|
Table Of Contents
N Through shdsl Commands for Cisco DSLAMs with NI-2
radius-server attribute nas-port format
radius-server challenge-noecho
radius-server directed-request
radius-server host non-standard
radius-server optional passwords
shdsl set bitrate masktype annex
N Through shdsl Commands for Cisco DSLAMs with NI-2
This chapter documents commands that you use to configure Cisco DSLAMs with NI-2. Commands in this chapter are listed alphabetically. For information on how to configure DSL features, refer to the Configuration Guide for Cisco DSLAMs with NI-2.
Note Commands that are identical to those documented in the Cisco IOS Configuration Fundamentals Command Reference and the ATM and Layer 3 Switch Router Command Reference have been removed from this chapter.
This chapter discusses the following commands:
radius-server attribute nas-port format
radius-server challenge-noecho
radius-server directed-request
radius-server host non-standard
radius-server optional passwords
shdsl set bitrate masktype annex
neighbor activate
To enable the exchange of information with a BGP neighboring router, use the neighbor activate router configuration command. To disable the exchange of an address with a neighboring router, use the no form of this command.
neighbor {ip-address | peer-group-name} activate
no neighbor {ip-address | peer-group-name} activate
Syntax Description
Defaults
The exchange of addresses with neighbors is enabled by default for the VPN IPv4 address family. You can disable IPv4 address exchange using the general command no default bgp ipv4 activate, or you can disable it for a particular neighbor using the no form of this command.
For all other address families, address exchange is disabled by default. You can explicitly activate the default command using the appropriate address family submode.
Command Modes
Router configuration
Command History
Usage Guidelines
Use this command to enable or disable the exchange of addresses with a neighboring router.
Examples
In the following example, a BGP router activates the exchange of a customer's IP address 10.15.0.15 to a neighboring router:
DSLAM(config)# router bgp 100
DSLAM(config-router)# neighbor 10.15.0.15 remote-as 100
DSLAM(config-router)# neighbor 10.15.0.15 update-source loopback0
DSLAM(config-router)# address-family vpnv4 unicast
DSLAM(config-router-af)# neighbor 10.15.0.15 activate
DSLAM(config-router-af)# exit-address-family
Related Commands
Command Descriptionaddress-family
Enters the address-family submode.
exit-address-family
Exits the address-family submode.
network (DHCP)
To configure the subnet number and mask for a Dynamic Host Configuration Protocol (DHCP) address pool on a Cisco IOS DHCP server, use the network DHCP pool configuration command. Use the no form of this command to remove the subnet number and mask.
network network-number [mask | /prefix-length]
no network
Syntax Description
Defaults
No default behavior or values.
Command Modes
DHCP pool configuration
Command History
Usage Guidelines
This command is valid only for DHCP subnetwork address pools. If you do not specify the mask or prefix length, the software uses the class A, B, or C natural mask. The DHCP server acts as if all host addresses are available. The system administrator can exclude subsets of the address space by using the ip dhcp excluded-address command.
Examples
The following example configures 172.16.0.0/16 as the DHCP pool subnetwork number and mask:
DSLAM#
configure terminal
DSLAM(config)#
ip dhcp pool 1
DSLAM(dhcp-config)#
network 172.16.0.0 /16Related Commands
option
To configure Cisco IOS Dynamic Host Configuration Protocol (DHCP) server options, use the option DHCP pool configuration command. Use the no form of this command to remove the options.
option code [instance number] {ascii string | hex string | ip address}
no option code [instance number]
Syntax Description
Defaults
The default instance number is 0.
Command Modes
DHCP pool configuration
Command History
Usage Guidelines
DHCP provides a framework for passing configuration information to hosts on a TCP/IP network. Configuration parameters and other control information are carried in tagged data items that you store in the options field of the DHCP message. The data items themselves are also called options. The current set of DHCP options is documented in RFC 2131, Dynamic Host Configuration Protocol.
Examples
The following example configures DHCP option 19, which specifies whether the client should configure its IP layer for packet forwarding. A value of 0 means disable IP forwarding; a value of 1 means enable IP forwarding. IP forwarding is enabled in the following example:
DSLAM#
configure terminal
DSLAM(config)#
ip dhcp pool 1
DSLAM(dhcp-config)#
option 19 hex 01
The following example configures DHCP option 72, which specifies the World Wide Web servers for DHCP clients. World Wide Web servers 172.16.3.252 and 172.16.3.253 are configured in the following example:
DSLAM#
configure terminal
DSLAM(config)#
ip dhcp pool 1
DSLAM(dhcp-config)#
option 72 ip 172.16.3.252 172.16.3.253Related Commands
Command Descriptionip dhcp pool
Configures a DHCP address pool on a Cisco IOS DHCP server and enters DHCP pool configuration mode.
payload-scrambling
To enable ATM cell payload scrambling on a DSL subscriber port, use the payload-scrambling profile configuration command. To disable payload scrambling, use the no form of the command.
payload-scrambling
no payload-scrambling
Syntax Description
This command has no keywords or arguments.
Defaults
No default behavior or values.
Command Modes
Profile configuration
Command History
Usage Guidelines
The two ends of a connection must have the same payload scrambling value—that is, payload scrambling must be enabled at both ends or disabled at both ends. The line trains if you enable payload scrambling at one end and disable it at the other end, but all AAL5 frames will have cyclic redundancy checks.
If you enable or disable payload scrambling, the port does not untrain or retrain.
Examples
This command disables payload scrambling for the default DSL profile:
DSLAM# configure terminal
DSLAM(config)# dsl-profile default
DSLAM(cfg-dsl-profile)# no payload-scrambling
Related Commands
Command Descriptionshow dsl profile
Displays a specific DSL profile.
show dsl interface atm slot#/port#
Displays the DSL and ATM status for a port.
peer default ip address
Use the peer default ip address command to specify an IP address, an address from a specific IP address pool, or an address from the DHCP mechanism that is to be returned to a remote peer connecting to this interface. Use the no form of the command to disable a prior peer IP address pooling configuration on an interface.
peer default ip address {ip-address | dhcp | pool [poolname]}
no peer default ip address
Syntax Description
Defaults
pool
Command Modes
Interface configuration
Usage Guidelines
This command applies to point-to-point interfaces that support the PPP or SLIP encapsulation.
This command allows an administrator to configure all possible address pooling mechanisms on a interface-by-interface basis.
The peer default ip address command can override the Global Default Mechanism defined by the ip address-pool command on an interface-by-interface basis.
•For all interfaces that are not configured with a peer default IP address mechanism (equivalent to selecting the peer default ip address pool command), the router uses the Global Default Mechanism that is defined by the ip address-pool command.
•If you select the peer default ip address pool poolname form of this command, the router uses the locally configured pool on this interface and does not follow the Global Default Mechanism.
•If you select the peer default ip address ip-address form of this command, the specified IP address is assigned to any peer that connects to this interface and any Global Default Mechanism is overridden for this interface.
•If you select the peer default ip address dhcp form of this command, the software uses the DHCP proxy-client mechanism by default on this interface and overrides any Global Default Mechanism for this interface.
Examples
The following command specifies that this interface will use a local IP address pool called pool1:
DSLAM(config)#
interface virtual-template 1
DSLAM(config-if)#
peer default ip address pool pool1
The following command specifies that this interface will use the IP address 172.140.34.21:
DSLAM(config-if)#
peer default ip address dhcp
The following command reenables the Global Default Mechanism that this interface will use:
DSLAM(config-if)#
peer default ip address poolRelated Commands
ppp authentication
To enable Challenge Handshake Authentication Protocol (CHAP) or Password Authentication Protocol (PAP) and to enable an AAA authentication method on an interface, use the ppp authentication interface configuration command. Use the no form of this command to disable this authentication.
ppp authentication {chap | pap} [if-needed] [list-name]
no ppp authentication
Caution If you use a list-name value that was not configured with the aaa authentication ppp command, you disable PPP on this interface.
Syntax Description
Defaults
PPP authentication is not enabled.
Command Modes
Interface configuration
Command History
Usage Guidelines
When you enable CHAP or PAP, the local router requires a password from remote devices. If the remote device does not support CHAP or PAP, no traffic is passed to that device.
If you use autoselect on a TTY line, you will probably want to use the ppp authentication command to turn on PPP authentication for the corresponding interface.
If you specify the if-needed option, the software does not require PPP authentication when you have already provided authentication. This option is useful if you specify the autoselect command, but you cannot use it with AAA.
You can use the list-name argument only when AAA is initialized; you cannot use it with the if-needed argument.
Examples
The following example enables CHAP on asynchronous interface 1, and uses the authentication list MIS-access:
DSLAM(config)#
interface async 1
DSLAM(config-if)#
encapsulation ppp
DSLAM(config-if)#
ppp authentication chap MIS-accessRelated Commands
ppp chap hostname
To create a pool of dialup routers that all appear to be the same host when you are authenticating with CHAP, use the ppp chap hostname interface configuration command. To disable this function, use the no form of the command.
ppp chap hostname hostname
no ppp chap hostname hostname
Syntax Description
Defaults
Disabled. The router name is sent in any CHAP challenges.
Command Modes
Interface configuration
Command History
Usage Guidelines
Currently, a router that dials a pool of access routers requires a username entry for each possible router in the pool because each router challenges with its hostname. If you add a router to the dialup rotary pool, you must update all connecting routers. The ppp chap hostname command allows you to specify a common alias for all routers in a rotary group so that you must configure only one username on the dialing routers.
You normally use this command with local CHAP authentication (when the router authenticates to the peer), but you can also use it for remote CHAP authentication.
Examples
The commands in the following example identify dialer interface 0 as the dialer rotary group leader and specify PPP as the encapsulation method that all member interfaces use. This example uses CHAP authentication on received calls only and sends the username ISPCorp in all CHAP challenges and responses:
DSLAM(config-if)# interface dialer 0
DSLAM(config-if)# encapsulation ppp
DSLAM(config-if)# ppp authentication chap callin
DSLAM(config-if)# ppp chap hostname ISPCorp
Related Commands
protocol
To specify the tunneling protocol the dial-in connection uses, use the protocol accept-dialin VPDN group configuration command. Use the no form of this command to remove the options.
protocol {any | l2f | l2tp | pppoe | pptp}
Syntax Description
Defaults
If you use this command under the VPDN-group, the default protocol is l2f. Otherwise, there is no default.
Command Modes
accept-dialin VPDN group configuration
Command History
Examples
The following example requests an L2TP dial-in tunnel to a local host named lac1 at IP address 123.45.67.891 for a user in the domain named partner.com:
DSLAM(config)# vpdn enable
DSLAM(config)# vpdn-group l2tp-group
DSLAM(config-vpdn)# protocol l2tp
DSLAM(config-vpdn)# domain partner.com
DSLAM(config-vpdn)# initiate-to ip 123.45.67.891
DSLAM(config-vpdn)# local name lac1
DSLAM(config-vpdn)# source-ip 123.45.67.891
Related Commands
None.
radius-server attribute nas-port format
To select the NAS-Port format used for RADIUS accounting features, use the radius-server attribute nas-port format global configuration command. To restore the default NAS-Port format, use the no form of this command.
radius-server attribute nas-port format format
no radius-server attribute nas-port format format
Syntax Description
Defaults
Standard NAS-Port format
Command Modes
Global configuration
Command History
Usage Guidelines
The radius-server attribute nas-port format command configures RADIUS to change the size and format of the NAS-Port attribute field (RADIUS IETF attribute 5).
The following NAS-Port formats are supported:
•Standard NAS-Port format—This 16-bit NAS-Port format indicates the type, port, and channel of the controlling interface. This is the default format used by Cisco IOS software.
