[c-nsp] mpls option A with LAC and LNS

Oliver Boehmer (oboehmer) oboehmer at cisco.com
Mon Jul 28 03:29:24 EDT 2008


Ah, ok.. may I ask why you would want to authenticate the "users"? And
against which user database? 
Which service(s) do you provide for the other operator? More than just
traffic?

	oli

Vikas Sharma <mailto:vikassharmas at gmail.com> wrote on Monday, July 28,
2008 8:24 AM:

> Hi Oli,
> 
> Thanks for the prompt responce. I think I need to slightly modify
> this. 
> 
> Though I have used the term LAC and LNS, I am not using L2TP to get
> the data from the other operator. I am using Inter-AS option A, back
> to back vrf. The issue I can see once the data is at my ASBR, it will
> not have any control plane information (as other operator has already
> put it in to the respective vrf). In that case I will not be able to
> use my radius to authenticate the user. In summary, my radius will
> not be used at all.      
> 
> Regards,
> Vikas Sharma
> 
> 
> On 7/28/08, Oliver Boehmer (oboehmer) <oboehmer at cisco.com> wrote:
> 
> 	Vikas Sharma <> wrote on Monday, July 28, 2008 6:59 AM:
> 
> 	> Hi,
> 	>
> 	> Need help to resolve the below situation. The scenario of LAC
/ LNS
> 	> and mpls option A -
> 	>
> 	> In case, the customer belong to the ISP dials and latch in the
same
> 	> ISP (i.e. using ISP infrastructure), I can authenticate (since
they
> 	> will latch on LNS, a radius client), using radius and radius
will
> 	> return certain attribute including vrf / pool name etc. and
then
> 	> customer will go to it's own vrf and to it's own network.
> 	>
> 	> But in my case, customers come from other ISP domain (dialing
and
> 	> coming on their lac) and we are using back to back vrf to
connect
> 	LAC > and LNS. Now the problem is, how to authenticate the users
and
> 	return > vrf and ip pool name from the radius as LNS can not act
as
> 	radius > client now. The only option I can see is to forward the
> 	fraffic to > firewall, which can act as radius client and query
to
> 	radius server, > radius server can inturn return the vlan which
can
> 	be mapped to > respective vrf.
> 
> 	you can use vrf-aware Radius to send Radius the radius requests
> 	within the VRF (which, I think, solves your problem, but I'm not
> 	sure I entirely understood your topology):
> 
> 	aaa authentication ppp VRFCUST group VRFGROUP
> 	aaa authorization network VRFCUST group VRFGROUP
> 	aaa accounting network  VRFCUST group VRFGROUP
> 	!
> 	aaa group server radius VRFGROUP
> 	server-private x.x.x.x key zzzzz
> 	ip radius source-interface ...
> 	ip vrf forwarding <vrf-name>
> 	!
> 	int virtual-template1
> 	ppp authentication chap pap VRFCUST
> 	ppp authorization VRFCUST
> 	ppp accounting VRFCUST
> 
> 	However: The L2TP packets also arrive within a VRF, so you need
to
> 	use vrf-aware vpdn as well (specifiy "vpn vrf <name>" in your
> vpdn-group). 
> 
> 	hope this helps..
> 
> 	       oli


More information about the cisco-nsp mailing list