Example for Configuring RUI+EDSG in Exclusive Address Pool Mode

This section provides an example for configuring Redundancy User Information (RUI)+enhanced dynamic service gateway (EDSG) in exclusive address pool mode.

Usage Scenario

High reliability is a basic requirement for carrier-class devices. An NetEngine 8000 F that functions as a service aggregation router carries multiple services, such as HSI, VoIP, and IPTV. It connects to a core network to implement Layer 3 routing functions and to the aggregation layer to terminate Layer 2 user packets for user access. The NetEngine 8000 F therefore must have high reliability. Although the NetEngine 8000 F can ensure non-stop data flow forwarding, this does not guarantee interruption-free user services. If a network node or link fails and user information is not synchronized to a backup device, user services will be interrupted. To prevent this problem, dual-device hot backup is introduced.

Requirements on Hardware

User access boards are installed.

Requirements on Interconnected Devices

  • Upstream device: a CR (generally) that must be able to perform route switching and support MPLS and MPLS L3VPN. It is recommended that the upstream device also be able to provide MPLS L2VPN capabilities. In dual-device hot backup scenarios, MPLS tunnels are best suited to function as protection tunnels. This is because an MPLS protection tunnel can be established from the IP core network if a direct link cannot be deployed between NetEngine 8000 Fs.
  • Downstream device: an aggregation switch that must be able to learn MAC addresses from VLAN packets.

Solution Limitations

  • An exclusive address pool is an address pool or address segment exclusively used by a backup group or link. Generally, an exclusive address pool is used for services that can be assigned private IP addresses, such as VoIP services. To avoid IP address wastes, do not use this type of address pool for services that use public IP addresses, such as HSI services.
  • In exclusive address pool mode, the master and backup devices cannot advertise the same network segment route. Advertising the same network segment route will cause load balancing on the upstream CRs and network-to-user traffic forwarding errors.

Networking Requirements

Carriers can divide networks into different subnets based on traffic destination addresses. When different users access the subnets, different rate limit and accounting are performed for the users. EDSG implements subnet division, rate limit, and accounting management on NetEngine 8000 Fs. As applications accessed by users become diversified, high reliability is required for EDSG services. To meet this requirement, deploy RUI so that EDSG service traffic is smoothly switched to the backup device if the master device fails. RUI ensures normal traffic accounting without the need of users' re-dialup.

On the network shown in Figure 1, the user goes online from Device A (master device) through PPPoE dialup. Device A and Device B implement RUI over VRRP and BFD. Device A backs up EDSG services to Device B (backup device). If Device A fails, service traffic is switched to Device B. Traffic statistics on Device A and Device B remain consistent.

Figure 1 Example for configuring RUI+EDSG in exclusive address pool mode

Interface 1 and interface 2 in this example represent GE 0/1/0 and GE 0/1/8, respectively.


Device

Interface

IP Address

Device A

GE0/1/0

10.0.1.1/24

GE0/1/8

10.0.0.1/24

Loopback 1

4.4.4.4/32

Device B

GE0/1/0

10.0.1.2/24

GE0/1/8

10.2.0.1/24

Loopback 1

8.8.8.8/32

Configuration Roadmap

The configuration roadmap is as follows:

  1. Configure basic user access functions and ensure that the two NetEngine 8000 Fs have the same configuration. For details, see HUAWEI NetEngine 8000 F Series Router Configuration Guide - User Access.

  2. Configure routes to ensure IP connectivity between devices. For details, see HUAWEI NetEngine 8000 F Series Router Configuration Guide - IP Routing.

  3. Establish a dual-device backup platform.

  4. Set NAS parameters and a traffic backup interval (or traffic threshold).

  5. Configure IP address pool binding.

  6. Bind an RBP to an interface from which the user goes online.

  7. Configure EDSG services on Device A and Device B. For details, see HUAWEI NetEngine 8000 F Series Router Multiservice Control Gateway Configuration Guide - Value-added Service.

The configuration on Device A is used as an example. The configuration on Device B is similar to that on Device A.

Data Preparation

To complete the configuration, you need the following data:

  • VRRP ID

  • BFD parameters, such as the local and remote discriminators and expected minimum intervals at which BFD control packets are sent and received

  • IP addresses of interfaces on Device A and Device B

  • Backup ID, which is used together with an RBS to identify the RBP to which the user belongs

  • EDSG-related parameters

Procedure

  1. Establish a dual-device backup platform. The configuration on Device A is used as an example. The configuration on Device B is similar to that on Device A.

    In this example, only RUI-related configuration is described. For other configurations, see the corresponding configuration guide.

    # Configure a BFD session on the access side to rapidly detect faults in interfaces or links and trigger a master/backup VRRP switchover. 10.0.1.2 is the IP address of GE 0/1/0.2 on Device B.

    [~DeviceA] bfd 
    [*DeviceA-bfd] quit 
    [*DeviceA] bfd bfd bind peer-ip 10.0.1.2 
    [*DeviceA-bfd-session-bfd] discriminator local 1 
    [*DeviceA-bfd-session-bfd] discriminator remote 2 
    [*DeviceA-bfd-session-bfd] commit 
    [~DeviceA-bfd-session-bfd] quit 

    # Configure a VRRP group on GE 0/1/0.2, and configure the VRRP group to track the BFD session and network-side interface.

