cc/td/doc/product/wireless/moblwrls/cmx
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

CMX Configuration Guidelines
Reference Topology
VLAN Switching Blade Configuration Guidelines
RLB Configuration Guidelines
SSG Configuration Guidelines
SESM Configuration Guidelines
FWLB Configuration Guidelines
CSG Configuration Guidelines

CMX Configuration Guidelines


This chapter provides configuration guidelines for the Cisco Mobile Exchange (CMX).

For a complete description of the CMX commands in this chapter, refer to the Cisco IOS Mobile Wireless Command Reference. To locate documentation of other commands that appear in this chapter, use the command reference master index or search online.

This chapter includes the following sections:

Reference Topology

The reference topology for the CMX configuration is shown in Figure 5-1 and Figure 5-2.


Figure 5-1   CMX Reference Topology (1 of 2)


The CMX topology is organized into several VLANs. The VLANs shown in Figure 5-1 include:


Figure 5-2   CMX Reference Topology (2 of 2)


The VLANs shown in Figure 5-2 include:

VLAN Switching Blade Configuration Guidelines

This section describes how to configure the VLAN switching blade. The following tasks are presented:

Configuring VLAN Trunking Protocol

The VLAN trunking protocol (VTP) is a Layer 2 messaging protocol that maintains the VLAN configuration by managing the addition, deletion, and renaming of VLANs within a VTP domain. A VTP domain (also known as a VLAN management domain) is made up of one or more network devices that share the same VTP domain name and are interconnected with trunks. The VTP minimizes misconfigurations and configuration inconsistencies such as duplicate VLAN names, incorrect VLAN-type specifications, and security violations.

Before you create VLANs, you must decide whether to use VTP in your network. With VTP, you can make configuration changes centrally on one or more network devices and have those changes automatically communicated to all the other network devices in the network.

VTP Configuration Guidelines and Restrictions

Follow these guidelines and restrictions when implementing VTP in your network:


Caution   If you configure VTP in secure mode, the management domain does not function properly unless you assign a management domain password to each network device in the domain.

Configuring a VTP Password

To configure the VTP password parameters, use the following commands:

Command Purpose
Router# vtp password password_string

Sets a password, which can be from 8 to 64 characters long, for the VTP domain

Router# no vtp password

Clears the password

Configuring the VTP Mode

To configure the VTP mode, use the following commands:

Command Purpose
Router(config)# vtp mode {client | server | transparent}

Configures the VTP mode

Note Use no vtp mode to revert to the default VTP mode (server).

Router(config)# vtp domain domain_name

(Optional for server mode) Defines the VTP domain name, which can be up to 32 characters long. VTP server mode requires a domain name. If the switch has a trunk connection to a VTP domain, the switch learns the domain name from the VTP server in the domain.

Note You cannot clear the domain name.

Router(config)# end

Exits VLAN configuration mode

Router# show vtp status

Verifies the configuration


Note   When VTP is disabled, you can enter VLAN configuration commands in configuration mode instead of the VLAN database mode, and the VLAN configuration is stored in the startup configuration file.

This example shows how to configure the switch as a VTP server:

Router# configuration terminal
Router(config)# vtp mode transparent
Setting device to VTP TRANSPARENT mode.
Router(config)# vtp domain CMX
Setting VTP domain name to CMX
Router(config)# end
Router#

This example shows how to verify the configuration:

Router# show vtp status
VTP Version : 2
Configuration Revision : 247
Maximum VLANs supported locally : 1005
Number of existing VLANs : 24
VTP Operating Mode : Transparent
VTP Domain Name : CMX
VTP Pruning Mode : Enabled
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0x45 0x52 0xB6 0xFD 0x63 0xC8 0x49 0x80

Configuring VLANs

VLANs allow you to group LAN ports to limit unicast, multicast, and broadcast traffic flooding.


Note   Before you create VLANs, you must decide whether to use VLAN Trunking Protocol (VTP) to maintain global VLAN configuration information for your network. For complete information on VTP, see "Configuring VLAN Trunking Protocol" section.

Creating or Modifying an Ethernet VLAN

User-configured VLANs have unique IDs from 1 to 1001. Enter a VLAN command with an unused ID to create a VLAN. Enter a VLAN command for an existing VLAN to modify the VLAN. If you do not specify the VLAN type with the media keyword, the VLAN is an Ethernet VLAN.

To create a VLAN, use the following commands:

Command Purpose
Router# configure terminal

Enters global configuration mode to allow you to configure the system from the terminal.

Router(config)# vlan vlan_ID

Adds an Ethernet VLAN.

Note Use the no vlan command to delete a VLAN. You cannot delete the default VLANs for the different media types: Ethernet VLAN 1 and FDDI or Token Ring VLANs 1002 to 1005. When you delete a VLAN, any LAN ports configured as access ports assigned to that VLAN become inactive. They remain associated with the VLAN (and inactive) until you assign them to a new VLAN.

Router(config-vlan)# end

Updates the VLAN database and returns to privileged EXEC mode.

Router# show vlan [id | name] vlan

Verifies the VLAN configuration.

This example shows how to create an Ethernet VLAN in global configuration mode and verify the configuration:

Router# configure terminal
Router(config)# vlan 3
Router(config-vlan)# end
Router# show vlan id 3
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
3 VLAN0003 active
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
3 enet 100003 1500 - - - - - 0 0

Configuring a LAN Port for Layer 2 Switching

A VLAN created in a management domain is not used until you assign one or more LAN ports to it.


Note   Make sure you assign LAN ports to a VLAN of the appropriate type. For CMX Release 1, you can assign Fast Ethernet and Gigabit Ethernet ports.

To assign one or more LAN ports to a VLAN, use the following commands:

Command Purpose
Router(config)# interface type slot/port

Selects the LAN port to configure1

Router(config-if)# shutdown

(Optional) Shuts down the interface to prevent traffic flow until configuration is complete

Router(config-if)# switchport

Configures the LAN port for Layer 2 switching.

