Cisco ASR 1002 not sending Calling Station ID on accounting interim update
We are facing a strange behavior with two Cisco ASR 1002-X routers.
The routers are running on IOS XE, one of them is running version Version 15.4(1)S while the other is running version Version 15.5(3)S1a.
We use the routers to aggregate PPPoE sessions. Each router holds about 5 to 6 thousand PPPoE subscribers.
What we have noticed is that during accounting interim updates for a few clients the routers are not sending the Calling Station ID attribute in the packet, I would like to point out that this happens only for a few pppoe session not all of them.
From what we can see the issue happens only when sending interim updates, when Access Request packet is send the Calling station ID is there but when accounting stop and start messages are sent the Calling Station ID is attribute for the same user is not sent. Meanwhile for other users the same routers include the Calling station ID in the interim Update.
Below is the configuration that we have performed on both routers regarding aaa and pppoe sessions:
aaa authentication login console local aaa authentication ppp default group radius aaa authorization network default group radius aaa accounting delay-start aaa accounting update periodic 10 aaa accounting network default start-stop group radius
aaa server radius dynamic-author server-key 7 x.x.x.x auth-type any ignore session-key
aaa session-id common aaa policy interface-config allow-subinterface
multilink bundle-name authenticated vpdn enable ! vpdn-group pppoe ! Default L2TP VPDN group ! Default PPTP VPDN group accept-dialin protocol any virtual-template 1
bba-group pppoe global virtual-template 1 sessions max limit 12000 sessions per-mac limit 22 sessions per-vlan limit 12000 sessions per-mac throttle 1 3 10 sessions auto cleanup
Hello All, We have Cisco 5545-x & we running SSLVPN anyconnect. when we do tracert 1st hop is showing public of outside interface. we have configure tunnel route toward inside. but when do same think form other firewall it show next hope of ...
Cisco SD-WAN Cloud OnRamp allows you to simplify and secure connectivity to cloud applications and public clouds. Interested in testing out the latest Cisco Cloud OnRamp solutions?
Sign up to try out various use cases with the Cisco SD-WAN Cloud ...
“Use Serviceability Features to Troubleshoot your Cat9K as a Cisco TAC Engineer”
This special event is open only to Cisco Customers and Partners.
Many pages in the Cisco Community are accessible only to Cisco customers, partners, or logged in ...
Cisco Champion Radio · S7|E40 From SD-WAN to SASE: Speed Up and Secure SaaS Internet Apps
The changing global environment has transformed how enterprise users connect to applications. The SASE architecture delivers important networking and securit...
Hi guys,Have a question regarding spanning tree and way its supposed to work when there is a redundant path in fiber daisy-chained switches. Root switch for all vlans is connected via fiber link to the first of the daisy-chained switches. Below is same co...