cc/td/doc/solution/sesm/sesm_315
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

SESM Introduction

SESM Introduction

This chapter introduces the Cisco Subscriber Edge Services Manager (Cisco SESM) Release 3.1(5). The chapter includes the following topics:

SESM Overview

The Cisco Subscriber Edge Services Manager (SESM) is an extensible set of applications for providing on-demand value-added services and access control at the network edge. Internet service providers (ISPs) and network access providers (NAPs) deploy SESM solutions to provide value-added services to their subscriber base or management capabilities to their administrators.

SESM solutions consist of customized web portals that implement the deployer's business model, show branded identities, offer customized and branded web page content, and control the subscriber experience with personalized web page content based on subscriber attributes such as location, access device, browser preferences, language, and interests. Captive portal features can further control subscriber experiences by capturing subscriber requests and redirecting browsers.

SESM Value-Added Services

Some examples of value-added services that can be offered through SESM portal applications are:

SESM Architecture

SESM solutions can be deployed independently of the access network, access type and access device. Subscribers access SESM portals using any Internet browser on any access device. They do not need to download any software or plug-ins. Supported access technologies include

Supported protocols include:

SESM is inherently scalable with a stateless architecture to support transparent load balancing and failover. SESM applications can run on any platform that supports the Java Runtime Environment (JRE). Platforms tested in our labs include Sun Solaris, Windows NT, Windows 2000, Red Hat Linux, and SuSE Linux.

SESM Applications

SESM is an extensible Java2 Enterprise Edition (J2EE) compliant suite of applications and components for developing, deploying, and managing customized and branded web portal applications. SESM Release 3.1(5) includes the following applications:

SESM solutions work in conjunction with additional network software components. Depending on the goals of the solution, SESM deployments might require one or more of the following components:

The "Related Software" section describes these components.

SESM Packages

The SESM applications are available in the following packages:

Figure 1-1 shows the software included in the SESM packages. Each package is available in versions appropriate for the Sun Solaris, Linux, or Windows platforms.


Note   The SESM product was previously called the Cisco Service Selection Dashboard (Cisco SSD).


Figure 1-1: SESM Release 3.1(5) Bundled Packages


SESM Component Descriptions

This section describes the SESM product. Topics in this section are:

CDAT Management Application

The Cisco Distributed Administration Tool (CDAT) is a web-based management tool for administrators. CDAT is a J2EE web application. It runs in a J2EE container and uses the services of a JMX server for configuration.

With CDAT, administrators can:

For more information, see:

RDP Server

The RADIUS Data Proxy (RDP) server is a RADIUS server that you can configure to:

RDP is a Java2 application that uses the services of a JMX server for configuration. It is not a web application and therefore does not run in a J2EE container.

For more information about configuring RDP, see the Cisco Subscriber Edge Services Manager Installation and Configuration Guide.

Web Development Kit

When you install the SESM sample portal applications, the SESM libraries and other components required to build your own customized portal application are also installed. The installation provides the following items:

See the Cisco Subscriber Edge Services Manager Web Developer Guide for information about developing a customized SESM portal application. See the Cisco Subscriber Edge Services Manager Installation and Configuration Guide to deploy and configure a customized application.

Sample Portal Applications

The first step toward developing a customized SESM portal is to install and configure the sample portals in a development environment. You can create the desired look and branded aspects of a customized SESM portal by altering one of these sample applications or writing your own application using one of the samples as an example.

The SESM sample applications are fully functioning web applications that were built using the SESM development library. These applications use the services of the Jetty web server and the JMX management server.

The sample portals installed with SESM are:

Deployers can customize this application to detect the type and make of various WAP devices used by their subscribers, and tailor the pages to the features of each device.

Deployers can customize this application to detect the type and make of various PDA devices used by their subscribers, and tailor the pages to the features of each device.

The Cisco Subscriber Edge Services Manager Web Developer Guide provides detailed information about each of these sample portal applications.

Sample Captive Portal Solution

The sample captive portal solution installed with SESM works in conjunction with the SSG TCP redirect feature to provide enhanced user experiences in the case of unauthenticated network access or unauthenticated or unauthorized service access. Rather than simply being rejected, the subscriber sees a portal page with opportunities for logging on or gaining service authorization. The captive portal features also provide a way to present messages and advertisements to subscribers at initial logon and at timed intervals.

