05-Layer 2—WAN Access Configuration Guide

HomeSupportResource CenterTechnical DocumentsConfigure & DeployConfiguration GuidesH3C MSR810[830][2600][3600] Routers Configuration Guides(V7)-R0821-6W50005-Layer 2—WAN Access Configuration Guide
10-IPoE configuration
Title Size Download
10-IPoE configuration 461.23 KB

Contents

Configuring IPoE·· 1

About IPoE· 1

IPoE access modes· 1

IPoE users· 1

IPoE session· 2

IPoE addressing· 2

IPoE access procedure· 3

Support for MPLS L3VPN· 7

Support for ITA· 7

Restrictions: Licensing requirements for IPoE· 7

Restrictions and guidelines: IPoE configuration· 7

IPoE tasks at a glance· 7

Prerequisites for IPoE· 8

Enabling IPoE and setting the IPoE access mode· 8

Configuring dynamic individual users· 9

Dynamic individual user tasks at a glance· 9

Enabling dynamic individual users· 9

Configuring authentication user naming conventions for dynamic individual users· 10

Configuring passwords for dynamic individual users· 11

Configuring ISP domains for dynamic individual users· 12

Configuring the maximum number of dynamic IPoE sessions· 13

Configuring trusted DHCP options for DHCP users· 13

Configuring trusted source IP addresses for unclassified-IP users· 14

Configuring static individual users· 14

Static individual user tasks at a glance· 14

Enabling static individual users· 15

Configuring static IPoE sessions· 15

Configuring authentication user naming conventions for static individual users· 16

Configuring passwords for static individual users· 16

Configuring ISP domains for static individual users· 17

Configuring the static IPoE whitelist feature· 17

Configuring leased users· 18

Leased user tasks at a glance· 18

Configuring interface-leased users· 18

Configuring subnet-leased users· 19

Configuring ISP domains for leased users· 19

Configuring service-specific ISP domains· 20

About configuring service-specific ISP domains· 20

Restrictions and guidelines· 20

Configuring service-specific ISP domains for IPv4 users· 20

Configuring service-specific ISP domains for IPv6 users· 20

Configuring the quiet timer for users· 21

Configuring online detection for IPoE users· 21

Configuring NAS-Port-Type for an interface· 22

Setting the traffic statistics update timer for IPoE sessions· 22

Enabling IPoE user logging· 23

Configuring NAS-Port-ID formats· 24

About configuring NAS-Port-ID formats· 24

Configuring the NAS-Port-ID format for IPv4 users· 24

Configuring the NAS-Port-ID format for IPv6 users· 24

Display and maintenance commands for IPoE· 25

Display and maintenance commands for IPv4 IPoE· 25

Display and maintenance commands for IPv6 IPoE· 26

IPoE configuration examples· 28

Example: Configuring an unclassified-IP user 28

Example: Configuring a DHCP user 30

Example: Configuring an IPv6-ND-RS user 32

Example: Configuring subnet-leased users· 33

Example: Configuring an interface-leased user 37

Example: Configuring a VPN DHCP user 39

Example: Configuring online detection· 42

Troubleshooting IPoE· 43

DHCP clients failed to come online· 43

Inter-card traffic statistics failure on an aggregate interface· 44

 


Configuring IPoE

About IPoE

IP over Ethernet (IPoE) enables a BRAS to connect and authenticate users over IPoE connections.

As shown in Figure 1, a BRAS connects hosts over IPoE connections, and provides AAA, security, and DHCP services for the hosts. This solution does not require the hosts to install any client software.

Figure 1 IPoE network diagram

 

IPoE access modes

IPoE supports Layer 2 and Layer 3 access modes.

·     Layer 2 access mode

Hosts directly access the BRAS. The hosts connect to the BRAS directly or through Layer 2 devices. The BRAS uses MAC addresses to identify the hosts.

·     Layer 3 access mode

Hosts use routing to access the BRAS. The hosts connect to the BRAS directly or through Layer 3 devices. When a Layer 3 device resides between the hosts and the BRAS, the source MAC address of packets received by the BRAS is the MAC address of the Layer 3 device. Therefore, the BRAS uses IP addresses or VLAN IDs to identify hosts.

IPoE users

IPoE users include individual users and leased users.

Individual users

Individual users use independent IPoE services. The BRAS authenticates, authorizes, and bills individual users based on user location and packet information. Individual users include dynamic and static individual users.

·     Dynamic individual users

IPoE defines the following dynamic individual users:

¡     DHCP user—Sends DHCP packets to trigger IPoE session establishment.

¡     IPv6-ND-RS user—Sends IPv6 ND RS packets to trigger IPoE session establishment.

¡     Unclassified-IP userSends packets other than DHCP and IPv6 ND RS packets to trigger IPoE session establishment.

·     Static individual users

Static individual users trigger IPoE session establishment by sending IP packets. If an IP packet matches a manually configured IPoE session, the BRAS authenticates the user and establishes an IPoE session.

Leased users

Leased users include the following types:

·     Interface-leased user—Represents hosts that rent the same interface.

·     Subnet-leased user—Represents hosts that rent a subnet of an interface.

The BRAS automatically uses the credentials configured for a leased user to perform authentication. Users are not required to send IP packets to trigger authentication.

IPoE session

IPoE sessions include dynamic and static sessions.

Dynamic IPoE session

IPoE sessions established for dynamic individual users are dynamic IPoE sessions.

The BRAS disconnects a dynamic IPoE session in one of the following cases:

·     The AAA-authorized service expires.

·     The AAA server logs out the user.

·     The user traffic is less than the authorized traffic during the idle-timeout time.

·     The BRAS cannot detect the user after the number of detection attempts reaches the maximum.

·     The IP address lease expires.

·     The IPoE session is restarted.

·     The access interface goes down.

Static IPoE session

IPoE sessions established for static individual users, interface-leased users, and subnet-leased users are static IPoE sessions.

The BRAS creates a static IPoE session based on configured information after you enable IPoE on an interface. The BRAS initiates user authentication based on the configured username and password upon receiving IP packets from static individual users. Static IPoE sessions can only be deleted manually at the CLI.

For static individual users, the BRAS creates a static IPoE session based on configured information after you enable IPoE on an interface. The BRAS initiates user authentication based on the configured username and password upon receiving IP packets from static individual users.

For interface-leased users and subnet-leased users, the BRAS creates a static IPoE session based on configured information after you enable IPoE on an interface. The BRAS initiates user authentication based on the configured username and password.

IPoE addressing

IPoE addressing varies with user types.

·     DHCP users obtain IP addresses in the following sequence:

¡     Obtain IP addresses from the AAA-authorized IP address pool.

¡     Obtain IP addresses from the IP address pool configured in the ISP domain if the AAA server does not authorize any IP address pools.

¡     Obtain IP addresses in the same network segment as the interface IP address if no IP address pool is configured in the ISP domain.

·     IPv6-ND-RS users obtain the AAA-authorized IPv6 prefix from IPoE, and generate an IPv6 address based on the prefix. If no AAA-authorized IPv6 prefix exists, the user adopts the first 64-bit IPv6 prefix of the interface to generate an IPv6 address.

·     Other users adopt static IP addresses or obtain IP addresses from the DHCP server without using IPoE.

IPoE access procedure

IPoE access includes the following steps:

1.     The BRAS initiates authentication.

The BRAS obtains information from user packets or IPoE sessions statically configured, and sends authentication requests.

2.     The AAA server authenticates users.

The AAA server completes user authentication and sends the result to the BRAS. The security server, if configured, completes security authorization and sends the result to the BRAS.

3.     (Optional.) DHCP allocates IP addresses.

The DHCP server assigns an IP address to a DHCP user and IPoE assigns an IPv6 prefix to an IPv6-ND-RS user.

4.     The BRAS performs access control.

The BRAS permits the user to get online and performs access control and billing based on the authorized result.

Access procedure for DHCP users

This section uses a DHCPv4 user as an example to illustrate the access procedure for DHCP users. The BRAS operates as a DHCP relay.

Figure 2 Access procedure for a DHCPv4 user

1.     The DHCP client sends a DHCP-DISCOVER message to the BRAS.

2.     The BRAS inserts Option 82 in the DHCP-DISCOVER message, and creates an IPoE session.

3.     The BRAS sends the AAA server an access request that includes user information, such as the client ID and source MAC address.

4.     The AAA server returns an access accept that contains authorization information to the BRAS if the authentication succeeds. If the authentication fails, the AAA server returns a reject message.

5.     The BRAS marks the IPoE session state as success and forwards the DHCP-DISCOVER message to the DHCP server if the authentication succeeds. If the authentication fails, the BRAS marks the session as failure and discards the DHCP-DISCOVER message.

6.     The DHCP server sends a DHCP-OFFER message to the BRAS.

7.     The BRAS forwards the DHCP-OFFER message to the DHCP client.

8.     The DHCP client sends a DHCP-REQUEST message to the BRAS.

9.     The BRAS forwards the DHCP-REQUEST message to the specified DHCP sever.

10.     The DHCP server sends a DHCP-ACK message containing the assigned IP address to the BRAS.

11.     The BRAS performs the following:

a.     Obtains address information from the DHCP-ACK message.

b.     Assigns a user profile.

c.     Updates the IPoE session information.

d.     Forwards the DHCP-ACK message to the client.

e.     Marks the session state as online.

If the authentication fails, the BRAS marks the session as failure and discards the DHCP-DISCOVER message.

12.     The DHCP client obtains configuration information from the DHCP-ACK message.

13.     The BRAS sends the AAA server a message to start accounting.

Access procedure for IPv6-ND-RS users

This example uses a Layer 2 device as the BRAS.