•Extended NAS-Port format—The standard NAS-Port attribute field is expanded to 32 bits. The upper 16 bits of the NAS-Port attribute display the type and number of the controlling interface; the lower 16 bits indicate the interface that is undergoing authentication.
•Shelf-slot NAS-Port format—This 16-bit NAS-Port format supports expanded hardware models that require shelf and slot entries.
•PPP extended NAS-Port format—This NAS-Port format uses 32 bits to indicate the interface, VPI, and VCI for PPP over ATM and PPPoE over ATM, and the interface and VLAN ID for PPPoE over IEEE 802.1Q VLANs.
In the following example, a RADIUS server is identified, and the NAS-Port field is set to the PPP extended format:
DSLAM(config)# aaa new-model
DSLAM(config)# radius-server host 172.31.5.96 auth-port 1645 acct-port 1646
DSLAM(config)# radius-server attribute nas-port format d
Related Commands
None.
radius-server challenge-noecho
To prevent the display of user responses to Access-Challenge packets, use the radius-server challenge-noecho global configuration command. To return to the default condition, use the no form of this command.
radius-server challenge-noecho
no radius-server challenge-noecho
Syntax Description
This command has no arguments or keywords.
Defaults
All user responses to Access-Challenge packets are echoed to the screen.
Command Modes
Global configuration
Command History
Usage Guidelines
This command applies to all users. When you configure the radius-server challenge-noecho command, user responses to Access-Challenge packets do not display unless the Prompt attribute in the user profile is set to echo on the RADIUS server. The Prompt attribute in a user profile overrides the radius-server challenge-noecho command for the individual user. For more information, see the chapter "Configuring RADIUS" in the Cisco IOS Security Configuration Guide, Release 12.2.
Examples
The command in the following example stops all user responses from displaying on the screen:
DSLAM(config)# aaa new-model
DSLAM(config)# radius-server challenge-noecho
Related Commands
None.
radius-server configure-nas
To have the Cisco router or access server query the vendor-proprietary RADIUS server for the static routes and IP pool definitions used throughout its domain when the device starts up, use the radius-server configure-nas command in global configuration mode. To discontinue the query of the RADIUS server, use the no form of this command.
radius-server configure-nas
no radius-server configure-nas
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
Global configuration
Command History
Usage Guidelines
Use the radius-server configure-nas command to have the Cisco router query the vendor-proprietary RADIUS server for static routes and IP pool definitions when the router first starts up. Some vendor-proprietary implementations of RADIUS let the user define static routes and IP pool definitions on the RADIUS server instead of on each individual network access server in the network. As each network access server starts up, it queries the RADIUS server for static route and IP pool information. This command enables the Cisco router to obtain static routes and IP pool definition information from the RADIUS server.
Note Because the radius-server configure-nas command is performed when the Cisco router starts up, it does not take effect until you issue the copy system:running-config nvram:startup-config command.
Examples
The following example shows how to tell the Cisco router or access server to query the vendor-proprietary RADIUS server for already-defined static routes and IP pool definitions when the device first starts up:
DSLAM(config)# aaa new-model
DSLAM(config)# radius-server configure-nas
Related Commands
Command Descriptionradius-server host non-standard
Indicates that the security server is using a vendor-proprietary implementation of RADIUS.
radius-server deadtime
To improve RADIUS response times when some servers might be unavailable, use the radius-server deadtime command in global configuration mode to cause the unavailable servers to be skipped immediately. To set dead time to 0, use the no form of this command.
radius-server deadtime minutes
no radius-server deadtime
Syntax Description
minutes
Length of time, in minutes, for which transaction requests skip over a RADIUS server, up to a maximum of 1440 minutes (24 hours).
Defaults
Dead time is set to 0.
Command Modes
Global configuration
Command History
Usage Guidelines
Use this command to cause the Cisco IOS software to mark as "dead" any RADIUS servers that fail to respond to authentication requests. This enables you to avoid the wait for the request to time out before the next configured server is tried. A RADIUS server marked as "dead" is skipped by additional requests for the duration of minutes or unless all servers are marked "dead."
Examples
The following example specifies 5 minutes dead time for RADIUS servers that fail to respond to authentication requests:
DSLAM(config)# aaa new-model
DSLAM(config)# radius-server deadtime 5
Related Commands
radius-server directed-request
To allow users who are logging into a Cisco network access server (NAS) to select a RADIUS server for authentication, use the radius-server directed-request global configuration command. To disable the directed-request feature, use the no form of this command.
radius-server directed-request [restricted]
no radius-server directed-request [restricted]
Syntax Description
restricted
(Optional) Prevents the user from being sent to a secondary server if the specified server is unavailable.
Defaults
User cannot log into a Cisco NAS to select a RADIUS server for authentication.
Command Modes
Global configuration mode
Command History
Usage Guidelines
The radius-server directed-request command sends only the portion of the username before the "@" symbol to the host specified after the "@" symbol. In other words, with this command enabled, you can direct a request to any of the configured servers, and only the username is sent to the specified server.
If you disable the radius-server directed-request command, the whole string, both before and after the "@" symbol, is sent to the default RADIUS server. The router queries the list of servers, starting with the first one in the list. The router sends the whole string and accepts the first response that it gets from the server.
Use the radius-server directed-request restricted command to limit the user to the RADIUS server that is identified as part of the username.
The no radius-server directed-request command causes the entire username string to be passed to the default RADIUS server.
Examples
DSLAM(config)# aaa new-model
DSLAM(config)# aaa authentication login default radius
DSLAM(config)# radius-server host 192.168.1.1
DSLAM(config)# radius-server host 172.16.56.103
DSLAM(config)# radius-server host 172.31.40.1
DSLAM(config)# radius-server directed-request
Related Commands
None.
radius-server host
To specify a RADIUS server host, use the radius-server host command in global configuration mode. To delete the specified RADIUS host, use the no form of this command.
radius-server host {hostname | ip-address} [auth-port port-number] [acct-port port-number] [timeout seconds] [retransmit retries] [key string] [alias{hostname | ip-address}]
no radius-server host {hostname | ip-address}
Syntax Description
Defaults
No RADIUS host is specified; use global radius-server command values.