    [~DeviceA] interface gigabitethernet 0/1/0.2 
    [*DeviceA-GigabitEthernet0/1/0.2] vlan-type dot1q 200  
    [*DeviceA-GigabitEthernet0/1/0.2] ip address 10.0.1.1 255.255.255.0 
    [*DeviceA-GigabitEthernet0/1/0.2] vrrp vrid 1 virtual-ip 10.0.1.100 
    [*DeviceA-GigabitEthernet0/1/0.2] admin-vrrp vrid 1 
    [*DeviceA-GigabitEthernet0/1/0.2] vrrp vrid 1 priority 120 
    [*DeviceA-GigabitEthernet0/1/0.2] vrrp vrid 1 preempt-mode timer delay 600
    [*DeviceA-GigabitEthernet0/1/0.2] vrrp vrid 1 track bfd-session 1 peer 
    [*DeviceA-GigabitEthernet0/1/0.2] vrrp vrid 1 track interface gigabitethernet 0/1/8 reduced 50
    [*DeviceA-GigabitEthernet0/1/0.2] vrrp recover-delay 20
    [*DeviceA-bfd-session-bfd] commit 
    [~DeviceA-bfd-session-bfd] quit 

    Different priorities must be configured for devices in a VRRP group. The device with a higher priority is the master device.

    # Configure an RBS.

    [~DeviceA] remote-backup-service service1 
    [*DeviceA-rm-backup-srv-service1] peer 8.8.8.8 source 4.4.4.4 port 2046 
    [*DeviceA-rm-backup-srv-service1] track interface gigabitethernet 0/1/8 
    [*DeviceA-rm-backup-srv-service1] commit 
    [~DeviceA-rm-backup-srv-service1] quit 

    Ensure that the master and backup devices can ping each other.

    You can run the track bfd-session command in the RBS view to track the peer BFD sessions established on the network side of the master and backup devices, achieving rapid peer status detection. For configuration details, see the corresponding command reference.

    # Configure an RBP.

    [~DeviceA] remote-backup-profile profile1 
    [*DeviceA-rm-backup-prf-profile1] peer-backup hot 
    [*DeviceA-rm-backup-prf-profile1] vrrp-id 1 interface gigabitethernet 0/1/0.2
    [*DeviceA-rm-backup-prf-profile1] backup-id 10 remote-backup-service service1 
    [*DeviceA-rm-backup-prf-profile1] service-type bras 
    [*DeviceA-rm-backup-prf-profile1] commit 
    [~DeviceA-rm-backup-prf-profile1] quit 

  2. Set NAS parameters and a traffic backup interval. The configuration on Device A is used as an example. The configuration on Device B is similar to that on Device A.

    # Set NAS parameters.

    [~DeviceA] remote-backup-profile profile1 
    [*DeviceA-rm-backup-prf-profile1] nas logic-ip 1.2.3.4 
    [*DeviceA-rm-backup-prf-profile1] nas logic-port gigabitethernet 0/1/0
    [*DeviceA-rm-backup-prf-profile1] nas logic-sysname huawei
    [*DeviceA-rm-backup-prf-profile1] commit 

    # Set a traffic backup interval.

    [~DeviceA] remote-backup-profile profile1 
    [*DeviceA-rm-backup-prf-profile1] traffic backup interval 10 
    [*DeviceA-rm-backup-prf-profile1] commit 

  3. Configure IP address pool binding. The configuration on Device A is used as an example. The configuration on Device B is similar to that on Device A.

    [~DeviceA] remote-backup-profile profile1 
    [*DeviceA-rm-backup-prf-profile1] ip-pool pool1
    [*DeviceA-rm-backup-prf-profile1] commit 

    The bound address pool named pool1 must have been configured using the ip pool command in the AAA domain view.

  4. Bind the RBP to GE 0/1/0.1 from which users go online. The configuration on 0/1/0 A is used as an example. The configuration on 0/1/0 B is similar to that on 0/1/0 A.

    [~DeviceA] interface gigabitethernet 0/1/0.1 
    [*DeviceA-GigabitEthernet0/1/0.1] remote-backup-profile profile1 
    [*DeviceA-GigabitEthernet0/1/0.1] commit 
    [~DeviceA-GigabitEthernet0/1/0.1] quit 

  5. Configure EDSG services.
    1. Enable the value-added service function.

      [~DeviceA] value-added-service enable
      [*DeviceA] commit

    2. Configure a policy server.

      # Set parameters as follows:
      • RADIUS server group name: rad_group1
      • RADIUS authentication server's IP address: 10.10.10.2
      • RADIUS authentication server's interface number: 1812
      • RADIUS accounting server's IP address: 10.10.10.2
      • RADIUS accounting server's interface number: 1813
      • Shared key for the RADIUS authentication and accounting servers: huawei_123
      [~DeviceA] radius-server group rad_group1
      [*DeviceA-radius-rad_group1] radius-server authentication 10.10.10.2 1812
      [*DeviceA-radius-rad_group1] radius-server accounting 10.10.10.2 1813
      [*DeviceA-radius-rad_group1] radius-server shared-key-cipher-cipher huawei_123
      [*DeviceA-radius-rad_group1] commit
      [~DeviceA-radius-rad_group1] quit

      For details about how to configure a RADIUS server group, see Configuring a RADIUS Server in HUAWEI NetEngine 8000 F Series Configuration Guide - User Access.

