[Top][Contents][Prev][Next][Last]Search


Setting Up Virtual Private Networks


Introduction to Virtual Private Networks 13-1
Configuring ATMP tunnels
Configuring PPTP tunnels for dial-in clients
Configuring L2TP tunnels for dial-in clients

Introduction to Virtual Private Networks

Virtual Private Networks (VPN) provide low-cost remote access to private LANs via the Internet. The tunnel to the private corporate network can be from an ISP, enabling Mobile Nodes to dial in to a corporate network, or it can provide a low-cost Internet connection between two corporate networks. Ascend currently supports these VPN schemes: Ascend Tunnel Management Protocol (ATMP), Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP).

An ATMP session can occur only between two Ascend units and must see UDP/IP. The MAX encapsulates all packets passing through the tunnel in standard Generic Routing Encapsulation as described in RFC 1701. ATMP creates and tears down a cross-Internet tunnel between the two Ascend units. In effect, the tunnel collapses the Internet cloud and provides what looks like direct access to a Home Network. The tunnels do not support bridging. All packets must be routed with IP or IPX.

The Microsoft Corporation developed Point-to-Point-Tunneling Protocol (PPTP) to enable Windows 95 and Windows NT Workstation users to dial into a local ISP to connect to a private corporate network across the Internet.

Version 8 of the Internet Engineering Task Force (IETF) draft titled Layer Two Tunneling Protocol "L2TP," dated November, 1997, specifies the Layer 2 Tunneling Protocol (L2TP). L2TP enables you to connect to a private network by dialing into a local MAX, which creates and maintains an L2TP tunnel between itself and the private network.

Configuring ATMP tunnels

ATMP is a UDP/IP-based protocol for tunneling between two Ascend units across an IP network. Data is transported through the tunnel in Generic Routing Encapsulation (GRE), as described in RFC 1701. (For a complete description of ATMP, see RFC 2107, Ascend Tunnel Management Protocol - ATMP.)

This section describes how ATMP tunnels work between two MAX units. One of the units acts as a Foreign Agent (typically a local ISP) and one as a Home Agent (which can access the Home Network). A Mobile Node dials into the Foreign Agent, which establishes a cross-Internet IP connection to the Home Agent. The Foreign Agent then requests an ATMP tunnel on top of the IP connection. The Foreign Agent must use RADIUS to authenticate Mobile Nodes dial ins.

The Home Agent is the terminating part of the tunnel, and provides most of the ATMP intelligence. It must be able to communicate with the Home Network (the destination network for Mobile Nodes) through a direct connection, another router, or across a nailed connection.

For example, in Figure 13-1, the Mobile Node might be a sales person who logs into an ISP to access his or her Home Network. The ISP is the Foreign Agent. The Home Agent has access to the Home Network.

Figure 13-1. ATMP tunnel across the Internet

How the MAX creates ATMP tunnels

The MAX establishes an ATMP connection as follows:

  1. A Mobile Node dials a connection to the Foreign Agent.

  2. The Foreign Agent uses a RADIUS profile to authenticate the Mobile Node.

    The MAX, configured as a Foreign Agent, requires RADIUS authentication of the Mobile Node, because only RADIUS supports the required attributes.

  3. The Foreign Agent uses the Ascend-Home-Agent-IP-Addr attribute in the Mobile Node's RADIUS profile to locate a Connection profile (or RADIUS profile) for the Home Agent.

  4. The Foreign Agent dials the Home Agent, and authenticates and establishes an IP connection in the usual way.

  5. The Foreign Agent informs the Home Agent that the Mobile Node is connected, and requests a tunnel. The Foreign Agent sends up to 10 RegisterRequest messages at two-second intervals, timing out and logging a message if it receives no response to the requests.

  6. The Home Agent requests a password before it creates the tunnel.

  7. The Foreign Agent returns an encrypted version of the Ascend-Home-Agent-Password found in the Mobile Node's RADIUS profile. This password must match the Home Agent's Password parameter in the ATMP configuration in the Ethernet Profile.

  8. The Home Agent returns a RegisterReply with a number that identifies the tunnel. If registration fails, the MAX logs a message and the Foreign Agent disconnects the Mobile Node. If registration succeeds, the MAX creates the tunnel between the Foreign Agent and the Home Agent.

  9. When the Mobile Node disconnects from the Foreign Agent, the Foreign Agent sends a DeregisterRequest to the Home Agent to close the tunnel.

    The Foreign Agent can send its request a maximum of ten times, or until it receives a DeregisterReply. If the Foreign Agent receives packets for a Mobile Node whose connection has been terminated, the Foreign Agent silently discards the packets.

Setting the UDP port

By default, ATMP agents use UDP port 5150 to exchange control information while establishing a tunnel. If the Home Agent ATMP profile specifies a different UDP port number, all tunnel requests to that Home Agent must specify the same UDP port.


Note: A system reset is required for the ATMP subsystem to recognize the new UDP port number.

Setting an MTU limit

The type of link that connects a Foreign Agent and Home Agent determines the Maximum Transmission Unit (MTU). The link may be a dial-up connection, a Frame Relay connection, or an Ethernet link, and it may be a local network or routed through multiple hops. If the link between devices is multihop (if it traverses more than one network segment), the path MTU is the minimum MTU of the intervening segments.

Figure 13-2 shows an ATMP setup across an Ethernet segment, which limits the path MTU to 1500 bytes.

Figure 13-2. Path MTU on an Ethernet segment

If any segment of the link between the agents has an MTU smaller than 1528, some packet fragmentation and reassembly will occur. You can push fragmentation and reassembly tasks to connection end-points (a mobile client and a device on the home network) by setting an MTU limit. Client software then uses MTU discovery mechanisms to determine the maximum packet size, and then fragments packets before sending them.

How link compression affects the MTU

Compression affects which packets must be fragmented, because compressed packets are shorter than their original counterparts. If any kind of compression is on (such as VJ header or link compression), the connection can transfer larger packets without exceeding a link's Maximum Receive Unit (MRU). If compressing a packet makes it smaller than the MRU, it can be sent across the connection, whereas the same packet without compression could not.

How ATMP tunneling causes fragmentation

To transmit packets through an ATMP tunnel, the MAX adds an 8-byte GRE header and a 20-byte IP header to the frames it receives. The addition of these packet headers can make the packet larger than the MTU of the tunneled link, in which case the MAX must either fragment the packet after encapsulating it or reject the packet.

Fragmenting packets after encapsulating them has several disadvantages for the Foreign Agent and Home Agent. For example, it causes a performance degradation because both agents have extra overhead. It also means that the Home Agent device cannot be a GRF switch. (To maintain its very high aggregate throughput, a GRF switch does not perform reassembly.)

Pushing the fragmentation task to connection end-points

To avoid the extra overhead incurred when ATMP agents perform fragmentation, you can either set up a link between the two units that has an MTU greater than 1528 (which means it cannot include Ethernet segments), or you can set the Ethernet > Mod Config > ATMP > GRE MTU parameter to a value that is 28 bytes less than the path MTU.

If you set GRE MTU to zero (the default), the MAX might fragment encapsulated packets before transmission. The other ATMP agent must then reassemble the packets.

If you set GRE MTU to a nonzero value, the MAX reports that value to the client software as the path MTU, causing the client to send packets of the specified size. This pushes the task of fragmentation and reassembly out to the connection end-points, lowering the overhead on the ATMP agents.

For example, if the MAX is communicating with another ATMP agent across an Ethernet segment, you can set the GRE MTU parameter to a value 28 bytes smaller than 1500 bytes, as shown in the following example, to enable the unit to send full-size packets that include the 8-byte GRE header and a 20-byte IP header without fragmenting the packets first:

GRE MTU = 1472
With this setting, the connection end-point sends packets with a maximum size of 1472 bytes. When the MAX encapsulates them, adding 28 bytes to the size, the packets still do not violate the 1500-byte Ethernet MTU.

Forcing fragmentation for interoperation with outdated clients

To discover the path MTU, some clients normally send packets that are larger than the negotiated Maximum Receive Unit (MRU) and that have the Don't Fragment (DF) bit set. Such packets are returned to the client with an ICMP message informing the client that the host is unreachable without fragmentation. This standard, expected behavior improves end-to-end performance by enabling the connection end-points to perform any required fragmentation and reassembly.

However, some outdated client software does not handle this process correctly and continues to send packets that are larger than the specified GRE MTU. To enable the MAX to interoperate with these clients, you can configure the MAX to ignore the DF bit and perform the fragmentation that normally should be performed by the client software. This function in the MAX is sometimes referred to as prefragmentation.

When you set the GRE MTU parameter to a nonzero value, you can set the Force fragmentation parameter to Yes to enable the MAX to prefragment packets it receives that are larger than the negotiated MRU with the DF bit set. It prefragments those packets, and then adds the GRE and IP headers.


Note: Setting the Force fragmentation parameter to Yes causes the MAX to bypass the standard MTU discovery mechanism and fragment larger packets before encapsulating them in GRE. Because this changes expected behavior, it is not recommended except for ATMP interoperation with outdated client software that does not handle fragmentation properly.

Router and gateway mode

The Home Agent can communicate with the Home Network through a direct connection, through another router, or across a nailed connection. When the Home Agent relies on packet routing to reach the Home Network, it operates in router mode. When it has a nailed connection to the Home Network, it is in gateway mode.

Configuring the Foreign Agent

Following are the parameters (shown with sample settings) related to Foreign Agent configuration:

Following are the parameters (shown with sample settings) for using RADIUS authentication:

Following are the parameters (shown with sample settings) for creating RADIUS user profiles for Mobile Nodes running TCP/IP:

Following are the parameters (shown with sample settings) for creating RADIUS user profiles for Mobile Nodes running NetWare:

Understanding the Foreign Agent parameters and attributes

This section provides some background information about configuring a Foreign Agent to initiate an ATMP request to the Home Agent MAX. For detailed information about each parameter, see the MAX Reference Guide. For details about attributes and configuring external authentication, see the MAX RADIUS Configuration Guide.

Parameter(s)

Usage

ATMP Mode

For the Foreign Agent, the mode is Foreign which makes the Type, Password, and SAP Reply parameters not applicable.

UDP port

ATMP uses UDP port 5150 for ATMP messages between the foreign and Home Agents. If you specify a different UDP port number, make sure that the entire ATMP configuration agrees.

GRE MTU

Specifies the Maximum Transmission Unit (MTU) for the path between the Foreign and Home Agents as described in Setting an MTU limit.

ATMP SNMP Traps

Specifies that the MAX sends ATMP-related SNMP traps.

IP configuration and Connection profile parameters

The cross-Internet connection to the Home Agent is an IP routing connection that the MAX authenticates and establishes in the usual way. (For details, see Chapter 7, Configuring IP Routing.)

RADIUS authentication attributes

The Foreign Agent must use RADIUS to authenticate Mobile Nodes, and the RADIUS server must be running a version of the daemon that includes the ATMP attributes. (For details, see the MAX RADIUS Configuration Guide.)

RADIUS user-profile attributes

The RADIUS user profiles for Mobile Nodes must set ATMP attributes. The required attributes differ slightly, depending on whether the Mobile Node and Home Network run IP or IPX and whether the Home Agent MAX operates in router mode or gateway mode.

Table 13-1 lists the required attributes when the Mobile Node and Home Network are routing IP.

Table 13-1. Required RADIUS attributes to reach an IP Home Network

Home Agent in router mode

Home Agent in gateway mode

Ascend-Primary-Home-Agent
Ascend-Primary-Home-Agent
Ascend-Home-Agent-Password
Ascend-Home-Agent-Password
Ascend-Home-Agent-UDP-Port
Ascend-Home-Agent-UDP-Port
Ascend-Home-Network-Name

Table 13-2 lists the required attributes when the Mobile Node and Home Network are routing IPX.

Table 13-2. Required RADIUS attributes to reach an IPX Home Network

Home Agent in router mode

Home Agent in gateway mode

Ascend-IPX-Peer-Mode
Ascend-IPX-Peer-Mode
Framed-IPX-Network
Framed-IPX-Network
Ascend-IPX-Node-Addr
Ascend-IPX-Node-Addr
Ascend-Primary-Home-Agent
Ascend-Primary-Home-Agent
Ascend-Home-Agent-Password
Ascend-Home-Agent-Password
Ascend-Home-Agent-UDP-Port
Ascend-Home-Agent-UDP-Port
Ascend-Home-Network-Name

Attribute

Description

Ascend-Primary-Home-Agent
IP address of the Home Agent, used to locate the Connection profile (or RADIUS profile) for the IP connection to the Home Agent.

Ascend-Home-Agent-Password
Used to authenticate the ATMP tunnel itself. Must match the password specified in the Home Agent's Ethernet > Mod Config > ATMP Options subprofile. All Mobile Nodes use the same ATMP-Home-Agent-Password.

Ascend-Home-Agent-UDP-Port
Must match the UDP port configuration in Ethernet > Mod Config > ATMP Options. Required only for a port number other than the default 5150.

Ascend-Home-Network-Name
Name of the Home Agent's local Connection profile to the Home Network. Required only when the Home Agent is operating in gateway mode (when it has a nailed WAN link to the Home Network). For details, see Configuring a Home Agent in gateway mode.

Ascend-IPX-Peer-Mode
Dial-in NetWare clients must specify IPX-Peer-Dialin. This enables the Foreign Agent to handle RIP and SAP advertisements and assign the Mobile Node a virtual IPX network number.

Framed-IPX-Network
Virtual IPX network number. Assigned to dial-in NetWare clients (Mobile Nodes) to enable the Home Agent to route back to the Mobile Node.

This IPX network number must be represented in decimal, not hexadecimal, and it must be unique in the IPX routing domain. (Note that you typically specify IPX network numbers in hexadecimal.) All Mobile Nodes logging into an IPX Home Network through the same Foreign Agent typically use the same virtual IPX network number.

Ascend-IPX-Node-Addr
Represents the Mobile Node on the virtual IPX network. Is represented as a 12-digit string that must be enclosed in double-quotes.

Following is a description of each Foreign Agent attribute:

Example of configuring a Foreign Agent (IP)

To configure the Foreign Agent and create a Mobile Node profile to access a home IP network:

  1. Open Ethernet > Mod Config > Ether Options and verify that the LAN interface has an IP address. For example:

  2. Open the ATMP Options subprofile and set ATMP Mode to Foreign:

  3. Open the Auth subprofile and configure the Foreign Agent to authenticate through RADIUS. For example:

    For detailed information about each parameter, see the MAX Reference Guide.

  4. Close the Ethernet profile.

  5. Open a Connection profile and configure an IP routing connection to the Home Agent. For example:

  6. Close the Connection profile.

  7. On the RADIUS server, open the RADIUS user profile and create an entry for a Mobile Node. For example:

  8. Close the user profile.

When the Mobile Node logs into the Foreign Agent with the password top secret, the Foreign Agent uses RADIUS to authenticate the Mobile Node. It then looks for a profile with an IP address that matches the Ascend-Home-Agent-IP-Addr value, so that it can bring up an IP connection to the Home Agent.

Example of configuring a Foreign Agent (IPX)

The procedure for configuring a Foreign Agent to support IPX connections that use ATMP is very similar to one for IP. The only difference is in the Mobile Node's user profile as shown in the following example:

When the Mobile Node logs into the Foreign Agent with the password ipx-unit, the Foreign Agent uses RADIUS to authenticate the Mobile Node. It then looks for a profile with an IP address that matches the Ascend-Home-Agent-IP-Addr value, so that it can bring up an IP connection to the Home Agent.

Configuring a Home agent

To configure an ATMP Home agent, you must set parameters in the ATMP profile, verify that the Home agent can communicate across an IP link with the Foreign agent, and configure the connection to the home network.

The link to the Foreign agent can be any kind of connection (dial-up, nailed, Frame Relay, etc.) or an Ethernet link, and it can be a local network or a remote network provided the two units communicate through an IP network.

Because the Home agent does not establish a connection on the basis of receiving tunneled data, the link to the home network cannot be a regular switched dial-up connection, but can be a nailed connection, a switched incoming connection from the home network, or a routed connection.

Configuring a Home Agent in router mode

When the ATMP tunnel has been established between the Home Agent and Foreign Agent, the Home Agent in router mode receives IP packets through the tunnel, removes the GRE encapsulation, and passes the packets to its bridge/router software. In its routing table, the Home Agent adds a host route to the Mobile Node.

Figure 13-3. Home Agent routing to the Home Network

The MAX requires the IPX routing parameters in the Ethernet profile only if the MAX is routing IPX. The following parameters (shown with sample settings) are used for configuring a Home Agent in router mode:

The IP routing connection to the Foreign Agent uses the following parameters (shown with sample settings):

Understanding the ATMP router mode parameters
This section provides some background information about configuring a Home Agent in router mode. For detailed information about each parameter, see the MAX Reference Guide.

.

Parameter

Usage

ATMP Mode

For the Home Agent, the mode is Home.

Type

When you set the ATMP Type to Router, the Home Agent relies on routing (not a WAN connection) to pass packets received through the tunnel to the Home Network.

Password

Used This is the password used to authenticate the ATMP tunnel itself. Must match the password specified in the Ascend-Home-Agent-Password attribute of each Mobile Node's RADIUS profile. (All Mobile Nodes use the same password for that attribute.)

SAP Reply

Enables a Home Agent to reply to the Mobile Node's IPX Nearest Server Query if it knows about a server on the Home Network. If the parameter is set to No, the Home Agent simply tunnels the Mobile Node's request to the Home Network.

UDP port

ATMP uses UDP port 5150 for ATMP messages between the foreign and Home Agents. If you specify a different UDP port number, make sure that the entire ATMP configuration agrees.

Idle limit

Specifies the number of minutes the Home Agent maintains an idle tunnel before disconnecting it.

GRE MTU

Specifies the Maximum Transmission Unit (MTU) for the path between the Foreign and Home Agents as described in Setting an MTU limit.

Force fragmentation

Enables/disables prefragmentation of packets that have the DF bit set, as described in Forcing fragmentation for interoperation with outdated clients.

IP configuration and Connection profile parameters

The cross-Internet connection to the Foreign Agent is an IP routing connection that the MAX authenticates and establishes in the usual way. (For details, see Chapter 7, Configuring IP Routing.)

Routing to the Mobile Node
When the Home Agent receives IP packets through the ATMP tunnel, it adds a host route for the Mobile Node to its IP routing table. It then handles routing in the usual way. When the Home Agent receives IPX packets through the tunnel, it adds a route to the Mobile Node on the basis of the virtual IPX network number assigned in the RADIUS user profile.

For IP routes, you can enable RIP on the Home Agent's Ethernet to enable other hosts and networks to route to the Mobile Node. Enabling RIP is particularly useful if the Home Network is one or more hops away from the Home Agent's Ethernet. If you turn RIP off, other routers require static routes that specify the Home Agent as the route to the Mobile Node.


Note: If the Home Agent's Ethernet is the Home Network (a direct connection), you should turn on proxy ARP in the Home Agent so that local hosts can use ARP to find the Mobile Node.

For details on IP routes, see Configuring IP Routing. For information about IPX routes, see Configuring IPX Routing.

Example of configuring a Home Agent in router mode (IP)
To configure the Home Agent in router mode to reach an IP Home Network:

  1. Open Ethernet > Mod Config > Ether Options and verify that the LAN interface has an IP address. You can also set routing options. For example:

  2. Open the ATMP Options subprofile, set ATMP Mode to Home, and set Type to Router.

  3. Specify the password used to authenticate the tunnel (Ascend-Home-Agent-Password). For example:

  4. Close the Ethernet profile.

  5. Open a Connection profile and configure an IP routing connection to the Foreign Agent. For example:

  6. Close the Connection profile.

Example of configuring a Home Agent in router mode (IPX)
To configure the Home Agent in router mode to reach an IPX network:

  1. Open Ethernet > Mod Config > Ether Options and verify that the LAN interface has an IP address (needed for communication with the Foreign Agent) and can route IPX.

    For details, see Chapter 9, Configuring IPX Routing.

  2. Open the ATMP Options subprofile, set ATMP Mode to Home, and set Type to Router.

    ATMP options...
    ATMP Mode=Home
    Type=Router

  3. Specify the password used to authenticate the tunnel (Ascend-Home-Agent-Password).

  4. Set SAP Reply to Yes, and leave the default for UDP port:

  5. Close the Ethernet profile.

  6. Open a Connection profile and configure an IP routing connection to the Foreign Agent. For example:

  7. Close the Connection profile.

Configuring a Home Agent in gateway mode

When you configure the Home Agent in gateway mode, it receives GRE-encapsulated IP packets from the Foreign Agent, strips off the encapsulation, and passes the packets across a nailed WAN connection to the Home Network.

Figure 13-4. Home Agent in gateway mode


Note: To enable hosts and routers on the Home Network to reach the Mobile Node, you must configure a static route in the Customer Premise Equipment (CPE) router on the Home Network (not in the Home Agent). The static route must specify the Home Agent as the route to the Mobile Node. That is, the route's destination address specifies the Framed-Address of the Mobile Node, and its gateway address specifies the IP address of the Home Agent.

Limiting the maximum number of tunnels
If you decide to limit the maximum number of tunnels a gateway will support, you should consider the expected traffic per mobile client connection, the bandwidth of the connection to the home network, and the availability of alternative Home Agents (if any). For example, the lower the amount of traffic generated by each mobile client connection, the more tunnels a a gateway connection will be able to handle.

Enabling RIP on the interface to the home router
The router at the far end of the gateway profile must be able to route back to mobile clients. The easiest way to accomplish this is by setting the ATMP RIP parameter to Send-v2. With this setting, the Gateway Home Agent constructs a RIP-v2 Response(2) packet at every RIP interval and sends it to the home network from all tunnels using the gateway profile. For each tunnel, the Response packet contains the mobile client IP address, the subnet mask, the next hop = 0.0.0.0, metric = 1. RIP-v2 authentication and route tags are not supported.


Note: The home network router should not send RIP updates, because the Home Agent does not inspect them. The RIP updates would be forwarded to the mobile clients instead.

If you set ATMP RIP to Off, the administrator of the home network must configure a static route to each mobile client. A static route to a mobile client can be specific to the client, where the route's destination is the mobile client IP address and the next-hop router is the Home Agent address. For example, in the following route the mobile client is a router (this is not a host route), and the Home Agent address is 2.2.2.2:

Dest=110.1.1.10/29
Gateway=2.2.2.2
Or, if the mobile clients have addresses allocated from the same address block (including router mobile client addresses with subnet masks less than 32 bits) and no addresses from that block are assigned to other hosts, the home network administrator can specify a single static route that encompass all mobile clients that use the same Home Agent. For example, in the following route all mobile clients are allocated addresses from the 10.4.n.n block (and no other hosts are allocated addresses from that block), and the Home Agent address is 2.2.2.2:

Dest=10.4.0.0/16
Gateway = 2.2.2.2
Configuring a Home Agent in gateway mode involves the following parameters (shown with sample settings):

The IP routing connection to the Foreign Agent uses the following parameters (shown with sample settings):

The nailed connection to the Home Network uses the following parameters (shown with sample settings):

The IPX routing parameters are required only if the MAX is routing IPX.

Understanding the ATMP gateway mode parameters
This section provides some background information about configuring a Home Agent in gateway mode. For detailed information about each parameter, see the MAX Reference Guide.

Set the following parameters in the Mod Config profile's ATMP Options subprofile:

Parameter

Usage

ATMP Mode

For the Home Agent, the mode is Home.

Type

When you set Type to Gateway, the Home Agent forwards packets received through the tunnel to the Home Network across a nailed WAN connection.

Password

Used to authenticate the ATMP tunnel itself. Must match the password specified in the Ascend-Home-Agent-Password attribute of each Mobile Node's RADIUS profile. (All Mobile Nodes use the same password for that attribute.)

SAP Reply

Enables a Home Agent to reply to the Mobile Node's IPX Nearest Server Query if it knows about a server on the Home Network. If the parameter is set to No, the Home Agent simply tunnels the Mobile Node's request to the Home Network.

UDP Port

ATMP uses UDP port 5150 for ATMP messages between the foreign and Home Agents. If you specify a different UDP port number, make sure that the entire ATMP configuration agrees.

Idle limit

Specifies the number of minutes the Home Agent maintains an idle tunnel before disconnecting it.

GRE MTU

Specifies the Maximum Transmission Unit (MTU) for the path between the Foreign and Home Agents as described in Setting an MTU limit.

Force fragmentation

Enables/disables prefragmentation of packets that have the DF bit set, as described in Forcing fragmentation for interoperation with outdated clients.

IP configuration and Connection profile
The cross-Internet connection to the Foreign Agent is an IP routing connection that the MAX authenticates and establishes in the usual way. For details, see Chapter 7, Configuring IP Routing.

Connection profile to the Home Network
The Connection profile to the Home Network must be a local profile. It cannot be specified in RADIUS. The name of this Connection profile must match the name specified by the Ascend-Home-Network-Name attribute in the Mobile Node's RADIUS profile. In addition, the Connection profile for connection to the Home Network must specify the following values:

Also, you can specify that the MAX include mobile-client routes in RIP-v2 responses to the home router. The ATMP RIP parameter specifies whether or not the MAX includes mobile-client routes in RIP-v2 responses to the home router.

Example of configuring a Home Agent in gateway mode (IP)
To configure the Home Agent in gateway mode to reach an IP Home Network:

  1. Open Ethernet > Mod Config > Ether Options and verify that the LAN interface has an IP address. For example:

  2. Open the ATMP Options subprofile, set ATMP Mode to Home, and set Type to Gateway.

  3. Specify the password used to authenticate the tunnel. It must match the Ascend-Home-Agent-Password attribute of each Mobile Node's RADIUS profile. For example:

  4. Close the Ethernet profile.

  5. Open a Connection profile and configure an IP routing connection to the Foreign Agent. For example:

  6. Open a Connection profile and configure a nailed WAN link to the Home Network. For example:

  7. Close the Connection profile.

Example of configuring a Home Agent in gateway mode (IPX)
To configure the Home Agent in gateway mode to reach an IPX Home Network:

  1. Open Ethernet > Mod Config > Ether Options and verify that the LAN interface has an IP address (required for communication with the Foreign Agent) and can route IPX. For example:

    For details, see Chapter 9, Configuring IPX Routing.

  2. Open the ATMP Options subprofile, set ATMP Mode to Home, and set Type to Gateway.

  3. Specify the password used to authenticate the tunnel. It must match the Ascend-Home-Agent-Password attribute of each Mobile Node's RADIUS profile .

  4. Set SAP Reply to Yes. The profile now has the following settings:

  5. Close the Ethernet profile.

  6. Open a Connection profile and configure an IP routing connection to the Foreign Agent. For example:

  7. Open a Connection profile and configure a nailed WAN link that routes IPX to the Home Network. For example:

  8. Close the Connection profile.

Specifying the tunnel password

The Home Agent typically requests a password before establishing a tunnel. The Foreign Agent returns an encrypted version of the password found in the mobile client profile.

If the password sent by the Foreign Agent matches the Password value specified in the ATMP profile, the Home Agent returns a RegisterReply with a number that identifies the tunnel, and the mobile client's tunnel is established. If the password does not match, the Home Agent rejects the tunnel, and the Foreign Agent logs a message and disconnects the mobile client.

Setting an idle timer for unused tunnels

When a mobile client disconnects normally, the Foreign Agent sends a request to the Home Agent to close down the tunnel. However, when a Foreign Agent restarts, tunnels that were established to a Home Agent are not normally cleared, because the Home Agent is not informed that the mobile clients are no longer connected. The unused tunnels continue to hold memory on the Home Agent. To enable the Home Agent to reclaim the memory held by unused tunnels, set an inactivity timer on a Home Agent by changing the Idle limit parameter to a non-zero value.

The inactivity timer runs only on the Home Agent side and specifies the number of minutes (1 to 65535) that the Home Agent maintains an idle tunnel before disconnecting it. A value of 0 disables the timer, which means that idle tunnels remain connected forever. The setting affects only tunnels created after the timer was set. Tunnels that existed before the timer was set are not affected by it.

Configuring the MAX as an ATMP multimode agent

You can configure the MAX to act as both a Home Agent and Foreign Agent on a tunnel-by-tunnel basis. Figure 13-5 shows a sample network topology that has a MAX acting as a Home Agent for Network B and a Foreign Agent for Network A.

Figure 13-5. MAX acting as both Home Agent and Foreign Agent

To configure the MAX as a multimode agent, set ATMP Mode to Both and complete both the foreign and Home Agent specifications. Setting ATMP Mode to Both indicates that the MAX will function as both a Home Agent and Foreign Agent on a tunnel-by-tunnel basis.

For example, to configure the MAX to operate as both a Home Agent and Foreign Agent, first check the interface and set the ATMP options:

  1. Open Ethernet > Mod Config > Ether Options and verify that the LAN interface has an IP address. For example:

  2. Open the ATMP Options subprofile and set ATMP Mode to Both.

  3. Configure the other home-agent settings as appropriate. For example, to use Gateway mode and a password of private:

Then set the Foreign Agent aspect of the multimode configuration:

  1. Open the Auth subprofile and configure RADIUS authentication. For example:

    For detailed information about each parameter, see the MAX Reference Guide.

  2. Close the Ethernet profile.

  3. On the RADIUS server, open the RADIUS user profile and create an entry for a Mobile Node. For example:

  4. Close the user profile.

  5. Open a Connection profile and configure an IP routing connection to the Network A Home Agent. For example:

  6. Close the Connection profile.

Finally, set the Home Agent aspect of the multimode configuration:

  1. Open a Connection profile and configure an IP routing connection to the Network B Foreign Agent. For example:

  2. Open a Connection profile and configure a nailed WAN link to the Network B Home Network. For example:

  3. Close the Connection profile.

Supporting Mobile Node routers (IP only)

To enable an IP router to connect as a Mobile Node, the Foreign Agent's RADIUS entry for the Mobile Node must specify the same subnet as the one that identifies the Home Network. For example, to connect to a Home Network whose router has the following address:

The Foreign Agent's RADIUS entry for the remote router would contain lines such as the following:

With these Framed-Address and Framed-Netmask settings (equivalent to 10.168.6.21/28) for the Mobile Node router, the connecting LAN can support up to 14 hosts. The network address (or base address) for this subnet is 10.168.6.16. This address represents the network itself, because the host portion of the IP address is all zeros.

The broadcast address (all ones in host portion of address) for this subnet is 10.168.6.31. Therefore, the valid host address range is 10.168.6.17-10.168.6.30, which includes 14 host addresses.

The MAX handles routes to and from the Mobile Node's LAN differently, depending on whether the Home Agent is configured in router mode or gateway mode.

Home Agent in router mode

If the Home Agent connects directly to the Home Network, set Proxy ARP=Always, which enables the Home Agent to respond to ARP requests on behalf of the Mobile Node.

If the Home Agent does not directly connect to the Home Network, the situation is the same as for any remote network: Routes to the Mobile Node's LAN must either be learned dynamically from a routing protocol or configured statically.

The Mobile Node always requires static routes to the Home Agent as well as to other networks reached through the Home Agent. (It cannot learn routes from the Home Agent.)

Home Agent in gateway mode

If the Home Agent forwards packets from the Mobile Node across a nailed WAN link to the home IP network, the answering unit on the Home Network must have a static route to the Mobile Node's LAN.

In addition, because no routing information passes through the connection between the Mobile Node and the Home Agent, the Mobile Node's LAN can only support local subnets that fall within the network specified in the RADIUS entry.

For example, using the previous sample RADIUS entry, the Mobile Node could support two subnets with a mask of 255.255.255.248: one on the 10.168.6.16 subnet and the other on the 10.168.6.24 subnet. The answering unit on the Home Network would have only one route to the router itself (10.168.6.21/28).

ATMP connections that bypass a Foreign Agent

If a Home Agent MAX has the appropriate RADIUS entry for a Mobile Node, the Mobile Node connects directly to the Home Agent. An ATMP-based RADIUS entry that is local to the Home Agent enables the Mobile Node to bypass a Foreign Agent connection, but it does not preclude a Foreign Agent. If both the Home Agent and the Foreign Agent have local RADIUS entries for the Mobile Node, the node can choose a direct connection or a tunneled connection through the Foreign Agent.

For example, the following RADIUS entry authenticates a mobile NetWare client that connects directly to the Home Agent. In this example, the Home Agent is in the gateway mode (it forwards packets from the Mobile Node across a nailed WAN link to the home IPX network):


Note: If you configure the Home Agent in router mode (which forwards packets from the Mobile Node to its internal routing module), the Ascend-Home-Network-Name line is not included in the user entry. The Ascend-Home-Network-Name attribute specifies the name of the answering unit across the WAN on the home IPX network.

Configuring PPTP tunnels for dial-in clients

Point to Point Tunneling Protocol (PPTP) enables Windows 95 and Windows NT Workstation users to dial into a local ISP to connect to a private corporate network across the Internet. To the user dialing the call, the connection looks like a regular login to an NT server that supports TCP/IP, IPX, or other protocols.

The MAX acts as a PPTP Access Controller (PAC) which functions as a front-end processor to offload the overhead of communications processing. At the other end of the tunnel, the NT server acts as a PPTP Network Server (PNS). All authentication is negotiated between the Windows 95 or NT client and the PNS. The NT server's account information remains the same as if the client dialed in directly. No changes are needed.

How the MAX works as a PAC

Currently, PPTP supports call routing and routing to the NT server by PPP-authenticated connection on a per-line basis, or on the basis of the called number or calling number. The following section describes how to dedicate an entire WAN access line for each destination PNS address. For details about configuring WAN lines and assigning phone numbers, see Chapter 3, Configuring WAN Access. For details about routing PPTP calls on the basis of called or calling number, see the MAX RADIUS Configuration Guide.

In the PPTP configuration, you specify the destination IP address of the PNS (the NT server), to which all calls that come in on the PPTP-routed line will be forwarded. When the MAX receives a call on that line, it passes the call directly to the specified IP address end-point, creating the PPTP tunnel to that address if one is not already up. The PNS destination IP address must be accessible by IP routing.


Note: The MAX handles PPTP calls differently than it does regular calls. No Connection profiles are used for these calls, and the Answer profile is not consulted. The calls are routed through the PPTP tunnel solely on the basis of the phone number dialed.

Following are the PPTP PAC configuration parameters (shown with sample settings):

Understanding the PPTP PAC parameters

This section provides some background information about configuring PPTP. For detailed information about each parameter, see the MAX Reference Guide.

Enabling PPTP

When you enable PPTP, the MAX can bring up a PPTP tunnel with a PNS and respond to a request for a PPTP tunnel from a PNS. You must specify the IP address of the PNS in one or more of the Route Line parameters.

Specifying a PRI line for PPTP calls and the PNS IP address

The PPTP parameters include four Route Line parameters, one for each of the MAX unit's WAN lines. If you specify the IP address of a PNS in one of these parameters, that WAN line is dedicated to receiving PPTP connections and forwarding them to that destination address.

The IP address you specify must be accessible via IP, but there are no other restrictions on it. It can be across the WAN or on the local network. If you leave the default null address, that WAN line handles calls normally.

Example of a PAC configuration

Figure 13-6 shows an ISP POP MAX unit communicating across the WAN with an NT Server at a customer premise. Windows 95 or NT clients dial into the local ISP and are routed directly across the Internet to the corporate server. In this example, the MAX unit's fourth WAN line is dedicated to PPTP connections to that server.

Figure 13-6. PPTP tunnel

To configure this MAX for PPTP:

  1. Open Ethernet > Mod Config > PPTP Options.

  2. Turn on PPTP, and set Route Line 4 to the PNS IP address.

  3. Close the Ethernet Profile.

Example of a PPTP tunnel across multiple POPs

Figure 13-7 shows an ISP POP MAX communicating through an intervening router to the PNS that is the end-point of its PPTP tunnel. The MAX routes the packets in the usual way to reach the end-point IP address.

Figure 13-7. PPTP tunnel across multiple POPs

In this example, the MAX at ISP POP #1 dedicates its second WAN line to PPTP connections to the PNS at 10.65.212.11. To configure this MAX as a PAC:

  1. Open Ethernet > Mod Config > PPTP Options.

  2. Turn on PPTP, and specify the PNS IP address for Route Line 2.

  3. Close the Ethernet Profile.

The PAC must have a route to the destination address, in this case a route through the ISP POP #2. It does not have to be a static route. It can be learned dynamically by means of routing protocols. The remaining steps of this procedure configure a static route to ISP POP #2:

  1. Open an unused IP Route profile and activate it. For example:

  2. Specify the PNS destination address:

  3. Specify the address of the next-hop router (ISP POP #2). For example:

  4. Specify a metric for this route, the route's preference, and whether the route is private. For example:

  5. Close the IP Route profile.

Routing a terminal-server session to a PPTP server

You can initiate a PPTP session in which the terminal-server interface routes the session to a PPTP server. The PPTP command gives you two options for selecting the tunnel the MAX creates. You can specify either the IP address or host name of the PPTP server. Normal PPTP authentication proceeds once the MAX creates the tunnel.

Enter the command, at the terminal-server prompt as follows:

pptp pptp_server

where pptp_server is the IP address or hostname of the PPTP server. When you enter the command, the system displays the following text:

PPTP: Starting session
PPTP Server pptp_server

Configuring L2TP tunnels for dial-in clients

L2TP enables you to dial into a local ISP and connect to a private corporate network across the Internet. You dial into a local MAX, configured as an L2TP Access Concentrator (LAC), and establish a PPP connection. Attributes in your RADIUS user profile specify that the MAX, acting as an LAC, establishes an L2TP tunnel. The LAC contacts the L2TP Network Server (LNS) that connects to the private network. The LAC and the LNS establish an L2TP tunnel (via UDP), and any traffic your client sends is tunneled to the private network. Once the MAX units establish the tunnel, the client connection has a PPP connection with the LNS, and appears to be directly connected to the private network.

You can configure the MAX to act as either an LAC, an LNS, or both. The LAC performs the following functions:

The LNS performs the following functions:


Note: With this release, a MAX acting as an LNS cannot send Incoming Call Requests to an LAC. Only an LAC can make requests for the creation of L2TP tunnels.

Elements of L2TP tunneling

This section describes how L2TP tunnels work between an LAC and an LNS. A client dials into an LAC, from either a modem or ISDN device, and the LAC establishes a cross-Internet IP connection to the LNS. The LAC then requests an L2TP tunnel via the IP connection.

The LNS is the terminating part of the tunnel, where most of the L2TP processing occurs. It communicates with the private network (the destination network for the dial-in clients) through a direct connection.

Figure 13-8 shows an ISP POP MAX, acting as an LAC, communicating across the WAN with a private network. Clients dial into the ISP POP and are forwarded across the Internet to the private network.

Figure 13-8. L2TP tunnel across the Internet

How the MAX creates L2TP tunnels

The dial-in client, the LAC, and the LNS establish, use, and terminate an L2TP-tunnel connection as follows:

  1. A client dials, over either a modem or ISDN connection, into the LAC.

  2. On the basis of dialed number or after authentication (depending on the LAC configuration), the LAC communicates with the LNS to establish an IP connection.

  3. Over the IP connection, the LAC and LNS establish a control channel.

  4. The LAC sends an Inbound Call Request to the LNS.

  5. Depending on the LNS configuration, the client might need to authenticate itself a second time.

  6. After successful authentication, the tunnel is established, and data traffic flows.

  7. When the client disconnects from the LAC, the LAC sends a Call Disconnect Notify message to the LNS. The LAC and LNS disconnect the tunnel.

LAC and LNS mode

The MAX can function as an LAC, an LNS, or both. When configured as both, the MAX functions as an LAC when so specified by the dial-in client configuration, and as an LNS in response to an Inbound Call Request from an LAC.


Note: The MAX can support several simultaneous connections, some in which it acts as an LAC, and some in which it acts as an LNS. For any single connection, however, the MAX can operate as either an LAC or LNS, but not both.

Tunnel authentication

You can configure the LNS to authenticate a tunnel during tunnel creation. You must enable tunnel authentication on both the LAC and LNS.

On the LNS, you must create a Names/Passwords profile where:

On the LAC, you can specify the password with the Tunnel-Password attribute in the RADIUS user profile for the connection initiating the session, or you can configure the password in a Names/Passwords profile. If you create a Names/Passwords profile, the value of the Ethernet > Names/Passwords > Name parameter must match the the value of the System > Sys Config > Name parameter on the LNS.

Conversely, you can configure the LAC and LNS to not require tunnel authentication.

Client authentication

Either the LAC, the LNS, or both, can perform PAP or CHAP authentication of clients for which they create tunnels. If you configure the MAX to create tunnels on a per-line basis, only the LNS can perform authentication, because the MAX automatically builds a tunnel to the LNS for any call it receives on that line.

If you use RADIUS to configure L2TP on a per-user basis, and you specify the Client-Port-DNIS attribute, the LAC does not perform PAP or CHAP authentication. If you specify Client-Port-DNIS, the tunnel is created as soon as the LAC receives a DNIS number that matches a Client-Port-DNIS for any user profile. You can configure the LNS to perform PAP or CHAP authentication after the LAC and LNS establish the tunnel.

If you use RADIUS to configure L2TP, but do not specify the Client-Port-DNIS attribute, the LAC performs PAP or CHAP authentication before the tunnel is established. Once the tunnel is up, the LNS can perform authentication again on the client. Each client sends the same username and password during the authentication phase, so for each client, make sure you configure the LAC and LNS to look for the same usernames and passwords.

You can also direct the MAX to create an L2TP tunnel, from the terminal server, by using the L2TP command. You can configure authentication on the LNS, requiring users to authenticate themselves when they manually initiate L2TP tunnels from the terminal server.

Flow control

The LAC and LNS automatically use a flow control mechanism that is designed to reduce network congestion. You do not need to configure the mechanism.

You can, however, configure the maximum number of unacknowledged packets that the LAC or LNS receives before it requests that the sending device stop sending data. You can configure the LAC or LNS to receive up to 63 unacknowledged packets before refusing new data, or you can disable flow control completely.

Configuration of the MAX as an LAC

The LAC is responsible for requesting L2TP tunnels to the LNS. You configure the LAC to determine when a dial-in connection should be tunneled, and you can specify the LNS used for the connection.

Understanding the L2TP LAC parameters

This section provides some background information about parameters used in configuring the MAX as an LAC:

Parameter

How it's used

L2TP Mode

Enables the MAX unit's LAC functionality if you set L2TP Mode to LAC or Both.

L2TP Auth Enabled

You must either enable tunnel authentication for both the LAC and LNS or enable it for neither. You configure a tunnel password in a Names/Passwords profile.

L2TP RX Window

Specifies the number of unacknowledged packets the MAX receives (when configured as an LAC or a LNS) before requesting that the sending device stop transmitting data.

Line N Tunnel Type

Specifies whether the MAX should dedicate an entire WAN line to either L2TP or PPTP. If you want the MAX to establish tunnels on a connection-by-connection basis, set Line N Tunnel Type to None on all lines.

Route Line N

Specifies the IP address of the LNS. This parameter applies only if you dedicate an entire WAN line to tunneling with the Line N Tunnel Type parameter. If you want the MAX to establish tunnels on a connection-by-connection basis, leave Route Line N blank for all lines.

Configuring the MAX

To configure the MAX as an L2TP LAC, you must first enable L2TP LAC on the MAX, then specify how the MAX determines which connections are tunneled.

Configuring systemwide L2TP LAC parameters
To configure systemwide L2TP LAC parameters on the MAX:

  1. Open the Ethernet > Mod Config > L2 Tunneling Options menu.

  2. Set L2TP Mode to LAC or to Both.

  3. If you require tunnel authentication, set L2TP Auth Enabled to Yes.

    You must configure both the LAC and LNS identically, to either require or not require authentication.

  4. Set L2TP RX Window to the number of packets that the MAX should receive before it requests that the sending device stop transmitting packets.

    The default is seven. Set the parameter to 0 (zero) to disable flow control in the receiving direction. The MAX continues to perform flow control for the sending direction regardless of the value of L2TP RX Window.

Enabling L2TP tunneling for an entire WAN line
If you want the LAC to create L2TP tunnels for every call received on a specific WAN line:

  1. Open the Ethernet > Mod Config > L2 Tunneling Options menu.

  2. For the line for which you are configuring LAC functionality (Line N) , set Line N Tunnel Type to L2TP. For example, if you want to tunnel all calls received on the first WAN port (labeled WAN 1 on the MAX back panel), set Line 1 Tunnel Type to L2TP.

  3. Set Route line n to the IP address of the LNS.

Enabling L2TP tunneling on a per-user basis
You can configure RADIUS to direct the MAX to create L2TP tunnels for specific users. To do so, you use three standard RADIUS attributes: Tunnel-Type, Tunnel-Medium-Type, and Tunnel-Server-Endpoint. Table 13-3 describes them.

Table 13-3. RADIUS attributes for specifying L2TP tunnels

Attribute

Description

Possible values

Tunnel-Type (64)

Specifies which tunneling protocol to use for this connection.

PPTP or L2TP. You must set this attribute to L2TP to direct the MAX to create an L2TP tunnel.

Tunnel-Medium-Type (65)

Specifies the protocol type, or medium, used for this connection. Currently, the MAX supports IP only. Future software releases will support additional medium types.

Currently, the only supported value is IP. You must set this attribute to IP.

Tunnel-Server-Endpoint (67)

Specifies the IP address or fully qualified host name of the LNS, if you set Tunnel-Type to L2TP, or PPTP Network Server (PNS), if you set Tunnel-Type to PPTP.

If a DNS server is available, you can specify the fully qualified host name of the LNS. Otherwise, specify the IP address of the LNS in dotted decimal notation (n.n.n.n, where n is a number from 0 to 255.) You must set this attribute to an accessible IP host name or address.

Configuration of the MAX as an LNS

When the MAX acts as an LNS, it responds to requests by LAC units to establish tunnels. The LNS does not initiate outgoing requests for tunnels, so configuration of the MAX is simple. Proceed as follows:

  1. Open the Ethernet > Mod Config > L2 Tunneling Options menu.

  2. Set L2TP Mode to either LNS or Both.

  3. If you require tunnel authentication, set L2TP Auth Enabled to Yes.

    You must configure both the LAC and LNS identically, to either require or not require authentication.

  4. Set L2TP RX Window to the number of packets that the MAX should receive before it requests that the sending device stop transmitting packets.

    The default is 7. Set the parameter to 0 (zero) to disable flow control in the receiving direction. The MAX continues to perform flow control for the sending direction regardless of the value of L2TP RX Window.



[Top][Contents][Prev][Next][Last]Search

techpubs@ascend.com

Copyright © 1998, Ascend Communications, Inc. All rights reserved.