Command Modes
Global configuration
Command History
Usage Guidelines
You can use multiple radius-server host commands to specify multiple hosts. The software searches for hosts in the order in which you specify them.
If no host-specific timeout, retransmit, or key values are specified, the global values apply to each host.
Examples
The following example specifies host1 as the RADIUS server and uses default ports for both accounting and authentication:
DSLAM(config)# aaa new-model
DSLAM(config)# radius-server host host1
The following example specifies port 1612 as the destination port for authentication requests and port 1616 as the destination port for accounting requests on the RADIUS host named host1:
DSLAM(config)# aaa new-model
DSLAM(config)# radius-server host host1 auth-port 1612 acct-port 1616
Because entering a line resets all the port numbers, you must specify a host and configure accounting and authentication ports on a single line.
The following example specifies the host with IP address 172.29.39.46 as the RADIUS server, uses ports 1612 and 1616 as the authorization and accounting ports, sets the timeout value to 6, sets the retransmit value to 5, and sets "rad123" as the encryption key, matching the key on the RADIUS server:
DSLAM(config)# aaa new-model
DSLAM(config)# radius-server host 172.29.39.46 auth-port 1612 acct-port 1616 timeout 6 DSLAM(config)# retransmit 5 key rad123
To use separate servers for accounting and authentication, use the zero port value as appropriate.
The following example specifies that RADIUS server host1 be used for accounting but not for authentication, and that RADIUS server host2 be used for authentication but not for accounting:
DSLAM(config)# aaa new-model
DSLAM(config)# radius-server host host1.example.com auth-port 0
DSLAM(config)# radius-server host host2.example.com acct-port 0
The following example specifies four aliases on the RADIUS server with IP address 172.1.1.1:
DSLAM(config)# aaa new-model
DSLAM(config)# radius-server host 172.1.1.1 acct-port 1645 auth-port 1646
DSLAM(config)# radius-server host 172.1.1.1 alias 172.16.2.1 172.17.3.1 172.16.4.1
Related Commands
radius-server host non-standard
To identify that the security server is using a vendor-proprietary implementation of RADIUS, use the radius-server host non-standard command in global configuration mode. This command tells the Cisco IOS software to support nonstandard RADIUS attributes. To delete the specified vendor-proprietary RADIUS host, use the no form of this command.
radius-server host {hostname | ip-address} non-standard
no radius-server host {hostname | ip-address} non-standard
Syntax Description
Defaults
No RADIUS host is specified.
Command Modes
Global configuration
Command History
Usage Guidelines
The radius-server host non-standard command enables you to indicate that the RADIUS server is using a vendor-proprietary implementation of RADIUS. Although an IETF draft standard for RADIUS specifies a method for communicating information between the network access server and the RADIUS server, some vendors have extended the RADIUS attribute set in a unique way. This command enables the Cisco IOS software to support the most common vendor-proprietary RADIUS attributes. Vendor-proprietary attributes are not supported unless you use the radius-server host non-standard command.
For a list of supported vendor-specific RADIUS attributes, refer to the appendix "RADIUS Attributes" in the Cisco IOS Security Configuration Guide.
Examples
The following example specifies a vendor-proprietary RADIUS server host named alcatraz:
DSLAM(config)# aaa new-model
DSLAM(config)# radius-server host alcatraz non-standard
Related Commands
radius-server key
To set the authentication and encryption key for all RADIUS communications between the router and the RADIUS daemon, use the radius-server key command in global configuration mode. To disable the key, use the no form of this command.
radius-server key {0 string | 7 string | string}
no radius-server key
Syntax Description
Defaults
Disabled
Command Modes
Global configuration
Command History
Usage Guidelines
After enabling authentication, authorization, and accounting (AAA) authentication with the aaa new-model command, you must set the authentication and encryption key using the radius-server key command.
Note Specify a RADIUS key after you issue the aaa new-model command.
The key that you enter must match the key that the RADIUS daemon uses. The software ignores all leading spaces, but it uses spaces within and at the end of the key. If you use spaces in your key, do not enclose the key in quotation marks unless the quotation marks themselves are part of the key.
Examples
The following example sets the authentication and encryption key to "dare to go":
DSLAM(config)# aaa new-model
DSLAM(config)# radius-server key dare to go
The following example sets the authentication and encryption key to "anykey." The 7 specifies that a hidden key will follow.
DSLAM(config)# aaa new-model
DSLAM(config)# service password-encryption
DSLAM(config)# radius-server key 7 anykey
After you save your configuration and use the show-running config command, an encrypted key displays as follows:
DSLAM> show running-config
!
!
radius-server key 7 19283103834782sda
!The leading 7 indicates that the following text is encrypted.
Related Commands
radius-server optional passwords
To specify that the first RADIUS request to a RADIUS server be made without password verification, use the radius-server optional-passwords command in global configuration mode. To restore the default, use the no form of this command.
radius-server optional-passwords
no radius-server optional-passwords
Syntax Description
This command has no arguments or keywords.
Defaults
Disabled
Command Modes
Global configuration
Command History
Usage Guidelines
When the user enters the login name, the login request transmits with the name and a zero-length password. If accepted, the login procedure completes. If the RADIUS server refuses this request, the server software prompts for a password and tries again when the user supplies a password. The RADIUS server must support authentication for users without passwords to make use of this feature.
Examples
The following example configures the first login so that it does not require RADIUS verification:
DSLAM(config)# aaa new-model
DSLAM(config)# radius-server optional-passwords
Related Commands
None.
radius-server retransmit
To specify the number of times the Cisco IOS software searches the list of RADIUS server hosts before it gives up, use the radius-server retransmit command in global configuration mode. To disable retransmission, use the no form of this command.
radius-server retransmit retries
no radius-server retransmit
Syntax Description
Defaults
3 attempts
Command Modes
Global configuration
Command History
Usage Guidelines
The Cisco IOS software tries all servers, allowing each one to time out before it increases the retransmit count.
Examples
The following example specifies a retransmit counter value of five times:
DSLAM(config)# aaa new-model
DSLAM(config)# radius-server retransmit 5
Related Commands
None.
radius-server timeout
To set the interval for which a router waits for a server host to reply, use the radius-server timeout command in global configuration mode. To restore the default, use the no form of this command.
radius-server timeout seconds
no radius-server timeout
Syntax Description
Defaults
5 seconds
Command Modes
Global configuration
Command History
Usage Guidelines
Use this command to set the number of seconds a router waits for a server host to reply before timing out.
Examples
The following example changes the interval timer to 10 seconds:
DSLAM(config)# aaa new-model
DSLAM(config)# radius-server timeout 10
Related Commands
radius-server vsa send
To configure the network access server to recognize and use vendor-specific attributes, use the radius-server vsa send command in global configuration mode. To restore the default, use the no form of this command.
radius-server vsa send [accounting | authentication]
no radius-server vsa send [accounting | authentication]
Syntax Description
Defaults
Disabled
Command Modes
Global configuration
Command History
Usage Guidelines
The Internet Engineering Task Force (IETF) draft standard specifies a method for communicating vendor-specific information between the network access server and the RADIUS server by using the vendor-specific attribute (attribute 26). Vendor-specific attributes (VSAs) allow vendors to support their own extended attributes that are unsuitable for general use. The radius-server vsa send command enables the network access server to recognize and use both accounting and authentication vendor-specific attributes. Use the accounting keyword with the radius-server vsa send command to limit the set of recognized vendor-specific attributes to only accounting attributes. Use the authentication keyword with the radius-server vsa send command to limit the set of recognized vendor-specific attributes to only authentication attributes.
The Cisco RADIUS implementation supports one vendor-specific option using the format recommended in the specification. The Cisco vendor-ID is 9, and the supported option has vendor-type 1, which is named "cisco-avpair." The value is a string with the following format:
protocol : attribute sep value *
"Protocol" is a value of the Cisco "protocol" attribute for a particular type of authorization. "Attribute" and "value" are an appropriate attribute-value (AV) pair defined in the Cisco TACACS+ specification, and "sep" is "=" for mandatory attributes and "*" for optional attributes. This syntax allows the full set of features available for TACACS+ authorization to also be used for RADIUS.
For example, the following AV pair causes the Cisco "multiple named ip address pools" feature to be activated during IP authorization (during the PPP IPCP address assignment):
cisco-avpair= "ip:addr-pool=first"
The following example causes a "NAS Prompt" user to have immediate access to EXEC commands:
cisco-avpair= "shell:priv-lvl=15"
Other vendors have their own unique vendor-IDs, options, and associated VSAs. For more information about vendor-IDs and VSAs, refer to RFC 2138, Remote Authentication Dial-In User Service (RADIUS).
Examples
The following example configures the network access server to recognize and use vendor-specific accounting attributes:
DSLAM(config)# aaa new-model
DSLAM(config)# radius-server vsa send accounting
Related Commands
Command Descriptionradius-server attribute nas-port format
Selects the NAS-Port format used for RADIUS accounting features.
rbe nasip
To configure DHCP relay agent information option (option 82) support for ATM routed bridge encapsulation (RBE), use the rbe nasip command in global configuration mode. To remove this specification, use the no form of this command.
rbe nasip source_interface
no rbe nasip source_interface
Syntax Description
Defaults
No IP address is specified.
Command Modes
Global configuration
Command History
Usage Guidelines
Use the rbe nasip command to configure DHCP relay agent information option (option 82) support for ATM routed bridge encapsulation (RBE).
You must configure DHCP relay agent information option support on the DHCP relay agent through the use of the ip dhcp relay information option command in order for the rbe nasip command to be effective.
Examples
In the following example, DHCP option 82 support is enabled on the DHCP relay agent with the ip dhcp relay agent information option command. The rbe nasip command configures the router to forward the IP address for Loopback0 to the DHCP server. ATM routed bridge encapsulation is configured on ATM subinterface 4/0.1.
DSLAM(config)# ip dhcp-server 10.0.0.202
!
DSLAM(config)# ip dhcp relay agent information option
!
DSLAM(config)# interface Loopback0
DSLAM(config-if)# ip address 18.52.86.120 255.255.255.255
!
DSLAM(config-if)# interface ATM4/0
DSLAM(config-if)# no ip address
!
DSLAM(config-if)# interface ATM4/0.1 point-to-point
DSLAM(config-if)# ip unnumbered Loopback0
DSLAM(config-if)# ip helper-address 170.16.1.2
DSLAM(config-if)# atm route-bridged ip
DSLAM(config-if)# pvc 88/800
DSLAM(config-if)# encapsulation aal5snap
!
DSLAM(config-if)# router eigrp 100
DSLAM(config-if)# network 11.0.0.0
DSLAM(config-if)# network 170.16.0.0
!
DSLAM(config-if)# rbe nasip loopback0
Related Commands
Command Descriptionip dhcp relay information option
Enables the system to insert the DHCP relay agent information option in forwarded BOOT REQUEST messages to a Cisco IOS DHCP server.
rd
To create routing and forwarding tables for a VRF, use the rd VRF submode command.
rd route-distinguisher
Syntax Description
Defaults
There is no default. You must configure a route distinguisher for a VRF to be functional.