Note You must enter the switchport command once without any keywords to configure the LAN port as a Layer 2 port before you can enter additional switchport commands with keywords. Use the no switchport command to clear Layer 2 LAN port configuration.

Router(config-if)# no shutdown

Activates the interface (required only if you previously shut down the interface)

Router(config-if)# end

Exits configuration mode

Router# show running-config interface [type slot/port]

Displays the running configuration of the interface1

Router# show interfaces [type slot/port] switchport

Displays the switch port configuration of the interface1

Router# show interfaces [type slot/port] trunk

Displays the trunk configuration of the interface1

1 type = ethernet, fastethernet, gigabitethernet, or tengigabitethernet
After you enter the switchport command, the default mode is switchport mode dynamic desirable. If the neighboring port supports trunking and is configured to allow trunking, the link becomes a Layer 2 trunk when you enter the switchport command. By default, LAN trunk ports negotiate encapsulation.

The code below represents an example of configuring a LAN port for Layer 2 switching:

!
interface GigabitEthernet1/1
no ip address
shutdown
!
interface GigabitEthernet1/2
description trunk port to FwLB1 Gig1/2
no ip address
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 7,111
!
interface FastEthernet4/1
description trunk port to Lab Network
no ip address
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 2,14
!
interface FastEthernet4/2
description port-channel 1 trunk to RLB2 Fast4/2
no ip address
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 2,7,14,16,17,111,113,119,256,257
channel-group 1 mode on
!

Configuring the Default VLAN

To configure the default VLAN, use the following commands:

Command Purpose
Router(config-if)# switchport access vlan vlan_num

(Optional) Configures the default VLAN, which is used if the interface stops trunking

Router(config-if)# no switchport access vlan

Reverts to the default value (VLAN 1)

The code below represents an example of configuring the default VLAN:

!
interface FastEthernet4/13
description SSG4 0/0 Host Side
no ip address
duplex full
speed 100
switchport
switchport access vlan 113
!

Configuring Port Channels

This feature allows multiple Fast Ethernet point-to-point links to be bundled into one logical link. You can configure the port-channel interface as you would do to any Fast Ethernet interface. After you create a port-channel interface, you assign Fast Ethernet interfaces (up to four) to it.

To configure port channel interfaces, use the following command:

Command Purpose
Router(config-if)# interface port-channel channel_num

Specifies a Fast EtherChannel and enters interface configuration mode.

channel_num is the channel number assigned to this port-channel interface. Range is 1 to 4.

The code below represents an example of configuring a port channel:

!
interface Port-channel1
 description trunk from RLB1 to RLB2
no ip address
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 2,14,15,16,17,113,256
switchport mode trunk
!

For more information on VLAN switching blade configuration, visit: http://www.cisco.com/en/US/products/hw/routers/ps368/products_configuration_guide_book09186a00 8007c883.html

RLB Configuration Guidelines

The RADIUS Load Balancer (RLB) load-balances the traffic among the SSGs using the IOS RADIUS SLB feature. The IOS SLB feature is an IOS-based solution that provides IP server load balancing. Using the IOS SLB feature, you can define a virtual server that represents a group of real servers in a cluster of network servers known as a server farm. In this environment, the clients connect to the IP address of the virtual server. When a client initiates a connection to the virtual server, the IOS SLB function chooses a real server for the connection based on a configured load-balancing algorithm.

Observe the following guidelines when configuring the redundant RLBs in the CMX framework:

The following tasks are presented in this section:

Configuring a Server Farm and Real Server

To configure an IOS SLB server farm, you will specify a server farm name and assign real servers to the server farm. Use the following commands beginning in global configuration mode:

Command Purpose
Router(config)# ip slb serverfarm serverfarm-name

Adds a server farm definition to the IOS SLB configuration and initiates server farm configuration mode.

Router(config-slb-sfarm)# nat {client pool | server}

Configures NAT client or server address translation mode on the server farm.

Router(config-slb-sfarm)# failaction {purge | radius reassign}

Configures the IOS SLB behavior when a real server fails.

The radius reassign option enables IOS SLB to automatically reassign to a new real server the RADIUS sticky objects that are destined for a failed real server.

Router(config-slb-sfarm)# probe probe

Associates a probe with the real server.

Router(config-slb-sfarm)# real ip-addr [port]

Identifies a real server by IP address and optional port number as a member of a server farm and enters real server configuration mode.

Router(config-slb-real)# weight setting

Specifies the real server's workload capacity relative to other servers in the server farm.

Router(config-slb-real)# reassign threshold

Specifies the threshold of consecutive unacknowledged synchronizations that, if exceeded, result in an attempted connection to a different real server.

Router(config-slb-real)# faildetect numconns number-conns [numclients number-clients]

Specifies the number of consecutive connection failures and, optionally, the number of unique client connection failures that constitute failure of the real server.

Router(config-slb-real)# maxclients number-conns

(Optional) Specifies the maximum number of entries in the IOS SLB RADIUS framed-IP sticky database that can be assigned to an individual real server.

Router(config-slb-real)# inservice

Enables the real server for use by IOS SLB.

The code below represents an example of configuring a server farm and a real server on the RLB:

!
ip slb serverfarm GPRS-SSGs
nat server
failaction radius reassign
probe PROBE1
!
real 10.113.0.16
weight 1
reassign 2
faildetect numconns 8 numclients 1
  maxclients 10000
  inservice
!

Configuring a Virtual Server

To configure the virtual servers on the RLB, use the following commands beginning in global configuration mode:

Command Purpose
Router(config)# ip slb vserver virtual_server

Identifies a virtual server and initiates virtual server configuration mode.

Router(config-slb-vserver)# virtual ip-addr [netmask] {tcp | udp} [port | all | isakmp | wsp | wsp-wtp | wsp-wtls |wsp-wtp-wtls] [service service]

Specifies the virtual server IP address, type of connection, and optional TCP or UDP port number, ISAKMP or WSP setting, and service coupling.

Router(config-slb-vserver)# serverfarm primary-farm [backup backup-farm [sticky]]

Associates a real server farm with a virtual server and optionally configures a backup server farm and specifies that sticky connections are to be used in the backup server farm.

Router(config-slb-vserver)# sticky {duration [group group-id] [netmask netmask] | radius framed-ip [group group-id]}

Specifies that connections from the same client use the same real server as long as the interval between client connections does not exceed the specified duration.

Router(config-slb-vserver)# idle [radius {session | framed-ip}] duration

Specifies the minimum amount of time IOS SLB maintains connection context in the absence of packet activity.

Router(config-slb-vserver)# purge [radius {session | framed-ip}] acct on-off

Prevents RLB from deleting information about sticky connections.

Note The GGSN can send accouting on and off messages when powered on or shut down. On receiving these messages, the RLB would delete information about sticky connections. This command purges these GGSN messages to preserve RLB sticky connections.

Router(config-slb-vserver)# access interface route framed-ip

Enables framed-IP routing to inspect the ingress interface.

Router(config-slb-vserver)# replicate casa listen-ip remote-ip port [interval] [password [0 | 7] password timeout]

Configures a stateful backup of IOS SLB decision tables to a backup switch.

Router(config-slb-vserver)# inservice

Enables the virtual server for use by IOS SLB.

The code below represents an example of configuring a virtual server on the RLB:

!
ip slb vserver GPRS-RLB-ACCT
virtual 10.7.7.15 udp 1646 service radius
serverfarm GPRS-SSGs
sticky radius framed-ip group 1
idle radius framed-ip 3600
purge radius framed-ip acct on-off
access Vlan16 route framed-ip
replicate casa 10.113.0.22 10.113.0.23 33333
inservice standby rlb-csg
!

Configuring Probes

Configure probes to verify connectivity and to detect SSG failures. By default, no probes are configured in IOS SLB. To configure a probe, enter the following commands in order, beginning in global configuration mode:

Command Purpose
Router(config)# ip slb probe probe {dns | http | ping | tcp | wsp}

Configures the IOS SLB probe name and changes to probe configuration submode.

Router(config-slb-probe)# address [ip-addr]

(Optional) Configures an IP address to which to send the probe.

Router(config-slb-probe)# interval seconds

(Optional) Configures the probe transmit timers.

Router(config-slb-probe)# faildetect pings

Specifies the number of consecutive unacknowledged pings that constitute failure of the real server or firewall.

The code below represents an example of configuring a probe on the RLB:

!
ip slb probe PROBE1 ping
address 10.119.0.11
interval 15
faildetect 4
!

Enabling IOS SLB to Inspect Packets for RADIUS Framed-IP Sticky Routing

You can enable IOS SLB to inspect packets with source IP addresses that match a configured IP address and subnet mask. If the source IP address of an inspected packet matches an entry in the IOS SLB RADIUS framed-IP sticky database, IOS SLB uses that entry to route the packet; otherwise, IOS routes the packet.

To enable IOS SLB to inspect packets for routing using the RADIUS framed-IP sticky database, enter the following command in global configuration mode:

Command Purpose
Router(config)# ip slb route ip-addr netmask framed-ip

Enables IOS SLB to route packets using the RADIUS framed-IP sticky database.

The code below represents an example of configuring framed-IP sticky routing on the RLB:

!
ip slb route 192.168.0.0 255.0.0.0 framed-ip
!

SSG Configuration Guidelines

Prior to configuring the SSG, the SSG image must be installed on the router and the FastEthernet port IP addresses must be configured using the ip address ip-address network-mask command. To enable the SSG, use the ssg enable command in the global configuration mode.

The following tasks are presented in this section:

Configuring Security

To configure security for SSG, use the following commands beginning in global configuration mode:

Command Purpose
Router(config)# aaa new-model

Enables AAA

Router(config)# aaa authorization config-commands

Reestablishes the default created when the aaa authorization commands command was issued.

Router(config)# aaa authorization network default group radius

Specifies that RADIUS is the default authorization used for all network-related requests.

Router(config)# ssg service-password password

Sets the password used to authenticate the SSG with the local AAA server service profiles. This value must match the value configured for the AAA server service profiles.

Router(config)# ssg radius-helper key key

Sets the RADIUS shared secret key between SSG and SESM.

Router(config)# ssg radius-helper [auth-port UDP-port-number] [acct-port UDP-port-number]

Specifies the UDP default port numbers for a RADIUS authentication server (1645) and accounting server (1646).

Router(config)# radius-server host {hostname | ip-address} [auth-port UDP-port-number] [acct-port UDP-port-number]

Specifies the RADIUS server host.

Router(config)# radius-server key AAAPassword

Sets the RADIUS shared secret between the SSG and the local AAA server.

The code below represents an example of configuring security on the SSG:

!
aaa new-model
aaa authentication ppp default group radius
aaa authorization config-commands
aaa authorization network default group radius
aaa authorization network ssg_aaa_author_internal_list none
aaa authorization configuration default group radius
aaa accounting network default start-stop group radius
aaa accounting system default start-stop broadcast group radius
!
ssg service-password cisco
ssg radius-helper auth-port 1645 acct-port 1646
ssg radius-helper key gociscogo
!
radius-server host 172.20.51.11F auth-port 1645 acct-port 1646
radius-server retransmit 3
radius-server timeout 1
radius-server key gociscogo
!

Configuring the Default Network

The SESM, AAA server, CW4MW, BMA, and prepaid server reside in the default network. To assign the default network, use the following command in global configuration mode:

Command Purpose
Router(config)# ssg default-network ip-address netmask

Sets the IP address or subnet that users are able to access without authentication. A mask provided with the IP address specifies the range of IP addresses that users can access without authentication.

The code below represents an example of configuring the default network on the SSG:

!
ssg default-network 10.13.0.0 255.255.255.0
!

Configuring the Access Network

Mobile wireless subscribers belong to the access network. To specify a downlink interface to the access network, use the following commands beginning in global configuration mode:

Command Purpose
Router(config)# ssg bind direction downlink {ATM atm-interface | Async async-interface | BVI bvi-interface | Dialer dialer-interface | Ethernet ethernet-interface | FastEthernet fastethernet-interface | Group-Async group-async-interface | Lex lex-interface | Loopback loopback-interface | Multilink multilink-interface | Null null-interface | Port-channel port-channel-interface | Tunnel tunnel-interface | Virtual-Access virtual-access-interface | Virtual-Template virtual-template-interface | Virtual-TokenRing virtual-tokenring-interface}

Specifies the downlink interface to the subscribers in the access network.

The code below represents an example of configuring the access network on the SSG:

!
ssg bind direction downlink BVI2
!

Configuring the Services Network

Network services, such as the pass-through service, are part of the services network. Configure one network for each service. The services networks are connected via the services VLAN. All interfaces connected to the services must be configured on the uplink interfaces. To configure the uplink interface (services network), use the following commands beginning in global configuration mode:

Command Purpose
Router(config)# ssg bind direction uplink {ATM atm-interface | Async async-interface | BVI bvi-interface | Dialer dialer-interface | Ethernet ethernet-interface | FastEthernet fastethernet-interface | Group-Async group-async-interface | Lex lex-interface | Loopback loopback-interface | Multilink multilink-interface | Null null-interface | Port-channel port-channel-interface | Tunnel tunnel-interface | Virtual-Access virtual-access-interface | Virtual-Template virtual-template-interface | Virtual-TokenRing virtual-tokenring-interface}

Specifies the uplink interface to the services network.


Note   To verify the SSG interfaces configuration, use the show ssg direction command.

The code below represents an example of configuring the services network on the SSG:

!
ssg bind direction uplink BVI1
!

Enabling SSG User Profile Caching

Enabling SSG user profile caching allows the SSG to cache the user profiles of non-PPP users. User profiles of PPP and RADIUS proxy users are cached by the SSG by default. In situations in which the user profile is not available from other sources, SSG user profile caching makes the user profile available for RADIUS status queries and provides support for single sign-on functionality and failover from one SESM to another.


Note   SSG user profile caching is required only when the SESM is used in RADIUS mode.

To enable SSG user-profile caching, use the following command in global configuration mode:

Command Purpose
Router(config)# ssg profile-cache

Enables the caching of user profiles for non-PPP users.

Configuring the SSG to Support L2TP Service

The SSG can be configured to support L2TP service. With this configuration, when a subscriber selects a service through the SESM, the router serves as an L2TP access concentrator (LAC) and sends the PPP session through the service-specific L2TP tunnel. If the tunnel does not already exist, the LAC creates the proper tunnel to the LNS.

To configure the SSG to support L2TP, perform the following tasks:

Configuring the SSG as a LAC

To configure the SSG as a LAC, use the following command in global configuration mode:

Command Purpose
Router(config)# vpdn enable

Enables L2TP functionality.

Configuring RADIUS Profiles for SSG Support of L2TP

The following vendor-specific attributes (VSAs) are used by the SSG to support L2TP:

Cisco-AVpair VPDN Attributes

Table 5-1 lists the Cisco-AVpair attributes used in the service profile to configure VPDN.

Table 5-1   Cisco-AVpair VPDN Attributes

Attribute Description

VPDN IP Address

Specifies the IP address of the home gateway (LNS) to receive the L2TP connections.

VPDN Tunnel ID

Specifies the name of the tunnel that must match the tunnel ID specified in the LNS VPDN group.

L2TP Tunnel Password

Specifies the secret (password) used for L2TP tunnel authentication.

Account-Info VPDN Attributes

Table 5-2 lists the Account-Info attributes used in the user profile to subscribe the user to a VPDN.

Table 5-2   Account-Info VPDN Attributes

Attribute Description

Auto Service

(Reply attribute) Subscribes the user to a service and automatically logs the user in to the service when the user accesses the SESM. Multiple instances of this attribute can occur within a single user profile. Use one attribute for each service to which the user is subscribed.

Service Name

Specifies the name of the tunnel that must match the tunnel ID specified in the LNS VPDN group.

Service-Info VPDN Attributes

Table 5-3 lists the Service-Info attributes used in the service profile to define the L2TP service parameter.

Table 5-3   Service-Info VPDN Attributes

Attribute Description

Type of Service

Specifies proxy, tunnel, or pass-through service. L2TP always uses tunneled service.

MTU Size

Specifies the PP maximum transmission unit (MTU) size for the SSG as a LAC. By default, the PPP MTU size is 1500 bytes.

Service Route

Specifies the networks available to the user for this service.

Configuring SSG Auto-logon Using Proxy RADIUS

To configure the SSG auto-logon using proxy RADIUS, use the following commands beginning in global configuration mode:

Command Purpose
Router(config)# ip cef

Enables CEF.

Note SSG works with CEF switching technology to provide maximum Layer 3 switching performance. Because CEF is topology-driven rather than traffic-driven, its performance is unaffected by network size or dynamics.

Router(config)# ssg enable

Enables SSG functionality.

Router(config)# ssg radius-proxy

Enables SSG RADIUS proxy and enters SSG RADIUS proxy mode.

Router(config-radius-proxy)# server-port [auth auth-port][acct acct-port]

Configures the authentication and accounting ports.

  • auth—(Optional) Configures the authentication port.
  • auth-port—(Optional) Specifies the authentication port number. The default authentication port is 1645. The valid range is 0 to 65535.
  • acct—(Optional) Configures the accounting port.
  • acct-port—(Optional) Specifies the accounting port number. The default accounting port is 1646. The valid range is 0 to 65535.
Router(config-radius-proxy)# client-address ip-address key secret

Configures the client IP address and the shared key secret of a RADIUS client.

  • ip-address—IP address of a RADIUS client.
  • key—Shared secret with the RADIUS client.
  • secret—Description of the shared secret.
Router(config-radius-proxy)# forward accounting-start-stop

(Optional) Proxies accounting start/stop/update packets generated by any RADIUS clients to the AAA server.

The code below represents an example of configuring auto-logon using proxy RADIUS on the SSG:

!
ip cef
ssg enable
!
ssg radius-proxy
server-port auth 1645 acct 1646
client-address 5.5.5.33
key gociscogo
!
client-address 10.5.5.19
key gociscogo
!
forward accounting-start-stop
!

Enabling SSG TCP Redirect for Services

To configure the TCP redirect feature on the SSG, use the following commands beginning in global configuration mode:

Command Purpose
Router(config)# ip cef

Enables CEF.

Note SSG works with CEF switching technology to provide maximum Layer 3 switching performance. Because CEF is topology-driven rather than traffic-driven, its performance is unaffected by network size or dynamics.

Router(config)# ssg enable

Enables SSG functionality.

Router(config)# ssg tcp-redirect

Enables SSG TCP redirect.

Router(config-ssg-redirect)# server-group group-name

Defines the group of one or more servers that make up a named captive portal group and enters SSG-redirect-group configuration mode.

  • group-name—Name of the captive portal group.
Router(config-ssg-redirect-group)# server ip-address port

Adds a server to a captive portal group.

  • ip-address—IP address of the server to add to the captive portal group.
  • port—TCP port of the server to add to the captive portal group.
Router(config-ssg-redirect)# redirect unauthenticated-user to group-name

Selects a captive portal group for redirection of traffic from unauthenticated users.

  • group-name—Name of the captive portal group.
Router(config-ssg-redirect)# port-list port-listname

Defines the port list and enters SSG-redirect-port configuration mode.

  • port-listname—Defines the name of the port list.
Router(config-ssg-redirect-port)# port port-number

Adds a port to a port list.

  • port-number—Incoming destination port number. The valid range of port numbers is 1 to 65535.
Router(config-ssg-redirect-port)# exit

Exits SSG-redirect-port configuration mode.

Router(config-ssg-redirect)# redirect port port-number to group-name
or
Router(config-ssg-redirect)# redirect port-list port-listname to group-name

Configures a TCP port or named TCP port list for SSG TCP redirection.

  • port—Specifies a TCP port to mark for SSG TCP redirection.
  • port-list—Specifies the named TCP port list to mark for SSG TCP redirection.
  • port-number—Specifies the incoming destination port number of the TCP port to mark for SSG TCP redirection.
  • group-name—Defines the name of the captive portal group to redirect packets that are marked for a destination port or named TCP port list.
  • port-listname—Specifies the name of the named TCP port list.
Router(config-ssg-redirect)# redirect captivate initial default group group-name duration seconds

Selects the default captive portal group for initial captivation of users upon initialization.

  • group-name—Name of the captive portal group.
  • seconds—The duration in seconds of the initial captivation. The valid range is 1 to 65,536 seconds.
Router(config-ssg-redirect)# redirect captivate advertising default group group-name duration seconds frequency frequency

Selects the default captive portal group for captivation of advertisements for users.

  • group-name—Name of the captive portal group.
  • seconds—The duration in seconds of the advertising captivation. The valid range is 1 to 65,536 seconds.
  • frequency—The frequency in seconds at which TCP packets are redirected to the captive portal group. The valid range is 1 to 65536 seconds.
Router(config-ssg-redirect)# network-list network-listname

Defines the network list and enters SSG-redirect-network configuration mode.

  • network-listname—Defines the name of the network list.
Router(config-ssg-redirect-network)# network ip-address netmask

Adds the specified IP address to the named network list.

  • ip-address—The IP address to add to a named network list.
Router(config-ssg-redirect-network)# exit

Exits SSG-redirect-network configuration mode.

Router(config-ssg-redirect)# redirect unauthorized-service [destination network-list network-listname] to group-name

Creates a list of destination IP networks that can be redirected by the named captive portal group.

  • (Optional) destination network-list—Checks incoming packets from authenticated hosts to networks that they are not authorized to access to determine if they need redirection.
  • (Optional) network-listname—Name of the list of destination IP networks.
  • group-name—Name of the captive portal group.

Note If you do not specify a destination IP network by configuring the optional destination network-list keywords, the captive portal group specified in the group-name attribute is used as the default group for unauthorized service redirection when the IP address of the unauthorized packet does not fall into any network list associated with the captive portal group.

Router(config-ssg-redirect)# redirect smtp group group-name [all | user]

Selects a captive portal group for redirection of SMTP traffic.

  • group-name—Name of the captive portal group.
  • (Optional) all—All SMTP packets are forwarded.
  • (Optional) user—SMTP packets from users that have SMTP forwarding permission are forwarded.

Note If you do not configure the optional all or user keywords, the default is all.

The code below represents an example of enabling TCP redirect on the SSG:

!
ssg tcp-redirect
server-group RedirectServer
server 10.13.0.13 8090
!
redirect unauthenticated-user to RedirectServer
!

Configuring the RADIUS Attributes for SSG TCP Redirect

Configure the RADIUS attributes in the user profiles on the AAA server. The user profile is downloaded from the AAA server as part of user authentication.

Table 5-4 lists vendor-specific attributes needed in the user profile to perform SSG TCP redirection.

Table 5-4   RADIUS Attributes for TCP Redirect

Feature Attribute ID VendorID SubAttrID SubAttrName SubAttrDataType Account-Info Feature Code

26

9

250

Account-Info

String

R

Additional features allowed include the following:

Configuring SSG Prepaid Billing

To configure SSG to provide the prepaid billing server with session ID and time-stamp information, use the following commands in global configuration mode:

Command Purpose
Router(config)# radius-server attribute 44 include-in-access-req

Sends RADIUS attribute 44 (accounting session ID) in access request packets before performing user authentication (including requests for preauthentication).

Router(config)#radius-server attribute 55 include-in-acct-req

Sends RADIUS attribute 55 (event timestamp) in accounting packets.

Configuring Local Service Profiles

You can configure local service profiles in addition to the service profiles on the remote RADIUS server.

To configure a local service profile, use the following commands beginning in global configuration mode:

Command Purpose
Router(config)# local-profile profilename

Configures a local RADIUS service profile. Enters profile configuration mode.

Router(config-prof)# attribute radius-attribute-id [vendor-id] [cisco-vsa-type] attribute-value

Configures an attribute in a local RADIUS service profile.

Note Only attributes that can appear in RADIUS Access-Accept packets can be configured using the attribute command.

Configuring an Open Garden

A Web portal presents subscribers with a menu of services that they can access using a Web browser. An open garden is a part of the Web portal that is free of charge to subscribers who have not been authenticated. Examples of free services in the open garden include checking the status of the user connection and obtaining the current balance for prepaid services.

To configure an open garden, use the following commands beginning in global configuration mode:

Command Purpose
Router(config)# local-profile profilename

Creates a local service profile and enters profile configuration mode.

Router(config-prof)# attribute 26 9 251 "Rip-address;subnet-mask"

Note Repeat this step as necessary.

(Service Route attribute) Specifies the network available to the service. You can add multiple networks to an open garden service.

Router(config-prof)# attribute 26 9 251 "Dip-address"

(DNS server address attribute) Specifies the DNS server for the service.

Note Enter this command twice to specify two DNS servers for DNS fault tolerance. SSG sends DNS requests to the first DNS server in its list. If the first server does not respond to the requests, SSG sends the requests to the second DNS server.

Router(config-prof)# attribute 26 9 251 "Odomain-name"

Note Repeat step as necessary.

(Domain name attribute) Specifies the domain name that gets DNS resolution from the DNS server specified in Step 3. You can add multiple domain names to an open garden service.

Router(config-prof)# exit

Returns to global configuration mode.

Router(config)# ssg open-garden profile-name

Designates the service as an open garden service.

Router(config)# ssg bind service service {ip-address | ATM atm-interface | Async async-interface | BVI bvi-interface | Dialer dialer-interface | Ethernet ethernet-interface | FastEthernet fastethernet-interface | Group-Async group-async-interface | Lex lex-interface | Loopback loopback-interface | Multilink multilink-interface | Null null-interface | Port-channel port-channel-interface | Tunnel tunnel-interface | Virtual-Access virtual-access-interface | Virtual-Template virtual-template-interface | Virtual-TokenRing virtual-tokenring-interface}

Specifies the interface for a service.

Note This step is required only if the open garden is routed through a next-hop gateway. Routes to the open garden network must be added to the routing table.

The code below represents an example of configuring an open garden network on the SSG:

!
ssg bind service opengarden1 10.111.0.15
ssg bind service ssg-gprs-passthru-service1 10.111.0.15
ssg bind service ssg-cisco-passthrough-service1 10.111.0.15
ssg bind service ssg-gprs-walled-service1 10.111.0.15
ssg open-garden opengarden1
!
local-profile opengarden1
attribute 26 9 251 "R10.115.0.0;255.0.0.0"
!

SESM Configuration Guidelines

Prior to installing and configuring SESM, Solaris must be installed and configured with an IP address. To install and configure SESM, the following steps must be completed:


Step 1   Install the SESM.

Step 2   Configure the SESM with the SSG addresses (see note).


Note    A typical SESM deployment consists of multiple SSGs. An SESM web application must know which SSG is handling each subscriber request. Each request arriving at an SESM web application contains a source IP address (also known as a client IP address). The SESM uses this client IP address to determine which SSG should handle each request. You must configure the associations between a subscriber request and its SSG.

Step 3   Configure captive portal, single sign-on, and port mapping.




Note   For detailed information on configuring the SESM, visit http://www.cisco.com/univercd/cc/td/doc/solution/sesm/sesm_313/index.htm

FWLB Configuration Guidelines

The Firewall Load Balancer (FWLB) implements load balancing among the Service Selection Gateways (SSGs) similar to the load balancing in the RADIUS Load Balancer (RLB). See "RLB Configuration Guidelines" section. The FWLB uses the IOS server load balancing (SLB) feature to balance traffic flows to the SSGs. The SLB feature is used in the FWLB to ensure that traffic flows to the same SSG in the downlink direction that was used in the uplink direction.

To configure the FWLB for the CMX, use the following commands:

Command Purpose
Router(config)# ip slb probe name ping

Places the user in ping probe configuration submode; the name string identifies the probe instance; maximum 15 characters long

Router(config-slb-probe)# address ip-address

In ping probe submode, ip-address is the destination intended to respond to the ping

Note If this probe is associated with a server farm, and the address is not specified, the address is inherited from the server farm real servers. If this probe is associated with a firewall farm, the address must be specified.

Router(config-slb-probe)# interval seconds

(Optional) Configures the probe transmit timers

Router(config)# ip slb firewallfarm name

Places the user in firewall configuration submode

Router(config-slb-sfarm)# probe name

(Optional) Associates a probe with the real server

Router(config-slb-sfarm)# real ip-address

Identifies a real server by IP address as a member of a server farm and enters real firewall configuration submode

Router(config-slb-real)# faildetect number

Configures the number of consecutive unanswered pings before failing the real server

Router(config-slb-real)# maxconns { udp | tcp number }

(Optional) Specifies the maximum number of active connections allowed on the real server at one time

Router(config-slb-real)# inservice

Enables the real server for use by IOS SLB

sticky duration

(Optional) Specifies that connections from the same client use the same real server as long as the interval between client connections does not exceed the specified duration

idle duration

(Optional) Specifies the minimum amount of time IOS SLB maintains connection context in the absence of packet activity

The code below represents an example of configuring the default VLAN:

!
ip slb probe PING-PROBE1 ping
address 10.111.0.16
interval 600
!
!
ip slb firewallfarm FIRE
inservice standby fwlb-ssg
!
real 10.111.0.16
probe PING-PROBE1
inservice
!
!
real 10.111.0.26
probe PING-PROBE4
inservice
protocol tcp
sticky 60 destination
protocol datagram
sticky 60 destination
replicate casa 10.111.0.17 10.111.0.18 22222

CSG Configuration Guidelines

The CMX framework uses the Content Services Gateway (CSG) in two locations to provide two distinct functions. In the uplink direction, it assumes a position before the RADIUS Load Balancer (RLB) and the Service Selection Gateways (SSGs). This CSG provides reference data as a backup to the IP billing in the SSG (in case the SSG fails). A second CSG is positioned after the SSGs and the Firewall Load Balancer (FWLB) in the uplink direction. This CSG is positioned to provide content-based billing. Each of these CSGs has a redundant standby. In the reference topology shown in Figure 5-1, CSG pair 1 and 2 provide the billing backup for the SSGs. The CSG pair 3 and 4 provide the content billing function (shown in Figure 5-2).

The configuration guidelines for the Content Services Gateway (CSG) include the following categories:

For complete configuration details, use the guidelines provided in the Content Services Gateway Installation and Configuration Guide. This guide is available at the following URL:

http://www.cisco.com/univercd/cc/td/doc/product/mwg/csg/icfg221/bsconfig.htm

Configuring User Groups

To configure the CSG to record and generate accounting records, you must specify the user group(s) for which you want to generate accounting records. You also specify the user database that the CSG queries for user IDs.

To configure user groups on the CSG, and to specify the user database and RADIUS endpoint, use the following commands:

Command Purpose
Router# ip csg user-group group-name

Creates a group of end users that you want to generate accounting records for.

Router(config-csg-group)# database ip address port number

Specifies the location of the user database, including its IP address and port number.

Router(config-csg-group)# radius key secret

Specifies and configures the CSG to be the RADIUS endpoint for accounting records and provides the key.

Router(config-csg-group)# radius acct-port port

Specifies the port number for the RADIUS accounting endpoint.

This example shows how to configure a CSG user group, database, and RADIUS endpoint:

ip csg user-group U1
 database 10.10.10.10 6666
 radius key secret
 radius acct-port 7777

Configuring and Activating Accounting Policies

To configure the CSG to record and generate accounting records, you need to define content-based client accounting as a service. This includes specifying the user group(s) you want to generate accounting records for, as well as the Billing Mediation Agent (BMA) to send accounting records to.

To configure the accounting policies on the CSG, use the following commands:

Command Purpose
Router# ip csg accounting name

Defines content-based client accounting as a policy.

Router(config-csg-acct)# user-group name

Associates a user group with a specific accounting service.

Router(config-csg-acct)# agent ip_address port number priority

Specifies the primary or backup billing mediation agent to send accounting records to (including IP address, port numbe, and priority).

Router(config-csg-acct)# inservice

Activates the accounting service on a CSG.

Router(config)# module ContentSwitcingModule number

Specifies the CSG location on the router/switch.

Router(config-module-csm)# csg accounting name

Activates the accounting policy on the CSG.

This example shows how to define the CSG accounting policy:

!
ip csg accounting GGSN-BMA
user-group MN-ID
agent 172.18.41.70 3333 1
agent 172.18.41.70 4444 2
inservice
!
module ContentSwitchingModule 3
csg accounting GGSN-BMA

Configuring Client-side VLAN

To configure client-side VLANs, use the following commands:


Caution   You cannot use VLAN 1 as a client-side or server-side VLAN for the CSG.

Command Purpose
Router(config-module-csm)# vlan vlanid client

Configures the client-side VLANs and enters the client VLAN mode1.

Router(config-slb-vlan-client)# ip ip-address netmask

Configures an IP address to the CSG. This address is used by probes and ARP requests on this particular VLAN2.

Router(config-slb-vlan-client)# route ip-address netmask gateway gw-ip-address

Configures a static route to reach the real clients if they are more than one Layer 3 hop away from the CSG.

1Enter the exit command to leave a mode or submode. Enter the end command to return to the menu's top level.

2The no form of this command restores the defaults.

This example shows how to configure the CSG for client-side VLANs:

!
vlan 17 client
ip address 10.17.17.29 255.255.255.0
route 192.168.0.0 255.0.0.0 gateway 10.17.17.15
!

Configuring Server-side VLAN

To configure server-side VLANs, use the following commands:

Command Purpose
Router(config-module-csm)# vlan vlanid server

Configures the server-side VLANs and enters the server VLAN mode1.

Router(config-slb-vlan-server)# ip ip-address netmask

Configures an IP address for the server VLAN2.

Router(config-slb-vlan-server)# route ip-address netmask gateway gw-ip-address

Configures a static route to reach the real servers if they are more than one Layer 3 hop away from the CSG.

1Enter the exit command to leave a mode or submode. Enter the end command to return to the menu's top level.

2The no form of this command restores the defaults.

This example shows how to configure the CSG for server-side VLANs:

!
vlan 16 server
ip address 10.16.16.29 255.255.255.0
route 0.0.0.0 0.0.0.0 gateway 10.16.16.15
!

Configuring Server Farms

A server farm or server pool is a collection of servers that contain the same content. You specify the server farm name when you configure the server farm and when you bind the server farm to a virtual server.

To use the CSG billing feature, you must specify a server farm and associate it with any policies that you create. The server farm associated with a policy receives all the requests that match that policy.

To configure server farms on the CSG, use the following commands:

Command Purpose
Router(config-module-csm)# serverfarm serverfarm-name

Creates and names a server farm and enters the server farm configuration mode1 2.

Router(config-slb-sfarm)# predictor forward

Configures the load-balancing prediction algorithm2.

Note Be sure to specify forward.

Router(config-slb-real)# inservice

Enables the server farm.

1Enter the exit command to leave a mode or submode. Enter the end command to return to the menu's top level.

2The no form of this command restores the defaults.

This example shows how to configure a server farm for the CSG. This serverfarm, named RLB, uses the predictor forward algorithm, and has no NAT or client servers.

!
serverfarm RLB
no nat server
no nat client
predictor forward
!

Note   Configure the CSG server farm without a real server. Configure no NAT server, no NAT client, and set the predictor forward.

Configuring Policies and Filters

Policies are access rules that traffic must match for a server farm. Policies allow the CSG to apply filters to certain types of traffic subject to the accounting service.


Note   You must associate a server farm with a policy. A policy that does not have an associated server farm cannot forward traffic. The server farm associated with a policy receives all the requests that match that policy.

When the CSG is able to match policies, it selects the policy that appears first in the policy list. Policies are located in the policy list in the sequence in which they were bound to the virtual server. You can reorder the policies in the list by removing policies and reentering them in the correct order.

To configure accounting records policies and filters, use the following commands:

Command Purpose
Router(config-module-csm)# policy policy-name

Creates the policy and enters the policy submode to configure the policy attributes1.

Router(config-slb-policy)# url-map name

Specifies a URL map for the policy.

Router(config-slb-policy)# serverfarm name

Specifies a server farm for the policy.

Router(config-slb-policy)# csg filter service name type <http | other> string ASCII string

Specifies which type of accounting records should be generated, as well as the string to include in the accounting records.

1Enter the exit command to leave a mode or submode. Enter the end command to return to the menu's top level.

The following example illustrates how to configure policies and filters on the CSG:

!
map WALLED-GARDEN url
match protocol http url *cisco*
match protocol http url *billing*
!
policy HTTP
url-map WALLED-GARDEN
serverfarm RLB
csg filter EVENT-BMA type http string CSG3-HTTP
!

Tip A policy will not work unless the csg filter name parameter matches the the ip csg accounting name parameter. See "Configuring and Activating Accounting Policies" section.

Configuring Billing Traffic (Virtual Servers)

Virtual servers (Vservers) represent groups of real servers and are associated with real server farms through policies. The CSG uses Vservers to specify destinations for billing records.

Configuring virtual servers requires that you set the attributes of the virtual server specifying the default server farm (default policy) and that you associate other server farms through a list of policies. The default server farm (default policy) is used if a request does not match any CSG filter policy or if there are no policies associated with the virtual server.

Before you can associate a server farm with the virtual server, you must configure the server farm. Policies are processed in the order in which they are entered in the virtual server configuration.


Note   Although all IP protocols have a protocol number, the CSG allows you to specify TCP or UDP by name instead of requiring you to enter their numbers.

To configure virtual servers, use the following commands:

Command Purpose
Router(config-module-csm)# vserver virtserver-name

Identifies the virtual server and enters the virtual server configuration mode1, 2.

Router(config-slb-vserver)# virtual ip-address [ip-mask] protocol port-number [service ftp]
 

Note Billing is not enabled for service ftp

Sets the IP address for the virtual server optional port number or name and the connection coupling and type2. The protocol value is tcp, udp, any (no port-number is required), or a number value (no port-number is required).

Router(config-slb-vserver)# serverfarm serverfarm-name
 

Note Supports predictor forward only.

Associates the default server farm with the virtual server2 3. Only one server farm is allowed. If the server farm is not specified, all the requests not matching any other policies will be discarded.

Router(config-slb-vserver)# replicate csrp {sticky | connection}

Configures CSRP replication for connection redundancy on the CSGs.

Router(config-slb-vserver)# persistent rebalance

Enables HTTP 1.1 persistence for connections in the virtual server. When a client connection fails during a transaction, the connection is rebalanced (using the load-balancing policy) to a new server in the server farm.

Router(config-slb-vserver)# slb-policy policy name

(Optional) Associates a filter policy with a virtual server2.

Router(config-slb-vserver)# inservice

Enables the virtual server for use by the CSM2.

1Enter the exit command to leave a mode or submode. Enter the end command to return to the menu's top level.

2The no form of this command restores the defaults.

3These parameters refer to the default policy.

This example shows how to configure virtual servers on the CSG:

!
vserver LNSINT
virtual 10.103.0.0 255.0.0.0 any
serverfarm RLB
replicate csrp connection
persistent rebalance
slb-policy IP
inservice
!

Configuring Fault Tolerant Group

This section describes a fault-tolerant configuration. In this configuration, two separate Catalyst 7600 devices each contain a CSG.

The client-side and server-side VLANs provide the fault-tolerant (redundant) connection paths between the CSG and routers on the client side and the servers on the server side. In a redundant configuration, two CSGs perform active and standby roles. Each CSG contains the same IP address, virtual server, and server farm. From the client-side and server-side networks, each CSG is configured identically. The network sees the fault-tolerant configuration as a single CSG.


Note   When you configure multiple fault-tolerant CSG pairs, do not configure multiple CSG pairs to use the same FT VLAN. Use a different FT VLAN for each fault-tolerant CSG pair.

To configure a CSG for fault tolerance, use the following commands:

Command Purpose
Router(config-module-csm)# ft group ft-group-number vlan vlanid

Assigns a VLAN to a fault tolerant group.

Router(config-module-csm)# priority level

Assigns a priority level to the CSG in a fault-tolerant pair of CSGs. The CSG with the highest priority level is the primary CSG.

Router(config-module-csm)# heartbeat-time time

Specifies number of seconds between heartbeat transmissions.

Router(config-module-csm)# failover value

Specifies number of seconds (default of 3) the CSG waits before assuming the mate CSG is not operational.

Router(config-module-csm)# show module csm csm-number ft

Displays statistics and counters for the CSG fault-tolerant pair.

This example shows how to configure fault tolerance on the CSG:

!
ft group 1 vlan 256
priority 20
!
ft group 2 vlan 257
priority 20
!

Refer to the Content Services Gateway Installation and Configuration Guide for a detailed description of fault tolerant configurations. This guide is available at the following URL:

http://www.cisco.com/univercd/cc/td/doc/product/mwg/csg/icfg221/bsconfig.htm


hometocprevnextglossaryfeedbacksearchhelp
Posted: Tue Dec 31 04:10:22 PST 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.