|
The Cisco Broadband Access Center (BAC) software enables you to organize and manage network services. Network services are predefined resources that include:
Table 5-1 lists the topics discussed in this chapter and their associated sections.
Table 5-1 Managing Network Services Topics
If you want to... | Go to the... |
---|---|
Create and delete access lists, which enable the filtering of network traffic, including standard and extended access lists |
"Organizing and Managing Notification Engine Servers" section. |
Create and delete Cisco CNS Notification Engine servers, which enable fault management |
"Organizing and Managing Notification Engine Servers" section. |
Create and delete Cisco IE2100 Configuration Engine servers, which store and deliver router configurations |
"Organizing and Managing Configuration Engine Servers" section. |
Create and delete Cisco CNS Network Registrar servers, which enable IP address management through DHCP |
|
Create and delete QoS features, enabling you to provide different levels of service depending on network and customer requirements. These QoS features consist of access lists, class maps, and policy maps. |
"Organizing and Managing Quality of Service Features" section. |
Create and delete terminal servers, which enable access to routers through console ports |
|
Network services are resources that enable subscriber and device provisioning. You organize your resources using predefined containers. Table 5-2 lists and describes the predefined resource containers.
Table 5-2 Predefined Containers for Network Services
Use the containers to organize the resources that you use on your network. BAC displays a list of the expected fields for each resource type, and you supply the values for the individual resource. For example, when you add a AAA server, you add values that describe its IP address, its owner (network service provider), the vendor whose RADIUS product you are implementing, hostname, password information, and port information.
As you organize and manage resources, BAC writes information to its database. It then uses this information to provide default values as you create administrative networks and network devices.
AAA servers provide authentication, authorization, and accounting only in LAC, PTA, and LNS broadband aggregation scenarios. AAA (or RADIUS) servers receive subscriber connection requests through a router, which acts as a network access server (NAS). AAA servers authenticate users and return to the NAS the configuration information needed to deliver service to the subscriber.
BAC directly supports either the Cisco CNS Access Registrar server or the Interlink Merit AAA server. You can configure these servers as either remote or proxy servers. You link a proxy server to a remote server. You can add other AAA servers as proxy servers, if you then associate them with an Access Registrar or a Merit server.
When you create a AAA server, you define the fields listed in Table 5-3.
Create a AAA server to support RADIUS proxy configuration. This enables an administrator to configure a AAA server to act as a proxy client to other RADIUS servers or other kinds of authentication servers.
Before you add a AAA server to BAC, determine whether it is a remote server or a proxy server. It does not matter in what order you create the proxy server and the remote server. You link the two servers after you create them. When you are ready, log in to BAC.
To create a AAA server, follow these steps:
Step 2 In the Object Selector, click AAA.
Step 3 In the main window, click Create. The system displays the Select Owners page.
The Select Owners page contains a dual column selection box, which you use to add and remove owners.
Step 4 In the Available Owners list box, choose the owner of the access list and click Add. BAC moves the owner to the Selected Owners list box.
Step 5 Click Next. The system displays the Create AAA page in the main window.
Step 6 Enter the AAA resource information, as defined in Table 5-3.
Note To enable BAC to update the AAA server automatically, check
Update AAA. If you disable updates, you must process any updates manually. To enable the AAA server to act as a proxy, check Proxy. |
Step 7 When you are done, click Finish. The system redisplays the Network Services Inventory page in the main window.
Step 8 If you are creating a remote server and a proxy server, repeat Steps 2 through 7 to add another server. Then, go to the "Associating a Proxy Server With a Remote Server" section.
You can configure a AAA server to act as a proxy server. The proxy server passes authentication requests to a remote server, which might be a AAA server or another type of authentication server; for example, an RSA server. You first use BAC to add both servers, then you create the link between them.
BAC supports two network topologies. In the first topology, the proxy server is located at wholesale network access provider where the BAC server can access it. The remote server is located at the retail service provider and is inaccessible to the BAC server due to a firewall. In this topology, BAC cannot configure the remote server, so the retail service provider must ensure it is configured to support a proxy server.
In the second topology, the proxy server and the remote server are located at the wholesale network access provider. In this topology, BAC configures both servers.
When you associate a proxy server with a remote server, you define the fields listed in Table 5-4.
Table 5-4 Proxy Association Fields
Field | Description |
---|---|
The namespace that the proxy server manages. This field is required. |
|
The shared secret key that the proxy and remote servers use to authenticate one another. This field is required. |
|
Before you associate a proxy server with a remote server, be aware of the following considerations:
To associate a proxy and a remote server, follow these steps:
Step 2 In the Object Selector, expand the AAA folder and choose the proxy server that you want to associate with a remote server.
Step 3 In the main window, click Associate Proxy. The system displays the AAA Proxy Link Inventory page.
Step 4 Click Add. The system displays the Associate AAA Proxy With a Remote AAA Resource dialog box.
Step 5 Enter the information about the proxy association, as defined in Table 5-4.
Step 6 Click OK. The system redisplays the AAA Proxy Link Inventory page.
Step 7 Click Done.
Before you delete a AAA server, be aware of the following considerations:
To delete a AAA server, follow these steps:
Step 2 In the Object Selector, expand the AAA container.
Step 3 Select the AAA resource that you want to delete.
Step 4 In the main window, click Delete. The system prompts you to confirm that you want delete this resource.
Step 5 Click OK.
Before you remove the association of a proxy server with a remote server, you first delete the remote server.
To remove the association with a remote server, follow these steps:
Step 2 In the Object Selector, expand the AAA folder and choose the proxy server that has the association with a remote server that you want to remove.
Step 3 In the main window, click Associate Proxy. The system displays the AAA Proxy Link Inventory page.
Step 4 Click Remove.
A Cisco CNS Notification Engine (Cnote) server is a software product integrated with BAC to provide network, device, and subscriber fault management. You organize and manage Notification Engine servers within BAC to support detecting, diagnosing, and resolving these faults.
When you create a Notification Engine server, you define the fields listed in Table 5-5.
Table 5-5 Notification Engine Server Fields
Field | Description |
---|---|
The name of the server on which the Notification Engine software is installed. |
|
An optional text block for descriptive information about the Notification Engine server. |
Create a Notification Engine server to enable you to read Syslog messages and to take advantage of these Notification Engine capabilities:
To create a Notification engine server, follow these steps:
Step 2 In the Object Selector, click Cnote.
Step 3 In the main window, click Create. The system displays the Select Owners page.
The Select Owners page contains a dual column selection box, which you use to add and remove owners.
Step 4 In the Available Owners list box, select the owner of the Notification Engine server and click Add. BAC moves the owner to the Selected Owners list box.
Step 5 Click Next. The system displays the Create Notification Engine page.
Step 6 Enter information about the Notification Engine server, as defined in Table 5-5.
Step 7 When you are done, click Finish.
Delete a Notification Engine server if you remove the device on which this software is installed from the network.
To delete a Notification Engine server, follow these steps:
Step 2 In the Object Selector, expand the Cnote container.
Step 3 Select the Notification Engine server that you want to delete.
Step 4 In the main window, click Delete. The system prompts you to confirm that you want delete this resource.
Step 5 Click OK.
You organize and manage Configuration Engine servers to handle groups of Cisco IOS devices and the services they deliver. These servers store router configurations and deliver them to devices as needed.
When you create Configuration Engine servers, you define the fields listed in Table 5-6.
Table 5-6 Configuration Engine Server Fields
Create a Configuration Engine server if you want to download the configuration files using Telnet or HTTP.
To create a Configuration Engine server, follow these steps:
Step 2 In the Object Selector, click Config Engine.
Step 3 In the main window, click Create. The system displays the Configuration Engine page.
Step 4 Enter information about the Configuration Engine server, as defined in Table 5-6.
Step 5 When you are done, click OK.
Delete a Configuration Engine server if you remove the device on which this software is installed from the network.
To delete a Configuration Engine server, follow these steps:
Step 2 In the Object Selector, expand the Configuration Engine container.
Step 3 Select the Configuration Engine server that you want to delete.
Step 4 In the main window, click Delete. The system prompts you to confirm that you want delete this resource.
Step 5 Click OK.
You organize and manage Cisco CNS Network Registrar servers to provide IP address management and DNS domain update functions.
When you create a DHCP server, you define the fields listed in Table 5-7.
Create DHCP servers to manage scopes of IP addresses in PTA and LNS broadband aggregation scenarios.
To create a DHCP server, follow these steps:
Step 2 In the Object Selector, click DHCP.
Step 3 In the main window, click Create. The system displays the DHCP page in the main window.
Step 4 Enter the DHCP resource information, as defined in Table 5-7.
Step 5 When you are done, click Finish.
