Using the AAA Logical Line Identifier to Track Subscribers

You can configure the router to support the AAA logical line identification feature. This feature enables service providers to track subscribers on the basis of a virtual port known as the logical line ID (LLID).

The LLID is an alphanumeric string that logically identifies a subscriber line. The service provider maps each subscriber to an LLID based on the user name and circuit ID from which the customer’s calls originate. When a subscriber moves to a new physical line, the service provider’s customer profile database is updated to map to the same LLID.

Because a subscriber’s LLID remains the same regardless of the subscriber’s physical location, using the LLID gives service providers a more secure mechanism for tracking subscribers and maintaining the customer database.

How the Router Obtains and Uses the LLID

To obtain an LLID for a subscriber, the router must issue two RADIUS access requests: a preauthentication request to obtain the LLID, followed by an authentication request encoded with the LLID returned in response to the preauthentication request.

To configure this feature, you:

  1. Create an AAA profile that supports preauthentication (by using the pre-authenticate command in AAA Profile Configuration mode).
  2. Specify the IP address of a RADIUS preauthentication server (by using the radius pre-authentication server command in Global Configuration mode) and of an authentication server (by using the radius authentication server command in Global Configuration mode).

The following steps describe how the router uses RADIUS to obtain and use the LLID. It is assumed that you have already configured an AAA profile for preauthentication and have defined both a RADIUS preauthentication server and a RADIUS authentication server. Typically, the preauthentication server and the authentication server reside in the same virtual router context in which the PPP subscriber is authenticated.

The router obtains and uses the LLID as follows:

  1. A PPP subscriber requests authentication through RADIUS.
  2. The router sends an Access-Request message to the RADIUS preauthentication server to obtain an LLID for the subscriber.

    This step is referred to as the preauthentication request because it occurs before user authentication and authorization.

  3. The preauthentication server returns the LLID to the router in the Calling-Station-Id (RADIUS attribute 31) of an Access-Accept message.

    The router ignores any RADIUS attributes other than the Calling-Station-Id that are returned in the preauthentication Access-Accept message.

  4. The router encodes the LLID in the RADIUS Calling-Station-Id and sends an Access-Request message to the RADIUS authentication server.

    This step is referred to as the authentication request.

  5. The RADIUS authentication server returns an Access-Accept message to the router that includes the tunnel attributes for the subscriber session.
  6. For tunneled PPP subscribers, the router, acting as an L2TP access concentrator (LAC), encodes the LLID into L2TP Calling Number AVP 22 and sends this to the L2TP network server (LNS) in an incoming-call request (ICRQ) packet.

    After a successful preauthentication request, the router always encodes the LLID in Calling Number AVP 22. The use of aaa commands such as aaa tunnel calling-number-format to control or change the inclusion of the LLID in Calling Number AVP 22 has no effect.

RADIUS Attributes in Preauthentication Request

Table 6 describes the RADIUS IETF attributes that are always included in a preauthentication request to obtain the LLID. The attributes are listed in ascending order by standard number.

Table 6: RADIUS IETF Attributes in Preauthentication Request

Attribute Number

Attribute Name

Description

[1]

User-Name

Name of the user associated with the LLID, in the format:

NAS-Port:<NAS-IP-Address>:<Nas-Port-Id>

For example, nas-port:172.28.30.117:atm 4/1.104:2.104

[2]

User-Password

Password of the user to be authenticated; always set to “ juniper”

[4]

NAS-IP-Address

IP address of the network access server (NAS) that is requesting authentication of the user; for example, 172.28.30.117

[5]

NAS-Port

Physical port number of the NAS that is authenticating the user; this is always interpreted as a bit field

[6]

Service-Type

Type of service the user has requested or the type of service to be provided; for example, framed

[61]

NAS-Port-Type

Type of physical port the NAS is using to authenticate the user

[77]

Connect-Info

Actual user name; for example, jdoe@xyzcorp.east.com

[87]

NAS-Port-Id

Text string that identifies the physical interface of the NAS that is authenticating the user; for example, atm 4/1.104:2.104

The use of radius commands such as radius calling-station-format or radius override calling-station-id to control or change the inclusion of these attributes in the preauthentication request has no effect.

For more information about these attributes, see RADIUS IETF Attributes.

Considerations for Using the LLID

The following considerations apply when you configure the router for subscriber preauthentication:

Configuring the Router to Obtain the LLID for a Subscriber

To configure the router to obtain the LLID for a subscriber:

  1. Create an AAA profile that supports subscriber preauthentication.
    host1(config)#aaa profile preAuthLlid host1(config-aaa-profile)#pre-authenticate host1(config-aaa-profile)#exit
  2. Define a RADIUS preauthentication server.
    host1(config)#radius pre-authentication server 10.10.10.1 host1(config-radius)#key abc123 host1(config-radius)#exit
  3. Associate the AAA profile with the designated PPP interface.
    host1(config)#interface atm 4/3.101 host1(config-subif)#ppp aaa-profile preAuthLlid
  4. (Optional) Verify that preauthentication support is configured for the AAA profile.
    host1(config-subif)#run show aaa profile name PreAuthLlid
    preAuthLlid:
        atm nas-port-type: ADLSL-CAP
        ethernet nas-port-type: Cable
        profile-service-description: xyzService
        pre-authenticate 
        allow xyz.com
        deny default
        translate xyz1.com abc.com

    For information, see Setting Baselines for Remote Access.

  5. (Optional) Verify configuration of the RADIUS preauthentication server.
    host1(config-subif)#run show radius pre-authentication servers
    
                   RADIUS Pre-Authentication Configuration
                   ---------------------------------------
                    Udp    Retry             Maximum    Dead
     IP Address     Port   Count   Timeout   Sessions   Time   Secret
    -------------   ----   -----   -------   --------   ----   ------
    10.10.10.1      1812   3       3         255        0      radius

    You can also display configuration information for preauthentication servers by using the show radius servers command. For information, see Setting Baselines for Remote Access.

  6. (Optional) Display statistics for the RADIUS preauthentication server.

    To display preauthentication statistics, use the show radius pre-authentication statistics command. For information, see Setting Baselines for Remote Access.

    To display a count of preauthentication requests and responses, use the show aaa statistics command. For information, see Setting Baselines for Remote Access.

aaa profile

key

ppp aaa-profile

pre-authenticate

radius pre-authentication server

Troubleshooting Subscriber Preauthentication

You can configure the router to send traps to SNMP when a RADIUS preauthentication server fails to respond to messages. To do so, you use the same procedure and commands as you do to configure SNMP traps for a RADIUS authentication server.

For example, to enable SNMP traps when a particular RADIUS preauthentication server fails to respond to Access-Request messages, use the radius trap auth-server-not-responding enable command.

For more information, see Configuring SNMP Traps .