The Evolution from PPPoE to IPoE sessions. Horia Miclea, hmiclea@cisco.com Cisco Systems, Service Provider Systems Development



Similar documents
Cisco ASR 9000 Series: Carrier Ethernet Architectures

Call Flows for Simple IP Users

VLAN and QinQ Technology White Paper

Use MAC-Forced Forwarding with DHCP Snooping to Create Enhanced Private VLANs

DSL Forum. Working Text WT-101

NETOP SUITE NETOP POLICY MANAGER (PM)

Driving Ethernet Deeper Ethernet Business Services over DOCSIS COX New Orleans (NOLA) Case Study

Com.X Router/Firewall Module. Use Cases. White Paper. Version 1.0, 21 May Far South Networks

INTRODUCTION TO L2VPNS

Internet Access Setup

Development of the FITELnet-G20 Metro Edge Router

Chapter 4: Security of the architecture, and lower layer security (network security) 1

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

SmartRG Residential Gateways. April 30, 2012 Version 2.0

This page displays the device information, such as Product type, Device ID, Hardware version, and Software version.

Carrier Ethernet Service, Release 4 Swinog #18. Martin Gysi Network Development Engineer

Архитектура за IP пренос във всяка среда и върху всяка медия

Implementing Cisco IOS Network Security

Switch Configuration Required to Support Cisco ISE Functions

Cisco Virtual Office Express

Addressing Inter Provider Connections With MPLS-ICI

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Security Considerations in IP Telephony Network Configuration

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

IINS Implementing Cisco Network Security 3.0 (IINS)

Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX

Configuring Remote Access to MPLS VPN

How To Understand and Configure Your Network for IntraVUE

Secure Networks for Process Control

Adtran, Inc All rights reserved

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

IPv6 and xdsl. Speaker name address

Authentication, Authorization and Accounting (AAA) Protocols

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January Introduction...

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Catalyst 3750 Metro Series Switches

Network Virtualization Network Admission Control Deployment Guide

Security Technology: Firewalls and VPNs

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. Kapil.Kumar@relianceinfo.com

Overview. Introduction

References and Requirements for CPE Architectures for Data Access

7.1. Remote Access Connection

Cisco Easy VPN on Cisco IOS Software-Based Routers

ICTTEN4215A Install and configure internet protocol TV in a service provider network

UIP1868P User Interface Guide

Cisco RV 120W Wireless-N VPN Firewall

Solutions Focus: IPTV

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Broadband Network Architecture

Edgewater Routers User Guide

Chapter 12 Supporting Network Address Translation (NAT)

Session Border Controller

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Supporting Document PPP

Portal Authentication Technology White Paper

Barracuda Link Balancer

Internet Access Setup

Edgewater Routers User Guide

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Wholesale IP Bitstream on a Cable HFC infrastructure

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

Chapter 3 Connecting the Router to the Internet

Ranch Networks for Hosted Data Centers

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller

Router configuration manual for I3 Micro Vood 322

NAC Guest. Lab Exercises

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

V310 Support Note Version 1.0 November, 2011

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Cisco TrustSec How-To Guide: Guest Services

Vision. Paradyne Confidential & Proprietary Page 2

co Sample Configurations for Cisco 7200 Broadband Aggreg

Multi-Service Broadband Network Architecture. NextGen 13 London, October 2013 Robin Mersh CEO

Configuring DHCP Snooping

Cisco Which VPN Solution is Right for You?

Interoperability between Avaya IP phones and ProCurve switches

Application Note Secure Enterprise Guest Access August 2004

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

IP Telephony Management

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

Interconnecting Cisco Networking Devices Part 2

New Features in Cisco IOS Software Release 12.2(33)SXI2

Web Authentication Application Note

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

Southwest Arkansas Telephone Cooperative Network Management Practices

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

November Defining the Value of MPLS VPNs

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

The Use of Mikrotik Router Boards With Radius Server for ISPs.