Delete a DHCP server if you remove the device on which this software is installed from the network. To delete a DHCP server, follow these steps:
Step 2 In the Object Selector, expand the DHCP container.
Step 3 Select the DHCP server that you want to delete.
Step 4 In the main window, click Delete. The system prompts you to confirm that you want delete this resource.
Step 5 Click OK.
You organize and manage QoS features in BAC so that you can provided differentiated services based on subscriber and network requirements. You control QoS within BAC through:
Standard access lists filter IP traffic at a router interface. They permit or deny network access to packets based on conditions you specify in each list.
Tip Create access lists before you create class maps and policy maps. |
When you create a standard access list, you define the fields listed in Table 5-8.
Table 5-8 Standard Access List Fields
Create standard access lists to filter network traffic based on the source of packets. Before you add a standard access list, be aware of the following considerations:
To create a standard access list, follow these steps:
Step 2 In the Object Selector, expand the QoS container and click AccessList.
Step 3 In the main window, click Create. The system displays the Select Owners page in the main window.
The Select Owners page contains a dual column selection box, which you use to add and remove owners.
Step 4 In the Available Owners list box, choose the owner of the access list and click Add. BAC moves the owner to the Selected Owners list box.
Step 5 Click Next. The system displays the Select Configuration Profile page.
Step 6 In the Access List folder, select the Access List icon and click Next. The system displays the Access List Resource page.
Step 7 Create the access list by entering information in the Access List Name, IP Based, and Mode fields, as defined in Table 5-8.
Step 8 Click Add. The system displays the Create AccessList Resource dialog box.
Step 9 Configure the access list by entering information in the Operation and IP Wildcard Bits fields, as defined in Table 5-8.
Step 10 Click OK. The system redisplays the AccessList Resource page.
Delete standard access lists access lists if changes to network topology make them obsolete. Before you delete a standard access list, be aware of the following considerateness:
To delete a standard access list, follow these steps:
Step 2 In the Object Selector, expand the QoS and Access List containers.
Step 3 Select the access list that you want to delete.
Step 4 In the main window, click Delete. The system prompts you to confirm that you want delete this resource.
Extended access lists enable you to filter network traffic based on interfaces, protocols, and source and destination addresses.
When you create an extended access list, you define the fields listed in Table 5-9.
Table 5-9 Extended Access List Fields
Create extended access lists if you want to achieve a greater degree of control over traffic filtering than standard access lists enable. Before you add an extended access list, be aware of the following considerations:
To create an extended access list, follow these steps:
Step 2 In the Object Selector, expand the QoS container and click AccessList.
Step 3 In the main window, click Create. The system displays the Select Owners page in the main window.
The Select Owners page contains a dual column selection box, which you use to add and remove owners.
Step 4 In the Available Owners list box, select the owner of the access list and click Add.
Step 5 Click Next. The system displays the Select Configuration Profile page.
Step 6 In the Access List folder, select the Access List icon and click Next. The system displays the Access List Resource page.
Step 7 Create the access list by entering information in the Access List Name, IP Based, and Mode fields, as defined in Table 5-9.
Step 8 Click Add. The system displays the Create AccessList Resource dialog box.
Step 9 Configure the access list by entering information in the Operation, Protocol, Source IP Wildcards, and Destination IP Wildcards, as defined in Table 5-9.
Step 10 Click OK. The system redisplays the AccessList Resource page.
Delete extended access lists if changes to network topology make them obsolete. Before you delete an extended access list, be aware of the following considerations:
To delete an extended access list, follow these steps:
Step 2 In the Object Selector, expand the QoS and Access List containers.
Step 3 Select the access list that you want to delete.
Step 4 In the main window, click Delete. The system prompts you to confirm that you want delete this resource.
Class maps define the criteria that enable routers to differentiate network traffic. A class map classifies traffic on an inbound or an outbound interface. You organize and manage class maps to differentiate network traffic based on a series of match criteria.
Tip Create class maps before you create policy maps. |
When you create a class map, you define the fields listed in Table 5-10.
Field | Description |
---|---|
Specifies how to evaluate IP packets. The evaluation criteria is match-any or match-all. |
|
An optional text block for descriptive information about the class map. |
|
Two fields that determine whether IP precedence is one of the match criteria. The first field acts as a switch to turn IP precedence on or off. The second field sets the precedence level. |
|
Two fields that determine whether an IP differentiated services code point (DSCP) is one of the match criteria. The first field acts as a switch to turn IP DSCP on or off. The second field defines the code point. |
|
One of two fields that determine whether an access list is one of the match criteria. Access Group acts as a switch to turn Access Group List on or off. |
|
One of two fields that determine whether an access list is one of the match criteria. Access Group List field is a drop-down list box that displays the numbers or names of the standard and extended access lists that you have created. For more information about access lists, see "Creating and Managing Standard Access Lists" section and "Creating and Managing Extended Access Lists" section. |
Create class maps to mark IP packets so that routers on your network can evaluate the packets against the match criteria you specify.
Tip If you intend to use an access list as part of the match criteria, make sure to create the access list before you create the class map. |
To create a class map, follow these steps:
Step 2 In the Object Selector, expand the QoS container and click ClassMap.
Step 3 In the main window, click Create. The system displays the Select Owners page in the main window.
The Select Owners page contains a dual column selection box, which you use to add and remove owners.
Step 4 In the Available Owners list box, select the owner of the class map and click Add. BAC moves the owner to the Selected Owners list box.
Step 5 Click Next. The system displays the Select Configuration Profile page.
Step 6 In the ClassMap folder, click the ClassMap icon, and then, click Next. The system displays the ClassMap Resource page.
Step 7 Create the class map as follows:
a. On the ClassMap Resource page, enter the ClassMap Name and Match Type. For more information about these fields, see Table 5-10.
b. Click Add. The system displays the Create ClassMap Resource dialog box.
c. In the Create ClassMap Resource dialog box, configure the resource using the field descriptions in Table 5-10 as guidelines.
d. Click OK. The system redisplays the ClassMap Resource page.
Delete class maps if changes to network topology make the match conditions obsolete.
Note Before you delete a class map, you must first delete any policy maps that reference it. |
To delete a class map, follow these steps:
Step 2 In the Object Selector, expand the QoS and ClassMap containers.
Step 3 Select the class map that you want to delete.
Step 4 In the main window, click Delete. The system prompts you to confirm that you want delete this resource.
Step 5 Click OK.
Policy maps define QoS actions and rules and associate these to a class maps. You organize and manage policy maps in BAC to set up such things as class-based weighted fair queuing, traffic policing, and traffic shaping.
Tip Create a policy map before you create a service. |
When you create a policy map, you define the fields Listed in Table 5-7.
Create policy maps so that you can provide differentiated services to network subscribers. To create a policy map, follow these steps:
Step 2 In the Object Selector, expand the QoS container and click PolicyMap.
Step 3 In the main window, click Create. The system displays the Select Owners page.
The Select Owners page contains a dual column selection box, which you use to add and remove owners.
Step 4 In the Available Owners list box, select the owner of the policy map and click Add. The system moves the owner to the Selected Owners list box.
Step 5 Click Next. The system displays the Select Configuration Profile page.
Step 6 In the PolicyAction folder, click the PolicyAction icon, and then, click Next. The system displays the Policy Resource page.
Step 7 Create the policy map as follows:
a. On the Policy Resource page, enter the following information:
b. Click Add. The system displays the Policy Resource dialog box.
c. In the Create Policy Resource dialog box, enter the policy map resource information, as defined in Table 5-11.
d. When you are done, Click OK. The system redisplays the Policy Resource page.
Delete policy maps if network changes make them obsolete.
Note Before you delete a policy map, you must first delete any service or device that references it. |
To delete a policy map, follow these steps:
Step 2 In the Object Selector, expand the Qos and PolicyMap containers.
Step 3 Select the policy map that you want to delete.
Step 4 In the main window, click Delete. The system prompts you to confirm that you want delete this resource.
Step 5 Click OK.
A service attaches a policy map to an interface and specifies the direction (inbound or outbound) to which it applies. You organize and manage services within BAC so that you can provide differentiated services to subscribers depending on their application requirements.
When you create a service, you define the fields listed in Table 5-12.
Note You can customize all Cisco attribute/value pairs. The pairs listed in this table are simply the set that is
delivered with the product. To customize attribute/value pairs for a service open the following files in a
text editor: /opt/CSCObacss/common/templates/Broadband/aggregator-add-service_TMPL_ /opt/CSCObacss/common/templates/Broadband/aggregator-delete-service_TMPL_ |
Create a service so that you can attach a policy map to an interface. To create a service, follow these steps:
Step 2 In the Object Selector, select Service.