Command Modes
VRF submode
Command History
Usage Guidelines
A route-distinguisher creates routing and forwarding tables and specifies the default route-distinguisher for a VPN. The software adds the route distinguisher to the beginning of the IPv4 prefixes to make the VPN-IPv4 prefixes globally unique.
A route distinguisher is either ASN-relative, in which case it is composed of an autonomous system number and an arbitrary number, or it is IP-address-relative, in which case it is composed of an IP address and an arbitrary number.
You can enter a route distinguisher in either of these formats:
16-bit AS number: your 32-bit number
For example, 101:332-bit IP address: your 16-bit number
For example, 192.168.122.15:1Examples
The following example shows how to configure a default route distinguisher for two VRFs. The example illustrates the use of both AS-relative and IP address-relative route distinguishers:
DSLAM(config)# ip vrf vrf_blue
DSLAM(config-vrf)# rd 100:3
DSLAM(config-vrf)# ip vrf vrf_red
DSLAM(config-vrf)# rd 173.13.0.12:200
Related Commands
Command Descriptionip vrf
Enters VRF configuration mode.
show ip vrf
Displays information about a VRF.
redundancy reload-peer
To reload the standby NI-2 card, use the redundancy reload-peer privileged EXEC command.
redundancy reload-peer
Syntax Description
This command has no argument or keywords.
Defaults
No default behavior or values.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
This command reloads the standby NI-2 card in slot 11.
Examples
The following example reloads the standby NI-2 card:
DSLAM> enable
DSLAM# redundancy reload-peer
Related Commands
redundancy reload-shelf
To reload all cards in the chassis, including the NI-2 cards, use the redundancy reload-shelf privileged EXEC command.
redundancy reload-shelf
Syntax Description
This command has no argument or keywords.
Defaults
No default behavior or values.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
This command reloads all the cards in the chassis. This command also prompts you for confirmation to save the running configuration if it has changed. If you enter "yes," the system saves the running configuration and then reloads all the cards in the chassis. If you enter "no," the system directly reloads all the cards in the chassis.
Examples
The command in the following example reloads all cards in the chassis:
DSLAM> enable
DSLAM# redundancy reload-shelf
System configuration has been modified. Save? [yes/no]: no
Reload the entire shelf [confirm] y
Related Commands
redundancy switch-activity
To switch over manually from the active NI-2 card to the standby NI-2 card, use the redundancy switch-activity privileged EXEC command.
redundancy switch-activity
Syntax Description
This command has no argument or keywords.
Defaults
No default behavior or values.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
This command causes a manual switchover of activity to occur. This command also asks you for confirmation to save the running configuration if it has changed. If you enter "yes," the system saves the running command and then reloads all the cards in the chassis. If you enter "no," the system directly reloads all the cards in the chassis.
Examples
The command in the following example causes a manual switchover from the active NI-2 card to the standby NI-2 card:
DSLAM> enable
DSLAM# redundancy switch-activity
System configuration has been modified. Save? [yes/no]: no
This will reload the active unit and force a switch of activity. [confirm] y
Related Commands
request-dialin
To configure an L2TP access concentrator (LAC) to request L2F or L2TP tunnels to an LNS and create a request-dialin VPDN subgroup, use the request-dialin VPDN group command. To remove the request-dialin subgroup from a VPDN group, use the no form of this command.
request-dialin
no request-dialin
Syntax Description
This command has no keywords nor arguments.
Defaults
Disabled
Command Modes
VPDN group mode
Command History
Usage Guidelines
For a VPDN group to request dial-in calls, you must also configure the following commands:
•initiate-to VPDN group command
•protocol VPDN subgroup command
•At least one dialed number identification service (DNIS) or domain request-dialin command
After you establish an L2TP tunnel, both dial-in and dial-out calls can use the same tunnel.
Note You must configure the vpdn-group command with the accept-dialin command or the request-dialin command to enable VPDN. The request-dialin command initiates a dial-in tunnel. The acceptor, in turn, accepts a request for a dial-in tunnel.
Examples
The following example requests an L2TP dial-in tunnel to a remote peer at IP address 172.17.33.125 for a user in the domain named partner.com:
DSLAM(config)# vpdn-group 1
DSLAM(config-vpdn)# request-dialin
DSLAM(config-vpdn-req-in)# protocol l2tp
DSLAM(config-vpdn-req-in)# domain partner.com
DSLAM(config-vpdn-req-in)# initiate-to ip 172.17.33.125
Related Commands
route-target
To create a route-target extended community for a VRF, use the route-target VRF submode command. To disable the configuration of a route-target community option, use the no form of this command.
route-target {import | export | both} route-target-ext-community
no route-target {import | export | both} route-target-ext-community
Syntax Description
Defaults
There are no defaults. A VRF is not associated with any route-target extended community attributes until you specify the VRF using the route-target command.
Command Modes
VRF submode
Command History
Usage Guidelines
The route-target command creates lists of import and export route target extended communities for the specified VRF. Execute the command one time for each target community. All VRFs that are configured with that extended community as an import route target contain learned routes that carry a specific route-target extended community. Learned routes from a VRF site (for example, by BGP, RIP, or static route configuration) contain export route targets for extended communities that are configured for the VRF added as route attributes to control the VRFs into which the route is imported.
The route-target specifies a target VPN extended community. Like a route-distinguisher, an extended community is composed of either an autonomous system number and an arbitrary number, or an IP address and an arbitrary number. You can enter the numbers in either of these formats:
•16-bit AS number: your 32-bit number
For example, 101:3•32-bit IP address: your 16-bit number
For example, 192.168.122.15:1Examples
The following example shows how to configure route-target extended community attributes for a VRF:
DSLAM(config)# ip vrf vrf_blue
DSLAM(config-vrf)# route-target both 1000:1
DSLAM(config-vrf)# route-target export 1000:2
DSLAM(config-vrf)# route-target import 173.27.0.130:200
Note The result of the command sequence is that VRF vrf_blue has two export extended communities (1000:1 and 1000:2) and two import extended communities (1000:1 and 173.27.0.130:200).
Related Commands
Command Descriptionip vrf
Enters VRF configuration mode.
import map
Configures an import route map for the VRF.
scrambling
To configure scrambling on an interface, use the scrambling interface configuration command. To restore the default value, use the no form of this command.
scrambling [cell-payload | sts-stream] [protection | working | <cr>]
no scrambling
Syntax Description
Defaults
No default behavior or values.
Command Modes
Interface configuration
Command History
Release Modification12.1(4)DA
This command was introduced.
12.1(7)DA
The keywords protection and working were added.
Usage Guidelines
The scrambling type must match on both sides of a link. Use the scrambling command only on trunk or subtend interfaces.
Examples
The following example uses the scrambling command to enable scrambling on the specified interface:
DSLAM> enable
DSLAM# configure terminal
DSLAM(config)# interface atm 0/1
DSLAM(config-if)# scrambling cell-payload protection
Note The scrambling sts-stream and scrambling cell-payload commands execute only on STS network interfaces such as OC-3.
Related Commands
Command Descriptionpayload scrambling
Enables ATM cell payload scrambling on a subscriber port.
show controllers
Displays information on working and protection fibers.
sdsl bitrate
To set the maximum and minimum allowed bit rates for the STU-C profile parameters, use the sdsl bitrate command.
sdsl bitrate bitrate
Syntax Description
bitrate
The STU-C upstream and downstream bit rates are identical. The loop characteristics determine the achievable rate. See the allowed ranges and default values in Usage Guidelines below.
Defaults
The default setting specifies a line rate of 784 kbps.
Command Modes
Profile configuration
Command History
Usage Guidelines
SDSL cards train only at the selected bit rate. If a CPE fails to train, a lower bit rate might be required.
The following allowable STU-C bit rate ranges occur in kilobits per second:
•1168
•1040
•784
•528
•400
•272
•144
Caution This command causes the port to retrain when you change the bit rate parameter.
If you set a parameter to its current value, the port does not retrain. If a port is training when you change the parameter, the port untrains and retrains to the new parameter.
Examples
In this example, the command sets the bit rate of the default profile to 528 kbps downstream and upstream:
DSLAM# configure terminal
DSLAM(config)# dsl-profile default
DSLAM(cfg-dsl-profile)# sdsl bitrate 528
Related Commands
secondary sync bootflash
To manually synchronize the bootflash files between the active and the standby NI-2, use the secondary sync bootflash privileged EXEC command.
secondary sync bootflash
Syntax Description
This command has no argument or keywords.
Defaults
No default behavior or values.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Use this command to manually synchronize the bootflash files between the active and the standby NI-2. The auto-sync command performs this task automatically.
Examples
The following example synchronizes the bootflash files between the active and the standby NI-2:
DSLAM> enable
DSLAM# secondary sync bootflash
Related Commands
secondary sync config
To manually copy the startup configuration and the IfIndex-table files from the active to the standby NI-2, use the secondary sync config privileged EXEC command.
secondary sync config
Syntax Description
This command has no argument or keywords.
Defaults
No default behavior or values.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Use this command to manually copy the startup configuration from the active to the standby NI-2.
Examples
The command in the following example copies the startup configuration from the active to the standby NI-2:
DSLAM> enable
DSLAM# secondary sync config
Related Commands
secondary sync flash
To manually synchronize the flash files on the active and the standby NI-2, use the secondary sync flash privileged EXEC command.
secondary sync flash
Syntax Description
This command has no argument or keywords.
Defaults
No default behavior or values.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Use this command to manually synchronize the flash files on the active and the standby NI-2.
Examples
The following example synchronizes the flash files on the active and the standby NI-2:
DSLAM> enable
DSLAM# secondary sync flash
Related Commands
secondary sync running-config
To synchronize the running configurations on the active and the standby NI-2, use the secondary sync running-config privileged EXEC command.
secondary sync running-config
Syntax Description
This command has no argument or keywords.
Defaults
No default behavior or values.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Use this command to synchronize the running configurations on the active and the standby NI-2.
Examples
The following example synchronizes the running configurations on the active and the standby NI-2:
DSLAM> enable
DSLAM# secondary sync running-config
Related Commands
service dhcp
To enable the Cisco IOS Dynamic Host Configuration Protocol (DHCP) Server feature, use the service dhcp global configuration command. Use the no form of this command to disable the Cisco IOS DHCP Server feature.
service dhcp
no service dhcp
Syntax Description
This command has no keywords or arguments.
Defaults
The feature is enabled.
Command Modes
Global configuration
Command History
Usage Guidelines
By default, the Cisco IOS DHCP Server feature is enabled on your Cisco DSLAM.
Examples
The following example enables DHCP services on the DHCP server:
DSLAM(config)#
service dhcpRelated Commands
None.
set temperature-rating
Use the set temperature-rating command in EXEC mode to provision the system temperature rating.
set temperature-rating { commercial | osp }
Syntax Description
Defaults
No default behavior or values.
Command Modes
EXEC
Command History
Usage Guidelines
Use this command to set the temperature rating for the system. By default, system temperature ratings are set as commercial. A temperature rating mismatch alarm is triggered when any installed system component has a different temperature rating than the system temperature rating setting.
If the system temperature rating setting is osp, then any system component with a temperature rating of commercial triggers the temperature rating mismatch alarm. If the system temperature rating setting is commercial, then any system component with an osp rating triggers the alarm.
If a system has an osp rating but has never been provisioned, then the temperature rating mismatch alarm is on. To remove the alarm, set the system temperature rating to osp. When you change the system temperature rating setting, the facility-alarm status automatically updates, preventing unnecessary mismatch alarms.
Examples
The following examples show how to use the command to change the system temperature rating setting.