Figure 3 Access procedure for IPv6-ND-RS users

1.     The host sends an IPv6 ND RS packet to the BRAS.

2.     The BRAS initiates an IPoE session and sends the AAA server an access request that contains user information, such as the source MAC address.

3.     The AAA server returns an access accept that contains authorization information to the BRAS if the authentication succeeds. If the authentication fails, the AAA server returns a reject message.

4.     The BRAS performs the following:

a.     Generates an IPv6 address based on the host's MAC address and the IPv6 prefix.

b.     Updates the IPoE session information.

c.     Marks the session as success.

If the authentication fails, the BRAS marks the session as failure and discards the IPv6 ND RS packet.

5.     The BRAS assigns a user profile and sends the host an IPv6 ND RA packet containing the IPv6 prefix.

6.     The host generates an IPv6 address based on the received IPv6 prefix.

7.     The BRAS sends the AAA server a message to start the service accounting.

Access procedure for unclassified-IP users

Figure 4 Access procedure for unclassified-IP users

1.     The host sends an IP packet to the BRAS.

2.     The BRAS obtains user information from the IP packet, and matches the user information against existing IPoE sessions.

¡     If no match is found, the BRAS initiates an IPoE session for the user. (This section uses this case as an example.)

¡     If the information matches an authenticated session, the BRAS forwards the IP packet.

¡     If the information matches an unauthenticated session, the BRAS discards the IP packet.

3.     The BRAS sends the AAA server an access request containing the obtained information, such as the source IP address or source MAC address.

4.     The AAA server returns an access accept that contains authorization information if the authentication succeeds. If the authentication fails, the AAA server returns a reject message.

5.     The BRAS assigns a user profile and marks the IPoE session state as online.

6.     The BRAS sends the AAA server a message to start the service accounting.

Access procedure for static and leased users

The access procedure for static users is as follows:

1.     The user statically configures an IPoE session at the CLI on the BRAS.

2.     The user sends an IP packet to the BRAS.

3.     The BRAS obtains user information from the IP packet, and sends the AAA server an access request containing configured IPoE session information.

4.     The AAA server returns an access accept that contains authorization information if the authentication succeeds. If the authentication fails, the AAA server returns a reject message.

5.     The BRAS assigns the user profile and marks the IPoE session state as online.

6.     The host receives the user profile.

7.     The BRAS sends the AAA server a message to start the service accounting.

The access procedure for leased users is as follows:

1.     The user statically configures an IPoE session at the CLI on the BRAS.

2.     The BRAS automatically obtains configured IPoE session information and sends the AAA server an access request.

3.     The AAA server returns an access accept that contains authorization information if the authentication succeeds. If the authentication fails, the AAA server returns a reject message.

4.     The BRAS assigns the user profile and marks the IPoE session state as online.

5.     The host receives the user profile.

6.     The BRAS sends the AAA server a message to start the service accounting.

Support for MPLS L3VPN

IPoE supports MPLS L3VPN. It uses AAA to authorize VPNs for users. Before you bind a VPN instance to an interface, you must delete existing IPoE sessions on the interface for the users to communicate in their authorized VPNs.

 

 

NOTE:

Leased users do not support AAA-authorized VPNs through ISP domains or AAA servers. For more information about VPN authorization through ISP domains, see Security Configuration Guide.

Support for ITA

ITA provides accounting and bandwidth solutions for users based on the destination addresses they access.

For more information about configuring ITA, see Security Configuration Guide.

Restrictions: Licensing requirements for IPoE

The maximum number of IPoE sessions varies by license and device model. For more information about licenses, see Fundamentals Configuration Guide.

Restrictions and guidelines: IPoE configuration

IPoE supports the following interfaces:

·     Layer 3 aggregate interfaces.

·     Layer 3 aggregate subinterfaces

·     Layer 3 Ethernet interfaces.

·     Layer 3 Ethernet subinterfaces.

·     L3VE interfaces.

·     L3VE subinterfaces.

·     VEth interfaces.

·     VEth subinterfaces.

·     VLAN interfaces.

IPoE tasks at a glance

To configure IPoE, perform the following tasks:

1.     Enabling IPoE and setting the IPoE access mode

2.     Configure user types

¡     Configuring dynamic individual users

¡     Configuring static individual users

¡     Configuring leased users

Individual users and leased users cannot be configured on the same interface. Dynamic and static individual users can be configured on the same interface.

3.     (Optional.) Configuring service-specific ISP domains

4.     (Optional.) Configuring the quiet timer for users

5.     (Optional.) Configuring online detection for IPoE users

6.     (Optional.) Configuring NAS-Port-Type for an interface

7.     (Optional.) Setting the traffic statistics update timer for IPoE sessions

8.     (Optional.) Enabling IPoE user logging

9.     (Optional.) Configuring NAS-Port-ID formats

Prerequisites for IPoE

Complete the following configuration as required:

·     Configure the DHCP server.

·     Enable the DHCP relay agent on the BRAS.

·     Configure the RADIUS server and client. For more information about how to configure a RADIUS client, see AAA configuration in Security Configuration Guide.

·     Configure security policies on the H3C iMC security server and configure the security server's IP address on the BRAS. For more information about how to configure a security server, see AAA configuration in Security Configuration Guide.

·     Configure local user accounts on the BRAS if local authentication is used. For more information about how to configure a local user account, see AAA configuration in Security Configuration Guide.

·     Make sure the hosts, BRAS, and servers can reach each other.

Enabling IPoE and setting the IPoE access mode

Restrictions and guidelines

To change the IPoE access mode, disable IPoE, and then set the new IPoE mode when you enable IPoE.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Enable IPoE and set the IPoE access mode on an IPv4 interface

ip subscriber { l2-connected | routed } enable

By default, IPv4 IPoE is disabled.

4.     Enable IPoE and set the IPoE access mode on an IPv6 interface

ipv6 subscriber { l2-connected | routed } enable

By default, IPv6 IPoE is disabled.

Configuring dynamic individual users

Dynamic individual user tasks at a glance

To configure dynamic individual users, perform the following tasks:

1.     Enabling dynamic individual users

2.     (Optional.) Configuring authentication user naming conventions for dynamic individual users

3.     (Optional.) Configuring passwords for dynamic individual users

4.     (Optional.) Configuring ISP domains for dynamic individual users

5.     (Optional.) Configuring the maximum number of dynamic IPoE sessions

6.     (Optional.) Configuring trusted DHCP options for DHCP users

Enabling dynamic individual users

About this task

Dynamic individual users include the unclassified-IP user, IPv6-ND-RS user, and DHCP user. After IPoE is enabled on an interface, the BRAS discards packets from users by default. You must enable dynamic individual users on the interface to trigger IPoE session establishment. You can enable multiple dynamic individual users on an interface.

Restrictions and guidelines

It requires the BRAS to send IPv6 ND RA packets. The interval for sending IPv6 ND RA packets should be no less than 6 minutes.

The IPv6-ND-RS user supports only hosts that use layer-2 access mode.

As a best practice, configure both the unclassified-IP user and IPv6-ND-RS user for an IPv6 interface. PCs running Windows generate IPv6 addresses randomly or using the EUI-64 method. The unclassified-IP user supports packets with randomly-generated IPv6 addresses. The IPv6-ND-RS user supports packets with EUI-64-generated IPv6 addresses.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Enable the IPv4 dynamic individual user.

ip subscriber initiator { dhcp | unclassified-ip } enable

By default, no IPv4 dynamic individual users are enabled.

4.     Enable the IPv6 dynamic individual user:

ipv6 subscriber initiator { dhcp | ndrs | unclassified-ip } enable

By default, no IPv6 dynamic individual users are enabled.

Configuring authentication user naming conventions for dynamic individual users

About this task

Usernames configured for dynamic individual users must be the same as those configured on the AAA server.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure authentication user naming conventions for IPv4 dynamic individual users.

¡     Configure an authentication user naming convention for DHCPv4 users.

ip subscriber dhcp username include { circuit-id [ separator separator ] | client-id [ separator separator ] | nas-port-id [ separator separator ] | port [ separator separator ] | remote-id [ separator separator ] | second-vlan [ separator separator ] | slot [ separator separator ] | source-mac [ address-separator address-separator ] [ separator separator ] | subslot [ separator separator ] | sysname [ separator separator ] | vendor-class [ separator separator ] | vendor-specific [ separator separator ] | vlan [ separator separator ] } *

By default, usernames for DHCPv4 users are source MAC addresses.

¡     Configure an authentication user naming convention for unclassified-IP users.

ip subscriber unclassified-ip username include { nas-port-id [ separator separator ] | port [ separator separator ] | second-vlan [ separator separator ] | slot [ separator separator ] | source-ip [ address-separator address-separator ] [ separator separator ] | source-mac [address-separator address-separator ] [ separator separator ] | subslot [ separator separator ] | sysname [ separator separator ] | vlan [ separator separator ] } *

By default, usernames for unclassified-IP users are source IP addresses.

4.     Configure authentication user naming conventions for IPv6 dynamic individual users.

¡     Configure an authentication user naming convention for DHCPv6 users.

ipv6 subscriber dhcp username include { circuit-id [ separator separator ] | client-id [ separator separator ] | nas-port-id [ separator separator ] | port [ separator separator ] | remote-id [ separator separator ] | second-vlan [ separator separator] | slot [ separator separator] | source-mac [ address-separator address-separator ] [ separator separator ] | subslot [ separator separator ] | sysname [ separator separator ] | vendor-class [ separator separator ] | vendor-specific [ separator separator ] | vlan [ separator separator ] } *

By default, usernames for DHCPv6 are source MAC addresses.