    3. Configure an EDSG traffic policy.

      1. Create service groups.

        # Create a service group named s_1m.

        [~DeviceA] service-group s_1m
        [*DeviceA] service-group s_2m
        [*DeviceA] commit

        You must run the service-group command to create service groups regardless of whether the NetEngine 8000 F obtains EDSG service policies from local configurations or a RADIUS server.

      2. Configure an ACL and define ACL rules for each service group.

        # Configure ACL 6020 and define ACL rules for the service group named s_1m.

        [~DeviceA] acl number 6020
        [*DeviceA-acl-ucl-6020] rule 10 permit ip source service-group s_1m destination ip-address 192.168.100.0 0.0.0.255
        [*DeviceA-acl-ucl-6020] rule 20 permit ip source ip-address 192.168.100.0 0.0.0.255 destination service-group s_1m
        [*DeviceA-acl-ucl-6020] commit
        [~DeviceA-acl-ucl-6020] quit

        # Configure ACL 6021 and define ACL rules for the service group named s_2m.

        [~DeviceA] acl number 6021
        [*DeviceA-acl-ucl-6021] rule 15 permit ip source service-group s_2m destination ip-address 192.168.200.0 0.0.0.255
        [*DeviceA-acl-ucl-6021] rule 25 permit ip source ip-address 192.168.200.0 0.0.0.255 destination service-group s_2m
        [*DeviceA-acl-ucl-6021] commit
        [~DeviceA-acl-ucl-6021] quit
      3. Define traffic classifiers.

        # Define a traffic classifier named c1.

        [~DeviceA] traffic classifier c1 operator or
        [*DeviceA-classifier-c1] if-match acl 6020
        [*DeviceA-classifier-c1] commit
        [~DeviceA-classifier-c1] quit

        # Define a traffic classifier named c2.

        [~DeviceA] traffic classifier c2 operator or
        [*DeviceA-classifier-c2] if-match acl 6021
        [*DeviceA-classifier-c2] commit
        [~DeviceA-classifier-c2] quit
      4. Define traffic behaviors.

        # Define a traffic behavior named b1.

        [~DeviceA] traffic behavior b1
        [*DeviceA-behavior-b1] commit
        [~DeviceA-behavior-b1] quit

        # Define a traffic behavior b2.

        [~DeviceA] traffic behavior b2
        [*DeviceA-behavior-b2] commit
        [~DeviceA-behavior-b2] quit
      5. Configure an EDSG traffic policy.

        # Configure an EDSG traffic policy named traffic_policy_edsg, and associate c1 and c2 with b1 and b2, respectively.

        [~DeviceA] traffic policy traffic_policy_edsg
        [*DeviceA-policy-traffic_policy_edsg] share-mode
        [*DeviceA-policy-traffic_policy_edsg] classifier c1 behavior b1
        [*DeviceA-policy-traffic_policy_edsg] classifier c2 behavior b2
        [*DeviceA-policy-traffic_policy_edsg] commit
        [~DeviceA-policy-traffic_policy_edsg] quit
      6. Apply the EDSG traffic policy globally.

        [~DeviceA] traffic-policy traffic_policy_edsg inbound
        [~DeviceA] traffic-policy traffic_policy_edsg outbound
        [~DeviceA] commit

    4. Configure an AAA authentication scheme and accounting scheme.

      # Configure an AAA authentication scheme named auth1 and specify RADIUS authentication as the authentication mode.

      [~DeviceA] aaa
      [*DeviceA-aaa] authentication-scheme auth1
      [*DeviceA-aaa-authen-auth1] authentication-mode radius
      [*DeviceA-aaa-authen-auth1] commit
      [~DeviceA-aaa-authen-auth1] quit

      # Configure an AAA accounting scheme named acct1 and specify RADIUS accounting as the accounting mode.

      [~DeviceA-aaa] accounting-scheme acct1
      [*DeviceA-aaa-accounting-acct1] accounting-mode radius
      [*DeviceA-aaa-accounting-acct1] quit
      [*DeviceA-aaa] commit
      [~DeviceA-aaa] quit

    5. Configure a mode in which EDSG service policies are obtained.

      # Configure the NetEngine 8000 F to obtain EDSG service policies from local configurations and then from a RADIUS server if no EDSG service policy is obtained from local configurations.

      [~DeviceA] service-policy download local radius rad_group1 password cipher huawei_123
      [~DeviceA] commit

    6. Configure EDSG service policies.

      1. Configure an EDSG service policy for the access to network 1.

        # Create an EDSG service policy named service_edsg1.

        [~DeviceA] service-policy name service_edsg1 edsg

        # Bind s_1m to service_edsg1.

        [*DeviceA-service-policy-service_edsg1] service-group s_1m

        # Bind rad_group1 to service_edsg1.

        [*DeviceA-service-policy-service_edsg1] radius-server group rad_group1

        # Bind auth1 to service_edsg1.

        [*DeviceA-service-policy-service_edsg1] authentication-scheme auth1

        # Bind acct1 to service_edsg1.

        [*DeviceA-service-policy-service_edsg1] accounting-scheme acct1

        # Set the uplink traffic rate limit for service_edsg1 to 1 Mbit/s.

        [*DeviceA-service-policy-service_edsg1] rate-limit cir 1000 inbound

        # Set the downlink traffic rate limit for service_edsg1 to 1 Mbit/s.

        [*DeviceA-service-policy-service_edsg1] rate-limit cir 1000 outbound
        [*DeviceA-service-policy-service_edsg1] commit
        [~DeviceA-service-policy-service_edsg1] quit
      2. Configure an EDSG service policy for the access to network 2.

        # Create an EDSG service policy named service_edsg2.

        [~DeviceA] service-policy name service_edsg2 edsg

        # Bind s_2m to service_edsg2.

        [*DeviceA-service-policy-service_edsg2] service-group s_2m

        # Bind rad_group1 to service_edsg2.

        [*DeviceA-service-policy-service_edsg2] radius-server group rad_group1

        # Bind auth1 to service_edsg2.

        [*DeviceA-service-policy-service_edsg2] authentication-scheme auth1

        # Bind acct1 to service_edsg2.

        [*DeviceA-service-policy-service_edsg2] accounting-scheme acct1

        # Set the uplink traffic rate limit for service_edsg2 to 2 Mbit/s.

        [*DeviceA-service-policy-service_edsg2] rate-limit cir 2000 inbound

        # Set the downlink traffic rate limit for service_edsg2 to 2 Mbit/s.

        [*DeviceA-service-policy-service_edsg2] rate-limit cir 2000 outbound
        [*DeviceA-service-policy-service_edsg2] commit
        [~DeviceA-service-policy-service_edsg2] quit

    7. Bind the local address pool and RADIUS server group to an AAA domain.

      # Bind edsg_pool and rad_group1 to an AAA domain.

      [~DeviceA] aaa
      [*DeviceA-aaa] domain domain1
      [*DeviceA-aaa-domain-domain1] ip-pool edsg_pool
      [*DeviceA-aaa-domain-domain1] radius-server group rad_group1
      [*DeviceA-aaa-domain-domain1] quit
      [*DeviceA-aaa] commit
      [~DeviceA-aaa] quit

    8. Configure the prepaid function.

      1. Configure a prepaid profile for the access to network 1.

        # Create a prepaid profile named prepaid1.

        [~DeviceA] prepaid-profile prepaid1

        # Bind rad_group1 to prepaid1.

        [~DeviceA-prepaid-profile-prepaid1] radius-server group rad_group1

        # Bind auth1 to prepaid2.

        [*DeviceA-prepaid-profile-prepaid1] authentication-scheme auth1

        # Bind acct1 to prepaid2.

        [*DeviceA-prepaid-profile-prepaid1] accounting-scheme acct1

        # Configure a password used for the NetEngine 8000 F to apply for an EDSG service quota from the RADIUS server group.

        [*DeviceA-prepaid-profile-prepaid1] password cipher huawei_123

        # Set the time threshold for the NetEngine 8000 F to reapply for a time quota for EDSG services from the RADIUS server to 60s.

        [*DeviceA-prepaid-profile-prepaid1] threshold time 60 seconds

        # Set the traffic volume threshold for the NetEngine 8000 F to reapply for a traffic volume quota for EDSG services from the RADIUS server to 10 Mbytes.

        [*DeviceA-prepaid-profile-prepaid1] threshold volume 10 mbytes
        [*DeviceA-prepaid-profile-prepaid1] commit
        [~DeviceA-prepaid-profile-prepaid1] quit
      2. Configure a prepaid profile for the access to network 2.

        # Create a prepaid profile named prepaid2.

        [~DeviceA] prepaid-profile prepaid2

        # Bind rad_group1 to prepaid2.

        [*DeviceA-prepaid-profile-prepaid2] radius-server group rad_group1

        # Bind auth1 to prepaid2.

        [*DeviceA-prepaid-profile-prepaid2] authentication-scheme auth1

        # Bind acct1 to prepaid2.

        [*DeviceA-prepaid-profile-prepaid2] accounting-scheme acct1

        # Configure a password used for the NetEngine 8000 F to apply for an EDSG service quota from the RADIUS server group.

        [*DeviceA-prepaid-profile-prepaid2] password cipher huawei_123

        # Set the time threshold for the NetEngine 8000 F to reapply for a time quota for EDSG services from the RADIUS server to 300s.

        [*DeviceA-prepaid-profile-prepaid2] threshold time 300 seconds

        # Set the traffic volume threshold for the NetEngine 8000 F to reapply for a traffic volume quota for EDSG services from the RADIUS server to 20 Mbytes.

        [*DeviceA-prepaid-profile-prepaid2] threshold volume 20 mbytes
        [*DeviceA-prepaid-profile-prepaid2] commit
        [~DeviceA-prepaid-profile-prepaid2] quit
      3. Apply the prepaid profiles in the EDSG service policy view.

