VPD CFG Aaa
VPD CFG Aaa
This module describes how to configure authentication, authorization, and accounting (AAA) for virtual
          private dialup networks (VPDNs).
                            • If you plan to configure remote AAA, you should understand the concepts in the Authentication,
                              Authorization, and Accounting (AAA) module and Security Server Protocols module.
                            • If you plan to configure Layer 2 Tunneling Protocol (L2TP) Forwarding of Point-to-Point Protocol over
                              Ethernet (PPPoE) Tagging Information, it is recommended that you be familiar with RFC 2516 and DSL
                              Forum TR-101 before configuring this feature.
      VPDN Tunnel Lookup Based on Both Domain Name and DNIS Information
                        When a service provider has multiple AAA servers configured, VPDN tunnel authorization searches based
                        on domain name can be time consuming and might cause the client session to time out.
                        To provide more flexibility, service providers can configure the NAS to perform tunnel authorization searches
                        by domain name only, by DNIS only, or by both in a specified order.
                        For L2TP tunnels only, a remote RADIUS AAA server can be used to perform VPDN tunnel authentication
                        on the VPDN tunnel terminator as follows:
                            • Using a remote RADIUS AAA server on the tunnel server for dial-in VPDNs
                            • Using a remote RADIUS AAA server on the NAS for dial-out VPDNs
                        For detailed information on configuring remote RADIUS or TACACS+ servers, see the "Additional References
                        section."
                       Enter the radius-server attribute 87 circuit-id command to override the nas-port-id with the CIRCUIT_ID
                       VSA. Enter the radius-server attribute 31 remote-id command to override the calling-station-id with the
                       REMOTE_ID VSA.
                       In accordance with DSL Forum 2004-71, the DSL uses the Vendor Specific tag for line identification. The
                       first 2 octets (TAG_TYPE) are PPPOE_TAG_VENDSPEC (0x0105). The next 2 octets (TAG_LENGTH)
                       contain the total length including Sub-options, Sub-option-lengths, and Tag-values. The first four octets of
                       the TAG_VALUE contain the vendor ID. The next octet contains sub-option for Agent Remote ID (0x02).
                       Following octet contains total length of Sub-option-tag in bytes.
                       The maximum length for the Remote-ID tag is 63 bytes. The Remote-ID tag contains an operator administered
                       string that uniquely identifies the subscriber on the associated DSL line. The Remote-ID tag can be a phone
                       number, an email address, a billing account number, or any other string that can be used by Service Providers
                       as a tracking mechanism.
                      If the discovery frame has the sub-option 0x01, it indicates the presence of the Circuit-ID tag. A single frame
                      supports Circuit-ID, Remote-ID, or both. If Circuit-ID is present in the same frame, it sends to the RADIUS
                      server through the Nas-Port-ID attribute.
                      The following example shows an access and accounting request sent to the RADIUS server with remote-ID
                      tag and DSL-Sync-Rate tags:
                         If you plan to configure L2TP Forwarding of PPPoE Tagging Information, it is recommended that you be
                         familiar with RFC 2516 and DSL Forum TR-101 before configuring this feature.
                         PADI/PADR frames might contain an optional DSL Sync-Rate tag. The table below shows DSL line information
                         and their associated RADIUS VSA for the optional DSL Sync-Rate tags.
DSL Line Minimum-Data-Rate-Upstream AAA_AT_MIN_RATE_UP_LOW_POWER Minimum data rate upstream in low power
-Low-Power AVP                                                   state in kbps.
                       example.com Password="example"
                       Service-Type=Outbound
                       Cisco-Avpair="vpdn:tunnel-id=tunnel"
                       Cisco-Avpair="vpdn:tunnel-type=l2tp"
                       Cisco-Avpair=":ip-address=10.10.10.1"
                       Cisco-Avpair="vpdn:l2tp-tunnel-password=example"
                       Cisco-Avpair="vpdn:l2tp-security-ip-address-check=yes"
                        Tnl <tunnel-ID>
                         L2TP: Drop <L2TP-packet-name>
                         from y.y.y.y (attempted) x.x.x.x
SUMMARY STEPS
                        1. enable
                        2. configure terminal
                        3. vpdn enable
DETAILED STEPS
                         Example:
                         Router# configure terminal
                         Example:
                         Router(config)# vpdn enable
                  Note      Tunnel authorization searches based on the multihop hostname are supported only for multihop tunnel
                            switching deployments.
SUMMARY STEPS
                           1. enable
                           2. configure terminal
                           3. vpdn search-order {dnis [domain] [multihop-hostname] | domain [dnis] [multihop-hostname] |
                              multihop-hostname [dnis] [domain]}
DETAILED STEPS
              Example:
              Router# configure terminal
Step 3        vpdn search-order {dnis [domain]               Specifies how the service provider NAS or tunnel switch is to
              [multihop-hostname] | domain [dnis]            perform VPDN tunnel authorization searches.
              [multihop-hostname] | multihop-hostname [dnis]
              [domain]}                                          • At least one search parameter keyword must be specified. You
                                                                   can specify multiple search parameter keywords in any order
                                                                   to define the desired order in which searches will be performed.
              Example:
              Router(config)# vpdn search-order domain             Note      The multihop-hostname keyword is used only on a device
              dnis                                                           configured as a tunnel switch.
     Prerequisites
                         The NAS remote RADIUS server must be configured for AAA. See the "Additional References" section.
     Restrictions
                               • Per-user VPDN configuration supports only RADIUS as the AAA protocol.
                               • This task is compatible only with NAS-initiated dial-in VPDN scenarios.
                           globally, or for individual VPDN groups. Configuring per-user VPDN globally will apply per-user VPDN to
                           all request-dialin VPDN groups configured on the NAS.
                           Perform this task on the NAS to configure global per-user VPDN.
SUMMARY STEPS
                           1. enable
                           2. configure terminal
                           3. vpdn authen-before-forward
DETAILED STEPS
                     Example:
                     Router# configure terminal
SUMMARY STEPS
                         1. enable
                         2. configure terminal
                         3. vpdn-group name
                         4. request-dialin
                         5. protocol l2tp
                         6. exit
                         7. authen-before-forward
DETAILED STEPS
                  Example:
                  Router# configure terminal
Step 3            vpdn-group name                             Creates a VPDN group and enters VPDN group configuration
                                                              mode.
                  Example:
                  Router(config)# vpdn-group 1
Router(config-vpdn)# request-dialin
Step 5            protocol l2tp                               Specifies the Layer 2 tunneling protocol that the VPDN group
                                                              will use.
                  Example:
                  Router(config-vpdn-req-in)# protocol l2tp
                  Example:
                  Router(config-vpdn-req-in)# exit
Router(config-vpdn)# authen-before-forward
SUMMARY STEPS
                            1. enable
                            2. configure terminal
                            3. aaa new-model
                            4. aaa authentication login {default | list-name} method1 [method2...]
                            5. aaa authentication ppp {default | list-name} method1 [method2...]
                            6. aaa authorization {network | exec | commands level | reverse-access | configuration} {default |
                               list-name} [method1 [method2...]]
                            7. vpdn aaa attribute {nas-ip-address{vpdn-nas | vpdn-tunnel-client} | nas-port {physical-channel-id
                               | vpdn-nas}}
DETAILED STEPS
                 Example:
                 Router# configure terminal
               Example:
               Router(config)# aaa new model
Step 4         aaa authentication login {default | list-name} method1 Sets AAA authentication at login.
               [method2...]
               Example:
               Router(config)# aaa authentication login default
                local
Step 5         aaa authentication ppp {default | list-name} method1 Specifies one or more AAA authentication methods for use
               [method2...]                                         on serial interfaces that are running PPP.
                                                                        Note      This command must be configured with the
               Example:                                                           if-needed option for the method1argument if you
               Router(config)# aaa authentication ppp default                     are configuring shell-based authentication for
               radius                                                             VPDNs. This configures PPP to bypass user
                                                                                  authentication if the user has been authenticated at
                                                                                  the login prompt.
Step 6         aaa authorization {network | exec | commands level | Sets parameters that restrict user access to a network.
               reverse-access | configuration} {default | list-name}
               [method1 [method2...]]
               Example:
               Router(config)# aaa authorization network default
                radius
Step 7         vpdn aaa attribute {nas-ip-address{vpdn-nas |         (Optional) Enables AAA attributes related to a VPDN that
               vpdn-tunnel-client} | nas-port {physical-channel-id | will be reported to the AAA server in accounting records.
               vpdn-nas}}                                            Note     Configure this command only on the tunnel server
                                                                              when remote AAA accounting will be enabled on
               Example:                                                       the NAS.
               Router(config)# vpdn aaa attribute nas-ip-address
                vpdn-nas
                          Dial-In Configurations
                               • The NAS can be configured to use a remote AAA server.
                               • The tunnel server, functioning as the tunnel terminator, can be configured to use a remote AAA server
                                 for L2TP tunnels only.
                          Dial-Out Configurations
                               • The NAS, functioning as the tunnel terminator, can be configured to use a remote AAA server for L2TP
                                 tunnels only.
SUMMARY STEPS
                          1. enable
                          2. configure terminal
                          3. Do one of the following:
                                   • radius-server host {hostname | ip-address} [auth-port port-number] [acct-port port-number]
                                     [timeout seconds] [retransmit retries] [key string] [alias {hostname | ip-address}]
                                   • tacacs-server host {host-name | host-ip-address} [key string] [nat] [port [integer]]
                                     [single-connection] [timeout [integer]]
DETAILED STEPS
            Example:
            Router# configure terminal
            Example:
            Router(config)# radius-server host 10.1.1.1
            Example:
            Router(config)# tacacs-server host 10.2.2.2
Step 4      Do one of the following:                                             (Optional) Groups different RADIUS server hosts into
                                                                                 distinct lists and distinct methods and enters RADIUS
                 • aaa group server radius group-name                            server group configuration mode.
                 • aaa group server tacacs+ group-name                           or
                                                                                 (Optional) Groups different TACACS+ server hosts into
                                                                                 distinct lists and distinct methods and enters RADIUS
            Example:
                                                                                 server group configuration mode.
            Router(config)# aaa group server radius group1
            Example:
            Router(config)# aaa group server tacacs+ group7
Step 5      Do one of the following:                                             (Optional) Configures the IP address of the RADIUS
                                                                                 server for the group server.
                 • server ip-address [auth-port port-number] [acct-port
                   port-number]                                         or
          Example:
          Router(config-sg-radius)# server 10.2.2.2
     What to Do Next
                      You must perform the process in the Configuring VPDN Tunnel Authentication section.
     Configuring the Tunnel Terminator for Remote RADIUS AAA for L2TP Tunnels
                      You can configure the device that terminates the L2TP VPDN tunnel to perform remote RADIUS AAA.
                      Without this functionality, the tunnel terminator can only perform L2TP authentication locally. Local
                      authentication requires that data about the corresponding tunnel endpoint be configured within a VPDN group.
                      This mechanism does not scale well because the information stored in the VPDN groups on each device must
                      be updated independently.
                      Remote RADIUS authentication allows users to store configurations on the RADIUS server, avoiding the
                      need to store information locally. New information can be added to the RADIUS server as needed, and a
                      group of tunnel terminators can access a common database on the RADIUS server.
                      Perform this task to configure remote RADIUS AAA for L2TP tunnels on the tunnel terminator. This task
                      can be performed on the tunnel server for dial-in VPDN tunnels, or on the NAS for dial-out VPDN tunnels.
SUMMARY STEPS
                          1. enable
                          2. configure terminal
                          3. radius-server host {hostname | ip-address} [auth-port port-number] [acct-port port-number] [timeout
                             seconds] [retransmit retries] [key string] [alias {hostname | ip-address}]
                          4. aaa group server radius group-name
                          5. server ip-address [auth-port port-number] [acct-port port-number]
                          6. exit
                          7. vpdn tunnel authorization network {list-name | default}
                          8. vpdn tunnel authorization virtual-template vtemplate-number
                          9. vpdn tunnel authorization password password
DETAILED STEPS
               Example:
               Router# configure terminal
Step 3         radius-server host {hostname | ip-address} [auth-port Specifies a RADIUS server host.
               port-number] [acct-port port-number] [timeout
               seconds] [retransmit retries] [key string] [alias
               {hostname | ip-address}]
               Example:
               Router(config)# radius-server host 10.1.1.1
Step 4         aaa group server radius group-name                     Groups different RADIUS server hosts into distinct lists and
                                                                      distinct methods and enters RADIUS server group
               Example:                                               configuration mode.
Step 5         server ip-address [auth-port port-number] [acct-port Configures the IP address of the RADIUS server for the group
               port-number]                                         server.
                Example:
                Router(config-sg-radius)# exit
Step 7          vpdn tunnel authorization network {list-name |           Specifies the AAA authorization method list that will be used
                default}                                                 for remote tunnel hostname-based authorization.
                                                                             • If the list-name argument was specified in the aaa
                Example:                                                       authorization command, you must use that list name.
                Router(config)# vpdn tunnel authorization
                network default                                              • If the default keyword was specified in the aaa
                                                                               authorization command, you must use that keyword.
Step 8          vpdn tunnel authorization virtual-template               (Optional) Selects the default virtual template from which to
                vtemplate-number                                         clone virtual access interfaces.
                Example:
                Router(config)# vpdn tunnel authorization
                virtual-template 3
Step 9          vpdn tunnel authorization password password              (Optional) Configures a false password for the RADIUS
                                                                         authorization request to retrieve the tunnel configuration that
                Example:                                                 is based on the remote tunnel hostname.
                Router(config)# vpdn tunnel authorization                Note      If this command is not enabled, the password will
                password my-secret                                                 always be "cisco."
        What to Do Next
                           You must perform the task in the Configuring the Multihop Tunnel Switch to Initiate Outgoing VPDN Tunnels.
SUMMARY STEPS
                         1. enable
                         2. show vpdn tunnel
DETAILED STEPS
Step 1       enable
             Enter this command to enable privileged EXEC mode. Enter your password if prompted:
             Example:
             Router> enable
             Example:
             Router# show vpdn tunnel
             L2TP Tunnel and Session Information Total tunnels 1 sessions 1
             LocID RemID Remote   Name   State Remote Address Port Sessions VPDN Group
             4571 61568 csidtw13         est    10.0.195.4      1701 1         ?
             LocID RemID TunID Intf          Username               State Last Chg
             4     11    4571 Vi4.1          csidtw9@cisco.com       est    00:02:29
             %No active PPPoE tunnels
SUMMARY STEPS
                         1. enable
                         2. debug radius
                         3. show logging
DETAILED STEPS
Step 1         enable
               Enter this command to enable privileged EXEC mode. Enter your password if prompted:
               Example:
               Router> enable
               Example:
               Router# debug radius
               Example:
               Router# show logging
               00:32:56: RADIUS: Received from id 21645/5 172.19.192.50:1645, Access-Accept
               , len 81
               00:32:56: RADIUS: authenticator 73 2B 1B C2 33 71 93 19 - 62 AC 3E BE 0D 13 14 85
               00:32:56: RADIUS: Service-Type         [6]   6   Outbound                  [5]
               00:32:56: RADIUS: Tunnel-Type          [64] 6    00:L2TP                   [3]
               00:32:56: RADIUS: Tunnel-Medium-Type [65] 6      00:IPv4                   [1]
               00:32:56: RADIUS: Tunnel-Client-Auth-I[90]
                 6   00:"csidtw13"
               00:32:56: RADIUS: Tunnel-Password      [69]
                8   *
               00:32:56: RADIUS: Vendor, Cisco        [26] 29
               00:32:56: RADIUS:   Cisco AVpair       [1]   23 "vpdn:vpdn-vtemplate=1"
                               • debug vpdn events --Displays information about Layer 2 protocol-independent events that are part of
                                 normal tunnel establishment or shutdown.
                               • debug vpdn l2x-errors --Displays information about Layer 2 protocol-specific errors that are part of
                                 normal PPP tunnel establishment or shutdown.
                               • debug vpdn l2x-events --Displays information about Layer 2 protocol-specific events that are part of
                                 normal PPP tunnel establishment or shutdown.
                               • debug vpdn l2x-packets --Displays information about Layer 2 protocol-specific
                               • debug vtemplate --Displays cloning information for a virtual access interface from the time it is cloned
                                 from a virtual template to the time the virtual access interface comes down when the call ends.
SUMMARY STEPS
                         1. enable
                         2. show debugging
                         3. Examine the debug output.
DETAILED STEPS
Step 1       enable
             Enter this command to enable privileged EXEC mode. Enter your password if prompted:
             Example:
             Router> enable
             Example:
             Router# show debugging
             General OS:
             AAA Authentication debugging is on
             AAA Authorization debugging is on
             AAA Accounting debugging is on
             VPN:
             L2X protocol events debugging is on
             L2X protocol errors debugging is on
             VPDN events debugging is on
             VPDN errors debugging is on
             VTEMPLATE:
             Virtual Template debugging is on
             !
             Example:
             Jan 30 12:17:09: As1 AAA/AUTHOR/FSM: (0): LCP succeeds trivially
  Verifying the Remote TACACS+ AAA Server Configuration on the Tunnel Server
                      Perform this task on the tunnel server to verify that the remote TACACS+ AAA server is properly configured.
                                • debug vtemplate --Displays cloning information for a virtual access interface from the time it is cloned
                                  from a virtual template to the time the virtual access interface comes down when the call ends.
                                • debug vpdn error --Displays errors that prevent a PPP tunnel from being established or errors that
                                  cause an established tunnel to be closed.
                                • debug vpdn events --Displays messages about events that are part of normal PPP tunnel establishment
                                  or shutdown.
                                • debug vpdn l2x-errors --Displays messages about events that are part of normal PPP tunnel establishment
                                  or shutdown.
                                • debug vpdn l2x-events --Displays messages about events that are part of normal PPP tunnel establishment
                                  or shutdown for Layer 2.
SUMMARY STEPS
                           1. enable
                           2. show debugging
                           3. Examine the debug output.
DETAILED STEPS
Step 1         enable
               Enter this command to enable privileged EXEC mode. Enter your password if prompted:
               Example:
               Router> enable
               Example:
               Router# show debugging
               General OS:
               AAA Authentication debugging is on
               AAA Authorization debugging is on
               AAA Accounting debugging is on
               VPN:
               L2X protocol events debugging is on
               L2X protocol errors debugging is on
               VPDN events debugging is on
               VPDN errors debugging is on
               VTEMPLATE:
               Virtual Template debugging is on
          Example:
          Jan 30 12:17:09: L2TP: I SCCRQ from rtp_tunnel tnl 74
          Jan 30 12:17:09: Tnl 56 L2TP: New tunnel created for remote
          rtp_tunnel, address 10.31.1.144
          Jan 30 12:17:09: Tnl 56 L2TP: Got a challenge in SCCRQ, rtp_tunnel
          Jan 30 12:17:09: AAA: parse name= idb type=-1 tty=-1
          Jan 30 12:17:09: AAA/AUTHEN: create_user (0x21F6D0) user='ABCDE'
          ruser='' port=''
          rem_addr='' authen_type=CHAP service=PPP priv=1
          Jan 30 12:17:09: AAA/AUTHEN/START (3194595626): port='' list='default'
          action=SENDAUTH service=PPP
          Jan 30 12:17:09: AAA/AUTHEN/START (3194595626): found list default
          Jan 30 12:17:09: AAA/AUTHEN (3194595626): status = UNKNOWN
          Jan 30 12:17:09: AAA/AUTHEN/START (3194595626): Method=TACACS+
          Jan 30 12:17:09: TAC+: send AUTHEN/START packet ver=193 id=3194595626
          Jan 30 12:17:09: TAC+: ver=192 id=3194595626 received AUTHEN status = ERROR
          Jan 30 12:17:09: AAA: parse name= idb type=-1 tty=-1
          Jan 30 12:17:09: AAA/AUTHEN: create_user (0x2281AC) user='ABCDE'
          ruser='' port=''
          rem_addr='' authen_type=CHAP service=PPP priv=1
          Jan 30 12:17:09: TAC+: ver=192 id=3639011179 received AUTHEN status = PASS
          Jan 30 12:17:09: AAA/AUTHEN: free_user (0x2281AC) user='ABCDE' ruser='' port=''
          rem_addr='' authen_type=CHAP service=PPP priv=1
          Jan 30 12:17:09: AAA/AUTHEN (3194595626): status = PASS
          Jan 30 12:17:09: AAA/AUTHEN: free_user (0x21F6D0) user='ABCDE' ruser='' port=''
          rem_addr='' authen_type=CHAP service=PPP priv=1
          Jan 30 12:17:09: Tnl 56 L2TP: O SCCRP to rtp_tunnel tnlid 74
          Jan 30 12:17:09: Tnl 56 L2TP: Tunnel state change from idle to
          wait-ctl-reply
          Jan 30 12:17:10: Tnl 56 L2TP: O Resend SCCRP, flg TLF, ver 2, len 152,
          tnl 74, cl 0, ns 0, nr 1
          Jan 30 12:17:10: Tnl 56 L2TP: I SCCCN from rtp_tunnel tnl 74
          Jan 30 12:17:10: Tnl 56 L2TP: Got a Challenge Response in SCCCN from rtp_tunnel
          Jan 30 12:17:10: AAA: parse name= idb type=-1 tty=-1
          Jan 30 12:17:10: AAA/AUTHEN: create_user (0x227F3C) user='ABCDE'
          ruser='' port=''
          rem_addr='' authen_type=CHAP service=PPP priv=1
          Jan 30 12:17:10: AAA/AUTHEN/STARTTranslating "rtp.cisco.com"
          (4117701992): port='' list='default' action=SENDAUTH service=PPP
          Jan 30 12:17:10: AAA/AUTHEN/START (4117701992): found list default
          Jan 30 12:17:10: AAA/AUTHEN (4117701992): status = UNKNOWN
          Jan 30 12:17:10: AAA/AUTHEN/START (4117701992): Method=TACACS+
          Jan 30 12:17:10: TAC+: send AUTHEN/START packet ver=193 id=4117701992
          Jan 30 12:17:11: TAC+: ver=192 id=4117701992 received AUTHEN status = ERROR
          Jan 30 12:17:11: AAA: parse name= idb type=-1 tty=-1
          Jan 30 12:17:11: AAA/AUTHEN: create_user (0x228E68) user='ABCDE' ruser='' port=''
          rem_addr='' authen_type=CHAP service=PPP priv=1
          Jan 30 12:17:11: TAC+: ver=192 id=2827432721 received AUTHEN status = PASS
          Jan 30 12:17:11: AAA/AUTHEN: free_user (0x228E68) user='ABCDE' ruser='' port=''
          rem_addr='' authen_type=CHAP service=PPP priv=1
          Jan 30 12:17:11: AAA/AUTHEN (4117701992): status = PASS
          Jan 30 12:17:11: AAA/AUTHEN: free_user (0x227F3C) user='ABCDE' ruser='' port=''
          rem_addr='' authen_type=CHAP service=PPP priv=1
          Jan 30 12:17:11: Tnl 56 L2TP: Tunnel Authentication success
          Jan 30 12:17:11: Tnl 56 L2TP: Tunnel state change from wait-ctl-reply
          to established
          Jan 30 12:17:11: Tnl 56 L2TP: SM State established
          Jan 30 12:17:11: Tnl 56 L2TP: I ICRQ from rtp_tunnel tnl 74
          Jan 30 12:17:11: Tnl/Cl 56/1 L2TP: Session FS enabled
          Jan 30 12:17:11: Tnl/Cl 56/1 L2TP: Session state change from idle to
          wait-for-tunnel
          Jan 30 12:17:11: Tnl/Cl 56/1 L2TP: New session created
          Jan 30 12:17:11: Tnl/Cl 56/1 L2TP: O ICRP to rtp_tunnel 74/1
          Jan 30 12:17:11: Tnl/Cl 56/1 L2TP: Session state change from wait-for-tunnel
          to wait-connect
          Jan 30 12:17:11: Tnl/Cl 56/1 L2TP: I ICCN from rtp_tunnel tnl 74, cl 1
          Jan 30 12:17:11: Tnl/Cl 56/1 L2TP: Session state change from wait-connect
          to established
        Verifying L2TP Tunnel Establishment PPP Negotiations and Authentication with the Remote
        Client
                           Perform this task to verify that the L2TP tunnel has been established and that the tunnel server can perform
                           PPP negotiation and authentication with the remote client.
                           In this example the steps are performed on the tunnel server, which is performing remote AAA as a tunnel
                           terminator. These steps can also be performed on the NAS when remote AAA is being performed on the NAS
                           as a tunnel initiator for dial-in VPDNs or as a tunnel terminator for dial-out VPDNs.
SUMMARY STEPS
                           1. enable
                           2. debug ppp negotiation
                           3. debug ppp authentication
                           4. show logging
DETAILED STEPS
Step 1         enable
               Enter this command to enable privileged EXEC mode. Enter your password if prompted:
               Example:
               Router> enable
               Example:
               Router# debug ppp negotiation
             Example:
             Router# debug ppp authentication
             Example:
             00:38:50:   ppp3 PPP: Received LOGIN Response from AAA = PASS
             00:38:50:   ppp3 PPP: Phase is FORWARDING, Attempting Forward
             00:38:50:   Vi4.1 Tnl/Sn4571/4 L2TP: Session state change from wait-for-service-selection to established
             00:38:50:   Vi4.1 PPP: Phase is AUTHENTICATING, Authenticated User
             00:38:50:   Vi4.1 CHAP: O SUCCESS id 1 len 4
             After PPP authentication is successful, observe from the debug output that PPP negotiation has started, that the tunnel
             server has received Link Control Protocol (LCP) IP Control Protocol (IPCP) packets, and that negotiation is successful.
             Example:
             00:38:50: Vi4.1 IPCP: State is Open
             00:38:50: Vi4.1 IPCP: Install route to 10.1.1.4
SUMMARY STEPS
                            1. enable
                            2. configure terminal
                            3. ip host {name | t modem-telephone-number} [tcp-port-number] address1 [address2...address8]
                            4. Do one of the following:
                                     • radius-server directed-request [restricted]
                                     • tacacs-server directed-request [restricted] [no-truncate]
DETAILED STEPS
                 Example:
                 Router# configure terminal
Step 3           ip host {name | t modem-telephone-number}                 Specifies or modifies the hostname for the network server.
