When an interface is used for broadband access, you need to configure it as a BAS interface, and then specify the user access type and attributes for the interface.
When configuring a BAS interface, you need the following parameters:
BAS interface number
Access type and authentication scheme
(Optional) Maximum number of users allowed access through the BAS interface and maximum number of users allowed access in a specified VLAN
(Optional) Default domain, roaming domain, and domains that users are allowed to access
(Optional) Whether to enable proxy ARP, DHCP broadcast, accounting packet copy, IP packet-triggered user login, and user-based multicast replication
(Optional) Whether to trust client-reported Access-Line-Id information, user detection parameters, VPN instances of non-PPP users, and BAS interface name
The system view is displayed.
The interface view is displayed.
In scenarios of BRAS access through L2VPN termination, run the ve-group ve-group-id l2-terminate command to configure a VE interface as an L2VE interface to terminate an L2VPN and bind the interface to a VE-group. In scenarios of BRAS access through L3VPN termination, run the ve-group ve-group-id l3-terminate command to configure a VE interface as an L3VE interface to terminate an L3VPN and bind the interface to a VE-group. The preceding commands are configured in the VE interface view. Only Layer 3 static user access is supported in scenarios of BRAS access through L3VPN termination. For details, see Example for Configuring BRAS Access Through L3VPN Termination.
A BAS interface is created, and the BAS interface view is displayed.
You can configure an interface as the BAS interface by running the bas command in the interface view. You can configure an Ethernet interface or its sub-interface, a VE interface or its sub-interface, or an Eth-Trunk interface or its sub-interface as a BAS interface.
When setting the access type of a BAS interface, you can set the service attributes of the access users at the same time. You can also set these attributes in later configurations.
The access type cannot be configured on the Ethernet interface that is added to an Eth-Trunk interface. You can configure the access type of such an Ethernet interface only on the associated Eth-Trunk interface.
When configuring static routes for Layer 3 users, specify the next hop as the user IP address and do not specify the outbound interface. Otherwise, network-to-user traffic may fail to be forwarded.
If a BAS interface has an online user, you can change the access type of the BAS interface only when the online user is a leased line user.
After the access type is set to leased line access, the NetEngine 8000 F performs authentication on the leased line users immediately.
The hostcar hash rule is configured as the 128 bits of IPv6 address for the Layer 3 IPv6 user packets on a BAS interface.
Before running the ipv6 hostcar hash-arithmetic all-ip command, you need to set the access type of the BAS interface to Layer 3 common access.
You are advised to run this command on the BAS interface through which Layer 3 static IPv6 users go online. You are not advised to run this command on the BAS interface through which Layer 3 static IPv6 prefix users go online.
Suppression of leased line user access is enabled.
If the duration or traffic volume quota delivered by the RADIUS server to a leased line user is 0, the leased line user can go online but will go offline immediately. This results in frequent login and logout of leased line users.
The command can be run to configure the maximum allowable number of connection requests, the interval at which connection requests can be sent, and a blocking period.
The BAS interface is configured to trust the 802.1p priority of VLAN packets.
The trust 8021p-protocol command can be configured only if the access type is set to Layer 2 subscriber access.
The maximum number of users allowed access through the interface is configured.
To specify the default pre-authentication domain, run the default-domain pre-authentication domain-name command.
To specify the default authentication domain, run the default-domain authentication [ force | replace ] domain-name command.
To specify the domain in which users are allowed to access the BAS interface, run the permit-domain domain-name &<1-16> command.
To specify domains in which users are denied access to the BAS interface, run the deny-domain domain-name&<1-16> command.
To specify a list of domains in which users are allowed to access the BAS interface, run the permit-domain-list command.
To specify a list of domains in which users are denied access to the BAS interface, run the deny-domain-list command.
The permit-domain command cannot be configured together with the deny-domain, deny-domain-list, or permit-domain-list command on a BAS interface.
To configure the NetEngine 8000 F to trust the Access-Line-Id information reported by clients, run the client-option82 [ basinfo-insert { cn-telecom [ version2 ] | version3 } | version1 ] or client-access-line-id [ basinfo-insert { cn-telecom [ version2 ] | version3 } | version1 ] command.
To configure the NetEngine 8000 F to insert the Access-Line-Id information in the format defined by cn-telecom instead of trusting that reported by clients, run the basinfo-insert cn-telecom command.
To configure the NetEngine 8000 F to trust the Access-Line-Id information in the format defined by version2 instead of trusting that reported by clients, run the basinfo-insert version2 command.
To enable the function to locate a user through the virtual BAS (vBAS), run the vbas vbas-mac-address [ auth-mode { ignore | reject } ] command.
The device is enabled to update the Option 82 information of an online user through a DHCP Request message for lease renewal.
The NetEngine 8000 F is configured to trust the Option 60 information reported by clients.
If user domain information is obtained from Option 60, the character string following the domain name delimiter (@ is the default) in the Option 60 field is used as the domain name. If no user domain information is obtained from Option 60, the router performs the following procedure to continue searching for the information. If there is no domain name delimiter in the field, the router performs a fuzzy or exact match of the domain name information based on the configured mode. The procedure will stop if user domain information is obtained.
The DHCP6ACC component is enabled to remove enterprise number information from Option 37 in a Solicit or Request message to be sent to the UM component.
The following operations must have been performed:
The accounting packet copy function is enabled.
The NetEngine 8000 F is enabled to carry link-account information in an Accounting-Request packet to be sent to a RADIUS server.
Before running the command, set the access type to Layer 2 subscriber access.
The command affects the RADIUS attribute 25 in Accounting-Request packets sent by the NetEngine 8000 F to a RADIUS accounting server.
For IPoE access services:
Run the ip-trigger command to enable user access triggered by IP packets or run the arp-trigger command to enable user access triggered by ARP packets.
For IPoEv6 access services:
Run the ipv6-trigger command to enable user access triggered by IPv6 packets or run the nd-trigger command to enable user access triggered by NS/NA packets.
WLAN user roaming switchover is enabled.
After the preceding steps are performed, WLAN users do not need to be re-authenticated for login after being logged out when roaming between different APs. This ensures that services are not interrupted.
User detection parameters are configured.
Online users whose physical location information is changed but MAC addresses remain unchanged are logged out when they resend DHCP or ND login requests.
The BAS interface is blocked.
The authentication method is configured.
You can configure authentication methods for only Layer 2 users on BAS interfaces. Multiple authentication methods can be configured on a BAS interface but you should note the following:
The device is enabled to use the domain carried in an EAP user name as the authentication domain for an EAP-authentication-based RADIUS proxy user.
The device is enabled to use the broadcast flag value in a DHCP request packet to determine the destination MAC address type for a DHCP response packet.
After the dhcp-reply trust broadcast-flag command is run, if the broadcast flag value in a DHCP request packet is 1, the device replies with a DHCP response packet that carries the broadcast address of all Fs as the destination MAC address; if the broadcast flag value in a DHCP request packet is 0, the device replies with a DHCP response packet that carries the user MAC address as the destination MAC address.
The dhcp-reply trust broadcast-flag command applies only to Layer 2 access users.
The dhcp-reply trust broadcast-flag command is mutually exclusive with the dhcp-broadcast command.
A method is configured for obtaining MAC addresses of Layer 3 DHCPv6 users during login.
The configuration is committed.