![]() | Note:
The commands listed in this section apply only to the 7750 SR. |
![]() | Note:
The commands listed in this section apply only to the 7750 SR only. |
Refer to the OS Multi-Service Integrated Services Adapter Guide for MLPPP configuration and command information.
This command creates a text description stored in the configuration file for a configuration context.
The description command associates a text string with a configuration context to help identify the content in the configuration file.
The no form of this command removes the string from the configuration.
No description associated with the configuration context.
This command administratively disables an entity. When disabled, an entity does not change, reset, or remove any configuration settings or statistics.
The operational state of the entity is disabled as well as the operational state of any entities contained within. Many objects must be shut down before they may be deleted.
The no form of this command places the entity into an administratively enabled state.
This command configures a PPP policy. These policies are referenced from interfaces configured for PPP. Multiple PPP policies may be configured.
This default policy cannot be modified nor deleted.
default
This command configures the default PAP password for RADIUS authentication when the Password-Length=0 in the PAP Authenticate-Request.
RADIUS authentication cannot be initiated when the Password-Length=0 in the PAP Authenticate-Request and no default-pap-password is configured. The PPP session terminates in this case.
no default-pap-password
This command configures the default username for authentication when not provided in PAP/CHAP authentication (no Name field in CHAP Response message or Peer-Id-Length=0 in PAP Authenticate-Request).
The PPP session terminates when no username is provided in PAP/CHAP authentication and no default-user-name is configured.
no default-user-name
This command disables the use of cookies.
The no form of the command enables cookies.
no disable-cookies
This command enables PPPoE Maximum-Receive-Unit (MRU) negotiations greater than 1492 bytes without the need to receive a “PPP-Max-Payload” tag in PADI/PADR from the client as defined in RFC 4638, Accommodating a Maximum Transit Unit/Maximum Receive Unit (MTU/MRU) Greater Than 1492 in the Point-to-Point Protocol over Ethernet (PPPoE).
The MRU send in the initial LCP Config Request is determined by the port mtu and ppp-policy ppp-mtu parameters.
no force-ppp-mtu-gt-1492
This command defines the keepalive interval and the number of keepalives that can be missed before the session is declared down for this PPP policy.
The no form of the command reverts to the default value.
30 seconds
3 multiplier
This command enables subnet negotiation using PPP IPCP Subnet-Mask option (0x90) if requested by the client. The subnet can be obtained from RADIUS (Framed-IP-Netmask attribute) or local user database. The subnet is installed as a managed route of the PPP session. This requires the anti-spoof type on the SAP to be configured to nh-mac.
By default, an IPCP Config Request with IPCP Subnet-Mask option (0x90) is rejected.
no ipcp-subnet-negotiation
This command enables the PPP session to stay established when an LCP peer magic number mismatch is detected.
By default, the PPP session is terminated when an LCP peer magic number mismatch is detected.
no lcp-ignore-magic-numbers
This command sets the maximum PPP sessions that can be opened for a given MAC address.
To enable IPv4 address allocation using the internal dhcpv4 client for multiple PPPoE sessions on a single SAP and having the same MAC address and circuit-ID, the optional cli flag “allow-same-circuit-id-for-dhcp” should be added. The SROS local-dhcp-server will detect the additional vendor-specific options inserted by the internal dhcpv4 client and use an extended unique key for lease allocation.
The no form of the command reverts to the default value.
1
This command configures the Access Concentrator name that is used in the PPPoE PADO message.
By default, the system name or if not configured, the chassis Serial Number is used.
no pado-ac-name
This command configures the delay timeout before sending a PPP Active Discovery Offer (PADO) packet.
no delay
This command configures the PPP protocol used to authenticate the PPP session.
This command configures the minimum and maximum length of a PPP Chap Challenge.
When the Chap Challenge is exactly 16 bytes, it is send in the [60] CHAP-Challenge RADIUS attribute and also copied in the RADIUS Authenticator field from the RADIUS Access Request.
ppp-chap-challenge-length min 32 max 64
This command delays the sending of an LCP-configure request after the discovery phase by 40 – 60 milliseconds.
no ppp-initial-delay
This command configures the the maximum PPP MTU size.
no ppp-mtu
This command enables the context to configure PPP options.
This command provides the ability to configure custom PPP options.
![]() | Note:
Standard options such as the DNS name will be returned from DHCP or RADIUS and be converted to PPP automatically. Compression is not supported. |
The no form of the command removes the custom options from the configuration.
This command enables/disables host to reconnect and override existing session.
If disabled and a subscriber abruptly terminates a PPP sessions without sending a PADT to the BNG, the BNG will deny any reconnect attempts until the stale PPP session has expired. With this, enabled re-establish-session will eliminate the waiting period by allowing immediate PPP reconnection attempts
no re-establish-session
This command forces an LCP Protocol Reject when receiving an IPv6CP Configure Request message while IPv6 is not configured.
By default, an IPv6CP Configure Request message is silently ignored when IPv6 is not configured.
no reject-disabled-ncp
Some of the PPPoE clients expect reply on PPPoE Active Discovery Terminate (PADT) message before the context of the session is cleared up. To support such client, a command enabling reply to PADT is provided.
no reply-on-padt
This command defines the time in seconds between 1 and 360 days before the PPP session will be terminated. The default value is unlimited session timeout.
A RADIUS specified session-timeout (attribute [27] Session-Timeout) overrides the CLI configured value.
no session-timeout
This command assigns a unique session ID to each PPPoE session with different MAC addresses that are active on a single SAP.
On a capture-sap, a unique session ID is assigned per MSAP. Multiple sessions with different MAC addresses that are active on the same MSAP have the same session ID.
With the optional parameter per-msap, a unique session id is assigned for each session with different MAC address that is active on the same MSAP.
The maximum session ID range is 1 — .8191.
By default, all PPPoE sessions with different MAC address on a given SAP or MSAP have session-id 1.
no unique-sid-per-sap
This command configures PPP parameters.
The no form of the command reverts all PPP parameters from the PPP context to their defaults.
TThis command configures PPPoE parameters.
The no form of the command reverts all PPPoE parameters from the PPPoE context to their defaults.
This command specifies the type of PPPoE anti-spoof filtering to use.
mac-sid
This command enables the context to configure the PPPoE-to-DHCP options.
This command enables the original VPLS SAP to be included in the circuit-id option to send to the DHCP server (in case this interface is connected to a VPLS by a CCA MDA).
The no form of the command disables the feature.
no ccag-use-origin-sap
This command specifies the PPPoE policy on this interface.
This command allows the configuration of a vendor-specific sub-option string in a DHCP message.
This command specifies the number of PPPoE hosts per SAP allowed for this group-interface.
1
![]() | Note:
The operational maximum value may be smaller due to equipped hardware dependencies. |
This command specifies the number of PPPoE hosts allowed for this group interface.
1
![]() | Note:
The operational maximum value may be smaller due to equipped hardware dependencies. |
This command configures the local user database to use for PPP PAP/CHAP authentication
This command enables the generation of the acct-authentic RADIUS attribute.
This command enables the generation of the acct-delay-time RADIUS attribute.
This command includes called station id attributes.
The no form of the command excludes called station id attributes.
This command enables the inclusion of the calling-station-id attribute in RADIUS authentication requests and RADIUS accounting messages. The value inserted is set at the SAP level. If no calling-station-id value is set at the SAP level, the calling-station-id attribute will not be sent.
no calling-station-id
This command enables the generation of the agent-circuit-id for RADIUS.
This command enables the generation of the delegated-ipv6-prefix RADIUS attribute.
no delegated-ipv6-prefix
This command enables the generation of the framed-interface-id RADIUS attribute.
This command enables the inclusion of the framed-ip-addr attribute.
This command enables the inclusion of the framed-ip-netmask attribute.
This command enables the generation of the framed-ipv6-prefix RADIUS attribute.
This command enables the generation of the ipv6-address RADIUS attribute.
This command enables the generation of the client MAC address RADIUS attribute.
This command enables the generation of the nas-identifier RADIUS attribute.
This command enables the generation of the nas-port RADIUS attribute. You enter decimal representation of a 32-bit string that indicates your port information. This 32-bit string can be compiled based on different information from the port (data types). By using syntax number-of-bits data-type you indicate how many bits from the 32 bits are used for the specific data type. These data types can be combined up to 32 bits in total. In between the different data types 0's and/or 1's as bits can be added.
The no form of this command disables your nas-port configuration.
binary-spec | <bit-specification> <binary-spec> | |
bit-specification | 0 | 1 | <bit-origin> | |
bit-origin | *<number-of-bits><origin> | |
number-of-bits | 1 — 32 | |
origin | o | i | s | m | p | |
o | outer VLAN ID | |
i | inner VLAN ID | |
s | slot number | |
m | MDA number | |
p | port number or lag-id |
This command enables the generation of the nas-port-id RADIUS attribute. Optionally, the value of this attribute (the SAP-id) can be prefixed by a fixed string and suffixed by the circuit-id or the remote-id of the client connection. If a suffix is configured, but no corresponding data is available, the suffix used will be 0/0/0/0/0/0.
This command enables the generation of the nas-port-type RADIUS attribute. If set to nas-port-type, the following will be sent: values: 32 (null-encap), 33 (dot1q), 34 (qinq), 15 (DHCP hosts). The nas-port-type can also be set as a specified value, with an integer from 0 to 255.
The no form of the command reverts to the default.
no nas-port-type
This command enables the generation of the of nat-port-range attribute.
no nat-port-range
This command enables the generation of the agent-remote-id for RADIUS.
This command includes sap-session-index attributes.
The no form of the command excludes sap-session-index attributes.
This command specifies that SLA profile attributes should be included into RADIUS accounting messages.
This command specifies that subscriber profile attributes should be included into RADIUS accounting messages.
This command specifies that subscriber ID attributes should be included into RADIUS accounting messages.
This command creates the context for defining RADIUS accounting server attributes under a given session authentication policy.
This command configures the algorithm used to access the list of configured RADIUS servers.
direct
This command configures the number of times the router attempts to contact the RADIUS server for authentication.
![]() | Note:
The retry count includes the first attempt. |
The no form of the command reverts to the default value.
3 (the initial attempt as well as two retried attempts)
This command specifies the number of times the router attempts to contact the RADIUS server for authentication, if not successful the first time.
The no form of the command reverts to the default value.
This command adds a RADIUS server and configures the RADIUS server IP address, index, and key values.
Up to five RADIUS servers can be configured at any one time. RADIUS servers are accessed in order from lowest to highest index for authentication requests until a response from a server is received. A higher indexed server is only queried if no response is received from a lower indexed server (which implies that the server is not available). If a response from a server is received, no other RADIUS servers are queried.
The no form of the command removes the server from the configuration.
none
This command configures the source address range of the RADIUS messages.
The no form of the command reverts to the default value.
systemIP address
This command configures the number of seconds the router waits for a response from a RADIUS server.
The no form of the command reverts to the default value.
5
![]() | Note:
Command outputs in the following section are examples only; actual displays may differ depending on supported functionality and user configuration. |
This command displays PPP policy information.
This command enables the context to display PPPoE information.
This command displays PPPoE session information.
This command displays PPPoE statistics.
This command displays PPPoE summary information
This command enables the context to clear PPPoE-related data for the specified service.
This command clears PPPoE sessions.
This command clears PPPoE statistics.
This command enables and configures PPP debugging.
This command enables debugging for specific PPPoE events.
This command enables debugging for specific DHCP client events.
This command enables debugging for specific PPP events.
This command shows PPP packets for a particular MAC address.
This command enables debugging for specific PPPoE packets.
This command configures the PPP packet tracing detail level.
This command enables debugging for specific DHCP client packets.
This command enables debugging for specific PPP discovery packets.
This command configures the PPP packet tracing mode.
This command enables debugging for specific PPP packets
This command displays PPP packets for a particular SAP.