Step 3 In the main window, click Create. The system displays the Select Owners page.
The Select Owners page contains a dual column selection box, which you use to add and remove owners.
Step 4 In the Available Owners list box, select the owner of the policy map and click Add. The system moves the owner to the Selected Owners list box.
Step 5 Click Next. The system displays the Select Configuration Profile page.
Step 6 In the Service folder, click the Service icon, and then, click Next. The system displays the Create Service Resource page.
Step 7 On the Create Service Resource page, enter the resource information, as defined in Table 5-12.
To delete a service, follow these steps:
Step 2 In the Object Selector, expand the Service container.
Step 3 Select the service that you want to delete.
Step 4 In the main window, click Delete. The system prompts you to confirm that you want delete this resource.
Step 5 Click OK.
Terminal servers enable you to use a single point to access the console ports of many devices. You organize and manage terminal servers within BAC if you want to download configuration information using console ports.
When you create terminal servers, you define the fields listed in Table 5-13.
Table 5-13 Terminal Server Fields
Create terminal servers if you want to download configuration files using the console port of a router.
Step 2 In the Object Selector, select TermServer.
Step 3 In the main window, click Create. The system displays the Select Owners page.
The Select Owners page contains a dual column selection box, which you use to add and remove owners.
Step 4 In the Available Owners list box, select the owner of the policy map and click Add. The system moves the owner to the Selected Owners list box.
Step 5 Click Next. The system displays the Create Terminal Server page.
Step 6 On the Create Service Resource page, enter the information as defined in Table 5-13.
Step 7 When you are done, click Finish.
To delete a terminal server, follow these steps:
Step 2 In the Object Selector, expand the TermServer container.
Step 3 Select the terminal server that you want to delete.
Step 4 In the main window, click Delete. The system prompts you to confirm that you want delete this resource.
Step 5 Click OK.
You organize and manage tunnels to encapsulate packets inside a transport protocol. Tunnels provide the ability to implement standard point-to-point encapsulation schemes.
BAC supports two tunneling profiles:
Note You can customize tunnel Cisco and IETF tunnel characteristics. To customize tunnel open the following
files in a text editor: /opt/CSCObacss/common/templates/Broadband/aggregator-add-cisco-tunnel_TMPL_ /opt/CSCObacss/common/templates/Broadband/aggregator-delete-cisco-tunnel_TMPL_ /opt/CSCObacss/common/templates/Broadband/aggregator-add-ietf-tunnel_TMPL_ /opt/CSCObacss/common/templates/Broadband/aggregator-delete-ietf-tunnel_TMPL_ |
When you configure a tunnel with Cisco encapsulation, you set the fields listed in Table 5-14.
Table 5-14 Cisco Tunnel Fields
To configure a Cisco tunnel, follow these steps:
Step 2 In the Object Selector, select Tunnel.
Step 3 In the main window, click Create. The system displays the Owner Assignment page.
The Select Owners page contains a dual column selection box, which you use to add and remove owners.
Step 4 Select the owner of the tunnel from the Available Owners list box and click Add.
Step 5 Click Next. The system displays the Select Profile page in the main window.
Step 6 Click Cisco Tunnel and click Next. The system displays the Tunnel page in the main window.
Step 7 Enter values in the required fields and as appropriate in the optional fields. For more information, see Table 5-15.
When you configure a tunnel with IETF encapsulation, you set the fields listed in Table 5-15.
To configure an IETF tunnel, follow these steps:
Step 2 In the Object Selector, select Tunnel.
Step 3 In the main window, click Create. The system displays the Owner Assignment page.
The Select Owners page contains a dual column selection box, which you use to add and remove owners.
Step 4 Select the owner of the tunnel from the Available Owners list box and click Add.
Step 5 Click Next. The system displays the Select Profile page in the main window.
Step 6 Click IETF Tunnel and click Next. The system displays the Tunnel page in the main window.
Step 7 Enter values in the required fields and as appropriate in the optional fields. For more information, see Table 5-15.
Step 8 Click Finish.
To delete a tunnel, follow these steps:
Step 2 In the Object Selector, expand the Tunnel container.
Step 3 Select the tunnel that you want to delete.
Step 4 In the main window, click Delete. The system prompts you to confirm that you want delete this resource.
Step 5 Click OK.
Posted: Wed May 21 08:06:52 PDT 2003
All contents are Copyright © 1992--2003 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.