                 [tcp-port-number] address1 [address2...address8]          Note      The IP address specified with the ip host command
                                                                                     must match the IP address you configured with the
                 Example:                                                            radius-server hostor tacacs-server host command
                 Router(config)# ip host example.com 10.3.3.3                        when performing the task in the Configuring Remote
                                                                                     AAA for VPDNs, on page 15.
Step 4           Do one of the following:                                  Allows users logging in to a NAS to select a RADIUS server
                                                                           for authentication.
                     • radius-server directed-request [restricted]
                                                                           or
                     • tacacs-server directed-request [restricted]
                       [no-truncate]                                       Allows users logging in to a NAS to select a TACACS+
                                                                           server for authentication.
                 Example:
                 Router(config)# radius-server directed-request
              Example:
              Router(config)# tacacs-server directed-request
Step 5 vpdn authorize directed-request Enables VPDN authorization for directed request users.
              Example:
              Router(config)# vpdn authorize directed-request
     What to Do Next
                         You must perform the process in the Configuring VPDN Tunnel Authentication section.
SUMMARY STEPS
                         1. enable
                         2. configure terminal
                         3. ip host {name | t modem-telephone-number} [tcp-port-number] address1 [address2...address8]
                         4. Do one of the following:
                                • radius-server directed-request [restricted]
                                • tacacs-server directed-request [restricted] [no-truncate]
DETAILED STEPS
                 Example:
                 Router# configure terminal
Step 3           ip host {name | t modem-telephone-number}                   Specifies or modifies the hostname for the network server.
                 [tcp-port-number] address1 [address2...address8]            Note      The IP address specified with the ip host command
                                                                                       must match the IP address you configured with the
                 Example:                                                              radius-server host or tacacs-server host command
                 Router(config)# ip host example.com 10.3.3.3                          when performing the task in the Configuring Remote
                                                                                       AAA for VPDNs, on page 15.
Step 4           Do one of the following:                                    Allows users logging in to a NAS to select a RADIUS server
                                                                             for authentication.
                      • radius-server directed-request [restricted]
                                                                             or
                      • tacacs-server directed-request [restricted]
                        [no-truncate]                                        Allows users logging in to a NAS to select a TACACS+ server
                                                                             for authentication.
                 Example:
                 Router(config)# radius-server directed-request
                 Example:
                 Router(config)# tacacs-server directed-request
Step 5 vpdn authorize directed-request Enables VPDN authorization for directed request users.
                 Example:
                 Router(config)# vpdn authorize directed-request
        What to Do Next
                            You must perform the process in the Configuring VPDN Tunnel Authentication section.
Perform this task on the NAS to configure a set of global or per-VRF stripping rules.
SUMMARY STEPS
                         1. enable
                         2. configure terminal
                         3. Do one of the following:
                                  • radius-server domain-stripping [right-to-left] [prefix-delimiter character
                                    [character2...character7]] [delimiter character [character2...character7]] [vrf vrf-name]
                                  • tacacs-server domain-stripping [right-to-left] [prefix-delimiter character [character2...character7]]
                                    [delimiter character [character2...character7]] [vrf vrf-name]
DETAILED STEPS
       Example:
       Router# configure terminal
Step 3 Do one of the following:                       (Optional) Configures a router to strip suffixes, or both suffixes and prefixes,
                                                      from the username before forwarding the username to the RADIUS server.
            • radius-server domain-stripping
              [right-to-left] [prefix-delimiter    or
              character [character2...character7]] (Optional) Configures a router to strip suffixes, or both suffixes and prefixes,
              [delimiter character                 from the username before forwarding the username to the TACACS+ server.
              [character2...character7]] [vrf
              vrf-name]
                                                              Note      Only one parse direction can be configured per set of global or per-VRF
        Example:
                                                                        rules. The router cannot be configured to parse for prefixes in one
                                                                        direction, and parse for suffixes in the other direction.
        Router(config)# radius-server
        domain-stripping prefix-delimiter                          • prefix-delimiter character [character2...character7]--Enables prefix
        #%&\\ delimiter @/                                           stripping and specifies the character or characters that will be recognized
                                                                     as a prefix delimiter. Valid values for the character argument are @, /, $,
        Example:                                                     %, \, #, and -. Multiple characters can be entered without intervening spaces.
                                                                     Up to seven characters can be defined as prefix delimiters, which is the
        Router(config)# tacacs-server                                maximum number of valid characters. If a \ is entered as the final or only
        domain-stripping prefix-delimiter
        %\$ vrf myvrf                                                value for the character argument, it must be entered as \\.
                                                              Note      Enabling prefix stripping will automatically enable suffix stripping using
                                                                        the default suffix delimiter @, unless a different suffix delimiter is
                                                                        configured using the delimiter character keyword and argument.
                                                                   • delimiter character [character2...character7]--Specifies the character or
                                                                     characters that will be recognized as a suffix delimiter. Valid values for the
                                                                     character argument are @, /, $, %, \, #, and -. Multiple characters can be
                                                                     entered without intervening spaces. Up to seven characters can be defined
                                                                     as prefix delimiters, which is the maximum number of valid characters. If
                                                                     a \ is entered as the final or only value for the character argument, it must
                                                                     be entered as \\.
                                                                   • vrf vrf-name --Restricts the stripping configuration to a VRF instance. The
                                                                     vrf-nameargument specifies the name of a configured VRF.
Step 4 Do one of the following:                               (Optional) Configures a router to strip a specific suffix from the username before
                                                              forwarding the username to the RADIUS server.
             • radius-server domain-stripping
               strip-suffix suffix [vrf vrf-name]             or
             • tacacs-server domain-stripping                 (Optional) Configures a router to strip a specific suffix from the username before
               strip-suffix suffix [vrf vrf-name]             forwarding the username to the TACACS+ server.
                                                                   • strip-suffix suffix --Enables per-suffix suffix stripping and specifies the
                                                                     string that must be matched for the suffix to be stripped.
        Example:
                                                              Note      Both the suffix delimiter and the suffix must match for the suffix to be
        Router(config)# radius-server
                                                                        stripped from the full username. The default suffix delimiter of @ will
                                                                        be used if you do not specify a different suffix delimiter or set of suffix
                                                                        delimiters in .
     Example:                                        Note      You can configure a single ruleset to strip multiple specific suffixes by
                                                               performing this step multiple times.
     Router(config)# tacacs-server
     domain-stripping strip-suffix
     cisco.net vrf myvrf
   What to Do Next
                       You must perform the process in the Configuring VPDN Tunnel Authentication section.
                       For L2TP client-initiated VPDN tunnels, the shared secret can be configured on the tunnel server using the
                       hostname, the local name, or the L2TP tunnel password as described the process documented in this section.
                       The shared secret can be configured on the local peer router in either of these ways:
                             • In an L2TP class configuration. Perform the task Configuring L2TP Control Channel Authentication
                               Parameters in the Configuring Client-Initiated Dial-In VPDN Tunneling module instead of the process
                               documented in this section.
                             • Using the hostname of the router as described in the process documented in this section.
                           For PPTP client-initiated VPDN tunnels, authentication parameters can be configured by using the hostname
                           or the local name as described in the process documented in this section.
                           To configure VPDN tunnel authentication, you must perform one of the following tasks on the NAS and the
                           tunnel server as required. You need not choose the same method to configure the secret on the NAS and the
                           tunnel server. However, the configured password must be the same on both devices.
                           VPDN tunnel authentication is optional for L2TP tunnels. Perform this task on the NAS and the tunnel server
                           if you want to disable VPDN tunnel authentication:
        Prerequisites
                           AAA must be enabled. See the Configuring AAA on the NAS and the Tunnel Server section.
SUMMARY STEPS
                           1. enable
                           2. configure terminal
                           3. hostname name
                           4. username name password secret
DETAILED STEPS
                    Example:
                    Router# configure terminal
Step 3 hostname name Specifies or modifies the hostname for the network server.
                    Example:
                    Router(config)# hostname tunnelserver12
                  Router(config)# username nas4 password                     • The secret password must be the same on both routers.
                  mysecret
     What to Do Next
                               • Once you have configured a secret password on one tunnel endpoint, you must configure the same tunnel
                                 secret on the corresponding tunnel endpoint.
SUMMARY STEPS
                         1. enable
                         2. configure terminal
                         3. vpdn-group name
                         4. local name host-name
                         5. exit
                         6. username        name password secret
DETAILED STEPS
                   Example:
                   Router# configure terminal
Step 4               local name host-name                                  Specifies a local hostname that the tunnel will use to identify
                                                                           itself.
                     Example:
                     Router(config-vpdn)# local name tunnelserver2
                     Example:
                     Router(config-vpdn)# exit
        What to Do Next
                                • Once you have configured a secret password on one tunnel endpoint, you must configure the same tunnel
                                  secret on the corresponding tunnel endpoint.
