cc/td/doc/solution/sesm/sesm_311
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Configuring Components after Installation

Configuring Components after Installation

This chapter describes all of the configurable attributes in the Subscriber Edge Services Manager (SESM) software components. Use this chapter to change or fine-tune attributes after installation.

This chapter includes the following topics:

Configuration Overview

This section provides an overview of the configuration files and the configuration technology used by SESM. It includes the following topics:

Changing Configuration Information

You can change any configuration information by manually editing the configuration files. If you change configuration information, you must stop and restart the SESM web application and the Jetty server. If you deployed SESM in DESS mode, you also must stop and restart RDP. See "Running SESM Components," for instructions.

Configuration Technology

SESM configuration is based on the Java Management Extensions (JMX) specification and its related JMX MBean standards. For descriptions of these standards, go to:

    http://java.sun.com/products/JavaManagement

The configuration elements involved in SESM are:

SESM uses MBeans to configure components and the communications connections between those components. For example, an SESM MBean configures the SESM mode; an SSG MBean configures communication between SSG and the SESM web application, an AAA MBean configures communication between RADIUS servers and the SESM web application, and so on. Container-specific parameters are also defined as MBeans. For example, Cisco created a logging MBean for the Jetty server.

The Jetty component in the SESM installation package includes a JMX server. You can substitute any JMX-compliant server.

Cisco ConfigAgent

Cisco ConfigAgent performs the following management functions for MBeans.

After initialization, an MBean registers itself with the JMX server.

When the ConfigAgent detects a newly registered MBean, ConfigAgent configures that MBean if there is a matching entry in the XML files for that MBean.

The <Set> tag sets attribute values for the MBean.

The contents of the MBean configuration files control ConfigAgent activity.

Configuration Files

Two types of configuration files are used in SESM:

J2EE Configuration Files

The J2EE configuration files, such as web. xml and webdefaults.xml, define how the applications run in the J2EE environment. These files conform to Java specifications, as described in the Java Servlet Version 2.3 specifications from Sun Microsystems.

Administrators do not usually need to change the J2EE configuration files. Therefore, the contents of these files are not documented in this guide. However, web developers might require changes to these files. The Cisco Subscriber Edge Services Manager Web Developer Guide describes application-specific parameters in the J2EE configuration files. For information about other parameters, see the Java Servlet Version 2.3 specifications. To download these specifications, go to:

http://java.sun.com/aboutJava/communityprocess/first/jsr053

Table 4-1 lists the J2EE configuration files used to configure SESM web applications. The table includes a brief description of each file and shows the installed location of the file.


Table 4-1: Summary of J2EE Configuration Files
Component File Path and Name Description

Container (Jetty)

jetty
    config
      IREFOB J:1139010web default.xml

This file sets attributes for the Jetty server's handling of HTTP requests and how they map to servlets and JSPs.

SESM web application (NWSP)

nwsp
    docroot
      WEB-INF     _(_IR EFOBJ:1140102_) _web.xml

This file defines J2EE application parameters, including parameters related to Java Server Pages (JSPs).

SESM captive portal application

captiveportal
    docroot
      WEB-INF     web.xml

This file defines J2EE application parameters for the captive portal application.

CDAT

cdat
    docroot
      WEB-INF     web.xml

This file defines J2EE application parameters for CDAT.

MBean Configuration Files

Administrators edit the MBean configuration files to change values of configurable attributes for SESM software components. The installation program assigns initial values for all of the key attributes in these files, using a combination of default values and values you provide during the install. You can change the value of any attribute by editing the appropriate MBean configuration file.

The MBean configuration files conform to xmlconfig.dtd, a Cisco DTD. See the "MBean Configuration File Format" section for a summary of the MBean configuration file format. See "DTD for MBean Configuration Files" for the complete DTD.

Each software component in an SESM deployment has its own MBean configuration files. Table 4-2 lists all of the MBean configuration files used in an SESM deployment. The table describes the file location relative to the installation directory and a brief description of the file.


Table 4-2: Summary of MBean Configuration Files
Component File Path and Name Description

Container (Jetty)

jetty
    config
      nwsp.jett y.xml cdat.jett y.xml yourapp.jetty.xml

You can configure the Jetty server instance associated with each application differently. These files configure:

SESM web application (NWSP)

nwsp
    config
      nwsp.xml

This file configures:

  • SESM deployment options

  • Communication between an SESM web application and SSG

  • Communication between an SESM web application and RADIUS servers

  • Attributes for a captive portal application

  • Logging and debugging for the SESM web application. The log file name is nnn.application.log.

  • A management port for development and testing purposes

SESM captive portal application

Captive portal attributes are included in the MBean configuration file for the SESM web application.

RDP

rdp
    config
      rdp.xml

This file configures:

  • RDP options and packet handlers

  • RDP communication with SSG

  • Optionally, RDP communication with a RADIUS server

  • Logging and debugging for RDP

  • A management port for development and testing purposes.

CDAT

cdat
    config
      cdat.xml

This file configures:

  • System resource usage for the CDAT application

  • Logging and debugging for the CDAT application

  • A management port for development and testing purposes.

DESS

dess-auth
    config
      config.xm l

This file configures attributes used by the executing classes in the Dess and Auth application programming interfaces (APIs). The Dess and Auth APIs provide the underlying support for communication between an LDAP directory and the RDP, CDAT, and SESM web applications. If these applications are installed on the same machine, the same config.xml file applies to all of the applications.

This file contains attributes that control:

  • Directory security

  • Directory connections

  • Caching

  • Logging

For detailed descriptions of all attributes in the MBean configuration files, see the following tables:

MBean Configuration File Format

This section summarizes the MBean file format defined in xmlconfig.dtd. The purpose of this summary is to provide enough information for you to easily edit the MBean files. For the full text of the DTD, including extensive comments, see "DTD for MBean Configuration Files."

Use the following example as a reference while reading the format guidelines that follow. The example configures the debugging MBean for an SESM application.

<Instantiate order="1"
    class="com.cisco.aggbu.jmx.LoggerMBean" jmxname="com.cisco.aggbu:name=Logger"/>
</Instantiate> <!-- ================================================================ --> <Configure jmxname="com.cisco.aggbu:name=Logger">
    <Set name="debug" type="boolean"><SystemProperty name="nwsp.debug"
      default="false"/></Set>
    <Set name="debugPatterns"></Set> <Set name="debugThreads"></Set> <Set name="debugVerbosity">LOW</Set> <Set name="logDateFormat">yyyyMMdd:HHmmss.SSS</Set> <Set name="logFile"><SystemProperty name="application.log"
      default="./logs"/>/yyyy_mm_dd.application.log</Set>
    <Set name="logFrame" type="boolean">false</Set> <Set name="logStack" type="boolean">false</Set> <Set name="logThread" type="boolean">true</Set> <Set name="logToErr" type="boolean"><SystemProperty name="nwsp.logToErr"
      default="false"/></Set>
    <Set name="trace" type="boolean">true</Set> <Set name="warning" type="boolean">true</Set>
</Configure>

The following guidelines explain the basic format of the MBean configuration files.

Each <Configure> element must contain one of the above attributes, or both. ConfigAgent matches a registered MBean by both class and name, so that two <Configure> elements might be applied to an MBean.

The <Instantiate order = x> tag causes the ConfigAgent to construct and initialize the named MBean or class of MBeans.

The value assigned to the order attribute controls the order in which objects are initialized by the ConfigAgent. The lowest value is initialized first and the highest value is initialized last. For example, in the nwsp.xml file, the logger MBean uses the value 1, to ensure that it is initialized first.

After being initialized, an MBean registers itself with the MBean server. When ConfigAgent detects the newly registered object, it then configures the object.

Where:

parmName is the MBean parameter name whose value is being set. Do not change any parmName.

dataType is the required data type of the value you specify. If dataType is not explicitly identified, the default dataType is string. It is best not to change any dataType.

value is the parameter value. You can edit the value, making sure that the value you provide conforms to the data type specified.

Java System Properties in the MBean Configuration Files

The MBean configuration files use Java system properties as the value for some attributes. The value of a Java system property can be set at application run time. If a value is not specified at run time, the application uses a default value specified in the MBean configuration file.

In the MBean configuration files, the <SystemProperty> tag might appear inside a <Set> or <Call> tag. The format is:

    <SystemProperty name="propertyName" default="value"/>

Where:

propertyName is the Java system property name whose value sets the configurable attribute.

value is the default value used if no value is assigned at run time.

The following lines from the installed start script set system properties. (The -D argument to the JAVA command defines the value of a system property.) For a description of how the start script derives values for the environment variables used in the assignments, see Table 5-1.

$JAVA -Xmx20m \ -classpath $CLASSPATH \ -Djetty.home=$JETTYDIR \ -Dapplication.home=$APPDIR \ -Dapplication.log=$LOGDIR \ -Dapplication.portno=$PORTNO \ -Dmanagement.portno=$MGMTPORTNO \

Configuring the J2EE Jetty Container

This section includes the following topics:

Also see the "Sample Container MBean Configuration File" section.

Containers and Applications

This section defines containers and applications, and describes the relationship between them.

SESM applications and CDAT are J2EE web applications. The J2EE web server is the container for the applications that run in it. For example, the Jetty server is the container for the installed NWSP application.

One-to-One Relationship

The SESM core model, the NWSP sample application, and CDAT are designed and configured with the assumption that there is a one-to-one relationship between the web server container and each web application. That is, each application runs in its own web server container. If you are running two instances of the same application, or two different applications, you are running two web servers.

This one-to-one relationship means that you can configure the J2EE server differently for each application. For example, you can turn on logging for one application and turn it off for another.

Configuration File Locations

Each SESM web application (and also CDAT) has two MBean configuration files associated with it. The two files are:

    nwsp
      config    nwsp.xml
    cdat
      config    cdat.xml
    jetty
      config    nwsp.jetty.xml    cdat.jetty.xml    newapplication.jetty.xml

This modular approach has several advantages:

The RDP and DESS components are not web applications. Therefore, the jetty directory does not contain an MBean configuration file for those components.

Container Attributes

This section describes the attributes in the J2EE container MBean configuration files. These files are located in the container's config directory. For example:

    jetty
      config    nwsp.jetty.xml    cdat.jetty.xml

The container MBean configuration files configure the following MBeans:

Table 4-3 describes the attributes in the container MBean configuration files.


Table 4-3: Attributes in the Container MBean Configuration Files
Object Name Attribute Name Explanation

LogMBean

append

Indicates if messages overwrite existing contents (false) or are appended to the existing file (true).

Installed default: true

filename

Specifies the log file name and path, as follows:

application.log/yyyy_mm_dd.jetty.log

Where:

logTimezone

Installed default: empty

logDateFormat

Controls the format of the date stamp in the log messages.

Installed default: yyyyMMdd:HHmmss.sss

logLabels

Controls whether or not logging messages include frame details.

Installed default: false

logOneLine

Installed default: false

logStackSize

Controls whether or not logging messages include an indication of stack depth.

Installed default: false

logStackTrace

Controls whether or not logging messages include trace information.

Installed default: false

DebugMBean

debug

Controls whether or not debugging messages are produced.

Installed default: false

debugPatterns

By specifying one or more patterns, you turn on a filtering mechanism that excludes any message that does not match the pattern. The patterns are file, class, or method names. Pattern matching is based on substring matches. For example, if you specify the pattern RADIUS, the software focuses on RADIUS messages. To specify multiple patterns, separate the patterns using a comma.

Installed default: empty

debugTriggers

Installed default: empty

verbose

Specifies the level of detail reported in debugging messages. The range of allowed values is 0 (no details) to 255 (all details).

Installed default: 0

suppressStack

Controls whether or not stack information is included in debug messages.

Installed default: false

suppressWarnings

Controls whether or not warning messages are included in debug messages.

Installed default: false

HttpServer MBean—
AddListener for HTTP.SocketListener

port

Sets the port number that the web server listens on. The installed value is a Java system property named:

    application.portno

Note   The startup script sets this system property. Unless you alter the startup script, the default value in the MBean configuration file is ignored during application startup.

To change the value of application.portno, edit the application-specific startup script. The SESM installation program sets application.portno in the startup script to the NWSP port that you provided during the installation process.

If you are running in captive portal mode, this port value must be 80, whether you explicitly set it here by removing the reference to the Java system property or change the value of application.portno in the startup script.

minThreads

Sets the minimum number of threads that this listener will maintain during periods of low load. This listener will always have system resources allocated for this number of threads.

Installed default: 5

maxThreads

Sets the maximum number of threads that this listener can allocate resources for, even during peak loads. This listener can have up to this number of threads.

Installed default: 255

maxIdleTimeMs

Specifies how long a thread can be idle (not used) before the listener deallocates it. The unit is milliseconds.

Installed default: 60000

maxReadTimeMs

Specifies the time that a read on a request can block. This is how long the web server waits for a request to come from a client after the client opens a socket connection. When maxReadTimeMs is exceeded, the web server closes the socket connection.

Installed default: 60000

HttpServer MBean—
AddListener for HTTP.SunJsseListener

port

Sets the port that the secure socket layer (SSL) listener uses. The installed value is a Java system property named:

    application.ssl.portno

Note   The startup script sets this system property. Unless you alter the startup script, the default value in the MBean configuration file is ignored during application startup.

The generic startup script derives a value for application.ssl.portno based on the value of application.portno, as follows:

    application.ssl.portno = application.portno - 80 + 443

To change the value of application.ssl.portno, edit the generic startup script.

MinThreads

Sets the minimum number of threads that this listener will maintain during periods of low load. This listener will always have system resources allocated for this number of threads.

