CPAR 9.1 Reference Guide
CPAR 9.1 Reference Guide
CPAR 9.1 Reference Guide
1
Reference Guide
Published: March 20, 2020
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1721R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
APPENDIX A Cisco Prime Access Registrar Tcl, REX, and Java Dictionaries A-1
Tcl Attribute Dictionaries A-1
Attribute Dictionary Methods A-1
Tcl Environment Dictionary A-4
REX Attribute Dictionary A-5
Attribute Dictionary Methods A-5
REX Environment Dictionary A-11
REX Environment Dictionary Methods A-11
Dest-GT-Format B-6
Diameter-Application-Id B-6
Diameter-Command-Code B-7
Disable-Accounting-On-Off-Broadcast B-7
DSA-Response-Cache B-7
Dynamic-DNS-HostName B-7
Dynamic-Search-Filter B-7
Dynamic-Search-Path B-7
Dynamic-Search-Scope B-7
Dynamic-Service-Loop-Limit B-8
Dynamic-User-Password-Attribute B-8
EAP-Actual-Identity B-8
EAP-Authentication-Mode B-8
EnableMatchingServiceSelection5GFlag B-8
Enforce-Traffic-Throttling B-8
E-UTRANCellGlobalId B-8
FetchAuthorizationInfo B-8
Generate-BEK B-9
Group-Session-Limit B-9
HLR-GlobalTitle-Address B-9
HLR-GlobalTitle-Cached B-9
HLR-Translated-IMSI B-9
Ignore-Accounting-Signature B-10
IMSI B-10
Incoming-Translation-Groups B-10
Location-Capability B-10
Master-URL-Fragment B-10
Misc-Log-Message-Info B-10
MSISDN B-10
Notification-Code B-11
Notification-Service B-11
Outgoing-Translation-Groups B-11
Pager B-11
PoD/CoA B-11
Query-Service B-12
Re-Accounting-Service B-12
Re-Authentication-Service B-12
Re-Authorization-Service B-12
Reject-Reason B-12
Remote-Server B-13
Remove-Session-On-Acct-Stop B-13
Remote-Servers-Tried B-13
Request-Authenticator B-13
Request-Type B-13
Require-User-To-Be-In-Authorization-List B-14
Response-Type B-14
Retrace-Packet B-14
Send-PEAP-URI-TLV B-14
Session-Key B-15
Session-Manager B-15
Session-Notes B-15
Session-Service B-15
Set-Session-Mgr-And-Key-Upon-Lookup B-15
Skip-Session-Management B-15
Skip-Overriding-Username-With-LDAP-UID B-15
Skip-Overriding-UserName-With-PEAPIdentity B-16
Source-IP-Address B-16
Source-Port B-16
SQL-Sequence B-16
Subnet-Size-If-No-Match B-16
Trace-Level B-16
Unavailable-Resource B-17
Unavailable-Resource-Type B-17
UserDefined1 B-17
User-Authorization-Script B-17
User-Group B-17
User-Group-Session-Limit B-17
User-Name B-17
User-Profile B-17
User-Session-Limit B-18
Virtual-Server-Outgoing-Script B-18
X509- Subject-Name B-18
Internal Variables B-18
APPENDIX D Support for REST API in Cisco Prime Access Registrar D-1
The chapter provides an overview of the RADIUS server, including connection steps, RADIUS message
types, and using Cisco Prime Access Registrar (Prime Access Registrar) as a proxy server.
Prime Access Registrar is a 3GPP-compliant, 64-bit carrier-class RADIUS (Remote Authentication
Dial-In User Service)/Diameter server that enables multiple dial-in Network Access Server (NAS)
devices to share a common authentication, authorization, and accounting database.
Prime Access Registrar handles the following tasks:
• Authentication—determines the identity of users and whether they can be allowed to access the
network
• Authorization—determines the level of network services available to authenticated users after they
are connected
• Accounting—keeps track of each user’s network activity
• Session and resource management—tracks user sessions and allocates dynamic resources
Using a RADIUS server allows you to better manage the access to your network, as it allows you to store
all security information in a single, centralized database instead of distributing the information around
the network in many different devices. You can make changes to that single database instead of making
changes to every network access server in your network.
Prime Access Registrar also allows you to manage the complex interconnections of the new network
elements in order to:
• adequately manage the traffic
• perform appropriate load balancing for desired load distribution
• allow binding of different protocol interfaces corresponding to a subscriber/network element
Service providers transform their 3G and 4G wireless networks with complex services, tiered charging,
converged billing, and more by introducing increasing numbers and types of Diameter-based network
elements. LTE and IMS networks are the most likely to implement these new network
elements—including Policy and Charging Rules Functions (PCRF), Home Subscriber Servers (HSS),
Mobility Management Entities (MME), Online Charging Systems (OCS), and others. As a result, as the
traffic levels grow, these wireless networks are becoming more difficult to manage and scale without the
Prime Access Registrar infrastructure.
Prime Access Registrar allows GUI-based, CLI-based, and REST API-based configurations. For more
details, see the “Using the Graphical User Interface” chapter of the
Cisco Prime Access Registrar 9.1 User Guide, the “Using the aregcmd Commands” chapter of the
Cisco Prime Access Registrar 9.1 Administrator Guide, and Chapter D, “REST API Framework.”
This chapter contains the following sections:
Subdirectory Description
.system Contains ELFs, or binary SPARC executables that should not be run directly.
bin Contains shell scripts and programs frequently used by a network
administrator; programs that can be run directly.
conf Contains configuration files.
data Contains the radius directory, which contains session backing files; and the
db directory, which contains configuration database files.
examples Contains documentation, sample configuration scripts, and shared library
scripts.
lib Contains Prime Access Registrar software library files.
logs Contains system logs and is the default directory for RADIUS accounting.
odbc Contains Prime Access Registrar ODBC files.
scripts Contains sample scripts that you can modify to automate configuration, and
to customize your RADIUS server.
temp Used for temporary storage.
ucd-snmp Contains the UCD-SNMP software Prime Access Registrar uses.
usrbin Contains a symbolic link that points to bin.
Program Flow
When a NAS sends a request packet to Prime Access Registrar with a name and password,
Prime Access Registrar performs the following actions. Table 1-2 describes the flow without regard to
scripting points.
Prime Access Registrar supports Diameter with Extensible Authentication Protocol (EAP) functionality
to enable authentication between NAS and a backend NAS Diameter authentication server. For more
information, see the “Diameter” chapter of the Cisco Prime Access Registrar 9.1 User Guide.
Prime Access Registrar also support 3GPP compliance by implementing a set of protocols. To
understand more about the 3GPP AAA server support and the call flow, see the “Wireless Support”
chapter of the Cisco Prime Access Registrar 9.1 Reference Guide.
Scripting Points
Prime Access Registrar lets you invoke scripts you can use to affect the Request, Response, or
Environment dictionaries. This section contains the following topics:
• Client Scripting
• Client or NAS Scripting Points
• Authentication and/or Authorization Scripting Points
Client Scripting
Though Prime Access Registrar allows external code (Tcl/C/C++/Java) to be used by means of a script,
custom service, policy engine, and so forth, while processing request, response, or while working with
the environment dictionaries, it shall not be responsible for the scripts used and will not be liable for any
direct, indirect, incidental, special, exemplary, or consequential damages (including, but not limited to,
procurement of substitute goods or services; loss of use, data, or profits; or business interruption)
however caused and on any theory of liability, whether in contract, strict liability, or tort (including
negligence or otherwise) arising in any way out of the use of the script.
Prime Access Registrar also allows you to define internal scripts, by which you can add, modify, or
delete attributes in the request, response, and environment dictionaries for RADIUS, Diameter, and
TACACS+.
Action Explanation
Receives an Access-Request. The Prime Access Registrar RADIUS server receives an
Access-Request packet from a NAS.
Determines whether to accept the The client’s IP address listed in
request. /Radius/Clients/<Name>/IPAddress.
*Executes the server’s incoming A script referred to in /Radius/IncomingScript.
script.
*Executes the vendor’s incoming The vendor listed in /Radius/Clients/Name/Vendor, and is a script
script. referred to in /Radius/Vendors/<Name>/IncomingScript.
*Executes the client’s incoming A script referred to in
script. /Radius/Clients/<Name>/IncomingScript.
Determines whether to accept requests from this specific NAS.
/Radius/Advanced/RequireNASsBehindProxyBeInClientList
set to TRUE.
The NAS’s Identifier listed in /Radius/Clients/<Name>, or its
NAS-IP-Address listed in /Radius/Clients/<Name>/IPAddress.
If the client’s IP address listed in /Radius/Clients/<Name>/IPAddress is different:
*Executes the vendor’s incoming The vendor listed in /Radius/Clients/Name/Vendor, and is a
script. script referred to in /Radius/Vendors/<Name>/IncomingScript.
*Executes the client’s incoming The client listed in the previous /Radius/Clients/Name, and is a
script. script referred to in /Radius/Clients/Name/IncomingScript.
Action Explanation
Determines Service to use for The Service name defined in the Environment dictionary variable
authentication and/or Authentication-Service, and is the same as the Service defined
authorization. in the Environment dictionary variable Authorization-Service.
The Service name referred to by
/Radius/DefaultAuthenticationService, and is the same as the
Service defined in /Radius/DefaultAuthorizationService.
Performs authentication and/or If the Services are the same, perform authentication and
authorization. authorization.
If the Services are different, just perform authentication.
Action Explanation
*Executes the Service’s incoming A script referred to in
script. /Radius/Services/<Name>/IncomingScript.
Performs authentication and/or Based on the Service type defined in
authorization. /Radius/Services/<Name>/<Type>.
*Executes the Service’s outgoing A script referred to in
script. /Radius/Services/<Name>/OutgoingScript.
Determines whether to perform The Service name defined in
authorization. /Radius/DefaultAuthorizationService, if different than the
Authentication Service.
*Executes the Service’s incoming A script referred to in
script. /Radius/Services/<Name>/IncomingScript.
Performs authorization. Checks that the Service type is defined in
/Radius/Services/<Name>/<Type>.
*Executes the Service’s outgoing A script referred to in
script. /Radius/Services/<Name>/OutgoingScript.
Note The client and the NAS can be the same entity, except when the immediate client is acting
as a proxy for the actual NAS.
Table 1-5 Prime Access Registrar Processing Hierarchy for Incoming Scripts
Table 1-7 Prime Access Registrar Processing Hierarchy for Outgoing Script
Ports
The following table lists the port numbers that are used for various services in Prime Access Registrar
for AAA.
Protocol
Port Service of the Access from Configuration Name and
Names Description Numbers Ports Network Node Setting Reference
AR AAA Service The RADIUS 1812-udp RADIUS AA Network Access You can change the RADIUS AA
packet listener uses Server default or define (Authenticati
these ports by new RADIUS port on, and
default. numbers under Authorizatio
/Radius/Advanced/ n) service.
Ports in the CLI
and Configuration
> Advanced >
Ports in the GUI.
1813-udp RADIUS Network Access You can change the RADIUS
radacct Accounting Server default or define Accounting
new RADIUS port service.
numbers under Refer to RFC
/Radius/Advanced/ 6733 for
Ports in the CLI more
and Configuration information.
> Advanced >
Ports in the GUI.
3799/udp RADIUS Network Access N/A RADIUS
Dynamic Server Dynamic
Authorizatio authorization
n (CoA/PoD) which is used
with
(CoA/PoD)
packet types.
AR AAA Service The RADIUS 2083-rtls RADIUS Network Access You can change the RADIUS
packet TLS listener TLS Server default or define AAA over
uses this port by new RADIUS port TLS
default. numbers under communicati
/Radius/Advanced/ on
Ports in the CLI
and Configuration
> Advanced >
Ports in the GUI.
Protocol
Port Service of the Access from Configuration Name and
Names Description Numbers Ports Network Node Setting Reference
AR AAA Service The TACACS+ 49/tcp TACACS+ Network Access You can change the TACACS+
packet listener uses Server default or define based on
this port by default. new RADIUS port AAA service
numbers under (Authenticati
/Radius/Advanced/ on,
Ports in the CLI Authorizatio
and Configuration n, and
> Advanced > Accounting).
Ports in the GUI.
Refer to RFC
1491 for
more
information.
AR AAA Service The DIAMETER 3868/tcp DIAMETER Network Access You can enable or DIAMETER
packet listener uses Server disable this service AA Service
these ports by in (Authenticati
default. Radius/Advanced/ on, and
Diameter/IsDiamet Authorizatio
erEnabled. n) by tcp
protocol.
Refer to RFC
4005 for
more
information.
3868/sctp DIAMETER Network Access You can enable or DIAMETER
Server disable this service AA Service
in (Authenticati
Radius/Advanced/ on, and
Diameter/IsDiamet Authorizatio
erEnabled1. n) by SCTP
protocol.
AR MCD Server MCD is used to 2786/tcp MCD This service can N/A Proprietary
store Prime Access database be accessed IPC
Registrar Server from local host mechanism.
configuration. by Prime Access
Registrar radius
and server agent
process.
AR Server Agent AR Server Agent is 2785/tcp Internal IPC This service can N/A Proprietary
used to log all the mechanism be accessed IPC
activities of from local host mechanism.
Prime Access Regi by Prime Access
strar processes. Registrar radius
and server agent
process.
Protocol
Port Service of the Access from Configuration Name and
Names Description Numbers Ports Network Node Setting Reference
AR GUI Service Prime Access 8080/tcp AR HTTP This service is You can change the Standard
Registrar GUI service accessible from default port HTTP
processes use these any end user numbers in editing protocol
ports by default. desktop browser the server.xml file.
using http
protocol.
8443/tcp AR HTTPS This service is You can change the Standard
service accessible from default port HTTPS
any end user numbers in editing protocol
desktop browser the server.xml file.
using https
protocol.
8005/tcp Internally Local host You can change the To shutdown
used by default port Tomcat JVM
Apache numbers in editing service
Tomcat the server.xml file.. instance.
container
8009/tcp Apache Local host You can change the Apache JServ
Tomcat default port protocol.
container numbers in editing
AJP 1.3
the server.xml file.
AJP 1.3 Connector.
Connector
SNMP Master SNMP Packet 161/udp Simple Net This service is Refer to net-snmp SNMP MIBs
Agent listener supports Management accessible from documentation for server
these ports by Protocol any network more information.
default. management
host.
162/udp Traps for This service is Refer to SNMP SNMP trap
SNMP accessible to chapter of the server
any SNMP trap Cisco Prime Acces
client when you s Registrar 9.1 Use
want to use r Guide for more
net-snmp information.
snmptrap
daemon as a
SNMP trap
server.
Protocol
Port Service of the Access from Configuration Name and
Names Description Numbers Ports Network Node Setting Reference
CPAR SIGTRAN Listen on these 9041/TCP Stack This service can N/A CPAR
Stack (radius) ports for internal Manager be accessed Specific IPC
configuration from Configuratio from local host Protocol
stack manager n/Event by Prime Access implementati
events Listener Registrar – on
Radius Process.
9041/UDP Stack This service can N/A CPAR
Manager be accessed Specific IPC
Configuratio from local host Protocol
n/Event by Prime Access implementati
Listener Registrar – on
Radius Process.
CPAR SIGTRAN Configure stack 9100/TCP SIGTRAN This service can N/A CPAR
stack and receive Stack be accessed Specific IPC
manager(m3ua-sta configuration from Manager from local host Protocol
ckmgr) m3ua-cliclient by Prime Access implementati
Registrar – on
Radius Process
and
m3ua-cliclient
Process.
9100/UDP SIGTRAN This service can N/A CPAR
Stack be accessed Specific IPC
Manager from local host Protocol
by Prime Access implementati
Registrar – on
Radius Process
and
m3ua-cliclient
Process.
1. If an error occurs while starting the Diameter SCTP interface, add install sctp /bin/true to /etc/modprobe.conf. Then, configure port 3868 with Type
Diameter-TCP using aregcmd in /Radius/Advanced/Ports.
Related Documentation
For a complete list of Cisco Prime Access Registrar documentation, see the Cisco Prime Access
Registrar 9.1 Documentation Overview.
Note We sometimes update the documentation after original publication. Therefore, you should also review
the documentation on Cisco.com for any updates.
Accounting-Start Packet
The Accounting-Start packet describes the type of service and the user attempting to login.
Tue, 06 Dec 2013 12:32:17.036
User-Name = bob
NAS-Port = 1
Framed-IP-Address = 1.1.1.1
Class = yahoo.com
NAS-Identifier = localhost
Acct-Status-Type = Start
Acct-Session-Id = 1
05/15/2013 2:52:29 name/radius/1 Error System 0 Failed to write records to the accounting
report file '/usr/accounting.log' - accounting records lost
Note An Accounting-Response packet is sent only if the accounting record is written to the file in the disk. If
the disk is full, an Accounting-Response packet is not sent.
Error message logged in name_radius_1_log file when the path specified in the
FilenamePrefix property is not valid.
Cisco Prime Access Registrar (Prime Access Registrar) supports Worldwide Interoperability for
Microwave Access (WiMAX) technology. This feature support in Prime Access Registrar complies with
the WiMAX forum NWG_R1_V1.3.1-Stage-3 specifications.
This chapter contains the following sections:
• WiMAX - An Overview
• WiMAX in Cisco Prime Access Registrar
WiMAX - An Overview
WiMAX is a standards-based wireless technology that offers high throughput broadband connections
over long distances. WiMAX can be used for a number of applications, including “last mile” broadband
connections, fixed and mobile cellular service, hotspots and cellular backhaul, and high-speed enterprise
connectivity for business. WiMAX is based on the IEEE 802.16d standard for fixed wireless, and the
802.16e standard for mobile wireless. This standard is appealing to customers because it allows mass
production of chipsets that reduce CPE costs, ensures multi-vendor interoperability, and reduces
investment risk for operators.
The architectural framework of a WiMAX network consists of the Access Service Network (ASN), the
Connectivity Service Network (CSN), and a AAA Server. An Access Service Network is a set of network
functions that provide radio access to a WiMAX subscriber. The ASN typically provides functions such
as network discovery and selection, connectivity service between the MSS and CSN, Radio Resource
Management, Multicast and Broadcast Control, Intra-ASN mobility, Paging, and Location Management.
The WiMAX architecture consists of both mobile and fixed subscribers, as well as the ASN and CSN.
A CSN is defined as a set of network functions that provide IP connectivity services to the WiMAX
subscribers. CSN might comprise network elements such as Routers, Home Agent, AAA proxy/servers,
user databases, Policy Servers, Content Service Gateways, Service Selection Gateways, and
interworking gateway devices.
The Access Service Network is connected to a home network HCSN (Home Connectivity Service
Network) via at least one visited network (Visited Connectivity Service Network VCSN) or intermediate
network.
The Visited CSN plays the role of a AAA proxy. During all AAA interaction the VCSN AAA server acts
as a RADIUS proxy transporting RADIUS packets between the ASN and the HCSN.
Figure 3-1 describes the network reference model of a typical WiMAX scenario.
Direct Interaction Between the ASN GW and Cisco Prime Access Registrar
When the mobile node (MN) sends a RADIUS request to the ASN GW, it forwards this request to the
CSN. If it is VCSN, the VAAA proxies the request with Visited HA address in the Access Request to
HAAA. The HAAA initiates an authentication using the EAP service, for example, eap-ttls. The initial
Access-Request containing the WiMAX capability and NAS-Port-Type (Type:61) attributes indicate that
the specified flow is for a WiMAX request from ASN GW. Prime Access Registrar redirects this request
to the WiMAX service that you configure. The WiMAX service redirects the request to the EAP-based
Wimax-Authentication-Service for authentication. Upon successful authentication, the WiMAX service
redirects the request to Wimax-Session-Manager to allocate the home agent. Subsequently,
Prime Access Registrar generates the appropriate keys based on the Extended Master Session Key
(EMSK) and records the generated keys in the session cache resource manager as configured, before
sending Access-Accept to the ASN GW.
If there is no VCSN, then the HAAA will send the Access-Accept to ASNGW. Otherwise, the HAAA
sends the Access-Accept to VAAA. The VAAA then generates the visited HA-RK Key with SPI and
Lifetime and sends the access-accept to ASNGW.
The authentication methods followed by Prime Access Registrar are:
• User-only
• Device-only
• Single-EAP Device or User authentication
Note Prime Access Registrar 4.2 does not support Double-EAP authentication.
Prime Access Registrar uses the following values to identify the service-type:
• Framed—for initial authentication
• Authenticate-Only—for reauthentication
• Authorize-Only—for prepaid request
The attributes contained in this flow are listed in Table 3-1. For detailed information on the attributes
refer to the WiMAX forum NWG_R1_V1.3.1-Stage-3 specifications document.
Attribute Description
User-Name Must be present. This attributes gets the NAI from
the EAP-Response/Identity.
Service-Type Must be present and the value is Framed,
Authenticate-Only or Authorize-Only.
WiMAX Capability This attribute is chosen by the ASN GW. The
request to the Prime Access Registrar is provided
through the WiMAX-Capability attribute. The
server might respond with the chosen WiMAX
Capability.
NAS-Port-Type The request must contain this attribute with the
value 27. This indicates Wireless IEEE 802.16
port when coming from a WiMAX ASN.
Calling-Station-ID The request must contain this attribute with the
value set to the MAC address of the device in
binary format.
Device-Authentication-Indicator The request might contain this attribute to
indicate whether the device authentication was
performed or not and the result of the action.
CUI The NAS might intimate the support for CUI by
sending the CUI attribute with the value ‘null’.
GMT-Time-Zone-Offset The request must contain the offsets in seconds
from the GMT at the NAS.
Attribute Description
Framed-IP-Address This is the CMIPv4 Home address to be assigned
to the MN. If this attribute is not present then the
Home address is derived by the ASN from MIP
procedures or through DHCP.
WiMax-Session-ID This attribute shall not be present in the initial
authentication. The value is a unique identifier in
the home realm for this session as set by the
HAAA(Prime Access Registrar) in the
Access-Accept, when the authentication is
successful and it will be included in all
subsequent requests from the NAS, such as online
accounting.
MSK The MSK shall be provided by the AAA Server as
a result of successful EAP-authentication.
MSK can be transmitted using either the
MS-MPPE-Keys or the MSK attribute.
Packet-Flow-Descriptor The pre-provisioned service flow which might be
present in the Access-Accept packet.
QoS-Descriptor The pre-provisioned service flow which might be
present in the Access-Accept packet, if
configured in Prime Access Registrar.
BS-ID Might be present in the Access-Request packet
which will identify NAP-ID base station. If both
NAP-ID and BS-ID are present, the NAP-ID will
be ignored.
Acct-Interim-Interval Sent in the Access-Accept packet. It indicates the
accounting update intervals.
Prime Access Registrar generates a few more attributes upon successful authentication. These attributes
are described in Table 3-2.
Attribute Description
hHA-IP-MIP4 The IP address of the home HA allocated for the
incoming request.
vHA-IP-MIP4 The IP address of the visited HA. To be used by
the PMIP4 client.
MN-hHA-MIP4-KEY The MN-hHA key is used for MIP4 procedures.
MN-hHA-MIP4-SPI The SPI associated with the
MN-hHA-MIP4-KEY.
MN-vHA-MIP4-KEY The MN-vHA key is used for MIP4 procedures.
Table 3-2 Additional Attributes: ASN-GW Prime Access Registrar Flow (continued)
Attribute Description
MN-vHA-MIP4-SPI The SPI associated with the
MN-vHA-MIP4-KEY.
FA-RK-KEY The FA-RK key will be used at ASN GW to derive
MN-FA for MIP4 procedures.
Note A policy engine can parse the NAI decoration and conclude the type of authentication method for the
incoming access-request for passing on to WiMAX service.
Attribute Description
Pseudo Identity As received from the MS in the NAI in the
EAP-Response/Identity. The HAAA is required to
correlate this to the true identity of the user.
NAS-ID/NAS-IP address One or both of these parameters are cached by the
HAAA. This is required to locate the serving
NAS.
Framed-IP Address The IP address allocated to the user session. This
information is useful in identifying the session
during AAA dynamic procedures.
MIP-RK, hHA-RK, FA-RK, MN-hHA Mobility keys generated during network access
authentication. These keys are cached and used by
the network for mobility authentication.
hHA-IP address The IP address of the home HA assigned to the
MS.
Attribute Description
vHA-RK, vHA-RK-SPI, vHA-RK Lifetime, Mobility keys generated during network access
MN-vHA authentication. These keys are cached and used by
the network for mobility authentication.
vHA-IP address The IP address of the visited HA assigned to the
MS.
Note Prime Access Registrar responds with the correct keys back to the HA based on the NAI in User-Name
attribute. Prime Access Registrar returns an Access-Reject if it does not find a valid session for the NAI
during the user authentication and authorization or if there are other errors.
Note The HA Resource Manager allocates the IP addresses to the HA. If you do not configure the HA
Resource Manager properly, Prime Access Registrar will not generate some of the keys, which result in
an Access-Reject by the NAS.
When the OverwriteAttributes value is set as TRUE, the newly generated mobility keys will be cached
with the session record. By default, the value is FALSE.
The HA-RK-Lifetime attribute type must be of type STRING instead of UINT32 under
/Radius//advanced/attribute\ dictionary/vendor-Specific/vendors/wimAX/subAttribute\
Dictionary.
Note For generating RRQ-MN-HA key, we must configure MIP-RK in the AttributesToBeCached list.
Note If a default session manager is configured with the same key as that of the WiMAX session manager, the
incoming WiMAX request will fail.
Note If AttributesToBeReturned is not configured, all the cached attributes will be returned.
