No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

NE40E V800R010C10SPC500 Configuration Guide - Value-Added-Service 01

This is NE40E V800R010C10SPC500 Configuration Guide - Value-Added-Service
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring EDSG

Configuring EDSG

Before configuring EDSG, familiarize yourself with the usage scenario, complete the pre-configuration tasks, and obtain the data required for the configuration.

Usage Scenario

Typical EDSG usage scenarios are as follows:
  • In some regions, small local carriers need to rent backbone carriers' lines to provide Internet access services to users. The local carriers also need to pay the backbone carriers for traffic over the backbone networks. Low fees are charged for traffic over a local network, whereas high fees are charged for traffic over a backbone network. To increase revenues, local carriers need a solution that can distinguish the two types of traffic and perform accounting based on network types. EDSG meets this requirement. Two EDSG services can be configured for the local and backbone networks based on traffic destination addresses to implement differentiated accounting on traffic over both the local and backbone networks.

  • When campus users access a campus network, the carrier does not charge any fees or charges low fees, and the carrier does not limit their access rates. However, when campus users access an external network, the carrier charges high fees and limits their access rates. To increase the carrier's revenues, configure two EDSG services for the campus and external networks based on traffic destination addresses to implement differentiated accounting and rate limit on traffic over both the campus and external networks.

  • Many Internet services, such as gaming, File Transfer Protocol (FTP), video on demand (VoD), and news services, have different costs and bandwidth requirements. To implement differentiated accounting and rate limit on various services, configure these services as different EDSG services.

As shown in Figure 4-1, Point-to-Point Protocol over Ethernet (PPPoE) users access networks 1 and 2. Different fees need to be charged for traffic over networks 1 and 2. The users have different bandwidth requirements for networks 1 and 2. To meet these requirements, configure two EDSG services on the broadband remote access server (BRAS) to perform differentiated accounting and rate limit on traffic over networks 1 and 2. EDSG allows carriers to provide flexible service and accounting policies for different user requirements.

NOTE:
The BRAS can work with the AAA server, policy server, and portal server to implement differentiated accounting and rate limit based on traffic destination addresses.
  • AAA server: provides user authentication, authorization, and accounting. Generally, a RADIUS server is used as an AAA server.

  • Policy server: delivers EDSG service policies. Only a RADIUS server can be used as a policy server.

  • Portal server: provides user interfaces. Users can log in to a portal server and select EDSG services as required. A portal server is generally integrated into an AAA or policy server.

Figure 4-1 EDSG networking

Pre-configuration Tasks

Before configuring EDSG, complete the following tasks:

  • Load the BRAS license and the EDSG license.

  • Configure an authentication scheme, an accounting scheme, and a RADIUS server group for an EDSG service policy (for details, see AAA and User Management Configuration (Access User)).

  • Configure an address pool (for details, see Configuring an IPv4 Address Pool and an Address Pool Group).

  • Configure a domain and bind the authentication scheme, accounting scheme, address pool, and RADIUS server group to the domain (for details, see Configuring a Domain).

  • Configure a BAS interface (for details, see IPoE Access Configuration and PPPoE Access Configuration).

Configuration Procedures

Figure 4-2 Flowchart for configuring EDSG

Enabling the Value-added Service Function

A value-added service can be configured only after the value-added service function is enabled.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Run value-added-service enable

    The value-added service function is enabled globally.

    The value-added service function is not enabled globally by default.

  3. Run commit

    The configuration is committed.

Configuring a Policy Server

EDSG requires a dedicated policy server to deliver an EDSG service policy. This section describes how to configure a policy server.

Context

The value-added service policy can be delivered through the RADIUS protocol or Diameter Protocol. When delivered through the RADIUS protocol, you need to configure the RADIUS server on the NE40E. For details about the configuration, see Configuring a RADIUS Server. When delivered through the Diameter protocol, you need to configure the Diameter server on the NE40E. For details about the configuration, see Configuring a Diameter Server.

Configuring an EDSG Traffic Policy

To distinguish user traffic over networks 1 and 2, create two service groups and configure an EDSG traffic policy for each service group. This section describes how to configure an EDSG traffic policy.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Run service-group service-group-name

    A service group is created.

  3. Define an ACL rule for matching the service group.
    1. Run the acl { name advance-acl-name [ advance | [ advance ] number advance-acl-number ] | [ number ] advance-acl-number } [ match-order { config | auto } ] command to create an ACL and enter the ACL view.

      NOTE:

      You need to use UCLs. The number of a UCL ranges from 6000 to 9999.

    2. Create an ACL rule based on protocol types.

      1. For TCP, run:

        rule [ rule-id ] [ name rule-name ] { deny | permit } { protocol | tcp } [ [ dscp dscp | [ precedence precedence | tos tos ] * ] | { destination { destination-ip-address { destination-wildcard | 0 | des-netmask } | any } | destination-pool destination-pool-name } | { destination-port operator port-number | destination-port-pool destination-port-pool-name } | fragment-type { fragment | non-fragment | non-subseq | fragment-subseq | fragment-spe-first } | { source { source-ip-address { source-wildcard | 0 | src-netmask } | any } | source-pool source-pool-name } | { source-port operator port-number | source-port-pool source-port-pool-name } | { tcp-flag | syn-flag } { tcp-flag [ mask mask-value ] | established |{ ack [ fin | psh | rst | syn | urg ] * } | { fin [ ack | psh | rst | syn | urg ] * } | { psh [ fin | ack | rst | syn | urg ] * } | { rst [ fin | psh | ack | syn | urg ] * } | { syn [ fin | psh | rst | syn | urg ] * } | { urg [ fin | psh | rst | syn | urg ] * } } | time-range time-name | [ vpn-instance vpn-instance-name | vpn-instance-any ] | ttl ttl-operation ttl-value | packet-length length-operation length-value ] *

      2. For UDP, run:

        rule [ rule-id ] [ name rule-name ] { deny | permit } { protocol | udp } [ [ dscp dscp | [ precedence precedence | tos tos ] * ] | { destination { destination-ip-address { destination-wildcard | 0 | des-netmask } | any } | destination-pool destination-pool-name } | { destination-port operator port-number | destination-port-pool destination-port-pool-name } | fragment-type { fragment | non-fragment | non-subseq | fragment-subseq | fragment-spe-first } | { source { source-ip-address { source-wildcard | 0 | src-netmask } | any } | source-pool source-pool-name } | { source-port operator port-number | source-port-pool source-port-pool-name } | time-range time-name | [ vpn-instance vpn-instance-name | vpn-instance-any ] | ttl ttl-operation ttl-value | packet-length length-operation length-value ] *

      3. For ICMP, run:

        rule [ rule-id ] [ name rule-name ] { deny | permit } { protocol | icmp } [ [ dscp dscp | [ precedence precedence | tos tos ] * ] | { destination { destination-ip-address { destination-wildcard | 0 | des-netmask } | any } | destination-pool destination-pool-name } | fragment-type { fragment | non-fragment | non-subseq | fragment-subseq | fragment-spe-first } | icmp-type { icmp-name | icmp-type [ to icmp-type-end ] [ icmp-code ] } | { source { source-ip-address { source-wildcard | 0 | src-netmask } | any } | source-pool source-pool-name } | time-range time-name | [ vpn-instance vpn-instance-name | vpn-instance-any ] | ttl ttl-operation ttl-value | packet-length length-operation length-value ] *

      4. For other protocols, run:

        rule [ rule-id ] [ name rule-name ] { deny | permit } { protocol | gre | ip | ipinip | igmp | ospf } [ [ dscp dscp | [ precedence precedence | tos tos ] * ] | { destination { destination-ip-address { destination-wildcard | 0 | des-netmask } | any } | destination-pool destination-pool-name } | fragment-type { fragment | non-fragment | non-subseq | fragment-subseq | fragment-spe-first } | { source { source-ip-address { source-wildcard | 0 | src-netmask } | any } | source-pool source-pool-name } | time-range time-name | [ vpn-instance vpn-instance-name | vpn-instance-any ] | ttl ttl-operation ttl-value | packet-length length-operation length-value ] *

    3. Run commit

      The configuration is committed.

    4. Run quit

      The system is displayed.

  4. Configure a traffic classifier.
    1. Run the traffic classifier classifier-name [ operator { and | or } ] command to configure a traffic classifier and enter the traffic classifier view.
    2. Run the if-match acl { acl-number | name acl-name } command to configure the traffic classifier to reference a specified ACL.
    3. Run commit

      The configuration is committed.

    4. Run quit

      The system is displayed.

  5. Configure a traffic behavior.
    1. Run the traffic behavior behavior-name command to configure a traffic behavior and enter the traffic behavior view.
    2. (Optional) Run service-class edsg keep-queue-level

      The device is configured to retain the service class of the original packets after the EDSG service is matched to a traffic behavior.

    3. Run commit

      The configuration is committed.

    4. Run quit

      The system is displayed.

  6. Configure an EDSG traffic policy.
    1. Run the traffic policy policy-name command to configure an EDSG traffic policy and enter the EDSG traffic policy view.
    2. Run the classifier classifier-name behavior behavior-name [ precedence precedence ] command to specify the traffic behavior for the traffic classifier.
    3. Run commit

      The configuration is committed.

    4. Run quit

      The system is displayed.

  7. Run traffic-policy policy-name { inbound | outbound }

    The EDSG traffic policy is globally applied.

  8. Run commit

    The configuration is committed.

Configuring an EDSG Service Policy

To implement differentiated accounting and rate limit on traffic over networks 1 and 2, configure two EDSG service policies, bind service groups to the two EDSG service policies, configure different accounting schemes for the two EDSG service policies, and set bandwidth parameters for uplink and downlink traffic rate limit. This section describes how to configure an EDSG service policy.

Procedure

  1. Run system-view

    The system view is displayed.

  2. (Optional) Run service-policy cache update interval interval-value

    An interval at which the downloaded EDSG service policy template is updated is configured.

  3. (Optional) Run value-added-service update-online-edsg rate-limit service-policy [ cache [ cache-policy-name ] | configuration [ configuration ] ]

    The rate limit of online EDSG services is updated.

  4. (Optional) Run radius-attribute hw-policy-name support-type edsg

    The HW-Policy-Name attribute is configured to carry the EDSG service policy name.

  5. (Optional) Run radius-attribute include edsg-service-name accounting-request

    User accounting packets are configured to carry the EDSG service policy name.

    NOTE:
    If the radius-attribute hw-policy-name support-type edsg command is configured, it indicates the Huawei proprietary No. 95 attribute. If the radius-attribute hw-policy-name support-type edsg command is not configured, it indicates the Huawei proprietary No. 185 attribute.

  6. (Optional) Run service-policy name policy-name edsg

    An EDSG service policy is created, and the EDSG service policy view is displayed.

    NOTE:
    If the policy profile name needs to be case sensitive, run the service-policy name-case-sensitive enable command to enable case sensitivity of EDSG service profile names.

  7. (Optional) Run ip-type ipv6

    The statistic type for EDSG services is set to IPv6.

  8. Run service-group service-group-name [ inbound | outbound ] [ priority priority ]

    A specified service group is bound to the EDSG service policy.

    You can run the service-group service-group-name command in the system view to create a service group.

  9. Run radius-server group group-name

    A specified RADIUS server group is bound to the EDSG service policy.

  10. Run authentication-scheme authentication-scheme-name

    An authentication scheme is configured for the EDSG service policy.

  11. Run accounting-scheme accounting-scheme-name

    An accounting scheme is configured for the EDSG service policy.

    Respectively. EDSG services support only RADIUS accounting and non-accounting.

    The BRAS provides two fixed accounting schemes: default0 and default1. The two accounting schemes cannot be deleted but can be modified.

  12. Run rate-limit cir cir-value [ pir pir-value ] [ cbs cbs-value ] [ pbs pbs-value ] { inbound | outbound }

    Bandwidth parameters are set for uplink and downlink traffic rate limit for EDSG services.

  13. (Optional) Run diameter monitor-key monitor-key

    A Diameter monitoring key is configured for the service policy.

  14. (Optional) Run service-class { cs7 | cs6 | ef | af4 | af3 | af2 | af1 | be } { inbound | outbound }

    The upstream or downstream service class is specified.

  15. Run commit

    The configuration is committed.

(Optional) Configuring a Mapping Between a Time Range Template and Service Bandwidth

This section describes how to configure a mapping between a time range template and EDSG service bandwidth. After the configuration is complete, the EDSG service bandwidth is adjusted when the time range changes.

Context

User service traffic has different requirements on service bandwidth in different time ranges. For example, the service traffic volume used by a user in a time range during daylight hours is usually greater than that in the early morning. Therefore, a larger service bandwidth must be set for the time range during daylight hours. To properly distribute service traffic, configure the service bandwidth to be flexibly adjusted when the time range changes.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Run time-range time-name { start-time to end-time days | from time1 date1 [ to time2 date2 ] }

    A time range is defined.

  3. Run service-policy name policy-name edsg

    The EDSG service policy view is displayed.

  4. Run time-range time-range-name rate-limit cir cir-value [ pir pir-value ] [ cbs cbs-value [ pbs pbs-value ] ] [ inbound | outbound ]

    A mapping is configured between the time range template and EDSG service bandwidth.

(Optional) Configuring the Prepaid Function

The prepaid function allows the RADIUS server to deliver an EDSG service with a specified time or traffic volume quota in advance. After the quota is exhausted, the BRAS reapplies for an EDSG service quota from the RADIUS server. When the RADIUS server returns a zero quota, the BRAS executes a deactivation or redirection policy. This section describes how to configure the prepaid function.

Context

An authentication scheme, an accounting scheme, and a RADIUS server group have been configured for the prepaid function of EDSG services (for details, see AAA Configuration).

Procedure

  1. Run system-view

    The system view is displayed.

  2. Configure a prepaid profile.
    1. Run the prepaid-profile prepaid-profile-name command to create a prepaid profile and enter the prepaid profile view.
    2. Run the radius-server group group-name command to bind a RADIUS server group to the prepaid profile.
    3. Run the authentication-scheme prepaid-profile-name command to configure an authentication scheme for the prepaid profile.

    4. Run the accounting-scheme accounting-scheme-name command to configure an accounting scheme for the prepaid profile.

      The BRAS provides two fixed accounting schemes: default0 and default1. The two accounting schemes cannot be deleted but can be modified.

    5. Run the password cipher cipher-password command to configure a password used for the BRAS to apply for an EDSG service quota from the RADIUS server.
    6. (Optional) Run the threshold time time-threshold seconds command to configure a time threshold for the BRAS to reapply for a time quota for EDSG services from the RADIUS server.

      When the remaining time quota of a user's EDSG service reaches a configured time threshold, the BRAS reapplies for a time quota for the EDSG service from the RADIUS server. When the RADIUS server returns a zero time quota, the BRAS executes a deactivation or redirection policy.

    7. (Optional) Run the threshold volume volume-threshold { kbytes | mbytes | bytes } command to configure a traffic volume threshold for the BRAS to reapply for a traffic volume quota for EDSG services from the RADIUS server.

      When the remaining traffic volume quota of a user's EDSG service reaches a configured traffic volume threshold, the BRAS reapplies for a traffic volume quota for the EDSG service from the RADIUS server. When the RADIUS server returns a zero traffic volume quota, the BRAS executes a deactivation or redirection policy.

      NOTE:
      You can configure both the time and traffic volume thresholds for the BRAS to reapply for EDSG service quotas from the RADIUS server. Once the remaining time or traffic volume quota of a user's EDSG service reaches the corresponding configured threshold, the BRAS reapplies for an EDSG service quota from the RADIUS server. For example, if the time and traffic volume thresholds are respectively set to 60s and 5 Mbytes for a user:
      • When the remaining traffic volume quota of the user's EDSG service is 5 Mbytes but the remaining time quota of the EDSG service is greater than 60s, the BRAS reapplies for a traffic volume quota for the EDSG service from the RADIUS server.
      • When the remaining time quota of the user's EDSG service is 60s but the remaining traffic volume quota of the EDSG service is greater than 5 Mbytes, the BRAS reapplies for a time quota for the EDSG service from the RADIUS server.

    8. Run the commit to commit the configuration.
  3. (Optional) Configure a policy used when the quota is exhausted as required.
    1. Configure a deactivation policy. When the quota of a user's EDSG service is exhausted, the BRAS deletes the EDSG service.

      1. Run the quota-out service deactivate command to configure a deactivation policy.

      2. Run the commit to commit the configuration.

      3. Run the quit command to return to the system view.

    2. Configure a redirection policy. When the quota of a user's EDSG service is exhausted, the user is redirected to a specified web page.

      1. Run the http-redirect-profile redirect-profile-name command to create an HTTP redirection profile and enter the HTTP redirection profile view.

      2. Run the web-server url redirect-url command to configure a redirection web page.

      3. (Optional) Run the web-server mode { get | post } command to configure an HTTP access mode for the web server.

      4. Run the commit to commit the configuration.

      5. Run the quit command to return to the system view.

      6. Run the prepaid-profile prepaid-profile-name command to enter the prepaid profile view.

      7. Run the quota-out redirect redirect-profile-name command to configure a redirection policy and specify an HTTP redirection profile.

      8. Run the commit to commit the configuration.

      9. Run the quit command to return to the system view.

  4. Apply the prepaid profile in the EDSG service policy view.
    1. Run the service-policy name policy-name edsg command to enter the EDSG service policy view.

      An EDSG service policy must have been configured. For details about how to configure an EDSG service policy, see Configuring an EDSG Service Policy.

    2. Run the prepaid-profile prepaid-profile-name command to configure a prepaid profile for the EDSG service policy.
  5. (Optional) Run the service volume-quota apply { inbound | outbound } command to specify the traffic direction to which the EDSG service quota applies.
  6. Run the commit to commit the configuration.

(Optional) Configuring a Mode in Which an EDSG Service Policy Is Obtained

An EDSG service policy can be downloaded from local configurations or a RADIUS server.

Procedure

  1. Run service-policy download { local | radius server-group password cipher cipher-password }*

    A mode in which an EDSG service policy is obtained is configured.

    NOTE:
    The BRAS can obtain an EDSG service policy in any of the following modes:
    • From local configurations only: The BRAS obtains an EDSG service policy only from local configurations.

    • From a RADIUS server only: The BRAS obtains an EDSG service policy only from a RADIUS server.

    • First from local configurations and then from an RADIUS server: The BRAS first attempts to obtain an EDSG service policy from local configurations. If no EDSG service policy is locally configured, the BRAS obtains an EDSG service policy from an RADIUS server.

    • First from an RADIUS server and then from local configurations: The BRAS first attempts to obtain an EDSG service policy from an RADIUS server. If the RADIUS server does not respond after expiration, the BRAS obtains an EDSG service policy from local configurations.

    To configure the BRAS to obtain an EDSG service policy from local configurations, you must have configured an authentication scheme, an accounting scheme, and a RADIUS server group for the EDSG service policy. For configuration details, see Configuring AAA Schemes. To configure the BRAS to obtain an EDSG service policy from a RADIUS server, you must have configured the RADIUS server. For configuration details, see Configuring RADIUS.

(Optional) Configuring a Rate Limit Mode for EDSG Services

You can configure different rate limit modes for upstream and downstream EDSG service traffic of users who go online from an AAA domain.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Run aaa

    The AAA view is displayed.

  3. Run domain domain-name

    The AAA domain view is displayed.

  4. Run service rate-limit-mode { car | user-queue } { inbound | outbound }

    A rate limit mode is configured for online users' upstream or downstream EDSG service traffic.

  5. Run commit

    The configuration is committed.

(Optional) Enabling EDSG Services to Support HQoS Scheduling for Home Users

This section describes how to enable EDSG services to support HQoS scheduling for home users in an AAA domain.

Context

Home users support HQoS, but differentiated traffic statistics and accounting cannot be performed for many users' services. To resolve this issue, enable EDSG services to support HQoS scheduling for home users.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Run aaa

    The AAA view is displayed.

  3. Run domain domain-name

    The AAA domain view is displayed.

  4. Run value-added-service edsg family-schedule { inbound | outbound }

    EDSG services are enabled to support HQoS scheduling for home users.

  5. Run commit

    The configuration is committed.

(Optional) Configuring EDSG Service Traffic to Match a User Group

This section describes how to configure EDSG service traffic to match a user group in NAT/DS-Lite load-balancing scenarios.

Context

In NAT/DS-Lite load-balancing scenarios, after user traffic matches EDSG services, it must continue to match a user group for NAT/DS-Lite service selection.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Run service-policy name policy-name edsg

    The EDSG service policy view is displayed.

  3. Run traffic match user-group [ inbound | outbound ]

    EDSG service traffic is configured to match a user group.

    NOTE:
    For DS-Lite users, the EDSG service matches the inner IPv4 address of the tunnel.

  4. Run commit

    The configuration is committed.

(Optional) Configuring Accounting Copy for EDSG Services

This section describes how to enable the copy function for EDSG service accounting packets in a user access domain.

Context

If the original accounting packet information of EDSG services is required, a device must send EDSG service accounting packets to a RADIUS copy server group as the original accounting information in subsequent settlement.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Run aaa

    The AAA view is displayed.

  3. Run domain domain-name

    The domain view is displayed.

  4. Run service-policy accounting-copy radius-server group-name

    EDSG service accounting copy is enabled, and a RADIUS copy server group is configured.

  5. Run the commit to commit the configuration.

(Optional) Configuring Accounting Packet Merging for Value-added Services

This section describes how to configure accounting packet merging for value-added services to reduce the number of packets sent to a RADIUS accounting server.

Context

When a large number of users go online and each user applies for many value-added services, a large number of accounting packets are generated. The processing capability of a RADIUS accounting server is limited. To prevent the number of accounting packets from exceeding the processing capability of a RADIUS accounting server, the number of accounting packets sent by a device to a RADIUS accounting server must be reduced to relieve the pressure on the RADIUS accounting server.

Procedure

  1. Enable accounting packet merging for value-added services.
    1. Run system-view

      The system view is displayed.

    2. Run aaa

      The AAA view is displayed.

    3. Run domain domain-name

      The domain view is displayed.

    4. Run value-added-service accounting-merge edsg { stop | interim interval interval [ hash ] }

      Accounting packet merging is enabled for value-added services.

    5. Run the commit to commit the configuration.
  2. (Optional) Set the maximum length of a post-merging accounting packet for value-added services.
    1. Run system-view

      The system view is displayed.

    2. Run radius-server group groupname

      The RADIUS server group view is displayed.

    3. Run radius-server accounting-merge max-length length

      The maximum length is set for a post-merging accounting packet for value-added services.

    4. Run the commit to commit the configuration.
  3. (Optional) Enable a post-merging accounting packet that fails to be sent for value-added services to enter the accounting packet cache.
    1. Run system-view

      The system view is displayed.

    2. Run value-added-service accounting-merge cache enable

      A post-merging accounting packet that fails to be sent for value-added services is enabled to enter the accounting packet cache.

    3. Run the commit to commit the configuration.

(Optional) Enabling the Captive Portal Function Based on EDSG Services

After an HTTP redirection profile is bound to a service policy, the captive portal function based on EDSG services is enabled. When users visit HTTP web pages matching service traffic, they are redirected to a specified page.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Configure a redirection profile.
    1. Run http-redirect-profile profile-name

      An HTTP redirection profile is created.

    2. Run web-server url redirect-url

      The destination link for user HTTP redirection is configured.

    3. (Optional) Run web-server redirect-limit limit-value

      The number of times advertisements are forcibly pushed for an HTTP redirection profile is configured.

    4. Run quit

      The system view is displayed.

  3. Apply the redirection profile in the service policy view.
    1. Run service-police name police-name edsg

      An EDSG service policy profile is created and the EDSG service policy profile view is displayed.

    2. Run either of the following command to bind the redirection profile to the service policy view.

      • If users are required to be redirected to a specified page while visiting HTTP web pages matching service traffic, run the http-redirect-profile profile-name command to bind the redirection profile to the service policy view
      • If the traffic matching the service needs to be redirected instantly after the service is activated, run the service force redirect redirect-profile-name command to bind the redirection profile to the service policy view.

  4. Run commit

    The configuration is committed.

(Optional) Configuring RADIUS Attributes

To enable attributes delivered by a RADIUS server through CoA packets or RADIUS to take effect, you must perform related configurations on the NE40E.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Run aaa

    The AAA view is displayed.

  3. Run value-added-service edsg modify-synchronous attribute-name

    A specified attribute is enabled to take effect upon delivery in EDSG service scenarios.

  4. Run value-added-service edsg accounting interim send-update user-ip enable

    The device is enabled to send a real-time accounting packet carrying the HW-Acct-Update-Address (26-159) attribute with a value of 1 for EDSG services when the user address changes.

Checking the Configurations

You can configure different rate limit modes for upstream and downstream EDSG service traffic of users who go online from an AAA domain.

Procedure

  • Run the display service-policy { configuration [ name config-policy-name ] | cache [ name config-policy-name ] } command to check information about a specified EDSG service policy.
  • Run the display service-policy configuration global command to check global service policy configurations.
  • Run the display prepaid-profile [ name prepaid-profile-name ] command to check information about a specified prepaid profile.
  • Run the display value-added-service update-online-edsg process-information command to check online EDSG service update information.
  • Run the display value-added-service policy command to check information about a value-added service policy.
  • Run the display value-added-service user command to check information about a value-added service.
  • Run the display value-added-service edsg time-range process-information command to view the process of updating the EDSG service bandwidth based on a time range.

Example

Run the display service-policy command to view information about a specified EDSG service policy.

<HUAWEI> display service-policy configuration name gd-edsg1
------------------------------------------------
Service-policy-index         : 0
  Service-policy-name          : gd-edsg1
  Service-policy-type          : EDSG
  Policy-storage-type          : configuration
  Reference-count              : 0
  Service-IP-type              : IPv6
  Service-class-inbound        : ef
  Service-class-outbound       : ef
  Authentication-scheme-name   : -
  Accounting-scheme-name       : default1
  Radius-server-template       : template1
  Service-group-name           : -
  Service-group-priority       : -
  Inbound-cir                  : 100(kbps)
  Inbound-pir                  : 100(kbps)
  Inbound-cbs                  : 100(bytes)
  Inbound-pbs                  : 3000(bytes)
  Outbound-cir                 : 10000(kbps)
  Outbound-pir                 : -
  Outbound-cbs                 : -
  Outbound-pbs                 : -
  Prepaid-profile-name         : -
  HTTP-redirect-profile        : -
  Diameter monitor key         : -
  Inbound-match-usergroup      : no
  Outbound-match-usergroup     : no
  Current time-range template  :-
  Time-range template          : t1
    Inbound-cir      : 10000(kbps)                                    
    Inbound-pir      : -                                              
    Inbound-cbs      : -                                              
    Inbound-pbs      : -                                              
    Outbound-cir      : 10000(kbps)                                    
    Outbound-pir      : -                                              
    Outbound-cbs      : -                                              
    Outbound-pbs      : -
  Time-range template        : t2
    Inbound-cir        : 20000(kbps)                                    
    Inbound-pir        : -                                              
    Inbound-cbs        : -                                              
    Inbound-pbs        : -                                              
    Outbound-cir        : 20000(kbps)                                    
    Outbound-pir        : -                                              
    Outbound-cbs       : -                                              
    Outbound-pbs        : -
  Time-range template        : t3
    Inbound-cir      : 30000(kbps)                                    
    Inbound-pir      : -                                              
    Inbound-cbs      : -                                              
    Inbound-pbs      : -                                              
    Outbound-cir      : 30000(kbps)                                    
    Outbound-pir      : -                                              
    Outbound-cbs      : -                                              
    Outbound-pbs      : -        
 ------------------------------------------------ 

Run the display service-policy configuration global command to view the global configurations of an EDSG service policy when the license function for EDSG is enabled.

<HUAWEI> display service-policy configuration global
  ------------------------------------------------                              
  Download-configuration:                                                       
   First-method                : local                                          
   Second-method               : -                                              
   Server-group-name           : -                                              
   Password                    : -                                              
  Cache-update-interval        : -                                              
    EDSG-license-configuration : 
         Function-license                : ACTIVE
  ------------------------------------------------  

Run the display service-policy download-configuration command to view the mode in which an EDSG service policy is obtained.

<HUAWEI> display service-policy download-configuration
 ------------------------------------------------
  First-method                 : local
  Second-method                : radius
  Server-group-name            : group1
  Password                     : ******
  -----------------------------------------------

Run the display prepaid-profile command to view information about a specified prepaid profile.

<HUAWEI> display prepaid-profile name test
------------------------------------------------
  Prepaid-profile-index        : 0
  Prepaid-profile-name         : prepaid
  Prepaid-password             : ******
  Reference-count              : 0
  Authentication-scheme-name   : auth1
  Accounting-scheme-name       : acct1
  Radius-server-template       : template1
  Time-threshold               : 30(s)
  Volume-threshold             : 0(bytes)
  Quota-out-action             : service deactivate
  Http-redirect-profile       : redirect1
  Service Volumequota apply direction: outbound
------------------------------------------------ 

Run the display value-added-service update-online-edsg process-information command to view online EDSG service update information.

<HUAWEI> display value-added-service update-online-edsg process-information
 -------------------------------------------------------------------------------
Last receive update message time : 2012-07-01 11:00:33
 Last service-policy type         : all
 Current update process           : 51%
 Send update request              : 62305
 Receive update ack               : 62257

 Update fail user information     :
 -------------------------------------------------------------------------------
 UserID  Username                MAC             Update fail reason            
 -------------------------------------------------------------------------------
 16672   aaa@lgl1                0011-1100-0bb8  Unknown reason.Please update again
 16674   aaa@lgl1                0011-1100-0bb9  Unknown reason.Please update again
 16763   aaa@lgl1                0011-1100-0bba  Unknown reason.Please update again
 16764   aaa@lgl1                0011-1100-0bbb  Unknown reason.Please update again
 16765   aaa@lgl1                0011-1100-0bbc  Unknown reason.Please update again

 -------------------------------------------------------------------------------
 Total fail number                : 10024

Run the display value-added-service policy command to view information about a value-added service policy.

<HUAWEI>display value-added-service policy
------------------------------------------------------------------
  Index   Service Policy Name               Used Num  Type  User Num
  ------------------------------------------------------------------
  0      bod                                   0       BOD    0
  1      daa                                   0       DAA    0
  2      daa2                                  0       DAA    0
  3      daa3                                  0       DAA    0
  4      lsh                                   0       DAA    0
  5      lsh1                                  2       EDSG   1
  6      lsh2                                  1       EDSG   1

 
  ------------------------------------------------------------------
  Total 7,7 printed 

Run the display value-added-service user command to view information about a value-added service.

<HUAWEI> display value-added-service user
----------------------------------------------------------------
 The used user id table are:
       90      95      98
 ----------------------------------------------------------------
Total users:3

Run the display value-added-service edsg time-range process-information command to view the process of updating the EDSG service bandwidth based on a time range.

<HUAWEI> display value-added-service edsg time-range process-information 
 Number of updated users                      : 3
 Number of users that fail to be updated      : 3
 Number of users to be updated                : 3
 Total number of updated users                : 9
Translation
Download
Updated: 2019-01-03

Document ID: EDOC1100055032

Views: 4417

Downloads: 52

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Share
Previous Next