cc/td/doc/product/dsl_prod/6400/feat_gd
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Layer 2 Tunnel Protocol
Restrictions
Basic LAC Configuration
Basic LNS Configuration
Tunnel Service Authorization Enhancements
Sessions per Tunnel Limiting
Tunnel Sharing
Tunnel Switching

Layer 2 Tunnel Protocol


This chapter provides tasks and restrictions for Layer 2 tunnel protocol (L2TP) features supported by the Cisco 6400 in Cisco IOS Release 12.3.

This chapter only describes tasks that are specific to the Cisco 6400 and supplements the following documentation:

Provides general L2TP overview, configuration, verification, monitoring, and troubleshooting information.

Provides general L2TP overview, configuration, verification, monitoring, and troubleshooting information.

This chapter includes the following sections:

See the "Supported Features" chapter for additional documentation on L2TP features.

Restrictions

L2TP Tunnel Service Authorization Feature Restriction

Static tunnel service authorization does not support switched virtual channels (SVCs).

L2TP Tunnel Switching Feature Restriction

When using a RADIUS service profile for tunnel service authorization, the NRP configured as an L2TP tunnel switch must forward all sessions through L2TP tunnels. The L2TP tunnel switch must not terminate any of the sessions.

L2TP Multihop Feature Restriction

L2TP Multihop by remote tunnel hostname is not supported in Cisco IOS Release 12.2(4)B3.

L2TP Multihop by domain is supported in Cisco IOS Release 12.2(4)B3 with the following required configuration:

Enter the lcp renegotiation always configuration command on the L2TP network server (LNS) vpdn-group.

Basic LAC Configuration

The L2TP access concentrator (LAC) acts as one side of an L2TP tunnel endpoint and is a peer to the L2TP network server (LNS). The LAC sits between an LNS and a remote system and forwards packets to and from each. Packets sent from the LAC to the LNS require tunneling with the L2TP protocol, and the connection from the LAC to the remote system is either local or a PPP link.

Configuring the LAC

Enter the following commands to enable VPDN on a LAC by using L2TP beginning in global configuration mode:

  Command  Purpose 
Step 1 
Router(config)# vpdn enable

Enables VPDN and informs the router to look for tunnel definitions from an LNS.

Step 2 
Router(config)# vpdn group group-number

Defines a local group number identifier for which other VPDN variables can be assigned. Valid group numbers range between 1 and 3000.

Step 3 
Router(config-vpdn)# request-dialin l2tp ip ip-address
{domain domain-name | dnis dialed-number}

Enables the router to request a dial-in tunnel to an IP address if the dial-in user belongs to a specific domain or the dial-in user dialed a specific DNIS.

Basic LNS Configuration

The L2TP network server (LNS) is the termination point for an L2TP tunnel and is a peer to the LAC. The LNS is the logical termination point of a PPP session that is being tunneled from the remote system by the LAC. Basic LNS configuration consists of the following tasks:

You can configure the virtual template interface with configuration parameters you want to apply to virtual access interfaces. A virtual template interface is a logical entity configured for a serial interface, is not tied to any physical interface, and is applied dynamically as needed. Virtual access interfaces are cloned from a virtual template interface, used on demand, and then freed when no longer needed.

Task 1: Configuring the LNS to Initiate and Receive Calls

To configure the LNS to initiate and receive calls, enter the following commands beginning in global configuration mode:

  Command  Purpose 
Step 1 
Router(config)# vpdn enable

Enables VPDN and informs the router to look for tunnel definitions from an LNS.

Step 2 
Router(config)# vpdn group group-number

Defines a local group number identifier for which other VPDN variables can be assigned. Valid group numbers range between 1 and 3000.

Step 3 
Router(config-vpdn)# accept dialin l2tp
virtual-template
virtual-template-number
remote remote-peer-name

Allows the LNS to accept an open tunnel request from the specified remote peer and identify the virtual template to use for cloning virtual access interfaces.

Task 2: Configuring the Virtual Template Interface

To create and configure a virtual template interface, complete the following steps beginning in global configuration mode:

  Command  Purpose 
Step 1 
Router(config)# interface virtual-template number

Creates a virtual template interface and enters interface configuration mode.