Installed default: 5

MaxThreads

Sets the maximum number of threads that this listener can allocate resources for, even during peak loads. The listener can allocate up to this number of threads.

Installed default: 255

MaxIdleTimeMs

Specifies the length of time a thread can be idle (not used) before the listener deallocates it. The unit is milliseconds.

Installed default: 50000

Keystore

Sets the pathname of the SSL keystore file. The keystore file is a binary file created by keytool. A sample keystore file is included in the installation. The name and location of the sample is:

jetty.home/config/nwspkeystore

Where:


Caution   A keystore file is required for deployments that use HTTPS. HTTPS does not function without a valid keystore file. The nwspkeystore file included with the SESM installation works, but you should replace it with a keystore valid for your specific deployment. See the "HTTPS Description" section for more information

Password

Must match the value in the keystore file referenced above.

KeyPassword

Must match the value in the keystore file referenced above.

HttpServerMBean—
LogSink

Configures a log file that records the incoming HTTP requests.

This is a positional argument.

The logSink class has one argument, which specifies the name and location of the request log. The installed value is:

application.log/yyyy_mm_dd.request.log

Where:

retainDays

Indicates the number of days to keep an old log file before deleting it.

Installed default: 90

append

Indicates whether or not to append messages to an existing file or to create a new file for each application instance.

Installed default: true

HttpServer MBean— <Call AddWebApplication>

The first call to this class adds the NWSP application to run on the web server.

These are positional arguments.

AddWebApplication has five positional arguments:

    1. The first positional argument specifies the virtual host name for the web server application.

    2. The second positional argument specifies the context path for locating the web server application. For example, / or /pathname/*.

    3. The third positional argument identifies the location of the application. The XML file sets this value to:

application.home/docroot

Where:

application.home is a Java system property.

    4. The fourth positional argument identifies the location of the webdefault.xml file for this application. The XML file sets this value to:

jetty.home/config/webdefault.xml

Where:

jetty.home is a Java system property

    5. The fifth positional argument specifies whether or not web archive (WAR) files are used. Valid values are TRUE and FALSE. Set this value to FALSE, since NWSP and CDAT are not WAR files.

The first three arguments define the location of the web server application.

    host/context/application

The NWSP start script derives the values for application.home and jetty.home from an expected (installed) directory structure. To change the value of application.home or jetty.home, edit the start script.

HttpServer MBean— <Call AddWebApplication>

The second call to this class adds the captive portal application to run on the web server.

These are positional arguments.

AddWebApplication has five positional arguments:

    1. The first positional argument is not used when calling the captive portal application.

    2. The second positional argument specifies the context path for locating the web server application. For example, / or /pathname/*. (context)

    3. The third positional argument identifies the location of the captive portal application. The XML file sets this value to:

install.root/captiveportal/docroot

Where:

install.root is a Java system property

    4. The fourth positional argument identifies the location of the webdefault.xml file for the captive portal application. The XML file sets this value to:

jetty.home/config/webdefault.xml

Where:

jetty.home is a Java system property

    5. The fifth positional argument specifies whether web archive (WAR) files are used. Valid values are TRUE and FALSE. Set this value to FALSE, since NWSP and CDAT are not WAR files.

The first three arguments define the location of the captive portal application.

    host/context/application

The NWSP start script derives the values for install.root and jetty.home from an expected (installed) directory structure. To change the value of application.home or jetty.home, edit the start script.

Configuring an SESM Web Application

This section describes how to configure an SESM web application, using the NWSP application as an example. The section includes the following topics:

Also see the "Sample Application MBean Configuration File" section.

SESM Application Attributes

This section describes the SESM application MBean configuration file. This file is located in the application's config directory. For example:

    nwsp
      config    nwsp.xml

The application MBean configuration file configures the following MBeans:

Table 4-4 explains the configurable attributes in the MBeans listed above.


Table 4-4: Attributes in the Application MBean Configuration File
Object Attribute Name Explanation

ManagementConsole

Port

Specifies a port for a management console.

The management console displays the current settings of all attributes in all of the MBean configuration files. The console is useful in development and testing environments.

Note   The ManagementConsole is the HTML adaptor server included with the Sun example JMX server. However, the HTML adaptor server is not production quality. For example, configuration changes that you make using the management console are not persistent. You should remove the HTML adaptor server from your configuration before transitioning the SESM deployment to public use.

To remove the JMX HTML adaptor server, comment out the following lines in the configuration files:

    <Configure jmxname="com.cisco.aggbu:name=ManagementConsole"> <Call name="start"/> </Configure>

The port attribute is set to a Java system property named:

    management.portno

All of the installed startup scripts set this Java system property to the following value:

    application.portno + 100

For example, if the application.portno is 8080, the management.portno is 8180.

This runtime setting overrides any value you enter in the configuration file. To change the value of this attribute, edit the start script.

AuthInfo

AuthInfo provides a level of access control on the Management Console. When a user attempts to access the management console port from a web browser, a logon window appears first. The user must enter a user ID and password that matches the values specified here.

AuthInfo requires two positional arguments:

    1. User ID—Enter a user ID that will be required to access the management console. The default value in all of the MBean configuration files is MgmtUser.

    2. Password—Enter a password that will be required to access the management console. The default value in all of the MBean configuration files is MgmtPassword.

Logger MBean

debug

Turns debugging on (value is true) or off (value is false).

The following parameters control the contents of debug messages that the application generates: logFrame, logStack, logThread, debugPatterns, and debugThreads.

When debug is false, the application does not generate debug messages but it can still generate logging messages. The following parameters control the types of logging messages produced: trace and warning.

Installed default: false

debugPatterns

By specifying one or more patterns, you turn on a filtering mechanism that excludes any message that does not match the pattern. The patterns are file, class, or method names. Pattern matching is based on substring matches. For example, if you specify the pattern RADIUS, the software focuses on RADIUS messages. To specify multiple patterns, separate the patterns using a comma.

Installed default: empty, which means that you receive all messages.

debugThreads

Specifies a specific thread name for which to show debugging messages. You can specify multiple thread names, separating them using a comma. By default, no thread name is specified.

Because each user interaction with the SESM web application takes place in a thread named for that user, this parameter can be used to focus the logging trace on a specific user activity. (This feature is not implemented in SESM Release 3.1(1).)

Installed default: empty

debugVerbosity

Specifies the level of detail in debugging messages. When the debug attribute is set to false, this attribute is ignored. Values are:

  • MAX

  • MED

  • LOW

Installed default: LOW

logDateFormat

Specifies format of dates in the log file.

Installed default: yyyyMMdd:HHmmss.SSS

LoggerMBean (continued)

logFile

Specifies the log file name and location. The installed default is:

application.log/yyyy_mm_dd.application.log

Where:

logFrame

Controls whether or not to log the calling member function.

Installed default: false

logStack

Controls whether or not to log stack traces.