SSVP SIP School VoIP Professional Certification

Securing Networks with PIX and ASA

Solving the Access Conundrum for the All-IP Network:

The Keys for Campus Networking: Integration, Integration, and Integration

pfsense Captive Portal: Part One

Case Study for Layer 3 Authentication and Encryption

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

SmartRG Residential Gateways. November 15th, 2012 Version 2.4

Transcription:

The Evolution from PPPoE to IPoE sessions Horia Miclea, hmiclea@cisco.com Cisco Systems, Service Provider Systems Development Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1

Agenda From PPP to IP, a natural evolution Carrier Ethernet Service Delivery Models Intelligent Service Gateway for PPPoE and IPoE Overview ISG IP Session Models IP Sessions Additional Considerations Conclusion 2007 Cisco Systems, Inc. All rights reserved. 2

PPP to IP, A Natural Evolution For Carrier Ethernet Triple Play Services Broadband Access Technology options are evolving and diversifying while having two common technology denominators, Ethernet multiplexing/ aggregation and IP services WiMAX 802.16D/E gets traction in emerging worldwide markets New DSL flavours (ADSL2+ and VDSL) defined an Ethernet baseline for the Access Nodes at the UNI and NNI level Metro FTTX P2P (802.3ah) and MP (PON) deployments are increasing in relevance for both residential and business services Triple/Quad Play services like IPTV and VOD have imposed IPoEthernet as service encapsulation baseline PPPoE may still be used for Internet Access High market penetration targets requires advanced subscriber management functions for PPPoE and IPoE service models to optimize the operational costs And to enable mass customization of the broadband services Cisco offers Intelligent Services Gateways to address the PPPoE to IPoE migration while maintaining all subscriber management functions 2007 Cisco Systems, Inc. All rights reserved. 3

Carrier Ethernet Architectures and Service Delivery Models 2007 Cisco Systems, Inc. All rights reserved. 4

Carrier Ethernet Architecture Models Operational & cost considerations drive two architectures models: Distributed and Centralised IP Edge Architectures Drivers for the centralized edge architecture Align with existing SP organizational and operational structures An order of magnitude fewer subscriber state aware network elements to manage May improve the CAPEX efficiency especially if services planned allow network oversubscription Operational and organizational differentiation into access, aggregation, edge and core network layers Drivers for the distributed edge architecture Single point of implementing (L2/L3) services edge Consolidation of functions eliminates differentiated infrastructure Simplified operations by removing the overlay circuit based aggregation network transport Increased penetration of 3play services (VOD) drives lower oversubscription on the aggregation network and makes less suitable centralized edge devices Increased flexibility for local content injection, network based admission control for VoD and more optimal handling for peer to peer traffic Notes: An MPLS/IP transport for the Core & Aggregation layers can accommodate both architecture models These two architecture models may be combined on a service basis in the scope a network deployment for meeting certain practical considerations (for example centralised edge for Internet Access while it already exists and distributed Video and Voice services edge to optimize the costs) 2007 Cisco Systems, Inc. All rights reserved. 5

Centralised Services Architecture Options ISG Sessions HSI, VoIP, VoD Non Trunk N:1 or 1:1 VLAN TV N:1 VLAN HSI/VoD/VoIP IP Multicast or Multicast VPN HSI, VoIP, VoD, TV TV SP Peering L2 IP/PPoE or Interface Sessions ISG Sessions HSI, VoIP Trunk N:1 or 1:1 Service VLAN TV, VoD HSI/VoIP VOD HSI VOD N:1 VLAN IP Multicast or Multicast VPN TV Efficient Access Large Scale Equal Access Aggregation Retail & Wholesale Intelligent Edge Multiservice Core MPLS L2/L3 services VPWS/H-VPLS/IP Multicast Access Node Aggregation Distribution Core DSL, PON, Ethernet, WiMAX MPLS ISG MPLS 2007 Cisco Systems, Inc. All rights reserved. 6

Distributed Services Architecture Options ISG Sessions ISG Sessions HSI, VoIP, VoD, TV Non Trunk N:1 or 1:1 VLAN TV N:1 VLAN for 1:1 VLAN model EoMPLS Pseudowire MPLS/IP, IP Multicast MPLS VPN, Multicast VPN (w/ HD-VRF) SP Peering HSI, VoIP, VoD, TV TV ISG Sessions L3 (routed) IP Sessions HSI and/or VoIP Trunk N:1 or 1:1 Service VLAN TV, VoD Trunk N:1 or 1:1 Service VLAN TV N:1 VLAN for 1:1 VLAN model MPLS/IP, IP Multicast MPLS VPN, Multicast VPN (w/ HD-VRF) HSI VOD TV Efficient Access Large Scale Equal Access Aggregation Wholesale Intelligent Edge Multiservice Core MPLS/IP, IP Multicast MPLS VPN, Multicast VPN Access Node Integrated Edge Distribution Core DSL, PON, Ethernet, WiMAX ISG MPLS ISG MPLS 2007 Cisco Systems, Inc. All rights reserved. 7

ISG Intelligent Services Gateway 2007 Cisco Systems, Inc. All rights reserved. 8

Intelligent Services Gateway Dynamic Subscriber and Service Management It enables a Cisco network device to be a Policy Enforcement Point (PEP) (and optionally PDP) RADIUS DHCP Portal It is an IOS functional component that enables: IP and PPPoE session management and control IP service flow management and control Local and remote Session Control Policies with event and condition based enforcement: AAA, Transparent or Portal based Logon, Logoff, Timeouts, Time Volume Prepaid Local and remote Traffic Control Policies with event and condition based enforcement: QOS, ACLs, L4 redirect Local and remote Network Control Policies with event and condition based enforcement: L2TP selection, VRF selection and transfer PPPoEoX IPoE RADIUS / AAA push/pull Per Sub/Service Accounting ISG ISG Sessions L4R Internet Self-provisioning / Selfcare 2007 Cisco Systems, Inc. All rights reserved. 9

ISG Subscriber Session Data Plane Subscriber Session ACL Flow Data Feature Feature ACL Flow Feature Feature Network Service Default-Class Session-Features: Apply to the entire session e.g. per-session-acl, Policing, H-QOS, Accounting, L4 redirect Traffic Classification (using traffic classes: class-map type traffic) Flow-Features: Apply to the classified flow (a portion of the entire session data) Session- Features: Apply to the entire session e.g. PBHK Network Service: Forwarding (at L2, e.g. L2TP) or Routing (L3, e.g. connection to a VRF) Mutually exclusive 2007 Cisco Systems, Inc. All rights reserved. 10

ISG Internal and External Policy Control Policy Enforcement Point (PEP) ISG takes role of PDP and PEP: Communication to external Server not required/ optional Business Policy Decisions: Centralized Event Event Policy Decision Point (PDP) Signaling/Network Policy Decisions: Distributed Policy plane Control plane Central Services (Application & Policy) Multiple Layers through ISP SP etc. ISG Network Element Services (Access/ Aggregation) Event Data Identification/ Classification (ACL) Flow Feature Network Service (route/forward) 2007 Cisco Systems, Inc. All rights reserved. 11

ISG Local Policy Control Control Policy Associate Events and Conditions to an ordered list of Actions Condition Event Condition Event Condition Event Condition Event Control Class: List of Actions 1. Disable Service B 2. Enable Service A Control Class: List of Actions 1. Enable Service X 2. Enable Service Y 3. Take Action R Control Class: List of Actions 1. Enable Service PBHK 2. Take action AAA 3. Enable Service L4R 4. Take action: Set Timer policy-map type control SUBSCRIBER_RULE class type control always event session-start 10 service-policy type service name PBHK 20 authorize aaa password lab identifier circuit-id 30 service-policy type service name L4R 40 set-timer IP_UNAUTH_TIMER 5! class type control always event account-logon 10 authenticate aaa list IP_AUTH_LIST 20 service-policy type service unapply name L4R! class type control CND_U event timed-policy-expiry 10 service disconnect! 2007 Cisco Systems, Inc. All rights reserved. 12

