This guide describes the concept of a Remote Authentication Dial-In User Service (RADIUS) Login Event Generator (LEG) based on a RADIUS Sniffer, and explains how to install and configure it on the SCMS Subscriber Manager (SM) platform.
This guide assumes a basic familiarity with telecommunications equipment and installation procedures, Cisco SCMS subscriber management, subscriber integration concepts, and the RADIUS protocol.
For complete information regarding Cisco's subscriber integration concept, see the Cisco SCMS Subscriber Manager User Guide.
Cisco Service Center Release |
Part Number |
Publication Date |
---|---|---|
Release 3.0.5 |
OL-8234-03 |
November, 2006 |
Description of Changes
Added new section describing subscriber IP association. See Subscriber IP Association.
Added new section describing configuring the subscriber IP address. See Configuring the Subscriber IP Address.
Small changes to text throughout the guide.
Cisco Service Center Release |
Part Number |
Publication Date |
---|---|---|
Release 3.0.3 |
OL-8234-02 |
May, 2006 |
Description of Changes
Added new section describing the Accounting-Interim-Update packet. See Accounting-Interim-Update packet.
Small changes to text throughout the guide.
Release 3.0 |
OL-8234-01 |
December, 2005 |
This document is intended for system administrators and system integrators who are familiar with the SCE-Sniffer RADIUS LEG concepts and with the Cisco SCMS Subscriber Management and Subscriber Integration concepts.
This guide covers the following topics:
Chapter |
Title |
Description |
---|---|---|
Chapter 1 |
Describes the SCE-Sniffer RADIUS LEG software module, and terms and concepts | |
Chapter 2 |
Provides a description of SCE-Sniffer RADIUS LEG transactions for login and logout operations | |
Chapter 3 |
Describes the installation process for installing the SM SCE-Sniffer RADIUS LEG | |
Chapter 4 |
Provides the configuration instructions to configure the SCE-Sniffer RADIUS LEG | |
Chapter 5 |
Describes the Command-Line Utilities to retrieve information and statistics about the LEG |
This SM SCE-Sniffer RADIUS LEG Reference Guide should be used in conjunction with the following Cisco documentation:
Cisco SCMS Subscriber Manager User Guide
Cisco Service Control Application for Broadband User Guide
This document uses the following conventions:
Convention |
Description |
---|---|
boldface font |
Commands and keywords are in boldface. |
italic font |
Arguments for which you supply values are in italics. |
[ ] |
Elements in square brackets are optional. |
{x | y | z} |
Alternative keywords are grouped in braces and separated by vertical bars. |
[x | y | z] |
Optional alternative keywords are grouped in brackets and separated by vertical bars. |
string |
A nonquoted set of characters. Do not use quotation marks around the string, or the string will include the quotation marks. |
|
Terminal sessions and information that the system displays are in |
|
Information you must enter is in |
|
Arguments for which you supply values are in |
< > |
Nonprinting characters, such as passwords, are in angle brackets. |
[ ] |
Default responses to system prompts are in square brackets. |
!, # |
An exclamation point (!) or a pound sign (#) at the beginning of a line of code indicates a comment line. |
Means reader take note. Notes contain helpful suggestions or references to materials not covered in this manual.
Means reader be careful. In this situation, you might do something that could result in loss of data.
The following sections provide sources for obtaining documentation from Cisco Systems.
You can access the most current Cisco documentation on the World Wide Web at the following sites:
Cisco documentation and additional literature are available in a CD-ROM package that ships with your product. The Documentation CD-ROM is updated monthly and may be more current than printed documentation. The CD-ROM package is available as a single unit or as an annual subscription.
Cisco documentation is available in the following ways:
Registered Cisco Direct Customers can order Cisco Product documentation from the networking Products MarketPlace:
Registered Cisco.com users can order the Documentation CD-ROM through the online Subscription Store:
Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco corporate headquarters (California, USA) at 408 526-7208 or, in North America, by calling 800 553-NETS(6387).
If you are reading Cisco product documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco.
You can e-mail your comments to bug-doc@cisco.com.
To submit your comments by mail, use the response card behind the front cover of your document, or write to the following address:
Attn Document Resource Connection Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-9883
We appreciate your comments.
Cisco provides Cisco.com as a starting point for all technical assistance. Customers and partners can obtain documentation, troubleshooting tips, and sample configurations from online tools. For Cisco.com registered users, additional troubleshooting tools are available from the TAC website.
Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at any time, from anywhere in the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco.
Cisco.com provides a broad range of features and services to help customers and partners streamline business processes and improve productivity. Through Cisco.com, you can find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online technical support, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available.
Customers and partners can self-register on Cisco.com to obtain additional personalized information and services. Registered users can order products, check on the status of an order, access technical support, and view benefits specific to their relationships with Cisco.
To access Cisco.com, go to http://www.cisco.com.
The Cisco Technical Assistance Center (TAC) website is available to all customers who need technical assistance with a Cisco product or technology that is under warranty or covered by a maintenance contract.
If you have a priority level 3 (P3) or priority level 4 (P4) problem, contact TAC by going to the TAC website http://www.cisco.com/tac.
P3 and P4 level problems are defined as follows:
P3—Your network is degraded. Network functionality is noticeably impaired, but most business operations continue.
P4—You need information or assistance on Cisco product capabilities, product installation, or basic product configuration.
In each of the above cases, use the Cisco TAC website to quickly find answers to your questions.
To register for Cisco.com, go to http://tools.cisco.com/RPF/register/register.do.
If you cannot resolve your technical issue by using the TAC online resources, Cisco.com registered users can open a case online by using the TAC Case Open tool at http://www.cisco.com/tac/caseopen.
If you have a priority level 1 (P1) or priority level 2 (P2) problem, contact TAC by telephone and immediately open a case. To obtain a directory of toll-free numbers for your country, go to http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml.
P1 and P2 level problems are defined as follows:
P1—Your production network is down, causing a critical impact to business operations if service is not restored quickly. No workaround is available.
P2—Your production network is severely degraded, affecting significant aspects of your business operations. No workaround is available.
The SCMS SM SCE-Sniffer RADIUS LEG is a software module that receives RDR (Raw Data Record) messages containing RADIUS information from SCE devices configured with a RADIUS Sniffer service. The SCE-Sniffer RADIUS LEG is an extension of the Subscriber Manager (SM) software and runs as part of the SM process.
The SCE device analyzes RADIUS traffic that traverses it (1), and reports the RADIUS transactions to the LEG using the RDR protocol (2). The LEG associates the RDR data to subscriber properties (name, subscriber IP, domain, and policies), and triggers a login or logout operation to the SM (3).
This implementation of the SCE-Sniffer RADIUS LEG supports RFC 2865 (RADIUS protocol) and RFC 2866 (RADIUS Accounting).
The LEG uses the following packet types:
Accounting-Start—Initiates login operations (with subscriber IP, domain, and policies)
Accounting-Interim-Update—Initiates login operations (with subscriber IP, domain, and policies)
Accounting-Stop—Initiates logout operations.
Access-Request—Initiates domain and policies associations
Access-Accept—Initiates login operations (with subscriber IP and policies)
The LEG uses the following attributes:
User Name (Attribute #1)—Default attribute for subscriber ID
NAS-IP-Address (Attribute #4)—Associates the NAS IP address as the subscriber's domain (optional)
Framed-IP-Address (Attribute #8)—Associates an IP address to the subscriber
Framed-IP-Netmask (Attribute #9)—Associates an IP netmask to the subscriber
Framed-Route (Attribute #22)—Associates an IP/IP-range to the subscriber
NAS-Identifier (Attribute #32)—Associates the NAS identifier as the subscriber's domain (optional)
Acct-Status-Type (Attribute #40)—Distinguishes between the different accounting transactions.
To associate policies to the subscribers, configure the LEG with the attribute that contains the policy information. The Vendor Specific attribute (Attribute #26) can be used to associate policies to the subscribers in addition to all other RADIUS attributes of type string or integer.
To determine the subscriber ID, configure the LEG with the attribute that contains the subscriber ID information. The Vendor Specific attribute (Attribute #26) can be used to determine the subscriber ID in addition to all other RADIUS attributes of type string. By default, the User-Name (Attribute #1) is configured to hold the subscriber ID.
The following list of terms and concepts are necessary to understand the SCE-Sniffer RADIUS LEG, configuration, and operation. Additional information regarding other various issues can be found in the Cisco SCMS Subscriber Manager User Guide.
A software component that performs subscriber login and logout operations on the SM, which is used to handle dynamic subscriber integration.
A client/server data protocol that enables the SCE devices to export network transactions reports to external collectors. This is a Cisco proprietary protocol.
A network device that serves as an access point for a remote user. It initiates RADIUS transactions to the RADIUS server to authenticate a remote user.
The RADIUS transactions are used for authenticating a remote user, and authorizing access to the network's resources. The LEG supports RADIUS authentication based on RFC 2865. The authentication RADIUS packets used by the LEG are ACCESS-REQUEST and ACCESS-ACCEPT.
The RADIUS accounting transactions are used to keep track of the services used by the user for administrative purposes. The LEG supports RADIUS accounting based on RFC 2866. The only RADIUS accounting packet the LEG uses is ACCOUNTING-REQUEST.
An abbreviated term used in this document to describe an ACCOUNTING-REQUEST packet with the ACCT-STATUS-TYPE attribute set to start. The NAS sends this packet to the RADIUS server when the remote user starts using a network service. The LEG uses it to initiate a login operation on the SM.
An abbreviated term used in this document to describe an ACCOUNTING-REQUEST packet with the ACCT-STATUS-TYPE attribute set to stop. The NAS sends this packet to the RADIUS server when the remote user stops using a network service. The LEG uses it to initiate a logout operation on the SM.
The software logic inside the SCE device that analyzes RADIUS traffic and sends the information to the SCE-Sniffer RADIUS LEG using the RDR protocol.
The Service Control solution requires a unique identifier for each subscriber. A subscriber ID represents a logical subscriber entity from the service provider perspective.
The SCE platform requires mappings between the network IDs (IP addresses) of the flows it encounters and the subscriber IDs. The SM database contains the network IDs that map to the subscriber IDs. The SCE network-ID-to-subscriber mappings are constantly updated from the SM database.
The SM provides the option of partitioning SCE platforms and subscribers into subscriber domains. A subscriber domain is a group of SCE platforms that share a group of subscribers. Subscriber domains can be configured using the SM configuration file and can be viewed using the SM Command-Line Utility (CLU).
For additional information about domains and domain aliases, see the Cisco SCMS Subscriber Manager User Guide.
A subscriber policy package usually defines the policy enforced by Cisco SCMS solutions on each subscriber. The SCE-Sniffer RADIUS LEG can handle the policy in any of the following ways:
Set the policy according to configurable attributes of the RADIUS transactions
Set the policy using a constant default value
Leave the package ID unset
For additional information, see the Cisco Service Control Application for Broadband User Guide.
The SCE devices analyze the RADIUS transactions and send the information to the SCE-Sniffer RADIUS LEG that resides on the SM. The LEG performs login or logout operations to the SM using the information sent from the SCE devices.
The LEG supports the following integrations with the RADIUS transactions:
Integrating with the RADIUS Accounting transactions
In this mode, the Accounting-Start and (optionally) Accounting-Interim-Update packets are used for login operations, and (optionally) the Accounting-Stop packets are used for logout operations. This integration mode is the simplest; therefore, if accounting transactions are used in your network it is advisable to use this integration mode.
Integrating with the RADIUS Authentication transactions
In this mode, the Access-Request and Access-Accept packets are used for login operations. This mode does not support logout operations. Use this integration mode if RADIUS accounting is not used in your network.
Integrating with the RADIUS Accounting and Authentication transactions
This mode combines the previous two modes. Login operations use Authentication transactions, and logout operations use Accounting transactions.
This section describes how subscriber properties are extracted from the RADIUS attributes.
By default, the attribute used for the subscriber ID association is the User-Name attribute (#1), but it can be configured to any other attribute including the Vendor-Specific attribute (#26).
The only requirement is that the configured attribute must be of type string.
This attribute must exist in the RADIUS traffic for successful login operations, because a subscriber cannot be introduced to the SM without its ID.
For logout operations, which are triggered by Accounting-Stop packets only, this attribute is not mandatory, because logouts can be performed using the mapping information.
Domain association is only relevant for login operations and is optional.
Domain association is based on the Network Access System (NAS) that initiated the RADIUS transaction. The RADIUS attributes that identify the NAS are NAS-Identifier (#32), and NAS-IP-Address (#4). If none of the attributes exist, the LEG tries to identify the NAS using the IP address of the NAS taken from the UDP packet.
Before a login operation occurs, the NAS properties, NAS-Identifier and NAS-IP-Address, are matched against the configured domains or domain aliases of the SM. The login operation uses the matched domain or domain alias as the subscriber domain.
