Alcatel-Lucent 7750 Reference guide

Type
Reference guide
Alcatel-Lucent 7750
SERVICE ROUTER | RELEASE 13.0.R4
RADIUS ATTRIBUTES REFERENCE GUIDE
RADIUS ATTRIBUTES REFERENCE GUIDE
Alcatel-Lucent – Proprietary & Confidential
Contains proprietary/trade secret information which is the property of Alcatel-Lucent. Not to be made available
to, or copied or used by anyone who is not an employee of Alcatel-Lucent except when there is a valid non-
disclosure agreement in place which covers such information and contains appropriate non-disclosure and
limited use obligations.
Copyright 2015 © Alcatel-Lucent. All rights reserved.
All specifications, procedures, and information in this document are subject to change and revision at any time
without notice. The information contained herein is believed to be accurate as of the date of publication. Alcatel-
Lucent provides no warranty, express or implied, regarding its contents. Users are fully responsible for application
or use of the documentation.
Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks
are the property of their respective owners.
Copyright 2015 Alcatel-Lucent.
All rights reserved.
Disclaimers
Alcatel-Lucent products are intended for commercial uses. Without the appropriate network design engineering,
they must not be sold, licensed or otherwise distributed for use in any hazardous environments requiring fail-safe
performance, such as in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic
control, direct life-support machines, or weapons systems, in which the failure of products could lead directly to
death, personal injury, or severe physical or environmental damage. The customer hereby agrees that the use, sale,
license or other distribution of the products for any such application without the prior written consent of
Alcatel-Lucent, shall be at the customer's sole risk. The customer hereby agrees to defend and hold Alcatel-Lucent
harmless from any claims for loss, cost, damage, expense or liability that may arise out of or in connection with the
use, sale, license or other distribution of the products in such applications.
This document may contain information regarding the use and installation of non-Alcatel-Lucent products. Please
note that this information is provided as a courtesy to assist you. While Alcatel-Lucent tries to ensure that this
information accurately reflects information provided by the supplier, please refer to the materials provided with any
non-Alcatel-Lucent product and contact the supplier for confirmation. Alcatel-Lucent assumes no responsibility or
liability for incorrect or incomplete information provided about non-Alcatel-Lucent products.
However, this does not constitute a representation or warranty. The warranties provided for Alcatel-Lucent products,
if any, are set forth in contractual documentation entered into by Alcatel-Lucent and its customers.
This document was originally written in English. If there is any conflict or inconsistency between the English
version and any other version of a document, the English version shall prevail.
7750 SR RADIUS Attributes Reference Guide Page 3
Table of Contents
Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
About This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
List of Technical Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Searching for information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
To search for specific information in this guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
To search for specific information in multiple documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
RADIUS Attributes Reference
In This Section . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
RADIUS Authentication Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Subscriber Host Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Wholesale-Retail — Local Access Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
Wholesale-Retail — L2TP Tunneled Access Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
Business Service Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
Accounting On-Line Charging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82
IP and IPv6 Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85
Subscriber Host Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96
Subscriber Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99
WLAN Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .101
Dynamic Data Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .111
Lawful Intercept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117
IPSEC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .120
Application Assurance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127
CLI User Authentication and Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .132
AAA Route Downloader. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .138
RADIUS Accounting Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .141
Enhanced Subscriber Management (ESM) Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .141
Distributed Subscriber Management (DSM) Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190
Subscriber Service Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .193
Large Scale NAT (LSN) Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .196
L2TP Tunnel Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .204
Application Assurance (AA) Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .214
Dynamic Data Service accounting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .220
CLI User Access Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .225
Accounting Terminate Causes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .228
Accounting Triggered Reason VSA Values. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .230
RADIUS CoA and Disconnect Message Attributes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .233
Subscriber Host Identification Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .233
