Cisco IOS Broadband and DSL Configuration Guide Release 12.4

Total Page:16

File Type:pdf, Size:1020Kb

Cisco IOS Broadband and DSL Configuration Guide Release 12.4 Cisco IOS Broadband and DSL Configuration Guide Release 12.4 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Customer Order Number: DOC-7817496= Text Part Number: 78-17496-01 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0601R) Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Cisco IOS Broadband and DSL Configuration Guide © 2005–2006 Cisco Systems, Inc. All rights reserved. CONTENTS About Cisco IOS Software Documentation for Release 12.4 xxv Documentation Objectives xxv Audience xxv Documentation Organization for Cisco IOS Release 12.4 xxvi Document Conventions xxxii Obtaining Documentation xxxiii Cisco.com xxxiii Product Documentation DVD xxxiv Ordering Documentation xxxiv Documentation Feedback xxxiv Cisco Product Security Overview xxxv Reporting Security Problems in Cisco Products xxxv Obtaining Technical Assistance xxxvi Cisco Technical Support & Documentation Website xxxvi Submitting a Service Request xxxvi Definitions of Service Request Severity xxxvii Obtaining Additional Publications and Information xxxvii Using Cisco IOS Software for Release 12.4 xxxix Understanding Command Modes xxxix Getting Help xl Example: How to Find Command Options xli Using the no and default Forms of Commands xliv Saving Configuration Changes xliv Filtering Output from the show and more Commands xlv Finding Additional Feature Support Information xlv PART 1: BROADBAND ACCESS AGGREGATION OVERVIEW Configuring Broadband Access Aggregation Features Roadmap 3 Understanding Broadband Access Aggregation 7 Contents 7 Information About Broadband Access Aggregation 7 Cisco IOS Broadband and DSL Configuration Guide iii Contents Encapsulation Protocols 8 Layer 2 Tunneling Protocol 8 ATM Services 9 PPPoE 9 PPPoEoE/PPPoEo802.1q 10 PPPoA 10 Routed Bridge Encapsulation 10 Cisco Subscriber Service Switch 11 RADIUS Support in Cisco IOS 11 Additional References 12 Related Documents 12 Standards 12 MIBs 12 RFCs 12 Technical Assistance 13 Glossary 14 Preparing for Broadband Access Aggregation 17 Contents 17 Prerequisites for Preparing for Broadband Access Aggregation 18 Restrictions for Preparing for Broadband Access Aggregation 18 Information About Preparing for Broadband Access Aggregation 18 Virtual-Access Interfaces 18 Autosense for ATM PVCs 19 Virtual Access Interface Precloning 19 Configuration Enhancements for Broadband Scalability 19 Virtual Access Subinterfaces 19 Virtual Template Compatibility with Subinterfaces 20 Benefits of Using Broadband Scalability Features 20 How to Prepare for Broadband Access Aggregation 21 Configuring PVCs 21 Benefits of Configuring a PVC Range 21 Configuring an ATM PVC or PVC Range 21 Example 23 Configuring an Individual PVC Within a PVC Range 23 Configuring a Virtual Template 25 Precloning Virtual-Access Interfaces 26 Example 27 Configuring Enhancements for Broadband Scalability 27 Cisco IOS Broadband and DSL Configuration Guide iv Contents Verifying Virtual-Template Compatibility with Virtual-Access Subinterfaces 27 Example 28 Disabling Virtual-Access Subinterfaces 28 Configuration Examples for Preparing for Broadband Access Aggregation 29 ATM PVC Range on a Point-to-Point Subinterface: Example 29 ATM PVC Range on a Multipoint Subinterface: Example 29 Individual PVC Within a PVC Range Configuration: Example 30 Virtual-Access Subinterfaces Configuration: Examples 30 Virtual-Access Subinterface Configuration: Example 30 Testing a Virtual Template for Compatibility with Subinterfaces: Example 32 Where to Go Next 32 Additional References 33 Related Documents 33 Standards 33 MIBs 34 RFCs 34 Technical Assistance 34 Feature Information for Preparing for Broadband Access Aggregation 35 PART 2: PPPOA, PPPOE, PPPOX Providing Protocol Support for Broadband Access Aggregation of PPP over ATM Sessions 39 Contents 39 Prerequisites for Providing Protocol Support for Broadband Access Aggregation of PPP over ATM Sessions 40 Restrictions for Providing Protocol Support for Broadband Access Aggregation of PPP over ATM Sessions 40 Information About Providing Protocol Support for Broadband Access Aggregation of PPP over ATM Sessions 40 PPP over ATM Configuration Scenario 40 Virtual Access Interface 41 Autosense for ATM PVCs 42 Benefits of Autosense for ATM PVCs 42 How to Provide Protocol Support for Broadband Access Aggregation of PPP over ATM Sessions 42 Configuring IETF-Compliant MUX Encapsulated PPP over ATM 42 Configuring IETF-Compliant LLC Encapsulated PPP over ATM 45 Configuring Cisco-Proprietary PPP over ATM PVCs 47 Configuring SVCs for NAPs and NSPs 49 Configuring PPPoA Autosense for a Single PVC 52 Cisco IOS Broadband and DSL Configuration Guide v Contents Configuring PPPoA Autosense for a VC Class 54 Verifying PPPoA Autosense for ATM PVCs 56 Configuration Examples for Configuring PPP over ATM 57 IETF-Compliant MUX Encapsulated PPP over ATM Configuration: Examples 57 IETF-Compliant PPP over ATM with Different Traffic-Shaping Parameters: Example 57 ADSL Termination: Example 58 Two Routers with Back-to-Back PVCs: Example 60 Multiplexed Encapsulation Using VC Class: Example 61 IETF-Compliant LLC Encapsulated PPP over ATM Configuration: Examples 61 Configuring IETF-Compliant PPP over ATM LLC Encapsulation: Example 61 Overriding a Virtual Template for IETF-Compliant PPP over ATM: Example 62 Disabling IETF-Compliant PPP over ATM LLC Encapsulation on a Specific VC: Example 62 Cisco Proprietary-PPP-over-ATM: Example 62 PPP over an ATM SVC Configuration: Example 63 PPPoA/PPPoE Autosense on an ATM PVC: Example 63 PPPoA/PPPoE Autosense on a VC Class: Example 64 PPPoA/PPPoE Autosense on Multiple VC Classes and Virtual Templates: Example 64 Where to Go Next 65 Additional References 65 Related Documents 66 Standards 66 MIBs 66 RFCs 66 Technical Assistance 66 Feature Information for Providing Protocol Support for Broadband Access Aggregation of PPP over ATM Sessions 67 Providing Protocol Support for Broadband Access Aggregation of PPPoE Sessions 69 Contents 69 Prerequisites for Providing Protocol Support for Broadband Access Aggregation of PPPoE Sessions 70 Restrictions for Providing Protocol Support for Broadband Access Aggregation of PPPoE Sessions 70 Information About Providing Protocol Support for Broadband Access Aggregation for PPPoE Sessions 71 PPPoE Specification Definition 71 Benefits of PPPoE Profiles 71 PPPoE Connection Throttling 71 PPPoE Profile Assignment to
Recommended publications
  • Point-To-Point Protocol Over Ethernet (Pppoe) Management
    Point-to-Point Protocol over Ethernet (PPPoE) Management In This Chapter This chapter provides information about using PPPoE, including theory, supported features and configuration process overview. Topics in this chapter include: • PPPoE on page 596 → PPPoE Authentication and Authorization on page 599 → General Flow on page 599 − RADIUS on page 600 − Local User Database Directly Assigned to PPPoE Node on page 601 − Local DHCP Server with Local User Database on page 605 → Multiple Sessions Per MAC Address on page 607 → Private Retail Subnets on page 608 • MLPPPoE, MLPPP(oE)oA with LFI on LNS on page 614 7750 SR Triple Play Service Delivery Architecture Page 595 PPPoE PPPoE A Broadband Remote Access Server (BRAS) is a device that terminates PPPoE sessions. PPPoE sessions are supported on Alcatel-Lucent Broadband Services Router (BSR) on IOM2. The Point- to-Point Protocol (PPP) is used for communications between a client and a server. Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol used to encapsulate PPP frames inside Ethernet frames. Ethernet networks are packet-based, unaware of connections or circuits. Using PPPoE, Alcatel- Lucent users can dial from one router to another over an Ethernet network, then establish a point- to-point connection and transport data packets over the connection. In this application subscriber hosts can connect to the router using a PPPoE tunnel. There are two command available under PPPoE to limit the number of PPPoE hosts, one to set a limit that is applied on each SAP of the group-interface and one to set the limit per group-interface.
    [Show full text]
  • DSL Network Architectures
    CHAPTER 2 DSL Network Architectures This chapter provides a brief overview of available asymmetric DSL (ADSL) architecture options. A typical ADSL service architecture is illustrated in Figure 2-1. In the architecture illustrated, the network consists of Customer Premise Equipment (CPE), the Network Access Provider (NAP) and the Network Service Provider (NSP). CPE refers to an end-user workstations (such as a PC) together with an ADSL modem or ADSL terminating unit router (ATU-R). The NAP provides ADSL line termination by using DSL access multiplexers (DSLAMs). The DSLAM forwards traffic to the local access concentrator, which is used for Point-to-Point Protocol (PPP) tunneling and Layer 3 termination. From the Layer 2 Tunneling Protocol Access Concentrator (LAC), services extend over the ATM core to the NSP. Figure 2-1 Overview of a DSL network deployment including CPE, NAP and NSP components ISP Internet Internet Enterprise DSLAM 6400 ATU-R Termination ATMCore service selection Content Video Aggregation Voice service selection 49326 CPE NAP NSP 2-1 Chapter 2 DSL Network Architectures Technology Overview Technology Overview In this section some of the major DSL architectures are briefly addressed. The order of the architectures presented is from the most simplistic (bridging based) to the most robust and scalable (PPP based). Five general design scheme are described: • Integrated Routing and Bridging (IRB)/RFC 1483 Bridging • Routed Bridge Encapsulation (RBE) • Point-to-Point Protocol over ATM (PPPoA) • Point-to-Point Protocol over Ethernet (PPPoE) • Service Selection Gateway (SSG) Integrated Routing and Bridging (IRB)/RFC 1483 Bridging The RFC 1483 bridging architecture is very simple to understand and implement.
    [Show full text]
  • Understanding Broadband Access Aggregation
    Understanding Broadband Access Aggregation First Published: May 2, 2005 Last Updated: May 2, 2005 Broadband access aggregation is the means by which connections are made among multiple technologies. These technologies include ISDN, DSL, cable, Ethernet, and wireless devices that are connected to corporate virtual private networks (VPNs), third-party applications, and the Internet. Subscriber demand for high-speed services, including multi-player gaming, video-on-demand, home security, digital audio, streaming video, and many other applications, require the delivery of IP services, regardless of the access medium. Because so many different technologies are involved in broadband access aggregation, it is important that the service provider understand their network both in terms of the hardware that makes up the installation, which determines what type of sessions need to be established, but also in terms of what kinds of services their subscribers expect to receive. The demands placed on large service provider installations can often result in the need to contend with millions of sessions and provide flexible and reliable configurations for widely diverse consumer needs. This module contains conceptual information about broadband access aggregation. Contents • Information About Broadband Access Aggregation, page 1 • Additional References, page 6 • Glossary, page 7 Information About Broadband Access Aggregation To perform the necessary tasks in providing broadband access aggregation, you should understand the following concepts: • Encapsulation
    [Show full text]
  • Broadband Access Aggregation and DSL Configuration Guide, Cisco IOS Release 15MT
    Broadband Access Aggregation and DSL Configuration Guide, Cisco IOS Release 15MT Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Point-To-Point Protocol Over Ethernet (Pppoe) Management
    Point-to-Point Protocol over Ethernet (PPPoE) Management In This Chapter This chapter provides information about using PPPoE, including theory, supported features and configuration process overview. Topics in this chapter include: • PPPoE on page 512 → PPPoE Authentication and Authorization on page 515 → General Flow on page 515 − RADIUS on page 516 − Local User Database Directly Assigned to PPPoE Node on page 517 − Local DHCP Server with Local User Database on page 518 → Multiple Sessions Per MAC Address on page 520 → Private Retail Subnets on page 521 • MLPPPoE, MLPPP(oE)oA with LFI on LNS on page 529 7750 SR OS Triple Play Guide Page 511 PPPoE PPPoE A Broadband Remote Access Server (BRAS) is a device that terminates PPPoE sessions. PPPoE sessions are supported on Alcatel-Lucent Broadband Services Router (BSR) on IOM2. The Point- to-Point Protocol (PPP) is used for communications between a client and a server. Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol used to encapsulate PPP frames inside Ethernet frames. Ethernet networks are packet-based, unaware of connections or circuits. Using PPPoE, Alcatel- Lucent users can dial from one router to another over an Ethernet network, then establish a point- to-point connection and transport data packets over the connection. In this application subscriber hosts can connect to the router using a PPPoE tunnel. There are two command available under PPPoE to limit the number of PPPoE hosts, one to set a limit that is applied on each SAP of the group-interface and one to set the limit per group-interface.