To set the system temperature rating to osp:
DSLAM> set temperature-rating osp
To set the system temperature rating to commercial:
DSLAM# set temperature-rating commercial
Related Commands
shdsl annex
To configure the shdsl annex type, use the shdsl annex DSL profile configuration command. To disable, use the no form of this command.
shdsl annex {a | b | auto}
no shdsl annex {a | b | auto}
Syntax Description
a
Configures annex type a on the selected DSL profile.
b
Configures annex type b on the selected DSL profile.
auto
Allows the CO to detect and then select the CPE side annex type during training.
Defaults
The default setting for the shdsl annex command is auto.
Command Modes
DSL profile configuration.
Command History
Release Modification12.1(7)DA2
This command was introduced.
12.2(7)DA
The Auto Annex feature was added to the command.
Usage Guidelines
Use Annex A in North American network implementations. Annex B is appropriate for European shdsl implementations.
Examples
The following example shows how to configure shdsl Annex B:
DSLAM(config)# dsl-profile austin
DSLAM(cfg-dsl-prof)# shdsl annex b
Related Commands
shdsl bitrate
To configure the shdsl bit rate, use the shdsl bitrate DSL profile configuration command. To disable, use the no form of this command.
shdsl bitrate rate
no shdsl bitrate
Syntax Description
rate
Specifies the maximum symmetrical data transmission rate for a G.SHDSL link.
Valid rates are 72, 136, 200, 264, 392, 520, 776, 1032, 1160, 1544, 2056, and 2312 kbps.
Defaults
no shdsl bitrate
The default setting specifies a line rate of 776 kbps.
Command Modes
DSL profile configuration
Command History
Usage Guidelines
If you change the bit rate on a live port, the line retrains.
Examples
The following example shows how to use the shdsl bitrate command to configure the upstream and downstream bandwidth at 2312 kbps:
DSLAM(config)# dsl-profile austin
DSLAM(cfg-dsl-prof)# shdsl bitrate 2312
Related Commands
shdsl margin
To configure shdsl margins, use the shdsl margin DSL profile configuration command. To disable, use the no form of this command.
shdsl margin target dB
shdsl margin min dB
shdsl margin threshold dB
no shdsl margin target
no shdsl margin min
no shdsl margin threshold
Syntax Description
Defaults
The default setting, no shdsl margin configures the following threshold values:
•min—0
•threshold—3
•target—0 (for rate adaptive mode the target default is 2)
Note We suggest using the no shdsl margin default settings.
Command Modes
DSL profile configuration.
Command History
Usage Guidelines
Changing the shdsl margin on a live port causes the line to retrain.
Examples
The following example shows you how to configure the shdsl margin values min 2, threshold 10, and target 0:
DSLAM(config)#
dsl-profile austin
DSLAM
(cfg-dsl-prof)# shdsl margin min 2
DSLAM
(cfg-dsl-prof)# shdsl margin threshold 10
DSLAM
(cfg-dsl-prof)# shdsl margin target 0Related Commands
Command Descriptionshdsl set bitrate rate masktype symmetric annex {a | b | auto} ratemode {fixed | adaptive}
Configures the bit rate, mask type, annex type, and rate mode on a DSL profile.
shdsl masktype
To set the G.SHDSL mask type, use the shdsl masktype command in DSL profile configuration mode. To use the default mask type, use the no form of this command.
shdsl masktype masktype
no shdsl masktype
Syntax Description
Defaults
The default shdsl masktype is symmetric.
Command Modes
DSL profile configuration.
Command History
Usage Guidelines
If you change the shdsl mask type on a live port, the line retrains.
Examples
The following example shows you how to configure a symmetric mask type:
DSLAM(config)#
dsl-profile austinDSLAM(cfg-dsl-prof)# shdsl masktype symmetric
Related Commands
shdsl ratemode
To configure the type of training rate (fixed or adaptive), use the shdsl ratemode command. To disable ratemode, use the no form of this command.
shdsl ratemode {fixed | adaptive}
no shdsl ratemode
Syntax Description
Defaults
The default, no shdsl ratemode, is fixed.
Command Modes
DSL profile configuration.
Command History
Usage Guidelines
Changing the shdsl bit rate, mask type, rate, or annex type on a live port causes the line to retrain.
Examples
In the following example the training mode is configured as adaptive:
DSLAM(config)# dsl-profile austin
DSLAM(cfg-dsl-prof)# shdsl ratemode adaptive
Related Commands
shdsl set bitrate masktype annex
The shdsl set bitrate masktype annex ratemode command aggregates the configuration of shdsl bit rates, mask types, annex types, and rate mode. To configure SHDSL bit rates, mask types, annex types, and rate mode, use the shdsl set bitrate masktype annex ratemode command in DSL profile configuration mode. To disable the shdsl set bitrate masktype annex ratemode command, use the no form of this command.
shdsl set bitrate rate masktype symmetric annex {a | b | auto} ratemode {fixed | adaptive}
no shdsl set bitrate masktype annex ratemode
Syntax Description
Defaults
The default no shdsl set bitrate rate masktype symmetric annex {a | b | auto} ratemode {fixed | adaptive} configures the following values on the selected DSL profile:
•Bit rate—776
•Mask type—Symmetric
•Annex—A
•Rate mode—(fixed)
Command Modes
DSL profile configuration.
Command History
Release Modification12.1(7)DA2
This command was introduced.
12.2(7)DA
The ratemode keyword was added.
Usage Guidelines
Changing the shdsl bit rate, mask type, rate, or annex type on a live port causes the line to retrain.
Examples
The following example shows how to configure a DSL profile with a 1544 kbps bit rate, symmetric mask type, Annex A, and adaptive rate mode:
DSLAM(config)# dsl-profile austin
DSLAM(cfg-dsl-prof)# shdsl set bitrate 1544 masktype symmetric annex a ratemode adaptive
Related Commands
Posted: Thu May 27 13:36:23 PDT 2004
All contents are Copyright © 1992--2004 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.