¡     Configure an authentication user naming convention for IPv6-ND-RS users.

ipv6 subscriber ndrs username include { nas-port-id [ separator separator ] | port [ separator separator ] | second-vlan [ separator separator ] | slot [ separator separator ] | source-mac [ address-separator address-separator ] [ separator separator ] | subslot [ separator separator ] | sysname [ separator separator ] | vlan [ separator separator ] } *

By default, usernames for IPv6-ND-RS users are source MAC addresses.

¡     Configure an authentication user naming convention for unclassified-IP users.

ipv6 subscriber unclassified-ip username include { nas-port-id [ separator separator ] | port [ separator separator ] | second-vlan [ separator separator ] | slot [ separator separator ] | source-ip [ address-separator address-separator ] [ separator separator ] | source-mac [ address-separator address-separator ] [ separator separator ] | subslot [ separator separator ] | sysname [ separator separator ] | vlan [ separator separator ] } *

By default, usernames for unclassified-IP users are source IP addresses.

Configuring passwords for dynamic individual users

About this task

Passwords configured for dynamic individual users must be the same as those configured on the AAA server.

If you configure multiple passwords for an DHCP user, the passwords are used in the following order:

1.     Password specified in trusted Option 60 or Option 16.

2.     Password specified the ip subscriber password or ipv6 subscriber password command.

3.     Default system password.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure a password for IPv4 IPoE users.

¡     Configure a password for IPv4 dynamic individual users.

ip subscriber password { ciphertext | plaintext } string

The default password for dynamic individual users is vlan.

¡     Specify a string from the Option 60 as the password for IPv4 DHCP users.

ip subscriber dhcp password option60 [ offset offset ] [ length length ]

By default, the BRAS does not use the password specified in Option 60 for DHCP users.

Configure Option 60 as the trusted DHCP option for the password specified by this command to take effect. For more information about Option 60, see "Configuring trusted DHCP options for DHCP users."

4.     Configure a password for IPv6 IPoE users.

¡     Configure a password for IPv6 dynamic individual users.

ipv6 subscriber password { ciphertext | plaintext } string

The default password for dynamic individual users is vlan.

¡     Specify a string from the Option 16 as the password for IPv6 dynamic individual users:

ipv6 subscriber dhcp password option16 [ offset offset ] [ length length ]

By default, the BRAS does not use the password specified in Option 16 for DHCP users.

Configure DHCPv6 Option 16 as the trusted DHCP option for the password specified by this command to take effect. For more information about Option 16, see "Configuring trusted DHCP options for DHCP users."

Configuring ISP domains for dynamic individual users

About this task

The following table shows how the BRAS selects ISP domains for dynamic individual users.

 

Dynamic individual users

Order in selecting an ISP domain

DHCP user

·     ISP domain automatically selected from DHCPv4 Option 60 or DHCPv6 Option 16 if the option is trusted

·     Interface-specific ISP domain

·     Default system ISP domain

IPv6-ND-RS user

·     Interface-specific ISP domain

·     Default system ISP domain

Unclassified-IP user

·     Service-specific ISP domain

·     Interface-specific ISP domain

·     Default system ISP domain

For more information about how to configure service-specific ISP domains, see "Configuring service-specific ISP domains."

For more information about how to configure the default system ISP domain, see AAA configuration in Security Configuration Guide.

Restrictions and guidelines

Configure trusted DHCP options before you configure ISP domains automatically selected from DHCPv4 Option 60 or DHCPv6 Option 16. For more information about how to configure trusted DHCP options, see "Configuring trusted DHCP options for DHCP users."

The specified ISP domain must exist on the BRAS.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure an ISP domain for IPv4 dynamic individual users.

ip subscriber { dhcp | unclassified-ip } domain domain-name

By default, IPv4 dynamic individual users use the default system ISP domains.

4.     Configure an ISP domain for IPv6 dynamic individual users.

ipv6 subscriber { dhcp | ndrs | unclassified-ip } domain domain-name

By default, IPv6 dynamic individual users use the default system ISP domains.

Configuring the maximum number of dynamic IPoE sessions

About this task

This feature limits the total number of dynamic IPoE sessions on an interface.

Restrictions and guidelines

You can set a smaller value than the number of existing dynamic IPoE sessions on an interface. In this scenario, the existing dynamic IPoE sessions are not affected.

Make sure the total maximum number of dynamic IPoE sessions for all interfaces on the device is less than the upper limit of the device. The maximum number of dynamic IPoE sessions supported by a device varies by license and device model. If the number of dynamic IPoE sessions reaches the upper limit on an interface or reaches the upper limit supported by the device, you cannot establish any additional IPoE sessions on the interface or on the device.

You can install a license that supports less dynamic IPoE sessions than the existing dynamic IPoE sessions. In this scenario, the existing dynamic IPoE sessions are not affected.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure the maximum number of IPv4 dynamic IPoE sessions.

ip subscriber { dhcp | unclassified-ip } max-session max-number

By default, the maximum number of dynamic IPv4 IPoE sessions is not configured.

4.     Configure the maximum number of IPv6 dynamic IPoE sessions.

ipv6 subscriber { dhcp | ndrs | unclassified-ip } max-session max-number

By default, the maximum number of dynamic IPv6 IPoE sessions is not configured.

Configuring trusted DHCP options for DHCP users

About this task

This feature enables a BRAS to obtain user access information from trusted DHCP options when the BRAS acts as a DHCP relay. The BRAS includes the obtained user access information in the RADIUS attributes sent to the RADIUS server based on the following matrix.

Table 1 Associated DHCP options for RADIUS attributes

RADIUS attributes

Associated DHCP options

NAS-PORT-ID

·     DHCPv4 Option 82 Suboption Circuit-ID

·     DHCPv6 Option 18

DSL_AGENT_CIRCUIT_ID

·     DHCPv4 Option 82 Suboption Circuit-ID

·     DHCPv6 Option 18

DSL_AGENT_REMOTE_ID

·     DHCPv4 Option 82 Suboption Remote-ID

·     DHCPv6 Option 37

If the BRAS trusts DHCPv4 Option 60 and DHCPv6 Option 16, IPoE can use the ISP domains specified in the options when certain conditions exist. For more information about selecting ISP domains, see "Configuring ISP domains for dynamic individual users."

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure trusted DHCP options for DHCPv4 users.

ip subscriber trust { option60 | option82 }

By default, the BRAS does not trust DHCPv4 options.

4.     Configure trusted DHCP options for DHCPv6 users.

ipv6 subscriber trust { option16 | option18 | option37 }

By default, the BRAS does not trust DHCPv6 options.

Configuring trusted source IP addresses for unclassified-IP users

About this task

When unclassified-IP users are configured and portal authentication is configured, a user comes online as a static IPoE user if the unclassified-IPv4 packets match a static IPoE session. Otherwise, the following rules apply:

·     IPoE authentication is available only for unclassified-IP users who send packets with the trusted source IP addresses.

·     Portal authentication is available for unclassified users who send packets with untrusted source IP addresses.

For more information about portal authentication, see portal configuration in Security Configuration Guide.

If unclassified-IP users are configured but portal authentication is not configured on an interface, a user comes online as a static IPoE user if the unclassified-IPv4 packets match a static IPoE session. Otherwise, unclassified-IP packets with untrusted source IP addresses are dropped. Only unclassified-IP packets with trusted source IP addresses can initiate IPoE authentication.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure trusted source IPv4 addresses for unclassified-IPv4 users.

ip subscriber unclassified-ip ip match start-ip-address [ end-ip-address ]

By default, no trusted source IPv4 addresses are configured.

Configuring static individual users

Static individual user tasks at a glance

To configure static individual users, perform the following tasks:

1.     Enabling static individual users

2.     Configuring static IPoE sessions

3.     (Optional.) Configuring authentication user naming conventions for static individual users

4.     (Optional.) Configuring passwords for static individual users

5.     (Optional.) Configuring ISP domains for static individual users

6.     (Optional.) Configuring the static IPoE whitelist feature

Enabling static individual users

About this task

This feature enables configured static IPoE sessions information to match IP packets.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Enable IPv4 static individual users.

ip subscriber initiator unclassified-ip enable

By default, no IPv4 static individual users are enabled.

4.     Enable IPv6 static individual users.

ipv6 subscriber initiator unclassified-ip enable

By default, no static individual users are enabled.

Configuring static IPoE sessions

About this task

Static individual users trigger IPoE session establishment by sending IP packets. If an IP packet matches a manually configured IPoE session, the BRAS authenticates the user and establishes an IPoE session.

Restrictions and guidelines

On one interface, a maximum of one static IPoE session can be configured for one IP address.

Configuration procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure a static IPv4 IPoE session.

ip subscriber session static ip ip-address [ vlan vlan-id [ second-vlan vlan-id ] ] [ mac mac-address ] [ domain domain-name ] [ description string ]

By default, no static IPv4 IPoE session is configured.

Only subinterfaces support parameters vlan and second-vlan.

4.     Configure a static IPv6 IPoE session.

ipv6 subscriber session static ipv6 ipv6-address [ vlan vlan-id [ second-vlan vlan-id ] ] [ mac mac-address ] [ domain domain-name ] [ description string ]

By default, no static IPv6 IPoE session is configured.

Only subinterfaces support parameters vlan and second-vlan.

Configuring authentication user naming conventions for static individual users

About this task

Usernames configured for static individual users must be the same as those configured on the AAA server.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure an authentication user naming convention for IPv4 static individual users.

ip subscriber unclassified-ip username include { nas-port-id [ separator separator ] | port [ separator separator ] | second-vlan [ separator separator ] | slot [ separator separator ] | source-ip [ address-separator address-separator ] [ separator separator ] | source-mac [address-separator address-separator ] [ separator separator ] | subslot [ separator separator ] | sysname [ separator separator ] | vlan [ separator separator ] } *

The default username is the source IPv4 address of packets sent by users.

