cc/td/doc/product/software/ios121/121newft/121t
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Preauthentication with ISDN PRI

Preauthentication with ISDN PRI

This feature module describes the Preauthentication with ISDN PRI feature. It includes information on the benefits of the new feature, supported platforms, and related documents.

This document includes the following sections:

Feature Overview

With an ISDN PRI (Primary Rate Interface), information about an incoming call is available to the network access server (NAS) before the call is answered. The available call information includes the Dialed Number Identification Service (DNIS) number, also referred to as the called number; the Calling Line Identification (CLID) number, also referred to as the calling number; and the call type, also referred to as the bearer capability. The Preauthentication with ISDN PRI feature allows a Cisco NAS to decide---on the basis of the DNIS number, the CLID number, or the call type---whether to answer an incoming call.

When an incoming call arrives from the public network switch, but before it is answered, this feature enables the NAS to send the DNIS number, CLID number, and call type to a RADIUS server for authorization. If the server authorizes the call, then the NAS accepts the call. If the server does not authorize the call, then the NAS sends a disconnect message to the public network switch to reject the call. This feature supports the use of attribute 44 by the RADIUS server application, which allows user authentication on the basis of the CLID number in the same transaction. (For more information about attribute 44 and how it works with preauthentication, refer to the Cisco IOS Release 12.0(7)T feature module entitled RADIUS Attribute 44 (Accounting Session ID) in Access Requests.)

This feature also supports the use of new RADIUS attributes. These RADIUS attributes are configured in the RADIUS preauthentication profiles to specify preauthentication behavior. They may also be used, for instance, to specify whether subsequent authentication should occur and, if so, what authentication method should be used.

In the event that the RADIUS server application becomes unavailable, this feature allows a guard timer to be set in the NAS. When the timer expires, the NAS uses a configurable parameter to accept or reject the incoming call without the authorization.

Benefits

The Preauthentication with ISDN PRI feature offers the following benefits:

Restrictions

The current preauthentication feature may be used with ISDN PRI circuits. A later release of Cisco IOS software will add support for using preauthentication with channel associated signaling (CAS) circuits.

This feature does not work when resource pooling is enabled.

Related Features and Technologies

This feature makes use of the functionality described in the 12.0(7)T feature module entitled
RADIUS Attribute 44 (Accounting Session ID) in Access Requests.

Related Documents

The following documents provide information related to this feature:

Supported Platforms

This feature runs on the following platforms:

Supported Standards, MIBs, and RFCs

Standards

No new or modified standards are supported by this feature.

MIBs

No new or modified MIBs are supported by this feature.

For descriptions of supported MIBs and how to use MIBs, see the Cisco MIB web site on CCO at http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml.

RFCs

No new or modified RFCs are supported by this feature.

Prerequisites

To configure preauthentication, you must first enable the aaa new-model command.

The supporting preauthentication application must be running on a RADIUS server in your network.

Configuration Tasks

See the following sections for configuration tasks for the Preauthentication with ISDN PRI feature. Each task in the list is identified as optional or required.

Configuring Preauthentication

To configure AAA preauthentication, use the following commands beginning in global configuration mode. To enter AAA preauthentication configuration mode, use the aaa preauth command. To configure preauthentication, use some combination of the aaa preauth commands: group, clid, ctype, dnis, and dnis bypass. You must configure the group command. You must also configure one or more of the clid, ctype, dnis, or dnis bypass commands.

Command Purpose

Step 1

Router(config)# aaa preauth

Enters AAA preauthentication configuration mode.

Step2

Router(config-preauth)# group server-group

Specifies the AAA RADIUS server group to use for preauthentication.

Step3

Router(config-preauth)# clid [if-avail | required] 
[accept-stop] [password string]

Preauthenticates calls on the basis of the CLID number.

Step4

Router(config-preauth)# ctype [if-avail | required] 
[accept-stop] [password string]

Preauthenticates calls on the basis of the call type.

Step5

Router(config-preauth)# dnis [if-avail | required] 
[accept-stop] [password string]

Preauthenticates calls on the basis of the DNIS number.

Step6

Router(config-preauth)# dnis bypass {dnis-group-name}

Specifies a group of DNIS numbers that will be bypassed for preauthentication.