        # Apply prepaid1 to service_edsg1.

        [~DeviceA] service-policy name service_edsg1 edsg
        [*DeviceA-service-policy-service_edsg1] prepaid-profile prepaid1
        [*DeviceA-service-policy-service_edsg1] commit
        [~DeviceA-service-policy-service_edsg1] commit

        # Apply prepaid2 to service_edsg2.

        [~DeviceA] service-policy name service_edsg2 edsg
        [*DeviceA-service-policy-service_edsg2] prepaid-profile prepaid2
        [*DeviceA-service-policy-service_edsg2] commit
        [~DeviceA-service-policy-service_edsg2] quit

    9. Configure interfaces.

      1. Create a virtual template interface.

        [~DeviceA] interface Virtual-Template 1
        [*DeviceA-Virtual-Template1] commit
        [~DeviceA-Virtual-Template1] quit
      2. Configure a BAS interface.

        [*DeviceA] interface GigabitEthernet0/1/2.1
        [*DeviceA-GigabitEthernet0/1/2.1] user-vlan 1000 2000
        [*DeviceA-GigabitEthernet0/1/2.1] user-vlan 1 1000 qinq 100
        [*DeviceA-GigabitEthernet0/1/2.1] pppoe-server bind virtual-template 1
        [*DeviceA-GigabitEthernet0/1/2.1] bas
        [*DeviceA-GigabitEthernet0/1/2.1-bas] access-type layer2-subscriber default-domain pre-authentication domain1
        [*DeviceA-GigabitEthernet0/1/2.1-bas] authentication-method ppp web 
        [*DeviceA-GigabitEthernet0/1/2.1-bas] quit
        [*DeviceA-GigabitEthernet0/1/2.1] commit
        [~DeviceA-GigabitEthernet0/1/2.1] quit
      3. Configure an uplink interface.

        [~DeviceA] interface GigabitEthernet0/1/0.1
        [*DeviceA-GigabitEthernet0/1/0.1] vlan-type dot1q 1
        [*DeviceA-GigabitEthernet0/1/0.1] ip address 192.168.100.1 255.255.255.0
        [*DeviceA-GigabitEthernet0/1/0.1] commit
        [~DeviceA-GigabitEthernet0/1/0.1] quit
        [~DeviceA] interface GigabitEthernet0/1/0.2
        [*DeviceA-GigabitEthernet0/1/0.2] vlan-type dot1q 1
        [*DeviceA-GigabitEthernet0/1/0.2] ip address 192.168.200.1 255.255.255.0
        [*DeviceA-GigabitEthernet0/1/0.2] commit
        [~DeviceA-GigabitEthernet0/1/0.2] quit
      4. Configure the interface connected to the policy server, AAA server, and portal server.

        [~DeviceA] interface GigabitEthernet0/1/1
        [*DeviceA-GigabitEthernet0/1/1] ip address 10.10.10.1 255.255.255.0
        [*DeviceA-GigabitEthernet0/1/1] commit
        [~DeviceA-GigabitEthernet0/1/1] quit

    10. Configure users to go online.

      # Configure the AAA server to deliver the RADIUS attribute User-Password with a value of huawei_123 for PPPoE users (users 1 and 2).

      The shared key configured for a RADIUS server group determines the content of the User-Password attribute.

      # Configure the AAA server to deliver the RADIUS attribute HW-Account-Info containing Aservice_edsg1 for user 1.

      # Configure the AAA server to deliver the RADIUS attribute HW-Account-Info containing Aservice_edsg2 for user 2.

      The content of the HW-Account-Info attribute starts with "A" followed by a service name. This attribute is used in user authentication response packets to deliver EDSG services that automatically take effect (directly activated after delivery).

  6. Verify the configuration.

    After successfully configuring the RBP, run the display remote-backup-profile command. According to the command output, the RBS type is bras, the RBP named profile1 is bound to GigabitEthernet 0/1/0.1 from which users go online, and Device A is in the Master state.

    <DeviceA> display remote-backup-profile profile1 
    -----------------------------------------------
     Profile-Index        : 0x802
     Profile-Name         : profile1
     Service              : bras
     Remote-backup-service: service1
     Backup-ID            : 10
     track protocol       : VRRP
     VRRP-ID              : 1
     VRRP-Interface       : GigabitEthernet0/1/0.2
     Interface            : 
                           GigabitEthernet0/1/0.1
     State           	 : Master
     Peer-state      	 : Slave
     Backup mode          : hot
     Slot-Number          : 1
     Card-Number          : 0
     Port-Number          : 0
     Nas logic-port       : Gigabitethernet 0/1/0
     Nas logic-ip         : 1.2.3.4
     Nas logic-sysname    : huawei
    IP-Pool               :
                             pool1
     Traffic interval     : 10(minutes)

    After successfully configuring the RBS, run the display remote-backup-service command. According to the command output, the TCP connection is in the Connected state.

    <DeviceA> display remote-backup-service service1 
    ----------------------------------------------------------
     Service-Index    : 0
     Service-Name     : service1
     TCP-State        : Connected
     Peer-ip          : 8.8.8.8
     Source-ip        : 4.4.4.4
     TCP-Port         : 2046
     Track-BFD        : --
     Track-interface0 : GigabitEthernet0/1/8
     Track-interface1 : --
     Last up time     : 2016-06-02 16:15:8 
     Last down time   : 2016-06-02 16:3:36 
     Last down reason : TCP closed for packet error. 
    --------------------------------------------------------

    After users go online, run the display backup-user command to view user information that is backed up.

    <DeviceA> display backup-user
      Remote-backup-service: service1
      Total Users Numer: 10
    ------------------------------------------------------------------------
     100     101     102     103     104     105     106     107     108     109
    ------------------------------------------------------------------------
    

    Run the display access-user interface command to view online user information on a specified interface.

    <DeviceA> display access-user interface GigabitEthernet 0/1/0.1
    ------------------------------------------------------------------------------
      UserID  Username                Interface      IP address       MAC          IPv6 address
      ------------------------------------------------------------------------------
      --------------------------------------------------------------------------
      100      user@lsh                GE0/1/0.1      2.2.2.10         00e0-fc12-0101          -
      101      user@lsh                GE0/1/0.1      2.2.2.9          00e0-fc12-0102          -
      102      user@lsh                GE0/1/0.1      2.2.2.8          00e0-fc12-0103          -
      103      user@lsh                GE0/1/0.1      2.2.2.7          00e0-fc12-0104          -
      104      user@lsh                GE0/1/0.1      2.2.2.6          00e0-fc12-0105          -
      105      user@lsh                GE0/1/0.1      2.2.2.5          00e0-fc12-0106          -
      106      user@lsh                GE0/1/0.1      2.2.2.4          00e0-fc12-0107          -
      107      user@lsh                GE0/1/0.1      2.2.2.3          00e0-fc12-0108          -
      108      user@lsh                GE0/1/0.1      2.2.2.2          00e0-fc12-0109          -
      109      user@lsh                GE0/1/0.1      2.2.2.11         00e0-fc12-0110          -
      --------------------------------------------------------------------------
      Total users                        : 10

    View the configuration of the EDSG service policy on Device A.

    <DeviceA> display service-policy configuration name service_edsg1
    ------------------------------------------------
    Service-policy-index         : 0
      Service-policy-name          : service1
      Service-policy-type          : EDSG
      Policy-storage-type          : configuration
      Reference-count              : 0
      Service-class-inbound        :ef
      Service-class-outbound       :ef
      Authentication-scheme-name   : -
      Accounting-scheme-name       : default1
      Radius-server-template       : template1
      Service-group-name           : -
      Service-group-priority       : -
      Inbound-cir                  : 100(kbps)
      Inbound-pir                  : 100(kbps)
      Inbound-cbs                  : 100(bytes)
      Inbound-pbs                  : 3000(bytes)
      Outbound-cir                 : 10000(kbps)
      Outbound-pir                 : -
      Outbound-cbs                 : -
      Outbound-pbs                 : -
      Prepaid-profile-name         : -
      Diameter monitor key         : -
      Inbound-match-usergroup      : no
      Outbound-match-usergroup     : no
     ------------------------------------------------ 
    