4.     Configure an authentication user naming convention for IPv6 static individual users.

ipv6 subscriber unclassified-ip username include { nas-port-id [ separator separator ] | port [ separator separator ] | second-vlan [ separator separator ] | slot [ separator separator ] | source-ip [ address-separator address-separator ] [ separator separator ] | source-mac [ address-separator address-separator ] [ separator separator ] | subslot [ separator separator ] | sysname [ separator separator ] | vlan [ separator separator ] } *

The default username is the source IPv6 address of packets sent by users.

Configuring passwords for static individual users

About this task

Passwords configured for static individual users must be the same as those configured on the AAA server.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure a password for IPv4 static individual users.

ip subscriber password { ciphertext | plaintext } string

The default password for an IPv4 static individual user is vlan.

4.     Configure a password for IPv6 static individual users.

ipv6 subscriber password { ciphertext | plaintext } string

The default password for an IPv6 static individual user is vlan.

Configuring ISP domains for static individual users

About this task

The BRAS selects ISP domains for static individual users in the following order:

·     Domain configured in the static IPoE session

·     Service-specific domain

·     Interface-specific domain

·     Default system domain

For more information about how to configure service-specific ISP domains, see "Configuring service-specific ISP domains." For more information about how to configure the default system domain, see Security Configuration Guide.

Restrictions and guidelines

The specified ISP domain must exist on the BRAS.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure an ISP domain for static IPv4 individual users.

ip subscriber unclassified-ip domain domain-name

By default, static IPv4 individual users use the default system domain.

4.     Configure an ISP domain for static IPv6 individual users.

ipv6 subscriber unclassified-ip domain domain-name

By default, static IPv6 individual users use the default system domain.

Configuring the static IPoE whitelist feature

About this task

With this feature enabled, only IPv4 or IPv6 traffic matching static IPv4 or IPv6 IPoE sessions can initiate IPoE authentication, and IPoE directly permits the other traffic without any processing.

In some scenarios, an interface might need to have both IPoE and portal authentication enabled. For example, both dumb terminals and broadband dial-up users exist on an interface. Dumb terminals (for example, monitoring cameras) need to come online through IPoE without portal authentication, and broadband dial-up users need to come online through portal Web authentication. In this case, you can enable the IPv4 or IPv6 IPoE whitelist feature on the interface. When both the IPv4 or IPv6 IPoE whitelist feature and portal authentication are enabled on an interface, the following rules apply:

·     If the IPv4 or IPv6 traffic of a user matches a static IPv4 or IPv6 IPoE session, the user is processed by the static IPv4 or IPv6 IPoE authentication flow. For an IPoE user to bypass authentication, specify the authentication and authorization modes as none in the ISP domain of the IPoE user.

·     If the IPv4 or IPv6 traffic of a user does not match any IPv4 or IPv6 IPoE session, the user is processed by portal authentication.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Enable the IPv4 IPoE whitelist feature.

ip subscriber whitelist enable

By default, the IPv4 IPoE whitelist is disabled.

4.     Enable the IPv6 IPoE whitelist feature.

ipv6 subscriber whitelist enable

By default, the IPv6 IPoE whitelist is disabled.

Configuring leased users

Leased user tasks at a glance

To configure leased users, perform the following tasks:

1.     Configuring leased users

¡     Configuring interface-leased users

¡     Configuring subnet-leased users

Interface-leased users and subnet-leased users cannot be configured on the same interface.

2.     Configuring ISP domains for leased users

Configuring interface-leased users

About this task

An interface-leased user represents hosts that rent the same interface.

Restrictions and guidelines

You can configure up to one IPv4 interface-leased user and one IPv6 interface-leased user on an interface.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure an IPv4 interface-leased user.

ip subscriber interface-leased username name password { ciphertext | plaintext } string [ domain domain-name ]

By default, no IPv4 interface-leased user is configured.

4.     Configure an IPv6 interface-leased user.

ipv6 subscriber interface-leased username name password { ciphertext | plaintext } string [ domain domain-name ]

By default, no IPv6 interface-leased user is configured.

Configuring subnet-leased users

About this task

A subnet-leased user represents hosts that rent a subnet of an interface.

Restrictions and guidelines

You can configure multiple subnet-leased users on an interface. Different subnets must have the same mask length. Each subnet can be bound to only one subnet-leased user.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure an IPv4 subnet-leased user.

ip subscriber subnet-leased ip ip-address { mask | mask-length } username name password { ciphertext | plaintext } string [ domain domain-name ]

By default, no IPv4 subnet-leased user is configured.

4.     Configure an IPv6 subnet-leased user.

ipv6 subscriber subnet-leased ipv6 ipv6-address prefix-length username name password { ciphertext | plaintext } string [ domain domain-name ]

By default, no IPv6 subnet-leased user is configured.

Configuring ISP domains for leased users

About this task

The BRAS selects ISP domains for leased users in the following order:

·     Domains configured for each interface-leased user and each subnet-leased user

·     Service-specific domain

·     Domain configured for leased users

·     Default system domain

For more information about how to configure the service-specific ISP domains, see "Configuring service-specific ISP domains."

For more information about how to configure the default system domain, see AAA configuration in Security Configuration Guide.

Restrictions and guidelines

The specified ISP domain must exist on the BRAS.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure a domain collectively for IPv4 leased users.

ip subscriber unclassified-ip domain domain-name

By default, IPv4 leased users use the default system ISP domain.

4.     Configure a domain collectively for IPv6 leased users.

ipv6 subscriber unclassified-ip domain domain-name

By default, IPv6 leased users use the default system ISP domain.

Configuring service-specific ISP domains

About configuring service-specific ISP domains

This task enables you to assign ISP domains to users based on services. You can classify services by VLAN ID, 802.1P, and DSCP carried in packets from users.

Restrictions and guidelines

For DHCPv4 users, the trusted Option 60 configuration takes precedence over the global service identifier configuration.

For DHCPv6 users, the trusted Option 16 configuration takes precedence over the global service identifier configuration.

You must specify an identifier for a service before you bind an ISP domain to the service. Otherwise, the binding does not take effect.

Configuring service-specific ISP domains for IPv4 users

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure a service identifier for IPv4 users.

ip subscriber service-identify { 8021p { second-vlan | vlan } | dscp | second-vlan | vlan }

By default, no service identifier is configured for IPv4 users.

4.     Configure service-specific ISP domains for IPv4 users.

¡     Bind an ISP domain to a VLAN list.

ip subscriber vlan vlan-list domain domain-name

¡     Bind an ISP domain to an 802.1p list.

ip subscriber 8021p 8021p-list domain domain-name

¡     Bind an ISP domain to a DSCP list.

ip subscriber dscp dscp-value-list domain domain-name

By default, no service-specific ISP domains are configured for IPv6 users.

Configuring service-specific ISP domains for IPv6 users

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure a service identifier for IPv6 users.

ipv6 subscriber service-identify { 8021p { second-vlan | vlan } | dscp | second-vlan | vlan }

By default, no service identifier is configured for IPv6 users.

4.     Configure service-specific ISP domains for IPv6 users.

¡     Bind an ISP domain to a VLAN list.

ipv6 subscriber vlan vlan-list domain domain-name

¡     Bind an ISP domain to an 802.1p list.

ipv6 subscriber 8021p 8021p-list domain domain-name

¡     Bind an ISP domain to a DSCP list.

ipv6 subscriber dscp dscp-value-list domain domain-name

By default, no service-specific ISP domains are configured for IPv6 users.

Configuring the quiet timer for users

About this task

If this feature is enabled, the quiet timer starts when number of consecutive authentication failures of a user reaches the limit in the specified period. During the quiet timer period, packets from the user are dropped. After the quiet timer expires, the BRAS performs authentication upon receiving a packet from the user.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure the quiet timer for IPv4 IPoE users.

ip subscriber timer quiet time

By default, the quite timer is disabled for IPv4 IPoE users.

4.     Configure the quiet timer for IPv6 IPoE users.

ipv6 subscriber timer quiet time

By default, the quite timer is disabled for IPv6 IPoE users.

Configuring online detection for IPoE users

About this task

Online detection enables the BRAS to periodically detect the status of a user. It uses ARP or ICMP requests to detect IPv4 users, and uses NS packets of the ND protocol or ICMPv6 requests to detect IPv6 users.

After you configure online detection, the BRAS starts a detection timer to detect online users. If the BRAS does not receive user packets from a user when the detection timer expires, it sends a detection packet to the user and performs the following operations:

·     If the BRAS receives user packets within the maximum number of detection attempts, the BRAS assumes that the user is online. It resets the detection timer, and starts the next detection attempt.

·     If the BRAS does not receive user packets within the maximum number of detection attempts, the BRAS assumes that the user is offline and deletes the user session.

Restrictions and guidelines

This feature supports only individual users.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure online detection for IPv4 IPoE users.

ip subscriber user-detect { arp | icmp } retry retries interval interval

By default, online detection is disabled for IPv4 IPoE users.

4.     Configure online detection for IPv6 IPoE users.

ipv6 subscriber user-detect { icmpv6 | nd } retry retries interval interval

By default, online detection is disabled for IPv6 IPoE users.

Configuring NAS-Port-Type for an interface

About this task

The NAS-Port-Type attribute carries information about the access interface. The BRAS includes the configured NAS-Port-Type in RADIUS requests sent to the RADIUS server.

Procedure

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure the IPv4 NAS-Port-Type.

ip subscriber nas-port-type { 802.11 | adsl-cap | adsl-dmt | async | cable | ethernet | g.3-fax | hdlc | idsl | isdn-async-v110 | isdn-async-v120 | isdn-sync | piafs | sdsl | sync | virtual | wireless-other | x.25 | x.75 | xdsl }

The default IPv4 NAS-Port-Type is Ethernet.

4.     Configure the IPv6 NAS-Port-Type.

ipv6 subscriber nas-port-type { 802.11 | adsl-cap | adsl-dmt | async | cable | ethernet | g.3-fax | hdlc | idsl | isdn-async-v110 | isdn-async-v120 | isdn-sync | piafs | sdsl | sync | virtual | wireless-other | x.25 | x.75 | xdsl }

The default IPv6 NAS-Port-Type is Ethernet.

Setting the traffic statistics update timer for IPoE sessions

About this task

Perform this task to set the traffic statistic update timer for IPoE sessions.

Restrictions and guidelines

Updating traffic statistics for IPoE sessions consumes certain system resources. As a best practice, use the default traffic statistics update timer. You can set the traffic statistics update timer for IPoE sessions based on the statistic frequency requirement.

When the network has a large number of online users authorized with the idle-cut attribute, adjust the traffic statistics update timer according to the authorized idle-cut attribute to prevent users from being logged out because the idle timer times out.

Procedure

1.     Enter system view.

system-view

2.     Set the traffic statistics update timer for IPv4 IPoE sessions.

ip subscriber timer traffic value

By default, the traffic statistics update timer for IPv4 IPoE sessions is 60000 milliseconds.

3.     Set the traffic statistics update timer for IPv6 IPoE sessions.

ipv6 subscriber timer traffic value

By default, the traffic statistics update timer for IPv6 IPoE sessions is 60000 milliseconds.

Enabling IPoE user logging

About this task

The IPoE user logging feature enables the device to generate IPoE logs and send them to the information center. Logs are generated after a user comes online successfully, fails to come online, normally goes offline, or abnormally goes offline. A log entry contains information such as the username, IP address, interface name, inner VLAN, outer VLAN, MAC address, and failure causes. For information about the log destination and output rule configuration in the information center, see Network Management and Monitoring Configuration Guide.

Restrictions and guidelines

Typically, disable this feature to prevent excessive IPoE log output.

Procedure

1.     Enter system view.

system-view

2.     Enable IPv4 IPoE user logging.

ip subscriber access-user log enable [ successful-login | failed-login | logout [ normal ] [ abnormal ] ] *

By default, IPv4 IPoE user logging is disabled.

3.     Enable IPv6 IPoE user logging.

ipv6 subscriber access-user log enable [ successful-login | failed-login | logout [ normal ] [ abnormal ] ] *

By default, IPv6 IPoE user logging is disabled.

Configuring NAS-Port-ID formats

About configuring NAS-Port-ID formats

The NAS-Port-ID RADIUS attribute specifies access location of a user. The BRAS supports the following formats for NAS-Port-ID:

·     version 1.0—Format for China Telecom.

·     version 2.0—Format specified in YDT 2275-2011 Subscriber Access Loop (Port) Identification in Broadband Access Networks.

You can configure the following settings if version 2.0 is used when the BRAS acts as a DHCP relay:

·     Configure DHCPv4 Option 82 or DHCPv6 Option 18 as a trusted DHCP option and obtain information from the trusted option.

·     Include the NAS information and obtained option information in NAS-Port-ID.

Configuring the NAS-Port-ID format for IPv4 users

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure the NAS-Port-ID format for IPv4 users.

ip subscriber nas-port-id format cn-telecom { version1.0 | version2.0 }

The default format is version1.0.

4.     (Optional.) Configure the trusted DHCPv4 option 82 for IPv4 users.

ip subscriber trust option82

By default, the BRAS does not trust Option 82.

5.     (Optional.) Include the NAS information and DHCPv4 option 82 information in NAS-Port-ID for IPv4 users.

ip subscriber nas-port-id nasinfo-insert

By default, the BRAS includes only information obtained from the trusted DHCPv4 option 82 in NAS-Port-ID.

Configuring the NAS-Port-ID format for IPv6 users

1.     Enter system view.

system-view

2.     Enter interface view.

interface interface-type interface-number

3.     Configure the NAS-Port-ID format for IPv6 users.

ipv6 subscriber nas-port-id format cn-telecom { version1.0 | version2.0 }

The default format is version1.0.

4.     (Optional.) Configure the trusted DHCPv6 option 18 for IPv6 users.

ipv6 subscriber trust option18

By default, the BRAS does not trust Option 18.

5.     (Optional.) Include the NAS information and DHCPv6 option 18 information in NAS-Port-ID for IPv6 users.

ipv6 subscriber nas-port-id nasinfo-insert

By default, the BRAS includes only information obtained from the trusted DHCPv6 option 18 in NAS-Port-ID.

Display and maintenance commands for IPoE

Display and maintenance commands for IPv4 IPoE

Execute display commands in any view and reset commands in user view.

 

Task

Command

Display IPoE session information for individual users.

In standalone mode:

display ip subscriber session [ interface interface-type interface-number ] [ domain domain-name | ip ip-address [ vpn-instance vpn-instance-name ] | mac mac-address | static | username name ] [ verbose ]

In IRF mode:

display ip subscriber session [ interface interface-type interface-number ] [ domain domain-name | ip ip-address [ vpn-instance vpn-instance-name ] | mac mac-address | static | username name ] [ slot slot-number ] [ verbose ]

Display information about IPoE interface-leased users.

In standalone mode:

display ip subscriber interface-leased [ interface interface-type interface-number ]

In IRF mode:

display ip subscriber interface-leased [ interface interface-type interface-number ] [ slot slot-number ]

Display information about IPoE subnet-leased users.

In standalone mode:

display ip subscriber subnet-leased [ interface interface-type interface-number ]

In IRF mode:

display ip subscriber subnet-leased [ interface interface-type interface-number ] [ slot slot-number ]

Display IPoE session statistics for individual users.

In standalone mode:

display ip subscriber session statistics [ session-type { dhcp | static | unclassified-ip } ] [ interface interface-type interface-number

In IRF mode:

display ip subscriber session statistics [ session-type { dhcp | static | unclassified-ip } ] [ interface interface-type interface-number ] [ slot slot-number ]

Display IPoE session statistics for interface-leased users.

In standalone mode:

display ip subscriber interface-leased statistics [ interface interface-type interface-number ]

In IRF mode:

display ip subscriber interface-leased statistics [ interface interface-type interface-number ] [ slot slot-number ]

Display IPoE session statistics for subnet-leased users.

In standalone mode:

display ip subscriber subnet-leased statistics [ interface interface-type interface-number ]

In IRF mode:

display ip subscriber subnet-leased statistics [ interface interface-type interface-number ] [ slot slot-number ]

Display offline statistics for users.

display ip subscriber offline statistics [ interface interface-type interface-number ]

Delete dynamic IPoE sessions and log out the users.

reset ip subscriber session [ interface interface-type interface-number ] [ domain domain-name | ip ip-address  [ vpn-instance vpn-instance-name ]| mac mac-address | username name ]

Delete offline statistics for users.

reset ip subscriber offline statistics [ interface interface-type interface-number ]

Display and maintenance commands for IPv6 IPoE

Execute display commands in any view and reset commands in user view.

 

Task

Command

Display IPoE session information for individual users.

In standalone mode:

display ipv6 subscriber session [ interface interface-type interface-number ] [ domain domain-name | ipv6 ipv6-address [ vpn-instance vpn-instance-name ] | mac mac-address | static | username name ] [ verbose ]

In IRF mode:

display ipv6 subscriber session [ interface interface-type interface-number ] [ domain domain-name | ipv6 ipv6-address [ vpn-instance vpn-instance-name ] | mac mac-address | static | username name ] [ slot slot-number ] [ verbose ]

Display information about IPoE interface-leased users.

In standalone mode:

display ipv6 subscriber interface-leased [ interface interface-type interface-number ]

In IRF mode:

display ipv6 subscriber interface-leased [ interface interface-type interface-number ] [ slot slot-number ]

Display information about IPoE subnet-leased users.

In standalone mode:

display ipv6 subscriber subnet-leased [ interface interface-type interface-number ]

In IRF mode:

display ipv6 subscriber subnet-leased [ interface interface-type interface-number ] [ slot slot-number ]

Display IPoE session statistics for individual users.

In standalone mode:

display ipv6 subscriber session statistics [ session-type { dhcp | ndrs | static | unclassified-ip } ] [ interface interface-type interface-number ]

In IRF mode:

display ipv6 subscriber session statistics [ session-type { dhcp | ndrs | static | unclassified-ip } ] [ interface interface-type interface-number ] [slot slot-number ]

Display IPoE session statistics for interface-leased users.

In standalone mode:

display ipv6 subscriber interface-leased statistics [ interface interface-type interface-number ]

In IRF mode:

display ipv6 subscriber interface-leased statistics [ interface interface-type interface-number ] [ slot slot-number ]

Display IPoE session statistics for subnet-leased users.

In standalone mode:

display ipv6 subscriber subnet-leased statistics [ interface interface-type interface-number ]

In IRF mode:

display ipv6 subscriber subnet-leased statistics [ interface interface-type interface-number ] [ slot slot-number ]

Display offline statistics for users.

display ipv6 subscriber offline statistics [ interface interface-type interface-number ]

Delete dynamic IPoE sessions and log out the users.

reset ipv6 subscriber session [ interface interface-type interface-number ] [ domain domain-name | ipv6 ipv6-address [ vpn-instance vpn-instance-name ] | mac mac-address | username name ]

Delete offline statistics for users.

reset ipv6 subscriber offline statistics [ interface interface-type interface-number ]

‌‌

IPoE configuration examples

Example: Configuring an unclassified-IP user

Network configuration

As shown in Figure 5, the host accesses the BRAS as an unclassified-IP user. The BRAS performs AAA for the host through the RADIUS server.

Figure 5 Network diagram

Procedure

1.     Configure the RADIUS server: (This section uses the Linux Free RADIUS server as an example.)

# Add BRAS IP address 4.4.4.2 and secret radius to the clients.conf file.

client 4.4.4.2/32 {

ipaddr = 4.4.4.2

netmask=32

secret=radius

}

# Add the username and password to the users user information file. The username is the host IP address, and the password is radius.

2.2.2.2   Cleartext-Password :="radius"

2.     Configure the BRAS:

a.     Configure IP addresses for interfaces. (Details not shown.)

b.     Configure a RADIUS scheme:

# Create a RADIUS scheme named rs1 and enter its view.

<Device> system-view

[Device] radius scheme rs1

# Configure primary servers and keys for authentication and accounting.

[Device-radius-rs1] primary authentication 4.4.4.1

[Device-radius-rs1] primary accounting 4.4.4.1

[Device-radius-rs1] key authentication simple radius

[Device-radius-rs1] key accounting simple radius

# Exclude the ISP name from the username sent to the RADIUS server.

[Device-radius-rs1] user-name-format without-domain

[Device-radius-rs1] quit

c.     Configure the ISP domain:

# Create an ISP domain named dm1 and enter its view.

[Device] domain dm1

# Configure dm1 to use RADIUS scheme rs1.

[Device-isp-dm1] authentication ipoe radius-scheme rs1

[Device-isp-dm1] authorization ipoe radius-scheme rs1

[Device-isp-dm1] accounting ipoe radius-scheme rs1

[Device-isp-dm1] quit

d.     Configure IPoE:

# Enable IPoE and configure Layer 3 access mode on GigabitEthernet 1/0/2.

[Device] interface gigabitethernet 1/0/2

[Device–GigabitEthernet1/0/2] ip subscriber routed enable

# Enable the unclassified-IP user.

[Device–GigabitEthernet1/0/2] ip subscriber initiator unclassified-ip enable

# Specify dm1 as the ISP domain.

[Device–GigabitEthernet1/0/2] ip subscriber unclassified-ip domain dm1

# Configure plaintext password radius for authentication.

[Device–GigabitEthernet1/0/2] ip subscriber password plaintext radius

[Device–GigabitEthernet1/0/2] quit

Verifying the configuration

# Display IPoE session information to verify that the host has come online.

[Device] display ip subscriber session

  Type: D-DHCP   S-Static     U-Unclassified-IP

Interface            IP address                MAC address    Type  State

--------------------------------------------------------------------------------

GE1/0/2              2.2.2.2                   000c-29a6-b656 U     Online

Example: Configuring a DHCP user

Network configuration

As shown in Figure 6, the host accesses the BRAS as a DHCP user. It obtains configuration information from the DHCP server. The BRAS performs AAA for the host through the RADIUS server.

Figure 6 Network diagram

Procedure

1.     Configure the RADIUS server: (This section uses the Linux Free RADIUS server as an example.)

# Add BRAS IP address 4.4.4.2 and secret radius to the clients.conf file.

client 4.4.4.2/32 {

ipaddr = 4.4.4.2

netmask=32

secret=radius

}

# Add the username and password to the users user information file. The username is the host MAC address and the password is radius.

000c29a6b656  Cleartext-Password :="radius"

2.     Configure the DHCP server:

# Enable DHCP.

<DHCP-server> system-view

[DHCP-server] dhcp enable

# Create an IP address pool named pool1 and enter its view.

[DHCP-server] dhcp server ip-pool pool1

# Configure network segment 3.3.3.0/24 to the pool, and configure IP address 3.3.3.1 as unavailable.

[DHCP-server-pool-pool1] network 3.3.3.0 24

[DHCP-server-pool-pool1] forbidden-ip 3.3.3.1

[DHCP-server-pool-pool1] quit

3.     Configure the BRAS:

a.     Configure IP addresses for interfaces. (Details not shown.)

b.     Configure a RADIUS scheme:

# Create a RADIUS scheme named rs1 and enter its view.

<Device> system-view

[Device] radius scheme rs1

# Configure primary servers and keys for authentication and accounting.

[Device-radius-rs1] primary authentication 4.4.4.1

[Device-radius-rs1] primary accounting 4.4.4.1

[Device-radius-rs1] key authentication simple radius

[Device-radius-rs1] key accounting simple radius

# Exclude the ISP name from the username sent to the RADIUS server.

[Device-radius-rs1] user-name-format without-domain

[Device-radius-rs1] quit

c.     Configure the ISP domain: (This example assumes that the DHCP packets do not contain option 60.)

# Create an ISP domain named dm1 and enter its view.

[Device] domain dm1

# Configure dm1 to use RADIUS scheme rs1.

[Device-isp-dm1] authentication ipoe radius-scheme rs1

[Device-isp-dm1] authorization ipoe radius-scheme rs1

[Device-isp-dm1] accounting ipoe radius-scheme rs1

[Device-isp-dm1] quit

d.     Configure the DHCP relay:

# Enable DHCP.

[Device] dhcp enable

# Enable the DHCP relay and specify the DHCP server 4.4.4.3 on GigabitEthernet 1/0/2.

[Device] interface gigabitethernet 1/0/2

[Device–GigabitEthernet1/0/2] dhcp select relay

[Device–GigabitEthernet1/0/2] dhcp relay server-address 4.4.4.3

e.     Configure IPoE:

# Enable IPoE and configure Layer 2 access mode on GigabitEthernet 1/0/2.

[Device–GigabitEthernet1/0/2] ip subscriber l2-connected enable

# Enable the DHCP user.

[Device–GigabitEthernet1/0/2] ip subscriber initiator dhcp enable

# Specify dm1 as the ISP domain.

[Device–GigabitEthernet1/0/2] ip subscriber dhcp domain dm1

# Configure plaintext password radius for authentication.

[Device–GigabitEthernet1/0/2] ip subscriber password plaintext radius

[Device–GigabitEthernet1/0/2] quit

Verifying the configuration

# Display IPoE session information to verify that the host has come online.

[Device] display ip subscriber session

  Type: D-DHCP   S-Static     U-Unclassified-IP

Interface            IP address                MAC address    Type  State

--------------------------------------------------------------------------------

GE1/0/2              3.3.3.2                   000c-29a6-b656 D     Online

Example: Configuring an IPv6-ND-RS user

Network configuration

As shown in Figure 7, the host accesses the BRAS as an IPv6-ND-RS user. The BRAS performs AAA for the host through the RADIUS server.

Figure 7 Network diagram

Procedure

1.     Configure the RADIUS server: (This section uses the Linux Free RADIUS server as an example.)

# Add BRAS IP address 4.4.4.2 and secret radius to the clients.conf file.

client 4.4.4.2/32 {

ipaddr = 4.4.4.2

netmask=32

secret=radius

}

# Add the username, password, and authorized IPv6 prefix to the users user information file. The username is the host MAC address, the password is radius, and the IPv6 prefix is 10::10/64.

000c29a6b656  Cleartext-Password :="radius"

Framed-IPv6-Prefix =10::10/64

2.     Configure the BRAS:

a.     Configure IP addresses for interfaces. (Details not shown.)

b.     Enable GigabitEthernet 1/0/2 to support IPv6-ND-RA messages.

<Device> system-view

[Device] interface gigabitethernet 1/0/2

[Device–GigabitEthernet1/0/2] undo ipv6 nd ra halt

[Device–GigabitEthernet1/0/2] quit

c.     Configure a RADIUS scheme:

# Create a RADIUS scheme named rs1 and enter its view.

[Device] radius scheme rs1

# Configure primary servers and keys for authentication and accounting.

[Device-radius-rs1] primary authentication 4.4.4.1

[Device-radius-rs1] primary accounting 4.4.4.1

[Device-radius-rs1] key authentication simple radius

[Device-radius-rs1] key accounting simple radius

# Exclude the ISP name from the username sent to the RADIUS server.

[Device-radius-rs1] user-name-format without-domain

[Device-radius-rs1] quit

d.     Configure the ISP domain:

# Create an ISP domain named dm1 and enter its view.

[Device] domain dm1

# Configure dm1 to use RADIUS scheme rs1.

[Device-isp-dm1] authentication ipoe radius-scheme rs1

[Device-isp-dm1] authorization ipoe radius-scheme rs1

[Device-isp-dm1] accounting ipoe radius-scheme rs1

[Device-isp-dm1] quit

e.     Configure IPoE:

# Enable IPoE and configure Layer 2 access mode on GigabitEthernet 1/0/2.

[Device] interface gigabitethernet 1/0/2

[Device–GigabitEthernet1/0/2] ipv6 subscriber l2-connected enable

# Enable the IPv6-ND-RS user.

[Device–GigabitEthernet1/0/2] ipv6 subscriber initiator ndrs enable

# Specify dm1 as the ISP domain.

[Device–GigabitEthernet1/0/2] ipv6 subscriber ndrs domain dm1

# Configure plaintext password radius for authentication.

[Device–GigabitEthernet1/0/2] ipv6 subscriber password plaintext radius

[Device–GigabitEthernet1/0/2] quit

Verifying the configuration

# Display IPoE session information to verify that the host has come online.

[Device] display ipv6 subscriber session

  Type: D-DHCP   S-Static     U-Unclassified-IP   N-NDRS

Interface            IP address                MAC address    Type  State

--------------------------------------------------------------------------------

GE1/0/2              10::20C:29FF:FEA6:B656    000c-29a6-b656 N     Online

Example: Configuring subnet-leased users

Network configuration

As shown in Figure 8, three hosts access the BRAS as subnet-leased users. The BRAS performs AAA for the hosts through the RADIUS server.