SUMMARY STEPS
                            1. enable
                            2. configure terminal
                            3. vpdn-group name
                            4. l2tp tunnel password        password
                            5. local name host-name
                            6. exit
                            7. username           name password secret
DETAILED STEPS
                Example:
                Router# configure terminal
Step 3 vpdn-group name Enters VPDN group configuration mode and creates a VPDN group.
                Example:
                Router(config)# vpdn-group mygroup
Step 4 l2tp tunnel password password Sets the password that the router will use to authenticate the tunnel.
                Example:
                Router(config-vpdn)# l2tp tunnel password
                 mysecret
Step 5          local name host-name                        (Optional) Specifies a local hostname that the tunnel will use to
                                                            identify itself.
                Example:                                        • You must perform this step if the remote router does not use
                Router(config-vpdn)# local name                   the L2TP tunnel password.
                tunnelserver2
Step 7          username       name password secret         (Optional) Establishes a username-based authentication system.
                                                                • You need to perform this step only if the remote router does
                Example:                                          not use the L2TP tunnel password method of VPDN tunnel
                Router(config)# username nas64 password           authentication.
                 mysecret
                                                                • The specified username must be the name of the remote router.
                                                                • The password must be the same on both routers.
        What to Do Next
                                • Once you have configured a secret password on one tunnel endpoint, you must configure the same tunnel
                                  secret on the corresponding tunnel endpoint.
SUMMARY STEPS
                           1. enable
                           2. configure terminal
                           3. vpdn-group name
                           4. no l2tp tunnel authentication
DETAILED STEPS
                      Example:
                      Router# configure terminal
Step 3                vpdn-group name                                            Enters VPDN group configuration mode and creates a
                                                                                 VPDN group.
                      Example:
                      Router(config)# vpdn-group mygroup
                      Example:
                      Router(config-vpdn)# no l2tp tunnel
                      authentication
Note RADIUS tunnel accounting is supported only for VPDNs using the L2TP protocol.
SUMMARY STEPS
                         1. enable
                         2. configure terminal
                         3. aaa accounting network default | list-name} {start-stop | stop-only | wait-start | none group groupname
                         4. vpdn tunnel accounting network list-name
                         5. vpdn session accounting network list-name
DETAILED STEPS
             Example:
             Router# configure terminal
Step 4         vpdn tunnel accounting network list-name Enables Tunnel-Start, Tunnel-Stop, and Tunnel-Reject accounting records.
                                                                           • list-name --The list-name must match the list-name defined in the
               Example:                                                      aaa accountingcommand; otherwise, network accounting will not
               Router(config)# vpdn tunnel accounting                        occur.
                network list1
Step 5         vpdn session accounting network list-name Enables Tunnel-Link-Start, Tunnel-Link-Stop, and Tunnel-Link-Reject
                                                         accounting records.
               Example:                                                    • list-name --The list-name must match the list-name defined in the
               Router(config)# vpdn session accounting                       aaa accounting command; otherwise, network accounting will not
                network list1                                                occur.
                            Perform this task on the remote RADIUS AAA server to configure the RADIUS server to authenticate VPDN
                            tunnels at the device that terminates the tunnel.
                Note      This task applies only when the device that terminates the VPDN tunnel is performing remote RADIUS
                          AAA. To configure the tunnel terminator to perform remote RADIUS AAA, perform the task in the
                          "Configuring the Tunnel Terminator for Remote RADIUS AAA for L2TP Tunnels" section.
SUMMARY STEPS
DETAILED STEPS
               Example:
               service type = Outbound
Step 3         Cisco:Cisco-Avpair = vpdn:dout-dialer =               Specifies which dialer to use on the NAS for dial-out configuration.
               NAS-dialer-number                                     Note      Perform this step only for dial-out
                                                                               configurations.
               Example:
               Cisco:Cisco-Avpair = vpdn:dout-dialer = 2
Step 4         Cisco:Cisco-Avpair = vpdn:vpdn-vtemplate = Specifies the virtual template number to use on the tunnel server
               vtemplate-number                           for dial-in configuration.
                                                                     Note      Perform this step only for dial-in
               Example:                                                        configurations.
               Cisco:Cisco-Avpair = vpdn:vpdn-vtemplate = Note                 This configuration is optional if the vpdn tunnel
                1                                                              authorization virtual-template command is used in the
                                                                               task in the Configuring the Tunnel Terminator for Remote
                                                                               RADIUS AAA for L2TP Tunnels, on page 18.
SUMMARY STEPS
                           2. tunnel-type = protocol
                           3. tunnel-server-endpoint = ip-address
                           4. tunnel-assignment-id = name
DETAILED STEPS
                Example:
                user@cisco.com Password = "cisco" Service-Type
                = Outbound
                Example:
                user.cisco.com Password = "cisco" Service-Type
                = Outbound
Step 4        tunnel-assignment-id = name                                  Specifies the tunnel ID that calls from the specified user or
                                                                           domain are assigned.
              Example:                                                          • The tunnel assignment ID must be identical for users
              tunnel-assignment-id = group1                                       to be grouped into the same tunnel.
SUMMARY STEPS
DETAILED STEPS
               Example:
               user@cisco.com Password = "cisco" Service-Type =
               Outbound
               Example:
               user.cisco.com Password = "cisco" Service-Type =
               Outbound
Step 2         tunnel-client-auth-id = {:1 | :2}: " NAS-name "                    Specifies the name used by the NAS when it
                                                                                  authenticates tunnel setup with the tunnel server.
               Example:                                                               • :1 --Specifies L2F tunnels.
               tunnel-client-auth-id = :2:NAS36
                                                                                      • :2 --Specifies L2TP tunnels.
Step 3         tunnel-server-auth-id = {:1 | :2}: " tunnel-server-name "          Specifies the name used by the tunnel server when it
                                                                                  authenticates tunnel setup with the NAS.
               Example:                                                               • :1 --Specifies L2F tunnels.
               tunnel-server-auth-id = :2:TS14
                                                                                      • :2 --Specifies L2TP tunnels.
SUMMARY STEPS
                          1. enable
                          2. configure terminal
                          3. vpdn-group name
                          4. dsl-line-info-forwarding
                          5. exit
DETAILED STEPS
                   Example:
                   Router# configure terminal
Step 3             vpdn-group name                                    Creates a VPDN group and enters VPDN group configuration
                                                                      mode.
                   Example:
                   Router(config)# vpdn-group pppoe-group
                   Router(config-vpdn)#
                   dsl-line-info-forwarding
                   Example:
                   Router(config-vpdn)# exit
SUMMARY STEPS
                             1. enable
                             2. configure terminal
                             3. radius-server attribute 87 circuit-id
                             4. exit
DETAILED STEPS
                      Example:
                      Router# configure terminal
Step 3                radius-server attribute 87 circuit-id                      Overrides the NAS-Port-Id attribute with the Circuit-ID
                                                                                 attribute in RADIUS access and accounting requests.
                      Example:
                      Router(config)# radius-server attribute 87
                      circuit-id
                      Example:
                      Router(config)# exit
SUMMARY STEPS
                           1. enable
                           2. configure terminal
                           3. radius-server attribute 31 remote-id
                           4. exit
DETAILED STEPS
                    Example:
                    Router # configure terminal
Step 3              radius-server attribute 31 remote-id                     Overrides the calling-station-id attribute with Remote-ID
                                                                             attribute in RADIUS access and accounting requests.
                    Example:
                    Router(config)# radius-server attribute 31
                    remote-id
                    Example:
                    Router(config)# exit
SUMMARY STEPS
                           1. enable
                           2. configure terminal
                           3. bba-group pppoe group-name
                           4. vendor-tag remote-id strip
DETAILED STEPS
                     Example:
                     Router# configure terminal
Step 3               bba-group pppoe group-name                             Defines a PPPoE profile and enters BBA group
                                                                            configuration mode.
                     Example:
                     Router(config)# bba-group pppoe pppoe-group
Step 4               vendor-tag remote-id strip                             Enables the BRAS to strip off incoming Vendor-Specific
                                                                            Remote-Id tags from outgoing PADO and PADS packets.
                     Example:
                     Router(config-bba-group)# vendor-tag remote-id
                      strip
SUMMARY STEPS
                           1. Enable the debug radius command to display a report of session activity. In the example shown in this
                              section:
DETAILED STEPS
            Enable the debug radius command to display a report of session activity. In the example shown in this section:
                • The acct_session_id is 79 or 4F in hexadecimal format.
                • In the message Acct-session-id pre-pended with Nas Port = 0/0/0/200, the interface on which the PPPoE discovery
                  frames arrived is FastEthernet0/0.200. The 0/0/0 is Cisco format for slot/subslot/port.
                • The Acct-Session-Id vendor-specific attribute 44 contains the string 0/0/0/200_0000004F, which is a combination
                  of the ingress interface and the session identifier.
Note Strings of interest in the debug radius output log are presented in bold text for purpose of example only.
            Example:
            Router# debug radius
            02:10:49: RADIUS(0000003F): Config NAS IP: 0.0.0.0
            02:10:49: RADIUS/ENCODE(0000003F): acct_session_id: 79
            02:10:49: RADIUS(0000003F): sending
            02:10:49: RADIUS/ENCODE: Best Local IP-Address 10.0.58.141 for Radius-Server 172.20.164.143
            02:10:49: RADIUS(0000003F): Send Access-Request to 172.20.164.143:1645 id 1645/65, len 98
            02:10:49: RADIUS: authenticator 1C 9E B0 A2 82 51 C1 79 - FE 24 F4 D1 2F 84 F5 79
            02:10:49: RADIUS: Framed-Protocol      [7]   6 PPP                       [1]
            02:10:49: RADIUS: User-Name            [1]   7   "peer1"
            02:10:49: RADIUS: CHAP-Password        [3]   19 *
            02:10:49: RADIUS: NAS-Port-Type        [61] 6 Ethernet                   [15]
            02:10:49: RADIUS: NAS-Port             [5]   6   200
            02:10:49: RADIUS: NAS-Port-Id          [87] 22 "FastEthernet6/0.200:"
            02:10:49: RADIUS: Service-Type         [6]   6 Framed                    [2]
            02:10:49: RADIUS: NAS-IP-Address       [4]   6   10.0.58.141
            02:10:49: RADIUS: Received from id 1645/65 172.20.164.143:1645, Access-Accept, len 32 02:10:49:
            RADIUS: authenticator 06 45 84 1B 27 1F A5 C3 - C3 C9 69 6E B9 C0 6F 94
            02:10:49: RADIUS: Service-Type         [6]   6 Framed                    [2]
            02:10:49: RADIUS: Framed-Protocol      [7]   6 PPP                       [1]
            02:10:49: RADIUS(0000003F): Received from id 1645/65
            02:10:49: [62]PPPoE 65: State LCP_NEGOTIATION    Event PPP_LOCAL
            02:10:49: PPPoE 65/SB: Sent vtemplate request on base Vi2
            02:10:49: [62]PPPoE 65: State VACCESS_REQUESTED    Event VA_RESP
            02:10:49: [62]PPPoE 65: Vi2.1 interface obtained
            02:10:49: [62]PPPoE 65: State PTA_BINDING    Event STAT_BIND
            02:10:49: [62]PPPoE 65: data path set to Virtual Acess
            02:10:49: [62]PPPoE 65: Connected PTA
            02:10:49: [62]PPPoE 65: AAA get dynamic attrs
            02:10:49: [62]PPPoE 65: AAA get dynamic attrs
            02:10:49: RADIUS/ENCODE(0000003F):Orig. component type = PPoE
            02:10:49: RADIUS/ENCODE(0000003F): Acct-session-id pre-pended with Nas Port = 0/0/0/200
            02:10:49: RADIUS(0000003F): Config NAS IP: 0.0.0.0
            02:10:49: RADIUS(0000003F): sending
            02:10:49: RADIUS/ENCODE: Best Local IP-Address 10.0.58.141 for Radius-Server 172.20.164.143
            02:10:49: RADIUS(0000003F): Send Accounting-Request to 172.20.164.143:1646 id 1 646/42, len 117
            02:10:49: RADIUS: authenticator 57 24 38 1A A3 09 62 42 - 55 2F 41 71 38 E1 CC 24
            02:10:49: RADIUS: Acct-Session-Id      [44] 20 "0/0/0/200_0000004F"
            02:10:49: RADIUS: Framed-Protocol      [7]   6 PPP                       [1]
            02:10:49: RADIUS: User-Name            [1]   7   "peer1"
            02:10:49: RADIUS: Acct-Authentic       [45] 6 RADIUS                     [1]
            02:10:49: RADIUS: Acct-Status-Type     [40] 6 Start                      [1]
            02:10:49: RADIUS: NAS-Port-Type        [61] 6 Ethernet                   [15]
            02:10:49: RADIUS: NAS-Port             [5]   6   200
            02:10:49: RADIUS: NAS-Port-Id          [87] 22 "FastEthernet6/0.200:"
            02:10:49: RADIUS: Service-Type         [6]   6 Framed                    [2]
            02:10:49: RADIUS: NAS-IP-Address       [4]   6   10.0.58.141
            02:10:49: RADIUS: Acct-Delay-Time      [41] 6    0
        Configuring rx-speed and tx-speed Values When the RADIUS Server Is Not Used
                            When the RADIUS server is not used, the rx-speed and the tx-speed values can be configured in VPDN group
                            configuration or VPDN template configuration mode. The rx-speed and tx-speed values configured in VPDN
                            group configuration mode are specific to the tunnel and are sent to all sessions under the tunnel.
                            Perform this task to configure rx-speed and tx-speed values in VPDN group configuration or VPDN template
                            configuration mode when the RADIUS server is not used.
SUMMARY STEPS
                            1. enable
                            2. configure terminal
                            3. vpdn enable
                            4. Do one of the following:
                                     • vpdn-group name
                                     • vpdn-template name
DETAILED STEPS
                 Example:
                 Router# configure terminal
                 Example:
                 Router(config)# vpdn enable
                 Example:
                 Router(config)# vpdn-group 1
                 Example:
                 Router(config)# vpdn-template 1
Step 7           end                                              Exits VPDN group configuration mode and returns to privileged
                                                                  EXEC mode.
                 Example:
                 Router(config-vpdn)# end
        Configuring rx-speed and tx-speed Values from ANCP on the RADIUS Server
                           ANCP sends the upstream and downstream values to L2TP. The upstream value is the rx-speed value and the
                           downstream value is the tx-speed value.
                           Perform this task on the RADIUS server to configure rx-speed and tx-speed values from ANCP.
SUMMARY STEPS
                           1. enable
                           2. configure terminal
                           3. vpdn enable
                           4. Do one of the following:
                                    • vpdn-group name
                                    • vpdn-template name
DETAILED STEPS
            Example:
            Router# configure terminal
            Example:
            Router(config)# vpdn enable
            Example:
            Router(config)# vpdn-group 1
            Example:
            Router(config)# vpdn-template 1
Step 5      l2tp rx-speed ancp [value]        Sends the rx-speed value to LNS if a value is not configured for ANCP.
                                                   • If the rx-speed value is not configured for ANCP and the rx-speed value is
            Example:                                 not provided in the command, L2TP sends the rx-speed value configured
            Router(config-vpdn)# l2tp                in VPDN group configuration or VPDN template configuration mode.
            rx-speed ancp 15000
                                                   • If the rx-speed value is not configured in VPDN group configuration or
                                                     VPDN template configuration mode, L2TP sends the average rate traffic
                                                     shaping value to LNS.
                                                   • For ATM interfaces, if the average rate traffic shaping value is not
                                                     configured, L2TP sends the rx-speed value configured in VC-class
                                                     configuration mode. If the rx-speed value is not configured in VC-class
                                                     configuration mode, L2TP sends the rx-speed value obtained from PPPoE.
                                                   • For Ethernet interfaces, if the average rate traffic shaping value is not
                                                     configured, L2TP sends the rx-speed value obtained from PPPoE.
Step 6 l2tp tx-speed ancp [value] Sends the tx-speed value to LNS if a value is not configured for ANCP.
Step 7 end Exits VPDN group configuration mode and returns to privileged EXEC mode.
               Example:
               Router(config-vpdn)# end
        Configuring rx-speed and tx-speed Values from RAM-min on the RADIUS Server
                           Perform this task on the RADIUS server to configure the rx-speed and tx-speed values from RAM-min.
SUMMARY STEPS
                         1. enable
                         2. configure terminal
                         3. vpdn enable
                         4. Do one of the following:
                                  • vpdn-group name
                                  • vpdn-template name
DETAILED STEPS
             Example:
             Router# configure terminal
             Example:
             Router(config)# vpdn enable
             Example:
             Router(config)# vpdn-group 1
             Example:
             Router(config)# vpdn-template 1
Step 6         l2tp tx-speed ram-min [value]                 Sends the tx-speed value to LNS if the average rate traffic shaping value is
                                                             not configured.
               Example:                                          • For ATM interfaces, if the average rate traffic shaping value is not
               Router(config-vpdn)# l2tp tx-speed                  configured and the tx-speed value is not provided in the command,
               ram-min 15000                                       L2TP sends the peak cell rate (PCR) value configured using the vbr-nrt
                                                                   command in VC-class configuration mode. If the tx-speed value is not
                                                                   configured in VC-class configuration mode, L2TP sends the tx-speed
                                                                   value obtained from PPPoE.
                                                                 • For Ethernet interfaces, if the average rate traffic shaping value is not
                                                                   configured and the tx-speed value is not provided in the command,
                                                                   L2TP sends the tx-speed value obtained from PPPoE.
Step 7         end                                           Exits VPDN group configuration mode and returns to privileged EXEC
                                                             mode.
               Example:
               Router(config-vpdn)# end
SUMMARY STEPS
                         1. enable
                         2. configure terminal
                         3. vpdn enable
                         4. vpdn-group name
                         5. l2tp security ip address-check
                         6. exit
DETAILED STEPS
                  Example:
                  Router# configure terminal
Step 3            vpdn enable                                Enables virtual private dialup networking on the router and informs
                                                             the router to look for tunnel definitions in a local database or on a
                  Example:                                   remote authorization server (home gateway), if one is present.
Step 4            vpdn-group name                            Creates a VPDN group and enters VPDN group configuration
                                                             mode.
                  Example:
                  Router(config)# vpdn-group example
Step 5            l2tp security ip address-check             Configures the LNS to compare the IP addresses contained in the
                                                             inbound and outbound message to ensure they are identical. If the
                  Example:                                   IP addresses to not match, the L2TP tunnel is not established.
                  Example:
                  Router(config-vpdn)# exit
SUMMARY STEPS
                            1. enable
                            2. show vpdn dead-cache {group name | all}
                            3. exit
DETAILED STEPS
Step 2               show vpdn dead-cache {group name | all}               Displays the status of any LNS in a dead-cache state, including
                                                                           how long the entry has been in the dead-cache state.
                     Example:
                     Router# show vpdn dead-cache all
                     Example:
                     Router# exit
                           This procedure shows how to clear an LNS in a dead-cache state. Once an entry clears from the dead-cache
                           state, the entry is available for new session establishments and calls.
SUMMARY STEPS
                           1. enable
                           2. clear vpdn dead-cache {group name | ip-address ip-address | all}
                           3. exit
DETAILED STEPS
Step 2              clear vpdn dead-cache {group name | ip-address                Clears the designated LNS from the dead-cache state.
                    ip-address | all}
                    Example:
                    Router# clear vpdn dead-cache ip-address
                    10.10.10.1
                    Example:
                    Router# exit
SUMMARY STEPS
                             1. enable
                             2. configure terminal
                             3. snmp-server enable traps vpdn dead-cache
                             4. exit
DETAILED STEPS
                      Example:
                      Router# configure terminal
Step 3                snmp-server enable traps vpdn dead-cache                   Enables the generation of an SNMP event whenever an
                                                                                 LNS enters or exits the dead-cache state.
                      Example:
                      Router(config)# snmp-server enable traps vpdn
                      dead-cache
                      Example:
                      Router(config)# exit
To generate a syslog event when an LNS enters or exits the dead-cache state, follow this procedure.
SUMMARY STEPS
                         1. enable
                         2. configure terminal
                         3. vpdn logging dead-cache
                         4. exit
DETAILED STEPS
                    Example:
                    Router# configure terminal
Step 3              vpdn logging dead-cache                                Enables the generation of a syslog event when an LNS
                                                                           enters or exits the dead-cache state.
                    Example:
                    Router(config)# vpdn logging dead-cache
                    Example:
                    Router(config)# exit
                        vpdn enable
                        vpdn search-order domain dnis
                        The following example enables VPDN and multihop, and configures a tunnel authorization search order of
                        multihop hostname first, then domain, then DNIS number. This configuration is used only on a tunnel switch.
                        vpdn enable
                        vpdn multihop
                        vpdn search-order multihop-hostname domain dnis
                        vpdn enable
                        vpdn authen-before-forward
                        The following example enables VPDN and configures per-user VPDN on the NAS for dial-in VPDN tunnels
                        belonging to the VPDN group named cisco1. The first time the NAS contacts the remote RADIUS AAA
                        server, the entire structured username will be sent rather than just the domain name or DNIS number.
                        vpdn enable
                        vpdn-group cisco1
                         request-dialin
                          protocol l2tp
                          exit
                         authen-before-forward
                        vpdn enable
                        !
                        aaa new-model
                        aaa authentication login default local
                        aaa authentication ppp default local
                        aaa authorization network default local
                        The following examples enables VPDN and configures the NAS and the tunnel server for dial-in VPDN
                        tunnels when remote RADIUS AAA authentication occurs at the NAS:
NAS Configuration
                       vpdn enable
                       !
                       aaa new-model
                       aaa authentication login default radius
                       aaa authentication ppp default radius
                       aaa authorization network default radius
                       aaa accounting network default start-stop radius
                       radius-server host 10.1.1.1 auth-port 1939 acct-port 1443
                       vpdn aaa untagged
                       vpdn enable
                       !
                       aaa new-model
                       aaa authentication login default radius
                       aaa authentication ppp default radius
                       aaa authorization network default radius
                       aaa accounting network default start-stop radius
                       vpdn aaa attribute nas-ip-address vpdn-nas
                       vpdn aaa untagged
                       The Basic TACACS+ Configuration Example document provides a basic configuration of TACACS+ for
                       user dialup authentication to a NAS.
Examples Configuring Remote AAA for VPDNs on the L2TP Tunnel Terminator
                       The following example enables VPDN and configures the NAS and the tunnel server for dial-in VPDN tunnels
                       with remote RADIUS AAA authentication occurring at the tunnel server. A sample RADIUS user profile for
                       the remote RADIUS AAA server is also shown.
NAS Configuration
                       vpdn enable
                       !
                       aaa new-model
                       aaa authentication login default radius
                       aaa authentication ppp default radius
                       aaa authorization network default radius
                       aaa accounting network default start-stop radius
                       radius-server host 10.1.1.1 auth-port 1939 acct-port 1443
                       vpdn aaa untagged
                       vpdn enable
                       !
                       aaa new-model
                       aaa authentication login default radius
                       aaa authentication ppp default radius
                       aaa authorization network default mymethodlist group myvpdngroup
                       radius-server host 10.2.2.2 auth-port 1939 acct-port 1443
                       aaa group server radius myvpdngroup
                        server 10.2.2.2 auth-port 1939 acct-port 1443
                       !
                       vpdn tunnel authorization network mymethodlist
                       vpdn tunnel authorization virtual-template 1
                        vpdn enable
                        !
                        aaa new-model
                        aaa authentication login default radius
                        aaa authentication ppp default radius
                        aaa authorization network default mymethodlist group myvpdngroup
                        radius-server host 10.3.3.3 auth-port 1939 acct-port 1443
                        aaa group server radius myvpdngroup
                         server 10.3.3.3 auth-port 1939 acct-port 1443
                        !
                        ip host example.com 10.3.3.3
                        radius-server directed-request
                        vpdn authorize directed-request
                        The following example enables VPDN and configures per-user VPDN, remote TACACS+ AAA, and VPDN
                        authentication of directed request users on the NAS:
                        vpdn enable
                        vpdn-group 1
                         request-dialin
                          protocol l2tp
                          domain example.com
                        !
                         initiate-to 10.3.3.3
                         local name local1
                         authen-before-forward
                        !
                        aaa new-model
                        aaa authentication login default tacacs
                        aaa authentication ppp default tacacs
                        aaa authorization network default mymethod group mygroup
                        radius-server host 10.4.4.4 auth-port 1201 acct-port 1450
                        aaa group server tacacs mygroup
                         server 10.3.3.3 auth-port 1201 acct-port 1450
                        !
                        ip host example.com 10.3.3.3
                        radius-server directed-request
                        vpdn authorize directed-request
                       The following example configures the router to strip the domain name from usernames only for users associated
                       with the VRF instance named abc. The default suffix delimiter @ will be used for generic suffix stripping.
NAS Configuration
                       hostname NAS1
                       username tunnelserver1 password supersecret
                       vpdn-group 1
                        local name tunnelserver1
                        exit
                       username NAS1 password supersecret
                       The following example configures VPDN tunnel authentication using the local name on the NAS and the
                       L2TP tunnel password on the tunnel server. Note that the secret password configured for each device matches.
NAS Configuration
                        vpdn-group 2
                         local name NAS6
                        !
                        username tunnelserver12 password verysecret
                        vpdn-group 4
                         l2tp tunnel password verysecret
                         local name tunnelserver12
                         exit
                        username NAS6 password verysecret
                        The following example configures VPDN tunnel authentication using the L2TP tunnel password on both the
                        NAS and the tunnel server. Note that the secret password configured for each device matches.
NAS Configuration
                        vpdn-group l2tp
                         l2tp tunnel password rathersecret
                        vpdn-group 46
                         l2tp tunnel password rathersecret
                        aaa new-model
                        !
                        aaa authentication ppp default group radius
                        aaa authorization network default local
                        aaa accounting network m1 start-stop group radius
                        aaa accounting network m2 stop-only group radius
                        aaa session-id common
                        enable secret 5 $1$IDjH$iL7puCja1RMlyOM.JAeuf/
                        enable password secret
                        !
                        username ISP-LAC password 0 tunnelpass
                        !
                        resource-pool disable
                        !
                        ip subnet-zero
                        ip cef
                        no ip domain-lookup
                        ip host myhost 172.16.1.129
                        !
                        vpdn enable
                        vpdn tunnel accounting network m1
                        vpdn session accounting network m1
                        vpdn search-order domain dnis
                        !
                        vpdn-group 1
                         request-dialin
                         protocol l2tp
                         domain cisco.com
                         initiate-to ip 10.1.26.71
                       aaa new-model
                       !
                       aaa accounting network m1 start-stop group radius
                       aaa accounting network m2 stop-only group radius
                       aaa session-id common
                       enable secret 5 $1$ftf.$wE6Q5Yv6hmQiwL9pizPCg1
                       !
                       username ENT_LNS password 0 tunnelpass
                       username user1@cisco.com password 0 lab
                       username user2@cisco.com password 0 lab
                       !
                       radius-server retransmit 3
                       call rsvp-sync
Per-User Configuration
Domain Configuration
                       interface GigabitEthernet3/1/0.30880387
                         encapsulation dot1Q 3088 second-dot1q 20
                         ancp neighbor name ancp-neighbor id 0016.fa11.0488 client-ID "12.124.234.132/0.0.0.0 eth
                        3/4/1.32"
                         pppoe enable group test2
                         service-policy output speed:ether:22000:1200:06/0
                       !
                       policy-map speed:ether:22000:1200:06/0
                            class class-default
                           shape average 10281000 !10,281 Mbps is so-called Rate Adaptive Mode (RAM) MIN value!
                       !
                       The following example shows how to configure rx-speed and tx-speed values for an ATM interface when the
                       rx-speed and tx-speed values, including 0, 0, are not configured in the RADIUS server. The average rate
                       traffic shaping value is configured for the Ethernet interface. If the average rate traffic shaping value for the
                       default class in policy-map class configuration mode is not configured, the rx-speed and tx-speed values
                       specified in the l2tp rx-speed and l2tp tx-speed commands are configured for the ATM interface.
                        values are not configured for ANCP, the rx-speed and tx-speed values specified in the l2tp rx-speed and l2tp
                        tx-speed commands are configured for the Ethernet interface.
                        hostname Client
                        !
                        enable password example
                        !
                        no aaa new-model
                        !
                        vpdn enable
                        !
                        bba-group pppoe 1
                         virtual-template 1
                        !
                        interface <interface toward LAC>
                         pppoe enable group 1
                        !
                        interface Virtual-Template 1
                         ip unnumbered <interface>
                         ppp pap sent-username@example.com
                        !
                        end
                        The following shows an example configuration for the LAC.
hostname LAC
                       !
                       enable password example
                       !
                       no aaa new-model
                       !
                       vpdn enable
                       !
                       vpdn-group 1
                        request-dialin
                        protocol l2tp
                        domain example.com
                        initiate-to ip <lns 1 IP address>
                        l2tp tunnel password 0 example
                       !
                       bba-group pppoe 1
                        virtual-template 1
                       !
                       interface Virtual-Template 1
                        no ip address
                        ppp authentication pap
                       !
                       interface <interface>
                        pppoe enable group 1
                       !
                       end
                       The following shows an example configuration for the LNS 1.
                       hostname LNS1
                       !
                       enable password example
                       !
                       aaa authentication ppp default local
                       !
                       vpdn enable
                       !
                       vpdn-group 1
                       !Default L2TP VPDN group
                        accept-dialin
                        protocol l2tp
                        virtual-template 1
                        l2tp tunnel password 0 example
                       !
                       vpdn-group 2
                        request-dialin
                        protocol l2tp
                        domain example.com
                        initiate-to ip <lns 2 IP address>
                        l2tp tunnel password 0 example
                       !
                       interface Virtual-Template 1
                        ip unnumbered <interface>
                        ppp authentication pap
                       !
                       end
                       Router> enable
                       Router# show vpdn dead-cache    all
                       vpdn-group     ip address        down time
                       exampleA     192.168.2.2        00:10:23
                       exampleB     192.168.4.2        00:10:16
                       exampleB     192.168.4.3        00:10:15
                       exampleB     192.168.4.4        00:10:12
                         The following shows an example configuration to clear an LNS, based on its IP address, from the dead-cache
                         state:
Where to Go Next
                         Depending on the type of VPDN deployment you are configuring, you should perform the tasks in one of
                         these modules:
                            • To configure a NAS-initiated tunneling deployment, proceed to the Configuring NAS-Initiated Dial-In
                              VPDN Tunneling module.
                            • To configure a multihop MMP or multihop tunnel switching VPDN deployment, proceed to the
                              Configuring Multihop VPDN module.
Additional References
                         Related Documents
                         VPDN commands: complete command syntax,              Cisco IOS VPDN Command Reference
                         command mode, defaults, usage guidelines, and
                         examples
                       Security commands: complete command syntax,         Cisco IOS Security Command Reference
                       command mode, defaults, usage guidelines, and
                       examples
                       Dial Technologies commands: complete command        Cisco IOS Dial Technologies Command Reference
                       syntax, command mode, defaults, usage guidelines,
                       and examples
Standards
                       Standard                                            Title
                       DSL Forum 2004-72                                   --
MIBs
RFCs
                       RFC                                                 Title
                       RFC 2516                                            A Method for Transmitting PPP Over Ethernet
                                                                           (PPPoE)
Technical Assistance
                          Description                                           Link
                          The Cisco Support and Documentation website             http://www.cisco.com/cisco/web/support/index.html
                          provides online resources to download documentation,
                          software, and tools. Use these resources to install and
                          configure the software and to troubleshoot and resolve
                          technical issues with Cisco products and technologies.
                          Access to most tools on the Cisco Support and
                          Documentation website requires a Cisco.com user ID
                          and password.
                          RADIUS Attribute 82: Tunnel           Cisco IOS XE Release 2.1          This feature allows the L2TP NAS
                          Assignment ID                                                           to group users from different
                                                                                                  per-user or domain RADIUS
                                                                                                  profiles into the same active tunnel
                                                                                                  if the tunnel endpoints, tunnel type,
                                                                                                  and Tunnel-Assignment-ID are
                                                                                                  identical.
                                                                                                  No commands were introduced or
                                                                                                  modified by this feature.
                       RFC-2867 RADIUS Tunnel        Cisco IOS XE Release 2.1       This feature introduces six new
                       Accounting                                                   RADIUS accounting types that are
                                                                                    used with the RADIUS accounting
                                                                                    attribute Acct-Status-Type
                                                                                    (attribute 40), which indicates
                                                                                    whether an accounting request
                                                                                    marks the beginning of user service
                                                                                    (start) or the end (stop).
                                                                                    The following commands were
                                                                                    introduced or modified by this
                                                                                    feature: aaa accounting, vpdn
                                                                                    session accounting network, vpdn
                                                                                    tunnel accounting network.
                       Tunnel Authentication via     Cisco IOS XE Release 2.1       This feature allows the L2TP
                       RADIUS on Tunnel Terminator                                  tunnel server to perform remote
                                                                                    authentication and authorization
                                                                                    with RADIUS on incoming L2TP
                                                                                    NAS dial-in connection requests.
                                                                                    This feature also allows the L2TP
                                                                                    NAS to perform remote
                                                                                    authentication and authorization
                                                                                    with RADIUS on incoming L2TP
                                                                                    tunnel server dial-out connection
                                                                                    requests.
                                                                                    The following commands were
                                                                                    introduced by this feature: vpdn
                                                                                    tunnel authorization network,
                                                                                    vpdn tunnel authorization
                                                                                    password, vpdn tunnel
                                                                                    authorization virtual-template.
                       L2TP Forwarding of PPPoE      Cisco IOS XE Release 2.4       This feature was introduced on
                       Tagging Information                                          Cisco ASR 1000 Series Routers.
                         Modified LNS Dead-Cache          Cisco IOS XE Release 2.4     This feature displays and clears
                         Handling                                                      (restarts) any LNS entry in a
                                                                                       dead-cache (DOWN) state.
                                                                                       The following commands were
                                                                                       introduced by this feature: clear
                                                                                       vpdn dead-cache, show vpdn
                                                                                       dead-cache.
                                                                                       The following commands were
                                                                                       modified by this feature:
                                                                                       snmp-server enable traps, vpdn
                                                                                       logging.
                         Configurable Domain Name Prefix Cisco IOS XE Release 2.5      This feature allows the NAS to be
                         and Suffix Stripping for the                                  configured to strip prefixes,
                         TACACS+ server                                                suffixes, or both from the full
                                                                                       username. The reformatted
                                                                                       username is then forwarded to the
                                                                                       remote AAA server.
                                                                                       The following command was
                                                                                       introduced or modified by this
                                                                                       feature: tacacs-server
                                                                                       domain-stripping.
                         ANCP values configuration support Cisco IOS XE Release 3.2S   This feature allows L2TP to send
                         on LNS                                                        the rx-speed and tx-speed values
                                                                                       configured in VPDN group
                                                                                       configuration or VPDN template
                                                                                       configuration mode, or the rx-speed
                                                                                       and the tx-speed values configured
                                                                                       on the RADIUS server, to LNS.
                                                                                       The following commands were
                                                                                       introduced by this feature: l2tp
                                                                                       rx-speed, l2tp tx-speed.