Configuration Files

Device A configuration file

#
 sysname DeviceA
#
 ip pool pool1 bas local 
 gateway 10.1.16.1 255.255.255.0 
 section 0 10.1.16.2 10.1.16.100 
#
aaa
 domain userdomain1 
 authentication-scheme default0 
 accounting-scheme default0 
 ip-pool pool1 
#
bfd bfd bind peer-ip 10.0.1.2 
 discriminator local 1 
 discriminator remote 2 
 commit 
#
interface gigabitethernet 0/1/0.2 
 vlan-type dot1q 200 
 ip address 10.0.1.1 255.255.255.0 
 vrrp vrid 1 virtual-ip 10.0.1.100 
 admin-vrrp vrid 1 
 vrrp vrid 1 priority 120 
 vrrp vrid 1 preempt-mode timer delay 600
 vrrp vrid 1 track bfd-session session-name bfd peer 
 vrrp vrid 1 track interface gigabitethernet 0/1/8 reduced 50
 vrrp recover-delay 20
#
remote-backup-service service1 
 peer 8.8.8.8 source 4.4.4.4 port 2046 
 track interface gigabitethernet 0/1/8  
#
remote-backup-profile profile1 
 service-type bras
 backup-id 10 remote-backup-service service1 
 peer-backup hot 
 vrrp-id 1 interface gigabitethernet 0/1/0.2
 nas logic-ip 1.2.3.4 
 nas logic-port gigabitethernet0/1/0 
 nas logic-sysname huawei 
 traffic backup interval 10 
 ip-pool pool1
#
interface gigabitethernet 0/1/0.1
 user-vlan 50 
 remote-backup-profile profile1 
 bas 
 access-type layer2-subscriber 
 authentication-method  web 
 vlan-type dot1q 1
 ip address 192.168.100.1 255.255.255.0
#
interface LoopBack1
 ip address 4.4.4.4 255.255.255.255#
ospf 1
 import-route unr
 area 0.0.0.0
  network 10.0.0.0 0.0.0.255
  network 4.4.4.4 0.0.0.0
#
value-added-service enable
#
radius-server group rad_group1
 radius-server authentication 10.10.10.2 1812 weight 0
 radius-server accounting 10.10.10.2 1813 weight 0
 radius-server shared-key-cipher %^%#x*CgITP4C~;q,*+DEW'JBWe#)"Q&|7bX]b:Y<{w'%^%#    
#
ip pool edsg_pool bas local
 gateway 172.16.1.0 255.255.0.0
 section 0 172.16.1.0 172.16.1.255
#
aaa
 authentication-scheme auth1
  authentication-scheme radius
 accounting-scheme acct1
  accounting-mode radius
 domain domain1
  ip-pool edsg_pool
  radius-server group rad_group1
#
service-group s_1m
service-group s_2m
#
acl number 6020
 rule 10 permit ip source service-group s_1m destination ip-address 192.168.100.0 0.0.0.255
 rule 20 permit ip source ip-address 192.168.100.0 0.0.0.255 destination service-group s_1m
 #
acl number 6021
 rule 15 permit ip source service-group s_2m destination ip-address 192.168.200.0 0.0.0.255
 rule 25 permit ip source ip-address 192.168.200.0 0.0.0.255 destination service-group s_2m
#
traffic classifier c1 operator or
 if-match acl 6020
#
traffic classifier c2 operator or
 if-match acl 6021
#
traffic behavior b1
#
traffic behavior b2
#
traffic policy traffic_policy_edsg           
 share-mode
 classifier c1 behavior b1
 classifier c2 behavior b2
#
traffic-policy traffic_policy_edsg inbound
traffic-policy traffic_policy_edsg outbound
#
aaa
 authentication-scheme auth1                                                    
 #  
 accounting-scheme acct1                                                        
 #
# 
http-redirect-profile http_redirect_profile                                     
 web-server url http://www.sample.com                                              
 web-server mode post                                                           
#                                               
prepaid-profile prepaid1                                                        
 password cipher %@%##!!!!!!!!!"!!!!"!!!!(!!!!1];16qfZ81fv"uMoKKZ.1k"`AO!X2K2N.b~'NB^V!!!!!!!!!!1!!!!o/4J(q"J1F.!K9%M!6x8%@%#                               
 authentication-scheme auth1                                                    
 accounting-scheme acct1                                                        
 radius-server group rad_group1                                                     
 threshold time 60 seconds                                                      
 threshold volume 10 mbytes                                                     
#                                         
prepaid-profile prepaid2                                                        
 password cipher %@%##!!!!!!!!!"!!!!"!!!!(!!!!1];16qfZ81fv"uMoKKZ.1k"`AO!X2K2N.b~'NB^V!!!!!!!!!!1!!!!o/4J(q"J1F.!K9%M!6x8%@%#                               
 authentication-scheme auth1                                                    
 accounting-scheme acct1                                                        
 radius-server group rad_group1                                                     
 threshold time 300 seconds                                                     
 threshold volume 20 mbytes                                                     
 quota-out redirect http_redirect_profile                                       
#                              
service-policy download local radius rad_group1 password cipher %@%##!!!!!!!!!"!!!!"!!!!(!!!!1];16qfZ81fv"uMoKKZ.1k"`AO!X2K2N.b~'NB^V!!!!!!!!!!1!!!!o/4J(q"J1F.!K9%M!6x8%@%#
#
service-policy name service_edsg1 edsg
 radius-server group rad_group1
 service-group s_1m
 authentication-scheme auth1
 accounting-scheme acct1
 rate-limit cir 1000 inbound
 rate-limit cir 1000 outbound
 prepaid-profile prepaid1
#
service-policy name service_edsg2 edsg
 radius-server group rad_group1
 service-group s_2m
 authentication-scheme auth1
 accounting-scheme acct1
 rate-limit cir 2000 inbound
 rate-limit cir 2000 outbound
 prepaid-profile prepaid2
#
interface GigabitEthernet0/1/2.1
 user-vlan 1000 2000
 user-vlan 1 1000 qinq 100
 bas
 #
  access-type layer2-subscriber default-domain pre-authentication domain1
  authentication-method ppp web  
#
 return 