Step 2 
Router(config-if)# ip unnumbered ethernet 0

Enables IP without assigning a specific IP address on the LAN.

Step 3 
Router(config-if)# encapsulation ppp

Enables PPP encapsulation on the virtual template interface, which will be applied to virtual access interfaces.

Step 4 
Router(config-if)# ppp authentication {pap | chap}

Enables PAP or CHAP authentication on the virtual template interface, which will be applied to virtual access interfaces.

Optionally, you can configure other commands for the virtual template interface. For information about configuring virtual template interfaces, see the "Configuring Virtual Template Interfaces" chapter in the "Virtual Templates, Profiles, and Networks" part of the Cisco IOS Dial Technologies Configuration Guide.

Tunnel Service Authorization Enhancements


Note   Before configuring this feature, see the "Restrictions" section.

The tunnel service authorization enhancements enable the LAC to conduct static or dynamic tunnel service authorization. A static domain name can be configured on the ATM PVC port (directly or through a VC class) to override the domain name supplied by the client. If a static domain name is not configured, the LAC conducts dynamic tunnel service authorization, which includes two steps.

1. Domain Preauthorization—The LAC checks the client-supplied domain name against an authorized list configured on the RADIUS server for each PVC. If successful, the LAC proceeds to tunnel service authorization. If domain preauthorization fails, the LAC attempts PPP authentication/authorization for local termination.

2. Tunnel Service Authorization—The user profile on the RADIUS server provides a list of domains accessible to the user, enabling tunnel service authorization for the client-supplied domain. If successful, the LAC establishes an L2TP tunnel.

The tunnel service authorization enhancements provide the following benefits:

To configure the tunnel service authorization enhancements, complete the following tasks:

Task 1 (Option 1): Configuring a Static Domain Name—PVC Method

To configure the static domain name directly on the PVC, enter the following commands beginning in global configuration mode:

  Command  Purpose 
Step 1 
Router(config)# interface atm 0/0/0[.subinterface-number]
{multipoint | point-to-point | tag-switching}

Specifies the ATM interface and optional subinterface.

Step 2 
Router(config-subif)# no ip directed-broadcast

Disables forwarding of directed broadcasts.

Step 3 
Router(config-subif)# pvc [name] vpi/vci

Configures a PVC on the ATM interface or subinterface.

Step 4 
Router(config-if-atm-vc)# encapsulation aal5mux ppp Virtual-Template number

Sets encapsulation as PPP. Also specifies the virtual template interface to clone for the new virtual access interface.

Step 5 
Router(config-if-atm-vc))# vpn service domain-name

Configures the static domain name on the PVC.

Example: Configuring a Static Domain Name—PVC Method

The following example shows the static domain names "net1.com" and "net2.com" assigned to PVCs on an ATM interface. All PPP sessions originating from PVC 30/33 are sent to the "net1.com" L2TP tunnel; all PPP sessions originating from PVC 30/34 are sent to the "net2.com" tunnel.

!
interface ATM 0/0/0.33 multipoint
  pvc 30/33 
   encapsulation aal5ciscoppp Virtual-Template1
   vpn service net1.com
  !
  pvc 30/34 
   encapsulation aal5ciscoppp Virtual-Template1
   vpn service net2.com
  !

Task 1 (Option 2): Configuring a Static Domain Name—VC Class Method

To configure the static domain name on the VC class, enter the following commands beginning in global configuration mode:

  Command  Purpose 
Step 1 
Router(config)# vc-class atm vc-class-name

Creates and names a map class.

Step 2 
Router(config-vc-class)# encapsulation aal5mux ppp Virtual-Template number

Sets encapsulation as PPP. Also specifies the virtual template interface to clone for the new virtual access interface.

Step 3 
Router(config-vc-class)# vpn service domain-name

Configures the static domain name on the VC class.

Step 4 
Router(config-vc-class)# exit

Returns to global configuration mode.

Step 5 
Router(config)# interface atm 0/0/0[.subinterface-number]
{multipoint | point-to-point | tag-switching}

Specifies the ATM interface and optional subinterface.

Step 6 
Router(config-subif)# class-int vc-class-name

Applies the VC class to all VCs on the ATM interface or subinterface.