Figure 8 Network diagram

Procedure

1.     Configure the RADIUS server: (This section uses the Linux Free RADIUS server as an example.)

# Add BRAS IP address 4.4.4.2 and secret radius to the clients.conf file.

client 4.4.4.2/32 {

ipaddr = 4.4.4.2

netmask=32

secret=radius

}

# Add usernames and passwords to the users user information file. Usernames for the three subnet user groups are us1, us2, and us3. Passwords for the three subnet user groups are pw1, pw2, and pw3.

us1  Cleartext-Password :="pw1"

us2  Cleartext-Password :="pw2"

us3  Cleartext-Password :="pw3"

2.     Configure the BRAS:

a.     Configure IP addresses for interfaces. (Details not shown.)

b.     Configure a RADIUS scheme:

# Create a RADIUS scheme named rs1 and enter its view.

<Device> system-view

[Device] radius scheme rs1

# Configure primary servers and keys for authentication and accounting.

[Device-radius-rs1] primary authentication 4.4.4.1

[Device-radius-rs1] primary accounting 4.4.4.1

[Device-radius-rs1] key authentication simple radius

[Device-radius-rs1] key accounting simple radius

# Exclude the ISP name from the username sent to the RADIUS server.

[Device-radius-rs1] user-name-format without-domain

[Device-radius-rs1] quit

c.     Configure the ISP domain:

# Create an ISP domain named dm1 and enter its view.

[Device] domain dm1

# Configure dm1 to use RADIUS scheme rs1.

[Device-isp-dm1] authentication ipoe radius-scheme rs1

[Device-isp-dm1] authorization ipoe radius-scheme rs1

[Device-isp-dm1] accounting ipoe radius-scheme rs1

[Device-isp-dm1] quit

d.     Configure IPoE:

# Enable IPoE and configure Layer 2 access mode on GigabitEthernet 1/0/2.

[Device] interface gigabitethernet 1/0/2

[Device–GigabitEthernet1/0/2] ip subscriber l2-connected enable

# Configure three subnet-leased users and specify their usernames, passwords, and ISP domains.

[Device–GigabitEthernet1/0/2] ip subscriber subnet-leased ip 5.5.5.0 24 username us1 password plaintext pw1 domain dm1

[Device–GigabitEthernet1/0/2] ip subscriber subnet-leased ip 6.6.6.0 24 username us2 password plaintext pw2 domain dm1

[Device–GigabitEthernet1/0/2] ip subscriber subnet-leased ip 7.7.7.0 24 username us3 password plaintext pw3 domain dm1

[Device–GigabitEthernet1/0/2] quit

Verifying the configuration

# Display IPoE session information to verify that the host has come online.

[Device] display ip subscriber subnet-leased

Basic:

  Access interface           : GE1/0/2

  VPN instance               : N/A

  Username                   : us1

  Network                    : 5.5.5.0/24

  User ID                    : 0x38020000

  State                      : Online

  Service node               : Slot 1 CPU 0

  Domain                     : dm1

  Login time                 : May 14 20:08:35 2014

  Online time (hh:mm:ss)     : 00:16:37

 

AAA:

  IP pool                    : N/A

  Session idle time          : N/A

  Session duration           : N/A, remaining: N/A

  Remaining traffic          : N/A

  Max multicast addresses    : 4

  Multicast address list     : N/A

 

QoS:

  User profile               : N/A

  Session group profile      : N/A

  Inbound CAR                : N/A

  Outbound CAR               : N/A

 

Flow statistic:

  Uplink   packets/bytes     : 223423/28598144

  Downlink packets/bytes     : 5802626/742736000

 

Basic:

  Access interface           : GE1/0/2

  VPN instance               : N/A

  Username                   : us2

  Network                    : 6.6.6.0/24

  User ID                    : 0x38020001

  State                      : Online

  Service node               : Slot 1 CPU 0

  Domain                     : dm1

  Login time                 : May 14 20:08:35 2014

  Online time (hh:mm:ss)     : 00:10:37

 

AAA:

  IP pool                    : N/A

  Session idle time          : N/A

  Session duration           : N/A, remaining: N/A

  Remaining traffic          : N/A

  Max multicast addresses    : 4

  Multicast address list     : N/A

 

QoS:

  User profile               : N/A

  Session group profile      : N/A

  Inbound CAR                : N/A

  Outbound CAR               : N/A

 

Flow statistic:

  Uplink   packets/bytes     : 223423/28598144

  Downlink packets/bytes     : 5802626/742736000

 

Basic:

  Access interface           : GE1/0/2

  VPN instance               : N/A

  Username                   : us3

  Network                    : 7.7.7.0/24

  User ID                    : 0x38020002

  State                      : Online

  Service node               : Slot 1 CPU 0

  Domain                     : dm1

  Login time                 : May 14 20:08:35 2014

  Online time (hh:mm:ss)     : 00:16:03

 

AAA:

  IP pool                    : N/A

  Session idle time          : N/A

  Session duration           : N/A, remaining: N/A

  Remaining traffic          : N/A

  Max multicast addresses    : 4

  Multicast address list     : N/A

 

QoS:

  User profile               : N/A

  Session group profile      : N/A

  Inbound CAR                : N/A

  Outbound CAR               : N/A

 

Flow statistic:

  Uplink   packets/bytes     : 223423/28598144

  Downlink packets/bytes     : 5802626/742736000

Example: Configuring an interface-leased user

Network configuration

As shown in Figure 9, three hosts access the BRAS as one interface-leased user. The BRAS performs AAA for the hosts through the RADIUS server.

Figure 9 Network diagram

Procedure

1.     Configure the RADIUS server: (This section uses the Linux Free RADIUS server as an example.)

# Add the BRAS IP address 4.4.4.2 and the secret radius to the clients.conf file.

client 4.4.4.2/32 {

ipaddr = 4.4.4.2

netmask=32

secret=radius

}

# Add host username and password to the users user information file. The username is us1 and the password is pw1.

us1  Cleartext-Password :="pw1"

2.     Configure the BRAS:

a.     Configure IP addresses for interfaces. (Details not shown.)

b.     Configure a RADIUS scheme:

# Create a RADIUS scheme named rs1 and enter its view.

<Device> system-view

[Device] radius scheme rs1

# Configure primary servers and keys for authentication and accounting.

[Device-radius-rs1] primary authentication 4.4.4.1

[Device-radius-rs1] primary accounting 4.4.4.1

[Device-radius-rs1] key authentication simple radius

[Device-radius-rs1] key accounting simple radius

# Exclude the ISP name from the username sent to the RADIUS server.

[Device-radius-rs1] user-name-format without-domain

[Device-radius-rs1] quit

c.     Configure the ISP domain:

# Create an ISP domain named dm1 and enter its view.

[Device] domain dm1

# Configure dm1 to use RADIUS scheme rs1.

[Device-isp-dm1] authentication ipoe radius-scheme rs1

[Device-isp-dm1] authorization ipoe radius-scheme rs1

[Device-isp-dm1] accounting ipoe radius-scheme rs1

[Device-isp-dm1] quit

d.     Configure IPoE:

# Enable IPoE and configure Layer 3 access mode on GigabitEthernet 1/0/2.

[Device] interface gigabitethernet 1/0/2

[Device–GigabitEthernet1/0/2] ip subscriber routed enable

# Configure the interface-leased user and specify its username, password, and ISP domain.

[Device–GigabitEthernet1/0/2] ip subscriber interface-leased username us1 password plaintext pw1 domain dm1

[Device–GigabitEthernet1/0/2] quit

Verifying the configuration

# Display IPoE session information to verify that the host has come online.

[Device] display ip subscriber interface-leased

Basic:

  Access interface           : GE1/0/2

  VPN instance               : N/A

  Username                   : us1

  User ID                    : 0x30000000

  State                      : Online

  Service node               : Slot 1 CPU 0

  Domain                     : dm1

  Login time                 : May 14 20:04:42 2014

  Online time (hh:mm:ss)     : 00:16:37

 

AAA:

  IP pool                    : N/A

  Session idle time          : N/A

  Session duration           : N/A, remaining: N/A

  Remaining traffic          : N/A

  Max multicast addresses    : 4

  Multicast address list     : N/A

 

QoS:

  User profile               : N/A

  Session group profile      : N/A

  Inbound CAR                : N/A

  Outbound CAR               : N/A

 

Flow statistic:

  Uplink   packets/bytes     : 16734145/2141970560

  Downlink packets/bytes     : 22314327/2856233728

Example: Configuring a VPN DHCP user

Network configuration

As shown in Figure 10, the host in a VPN accesses the BRAS as a DHCP user. The BRAS performs AAA for the host through the RADIUS server.

Figure 10 Network diagram

Procedure

1.     Configure the RADIUS server: (This section uses the Linux Free RADIUS server as an example.)

# Add BRAS IP address 4.4.4.2 and secret radius to the clients.conf file.

client 4.4.4.2/32 {

ipaddr = 4.4.4.2

netmask=32

secret=radius

}

# Add host username, password, VPN, and address pool to the users user information file. The username is the host MAC address, the password is radius, the VPN is vpn1, and the address pool is pool1.

000c29a6b656  Cleartext-Password :="radius"

Huawei-VPN-Instance :="vpn1",

Framed-Pool := " pool1"

2.     Configure the DHCP server:

# Enable DHCP.

<DHCP-server> system-view

[DHCP-server] dhcp enable

# Create an IP address pool named pool1 and enter its view.

[DHCP-server] dhcp server ip-pool pool1

# Configure network segment 3.3.3.0/24 to the pool.

[DHCP-server-pool-pool1] network 3.3.3.0 24

# Configure IP address 3.3.3.1 as unavailable.

[DHCP-server-pool-pool1] forbidden-ip 3.3.3.1

[DHCP-server-pool-pool1] quit

# Configure a static IP address to specify the next hop for destination IP address 3.3.3.0.

[DHCP-server] ip route-static 3.3.3.0 24 4.4.4.2

3.     Configure the BRAS:

a.      Configure IP addresses for interfaces. (Details not shown.)

b.     Configure a RADIUS scheme:

# Create a RADIUS scheme named rs1 and enter its view.

<Device> system-view

[Device] radius scheme rs1

# Configure primary servers and keys for authentication and accounting.

[Device-radius-rs1] primary authentication 4.4.4.1

[Device-radius-rs1] primary accounting 4.4.4.1

[Device-radius-rs1] key authentication simple radius

[Device-radius-rs1] key accounting simple radius

# Exclude the ISP name from the username sent to the RADIUS server.

[Device-radius-rs1] user-name-format without-domain

[Device-radius-rs1] quit

c.     Configure the ISP domain:

# Create an ISP domain named dm1 and enter its view.

[Device] domain dm1

# Configure dm1 to use RADIUS scheme rs1.

[Device-isp-dm1] authentication ipoe radius-scheme rs1

[Device-isp-dm1] authorization ipoe radius-scheme rs1

[Device-isp-dm1] accounting ipoe radius-scheme rs1

[Device-isp-dm1] quit

d.     Configure the DHCP relay:

# Enable DHCP.

[Device] dhcp enable

[Device] interface gigabitethernet 1/0/2

# Enable the DHCP relay on GigabitEthernet 1/0/2.

[Device–GigabitEthernet1/0/2] dhcp select relay

[Device–GigabitEthernet1/0/2] quit

# Create an address pool named pool1 and assign pool1 to vpn1.

[Device] dhcp server ip-pool pool1

[Device-dhcp-pool-pool1] vpn-instance vpn1

# Configure a gateway IP address for the host and enable route exporting. Route exporting automatically adds the gateway IP address and related static IP address to the routing table of vpn1.

[Device-dhcp-pool-pool1] gateway-list 3.3.3.1 export-route

# Configure an IP address for the DHCP sever

[Device-dhcp-pool-pool1] remote-server 4.4.4.3

e.     Configure IPoE:

# Enable IPoE and configure Layer 2 access mode on GigabitEthernet 1/0/2.

[Device] interface gigabitethernet 1/0/2

[Device–GigabitEthernet1/0/2] ip subscriber l2-connected enable

# Enable the DHCP user.

[Device–GigabitEthernet1/0/2] ip subscriber initiator dhcp enable

# Specify dm1 as the ISP domain.

[Device–GigabitEthernet1/0/2] ip subscriber dhcp domain dm1

# Configure plaintext password radius for authentication.

[Device–GigabitEthernet1/0/2] ip subscriber password plaintext radius

[Device–GigabitEthernet1/0/2] quit

f.     Configure a static route to direct the DHCP request from vpn1 to the DHCP server.

[Device] ip route-static vpn-instance vpn1 4.4.4.0 24 4.4.4.3 public

g.     Configure a policy-based route to direct the traffic from the DHCP server to vpn1:

# Configure a policy named to_vpn1 with a node number of 0 and match mode of permit, and specify packets to be transmitted in vpn1.

[Device] policy-based-route to_vpn1 permit node 0

[Device-pbr-to_vpn1-0] apply access-vpn vpn-instance vpn1

[Device-pbr-to_vpn1-0] quit

# Apply to_vpn1 to GigabitEthernet 1/0/1.

[Device] interface gigabitethernet 1/0/1

[Device–GigabitEthernet1/0/1] ip policy-based-route to_vpn1

[Device–GigabitEthernet1/0/1] quit

Verifying the configuration

# Display IPoE session information to verify the configuration.

[Device] display ip subscriber session verbose

Basic:

  Description                : -

  Username                   : 000c29a6b656

  Domain                     : dm1

  VPN instance               : vpn1

  IP address                 : 3.3.3.2

  MAC address                : 000c-29a6-b656

  Service-VLAN/Customer-VLAN : -/-

  Access interface           : GE1/0/2

  User ID                    : 0x380800b5

  VPI/VCI(for ATM)           : -/-

  DHCP lease                 : 86400 sec

  DHCP remain lease          : 18400 sec

  Login time                 : May  9 08:56:29 2014

  Online time (hh:mm:ss)     : 00:16:37

  Service node               : Slot 1 CPU 0

  Type                       : DHCP

  State                      : Online

 

AAA:

  IP pool                    : pool1

  Session idle time          : N/A

  Session duration           : N/A, remaining: N/A

  Remaining traffic          : N/A

  Max multicast addresses    : 4

  Multicast address list     : N/A

 

QoS:

  User profile               : N/A

  Session group profile      : N/A

  Inbound CAR                : N/A

  Outbound CAR               : N/A

 

Flow statistic:

  Uplink   packets/bytes     : 594341/76075648

  Downlink packets/bytes     : 0/0

Example: Configuring online detection

Network configuration

As shown in Figure 11, three hosts access the BRAS as unclassified-IP users. The BRAS performs AAA for the host through the RADIUS server.

Figure 11 Network diagram

Procedure

1.     Configure the RADIUS server: (This section uses the Linux Free RADIUS server as an example.)

# Add BRAS IP address 4.4.4.2 and secret radius to the clients.conf file.

client 4.4.4.2/32 {

ipaddr = 4.4.4.2

netmask=32

secret=radius

}

# Add the usernames and passwords to the users user information file. The usernames are the host IP addresses and the plaintext password is radius.

2.2.2.2  Cleartext-Password :="radius"

2.2.2.3  Cleartext-Password :="radius"

2.2.2.4  Cleartext-Password :="radius"

2.     Configure the BRAS:

a.     Configure IP addresses for interfaces. (Details not shown.)

b.     Configure a RADIUS scheme:

# Create a RADIUS scheme named rs1 and enter its view.

<Device> system-view

[Device] radius scheme rs1

# Configure primary servers and keys for authentication and accounting.

[Device-radius-rs1] primary authentication 4.4.4.1

[Device-radius-rs1] primary accounting 4.4.4.1

[Device-radius-rs1] key authentication simple radius

[Device-radius-rs1] key accounting simple radius

# Exclude the ISP name from the username sent to the RADIUS server.

[Device-radius-rs1] user-name-format without-domain

[Device-radius-rs1] quit

c.     Configure the ISP domain:

# Create an ISP domain named dm1 and enter its view.

[Device] domain dm1

# Configure dm1 to use RADIUS scheme rs1.

[Device-isp-dm1] authentication ipoe radius-scheme rs1

[Device-isp-dm1] authorization ipoe radius-scheme rs1

[Device-isp-dm1] accounting ipoe radius-scheme rs1

[Device-isp-dm1] quit

d.     Configure IPoE:

# Enable IPoE and configure Layer 3 access mode on GigabitEthernet 1/0/2.

[Device] interface gigabitethernet 1/0/2

[Device–GigabitEthernet1/0/2] ip subscriber routed enable

# Enable the unclassified-IP user.

[Device–GigabitEthernet1/0/2] ip subscriber initiator unclassified-ip enable

# Specify dm1 as the ISP domain.

[Device–GigabitEthernet1/0/2] ip subscriber unclassified-ip domain dm1

# Configure plaintext password radius for authentication.

[Device–GigabitEthernet1/0/2] ip subscriber password plaintext radius

# Configure online detection:

-     Use ICMP detection mode.

-     Set the maximum number of detection attempts to 2.

-     Set the detection interval to 30 seconds.

[Device–GigabitEthernet1/0/2] ip subscriber user-detect icmp retry 2 interval 30

[Device–GigabitEthernet1/0/2] quit

Verifying the configuration

Use the display ip subscriber session command to verify that the BRAS deletes the IPoE session after the user goes offline.

Troubleshooting IPoE

DHCP clients failed to come online

Symptom

DHCP clients cannot come online, although network connections and interface IPoE configurations are correct.

Solution

To solve the problem:

1.     Use debug commands or a packet analyzer to check DHCP packets from the DHCP client.

By default, DHCPv4 and DHCPv6 clients use ISP domains specified in Option 60 and Option 16, respectively.

2.     If the DHCPv4 packet carries Option 60 or the DHCPv6 packet carries Option 16, verify that the ISP domain in the option exists on the BRAS.

3.     If the DHCP packet does not carry Option 60 or Option 16, verify that the ISP domain specified on the interface exists on the BRAS.

4.     If the problem persists, contact H3C Support.

Inter-card traffic statistics failure on an aggregate interface

Symptom

Network connections and interface IPoE configurations are correct and traffic statistics can be performed correctly for an aggregate interface with member ports on different cards. Traffic statistics fails after the member port on the initially accessed card goes down and the user accesses the member port on another card.

Solution

To solve the problem:

1.     Use the service command to specify a service card for traffic statistics. Traffic will be forwarded to the specified service card for statistics. To avoid interrupting traffic statistics, make sure the specified service card is present.

Traffic statistics is performed on the card that the user initially accessed. When a member port on the initially accessed card goes down, the user traffic is redirected to the member port on another card. If no traffic exists on the initially accessed card, traffic statistics cannot be performed.

2.     If the problem persists, contact H3C Support.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网