Configuring WiMAX
When you configure the WiMAX service under /Radius/Services, you must set its type to wimax and
provide the following configuration options:
[ //localhost/Radius/Services/wimax ]
Name = WiMAX
Description =
Type = WiMAX
IncomingScript~ =
OutgoingScript~ =
OutagePolicy~ = RejectAll
OutageScript~ =
HA-RK-Key = cisco112
HA-RK-LifeTime = 60
WiMAX-Authentication-Service = None
WiMAX-Session-Manager = None
WiMAX-Query-Service = None
WiMAX-Prepaid-Service = None
Allow-HAAA-To-Include-Keys = TRUE
Require-MSK = False
Parameter Description
Name Required; inherited from the upper directory.
Description An optional description of the service.
Type Must be set to wimax for WiMAX service.
IncomingScript Optional.
OutgoingScript Optional.
OutagePolicy Required; must be set to AcceptAll, DropPacket,
or RejectAll. Default is DropPacket.
Parameter Description
OutageScript Optional. if you set this property to the name of a
script, Prime Access Registrar runs it when an
outage occurs. This property allows you to create
a script that notifies you when the RADIUS server
detects a failure.
HA-RK-Key Used as the base key to generate random
HA-RK-Key for all the HAs that are configured in
Prime Access Registrar.
By default, the value is cisco112.You can change
this value.
HA-RK-LifeTime Used as time (in minutes) to regenerate the
HA-RK-Keys based on its lifetime.
WiMAX-Authentication-Service A valid eap service which can be used for
WiMAX authentication. By default, this value is
none.
ls
[ //localhost/Radius/Scripts/wimax-provision ]
Name = wimax-provision
Description =
Language = rex
Filename = /cisco-ar/scripts/radius/rex/libProvisioning.so
EntryPoint = ProvisionedDeviceLookup
InitEntryPoint = InitializeProvisioning
InitEntryPointArgs = ldap:wimax
The file libProvisioning.so is come up with Prime Access Registrar kit. You have to copy it into
/cisco-ar/scripts/radius/rex path. Entrypoint ProvisionedDeviceLookup literally looks up a datastore to
check if the user is provisioned. InitEntryPoint 'InitializeProvisioning' takes care of all initialization
work for entry point. InitEntryPointArgs 'ldap-wimax' says the user look up to be performed against ldap
datastore. Oracle datastore can also be used wherein you have to give this property to 'oracle:wimax'.
Step 2 Configure the configured script object to the server's incoming scripting point.
ls
[ //localhost/Radius ]
Name = Radius
Description =
Version = 7.2.0.0
IncomingScript~ = provision
OutgoingScript~ =
save
reload
Cisco Prime Access Registrar’s replication feature allows you to maintain identical configurations on
multiple machines simultaneously. For more information on replication, see the “Using Replication”
chapter of the Cisco Prime Access Registrar 9.1 User Guide.
This chapter provides information about replication log messages in Prime Access Registrar and certain
frequently asked questions on replication.
This chapter contains the following sections:
• Frequently Asked Questions
• Replication Log Messages
Answer: This depends upon how long you want to allow an out-of-sync condition to persist. The shorter
the interval, the more often an out-of-sync condition is checked. However, this results in added network
traffic, additional processing by Prime Access Registrar and, if the interval is too small, frequent
unnecessary resynchronization requests. The default value of 60,000 milliseconds (1 minute) is usually
sufficient; however, values of as little as 10,000 milliseconds (10 seconds) have been tested and have
worked well.
Question: What is an appropriate TransactionArchiveLimit setting?
Answer: This depends upon two things:
1. How much hard disk space you are willing to devote to transaction archive storage
2. How often your configuration is changed (a save is issued through Aregcmd).
If you have limited hard disk space, then perhaps smaller values (less than 1000) are appropriate;
however if you have sufficient hard disk space, values of 10,000 or greater are better. The primary reason
for this preference is to limit the possibility of a full-resynchronization being required. A
full-resynchronization is required when the member has missed so many transactions that the master no
longer contains all the transaction necessary to resynchronize the member. The greater the limit, the
longer the member can be down without requiring a full-resynchronization.
Question: Can I specify a member in the member configuration?
Answer: Yes, and this is recommended. In the member's replication configuration Rep Members list,
specify another server, perhaps one which can be used in-case of critical failure of the master. If the
master suffers a catastrophic failure (a hard disk crash, for example) the member can be reconfigured to
be the master simply by setting the RepIsMaster to TRUE and changing the MasterIPAddress to its own
IP Address and the member specified in its Rep Members list will perform as the member. Because the
member has an archive of transactions, the new member can be automatically resynchronized. If the
archive limit on the new master has been exceeded (the transaction file txn0000000001 is no longer
present in the new master's archive directory), then the new member will require a
full-resynchronization. Setting the member up in this manner prevents down-time if the master fails and
allows configuration changes to be made on the new master.
Question: How can I prevent a full-resynchronization from ever being necessary?
Answer: You can't, but you can limit the possibility by setting the TransactionArchiveLimit to a large
value (greater than 10000). Another technique is to periodically check the archive when the master and
member are synchronized. If the number of transaction files is approaching 10,000, then you can stop
the master and member servers, delete all files in the replication archive, and restart the master and
member. The only side effect is that if the master or member suffers a catastrophic failure, a full
resynchronization will be required.
Question: Can I use the member to process RADIUS requests along with the master?
Answer: Yes, and this was one of the goals of the replication feature. Keep in mind that session
information is not replicated between master and member. To use session management in this
environment, use Prime Access Registrar's central session manager.
Displayed at start-up and indicates the Replication Manager is configured and enabled.
(RepType=SMDBR)
Info Message Replication Disabled
Displayed by the member at start-up to indicate the member is synchronized with the master and
processing RADIUS requests. It is also displayed after a successfully completed resynchronization.
This message is never displayed on the master.
Info Message Radius Server is Off-Line
Displayed by the member at start-up to indicate the radius server is not processing RADIUS requests
until it can ensure synchronization with the master. When this is displayed after startup, it indicates
the member is no longer synchronized with the master and is directly associated with a
resynchronization request to the master. This message is never displayed on the master.
Info Message Resynchronizing <member name>
Displayed by the master to indicate that it is resynchronizing the specified member (member).
Info Message Resynchronization from Master in progress.
Displayed by the member to indicate the master is in the process of resynchronizing it.
Info Message Resynchronization complete.
Indicates the master did not complete the resynchronization before the member expected it to
complete and that the member is re-requesting resynchronization from the master for the remaining
missed transactions.
Info Message Master Selected As Partner (DEFAULT)
Displayed by the member to indicate that it has selected the master as a partner after successfully
getting connected with the master. Partner selection is performed after analyzing the replication
workloads on other replication members.
Info Message Initiating Replication of Transaction <transaction #> with <# of elements>
Elements.
Displayed by the master to indicate that it is beginning replication of a transaction to the member.
Info Message Replication Transaction #<transaction #> With <# of elements> Elements
Initiated
Displayed by the master to indicate that it has completed sending the transaction to the member.
Info Message Committing Replication of Transaction <transaction #> with <# of elements>
Elements.
Displayed by the member to indicate that it has received a transaction and is processing it.
Info Message Replication Transaction #<transaction#> With <# of element> Elements
Committed
Displayed by the member to indicate that the transaction has been successfully processed.
Info Message Stopping Replication Manager
Displayed at shutdown by both the master and member to indicate the replication manager is being
shut down.
Info Message Stopping Replication Manager - waiting for replication to complete...
Displayed by the member when a shutdown is attempted while received replications are being
processed. After the replications are complete, the shutdown will complete.
Info Message Replication in progress. Please wait...
Periodically displayed while a shutdown is pending and replications are being completed.
Info Message Replication Manager Stopped
Displayed by both the master and member to indicate the replication manager has been successfully
shutdown.
The member displays this log messages to indicate that it has not received a TransactionSync
message from the master within its configured TransactionSync interval.
Warning Message TXN_SYNC Received by Master from unknown member <ip address>. Validation
Failed
Displayed by the master when a TransactionSync message is received by the master. Since there can
be only one configured master in a replication network, and the master is the only server who can
send a TransactionSync message, this indicates there is another configured master in the replication
network.
Warning Message TXN_SYNC Received from unknown Master <ip address>. Validation Failed
Displayed by the member to indicate that a TransactionSync message was received from a server not
configured as its master.
Warning Message Requesting resynchronization from Master: Last Txn#<transaction#>
Displayed by the member to indicate that it is requesting resynchronization from the master. The
LastTxn# is the last transaction number the member received and processed successfully.
Warning Message Resynchronization Request received from unknown member.
Displayed by the master when a resynchronization request is received by a member who is not listed
in its /radius/replication/rep members configuration.
Warning Message Resynchronization of <member name> requires Full Resynchronization.
Displayed by the master to indicate that the member cannot be automatically resynchronized
because its last transaction number is not within the configured history length of the archive
(TransactionArchiveLimit). A manual resynchronization of the member is required to put the
member back in-sync.
Warning Message MEMBER_SYNC Received from unknown Master at <ip address>. Validation
Failed
Displayed by a member indicating that a master, other than its configured master, is requesting
partnership.
Warning Message MEMBER_SYNC Received by Master from unknown member <ip address>.
Validation Failed
Displayed by the master to indicate a member not listed in its /radius/replication/rep members
configuration has requested partnership.
Warning Message TXN_EXPECT Received by Master from unknown <ip address>.
Displayed by the master to indicate it has received a transaction which originated from another
illegal master.
Warning Message TXN_EXPECT Received from unknown Master <ip address>.
Displayed by the member to indicate it has received a transaction which originated from a master
other than its configured master.
Warning Message TXN_EXPECT Broadcast failed.
Indicates that the master could not initiate a replication.
Warning Message DATA_SYNC Received by Master from unknown <ip address>
Displayed by the master to indicate that it received a replication transaction from another illegal
master.
Warning Message DATA_SYNC Received from unknown <ip address>
Displayed by the member to indicate that a transaction was received from a server external to the
replication network.
Error Message
DATA_SYNC Received from non-partner <ip address>
DATA_RE_SYNC CRC mismatch. Replying with NAK
DATA_RE_SYNC Commit Failed. Replying with NAK
EVAL_SYNC Validation failed. <ip address> is not a Master or Member of the
Replication network
Cisco Prime Access Registrar (Prime Access Registrar) provides support for On-Demand Address Pools
(ODAP). Using ODAP, the Prime Access Registrar server manages pools of addresses. Each pool is
divided into subnets of various sizes, and the Prime Access Registrar server assigns the subnets to virtual
home gateways (VHG) and Provider Edge (PE) routers. The VHG/PE router has one On-Demand
Address Pool configured for each VPN supported by that VHG/PE.
Prime Access Registrar has been enhanced to make ODAP functionality more accessible and to enable
ODAP requests and normal user authentication to occur on the same Prime Access Registrar server. To
achieve this functionality, a new Cisco vendor script CiscoWithODAPIncomingScript was written to
direct ODAP requests to particular services and session managers. CiscoWithODAPIncomingScript
also provides the same functionality as the previous CiscoIncomingScript.
Additionally, Prime Access Registrar has a new vendor type, CiscoWithODAP which references
CiscoWithODAPIncomingScript as its IncomingScript and references the existing script, Cisco, as its
Outgoing Script.
Figure 5-1 shows a simple MPLS VPN network with two VHG/PE routers, VHG-1 and VHG-2. The
Prime Access Registrar server allocates IP subnets to the VHGs by way of VRFs which contain the
subnets and addresses (address space) available.
MPLS core
In Prime Access Registrar, the VRFs are configured as users in an ODAP-users list under
/Radius/UserLists. The VRF name is set in IOS for the ODAP pool. When a VRF requests a pool of
addresses, Prime Access Registrar directs the request to a Session-Manager configured with the name
odap-<VRF name>. Prime Access Registrar also directs ODAP accounting requests to the service
odap-accounting.
In the example network shown in Figure 5-1, the VRFs are configured with the following address spaces:
• VRF-ISP1.com—consists of the address range 10.255.0.0 - 10.255.255.255 divided among the
following subnets:
– 10.255.0.0/24
– 10.255.1.0/24
– ...
– 10.255.255.0/24
• VRF-ISP2.com—consists of the address ranges 10.0.0.0 - 10.10.255.255 and 10.255.0.0 -
10.255.10.255 divided among the following subnets:
– 10.0.0.0/16
– 10.1.0.0/16
– ...
– 10.10.0.0/16
and:
– 10.255.0.0/24
– 10.255.1.0/24
– ...
– 10.255.10.0/24
Note VRF-ISPe.com requires two ResourceManagers because it has subnets of two different sizes.
Note VRF-ISP3.com requires two ResourceManagers because it also has subnets of two different
sizes.
Cisco-Incoming Script
The CiscoWithODAPIncomingScript makes ODAP functionality more accessible. This script eases
the configuration required to enable ODAP requests and normal user authentication to occur on the same
Prime Access Registrar server. CiscoWithODAPIncomingScript also provides the functionality of the
original CiscoIncomingScript.
If the Prime Access Registrar server receives an ODAP request, the server sets the Session-Key from the
AcctSessionID and sets the services and session managers.
If the Prime Access Registrar server receives a non-ODAP request, other scripts, rules or policies that
you might already have in place on the Prime Access Registrar server handle these requests.
This section contains the following topics:
• How the Script Works
• CiscoWithODAPIncomingScript
CiscoWithODAPIncomingScript
The following is a Tcl script example of the script CiscoWithODAPIncomingScript.
Note The final line in the example above is not how the script really works because a Tcl script cannot call a
C script. This is one reason why CiscoWithODAPIncomingScript was written in C.
Step 1 Create and configure an ODAP-users UserList. All ODAP users are configured under this UserList.
Step 2 Add all ODAP users to the ODAP-users UserList. Usernames must be of the form <vrf name> with the
AllowNullPassword property set to TRUE.
Step 3 Create and configure a service for ODAP-users.
Step 4 Create and configure an ODAP accounting service. Set the accounting service Type to file and
FilenamePrefix odap-accounting.
Step 5 Create a Session Manager for each of the VRFs. There must be a separate Session Manager for each VRF
pool.
Step 6 Create and configure Resource Managers to be referenced by the Session Managers.
Note Subnet pools of different sizes (different subnet masks) require separate Resource Managers
[ //localhost/Radius/UserLists ]
Default/
Added odap-users
Name = odap-users
Description =
Added vrf-ISP1.com
Added vrf-ISP2.com
Added vrf-ISP3.com
--> ls
[ //localhost/Radius/UserLists/odap-users ]
Entries 1 to 3 from 3 total entries
Current filter: <all>
Name = odap-users
Description =
vrf-ISP1.com/
vrf-ISP2.com/
vrf-ISP3.com/
Step 3 Set the AllowNullPassword property to TRUE for each ODAP user.
--> cd vrf-ISP2.com
[ //localhost/Radius/UserLists/odap-users/vrf-ISP2.com ]
Name = vrf-ISP2.com
Description =
Password =
Enabled = TRUE
Group~ =
BaseProfile~ =
AuthenticationScript~ =
AuthorizationScript~ =
UserDefined1 =
AllowNullPassword = FALSE
[ //localhost/Radius/Services ]
Entries 1 to 2 from 2 total entries
Current filter: <all>
local-file/
local-users/
Added odap-users
--> cd odap-users
[ //localhost/Radius/Services/odap-users ]
Name = odap-users
Description =
Type =
IncomingScript~ =
OutgoingScript~ =
--> ls
[ //localhost/Radius/Services/odap-users ]
Name = odap-users
Description =
Type = local
IncomingScript~ =
OutgoingScript~ =
OutagePolicy~ = RejectAll
OutageScript~ =
UserList = odap-users
[ //localhost/Radius/Services ]
Entries 1 to 3 from 3 total entries
Current filter: <all>
local-file/
local-users/
odap-users/
Added odap-accounting
--> cd odap-accounting
[ //localhost/Radius/Services/odap-accounting ]
Name = odap-accounting
Description =
Type =
IncomingScript~ =
OutgoingScript~ =
--> ls
[ //localhost/Radius/Services/odap-accounting ]
Name = odap-accounting
Description =
Type = file
IncomingScript~ =
OutgoingScript~ =
OutagePolicy~ = RejectAll
OutageScript~ =
FilenamePrefix = accounting
MaxFileSize = "10 Megabytes"
MaxFileAge = "1 Day"
RolloverSchedule =
--> cd /radius/sessionmanagers
[ //localhost/Radius/SessionManagers ]
Entries 1 to 1 from 1 total entries
Current filter: <all>
session-mgr-1/
Added odap-vrf-ISP1.com
Added odap-vrf-ISP2.com
Added odap-vrf-ISP3.com
[ //localhost/Radius/ResourceManagers ]
Entries 1 to 5 from 5 total entries
Current filter: <all>
IPA-Pool/
IPA-Pool-2/
IPX-Pool/
Per-Group/
Per-User/
Added odap-vrf-ISP1.com
--> cd odap-vrf-ISP1.com
[ //localhost/Radius/ResourceManagers/odap-vrf-ISP1.com ]
Name = odap-vrf-ISP1.com
Description =
Type =
--> ls
[ //localhost/Radius/ResourceManagers/odap-vrf-ISP1.com ]
Name = odap-vrf-ISP1.com
Description =
Type = subnet-dynamic
NetMask =
SubnetAddresses/
-> cd subnetaddresses
[ //localhost/Radius/ResourceManagers/odap-vrf-ISP1.com/SubnetAddresses ]
Entries 0 to 0 from 0 total entries
Current filter: <all>
Added 10.255.0.0-10.255.255.255
Note Two Resource Managers are required for VRF-ISP3.com and VRF-ISP2.com because their address
spaces are made up of subnets of the different sizes.
--> cd /radius/resourcemanagers
[ //localhost/Radius/ResourceManagers ]
Entries 1 to 5 from 5 total entries
Current filter: <all>
IPA-Pool/
IPA-Pool-2/
IPX-Pool/
odap-vrf-ISP1.com/
Per-Group/
Per-User/
Added odap-vrf-ISP3-a.com
--> cd odap-vrf-ISP3-a.com
[ //localhost/Radius/ResourceManagers/odap-vrf-ISP3-a.com ]
Name = odap-vrf-ISP3-a.com
Description =
Type =
--> ls
[ //localhost/Radius/ResourceManagers/odap-vrf-ISP3-a.com ]
Name = odap-vrf-ISP3-a.com
Description =
Type = subnet-dynamic
NetMask =
SubnetAddresses/
-> cd subnetaddresses
[ //localhost/Radius/ResourceManagers/odap-vrf-ISP3-a.com /SubnetAddresses ]
Entries 0 to 0 from 0 total entries
Current filter: <all>
Added 172.21.0.0-172.21.191.255
-> cd /radius/resourcemanagers
[ //localhost/Radius/ResourceManagers ]
Entries 1 to 10 from 10 total entries
Current filter: <all>
IPA-Pool/
IPA-Pool-2/
IPX-Pool/
odap-vrf-ISP1.com/
odap-vrf-ISP3-a.com /
Per-Group/
Per-User/
Added odap-vrf-ISP3-b.com
--> cd odap-vrf-ISP3-b.com
[ //localhost/Radius/ResourceManagers/odap-vrf-ISP3-b.com ]
Name = odap-vrf-ISP3-b.com
Description =
Type =
--> ls
[ //localhost/Radius/ResourceManagers/odap-vrf-ISP3-b.com ]
Name = odap-vrf-ISP3-b.com
Description =
Type = subnet-dynamic
NetMask =
SubnetAddresses/
-> cd subnetaddresses
[ //localhost/Radius/ResourceManagers/odap-vrf-ISP3-b.com /SubnetAddresses ]
Entries 0 to 0 from 0 total entries
Current filter: <all>
Added 172.21.191.0-172.21.255.255
-> cd /radius/resourcemanagers
[ //localhost/Radius/ResourceManagers ]
Entries 1 to 10 from 10 total entries
Current filter: <all>
IPA-Pool/
IPA-Pool-2/
IPX-Pool/
odap-vrf-ISP1.com/
odap-vrf-ISP3-a.com /
odap-vrf-ISP3-b.com /
Per-Group/
Per-User/
Added odap-vrf-ISP2-a.com
--> cd odap-vrf-ISP2-a.com
[ //localhost/Radius/ResourceManagers/odap-vrf-ISP2-a.com ]
Name = odap-vrf-ISP2.com
Description =
Type =
--> ls
[ //localhost/Radius/ResourceManagers/odap-vrf-ISP2-a.com ]
Name = odap-vrf-ISP2-a.com
Description =
Type = subnet-dynamic
NetMask =
SubnetAddresses/
-> cd subnetaddresses
[ //localhost/Radius/ResourceManagers/odap-vrf-ISP2-a.com /SubnetAddresses ]
Entries 0 to 0 from 0 total entries
Current filter: <all>
Added 10.0.0.0-10.255.255.255
-> cd /radius/resourcemanagers
[ //localhost/Radius/ResourceManagers ]
Entries 1 to 10 from 10 total entries
Current filter: <all>
IPA-Pool/
IPA-Pool-2/
IPX-Pool/
odap-vrf-ISP1.com/
odap-vrf-ISP3-a.com /
odap-vrf-ISP3-b.com /
odap-vrf-ISP2-a.com /
Per-Group/
Per-User/
Added odap-vrf-ISP2-b.com
--> cd odap-vrf-ISP2-b.com
[ //localhost/Radius/ResourceManagers/odap-vrf-ISP2-b.com ]
Name = odap-vrf-ISP2-b.com
Description =
Type =
--> ls
[ //localhost/Radius/ResourceManagers/odap-vrf-ISP2-b.com ]
Name = odap-vrf-ISP2-b.com
Description =
Type = subnet-dynamic
NetMask =
SubnetAddresses/
-> cd subnetaddresses
[ //localhost/Radius/ResourceManagers/odap-vrf-ISP2-b.com /SubnetAddresses ]
Entries 0 to 0 from 0 total entries
Added 10.255.0.0-10.255.10.255
Note It is not necessary to configure Session Managers in two instances. All SessionManager configuration
can be done at one time before configuring the Resource Managers.
[ //localhost/Radius/SessionManagers ]
Entries 1 to 4 from 4 total entries
Current filter: <all>
odap-vrf-ISP1.com/
odap-vrf-ISP2.com/
odap-vrf-ISP3.com/
session-mgr-1/
--> cd odap-vrf-ISP2.com
[ //localhost/Radius/SessionManagers/odap-vrf-ISP2.com ]
Name = odap-vrf-ISP2.com
Description =
AllowAccountingStartToCreateSession = FALSE
ResourceManagers/
--> cd resourcemanagers
Set 1 odap-vrf-ISP2-a.com
Set 2 odap-vrf-ISP2-b.com
--> cd/radius/sessionmanagers
[ //localhost/Radius/SessionManagers ]
Entries 1 to 4 from 4 total entries
Current filter: <all>
odap-vrf-ISP1.com/
odap-vrf-ISP2.com/
odap-vrf-ISP3.com /
session-mgr-1/
--> cd odap-vrf-ISP3.com
[ //localhost/Radius/SessionManagers/odap-vrf-ISP3.com ]
Name = odap-vrf-ISP3.com
Description =
AllowAccountingStartToCreateSession = FALSE
ResourceManagers/
--> cd resourcemanagers
Set 1 odap-vrf-ISP3-a.com
Set 2 odap-vrf-ISP3-b.com
--> cd/radius/sessionmanagers
[ //localhost/Radius/SessionManagers ]
Entries 1 to 4 from 4 total entries
Current filter: <all>
odap-vrf-ISP1.com/
odap-vrf-ISP2.com/
odap-vrf-ISP3.com/
session-mgr-1/
--> cd odap-vrf-ISP1.com
[ //localhost/Radius/SessionManagers/odap-vrf-ISP1.com ]
Name = odap-vrf-ISP1.com
Description =
AllowAccountingStartToCreateSession = FALSE
ResourceManagers/
--> cd resourcemanagers
Set 1 odap-vrf-ISP1.com
Configure Clients
Step 9 For any client that might forward ODAP requests to the Prime Access Registrar server, set the Vendor
property to CiscoWithODAP.
--> cd /radius/clients
[ //localhost/Radius/Clients ]
Entries 1 to 2 from 2 total entries
Current filter: <all>
localhost/
vhg-1/
vhg-2/
--> cd vhg-1
[ //localhost/Radius/Clients/vhg-1 ]
Name = vhg-1
Description =
IPAddress = 209.165.200.225
SharedSecret = secret
Type = NAS
Vendor =
IncomingScript~ =
OutgoingScript~ =
UseDNIS = FALSE
DeviceName = a_name
DevicePassword = password
Validating //localhost...
Saving //localhost...
This chapter provides the following information about using Cisco Prime Access Registrar
(Prime Access Registrar) for wireless support:
• Mobile Node-Home Agent Shared Key, page 6-1
• 3GPP2 Home Agent Support, page 6-3
• Session Correlation Based on User-Defined Attributes, page 6-5
• Managing Multiple Accounting Start/Stop Messages, page 6-6
• NULL Password Support, page 6-6
• 3GPP Compliance, page 6-7
• 5G Data Network-AAA (DN-AAA) Compliance, page 6-16
The Prime Access Registrar server then sends the CDMA-MN-HA-Shared-Key corresponding to the
user if the user has successfully authenticated subject to the following rules:
1. If there is an incoming SPI and no configured SPI, the Prime Access Registrar server authenticates
the user as usual and does not include a configured shared-key (if there is one) in the reply.
2. If the incoming SPI does not match the configured SPI, the Prime Access Registrar server
authenticates the user as usual, but does not include the configured shared-key (if there is one) in
the reply.
3. If the incoming SPI matches the configured SPI, but there is no shared-key configured, the
Prime Access Registrar server proceeds with normal authentication. Since there is no shared-key, it
will not be included in the reply.
4. If the incoming SPI matches the configured SPI and a configured shared-key exists, the
Prime Access Registrar server proceeds to encrypt the MCD5 shared-key and include it in the
Access-Accept.
The key to including the shared key in an Access-Accept is in matching the values of the SPI attribute.
Step 1 Log into the Prime Access Registrar server and launch aregcmd.
Log in as a user with administrative rights such as user admin.
Step 2 Change directory to the attribute directory of the user.
cd /Radius/UserLists/Default/bob/Attributes
validate
save
Note The NAI is the userID submitted by the client during PPP authentication. In roaming, the purpose of the
NAI is to identify the user as well as to assist in the routing of the authentication request.
During the authentication and authorization phase for each Mobile IP client, the RADIUS server must
decide which HA from a group of HAs should be chosen to serve the client. This is called dynamic HA
assignment.
This section contains the following topics:
• Home-Agent Resource Manager
• Querying and Releasing Sessions
• Access Request Requirements
• New 3GPP2 VSAs in the Cisco Prime Access Registrar Dictionary
Load Balancing
The goal of dynamic HA assignment is to have load balancing among HAs. The Prime Access Registrar
server achieves this by evenly distributing mobile clients among HAs. At the same time, the
Prime Access Registrar server ensures that the same HA is always assigned to the same Mobile IP client
for the same session.
Step 2 Use the add command to specify the name of a resource manager to create.
--> add home-agent-pool
--> Added home-agent-pool
Step 4 Use the set command to set the resource manager type to home-agent.
--> set type home-agent
Step 5 Use the ls command to view the subdirectories under home-agent-pool.
--> ls
[ //localhost/Radius/ResourceManagers/home-agent-pool ]
Name = home-agent-pool
Description =
Type = home-agent
Home-Agent-IPAddresses/
This command line will return all sessions that have a home-agent resource equal to the IP address
10.10.10.1.
Querying sessions using aregcmd displays the home-agent resource in each session as:
HA ddd.ddd.ddd.ddd
where each ddd is a decimal number from 0-255.
Note There is no planned support for the Accounting-Container (3GPP2/6) attribute because it
has different syntax than other vendor-specfic attributes (VSAs) and requires special
processing.
Use the script UseCLIDAsSessionKey as defined in the script rexscript.c to specify that the
Calling-Station-Id attribute that should be used as the session key to correlate requests for the same
session. This is a typical case for 3G mobile user session correlation. You can provide your own script
to define other attributes as the session key.
In the absence of the Session-Key variable, the key to the session will be created based on the string
concatenated by the value of the NAS and the NAS-Port.
There is a new option with-key available in aregcmd for query-sessions and release-sessions to access
sessions by Session-Key.
Note One of the conditions above must be true to release the session and its resources.
Note You should be aware of the security impact when using the NULL Password feature.
3GPP Compliance
Prime Access Registrar supports 3GPP compliance by implementing the following (refer to RFC
29.273):
• SWa reference point between an untrusted non-3GPP IP access and a 3GPP AAA server/proxy. See
SWa Access Authentication and Authorization, page 6-8.
• STa reference point between a trusted non-3GPP access and a 3GPP AAA server/proxy. See STa
Access Authentication and Authorization, page 6-8.
• SWm reference point between an Evolved Packet Data Gateway (ePDG) and a 3GPP AAA
server/proxy. See SWm Access Authentication and Authorization, page 6-9.
• SWd reference point between a 3GPP AAA server and a 3GPP AAA proxy. See SWd Access
Authentication and Authorization, page 6-9.
• SWx reference point between a Home Subscriber Server (HSS) and a 3GPP AAA server. See SWx
Authentication Procedure, page 6-10.
• S6b reference point between a PDN GW and a 3GPP AAA server/proxy. See S6b Authentication
and Authorization Procedure, page 6-10.
This topic also contains the following sections:
• 3GPP Call Flows, page 6-11
• Voice over Wi-Fi (VoWiFi) Location Based Authentication, page 6-13
• Mobile Equipment Identity Check Support in Cisco Prime Access Registrar, page 6-14
Figure 6-1 depicts the various interfaces used for 3GPP compliance in a mobile network.
SWx SWd
3GPP AAA 3GPP AAA
HSS
Server Proxy
S6b S6b
SWm SWm
PDN PDN
GW GW
361687
Home network Visited network
and SWa reference points are clearly distinguished after the exchange of the first authentication and
authorization messages, during which trusted/untrusted decision is made by the 3GPP AAA server and
this decision is communicated to the non-3GPP access network.
The trusted non-3GPP access authentication and authorization requires DiaEAP with EAP-AKA or
EAP-AKA`. Prime Access Registrar implements the STa access authentication and authorization
procedure based on the mobility parameters transported by the non-3GPP access network to the 3GPP
AAA server.
This procedure follows the SWa authentication and authorization procedure, with the following
differences:
• Information elements that reflect information about the user's service request and about the access
network are mandatorily included in the authentication and authorization request.
• The information elements that describe the user's subscription profile are downloaded to the
non-3GPP access network.
3. The S6b authentication and authorization procedure is invoked by the PDN GW after receiving an
IKE_SA_AUTH message from the UE. The S6b reference point performs authentication based on
reuse of the DER/DEA command set defined in Diameter EAP.
Authentication request
Authentication response
Diameter STR
Diameter STA
Session-Termination answer
361686
[ //localhost/Radius/Services/3gpp-authz-radius]
Name = 3gpp-authz-radius
Description = STa to SWx authz (update-gw, get-profile , push-profile from HSS, de-reg
from HSS )
Type = 3gpp-authorization
Protocol = Radius
SessionManager =
TranslationService =
[ //localhost/Radius/Services/3gpp-authz-radius]
Name = 3gpp-authz-radius
Description = STa to SWx authz (update-gw, get-profile , push-profile from HSS, de-reg
from HSS )
Type = 3gpp-reverse-authorization
Protocol = Radius
PreRequestTranslationScript~ =
PostRequestTranslationScript~ =
PreResponseTranslationScript~ =
PostResponseTranslationScript~ =
EnvMapping/
ForwardMapping/
ReverseMapping/
ResponseMapping/
[ //localhost/Radius/Services/3gpp-authz]
Name = 3gpp-authz-radius
Description = STa to SWx authz (update-gw, get-profile , push-profile from HSS, de-reg
from HSS )
Type = 3gpp-reverse-authorization
Protocol = Diameter
Incoming~ =
Outgoing~=
SessionManager =
RequestMapping/
EnvMapping/
ResponseMapping/
[ //localhost/Radius/Services/reverse ]
Name = reverse
Description =
Type = 3gpp-reverse-authorization
IncomingScript~ =
OutgoingScript~ =
SessionManager = cache
TranslationService = diatorad
ProxyService =
[ //localhost/Radius/Services/diatorad ]
Name = diatorad
Description =
Type = diameter-radius
ProxyServiceName = rad-proxy
PreRequestTranslationScript~ =
PostRequestTranslationScript~ =
PreResponseTranslationScript~ =
PostResponseTranslationScript~ =
RequestMapping/
CommandMappings/
PPR = Radius-Access-Request
RAR = Radius-CoA-Request
AVPMappings/
Auth-Session-State = Cisco-AVPair
user-name = user-name
AVPsToBeAdded/
EnvironmentMappings/
ResponseMapping/
ResultCodeMappings/
Radius-CoA-ACK = Diameter-Success
Radius-CoA-NAK = Diameter-Unable-To-Deliver
AVPMappings/
AVPsToBeAdded/
EnvironmentMappings/
6. The MME/SGSN sends the user identity information to the HSS through an
Insert-Subscription-Data-Answer (IDA) response.
7. The HSS communicates the received data to Prime Access Registrar through Sh interface in XML
format.
8. Upon receiving the user profile, Prime Access Registrar parses the User-Data AVP, extracts the
location information, and copies it to the E-UTRANCellGlobalId environment variable.
Prime Access Registrar can be configured to run the following script at 3GPP authorization service
outgoing script to check the E-UTRANCellGlobalId variable and reject/accept the UE based on the
location information.
[ //localhost/Radius/Services/3gpp-rad ]
Name = 3gpp-rad
Description =
Type = 3gpp-authorization
Protocol = radius
IncomingScript~ =
OutgoingScript~ = BlockorAcceptUE
SessionManager = smrad
TranslationService = rad-AA-SAR
FetchLocationInformation = True
In STa interface, Prime Access Registrar retrieves the IMEI information using additional AVPs in the
EAP call flows as shown in the sample configuration below.
[ //localhost/Radius/Services/eap-aka ,eap-aka-prime and eap-sim ]
Name = eap-aka
Description =
Type = eap-aka
NumberOfQuintets = 1
AlwaysRequestIdentity = False
EnableIdentityPrivacy = False
EnableRollingPseudonymSecret = False
PseudonymSecret = <encrypted>
PseudonymRenewtime = "24 Hours"
PseudonymLifetime = Forever
NotificationService =
Generate3GPPCompliantPseudonym = False
EnableReauthentication = False
UseOutagePolicyForReauth = False
MaximumReauthentications = 16
ReauthenticationTimeout = 3600
ReauthenticationRealm =
EnableEncryptedIMSI = FALSE
QuintetCacheTimeout = 120
AuthenticationTimeout = 120
QuintetGenerationScript~ =
UseProtectedResults = False
EnableStateStickiness = False
SendReAuthIDInAccept = False
Subscriber_DBLookup = DiameterDB
DiameterInterface = SWx
ProxyService =
MEIdentityLookup = TRUE/FALSE
IMEIUnavailable = Continue/Terminate
GreyListPolicy = Accept/Reject
EIRProxyService =
EmergencyServiceMEIdentityLookup = True
MEIdentityLookupFailurePolicy = Continue
Table 6-1 lists the attributes added to support the EIR check feature in EAP-SIM, EAP-AKA, and
EAP-AKA-PRIME services.
Attribute Description
MEIdentityLookup Set to TRUE to enable EIR check for the service.
IMEIUnavailable Set this parameter to one of the following:
• Continue—Prime Access Registrar will continue the
authentication/authorization even if the IMEI information is not
received from the client.
• Terminate—Prime AccessRegistrar will terminate the
authentication/authorization if the IMEI information is not received
from the client.
Attribute Description
GreyListPolicy Set this parameter to one of the following:
• Accept—Prime Access Registrar will continue the
authentication/authorization even if the equipment status is
grey-listed from EIR check.
• Reject—Prime Access Registrar will reject the
authentication/authorization if the equipment status is grey-listed
from EIR check.
EIRProxyService Separate proxy service for EIR that should be mapped with EIR remote
servers.
EmergencyServiceMEIdenti Set to TRUE to perform MEIdentityLookup during emergency services
tyLookup based on the EmergencyServicesPolicy set up under
Radius/Advanced/Diameter/General.
MEIdentityLookupFailureP Set this parameter to one of the following:
olicy
• Continue—Prime Access Registrar will continue the
authentication for emergency ME Identity Lookup EIR failure
cases.
• Terminate—Prime Access Registrar will terminate the
authentication for emergency ME Identity Lookup EIR failure
cases.
This option is available only if EmergencyServiceMEIdentityLookup
is checked.
This chapter describes the enforcement of transactions per second (TPS) based licensing and session
based licensing models introduced in Cisco Prime Access Registrar (Prime Access Registrar).
In TPS based licensing model, the license is based on the number of transactions per second that are
handled by the server. In session based licensing model, the license is managed based on the number of
sessions that resides in Prime Access Registrar. During Prime Access Registrar startup, you can either
load TPS based licensing or session based licensing, but not both at the same time.
This chapter contains the following sections:
• TPS Licensing Features
• Concurrent Session License Features
Note The type of licensing will determine the applicable features and its corresponding enforcement.
Enforcement Rules
Any license enforcement is triggered only after Prime Access Registrar has observed increasing steady
state in TPS. Increasing steady state is marked by the steady increase in incoming traffic (measured in
TPS) beyond 80% of the licensed TPS for any 15 minutes of a 20 minute interval.
The following are the enforcement rules applied on reaching increasing steady state:
• When the incoming traffic (measured in TPS) is greater than 80% of the licensed TPS, SNMP Trap
will be generated for the first time on reaching the increased steady state. The warning message on
the current license usage is logged for every 5 minutes.
• When the incoming traffic (measured in TPS) is greater than 90% of the licensed TPS, SNMP Trap
will be generated for the first time on reaching the increased steady state. Warning message on the
current license usage is logged for every 5 minutes.
• When the incoming traffic (measured in TPS) is greater than 100% of the licensed TPS, SNMP Trap
will be generated for the first time on reaching the increased steady state. Error message on the
current license usage is logged for every 5 minutes.
• When the incoming traffic (measured in TPS) is greater than 110% of the licensed TPS, SNMP Trap
will be generated for the first time on reaching the increased steady state.
Note Steady state denotes continuous increase or decrease in the TPS within a given TPS range. For the
purpose of enforcement of licensing in Prime Access Registrar, the range is always 80% and above. The
enforcement begins after TPS reaches and is greater than 80% for a steady state of 20 minutes.
Notification Logs
A warning message is logged for every 5 minutes when the TPS count reaches an increased steady state,
where, the TPS count is in the range of 80% to 100% of the licensed TPS.
An error message is logged for every 5 minutes when the TPS count reaches an increased steady state,
where, the TPS count is in the range of 100% to 110% of the licensed TPS.
In the above example, the first numerical value (2998) in the log entry denotes the total TPS traffic and
the second value (1000) denotes the SIGTRAN-M3UA traffic.
For TPS measurement in Prime Access Registrar server, you can run the TPS calculator script when you
want to monitor the TPS during the peak period or run the TPS for 24 hours.
Note During startup of the Prime Access Registrar, the default session manager must be enabled for RADIUS
and the EnableStickySession must be set to TRUE for Diameter. This is applicable only for session based
license.
The sticky sessions is enabled during the initialization of Prime Access Registrar for Diameter based
license to track the session counts in the diameter service. The server level count is calculated by adding
all the sessions maintained across all the session managers and the sticky sessions of all the diameter
services in the server. This session count is used by licensing module for license enforcement. The
session count is either increased or decreased based on the action performed.
This section contains the following topics:
• Sessions Enforcement Rules
• Notification Logs
• Notification - SNMP Traps
• Session Logging Feature
Note The steady state period is not applicable for Concurrency Session based licensing.
Notification Logs
A warning message is logged for every 5 minutes when the session count reaches 80% and 90% of the
licensed Concurrent Session.
An error message is logged when the session count reaches the range of 100% to 110% of the licensed
Concurrent Session.
Note Logging Feature is applicable for session based license as like TPS logging feature. The warning
messages are displayed corresponding to session logging feature. See TPS Logging Feature, page 7-3
for more information.
08-09-2016, 5:18:52,100, 20
08-09-2016, 5:19:22,130, 45
08-09-2016, 5:19:52,160, 60
08-09-2016, 5:20:22,175, 70
08-09-2016, 5:20:52,210, 85
08-09-2016, 5:21:22,195, 83
08-09-2016, 5:21:52,225, 95
Syslog Messages
Messages sent to the following logs will be forwarded to syslog server in a slightly different format. The
logs are:
• aregcmd_log
• config_mcd_[1..n]_log
• name_radius_[1..n]_log
• agent_server_[1..n]_log
Messages less than 1024 bytes in length display in the following format:
MMM DD hh:mm:ss hostname %Prime AR-[severity]-[mnemonic]: [#n], [System|Server]:
message_description
Where:
MMM DD is the month and date that the message is received by the syslog server.
hh:mm:ss is the arrival time of the message.
hostname is the name of the syslog server.
severity is one of the following levels:
0 - emergency
1 - alert
2 - critical
3 - error
4 - warning
5 - notification
6 - informational
7 - debugging
mnemonic can be aregcmd, name_radius, agent_server and config_mcd for the identification of
Prime Access Registrar-relative subsystems.
#n is the id for the components: name_radius, agent_server, and config_mcd
message_description provides detailed information of the message.
Messages greater than 1024 bytes in length display in multiple lines. At the end of each 1024 bytes line,
three dots indicate a continuation of the message as follows:
MMM DD hh:mm:ss hostname %Prime AR-[severity]-[mnemonic]: [#n], [System|Server]:
message_description: Configuration: text and more message text and more message text
and more message text and more message text and more message text and more message
text and more message text and more message text and more message text and more
message text and more message text and more message text and more message text and
more message text and more message text and more message text and more message text
and more message text and more message text and more message text and more message
text and more message text and more message text and more message text ...
Example 1
May 19 14:28:44 dwlau-ultra2.cisco.com
%Prime AR-3-name_radius: #1, System: Remote LDAP Server.Unable to bind.
Example 2
May 19 14:28:45 dwlau-ultra2.cisco.com
%Prime AR-6-name_radius: #1, Server: Stopping server
To enable logging of syslog messages, you must enable the syslog daemon to listen on port 514 by
adding the -r flag to the SYSLOGD_OPTIONS line as follows:
SYSLOGD_OPTIONS=”-r -m 0”
For RHEL version 7.0 and above, you must update the /etc/rsyslog.conf file with the following
information and restart the syslog service:
$ModLoad imudp.so
$UDPServerRun 514
SYSLOGD_OPTIONS="-r -m 0"
localn.info <tab> <tab> <tab> /var/log/filename.log
Where:
localn—is the facility being used for syslogd; n must be a value from 0-7 and match the
FACILITY_LOCAL_NUMBER used in Prime Access Registrar's car.conf file.
/var/log/—is the path to the file that stores syslogd messages.
filename.log—is the file that stores syslogd messages. You can give this file a name of your choice.
Where full_path is a full path to the directory where you want to store the log messages. For example,
to store all system logs in /var/log/AICar1, add the following line in the
$INSTALLPATH/conf/car.conf file:
LOGDIR /var/log/AICar1
You must first stop the Prime Access Registrar server prior to changing the car.conf file. After changing
the car.conf file, copy all existing log files to the new directory, then restart the server.
Note Specifying a path for local logging does not affect the storage location of syslog messages.
Note Consider using move (mv) or copy (cp) commands to store the previous week’s syslog files in a
different disk partition to reserve space for the current syslog file.
Header Formats
The format of a header entry is:
mm/dd/yyyy HH:MM:SS name/radius/n Error Server 0
Prime Access Registrar detects the Remote Server is not responding to its request. The format of the
message is:
Remote Server <hostname> (<ipaddress>:<port>) is DOWN!
The following is an example header and message:
10/12/2013 17:57:12 name/radius/1 Error Server 0 Remote
server dave-ultra (171.69.127.99:1812) is DOWN!
2. Prime Access Registrar receives no response from the Remote Server after the server is reentered
into Prime Access Registrar’s server pool for retry. The format of the message is:
Remote Server <hostname> (<ipaddress>:<port>) remains DOWN!
The following is an example header and message:
10/12/2013 17:56:32 name/radius/1 Error Server 0 Remote
server dave-ultra (171.69.127.99:1812) remains DOWN!
3. The Remote Server is responding to the first retry but not the initial request. The format of the
message is:
Remote Server <hostname> (<ipaddress>:<port>) is UP but slow!
The following is an example header and message:
10/12/2013 17:56:32 name/radius/1 Error Server 0 Remote
server dave-ultra (171.69.127.99:1812) is UP but slow!
4. The Remote Server is responding to the second retry request but not the initial request or the first
retry request. The format of the message is:
5. The Remote Server has been marked inactive and is being put back into Prime Access Registrar’s
server pool for later use. The format of the message is:
Remote Server <hostname> (<ipaddress>:<port>) is being reactivated for later use.
The following is an example header and message:
10/12/2013 17:56:32 name/radius/1 Error Server 0 Remote
server dave-ultra (209.165.200.224:1812) is being reactivated for later use.
Message Format:
Date|Time|Diameter-Message-Type|User-Name(IMSI) \
|MSISDN|Subscirption-Id|Origin-Host|Host-IP-Address|Product-Name|Origin-Realm|Destin\
ation-Host|APN-Name|Session-id|Result_Code|Result-Description|UELocalIPAddress|Non-3\
GPP-IP-Access
Note More information about these commands and their options is available using the man command in a
terminal window on the Sun workstation.
Disk Space
Running out of disk space can cause a number of problems including:
• Failure to process RADIUS requests
• Parts of the Prime Access Registrar configuration disappearing in aregcmd
• Failure to log into aregcmd
Check that the Prime Access Registrar installation partition ($INSTALL) and /tmp are not at capacity.
Resource Conflicts
Resource conflicts are a common reason for the Cisco Prime Access Registrar server failing to start. The
most common resource conflicts are the following:
• Cisco Network Registrar is running on the Prime Access Registrar server
• Another application is also using ports 1812 and 1813
• A network management application is using the Sun SNMP Agent
Port Conflicts
The default ports used by the Prime Access Registrar server are ports 1812 and 1813. You should check
to determine that no other applications are listening on the same ports as Prime Access Registrar.
You can check to see which TCP ports are in use by entering the following command line:
You can check to see which UDP ports are in use by entering the following command line:
Note If you configure the Prime Access Registrar server to use ports other than the default, you will have to
specifically add those ports if you want to use them.
Modifying File Sizes for Agent Server and MCD Server Logs
The two parameters added to the car.conf file under $BASEDIR/conf affect the agent_server_logs and
config_mcd_server_logs logs files:
• AGENT_SERVER_LOG_SIZE (10 MB by default)
• AGENT_SERVER_LOG_FILES (2 by default)
You will find these new parameters at the beginning of the car.conf file. When the log file size reaches
the value set in AGENT_SERVER_LOG_SIZE, a rollover of the agent_server_log_file occurs. The
value set in AGENT_SERVER_LOG_FILES specifies the number of log files to be created.
xtail $INSTALL/logs/*
Note Cisco AR 4.1.5 and later include the millisecond field in the logs’ timestamp.
If any of the above processes are not displayed, check the log file of the failed process to determine the
reason. The MCD processes might fail to start if Cisco Network Registrar is installed on the same
machine.
The manual method of starting and stopping the Prime Access Registrar processes is using the arserver
utility.
To start Prime Access Registrar processes: arserver start
To stop Prime Access Registrar processes: arserver stop
To restart Prime Access Registrar processes: arserver restart
status
stop
start
reload
During the transition from running to stopped, Prime Access Registrar stops processing new RADIUS
requests and releases resources such memory, network and database connections and open files.
During the transition from stopped to running, Prime Access Registrar reverses this process by opening
a connection with its internal database, reading configuration data, claiming memory, establishing
network connections, opening files, and initializing scripts. During this transition, problems can occur.
Prime Access Registrar might fail to start and display the following:
reload
status
totalUSRQueryResourceRequests = 0
totalUSRQueryResourceResponses = 0
totalUSRQueryReclaimRequests = 0
totalUSRQueryReclaimResponses = 0
totalPacketsInUse = 0
totalPacketsDrained = 0
totalPacketsDropped = 0
totalPayloadDecryptionFailures = 0
Core Files
A core file in the Prime Access Registrar installation directory is an indication that
Prime Access Registrar has crashed and restarted. Check that the radius server process generated the
core file using the UNIX file command:
> file core
core: ELF 32-bit MSB core file SPARC Version 1, from 'radius'
Check the timestamp on the core file and look for corresponding log messages in the
name_radius_1_log file in $INSTALL/logs. The word assertion commonly appears in core messages.
Try to establish what caused the problem and contact Cisco TAC.
radclient
The Prime Access Registrar package provides a utility called radclient that allows RADIUS requests to
be generated. Use radclient to test configurations and troubleshoot problems.
Note One of the parameters in the calculation of the Prime Access Registrar server’s health is the
percentage of responses to Access-Accepts that are rejections. In a healthy environment, the
rejection percentage will be fairly low. An extremely high percentage of rejections could be an
indication of a Denial of Service attack.
• Configuration errors
• Running out of memory
• Errors reading from the network
• Dropping packets that cannot be read (because the server ran out of memory)
• Errors writing to the network.
Prime Access Registrar logs all of these conditions. Sending multiple successful responses to any
packet, increments the server’s health.
This appendix describes the Tcl and REX dictionaries that are used when writing Incoming or Outgoing
scripts.
A dictionary is a data structure that contains key/value pairs. Two types of dictionaries exist: the
Attribute dictionaries (used by the Request and Response dictionaries), and the Environment dictionary.
This section contains the dictionaries you reference when writing a Tcl script and the dictionaries you
reference when you write a script using the shared libraries (REX—RADIUS EXtension).
This appendix section also describes the following Java attribute dictionary:
• Tcl Attribute Dictionaries
• REX Attribute Dictionary
• Java Attribute Dictionary
get $dict get <key> Returns the value of <key> from the dictionary.
When the dictionary does not contain the <key>,
an empty string is returned.
isEmpty $dict isEmpty Returns 1 when the dictionary has no entries,
otherwise returns 0.
log $dict log <level> <message> … Outputs a message into the logging system used
by the RADIUS server. <level> should be one of
LOG_ERROR, LOG_WARNING, or
LOG_INFO. The remaining arguments are
concatenated together and sent to the logging
system at the specified level.
nextKey $dict nextKey Returns the name of the next key in the dictionary
that follows the key returned in the last call to
firstKey or nextKey.
put $dict put <key> <value> Associates <value> with the <key> key in the
dictionary, replacing an existing instance of
<key> with the new value.
remove $dict remove <key> Removes the <key> key from the dictionary.
Always returns 1, even when the dictionary did
not contain the <key>.
size $dict size Returns the number of entries in the dictionary.
trace $dict <level> <message> … Outputs a message into the packet tracing system
used by the RADIUS server. At level 0, no tracing
occurs. At level 1, only an indication the server
received the packet and sent a reply is output. As
the number gets higher, the amount of information
output is greater, until at level 4, where everything
the is traced as output. The remaining arguments
are concatenated together and sent to the tracing
system at the specified level.
Table A-5 lists all of the methods you can use with the Request and Response dictionaries.
Table A-5 Java Attribute Dictionary Methods
Interface Extension
Classes that are going to be used as scripts or services from Access Registrar must implement the
Extension interface. When a Java scripting point or service is encountered during the processing of a
request, the server will call the runExtension method defined in this interface and implemented by the
appropriate class.
Interface ExtensionforSession
Classes that are going to be used as scripts at Session Manager level from Cisco Prime Access Registrar
must implement the ExtensionForSession interface. When a Java scripting point or service is
encountered during the processing of a request, the server will call the runExtension method defined in
this interface and implemented by the appropriate class.
Interface Extensionwithinitialization
Classes that are going to be used as scripts or services from Access Registrar implements the
ExtensionWithInitialization interface. ExtensionWithInitialization extends the Extension interface with
methods to initialize and destroy the extension. initialize(java.lang.String) is called when the extension
is first loaded, with the string argument being set from the InitializeArg property that was defined in the
server configuration when the extension was defined (either as a Script or a Service). Destroy() is called
before the extension is unloaded.
Interface ExtensionforSessionwithinitialization
Classes that are going to be used as scripts from Access Registrar at Session Manager level implement
the ExtensionForSessionWithInitialization interface. ExtensionForSessionWithInitialization extends the
ExtensionForSession interface with methods to initialize and destroy the extension.
initialize(java.lang.String) is called when the extension is first loaded, with the string argument being set
from the InitializeArg property that was defined in the server configuration when the extension was
defined (either as a script or a service). Destroy () is called before the extension is unloaded.
Interface MarkerExtension
This is just going to be a marker interface containing various member variables which can be used in
interfaces/classes extending from this interface. Extension and ExtensionForSession interfaces will
extend this interface.
Class Sessionrecord
Each request processed by an Extension will have a corresponding session. The methods present in this
class operate on the attributes cached in that session record. Group of attributes are cached as an
AttributeDictionary in the session record.
Note A sample java script is available in the following path “/cisco-ar/examples/java” after the installation of
AR.
This appendix describes the environment variables the scripts use to communicate with Cisco
Prime Access Registrar (Prime Access Registrar) or to communicate with other scripts.
Prime Access Registrar sets the arguments variable in the Environment dictionary, before calling the
InitEntryPoint of each script. The arguments variable is set to the value of the InitEntryPointArgs
property corresponding to that script, and it allows the administrator to pass (possibly unique)
information to each script initialization function.
Environment variables that are set and read for resource management override provide scripts further
control over session management. These environment variables, including the following
Acquire-User-Session-Limit, Acquire-Group-Session-Limit, Acquire-IP-Dynamic,
Acquire-IP-Per-NAS-Port, Acquire-IPX-Dynamic, and Acquire-USR-VPN, can be set at any point
before session management is invoked. These environment variables are read as the packet flows through
each Resource Manager that the chosen Session Manager calls. The default setting for these environment
variables is TRUE. See the “Configuring and Monitoring the RADIUS Server” chapter of the
Cisco Prime Access Registrar 8.0 Administrator Guide for additional information about Resource
Managers.
This appendix has the following major sections:
• Cisco Prime Access Registrar Environment Dictionary Variables
This section lists environment variables you can use in scripts to communicate with
Prime Access Registrar or to communicate with other scripts.
• Internal Variables
This section lists environment variables used by the Prime Access Registrar server for internal
operations. The environment variables listed in this section must not be modified by scripts.
Accepted-Profiles
Accepted-Profiles is read during authorization after calling server and client incoming scripts (not set
by Prime Access Registrar code). If set, the authorization done by local user lists checks to see if the
given user's profile as specified in the user record is one of those in the separated list of profiles. If it is
not in the separated list of profiles, the request is rejected.
Accounting-Service
Accounting-Service is set after calling server and client incoming scripts and is used to determine which
accounting service is used for this request. If set, the server directs the request to be processed by the
specified accounting service.
When Accounting-Service is not set, the DefaultAccountingService (as defined in the server
configuration) is used instead.
Acquire-Dynamic-DNS
Acquire-Dynamic-DNS is set and read for resource management override. Acquire-Dynamic-DNS is
set to FALSE to skip DNS updating during resource management processing.
Acquire-Group-Session-Limit
Acquire-Group-Session-Limit is set and read for resource management override.
Acquire-Group-Session-Limit is set to FALSE to override the use of group session limit resource
management.
Acquire-Home-Agent
Acquire-Home-Agent is set and read for resource management override. Acquire-Home-Agent is set
to FALSE to override the allocation of the home agent IP address during resource management
processing.
Acquire-IP-Dynamic
Acquire-IP-Dynamic is set and read for resource management override. Acquire-IP-Dynamic is set to
FALSE to override the use of a managed pool of IP addresses resource management.
Acquire-IPX-Dynamic
Acquire-IPX-Dynamic is set and read for resource management override. Acquire-IPX-Dynamic is set
to FALSE to override the use of a managed pool of IPX addresses resource management.
Acquire-IP-Per-NAS-Port
Acquire-IP-Per-NAS-Port is set and read for resource management override.
Acquire-IP-Per-NAS-Port is set to FALSE to override the use of ports associated with specific IP
addresses resource management.
Acquire-Subnet-Dynamic
Acquire-Subnet-Dynamic is not always used. If set to FALSE, subnet-dynamic resource managers are
skipped.
Acquire-User-Session-Limit
Acquire-User-Session-Limit set and read for resource management override.
Acquire-User-Session-Limit is set to FALSE to override the use of user session limit resource
management.
Acquire-USR-VPN
Acquire-USR-VPN is set and read for resource management override. Acquire-USR-VPN is set to
FALSE to override the use of Virtual Private Networks (VPNs) that use USR NAS Clients resource
management.
Allow-Null-Password
Allow-Null-Password is read during password matching and set in local userlist password matching if
not set prior. If Allow-Null-Password is set to TRUE, the Prime Access Registrar server accepts
requests with null passwords.
Authentication-Service
Authentication-Service is set and read for authentication service selection and is used to determine
which service is used to authenticate the user. If set, the server directs the request to be processed by the
specified authentication service. When Authentication-Service is not set, the
DefaultAuthenticationService is used instead.
Authorization-Service
Authorization-Service is set and read for authorization service selection and is used to determine which
service to use to authorize the user. If set, the server directs the request to be processed by the specified
authorization service. When Authorization-Service is not set, the DefaultAuthorizationService is used
instead.
AuthorizationInfo
The MSISDN information is copied to AuthorizationInfo that is fetched by M3UA service.
BackingStore-Env-Vars
BackingStore-Env-Vars overrides the BackingStoreEnvironmentVariables property of remote servers
of type odbc-accounting only when the property BufferAccountingPackets is set to TRUE. The value is
a comma separated list of environment variables to be stored along with the packet contents in the local
disk.
Blacklisted-IMSI
This variable is configured on a SIGTRAN-M3UA remote server. For any incoming request with an
IMSI value, if the variable is set as TRUE, then that IMSI value is blacklisted and will not forwarded to
the HLR. For more information, see the “SIGTRAN-M3UA” chapter of the
Cisco Prime Access Registrar 9.1 User Guide.
Broadcast-Accounting-Packet
If set to TRUE, Broadcast-Accounting-Packet enables broadcasting of Accounting-on or
Accounting-off packets to all remote servers of type radius.
Cache-Attributes-In-Session
Cache-Attributes-In-Session is set and read for resource management override. Cache-Attributes-
In-Session is set to FALSE to override the caching of attributes by the session-cache type of resource
manager.
Current-Group-Count
Current-Group-Count is set and read for group session management. If set, the group-session-limit
resource manager sets Current-Group-Count to be the new value of the group-session-limit counter.
Cache-Outer-Identity
Cache-Outer-Identity value is set to enable identifying session of an user. If it is set to TRUE, WiMAX
session manager will cache the outer identity. If it is set to FALSE, the WiMAX session manager will
cache the inner identity. The value is set to FALSE by default.
Destination-IP-Address
Destination-IP-Address is a read only value which is set to the receiver IP address.
Destination-IP-Address contains the IP address of the request packet receiver.
Destination-Port
Destination-port is a read only value which is set to the receiving port number. Destination-port
contains the port number of the receiver of the request.
Dest-Translation-Type
Dest-Translation-Type is configured through the GlobalTitleTranslationScript. When the
RoutingIndicator is set to RTE_GT, Prime Access Registrar server reads the value that is set in
Dest-Translation-Type and sets the TranslationType field of the Called Party Address. The value in this
environment variable overrides the value that is configured in the
DestinationGTAddress/DestTranslationType property of a remote server, SIGTRAN-M3UA.
Dest-Numbering-Plan
Dest-Numbering-Plan is configured through the GlobalTitleTranslationScript. When the
RoutingIndicator is set to RTE_GT, Prime Access Registrar server reads the value that is set in
Dest-Numbering-Plan and sets the NumberingPlan field of the Called Party Address. The value in this
environment variable overrides the value that is configured in the
DestinationGTAddress/Dest-Numbering-Plan property of a remote server, SIGTRAN-M3UA.
The following are the only values that are used for Dest-Numbering-Plan environment variable:
• DATA
• GENERIC
• ISDN
• ISDNMOB
• LANMOB
• MARMOB
• NWSPEC
• TEL
• TELEX
• UNKN
If you set any variable other than the above ones, Prime Access Registrar server sets the NumberingPlan
that is configured in DestinationGTAddress/Dest-Numbering-Plan property of a remote server of type
SIGTRAN-M3UA.
Dest-Encoding-Scheme
Dest-Encoding-Scheme is configured through the GlobalTitleTranslationScript. When the
RoutingIndicator is set to RTE_GT, Prime Access Registrar server reads the value that is set in
Dest-Encoding-Scheme environment variable and sets the EncodingScheme field of the Called Party
Address. The value in this environment variable overrides the value that is configured in the
DestinationGTAddress/ DestEncodingScheme property of a remote server, SIGTRAN-M3UA.
The following are the only values that are used for Dest-Encoding-Scheme environment variable:
• BCDEVEN
• BCDODD
If you set any variable other than the above ones, Prime Access Registrar server sets the
EncodingScheme that is configured in the DestinationGTAddress/ DestEncodingScheme property of a
remote server of type SIGTRAN-M3UA.
Dest-Nature-Of-Address
Dest-Nature-Of-Address is configured through the GlobalTitleTranslationScript. When the
RoutingIndicator is set to RTE_GT, Prime Access Registrar server reads the value that is set in
Dest-Nature-Of-Address environment variable and sets the NatureOfAddress field of the Called Party
Address. The value in this environment variable overrides the value that is configured in the
DestinationGTAddress/ DestNatureofAddress property of a remote server, SIGTRAN-M3UA.
The following are the only values that are used for Dest-Nature-Of-Address environment variable:
• ADDR_NOTPRSNT
• INTNUM
• NATSIGNUM
• SUBNUM
If you set any variable other than the above ones, Prime Access Registrar server sets the
NatureOfAddress that is configured in the DestinationGTAddress/ DestNatureofAddress property of a
remote server of type SIGTRAN-M3UA.
Dest-GT-Format
Dest-GT-Format configured through the GlobalTitleTranslationScript. When the RoutingIndicator is
set to RTE_GT, Prime Access Registrar server reads the value that is set in Dest-GT-Format
environment variable and uses this format specified for the Global Title Digits(Address Information).
The value in this environment variable overrides the value that is configured in the
DestinationGTAddress/ DestGTFormat property of a remote server, SIGTRAN-M3UA.
The following are the only values that are used for Dest-GT-Format environment variable:
• GTFRMT_0
• GTFRMT_1
• GTFRMT_2
• GTFRMT_3
• GTFRMT_4
• GTFRMT_5
If you set any variable other than the above ones, Prime Access Registrar server sets the GTFormat that
is configured in the DestinationGTAddress/ DestGTFormat property of a remote server of type
SIGTRAN-M3UA.
Diameter-Application-Id
Diameter-Application-Id is set to get the application ID in the Diameter packet.
Diameter-Command-Code
Diameter-Command-Code is set to get the command codes in the Diameter packet.
Disable-Accounting-On-Off-Broadcast
If set to TRUE, Disable-Accounting-On-Off-Broadcast disables broadcasting of Accounting-On and
Accounting-Off packets to all remote servers of type 'radius'.
DSA-Response-Cache
DSA-Response-Cache is used while performing DSA( Dynamic Service Authorization) feature in
Prime Access Registrar. It is FALSE by default, which will clear the response dictionary before
Re-Authentication. If DSA-Response-Cache is set to TRUE, Prime Access Registrar will not clear the
response dictionary before Re-Authenticating with next service configured.
DSA-Response-Cache must be set to TRUE for enabling delivery of location information from the client
to RADIUS/Diameter server.
Dynamic-DNS-HostName
Dynamic-DNS-HostName is read while constructing the forward hostname during resource
management processing to update DNS entries. If set, the name will be used as forward hostname instead
of constructing one.
Dynamic-Search-Filter
Dynamic-Search-Filter overrides the Filter property in remote servers of type ldap. The format of the
value set for Dynamic-Search-Filter should be similar to that of the Filter property.
Dynamic-Search-Path
Dynamic-Search-Path is read for LDAP searching. If set, the server uses it as its LDAP search path
rather than the value set in the remote server configuration.
Dynamic-Search-Scope
Dynamic-Search-Scope is used to dynamically set the SearchScope property of an LDAP remote server
configuration on a per-packet basis.
Dynamic-Service-Loop-Limit
Dynamic-Service-Loop-Limit variable is used to change loop counts. When using the same service for
reauthentication and reauthorization, a loop can occur in these services. The loop count, by default is 10.
You can change the loop count using this variable.
Dynamic-User-Password-Attribute
Dynamic-User-Password-Attribute is read for LDAP authentication and overrides the
UserPasswordAttribute. If set, the server uses it to retrieve the password field as its LDAP UserPassword
attribute instead of the value set in the remote server configuration.
EAP-Actual-Identity
EAP-Actual-Identity is a read-only variable that contains the International Mobile Subscriber Identity
(IMSI) of the user after a successful EAP-SIM authentication.
EAP-Authentication-Mode
EAP-Authentication-Mode is a read-only variable, set after a successful EAP-SIM authentication, that
indicates whether the EAP-SIM authentication was a reauthentication or a full authentication.
EnableMatchingServiceSelection5GFlag
EnableMatchingServiceSelection5GFlag variable provides a flexibility to decide if you want to check
the Interworking-5GS-Indicator AVP in the APN configuration of matching Service-Selection. The
value must be set to 1 in the remote server incoming script to enable this flag.
Enforce-Traffic-Throttling
By default, the value is set to FALSE. When set to TRUE, the traffic throttling check for the packet will
be executed.
E-UTRANCellGlobalId
Variable that carries location information of a user equipment (UE) that tries to access a network. For
more information, see Chapter 6, “Wireless Support.”
FetchAuthorizationInfo
When set to TRUE, this variable fetches MSISDN value from the HLR.
Do not use FetchAuthorizationInfo for authorization. We recommend that you use the authorization
service of m3ua instead.
Generate-BEK
Generate-BEK is read when WiMax provisioning service is enabled. If this is set,
Prime Access Registrar will generate the Bootstrap Encryption Key in the WiMax flow.
Group-Session-Limit
Group-Session-Limit is set and read for group session management. The group-session-limit resource
manager sets this environment variable to be the limit of the group-session-limit counter as set by the
configuration.
HLR-GlobalTitle-Address
HLR-GlobalTitle-Address is configured through the GlobalTitleTranslationScript. When the
RoutingIndicator is set to RTE_GT in SIGTRAN-M3UA remote server, Prime Access Registrar server
reads the value that is set in HLR-GlobalTitle-Address and sets the Destination GT Digits(Address
Information field) of the Called Party Address.
HLR-GlobalTitle-Cached
HLR-GlobalTitle-Cached is set as TRUE to indicate the HLR GT is cached.
The Home Location Registry (HLR) Global Title address (GT address in calling party address (CgPA))
from the SendAuthenticationInfo (SAI) response is cached and used for subsequent authorization
request. This cached HLR GT is added to the environment dictionary of the packet to be available for
the authorization flow.
The cached HLR GT overrides both the configured destination GT values and GT script provided GT
values. The HLR GT caching works by default for RTE_GT. The cached HLR GT can be overridden by
updating the environment variable HLR-GlobalTitle-Cached to FALSE (or anything other than TRUE)
in the GT script.
This HLR GT will not be cached for:
• reauthentication flow
• authorize only flow when authentication vectors are already available in cache (as there will not be
SAI request.
HLR-Translated-IMSI
HLR-Translated-IMSI is configured through the IMSITranslationScript. Prime Access Registrar
server reads the value in HLR-Translated-IMSI and sets the value as IMSI before sending the request to
STP/HLR. The value that is configured in the HLR-Translated-IMSI environment variable overrides the
IMSI received in EAP-AKA/EAP-SIM request packet.
Ignore-Accounting-Signature
Ignore-Accounting-Signature is set after calling server and client incoming scripts and is used to
ignore missing or incorrect accounting signatures from NASs. If set, Prime Access Registrar does not
check whether the account request packet has been signed with the same shared secret as the NAS.
Ignore-Accounting-Signature is used to work with RADIUS implementations that did not sign
Accounting-Requests. A script was provided in the distribution (for USR NASs) that could be set in the
IncomingScript extension point for the USR Vendor that simply set this environment variable.
IMSI
International Mobile System Identifier (IMSI) that is fetched from the response from HLR.
Incoming-Translation-Groups
Incoming-Translation-Groups is read for authentication while processing responses from a remote
RADIUS server. If set, Incoming-Translation-Groups specifies the translation groups to be used to
filter attributes on requests.
Location-Capability
Location-Capability must be set to TRUE to enable delivery of location information from the client to
RADIUS/Diameter server.
Master-URL-Fragment
Used with the Windows Provisioning Service feature, Master-URL-Fragment specifies the fragment
within the Master URL to be sent back to the provisioning server. Master-URL-Fragment can be set to
any of the following four values: signup, renewal, passwordchange, and forceupdate. If
Master-URL-Fragment is not set and is required to send the URL, signup will be sent by default.
The environmental variable Send-PEAP-URL-TLV indicates whether or not to send the URL.
Misc-Log-Message-Info
Misc-Log-Message-Info is read for packet event logging. If a log message is generated, the value of
Misc-Log-Message-Info is inserted into the middle of the log message.
MSISDN
The Mobile Subscriber ISDN Number (MSISDN) that is fetched from the response from HLR.
Notification-Code
The Notification-Code variable is set up to indicate the reason for an authentication or authorization
failure for EAP-SIM, EAP-AKA, and EAP-AKA’ services. The common authorization/authentication
failure reasons as received from the HLR are:
• Unknown subscriber
• System failure
• Data missing
• Unexpected data value
• Reject / Return with unknown error
Prime Access Registrar reads this environment variable and sends an appropriate message to the client.
Notification-Service
Notification-Service is an authorization service and is used to send a notification code to the client in
case of authorization failure.
This can be any of the services configured under /radius/services/ except eap services, accounting
services, radius-session, radius-query, and diameter.
Outgoing-Translation-Groups
Outgoing-Translation-Groups is read while proxying to a remote radius server. If set,
Outgoing-Translation-Groups specifies the translation groups to be used to filter attributes.
Pager
The aregcmd command supports the Pager environment variable. When the aregcmd command stats
is used and the Pager environment variable is set, the output of the stats command is displayed using
the program specified by the Pager environment variable.
PoD/CoA
The PoD/CoA variable is set and read for the CoA/PoD packet processing and used to determine whether
the incoming PoD/CoA request must be translated to the corresponding PoD/CoA request. Table B-1
lists the PoD/CoA values and the corresponding functions.
Query-Service
The Query-Service variable is set and read for the radius-query service selection type. The
Query-Service variable must be set before authentication phase begins at the server, vendor, or client
incoming scripting point or using the policy engine. If set, the server directs requests to be processed by
the specified radius-query service. After the Query-Service variable is set, no AAA processing will be
done.
Re-Accounting-Service
Re-Accounting-Service is configured, through script, for dynamic service authorization. When the
Re-Accounting-Service is set, the server directs the request to the specified reaccounting service for
processing.
Re-Authentication-Service
Re-Authentication-Service is configured, through script, for dynamic service authorization. When the
Re-Authentication-Service is set, the server directs the request to the specified reauthentication service
for processing.
Re-Authorization-Service
Re-Authorization-Service is configured, through script, for dynamic service authorization. When the
Re-Authorization-Service is set, the server directs the request to the specified reauthorization service for
processing.
Re-Authorization Service must be set to the local service, which contains the profiles that must be
added to the EAP Access-Challenge message for delivery of location information from the client to the
RADIUS/Diameter server.
Reject-Reason
Reject-Reason is set when a request is being rejected and contains the Reject-Reason.
Prime Access Registrar uses the value of Reject-Reason to look up the reject reason in the reply
message table.
If Reject-Reason is set to one of: UnknownUser, UserNotEnabled, UserPasswordInvalid,
UnableToAcquireResource, ServiceUnavailable, InternalError, MalformedRequest, ConfigurationError,
IncomingScriptFailed, OutgoingScriptFailed, IncomingScriptRejectedRequest,
OutgoingScriptRejectedRequest, or TerminationAction, then the value set in the configuration under
/Radius/Advanced/ReplyMessages will be returned.
Remote-Server
Remote-Server is set and read for logging a rejected packet from a remote server. Remote-Server
records the name and IP address of the remote server to which the request has been forwarded.
Remove-Session-On-Acct-Stop
When set to TRUE, server removes the session on receiving an accounting stop packet.
Remote-Servers-Tried
Remote-Servers-Tried contains a list of remote servers that were tried before a request was accepted or
rejected (in the case of a Failover multiple remoteserver policy). The list of servers is a comma-separated
list of remote server names.
Request-Authenticator
Request-Authenticator is set for every packet upon reception. Getting the Request-Authenticator
from a script returns the value of the request authenticator.
Request-Type
Request-Type is set when a request is first received to the type of request, such as one of
Access-Request, Access-Accept, Access-Reject, Accounting-Request, Accounting-Response, or
Access-Challenge before calling any extension points.
The request contains a string representation of the RADIUS packet type (code). When
Prime Access Registrar does not recognize the packet type, it is represented as
“Unknown-Packet-Type-<N>, where <N> is the numeric value of the packet type (for example
“Unknown-Packet-Type-9). The known packet types are listed in Table B-2.
Require-User-To-Be-In-Authorization-List
Require-User-To-Be-In-Authorization-List is read for authorization. If we are authorizing with a
different service than we authenticated with (not usually done) and the user is not known by the
authorization service, the default is to continue on unless this environment variable is set, in which case
we reject the request with a cause of Unknown-user.
Response-Type
Response-Type is set and read throughout processing and used to determine whether the request should
be accepted, rejected, or challenged. When Response-Type is set to “Access-Reject at any time during
the processing of a request, no more processing of the request is done, and an Access-Reject response is
sent. For other valid values for Response-Type, see Table B-2.
Retrace-Packet
If set, Retrace-Packet causes a trace of the packet to be displayed during the incoming and outgoing
scripts. If set, will cause a second trace of the request packet's contents after running all the incoming
scripts and/or a second trace of the response packet's contents before running the outgoing scripts.
Send-PEAP-URI-TLV
When set to TRUE, the URI PEAP-TLV is included along with the Result PEAP-TLV in the
access-challenge packet. The authenticating user service (of type userlist, LDAP, or WDA) can set this
to TRUE using an extension point script or attribute mapping so that the PEAP-v0 service can send the
URI PEAP-TLV. The default value for this is FALSE.
Note This variable is used with the Windows Provisioning Service (WPS) feature.
Session-Key
Session-Key is read for session management. If set, the server uses it as the key to look up the session
associated with the current request, if any. If not set, the server uses the NAS IP Address and NAS Port
to create a session key.
Session-Manager
Session-Manager is read after user authorization and determines which dynamic resources to allocate
for this user, when one is needed. If set, the server directs the request to be processed by the specified
session manager. When not set, the SessionManager (as defined in DefaultSessionManager) is used
when needed.
Session-Notes
Session-Notes is a comma-separated list set to make session information available to scripts.
Session-Notes contains the names of other environment variables. If set, these variables are stored on a
Session as notes.
Session-Service
Session-Service is set and read during session management. If set, the server will direct the request to
be processed by the specified session service.
Set-Session-Mgr-And-Key-Upon-Lookup
When Set-Session-Mgr-And-Key-Upon-Lookup is set to TRUE, a session-cache resource manager
sets the session-manager and session-key environment variable during a query-lookup, and the
Prime Access Registrar server does not cache the response dictionary attributes.
Set-Session-Mgr-And-Key-Upon-Lookup is set to TRUE by a query-service IncomingScript.
Skip-Session-Management
When set to TRUE in a request, Skip-Session-Management causes session management to be skipped
for the request, even if session management might normally occur.
Skip-Overriding-Username-With-LDAP-UID
Skip-Overriding-Username-With-LDAP-UID is used to decide if the username should be replaced with
the UID from the LDAP server. When Skip-Overriding-Username-With-LDAP-UID is set to TRUE, the
username is not replaced with the UID from the LDAP server.
You can use Skip-Overriding-Username-With-LDAP-UID to retain case sensitivity in usernames when
the username given logging into the network is in a different case that the UID in the LDAP server
database, such as User1 and user1.
Skip-Overriding-UserName-With-PEAPIdentity
Skip-Overriding-Username-With-PEAPIdentity is used to decide if the username should be replaced
with the PEAP Identity. When Skip-Overriding-Username-With-PEAPIdentity is set to TRUE, the
username is not replaced with the PEAP Identity.
Source-IP-Address
Source-IP-Address is set when a request is first received to the IP address from which the IP request
was received before calling any extension points. Source-IP-Address contains the IP address of the
NAS or proxy server that sent the request to this server.
Source-Port
Source-Port is set when a request is first received to the port from which the request was received.
Source-Port is set for each request before calling any extension points and contains the port on the NAS
or proxy server that was used to send the request to this server.
SQL-Sequence
SQL-Sequence variable is set with a list of SQL statement names, separated by a semicolon (;). For
example, the SQL statement names ‘sql3’, ‘sql4’, and ‘sql5’ are denoted as sql3;sql4;sql5. If the variable
is set, Prime Access Registrar picks the SQL statements and executes them in the order specified.
Subnet-Size-If-No-Match
Subnet-Size-If-No-Match is set to one of BIGGER, SMALLER or EXACT, determines the behavior of
the subnet-dynamic resource manager if a pool of the requested size is not available.
Trace-Level
Trace-Level is set for each request before calling any extension points. Trace-Level is set to the current
trace level as specified through aregcmd. If set by a script, Trace-Level changes the trace level used to
determine what level of information is traced.
Unavailable-Resource
Unavailable-Resource is set during session management. If the request is being rejected because one of
the resource managers failed to allocate a resource, Unavailable-Resource is set to the name of the
resource manager that failed.
Unavailable-Resource-Type
Unavailable-Resource-Type is set during session management. If the request is being rejected because
one of the resource managers failed to allocate a resource, Unavailable-Resource-Type is set to the type
of the resource manager that failed.
UserDefined1
UserDefined1 is set to the value of the UserDefined1 property of the user from a local user list during
password matching of local users.
User-Authorization-Script
User-Authorization-Script is read in local services during authorization. If set, the server calls the
specified script to do additional user authorization after authentication succeeds.
User-Group
User-Group is read in local services during authorization. If set, species the UserGroup to which the
current user belongs.
User-Group-Session-Limit
User-Group-Session-Limit is read during session management. If set, User-Group-Session-Limit
overrides the limit specified for the group-session-limit resource manager.
User-Name
User-Name is read by a local service during authentication. When User-Name is set, it is the name used
to authenticate or authorize the request and overrides the User-Name in the Request dictionary.
User-Profile
User-Profile is read in local services during authorization. If set, User-Profile specifies the Profile from
which the current user should receive attributes.
User-Session-Limit
User-Session-Limit is read during session management. If set, User-Session-Limit overrides the limit
specified for the user-session-limit resource manager.
Virtual-Server-Outgoing-Script
Virtual-Server-Outgoing-Script is read when LawfulIntercept script object is enabled to use virtual script
object. If this is set, the configured script will be executed after server outgoing script.
X509- Subject-Name
X509- Subject-Name reads the value of the subject in the SSL certificate. This is read while processing
the access request.
Internal Variables
The following environment variables are used by the server for internal operation. The values for these
environment variables must not be modified.
• Add-Message-Authenticator
• Calling-Service-Name
• Cleartext-Password
• Current-Service-Name
• Dynamic-Search-UID
• Duplicate-Req
• EAP-Internal-Services
• Group-Service
• Group-Service-State-ID
• Hidden-Attrib
• IMSI
• Local-Port-type
• Message-Authenticator-Present
• MSCHAP-Account-Name
• MS-ChapV2-Message
• NAS-Name-And-IPAddress
• Notify-Service-Session-Key
• Notify-Service-State-ID
• Number-Requested-Quintets
• Number-Requested-Triplets
• Proxied-Dynamic-Auth (named Proxied-POD in earlier releases)
• Provider-Identifier
• Rcd-NT-Password-Hash-Hash (named Rcd-NT-Password-Hash in earlier releases)
• Remote-Session
• Return-Data
• Roaming
• Script-Level
• Session-ID
• Session-Accounting-Counter
• Session-Generation-Tag
• Session-Last-Accessed-Time
• Session-Manager-Key
• Session-NAS-Identifier
• Session-NAS-Port
• Session-Resource-Count
• Session-Resource-%d
• Session-Reuse
• Session-Start-Time
• Session-Survives-NAS-Reboot
• Session-User-Name
• User-Name-Used-For-Lookup
• WiMax-Authentication
• WiMax-SessionManager-Exists
This appendix lists the attributes Cisco Prime Access Registrar (Prime Access Registrar) supports with
their names and values. RADIUS attributes carry the specific authentication, authorization information,
and configuration details for requests and replies. For more detailed information about specific
attributes, see the appropriate RFC as listed Table C-1.
RADIUS Attributes
This section lists the RADIUS attributes supported in Prime Access Registrar. RADIUS attributes carry
specific authentication, authorization, information, and configuration details in the Access-Request and
the RADIUS server response.
Vendor-Specific Attributes
This section lists all vendor-specific attributes (VSAs) supported by Prime Access Registrar.
3GPP VSAs
Table C-4 lists the 3GPP VSAs. The vendor ID for 3GPP VSAs is 10415.
3GPP2 VSAs
Table C-5 lists the 3GPP2 VSAs. The vendor ID for 3GPP2 VSAs is 5535 with 8-bit VendorTypeSize.
ACC VSAs
Table C-6 lists the ACC VSAs. The vendor ID for ACC VSAs is 5.
Min-Max
SubAttr VSA Name Type Value
1 Acc-Reason-Code ENUM: 0-56
no reason given/no failure
resource shortage
protocol error
invalid attribute
invalid service type
invalid framed protocol
invalid attribute value
invalid user information
invalid IP address
invalid integer syntax
invalid NAS port
1 Acc-Reason-Code (Continued) ENUM: 0-56
requested by user
session already open
network disconnect
service interruption
physical port error
idle timeout
session timeout
administrative reset
NAS reload or reset
NAS error
NAS request
1 Acc-Reason-Code (Continued) ENUM: 0-56
undefined reason given
too many RADIUS users
conflicting attributes
port limit exceeded
facility not available
internal configuration error
bad route specification
Min-Max
SubAttr VSA Name Type Value
1 Acc-Reason-Code (Continued) Access Partition bind failure 0-56
security violation
request type conflict
configuration disallowed
missing attribute
no authentication server
invalid request
missing parameter
invalid parameter
call cleared with cause
inopportune config request
invalid config parameter
missing config parameter
incompatible service profile
administrative reset
1 Acc-Reason-Code (Continued) administrative reload 0-56
no authentication response
port unneeded
port preempted
port suspended
service unavailable
callback
user error
host request
no accounting server
no accounting response
access denied
temporary buffer shortage
2 Acc-Ccp-Option ENUM: 1-2
Disabled
Enabled
3 Acc-Input-Errors UINT32 0-253
4 Acc-Output-Errors UINT32 0-253
5 Acc-Access-Partition String 0-253
6 Acc-Customer-Id String 0-253
7 Acc-Ip-Gateway-Pri IPADDR 0-253
8 Acc-Ip-Gateway-Sec IPADDR 0-253
9 Acc-Route-Policy ENUM : 1-2
Funnel
Direct
10 Acc-ML-MLX-Admin-State ENUM: 1-2
Enabled
Disabled
11 Acc-ML-Call-Threshold UINT32 0-253
Min-Max
SubAttr VSA Name Type Value
12 Acc-ML-Clear-Threshold UINT32 0-253
13 Acc-ML-Damping-Factor UINT32 0-253
14 Acc-Tunnel-Secret String 0-253
15 Acc-Clearing-Cause ENUM: 0-127
cause unspecified
unassigned number
invalid information element c
message incompatible with sta
recovery on timer expiration
mandatory information element
protocol error
interworking
normal clearing
user busy
no user responding
user alerted no answer
15 Acc-Clearing-Cause ENUM: 0-127
(Continued) no route to transit network
call rejected
number changed
non selected user clearing
destination out of order
invalid or incomplete number
facility rejected
no route to destination
response to status inquiry
normal unspecified cause
no circuit or channel availab
network out of order
15 Acc-Clearing-Cause ENUM: 0-127
(Continued) temporary failure
switching equipment congestio
access information discarded
circuit or channel unavailabl
circuit or channel preempted
resources unavailable
quality of service unavailabl
facility not subscribed
outgoing calls barred
incoming calls barred
bearer capability unauthorize
bearer capability not availab
Min-Max
SubAttr VSA Name Type Value
15 Acc-Clearing-Cause ENUM: 0-127
(Continued) channel unacceptable
service not available
bearer capability not impleme
channel type not implemented
facility not implemented
call awarded being delivered
restricted digital informatio
service not implemented
invalid call reference
identified channel does not e
call identity does not exist
call identity in use
no call suspended
15 Acc-Clearing-Cause ENUM: 0-127
(Continued) suspended call cleared
incompatible destination
invalid transit network selec
invalid message
mandatory information element
message not implemented
inopportune message
information element not imple
16 Acc-Clearing-Location ENUM: 0-10
local or remote user
private network serving local
beyond interworking point
public network serving local
transit network
private network serving remot
public network serving remote
international network
17 Acc-Service-Profile String 0-253
18 Acc-Request-Type ENUM: 1-6
Ring Indication
Dial Request
User Authentication
Tunnel Authentication
User Accounting
Tunnel Accounting
19 Acc-Framed-Bridge ENUM : 0-1
Disabled
Enabled
20 Acc-Vpsm-Oversubscribed ENUM : 1-2
False
True
Min-Max
SubAttr VSA Name Type Value
21 Acc-Acct-On-Off-Reason ENUM : 0-5
NAS Reset
NAS Reload
Configuration Reset
Configuration Reload
Enabled
Disabled
22 Acc-Tunnel-Port UINT32 0-253
12 Acc-Dns-Server-Pri IPADDR 0-253
24 Acc-Dns-Server-Sec IPADDR 0-253
26 Acc-Nbns-Server-Sec IPADDR 0-253
27 Acc-Dial-Port-Index
28 Acc-Ip-Compression ENUM: 0-1
Disabled
Enabled
29 Acc-Ipx-Compression ENUM: 0-1
Disabled
Enabled
30 Acc-Connect-Tx-Speed UINT32 0-253
31 Acc-Connect-Rx-Speed UINT32 0-253
32 Acc-Modem-Modulation-Type String 0-253
33 Acc-Modem-Error-Protocol String 0-253
34 Acc-Callback-Delay UINT32 0-253
35 Acc-Callback-Num-Valid String 0-253
36 Acc-Callback-Mode ENUM: 0-7
User-Auth
User-Specified-E-164
CBCP-Callback
CLI-Callback
37 Acc-Callback-CBCP-Type ENUM: 1-3
CBCP-None
CBCP-User-Specified
CBCP-Pre-Specified
38 Acc-Dialout-Auth-Mode ENUM: 1-4
PAP
CHAP
CHAP-PAP
NONE
39 Acc-Dialout-Auth-Password String 0-253
40 Acc-Dialout-Auth-UserName String 0-253
Min-Max
SubAttr VSA Name Type Value
42 Acc-Access-Community ENUM: 1-2
PUBLIC
NETMAN
43 Acc-Vpsm-Reject-Cause ENUM: 1-7
No-Access-Partition
Access-Partition-Disabled
Partition-Portlimit-Exceeded
License-Portlimit-Exceeded
Home-Server-Down
Rejected-By-Home-Server
NAS-Administratively-Disabled
44 Acc-Ace-Token String 0-253
45 Acc-Ace-Token-Ttl UINT 0-253
46 Acc-Ip-Pool-Name String 0-253
47 Acc-Igmp-Admin-State ENUM : 1-2
Enabled
Disabled
48 Acc-Igmp-Version ENUM : 1-2
V1
V2
Altiga VSAs
Table C-7 lists the Altiga VSAs. The vendor ID for Altiga VSAs is 3076.
Min-Max
SubAttr VSA Name Type Value
1 Altiga-General-Acces-Hours String 0-253
2 Altiga-General-Simultaneous-Logic UINT32 0-253
3 Altiga-General-Minimum-Password-Length UINT32 0-253
4 Altiga-General-All-Alphabetic-Only-Passwords ENUM 0-1
5 Altiga-General-Primary-DNS IP Address 0-253
6 Altiga-General-Secondary-DNS IP Address 0-253
8 Altiga-General-Secondary-WINS IP Address 0-253
9 Altiga-General-SEP-Card-Assignment UINT32 0-253
10 Altiga-General-Priority-On-SEP UINT32 0-253
11 Altiga-General-Tunneling-Protoco UNIT32 0-253
12 Altiga-IPSec-Security-Associatio String 0-253
Min-Max
SubAttr VSA Name Type Value
13 Altiga-IPSec-Authentication ENUM: 0-5
None
RADIUS
LDAP
NT Domain
SDI
Internal
15 Altiga-IPSec-Banner String 0-253
16 Altiga-IPSec-Allow-Password-Storage-On-Client ENUM: 0-1
False
True
17 Altiga-PPTP-L2TP-Use-Client-Specified-Addres ENUM: 0-1
s False
True
18 Altiga-PPTP-Minimal-Authentication-Protocol UINT32 0-253
19 Altiga-L2TP-Minimal-Authentication UINT32 0-253
20 Altiga-PPTP-Encryption UINT32 0-253
21 Altiga-L2TP-Encryption UINT32 0-253
22 Altiga-Argument-Authentication-Server-Type ENUM: 0-5
First Active
Server
RADIUS
LDAP
NT
SDI
Internal
12 Altiga-Argument-Authentication-Server-Passwor String 0-253
d
24 Altiga-Argument-Request-Authenticatior-Vector String 0-253
25 Altiga-IPSec-LTL-Keepalives ENUM: 0-1
False
True
26 Altiga-Argument-IPSec-Group-Name String 0-253
27 Altiga-IPSec-Split-Tunneling String 0-253
28 Altiga-IPSec-Default-Domain String 0-253
28 Altiga-IPSec-Secondary-Domain-List String 0-253
30 Altiga-IPSec-Tunnel-Type ENUM: 1-2
LAN to
LAN
Remote
Access
Min-Max
SubAttr VSA Name Type Value
31 Altiga-IPSec-Mode-Configuration ENUM: 0-1
False
True
32 Altiga-Argument-Authentication-Server-Priority UINT32 0-253
33 Altiga-IPSec-Group-Lock-Of-User ENUM: 0-1
False
True
34 Altiga-IPSec-IPSec-Over-UDP ENUM: 0-1
False
True
35 Altiga-IPSec-UDP-Port-For-IPSec UINT32 0-253
128 Altiga-Partitioning-Primary-DHCP
129 Altiga-Partitioning-Secondary-DHCP IP Address 0-253
131 Altiga-Partitioning-Premise-Rout IP Address 0-253
132 Altiga-Partitioning-Partition-Max-Sessions String 0-253
133 Altiga-Partitioning-Mobile-IP-Key String 0-253
134 Altiga-Partitioning-Mobile-IP-Address IP Address 0-253
135 Altiga-Partitioning-Mobile-IP-SPI IP Address 0-253
136 Altiga-Partitioning-Strip-Realm ENUM: 0-1
False
True
137 Altiga-Partitioning-Group-ID UINT32 0-253
250 Altiga-Group-Name String 0-253
Ascend VSAs
Table C-8 lists the Ascend VSAs. The vendor ID for Ascend VSAs is 529.
Min-Max
SubAttr VSA Name Type Value
17 Ascend-Change-Password String 0 - 253
18 Ascend-Session-Type ENUM: 0-8
Unused
Unknown
G711-Ulaw
G711-Alaw
G712
G729
G712-64KPS
G728
RT24
19 Ascend-H312-Gatekeeper IP Address 0 - 253
21 Ascend-H312-Conference-ID String 0-253
22 Ascend-H312-Destination-NAS-ID IP Address 0-65535
12 Ascend-H312-Dialed-Time UINT32 0-253
24 Ascend-H312-Dialed-Number String 0-253
25 Ascend-Inter-Arrival-Jitter UINT32 0-253
26 Ascend-Dropped-Octets UINT32 0-253
27 Ascend-Dropped-Packets UINT32 0-253
48 Ascend-Call-Direction ENUM: 0-1
Incoming
Outgoing
Min-Max
SubAttr VSA Name Type Value
49 Ascend-Service-Type ENUM 0 - 12;
NotUsed
None
EuUi
Telnet
TelnetBi
n
RawTcp
TermSer
ver
MP
VirtualC
onn
X25DCh
an
PseuTun
PPP
IpFax
Other
ATM
HdlcNrm
VoIp
Visa2
PPP
Slip
MPP
X25
Combine
t
FR
EuRaw
68 Ascend-Tunnel-ID String 0 - 253
126 Ascend-Route-Preference ENUM: 0-225
Interface,
OSPF-Internal
,
RIP,
Down-WAN,
OSPF-ASE,
Infinite,
ICMP
132 Ascend-Client-Gateway IP Address 0 - 253
144 Ascend-Assign-IP-Client IP Address 0-0
145 Ascend-Assign-IP-Server IP Address 0-0
152 Ascend-Multicast-Rate-Limit UINT32 0-65535
162 Ascend-FR-DCE-N392 UINT32 0-65535
Min-Max
SubAttr VSA Name Type Value
163 Ascend-FR-DTE-N392 UINT32 0-65535
164 Ascend-FR-DCE-N393 UINT32 0-65535
165 Ascend-FR-DTE-N393 UINT32 0-65535
166 Ascend-FR-T391 UINT32 0-65535
167 Ascend-FR-T392 UINT32 0-65535
168 Ascend-Bridge-Address UINT32 1-253
169 Ascend-TS-Idle-Limit UINT32 0-65535
170 Ascend-TS-Idle-Mode ENUM; 0-2
TS-Idle-None
TS-Idle-Input
TS-Idle-Input-
Output
171 Ascend-DBA-Monitor ENUM; 0-2
Transmit
Transmit-Rece
ive
None
172 Ascend-Base-Channel-Count UINT32 0-65535
173 Ascend-Minimum-Channels UINT32 0-65535
174 Ascend-IPX-Route String 1-253
175 Ascend-FT1-Caller ENUM; 0-1
FT1-No
FT1-Yes
176 Ascend-Backup String 1-253
177 Ascend-Call-Type ENUM; 0-2
Nailed
Nailed/MPP
Perm/Switche
d
178 Ascend-Group String 1-253
179 Ascend-FR-DLCI UINT32 0-65535
180 Ascend-FR-Profile-Name String 1-253
181 Ascend-Ara-PW String 1-253
182 Ascend-IPX-Node-Address String 1-253
183 Ascend-Home-Agent-IP-Addr IP Address 0-0
184 Ascend-Home-Agent-Password String 1-253
185 Ascend-Home-Network-Name String 1-253
186 Ascend-Home-Agent-UDP-Port UINT32 0-65535
187 Ascend-Multilink-ID UINT32 0-65535
Min-Max
SubAttr VSA Name Type Value
188 Ascend-Num-In-Multilink UINT32 0-65535
189 Ascend-First-Dest IP Address 0-0
190 Ascend-Pre-Input-Octets UINT32 0-65535
191 Ascend-Pre-Output-Octets UINT32 0-65535
192 Ascend-Pre-Input-Packets UINT32 0-65535
193 Ascend-Pre-Output-Packets UINT32 0-65535
194 Ascend-Maximum-Time UINT32 0-65535
Min-Max
SubAttr VSA Name Type Value
195 vAscend-Pre-Output-Packets ENUM: 0-195
(continued) No-Reason,
Not-Applicabl
e,
Modem-No-D
CD,
Session-Timeo
ut,
Invalid-Incomi
ng-User,
Disconnect-D
ue-To-Callbac
k,
DCD-Detected
-Then-Inactive
,
Modem-Invali
d-Result-Code
s,
Protocol-Disa
bled-Or-Unsup
por,
Disconnect-Re
q-By-RADIUS
,
Disconnect-Re
q-By-Local-A
dmin,
V110-Timeout
-Or-Sync-Retr
y-Ex,
PPP-Auth-Tim
eout-Exceeded
,
User-Executed
-Do-Hangup,
Remote-End-
Hung-Up,
Resource-Has-
Been-Quiesce
d,
Max-Call-Dur
ation-Reached,
Unknown,
(continued)
Min-Max
SubAttr VSA Name Type Value
195 vAscend-Pre-Output-Packets ENUM: 0-195
TermSrv-User-
Quit,
TermSrv-Idle-
Timeout,
TermSrv-Exit-
Telnet,
TermSrv-No-I
Paddr,
TermSrv-Exit-
Raw-TCP,
TermSrv-Exit-
Login-Failed,
TermSrv-Exit-
Raw-TCP-Dis
abled,
TermSrv-CTR
L-C-In-Login,
TermSrv-Destr
oyed,
TermSrv-User-
Closed-VCon,
Call-Disconne
cted,
TermSrv-VCo
n-Destroyed,
TermSrv-Exit-
Rlogin,
TermSrv-Bad-
Rlogin-Option
,
TermSrv-Not-
Enough-Resou
rces,
MPP-No-NUL
L-Msg-Timeo
ut,
CLID-Authent
ication-Failed,
(continued)
Min-Max
SubAttr VSA Name Type Value
195 vAscend-Pre-Output-Packets ENUM: 0-195
PPP-LCP-Tim
eout,
PPP-LCP-Neg
otion-Failed,
PPP-PAP-Aut
h-Failed,
PPP-CHAP-A
uth-Failed,
PPP-Rmt-Auth
-Failed,
PPP-Rcv-Term
inate-Req,
PPP-Rcv-Clos
e-Event,
PPP-No-NCPs
-Open,
PPP-MP-Bund
le-Unknown,.
PPP-LCP-Clos
e-MP-Add-Fai
l,
CLID-RADIU
S-Timeout
(continued)
Min-Max
SubAttr VSA Name Type Value
195 vAscend-Pre-Output-Packets Out-Of-Resou
(continued) rces,
Invalid-IP-Ad
dress,
Hostname-Res
olution-Failed,
Bad-Or-Missin
g-Port-Numbe
r, Host-Reset,
Connection-R
efused,
Connection-Ti
meout,
Connection-Cl
osed,
Network-Unre
achable,
Host-Unreach
able,
Network-Unre
achable-Admi
n,
Host-Unreach
able-Admin,
Port-Unreacha
ble,
Min-Max
SubAttr VSA Name Type Value
196 Ascend-Connect-Progress ENUM: 0-94
No-Progress,
unknown1,
Call-Up,
unknown2,
Modem-Up,
Modem-Awaiti
ng-DCD,
Modem-Awaiti
ng-Codes,
TermSrv-Start
ed,
TermSrv-Raw-
TCP-Started,
TermSrv-Telne
t-Started,
TermSrv-Raw-
TCP-Connecte
d,
TermSrv-Telne
t-Connected,
TermSrv-Rlogi
n-Started,
TermSrv-Rlogi
n-Connected,
TermSrv-Auth
entication-Beg
in,
Modem-Outdi
al-Call-Up
Min-Max
SubAttr VSA Name Type Value
196 Ascend-Connect-Progress ENUM: 0-94
LAN-Session-
Up,
LCP-Opening,
CCP-Opening,
IPNCP-Openi
ng,
NCP-Opening,
LCP-Opened,
CCP-Opened,
IPNCP-Opene
d,
BNCP-Opened
,
LCP-State-Init
ial,
LCP-State-Sta
rting,
LCP-State-Clo
sed,
LCP-State-Sto
pped,
BACP-Opened
,
LCP-State-Sto
pping,
LCP-State-Re
quest-Sent,
LCP-State-Ac
k-Received,
LCP-State-Ac
k-Sent,
IPXNCP-Open
ed,
ATNCP-Open
ed,
BACP-Openin
g,
V110-Up,
V110-State-O
pened,
V110-State-Ca
rrier,
V110-State-Re
set,
V110-State-Cl
osed
197 Ascend-Data-Rate UINT32 0-65535
Min-Max
SubAttr VSA Name Type Value
198 Ascend-PreSession-Time UINT32 0-65535
199 Ascend-Token-Idle UINT32 0-65535
200 ENUM: 0-1
Tok-Imm-No,
Tok-Imm-Yes
201 Ascend-Require-Auth ENUM: 0-55
Not-Require-
Auth
Require-Auth
Pap-Only
Pap-Only
Pap-Login-Onl
y
Pap-Framed-O
nly
Pap-Outbound
-Only
CHAP-Only
CHAP-Only
CHAP-Login-
Only
CHAP-Framed
-Only
CHAP-Outbou
nd-Only
MS-CHAP-On
ly
MS-CHAP-On
ly
MS-CHAP-Lo
gin-Only
MS-CHAP-Fr
amed-Only
MS-CHAP-Ou
tbound-Only
210 Ascend-PPP-VJ-Slot-Comp ENUM: 1-1
VJ-Slot-Comp
-No
211 Ascend-PPP-VJ-1172 ENUM: 1-1
PPP-VJ-1172
212 Ascend-PPP-Async-Map UINT32 0-65535
213 Ascend-Third-Prompt String 1-253
214 Ascend-Send-Secret String 1-253
215 Ascend-Receive-Secret String 1-253
Min-Max
SubAttr VSA Name Type Value
216 Ascend-IPX-Peer-Mode ENUM: 1-1
IPX-Peer-Rout
er,
IPX-Peer-Dial
in
217 Ascend-IP-Pool-Definition String 1-253
218 Ascend-Assign-IP-Pool UINT32 0-65535
219 Ascend-FR-Direct ENUM: 1-1
FR-Direct-No,
FR-Direct-Yes
220 Ascend-FR-Direct-Profile String 1-253
221 Ascend-FR-Direct-DLCI UINT32 0-65535
222 Ascend-Handle-IPX ENUM: 0-2
Handle-IPX-N
one,
Handle-IPX-C
lient,
Handle-IPX-S
erver
212 Ascend-Netware-timeout UINT32 0-65535
224 Ascend-IPX-Alias UINT32 0-65535
225 Ascend-Metric UINT32 0-65535
226 Ascend-PRI-Number-Type ENUM: 0-5
Unknown-Nu
mber,
Intl-Number,
National-Num
ber,
Local-Number
Abbrev-Numb
er
227 Ascend-Dial-Number String 1-253
228 Ascend-Route-IP ENUM: 0-5
Unknown-Nu
mber,
Intl-Number,
National-Num
ber,
Local-Number
,
Abbrev-Numb
er
Min-Max
SubAttr VSA Name Type Value
229 Ascend-Route-IPX ENUM: 0-1
Route-IPX-No
Route-IPX-Ye
s
120 Ascend-Bridge ENUM: 0-1
Bridge-No,
Bridge-Yes
121 Ascend-Send-Auth ENUM: 0-2
Send-Auth-No
ne,
end-Auth-PAP,
Send-Auth-CH
AP
122 Ascend-Send-Passwd String 1-253
123 Ascend-Link-Compression ENUM: 0-3
Link-Comp-N
one,
Link-Comp-St
ac,
Link-Comp-St
ac-Draft-9,
Link-Comp-M
S-Stac
124 Ascend-Target-Util UINT32 0-65535
125 Ascend-Maximum-Channels UINT32 0-65535
126 Ascend-Inc-Channel-Count UINT32 0-65535
127 Ascend-Dec-Channel-Count UINT32 0-65535
128 Ascend-Seconds-Of-History UINT32 0-65535
129 Ascend-History-Weigh-Type ENUM: 0-2
History-Const
ant,
History-Linear
,
History-Quadr
atic
240 Ascend-Add-Seconds UINT32 0-65535
241 Ascend-Remove-Seconds UINT32 0-65535
242 Ascend-Data-Filter String 1-253
243 Ascend-Call-Filter String 1-253
244 Ascend-Idle-Limit UINT32 0-65535
245 Ascend-Idle-Limit UINT32 0-65535
Min-Max
SubAttr VSA Name Type Value
246 Ascend-Callback ENUM: 0-1
Callback-No,
Callback-Yes
Min-Max
SubAttr VSA Name Type Value
247 Ascend-Data-Svc ENUM: 0-43
Switched-Voic
e-Bearer,
Switched-56K
R,
Switched-192
K,
Switched-256
K,
Switched-320
K,
Switched-384
K-MR,
Switched-448
K,
Switched-512
K,
Switched-566
K,
Switched-640
K,
Switched-704
K,
Switched-768
K,
Switched-64K,
Switched-832
K,
Switched-896
K,
Switched-960
K,
Switched-102
4K,
Switched-108
8K,
Switched-115
2K,
Switched-121
6K,.
Switched-128
0K,
Switched-134
4K,
Switched-140
8K,
Switched-64K
R,
Switched-147
2K,
Switched-160
Cisco Prime Access Registrar 9.1 Reference Guide 0K,
C-44 Switched-166
4K,
Switched-172
Appendix C RADIUS Attributes
Vendor-Specific Attributes
Min-Max
SubAttr VSA Name Type Value
248 Ascend-Force-56 ENUM: 0-1
Force-56-No,
Force-56-Yes
249 Ascend-Billing-Number String 1-253
250 Ascend-Call-By-Call UINT32 0-65535
251 Ascend-Transit-Number String 1-253
252 Ascend-Host-Info String 1-253
253 Ascend-PPP-Address IP Address 0-0
254 Ascend-MPP-Idle-Percent UINT32 0-65535
Min-Max
SubAttr VSA Name Type Value
28 Annex-Filter String 1-253
29 Annex-CLI-Command String 1-253
30 Annex-CLI-Filter String 1-253
31 Annex-Host-Restrict String 1-253
32 Annex-Host-Allow String 1-253
33 Annex-Product-Name String 1-253
34 Annex-SW-Version String 1-253
35 Annex-Local-IP-Address IPADDR 1-253
36 Annex-Callback-Portlist UINT32 0-0
44 Annex-System-Disc-Reason UINT32 0-0
45 Annex-Modem-Disc-Reason UINT32 0-0
46 Annex-Disconnect-Reason UINT32 0-0
50 Annex-Transmit-Speed UINT32 0-0
51 Annex-Receive-Speed UINT32 0-0
Cabletron VSAs
Table C-10 lists the Cabletron VSAs. The vendor ID for Cabletron VSAs is 52.
Min-Max
SubAttr VSA Name Type Value
192 Cabletron-Framed-Data-Rate ENUM: 0-4
Rate-56KB
Rate-64KB
Rate-112KB
Rate-128KB
193 Cabletron-Phone-Number String 0-253
194 Cabletron-Caller-Id String 0-253
196 Cabletron-Connection-Reference UINT32 0-253
198 Cabletron-Initial-Rate UINT32 0-253
199 Cabletron-Maximum-Rate UINT32 0-253
192 Cabletron-Framed-Data-Rate Enum: 192
Rate-56KB
Rate-64KB
Rate-112KB
Rate-128KB
Min-M
ax
SubAttr VSA Name Type Value
1 Realm String 1-253
2 Incoming-Translation-Groups String 1-253
3 Client-IP-Address IP Address 1-253
4 Subnet-Mask IP Address 1-253
5 Outgoing-Translation-Groups String 1-253
6 Authentication-Service String 1-253
7 Authorization-Service String 1-253
8 DNIS String 1-253
9 CLID String 1-253
10 UserFilterMask String 1-253
Min-M
ax
SubAttr VSA Name Type Value
11 Session-Manager String 1-253
12 Accounting-Service String 1-253
13 TimeRange String 1-253
14 AcceptedProfiles String 1-253
15 Policy String 1-253
16 Prefix String 1-253
17 Delimiters String 1-253
18 StripPrefix String 1-253
19 ODBC-Reply-Attribs String 1-253
20 ODBC-Check-Attribs String 1-253
21 Session-Service String 1-253
22 Prepaid ENUM: 0-1
0 = False
1 = True
12 Suffix String 0-253
12 Implicit-Auth-Enabled ENUM: 0-1
0 = False
1 = True
24 StripSuffix ENUM: 0-1
0 = False
1 = True
24 Query-Service String 0-253
92 RepSourceIP String 1-253
93 RepTargetIP String 1-253
94 RepTxnNum String 1-253
95 RepTxnCRC String 1-253
96 RepTxnElementCount String 1-253
97 RepNeedsFullSync UINT32 0-253
98 RepNeedsReSync UINT32 0-253
99 RepLastRxTxnNum UINT32 0-253
100 RepLastRxTxnCRC UINT32 0-253
101 RepNeedsMember UINT32 0-253
102 RepMemberName String 1-253
103 RepMemberIP IP Address 0-253
104 RepMemberPort UINT32 0-253
105 RepMemberOrdinal UINT32 0-253
Min-M
ax
SubAttr VSA Name Type Value
106 RepWorkLoad UINT32 0-253
107 RepTxTime UINT32 0-253
108 RepElementPath String 1-253
109 RepElementValue String 1-253
110 RepElementOrdinal UINT32 0-253
111 RepElementCRC UINT32 0-253
112 RepElementType UINT32 0-253
113 RepElementMode UINT32 0-253
114 RepPartialElement Undefined 0-253
Cisco VSAs
Table C-12 lists the Cisco VSAs. The vendor ID for Cisco VSAs is 9.
Min-Max
SubAttr VSA Name Type Value
1 Cisco-AVPair String 0-253
2 Cisco-NAS-Port String 0-253
3 Cisco-Fax-Account-ID-Origin String 0-253
4 Cisco-Fax-Message-ID String 0-253
5 Cisco-Fax-Pages String 0-253
6 Cisco-FAX Cover Page Flag String 0-253
7 Cisco-Fax-Modem-Time String 0-253
8 Cisco-Fax-Connect-Speed String 0-253
9 Cisco-Fax-Recipient-Count String 0-253
10 Cisco-Fax-Process-Abort-Fla String 0-253
g
11 Cisco-Fax-DSN-Address String 0-253
12 Cisco-Fax-DSN-Flag String 0-253
13 Cisco-Fax-MDN-Address String 0-253
14 Cisco-Fax-MDN-Flag String 0-253
15 Cisco-Fax-Auth-Status String 0-253
16 Cisco-Email-Server-Address IP
Addres
s
Min-Max
SubAttr VSA Name Type Value
17 Cisco-Email-Server-ACK String 0-253
Flag
18 Cisco-Gateway-ID String 0-253
19 Cisco-Call-Type String 0-253
20 Cisco-Port-Used String 0-253
21 Cisco-Abort-Cause String 0-253
22 Cisco-CRS-Info String 0-253
12 Cisco-h312-Remote-Address String 0-253
24 Cisco-h312-Conf-ID String 0-253
25 Cisco-h312-Setup-Time String 0-253
26 Cisco-h312-Call-Origin String 0-253
27 Cisco-h312-Call-Type String 0-253
28 Cisco-h312-Connect-Time String 0-253
29 Cisco-h312-Disconnect-Time String 0-253
30 Cisco-h312-Disconnect-Cause String 0-253
31 Cisco-h312-Voice-Quality String 0-253
32 Cisco-h312-Generic-IVR-Out String 0-253
33 Cisco-h312-Gateway-ID String 0-253
34 Cisco-3GPP2-AVPair String 0-253
35 Cisco Connection String 0-253
ID-h312-incoming-connection
-ID
100 Cisco-h312-Generic-IVR-In String 0-253
101 Cisco-h312-Amount-Balance
102 Cisco-h312-Time-Balance String 0-253
103 Cisco-h312-Return-Code String 0-253
104 Cisco-h312-Prompt-ID String 0-253
105 Cisco-h312-Time-of-Day String 0-253
106 Cisco-h312-Redirect-Number String 0-253
107 Cisco-h312-Preferred-Langua String 0-253
ge
108 Cisco-h312-Redirect-IP-Addr String 0-253
ess
109 Cisco-h312-Billing-Model ENUM: 0-1
postpai
d
prepaid
110 Cisco-h312-Currency String 0-253
Min-Max
SubAttr VSA Name Type Value
128 Cisco-UCP-IP-Pool-ID String 0-253
129 Cisco-UCP-User-Max-Sessio String 0-253
ns
130 Cisco-UCP-User-Session-Cou String 0-253
nt
131 Cisco-UCP-Next-Session-ID String 0-253
132 Cisco-UCP-VPDN-Max-Sessi String 0-253
ons
133 Cisco-UCP-VPDN-Session-C String 0-253
ount
134 Cisco-UCP-B-Channel-Max- String 0-253
Sessions
135 Cisco-UCP-B-Channel-Sessio String 0-253
n-Coun
136 Cisco-UCP-Status String 0-253
137 Cisco-UCP-BLOB-Attribute- String 0-253
Length
138 Cisco-UCP-Disable-Statu String 0-253
139 Cisco-UCP-Block-Access-Ra String 0-253
nge
140 Cisco-UCP-Home-POP-ID String 0-253
175 Cisco-UCP-IP-Addresses IP 0-253
Addres
s
176 Cisco-UCP-Session-Info String 0-253
211 Cisco-Ascend AV pairs String 0-253
250 Cisco-SSG-Account-Info String 0-253
251 Cisco-SSG-Service-Info String 0-253
252 Cisco-SSG-Command-Code String 0-253
253 Cisco-SSG-Control-Info String 0-253
Compatible VSAs
Table C-13 lists the Compatible VSAs. The vendor ID for Compatible VSAs is 255.
Min-Max
SubAttr VSA Name Type Value
0 Compatible-Tunnel-Delay UNIT32 0-253
1 Compatible-Tunnel-Throughput UNIT32 0-253
3 Compatible-Tunnel-Server-Endpoint IP Address 0-253
4 Compatible-Tunnel-Group-Info String 0-253
5 Compatible-Tunnel-Password String 0-253
6 Compatible-Echo UNIT32 0-253
7 Compatible-Tunnel-Client-IPX UNIT32 0-253
Microsoft VSAs
Table C-14 lists the Microsoft VSAs. The vendor ID for Microsoft VSAs is 311.
Min-Max
SubAttr VSA Name Type Value
1 MS-CHAP-Response String 50-50
2 MS-CHAP-Error String 0-253
3 MS-CHAP-CPW1 String 70-70
4 MS-CHAP-CPW2 String 84-84
5 MS-CHAP-LM-Enc-PW String 4-253
6 MS-CHAP-NT-Enc-PW String 4-253
7 MS-MPPE-Encryption- ENUM: 1-2
Policy Encryption-Allowed
Encryption-Required
8 MS-MPPE-Encryption- String 0-4
Types
9 MS-RAS-Vendor UINT32 0-253
10 MS-CHAP-Domain String 0-253
11 MS-CHAP-Challenge String 0-253
12 MS-CHAP-MPPE-Keys String 32-32
13 MS-BAP-Usage ENUM: 0-2
Not allowed
Allowed
Required
Min-Max
SubAttr VSA Name Type Value
14 MS-Link-Utilization-Th UINT32 0-253
reshold
15 MS-Link-Drop-Time-Li String 0-253
mit
16 MS-MPPE-Send-Key String 0-253
17 MS-MPPE-Recv-Key String 0-253
18 MS-RAS-Version String 0-253
19 MS-Old-ARAP-Passwor String 0-253
d
20 MS-New-ARAP-Passwo String 0-253
rd
21 MS-ARAP-Password-C ENUM: 1-4
hange-Reason Just-Change-Passwor
d
Expired-Password
Admin-Requires-Pas
sword-Chang
Password-Too-Short
22 MS-Filter String 0-253
12 MS-Acct-Auth-Type ENUM: 1-5
PAP
CHAP
MS-CHAP-1
MS-CHAP-2
EAP
26 MS-CHAP2-Success String 43-43
27 MS-CHAP2-CPW8 String 68-68
29 MS-Secondary-DNS-Se IP Address 68-68
rver
31 MS-Secondary-NBNS-S IP Address 70-70
erver
33 MS-ARAP-Challenge String 8-8
Nomadix VSAs
Table C-15 lists the Nomadix VSAs. The vendor ID for Nomadix VSAs is 3309.
RedBack VSAs
Table C-16 lists the RedBack VSAs. The vendor ID for RedBack VSAs is 1252.
Min-Max
SubAttr VSA Name Type Value
1 RedBack-Client-DNS-Pri String 0-253
2 RedBack-Client-DNS-Sec String 0-253
3 RedBack-DHCP-Max-Leases String 0-253
4 RedBack-Context-Name String 0-253
5 RedBack-Bridge-Group String 0-253
6 RedBack-BG-Aging-Time String 0-253
7 RedBack-BG-Path-Cost String 0-253
8 RedBack-BG-Span-Dis String 0-253
9 RedBack-BG-Trans-BPDU String 0-253
10 RedBack-Rate-Limit-Rate String 0-253
11 RedBack-Rate-Limit-Burst String 0-253
12 RedBack-Police-Rate String 0-253
13 RedBack-Police-Burst String 0-253
14 RedBack-Source-Validation String 0-253
15 RedBack-Tunnel-Domain String 0-253
16 RedBack-Tunnel-Local-Name String 0-253
17 RedBack-Tunnel-Remote-Name String 0-253
18 RedBack-Tunnel-Function String 0-253
21 RedBack-Tunnel-Max-Sessions String 0-253
22 RedBack-Tunnel-Max-Tunnels String 0-253
12 RedBack-Tunnel-Session-Auth String 0-253
24 RedBack-Tunnel-Window String 0-253
25 RedBack-Tunnel-Retransmit String 0-253
Min-Max
SubAttr VSA Name Type Value
26 RedBack-Tunnel-Cmd-Timeout String 0-253
27 RedBack-PPPOE-URL String 0-253
28 RedBack-PPPOE-MOTM String 0-253
29 RedBack-Tunnel-Group String 0-253
30 RedBack-Tunnel-Context String 0-253
31 RedBack-Tunnel-Algorithm String 0-253
32 RedBack-Tunnel-Deadtime String 0-253
33 RedBack-Mcast-Send String 0-253
34 RedBack-Mcast-Receive String 0-253
35 RedBack-Mcast-MaxGroups String 0-253
36 RedBack-Ip-Address-Pool-Name String 0-253
37 RedBack-Tunnel-DNIS String 0-253
38 RedBack-Medium-Type String 0-253
39 RedBack-PVC-Encapsulation-Ty String 0-253
pe
40 RedBack-PVC-Profile-Name String 0-253
41 RedBack-PVC-Circuit-Padding String 0-253
42 RedBack-Bind-Type String 0-253
43 RedBack-Bind-Auth-Protocol String 0-253
44 RedBack-Bind-Auth-Max-Sessio String 0-253
ns
45 RedBack-Bind-Bypass-Bypass String 0-253
46 RedBack-Bind-Auth-Context String 0-253
47 RedBack-Bind-Auth-Service-Grp String 0-253
48 RedBack-Bind-Bypass-Context String 0-253
49 RedBack-Bind-Int-Context String 0-253
50 RedBack-Bind-Tun-Context String 0-253
51 RedBack-Bind-Ses-Context String 0-253
52 RedBack-Bind-Dot1q-Slot String 0-253
53 RedBack-Bind-Dot1q-Port String 0-253
54 RedBack-Bind-Dot1q-Vlan-Tag-I String 0-253
d
55 RedBack-Bind-Int-Interface-Nam String 0-253
e
56 RedBack-Bind-L2TP-Tunnel-Na String 0-253
me
Min-Max
SubAttr VSA Name Type Value
57 RedBack-Bind-L2TP-Flow-Contr String 0-253
ol
58 RedBack-Bind-Sub-User-At-Con String 0-253
text
59 RedBack-Bind-Sub-Password String 0-253
60 RedBack-Ip-Host-Addr String 0-253
61 RedBack-IP-TOS-Field String 0-253
62 RedBack-NAS-Real-Port String 0-253
63 RedBack-Tunnel-Session-Auth-C String 0-253
tx
64 RedBack-Tunnel-Session-Auth-S String 0-253
ervice-Grp
65 RedBack-Tunnel-Rate-Limit-Rat String 0-253
e
66 RedBack-Tunnel-Rate-Limit-Bur String 0-253
st
67 RedBack-Tunnel-Police-Rate String 0-253
68 RedBack-Tunnel-Police-Burst String 0-253
69 RedBack-Tunnel-L2F-Second-Pa String 0-253
ssword
128 RedBack-Acct-Input-Octets-64 String 0-253
129 RedBack-Acct-Output-Octets-64 String 0-253
130 RedBack-Acct-Input-Packets-64 String 0-253
131 RedBack-Acct-Output-Packets-6 String 0-253
4
132 RedBack-Assigned-IP-Address String 0-253
133 RedBack-Acct-Mcast-In-Octets String 0-253
134 RedBack-Acct-Mcast-Out-Octets String 0-253
135 RedBack-Acct-Mcast-In-Packets String 0-253
136 RedBack-Acct-Mcast-Out-Packet String 0-253
s
137 RedBack-LAC-Port String 0-253
138 RedBack-LAC-Real-Port String 0-253
139 RedBack-LAC-Port-Type String 0-253
140 RedBack-LAC-Real-Port-Type String 0-253
RedCreek VSAs
Table C-17 lists the RedCreek VSAs. The vendor ID for RedCreek VSAs is 1958.
Min-Max
SubAttr VSA Name Type Value
6 RedCreek-Tunneled-IP-Netmask IP Address 0-253
7 RedCreek-Tunneled-Gateway IP Address 0-253
9 RedCreek-Tunneled-WINS-Server1 String 0-253
10 RedCreek-Tunneled-WINS-Server2 String 0-253
11 RedCreek-Tunneled-HostName String 0-253
12 RedCreek-Tunneled-DomainName String 0-253
13 RedCreek-Tunneled-Search-List String 0-253
TACACS+ VSAs
Table C-18 lists the TACACS+ VSAs. The vendor ID for TACACS+ VSAs is 268435456.
Min-Max
SubAttr VSA Name Type Value
1 Tacacs-Version ENUM: 0-255
192 = 12.0
193 = 12.1
2 Tacacs-Type ENUM: 1-3
1 = Authentication
2 = Authorization
3 = Accounting
3 Tacacs-Sequence-Number UINT32 0-1
4 Tacacs-Session-Id UINT32 0-2147483
647
5 Tacacs-Action ENUM: 0-253
1 = Login
2 = ChPass
3 = SendPass
4 = SendAuth
6 Tacacs-Privilege-Level UINT32 0-15
7 Tacacs-Authentication-Type ENUM: 1-5
1 = ASCII
2 = PAP
3 = CHAP
4 = ARAP
5 = MSCHAP
Min-Max
SubAttr VSA Name Type Value
8 Tacacs-Service ENUM: 1-9
1 = Login
2 = Enable
3 = PPP
4 = ARAP
5 = PT
6 = RCMD
7 = X25
8 = NASI
9 = FWPROXY
9 Tacacs-User-Name String 0-253
10 Tacacs-Port String 0-253
11 Tacacs-Remote-Address String 0-253
12 Tacacs-Data String 0-253
13 Tacacs-User-Message String 0-253
14 Tacacs-User-Data String 0-253
15 Tacacs-Authentication-Conti ENUM: 0-1
nue-Flag 0 = Continue
1 = Abort
16 Tacacs-Authentication-Repl ENUM: 0-1
y-Flag‘ 0 = Echo
1 = NoEcho
17 Tacacs-Authentication-Repl ENUM: 0-33
y-Status 1 = Pass
2= Fail
3 = GetData
4 = GetUser
5 = GetPass
6 = Restart
7 = Error
33 = Follow
18 Tacacs-Authorization-Reply ENUM: 0-33
-Status 1 = PassAdd
2 = PassRepl
16 = Fail
17 = Error
33 = Follow
19 Tacacs-Server-Message String 0-253
Min-Max
SubAttr VSA Name Type Value
20 Tacacs-Authentication-Meth ENUM: 0-32
od 0 = NotSet
1 = None
2 = KRB5
3 = Line
4 = Enable
5 = Local
6 = TacacsPlus
7 = Guest
16 = Radius
17 = KRB4
32 = RCMD
21 Tacacs-AVPair String 0-253
22 Tacacs-Accounting-Reply-St ENUM: 0-33
atus 1 = Success
2 = Fail
33 = Follow
12 Tacacs-Header-Flag ENUM: 0-5
0 = Encrypted
1 = Unencrypted
4 = Encrypted +
ReuseConnection
5 = Unencrypted +
ReuseConnection
24 Tacacs-User-Password String 0-253
25 Tacacs-Accounting-Request- ENUM: 0-33
Flag 1 = More
2 = Start
3 = Start
4 = Stop
5 = Stop
6 = Start
7 = Start
8 = Update
9 = More
10 = Start
11 = Start
12 = Stop
13 = Stop
14 = Start
15 = Start
26 Tacacs-CHAP-Password CHAP_PASSWOR 17-17
D
27 Tacacs-CHAP-Challenge String 0-253
Min-Max
SubAttr VSA Name Type Value
28 Tacacs-MSCHAP-Response String 50-50
29 Tacacs-MSCHAP-Challenge String 0-253
Telebit VSAs
Table C-19 lists the Telebit VSAs. The vendor ID for Telebit VSAs is 117.
Min-Max
SubAttr VSA Name Type Value
1 Telebit-Login-Command String 0-253
2 Telebit-Port-Name String 0-253
3 Telebit-Activate-Comma String 0-253
nd
4 Telebit-Accounting-Info String 0-253
5 Telebit-Login-Option String 0-253
Unisphere VSAs
Table C-20 lists the Unisphere VSAs. The vendor ID for RedBack VSAs is 4874.
Min-Max
SubAttr VSA Name Type Value
1 Unisphere-Virtual-Router String 0-253
2 Unisphere-Local-Address-Pool String 0-253
3 Unisphere-Local-Interface String 0-253
4 Unisphere-Primary-DNS String 0-253
5 Unisphere-Secondary-DNS String 0-253
6 Unisphere-Primary-WINS String 0-253
7 Unisphere-Secondary-WINS String 0-253
8 Unisphere-Tunnel-Virtual-Rout String 0-253
er
9 Unisphere-Tunnel-Password String 0-253
10 Unisphere-Ingress-Policy-Nam String 0-253
e
11 Unisphere-Egress-Policy-Name String 0-253
Min-Max
SubAttr VSA Name Type Value
12 Unisphere-Ingress-Statistics String 0-253
13 Unisphere-Egress-Statistics String 0-253
14 Unisphere-Service-Category String 0-253
15 Unisphere-PCR String 0-253
16 Unisphere-SCR String 0-253
17 Unisphere-MBS String 0-253
18 Unisphere-Init-CLI-Access-Le String 0-253
vel
19 Unisphere-Allow-All-VR-Acce String 0-253
ss
20 Unisphere-Alt-CLI-Access-Lev String 0-253
el
21 Unisphere-Alt-CLI-VRouter-N String 0-253
ame
22 Unisphere-SA-Validate String 0-253
12 Unisphere-IGMP-enable String 0-253
24 Unisphere-PPPoE-Description String 0-253
25 Unisphere-Redirect-VRouter-N String 0-253
ame
USR VSAs
Table C-21 lists the USR VSAs. The vendor ID for USR VSAs is 429.
Min-Max
SubAttr VSA Name Type Value
1 USR-DTE-Data-Idle-Timeout UINT32 0-0
2 USR-Default-DTE-Data-Rate ENUM: 1-54
110_BPS
300_BPS
600_BPS
1200_BPS
2400_BPS
4800_BPS
7200_BPS
9600_BPS
12K_BPS
14.4K_BPS
16.8_BPS
19.2K_BPS
38.4K_BPS
75_BPS
450_BPS
UNKNOWN_BPS
57.6K_BPS
21.6K_BPS
24K_BPS
26K_BPS
28K_BPS
115K_BPS
31K_BPS
33K_BPS
25333_BPS
110_BPS
300_BPS
600_BPS
1200_BPS
2400_BPS
26666_BPS
28000_BPS
29333_BPS
30666_BPS
32000_BPS
Min-Max
SubAttr VSA Name Type Value
2 USR-Default-DTE-Data-Rate 33333_BPS
34666_BPS
36000_BPS
37333_BPS
38666_BPS
40000_BPS
41333_BPS
42666_BPS
44000_BPS
45333_BPS
46666_BPS
48000_BPS
49333_BPS
50666_BPS
52000_BPS
53333_BPS
54666_BPS
56000_BPS
57333_BPS
58666_BPS
60000_BPS
61333_BPS
62666_BPS
64000_BPS
3 USR-Last-Number-Dialed-Out String 1-253
4 USR-Sync-Async-Mode ENUM: 1-2
Asynchronous
Synchronous
5 USR-Originate-Answer-Mode ENUM: 1-4
Originate_in_Originate_Mode
Originate_in_Answer_Mode
Answer_in_Originate_Mode
Answer_in_Answer_Mode
6 USR-Failure-to-Connect-Reaso ENUM: 1-67
n
Min-Max
SubAttr VSA Name Type Value
7 USR-Initial-Tx-Link-Data-Rat ENUM: 1-54
e 110_BPS
14.4K_BPS
16.8_BPS
19.2K_BPS
38.4K_BPS
75_BPS
450_BPS
UNKNOWN_BPS
57.6K_BPS
21.6K_BPS
24K_BPS
300_BPS
26K_BPS
28K_BPS
115K_BPS
31K_BPS
33K_BPS
25333_BPS
26666_BPS
28000_BPS
29333_BPS
30666_BPS
600_BPS
32000_BPS
33333_BPS
34666_BPS
36000_BPS
37333_BPS
38666_BPS
40000_BPS
41333_BPS
42666_BPS
44000_BPS
1200_BPS
45333_BPS
46666_BPS
48000_BPS
49333_BPS
50666_BPS
52000_BPS
53333_BPS
54666_BPS
56000_BPS
57333_BPS
2400_BPS
58666_BPS
60000_BPS
Min-Max
SubAttr VSA Name Type Value
7 USR-Initial-Tx-Link-Data-Rat 61333_BPS
e (continued) 62666_BPS
64000_BPS
4800_BPS
7200_BPS
9600_BPS
12K_BPS
8 USR-Final-Tx-Link-Data-Rate ENUM: 1-54
110_BPS
14.4K_BPS
16.8_BPS
19.2K_BPS
38.4K_BPS
75_BPS
450_BPS
UNKNOWN_BPS
57.6K_BPS
21.6K_BPS
24K_BPS
300_BPS
26K_BPS
28K_BPS
115K_BPS
31K_BPS
33K_BPS
25333_BPS
26666_BPS
28000_BPS
29333_BPS
30666_BPS
600_BPS
Min-Max
SubAttr VSA Name Type Value
8 USR-Final-Tx-Link-Data-Rate 32000_BPS 1-54
33333_BPS
34666_BPS
36000_BPS
37333_BPS
38666_BPS
40000_BPS
41333_BPS
42666_BPS
44000_BPS
1200_BPS
45333_BPS
46666_BPS
48000_BPS
49333_BPS
50666_BPS
52000_BPS
53333_BPS
8 USR-Final-Tx-Link-Data-Rate 54666_BPS
56000_BPS
57333_BPS
2400_BPS
58666_BPS
60000_BPS
61333_BPS
62666_BPS
64000_BPS
4800_BPS
7200_BPS
9600_BPS
Min-Max
SubAttr VSA Name Type Value
9 USR-Modulation-Type ENUM: 1-28
usRoboticsHST
bell208b
v21FaxClass1
v27FaxClass1
v29FaxClass1
v17FaxClass1
v21FaxClass2
v27FaxClass2
v29FaxClass2
v17FaxClass2
v32Terbo
ccittV32
v34
vFC
v34plus
x2
v110
v120
x75
ayncSyncPPP
clearChannel
ccittV22bis
bell103
ccittV21
bell212
ccittV32bis
ccittV12
negotiationFailed
9 USR-Modulation-Type ENUM:
Min-Max
SubAttr VSA Name Type Value
21 USR-Back-Channel-Data-Rate ENUM : 1-3
450BPS
300BPS
None
22 USR-Number-of-Blers UINT32 0-0
12 USR-Number-of-Link-Timeout UINT32 0-0
s
24 USR-Number-of-Fallbacks UINT32 0-0
25 USR-Number-of-Upshifts UINT32 0-0
26 USR-Number-of-Link-NAKs UINT32 0-0
27 USR-Simplified-MNP-Levels ENUM: 0-16
Unknown
NON_ARQ
MNP10ec
LAPMAC
V42ETC2
V42SREJ
PIAFS
V120
X75
MNP3
MNP4
V42
HST
synchronous
MNP2
MNP10(Cellular)
V42ETC
Min-Max
SubAttr VSA Name Type Value
28 USR-Connect-Term-Reason ENUM: 1-67
dtrDrop
retransmitLimit
linkDisconnectMsgReceived
noLoopCurrent
invalidSpeed
unableToRetrain
managementCommand
noDialTone
keyAbort
lineBusy
noAnswer
escapeSequence
voice
noAnswerTone
noCarrier
undetermined
v42SabmeTimeout
v42BreakTimeout
v42DisconnectCmd
v42IdExchangeFail
v42BadSetup
v42InvalidCodeWord
athCommand
v42StringToLong
v42InvalidCommand
none
v32Cleardown
dialSecurity
Min-Max
SubAttr VSA Name Type Value
28 USR-Connect-Term-Reason remoteAccessDenied
loopLoss
ds0Teardown
promptNotEnabled
noPromptingInSync
carrierLoss
nonArqMode
modeIncompatible
noPromptInNonARQ
dialBackLink
linkAbort
autopassFailed
pbGenericError
pbLinkErrTxPreAck
pbLinkErrTxTardyACK
pbTransmitBusTimeout
inactivityTimout
pbReceiveBusTimeout
pbLinkErrTxTAL
pbLinkErrRxTAL
pbTransmitMasterTimeout
pbClockMissing
pbReceivedLsWhileLinkUp
pbOutOfSequenceFrame
pbBadFrame
pbAckWaitTimeout
pbReceivedAckSeqErr
mnpIncompatible
pbReceiveOvrflwRNRFail
pbReceiveMsgBufOvrflw
rcvdGatewayDiscCmd
tokenPassingTimeout
dspInterruptTimeout
mnpProtocolViolation
28 USR-Connect-Term-Reason class2FaxHangupCmd
hstSpeedSwitchTimeout
undefined
remotePassword
linkPassword
29 USR-DTR-False-Timeout UINT32 0-0
30 USR-Fallback-Limit UINT32 0-0
31 USR-Block-Error-Count-Limit UINT32 0-0
32 USR-Simplified-V42bis-Usage ENUM: 1-3
None
ccittV42bis
mnpLevel5
Min-Max
SubAttr VSA Name Type Value
33 USR-DTR-True-Timeou UINT32 0-0
34 USR-Last-Number-Dialed-In- String 1-253
DNIS
35 USR-Last-Callers-Number-AN String 1-253
I
36 USR-Mbi-Ct-PRI-Card-Slot UINT32 0-0
37 USR-Mbi-Ct-TDM-Time-Slot UINT32 0-0
38 USR-Mbi-Ct-PRI-Card-Span-L UINT32 0-0
ine
39 USR-Mbi-Ct-BChannel-Used UINT32 0-0
40 USR-IP-Input-Filter String 1-253
41 USR-IPX-Input-Filter String 1-253
42 USR-IP-Output-Filter String 1-253
43 USR-IPX-Output-Filter String 1-253
44 USR-SAP-Output-Filter String 1-253
45 USR-VPN-ID UINT32 0-0
46 USR-VPN-Name String 1-253
47 USR-VPN-Neighbor String 1-253
48 USR-Framed-Routing-V2 ENUM: 1-2
RIP-V2-Off
RIP-V2-On
49 USR-VPN-Gateway String 1-253
50 USR-Tunnel-Authenticato String 1-253
51 USR-Packet-Index String 1-253
52 USR-Cutoff String 1-253
53 USR-Access-Accept-Packet String 1-253
54 USR-Primary-DNS-Server String 1-253
55 USR-Secondary-DNS-Server String 1-253
56 USR-Primary-NBNS-Server String 1-253
57 USR-Secondary-NBNS-Server String 1-253
58 USR-Syslog-Tap UINT32 0-0
59 USR-Chassis-Call-Slot UINT32 0-0
60 USR-Chassis-Call-Span UINT32 0-0
61 -Chassis-Call-Channel UINT32 0-0
62 USR-Keypress-Timeout UINT32 0-0
63 USR-Unauthenticated-Time UINT32 0-0
64 USR-Bearer-Capabilities UINT32 0-0
Min-Max
SubAttr VSA Name Type Value
65 USR-Speed-Of-Connection UINT32 0-0
66 USR-Max-Channels UINT32 0-0
67 USR-Channel-Expansion UINT32 0-0
68 USR-Channel-Decrement UINT32 0-0
69 USR-Expansion-Algorithm UINT32 0-0
70 USR-Compression-Algorithm UINT32 0-0
71 USR-Receive-Acc-Map UINT32 0-0
72 USR-Transmit-Acc-Map UINT32 0-0
73 USR-Compression-Reset-Mod UINT32 0-0
e
74 USR-Min-Compression-Size UINT32 0-0
75 USR-IP UINT32 0-0
76 USR-IPX UINT32 0-0
77 USR-Filter-Zones UINT32 0-0
78 USR-Appletalk UINT32 0-0
79 USR-Bridging UINT32 0-0
80 USR-Spoofing UINT32 0-0
81 USR-Host-Type String 1-253
82 USR-Send-Name UINT32 0-0
83 USR-Send-Password String 1-253
84 USR-Start-Time UINT32 0-0
85 USR-End-Time UINT32 0-0
86 USR-Send-Script1 String 1-253
87 USR-Reply-Script1 String 1-253
88 USR-Send-Script2 String 1-253
89 USR-Reply-Script2 String 1-253
90 USR-Send-Script3 String 1-253
91 USR-Send-Script3 String 1-253
USR-Reply-Script3
92 USR-Send-Script4 String 1-253
93 USR-Reply-Script4 String 1-253
94 USR-Send-Script5 String 1-253
95 USR-Reply-Script5 String 1-253
96 USR-Send-Script6 String 1-253
97 USR-Reply-Script6 String 1-253
98 USR-Terminal-Type String 1-253
Min-Max
SubAttr VSA Name Type Value
99 USR-Appletalk-Network-Rang UINT32 0-0
e
100 USR-Local-IP-Address String 1-253
101 USR-Routing-Protocol UINT32 0-0
102 USR-Modem-Group UINT32 0-0
103 USR-IPX-Routing UINT32 0-0
104 USR-IPX-Wan UINT32 0-0
105 USR-IP-RIP-Policies UINT32 0-0
106 USR-IP-RIP-Simple-Auth-Pass String 0-253
word
107 USR-IDS0-Call-Type UINT32 0-0
108 USR-Call-Terminate-in-GMT UINT32 0-0
109 USR-Call-Connect-in-GMT UINT32 0-0
110 USR-Call-Arrival-in-GMT UINT32 0-0
111 USR-Channel-Connected-To UINT32 0-0
112 USR-Slot-Connected-To UINT32 0-0
113 USR-Device-Connected-To ENUM: 1-3
None
isdnGateway
quadModem
114 USR-NFAS-ID UINT32 0-0
115 USR-Q931-Call-Reference-Val UINT32 0-0
ue
Min-Max
SubAttr VSA Name Type Value
116 USR-Call-Event-Code ENUM: 1-28
notSupported
noFreeIGW
igwRejectCall
igwSetupTimeout
noFreeTdmts
bcReject
ieReject
chidReject
progReject
callingPartyReject
calledPartyReject
setup
blocked
analogBlocked
digitalBlocked
outOfService
busy
congestion
protocolError
noFreeBchannel
inOutCallCollision
usrSetup
telcoDisconnect
usrDisconnect
noFreeModem
modemsNotAllowed
modemsRejectCall
modemSetupTimeout
117 USR-DS0 UINT32 0-0
118 USR-DS0s String 1-253
119 USR-Gateway-IP-Address IP Address 0-0
120 USR-Physical-State UINT32 0-0
121 USR-Chassis-Temp-Threshold UINT32 0-0
Min-Max
SubAttr VSA Name Type Value
122 USR-Card-Type ENUM:
SlotEmpty
QuadV32DigitalModemNAC
DualT1NIC
DualAlogMdmNIC
QuadDgtlMdmNIC
QuadAlogDgtlMdmNIC
TokenRingNIC
SingleT1NIC
EthernetNIC
ShortHaulDualT1NIC
DualAlogMgdIntlMdmNIC
X25NIC
122 USR-Card-Type (continued) ENUM:
QuadAlogNonMgdMdmNIC
QuadAlogMgdIntlMdmNIC
QuadAlogNonMgdIntlMdmNIC
QuadLsdLiMgdMdmNIC
QuadLsdLiNonMgdMdmNIC
QuadLsdLiMgdIntlMdmNIC
QuadLsdLiNonMgdIntlMdmNI
C
EthernetWithV35NIC
HSEthernetWithoutV35NIC
DualHighSpeedV35NIC
QuadV35RS122LowSpeedNIC
DualE1NIC
ShortHaulDualE1NIC
BellcoreLongHaulDualT1NIC
BellcoreShrtHaulDualT1NIC
SCSIEdgeServerNIC
QuadV32AnalogModemNAC
QuadV32DigAnlModemNAC
QuadV34DigModemNAC
QuadV34AnlModemNAC
QuadV34DigAnlModemNAC
SingleT1NAC
EthernetGatewayNAC
AccessServer
486TrGatewayNAC
SlotUnknown
Min-Max
SubAttr VSA Name Type Value
122 USR-Card-Type (continued) ENUM: 1-1027
486EthernetGatewayNAC
DualRS122NAC
486X25GatewayNAC
ApplicationServerNAC
ISDNGatewayNAC
ISDNpriT1NAC
ClkedNetMgtCard
ModemPoolManagementNAC
NetwMgtCard
ModemPoolNetserverNAC
(continued)
122 USR-Card-Type (continued) ModemPoolV34ModemNAC
ModemPoolISDNNAC
NTServerNAC
QuadV34DigitalG2NAC
QuadV34AnalogG2NAC
QuadV34DigAnlgG2NAC
NETServerFrameRelayNAC
NETServerTokenRingNAC
X2524ChannelNAC
DualT1NAC
WirelessGatewayNac
EnhancedAccessServer
EnhancedISDNGatewayNAC
DualModemNAC
QuadModemNAC
TrGatewayNAC
X25GatewayNAC
DualV34ModemNAC
112 USR-Security-Login-Limit UINT32 0-0
124 USR-Security-Resp-Limit UINT32 0-0
125 USR-Packet-Bus-Session UINT32 0-0
126 USR-DTE-Ring-No-Answer-Li UINT32 0-0
mit
Min-Max
SubAttr VSA Name Type Value
127 USR-Final-Rx-Link-Data-Rate ENUM: 1-54
110_BPS
14.4K_BPS
16.8_BPS
19.2K_BPS
38.4K_BPS
75_BPS
450_BPS
UNKNOWN_BPS
57.6K_BPS
21.6K_BPS
24K_BPS
300_BPS
6K_BPS
28K_BPS
115K_BPS
31K_BPS
33K_BPS
25333_BPS
26666_BPS
28000_BPS
62666_BPS
9333_BPS
30666_BPS
600_BPS
(continued)
Min-Max
SubAttr VSA Name Type Value
127 USR-Final-Rx-Link-Data-Rate 32000_BPS
(continued) 33333_BPS
34666_BPS
36000_BPS
37333_BPS
38666_BPS
40000_BPS
41333_BPS
42666_BPS
44000_BPS
1200_BPS
45333_BPS
46666_BPS
48000_BPS
49333_BPS
50666_BPS
52000_BPS
53333_BPS
54666_BPS
56000_BPS
57333_BPS
2400_BPS
58666_BPS
60000_BPS
61333_BPS
64000_BPS
800_BPS
7200_BPS
9600_BPS
12K_BPS
Min-Max
SubAttr VSA Name Type Value
128 USR-Initial-Rx-Link-Data-Rat ENUM: 1-54
e 110_BPS
14.4K_BPS
16.8_BPS
19.2K_BPS
38.4K_BPS
75_BPS
450_BPS
UNKNOWN_BPS
57.6K_BPS
21.6K_BPS
24K_BPS
300_BPS
26K_BPS
28K_BPS
115K_BPS
31K_BPS
33K_BPS
25333_BPS
26666_BPS
Min-Max
SubAttr VSA Name Type Value
128 USR-Initial-Rx-Link-Data-Rat 54666_BPS
e 56000_BPS
57333_BPS
2400_XBPS
58666_BPS
60000_BPS
61333_BPS
62666_BPS
64000_BPS
4800_BPS
7200_BPS
9600_BPS
12K_BPS
129 USR-Event-Date-Time UINT32 0-0
130 USR-Chassis-Temperature UINT32 0-0
131 USR-Actual-Voltage UINT32 0-0
132 USR-Expected-Voltage UINT32 0-0
133 USR-Power-Supply-Number UINT32 0-0
134 USR-Channel UINT32 0-0
135 USR-Chassis-Slot UINT32 0-0
Min-Max
SubAttr VSA Name Type Value
136 USR-Event-Id ENUM:
HUB_Temp_Out_of_Range
Fan_Failed
Watchdog_Timeout
Mgmt_Bus_Failure
In_Connection_Est
Out_Connection_Est
In_Connection_Term
Out_Connection_Term
Connection_Failed
Connection_Timeout
DTE_Transmit_Idle
DTR_True
DTR_False
Block_Error_at_Threshold
Fallbacks_at_Threshold
No_Dial_Tone_Detected
No_Loop_Current_Detected
Yellow_Alarm
Red_Alarm
Loss_Of_Signal
Rcv_Alrm_Ind_Signal
Timing_Source_Switch
Modem_Reset_by_DTE
Modem_Ring_No_Answer
DTE_Ring_No_Answer
Pkt_Bus_Session_Active
Pkt_Bus_Session_Congestion
Pkt_Bus_Session_Lost
Pkt_Bus_Session_Inactive
User_Interface_Reset
Gateway_Port_Out_of_Service
Gateway_Port_Link_Active
Dial_Out_Login_Failure
Dial_In_Login_Failure
Dial_Out_Restricted_Number
Dial_Back_Restricted_Number
User_Blacklisted
Attempted_Login_Blacklisted
Response_Attempt_Limit_Exce
ed
Login_Attempt_Limit_Exceede
d
Dial_Out_Call_Duration
Dial_In_Call_Duration
Pkt_Bus_Session_Err_Status
NMC_AutoRespnse_Trap
(Continued)
Min-Max
SubAttr VSA Name Type Value
136 USR-Event-Id (Continued) Acct_Server_Contact_Loss 6-84
Yellow_Alarm_Clear
Red_Alarm_Clear
Loss_Of_Signal_Clear
Rcv_Alrm_Ind_Signal_Clear
Incoming_Connection_Establis
h
Module_Inserted
Outgoing_Connection_Establish
Incoming_Connection_Terminat
e
Outgoing_Connection_Terminat
e
Connection_Attempt_Failure
Continuous_CRC_Alarm
Continuous_CRC_Alarm_Clear
Physical_State_Change
Module_Removed
Gateway_Network_Failed
Gateway_Network_Restored
Packet_Bus_Clock_Lost
Packet_Bus_Clock_Restored
D_Channel_In_Service
D_Channel_Out_of_Service
DS0s_In_Service
DS0s_Out_of_Service
T1/T1PRI/E1PRI_Call_Event
PSU_Voltage_Alarm
Psu_Incompatible
T1,T1-E1/PRI-Call-Arrive-Even
T1,T1-E1/PRI-Call-Connect-Ev
e
T1,T1-E1/PRI-Call-Termina-Ev
e
T1,T1-E1/PRI-Call-Failed-Even
137 USR-Number-of-Rings-Limit UINT32 0-0
138 USR-Connect-Time-Limit UINT32 0-0
139 USR-Call-End-Date-Time UINT32 0-0
140 USR-Call-Start-Date-Time UINT32 0-0
141 USR-Server-Time UINT32 0-0
Min-Max
SubAttr VSA Name Type Value
142 USR-Request-Type ENUM: 1-255
Access-Request
Access-Challenge
Status-Server
Status-Client
Access-Accept
Reserved
Access-Reject
Accounting-Request
Accounting-Response
Access-Password-Change
Access-Password-Ack
Access-Password-Reject
143 USR-Old-Password String 0-253
144 USR-Expiration UINT32 0-0
145 USR-Prompt UINT32 0-1
146 USR-Char-Noecho UINT32 0-0
147 USR-User-Group-Name String 0-253
148 148 UINT32 0-253
USR-Call-Reference-Number
149 USR-Dial-In-Sec-Mode UNIT32 0-0
150 USR-Req-Db-Mdm-Sel UINT32 0-0
151 USR-Req-Db-Login-Valid UINT32 0-0
152 USR-Dialback-Group-Names String 0-253
153 USR-Dial-In-Call-Rest String 0-253
154 USR-Dial-Out-Call-Rest String 0-253
155 USR-Logins-Before-Blacklist UINT32 0-0
156 USR-Failed-Logins UINT32 0-0
157 USR-Allowed-DB-Modems String 0-253
158 USR-VPN-Encrypter String 0-253
159 USR-Acct-VPN-Gateway String 0-253
160 USR-Re-CHAP-Timeout UINT32 0-0
161 USR-RMMIE-Manufacutere-I String 0-253
D
162 USR-RMMIE-Product-Code String 0-253
163 USR-RMMIE-Serial-Number String 0-253
164 USR-RMMIE-Firmware-Versi String 0-253
on
165 USR-RMMIE-Firmware-Build String 0-253
-Date
Min-Max
SubAttr VSA Name Type Value
166 USR-RMMIE-Status ENUM: 1-3
notEnabledInLocalModem
notDetectedInRemoteModem
ok
170 USR-RMMIE-Last-Update-Ti UINT32 0-253
me
171 USR-RMMIE-Last-Update-Ev ENUM: 1-5
ent None
initialConnection
retrain speedShift
plannedDisconnect
172 USR-RMMIE-Rcv-Tot-PwrLvl UNIT32 0-253
173 USR-RMMIE-Rcv-PwrLvl-33 UNIT32 0-253
00Hz
174 USR-RMMIE-Rcv-PwrLvl-37 UNIT32 0-253
50Hz
175 USR-RMMIE-PwrLvl-NearEc UNIT32 0-253
ho-Canc
176 USR-RMMIE-PwrLvl-FarEcho UNIT32 0-253
-Canc
177 USR-RMMIE-PwrLvl-Noise-L UNIT32 0-253
vl
178 USR-RMMIE-PwrLvl-Xmit-L UNIT32 0-253
vl
179 USR-IPX-SAP String 0-253
180 USR-MIC UNIT32 0-253
181 USR-Call-Tracking-ID UNIT32 0-253
182 USR-Log-Filter-Packet UNIT32 0-253
183 USR-CCP-Algorithm UNIT32 0-253
184 USR-ACCM-Type UNIT32 0-253
185 USR-Connect-Speed UNIT32 0-253
186 USR-Framed-IP-Address-Pool- UNIT32 0-253
Name
187 USR-MP-EDO String 0-253
188 USR-Local-Framed-IP-Addr UNIT32 0-253
189 USR-IP-RIP-Input-Filter String 0-253
190 USR-IP-Call-Input-Filter String 0-253
191 USR-IPX-Call-Input-Filter String 0-253
192 USR-AT-Input-Filter String 0-253
Min-Max
SubAttr VSA Name Type Value
193 USR-AT-RTMP-Input-Filter String 0-253
194 USR-AT-Zip-Input-Filter String 0-253
195 USR-AT-Call-Input-Filter String 0-253
196 USR-ET-Bridge-Input-Filter String 0-253
197 USR-IP-RIP-Output-Filter String 0-253
198 USR-IP-Call-Output-Filter String 0-253
199 USR-IPX-RIP-Output-Filter String 0-253
200 USR-IPX-Call-Output-Filter String 0-253
201 USR-AT-Output-Filter String 0-253
202 USR-ET-RTMP-Output-Filter String 0-253
203 USR-AT-Zip-Output-Filter String 0-253
204 USR-AT-Call-Output-Filter String 0-253
205 USR-ET-Bridge-Output-Filter String 0-253
206 USR-ET-Bridge-Call-Output-F String 0-253
ilter
207 USR-IP-Default-Route-Option UINT32 0-253
208 USR-MP-EDO-HIPER String 0-253
209 USR-MP-MRRU UINT32 0-253
WiMax
Table C-22 lists the WiMax VSAs. The vendor ID for WiMax VSAs is 24757.
Min-Max
SubAttr VSA Name Type Value
1 HA-IP-MIP4 IPAddress 0-253
2 HA-IP-MIP6 IPAddress 0-253
3 GMT-Time-Zone-Offet String 0-253
4 NAP-ID String 0-253
5 NSP-ID String 0-253
6 Hotline-Indicator String 0-253
7 BS-ID String 0-253
WISPr
Table C-23 lists the WISPr VSAs. The vendor ID for WISPr VSAs is 14122.
Min-Max
SubAttr VSA Name Type Value
1 WISPr-Location-ID String 0-65535
2 WISPr-Location-Name String 0-253
3 WISPr-Logoff-URL String 0-253
4 WISPr-Redirection-UR String 0-253
L
5 WISPr-Bandwidth-Min UINT32 0-65535
-Up
6 WISPr-Bandwidth-Min UINT32 0-65535
-Down
7 WISPr-Bandwidth-Ma UINT32 0-65535
x-Up
8 WISPr-Bandwidth-Ma UINT32 0-65535
x-Down
9 WISPr-Session-Termin UINT32 0-65535
ate-Time
10 WISPr-Session-Termin UINT32 0-65535
ate-End-Of-Day
11 WISPr-Billing-Class-O String 0-253
f-Service
XML
Table C-24 lists the XML VSAs, attributes for XML tags. The vendor ID for XML VSAs is 5842.
Min-Max
SubAttr VSA Name Type Value
1 XML-Address-format-IPv4 IPADDR 0-253
2 XML-Association String 0-253
3 XML-Request String 0-253
4 XML-Response String 0-253
5 XML-UserId-id_type-subscriber_id String 0-253
6 XML-UserIdRequest String 0-253
This appendix provides information about the REpresentational State Transfer (REST) APIs supported
in Cisco Prime Access Registrar. The purpose of this appendix is to provide a developer, system or
network administrator, or system integrator with basic guidelines for using the outlined REST APIs
within the Prime Access Registrar deployment.
This chapter contains the following sections:
• REST API Framework, page D-1
• CSRF Token Implementation using REST, page D-9
Table D-3 provides a list of other REST APIs used in Prime Access Registrar.
Operation URL
Tacacs Statistics http://<hostname>:8080/RESTAPI/service/Tacacsstatistics
Diameterstatistics http://<hostname>:8080/RESTAPI/service/Diameterstatistics
Statistics http://<hostname>:8080/RESTAPI/service/Statistics
RemoteServerStats http://<hostname>:8080/RESTAPI/service/RemoteServerStats
DiameterPeerStats http://<hostname>:8080/RESTAPI/service/DiameterPeerStats
DiaRemoteServerS http://<hostname>:8080/RESTAPI/service/DiaRemoteServerStats
tats
ClientStats http://<hostname>:8080/RESTAPI/service/ClientStats
Operation URL
Reload http://<hostname>:8080/RESTAPI/service/Reload
AddUser http://<hostname>:8080/RESTAPI/service/adduser?UserListName=<nameofUse
rnameList>
GetUser http://<hostname>:8080/RESTAPI/service/getuser?name=<nameof
user>&UserListName=<nameofuserlist>
EditUser http://<hostname>:8080/RESTAPI/service/edituser?name=< nameof user
>&UserListName=<nameofuserlist>
DeleteUser http://<hostname>:8080/RESTAPI/service/deleteuser?name=< nameof
user>&UserListName=<nameofuserlist>
Always the JSON input must start with name of the objects while editing sub objects. A sample is given
below:
curl -k -X PUT -H "Authorization: Basic YWRtaW46YWljdXNlcg==" -H "Content-Type:
application/json" 'https://<hostname>:8443/RESTAPI/service/editobject?typeid=18&name=key1'
–data
"{\"AllowedKeyIdentifiers\":\"hello\",\"keys\":[{\"Name\":\"key1\",\"identifier\":\"100\",
\"PrivateKey\":\"test456\"}]}"
Note REST interface can also be accessed using HTTPS through the 8443 port.
Examples
The following example shows a sample PoD API written using cURL client:
http://ar-lnx-vm054:8080/RESTAPI/service/PoD -H “Content-Type: application/json” -H
“username:admin -H “password:aicuser --data
"{"parameter":"S21","value":"","type":"with-id"}"
Prime Access Registrar supports basic authentication with Base64 encoding support for username and
password.
A sample header on encryption is provided in the example below:
-H "Authorization: Basic YWRtaW46YWljdXNlcg=="
Note REST interface can also be accessed using HTTPS through the 8443 port.
We can also send CoA using with-profile option along with the existing parameters using REST API.
The parameters supported for REST API for CoA with-profile option are: with-id, with-user, with-key,
with-nas, with-ip-address, with-ipx-network, with-age, with-usr-vpn, with-attribute,
with-Home-Agent, and with-IP-Subnet.
Example:
curl 'http://10.197.95.162:8080/RESTAPI/service/CoA' -H "Authorization: Basic
YWRtaW46YWljdXNlcg==" -H "Content-Type: application/json" --data
"{\"parameter\":\"bob1\",\"value\":\"bob1\",\"type\":\"with-user\",\"profileType\":\"with-
profile\",\"profileValue\":\"cap\"}"
Prime Access Registrar supports send-CoA using CLI interface as well. For configuring send-CoA
using CLI, see the “query-sessions” section in the “Setting the Cisco Prime Access Registrar
Configurable Option” chapter of the Cisco Prime Access Registrar 9.1 Administrator Guide.
[ restproxy ]
Name = restproxy
Description =
Type = rest
IncomingScript~ =
OutgoingScript~ =
OutagePolicy~ = RejectAll
OutageScript~ = myscript
MultipleServersPolicy = Failover
RemoteServers/
1. restRM
--> ls -R
[ //localhost/Radius/RemoteServers/rest ]
Name = rest
Description =
Protocol = rest
ReactivateTimerInterval = 300000
Timeout = 5000
MaxTimeOuts = 3
RESTSourceConnections = 16
RequestURL = http://10.81.78.143:8080/eapauth/IMSI/CISCO/NASId/NASIP/Port/authorization
HTTPVersion = HTTP2
UserName = eapAuth32TMUS
Password = <encrypted>
KeepAliveTimerInterval = 0
RequestToJSONRequestMappings/
RequestToQueryMappings/
CISCO = Cisco-AVPair
IMSI = User-Name
NASId = NAS-Identifier
NASIP = NAS-IP-Address
Port = NAS-Port
2. Set the timer for the CSRF token in RestCSRF.properties. The token expires based on the timer
value. Default time value is 5 mins.
3. Generate CSRF tokens based on the authentication parameters. See the sample command below:
curl
[http://%3cIpaddress:port%3e/RESTAPI/service/getlogin]http://<Ipaddress:port>/RESTAPI/
service/getlogin -H "Authorization:Basic < Authentication paramert>"
Output:
4. You can perform curl operations using the CSRF token. See the sample command below:
curl 'http:// ://<Ipaddress:port>/RESTAPI/service/addobject' -H "csrf-token: <
csrf-token >" -H "Content-Type: application/json" --data
"{\"Service\":{\"Name\":\"null\",\"Description\":\"\",\"Type\":\"null\",\"IncomingScri
pt\":\"\",\"OutgoingScript\":\"\"}"
This appendix lists the supported counters and error statistics used in
Cisco Prime Access Registrar (Prime Access Registrar).
This appendix contains the following sections:
• Interface-Level KPI Counters, page E-1
• Error Statistics (error-stats), page E-9
Note The generic statistics counters are also displayed along with the interface-level counters.
Diameter Peer statistics for client: client1, 10.81.79.79 With Origin-Host 10.81.79.79, And port 4994
cdbpPeerStatsState = Closed
cdbpPeerStatsACRsIn = 0
cdbpPeerStatsACRsOut = 0
cdbpPeerStatsACAsIn = 0
cdbpPeerStatsACAsOut = 0
cdbpPeerStatsCERsIn = 0
cdbpPeerStatsCERsOut = 0
cdbpPeerStatsCEAsIn = 0
cdbpPeerStatsCEAsOut = 0
cdbpPeerStatsDWRsIn = 0
cdbpPeerStatsDWRsOut = 0
cdbpPeerStatsDWAsIn = 0
cdbpPeerStatsDWAsOut = 0
cdbpPeerStatsDPRsIn = 0
cdbpPeerStatsDPRsOut = 0
cdbpPeerStatsDPAsIn = 0
cdbpPeerStatsDPAsOut = 0
cdbpPeerStatsRedirectEvents = 0
cdbpPeerStatsAccDupRequests = 0
cdbpPeerStatsMalformedReqsts = 0
cdbpPeerStatsAccsNotRecorded = 0
cdbpPeerStatsWhoInitDisconnect = 0
cdbpPeerStatsAccRetrans = 0
cdbpPeerStatsTotalRetrans= 0
cdbpPeerStatsAccPendReqstsOut = 0
cdbpPeerStatsAccReqstsDropped = 0
cdbpPeerStatsHByHDropMessages = 0
cdbpPeerStatsEToEDupMessages= 0
cdbpPeerStatsUnknownTypes= 0
cdbpPeerStatsProtocolErrors = 0
cdbpPeerStatsTransientFailures = 0
cdbpPeerStatsPermanentFailures = 0
cdbpPeerStatsDWCurrentStatus= 0
cdbpPeerStatsTransportDown = 0
cdbpPeerStatsTimeoutConnAtmpts = 0
cdbpPeerStatsFailedCERs = 0
cdbpPeerStatsFailedDWRs = 0
cdbpPeerStatsFailedDPRs = 0
cdbpPeerStatsFailedSARs = 0
cdbpPeerStatsFailedPPRs = 0
cdbpPeerStatsFailedRARs = 0
cdbpPeerStatsRstFailedRARs = 0
cdbpPeerStatsFailedRTRs = 0
cdbpPeerStatsFailedASRs = 0
cdbpPeerStatsFailedSTRs = 0
cdbpPeerStatsMultiRoundDEAs = 0
cdbpPeerStatsFailedUDRs = 0
For remote server statistics, the interface is listed as a combination of the source (front-end) and
destination (back-end) interfaces e.g. SWx-SWm. In certain cases, where there is a failure of requests
initiated from HSS, there will not be any front-end interface. Those requests are grouped under SWx
interface.
For details about the Diameter peer and remote server statistics, see the
Cisco Prime Access Registrar 9.1 User Guide.
[ //localhost/Radius/RemoteServers ]
Entries 1 to 1 from 1 total entries
Current filter: <all>
remserver/
cDiaRemSvrStatsASAsIn = 0
cDiaRemSvrStatsASAsOut = 0
cDiaRemSvrStatsRARsIn = 0
cDiaRemSvrStatsRARsOut = 0
cDiaRemSvrStatsRAAsIn = 0
cDiaRemSvrStatsRAAsOut = 0
cDiaRemSvrStatsSTRsIn= 0
cDiaRemSvrStatsSTRsOut = 0
cDiaRemSvrStatsSTAsIn = 0
cDiaRemSvrStatsSTAsOut = 0
cDiaRemSvrStatsMARsIn = 0
cDiaRemSvrStatsMARsOut = 0
cDiaRemSvrStatsMAAsIn= 0
cDiaRemSvrStatsMAAsOut = 0
cDiaRemSvrStatsSARsIn = 0
cDiaRemSvrStatsSARsOut = 0
cDiaRemSvrStatsSAAsIn = 0
cDiaRemSvrStatsSAAsOut = 0
cDiaRemSvrStatsUDRsIn = 0
cDiaRemSvrStatsUDRsOut = 0
cDiaRemSvrStatsUDAsIn = 0
cDiaRemSvrStatsUDAsOut = 0
cDiaRemSvrStatsRTRsIn= 0
cDiaRemSvrStatsRTRsOut = 0
cDiaRemSvrStatsRTAsIn = 0
cDiaRemSvrStatsRTAsOut = 0
cDiaRemSvrStatsPPRsIn= 0
cDiaRemSvrStatsPPRsOut = 0
cDiaRemSvrStatsPPAsIn = 0
cDiaRemSvrStatsPPAsOut = 0
cDiaRemSvrStatsDERsIn= 0
cDiaRemSvrStatsDERsOut = 0
cDiaRemSvrStatsDEAsIn = 0
cDiaRemSvrStatsDEAsOut = 0
cDiaRemSvrStatsAARsIn= 0
cDiaRemSvrStatsAARsOut = 0
cDiaRemSvrStatsAAAsIn = 0
cDiaRemSvrStatsAAAsOut = 0
cDiaRemSvrStatsFailedAARs = 0
cDiaRemSvrStatsFailedDERs = 0
cDiaRemSvrStatsFailedMARs = 0
cDiaRemSvrStatsFailedSARs = 0
cDiaRemSvrStatsFailedPPRs = 0
cDiaRemSvrStatsFailedRARs = 0
cDiaRemSvrStatsFailedRTRs = 0
cDiaRemSvrStatsFailedASRs = 0
cDiaRemSvrStatsFailedSTRs = 0
cDiaRemSvrStatsFailedUDRs = 0
cDiaRemSvrStatsMAAsIn= 0
cDiaRemSvrStatsMAAsOut = 0
cDiaRemSvrStatsSARsIn = 0
cDiaRemSvrStatsSARsOut = 0
cDiaRemSvrStatsSAAsIn = 0
cDiaRemSvrStatsSAAsOut = 0
cDiaRemSvrStatsUDRsIn = 0
cDiaRemSvrStatsUDRsOut = 0
cDiaRemSvrStatsUDAsIn = 0
cDiaRemSvrStatsUDAsOut = 0
cDiaRemSvrStatsRTRsIn= 0
cDiaRemSvrStatsRTRsOut = 0
cDiaRemSvrStatsRTAsIn = 0
cDiaRemSvrStatsRTAsOut = 0
cDiaRemSvrStatsPPRsIn= 0
cDiaRemSvrStatsPPRsOut = 0
cDiaRemSvrStatsPPAsIn = 0
cDiaRemSvrStatsPPAsOut = 0
cDiaRemSvrStatsDERsIn= 0
cDiaRemSvrStatsDERsOut = 0
cDiaRemSvrStatsDEAsIn = 0
cDiaRemSvrStatsDEAsOut = 0
cDiaRemSvrStatsAARsIn= 0
cDiaRemSvrStatsAARsOut = 0
cDiaRemSvrStatsAAAsIn = 0
cDiaRemSvrStatsAAAsOut = 0
cDiaRemSvrStatsFailedAARs = 0
cDiaRemSvrStatsFailedDERs = 0
cDiaRemSvrStatsFailedMARs = 0
cDiaRemSvrStatsFailedSARs = 0
cDiaRemSvrStatsFailedPPRs = 0
cDiaRemSvrStatsFailedRARs = 0
cDiaRemSvrStatsFailedRTRs = 0
cDiaRemSvrStatsFailedASRs = 0
cDiaRemSvrStatsFailedSTRs = 0
cDiaRemSvrStatsFailedUDRs = 0
cDiaRemSvrStatsRTAsIn = 0
cDiaRemSvrStatsRTAsOut = 0
cDiaRemSvrStatsPPRsIn= 0
cDiaRemSvrStatsPPRsOut = 0
cDiaRemSvrStatsPPAsIn = 0
cDiaRemSvrStatsPPAsOut = 0
cDiaRemSvrStatsDERsIn= 0
cDiaRemSvrStatsDERsOut = 0
cDiaRemSvrStatsDEAsIn = 0
cDiaRemSvrStatsDEAsOut = 0
cDiaRemSvrStatsAARsIn= 0
cDiaRemSvrStatsAARsOut = 0
cDiaRemSvrStatsAAAsIn = 0
cDiaRemSvrStatsAAAsOut = 0
cDiaRemSvrStatsFailedAARs = 0
cDiaRemSvrStatsFailedDERs = 0
cDiaRemSvrStatsFailedMARs = 0
cDiaRemSvrStatsFailedSARs = 0
cDiaRemSvrStatsFailedPPRs = 0
cDiaRemSvrStatsFailedRARs = 0
cDiaRemSvrStatsFailedRTRs = 0
cDiaRemSvrStatsFailedASRs = 0
cDiaRemSvrStatsFailedSTRs = 0
cDiaRemSvrStatsFailedUDRs = 0
cDiaRemSvrStatsAAAsIn = 0
cDiaRemSvrStatsAAAsOut = 0
cDiaRemSvrStatsFailedAARs = 0
cDiaRemSvrStatsFailedDERs = 0
cDiaRemSvrStatsFailedMARs = 0
cDiaRemSvrStatsFailedSARs = 0
cDiaRemSvrStatsFailedPPRs = 0
cDiaRemSvrStatsFailedRARs = 0
cDiaRemSvrStatsFailedRTRs = 0
cDiaRemSvrStatsFailedASRs = 0
cDiaRemSvrStatsFailedSTRs = 0
cDiaRemSvrStatsFailedUDRs = 0
The xml file must contain the error codes to be monitored. Error statistics will be displayed only for the
error codes mentioned in the xml file.
A sample errorstats.xml file content is shown below:
[root@cpar-rhel-93 conf]# cat errorstats.xml <?xml version="1.0"?> <Application>
<Command>
<ErrorCode Name="Diameter-Command-Unsupported">3001</ErrorCode>
<ErrorCode Name="Diameter-Unable-To-Deliver">3002</ErrorCode>
<ErrorCode Name="Diameter-Realm-Not-Served">3003</ErrorCode>
<ErrorCode Name="Diameter-Too-Busy">3004</ErrorCode>
<ErrorCode Name="Diameter-Loop-Detected">3005</ErrorCode>
<ErrorCode Name="Diameter-Redirect-Indication">3006</ErrorCode>
<ErrorCode Name="Diameter-Application-Unsupported">3007</ErrorCode>
<ErrorCode Name="Diameter-Invalid-Hdr-Bits">3008</ErrorCode>
<ErrorCode Name="Diameter-Invalid-Avp-Bits">3009</ErrorCode>
<ErrorCode Name="Diameter-Unknown-Peer">3010</ErrorCode>
<ErrorCode Name="Diameter-Authentication-Rejected">4001</ErrorCode>
<ErrorCode Name="Diameter-Out-Of-Space">4002</ErrorCode>
<ErrorCode Name="Diameter-Election-Lost">4003</ErrorCode>
<ErrorCode Name="Diameter-Error-User-Unknown">5001</ErrorCode>
<ErrorCode Name="Diameter-Unknown-Session-Id">5002</ErrorCode>
<ErrorCode Name="Diameter-Error-Identity-Not-Registered">5003</ErrorCode>
<ErrorCode Name="Diameter-Error-Roaming-Not-Allowed">5004</ErrorCode>
<ErrorCode Name="Diameter-Error-Identity-Already-Registered">5005</ErrorCode>
<ErrorCode Name="Diameter-Unable-To-Comply">5012</ErrorCode>
<ErrorCode Name="Diameter-Error-User-No-Non-3gpp-Subscription">5450</ErrorCode>
<ErrorCode Name="Diameter-Error-User-No-Apn-Subscription">5451</ErrorCode>
<ErrorCode Name="Diameter-Error-Rat-Type-Not-Allowed">5452</ErrorCode>
<ErrorCode Name="Diameter-Error-Late-Overlapping-Request">5453</ErrorCode>
<ErrorCode Name="Diameter-Error-Timed-Out-Request">5454</ErrorCode>
<ErrorCode Name="Diameter-Error-Illegal-Equipment">5554</ErrorCode>
</Command>
</Application>
Diameter-Application-Unsupported = 0
Diameter-Invalid-Hdr-Bits = 0
Diameter-Invalid-Avp-Bits = 0
Diameter-Unknown-Peer = 0
Diameter-Authentication-Rejected = 0
Diameter-Out-Of-Space = 0
Election-Lost = 0
Diameter-Error-User-Unknown = 0
Diameter-Unknown-Session-Id = 0
Diameter-Error-Identity-Not-Registered = 0
Diameter-Error-Roaming-Not-Allowed = 0
Diameter-Error-Identity-Already-Registered = 0
Diameter-Unable-To-Comply = 0
Diameter-Error-User-No-Non-3gpp-Subscription = 0
Diameter-Error-User-No-Apn-Subscription = 0
Diameter-Error-Rat-Type-Not-Allowed = 0
Diameter-Error-Late-Overlapping-Request = 0
Diameter-Error-Timed-Out-Request = 0
Diameter-Error-Illegal-Equipment = 0
Diameter-Error-Roaming-Not-Allowed = 0
Diameter-Error-Identity-Already-Registered = 0
Diameter-Unable-To-Comply = 0
Diameter-Error-User-No-Non-3gpp-Subscription = 0
Diameter-Error-User-No-Apn-Subscription = 0
Diameter-Error-Rat-Type-Not-Allowed = 0
Diameter-Error-Late-Overlapping-Request = 0
Diameter-Error-Timed-Out-Request = 0
Diameter-Error-Illegal-Equipment = 0
Diameter-Unknown-Peer = 0
Diameter-Authentication-Rejected = 0
Diameter-Out-Of-Space = 0
Election-Lost = 0
Diameter-Error-User-Unknown = 0
Diameter-Unknown-Session-Id = 0
Diameter-Error-Identity-Not-Registered = 0
Diameter-Error-Roaming-Not-Allowed = 0
Diameter-Error-Identity-Already-Registered = 0
Diameter-Unable-To-Comply = 0
Diameter-Error-User-No-Non-3gpp-Subscription = 0
Diameter-Error-User-No-Apn-Subscription = 0
Diameter-Error-Rat-Type-Not-Allowed = 0
Diameter-Error-Late-Overlapping-Request = 0
Diameter-Error-Timed-Out-Request = 0
Diameter-Error-Illegal-Equipment = 0
Diameter-Error-User-No-Non-3gpp-Subscription = 0
Diameter-Error-User-No-Apn-Subscription = 0
Diameter-Error-Rat-Type-Not-Allowed = 0
Diameter-Error-Late-Overlapping-Request = 0
Diameter-Error-Timed-Out-Request = 0
Diameter-Error-Illegal-Equipment = 0
Fields Description
EnableHealthMonitoring Set to TRUE to enable health monitoring for RADIUS/Diameter in
Prime Access Registrar.
CPUUtilizationWarning- Warning threshold for CPU utilization. If the CPU utilization hits the
Threshold warning threshold, the corresponding health is decremented and a
warning trap is initiated.
CPUUtilizationErrorThresh- Error threshold for CPU utilization. If the CPU utilization drops
old below the error threshold value, an error trap is initiated.
Fields Description
MemoryWarningThreshold Warning threshold for memory utilization. If the memory utilization
hits the warning threshold, the corresponding health is decremented
and a warning trap is initiated.
MemoryErrorThreshold Error threshold for memory utilization. If the memory utilization
drops below the error threshold value, an error trap is initiated.
PacketsInUseWarningThresh- Warning threshold for packet buffer. If the packet buffer hits the
old warning threshold, the corresponding health is decremented and a
warning trap is initiated.
PacketsInUseErrorThreshold Error threshold for packet buffer. If the packet buffer drops below the
error threshold value, an error trap is initiated.
WorkerThreadsWarning- Warning threshold for worker threads. If the worker thread count hits
Threshold the warning threshold, the corresponding health is decremented and
a warning trap is initiated.
WorkerThreadsErrorThresh- Error threshold for worker threads. If the worker thread count drops
old below the error threshold value, an error trap is initiated.
PacketRejectsWarning- Warning threshold for packet rejects. If the packet reject count hits
Threshold the warning threshold, the corresponding health is decremented and
a warning trap is initiated.
PacketRejectsErrorThreshold Error threshold for packet rejects. If the packet reject count drops
below the error threshold value, an error trap is initiated.
PacketTimedOutsWarning- Warning threshold for packet timeouts. If the packet timeout count
Threshold hits the warning threshold, the corresponding health is decremented
and a warning trap is initiated.
PacketTimedOutsError- Error threshold for packet timeouts. If the packet timeout count drops
Threshold below the error threshold value, an error trap is initiated.
PacketDropsWarningThresh- Warning threshold for packet drops. If the packet dropout count hits
old the warning threshold, the corresponding health is decremented and
a warning trap is initiated.
PacketDropsErrorThreshold Error threshold for packet drops. If the packet dropout count drops
below the error threshold value, an error trap is initiated.
PeerConnectivityWarning- Warning threshold for peer connectivity. If the peer connectivity
Threshold count hits the warning threshold, the corresponding health is decre-
mented and a warning trap is initiated.
PeerConnectivityError- Error threshold for peer connectivity. If the peer connectivity count
Threshold drops below the error threshold value, an error trap is initiated.
HealthMonitorFreqInsecs The frequency, in seconds, to monitor the health parameters.
Note All the above parameters are represented in percentage values from 0 - 100. You can choose to set up a
value more than zero only for those parameters for which you wish to enable monitoring.
The following is a sample CLI that shows the health monitoring counters:
[ //localhost/Radius/Advanced/HealthMonitor ]
EnableHealthMonitoring = TRUE
CPUUtilizationWarningThreshold = 90
CPUUtilizationErrorThreshold = 0
MemoryWarningThreshold = 0
MemoryErrorThreshold = 0
PacketsInUseWarningThreshold = 0
PacketsInUseErrorThreshold = 0
WorkerThreadsWarningThreshold = 0
WorkerThreadsErrorThreshold = 0
PacketRejectsWarningThreshold = 0
PacketRejectsErrorThreshold = 0
PacketTimedOutsWarningThreshold = 0
PacketTimedOutsErrorThreshold = 0
PacketDropsWarningThreshold = 0
PacketDropsErrorThreshold = 0
HealthMonitorLogFreqInsecs = 0
The status of the health monitoring parameters are displayed as one of the following in the statistics:
• GOOD—If the parameter is within the limits.
• REDUCING—If the parameter is hitting the warning threshold value.
• CRITICAL—If the parameter is dropping below the error threshold value.
• UNMONITORED—If the parameter is unmonitored (no threshold values are set for the parameter).
You can use the health command in CLI to display the health statistics of all the parameters. You can
use the status command to display the overall health status of Prime Access Registrar.
The following traps are triggered for each of the health monitoring parameters in
Prime Access Registrar:
• HealthMonitoringWarningTrap—Triggered when the parameter health hits the warning threshold
limit.
• HealthMonitoringErrorTrap—Triggered when the parameter health hits the error threshold limit.
• HealthMonitoringResetTrap—Triggered to indicate that the parameter health has reached the
configured error/warning threshold percentage limit and falls behind the error/warning threshold
percentage limit. After this notification is sent, this type of notification will not be sent again until
the parameter health on the server increases above the configured error/warning threshold
percentage limit.
The following is an example of the health monitoring statistics:
--> health