Installed default: false

logThread

Controls whether or not to log thread IDs.

Installed default: true

logToErr

Controls whether or not to route log messages to stderr, in addition to the log file. This parameter is useful for monitoring the SESM web application at the command line. Displaying output to stderr is not recommended for production deployments.

Installed default: true

trace

Controls whether or not to log trace messages. These messages indicate entry and exit to code points.

Installed default: true

warning

Controls whether or not to log warning messages (nonfatal exceptions).

Installed default: true

SSD

mode

An SESM web application runs in one of the following modes. The SESM installation program sets the mode according to the options you choose during installation.

The MBean configuration file defines a Java system property for mode:

ssd.mode

This system property is different from most of the other system properties used in the MBean configuration files, in that, by default, the startup script does not set this system property. Therefore, the application runs in the mode specified in the MBean configuration file unless you explicitly override that value at run time.

To change the mode, you can:

Note   The best way to change the SESM mode is to re-install the software. Several other configuration attributes must be aligned with the mode for SESM to run properly in the selected mode. Also, you might not have all of the appropriate components to run in a mode other than the one you installed. For example, a demo installation does not install the DESS component.

singleSignOn

Enables (true) or disables (false) the single sign-on feature.

If single sign-on is enabled, the SESM web application does not ask a PPP subscriber to authenticate (log on). Instead, the SESM web application uses the SSG's PPP authenticated identity. Installed default: false

SSD (continued)

profileCache
Period

Specifies the time in seconds that a service or group object must be idle in the cache before its resources are deallocated from memory.

Installed default: 600

autoConnect

In RADIUS mode, this parameter is ignored. The automatic connection feature is always available, regardless of parameter settings. In RADIUS mode, the SSG always performs automatic service connections for all services marked as auto connect in a subscriber's profile.

In DESS mode, the SSG performs automatic connections if it has the service list. If SSG does not have the service list, you can set this autoConnect parameter to allow the SESM application to perform the automatic connections.

The Add Services option, which is set during RDP installation, controls whether or not SSG has a service list in DESS mode. The Add Services option configures RDP to either:

  • Return a service list to SSG—In this case, SSG performs automatic connections for services marked as auto connect in a subscriber's profile.

  • Not return a service list to SSG—In this case, SSG cannot perform automatic connections. The advantage to this configuration is that it saves memory on the SSG host (the NRP on the Cisco 6400 UAC).

If you configure RDP so that it does not return a service list to SSG, change the value of this autoConnect parameter to true to enable automatic connections by the SESM web application.

SSDDemoMode

demoDataFile

Specifies the file that contains data for the demo mode. The installed value is:

application.home/config/demo.txt

Where:

application.home is a Java system property

The NWSP start script derives the value for application.home from an expected (installed) directory structure. To change the value of application.home, edit the start script.

SSG—Global attributes

The global attributes apply to all SSGs that the SESM web application might communicate with.

To determine how an SSG was configured, use the show run command on the SSG host.

throttle

The maximum number of simultaneous requests that SESM web applications can send to SSG. This is a RADIUS protocol attribute. The RADIUS protocol queues additional requests and issues them as SSG returns responses or timeout messages for previous requests. You cannot override this global value.

Installed default: 20

PORT

The global value for RADIUS ports on the SSG hosts. This value must match the value that was configured on the SSG host using the following command:

ssg radius-helper authenticationPort

You can create subnet entries in the MBean configuration file to override this global value for specific SSGs.

TIMEOUTSECS

The number of seconds the SESM web application waits before timing out RADIUS packets that it sends to SSG. You cannot override this global value.

Installed default: 5

RETRIES

The number of times the SESM web application resends a RADIUS packet to SSG if no response is received. You cannot override this global value.

Installed default: 3

SECRET

The global value for the RADIUS protocol shared secret used for communication between the SESM web application and the SSGs. This value must match the value entered on the SSG host using the ssg radius-helper key command.

You can create subnet entries in the MBean configuration file to override this global value for specific SSGs.

MASK

The global value for the mask that the SESM web application applies to incoming subscriber IP addresses to derive an IP address for the SSG.

You can create subnet entries in the MBean configuration file to override this global value for specific subnets.

BUNDLE_
LENGTH

The global value for the port bundle length that SSGs use when the host key feature is enabled. Currently, this value can be either:

  • 0—A value of 0 indicates that SSGs are not using the host key feature.

  • 4—The port bundle length is the number of bits that SSG uses to indicate bundled slots. For example, a value of 4 indicates 16 bundled slots. This value must match the value used in the following command on the SSG host:

    ssg port-map length

SSG—Subnet entries

Use subnet entries to override the global values or to map client subnets to specific SSGs when the host key feature is not being used.

Subnet entries use positional arguments.

The call to setSubnetAttribute has four positional arguments:

    1. subnetAddress is the subnet for which you are explicitly setting a value, overriding the globally set value.

    2. subnetMask is the mask that can be applied to the subscriber's IP address to derive the subnet.

    3. argumentName is the argument that you are explicitly setting.

    4. argumentValue is the value for argumentName.

See the "Associating SSGs and Subscriber Requests" section for more information.

AAA

This MBean defines communication between the SESM web application and the RADIUS server, which occurs only when the SESM application is running in RADIUS mode.

Connection

The Configure element in the AAA MBean includes a connection attribute whose value is either:

  • ServiceProfile—The MBean for this connection type includes the servicePassword attribute.

  • GroupProfile—The MBean for this connection type includes the groupPassword attribute.

The connection name identifies the type of request.

throttle

The maximum number of simultaneous requests that SESM web applications can send to a RADIUS server. This is a RADIUS protocol attribute. The RADIUS protocol queues additional requests and issues them as the server returns responses or timeout messages for previous requests.

Installed default: 256

timeOut

The number of seconds the SESM web application waits before timing out RADIUS packets that it sends to the AAA server.

Installed default: 4

retryCount

The number of times the SESM web application resends packets to the AAA server if no response is received.

Installed default: 3

primaryIP

The IP address or the host name of the primary AAA server.

primaryPort

The port number that the primary RADIUS server listens on.

Default: 1812

secret

The shared secret used between the RADIUS server and the SESM web application. The shared secret must be the same for the primary and secondary servers. It must match the secret specified when you configured SESM as a NAS client on the RADIUS server.

Default: cisco.

secondaryIP

The IP address or the host name of the secondary AAA server. If you are not using a secondary RADIUS server, enter the same value used for the primary server.

AAA (continued)

secondaryPort

The port number that the secondary RADIUS server listens on. If you are not using a secondary RADIUS server, enter the same value used for the primary server.

Default: 1812

servicePassword

The password that the SESM web application uses to request service and group profiles from the RADIUS server.

This password must match the value that was configured on the SSG host with the following command:

ssg service-password password

The service-password value must be the same on all SSGs.

Default: servicecisco

groupPassword

The password that the SESM web application uses to request group profiles from the RADIUS server.

Default: groupcisco

Captive Portal

captureToURL

The URL of the NWSP application to which the captive portal application redirects the subscriber's browser. The captive portal application captures the original URL that was requested by the subscriber and forwards it to the SESM web application along with the redirect. The SESM web application can then honor the subscriber's originally requested URL after authentication occurs.

Options context parameters

useIcons

Controls whether the application uses icons or text when it displays, on the web page, the services that a subscriber is authorized to use.

Default: TRUE

confirmAtService
Logon

Controls whether or not the application prompts the user for confirmation before it acts on a request to start a service.

Default: FALSE

confirmAtService
Logoff

Controls whether or not the application prompts the user for confirmation before it acts on a request to log off.

Default: TRUE

confirmAtAccountLogoff

Controls whether or not the application prompts the user for confirmation before it acts on a request to log off of the SESM application.

Default: TRUE

sessionTimeOut

The number of seconds of inactivity allowed before the application closes a session. This value overrides the timeout value in the nwsp.jetty.xml file.

Default: 7200

Arbitrary context parameters

locations and brands

Defines specific locations and brands and the attributes associated with each one.

The NWSP application uses the location context parameter to define an initial URL and meaningful symbols (rivers and churches) related to the location. It uses the brand context parameter to define an initial URL and an email address.

You can define additional context parameters, for any arbitrary use, by copying the format used in the nwsp.xml file to define the location and brand parameters. See the "Sample Application MBean Configuration File" section section for context parameter examples.

To define a context parameter, use separate XML elements to define the following:

  • The context parameter (for example, location)

  • The related subcontext parameters (for example, London, Paris, New York)

  • The attributes that are associated with each subcontext value (for example, URL values, river values, and church values)

For new context parameters to be meaningful, the SESM web application must be changed to do something with the new parameters. You can add new subcontext parameters (new locations or new brands) without changing the web application.

Associating SSGs and Subscriber Requests

A typical SESM deployment consists of multiple SSGs. An SESM web application must know which SSG is handling each subscriber request. This section describes how to configure the associations between a subscriber request and its SSG. It includes the following topics:

Using Host Key with Identical SSG Configurations

The easiest way to associate the correct SSG with each subscriber request is to use the host key port bundle feature on all SSGs, and configure certain attributes identically on all of the SSG hosts. We recommend using host key unless you need backward compatibility with SSD Release 2.5(1).


Note   To use the host key port bundle feature, the Cisco 6400 NRP must be running Cisco IOS Release 12.2(2)B or later and the SSG host key feature must be configured appropriately.

When the host key feature is enabled on an SSG, the SSG replaces the subscriber IP address in the request with a software token (or key) when it forwards the request to SESM. The SESM application uses this key in its responses to SSG, and the SSG does an internal translation to an actual host object.

The key is a unique combination of an SSG IP address from a range of IP addresses and a port number from a range of port numbers, as follows:

IP_address:port

The IP address and port ranges are configured on each SSG. The key uniquely identifies each subscriber currently logged on to SESM, even when multiple subscribers are using the same IP address.

To use the host key feature to associate SSGs, follow these procedures:

    1. Enable and configure the host key feature on all of the SSGs, as described in the "Configuring the Host Key Port Bundle Feature on SSG" section.

    2. Configure the same values on all of the SSG hosts for the following attributes:

      ssg radius-helper authenticationPort
      ssg radius-helper key
      ssg port-map length

    3. Enter these globally configured values when the SESM installation program prompts you for them. These values are reflected in global elements in the <Configure name="SSG"> section of the application MBean configuration file, as the following example illustrates.

Example Using Host Key

When SSG has the host key feature enabled and configured, you can set all parameters globally.

    <Configure name="com.cisco.aggbu:name=SSG"> <Call name="setGlobalAttribute"><Arg>PORT</Arg><Arg>1812</Arg></Call> <Call name="setGlobalAttribute"><Arg>SECRET</Arg><Arg>cisco</Arg></Call> <Call name="setGlobalAttribute"><Arg>MASK</Arg><Arg>255.255.255.255</Arg></Call> <Call name="setGlobalAttribute"><Arg>BUNDLE_LENGTH</Arg><Arg>4</Arg></Call> </Configure>

In this example, all SSGs are configured to use a port of 1812 and a shared RADIUS secret of cisco. The BUNDLE_LENGTH of 4 indicates that host key is configured on all SSGs.

The MASK attribute specifies the mask that SESM applies to the client (source) IP address in a received message to determine the client's subnet, and, from that, the SSG IP address. However, when host key is being used, the client (source) IP address is the SSG IP address. The SESM installation program provides the default mask of 255.255.255.255.

Using Host Key with Varying SSG Configurations

If host key is enabled on all SSGs, but some are configured differently, you can configure the global case and then specifically configure the exceptions. For example, if all but one SSG is assigned the same shared secret, you can configure the shared secret attribute globally, and then add one subnet entry to configure the different secret for the one SSG.

The installation program lets you provide one set of SSG global attribute values and one subnet entry. It records these attribute values in the <Configure name="SSG"> section of the application MBean configuration file, as illustrated in the following example.

Example Using Host Key with One Non-Complying SSG

In this example, host key is enabled on all SSGs. In addition, all SSGs are using the same port, secret, and client IP address mask, except that one SSG uses a different port. In this case, you can set all parameters globally, and then use one subnet entry to define:

In the following example, the SSG that services subnet 10.1.1.0 uses port 1245.

    <Configure name="com.cisco.aggbu:name=SSG"> <Call name="setGlobalAttribute"><Arg>PORT</Arg><Arg>1812</Arg></Call> <Call name="setGlobalAttribute"><Arg>SECRET</Arg><Arg>cisco</Arg></Call> <Call name="setGlobalAttribute"><Arg>MASK</Arg><Arg>255.255.255.255</Arg></Call> <Call name="setGlobalAttribute"><Arg>BUNDLE_LENGTH</Arg><Arg>4</Arg></Call> <Call name="setSubnetAttribute"><Arg>10.1.1.0</Arg><Arg>255.255.255.0</Arg><Arg>PORT </Arg><Arg>1245</Arg></Call> </Configure>

Specifically Mapping SSGs to Subscriber Subnets

Each request arriving at an SESM web application contains a source, or client, IP address. SESM uses this client IP address to determine which SSG should handle each request.

For example, the following subnet entry explicitly sets the SSG IP address to 10.6.7.1 for subnet 10.2.0.0:

    <Call name="setSubnetAttribute">
    <Arg>10.2.0.0</Arg><Arg>255.255.0.0</Arg><Arg>IP</Arg><Arg>10.6.7.1</Arg></Call>

Example Mapping Client Subnets to SSGs

In this example, host key is not being used.In this case, you must explicitly define the mapping from subscriber subnet to the SSG IP address.

    <Configure name="com.cisco.aggbu:name=SSG"> <Call name="setGlobalAttribute"><Arg>PORT</Arg><Arg>1645</Arg></Call> <Call name="setGlobalAttribute"><Arg>SECRET</Arg><Arg>cisco</Arg></Call> <Call name="setGlobalAttribute"><Arg>MASK</Arg><Arg>255.255.255.255</Arg></Call> <Call name="setGlobalAttribute"><Arg>BUNDLE_LENGTH</Arg><Arg>0</Arg></Call> <Call name="setSubnetAttribute"><Arg>10.1.1.0</Arg><Arg>255.255.255.0</Arg><Arg>IP </Arg><Arg>10.21.1.2</Arg></Call> <Call name="setSubnetAttribute"><Arg>10.1.2.0</Arg><Arg>255.255.255.0</Arg><Arg>IP </Arg><Arg>10.21.2.2</Arg></Call> <Call name="setSubnetAttribute"><Arg>10.1.3.0</Arg><Arg>255.255.255.0</Arg><Arg>IP </Arg><Arg>10.21.3.2</Arg></Call> <Call name="setSubnetAttribute"><Arg>10.1.4.0</Arg><Arg>255.255.255.0</Arg><Arg>IP </Arg><Arg>10.21.4.2</Arg></Call> </Configure>

Format of Global and Subnet Attribute Elements

You can set the attributes that associate an SSG with subscriber requests globally, by client subnet, or for a specific client IP address, as follows:

You can also specify some optional session information in a subnet entry, using context parameter values. See Table 4-5.

The format for the global attribute entries is illustrated in the following examples:

    <Configure name="com.cisco.aggbu:name=SSG"> <Call name="setGlobalAttribute"><Arg>PORT</Arg><Arg>1645</Arg></Call> <Call name="setGlobalAttribute"><Arg>SECRET</Arg><Arg>cisco</Arg></Call> <Call name="setGlobalAttribute"><Arg>MASK</Arg><Arg>255.255.255.0</Arg></Call> <Call name="setGlobalAttribute"><Arg>BUNDLE_LENGTH</Arg><Arg>0</Arg></Call> </Configure>

The format for subnet entries is:

    <Call name="setSubnetAttribute">
    <Arg>subnetAddress</Arg> <Arg>subnetMask</Arg> <Arg>argumentName</Arg> <Arg>argumentValue</Arg> </Call>

Where:

subnetAddress is the subnet for which you are explicitly setting a value, overriding the globally set value.

subnetMask is the mask that can be applied to the subscriber's IP address to derive the subnet.

argumentName is the argument that you are explicitly setting. See Table 4-5.

argumentValue is the value for argumentName. See Table 4-5.


Table 4-5: Argument Names and Values for Subnet Entries
argumentName Value argumentValue Explanation

PORT

The SSG port for the specified subnet. Overrides the globally-set SSG port.

MASK

The mask used on the subscriber's IP address to derive the subnet. Overrides the globally-set mask.

SECRET

The shared secret used between SESM and SSG. Overrides the globally-set shared secret.

BUNDLE_LENGTH

The host key bundle length used on the SSG. Overrides the globally-set bundle length.

The bundle length is the number of bits that SSG uses for the port bundle feature. For example, a value of 4 indicates 16 bundled slots. A value of 0 indicates that the SSG is not using the host key and port bundle mechanism.

This value must match the value used in the following command on the SSG host:

    ssg port-map length

To determine how SSG has configured the port bundle length, use the show run command on the SSG host.

IP

Explicitly sets the IP address for the SSG that services the specified subnetAddress.

SESSION_LOCATION

The location associated with the specified subnet. Valid values are defined as subcontext parameters under the location context parameter in the nwsp.xml configuration file. The installed file defines the following locations: London, Paris, and New York.

For the context parameters to have meaning, the SESM web application must support them. The NWSP application uses the location context parameter to define an initial URL and meaningful symbols related to the location.

SESSION_BRAND

The brand of service associated with the specified subnet. Valid values are defined as subcontext parameters under the brand context parameter in the nwsp.xml configuration file. The installed file defines the following brands: acme, cisco, silver, and gold.

For the context parameters to have meaning, the SESM web application must support them. The NWSP application uses the brand context parameter to define an initial URL and an email address.

Configuring RDP

This section describes how to configure the RDP application. The section includes the following topics:

Also see the "Sample RDP MBean Configuration File" section.

RDP Modes

RDP can run in two modes:

You choose the mode during RDP installation. The content of the rdp.xml file is significantly different depending on the mode. Therefore, to change the mode, we recommend reinstalling the RDP component. (Choose a Custom installation to reinstall a single component.)

RDP Attributes

The MBean configuration file for RDP is located in:

    rdp
      config    rdp.xml

The rdp.xml file configures the following MBeans:

Table 4-6 explains the configurable attributes in these MBeans.


Table 4-6: Attributes in the RDP MBean Configuration File
MBean Attribute Name Explanation

Logger

See the description for Logger MBean in Table 4-4.

RDPPacketFactory

The only attributes in this MBean that administrators are expected to change are the password attributes associated with service profile requests. These password attributes are used to identify a service request as one of the following: a single service request, a service group request, or a next hop table request. SSG sets the password in the request; RDP interprets the password. You must configure the values on both sides, as follows:

  • On SSG, you set the values for these three passwords using IOS commands.

  • On RDP, you set the values for the three passwords as described here.

If the password in a request from SSG does not match one of the three values you set on the RDP side, the request is discarded.

You can find the password attributes in this MBean by searching the file for the following string:

    <arg>PASSWORD:

Note   There are no security implications to these attributes. It might be helpful to think of them as identifying keys, rather than passwords.

The three password attributes are:

    ssg service-password servicePassword
    ssg next-hop download nextHopTableName password

See "RDP Packet Handlers," for more information about how RDP processes requests from SSG.

RDP

secret

Enter the RADIUS client shared secret to be used for communication between SSG and RDP. It must be a different value from the shared secret used for RDP to RADIUS communication.

The installation program's displayed default is cisco.

localIPAddress

Enter the IP address or host name of the RDP.

Note   This value cannot be localhost (127.0.0.1)

localPort

Enter the port on which the RDP will listen.

The installation program's displayed default is 1812.

minThreads

Sets the minimum number of threads that RDP will maintain during periods of low load. RDP will always have system resources allocated for this number of threads.

Installed default: 10

maxThreads

The total number of simultaneous requests that the RDP can handle. If the RDP is receiving more requests than the current setting, and the RDP host machine is not processor-bound, then you can increase this number for a potential performance improvement.

Installed default: 256

maxIdleTimeMs

The number of milliseconds that a thread can remain idle before the system deallocates its resources.

Installed default: 10000

ManagementConsole

See the description for "ManagementConsole" in Table 4-4.

AAA

This MBean applies only when RDP is configured in Proxy mode.