ISG Remote Policy Control ISG Dynamic Interface for Session and Service Control RADIUS CoA, SGI (SOAP/BEEP) Applications CPE Service/Policy Control Access UNI Edge NNI Edge Services Policy Decision Point (PDP) Dynamic Session Interface Session logon/logoff View Service List Service logon/logoff View Session status View System messages Feature Change Aggregation Transport Core Transport Policy Enforcement Points (PEP) ISG features controllable by RADIUS Service polices including traffic policies, L4 redirect, Subscriber ACL, Idle Timer, Session Timer, QoS, Session/Service Accounting, Pre-paid 2007 Cisco Systems, Inc. All rights reserved. 13

ISG Key Functionality Service Selection / Self-Care Flexible Accounting Authentication / Authorization Dynamic Policy Push Flexible Session Type Policy based rules Control Policy Domain Switching MPLS integration VRF-Switching Multidimensional Identity Timeouts Conditional debugging Reduced CAPEX and OPEX for mass customization of broadband services Per session and per service accounting, QoS Accounting, Pre-paid (volume), Pre-paid (Time-Based), Tariff-Switching (Pre-Paid and Post-paid) L4 redirect for Web-Based Authentication, Transparent Auto Logon, PPP Authentication Policies for session bandwidth, security and accounting that can be pushed dynamically in real time while session is still active using standardized protocols (e.g. RADIUS, RFC3576 CoA) PPP and IP-Sessions - using different session initiators; access protocol agnostic Event triggered conditional actions: Association of actions based on events Map user to VRF Dynamic VPN Selection Policy determination based on all aspects of subscriber identity Idle Timeout, Session and Service Timeouts Debugging based on any subscriber, service or any other identifier 2007 Cisco Systems, Inc. All rights reserved. 14

ISG IP Session Models 2007 Cisco Systems, Inc. All rights reserved. 15

ISG IP Sessions Models ISG IP Sessions: L2 or L3 (routed) connected sessions ISG IP Session Creation: RADIUS Access Request: For routed IP subscribers, a new IP session is triggered by the RADIUS Access Request while ISG acts as RADIUS proxy Unclassified source IP address: For routed IP subscribers, a new IP session is triggered by the appearance of an IP packet with an unclassified source IP address DHCP DISCOVER: For Layer 2 connected IP subscribers, a new IP session is created based on DHCP Discover, while ISG acts as a DHCP relay or server Unclassified source MAC address: For Layer 2 connected IP subscribers, a new IP session is triggered by the appearance of an IP packet with an unclassified source MAC address ISG IP Sessions Termination: DHCP IP Sessions: DHCP RELEASE or lease expiry RADIUS IP Sessions: RADIUS Accounting-Stop (for RADIUS proxy operation) Any IP sessions models: Session Timeout, Account Logoff, ARP/ICMP/(BFD) keepalives timeout 2007 Cisco Systems, Inc. All rights reserved. 16

ISG IP Session Subscriber Session = IP host Residential Residential IP STB IP STB Access Node Note: In case of a bridged CPE each IP host creates it s own IP Session on the ISG gateway RADIUS ISG Gateway IP IP IP session Defined by a flow of traffic going to and from a subscriber IP address Configurable on logical (dot1q or QinQ) interfaces Session creation by FSOL* IP Packet, RADIUS proxy or DHCP relay Session end defined by DHCP lease, RADIUS Accounting Stop or timeout 1:n relationship between Interface and IP Session When using ISG/RADIUS for provisioning, features are applied to the session itself, not the interface Classification based on MAC, IP L2 connected or routed from first Aggregation device *Fist Sign of Life 2007 Cisco Systems, Inc. All rights reserved. 17

ISG IP Interface Session Subscriber Session = IP Interface RADIUS IP interface session Residential IP STB Residential Access Node ISG Gateway Defined by all traffic to and from a subscriber subinterface Configurable on logical Interfaces (dot1q or QinQ) 1:1 Mapping between Session and Interface Session initiation is at provisioning time (same for acct. start) IP Session end is at de-provisioning time (same for acct. stop) STB Dynamic RADIUS based features provisioning and changes 2007 Cisco Systems, Inc. All rights reserved. 18

ISG IP Subnet Session Subscriber Session = IP Subnet 10.0.0.8/29 Residential Access Node STB 10.0.0.16/29 Residential STB RADIUS ISG Gateway IP IP IP subnet session Configurable on Physical or Logical (dot1q or QinQ) Represents a subscriber IP subnet IP subnet sessions are supported as routed IP subscriber sessions only. IP subnet sessions are created the same way as IP sessions (except that when a subscriber is authorized or authenticated and the Framed-IP-Netmask attribute is present in the user or service profile, ISG converts the source- IP-based session into a subnet session with the subnet value in the Framed-IP-Netmask attribute= 2007 Cisco Systems, Inc. All rights reserved. 19

DHCP Initiated IP session IP Subscriber Transparent Auto Logon Access Node ISG Portal AAA Radius 1a 1d 5 13 DHCP DISCOVER DHCP REQUEST 1b DHCP DISCOVER With Option-82 Info HTTP : Open browser (home page) User Access to Services DHCP OFFER DHCP ACK 2 ISG session creation RADIUS Access Request 3a Username := Opt-82 Verify Identity: OK 3b RADIUS Access ACCEPT 3c 1c 1e 4 6 7b L4 Redirect (home page) HTTP Redirect to assigned portal (HTTPS. Credentials) 10a 9b 11 12 Apply L4-Redirect; Set Timer CoA Session Query Session Query Response Account Logon RADIUS Access Request UN-Apply L4-Redirect 7a Accounting start (for new session) (contains entire identity info of user) 8 9a Verify Credentials: OK! RADIUS Access ACCEPT CoA AcK (w/ service profile parameters) 10b 10c Notes: 1b. Note: We assume DHCP DISCOVER is the first sign of life. Conditions may arise such as a user leaves his previous session with a long lease still outstanding. When he returns, his PC will just send packets using the existing address. The first IP packet will be treated as the session-start event, the system will correlate the MAC address (if available) against cached DHCP information and then continue as shown. 3b. The AAA server knows which port the user is connected to and will use the Opt-82 information to successfully authorize the User. This results in TAL-like (transparent auto logon) behavior. PPPoE sessions have a similar model 2007 Cisco Systems, Inc. All rights reserved. 20

Routed IP session IP Subscriber Transparent Auto Logon Access Node ISG Portal AAA Radius 1a 5 13 First IP packet HTTP : Open browser (home page) User Access to Services 2 ISG session creation RADIUS Access Request Username := IP address Verify Identity: OK 3b RADIUS Access ACCEPT 3c 3a 4 6 7b L4 Redirect (home page) HTTP Redirect to assigned portal (HTTPS. Credentials) 10a 9b 11 12 Apply L4-Redirect; Set Timer CoA Session Query Session Query Response Account Logon RADIUS Access Request UN-Apply L4-Redirect 7a Accounting start (for new session) (contains entire identity info of user) 8 9a Verify Credentials: OK! RADIUS Access ACCEPT CoA AcK (w/ service profile parameters) 10b 10c Notes: 1a. Note: We assume the first IP packet is the first sign of like and the ISG gateway is configured for Transparent Auto Logon. The ISG session is created and RADIUS authorization is initiated 3b. The subscriber profile in the RADIUS server is defined based on the static IP address allocated to that subscriber. This results in TAL-like (transparent auto logon) behavior. 2007 Cisco Systems, Inc. All rights reserved. 21

Routed IP session IP Subscriber Web Portal Authentication Access Node ISG Portal AAA Radius 1a 5 First IP packet HTTP : Open browser (home page) 2 ISG session creation 4 6 Apply L4-Redirect; Set Timer L4 Redirect (home page) Notes: 1a. We assume the first IP packet is the first sign of life 2. The IP Session is created with a basic set of policies that are granting access to the authentication portal and L4-redirect to that portal 4. Redirect User to Portal to have him input his credentials and service preference. Set a timer which will remove the session if the authentication is not successful (avoid accumulating state). 13 User Access to Services HTTP Redirect to assigned portal (HTTPS. Credentials) Account Logon Accounting start (for new session) (contains entire identity info of user) 8 9a RADIUS Access Request 10a Verify Credentials: OK! RADIUS Access ACCEPT 9b 11 12 CoA AcK (w/ service profile parameters) UN-Apply L4-Redirect 10b 10c 12. Accounting record informs AAA server about user s identity (IP address and user name ). Note: Accounting messages need to be understood as state/event notifications, not just charging information. 2007 Cisco Systems, Inc. All rights reserved. 22

IP Subscriber Dynamic Service Selection Access Node ISG Portal AAA Radius 1 User accesses service page (after logon) Notes: 2 7 User selects a new service 4 ISG activates service 6 Portal displays authorized service profile page CoA ACK CoA Service Activate RADIUS Access Request Username := ServiceX 3 RADIUS Access Accept 5 0. Subscriber is logged on and portal displays authorized service profile info 1a. User requests addition of a new service (video) to their profile. 1b. Back-end process request/payment/subscription info and updates subscriber profile. Portal displays result 2. User activates new service. 3. Portal sends new service activate CoA to ISG 4. ISG requests service profile from Radius 7. User has access to prioritized service 2007 Cisco Systems, Inc. All rights reserved. 23

PPP to IP Sessions Evolution Experience very similar to former PPP Subscriber Identification/Authentication Subscriber Isolation Identify Line ID (ATM VC/VP), PPPoE Tag IPCP Keepalives Service Selection Session and Service Accounting Start Session Stop Session Session Identification Datagram Transport RADIUS Authorization, Portal Logon L3: ISG, ACLs, VRFs L2: VLAN, private VLAN DHCP opt. 82, vmac VLAN (802.1q, 802.1ad) DHCP ICMP, ARP Policy events (authorization, portal based, prepaid.) RADIUS Provisioned, DHCP, MAC, IP (subnet), RADIUS Session and/or Keepalives Timeout DHCP/RADIUS session stop, Logoff VLAN Interface, Mac, IP (subnet) IP/Ethernet Some open considerations Advanced Authentication (CHAP, PAP, EAP based) Consistent and coordinated session lifecycle on the client and server 2007 Cisco Systems, Inc. All rights reserved. 24

Additional Considerations For Transparent PPPoE to IPoE Migration 2007 Cisco Systems, Inc. All rights reserved. 25

IP sessions Authentication for Transparent Evolution from PPPoE to IPoE Target: Use the PPPoE authentication models to avoid operational impact Requirements: The authentication must be secure Client credentials are sent based on a secure encryption scheme The authentication must be before IP address allocation Ensures entitlement to the service Ensures safe and predictable IP address usage Ensures predictable legal intercept for the client traffic Ensures that any attacks are launched by known individuals The authentication process must accommodate clients that can t perform authentication The authentication process must rely on standards protocols and not disrupt or change existing protocols Standardization Direction: Started efforts in IETF for defining the DHCP authentication models 2007 Cisco Systems, Inc. All rights reserved. 26

DHCP-AUTH as drop-in for PPPoE draft-pruss-dhcp-auth-dsl-02.txt (Alternative 1) Use existing DHCP message set Reverse Authentication and other Auth Protocols (e.g. EAP) not supported All Attributes are mapped from RADIUS including IP address or Pool Client computes challenge-response with user s password RG Access Node DHCPDISCOVER (with auth-proto-chap Option) DHCPOFFER (w/ CHAP Challenge, Name) DHCP REQUEST (w/ CHAP Name, Response, ID) Adds subscriber line info In DHCP Option 82 Client IP/MAC recorded By DHCP snooping OR DHCPACK (w/ yiaddr) DHCPNACK (w/chap Failure if unsuccessful) AAA passes challenge & response to AAA (no password stored on ) RADIUS Access-Request (w/ CHAP Name, ID, Challenge, Response) RADIUS Access-Accept (w/ Profile, IP-Addr) Client Config included in DHCP ACK (could be proxy from an external DHCP-Server 2007 Cisco Systems, Inc. All rights reserved. 27

Enhanced DHCP-Auth For EAP, CHAP server auth etc. draft-pruss-dhcp-auth-dsl-02.txt (Alternative 2) Expands capabilities of Alternative 1 : supports CHAP server authentication - supports EAP and with that more advanced methods for authentication Requires: A new message DHCP message size >= 1604 for use with EAP message option (RFC 2132 max DHCP message size option) RG Precise EAP exchange dependent on EAP method, DHCPAUTH message is simply a wrapper DHCPDISCOVER (w/ auth-protoeap Option) DHCPEAP (w/ EAP Message) DHCPEAP (w/ EAP Message) DHCPREQUEST DHCPACK Access Node Adds subscriber line info In DHCP Option 82 EAP request/response pairs continue over DHCP and RADIUS until EAP is complete. If a Access reject is received a DHCPNAK with a EAP failure messages is sent. Else if an EAP-success is received in the an DHCPOFFER resumes normal DHCP. DHCPOFFER (w/ yiaddr) (w/ EAP-success) EAP passthrough shown Here. Could be terminated at NAS for PPP CHAP interface to AAA Radius Access Request (w/ EAP Message) Radius Access Accept (w/ EAP Message) OR Radius Access Reject (w/ EAP Message) AAA Client IP/MAC recorded by DHCP snooping 2007 Cisco Systems, Inc. All rights reserved. 28

IP sessions Keepalives for Transparent Evolution from PPPoE to IPoE IP sessions considerations IP flows are connection-less Neither Ethernet nor IP have a well-defined, built-in session life cycle IP Sessions need to be defined in respect of a session lifecycle IPoE session start/stop can be inferred from data-plane: e.g. 1st reception packet/frame from an unclassified source (IP/MAC address) and idle timeout or control-plane: e.g. by performing/witnessing a successful DHCP lease and lease expiration/release (similarly with RADIUS) In addition, there has to be a keepalives mechanism that allows detection of a session failure, resp. failed connectivity An IP Session keepalives mechanism needs to be implemented on client and server in order to obtain PPP like behavior By the server: to enable accurate session lifecycle and accounting By the IP client: to enable a similar inter server redundancy model DSLF WT-146 has specified several keepalives mechanisms for IP sessions, in the server and client: ARP, BFD based 2007 Cisco Systems, Inc. All rights reserved. 29

Access Node Dual-homing IPoE Session Re-Initiation 1. 2. Residential IP STB Access Node DHCP Discover DHCP Discover DHCP Discover Residential STB Access Node DHCP Offer DHCP Offer DHCP Offer DHCP Offer 3. 4. ARP Keepalive ARP Keepalive IPoE Session Residential Access Node DHCP Request Residential Access Node DHCP Ack DHCP Request DHCP Ack STB STB For IP routed sessions, FSOL is an RADIUS AR or new IP flow 2007 Cisco Systems, Inc. All rights reserved. 30

5. Residential Access Node Dual-homing IPoE Session Re-Initiation (continued) STB 2 Access Node Keepalives Keepalives IPoE Session 3 2 1 6. Residential STB Access Node DHCP Discover DHCP Offer 7. IPoE Session with a connection-oriented concept with builtin lifecycle management Session failure can be detected by means of session keepalives (ICMP, ARP, BFD) Residential Access Node Both, client and server () will be aware of session failure and terminate the session context STB DHCP Request DHCP Ack Client will/may re-initate a new session upon session failure and thereby create a new session with a standby IPoE Session ARP Keepalive ARP Keepalive For IP routed sessions, keepalives are based on BFD or ICMP 2007 Cisco Systems, Inc. All rights reserved. 31

Conclusion 2007 Cisco Systems, Inc. All rights reserved. 32

PPP to IP Journey... A Natural But Simple Evolution Carrier Ethernet deployments with IPTV services and Ethernet based access options are driving the migration from PPP to IP This migration has to be transparent for the service provider from functional and operational aspects There are various service delivery models that drive different IP session deployment models Cisco Intelligent Services Gateway enables the same services and operational behaviour for PPPoE and the various IP sessions models Standardization efforts are in place to fine tune the remaining functional aspects for full operational consistency In conclusion the migration from PPP to IP can be considered a natural and simple evolution 2007 Cisco Systems, Inc. All rights reserved. 33

2007 Cisco Systems, Inc. All rights reserved. 34