapConfiguration mode.
! Example
host1(config)#aaa domain-map xyz.comhost1(config-domain-map)#
! Use the no version to delete the map entry.
override-user
! Use to specify a single username and single password for all users from adomain in place of the values received from the remote client.
! Use only for domains that require the router to tunnel and not terminate PPPsessions.
! If you specify a password only, the router substitutes the domain name for theusername and associates the new password with the user. If you specify apassword only and you have configured the domain name none with the aaadomain-map command, the router rejects any users without domain names.
! If you specify a name and password, the router associates both the new name
and password with the user.! Example
host1(config-domain-map)#override-user name boston password abc
! Use the no version to revert to the original username.
Configuring RADIUS Authentication and Accounting Servers
The number of RADIUS servers you can configure depends on available memory.
The order in which you configure servers determines the order in which the routercontacts those servers on behalf of clients.
Initially, a RADIUS client sends a request to a RADIUS authentication or accountingserver. The RADIUS server uses the configured IP address, the UDP port number,and the secret key to make the connection. The RADIUS client waits for a responsefor a configurable timeout period and then retransmits the request. The RADIUSclient retransmits the request for a user-configurable retry limit.
http://../swcmdref/a-commands.pdfhttp://../swcmdref/opqr-commands.pdfhttp://../swcmdref/a-commands.pdfhttp://../swcmdref/a-commands.pdfhttp://../swcmdref/a-commands.pdfhttp://../swcmdref/a-commands.pdfhttp://../swcmdref/opqr-commands.pdfhttp://../swcmdref/a-commands.pdf7/30/2019 Broadband Access Configuration Guide
32/341
JUNOSe 6.1.x Broadband Access Configuration Guide
16 ! Configuring RADIUS Authentication and Accounting Servers
! If there is no response from the primary RADIUS server, the RADIUS clientsubmits the request to the secondary RADIUS server using the timeout periodand retry limit configured for the secondary RADIUS server.
! If the connection attempt fails for the secondary RADIUS server, the routersubmits the request to the tertiary server and so on until it either is grantedaccess on behalf of the client or there are no more configured servers.
! If another authentication server is not configured, the router attempts the nextmethod in the method list; for accounting server requests, the information isdropped.
For example, suppose that you have configured the following authenticationservers: Auth1, Auth2, Auth3, Auth4, and Auth5. Your router attempts to send anauthentication request to Auth1. If Auth1 is unavailable, the router submits therequest to Auth2, then Auth3, and so on until an available server is found. If Auth5,the last configured authentication server, is not available, the router attempts the
next method in the methods list. If the only method configured is RADIUS, then therouter notifies the client that the request has been denied.
Server Access
The router offers two options by which servers are accessed:
! DirectThe first authentication or accounting server that you configure istreated as the primary authentication or accounting server, the next serverconfigured is the secondary, and so on.
! Round-robinThe first configured server is treated as a primary for the firstrequest, the second server configured as primary for the second request, and so
on. When the router reaches the end of the list of servers, it starts again at thetop of the list until it comes full cycle through the list.
Use the radius algorithm command to specify the server access method.
When you configure the first RADIUS accounting server, a RADIUS Acct-Onmessage is sent. When you delete the last accounting server, a RADIUS Acct-Offmessage is sent.
Server Request Processing Limit
Authentication servers and accounting servers use different UDP ports on therouter. This enables the same IP address to be used for both an authenticationserver and an accounting server. Note however, that the same IP address cannot beused for multiple authentication servers or for multiple accounting servers.
Each authentication and accounting server supports up to 4,000 concurrentRADIUS requests. For example, an authentication server at address 10.10.0.1, usingUDP port 1812, supports a maximum of 4,000 authentication requests. Theaccounting server at 10.10.0.1, using UDP port 1813, supports a maximum of4,000 accounting requests.
7/30/2019 Broadband Access Configuration Guide
33/341
Configuring RADIUS Authentication and Accounting Servers ! 17
Chapter 1: Configuring Remote Access
The E-series router listens to UDP source (or local) port 50000 for RADIUSauthentication responses and to UDP source port 50016 for RADIUS accountingresponses. Each UDP source port supports a maximum of 255 RADIUS requests.When the 255 limit is reached, the router opens the next source port. When the4,000 requests-per-server limit is reached, the router submits the request to thenext configured server.
Authentication and Accounting Methods
When you configure AAA authentication and accounting services for your B-RASenvironment, one important task is to specify the authentication and accountingmethod used. The JUNOSe software gives you the flexibility to configureauthentication or accounting methods based on the type of subscriber. This featureallows you to enable RADIUS authentication for some subscribers, while disablingauthentication completely for other subscribers. Similarly, you can enable RADIUSaccounting for some subscribers, but no accounting for others. For example, youmight use RADIUS authentication for ATM 1483 subscribers, while granting IP
subscriber management interfaces access without authentication (using the nonekeyword).
You can specify the authentication or accounting method you want to use, or youcan specify multiple methods in the order in which you want them used. Forexample, if you specify the radius keyword followed by the none keyword whenconfiguring authentication, AAA initially attempts to use RADIUS authentication. Ifno RADIUS servers are available, AAA uses no authentication. The JUNOSe softwarecurrently supports radius and none as accounting methods and radius, none, andlocal as authentication methods. See Configuring Local Authentication Servers onpage 34 for information about local authentication.
You can configure authentication and accounting methods based on the following
types of subscribers:
! ATM 1483
! Tunnels (for example, L2TP tunnels)
! PPP
! RADIUS relay server
! IP subscriber management interfaces
NOTE: IP subscriber management interfaces are st