Connection

The Configure tag for the AAA MBean includes a connection attribute whose value is either:

The RDP proxy handlers use the connection name to identify the AAA server to proxy the request to.

throttle

The maximum number of simultaneous requests that RDP can send to a RADIUS server. This is a RADIUS protocol attribute. The RADIUS protocol queues additional requests and issues them as the RADIUS server returns responses or timeout messages for previous requests.

Installed default: 256

timeOut

The number of seconds RDP waits before timing out RADIUS packets that it sends to the AAA server.

Installed default: 4

retryCount

The number of times RDP resends packets to the AAA server if no response is received.

Installed default: 1

primaryIP

Enter the IP address or the host name of the primary RADIUS AAA server that you want RDP to communicate with.

primaryPort

Enter the port number on the primary RADIUS server host that the RADIUS server listens on.

AAASecret

Enter the RADIUS client shared secret used between RDP and the RADIUS server. The shared secret must be the same for both servers.

The installation program's displayed default value is cisco.

secondaryIP

Enter the IP address or the host name of the secondary RADIUS server. If you are not using a secondary RADIUS server, enter the same value used for the primary server.

secondaryPort

Enter the port number on the secondary RADIUS server host that the RADIUS server listens on. If you are not using a secondary RADIUS server, enter the same value used for the primary server.

Configuring CDAT

This section describes how to configure the CDAT application. The section includes the following topics:

Also see the "Sample CDAT MBean Configuration File" section.

Cookies Required

Make sure that the cookies feature is enabled on the browser where you are running CDAT. If the CDAT application seems to log itself off unexpectedly, check your cookies setting.

CDAT Attributes

The CDAT MBean configuration file is located in:

    cdat
      config    cdat.xml

The cdat.xml file configures the following MBeans:

Table 4-7 explains the configurable attributes in this MBean.


Table 4-7: Attributes in the CDAT MBean Configuration File
MBean Name Attribute Name Explanation

Logger

See the description for Logger MBean in Table 4-4.

ManagementConsole

See the description for ManagementConsole in Table 4-4.

CDAT

sessionTimeout

The maxmimum period of inactivity allowed during a CDAT login, after which the user will be logged out. Values are in seconds. A negative value will prevent the user from ever being logged out. Changes will only take effect for subsequent logins.

Default: 600

maxVariables

The maximum number of page/page instance variables allowed for each CDAT session. This number affects how many pages can be visited before their state is lost, though it is not a one-to-one mapping. If you see many StateTimedOut errors, you should increase this number.

Default: 40

queryMaxResults

The maximum number of results to return from any one directory query. Changes will take immediate effect. A value of zero will remove any limits.

Default: 500

queryTimeout

The timeout (in milliseconds) for directory queries. Changes will take immediate effect. A value of zero will cause an infinite timeout.

Default: 0

Configuring DESS

This section describes how to configure the DESS component. The section includes the following topics:

Also see the "Sample DESS MBean Configuration File" section.

DESS Attributes

The MBean configuration file for DESS is located in:

    dess-auth
      config    config.xml

This file applies to applications that incorporate the Dess and Auth APIs:

If these applications are installed on the same machine, the same config.xml file applies to both of them. If the applications are installed on different machines, the DESS component is installed with each of them, and each config.xml file can contain different attribute values.

The config.xml file for DESS contains the following MBean:

Table 4-8 explains the configurable attributes in this MBean.


Table 4-8: Attributes in the Dess-Auth MBean Configuration File
Object Name Attribute Name Explanation

Directory MBean

factory

The full class name of the JNDI connection factory.

poolSize

The number of active connections allowed to the LDAP server used for authorization.

URL

The URL of the LDAP server used for authorization.

principal

The name used when connecting to the LDAP server.

credentials

The credentials (such as password) used for connecting to the LDAP server.

context

The default LDAP context used for LDAP operations.

alwaysGetAllAttributes

If set to true then all the attributes of an LDAP entry are returned for every query.

traceFileName

The name of the directory log file.

traceLevel

Should be one of: NONE, ERROR, BRIEF, VERBOSE, or DEBUG.

printTraceToConsole

If set to true, the application sends trace messages to the console as well as writing them into the log file.

stackTrace

If set to true, print a stack trace with each trace message.

cacheMaxObjects

Specifies the maximum number of software objects to hold in the cache. Objects represent subscribers, services, privileges, roles, and so on.

When the cache contains cacheMaxObjects, old objects are deleted from cache, regardless of available cache space.

Set this value high to allow the available cache space to be the determining factor for cache management.

Installed default: 50000

Directory MBean

cacheMinFreeMem

Specifies the percentage of Java virtual memory that must remain available (that is, not used by the cache) after the application is loaded into memory.

You can calculate the specific amount of memory available for the cache as follows:

cacheSize = (JavaVM - applCodeSize) * (100% - cacheMinFreeMem)

Where:

JavaVM is the maximum virtual memory size specified at application startup time with the jvm argument. The installed startup scripts use the following values:

  • The startNWSP script uses 64 MB

  • The runrdp script uses 20 MB

applCodeSize is the application size. The NWSP is approximately 18 MB.

cacheMinFreeMem specifies the percentage of Java virtual memory that must remain available after the application is loaded into memory. The installed default value is 10. If NWSP and RDP applications are installed on the same machine, the same cacheMinFreeMem attribute value applies to both applications.

For example, using all of the installed default values, the cacheSize for the NWSP application is 90% of 14 MB, or 12.6 MB:

cacheSize = (32 MB - 18 MB) * (100% - 10%)

Installed default: 10

cacheSessionTimeout

Specifies the timeout of inactive client sessions in seconds.

Installed default: 600

cacheExpireInterval

Specifies the interval in seconds after which the cache attempts to expire objects.

Note   Do not set this attribute to 0. A value of 0 causes every request to go to the directory, bypassing caching and any memory storage from a recent request for the same object. A value of 0 would degrade performance substantially.

Installed default: 600

cacheObjectTimeout

Specifies the number of seconds before objects time out.

Installed default: 600

Extending the Directory Schema and Installing Initial RBAC Objects

An SESM deployment running in DESS mode requires the following update activities on the LDAP directory:

The DESS installation process optionally performs these two update activities. If you did not choose these options during the installation, you must do them before running CDAT or an SESM application running in DESS mode.


Note   If the SESM components are distributed among different servers, which means that DESS might be installed in more than one location, you only need to perform these update activities one time against the LDAP directory.

To perform these updates after the initial DESS installation, use either of the following procedures:

Using a Custom Installation to Update the Schema and Install RBAC Objects

To use the custom installation process to extend the directory schema and install initial RBAC objects, follow these procedures:


Step 1   Make sure the LDAP directory server is running.

Step 2   Make sure you know the following user IDs and passwords:

Step 3   Execute the SESM installation program on a server that has network access to the LDAP directory.

Step 4   When the installation program prompts for setup type, choose Custom.

