Hello,

I never think that it's will be problem. I don't guru in
Cisco-systems, but all changes in config I make how it's was descript
into "PPP Per-User Timeouts" (link from Radiator FAQ).

When I make all changes (see cisco.config.txt) I don't get wanted result.
I see that Radiator send Session-Timeout and Idle-Timeout to Cisco. I
see that Cisco get it and then lost or hide it.

All traces and debugs - Cisco (cisco.trace.txt), Radiator(trace4.txt),
Radstock(rad.log.txt) show that attributes exist, but NAS never apply it.
May be somebody have this problem?

  

-- 
Best regards,
Alexey Korchagin                          mailto:[EMAIL PROTECTED]
Jun 13 11:21:06.346: TTY12: DSR came up
Jun 13 11:21:06.346: tty12: Modem: IDLE->(unknown)
Jun 13 11:21:06.346: TTY12: Autoselect started
Jun 13 11:21:06.346: TTY12: create timer type 0, 120 seconds
Jun 13 11:21:07.310: TTY12: Autoselect sample 7E
Jun 13 11:21:07.310: TTY12: Autoselect sample 7EFF
Jun 13 11:21:07.310: TTY12: Autoselect sample 7EFF7D
Jun 13 11:21:07.310: TTY12: Autoselect sample 7EFF7D23
Jun 13 11:21:07.310: TTY12 Autoselect cmd:  ppp negotiate
Jun 13 11:21:07.310: TTY12: destroy timer type 0 (OK)
Jun 13 11:21:07.314: TTY12: EXEC creation
Jun 13 11:21:07.314: TTY12: create timer type 0, 43180 seconds
Jun 13 11:21:07.314: TTY12: create timer type 1, 1200 seconds
Jun 13 11:21:07.318: TTY12: destroy timer type 1 (OK)
Jun 13 11:21:07.318: TTY12: destroy timer type 0 (OK)
Jun 13 11:21:07.318: TTY12: create timer type 2, 43200 seconds
Jun 13 11:21:07.318: TTY12: create timer type 0, 43200 seconds
Jun 13 11:21:10.558: AAA/MEMORY: create_user (0x60FD78E8) user='elcom_w' ruser='' 
port='Async12' rem_addr='async' authen_type=PAP service=PPP priv=1
Jun 13 11:21:10.558: RADIUS: ustruct sharecount=1
Jun 13 11:21:10.558: RADIUS: Initial Transmit Async12 id 157 213.242.54.xxx:1645, 
Access-Request, len 77
Jun 13 11:21:10.558:         Attribute 4 6 D5F236E1
Jun 13 11:21:10.558:         Attribute 5 6 0000000C
Jun 13 11:21:10.558:         Attribute 61 6 00000000
Jun 13 11:21:10.558:         Attribute 1 9 656C636F
Jun 13 11:21:10.558:         Attribute 2 18 C90B9579
Jun 13 11:21:10.558:         Attribute 6 6 00000002
Jun 13 11:21:10.558:         Attribute 7 6 00000001
Jun 13 11:21:10.582: RADIUS: Received from id 157 213.242.54.xxx:1645, Access-Accept, 
len 50
Jun 13 11:21:10.582:         Attribute 6 6 00000002
Jun 13 11:21:10.582:         Attribute 7 6 00000001
Jun 13 11:21:10.582:         Attribute 9 6 FFFFFFFE
Jun 13 11:21:10.582:         Attribute 27 6 7FD1AF4F
Jun 13 11:21:10.582:         Attribute 28 6 000004B0
Jun 13 11:21:10.582: RADIUS: saved authorization data for user 60FD78E8 at 6102B914
Jun 13 11:21:10.582: As12 AAA/AUTHOR/LCP (1603074679): found list "default"
Jun 13 11:21:10.582: As12 AAA/DISC: 1/"User Request"
Jun 13 11:21:10.582: As12 AAA/DISC/EXT: 1020/"User Request"
Jun 13 11:21:10.586: AAA/ACCT/NET: Found list "default"
Jun 13 11:21:10.586: As12 AAA/AUTHOR/FSM (3360470138): found list "default"
Jun 13 11:21:10.586: As12 AAA/AUTHOR/FSM (3938440701): found list "default"
Jun 13 11:21:10.586: RADIUS: ustruct sharecount=4
Jun 13 11:21:10.590: RADIUS: Initial Transmit Async12 id 158 213.242.54.xxx:1646, 
Accounting-Request, len 87
Jun 13 11:21:10.590:         Attribute 4 6 D5F236E1
Jun 13 11:21:10.590:         Attribute 5 6 0000000C
Jun 13 11:21:10.590:         Attribute 61 6 00000000
Jun 13 11:21:10.590:         Attribute 1 9 656C636F
Jun 13 11:21:10.590:         Attribute 40 6 00000001
Jun 13 11:21:10.590:         Attribute 45 6 00000001
Jun 13 11:21:10.590:         Attribute 6 6 00000002
Jun 13 11:21:10.590:         Attribute 44 10 30303030
Jun 13 11:21:10.590:         Attribute 7 6 00000001
Jun 13 11:21:10.590:         Attribute 41 6 00000000
Jun 13 11:21:10.602: RADIUS: Received from id 158 213.242.54.xxx:1646, 
Accounting-response, len 20
Jun 13 11:21:10.922: As12 AAA/AUTHOR/IPCP (3934615531): found list "default"
Jun 13 11:21:10.922: RADIUS: ustruct sharecount=4
Jun 13 11:21:10.926: RADIUS: Initial Transmit Async12 id 159 213.242.54.xxx:1646, 
Accounting-Request, len 93
Jun 13 11:21:10.926:         Attribute 4 6 D5F236E1
Jun 13 11:21:10.926:         Attribute 5 6 0000000C
Jun 13 11:21:10.926:         Attribute 61 6 00000000
Jun 13 11:21:10.926:         Attribute 1 9 656C636F
Jun 13 11:21:10.926:         Attribute 40 6 00000003
Jun 13 11:21:10.926:         Attribute 45 6 00000001
Jun 13 11:21:10.926:         Attribute 6 6 00000002
Jun 13 11:21:10.926:         Attribute 44 10 30303030
Jun 13 11:21:10.926:         Attribute 7 6 00000001
Jun 13 11:21:10.926:         Attribute 8 6 D5F236F9
Jun 13 11:21:10.926:         Attribute 41 6 00000000
Jun 13 11:21:10.938: RADIUS: Received from id 159 213.242.54.xxx:1646, 
Accounting-response, len 20
Jun 13 17:21:20 Karachi: %SEC-6-IPACCESSLOGP: list 101 denied udp 213.242.54.99(137) 
-> 213.242.54.255(137), 11 packets
cisco-3640-i#terminal no monitor
cisco-3640-i#
Current configuration:
!
! Last configuration change at 17:23:05 Karachi Wed Jun 13 2001 by admcisco0
! NVRAM config last updated at 17:05:43 Karachi Tue May 29 2001 by admcisco0
!
version 12.0
service timestamps debug datetime msec
service timestamps log datetime localtime show-timezone
no service password-encryption
!
hostname cisco-3640-i
!
no logging buffered
no logging console
aaa new-model
aaa authentication login default group radius local
aaa authentication login admin local
aaa authentication ppp default if-needed group radius local
aaa authorization exec default group radius if-authenticated
aaa authorization network default if-authenticated group radius
aaa accounting update newinfo
aaa accounting exec default start-stop group radius
aaa accounting network default start-stop group radius
aaa accounting system default start-stop group radius
enable secret 5 xxx
enable password xxx
!
username xxx password 0 xxx
!
!
!
!
clock timezone Karachi 5
clock summer-time Karachi-summer recurring last Sun Mar 2:00 last Sun Sep 2:00
ip subnet-zero
ip host ns.buzuluk.ru 213.242.54.227
ip host proxy-elcom.buzuluk.ru 213.242.54.230
ip host rack0-elcom.buzuluk.ru 213.242.54.226
ip host cisco0-elcom.buzuluk.ru 213.242.54.225
ip domain-name buzuluk.ru
ip name-server 213.242.54.227
!
async-bootp dns-server 213.242.54.227 195.128.128.1
modemcap entry
zyxel336:FD=&F:AA=S0=1:CD=&C1:DTR=&D2:HFL=&H3:SPD=&B1:DTE=57600:BER=&M4:BCP=&K4:NER=&H0:NCP=&K0:NEC=E0:NRS=Q1:SFL=&H4:TPL=zyxel336

modemcap entry test:FD=&F:AA=S0=1:CD=&C1:DTR=&D2:SPD=&B1:DTE=57600:NEC=E0:NRS=Q1
!
!
!
interface Loopback0
 no ip address
 no ip directed-broadcast
!
interface Ethernet1/0
 bandwidth 10000
 ip address 213.242.54.xxx 255.255.255.224
 no ip directed-broadcast
!
interface Serial1/0
 bandwidth 128
 ip address 213.242.53.xxx 255.255.255.252
 ip access-group 101 in
 ip access-group 102 out
 no ip directed-broadcast
 ip accounting access-violations
 fair-queue 64 256 0
!
interface Serial1/1
 no ip address
 no ip directed-broadcast
 shutdown
!
interface Group-Async1
 mtu 8832
 ip unnumbered Ethernet1/0
 no ip directed-broadcast
 ip accounting access-violations
 encapsulation ppp
 ip tcp header-compression passive
 no logging event link-status
 timeout absolute 720 0
 dialer in-band
 dialer idle-timeout 1800
 dialer enable-timeout 43200
 dialer-group 1
 autodetect encapsulation ppp
 async mode interactive
 peer default ip address pool use_pool
 no fair-queue
 ppp max-bad-auth 3
 ppp authentication pap
 ppp authorization
 ppp accounting
 group-range 1 16
 hold-queue 10 in
!
router rip
 version 2
 passive-interface Serial1/0
 network 213.242.54.0
 no auto-summary
!
ip local pool use_pool 213.242.54.238 213.242.54.254
ip classless
ip route 0.0.0.0 0.0.0.0 Serial1/0
no ip http server
!
!
ip access-list extended kons
 permit tcp 20.18.22.0 225.225.225.192 any eq domain
logging facility local0
logging source-interface Ethernet1/0
logging 213.242.54.227
access-list 101 deny   ip 172.16.0.0 0.15.255.255 any
access-list 101 deny   ip 192.168.0.0 0.0.255.255 any
access-list 101 deny   udp any any range netbios-ns netbios-ss log
access-list 101 deny   tcp any any range 137 139 log
access-list 101 deny   udp any any eq 31337 log
access-list 101 deny   tcp any any eq telnet log
access-list 101 deny   tcp any any range exec lpd log
access-list 101 deny   udp any any eq sunrpc log
access-list 101 deny   tcp any any eq sunrpc log
access-list 101 deny   udp any any eq xdmcp log
access-list 101 deny   tcp any any eq 177 log
access-list 101 deny   tcp any any range 6000 6063 log
access-list 101 deny   udp any any range 6000 6063 log
access-list 101 deny   udp any any range biff syslog log
access-list 101 deny   tcp any any eq 11 log
access-list 101 deny   udp any any eq tftp log
access-list 101 deny   tcp any any eq 1645 log
access-list 101 deny   tcp any any eq 1646 log
access-list 101 deny   tcp any any eq 22 log
access-list 101 deny   tcp any any eq 37 log
access-list 101 deny   tcp any any eq 1080 log
access-list 101 deny   tcp any any eq 3050 log
access-list 101 deny   tcp any any eq 3306 log
access-list 101 deny   tcp any any eq 98 log
access-list 101 deny   tcp any any eq cmd log
access-list 101 deny   tcp any any eq finger log
access-list 101 deny   tcp any any eq ident log
access-list 101 deny   tcp any any eq login log
access-list 101 deny   tcp any any eq klogin log
access-list 101 deny   tcp any any eq kshell log
access-list 101 deny   tcp any any eq lpd log
access-list 101 deny   tcp any any eq pim-auto-rp log
access-list 101 deny   tcp any any eq pop2 log
access-list 101 deny   tcp any any eq tacacs log
access-list 101 deny   tcp any any eq talk log
access-list 101 deny   tcp any any eq uucp log
access-list 101 deny   tcp any any eq whois log
access-list 101 deny   tcp host 62.212.34.90 0.0.0.33 213.242.54.222 eq www log
access-list 101 deny   tcp host 62.212.34.51 0.0.0.33 213.242.54.222 eq www log
access-list 101 deny   tcp host 62.212.34.53 0.0.0.33 213.242.54.222 eq www log
access-list 101 deny   tcp host 62.212.34.55 0.0.0.33 213.242.54.222 eq www log
access-list 101 deny   ip host 62.212.46.99 0.0.0.33 213.242.54.222 log
access-list 101 deny   ip host 207.106.163.126 0.0.0.0 255.255.255.192 log
access-list 101 permit ip any any
access-list 102 permit ip 213.242.54.224 0.0.0.31 any
access-list 102 deny   ip any any
access-list 102 deny   tcp any any eq 1645 log
access-list 102 deny   tcp any any eq 1646 log
access-list 103 deny   tcp any any eq telnet log
access-list 105 deny   tcp any 0.0.0.1 255.255.255.224 eq telnet log
access-list 105 deny   tcp any 0.0.0.3 255.255.255.224 eq telnet log
access-list 105 deny   tcp any 0.0.0.5 255.255.255.224 eq telnet log
access-list 105 deny   tcp any 0.0.0.6 255.255.255.224 eq telnet log
access-list 105 permit ip any any
access-list 105 permit tcp any any
access-list 105 permit tcp any any eq telnet log
dialer-list 1 protocol ip permit
snmp-server engineID local 000000090200000196EB5D11
snmp-server community xxx RO
radius-server host 213.242.54.xxx auth-port 1645 acct-port 1646
radius-server key xxx
!
line con 0
 exec-timeout 0 0
 password xxx
 login authentication admin
 transport input none
line 1 16
 session-timeout 720
 exec-timeout 20 0
 autoselect ppp
 absolute-timeout 720
 modem Dialin
 modem autoconfigure type test
 transport input all
 escape-character BREAK
 telnet break-on-ip
 stopbits 1
 speed 57600
line aux 0
line vty 0 4
 exec-timeout 0 0
 password xxx
 login authentication admin
!
ntp broadcastdelay 9999
ntp clock-period 17179880
ntp source Serial1/0
ntp master 3
ntp server 192.93.2.20 source Serial1/0 prefer
end
Sat Jun 16 14:24:11 2001: DEBUG: Packet dump:
*** Received from 213.242.54.225 port 1645 ....
Code:       Access-Request
Identifier: 84
Authentic:  <192><202> <230><19>?{MC<191>9\<186><7>n<127>
Attributes:
        NAS-IP-Address = 213.242.54.225
        NAS-Port = 12
        NAS-Port-Type = Async
        User-Name = "elcom_w"
        User-Password = "<194><251><175><5>&n<137><247><129>X<7>h<255><18><196><154>"
        Service-Type = Framed-User
        Framed-Protocol = PPP

Sat Jun 16 14:24:11 2001: DEBUG: Handling request with Handler 'Realm=DEFAULT'
Sat Jun 16 14:24:11 2001: DEBUG: Rewrote user name to ELCOM_W
Sat Jun 16 14:24:11 2001: DEBUG: ID_0 Deleting session for elcom_w, 213.242.54.225, 12
Sat Jun 16 14:24:11 2001: DEBUG: do query is: delete from RADONLINE where 
NASIDENTIFIER = '213.242.54.225' and NASPORT=012

Sat Jun 16 14:24:11 2001: DEBUG: Handling with Radius::AuthSQL
Sat Jun 16 14:24:11 2001: DEBUG: Handling with Radius::AuthSQL
Sat Jun 16 14:24:11 2001: DEBUG: Query is: select CISCO_USER_PASSWORD, CHECKATTR, 
REPLYATTR, CISCO_SESSION_TIMEOUT, CISCO_IDLE_TIMEOUT, CISCO_SIMULTANEOUS_USE from 
SUBSCRIBERS where UPPER(CISCO_USER_NAME) = UPPER('ELCOM_W') and CISCO_SESSION_TIMEOUT 
> 600 and ENABLED = 1 and STATUS <> 3

Sat Jun 16 14:24:11 2001: DEBUG: Radius::AuthSQL looks for match with ELCOM_W
Sat Jun 16 14:24:11 2001: DEBUG: Query is: select NASIDENTIFIER, NASPORT, 
ACCTSESSIONID from RADONLINE where UPPER(USERNAME) = UPPER('elcom_w')

Sat Jun 16 14:24:11 2001: DEBUG: Radius::AuthSQL ACCEPT: 
Sat Jun 16 14:24:11 2001: DEBUG: Access accepted for ELCOM_W
Sat Jun 16 14:24:11 2001: DEBUG: Packet dump:
*** Sending to 213.242.54.225 port 1645 ....
Code:       Access-Accept
Identifier: 84
Authentic:  <192><202> <230><19>?{MC<191>9\<186><7>n<127>
Attributes:
        Service-Type = Framed-User
        Framed-Protocol = PPP
        Framed-IP-Netmask = 255.255.255.254
        Session-Timeout = 29290
        Idle-Timeout = 1200

Sat Jun 16 14:24:11 2001: DEBUG: Packet dump:
*** Received from 213.242.54.225 port 1646 ....
Code:       Accounting-Request
Identifier: 85
Authentic:  <138><29>J<166><137>M<158><153><227>k<186><162><206>w.<206>
Attributes:
        NAS-IP-Address = 213.242.54.225
        NAS-Port = 12
        NAS-Port-Type = Async
        User-Name = "elcom_w"
        Acct-Status-Type = Start
        Acct-Authentic = RADIUS
        Service-Type = Framed-User
        Acct-Session-Id = "000045DD"
        Framed-Protocol = PPP
        Acct-Delay-Time = 0

Sat Jun 16 14:24:11 2001: DEBUG: Handling request with Handler 'Realm=DEFAULT'
Sat Jun 16 14:24:11 2001: DEBUG: Rewrote user name to ELCOM_W
Sat Jun 16 14:24:11 2001: DEBUG: ID_0 Adding session for elcom_w, 213.242.54.225, 12
Sat Jun 16 14:24:11 2001: DEBUG: do query is: delete from RADONLINE where 
NASIDENTIFIER = '213.242.54.225' and NASPORT=012

Sat Jun 16 14:24:11 2001: DEBUG: do query is: insert into RADONLINE (USERNAME, 
NASIDENTIFIER, NASPORT, ACCTSESSIONID, TIME_STAMP, FRAMEDIPADDRESS, NASPORTTYPE, 
SERVICETYPE) values ('elcom_w', '213.242.54.225', 012, '000045DD', 992679851, '', 
'Async', 'Framed-User')

Sat Jun 16 14:24:11 2001: DEBUG: Handling with Radius::AuthSQL
Sat Jun 16 14:24:11 2001: DEBUG: Handling accounting with Radius::AuthSQL
Sat Jun 16 14:24:11 2001: DEBUG: Accounting accepted
Sat Jun 16 14:24:11 2001: DEBUG: Packet dump:
*** Sending to 213.242.54.225 port 1646 ....
Code:       Accounting-Response
Identifier: 85
Authentic:  <138><29>J<166><137>M<158><153><227>k<186><162><206>w.<206>
Attributes:

Sat Jun 16 14:24:11 2001: DEBUG: Packet dump:
*** Received from 213.242.54.225 port 1646 ....
Code:       Accounting-Request
Identifier: 86
Authentic:  <218><183><195><207>V<134>"<230>%<164><168><217><9><16>79
Attributes:
        NAS-IP-Address = 213.242.54.225
        NAS-Port = 12
        NAS-Port-Type = Async
        User-Name = "elcom_w"
        Acct-Status-Type = Alive
        Acct-Authentic = RADIUS
        Service-Type = Framed-User
        Acct-Session-Id = "000045DD"
        Framed-Protocol = PPP
        Framed-IP-Address = 213.242.54.250
        Acct-Delay-Time = 0

Sat Jun 16 14:24:11 2001: DEBUG: Handling request with Handler 'Realm=DEFAULT'
Sat Jun 16 14:24:11 2001: DEBUG: Rewrote user name to ELCOM_W
Sat Jun 16 14:24:11 2001: DEBUG: ID_0 Adding session for elcom_w, 213.242.54.225, 12
Sat Jun 16 14:24:11 2001: DEBUG: do query is: delete from RADONLINE where 
NASIDENTIFIER = '213.242.54.225' and NASPORT=012

Sat Jun 16 14:24:11 2001: DEBUG: do query is: insert into RADONLINE (USERNAME, 
NASIDENTIFIER, NASPORT, ACCTSESSIONID, TIME_STAMP, FRAMEDIPADDRESS, NASPORTTYPE, 
SERVICETYPE) values ('elcom_w', '213.242.54.225', 012, '000045DD', 992679851, 
'213.242.54.250', 'Async', 'Framed-User')

Sat Jun 16 14:24:11 2001: DEBUG: Handling with Radius::AuthSQL
Sat Jun 16 14:24:11 2001: DEBUG: Handling accounting with Radius::AuthSQL
Sat Jun 16 14:24:11 2001: DEBUG: Accounting accepted
Sat Jun 16 14:24:11 2001: DEBUG: Packet dump:
*** Sending to 213.242.54.225 port 1646 ....
Code:       Accounting-Response
Identifier: 86
Authentic:  <218><183><195><207>V<134>"<230>%<164><168><217><9><16>79
Attributes:

Sat Jun 16 14:24:33 2001: NOTICE: SIGHUP received: restarting
Handling radius filter ''
Done radius filter ''
interface: eth0 (213.242.54.eth/255.255.255.224)     filter1: udp and port 1645
filter: udp and port 1645
Src: 213.242.54.nas   Dst: 213.242.54.nas
Packet: total filters 0 - showpkt 1
Request (30) - 213.242.54.nas:1645 -> 213.242.54.host:1645 (L[19/05/01 11:43:06]
  NAS-IP-Address         Len  6         213.242.54.nas
  NAS-Port               Len  6         7
  NAS-Port-Type          Len  6         Async
  User-Name              Len  6         "bztm"
  Password               Len 18         "xxx"
  Service-Type           Len  6         Framed-User
  Framed-Protocol        Len  6         PPP
Src: 213.242.54.host   Dst: 213.242.54.host
Packet: total filters 0 - showpkt 1
Accept  (30) - 213.242.54.nas:1645 <- 213.242.54.host:1645 (L[19/05/01 11:43:06]
  Service-Type           Len  6         Framed-User
  Framed-Protocol        Len  6         PPP
  Framed-Netmask         Len  6         255.255.255.254
  Session-Timeout        Len  6         2147169563
  Idle-Timeout           Len  6         1200

Reply via email to