Juniper Networks
Log in
|
How to Buy
|
Contact Us
|
United States (Change)
Choose Country
Close

Choose Country

North America

  • United States

Europe

  • Deutschland - Germany
  • España - Spain
  • France
  • Italia - Italy
  • Россия - Russia
  • United Kingdom

Asia Pacific

  • Asean Region (Vietnam, Indonesia, Singapore, Malaysia)
  • Australia
  • 中国 - China
  • India
  • 日本 - Japan
  • 대한민국 - Korea
  • 台灣 - Taiwan
Solutions
Products & Services
Company
Partners
Support
Education
Community
Security Intelligence Center

Technical Documentation

Support
Technical Documentation
Content Explorer New
 
Enterprise MIBs
 
EOL Documentation
 
Feature Explorer Login required New
 
File Format Help
 
Glossary
 
Portable Libraries
 
 
Home > Support > Technical Documentation > JunosE Software > Guidelines for Configuring Duplicate Protection for IWF PPPoE Sessions
Print
Rate and give feedback:  Feedback Received. Thank You!
Rate and give feedback: 
Close
This document helped resolve my issue.  Yes No

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:  
E-mail: 
Submitting...
 

Related Documentation

  • Overview of IWF PPPoE Sessions with Duplicate MAC Addresses
  • Single DSLAM Connected to a PPPoE Access Concentrator
  • Multiple DSLAMs Connected to a PPPoE Access Concentrator
 

Guidelines for Configuring Duplicate Protection for IWF PPPoE Sessions

Keep the following points in mind when you configure duplicate protection for IWF PPPoE sessions:

  • In most environments, a 1:1 relationship between the DSLAM and PPPoE access concentrator is present. In such situations, all IWF sessions demultiplexed at any PPPoE access concentrator are required to contain the same source MAC address. In deployments where IWF sessions originate from multiple MAC addresses (because of multiple DSLAMs used to demultiplex subscriber sessions) and no VLAN grouping of VLAN IDs is configured, IWF sessions are not limited per source MAC address.
  • If a user spoofs the IWF-Session VSA in a PPPoE PADR that originates from the PPPoE client or access loop for a non-IWF session, this user might be able to bypass the duplicate protection setting configured on the router. The PPPoE access concentrator cannot detect such spoofing when the interworking functionality is activated.
  • Table 1 describes the different scenarios in which duplicate MAC addresses are supported for IWF PPPoE sessions and non-IWF PPPoE sessions, when duplicate protection configuration is enabled or disabled on a router.

    Table 1: PPPoE Duplicate Protection Scenarios for IWF and non-IWF PPPoE Sessions

    Type of PPPoE Session

    Duplicate Protection Enabled

    Duplicate Protection Disabled

    IWF PPPoE session (IWF-Session DSL VSA contained in the PADR packet)

    Sessions with duplicate MAC addresses are processed until the maximum number of PPPoE sessions configured per major interface is reached.

    Sessions with duplicate MAC addresses are processed.

    Non-IWF PPPoE session (IWF-Session DSL VSA not contained in the PADR packet )

    Sessions with duplicate MAC addresses are terminated and cannot access network resources

    Sessions with duplicate MAC addresses are processed.

 

Related Documentation

  • Overview of IWF PPPoE Sessions with Duplicate MAC Addresses
  • Single DSLAM Connected to a PPPoE Access Concentrator
  • Multiple DSLAMs Connected to a PPPoE Access Concentrator
 

Published: 2012-06-26

 
  • About Juniper
  • Investor Relations
  • Press Releases
  • Newsletters
  • Juniper Offices
  • Green Networking
  • Resources
  • How to Buy
  • Partner Locator
  • Image Library
  • Visio Templates
  • Security Center
  • Community
  • Forums
  • Blogs
  • Junos Central
  • Social Media
  • Developers
  • Support
  • Technical Documentation
  • Knowledge Base (KB)
  • Software Downloads
  • Product Licensing
  • Contact Support
Site Map / RSS Feeds / Careers / Accessibility / Feedback / Privacy & Policy / Legal Notices
Copyright© 1999-2012 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out