This section provides an example for configuring the delivery of the EDSG prepaid service through a RADIUS server.
On the network shown in Figure 1, PPPoE users access network 1 at 192.168.100.0/24 and network 2 at 192.168.200.0/24. Different fees need to be charged for traffic over networks 1 and 2. The users have different bandwidth requirements for networks 1 and 2. The uplink and downlink traffic bandwidths for access to network 1 and network 2 are limited to 1 Mbit/s and 2 Mbit/s, respectively. In addition, the prepaid function needs to be enabled for the users. To meet these requirements, configure two EDSG services on the BRAS to implement differentiated accounting, rate limit, and prepaid functions on traffic over network 1 and network 2. EDSG allows carriers to provide flexible service and accounting policies for different user requirements.
In this example, interfaces 1 through 3, sub-interface 3.1, and sub-interface 3.2 represent GE 0/1/2, GE 0/1/1, GE 0/1/0, GE 0/1/0.1, and GE 0/1/0.2, respectively.
The AAA server shown in Figure 1 also functions as a policy server and delivers services through RADIUS.
Policy server parameters, such as the IP address and port number
EDSG traffic policy parameters, such as the service group name, ACL rule, traffic classifier, traffic behavior, and traffic policy
RADIUS server group name, IP address and port number of a RADIUS authentication server, and IP address and port number of a RADIUS accounting server used for an EDSG service policy
Authentication scheme name, authentication mode, accounting scheme name, and accounting mode used for an EDSG service policy
Name of the local address pool used in the domain, gateway address, and address pool range used for a user domain
EDSG service policy parameters, such as the mode in which EDSG service policies are downloaded, EDSG service policy name, name of the bound RADIUS server group, authentication scheme, accounting scheme, and bandwidths for uplink and downlink traffic rate limiting for EDSG services
RADIUS server group name, IP address and port number of a RADIUS authentication server, and IP address and port number of a RADIUS accounting server used for a prepaid profile
Authentication scheme name, authentication mode, accounting scheme name, and accounting mode used for a prepaid profile
Prepaid function parameters, such as the prepaid profile name, bound RADIUS server group, authentication scheme, accounting scheme, password used for the BRAS to apply for an EDSG service quota from the RADIUS server group, time and traffic volume thresholds, and policy used when the service quota is exhausted.
<HUAWEI> system-view [~HUAWEI] value-added-service enable *HUAWEI] commit
# Set the RADIUS server group name to rad_group1, the RADIUS authentication server's IP address and port number to 10.10.10.2 and 1812, the RADIUS accounting server's IP address and port number to 10.10.10.2 and 1813, and the shared key for the RADIUS authentication and accounting servers to huawei_123.
[~HUAWEI] radius-server group rad_group1 [*HUAWEI-radius-rad_group1] radius-server authentication 10.10.10.2 1812 [*HUAWEI-radius-rad_group1] radius-server accounting 10.10.10.2 1813 [*HUAWEI-radius-rad_group1] radius-server shared-key-cipher huawei_123 [*HUAWEI-radius-rad_group1] commit [~HUAWEI-radius-rad_group1] quit
For details about how to configure a RADIUS server group, see Configuring a RADIUS Server in HUAWEI NetEngine 8000 F Series Configuration Guide - User Access.
# Configure an AAA authentication scheme named auth1 and specify RADIUS authentication as the authentication mode.
[~HUAWEI] aaa [*HUAWEI-aaa] authentication-scheme auth1 [*HUAWEI-aaa-authen-auth1] authentication-mode radius [*HUAWEI-aaa-authen-auth1] commit [~HUAWEI-aaa-authen-auth1] quit
# Configure an AAA accounting scheme named acct1 and specify RADIUS accounting as the accounting mode.
[~HUAWEI-aaa] accounting-scheme acct1 [*HUAWEI-aaa-accounting-acct1] accounting-mode radius [*HUAWEI-aaa-accounting-acct1] quit [*HUAWEI-aaa] commit [~HUAWEI-aaa] quit
# Configure the mode "first from local configurations and then from an RADIUS server." In this mode, the BRAS first attempts to obtain an EDSG service policy from local configurations. If no EDSG service policy is locally configured, the BRAS obtains an EDSG service policy from an RADIUS server.
[~HUAWEI] service-policy download local radius rad_group1 password cipher huawei_123 *HUAWEI] commit
# Configure a local address pool named edsg_pool, set the gateway address to 172.31.0.1/16, and specify the address range as 172.31.0.2 to 172.31.255.255.
[~HUAWEI] ip pool edsg_pool bas local [*HUAWEI-ip-pool-edsg_pool] gateway 172.31.0.1 255.255.0.0 [*HUAWEI-ip-pool-edsg_pool] section 0 172.31.0.2 172.31.255.255 [*HUAWEI-ip-pool-edsg_pool] commit [~HUAWEI-ip-pool-edsg_pool] quit
# Bind the local address pool edsg_pool and the RADIUS server group rad_group1 to an AAA domain.
[~HUAWEI] aaa [*HUAWEI-aaa] domain domain1 [*HUAWEI-aaa-domain-domain1] ip-pool edsg_pool [*HUAWEI-aaa-domain-domain1] radius-server group rad_group1 [*HUAWEI-aaa-domain-domain1] quit [*HUAWEI-aaa] commit [~HUAWEI-aaa] quit
# Configure the RADIUS server to deliver the RADIUS attribute User-Password with a value of huawei_123 for PPPoE user 1 and PPPoE user 2.
The shared key configured for a RADIUS server group determines the value of the User-Password attribute.
# Configure the RADIUS server to deliver the RADIUS attribute Huawei-Account-Info (vendor ID=2011; attribute number=184) with a value of Aservice_edsg1;d1;huawei for PPPoE user 1.
# Configure the RADIUS server to deliver the RADIUS attribute Huawei-Account-Info (vendor ID=2011; attribute number=184) with a value of Aservice_edsg2;d2;huawei for PPPoE user 2.
The Huawei-Account-Info attribute starting with A followed by the service policy name service_edsg1 is used in authentication response packets to deliver EDSG services that automatically take effect after being delivered; d1 and huawei indicate the authentication name and password, respectively, to be used for service authentication.
The Huawei-Account-Info attribute starting with A followed by the service policy name service_edsg2 is used in authentication response packets to deliver EDSG services that automatically take effect after being delivered; d2 and huawei indicate the authentication name and password, respectively, to be used for service authentication.
For details about the RADIUS attribute dictionary used in this step, see Description > Feature Description > User Access > Appendix: RADIUS Attributes > RADIUS Attribute Dictionary.
The RADIUS attribute names displayed in this step must be the same as those in the RADIUS attribute dictionary loaded to the RADIUS server. If they are different, change the RADIUS attribute names to be the same as those in the RADIUS attribute dictionary based on the vendor ID and attribute number.
# Configure the RADIUS server to deliver the RADIUS attribute Session-Timeout with a value of 120s for user 1. This attribute indicates the remaining service time.
# Obtain the ID of the online user.
<HUAWEI> display value-added-service user edsg
The used user id table are:
128000
128001
# View detailed information about the EDSG service when the user has used the EDSG service for 60s and the BRAS sends CoA messages to the RADIUS server in advance to apply for a new time.
<HUAWEI> display value-added-service user user-id 128000 edsg service-index 0 ------------------------------------------------------- Service index : 0 Service name : service_edsg1 Service type : EDSG Service state : Active Service group : s_1m Service group priority : 0 Authentication method : None Account method : Radius Radius server template : rad_group1 Account session id : HUAWEI05001SSG000100f5fcb5128034 Service online time(HH:MM:SS) : 00:01:00 Up committed information rate : 1000(kbps) Up Peak information rate : 1000(kbps) Up committed burst size : 187000(bytes) Up Peak burst size : 187000(bytes) Down committed information rate : 1000(kbps) Down Peak information rate : 1000(kbps) Down committed burst size : 187000(bytes) Down Peak burst size : 187000(bytes) Up flow packets(high, low) : (0, 0) Up flow bytes(high, low) : (0, 0) Down flow packets(high, low) : (0, 0) Down flow bytes(high, low) : (0, 0) Prepaid state : Monitoring Time quota : 60(seconds) Time threshold : 120(seconds) -------------------------------------------------------
# View service deactivation information. The command output shows that the user service has been deactivated after 120s.
<HUAWEI> display service deactivate-record
-------------------------------------------------------------------
Policy name : service_edsg1
User ID : 128000
Service index : 0
Access time : 2013-10-17 17:41:03
Deavtivate time : 2013-10-17 17:45:33
Deactivate reason : The server does not reply with prepaid authorization response
# Configure the RADIUS server to deliver the RADIUS attribute Huawei-Remanent-Volume (Vendor ID=2011, Attribute number=15) with a value of 100M for user 2. The RADIUS attribute Huawei-Remanent-Volume indicates the remaining traffic volume of user 2.
# View the status information of the prepaid profile prepaid2.
<HUAWEI> display prepaid-profile name prepaid2
------------------------------------------------
Prepaid-profile-index : 1
Prepaid-profile-name : prepaid2
Prepaid-password : ******
Reference-count : 0
Authentication-scheme-name : auth1
Accounting-scheme-name : acct1
Radius-server-template : rad_group1
Time-threshold : 300(s)
Volume-threshold : 20(Mbytes)
Quota-out-action : service deactivate
HTTP-redirect-profile : http_redirect_profile
------------------------------------------------
# View detailed information about the EDSG service with a service index of 0 and a user ID of 128001.
<HUAWEI> display value-added-service user user-id 128001 edsg service-index 0 ------------------------------------------------------- Service index : 0 Service name : service_edsg2 Service type : EDSG Service state : Active Service group : s_2m Service group priority : 0 Authentication method : None Account method : Radius Radius server template : rad_group1 Account session id : HUAWEI05001SSG000100f5fcb5128034 Service online time(HH:MM:SS) : 00:04:28 Up committed information rate : 6000(kbps) Up Peak information rate : 6000(kbps) Up committed burst size : 1122000(bytes) Up Peak burst size : 1122000(bytes) Down committed information rate : 6000(kbps) Down Peak information rate : 6000(kbps) Down committed burst size : 1122000(bytes) Down Peak burst size : 1122000(bytes) Up flow packets(high, low) : (0, 248230) Up flow bytes(high, low) : (0, 25815920) Down flow packets(high, low) : (0, 0) Down flow bytes(high, low) : (0, 0) Prepaid state : Exhausted Volume quota : (0, 8966321)(bytes) Volume threshold : (0, 104857600)(bytes) HTTP redirect profile : http_redirect_profile Source : Diameter -------------------------------------------------------
HUAWEI configuration file
# sysname HUAWEI # value-added-service enable # radius-server group rad_group1 radius-server authentication 10.10.10.2 1812 weight 0 radius-server accounting 10.10.10.2 1813 weight 0 radius-server shared-key-cipher %^%#x*CgITP4C~;q,*+DEW'JBWe#)"Q&|7bX]b:Y<{w'%^%# # ip pool edsg_pool bas local gateway 172.31.0.1 255.255.0.0 section 0 172.31.0.2 172.31.255.255 # aaa authentication-scheme auth1 authentication-scheme radius accounting-scheme acct1 accounting-mode radius domain domain1 ip-pool edsg_pool radius-server group rad_group1 # service-group s_1m service-group s_2m # acl number 6020 rule 10 permit ip source service-group s_1m destination ip-address 192.168.100.0 0.0.0.255 rule 20 permit ip source ip-address 192.168.100.0 0.0.0.255 destination service-group s_1m # acl number 6021 rule 15 permit ip source service-group s_2m destination ip-address 192.168.200.0 0.0.0.255 rule 25 permit ip source ip-address 192.168.200.0 0.0.0.255 destination service-group s_2m # traffic classifier c1 operator or if-match acl 6020 # traffic classifier c2 operator or if-match acl 6021 # traffic behavior b1 # traffic behavior b2 # traffic policy traffic_policy_edsg share-mode classifier c1 behavior b1 classifier c2 behavior b2 # traffic-policy traffic_policy_edsg inbound traffic-policy traffic_policy_edsg outbound # aaa authentication-scheme auth1 # accounting-scheme acct1 # # http-redirect-profile http_redirect_profile web-server url http://www.huawei.com web-server mode post # prepaid-profile prepaid1 password cipher $$e:TY%^%glhJ;yPG#$=tC&(Is%q!S_";(k.Ef$%^%#:978 authentication-scheme auth1 accounting-scheme acct1 radius-server group rad_group1 threshold time 60 seconds threshold volume 10 mbytes # prepaid-profile prepaid2 password cipher $$e:TY%(k.Ef$%^%#:978^%glhJ;yPG#$=tC&(Is%q!S_"; authentication-scheme auth1 accounting-scheme acct1 radius-server group rad_group1 threshold time 300 seconds threshold volume 20 mbytes quota-out redirect http_redirect_profile # service-policy download local radius rad_group1 password cipher $J;yPG#$=tC&(Is%q!S_";$e:TY%(k.Ef$%^%#:978^%glh # service-policy name service_edsg1 edsg radius-server group rad_group1 service-group s_1m authentication-scheme auth1 accounting-scheme acct1 rate-limit cir 1000 inbound rate-limit cir 1000 outbound prepaid-profile prepaid1 # service-policy name service_edsg2 edsg radius-server group rad_group1 service-group s_2m authentication-scheme auth1 accounting-scheme acct1 rate-limit cir 2000 inbound rate-limit cir 2000 outbound prepaid-profile prepaid2 # interface GigabitEthernet0/1/1 ip address 10.10.10.1 255.255.255.0 # interface GigabitEthernet0/1/2.1 user-vlan 1000 2000 user-vlan 1 1000 qinq 100 bas # access-type layer2-subscriber default-domain pre-authentication domain1 authentication-method ppp web # interface GigabitEthernet0/1/0.1 vlan-type dot1q 1 ip address 192.168.100.1 255.255.255.0 # interface GigabitEthernet0/1/0.2 vlan-type dot1q 2 ip address 192.168.200.1 255.255.255.0 # return