WLAN-GW migrant users Identification Attributes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .235
Distributed Subscriber Management (DSM) UE Identification Attributes . . . . . . . . . . . . . . . . . . . . . .235
IPSec Tunnel Identification Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .236
Overview of CoA Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .237
[101] Error-Cause Attribute Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .240
Page 4 7750 SR RADIUS Attributes Reference Guide
Table of Contents
7750 SR RADIUS Attributes Reference Guide Page 5
List of Tables
Table 1: List of Technical Publications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
RADIUS Attributes Reference
Table 2: Subscriber Host Identification (description) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Table 3: Subscriber Host Identification (limits). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
Table 4: Subscriber Host Identification (applicability) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52
Table 5: Wholesale-Retail: Local Access Mode (description) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
Table 6: Wholesale-Retail: local access mode (limits). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58
Table 7: Wholesale-Retail: Local Access Mode (applicability). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58
Table 8: Wholesale-Retail: L2TP Tunneled Access Mode (description) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
Table 9: Wholesale-Retail: L2TP Tunneled Access Mode (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
Table 10: Wholesale-Retail: L2TP Tunneled Access Mode (applicability). . . . . . . . . . . . . . . . . . . . . . . . . . . .71
Table 11: Business Access (description) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
Table 12: Business Access (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
Table 13: Business Access (applicability) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81
Table 14: Accounting: On-Line Charging (description) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82
Table 15: Accounting: On-line Charging (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
Table 16: Accounting: On-Line Charging (applicability). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
Table 17: IP and IPv6 filters (description) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85
Table 18: IP and IPv6 Filters (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87
Table 19: IP and IPv6 Filters (applicability) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .89
Table 20: [92] Nas-Filter-Rule Attribute Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90
Table 21: [242] Ascend-Data-Filter Attribute Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94
Table 22: Subscriber Host Creation (description) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96
Table 23: Subscriber Host Creation (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97
Table 24: Subscriber host creation (applicability) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98
Table 25: Subscriber Services (description) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99
Table 26: Subscriber Services (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .100
Table 27: Subscriber Services (applicability) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .100
Table 28: WLAN Gateway (description). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .101
Table 29: WLAN Gateway (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .106
Table 30: WLAN Gateway (applicability) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .109
Table 31: Dynamic Data Services (description). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .111
Table 32: Dynamic Data Services (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113
Table 33: Dynamic Data Services (applicability) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .115
Table 34: Dynamic Data Services — Control Channel CoA Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . .115
Table 35: Lawful Intercept (description). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117
Table 36: Lawful Intercept (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .118
Table 37: Lawful Intercept (applicability) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119
Table 38: IPSEC (description) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .120
Table 39: IPSEC (limits). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .124
Table 40: IPSEC (applicability) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . .126
Table 41: Application Assurance (description). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127
Table 42: Application Assurance (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .130
Table 43: Application Assurance (applicability) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .131
Page 6 7750 SR RADIUS Attributes Reference Guide
List of Tables
Table 44: CLI User Authentication and Authorization (description) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .132
Table 45: CLI User Authentication and Authorization (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .135
Table 46: CLI User Authentication and Authorization (applicability) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .137
Table 47: AAA Route Downloader (description) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .138
Table 48: AAA Route Downloader (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139
Table 49: AAA Route Downloader (applicability) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140
Table 50: Enhanced Subscriber Management Accounting [50] Acct-Multi-Session-Id values . . . . . . . . . . .142
Table 51: Accounting Statistics Type. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .143
Table 52: Enhanced Subscriber Management Accounting (description) . . . . . . . . . . . . . . . . . . . . . . . . . . . .144
Table 53: Enhanced Subscriber Management Accounting (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .169
Table 54: Enhanced Subscriber Management Accounting (applicability) . . . . . . . . . . . . . . . . . . . . . . . . . . .184
Table 55: Distributed Subscriber Management Accounting (applicability). . . . . . . . . . . . . . . . . . . . . . . . . . .190
Table 56: Subscriber Service Accounting (description) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .193
Table 57: Subscriber Service Accounting (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .194
Table 58: Subscriber Service Accounting (applicability) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .195
Table 59: LSN Accounting (description) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .196
Table 60: LSN Accounting (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .199
Table 61: LSN Accounting (applicability) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .202
Table 62: L2TP Tunnel Accounting (description). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .204
Table 63: L2TP Tunnel Accounting (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .209
Table 64: L2TP Tunnel Accounting (applicability) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .212
Table 65: Application Assurance Accounting (description) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .214
Table 66: Application Assurance Accounting (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .216
Table 67: Application Assurance Accounting (applicability). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .219
Table 68: Dynamic Data Service Accounting (description) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .220
Table 69: Dynamic Data Service Accounting (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .222
Table 70: Dynamic Data Service Accounting (applicability). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .224
Table 71: CLI User Access Accounting (description). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .225
Table 72: CLI User Access Accounting (limits) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .227
Table 73: CLI User Access Accounting (applicability) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .227
Table 74: Accounting Terminate Causes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .228
Table 75: Accounting Triggered Reason . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .230
Table 76: CoA and Disconnect Message: Subscriber Host Identification Attributes . . . . . . . . . . . . . . . . . . .233
Table 77: CoA and Disconnect Message: WLAN-GW Migrant Users Identification Attributes . . . . . . . . . . .235
Table 78: CoA and Disconnect Message: DSM UE Identification Attributes . . . . . . . . . . . . . . . . . . . . . . . . .235
Table 79: Disconnect Message: IPSec Tunnel Identification Attributes. . . . . . . . . . . . . . . . . . . . . . . . . . . . .236
Table 80: RADIUS CoA Message Supported Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .237
Table 81: RADIUS CoA message [101] Error-Cause values. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .240
Table 82: RADIUS Disconnect Message [101] Error-Cause Values for IPSec Tunnel. . . . . . . . . . . . . . . . .242
7750 SR RADIUS Attributes Reference Guide Page 7
Preface
About This Guide
This guide provides an overview of all supported RADIUS Authentication, Authorization and
Accounting attributes.
The authentication attributes are organized per application. The accounting attributes are
organized per accounting application. For each application, three tables provide the attribute
details:
Description — A detailed description per attribute
Limits — Value limits and format description per attribute. Note that the SR-OS RADIUS
Python interface enables flexible formatting of the attributes received from and send to the
RADIUS AAA servers.
Applicability: — RADIUS messages where the attribute can be present.
The following displays conventions used in this RADIUS attribute document.
Notes:
Unless explicitly stated differently, the term PPPoE is used in this document to indicate
PPPoE, PPPoEoA or PPPoA.
An unsupported attribute that is present in a CoA message is silently ignored, unless
explicitly stated differently in the attribute description.
Attribute Description
0 This attribute MUST NOT be present in packet.
0+ Zero or more instances of this attribute MAY be present in packet.
0-1 Zero or one instance of this attribute MAY be present in packet.
1 Exactly one instance of this attribute MUST be present in packet.
Preface
Page 8 7750 SR RADIUS Attributes Reference Guide
All Alcatel-Lucent Vendor Specific Attributes (VSAs) are available in a freeradius dictionary
format. The dictionary is delivered together with the software package:
<cflash>\support\dictionary-freeradius.txt
Audience
This guide is intended for network administrators who are responsible for configuring and
operating the 7750 SR routers using RADIUS AAA. It is assumed that the network administrators
have an understanding of networking principles and configurations, routing processes, protocols
and standards.
Preface
7750 SR RADIUS Attributes Reference Guide Page 9
List of Technical Publications
The 7750 SR documentation set is composed of the following guides:
Table 1: List of Technical Publications
Guide Description
7750 SR Basic System Configuration Guide This guide describes basic system configurations and
operations.
7750 SR System Management Guide This guide describes system security and access
configurations as well as event logging and accounting logs.
7750 SR Interface Configuration Guide This guide describes card, Media Dependent Adapter (MDA)
and port provisioning.
7750 SR Router Configuration Guide This guide describes logical IP routing interfaces and
associated attributes such as an IP address, as well as IP and
MAC-based filtering, and VRRP and Cflowd.
7750 SR Routing Protocols Guide This guide provides an overview of routing concepts and
provides configuration examples for RIP, OSPF, IS-IS, BGP,
and route policies.
7750 SR MPLS Guide This guide describes how to configure Multiprotocol Label
Switching (MPLS) and Label Distribution Protocol (LDP).
7750 SR Services Overview Guide This guide describes how to configure service parameters
such as service distribution points (SDPs), customer
information, and user services.
7750 SR Layer 2 Services and EVPN Guide: VLL,
VPLS, PBB, and EVPN
This guide describes Virtual Leased Lines (VLL), Virtual
Private LAN Service (VPLS), Provider Backbone Bridging
(PBB), and Ethernet VPN (EVPN).
7750 SR Layer 3 Services Guide: Internet Enhanced
Services and Virtual Private Routed Network
Services
This guide describes Internet Enhanced Services (IES) and
Virtual Private Routed Network (VPRN) services.
Preface
Page 10 7750 SR RADIUS Attributes Reference Guide
Searching for Information
You can use Adobe Reader, Release 6.0 or later, to search one or more PDF files for a term.
To search for specific information in this guide
1. From the Adobe Reader main menu, choose Edit > Search or Advanced Search. The Search
panel opens.
2. Click on the In the current document radio button.
3. Enter the term to search for.
7750 SR Versatile Service Module Guide This guide describes how to configure service parameters for
the Versatile Service Module (VSM).
7750 SR OAM and Diagnostics Guide This guide describes how to configure features such as service
mirroring and Operations, Administration and Management
(OAM) tools.
7750 SR Triple Play Guide This guide describes Triple Play services and support
provided by the 7750 SR and presents examples to configure
and implement various protocols and services.
7750 SR Quality of Service Guide This guide describes how to configure Quality of Service
(QoS) policy management.
7750 SR RADIUS Attributes Reference Guide This guide describes all supported RADIUS Authentication,
Authorization and Accounting attributes.
7450 ESS and 7750 SR Multiservice Integrated
Service Adapter Guide
This guide describes services provided by integrated service
adapters such as Application Assurance, IPSec, ad insertion
(ADI) and Network Address Translation (NAT).
7750 SR Gx AVPs Reference Guide This guide describes Gx Attribute Value Pairs (AVP).
Table 1: List of Technical Publications
Guide Description
Preface
7750 SR RADIUS Attributes Reference Guide Page 11
4. Select the following search criteria, if required:
Whole words only
Case-Sensitive
Include Bookmarks
Include Comments
5. Click on the Search button. Adobe Reader displays the search results.
You can expand the entries by clicking on the + symbol.
To search for specific information in multiple documents
Note: The PDF files that you search must be in the same folder.
1. From the Adobe Reader main menu, choose Edit > Search or Advanced Search. The Search
panel opens.
2. Click on the All PDF Documents in radio button.
3. Choose the folder in which to search using the drop-down menu.
4. Enter the term to search for.
5. Select the following search criteria, if required:
Whole words only
Case-Sensitive
Include Bookmarks
Include Comments
6. Click on the Search button. Adobe Reader displays the search results.
You can expand the entries for each file by clicking on the + symbol.
Preface
Page 12 7750 SR RADIUS Attributes Reference Guide
Technical Support
If you purchased a service agreement for your 7750 SR router and related products from a
distributor or authorized reseller, contact the technical support staff for that distributor or reseller
for assistance. If you purchased an Alcatel-Lucent service agreement, follow this link to contact an
Alcatel-Lucent support representative and to access product manuals and documentation updates:
https://support2.alcatel-lucent.com/portal/olcsHome.do
7750 SR RADIUS Attributes Reference Guide Page 13
RADIUS Attributes Reference
In This Section
This document provides an overview of all supported RADIUS Authentication, Authorization and
Accounting attributes in Alcatel-Lucent’s 7750 SR OS R13.0 R4.
Topics include:
RADIUS Authentication Attributes on page 14
RADIUS Accounting Attributes on page 141
RADIUS CoA and Disconnect Message Attributes on page 233
RADIUS Authentication Attributes
Page 14 7750 SR RADIUS Attributes Reference Guide
RADIUS Authentication Attributes
Subscriber Host Identification
Attributes related to subscriber-host configuration included in RADIUS authentication request and
response.
Table 2: Subscriber Host Identification (description)
Attribute ID Attribute Name Description
1 User-Name Refers to the user to be authenticated in the Access-Request. The format for
IPoE/PPPoE hosts depends on configuration parameters pppoe-access-method,
ppp-user-name or user-name-format in the CLI context configure subscriber-
mgmt authentication-policy <name>. The format for ARP-hosts is not
configurable and always the host IPv4-address.The RADIUS User-Name
specified in an Access-Accept or CoA is reflected in the corresponding
accounting messages. The attribute is omitted in authentication/accounting via
configure subscriber-mgmt authentication-policy/radius-accounting-policy
<name> include-radius-attribute no user-name.
2 User-Password The password of the user to be authenticated, or the user's input following an
Access-Challenge. For PPPoE users it indirectly maps to the password provided
by a PPPoE PAP user in response to the PAP Authenticate-Request. For IPoE/
ARP hosts it indirectly maps to a pre-configured password (configure
subscriber-mgmt authentication-policy <name> password <password> or
configure aaa isa-radius-policy <name> password <password>).
3 CHAP-Password Provided by a PPPoE CHAP user in response to the CHAP challenge. The
CHAP challenge sent by the NAS to a PPPoE CHAP user is part of the CHAP
authentication sequence RFC 1994, PPP Challenge Handshake Authentication
Protocol (CHAP), (Challenge, Response, Success, Failure). The user generated
CHAP password length is equal to the defined Limits and contains a one byte
CHAP-Identifier from the user's CHAP Response followed by the CHAP
Response from the user.
RADIUS Attributes Reference
7750 SR RADIUS Attributes Reference Guide Page 15
4 NAS-IP-Address The identifying IP Address of the NAS requesting the Authentication or
Accounting. Included when the RADIUS server is reachable via IPv4. The
address is determined by the routing instance through which the RADIUS
server can be reached:
“Management” — The active ipv4 address in the Boot Options File (bof
address <ipv4-address>)
“Base” or “VPRN” — the ipv4 address of the system interface (configure
router interface system address <address>).
The address can be overwritten with the configured source-address (configure
aaa radius-server-policy <policy-name> servers source-address <ip-
address>).
5 NAS-Port The physical access-circuit on the NAS which is used for the Authentication or
Accounting of the user. The format of this attribute is configurable on the NAS
as a fixed 32 bit value or a parameterized 32 bit value. The parameters can be a
combination of outer-vlan-id(o), inner-vlan-id(i), slot number(s), MDA
number(m), port number or lag-id(p), ATM VPI(v) and ATM VCI(c), fixed bit
values zero (0) or one (1) but cannot exceed 32 bit. The format can be
configured for following applications: configure aaa l2tp-accounting-policy
<name> include-radius-attribute nas-port, configure router l2tp cisco-nas-
port, configure service vprn <service-id> l2tp cisco-nas-port, configure
subscriber-mgmt authentication-policy <name> include-radius-attribute
nas-port, configure subscriber-mgmt radius-accounting-policy <name>
include-radius-attribute nas-port.
6 Service-Type The type of service the PPPoE user has requested, or the type of service to be
provided for the PPPoE user. Optional in RADIUS-Accept and CoA. Treated as
a session setup failure if different from Framed-User.
7 Framed-Protocol The framing to be used for framed access in case of PPPoE users. Optional in
RADIUS-Accept and CoA. Treated as a session setup failure if different from
PPP.
8 Framed-IP-
Address
The IPv4 address to be configured for the host via DHCPv4 (radius proxy) or
IPCP (PPPoE). Simultaneous returned attributes [88] Framed-Pool and [8]
Framed-IP-Address (RADIUS Access-Accept) are handled as host setup
failures. Attribute is also used in CoA and Disconnect Message (part of the
ESM or AA user identification-key). Attribute is omitted in accounting via
configure subscriber-mgmt radius-accounting-policy <name> include-
radius-attribute no framed-ip-addr.
Table 2: Subscriber Host Identification (description) (Continued)
Attribute ID Attribute Name Description
Subscriber Host Identification
Page 16 7750 SR RADIUS Attributes Reference Guide
9 Framed-IP-
Netmask
The IP netmask to be configured for the user when the user is a router to a
network. For DHCPv4 users, the attribute maps to DHCPv4 option [1] Subnet
mask and is mandatory if [8] Framed-IP-Address is also returned. For PPPoE
residential access, the attribute should be set to 255.255.255.255 (also the
default value if the attribute is omitted). For PPPoE business access, the
attribute maps to PPPoE IPCP option [144] Subnet-Mask only when the user
requests this option and if the node parameter configure subscriber-mgmt
ppp-policy <ppp-policy-name> ipcp-subnet-negotiation is set. Attribute is
omitted in accounting via configure subscriber-mgmt radius-accounting-
policy <name> include-radius-attribute no framed-ip-netmask.
18 Reply-Message Text that may be displayed to the user by a PPPoE client as a success, failure or
dialogue message. It is mapped to the message field from the PAP/CHAP
authentication replies to the user. Omitting this attribute results in standard
reply messages: login ok and login incorrect for PAP, CHAP authentication
success and CHAP authentication failure for CHAP. String length greater than
the defined Limits are accepted but truncated at this boundary.
Table 2: Subscriber Host Identification (description) (Continued)
Attribute ID Attribute Name Description
RADIUS Attributes Reference
7750 SR RADIUS Attributes Reference Guide Page 17
22 Framed-Route
Routing information (IPv4 managed route) to be configured on the NAS
for a host (dhcp, pppoe, arp) that operates as a router without NAT (so
called routed subscriber host). The route included in the Framed-Route
attribute is accepted as a managed route only if it's next-hop points to the
hosts ip-address or if the next-hop address equals 0.0.0.0 or if the
included route is a valid classful network in case the subnet-mask is
omitted. If neither is applicable, this specific framed-route attribute is
ignored and the host is instantiated without this specific managed route
installed. A Framed-Route attribute is also ignored if the SAP does not
have anti-spoof configured to nh-mac (the host will be installed as a
standalone host without managed route). Number of routes above Limits
are silently ignored. Optionally, a metric, tag and/or protocol preference
can be specified for the managed route. If the metrics are not specified or
specified in a wrong format or specified with out of range values then
default values are used for all metrics: metric=0, no tag and
preference=0.
If an identical managed route is associated with different routed
subscriber hosts in the context of the same IES/VPRN service up to
<max-ecmp-routes> managed routes are installed in the routing table
(configured as ecmp <max-ecmp-routes> in the routing instance).
Candidate ECMP Framed-Routes have identical prefix, equal lowest
preference and equal lowest metric. The “lowest ip next-hop” is the tie
breaker if more candidate ECMP Framed-Routes are available than the
configured <max-ecmp-routes>. Other identical managed routes are
shadowed (not installed in the routing table) and an event is logged. An
alternative to RADIUS managed routes are managed routes via host
dynamic BGP peering.
Valid RADIUS learned managed routes can be included in RADIUS
accounting messages with following configuration: configure
subscriber-mgmt radius-accounting-policy <name> include-radius-
attribute framed-route. Associated managed routes for an instantiated
routed subscriber host are included in RADIUS accounting messages
independent of the state of the managed route (Installed, Shadowed or
HostInactive).
25 Class
Attribute sent by the RADIUS server to the NAS in an Access-Accept or
CoA and is sent unmodified by the NAS to the Accounting server as part
of the Accounting-Request packet. Strings with a length longer than the
defined Limits are accepted but truncated to this boundary. Only first
64B are stored in the CF persistency file.
Table 2: Subscriber Host Identification (description) (Continued)
Attribute ID Attribute Name Description
Subscriber Host Identification
Page 18 7750 SR RADIUS Attributes Reference Guide
27 Session-Timeout Sets the maximum number of seconds of service to be provided to the user
(IPoEv4/PPPoE) before termination of the session. Attribute equals to [26-
6527-160] Alc-Relative-Session-Timeout when received in Access-Accept
since current session time portion is than zero. Value zero sets the session-
timeout to infinite (no session-timeout). The attribute is CoA Nack'd if its value
is smaller than the current-session time. Simultaneous received [27] Session-
Timeout and [26-6527-160] Alc-Relative-Session-Timeout are treated as a error
condition (setup failure if received via Access-Accept and Nack'd if received
via CoA). For IPoEv4 radius proxy and CoA create-host scenarios, [27]
Session-Timeout is interpreted as lease-time instead of session-time if [26-
6527-174] Alc-Lease-Time is omitted.
28 Idle-Timeout Sets the maximum number of consecutive seconds of idle connection allowed to
the user before termination of the session (IPoE/PPPoE) or a connectivity check
is triggered (IPoE). Values outside the allowed Limits are accepted but rounded
to these boundaries. A value of zero is treated as an infinite idle-timeout. The
idle-timeout handling on the node is implemented via category-maps
(configure subscriber-mgmt category-map <category-map-name> and
configure subscriber-mgmt sla-profile <sla-profile-name> category-map
<category-map-name>).
30 Called-Station-Id Allows the NAS to send in an Access Request and/or Accounting Request
information with respect to the user called. Attribute is omitted in
authentication/accounting via: configure subscriber-mgmt authentication-
policy/radius-accounting-policy <name> include-radius-attribute no called-
station-id.
Supported applications:
• LNS: the content is the string passed in the [21] Called Number AVP of the
L2TP ICRQ message.
• EAP authentication on WLAN Gateway: transparently forwarded as
received in EAP authentication or accounting messages from the AP
31 Calling-Station-Id Allows the NAS to send unique information identifying the user who requested
the service. This format is driven by configuration (configure subscriber-
mgmt authentication-policy/radius-accounting-policy <name> include-
radius-attribute calling-station-id <llid|mac|remote-id|sap-id|sap-string>).
The LLID (logical link identifier) is the mapping from a physical to logical
identification of a subscriber line and supplied by a RADIUS llid-server. The
sap-string maps to configure service <service-id> subscriber-interface <ip-
int-name> group-interface <ip-int-name> sap <sap-id> calling-station-id
<sap-string>. A [31] Calling-Station-Id attribute value longer than the allowed
maximum is treated as a setup failure. The attribute is omitted in authentication/
accounting via configure subscriber-mgmt authentication-policy/radius-
accounting-policy <name> include-radius-attribute no calling-station-id.
Table 2: Subscriber Host Identification (description) (Continued)
Attribute ID Attribute Name Description
RADIUS Attributes Reference
7750 SR RADIUS Attributes Reference Guide Page 19
32 NAS-Identifier A string (configure system name <system-name>) identifying the NAS
originating the Authentication or Accounting requests and sent when nas-
identifier is included for the corresponding application: configure subscriber-
mgmt authentication-policy (ESM authentication), configure subscriber-
mgmt radius-accounting-policy (ESM accounting), configure aaa isa-radius-
policy (LSN accounting, WLAN-GW) and configure aaa l2tp-accounting-
policy (L2TP accounting).
44 Acct-Session-Id A unique identifier that represents the subscriber host or session that is
authenticated. This attribute can be used as CoA or Disconnect Message key to
target the host or session and is reflected in the accounting messages for this
host or session.The attribute is included/excluded based on configure
subscriber-mgmt authentication-policy <name> include-radius-attribute
acct-session-id [host|session]. For PPPoE, either the host acct-session-id
(default) or the session acct-session-id is included.
60 CHAP-Challenge The CHAP challenge sent by the NAS to a PPPoE CHAP user as part of the
chap authentication sequence RFC 1994 (Challenge, Response, Success,
Failure). The generated challenge length for each new pppoe session is by
default a random value between [32..64] bytes unless configured different under
configure subscriber-mgmt ppp-policy <ppp-policy-name> ppp-chap-
challenge-length [8..64] or configure router l2tp group <tunnel-group-name>
ppp chap-challenge-length [8..64] for LNS. The CHAP challenge value is
copied into the request-authenticator field of the RADIUS Access-Request
message if the minimum and maximum value is configured at exact 16 (RFC
2865, Remote Authentication Dial In User Service (RADIUS), section 2.2,
Interoperation with PAP and CHAP). Attribute CHAP-Password is provided by
a PPPoE CHAP user in response to the [60] CHAP-challenge.
61 NAS-Port-Type The type of the physical port of the NAS which is authenticating the user and
value automatically determined from subscriber SAP encapsulation. It can be
overruled by configuration. Included only if include-radius-attribute nas-port-
type is added per application: configure subscriber-mgmt authentication-
policy (ESM authentication), configure subscriber-mgmt radius-accounting-
policy (ESM accounting), configure aaa isa-radius-policy (LSN accounting,
WLAN-GW) and configure aaa l2tp-accounting-policy (L2TP accounting).
Checked for correctness if returned in CoA.
The NAS-Port-Type attribute is always included when the Nas-Port-Id is also
included.
85 Acct-Interim-
Interval
Indicates the number of seconds between each interim update for this specific
session. Attribute values outside the allowed Limits are accepted but are
rounded to the minimum or maximum Limit.
Table 2: Subscriber Host Identification (description) (Continued)
Attribute ID Attribute Name Description
Subscriber Host Identification
Page 20 7750 SR RADIUS Attributes Reference Guide
87 NAS-Port-Id A text string which identifies the physical/logical port of the NAS which is
authenticating the user and/or reported for accounting. Attribute is also used in
CoA and Disconnect Message (part of the user identification-key). The nas-
port-id for physical ports usually contains <slot>/<mda>/<port>/
<vlan|vpi>.<vlan|vci>. The physical port can have an optional prefix-string
(max 8 chars) and suffix-string (max 64 chars) added for Authorization and
Accounting (configure subscriber-mgmt radius-accounting-policy |
authentication-policy <name> include-radius-attribute nas-port-id [prefix-
string <string>] [suffix <circuit-id|remote-id>]). For logical access circuits
(LNS) the nas-port-id is a fixed concatenation (delimiter #) of routing instance,
tunnel-server-endpoint, tunnel-client-endpoint, local-tunnel-id, remote-tunnel-
id, local-session-id, remote-session-id and call sequence number.
Included only if include-radius-attribute nas-port-id is added per application:
configure subscriber-mgmt authentication-policy (ESM authentication),
configure subscriber-mgmt radius-accounting-policy (ESM accounting),
configure aaa isa-radius-policy (LSN accounting, WLAN-GW) and configure
aaa l2tp-accounting-policy (L2TP accounting). For a capture-sap, the nas-
port-id attribute is always included in authentication requests.
88 Framed-Pool The name of one address pool or the name of a primary and secondary address
pool separated with a one character configurable delimiter (configure router/
service vprn <service-id> dhcp local-dhcp-server <server-name> use-pool-
from-client delimiter <delimiter>) that should be used to assign an address for
the user and maps to either:
1) dhcpv4 option [82] vendor-specific-option [9] sub-option [13] dhcpPool if
option is enabled on the node (configure service ies/vprn <service-id>
subscriber-interface <ip-int-name> group-interface <ip-int-name> dhcp
option vendor-specific-option pool-name) or
2) used directly as pool-name in the local configured dhcp server when local-
address-assignment is used and client-application is ppp-v4 (
configure service
ies/vprn <service-id> subscriber-interface ip-int-name group-interface ip-
int-name local-address-assignment). Alternative to [26-2352-36] Ip-Address-
Pool-Name and [26-4874-2] ERX-Address-Pool-Name. Framed-Pool names
longer than the allowed maximum are treated as host setup failures.
Simultaneous returned attributes [88] Framed-Pool and [8] Framed-IP-Address
are also handled as host setup failures.
Table 2: Subscriber Host Identification (description) (Continued)
Attribute ID Attribute Name Description
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244

Alcatel-Lucent 7750 Reference guide

Type
Reference guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI