forum.bitel.ru http://forum.bitel.ru/ |
|
IPoE sessions static IP http://forum.bitel.ru/viewtopic.php?f=44&t=11962 |
Страница 1 из 1 |
Автор: | aneye [ 29 сен 2016, 11:34 ] |
Заголовок сообщения: | IPoE sessions static IP |
Привет. Тут есть закрепленная тема о схемах с ISG по порту коммутатора, но я решил создать отдельную тему, потому что: а) у меня авторизации по порту не происходит, б) в вышеупомянутой теме с декабря 2014 года никто ничего не писал... Пытаемся реализовать схему, когда клиент подключен по технологии IPoE со статическим адресом. Т.е. мы аутентифицируем его по его IP, который является одновременно и логином. Никаких DHCP и 82-х опций нет. Есть тестовая ISG (7200 Software (C7200-ADVENTERPRISEK9-M), Version 15.2(4)S6), BGBillng 6.0 модуль Inet. ISG настраивался одновременно по нескольким статьям (http://wiki.bitel.ru/index.php/ISG,_%D1%81%D1%85%D0%B5%D0%BC%D0%B0_%D1%81%D0%BE_%D1%81%D1%82%D0%B0%D1%80%D1%82%D0%BE%D0%BC_%D1%81%D0%B5%D1%81%D1%81%D0%B8%D0%B8_%D0%B8_%D0%B5%D0%B5_%D0%B0%D0%B2%D1%82%D0%BE%D1%80%D0%B8%D0%B7%D0%B0%D1%86%D0%B8%D0%B5%D0%B9_%D0%BF%D0%BE_IP,_%D0%B2%D1%8B%D0%B4%D0%B0%D1%87%D0%B0_%D0%B0%D0%B4%D1%80%D0%B5%D1%81%D0%BE%D0%B2_%D0%BD%D0%B0_%D0%BE%D1%81%D0%BD%D0%BE%D0%B2%D0%B5_option82, https://www.lanbilling.ru/lanbilling-cisco-isg. Собственно, схемы именно по ISG в этих статьях почти идентичные. Что бы не быть голословным, вот конфиги: ISG: Код: ISG99#sh run Building configuration... Current configuration : 6186 bytes ! ! Last configuration change at 09:27:31 RTZ-3 Thu Sep 29 2016 ! NVRAM config last updated at 09:27:32 RTZ-3 Thu Sep 29 2016 ! version 15.2 service timestamps debug datetime msec service timestamps log datetime msec ! hostname ISG99 ! boot-start-marker boot-end-marker ! ! ! aaa new-model ! ! aaa group server radius ISG_TEST server 10.63.9.105 auth-port 1812 acct-port 1813 ip radius source-interface FastEthernet0/0 attribute nas-port format e UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU ! aaa authentication login IPOE-CLIENTS group ISG_TEST aaa authentication ppp PPPOE-CLIENTS group ISG_TEST aaa authorization network PPPOE-CLIENTS group ISG_TEST aaa authorization network IPOE-CLIENTS group ISG_TEST aaa authorization subscriber-service default local group ISG_TEST aaa authorization subscriber-service PPPOE-CLIENTS local group ISG_TEST aaa authorization subscriber-service IPOE-CLIETNS local group ISG_TEST aaa accounting update periodic 1 aaa accounting network default start-stop group radius aaa accounting network PPPOE-CLIENTS start-stop group ISG_TEST aaa accounting network IPOE-CLIENTS start-stop group ISG_TEST ! ! ! ! aaa server radius dynamic-author client 10.63.9.105 server-key cisco auth-type any ignore session-key ignore server-key ! aaa session-id common clock timezone RTZ-3 4 0 no ip icmp rate-limit unreachable ! ! ! ! ! ! no ip domain lookup ip cef no ipv6 cef ! ! subscriber authorization enable async-bootp dns-server 81.22.63.7 multilink bundle-name authenticated ! ! ! ! ! ! ! username aneye privilege 15 secret 5 $1$OfaS$jw84G4UwlVogs.DQQqAhK0 redirect server-group PORTAL server ip 81.22.63.53 port 80 ! ! ! ! ! ! ip tcp synwait-time 5 class-map type traffic match-any CLASS-TO-REDIRECT match access-group input 199 match access-group output 199 ! class-map type traffic match-any CLASS-TRUSTED match access-group input 198 match access-group output 198 ! class-map type control match-all ISG-IP-UNAUTH match authen-status unauthenticated match timer UNAUTH-TIMER ! policy-map type service LOCAL-L4R 5 class type traffic CLASS-TO-REDIRECT redirect to group PORTAL ! class type traffic default in-out drop ! ! policy-map type service SERVICE-TRUSTED 1 class type traffic CLASS-TRUSTED police input 1024000 192000 384000 police output 1024000 192000 384000 ! class type traffic default input drop ! ! policy-map type control ISG class type control always event session-start 1 authenticate aaa list PPPOE-CLIENTS ! ! policy-map type control ISG-IPOE-POLICY class type control ISG-IP-UNAUTH event timed-policy-expiry 1 service disconnect ! class type control always event session-start 10 authorize aaa list IPOE-CLIENTS password cisco identifier source-ip-address 20 set-timer UNAUTH-TIMER 3 30 service-policy type service name SERVICE-TRUSTED 40 service-policy type service name LOCAL-L4R ! class type control always event session-restart 10 authorize aaa list IPOE-CLIENTS password cisco identifier source-ip-address 20 set-timer UNAUTH-TIMER 3 30 service-policy type service name SERVICE-TRUSTED 40 service-policy type service name LOCAL-L4R ! class type control always event radius-timeout 1 service-policy type service name SERVICE-TRUSTED 2 service-policy type service name LOCAL-L4R ! class type control always event account-logoff 1 service disconnect delay 5 ! ! ! ! ! ! ! ! ! ! bba-group pppoe global virtual-template 1 sessions auto cleanup ! ! interface FastEthernet0/0 ip address 10.63.2.96 255.255.255.0 ip nat outside duplex full ! interface FastEthernet0/0.2 ! interface FastEthernet1/0 no ip address duplex full pppoe enable group global ! interface FastEthernet1/0.251 encapsulation dot1Q 251 ip address 60.1.1.1 255.255.255.252 ip nat inside service-policy type control ISG-IPOE-POLICY ip subscriber routed initiator unclassified ip-address ! interface Virtual-Template1 mtu 1492 ip unnumbered FastEthernet0/0 no ip redirects no ip unreachables no ip proxy-arp ip nat inside no peer default ip address ppp authentication chap pap ms-chap-v2 PPPOE-CLIENTS ppp authorization PPPOE-CLIENTS ppp accounting PPPOE-CLIENTS service-policy type control ISG ! ip local pool PPPOE-CLIENT-POOL 10.99.99.200 10.99.99.254 ip nat inside source list NAT interface FastEthernet0/0 overload ip forward-protocol nd ! ! no ip http server no ip http secure-server ip route 0.0.0.0 0.0.0.0 10.63.2.254 ! ip access-list standard NAT permit 10.37.37.0 0.0.0.255 permit 60.1.1.0 0.0.0.3 ! ip access-list extended PPPOE-ACL-IN deny icmp any any permit ip any any ip access-list extended PPPOE-ACL-OUT deny icmp any any permit ip any any ! ip radius source-interface FastEthernet0/0 access-list 197 permit tcp any any eq www access-list 198 permit udp any any eq domain access-list 198 permit udp any eq domain any access-list 198 permit tcp any host 194.54.14.159 eq www access-list 198 permit tcp any host 194.54.14.159 eq 443 access-list 198 permit icmp any any access-list 198 deny ip any any access-list 199 permit tcp any any eq www access-list 199 permit tcp any any eq 443 access-list 199 permit tcp any any eq 8080 ! ! radius-server attribute 44 include-in-access-req default-vrf radius-server attribute 6 on-for-login-auth radius-server attribute 8 include-in-access-req radius-server attribute 32 include-in-access-req radius-server attribute 32 include-in-accounting-req radius-server attribute 55 include-in-acct-req radius-server attribute 55 access-request include radius-server attribute 25 access-request include radius-server attribute nas-port format e UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU radius-server attribute 31 send nas-port-detail mac-only radius-server host 10.63.9.105 auth-port 1812 acct-port 1813 key cisco radius-server key cisco radius-server vsa send accounting radius-server vsa send authentication ! ! control-plane ! ! line con 0 exec-timeout 0 0 privilege level 15 logging synchronous stopbits 1 line aux 0 exec-timeout 0 0 privilege level 15 logging synchronous stopbits 1 line vty 0 4 password 15xbkjdtr transport input telnet ! ntp update-calendar ntp server 132.163.4.101 ntp server 132.163.4.103 ! end Вот конфигурация устройства ISG в BGBilling: Код: radius.servSearchMode=0 radius.realm=default connection.suspend.timeout=900 connection.close.timeout=130 connection.finish.timeout=5 radius.username.removeDomain=0 radius.realm.default.attributes=Acct-Interim-Interval=60;Idle-Timeout=1300;cisco-avpair=subscriber:accounting-list=IPOE-CLIENTS;cisco-avpair=subscriber:policy-directive=authenticate aaa list IPOE-CLIENTS; radius.inetOption.33.template=framed-mtu=1492;cisco-SSG-Service-Info=I$optionTitle;cisco-SSG-Service-Info=QU;;$speed;;$nburst;;$eburst;;D;;$speed;;$nburst;;$eburst;;; radius.connection.attributes=Acct-Session-Id,User-Name,Framed-IP-Address authorization.mode=1 radius.disable.attributes=Acct-Interim-Interval=60;cisco-avpair=subscriber:accounting-list=IPOE-CLIENTS;cisco-SSG-Service-Info=QU;;1000000;;187500;;375000;;D;;1000000;;187500;;375000;;;cisco-ssg-account-info=ASERVICE-TRUSTED;cisco-ssg-account-info=ALOCAL-L4R; sa.radius.connection.coa.mode=2 sa.radius.connection.close.mode=3 sa.radius.connection.withoutBreak=0 sa.radius.connection.attributes=Acct-Session-Id,User-Name,Framed-IP-Address session.split.onDeviceState=0 session.split.onTariffOption=1 sa.radius.realm.addAttributes=0 sa.radius.connection.attributes=Acct-Session-Id Так вот, проблема в следующем: если у абонента отрицательный баланс, ему возвращается ошибка 12 и Access-Reject: Код: Packet type: Access-Reject Identifier: 6 Authenticator: {DF F5 50 AF 2F 08 66 9F 1F F1 3E B8 42 56 C6 3A} Attributes: Reply-Message=12 На ISG при этом поднимается сессия и применяются сервисы, описанные в policy-map: Код: ISG99#show subscriber session detailed Current Subscriber Information: Total sessions 1 -------------------------------------------------- Type: IP, UID: 7, State: unauthen, Identity: 60.1.1.2 IPv4 Address: 60.1.1.2 Session Up-time: 00:00:02, Last Changed: 00:00:02 Switch-ID: 4135 Policy information: Context 680E7378: Handle 6700001F AAA_id 00000012: Flow_handle 0 Authentication status: unauthen Downloaded User profile, including services: ssg-service-info 0 "QU;1024000;192000;384000;D;1024000;192000;384000" username 0 "LOCAL-L4R" traffic-class 0 "input access-group 199 priority 5" traffic-class 0 "output access-group 199 priority 5" l4redirect 0 "redirect to group PORTAL" traffic-class 0 "input default drop" traffic-class 0 "output default drop" Config history for session (recent to oldest): Access-type: IP Client: SM Policy event: Service Selection Request (Service) Profile name: LOCAL-L4R, 3 references password 0 <hidden> username 0 "LOCAL-L4R" traffic-class 0 "input access-group 199 priority 5" traffic-class 0 "output access-group 199 priority 5" l4redirect 0 "redirect to group PORTAL" traffic-class 0 "input default drop" traffic-class 0 "output default drop" Access-type: IP Client: SM Policy event: Service Selection Request (Service) Profile name: SERVICE-TRUSTED, 3 references password 0 <hidden> username 0 "SERVICE-TRUSTED" traffic-class 0 "input access-group 198 priority 1" traffic-class 0 "output access-group 198 priority 1" ssg-service-info 0 "QU;1024000;192000;384000;D;1024000;192000;384000" traffic-class 0 "input default drop" [b]Active services associated with session: name "LOCAL-L4R", applied before account logon name "SERVICE-TRUSTED", applied before account logon[/b] Rules, actions and conditions executed: subscriber rule-map ISG-IPOE-POLICY condition always event session-start 10 authorize aaa list IPOE-CLIENTS identifier source-ip-address 20 set-timer UNAUTH-TIMER 3 30 service-policy type service name SERVICE-TRUSTED 40 service-policy type service name LOCAL-L4R Classifiers: Class-id Dir Packets Bytes Pri. Definition 0 In 0 0 0 Match Any 1 Out 0 0 0 Match Any 26 In 0 0 1 Match ACL 198 27 Out 0 0 1 Match ACL 198 28 In 0 0 5 Match ACL 199 29 Out 0 0 5 Match ACL 199 4294967294 In 0 0 - Drop 4294967295 Out 0 0 - Drop Features: L4 Redirect: Class-id Rule cfg Definition Source 28 #1 SVC to group PORTAL LOCAL-L4R Policing: Class-id Dir Avg. Rate Normal Burst Excess Burst Source 26 In 1024000 192000 384000 SERVICE-TRUSTED 27 Out 1024000 192000 384000 SERVICE-TRUSTED Configuration Sources: Type Active Time AAA Service ID Name SVC 00:00:02 - SERVICE-TRUSTED SVC 00:00:02 - LOCAL-L4R USR 00:00:02 - Peruser INT 00:00:02 - FastEthernet1/0.251 Но! Ничего не происходит! Т.е. нет ни редиректа, не выборочного "пущания" на сайты (в ACL 198 указан IP sberbank.ru). Подскажите пожалуйста, в чем может быть трабл? Я подозреваю, что проблема скорее цисковская, чем БГ-шная, но к сожалению, на одном хорошем форуме циско пока молчат, как партизаны... А здесь данная тема, на сколько я успел понять, обсуждалась достаточно активно. |
Автор: | georgdts [ 29 сен 2016, 17:03 ] |
Заголовок сообщения: | Re: IPoE sessions static IP |
У меня на 15м ios не взлетало. Но пробовал 2-4 года назад... 100% эта схема работает на Version 12.2(33)SRE2. |
Автор: | aneye [ 29 сен 2016, 17:56 ] |
Заголовок сообщения: | Re: IPoE sessions static IP |
Нет, с "железом" все в порядке. Затык был в голове, как обычно. ![]() Код: class-map type traffic match-any CLASS-TO-REDIRECT match access-group input 199 match access-group output 199 class-map type traffic match-any CLASS-TRUSTED match access-group input name TRUSTED-CLASS-ACL match access-group output name TRUSTED-CLASS-ACL Код: ip access-list extended TRUSTED-CLASS-ACL permit udp any any eq domain permit udp any eq domain any permit tcp any host 5.255.255.55 eq www permit tcp any host 77.88.55.70 eq www permit tcp any host 5.255.255.55 eq 443 permit tcp any host 77.88.55.70 eq 443 permit tcp host 77.88.55.70 any access-list 199 permit tcp any any eq www access-list 199 permit tcp any eq www any access-list 199 deny ip any any Так же, на класс редиректа я поставил меньший приоритет, и вот в таком виде оно заработало. Т.е. при отрицательном балансе клиент редиректиться на заглушку, но при этом может ходить на сайт (у меня yandex.ru в примере). |
Страница 1 из 1 | Часовой пояс: UTC + 5 часов [ Летнее время ] |
Powered by phpBB® Forum Software © phpBB Group http://www.phpbb.com/ |