Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:dpi:bras_bng:bras_pppoe:bras_pppoe_radius:bras_pppoe_radius_rej:start [2023/10/13 14:05] – ↷ Links adapted because of a move operation elena.krasnobryzh | en:dpi:bras_bng:bras_pppoe:bras_pppoe_radius:bras_pppoe_radius_rej:start [Unknown date] (current) – removed - external edit (Unknown date) 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Access-Reject format for PPPoE networks ====== | ||
- | {{indexmenu_n> | ||
- | There are two types of " | ||
- | * the subscriber is our, but he can not be delivered a full range of services for some reason (zero balance, he is blocked, etc.), | ||
- | * the subscriber is not known to us - in this case the subscriber can not be allowed to access the network | ||
- | In the first case (the subscriber is our), the subscriber have to be assigned an IP address (i.e. the PPPoE session will be established, | ||
- | That is, Access-Reject must contain the Framed-IP-Address attribute for such subscribers. | ||
- | |||
- | In the second case (the subscriber is not known to us, there is an error in the authorization parameters), | ||
- | |||
- | Access-Reject contains the following attributes: | ||
- | * '' | ||
- | * '' | ||
- | * '' | ||
- | * '' | ||
- | * '' | ||
- | * '' | ||
- | |||
- | The '' | ||
- | |||
- | The following Microsoft VSA attributes (vendor-id = 311, RFC2548) are supported, all of them are optional: | ||
- | * '' | ||
- | * '' | ||
- | * '' | ||
- | * '' | ||
- | |||
- | The VAS Experts VSA attributes (vendor-id = 43823) are optional: | ||
- | |||
- | [41] '' | ||
- | |||
- | DNS server IP addresses can be specified through the Microsoft VSA attributes or VAS Experts VSA-attribute. | ||
- | |||
- | If the subscriber is authorized, i.e., he is assigned an IP address, then in addition to the above-mentioned attributes ** it is necessary** to specify the '' | ||
- | |||
- | == Why do we need " | ||
- | The policing profile and services specified in the Access-Reject are applied temporarily. | ||
- | The subscriber properties being received in the Access-Accept attributes are stored in the internal fastDB (UDR) database and are applied even after rebooting, whereas the properties being received in Access-Reject are applied without saving in the UDR. | ||
- | That is, when the fastDPI is rebooted, the subscriber properties being received last time in the Access-Accept will be restored and the fastDPI will apply them until the new ones will be received | ||
- | |||
- | ---- | ||
- | [[en: |