Step 5   When the installation program prompts for the components to install, choose DESS.

Step 6   When the installation program prompts for directory connection information, provide correct information to access the directory. This includes the names of the organization and organizational unit you created to hold the SESM data.

Step 7   When the installation program displays the options, click the Update schema and Install RBAC check boxes.


Using LDIF Commands to Update the Directory Schema

To use LDIF commands to manually update the directory, follow these procedures:


Step 1   Make sure the LDAP directory server is running.

Step 2   Make sure you have a user ID and password for the directory that allows you to update the schema.

Step 3   Obtain the required updates from the following location under your installation directory. Choose NDS or Netscape, depending on the LDAP directory you are using:

dess-auth
    schema
      NDS Netscape

You need to apply the contents of all of the ldf files found under the NDS or Netscape directories:

    authattr.ldf authclas.ldf dessattr.ldf dessclas.ldf Policy15.ldf

Step 4   Use the ldapmodify command to apply all of the preceding files to your directory.

On successful completion, you have applied all of the required updates.


Using Manual Tools to Create Initial RBAC Objects

Some initial RBAC rules and roles must be loaded into the directory before any administrator can log into CDAT to create additional objects. The easiest way to load these top level objects is to allow the installation program to do it. However, you can also obtain them by loading the sample RBAC data files that are installed with DESS or by using your own data generating tool. See the Cisco Distributed Administration Tool Guide for information about the initial RBAC objects and loading the sample data.

Configuring Specific Features

Table 4-9 summarizes how to enable or disable some of the major features in an SESM deployment.


Table 4-9: Configuration Requirements for Specific Features
Feature Configuration Requirements

Single sign-on

On SESM Host

Edit the following line in the application MBean configuration file (for example, nwsp/config/nwsp.xml):

<Set name="singleSignOn" type="boolean">true</Set>

Automatic connections

On SSG Host

No action required.

On SESM Host—RADIUS Mode

In RADIUS mode, the autoconnect feature is always on, regardless of parameter settings. In RADIUS mode, the SSG always performs automatic service connections for all services marked as auto connect in a subscriber's profile.

In Subscriber's Profile—RADIUS Mode

The A attribute in a subscriber's profile marks a service as one that should be automatically connected for the subscriber. For example:

user5 Password = "cisco"
Service-Type = Framed-User,
Account-Info = "
Ainternet-green"

On SESM Host—DESS Mode

In DESS mode, the SSG performs automatic connections if it has the service list. If SSG does not have the service list, the SESM application can perform the automatic connections. During RDP installation, the Add Services option configures RDP to either:

  • Return a service list to SSG—In this case, RDP includes the subscriber's service list and related information in replies to SSG, and SSG performs automatic connections for services marked for autoconnection in the subscriber's profile.

The service information consumes memory on the SSG host.

  • Not return a service list to SSG—In this case, SSG cannot perform automatic connections. The advantage to this configuration is that it saves memory on the SSG host.

In this case, you can configure the SESM application to perform automatic connections. The following line in the application MBean configuration file (for example, nwsp/config/nwsp.xml) controls whether the SESM web application performs automatic connections:

    <Set name="autoConnect" type="boolean">false</Set>
Change the value to true to enable automatic connections by the SESM web application.

To change the setting of the RDP service list option, either reinstall RDP or edit the configuration files to enable the correct set of packet handlers. See "RDP Packet Handlers," for information about the packet handlers that are used in the various configurations.

In Subscriber's Profile—DESS Mode

See the Cisco Distributed Administration Tool Guide for instructions about marking services for autoconnection in subscriber profiles.

Application Interface Options

On SESM Host

Edit the following lines in the application MBean configuration file (for example, nwsp/config/nwsp.xml):

<Put name="useIcons" type="boolean">TRUE</Put> <Put name="confirmAtServiceLogon" type="boolean">FALSE</Put> <Put name="confirmAtServiceLogoff" type="boolean">TRUE</Put> <Put name="confirmAtAccountLogoff" type="boolean">TRUE</Put> <Put name="sessionTimeOut" type="String">7200</Put>

Captive portal

On SSG Host

Enable the TCP redirect feature using the http-redirect Cisco IOS commands.

ssg http-redirect group captive-portal-app1 server 10.1.2.50 80 ssg http-redirect unauthorized-user group captive-portal-app1

Note   The format of the http-redirect commands might change in the next release of Cisco IOS.

On SESM Host

To enable the captive portal application, choose the Run Captive Portal option when you install the NWSP application. This option sets the captiveportal.home Java system property in the generic startup script.

To disable captive portal, edit the generic startup script (for example, jetty/bin/start.sh) and remove the captiveportal.home system property.

To change the name of the captive portal application being called, edit the third argument in the Call element in the container MBean configuration file (for example, jetty/config/nwsp.jetty.xml):

<!-- Captive portal web application --> <Call name="addWebApplication"> <Arg></Arg> <Arg>/</Arg> <Arg><SystemProperty name="install.root" default="."/>/captiveportal/docroot</Arg> <Arg><SystemProperty name="jetty.home" default="."/>/config/webdefault.xml</Arg> <Arg type="boolean">FALSE</Arg> </Call>

To configure the SESM web application to which the captive portal application redirects subscribers, edit the following element in the application MBean configuration file (for example, nwsp/config/nwsp.xml):

<Configure name="com.cisco.aggbu:name=captiveportal"> <Set name="captureToURL">
http://localhost:80/decorate/pages/home.jsp</Set> </Configure>

Walled garden

In SSG

Enter Cisco IOS ssg commands. For example:

>ssg open-garden opengarden-xyz.com >local-profile opengarden-xyz.com > attribute 26 9 251 "R10.1.1.0;255.255.255.255" > attribute 26 9 251 "D10.1.1.10" > attribute 26 9 251 "Oxyz.com;zap.com"

In SESM

Create JSPs that implement the desired interface. See the Cisco Subscriber Edge Services Manager Web Developer Guide for information.

Retail pages and service ads

In SSG

No configuration required.

In SESM

Create JSPs that implement the desired interface. See the Cisco Subscriber Edge Services Manager Web Developer Guide for information.

Host Key

In SSG

Enable the SSG host key feature using the Cisco IOS ssg port-map commands.

    ssg port-map enable ssg port-map source ip loopback 0 ssg port-map destination range lowPort to highPort ip SSDaddress

Disable the host key feature using the following command:

ssg port-map disable

In SESM

Edit the BUNDLE_LENGTH attributes in the application MBean configuration file (for example, nwsp/config/nwsp.xml):

<Call name="setGlobalAttribute"><Arg>BUNDLE_LENGTH</Arg><Arg>0</Arg></Call>

In the SSG MBean, the BUNDLE_LENGTH attributes must match the bundle lengths specified on the SSG side.

Note   A BUNDLE_LENGTH of zero indicates that host key is not being used.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Wed Jul 24 12:21:33 PDT 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.