06-02-2018 11:47 PM - edited 03-01-2019 03:24 PM
Dear all,
I am looking at a scenario where I receive frames triple tagged. Wholesaler S-Tag and C-Tag, then our own Service TAG.
To terminate traffic on a a BNG configured node, I am rewriting top 2 tags to 1 tag on a POI, then layer 2 handoff to an ASR BNG, where I end up with a "Rewritten S-tag" and our service tag. There will be several unique S-Tag, but C-Tags are only unique per S-Tag.
Challenge I am facing is how to construct authentication attribute format for BNG ? Option 82 is not feasible in this scenario, so I have to make due with Tags, Sub-IF ids and perhaps a remote ID based on POI where tag rewriting is taking place.
Any suggestions, or pointers will be appreciated.
TIA
/Sam
Solved! Go to Solution.
06-05-2018 06:36 AM
hi sam, another option is to use PWHE. this way you instead of bundling 2 tags into a single tag on the adj pre-agg node, you'll make a PW there.
and you map your S-tag as a PW say, and use the inner/outer that is originally there.
so basically if you have a frame that looks like:
ur(S-tag) - their(S-tag) - their(C-tag)
then do: rewrite ingress tag pop 1 symmetric on the EFP side
and xconnect it into a pw with VCid ur(S-tag)
you can build multiple PW's between pre-agg and bng.
for now using PWHE eliminates the use of GEORED, but that is coming, but you can also use PW redundancy in the interim.
also PWHE binds you to RP based session scale.
xander
06-12-2018 07:27 AM
hi sam,
I think you're mixing a few things here that can't work together.
What works is, or what goes together is:
- BNG, amb vlan and dhcp profile (proxy).
- PWHE means xconnect between PW on one leg and a pwhe interface on the other leg.
OR
- bridge domain, vfi's (or not), pseudo wire, attachment circuits
- if you add dhcp snooping to the BD, you must have explicit vlan configuration
snooping does not track the vlan combo for hte incoming session like a BNG access interface does. so while you can take the discover and RELAY it, the return path doesnt exist since dhcp relay doesnt know what vlan combo to inject the packet into the BD with.
so your findings are consistent with the operations of the protocols/device implementation.
xander
06-05-2018 06:36 AM
hi sam, another option is to use PWHE. this way you instead of bundling 2 tags into a single tag on the adj pre-agg node, you'll make a PW there.
and you map your S-tag as a PW say, and use the inner/outer that is originally there.
so basically if you have a frame that looks like:
ur(S-tag) - their(S-tag) - their(C-tag)
then do: rewrite ingress tag pop 1 symmetric on the EFP side
and xconnect it into a pw with VCid ur(S-tag)
you can build multiple PW's between pre-agg and bng.
for now using PWHE eliminates the use of GEORED, but that is coming, but you can also use PW redundancy in the interim.
also PWHE binds you to RP based session scale.
xander
06-05-2018 07:14 AM
Thanks for the clarification Xander,
I stalled PWHE due to lack for GeoRed support, but I will test it this week.
Once again, many thanks !
/Sam
06-11-2018 11:23 PM
Hi Xander,
Finally tested PWHE both BNG and DHCP relay with few issues I am hoping you could shed some light on.
PWHE BNG, works as expected when both ends are configured with xconnect group syntax. Also works when remote end is configured with xconnect defined under bridge group, bridge domain and vfi. For latter, traffic drops as soon as I insert "dhcp ipv4 snoop profile" under either vfi or bridge domain.
For non BNG DHCP relay, ambiguous VLAN does not seem to work on PWHE, a lease is only obtained when encapsulation is set to match both VLANs.
Are there any caveats I should be aware of and how to mitigate them ?
TIA
/Sam
06-12-2018 07:27 AM
hi sam,
I think you're mixing a few things here that can't work together.
What works is, or what goes together is:
- BNG, amb vlan and dhcp profile (proxy).
- PWHE means xconnect between PW on one leg and a pwhe interface on the other leg.
OR
- bridge domain, vfi's (or not), pseudo wire, attachment circuits
- if you add dhcp snooping to the BD, you must have explicit vlan configuration
snooping does not track the vlan combo for hte incoming session like a BNG access interface does. so while you can take the discover and RELAY it, the return path doesnt exist since dhcp relay doesnt know what vlan combo to inject the packet into the BD with.
so your findings are consistent with the operations of the protocols/device implementation.
xander
06-14-2018 12:47 AM
Thanks a million Xander, although I see these are limitations am glad they are consistent with my tests and expected.
Once again, thanks for taking time to reply and clarify !
/Sam
06-12-2018 08:10 AM
hi Sam,
In addition to Xander's reply, I wanted to confirm that PWHE with ambiguous encap works:
RP/0/RSP0/CPU0:our9001#show subscriber session all | i PE1300.1400
IP:DHCP PE1300.1400.ip2 AC 172.31.0.69 (default)
IP:DHCP PE1300.1400.ip1 AC 172.31.0.70 (default)
IP:DHCP PE1300.1400.ip3 AC 172.31.0.71 (default)
IP:DHCP PE1300.1400.ip4 AC 172.31.0.72 (default)
IP:DHCP PE1300.1400.ip5 AC 172.31.0.74 (default)
IP:DHCP PE1300.1400.ip6 AC 172.31.0.75 (default)
RP/0/RSP0/CPU0:our9001#sh run int PE1300.1400
interface PW-Ether1300.1400
service-policy output SPD subscriber-parent resource-id 2
ipv4 unnumbered Loopback100
ipv6 enable
service-policy type control subscriber IPoE_Auth
load-interval 30
ipsubscriber ipv4 l2-connected
initiator dhcp
!
encapsulation ambiguous dot1q 1400 second-dot1q any
/Aleksandar
06-14-2018 12:49 AM
Thanks Aleksandar !
No doubt it works, it was just few variations which as confirmed by Xander do not work. Else I can also confirm BNG PWHE works fine on my test bed.
/Sam
09-10-2018 02:52 PM
Hi Xander
because of CRM and billing software, I would like to generate a AAA attribute format for IPOE session (exactly like for PTA session) as following: <number>@domain.com.
As DLSAM/OLT sent a remote-id-tag <number>-OLTX-ethX, I just need <number> which is 10 digits phone number, and append"@domain.com" (always the same domain).
I try with
!
aaa attribute format RID_FORMAT
format-string length 10 "%s@domain.com" remote-id-tag
!
But whatever it happen, RID_FORMAT attribute is always truncated to 10 first char (ie. 10 digit number).
Is it anyway possible to create a IPOE attribute format same as PPPoE?
Thanks for your help.
noruni
09-11-2018 01:33 AM
What happens if you omit the "length 10", i.e.:
aaa attribute format RID_FORMAT
format-string "%s@domain.com" remote-id-tag
09-11-2018 02:44 AM
hi Alek
Normal remote-id value received by ASR9001 is "9999999999-OLT1-CUST1" with:
9999999999=Phone number (different for each session). So i use phone number as username sent to radius (defined on policy-map): 9999999999@domain.com
Without lenght, and adding domain.com, il have following format string:
9999999999-OLT1-CUST1@domain.com
As it doesn't match with radius server user config, then, the authorization fail.
If you have any idea how to remove "-OLT1-CUST1", that's solve my problem.
Thanks
Noruni
09-11-2018 04:34 AM
you can only "strip" the username or format it.
if you dont care about the "@-domain" part then you can use the :
username-strip prefix-delimiter -
cheers
xander
09-11-2018 02:46 PM
Thanks Xander
I turned around my problem, and I think the only solution is to combine 2 "aaa attribute format":
* first attribute to get only phone number (ie. 1234567890)
* then second attribute which add "@domain" to first attribute.
is it possible to do it in the policy-map?
Noruni
09-16-2018 08:01 PM
Hi Noruni
BTW, as far as i know (but perhaps i am on the wrong way), your solution seems not possible.
Perhaps next major release...
Jacques
09-17-2018 01:59 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide