cc/td/doc/product/access/acs_serv
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

RADIUS Vendor-Specific Attributes Voice Implementation Guide

RADIUS Vendor-Specific Attributes Voice Implementation Guide

Version Date: 6/15/00

This document contains information about the Remote Access Dial-In User Service (RADIUS) vendor-specific attributes (VSA) that Cisco introduced for use with VoIP call authorization. It describes these voice-specific VSAs in detail and provides an example of how they can be used.

This document helps developers writing voice application software for Cisco voice interfaces, such as the Cisco AS5x00 series. This includes independent software vendors (ISVs), in-house corporate developers, system integrators, and Original Equipment Manufacturers (OEMs).

This document includes the following sections:

Overview of RADIUS VSAs

The RADIUS server contains a database that is used for authenticating connections and tracking connection time. The RADIUS server also stores accounting information. For more information about RADIUS, see RFC 2138, "Remote Authentication Dial-In User Service (RADIUS)," and RFC2139, "RADIUS Accounting."

Cisco IOS accounting for voice uses standard RADIUS attributes where possible. In previous Cisco IOS software releases, attributes that could not be mapped to standard RADIUS attributes were "packed" into the Acct-Session-Id attribute field (attribute 44) as a "/" (forward slash) delimited ASCII string. For more information, see the Configuration Guide for AAA Billing Features in Cisco Voice-Enabled Routers and Access Servers at http://www.cisco.com/warp/public/cc/cisco/mkt/servprod/sms/acct/prodlit/caaaf_cg.htm.

Recently, the Internet Engineering Task Force (IETF) introduced a draft standard, "RADIUS Vendor Specific Attributes," which specifies a method for communicating vendor-specific information between the network access server and the RADIUS server by using the vendor-specific attribute (Attribute 26). VSAs allow vendors to support their own extended attributes that are not suitable for general use.

With the implementation of voice-specific VSAs in Cisco IOS software, the previously overloaded Session ID is replaced with a set of voice-specific VSAs, which are described in this document. The VSA structure allows significant enhancement to the previous solution by extending the number of parameters that can be passed between the RADIUS server and the Voice Gateway.

Existing AAA behavior is available, unmodified, as the default behavior of the router. To get the new pieces of information, the caller must enable VSAs on the router. Once this is done, the Acct-Session-Id is no longer overloaded because the information once sent in the Session ID will now be captured in VSAs.


Note Currently, the use of voice-specific VSAs are supported on the Cisco AS5300, Cisco 2600, and Cisco 3600 only.

Developer Support

Developers using this guide may be interested in joining the Cisco Developer Support Program. This new program has been developed to provide you a consistent level of support that you can depend on while leveraging Cisco interfaces in your development projects.

A signed Developer Support Agreement is required to participate in this program. For more details, and access to this agreement, please visit us at: http://www.cisco.com/warp/public/779/servpro/programs/ecosystem/devsup, or contact developer-support@cisco.com.

Format of VSAs

Voice-specific VSAs are included in requests and responses between the Voice Gateway and the RADIUS server using a specific format.


Note A maximum of 248 characters can be assigned to a VSA value.

Voice-Specific VSAs Sent in a Request from the Voice Gateway

Voice-specific VSAs sent in a request from the Voice Gateway are encoded as specified in RFC 2138. The attribute-specific data in each voice-specific VSA contains a Cisco-AV-pair of the form attribute=value.

For example:

h323-conf-id=FF4A3BC9 C540077 0 1E1030

Voice-Specific VSAs in Access Requests from the Voice Gateway to the RADIUS Server

The following table lists the attributes and provides other details about VSAs in access requests. The attribute name should be used in the script code and billing server.
VSA Number Attribute Name VSA Name Accessible from Script?

1

h323-ivr-out

generic ivr-out

Yes

24

h323-conf-id

Conference ID

No

101

h323-credit-amount

Amount Balance

Yes

Voice-Specific VSAs in Accounting Requests from the Voice Gateway to the RADIUS Server

The following table lists the attributes and provides other details about VSAs in accounting requests. The attribute name should be used in the script code and billing server.
VSA Number Attribute Name VSA Name Accessible from Script?

1

h323-incoming-conf-id

Incoming Conference ID

No

1

h323-ivr-out

generic-ivr-out

Yes

1

h323-remote-id

Remote Gateway ID

No

23

h323-remote-address

Remote Gateway Address

No

24

h323-conf-id

Conference ID

No

25

h323-setup-time

Setup Time

No

26

h323-call-origin

Call Origin

No

27

h323-call-type

Call Type

No

28

h323-connect-time

Connect Time

No

29

h323-disconnect-time

Disconnect Time

No

30

h323-disconnect-cause

Disconnect Cause

No

31

h323-voice-quality

Voice Quality

No

33

h323-gw-id

Gateway ID

No

Voice-Specific VSAs in Responses from the RADIUS Server to the Voice Gateway

Voice-specific VSAs received in responses from the RADIUS server should be encoded as specified in RFC2138. The attribute-specific data in each voice-specific VSA should contain a Cisco-AV-pair of the form attribute=value.

For example:

h323-return-code=0
 

The following table lists the attributes and provides other details about VSAs in responses from the RADIUS server to the voice gateway. The attribute name should be used in the script code and billing server.
VSA Number Attribute Name VSA Name Accessible from Script?

1

h323-ivr-in

generic IVR-in

Yes

101

h323-credit-amount

Amount Balance

Yes

102

h323-credit-time

Time Balance

Yes

103

h323-return-code

Return Code

Yes

104

h323-prompt-id

Prompt ID

Yes

105

h323-time-and-day

Time of Day

Yes

106

h323--number

Redirect Number

Yes

107

h323-preferred-lang

Preferred Language

Yes

109

h323-billing-model

Billing Model

Yes

110

h323-currency

Currency Type

Yes

Voice-Specific VSA Descriptions

The types of voice-specific VSAs (Radius Type 26) available depend on whether they are being sent from the Voice Gateway or from the RADIUS server. This section describes the types of voice-specific VSAs available for both requests and responses.

Voice-Specific VSAs Sent From the Voice Gateway

The following table lists the voice-specific VSAs that are sent in an accounting request or access requests from the Voice Gateway, which is acting as the Network Access Server (NAS), to the RADIUS server.
VSA No. VSA Name Sample ASCII Value Purpose Radius Codes First Supported
Release

1

Remote Gateway ID

joshi4.mydomain

From the hostname, other operations like sorting or bringing out statistics is easier as compared to the IP address.

Accounting/
stop packets

12.1(2)T

1

generic ivr-out

payphone:true

User-definable attribute value pairs to be sent from the Voice Gateway to the RADIUS server.

Start and Stop records, Access request (1)

12.1(2)T

1

Incoming Conference ID

3AA9BF7E EAD90003 0 104D3

A VSA present in the start and stop records of all call legs, indicating it is the GUID for the first call. For long pound calls, a new GUID is generated and this incoming conf ID indicates that it is the same session. This is generated for all call legs. In the case of multiple outbound calls from the same inbound leg, a different GUID is used for each outbound call. This VSA is needed to be able to relate the outbound and inbound call legs.1

Start and Stop records

12.1(2)T

22

Cisco-NAS-Port

BRI0/0:1

NAS port number.

Stop record

12.0(7)T

23

Remote Gateway Address

156.221.17.128

Address of the remote gateway.

Stop record

12.0(7)T

24

Conference ID

3C5AEAB9 95C80008 0 587F34

Unique call identifier, 4 long words (128 bits) and space separated. Used to associate call data records (CDRs) from all call legs.

Start and Stop records, Access request

12.0(7)T

25

Setup Time

18:27:28.032 UTC Wed Dec 9 1998

Setup time in NTP format.

Start and Stop records

12.0(7)T

26

Call Origin

answer

Origin of call relative to the gateway. Possible values are "answer" and "originate".

Start and Stop records

12.0(7)T

27

Call Type

VoIP

Call leg type. Possible values are "VoIP" and "Telephony".

Start and Stop records

12.0(7)T

28

Connect Time

18:27:30.094 UTC Wed Dec 9 1998

Connect time in NTP format.

Stop record

12.0(7)T

29

Disconnect Time

18:27:49.095 UTC Wed Dec 9 1998

Disconnect time in NTP format.

Stop record

12.0(7)T

30

Disconnect Cause

4

Q.931 disconnect cause in Network Time Protocol (NTP) format. Possible values are 1 to 160.

Stop record

12.0(7)T

31

Voice Quality

25

Value representing Calculated Planning Impairment Factor (ICPIF) calculation of Voice Quality.

Stop record

12.0(7)T

33

Gateway ID

bowie.cisco.com

Name of the Voice Gateway emitting the message.

Start and Stop records

12.0(7)T

1Incoming Conference ID is different only when long# or outgoing disconnect call is made, otherwise same as Conference ID, as shown below:
h323-conf-id=3AA9BF7E EAD90006 0 11DD44
h323-incoming-conf-id=3AA9BF7E EAD90003 0 104D38
2 VSA attr.2 is not a voice-specific VSA and does not use the format of attribute=value for Cisco-AV-pairs.

Voice-Specific VSAs Sent From the RADIUS Server to the Voice Gateway

The following table lists the voice-specific VSAs that are received from the RADIUS server.
VSA No. VSA Name Sample ASCII Value Purpose Radius Codes First Supported Release

1

generic IVR-in

color:stardust

User-definable attribute value pairs to be sent from the RADIUS server to the Voice Gateway.

Accept (2), Reject (3), Response (5)

12.1(2) / 12.1(2)T

101

Amount Balance

123.45

Currency or unit balance remaining in the user's account (based on the user ID and personal identification number [PIN]).

Accept (2)

12.0(7)T

102

Time Balance

345

Seconds remaining based on called number (DNIS) and user balance. This translates to the hold time for the call.

Second Accept (2)

12.0(7)T

103

Return Code

86

The action to take (such as re-prompt for user ID, inform user that service is not available, redirect the caller, and so forth). For more information about return codes, see the "Return Codes" section.

Accept (2), Reject (3), Response (5)

12.0(7)T

104

Prompt ID

10

An index into an array of prompts known to the IVR script. This can be used with Return code (103) to indicate how and when to play out.

Accept (2), Reject (3), Response (5)

12.0(7)T

105

Time of Day

22:10:31

Time of day at called number.

Accept (2)

12.0(7)T

106

Redirect Number

4085551212

Number to be used for caller redirect. This can be used with Return Code (103) in failure conditions.

Accept (2), Reject (3)

12.0(7)T

107

Preferred Language

en

ISO language code indicating the caller's language of preference.

Accept (2), Reject (3)

12.0(7)T

109

Billing Model

1

Indicates billing model used for the call. Initial values: 0 = Credit, 1 = Debit.

Note The debit card application will assume a Debit billing model.

Accept (2)

12.1(2) / 12.1(2)T

110

Currency Type

USD

ISO currency to indicate what units to use in playing the remaining balance.

Note The debit card application will assume units of preferred_language_dollar.au and preferred_language_cent.au

Accept (2)

12.1(2) / 12.1(2)T


Note You can use the IVR In AV pair to define additional values on the RADIUS server. To do so, populate a voice-specific VSA with following string:

h323-ivr-in=value

where value is the value of the variable that you want the RADIUS server to provide to the script. For example: h323-ivr-in="color=stardust".

Then in your Tool Command Language (TCL) IVR script, you can obtain the value using the following statement:

getVariable aaa h323-ivr-in returnInfo

Using Voice-Specific VSAs with Debit Card Applications

In general, all the voice-specific VSAs are very useful, but optional. However, when using a debit card application, the following voice-specific VSAs are required (must be returned by the RADIUS server):

Return Codes

Return codes can be defined by the user through the implementation of the IVR script and agreement with RADIUS server. The following table lists return codes that are predefined and are expected by existing Cisco IVR scripts.
Value Purpose Comments

  0

Success, proceed

Authorization is successful.

  1

Failed - Invalid Account number

This code is returned after the first authorization request.

  2

Failed - Invalid Password

This code is returned after the first authorization request.

  3

Failed - Account in use

When there is a second attempt to make a call using the same account, authorization should fail unless the Internet Service Provider (ISP) allows multiple users for one account. This code is returned after the first authorization request.

  4

Failed - Zero balance

This code is returned after the first authorization request.

  5

Failed - Card expired

Some prepaid calling cards have expiration dates. When the date has expired, this code is returned after the first authorization request.

Also, when the credit card that is used to pay for the prepaid calling card has expired, this code is returned.

  6

Failed - Credit limit

This code is returned when the account balance has exceeded the credit limit set by the ISP.

  7

Failed - User denied

This code is returned when the account cannot be authorized for reasons other than the ones that are described in this table.

  8

Failed - Service not available

This code is returned after the second authorization request. For example, this code is returned if the network is down or service to a particular calling area is not available.

  9

Failed - Called number blocked

This code is used for blocking 900 numbers or for restricting calls to certain area codes. This code is returned after the second authorization request.

  10

Failed - Number of retries exceeded

This code is used when the number of times the user attempts to enter the account number and PIN has been exceeded.

  11

Failed - Invalid argument

This code is returned after the first or second authorization requests to provide system-level error information. For example, if the request sent to the RADIUS server is not populated with the correct parameters.

  12

Failed - Insufficient balance

This code is returned after the first authorization request when the account does not have enough balance to make a call to the destination number entered.

  13

Toll free calls allowed

This code is returned to allow 800 number calls to the customer service or operators.

  14

Failed - Invalid card number

This code is returned after the first authorization request.

  50

Call will be hairpinned back to the Public Switched Telephone Network (PSTN)

This code is returned when the IP network is not accessible or is busy.

  51

Redirect to called party (use redirect number)

  52

Redirect to Customer Service (use redirect number)

   

Using Return Codes with Debit Card Applications

Currently, the Cisco's debit card implementation is a single user system. Therefore, when using a debit card application, the RADIUS server must not authorize simultaneous usage of the card. The debit card application expects this failure to occur at the second authorization (Access-Request to Access-Accept).

Enabling the Use of VSAs

Before you can use the voice-specific VSAs described in this document, you must enable their use on the router.

To enable the router to send VSAs and optionally limit the type of information sent, use the following command in global configuration mode:
Command Purpose

radius-server vsa send [accounting | authentication]

Enable the network access server to recognize and use VSAs as defined by RADIUS IETF attribute 26.

To enable gateway-specific accounting using VSAs, use the following command in global configuration mode:
Command Purpose

gw-accounting vsa

Enable the gateway to recognize and use VSAs as defined by RADIUS IETF attribute 26.

Example

The following traces in this section show an example of how voice-specific VSAs are used in communication between the Voice Gateway and the RADIUS server (see the following illustration):

The router receives a PSTN incoming call on LEG1(answer/tel) and the NAS sends an accounting START request to the RAIDUS server.

In addition to standard accounting attributes, the request contains five voice-specific VSAs.

Oct 16 23:55:18.083: RADIUS: ustruct sharecount=3
Oct 16 23:55:18.083: RADIUS: added cisco VSA 33 len 18 "h323-gw-id=E1_UUT."
Oct 16 23:55:18.083: RADIUS: added cisco VSA 24 len 38 "h323-conf-id=FF4A3BC9 C540077 0 1E1030"
Oct 16 23:55:18.083: RADIUS: added cisco VSA 26 len 23 "h323-call-origin=answer"
Oct 16 23:55:18.083: RADIUS: added cisco VSA 27 len 24 "h323-call-type=Telephony"
Oct 16 23:55:18.083: RADIUS: added cisco VSA 25 len 48 "h323-setup-time=23:55:19.220 UTC Thu Oct 16 1997"
Oct 16 23:55:18.083: RADIUS: Initial Transmit  id 155 1.13.84.100:1646, Accounting-Request, len 272
Oct 16 23:55:18.087:         Attribute 4 6 010D6701
Oct 16 23:55:18.087:         Attribute 61 6 00000000
Oct 16 23:55:18.087:         Attribute 1 7 33303030
Oct 16 23:55:18.087:         Attribute 30 7 35303030
Oct 16 23:55:18.087:         Attribute 31 7 33303030
Oct 16 23:55:18.087:         Attribute 40 6 00000001
Oct 16 23:55:18.087:         Attribute 6 6 00000001
Oct 16 23:55:18.087:         Attribute 26 26 0000000921146833
Oct 16 23:55:18.087:         Attribute 26 46 0000000918286833
Oct 16 23:55:18.087:         Attribute 26 31 000000091A196833
Oct 16 23:55:18.087:         Attribute 26 32 000000091B1A6833
Oct 16 23:55:18.087:         Attribute 26 56 0000000919326833
Oct 16 23:55:18.087:         Attribute 44 10 30303030
Oct 16 23:55:18.087:         Attribute 41 6 00000000
 

The RADIUS server responds to the accounting start request for LEG1.

Oct 16 23:55:18.099: RADIUS: Received from id 155 1.13.84.100:1646, Accounting-response, len 20
 

The NAS sends the first access request to the RADIUS server. In addition to standard attributes (user, passwd), the request contains one voice-specific VSA.

Oct 16 23:55:24.311: RADIUS: ustruct sharecount=2
Oct 16 23:55:24.311: RADIUS: added cisco VSA 24 len 38 "h323-conf-id=FF4A3BC9 C540077 0 1E1030"
Oct 16 23:55:24.311: RADIUS: Initial Transmit  id 156 1.13.84.100:1645, Access-Request, len 109
Oct 16 23:55:24.311:         Attribute 4 6 010D6701
Oct 16 23:55:24.315:         Attribute 61 6 00000000
Oct 16 23:55:24.315:         Attribute 1 6 31313333
Oct 16 23:55:24.315:         Attribute 26 46 0000000918286833
Oct 16 23:55:24.315:         Attribute 31 7 33303030
Oct 16 23:55:24.315:         Attribute 2 18 6269F5D8
 

The RADIUS server responds to the access request. The response contains three voice-specific VSAs.

Oct 16 23:55:24.331: RADIUS: Received from id 156 1.13.84.100:1645, Access-Accept, len 157
Oct 16 23:55:24.331:         Attribute 26 26 0000000967146833
Oct 16 23:55:24.331:         Attribute 26 30 000000096B186833
Oct 16 23:55:24.331:         Attribute 26 33 00000009651B6833
Oct 16 23:55:24.331:         Attribute 26 23 000000096D116269
Oct 16 23:55:24.331:         Attribute 26 25 000000096E136375
Oct 16 23:55:24.331: RADIUS: saved authorization data for user 61E24B88 at 61E20590
Oct 16 23:55:24.331: RADIUS: cisco AVPair ":h323-return-code=0"
Oct 16 23:55:24.331: RADIUS: cisco AVPair ":h323-preferred-lang=en"
Oct 16 23:55:24.331: RADIUS: cisco AVPair ":h323-credit-amount=537.97"
 

The NAS sends the second access request to the RADIUS server. In addition to standard attributes (user, passwd, dnis), the request contains one voice-specific VSA.

Oct 16 23:55:40.103: RADIUS: ustruct sharecount=2
Oct 16 23:55:40.103: RADIUS: added cisco VSA 24 len 38 "h323-conf-id=FF4A3BC9 C540077 0 1E1030"
Oct 16 23:55:40.103: RADIUS: Initial Transmit  id 157 1.13.84.100:1645, Access-Request, len 116
Oct 16 23:55:40.103:         Attribute 4 6 010D6701
Oct 16 23:55:40.103:         Attribute 61 6 00000000
Oct 16 23:55:40.103:         Attribute 1 6 31313333
Oct 16 23:55:40.103:         Attribute 26 46 0000000918286833
Oct 16 23:55:40.103:         Attribute 30 7 35303030
Oct 16 23:55:40.103:         Attribute 31 7 33303030
Oct 16 23:55:40.103:         Attribute 2 18 45478D73
 

The RADIUS server responds to the access request. The response contains two voice-specific VSAs.

Oct 16 23:55:40.123: RADIUS: Received from id 157 1.13.84.100:1646, Access-Accept, len 76
Oct 16 23:55:40.123:         Attribute 26 26 0000000967146833
Oct 16 23:55:40.123:         Attribute 26 30 0000000966186833
Oct 16 23:55:40.127: RADIUS: saved authorization data for user 61B853E0 at 61E20590
Oct 16 23:55:40.127: RADIUS: cisco AVPair ":h323-return-code=0"
Oct 16 23:55:40.127: RADIUS: cisco AVPair ":h323-credit-time=32270"
 

The router places a VoIP call on LEG2 and the NAS sends an accounting START request to the RADIUS server. In addition to standard accounting attributes, the request contains five voice-specific VSAs.

Oct 16 23:55:45.275: RADIUS: ustruct sharecount=3
Oct 16 23:55:45.275: RADIUS: added cisco VSA 33 len 18 "h323-gw-id=E1_UUT."
Oct 16 23:55:45.275: RADIUS: added cisco VSA 24 len 38 "h323-conf-id=FF4A3BC9 C540077 0 1E1030"
Oct 16 23:55:45.275: RADIUS: added cisco VSA 26 len 26 "h323-call-origin=originate"
Oct 16 23:55:45.275: RADIUS: added cisco VSA 27 len 19 "h323-call-type=VoIP"
Oct 16 23:55:45.275: RADIUS: added cisco VSA 25 len 48 "h323-setup-time=23:55:46.410 UTC Thu Oct 16 1997"
Oct 16 23:55:45.275: RADIUS: Initial Transmit  id 158 1.13.84.100:1646, Accounting-Request, len 269
Oct 16 23:55:45.275:         Attribute 4 6 010D6701
Oct 16 23:55:45.275:         Attribute 61 6 00000000
Oct 16 23:55:45.275:         Attribute 1 6 31313333
Oct 16 23:55:45.275:         Attribute 30 7 35303030
Oct 16 23:55:45.275:         Attribute 31 7 33303030
Oct 16 23:55:45.275:         Attribute 40 6 00000001
Oct 16 23:55:45.275:         Attribute 6 6 00000001
Oct 16 23:55:45.275:         Attribute 26 26 0000000921146833
Oct 16 23:55:45.275:         Attribute 26 46 0000000918286833
Oct 16 23:55:45.275:         Attribute 26 34 000000091A1C6833
Oct 16 23:55:45.279:         Attribute 26 27 000000091B156833
Oct 16 23:55:45.279:         Attribute 26 56 0000000919326833
Oct 16 23:55:45.279:         Attribute 44 10 30303030
Oct 16 23:55:45.279:         Attribute 41 6 00000000
 

The RADIUS server responds to the accounting request for LEG2.

Oct 16 23:55:45.287: RADIUS: Received from id 158 1.13.84.100:1646, Accounting-response, len 20
 

The caller hangs up, the router receives a PSTN disconnect LEG1 message and the NAS sends an accounting STOP request to the RADIUS server. In addition to standard accounting attributes, the request contains nine voice-specific VSAs.

Oct 16 23:56:50.263: RADIUS: ustruct sharecount=2
Oct 16 23:56:50.263: RADIUS: added cisco VSA 33 len 18 "h323-gw-id=E1_UUT."
Oct 16 23:56:50.263: RADIUS: added cisco VSA 24 len 38 "h323-conf-id=FF4A3BC9 C540077 0 1E1030"
Oct 16 23:56:50.263: RADIUS: added cisco VSA 26 len 23 "h323-call-origin=answer"
Oct 16 23:56:50.263: RADIUS: added cisco VSA 27 len 24 "h323-call-type=Telephony"
Oct 16 23:56:50.263: RADIUS: added cisco VSA 25 len 48 "h323-setup-time=23:55:19.220 UTC Thu Oct 16 1997"
Oct 16 23:56:50.263: RADIUS: added cisco VSA 28 len 50 "h323-connect-time=23:55:19.240 UTC Thu Oct 16 1997"
Oct 16 23:56:50.263: RADIUS: added cisco VSA 29 len 53 "h323-disconnect-time=23:56:51.400 UTC Thu Oct 16 1997"
Oct 16 23:56:50.263: RADIUS: added cisco VSA 30 len 24 "h323-disconnect-cause=10"
Oct 16 23:56:50.263: RADIUS: added cisco VSA 31 len 20 "h323-voice-quality=0"
Oct 16 23:56:50.271: RADIUS: Initial Transmit  id 159 1.13.84.100:1646, Accounting-Request, len 481
Oct 16 23:56:50.271:         Attribute 4 6 010D6701
Oct 16 23:56:50.271:         Attribute 61 6 00000000
Oct 16 23:56:50.271:         Attribute 1 7 33303030
Oct 16 23:56:50.271:         Attribute 30 7 35303030
Oct 16 23:56:50.271:         Attribute 31 7 33303030
Oct 16 23:56:50.271:         Attribute 40 6 00000002
Oct 16 23:56:50.271:         Attribute 6 6 00000001
Oct 16 23:56:50.271:         Attribute 26 26 0000000921146833
Oct 16 23:56:50.271:         Attribute 26 46 0000000918286833
Oct 16 23:56:50.271:         Attribute 26 31 000000091A196833
Oct 16 23:56:50.271:         Attribute 26 32 000000091B1A6833
Oct 16 23:56:50.271:         Attribute 26 56 0000000919326833
Oct 16 23:56:50.271:         Attribute 26 58 000000091C346833
Oct 16 23:56:50.271:         Attribute 26 61 000000091D376833
Oct 16 23:56:50.271:         Attribute 26 32 000000091E1A6833
Oct 16 23:56:50.271:         Attribute 26 28 000000091F166833
Oct 16 23:56:50.271:         Attribute 44 10 30303030
Oct 16 23:56:50.271:         Attribute 42 6 0000E020
Oct 16 23:56:50.271:         Attribute 43 6 0002529D
Oct 16 23:56:50.271:         Attribute 47 6 00000701
Oct 16 23:56:50.271:         Attribute 48 6 00000A71
Oct 16 23:56:50.271:         Attribute 46 6 0000005C
Oct 16 23:56:50.271:         Attribute 41 6 00000000
 

The RADIUS server responds to the accounting STOP request for LEG1.

Oct 16 23:56:50.287: RADIUS: Received from id 159 1.13.84.100:1646, Accounting-response, len 46
 

The router disconnects the VoIP call on LEG2 and the NAS sends an accounting STOP request to the RADIUS server. In addition to standard accounting attributes, the request contains nine voice-specific VSAs.

Oct 16 23:56:50.275: RADIUS: ustruct sharecount=2
Oct 16 23:56:50.275: RADIUS: added cisco VSA 33 len 18 "h323-gw-id=E1_UUT."
Oct 16 23:56:50.275: RADIUS: added cisco VSA 24 len 38 "h323-conf-id=FF4A3BC9 C540077 0 1E1030"
Oct 16 23:56:50.275: RADIUS: added cisco VSA 26 len 26 "h323-call-origin=originate"
Oct 16 23:56:50.275: RADIUS: added cisco VSA 27 len 19 "h323-call-type=VoIP"
Oct 16 23:56:50.275: RADIUS: added cisco VSA 25 len 48 "h323-setup-time=23:55:46.410 UTC Thu Oct 16 1997"
Oct 16 23:56:50.275: RADIUS: added cisco VSA 28 len 50 "h323-connect-time=23:55:47.480 UTC Thu Oct 16 1997"
Oct 16 23:56:50.275: RADIUS: added cisco VSA 29 len 53 "h323-disconnect-time=23:56:51.410 UTC Thu Oct 16 1997"
Oct 16 23:56:50.279: RADIUS: added cisco VSA 30 len 24 "h323-disconnect-cause=10"
Oct 16 23:56:50.279: RADIUS: added cisco VSA 31 len 20 "h323-voice-quality=0"
Oct 16 23:56:50.279: RADIUS: added cisco VSA 23 len 31 "h323-remote-address=147.14.25.1"
Oct 16 23:56:50.291: RADIUS: Initial Transmit  id 160 1.13.84.100:1646, Accounting-Request, len 517
Oct 16 23:56:50.291:         Attribute 4 6 010D6701
Oct 16 23:56:50.291:         Attribute 61 6 00000000
Oct 16 23:56:50.291:         Attribute 1 6 31313333
Oct 16 23:56:50.291:         Attribute 30 7 35303030
Oct 16 23:56:50.291:         Attribute 31 7 33303030
Oct 16 23:56:50.291:         Attribute 40 6 00000002
Oct 16 23:56:50.291:         Attribute 6 6 00000001
Oct 16 23:56:50.291:         Attribute 26 26 0000000921146833
Oct 16 23:56:50.291:         Attribute 26 46 0000000918286833
Oct 16 23:56:50.291:         Attribute 26 34 000000091A1C6833
Oct 16 23:56:50.291:         Attribute 26 27 000000091B156833
Oct 16 23:56:50.291:         Attribute 26 56 0000000919326833
Oct 16 23:56:50.291:         Attribute 26 58 000000091C346833
Oct 16 23:56:50.291:         Attribute 26 61 000000091D376833
Oct 16 23:56:50.291:         Attribute 26 32 000000091E1A6833
Oct 16 23:56:50.291:         Attribute 26 28 000000091F166833
Oct 16 23:56:50.291:         Attribute 26 39 0000000917216833
Oct 16 23:56:50.291:         Attribute 44 10 30303030
Oct 16 23:56:50.291:         Attribute 42 6 00008CF0
Oct 16 23:56:50.291:         Attribute 43 6 00008A98
Oct 16 23:56:50.291:         Attribute 47 6 0000070C
Oct 16 23:56:50.291:         Attribute 48 6 000006EE
Oct 16 23:56:50.291:         Attribute 46 6 00000041
Oct 16 23:56:50.291:         Attribute 41 6 00000000
 

The RADIUS server responds to the accounting STOP request for LEG2.

Oct 16 23:56:50.323: RADIUS: Received from id 160 1.13.84.100:1646, Accounting-response, len 46

Command Reference

This section describes the commands that are used to enable the use of voice-specific VSAs.

gw-accounting

To enable gateway specific accounting, use the gw-accounting command. Use the no form of this command to disable gateway specific accounting.

gw-accounting [h323 | syslog | vsa ]

no gw-accounting [h323 | syslog | vsa ]

Syntax Description

h323

(Optional) H.323 method uses RADIUS to output accounting CDRs.

syslog

(Optional) Syslog uses the system logging facility to output CDRs.

vsa

(Optional) Voice-specific VSAs are included in the RADIUS accounting.

Default

Disable gateway specific accounting.

Command Mode

Global configuration

Usage Guidelines

Cisco IOS Release 12.0(4)XH introduces a new vsa field to this command.

This command is used when configuring the AAA accounting application.

This command defines a method for doing the accounting and enables the gateway to do the accounting. There are two accounting methods defined.

Both h.323 and syslog can be enabled at the same time, which causes CDRs to be generated in both methods.

radius-server vsa send

To configure the network access server to recognize and use vendor-specific attributes, use the radius-server vsa send global configuration command. Use the no form of this command to restore the default.

radius-server vsa send [accounting | authentication]

no radius-server vsa send [accounting | authentication]

Syntax Description

accounting

Limits the set of recognized vendor-specific attributes to only accounting attributes.

authentication

Limits the set of recognized vendor-specific attributes to only authentication attributes.

Default

Disabled

Command Mode

Global configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.3T.

The radius-server vsa send command enables the network access server to recognize and use both accounting and authentication vendor-specific attributes. Use the accounting keyword with the radius-server vsa send command to limit the set of recognized vendor-specific attributes to just accounting attributes. Use the authentication keyword with the radius-server vsa send command to limit the set of recognized vendor-specific attributes to just authentication attributes.

Related Documentation

http://www.cisco.com/univercd/cc/td/doc/product/access/acs_serv/5300/cfios/cfselfea/0061ivr.htm
http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/120newft/120t/120t3/voip1203.htm
http://www.cisco.com/univercd/cc/td/doc/product/access/nubuvoip/voip5300/index.htm
http://www.cisco.com/univercd/cc/td/doc/product/access/nubuvoip/voip5800/index.htm
http://www.cisco.com/univercd/cc/td/doc/product/access/nubuvoip/voip3600/index.htm
http://www.cisco.com/univercd/cc/td/doc/product/access/acs_serv/5300/iosinfo/ios_mods/0044gw.htm
http://www.cisco.com/univercd/cc/td/doc/product/access/acs_serv/5300/iosinfo/ios_mods/0042gk.htm
http://www.cisco.com/univercd/cc/td/doc/product/access/acs_serv/5300/cfios/cfselfea/0134bowi.htm
http://www.cisco.com/univercd/cc/td/doc/product/access/acs_serv/vapp_dev/tclivrpg.htm

Glossary

AAA--Authentication, Authorization, and Accounting. AAA is a suite of network security services that provides the primary framework through which you can set up access control on your Cisco router or access server.

CDR--Call Data Record.

DNIS--Dialed number identification service. Same as the called number.

DTMF--Dual tone multifrequency. Use of two simultaneous voice-band tones for dialing (such as touch tone).

Gatekeeper--A Gatekeeper maintains a registry of devices in the multimedia network. The devices register with the Gatekeeper at startup and request admission to a call from the Gatekeeper.

The Gatekeeper is an H.323 entity on the LAN that provides address translation and control access to the LAN for H.323 terminals and gateways. The Gatekeeper can provide other services to the H.323 terminals and gateways, such as bandwidth management and locating gateways.

gateway--A gateway allows H.323 terminals to communicate with non-H.323 terminals by converting protocols. A gateway is the point where a circuit-switched call is encoded and repackaged into IP packets.

An H.323 gateway is an endpoint on the LAN that provides real-time, two-way communications between H.323 terminals on the LAN and other ITU-T terminals in the WAN or to another H.323 gateway.

ISDN--Integrated Services Digital Network. Communication protocol, offered by telephone companies, that permits telephone networks to carry data, voice, and other source traffic.

IVR--Interactive voice response. When someone dials in, IVR responds with a prompt to get a personal identification number (PIN), and so on.

NAS--Network Access Server. Cisco platform (or collection of platforms such as an AccessPath system which interfaces between the packet world (e.g. the Internet) and the circuit world (e.g. the PSTN).

PIN--Personal identification number. Password used with account number for authentication.

POTS--Plain old telephone service. Basic telephone service supplying standard single line telephones, telephone lines, and access to the PSTN.

PSTN--Public Switched Telephone Network. PSTN refers to the local telephone company.

RADIUS--Remote Access Dial-In User Service. Database for authenticating modem and ISDN connections and for tracking connection time.

VoIP--Voice over IP. The ability to carry normal telephone-style voice signals over an IP-based network with POTS-like functionality, reliability, and voice quality. VoIP is a blanket term that generally refers to Cisco's open standards-based (for example, H.323) approach to IP voice traffic.


Note For a list of other internetworking terms, see Internetworking Terms and Acronyms document that is available on the Documentation CD-ROM and Cisco Connection Online (CCO) at the following URL: http://www.cisco.com/univercd/cc/td/doc/cisintwk/ita/index.htm.

Cisco Connection Online

Cisco Connection Online (CCO) is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CCO to obtain additional information and services.

Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco's customers and business partners. CCO services include product information, product documentation, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.

CCO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously: a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and it is excellent for quick access to information over lower bandwidths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.

You can access CCO in the following ways:

For a copy of CCO's Frequently Asked Questions (FAQ), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.


Note If you are a network administrator and need personal technical assistance with a Cisco product that is under warranty or covered by a maintenance contract, contact Cisco's Technical Assistance Center (TAC) at 800 553-2447, 408 526-7209, or tac@cisco.com. To obtain general information about Cisco Systems, Cisco products, or upgrades, contact 800 553-6387, 408 526-7208, or cs-rep@cisco.com.

Documentation CD-ROM

Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more current than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

If you are reading Cisco product documentation on the World Wide Web, you can submit comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco. We appreciate your comments.



hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Aug 7 19:24:01 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.