In addition to using the above commands to configure preauthentication on the Cisco router, you must set up the preauthentication profiles on the RADIUS server. For information on setting up the preauthentication profiles, see the following sections:

Setting Up the RADIUS Profile for DNIS or CLID Preauthentication

To preauthenticate calls on the basis of the DNIS or CLID number, you must enter the dnis or clid command, as indicated in the section "Configuring Preauthentication."

You must also set up the RADIUS preauthentication profile: use the DNIS or CLID number as the username, and use the password defined in the dnis or clid command as the password.


NoteThe preauthentication profile must have "Outbound" as the service type because the password is predefined on the NAS. Setting up the preauthentication profile in this manner prevents users from trying to log in to the NAS with the username of the DNIS number, CLID number, or call type and an obvious password. The "Outbound" service type is also included in the access-request packet to the RADIUS server.

Setting Up the RADIUS Profile for Call Type Preauthentication

To preauthenticate calls on the basis of the call type, you must enter the ctype command, as indicated in the section "Configuring Preauthentication."

You must also set up the RADIUS preauthentication profile: use the call type string as the username, and use the password defined in the ctype command as the password. The following table shows the call type strings that may be used in the preauthentication profile:
Call Type String ISDN Bearer Capabilities

digital

Unrestricted digital, restricted digital.

speech

Speech, 3.1 kHz audio, 7 kHz audio.

v.110

Anything with V.110 user information layer.

v.120

Anything with V.120 user information layer.


NoteThe preauthentication profile must have "Outbound" as the service type because the password is predefined on the NAS. Setting up the preauthentication profile in this manner prevents users from trying to log in to the NAS with the username of the DNIS number, CLID number, or call type and an obvious password. The "Outbound" service type is also included in the access-request packet to the RADIUS server.

Setting Up the RADIUS Profile for Modem Management

When DNIS, CLID, or call type preauthentication is used, the affirmative response from the RADIUS server may include a modem string for modem management in the NAS through vendor-specific attribute (VSA) 26. The modem management VSA has the following syntax:

    cisco-avpair = "preauth:modem-service=modem min-speed <x> max-speed <y> 
    modulation <z> error-correction <a> compression <b>"

The modem management string within the VSA may contain the following:
Command Argument

min-speed

<300 to 56000>, any

max-speed

<300 to 56000>, any

modulation

K56Flex, v22bis, v32bis, v34, v90, any

error-correction

lapm, mnp4

compression

mnp5, v42bis

When the modem management string is received from the RADIUS server in the form of a VSA, the information is passed to the Cisco IOS software and applied on a per-call basis. Modem ISDN channel aggregation (MICA) modems provide a control channel through which messages can be sent during the call setup time. Hence, this modem management feature is supported only with MICA modems and newer technologies. This feature is not supported with Microcom modems.

Setting Up the RADIUS Profile for Subsequent Authentication

If preauthentication passes, you may use vendor-proprietary RADIUS attribute 201 (Require-Auth) in the preauthentication profile to determine whether subsequent authentication is to be performed. If attribute 201, returned in the access-accept message, has a value of 0, then subsequent authentication will not be performed. If attribute 201 has a value of 1, then subsequent authentication will be performed as usual.

Attribute 201 has an equivalent VSA. The VSA has the following syntax:

    cisco-avpair = "preauth:auth-required=<n>"
     
    

where <n> has the same value range as attribute 201 (that is, 0 or 1).

If attribute 201 or its corresponding VSA is missing in the preauthentication profile, then a value of 1 is assumed, and subsequent authentication is performed.


NoteTo perform subsequent authentication, you must set up a regular user profile in addition to a preauthentication profile.

Setting Up the RADIUS Profile for Subsequent Authentication Type

If you have specified subsequent authentication in the preauthentication profile, you must also specify the authentication types to be used for subsequent authentication. To specify the authentication types allowed in subsequent authentication, use the following VSA:

    cisco-avpair = "preauth:auth-type=<string>"
     
    

where <string> can be one of the following:
String Description

chap

Requires username and password of CHAP1 for PPP authentication.

ms-chap

Requires username and password of MS-CHAP2 for PPP authentication.

pap

Requires username and password of PAP3 for PPP authentication.

1CHAP = Challenge Handshake Authentication Protocol
2MS-CHAP = Microsoft version of CHAP
3PAP = Password Authentication Protocol

To specify that multiple authentication types are allowed, you can configure more than one instance of this VSA in the preauthentication profile. The sequence of the authentication type VSAs in the preauthentication profile is significant because it specifies the order of authentication types to be used in the PPP negotiation.

This VSA is a per-user attribute and replaces the authentication type list in the ppp authentication interface command.


NoteYou should use this VSA only if subsequent authentication is required because it specifies the authentication type for subsequent authentication.

Setting Up the RADIUS Profile to Include the Username

If only preauthentication is used to authenticate a call, the NAS could be missing a username when it brings up the call. RADIUS may provide a username for the NAS to use through RADIUS attribute 1 (User-Name) or through a VSA returned in the access-accept packet. The VSA for specifying the username has the following syntax:

    cisco-avpair = "preauth:username=<string>"
     
    

If no username is specified, the DNIS number, CLID number, or call type is used depending on the last preauthentication command that has been configured (for example, if clid was the last preauthentication command configured, the CLID number will be used as the username).

If subsequent authentication is used to authenticate a call, there might be two usernames: one provided by RADIUS and one provided by the user. In this case, the username provided by the user overrides the one contained in the RADIUS preauthentication profile; the username provided by the user is used for both authentication and accounting.

Setting Up the RADIUS Profile to Support Authorization

If only preauthentication is configured, then subsequent authentication will be bypassed. Note that because the username and password are not available, authorization will also be bypassed. However, you may include authorization attributes in the preauthentication profile to apply per-user attributes and avoid having to return subsequently to RADIUS for authorization. To initiate the authorization process, you must also configure the aaa authorization network command on the NAS.

You may configure authorization attributes in the preauthentication profile with one exception: the Service-Type attribute. The Service-Type attribute must be converted to a VSA in the preauthentication profile. This VSA has the following syntax:

    cisco-avpair = "preauth:service-type=<n>"
     
    

where <n> is one of the standard RFC 2138 values for attribute 6. Here is the list of possible Service-Type values:
Value Description

0

Don't-Care

1

Login

2

Framed

3

Callback-Login

4

Callback-Framed

5

Outbound

6

Administrative

7

NAS-Prompt


NoteIf subsequent authentication is required, the authorization attributes in the preauthentication profile will not be applied.

Configuring a Guard Timer

To set a guard timer to accept or reject a call in the event that the RADIUS server fails to respond to a preauthentication request, use the following command in interface configuration mode:

Command Purpose
Router(config-if)# isdn guard-timer milliseconds 
[on-expiry {accept | reject}]

Sets a guard timer to accept or reject a call in the event that the RADIUS server fails to respond to a preauthentication request.

Configuring RADIUS Attribute 44 to Be Sent in Access-Request Packets

The radius-server attribute 44 include-in-access-req command allows the RADIUS daemon to track a call from the beginning of the call to the end of the call (for example, from the preauthentication stage to the accounting stop record stage). Specifically, this command allows RADIUS attribute 44 to be generated and sent in all access requests to the RADIUS server before the generation of accounting packets (these access requests include preauthentication requests).

To send RADIUS attribute 44 (Accounting Session ID) in access-request packets before user authentication (for example in preauthentication and VPDN requests), use the following command in global configuration command mode:

Command Purpose
Router(config)# radius-server attribute 44 
include-in-access-req 

Sends RADIUS attribute 44 (Accounting Session ID) in access-request packets before user authentication (for example in preauthentication and VPDN requests).

Verifying Preauthentication

To verify preauthentication, use the following commands in privileged EXEC mode:

Command Purpose
Router# more system:running-config

Displays the contents of the current running configuration file. (Note that the more system:running-config command has replaced the show running-config command.)

Router# debug aaa authorization

Displays information on authorization. The debug output displays a line for each attribute-value pair that is authenticated.

Configuration Examples

This section provides the following configuration examples:

Preauthentication Configuration Examples

The following example shows a simple configuration that specifies that the DNIS number be used for preauthentication:

aaa preauth
 group radius
 dnis required
 

The following example shows a configuration that specifies that both the DNIS number and the CLID number be used for preauthentication. DNIS preauthentication will be performed first, followed by CLID preauthentication.

aaa preauth
 group radius
 dnis required
 clid required
 

The following example specifies that preauthentication be performed on all DNIS numbers except the two DNIS numbers specified in the DNIS group called hawaii:

aaa preauth
 group radius
 dnis required
 dnis bypass hawaii
 
dialer dnis group hawaii
 number 12345
 number 12346

NoteTo configure preauthentication, you must also set up preauthentication profiles on the RADIUS server.

Guard Timer Configuration Example

The following example shows a guard timer that is set at 8000 milliseconds. A call will be rejected if the RADIUS server has not responded to a preauthentication request when the timer expires.

interface serial1/0/0:23
 isdn guard-timer 8000 on-expiry reject
 
aaa preauth
 group radius
 dnis required

RADIUS Attribute 44 Configuration Example

The following example shows a configuration that sends RADIUS attribute 44 in access-request packets before user authentication:

aaa new-model
aaa authentication ppp default group radius
radius-server host 10.100.1.34
radius-server attribute 44 include-in-access-req

Command Reference

This section documents new commands. All other commands used with this feature are documented in the Cisco IOS Release 12.1 command reference publications.

aaa preauth

To enter AAA preauthentication configuration mode, use the aaa preauth global configuration command. To disable preauthentication, use the no form of this command.

aaa preauth

no aaa preauth

Syntax Description

This command has no arguments or keywords.

Defaults

Preauthentication is not enabled.

Command Modes

Global configuration

Command History
Release Modification

12.1(2)T

This command was introduced.

Usage Guidelines

To enter AAA preauthentication configuration mode, use the aaa preauth command. To configure preauthentication, use some combination of the aaa preauth commands: group, clid, ctype, dnis, and dnis bypass. You must configure the group command. You must also configure one or more of the clid, ctype, dnis, or dnis bypass commands.

In addition to using the preauthentication commands to configure preauthentication on the Cisco router, you must set up the preauthentication profiles on the RADIUS server.

You can use the clid, ctype, or dnis commands to define the list of the preauthentication elements. For each preauthentication element, you can also define options such as password (for all the elements, the default password is "cisco"). If you specify multiple elements, the preauthentication process will be performed on each element according to the order of the elements that you configure with the preauthentication commands. In this case, more than one RADIUS preauthentication profile is returned, but only the last preauthentication profile will be applied to the authentication and authorization later on, if applicable.

Examples

The following example shows a configuration that specifies that both the DNIS number and the CLID number be used for preauthentication. DNIS preauthentication will be performed first, followed by CLID preauthentication.

aaa preauth
 group radius
 dnis required
 clid required

Related Commands
Command Description

clid

Preauthenticates calls on the basis of the CLID number.

ctype

Preauthenticates calls on the basis of the call type.

dnis

Preauthenticates calls on the basis of the DNIS number.

dnis bypass

Specifies a group of DNIS numbers that will be bypassed for preauthentication.

group

Specifies the AAA RADIUS server group to use for preauthentication.

isdn guard-timer

Sets a guard timer to accept or reject a call in the event that the RADIUS server fails to respond to a preauthentication request.

clid

To preauthenticate calls on the basis of the CLID number, use the clid AAA preauthentication configuration command. To remove the clid command from your configuration, use the no form of this command.

clid [if-avail | required] [accept-stop] [password string]

no clid [if-avail | required] [accept-stop] [password string]

Syntax Description

if-avail

(Optional) Implies that if the switch provides the data, RADIUS must be reachable and must accept the string in order for preauthentication to pass. If the switch does not provide the data, preauthentication passes.

required

(Optional) Implies that the switch must provide the associated data, that RADIUS must be reachable, and that RADIUS must accept the string in order for preauthentication to pass. If these three conditions are not met, preauthentication fails.

accept-stop

(Optional) Prevents subsequent preauthentication elements from being tried once preauthentication has succeeded for a call element.

password string

(Optional) Defines the password for the preauthentication element.

Defaults

The if-avail and required keywords are mutually exclusive. If the if-avail keyword is not configured, the preauthentication setting defaults to required.

The default password string is cisco.

Command Modes

AAA preauthentication configuration

Command History
Release Modification

12.1(2)T

This command was introduced.

Usage Guidelines

You may configure more than one of the AAA preauthentication commands (clid, ctype, dnis) to set conditions for preauthentication. The sequence of the command configuration decides the sequence of the preauthentication conditions. For example, if you configure dnis, then clid, then ctype, in this order, then this is the order of the conditions considered in the preauthentication process.

In addition to using the preauthentication commands to configure preauthentication on the Cisco router, you must set up the preauthentication profiles on the RADIUS server.

Examples

The following example specifies that incoming calls be preauthenticated on the basis of the CLID number:

aaa preauth
 group radius
 clid required

Related Commands
Command Description

ctype

Preauthenticates calls on the basis of the call type.

dnis

Preauthenticates calls on the basis of the DNIS number.

dnis bypass

Specifies a group of DNIS numbers that will be bypassed for preauthentication.

group

Specifies the AAA RADIUS server group to use for preauthentication.

ctype

To preauthenticate calls on the basis of the call type, use the ctype AAA preauthentication configuration command. To remove the ctype command from your configuration, use the no form of this command.

ctype [if-avail | required] [accept-stop] [password string]

no ctype [if-avail | required] [accept-stop] [password string]

Syntax Description

if-avail

(Optional) Implies that if the switch provides the data, RADIUS must be reachable and must accept the string in order for preauthentication to pass. If the switch does not provide the data, preauthentication passes.

required

(Optional) Implies that the switch must provide the associated data, that RADIUS must be reachable, and that RADIUS must accept the string in order for preauthentication to pass. If these three conditions are not met, preauthentication fails.

accept-stop

(Optional) Prevents subsequent preauthentication elements from being tried once preauthentication has succeeded for a call element.

password string

(Optional) Defines the password for the preauthentication element.

Defaults

The if-avail and required keywords are mutually exclusive. If the if-avail keyword is not configured, the preauthentication setting defaults to required.

The default password string is cisco.

Command Modes

AAA preauthentication configuration

Command History
Release Modification

12.1(2)T

This command was introduced.

Usage Guidelines

You may configure more than one of the AAA preauthentication commands (clid, ctype, dnis) to set conditions for preauthentication. The sequence of the command configuration decides the sequence of the preauthentication conditions. For example, if you configure dnis, then clid, then ctype, in this order, then this is the order of the conditions considered in the preauthentication process.

In addition to using the preauthentication commands to configure preauthentication on the Cisco router, you must set up the preauthentication profiles on the RADIUS server.

Set up the RADIUS preauthentication profile with the call type string as the username and with the password defined in the ctype command as the password. The following table shows the call type strings that you may use in the preauthentication profile:
Call Type String ISDN Bearer Capabilities

digital

Unrestricted digital, restricted digital.

speech

Speech, 3.1 kHz audio, 7 kHz audio.

v.110

Anything with V.110 user information layer.

v.120

Anything with V.120 user information layer.

Examples

The following example specifies that incoming calls be preauthenticated on the basis of the call type:

aaa preauth
 group radius
 ctype required

Related Commands
Command Description

clid

Preauthenticates calls on the basis of the CLID number.

dnis

Preauthenticates calls on the basis of the DNIS number.

dnis bypass

Specifies a group of DNIS numbers that will be bypassed for preauthentication.

group

Specifies the AAA RADIUS server group to use for preauthentication.

dnis (AAA preauthentication configuration)

To preauthenticate calls on the basis of the DNIS number, use the dnis AAA preauthentication configuration command. To remove the dnis command from your configuration, use the no form of this command.

dnis [if-avail | required] [accept-stop] [password string]

no dnis [if-avail | required] [accept-stop] [password string]

Syntax Description

if-avail

(Optional) Implies that if the switch provides the data, RADIUS must be reachable and must accept the string in order for preauthentication to pass. If the switch does not provide the data, preauthentication passes.

required

(Optional) Implies that the switch must provide the associated data, that RADIUS must be reachable, and that RADIUS must accept the string in order for preauthentication to pass. If these three conditions are not met, preauthentication fails.

accept-stop

(Optional) Prevents subsequent preauthentication elements from being tried once preauthentication has succeeded for a call element.

password string

(Optional) Defines the password for the preauthentication element.

Defaults

The if-avail and required keywords are mutually exclusive. If the if-avail keyword is not configured, the preauthentication setting defaults to required.

The default password string is cisco.

Command Modes

AAA preauthentication configuration

Command History
Release Modification

12.1(2)T

This command was introduced.

Usage Guidelines

You may configure more than one of the AAA preauthentication commands (clid, ctype, dnis) to set conditions for preauthentication. The sequence of the command configuration decides the sequence of the preauthentication conditions. For example, if you configure dnis, then clid, then ctype, in this order, then this is the order of the conditions considered in the preauthentication process.

In addition to using the preauthentication commands to configure preauthentication on the Cisco router, you must set up the preauthentication profiles on the RADIUS server.

Examples

The following example specifies that incoming calls be preauthenticated on the basis of the DNIS number:

aaa preauth
 group radius
 dnis required

Related Commands
Command Description

clid

Preauthenticates calls on the basis of the CLID number.

ctype

Preauthenticates calls on the basis of the call type.

dnis bypass

Specifies a group of DNIS numbers that will be bypassed for preauthentication.

group

Specifies the AAA RADIUS server group to use for preauthentication.

dnis bypass (AAA preauthentication configuration)

To specify a group of DNIS numbers that will be bypassed for preauthentication, use the dnis bypass AAA preauthentication configuration command. To remove the dnis bypass command from your configuration, use the no form of this command.

dnis bypass {dnis-group-name}

no dnis bypass {dnis-group-name}

Syntax Description

dnis-group-name

Name of the defined DNIS group.

Defaults

This command is not enabled.

Command Modes

AAA preauthentication configuration

Command History
Release Modification

12.1(2)T

This command was introduced.

Usage Guidelines

You must first create a DNIS group with the dialer dnis group command before using this command.

Examples

The following example specifies that preauthentication be performed on all DNIS numbers except for two DNIS numbers (12345 and 12346), which have been defined in the DNIS group called hawaii:

aaa preauth
 group radius
 dnis required
 dnis bypass hawaii
 
dialer dnis group hawaii
 number 12345
 number 12346

Related Commands
Command Description

dialer dnis group

Creates a DNIS group.

dnis

Preauthenticates calls on the basis of the DNIS number.

group (AAA preauthentication configuration)

To specify the AAA RADIUS server group to use for preauthentication, use the group AAA preauthentication configuration command. To remove the group command from your configuration, use the no form of this command.

group server-group

no group server-group

Syntax Description

server-group

Specifies a AAA RADIUS server group.

Defaults

No default behavior or values.

Command Modes

AAA preauthentication configuration

Command History
Release Modification

12.1(2)T

This command was introduced.

Usage Guidelines

You must configure a RADIUS server group with the aaa group server radius command in global configuration mode before using the group command in AAA preauthentication configuration mode.

You must configure the group command before you configure any other AAA preauthentication command (clid, ctype, dnis, or dnis bypass).

Examples

The following example shows the creation of a RADIUS server group called maestro and then specifies that DNIS preauthentication be performed using this server group:

aaa group server radius maestro
 server 1.1.1.1 
 server 2.2.2.2 
 server 3.3.3.3 
 
aaa preauth
 group maestro
 dnis required

Related Commands
Command Description

aaa group server radius

Groups different RADIUS server hosts into distinct lists and distinct methods.

clid

Preauthenticates calls on the basis of the CLID number.

ctype

Preauthenticates calls on the basis of the call type.

dnis

Preauthenticates calls on the basis of the DNIS number.

dnis bypass

Specifies a group of DNIS numbers that will be bypassed for preauthentication.

isdn guard-timer

To set a guard timer to accept or reject a call in the event that the RADIUS server fails to respond to a preauthentication request, use the isdn guard-timer interface configuration command. To remove the isdn guard-timer command from your configuration file, use the no form of this command.

isdn guard-timer milliseconds [on-expiry {accept | reject}]

no isdn guard-timer milliseconds [on-expiry {accept | reject}]

Syntax Description

milliseconds

Specifies the number of milliseconds to wait for a response from the RADIUS server.

on-expiry accept

(Optional) Accepts the call if a response is not received from the RADIUS server within the specified time.

on-expiry reject

(Optional) Rejects the call if a response is not received from the RADIUS server within the specified time.

Defaults

The default is to reject the call.

Command Modes

Interface configuration

Command History
Release Modification

12.1(2)T

This command was introduced.

Examples

The following example shows a guard timer that is set at 8000 milliseconds. A call will be rejected if the RADIUS server has not responded to a preauthentication request when the timer expires.

interface serial1/0/0:23
 isdn guard-timer 8000 on-expiry reject
 
aaa preauth
 group radius
 dnis required

Related Commands
Command Description

aaa preauth

Enters AAA preauthentication configuration mode.

Glossary

AAA---authentication, authorization, and accounting. Suite of network security services that provide the primary framework through which access control can be set up on your Cisco router or access server.

authentication, authorization, and accounting---See AAA.

Caller ID---See CLID.

Calling Line Identification---See CLID.

CAS---channel associated signaling. Call signaling that enables the access server to send or receive analog calls.

Challenge Handshake Authentication Protocol---See CHAP.

channel associated signaling---See CAS.

CHAP---Challenge Handshake Authentication Protocol. Security feature supported on lines using PPP encapsulation that prevents unauthorized access. CHAP does not itself prevent unauthorized access; it merely identifies the remote end. The router or access server then determines whether that user is allowed access. Compare to PAP.

CLID---Calling Line Identification. Also called Caller ID. CLID provides the number from which a call originates.

Dialed Number Identification Service---See DNIS.

DNIS---Dialed Number Identification Service. DNIS provides the number that is dialed.

Integrated Services Digital Network---See ISDN.

ISDN---Integrated Services Digital Network. Communication protocol, offered by telephone companies, that permits telephone networks to carry data, voice, and other source traffic.

MICA---modem ISDN channel aggregation. Modem module and card used in the Cisco AS5300 universal access servers. A MICA modem provides an interface between an incoming or outgoing digital call and an ISDN telephone line; the call does not have to be converted to analog, as it does with a conventional modem and an analog telephone line. Each line can accommodate, or aggregate, up to 24 (T1) or 30 (E1) calls.

modem ISDN channel aggregation---See MICA.

MS-CHAP---Microsoft version of CHAP.

NAS---network access server. Cisco platform (or collection of platforms such as an AccessPath system) that interfaces between the packet world (for example, the Internet) and the circuit world (for example, the Public Switched Telephone Network).

network access server---See NAS.

PAP---Password Authentication Protocol. Authentication protocol that allows PPP peers to authenticate one another. The remote router attempting to connect to the local router is required to send an authentication request. Unlike CHAP, PAP passes the password and host name or username in the clear (unencrypted). PAP does not itself prevent unauthorized access; it merely identifies the remote end. The router or access server then determines if that user is allowed access. PAP is supported only on PPP lines. Compare with CHAP.

Password Authentication Protocol---See PAP.

Point-to-Point Protocol---See PPP.

PPP---Point-to-Point Protocol. Successor to SLIP that provides router-to-router and host-to-network connections over synchronous and asynchronous circuits. Whereas SLIP was designed to work with IP, PPP was designed to work with several network layer protocols, such as IP, IPX, and ARA. PPP also has built-in security mechanisms, such as CHAP and PAP. PPP relies on two protocols: LCP and NCP.

PRI---Primary Rate Interface. ISDN interface to primary rate access. Primary rate access consists of a single 64-Kbps D channel plus 23 (T1) or 30 (E1) B channels for voice or data.

Primary Rate Interface---See PRI.

PSTN---Public Switched Telephone Network. General term referring to the variety of telephone networks and services in place worldwide. Sometimes called POTS (plain old telephone service).

Public Switched Telephone Network---See PSTN.

RADIUS---Remote Authentication Dial-In User Service. Database for authenticating modem and ISDN connections and for tracking connection time.

Remote Authentication Dial-In User Service---See RADIUS.

vendor-specific attribute---See VSA.

VSA---vendor-specific attribute. An attribute that has been implemented by a particular vendor. It uses the attribute Vendor-Specific to encapsulate the resulting AV pair: essentially,
Vendor-Specific = "protocol:attribute=value".


hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon May 22 12:13:07 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.