Configuring Authentication, Authorization, and Accounting Functions
aaa radius attribute nas-port format e PPPPPPQQQQQQQQQQVVVVVVVVVVUUUUUU type 37
Generated NAS-Port:
NAS-port format for IP/DHCP sessions are represented in these examples:
For IPoEoVLAN interface type:
aaa radius attribute nas-port format e SSAAAPPPPPVVVVVVVVVVVVVVVVVVVVVV type 40
For IPoEoQinQ:
aaa radius attribute nas-port format e SSAAAPPPPPQQQQQQQQQQQVVVVVVVVVVV type 41
For virtual IPoEoVLAN:
aaa radius attribute nas-port format e PPPPPPPPVVVVVVVVVVVVVVVVUUUUUUUU type 43
NAS-port format for PPPoE sessions are represented in these examples:
For PPPoEoVLAN
aaa radius attribute nas-port format e SSAAAPPPPPVVVVVVVVVVVVVVVVVVUUUU type 33
For Virtual PPPoEoVLAN:.
aaa radius attribute nas-port format e PPPPPPPPVVVVVVVVVVVVVVVVUUUUUUUU type 36
Note
If a NAS-Port format is not configured for a NAS-Port-Type, the system looks for a default CLI
configuration for the NAS-Port format. In the absence of both these configurations, for sessions with that
particular NAS-Port-Type, the NAS-Port attribute is not sent to the RADIUS server.
Configuring RADIUS Attribute List
Perform this task to create a RADIUS attribute list that is used for filtering authorization and accounting
attributes.
SUMMARY STEPS
1. configure
2. radius-server attribute list listname
3. attribute list_of_radius_attributes
4. attribute vendor-id vendor-type number
5. vendor-type vendor-type-value
6. Use the commit or end command.
DETAILED STEPS
Command or Action
Step 1
configure
Example:
RP/0/RSP0/CPU0:router# configure
OL-26148-02
010001QQQQQQQQQQVVVVVVVVVV000101
interface type:
Cisco ASR 9000 Series Aggregation Services Router Broadband Network Gateway Configuration Guide, Release
Configuring RADIUS Attribute List
Purpose
Enters global configuration mode.
4.2.x
21