Example: Configuring a Static Domain Name—VC Class Method

In the following example, the static domain name "net.com" is assigned to a VC class. The VC class is then assigned to the VCs on an ATM subinterface.

!
vc-class ATM MyClass
  encapsulation aal5ciscoppp Virtual-Template1
  vpn service net.com
  !
interface ATM 0/0/0.99 multipoint
  class-int MyClass
  no ip directed-broadcast
  pvc 20/40
  pvc 30/33 
  !

Verifying the Static Domain Name

To verify that you successfully configured the static domain name, enter the show running-config EXEC command.

Task 2: Enabling Domain Preauthorization

To enable the LAC to perform domain authorization before tunneling, enter the following command in global configuration mode:

Command  Purpose 
Router(config)# vpdn authorize domain

Enables domain preauthorization.

Dynamic tunnel service authorization requires additional commands for proper communication with the RADIUS server. See the "Task 3: Configuring Communication with the RADIUS Server" section.

Example: Enabling Domain Preauthorization

The following example shows the configuration necessary for the LAC to participate in domain preauthorization:

!
aaa new-model
aaa authorization network default local group radius
!
vpdn authorize domain
!
radius-server host 10.9.9.9 auth-port 1645 acct-port 1646
radius-server attribute nas-port format d
radius-server key MyKey
radius-server vsa send authentication
!

Verifying Domain Preauthorization

To check that you successfully enabled domain preauthorization, enter the show running-config EXEC command.

Task 3: Configuring Communication with the RADIUS Server

To enable the LAC to communicate properly with the RADIUS server for tunnel service authorization, complete following steps beginning in global configuration mode:

  Command  Purpose 
Step 1 
Router(config)# radius-server host
{hostname | ip-address} [auth-port port-number]
[acct-port port-number]

Specifies the RADIUS server host.

Step 2 
Router(config)# radius-server attribute nas-port
format d

Selects the ATM VC extended NAS port format for RADIUS accounting features.

Step 3 
Router(config)# radius-server key string

Specifies the authentication and encryption key for all RADIUS communications between the router and the RADIUS daemon.

Step 4 
Router(config)# radius-server vsa send authentication

Configures the LAC to recognize and use vendor-specific attributes.

Example: Configuring Communication with the RADIUS Server

The following example shows the configuration necessary for the LAC to participate in tunnel service authorization:

!
aaa new-model
aaa authorization network default local group radius
!
radius-server host 10.9.9.9 auth-port 1645 acct-port 1646
radius-server attribute nas-port format d
radius-server key MyKey
radius-server vsa send authentication
!

Verifying the Communication with the RADIUS Server Configuration

To check that you successfully configured the LAC to communicate properly with the RADIUS server for tunnel service authorization, enter the show running-config EXEC command.

Task 4: Configuring the RADIUS User Profile for Domain Preauthorization

To enable domain preauthorization, enter the following configuration in the user profile on the RADIUS server:

RADIUS Entry  Purpose 
nas-port:ip-address:slot/subslot/port/vpi.vci

Configures the NAS port username for domain preauthorization. Includes the management IP address of the NSP.

Password = "cisco"

Sets the fixed password.

User-Service-Type = Outbound-User

Configures the service-type as outbound.

Cisco-AVpair = "vpdn:vpn-domain-list=domain1, domain2,..."

Specifies the domains accessible to the user.

Example: Configuring the RADIUS User Profile for Domain Preauthorization

The following example shows a domain preauthorization RADIUS user profile:

user = nas-port:10.9.9.9:0/0/0/30.33{
 profile_id = 826 
 profile_cycle = 1 
 radius=Cisco {
 check_items= {
 2=cisco
 } 
 reply_attributes= {
 9,1="vpdn:vpn-domain-list=net1.com,net2.com"
 6=5
 } 
 } 
 
 }

Verifying the RADIUS User Profile for Domain Preauthorization

To verify the RADIUS user profile, refer to the user documentation for your RADIUS server.

Task 5: Configuring the RADIUS Service Profile for Tunnel Service Authorization

To enable tunnel service authorization, use the following configuration in the service profile on the RADIUS server:

RADIUS Entry  Purpose 
domain Password "cisco"

Sets the fixed password for the client-supplied domain.

User-Service-Type = Outbound-User

Configures the service-type as outbound.

Cisco-AVpair = "vpdn:tunnel-id=name"

Specifies the name of the tunnel that must match the LNS's VPDN terminate-from hostname.

Cisco-AVpair = "vpdn:l2tp-tunnel-password=secret"

Specifies the secret password for L2TP tunnel authentication.

Cisco-AVpair = "vpdn:tunnel-type=l2tp"

Specifies the Layer 2 Tunnel Protocol.

Cisco-AVpair = "vpdn:ip-addresses=ip-address"

Specifies the IP address of LNS.

Example: Configuring the RADIUS Service Profile for Tunnel Service Authorization

The following example shows a tunnel service authorization RADIUS service profile:

user = net1.com{
profile_id = 45 
profile_cycle = 18 
member = me 
radius=Cisco {
check_items= {
2=cisco
reply_attributes= {
9,1="vpdn:tunnel-id=LAC-1"
9,1="vpdn:l2tp-tunnel_password=MySecret"
9,1="vpdn:tunnel-type=l2tp"
9,1="vpdn:ip-addresses=10.10.10.10"
6=5
}

Verifying the RADIUS Service Profile for Tunnel Service Authorization

To verify the RADIUS service profile, refer to the user documentation for your RADIUS server.

Sessions per Tunnel Limiting

This feature enables the initiate-to command to limit the number of sessions per L2TP tunnel. Choose one method to configure this feature:

Option 1: Configuring Sessions Per Tunnel Limiting on the LAC

To limit the number of sessions per tunnel without using a RADIUS server, complete the following steps on the NRP-LAC beginning in global configuration mode:

  Command  Purpose 
Step 1 
Router(config)# vpdn-group number

Selects the VPDN group.

Step 2 
Router(config-vpdn)# request-dialin

Enables the LAC to request L2TP tunnels to the LNS. Enters VPDN request-dialin group mode.

Step 3 
Router(config-vpdn-req-in)# protocol l2tp

Specifies the Layer 2 Tunnel Protocol.

Step 4 
Router(config-vpdn-req-in)# multihop hostname ingress-tunnel-name

or

Router(config-vpdn-req-in)# domain domain-name

or

Router(config-vpdn-req-in)# dnis dnis-number

Initiates a tunnel based on the LAC's host name or ingress tunnel ID.

Initiates a tunnel based on the client-supplied domain name.

Initiates a tunnel based on the user's DNIS number.

Step 5 
Router(config-vpdn-req-in)# exit

Returns to VPDN group mode.

Step 6 
Router(config-vpdn)# initiate-to ip ip-address
limit limit-number [priority priority-number]

Specifies the LNS IP address and the maximum number of sessions per tunnel. Optionally specifies the priority of the IP address (1 is highest).

Example: Configuring Sessions Per Tunnel Limiting on the LAC

In the following example, the LAC initiates up to three tunnels. Each tunnel is limited to 40 sessions.

!
vpdn-group 1
 request-dialin
  protocol l2tp
  domain net.com
 initiate-to ip 10.1.1.1 limit 40
 initiate-to ip 10.2.2.2 limit 40
 initiate-to ip 10.2.2.2 limit 40
!

Verifying Sessions per Tunnel Limiting on the LAC


Step 1   Enter the show running-config EXEC command to check that you successfully configured the maximum number of sessions per tunnel.

Step 2   Enter the show vpdn tunnel privileged EXEC command to verify that the number of displayed sessions does not exceed your configured limit.

Router# show vpdn tunnel

L2TP Tunnel Information (Total tunnels 50 sessions 2000)

LocID RemID Remote Name   State  Remote Address  Port Sessions
41234 7811  LNS1          est    10.1.1.1        1701 40 
20022 2323  LNS1          est    10.1.1.1        1701 40 
41234 7811  LNS2          est    10.1.2.2        1701 40 
59765 3477  LNS2          est    10.1.3.3        1701 40 
...



Option 2: Configuring Sessions per Tunnel Limiting in the RADIUS Service Profile

To use a RADIUS server to limit the number of sessions per tunnel, enter the following Cisco-AVpair attributes in the RADIUS service profile:

VPDN IP Addresses

This attribute specifies the IP addresses of the LNSs to receive the L2TP connections.

Cisco-AVpair = "vpdn:ip-addresses=address1[<delimiter>address2][<delimiter>address3]..."
Syntax Description

address

IP address of the LNS.

<delimiter>

, (comma)

Selects load sharing among IP addresses.

  (space)

Selects load sharing among IP addresses.

/ (slash)

Groups IP addresses on left side in higher priority than the right side.

In the following example, the LAC sends the first PPP session through a tunnel to 10.1.1.1, the second PPP session to 10.2.2.2, and the third to 10.3.3.3. The fourth PPP session is sent through the tunnel to 10.1.1.1, and so forth. If the LAC fails to establish a tunnel with any of the IP addresses in the first group, then the LAC attempts to connect to those in the second group (10.4.4.4 and 10.5.5.5).

Example (RADIUS Freeware Format)
Cisco-AVpair="vpdn:ip-addresses=10.1.1.1,10.2.2.2,10.3.3.3/10.4.4.4,10.5.5.5"
Example (CiscoSecure ACS for UNIX)
9,1="vpdn:ip-addresses=10.1.1.1,10.2.2.2,10.3.3.3/10.4.4.4,10.5.5.5"

VPDN IP Address Limits

This attribute specifies the maximum number of sessions in each tunnel to the IP addresses listed with the vpdn:ip-addresses attribute.

Cisco-AVpair = "vpdn:ip-address-limits=limit1 [limit2] [limit3]... "
Syntax Description

limit

Maximum number of sessions per tunnel to the corresponding IP address.

Example (RADIUS Freeware Format)
Cisco-AVpair="vpdn:ip-address-limits=10 20 30 40 50 "
Example (CiscoSecure ACS for UNIX)
9,1="vpdn:ip-address-limits=10 20 30 40 50 "

Note   You must enter a space between the final limit entry and the end quotation marks.

Example: Configuring Sessions per Tunnel Limiting in the RADIUS Service Profile

The following example shows a tunnel service authorization RADIUS service profile with the session limiting entry. IP addresses 10.1.1.1 and 10.2.2.2 are assigned priority 1; IP addresses 10.3.3.3 and 10.4.4.4 are assigned priority 2. Tunnels to 10.1.1.1 are limited to 100 sessions, tunnels to 10.2.2.2 are limited to 200 sessions, tunnels to 10.3.3.3 are limited to 300 sessions, and tunnels to 10.4.4.4 are limited to 400 sessions.

user = net.com{
profile_id = 45 
profile_cycle = 18 
member = me 
radius=Cisco {
check_items= {
2=cisco
reply_attributes= {
9,1="vpdn:tunnel-id=LAC-1"
9,1="vpdn:l2tp-tunnel_password=MySecret"
9,1="vpdn:tunnel-type=l2tp"
9,1="vpdn:ip-addresses=10.1.1.1 10.2.2.2/10.3.3.3 10.4.4.4"
9,1="vpdn:ip-address-limits=100 200 300 400 "
6=5
}

Verifying Sessions per Tunnel Limiting in the RADIUS Service Profile

To verify the RADIUS service profile, refer to the user documentation for your RADIUS server.

Tunnel Sharing

This feature enables sessions that are authorized with different domains to share the same tunnel. Tunnel sharing reduces the number of tunnels required from the LAC. When used with the L2TP Tunnel Switching feature, tunnel sharing also reduces the number of tunnels to an LNS. While improving tunnel management, tunnel sharing helps to reduce the number of tunnel establishment messages that are sent after interface dropouts, reducing dropout recovery time.

Tunnel Sharing configuration consists of the following tasks:

Task 1: Configuring Tunnel Sharing on the LAC

To implement the tunnel sharing feature, complete the following steps on the NRP-LAC beginning in global configuration mode:

  Command  Purpose 
Step 1 
Router(config)# vpdn-group number

Selects the VPDN group.

Step 2 
Router(config-vpdn)# request-dialin

Enables the LAC to request L2TP tunnels to the LNS. Enters VPDN request-dialin group mode.

Step 3 
Router(config-vpdn-req-in)# protocol l2tp

Specifies the Layer 2 Tunnel Protocol.

Step 4 
Router(config-vpdn-req-in)# multihop hostname ingress-tunnel-name

or


Router(config-vpdn-req-in)# domain domain-name

or


Router(config-vpdn-req-in)# dnis dnis-number

(Repeat this step to enter all keys chosen for tunnel sharing)

Initiates a tunnel based on the LAC's host name or ingress tunnel ID.



Initiates a tunnel based on the client-supplied domain name.



Initiates a tunnel based on the user's DNIS number.

Step 5 
Router(config-vpdn-req-in)# exit

Returns to the VPDN group mode.

Step 6 
Router(config-vpdn)# initiate-to ip ip-address [priority priority-number]

Specifies the LNS IP address. Optionally specifies the priority of the IP address (1 is highest).

Step 7 
Router(config-vpdn)# tunnel share

Enables tunnel sharing among the keys entered in Step 4.

Example: Configuring Tunnel Sharing on the LAC

In the following example, all sessions that are locally authorized through VPDN group 1 are sent through the same tunnel to 10.1.1.1.

!
vpdn-group 1
 request-dialin
  protocol l2tp
  domain net1.com
  domain net2.com
 initiate-to ip 10.1.1.1
 tunnel share
!

Verifying Tunnel Sharing Configuration on the LAC

Enter the show running-config EXEC command to check that you successfully enabled the tunnel sharing feature.

Task 2: Configuring Tunnel Sharing in the RADIUS Service Profile

To implement the tunnel sharing feature, enter the following Cisco-AVpair attributes in the RADIUS service profile:

VPDN Group

This attribute specifies the group to which the service belongs. All services with matching group names are considered members of the same VPDN group.

Cisco-AVpair = "vpdn:vpdn-group=group-name"
Example (RADIUS Freeware Format)
Cisco-AVpair="vpdn:vpdn-group=group1"
Example (CiscoSecure ACS for UNIX)
9,1="vpdn:vpdn-group=group1"

Tunnel Share

This attribute indicates that the tunnel sharing feature is enabled for the service.

Cisco-AVpair = "vpdn:tunnel-share=yes"
Syntax Description

This attribute has no arguments or keywords.

Example (RADIUS Freeware Format)
Cisco-AVpair="vpdn:tunnel-share=yes"
Example (CiscoSecure ACS for UNIX)
9,1="vpdn:tunnel-share=yes"

Example: Configuring Tunnel Sharing in the RADIUS Service Profile

In the following example, both the net1.com and net2.com services are members of the "group1" VPDN group. With tunnel sharing enabled in both service profiles, the sessions for net1.com and net2.com will be combined and sent through the same tunnels.

user = net1.com{
profile_id = 45 
profile_cycle = 18 
member = me 
radius=Cisco {
check_items= {
2=cisco
reply_attributes= {
9,1="vpdn:tunnel-id=LAC-1"
9,1="vpdn:l2tp-tunnel_password=MySecret"
9,1="vpdn:tunnel-type=l2tp"
9,1="vpdn:ip-addresses=10.10.10.10"
9,1="vpdn:vpdn-group=group1"
9,1="vpdn:tunnel-share=yes"
6=5
}

user = net2.com{
profile_id = 45 
profile_cycle = 18 
member = me 
radius=Cisco {
check_items= {
2=cisco
reply_attributes= {
9,1="vpdn:tunnel-id=LAC-1"
9,1="vpdn:l2tp-tunnel_password=MySecret"
9,1="vpdn:tunnel-type=l2tp"
9,1="vpdn:ip-addresses=10.10.10.10"
9,1="vpdn:vpdn-group=group1"
9,1="vpdn:tunnel-share=yes"
6=5
}

Verifying the Tunnel Sharing Configuration in the RADIUS Service Profile

To verify the RADIUS service profile, refer to the user documentation for your RADIUS server.

Tunnel Switching


Note   Before configuring this feature, read the "Restrictions" section.

The L2TP Tunnel Switching feature enables the NRP to terminate tunnels from LACs and forward the sessions through new L2TP tunnels selected independently of the client-supplied domains. The NRP as a tunnel switch performs VPDN tunnel authorization based on the ingress tunnel names that are mapped to specified LNSs.