    [Show full text]
  • Must-Have Reference for IP and Next Generation Networking
    The Must-Have Reference for IP and Next Generation Networking This reference provides the information you need to (Application-Specific Integrated Circuits) allow real-time understand the terminology associated with IP and next switching and forwarding with wirespeed performance, generation network switching, routing, and testing and at lower cost than traditional software-based products. It enables you to make informed decisions routers built around general-purpose CPUs. about the products. Three factors combined over the last two years to fuel Understanding the Layers the evolution of multilayer switching: • Users need to get beyond the performance Internetworking devices such as bridges, routers, and bottleneck of collapsed backbone routers and avoid switches have traditionally been categorized by the OSI the high cost of expanding them. layer they operate at and the role they play in the • IP traffic from intranet and Internet applications has topology of a network: increased dramatically. • Bridges and switches operate at Layer 2: they • ASIC densities increased enough to allow economic extend network capabilities by forwarding traffic implementation of complex routing functions directly among LANs and LAN segments with high in high-speed hardware instead of using the slow throughput. software techniques of traditional routers. • Routers operate at Layer 3: they perform route calculations based on Layer 3 addresses and Multilayer Switch Names provide multi-protocol support and WAN access, but typically at the cost of higher latency and much Vendors, analysts, and editors don’t agree about the more complex administration requirements. specific meaning of terms such as multilayer switch, Layer 3 switch, IP switch, routing switch, switching Layer 2 refers to the layer in the communications router, and wirespeed router.
    [Show full text]
  • Traffic Policing of In-Contract Traffic in a L2tp Based L2f
    International Journal of Scientific & Engineering Research, Volume 5, Issue 2, February-2014 1126 ISSN 2229-5518 TRAFFIC POLICING OF IN-CONTRACT TRAFFIC IN A L2TP BASED L2F Pushpa yadav Abstract: L2TP (Layer 2 Tunneling Protocol) allows multiprotocol traffic to be encrypted and then sent over any medium that supports point-to-point datagram delivery, such as IP or asynchronous transfer mode. This paper represents the best features of PPTP and L2F. In this paper, we are mainly focusing on topic that how can shape the traffic for a smooth Traffic Management purpose so that we can easily confirm the amount of traffic travelled through the setup. This also ensures that the amount of traffic passed is same or varying to the amount of traffic we want to pass .At time of Congestion, this feature provides an additional benefit and helps in fighting congestion at the real time applications. Also this adds to the existing PPP authentication process and ensures a level of check from our side. Keywords: Authentication, VFN, Tunnelling, VPN, l2F, LAC, PPP ________________________ __________________________ IJSER IJSER © 2014 http://www.ijser.org International Journal of Scientific & Engineering Research, Volume 5, Issue 2, February-2014 1127 ISSN 2229-5518 1 Introduction Tunneling, also known as "port forwarding," is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network.L2TP requires two levels of authentication: Computer level Authentication and User level Authentication.
    [Show full text]