ascend   [plain text]


                          Ascend Radius Options
                                  or
              What happens when a big vendor ignores an RFC


  FreeRADIUS uses Vendor-Specific attributes to send the Ascend attributes.
By default, Ascend NASes send the Ascend specific attributes as NON VSA's,
which conflict with new RADIUS attributes assigned by the IETF.  This was
a very bad screw-up by Ascend that still causes many headaches, but sometimes
we have to live with it, so we try to cope the best we can.  

  If you see a large number of messages about invalid Message-Authenticator
attribute, you most likely are affected by this problem, and should implement
the first option.

You have two options:

o Enable VSA's on the Ascend/Lucent MAX:

  This is by far the preferred method ( as it solves many other problems ).

  Max6000/4000 Series TAOS with Menued Interface:

    Go to Ethernet->Mod Config->Auth.  
    At the bottom of the menu, change Auth-Compat from "OLD" to "VSA".
    Save your changes, no reboot is needed.

    Go to Ethernet->Mod Config->Acct.  
    At the bottom of the menu, change Acct-Compat from "OLD" to "VSA".
    Save your changes, no reboot is needed.

  Max TNT/Apex 8000 Series TAOS with CLI:    

    nas> read external-auth
    nas> set rad-auth-client auth-radius-compat = vendor-specific
    nas> set rad-acct-client acct-radius-compat = vendor-specific
    nas> write

o Enable OLD attributes in FreeRADIUS

  One note on this, Ciscos have an Ascend compatibility mode that
  accepts only the OLD style Ascend attributes, just to make life more
  interesting.  :)

  You can make FreeRADIUS send the OLD style attributes by prefixing the
  Ascend attributes with 'X-' in the 'users' file, sql table, ldap directory,
  attr_filter module, etc... 

  Thus the VSA Ascend attribute:

     Ascend-Data-Filter

  becomes the OLD Ascend attribute:

     X-Ascend-Data-Filter

$Id$