The domain association is performed in stages, as follows:
If the NAS-Identifier attribute exists, and a domain name or alias is configured in the SM for the same NAS-Identifier, the domain name or alias is used as the subscriber domain.
If the previous step fails, the same test is performed on the NAS-IP-Address attribute.
If the NAS-IP-Address does not exist as well, the same test is performed on the IP address of the NAS.
If the NAS-Identifier and the NAS-IP-Address attributes are missing or does not match to an existing SM domain or alias, the default subscriber domain is used.
Policy association is only relevant for login operations and is optional.
The user can configure policy association. You can use any RADIUS attribute for policy association, including the Vendor-Specific attribute.
The term "policy association" refers to the act of setting a subscriber property according to information extracted from the RADIUS packets. An example of policy association is setting the packageId property of the Service Control Application for Broadband (SCA BB) solution to control the network service level for which the subscriber is entitled.
To associate policy from a RADIUS attribute, the configured attribute must be of type string or integer. The subscriber property values are always integers. However, if the association is based on a string RADIUS attribute, it is mandatory to configure a mapping table. If the association is based on an integer RADIUS attribute, a mapping table is not needed, but can be used. See Configuring the Policy Settings for more information on configuring a mapping table.
You can define a default value for the policy if the configured RADIUS attribute is missing from the packet. The default value is valid only if the policy has not been set before (for example by other LEGs, or the Subscriber Manager).
The Configuring the Policy Settings section describes how to configure the policies.
The Subscriber IP Address is normally based on the Framed-IP-Address attribute, but can also be based on the RADIUS attribute. In different topologies, the subscriber IP address specification might be sent as a RADIUS attribute other than the Framed-IP-Address attribute.
The following algorithm extracts the IP addresses in this LEG:
If the user configured an attribute from which to extract the IP, the LEG will look for that attribute in the RDR. If the attribute exists, the LEG will use the attribute as the subscriber IP address.
If the attribute does not exist or is not configured, the LEG will look for the Framed-Route attributes; several Framed-Route attributes may exist. If any Framed-Route attributes exist, the LEG will use these attributes as the subscriber IP addresses.
If there are no Framed-Route attributes, the LEG will look for a Framed-IP-Address attribute and a Framed-IP-Netmask attribute. If a Framed-IP-Address attribute exists, the LEG will use this attribute as the subscriber IP address. If both the Framed-IP-Address and the Framed-IP-Netmask attributes exist, the operation is performed with the IP range represented by the IP address and the IP netmask.
Otherwise, the LEG will perform a login without the IP address.
The configured attribute can be a regular RADIUS attribute or a VSA. It is possible to encode the attribute as an integer in which case it will be a single IP address. It can also be encoded as a string and will therefore be an IP-Address/IP-Range value: the value must be formatted as A.B.C.D/E or A.B.C.D
The supported format of the Framed-Route attribute is as described in RFC-2865. It must start with a string that starts with the route itself in the format A.B.C.D/E followed by a space. Other values follow the space, but the LEG ignores these other values.
This section describes the RADIUS packets supported by the SCE-Sniffer RADIUS LEG and their impact on the SM.
An Accounting-Start packet initiates a login operation with the following subscriber properties:
Subscriber ID—See Subscriber ID Association
Subscriber IP—See Subscriber IP Association
Domain—See Domain Association
Policy—See Policy Association
If the Accounting-Start packet does not hold the subscriber ID, the login operation is not performed and an error message is written to the user log. All other properties (subscriber IP, domain, and policy) are optional.
The Accounting-Start and Accounting-Interim-Update packets are the only packets that hold all the subscriber properties. Use these packets whenever possible.
An Accounting-Interim-Update packet initiates a login operation with exactly the same properties as the Accounting-Start packet.
If the Accounting-Interim-Update packet does not hold the subscriber ID, the login operation is not performed and an error message is written to the user log. All other properties (subscriber IP, domain, and policy) are optional.
Use this packet when the subscribers are connected to the network for a long time in a single session.
An Accounting-Stop packet initiates a logout operation with the following subscriber properties:
Subscriber ID—See Subscriber ID Association
Subscriber IP—See Subscriber IP Association
Unlike the Accounting-Start packet, the subscriber ID is not mandatory in the Accounting-Stop packet. If it does not exist, the logout is based only on the mappings information. If the Accounting-Stop packet has a subscriber ID but does not have the mappings, all mappings of the subscriber are logged out. If both properties are missing, the logout operation is not performed and an error message is written to the user log.
The Accounting-Stop packet is the only packet that initiates a logout operation. If you need to perform logouts, you must use this packet for integration.
An Access-Accept packet initiates a login operation with the following subscriber properties:
Subscriber ID—See Subscriber ID Association
Subscriber IP—See Subscriber IP Association
Policy—See Policy Association
The subscriber ID is mandatory, subscriber IP and policy are not. If the subscriber ID is missing, the login operation is not performed and an error message is written to the user log.
The Access-Accept packet does not hold any information needed for domain association. If you are using domains, consider using the accounting packets for domain integration.
An Access-Request packet initiates a login operation with the following subscriber properties:
Subscriber ID—See Subscriber ID Association
Domain—See Domain Association
Policy—See Policy Association
The subscriber ID is mandatory, domain and policy are not. If the subscriber ID is missing, the login operation is not performed and an error message is written to the user log.
The Access-Request packet is used in conjunction with the Access-Accept packet because the Access-Request packet does not hold the attributes needed for mapping association.
This chapter describes the procedures for installing and running the SCE-Sniffer RADIUS LEG. It also describes the procedure to uninstall the SCE-Sniffer RADIUS LEG.
The SCE-Sniffer RADIUS LEG is an external component (PQI file) of the SM software that should be installed separately using the SM command-line utilities. The SCE-Sniffer RADIUS LEG distribution is part of the SM LEG distribution.
The installation package of the LEG includes a set of configuration files and command-line utilities for the LEG.
Before installation, verify that the Service Control Application for Broadband (SCA BB) is installed on all SM and SCE devices. If the application has not been installed, install the application as described in the Service Control Application for Broadband User Guide.
After the installation of the PQI file, the SM will automatically restart.
To install the SCE-Sniffer RADIUS LEG:
Install the PQI file of the SCE-Sniffer RADIUS LEG
Run the p3inst command line utility from the SM CLU <sm-inst-dir>/sm/server/bin
(sm-inst-dir refers to the SM installation directory):
> p3inst --install -f rad_snif.pqi
Edit the configuration file of the SCE-Sniffer RADIUS LEG
The name of the configuration file is rad_snif.cfg
, and it is located under the configuration folder of the SM (<sm-inst-dir>/sm/server/root/config
). It is recommended to familiarize yourself with this file immediately after the first installation, and edit it according to your specific needs. See Configuring the SCE-Sniffer RADIUS LEG for more information.
Load the configuration file to the SM
Run the p3sm
command line utility from the SM CLU:
> p3sm --load-config
This command-line utility loads the new configuration to the SM and activates it.
Configure the SCE to send RDRs to the LEG
Run the RDR-formatter Command-Line Interface (CLI) in the SCE to add the LEG as a category 3 RDR destination:
SCE2000
> configure
SCE2000(config)
> RDR-formatter destination <
SM-IP
> port <
port
> category number 3 priority 100
SCE2000(config)
> exit
Use the same port number as defined by the RDR server in the SM. The default port number is 33001.
To support SM cluster topology, set the cluster VIP as the SM-IP in the above CLI command.
To uninstall the SCE-Sniffer RADIUS LEG:
Configure the SCE to stop sending RDRs to the LEG:
Run the RDR-formatter CLI command in the SCE to remove the LEG as category 3 RDR destination
SCE2000
> configure
SCE2000(config)
> no RDR-formatter destination <
SM-IP
> port <
port
>
SCE2000(config)
> exit
Uninstall the SCE-Sniffer RADIUS LEG:
Run the p3inst
command line utility from the SM CLU:
> p3inst --uninstall -f rad_snif.pqi
After the uninstall process has successfully completed, the SM will automatically restart.
The SCE-Sniffer RADIUS LEG must be upgraded when upgrading is performed between versions of the SM as part of the SM upgrade process. The upgrade for the SCE-Sniffer RADIUS LEG should be performed together with the upgrade process of the SM.
To upgrade the SCE-Sniffer RADIUS LEG:
Backup the configuration file of the SCE-Sniffer RADIUS LEG. The original configuration file is deleted by the uninstall process in the next step.
Uninstall the SCE-Sniffer RADIUS LEG by running the p3inst --uninstall
CLU of the SM.
Perform the upgrade of the SM as described in the Cisco SCMS Subscriber Manager User Guide.
Install the new version of the SCE-Sniffer RADIUS LEG by running the p3inst --install
CLU of the SM.
Restore the configuration files of the SCE-Sniffer RADIUS LEG.
Load the new configuration by using the p3sm --load-config
CLU of the SM.
The SCE-Sniffer RADIUS LEG is configured using the configuration file rad_snif.cfg
, which resides in the <sm-inst-dir>/sm/server/root/config
directory (sm-inst-dir refers to the SM installation directory).
The configuration file consists of sections headed by a bracketed section title; for example, [SCE-Sniffer RADIUS LEG]
. Each section consists of several parameters with the format of parameter=value
. The number sign (“#”) at the beginning of a line denotes that this is a remark line.
The general configuration of the LEG appears under the section name [SCE-Sniffer RADIUS LEG]. The following list describes the general configuration parameters:
start
Defines whether the SM should run the LEG at startup.
Possible values for this parameter are yes
and no
. The default value is no
.
To start using the LEG, change this setting to yes
.
packet_types
Defines the RADIUS packet types to analyze. You should set this parameter according to the integration mode you have chosen.
Possible values are any combination of: access-request
, access-accept
, accounting-start
, accounting-interim
, and accounting-stop
separated by commas.
The default value is accounting-start, accounting-interim, accounting-stop
.
log_failures
Defines whether the LEG should add messages about failures to the user log.
Possible values for this parameter are true
and false
.
The default value is true
.
log_all
Defines whether the LEG should add all messages, including successful logins and logouts, to the user log.
Possible values for this parameter are true
and false
. The default value is false
.
For this LEG to work correctly, use the configuration file to enable the RDR server in the SM.
The Subscriber ID configuration is optional.
The subscriber ID is identified by the User-Name attribute by default. You can configure the LEG to use any other RADIUS attribute to identify the subscriber ID, including using the Vendor-Specific attribute.
If you want to keep the default identification according to the User-Name attribute, you can skip this section.
The configured attribute must be of data type string. When using the Vendor-Specific attribute, the configured vendor specific subtype must be of data type string.
The section used for subscriber ID configuration is called [RADIUS.Subscriber ID]
. The following list describes the parameters:
radius_attribute
Defines the attribute number for the subscriber ID classification. The default value is 1 (User-Name attribute).
radius_attribute_vendor_id
This parameter is only relevant if radius_attribute
is configured to 26 (Vendor-Specific attribute).
The parameter defines the vendor ID number for the subscriber ID classification.
This parameter has no default value.
radius_sub_attribute
This parameter is only relevant if radius_attribute
is configured to 26 (Vendor-Specific attribute).
The parameter defines the sub attribute within the vendor specific attribute that is used for subscriber ID classification.
This parameter has no default value.
radius_attribute_type
Defines the attribute type. Possible values for this parameter are integer
or string
.
The default value is string
.
The Subscriber IP Address configuration is optional.
The subscriber IP Address is identified by the Framed-Route attributes, or the Framed-IP-Address attribute (Framed-IP-Netmask optional) by default. The LEG can be configured to use any other RADIUS attribute to identify the subscriber IP Address, including using the Vendor-Specific attribute as described in the Subscriber IP Association section.
To define which attribute to use for the subscriber IP address, configure the [RADIUS.Subscriber IP Address]
section. In order to use the default values, leave the configuration remarked.
To define the attribute to be used, configure the following parameters:
radius_attribute
Configure the radius_attribute
parameter with the RADIUS attribute number. Enter the value of 26
for Vendor Specific Attributes (VSA).
radius_attribute_vendor_id
This parameter is only relevant if radius_attribute
is configured to 26 (Vendor-Specific attribute).
The parameter defines the vendor ID number for the subscriber ID classification.
This parameter has no default value.
radius_sub_attribute
This parameter is only relevant if radius_attribute
is configured to 26 (Vendor-Specific attribute).
The parameter defines the sub attribute within the vendor specific attribute that is used for subscriber ID classification.
This parameter has no default value.
radius_attribute_type
Configure the radius_attribute_type
parameter according to the RADIUS attribute format.
Possible values for this parameter are integer
or string
. If the type is string
, you must supply a mapping table.
The default value is string
.
The Policy configuration is optional.
Policy configuration assigns policy information such as package ID, according to the RADIUS packets. Configure the SCE-Sniffer RADIUS LEG using the policy section(s) to assign the policy information.
This section is optional. If you do not need to set policy information according to RADIUS packets, you can skip this section. The SCE-Sniffer RADIUS LEG will not include any policy information when it logs in subscribers. If the subscriber already has some policies set, the LEG will not affect it.
For each policy you want to define, you need to specify a different section named [RADIUS.Policy.policyName]
. You can use any string you want for policyName if the policy name is unique inside the configuration file.
Each policy section has the following parameters:
radius_attribute
Defines the attribute number that holds the policy information.
This parameter has no default value.
radius_attribute_vendor_id
This parameter is only relevant if radius_attribute is configured to 26 (Vendor-Specific attribute).
The parameter defines the vendor ID number that holds the policy information.
This parameter has no default value.
radius_sub_attribute
This parameter is only relevant if radius_attribute is configured to 26 (Vendor-Specific attribute).
The parameter defines the sub attribute of the vendor specific attribute that holds the policy information.
This parameter has no default value.
radius_attribute_type
Defines the type of the attribute.
Possible values are string
or integer
.
This parameter has no default value.
default_value
Defines the default value to set in case the attribute is not found in the traffic.
The default value is set only if this policy has not been already set, for example by other LEG interfaces.
This parameter is optional. If it does not exist, a default value will not be set for this policy.
policy_name
Defines the name of the subscriber property. For instance, the packageId property defines the policies of the SCA BB solution.
This parameter has no default value.
mapping_table.
<key>=<value>
A set of values (key, value) used to map the data retrieved from the RADIUS attribute to the policy index configured by the application.
The following configuration section associates the packageId property of the SCA BB solution with a Vendor Specific attribute of the RADIUS packet:
[RADIUS.policy.packageId]
radius_attribute=26
radius_attribute_vendor_id=1000
radius_sub_attribute=2
radius_attribute_type=string
default_value=1
policy_name=packageId
mapping_table.gold=11
mapping_table.silver=12
mapping_table.bronze=13
This configuration indicates that if the configured RADIUS attribute of data type string holds the value gold, the package ID that will be introduced to the SM will have the value of 11. If the configured vendor specific attribute does not appear in the traffic, the package ID that will be introduced to the SM will have the value 1.
The SCE-Sniffer RADIUS LEG contains its own Command-Line Utility (CLU) commands, called p3radiussniff, for retrieving information and statistics about the LEG.
The p3radiussniff utility displays the LEG configuration and statistics. The command format is p3radiussniff
<operation>
.
The following table lists the p3radiussniff operations.
Table 5.1. p3radiussniff Operations
Operation |
Description |
---|---|
--show |
Displays all of SCE-Sniffer RADIUS LEG configuration and status |
--show-statistics |
Displays counters of RADIUS messages handled and number of login/logout operations performed |
--show-version |
Displays the SCE-Sniffer RADIUS LEG version number |
--help |
Displays a list of available operations and arguments with a short explanation of their meanings |
You can use the p3radiussniff CLU to view the SCE-Sniffer RADIUS LEG status and statistics.
The following example illustrates the p3radiussniff Command-Line Utility using the show
operation:
> p3radiussniff --show
SCE-Sniffer RADIUS LEG:
======================
Active: true
RADIUS packet types:
accounting_start
accounting_interim
accounting_stop
Subscriber ID Association
Attribute: 1
Policy Association:
attribute=26
vendorIdAttribute=1000
subAttribute=2
atributeType=string
defaultValue=1
policyName=packageId
Command terminated successfully
>
The following example displays the p3radiussniff Command-Line Utility using the show-version
operation:
> p3radiussniff --show-version
SCE-Sniffer RADIUS LEG 3.0.5 Build 30
Command terminated successfully
>
The following example displays the p3radiussniff Command-Line Utility using the show
statistics
operation:
> p3radiussniff --show-statistics
SCE-Sniffer RADIUS LEG statistics
=================================
Total Received RDRs: 12
Accounting RDRs: 12
Accounting-Start RDRs: 6
Accounting-Interim RDRs: 0
Accounting-Stop RDRs: 6
Access RDRs: 0
Access-Request RDRs: 0
Access-Accept RDRs: 0
Invalid RDRs: 0
Successful logins: 6
Successful logouts: 6
Failed logins: 0
Failed logout: 0
Command terminated successfully
>