A sample captive portal solution is included with SESM that illustrates all supported types of redirection. The sample solution includes the following applications:

Most deployers will use the captive portal application as installed but provide their own content applications for the HTTP redirections. The content applications can be any web application. When they are SESM web portals, they can use all of the features in the SESM web development kit, including the device and locale awareness features.

See the Cisco Subscriber Edge Services Manager Installation and Configuration Guide for more information about captive portal features and how to install and configure the captive portal solution.

Bundled SESM RADIUS Server

All of the SESM packages include the bundled SESM RADIUS server. The SESM RADIUS server is suitable for developing, testing, and demonstrating SESM deployments. It reads and updates profiles in a Merit flat file format.

The bundled SESM RADIUS server comes with the following attributes internally predefined:

A configuration feature, the RADIUSDictionary MBean, lets you easily define additional attributes.

Bundled J2EE Components

The following J2EE components are bundled with SESM:

http://java.sun.com/products/JavaManagement/

The sample SESM portal applications and CDAT are installed with configuration files and startup scripts that are ready to run using the Jetty web server and the Sun example JMX server. RDP is installed with configuration files and a startup script that is ready to run using the JMX server.

http://jetty.mortbay.org/

Portal Modes

You can install and run the sample portal applications (NWSP, WAP, and PDA) in any of the SESM deployment modes:

The same SESM application programming interface (API) is used to develop and customize applications intended for either the RADIUS or the LDAP modes. Applications intended for LDAP mode deployment can include additional features provided by SPE. The Cisco Subscriber Edge Services Manager Web Developer Guide describes how to create applications for both RADIUS and LDAP mode deployments.

RADIUS Mode

In a RADIUS deployment, a RADIUS server stores subscriber and service profiles. RADIUS refers to the Remote Authentication Dial-In User Service (RADIUS) database and server that performs authentication, authorization, and accounting (AAA) services for network connections. SESM deployments work with any RADIUS server that accepts vendor-specific attributes (VSAs).

LDAP Mode

An LDAP deployment stores subscriber and service profile information in a Lightweight Directory Access Protocol (LDAP)-compliant directory. An LDAP deployment requires the Cisco Subscriber Policy Engine (SPE), which is available from the SESM installation package if your SESM purchase license allows it.

Demo Mode

The Demo deployment mode allows the portal to run without access to other solution components, such as an SSG, a RADIUS server, or an LDAP directory. Standalone Demo mode is only intended for demonstration purposes. Demo mode is not in any way representative of Cisco SESM performance in an end-to-end solution with actual network components.

Demo mode demonstrates the capabilities of both RADIUS and LDAP modes.

Related Software

This section describes the software components, in addition to the SESM applications, that might be required in SESM deployments. Each SESM solution has its own requirements regarding these components. The additional software components are:

J2EE Components

The SESM applications require J2EE-compliant servers. The SESM packages bundle suitable J2EE components required for running the SESM applications.


Note   The SESM packages do not include a Java Software Development Kit (JSDK), which is required for SESM development. See the Cisco Subscriber Edge Services Manager Web Developer Guide for recommended JSDK version numbers.

J2EE Server Requirements

The SESM portal applications and CDAT are J2EE applications. They require an HTTP (or HTTPS) listener and must run in a J2EE-compliant server container. RDP does not run in a J2EE server container.

During SESM installation, the sample portal applications and CDAT and their corresponding configuration files and startup scripts are set up to use the Jetty server components from Mort Bay Consulting. If desired, web developers at your site can deploy a J2EE-compliant server other than the Jetty server.


Note   Before deploying a J2EE server other than the Jetty server, determine whether your SESM solution requires the port-bundle host key feature on the Cisco Service Selection Gateway. The Jetty server is currently the only server that supports this feature. See the Cisco Subscriber Edge Services Manager Installation and Configuration Guide for more information.

JMX Server Requirements

All of the SESM applications (portals, RDP, and CDAT) require the services of a Java Management Extensions (JMX) server.

The installed sample applications, the configuration files, and the startup scripts are set up to use the Sun example JMX server from Sun Microsystems. The SESM installation program installs the JMX server along with the Jetty server. If desired, web developers at your site can deploy a JMX-compliant server other than the Sun example server.

