Дерево страниц
Перейти к концу метаданных
Переход к началу метаданных

1. General description

BRAS functionality is supported on Eltex ESR-10/20/100/200/1000/1200/1500/1700 service routers. This functionality allows to provide the ability to identify Wi-Fi clients connecting to access points produced by different manufacturers. In general terms, the following functions are required from BRAS:

  • When receiving client traffic, you need to understand whether this client is authorized in the system or not;
  • If the client is authorized, then he can enter into the Internet. If not authorized, then redirect him to the Authorization Portal, where he must confirm his identity (via SMS, call or ESIA account);
  • Once the client is authorized on the Portal, BRAS must learn about it by applying different access policies to the client's traffic;
  • While processing client traffic, BRAS must read and forward statistics to a higher-level system for further analysis and storage.

BRAS is an executive mechanism that applies certain policies to client traffic in accordance with the directives that are transmitted to it from the superior SoftWLC system, which makes decisions based on the data transmitted by BRAS. As part of SoftWLC, 2 modules interact with BRAS and send it directives to work with clients: PCRF and Portal.

In order to distinguish between clients BRAS needs some identifier that uniquely identifies the client. This identifier is the MAC of the client device. Therefore, it is necessary for BRAS to receive traffic with MAC headers of clients. For this purpose, it is necessary to provide L2-network between the client and BRAS or, alternatively, to forward the client traffic to BRAS inside the VPN through the L3-infrastructure of the operator. Further, in this documentation we will consider the L2 connection scheme, when the subscribers' traffic gets to BRAS using a vlan through the operator's L2 access network. To read the documentation on enabling ESR BRAS over the operator's L3 network, please refer to the link: BRAS. L3 WiFi - configuration guide.

The current document assumes that ESR is running software version 1.11.3, SoftWLC version 1.18.

2. Architecture of the solution

It is assumed that BRAS and SoftWLC management suite are enabled in the core of the service provider's network, where it is possible to route an L2 link (vlan) from each AP for each SSID.

2.1 Enabling BRAS on the carrier network

In Figure 2.1 below, the APs are connected to the switch, each SSID is in a separate vlan, they come to the ESR. When a new subscriber connects, a redirect is done to the authorization portal which is on the SoftWLC server. After authorization, the client has access to the Internet.

Fig. 2.1.

Below, in Fig. 2.2, the architecture of the ESR configuration is shown. The gi1/0/1 interface is used as an aplink (any physical interface can be used). Access to the Internet and to the SoftWLC complex is performed in separate subnets. The vlans with SSID1 and SSID2 come in one bridge type interface. Client traffic is released to the Internet using NAT on the ESR.

Fig. 2.2.

A bridge type interface is used for client termination because it allows to include different sub-interfaces and thereby terminate traffic from different vlan in the same address space, thus providing the possibility of seamless transition of clients from one vlan to another (this may be necessary if different vlans are used for the same SSID on different APs). At the same time, if subnetting for different SSIDs is required, multiple bridge-type interfaces can be used to terminate client vlans. For ESR BRAS to interact with the SoftWLC complex, it is sufficient to provide L3 connectivity.

2.2 Possible variants of enabling APs on the operator's access network

1) One SSID is configured on the 1st AP.

A single SSID is configured on the AP. The device is connected to the access port of the switch, which transmits all traffic through the operator's L2 access network to the ESR BRAS router in a unique vlan. In this case, it is possible to uniquely identify which AP and SSID the client traffic came from.

2) Two SSIDs (or more) are configured on 1 AP,


Two SSIDs with different names are configured on the AP. From the AP, traffic is untagged to one access port on the switch, which passes all traffic through the operator's L2 access network to the ESR BRAS router in a unique vlan. Thus, clients connected to different SSIDs get into one common channel. On the operator side, traffic from different SSIDs is not identified.

3.1) One SSID is configured on 2 or more APs.


One SSID is configured on each AP. Traffic from the APs is untagged, the devices are connected to different access ports (but with the same vlan id) of switch 1, which passes all traffic through the operator's L2 access network to the ESR BRAS router in a unique vlan. In this way, clients connected to different APs get into one common channel. Traffic from different APs is not identified on the operator's side.

3.2) One SSID is configured on 2 or more APs.

One SSID is configured on each AP. Traffic from the APs is untagged, the devices are connected to different access ports (but with the same vlan id) of switch 1, which passes all traffic through the operator's L2 access network to the ESR BRAS router in a unique vlan. In this way, clients connected to different APs get into one common channel. Traffic from different APs is not identified on the operator's side.

4.1) Two or more SSIDs are configured on 2 or more APs.

Two (or more) SSIDs with different names are configured on the AP. Each SSID from the AP is transmitted with a vlan tag (vlan settings are the same on all APs), to the trunk port of the switch, which forwards all traffic through the operator's L2 access network to the ESR BRAS router. Thus, the traffic of clients connected to different SSIDs can be uniquely identified. It is not possible to identify from which AP the traffic came from SSID.

4.2) Two or more SSIDs are configured on 2 or more APs.

Two 2 (or more) SSIDs with different names are configured on the AP. Each SSID from the AP is transmitted with its own vlan tag (vlan settings on all APs are unique), to the trunk port of the switch, which transmits all traffic through the operator's L2 access network to the ESR BRAS router in unique vlans. Thus, the traffic of clients connected to different SSIDs, as well as the APs to which it is connected, can be uniquely identified.

3. ESR BRAS configuration

Let's consider an example of configuring ESR and setting up SoftWLC complex to provide client authorization via BRAS. It is assumed that SoftWLC complex is placed on one host and is already installed. For more information on deploying the SoftWLC complex, please refer to the link:  Wi-Fi controller (SoftWLC)

The following addressing will be used in the following example and description of the ESR configuration:

Purposevlanaddress/mask
Management subnetwork, access to SoftWLC2300100.123.0.176/24
Access to Internet3500172.31.240.3/29
AP clients subnet
192.168.132.0/22
SSID 12336
SSID 22337

SotfWLC address is 100.123.0.2. Default gateway for ESR is 172.31.240.1.

Fig. 3.1 shows the architecture of ESR configuration with addressing. ESR is connected by "router-on-stick" scheme, using gi1/0/1 as uplink interface.

Fig. 3.1.

The principles should be followed when configuring the ESR:

1) First of all, perform general settings: assign addressing, configure access to ESR;

2) When configuring addressing, disable firewall on all L3 interfaces of ESR, except for the interface looking to the Internet;

3) Only after making sure that the clients and management traffic passes through correctly: clients receive addresses, there is access to the Internet, ESR has access to SoftWLC to configure BRAS;

4) After making sure that clients are successfully authorized on BRAS and have access to the Internet, configure the firewall and enable it on all interfaces.


Initial ESR configuration should be performed using a console connection and completely erase the old or factory configuration so that its remnants would not create problems in further configuration:

esr1000# copy system:default-config system:candidate-config 
Entire candidate configuration will be reset to default, all settings will be lost upon commit.
Do you really want to continue? (y/N): y
|******************************************| 100% (50B) Default configuration loaded successfully.

 Next, perform the initial configuration of the router:

security zone trusted
exit
security zone untrusted
exit
security zone users
exit


bridge 10
  description "users"
  security-zone users
  ip firewall disable
  ip address 192.168.132.1/22
  ip helper-address 100.123.0.2
  enable
exit

interface gigabitethernet 1/0/1.77
  description "UpLink"
  security-zone untrusted
  ip address 172.31.240.3/29
exit
interface gigabitethernet 1/0/1.2300
  description "mgmt"
  security-zone trusted
  ip firewall disable
  ip address 100.123.0.176/24
exit
interface gigabitethernet 1/0/1.2336
  bridge-group 10
exit
interface gigabitethernet 1/0/1.2337
  bridge-group 10
exit

ip dhcp-relay

ip route 0.0.0.0/0 172.31.240.1

ip telnet server
ip ssh server

Then apply this configuration (commit/confirm), after which the equipment can be placed in the rack and connected to it via ssh/telnet.

Configure NAT:

object-group network users
  ip prefix 192.168.132.0/22
exit

nat source
  pool nat_addr
    ip address-range 172.31.240.3
  exit
  ruleset nat_source
    to zone untrusted
    rule 1
      match source-address users
      action source-nat pool nat_addr
      enable
    exit
  exit
exit

After applying this setting, it is necessary to make sure that the clients are successfully connected – they receive addresses and access the Internet, as well as in the presence of connectivity to SoftWLC. DHCP server configuration is not considered in this document, because it is a separate service and can be based on different software (it is recommended to use isc-dhcp-server). Until network connectivity problems are fixed at this stage, it makes no sense to proceed to further configuration.

Then configure interaction with SNMP and NTP servers. It is necessary for correct monitoring of ESR status from EMS:

snmp-server
snmp-server system-shutdown
snmp-server community "private1" rw
snmp-server community "public11" ro

snmp-server host 100.123.0.2
  source-address 100.123.0.176
exit

clock timezone gmt +7

ntp enable
ntp server 100.123.0.2
exit


 BRAS configuration can be divided into the following steps:

1) Loading the BRAS license;

2) Configuring the interaction with the radius server;

3) Configuring the access-list to be used by BRAS services;

4) Configuring the BRAS service and enabling it on the appropriate bridges for client authorization.


1.1) Check the license availability:

esr1000# sh licence 
Active licence not found!

There is no license. To obtain it, please contact the sales department of Eltex company.

1.2) After obtaining the license, upload it to ESR and check that it has been successfully uploaded:

esr1000# copy tftp://100.123.0.2:/NP07000030.lic system:licence 
|******************************************| 100% (678B) Licence loaded successfully. Please reboot system to apply changes.
esr1000# sh licence 
Licence information
-------------------
Name:    eltex
Version: 1.0
Type:    ESR-1000
S/N:     NP07000030
MAC:     A8:F9:4B:AB:79:A0
Features:
 BRAS - Broadband Remote Access Server

1.3) Reboot ESR:

esr1000# reload system 
Do you really want to reload system ? (y/N): y

After rebooting, the BRAS configuration commands will become available.

2) Configure interaction with the radius server:

object-group network SoftWLC
  ip address-range 100.123.0.2
exit

radius-server timeout 10
radius-server retransmit 5
radius-server host 100.123.0.2
  key ascii-text testing123
  timeout 11
  priority 20
  source-address 100.123.0.176
  auth-port 31812
  acct-port 31813
  retransmit 10
  dead-interval 10
exit
aaa radius-profile PCRF
  radius-server host 100.123.0.2
exit
das-server COA
  key ascii-text testing123
  port 3799
  clients object-group SoftWLC
exit
aaa das-profile COA
  das-server COA
exit

In this configuration we specified that interaction with the radius server is performed at the address 100.123.0.2 on ports 31812 and 31813, with the password testing123. These ports should be opened on the transport when ESR accesses PCRF (it is assumed that all SoftWLC components are on the same host). We also specified that when accessing from PCRF, ESR listens to calls on port 3799 from the address 100.123.0.2, with the password testing123. This port should be open on the transport when PCRF accesses ESR.

3) Configure the access-list to be used by BRAS services:

ip access-list extended WELCOME
  rule 1
    action permit
    match protocol tcp
    match destination-port 443
    enable
  exit
  rule 2
    action permit
    match protocol tcp
    match destination-port 8443
    enable
  exit
  rule 3
    action permit
    match protocol tcp
    match destination-port 80
    enable
  exit
  rule 4
    action permit
    match protocol tcp
    match destination-port 8080
    enable
  exit
exit

ip access-list extended INTERNET
  rule 1
    action permit
    enable
  exit
exit

ip access-list extended unauthUSER
  rule 1
    action permit
    match protocol udp
    match source-port 68
    match destination-port 67
    enable
  exit
  rule 2
    action permit
    match protocol udp
    match destination-port 53
    enable
  exit
exit

4.1) Next, add the necessary BRAS settings on the client interface:

object-group network bras_users
  ip address-range 192.168.132.2-192.168.135.254
exit

bridge 10
  service-subscriber-control object-group bras_users
  location data10
exit

In "service-subscriber-control object-group bras_users" configuration we specified that only users with addresses from the range specified in the bras_users group will be authorized. This is necessary to ensure that traffic from the bridge 10 address and broadcast traffic of the subnet will pass through unhindered. Instead, you can use the "service-subscriber-control any" setting, which will block any traffic from passing through until it is authorized.

4.2) Then сonfigure BRAS:

This configuration specifies an address of 100.123.0.2 and port 7070 to download URL filtering lists and port 8080 to perform redirects. These ports must be open on the transport towards the PCRF.

subscriber-control filters-server-url http://100.123.0.2:7070/filters/file
subscriber-control
  aaa das-profile COA
  aaa sessions-radius-profile PCRF
  aaa services-radius-profile PCRF
  nas-ip-address 100.123.0.176
  session mac-authentication
  bypass-traffic-acl unauthUSER
  default-service
    class-map unauthUSER
    filter-name remote gosuslugi
    filter-action permit
    default-action redirect http://100.123.0.2:8080/eltex_portal/
  exit
  enable
exit

At this stage ESR configuration for operation in BRAS mode is completed. To verify the operability, it is necessary to perform the settings on the SoftWLC complex side. It makes sense to proceed to the firewall configuration only after the BRAS operability check, so it will be discussed further, after the SoftWLC complex settings.

4. Configuring SoftWLC for interaction with ESR

SoftWLC complex settings can be divided into global settings, which are performed once or when adding each new ESR BRAS; universal - they can be configured for an individual customer of the authorization service, and used in the settings of several or all customers; and individual settings, which are usually configured when connecting each new customer, even if they can be used in several different customers.

4.1. Global configuration

    Global configuration can be divided into several steps:

1) Enabling BRAS interaction in the Portal Builder;

2) Creation of two mandatory URL filtering lists in personal account - welcome and gosuslugi;

3) Creation of mandatory WELCOME service in personal account;

3) Setting up interaction with BRAS in personal account;

4) Adding ESR BRAS to EMS and customizing interaction with it.

The first four items are performed once during initial deployment and configuration, the 5th item is performed when adding each new ESR BRAS.

1) Open the Portal Builder (Fig. 4.1.1) at http://<ip host address>:8080/epadmin and go to the "Interaction with BRAS" setting:

Fig. 4.1.1.

Enable:

  • "Interaction with BRAS" - check the checkbox, after that you will be able to select BRAS tariffs in the portals settings;
    Click the "Save" button.

Starting with SoftWLC version 1.18, the way the portal interacts with ESR BRAS has changed: the portal will only use PCRF queries when authorizing BRAS users, which resulted in the exclusion of ESR interaction settings.

 Нажмите здесь для раскрытия...

Set up the following:

  • "Interaction with BRAS" - check mark;
  • "Radius secret key" - testing123;
  • "BRAS secret key" - testing123;
  • "CoA port" - 3799;
  • "Connection timeout (in seconds)" - 10.

Click the "Save" button.


2.1) Open the personal account http://<ip host address>:8080/wifi-cab/ and go to "PCRF Settings" → "URL Lists" and click the "Add" button (Fig. 4.2.1):

Fig. 4.2.1.

Set up the following:

  • "Name" - welcome;
  • "Domain" - root;
  • "Type" - white;
  • "URL" - add a line with the button  and in it specify "http://<ip address of the host with portal>:8080/eltex_portal/".

Then click "Save" to save the string and "Save" to save the list.

2.2) Similarly add gosuslugi filter list (Fig .4.2.2) which is used in BRAS filter-name remote gosuslugi:

The following table describes the statuses of the system indicators of the device and their values.

Fig. 4.2.2

Click "Save".
Configuring SoftWLC integration with EUIA is not considered in this document, you can find more details in the documentation section: Wi-Fi controller (SoftWLC).

3) After that go to the "Services and tariffs" section of personal account, select the "PCRF services" tab and click the "Add" button (Fig. 4.3.1):

Fig. 4.3.1.

Configure the following:

  • "Service name" - WELCOME;
  • "Domain" - root;
  • "Traffic class" - WELCOME.

This name must be the same as the ip access-list extended WELCOME configured on the ESR, including character case, because this is the access-list that the ESR will use when assigning this service. A name/register mismatch will cause BRAS to work incorrectly when assigning this service.

  • "Interval of account sending, s" - 600;
  • "Priority" - 4;
  • "IP streaming capability" - allow IP streaming in both directions;;
  • "Default action" - redirect;
  • "Default URL" - http://<ip portal address >:8080/eltex_portal/welcome;
  • "Filter name" - select welcome from the dropdown menu (this is the previously customized filter list);
  • "Action" - permit;
  • Click the "Add" button - the filter should appear in the "Selected Filters" window.

Click the "Save" button. This service is official, it is necessary for the correct operation of the "Welcome" page and cannot be used in the tariff settings.

4) After that, in "PCRF Settings" of the personal account and open the "BRAS VRF" tab (Fig. 4.4.1):

Fig. 4.4.1.

This page configures the interaction with BRAS in different VRFs. For interaction in the default VRF there is already an entry created with default parameters. If you want to use a port and password different from the default ones when making CoA calls to ESR, you should check the current entry and click the "Edit" button, a window will open (Fig. 4.4.2):

Fig. 4.4.2.

After changing the settings, click "Save". Earlier, in SoftWLC 1.17 and previous versions, this setting of these parameters was performed in the Portal Builder.

5.1) Then open EMS, create an eltex domain (the principles of setting up domains and nodes are not considered in this document), select the required node and add (by pressing the) ESR to the object tree (Fig. 4.5.1):

Fig. 4.5.1.

Specify:

  • "Object name" - ESR_BRAS_L2 (any name can be specified);
  • "Type" - select the desired type of device, in the given example ESR1000;
  • "IP address" - specify the IP address of the device, which will be used to communicate with SoftWLC. 

Click the "Add" button.

5.2) After the ESR appears in the object tree (in case it does not appear - you should click the button  in the upper left corner of the EMS window), stand on it and open the "Access" tab on the right, and in it click "Edit" (Fig. 4.5.2):

Fig. 4.5.2.

Specify:

  • "File protocol" - FTP;
  • "Read community / User v3" - public11;
  • "Write community / Password v3" - private1;
  • "BRAS service" - check the box.

Save the rest of the settings without changes and click "Accept".

5.3) Then in EMS it is necessary to specify the radius password for interaction with ESR from SoftWLC complex. To do this, open the menu "RADIUS" → "Access Point Management", find the ESR (if there are many addresses in the table - you can filter by IP address) and double-click on it to open the parameter editing window (Fig. 4.5.3):

Fig. 4.5.3.

Correct "Key" to testing123 and click "Accept", then close the "Access Point Management on RADIUS Server" window.

The radius password must be the same for ESR and localhost (127.0.0.1), if 127.0.0.1 has not changed its password, it must be changed.

4.2. General settings

Generl settings include settings of the customer's tariff. As a rule, if a standard Internet access service is required, the same tariff can be used for all customers. But if necessary it is possible to customize the tariff for an individual customer.

In the example below we consider the configuration of the tariff for access to the Internet without restrictions. Setting up the tariff includes setting up the PCRF service (the same service can be used in different tariffs), which will be used in the tariff and setting up the tariff itself.

Open personal account and go to "Services and tariffs" → "PCRF services" and click the add button - the "Create a new service" window will open (Fig. 4.2.1):

Fig. 4.2.1.

Configure:

  • "Service name" - INTERNET (can be any English letters, numbers and the symbol "_");
  • "Domain" - root;
  • "Traffic class" - INTERNET.

This name must be the same as the ip access-list extended INTERNET configured on the ESR, including character case, because this is the access-list that the ESR will use when assigning this service. A name/register mismatch will cause BRAS to work incorrectly when assigning this service.

  • "Interval of account sending, s" - 300;
  • "Priority" - 10;
  • "Allow IP streams" - allow IP stream in both directions;
  • "Default action" - permit;
  • Do not add any URL filtering lists.

Click "Save" button.

Open "Services and tariffs" → "Tariffs" in personal account and select the filter "PCRF/BRAS", thus proceeding to the configuration of BRAS tariffs (Fig. 4.2.2):

Fig. 4.2.2.

and click the "Add" button - the "Create new tariff" window will open (Fig. 4.2.3):

Fig. 4.2.3.

Configure:

  • "Name" - internet (can be any, in English letters, numbers and "_");
  • "Tariff code" - internet (can be any, in English letters, numbers and "_");
  • "Domain" - root;
  • "Session lifetime" - 12 hours. This is the maximum lifetime of a user's session if he remains active all the time. After this time his session will be closed on BRAS and a new one will be created, the new session will pass mac authorization transparently for the client;
  • "Session lifetime at user inactivity" - 15 min;
  • "Сервисы" - select the previously configured service "INTERNET".

Do not select the "WELCOME" service! If it is also selected - it will lead to incorrect operation of BRAS after authorization of the user and assignment of this tariff.

Click the "Save" button.

4.3. Individual settings performed for each customer

Individual settings include portal configuration, SSID configuration and binding, and adding L2 subnets. A portal can be used for multiple customers, but this is rarely practiced. SSID configuration is usually unique for each geographic location of the connection; and if a unique vlan is used for the same SSID for each ФЗ, then for each such ФЗ. Within a single customer, the same portal is usually used in different SSIDs. In general, the order of configuration for each new customer is as follows:

1) creating a portal (if you plan to use an existing one, this step is skipped);

2) SSID creation and binding in EMS;

3) creation of L2 subnet in personal account.


1.1) Open the portal builder http://<ip portal address>:8080/epadmin and click on "Create a new virtual portal", then in the opened window (Fig. 4.3.1):

Fig. 4.3.1.

configure:

  • "virtual portal name" - eltex;
  • "domain" - eltex.root.

Click "Save" button. The transition to the created portal will be made automatically.

1.2) Note that in the portal builder for the above created portal "eltex" in the "Rates" tab there is a "default" tariff, designed to work with AP (Fig. 4.3.2):

Fig. 4.3.2.

This tariff is not suitable for work with BRAS, but if you add a tariff like "Work via BRAS" - the portal can determine what type of authorization the user needs and will set the appropriate tariff. If you do not intend to use this portal for authorization of Eltex AP clients, you can click "Delete" and delete the tariff intended for AP.


1.3) Click the "Add" button at the bottom of the portal builder (Fig. 4.3.3).


Fig. 4.3.3.

in the tariff selection window that opens, check the "internet" tariff that was set up earlier in the personal account and click "Add". Please note that it belongs to the group of tariffs "Work via BRAS".

1.4)  Click the "Save" button at the bottom of the portal builder (Fig. 4.3.4):


Fig. 4.3.4.

This completes the portal configuration. In the current document it is assumed that demo mode will be used for client authorization. 

2.1) Open in EMS and open the menu "Wireless" → "SSID Manager" and in the "SSID Base" tab click the "Add SSID" button. The SSID creation window will open (Fig. 4.3.5):

Fig. 4.3.5.

and configure:

  • "Type" - Hotspot;
  • "Name" - SSID1;
  • "Domain" - eltex.root;
  • "Bridge, Location" - data10 - must match the location configured on the ESR client bridge;
  • "vlan-ID" - 2336;
  • "Virtual portal name" - eltex - select the portal we configured earlier.

Click "Accept".

Since the scheme to be configured assumes the presence of two SSIDs, we configure the second SSID for vlan 2337 in the same way (Fig. 4.3.6):

Fig. 4.3.6.

The only differences are in the vlan and SSID name.

2.2) Let's perform SSID binding. To do this, select SSID1 and SSID2 we created earlier and click the "Add SSID Binding" button. In the opened window (Fig. 4.3.7):

Fig. 4.3.7.

select "Key" - DOMAIN, and choose the eltex domain where our SSID will be located and click "Create binding". After that the "Accept" button will become available - click on it.

A question will appear - "Fix SSID bindings" - click "No", as it works only for Eltex AP and close the SSID manager. This completes the EMS configuration.


3.1) Open your personal account and go to "PCRF Settings" → "L2 subnets" and click "Add". The "Add subnet" window will open (Fig. 4.3.8):

Fig. 4.3.8.

configure:

  • "Name" - eltex_2336 (can be any, in English letters, numbers and "_");
  • "Type" - Service;
  • "NAS IP" - 100.123.0.176 (адрес управления ESR management address);
  • "Interface of location" - gi1/0/1.2336 (sub-interface through which SSID1 clients' traffic is terminated);
  • "Service domain" - eltex.root;
  • "Portal name" - eltex;
  • "AP domain" - eltex.root;
  • "SSID" - select SSID1:eltex.root

    In order to be able to select the desired SSID, the "Service Domain" must match or be the parent of the "Domain" setting in the SSID settings.

Click "Save" button.

Similarly, configure the L2 subnet for the second SSID (Fig. 4.3.9):

Fig. 4.3.9.

and save it.

This completes the configuration of SoftWLC complex to work with BRAS, then you need to connect to the previously configured vlan and make sure that there is a redirect to the portal, the ability to pass authorization in demo mode and access the Internet after authorization. Trableshooting when connecting BRAS clients is described in the link: BRAS. Troubleshooting Guide

5. Firewall configuration on ESR

During the initial ESR configuration, the firewall was disabled for ease of trabshooting. After the configuration is done and successful authorization and operation of clients through BRAS is verified, it is necessary to configure the firewall. The main purpose of firewall configuration is to prevent clients from accessing ESR, SoftWLC complex and resources of the operator's internal network.

The firewall on ESR works at the L3 level: to each L3 interface a security zone is assigned. Rules are formed on the basis of security zone-pair mappings. The names of trusted, untrusted and users zones used in this document may be labeled differently. The reserved security zone names that cannot be used are self and all. Fig. 5.1 shows the distribution of ESR interfaces by security zones:

Fig. 5.1.

  • Bridge 10 - users zone.

    The sub-interfaces gi1/0/1.2336 and gi1/0/1.2337 are included in bridge 10, they do not have their own ip addresses and therefore traffic coming through these interfaces is considered to come from the users zone. There is no need to configure security-zone on these interfaces;

  • Gi1/0/1.77 - untrusted zone, as this interface looks towards the Internet;

  • Gi1/0/1.2300 - trusted zone, as this interface is used for management and looks into the core of the operator's network;
  • All addresses configured directly on the ESR are considered to be in the self zone.

The principles of firewall configuration are as follows:

  • Client traffic from the users zone to the untrusted zone (Internet) must be fully authorized;
  • ESR management traffic from the trusted zone to the self zone must be fully authorized;
  • Traffic from the trusted zone to the users zone must be fully allowed, to be able to diagnose client problems;
  • When clients obtain addresses, their dhcp-discover passes from the users zone to the self zone, they must be allowed;
  • When clients renew addresses, their dhcp-request goes from the users zone to the trusted zone where the DHCP server is located, it must be allowed;
  • When clients access DNS, their packets go from the users zone to the trusted zone where the DNS server is located, they must be allowed;
  • When performing a redirect to the portal, such client access is proxied by ESR, so such packets are considered to go from the users zone to the self zone.


Security zones and assigning them to interfaces was done during the initial ESR configuration.

Next, create objects for dhcp and dns services:

object-group service dhcp_server
  port-range 67
exit
object-group service dhcp_client
  port-range 68
exit
object-group service dns
  port-range 53
exit
object-group service redirect
  port-range 3128-3159
exit


The object-group service redirect service setting specifies the proxy ports listening for client connection. Their number depends on the ESR model.

Configure filtering rules according to the firewall configuration principles selected above:

security zone-pair users untrusted
  rule 1
    action permit
    enable
  exit
exit
security zone-pair trusted self
  rule 1
    action permit
    enable
  exit
exit
security zone-pair trusted users
  rule 1
    action permit
    enable
  exit
exit
security zone-pair users self
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
  rule 2
    action permit
    match protocol tcp
    match destination-port redirect
    enable
  exit
exit
security zone-pair users trusted
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
  rule 2
    action permit
    match protocol udp
    match destination-port dns
    enable
  exit
exit

Enable the firewall on interfaces where it was previously disabled:

bridge 10
  no ip firewall disable
exit

interface gigabitethernet 1/0/1.77
  no ip firewall disable
exit
interface gigabitethernet 1/0/1.2300
  no ip firewall disable
exit

and apply the configuration.

Verify that authorization and Internet access are functional. After that the ESR BRAS configuration can be considered complete.

6. Appendix

6.1. ESR configuration

ESR full configuration:

object-group service dhcp_server
  port-range 67
exit
object-group service dhcp_client
  port-range 68
exit
object-group service dns
  port-range 53
exit
object-group service redirect
  port-range 3128-3131
exit

object-group network users
  ip prefix 192.168.132.0/22
exit
object-group network SoftWLC
  ip address-range 100.123.0.2
exit

radius-server timeout 10
radius-server retransmit 5
radius-server host 100.123.0.2
  key ascii-text encrypted 88B11079B9014FAAF7B9
  timeout 11
  priority 20
  source-address 100.123.0.176
  auth-port 31812
  acct-port 31813
  retransmit 10
  dead-interval 10
exit
aaa radius-profile PCRF
  radius-server host 100.123.0.2
exit
das-server COA
  key ascii-text encrypted 88B11079B9014FAAF7B9
  port 3799
  clients object-group SoftWLC
exit
aaa das-profile COA
  das-server COA
exit

security zone trusted
exit
security zone untrusted
exit
security zone users
exit

ip access-list extended WELCOME
  rule 1
    action permit
    match protocol tcp
    match destination-port 443
    enable
  exit
  rule 2
    action permit
    match protocol tcp
    match destination-port 8443
    enable
  exit
  rule 3
    action permit
    match protocol tcp
    match destination-port 80
    enable
  exit
  rule 4
    action permit
    match protocol tcp
    match destination-port 8080
    enable
  exit
exit

ip access-list extended INTERNET
  rule 1
    action permit
    enable
  exit
exit

ip access-list extended unauthUSER
  rule 1
    action permit
    match protocol udp
    match source-port 68
    match destination-port 67
    enable
  exit
  rule 2
    action permit
    match protocol udp
    match destination-port 53
    enable
  exit
exit

subscriber-control filters-server-url http://100.123.0.2:7070/filters/file
subscriber-control
  aaa das-profile COA
  aaa sessions-radius-profile PCRF
  aaa services-radius-profile PCRF
  nas-ip-address 100.123.0.176
  session mac-authentication
  bypass-traffic-acl unauthUSER
  default-service
    class-map unauthUSER
    filter-name remote gosuslugi
    filter-action permit
    default-action redirect http://100.123.0.2:8080/eltex_portal/
  exit
  enable
exit

snmp-server
snmp-server system-shutdown
snmp-server community "private1" rw
snmp-server community "public11" ro

snmp-server host 100.123.0.2
  source-address 100.123.0.176
exit

bridge 10
  description "users"
  security-zone users
  ip address 192.168.132.1/22
  ip helper-address 100.123.0.2
  service-subscriber-control any
  location data10
  enable
exit

interface gigabitethernet 1/0/1.77
  description "UpLink"
  security-zone untrusted
  ip address 172.31.240.3/29
exit
interface gigabitethernet 1/0/1.2300
  description "mgmt"
  security-zone trusted
  ip address 100.123.0.176/24
exit
interface gigabitethernet 1/0/1.2336
  bridge-group 10
exit
interface gigabitethernet 1/0/1.2337
exit
security zone-pair users untrusted
  rule 1
    action permit
    enable
  exit
exit
security zone-pair trusted self
  rule 1
    action permit
    enable
  exit
exit
security zone-pair trusted users
  rule 1
    action permit
    enable
  exit
exit
security zone-pair users self
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
  rule 2
    action permit
    match protocol tcp
    match destination-port redirect
    enable
  exit
exit
security zone-pair users trusted
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
  rule 2
    action permit
    match protocol udp
    match destination-port dns
    enable
  exit
exit

nat source
  pool nat_addr
    ip address-range 172.31.240.3
  exit
  ruleset nat_source
    to zone untrusted
    rule 1
      match source-address users
      action source-nat pool nat_addr
      enable
    exit
  exit
exit

ip dhcp-relay

ip route 0.0.0.0/0 172.31.240.1

ip telnet server
ip ssh server

clock timezone gmt +7

ntp enable
ntp server 100.123.0.2
exit

6.2. Configuring and using shapers

ESR allows you to impose a speed limit (shaper) on the channel of clients within one office/SSID. ESR configuration is required to be performed to be able to use this functionality.

1) Enable the ESR:

ip firewall sessions classification enable

    Further setting depends on the type of ESR:

а) ESR1x/100/200/1000 has a software shaper. The fact of enabling shaper capability on these types of devices reduces their performance. It should be enabled only if this mode of operation is necessary. The shaper can operate either on one physical interface (in the up/down direction) or on two physical interfaces - one in the up direction and one in the down direction. The number of sub-interfaces on these physical interfaces does not matter for the functionality to work.

б) ESR1200/1700 has a hardware shaper, enabling which does not affect performance and it can work on all interfaces.

2.1) We perform settings on ESR1x/100/200/1000 (ESR1000 is used in the current example):

interface gigabitethernet 1/0/1
  service-policy dynamic all
exit

and apply the configuration. This is the setting needed in the current example.

If interface gi1/0/1 is used as an uplink and clients are connected to interface gi1/0/2 for example, it is necessary to enable the use of shaper in the corresponding directions:

interface gigabitethernet 1/0/1
  service-policy dynamic upstream 
exit
interface gigabitethernet 1/0/2
  service-policy dynamic downstream
exit

2.2) On ESR1200/1700 we perform:

interface service-port 1
  service-policy dynamic
exit

Shapers are configured from the EMS. Open "Administration" → "Permissions and Users" → "Domains". In the opened list of domains, click on the required domain and press the button. The window for editing shapers will open (Fig. 6.2.1):

Fig. 6.2.1.

In this window to the left under Shaper for <domain> you can configure shapers that limit the download speed for all SSIDs in the domain. Specify:

  • Average upstream bandwidth, kbps - 10000 - limit the upload speed, kbps;
  • Peak upstream bandwidth, kbps - 10000 -  maximum value of upload speed at available bandwidth, cannot be less than Average upstream bandwidth, kbps;
  • Average downstream bandwidth, kbps - 10000 - download speed limit, kbps;
  • Peak downstream bandwidth, kbps - 10000 - maximum value of download speed at available bandwidth, cannot be less than Average upstream bandwidth, kbps.

After saving the settings, the command to change the speed will be sent to the ESR. The new value of shaper is applied and started with a delay of 1 min.


To configure the SSID limitation you should open the window of shaper editing, select the desired SSID in the window on the right (in the current example SSID1) and click the  button , the window of object editing will open (Fig. 6.2.2):

Fig. 6.2.2.

  • Average upstream bandwidth, kbps - 5000 - limit the upload speed, kbps;
  • Peak upstream bandwidth, kbps - 5000 - maximum value of upload speed at available bandwidth, cannot be less than Average upstream bandwidth, kbps;
  • Average downstream bandwidth, kbps - 5000 - download speed limit, kbps;

  • Peak downstream bandwidth, kbps - 5000 - maximum value of download speed at available bandwidth, cannot be less than Average upstream bandwidth, kbps.

After saving the settings, a command to change the speed will be sent to the ESR. The new shaper value will be applied and started with a delay of 1 min. Note that if there is a speed limit on the domain, then regardless of the speed limit settings on the SSID, their values, including total values cannot exceed this limit.

  • Нет меток