Tunnel switching provides the following benefits:

  • Improved Provisioning Scalability—Aggregating LAC tunnels with an L2TP tunnel switch improves provisioning scalability on both the LAC and wholesaler ends.
  • Improved Permanent Virtual Circuit Interconnect Scalability—In a B-ISDN network, a multihop node can improve PVC interconnect scalability.

Figure 2-1 shows an example network topology using the L2TP Tunnel Switching feature.


Figure 2-1   Example Network Topology Using the L2TP Tunnel Switching Feature

To configure the L2TP Tunnel Switching feature, complete the following tasks:

Task 1: Enabling VPDN and Multihop Functionality

To use the L2TP Tunnel Switching feature, you must first enable VPDN and multihop capabilities by entering the following commands in global configuration mode:

  Command  Purpose 
Step 1 
Router(config)# vpdn enable

Enables VPDN functionality.

Step 2 
Router(config)# vpdn multihop

Enables VPDN multihop functionality.

Verifying VPDN and Multihop Functionality

To verify that you enabled VPDN and multihop functionality, enter the show running-config EXEC command.

Task 2: Terminating the Tunnel from the LAC

To terminate the tunnel from the LAC, enter the following commands beginning in global configuration mode:

  Command  Purpose 
Step 1 
Router(config)# username remote-hostname password secret

Configures the secret password. Must match the secret password configured on the LAC.

Step 2 
Router(config)# username local-name password secret

Configures the secret password. Must match secret in Step 1.

Step 3 
Router(config)# vpdn-group number

Selects the VPDN group.

Step 4 
Router(config-vpdn)# accept-dialin

Accepts incoming L2TP tunnel connections. Enters VPDN accept-dialin group mode.

Step 5 
Router(config-vpdn-acc-in)# protocol l2tp

Specifies the Layer 2 Tunnel Protocol.

Step 6 
Router(config-vpdn-acc-in)# virtual-template number

Specifies the virtual template interface to clone the new virtual access interface.

Step 7 
Router(config-vpdn-acc-in)# exit

Returns to the VPDN group mode.

Step 8 
Router(config-vpdn)# terminate-from hostname remote-hostname

Specifies the host name of the remote LAC that will be required when accepting a VPDN tunnel. Must match remote-hostname in Step 1.

Step 9 
Router(config)# lcp renegotiation always

Allows the LNS to renegotiate the LCP on dial-in calls.

Step 10 
Router(config-vpdn)# local name local-name

Specifies the local host name of the tunnel. Must match local-name in Step 2.

Verifying Termination of the Tunnel from the LAC

To verify that you successfully configured the tunnel switch to terminate tunnels from the LAC, enter the show running-config EXEC command.

Task 3: Mapping the Ingress Tunnel Name to an LNS

To map the ingress tunnel name to an LNS, complete the following steps beginning in global configuration mode:

  Command  Purpose 
Step 1 
Router(config)# username username password secret

Configures the secret password. Username must match LNS's hostname or tunnel ID. Secret password must match the secret configured on the LNS.

Step 2 
Router(config)# username egress-tunnel-name password secret

Configures the secret password. Must match secret in Step 1.

Step 3 
Router(config)# vpdn-group number

Selects the VPDN group.

Step 4 
Router(config-vpdn)# request-dialin

Enables the tunnel switch to request L2TP tunnels to the LNS. Enters VPDN request-dialin group mode.

Step 5 
Router(config-vpdn-req-in)# protocol l2tp

Specifies the Layer 2 Tunnel Protocol.

Step 6 
Router(config-vpdn-req-in)# multihop hostname ingress-tunnel-name

Initiates a tunnel based on the LAC's hostname or ingress tunnel ID.

Step 7 
Router(config-vpdn-req-in)# exit

Returns to the VPDN group mode.

Step 8 
Router(config-vpdn)# initiate-to ip ip-address
[limit limit-number] [priority priority-number]

Specifies the LNS. Optionally specifies the maximum number of sessions per tunnel as well as the priority of the IP address (1 is highest).

Step 9 
Router(config-vpdn)# local name egress-tunnel-name

Specifies the local host name of the tunnel. Must match egress-tunnel-name in Step 2.

Verifying the Ingress Tunnel Name to LNS Map

To verify that you successfully mapped the ingress tunnel name to the LNS, enter the show running-config EXEC command.

Task 4: Performing VPDN Tunnel Authorization Searches by Ingress Tunnel Name

To specify how to perform VPDN tunnel authorization searches, enter the following command in global configuration mode:

Command  Purpose 
Router(config)# vpdn search-order {multihop-hostname dnis domain}

Specifies a search order. You can specify to search by onfigured ingress tunnel name (multihop-hostname), domain, and/or DNIS. The order you specify in the command controls the order of the resulting search.

Verifying VPDN Tunnel Authorization Searches by Ingress Tunnel Name

To verify that you successfully configured the tunnel switch to perform VPDN tunnel authorization searches by ingress tunnel name, enter the show running-config EXEC command.

Comprehensive Example: L2TP Tunnel Switching Configurations

The examples in this section show the configurations necessary for the basic L2TP tunnel switch topology shown in Figure 2-2. In this topology, a tunnel switch terminates tunnels from two LACs and forwards all the sessions through one tunnel to the LNS.


Figure 2-2   Example L2TP Tunnel Switch Topology

This section provides the following configuration examples:

Example: LAC-1 Configuration

In the following example, LAC-1 performs tunnel authorization based on domain name and initiates a tunnel to the L2TP tunnel switch:

!
vpdn enable
!
username net.com password Secret1
username Tunnel-Switch-In password Secret1
!
vpdn-group 1
 request-dialin
  protocol l2tp
  domain service1.net.com
 initiate-to ip 10.1.1.1
 local name net.com
!

Example: LAC-2 Configuration

In the following example, LAC-2 also performs tunnel authorization based on domain name and initiates a tunnel to the L2TP tunnel switch:

!
vpdn enable
!
username net.com password Secret2
username Tunnel-Switch-In password Secret2
!
vpdn-group 1
 request-dialin
  protocol l2tp
  domain service2.net.com
 initiate-to ip 10.1.1.1
 local name net.com
!

Example: L2TP Tunnel Switch Configuration

In the following example, the NRP is configured as an L2TP tunnel switch. VPDN groups 1 and 2 are used to terminate the tunnels from the LAC. VPDN group 11 is used to initiate the tunnel to the LNS, and it performs tunnel authorization based on the configured ingress tunnel name.

!
vpdn enable
vpdn multihop
vpdn search-order multihop-hostname domain
!
username net.com password Secret1
username Tunnel-Switch-In password Secret1
username net.com password Secret2
username Tunnel-Switch-In password Secret2
username LNS password Secret3
username Tunnel-Switch-Out password Secret3
!
vpdn-group 1
 accept-dialin
  protocol l2tp
  virtual-template 1
 terminate-from hostname net.com
 local name Tunnel-Switch-In
!
vpdn-group 11
 request-dialin
  protocol l2tp
  multihop hostname net.com
 initiate-to ip 10.2.2.2 
 local name Tunnel-Switch-Out
!
interface ATM 0/0/0.1001 point-to-point
 ip address 10.1.1.1 255.255.255.0
 pvc 5/10
 encapsulation aal5snap
!
interface Virtual-Template 1
 ip unnumbered FastEthernet 0/0/0
 no ip directed-broadcast
 no keepalive
 no peer default ip address
 ppp authentication chap
!

Example: LNS Configuration

In the following example, the LNS terminates the tunnel from the L2TP tunnel switch:

vpdn enable
!
username LNS password Secret3
username Tunnel-Switch-Out password Secret3
!
vpdn-group 1
 accept-dialin
  protocol l2tp
  virtual-template 1
 terminate-from hostname Tunnel-Switch
 local name LNS
!
interface Virtual-Template 1
 ip unnumbered FastEthernet 0/0/0
 no ip directed-broadcast
 ip mroute-cache
 no keepalive
 peer default ip address pool pool-1
 ppp authentication chap
!


hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Jan 29 19:27:20 PST 2004
All contents are Copyright © 1992--2004 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.