Cisco Security Policy Engine

The Cisco Security Policy Engine (SPE) is required in solutions that incorporate:

SPE software is bundled in the SESM-SPE package.

Introduction to Cisco SPE

The Cisco Subscriber Policy Engine (SPE) is a policy server specifically customized to provide granular subscriber service policy. SPE combines role-based access control (RBAC) functionality with an open policy server. Service providers can create differentiated subscriber groups. Service and content providers can use the SPE to provide value added and differentiated services to the subscriber population.

SPE is required when SESM is deployed in LDAP mode to provide the following enhanced features and capabilities:

Figure 1-2 shows the relationship between the SESM and SPE products.


Figure 1-2: SESM Components in LDAP Mode


SPE Software

The SESM-SPE package includes SPE. When you install applications in LDAP mode using the SESM-SPE package, the installation includes the following items:

Further Information about SPE

See the Cisco Distributed Administration Tool Guide for information about the RBAC model, the DESS and AUTH extensions to an LDAP directory, and how to develop subscriber and service profile information in the RBAC model.

Cisco Service Selection Gateway

The Cisco Service Selection Gateway (SSG) is a software feature module embedded in the Cisco IOS software. SESM solutions that perform service connection require the SSG. SSG can operate in standalone mode to provide Layer 2 service connection support, or it can be configured to work with SESM, which offers enhanced service-related features to subscribers.

In SESM deployments, SSG performs authentication and service connection tasks on behalf of the SESM portal. Other SSG features important in SESM deployments include:

See the following SSG documentation for descriptions of these and other SSG features:

http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122limit/122b/122b_4/

The SSG runs on a Cisco router or other Cisco device. The Cisco SSG feature is currently supported on the following platforms:

RADIUS Server

The following SESM deployments require a RADIUS server:

SESM works with any RADIUS server that accepts vendor-specific attributes (VSAs). Cisco VSAs define the subscriber and service profile information required in the SESM deployments. One RADIUS server to consider in your deployment is the Cisco Access Registrar, a carrier class RADIUS platform that is fully tested with SESM.

The Cisco Subscriber Edge Services Manager Installation and Configuration Guide describes the Cisco VSAs used in SESM deployments. The guide also describes how to configure a RADIUS server for SESM deployment, including specific information regarding the Cisco Access Registrar.

LDAP Directory

SESM portal applications deployed in LDAP mode require access to an LDAP-compliant directory. An LDAP directory allows interactive updates to information stored in the directory. The LDAP mode uses this update capability to offer SESM features that the RADIUS mode cannot provide, such as:

Some LDAP directories to consider in your deployment are:

The Cisco Subscriber Edge Services Manager Installation and Configuration Guide describes how to configure an LDAP server for SESM deployments, including specific information regarding iPlanet and NDS.

Supported Platforms

This section describes the application servers and browsers for SESM deployments.

Application Servers

SESM applications can run on any platform that supports the Java Runtime Environment (JRE). Table 1-1 lists the platforms tested in our labs.


Note   The SESM applications include the web portal applications, the Captive Portal application, RDP, and CDAT.


Table 1-1: Server Systems for the SESM Applications
Platform Specifications

Solaris

  • Sun Ultra10 or Sun E250 (or later version)

  • Solaris Version 2.6 (or later version) operating system

Windows NT

  • Pentium III (or equivalent) processor

  • Windows NT Version 4.0, Service Pack 5 (or later version)

Windows 2000

  • Pentium III (or equivalent) processor

Linux

  • Red Hat Linux Version 7.l

  • SuSE Linux

Browsers

Subscribers can use any type of web browser to access SESM portal applications. However, each web browser and access device has its own limitations, such as differences in display capabilities. Developers of SESM portals must consider the end users of a deployed application and design the application to accommodate their subscribers' media and browser versions.

Table 1-2 lists the browsers and devices for which the SESM sample portal applications are designed. The Cisco Subscriber Edge Services Manager Web Developer Guide includes information about obtaining and configuring simulators.


Note   These browser limitations apply only to the sample applications and are listed to ensure predictable results during demonstrations.


Table 1-2: Browsers for the SESM Sample Portal Applications
SESM Portal Application Device Other Requirements

NWSP
Message Portal

WAP

WAP devices and simulators

PDA

PDA devices and simulators


hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Oct 28 07:51:14 PST 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.