Device B configuration file

#
 sysname DeviceB
#
 gateway 10.1.16.1 255.255.255.0 
 section 0 10.1.16.2 10.1.16.100 
#
aaa
 domain userdomain1 
 authentication-scheme default0 
 accounting-scheme default0 
 ip-pool pool2 
#
bfd bfd bind peer-ip 10.0.1.1 
 discriminator local 2 
 discriminator remote 1 
 commit 
#
interface gigabitethernet 0/1/0.2 
 vlan-type dot1q 200 
 ip address 10.0.1.2 255.255.255.0 
 vrrp vrid 1 virtual-ip 10.0.1.100 
 admin-vrrp vrid 1 
 vrrp vrid 1 track bfd-session session-name bfd peer 
 vrrp vrid 1 track interface gigabitethernet 0/1/8 reduced 50
#
remote-backup-service service1 
 peer 4.4.4.4 source 8.8.8.8 port 2046 
 track interface gigabitethernet 0/1/8 
#
remote-backup-profile profile1 
 service-type bras
 backup-id 10 remote-backup-service service1 
 peer-backup hot 
 vrrp-id 1 interface gigabitethernet 0/1/0.2
 nas logic-ip 1.2.3.4 
 nas logic-port gigabitethernet0/1/0 
 nas logic-sysname huawei 
 traffic backup interval 10 
 ip-pool pool2
#
interface gigabitethernet 0/1/0.1
 user-vlan 50 
 remote-backup-profile profile1 
 bas 
 access-type layer2-subscriber 
 authentication-method  web 
 vlan-type dot1q 1
 ip address 192.168.100.1 255.255.255.0
#
interface LoopBack1
 ip address 8.8.8.8 255.255.255.255
#
ospf 1
 import-route unr
 area 0.0.0.0
  network 11.0.0.0 0.0.0.255
  network 8.8.8.8 0.0.0.0
#
value-added-service enable
#
radius-server group rad_group1
 radius-server authentication 10.10.10.2 1812 weight 0
 radius-server accounting 10.10.10.2 1813 weight 0
 radius-server shared-key-cipher %^%#x*CgITP4C~;q,*+DEW'JBWe#)"Q&|7bX]b:Y<{w'%^%#    
#
ip pool edsg_pool bas local
 gateway 172.16.1.0 255.255.0.0
 section 0 172.16.1.0 172.16.1.255
#
aaa
 authentication-scheme auth1
  authentication-scheme radius
 accounting-scheme acct1
  accounting-mode radius
 domain domain1
  ip-pool edsg_pool
  radius-server group rad_group1
#
service-group s_1m
service-group s_2m
#
acl number 6020
 rule 10 permit ip source service-group s_1m destination ip-address 192.168.100.0 0.0.0.255
 rule 20 permit ip source ip-address 192.168.100.0 0.0.0.255 destination service-group s_1m
 #
acl number 6021
 rule 15 permit ip source service-group s_2m destination ip-address 192.168.200.0 0.0.0.255
 rule 25 permit ip source ip-address 192.168.200.0 0.0.0.255 destination service-group s_2m
#
traffic classifier c1 operator or
 if-match acl 6020
#
traffic classifier c2 operator or
 if-match acl 6021
#
traffic behavior b1
#
traffic behavior b2
#
traffic policy traffic_policy_edsg           
 share-mode
 classifier c1 behavior b1
 classifier c2 behavior b2
#
traffic-policy traffic_policy_edsg inbound
traffic-policy traffic_policy_edsg outbound
#
aaa
 authentication-scheme auth1                                                    
 #  
 accounting-scheme acct1                                                        
 #
# 
http-redirect-profile http_redirect_profile                                     
 web-server url http://www.sample.com                                              
 web-server mode post                                                           
#                                               
prepaid-profile prepaid1                                                        
 password cipher %@%##!!!!!!!!!"!!!!"!!!!(!!!!1];16qfZ81fv"uMoKKZ.1k"`AO!X2K2N.b~'NB^V!!!!!!!!!!1!!!!o/4J(q"J1F.!K9%M!6x8%@%#                               
 authentication-scheme auth1                                                    
 accounting-scheme acct1                                                        
 radius-server group rad_group1                                                     
 threshold time 60 seconds                                                      
 threshold volume 10 mbytes                                                     
#                                         
prepaid-profile prepaid2                                                        
 password cipher %@%##!!!!!!!!!"!!!!"!!!!(!!!!1];16qfZ81fv"uMoKKZ.1k"`AO!X2K2N.b~'NB^V!!!!!!!!!!1!!!!o/4J(q"J1F.!K9%M!6x8%@%#                               
 authentication-scheme auth1                                                    
 accounting-scheme acct1                                                        
 radius-server group rad_group1                                                     
 threshold time 300 seconds                                                     
 threshold volume 20 mbytes                                                     
 quota-out redirect http_redirect_profile                                       
#                              
service-policy download local radius rad_group1 password cipher %@%##!!!!!!!!!"!!!!"!!!!(!!!!1];16qfZ81fv"uMoKKZ.1k"`AO!X2K2N.b~'NB^V!!!!!!!!!!1!!!!o/4J(q"J1F.!K9%M!6x8%@%#
#
service-policy name service_edsg1 edsg
 radius-server group rad_group1
 service-group s_1m
 authentication-scheme auth1
 accounting-scheme acct1
 rate-limit cir 1000 inbound
 rate-limit cir 1000 outbound
 prepaid-profile prepaid1
#
service-policy name service_edsg2 edsg
 radius-server group rad_group1
 service-group s_2m
 authentication-scheme auth1
 accounting-scheme acct1
 rate-limit cir 2000 inbound
 rate-limit cir 2000 outbound
 prepaid-profile prepaid2
#
interface GigabitEthernet0/1/2.1
 user-vlan 1000 2000
 user-vlan 1 1000 qinq 100
 bas
 #
  access-type layer2-subscriber default-domain pre-authentication domain1
  authentication-method ppp web  
#
 return 
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >