Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Configuring the NIC Proxy for the Pseudo-RADIUS Authorization Server (SRC CLI)

    When the check-lease-limit-with-sae option is set to true, you must configure the NIC proxy so that the pseudo-RADIUS authorization server can find the SAE managing the interface and determine the number of subscriber sessions already established on the interface (that is, the number of leases on the interface). The NIC proxy must be configured for a NIC scenario that maps VRs to SAEs.

    Tasks to configure the NIC proxy are:

    Configuring Resolution Information for a NIC Proxy

    Use the following configuration statements to configure the NIC proxy:

    slot number external-subscriber-monitor nic-proxy-configuration radius-authorization-nic resolution {resolver-name resolver-name; constraints constraints; }

    To configure resolution information for a NIC proxy:

    1. From configuration mode, access the configuration statement that configures the NIC proxy configuration. In this sample procedure, the NIC proxy called radius-authorization-nic is configured.
      user@host# edit slot 0 external-subscriber-monitor nic-proxy-configuration radius-authorization-nic resolution
    2. Specify the resolution information for this NIC proxy.
      [edit slot 0 external-subscriber-monitor nic-proxy-configuration radius-authorization-nic resolution]user@host# set ?

      For more information about configuring resolution information for a NIC proxy, see Configuring Resolution Information for a NIC Proxy (SRC CLI).

    3. (Optional) Verify your configuration.
      [edit slot 0 external-subscriber-monitor nic-proxy-configuration radius-authorization-nic resolution]user@host# show

    Changing the Configuration for the NIC Proxy Cache

    You can modify cache properties for the NIC proxy to optimize the resolution performance for your network configuration and system resources. Typically, you can use the default settings for the cache properties. The configuration statements are available at the Advanced editing level.

    Use the following configuration statements to change values for the NIC proxy cache:

    slot number external-subscriber-monitor nic-proxy-configuration radius-authorization-nic cache {cache-size cache-size; cache-cleanup-interval cache-cleanup-interval; cache-entry-age cache-entry-age; }

    To configure the cache for a NIC proxy:

    1. From configuration mode, access the configuration statement that specifies the NIC proxy configuration. In this sample procedure, the NIC proxy called radius-authorization-nic is configured.
      user@host# edit slot 0 external-subscriber-monitor nic-proxy-configuration radius-authorization-nic cache
    2. Specify the cache properties for the NIC proxy.
      [edit slot 0 external-subscriber-monitor nic-proxy-configuration radius-authorization-nic cache]user@host# set ?

      For more information about configuring the cache for a NIC proxy, see Changing the Configuration for the NIC Proxy Cache (SRC CLI).

    3. (Optional) Verify your configuration.
      [edit slot 0 external-subscriber-monitor nic-proxy-configuration radius-authorization-nic cache]
      user@host# show
      cache-size 10000; 
      cache-cleanup-interval 15; 

    Configuring a NIC Proxy for NIC Replication

    Typically, you configure NIC replication to keep the NIC highly available. You configure NIC host selection to specify the groups of NIC hosts to be contacted to resolve a request, and to define how the NIC proxy handles NIC hosts that the proxy is unable to contact. The configuration statements are available at the Normal editing level.

    Use the following configuration statements to configure NIC host selection for a NIC proxy:

    slot number external-subscriber-monitor nic-proxy-configuration radius-authorization-nic nic-host-selection {groups groups; selection-criteria (roundRobin | randomPick | priorityList); }
    slot number external-subscriber-monitor nic-proxy-configuration radius-authorization-nic nic-host-selection blacklisting {try-next-system-on-error; number-of-retries-before-blacklisting number-of-retries-before-blacklisting; blacklist-retry-interval blacklist-retry-interval; }

    To configure a NIC proxy to use NIC replication:

    1. From configuration mode, access the configuration statement that specifies the NIC proxy configuration. In this sample procedure, the NIC proxy called radius-authorization-nic is configured.
      user@host# edit slot 0 external-subscriber-monitor nic-proxy-configuration radius-authorization-nic nic-host-selection
    2. (Optional) Configure NIC host selection for a NIC proxy.
      [edit slot 0 external-subscriber-monitor nic-proxy-configuration radius-authorization-nic nic-host-selection]user@host# set ?

      For more information about configuring NIC host selection for a NIC proxy, see Configuring a NIC Proxy for NIC Replication (SRC CLI).

    3. (Optional) Verify your configuration.
      [edit slot 0 external-subscriber-monitor nic-proxy-configuration radius-authorization-nic nic-host-selection]
      user@host# show
      groups ; 
      selection-criteria roundRobin; 
    4. Access the configuration statement that specifies the NIC proxy configuration for blacklisting—the process of handling nonresponsive NIC hosts.
      [edit slot 0 external-subscriber-monitor nic-proxy-configuration radius-authorization-nic nic-host-selection]user@host# edit blacklisting [edit slot 0 external-subscriber-monitor nic-proxy-configuration radius-authorization-nic nic-host-selection blacklisting]
    5. (Optional) Configure blacklisting for a NIC proxy.
      [edit slot 0 external-subscriber-monitor nic-proxy-configuration radius-authorization-nic nic-host-selection blacklisting]user@host# set ?

      For more information about configuring NIC host selection for a NIC proxy, see Configuring a NIC Proxy for NIC Replication (SRC CLI).

    6. (Optional) Verify your configuration.
      [edit slot 0 external-subscriber-monitor nic-proxy-configuration radius-authorization-nic nic-host-selection blacklisting]
      user@host# show
      [edit slot 0 external-subscriber-monitor nic-proxy-configuration radius-authorization-nic nic-host-selection blacklisting]
      user@host# show
      try-next-system-on-error; 
      number-of-retries-before-blacklisting 3; 
      blacklist-retry-interval 15;
      

    Modified: 2013-05-20