Routing

Expand all | Collapse all

Help with Basic LNS Cisco/Juniper command conversion

Jump to Best Answer
  • 1.  Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-23-2017 03:12

    I have the LNS basic config, but in Cisco command.... Could anyone please tell me the equivelant Juniper commands?

     

    Once I have this basic tunnel up, I can work out the rest... thank you in advance (I have simply copied and pasted, so please excuse the obvious commands like interface addressing etc)...

     

    Version:1.0 StartHTML:000000197 EndHTML:000015057 StartFragment:000014431 EndFragment:000014972 StartSelection:000014431 EndSelection:000014972 SourceURL:https://mellowd.co.uk/ccie/?p=4819 Cisco LNS-LAC basic configuration | Darren's Blog

    vpdn enable
    !
    vpdn-group 21CN
     accept-dialin
      protocol l2tp
      virtual-template 1
     terminate-from hostname 21CN
     l2tp tunnel password 0 password
    !
    username testuser@network.com password 0 password
    !
    interface Loopback0
     ip address 10.10.10.10 255.255.255.255
    !
    interface GigabitEthernet2/0
     ip address 10.0.0.10 255.255.255.0
    !
    interface Virtual-Template1
     ip unnumbered Loopback0
     peer default ip address pool POOL
     ppp authentication pap callin
    !
    ip local pool POOL 192.168.1.1 192.168.2.254
    !
    router ospf 1
     redistribute connected subnets


  • 2.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-23-2017 03:47

    Please accept my apologies for this probably being very basic but I am struggling with this LNS configuration (I have what I think is a correct conffiguration on the LNS but I only have a Cisco 1841 to test as a LAC and it is a little frustrating).... thank you



  • 3.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-23-2017 20:56

    Hi,

     

    Please find the sample below.

     

     

    LNS# show chassis
    fpc 4 {
        pic 0 {
            tunnel-services {
                bandwidth 10g;
            }
            inline-services {
                bandwidth 1g;
            }
            max-queues-per-interface 8;
        }
    }

    dynamic-profiles {
        dyn-lns-profile {
            routing-instances {
                "$junos-routing-instance" {
                    interface "$junos-interface-name";
                    routing-options {
                        access {
                            route $junos-framed-route-ip-address-prefix {
                                next-hop "$junos-framed-route-nexthop";
                                metric "$junos-framed-route-cost";
                                preference "$junos-framed-route-distance";
                            }
                        }
                        access-internal {
                            route $junos-subscriber-ip-address {
                                qualified-next-hop "$junos-interface-name";
                            }
                        }
                    }
                }
            }
            interfaces {
                "$junos-interface-ifd-name" {
                    unit "$junos-interface-unit" {
                        dial-options {
                            l2tp-interface-id l2tp-encapsulation;
                            dedicated;
                        }
                        actual-transit-statistics;
                        no-traps;
                        family inet {
                            unnumbered-address "$junos-loopback-interface";
                        }
                    }
                }
            }
    }

     

    services {
        l2tp {
            tunnel-group LAC {
                l2tp-access-profile l2tp-profile;
                aaa-access-profile none;
                local-gateway {
                    address 21.21.21.1;
                }
                service-device-pool lns;
                dynamic-profile dyn-lns-profile;
            }                              
            traceoptions {
                file jl2tpd size 100m;
                level all;
                flag all;
            }
        }
        service-device-pools {
            pool lns {
                interface si-4/0/0;
            }
        }
    }
    access-profile none;
    interfaces {
        si-4/0/0 {
            hierarchical-scheduler maximum-hierarchy-levels 2;
            encapsulation generic-services;
            unit 0 {
                family inet;
                family inet6;
            }
        }
        lo0 {
            unit 0 {
                family inet {
                    address 1.1.1.1/32;
                }
            }
        }
        ge-2/0/0 {
            unit 0 {
                family inet {
                    address 21.21.21.1/24;
                }
            }
        }
    }


    access {
    group-profile l2tp-group-profile {
        ppp {
            idle-timeout 200;
            ppp-options {
                pap;
            }
            keepalive 30;
            primary-dns 8.8.8.8;
            secondary-dns 4.4.4.4;
        }
    }
    profile l2tp-profile {
        client 21CN {
            l2tp {
                maximum-sessions-per-tunnel 4000;
                interface-id l2tp-encapsulation;
                lcp-renegotiation;
                shared-secret password;
            }
            user-group-profile l2tp-group-profile;
      

        profile none {
            authentication-order none;
        }
        address-assignment {
            pool POOL {
                family inet {
                    network 192.168.1.0/22;
                    range lns {
                        low 192.168.1.1;
                        high 192.168.2.254;
                    }
                }
            }



  • 4.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-24-2017 03:14

    Hi rnayor,

     

    Firstly, thank you very much for your help with regards to this and again, my apologies, but I do not know LNS that well for configuration, so if any of my questions seem dumb, I'm sorry.

     

    Okay, so, the tunnel does not come up.... from a LAC perspective I have configured the following (on the Cisco 1841):

    hostname 21CN

    vpdn enable
    vpdn search-order domain
    !
    vpdn-group TESTNETWORK
     request-dialin
      protocol l2tp
      domain network.com
     initiate-to ip 195.80.0.17
     local name 21CN
     l2tp tunnel password 0 testing123

    interface FastEthernet0/0
     ip address 195.80.0.18 255.255.255.252
     duplex auto
     speed auto

    interface Serial0/1/0
     no ip address
     encapsulation ppp
     serial restart-delay 0
     ppp authentication pap callin

     

    From a log file perspective on the LNS (MX240) here are the last 70 lines:

     

    Oct 24 10:12:17.216583 setIfOperStatus: L2tpTunnel 0xc, LocalTunnelId 0x3a83, Changing tunnel ifOperStatus from Up to Down
    Oct 24 10:12:17.216602 checkpointMsOper: L2tpTunnel 0xc, LocalTunnelId 0x3a83, Changing tunnel checkpointMsOper from c3(up) to c4(downTriggered)
    Oct 24 10:12:17.216687 tunnelDown: skipping rtslib deleteTunnel for inline LNS destination.
    Oct 24 10:12:17.216708 buildL2tpLongRoutePrefix: lac long route formulated prefixLen =136
    Oct 24 10:12:17.216724 195.80.0.17.195.80.0.18.17.6.165.6.165.0.0.0.0
    Oct 24 10:12:17.216800 deleteCtrlDiscardRoute: lac-ctrl route delete succeeded for rttId = 0, localAddr = 195.80.0.17, remoteAddr = 0x195.80.0.18, err = 0
    Oct 24 10:12:17.216856 deleteCtrlDiscardRoute: lac-discard route delete succeeded for rttId = 0, localAddr = 195.80.0.17, remoteAddr = 195.80.0.18, err = 0
    Oct 24 10:12:17.216876 checkpointMsOper: L2tpTunnel 0xc, LocalTunnelId 0x3a83, Changing tunnel checkpointMsOper from c4(downTriggered) to c5(down)
    Oct 24 10:12:17.216982 addModifySfTunnelInfo: returning err = 0
    Oct 24 10:12:17.217008 deleteTunnelInfo: error = 0 No error: 0 genCfgKey/index = 0x0/0x0 genCfgKey/index =0/0
    Oct 24 10:12:17.217026 setMibState: L2tpTunnel 0xc, LocalTunnelId 0x3a83, Changing tunnel mibState from established to disconnecting
    Oct 24 10:12:17.217041 removePrivateData: sdb_remove_app_defined_data for sdb table type tunnel, rx remote host name, uid L2tpTunnel 0xc
    Oct 24 10:12:17.217095 removePrivateData: getSdbTableType failed, uidL2tpTunnel 0xc #16435
    Oct 24 10:12:17.217117 removePrivateData: sdb_remove_app_defined_data for sdb table type tunnel, rx remote vendor name, uid L2tpTunnel 0xc
    Oct 24 10:12:17.217162 removePrivateData: getSdbTableType failed, uidL2tpTunnel 0xc #16435
    Oct 24 10:12:17.217220 sendZLB: send L2TP packet type zlb, for remote  address 195.80.0.18, remote port 1701, from local address 195.80.0.17, local port 1701, L2tpTunnel 0xc, tunnel Id 842, session Id 0, Ns 3, Nr 5
    Oct 24 10:12:48.312780 run: tunnel: state = disconnecting, event = controlChannelDrained, next state = idle
    Oct 24 10:12:48.312832 run: SM tunnel, L2tpTunnel 0xc, enter State disconnecting, exit State idle, current event controlChannelDrained
    Oct 24 10:12:48.312859 checkpointMsOper: L2tpTunnel 0xc, LocalTunnelId 0x3a83, Changing tunnel checkpointMsOper from c5(down) to c6(dying)
    Oct 24 10:12:48.312947 setMibState: L2tpTunnel 0xc, LocalTunnelId 0x3a83, Changing tunnel mibState from disconnecting to idle
    Oct 24 10:12:48.312967 run: tunnel: state = idle, event = dying, next state = dying
    Oct 24 10:12:48.312981 run: SM tunnel, L2tpTunnel 0xc, enter State idle, exit State dying, current event dying
    Oct 24 10:13:13.911828 removePrivateData: sdb_remove_app_defined_data for sdb table type session, private group ID, uid L2tpSession 0xa
    Oct 24 10:13:13.911901 removePrivateData: getSdbTableType failed, uidL2tpSession 0xa #16435
    Oct 24 10:13:13.911920 removePrivateData: sdb_remove_app_defined_data for sdb table type session, user name, uid L2tpSession 0xa
    Oct 24 10:13:13.911947 removePrivateData: getSdbTableType failed, uidL2tpSession 0xa #16435
    Oct 24 10:13:13.911963 removePrivateData: sdb_remove_app_defined_data for sdb table type session, sub-address, uid L2tpSession 0xa
    Oct 24 10:13:13.911988 removePrivateData: getSdbTableType failed, uidL2tpSession 0xa #16435
    Oct 24 10:13:13.912003 removePrivateData: sdb_remove_app_defined_data for sdb table type session, called number, uid L2tpSession 0xa
    Oct 24 10:13:13.912028 removePrivateData: getSdbTableType failed, uidL2tpSession 0xa #16435
    Oct 24 10:13:13.912043 removePrivateData: sdb_remove_app_defined_data for sdb table type session, calling number, uid L2tpSession 0xa
    Oct 24 10:13:13.912079 removePrivateData: getSdbTableType failed, uidL2tpSession 0xa #16435
    Oct 24 10:13:13.912095 removePrivateData: sdb_remove_app_defined_data for sdb table type session, name, uid L2tpSession 0xa
    Oct 24 10:13:13.912124 removePrivateData: getSdbTableType failed, uidL2tpSession 0xa #16435
    Oct 24 10:13:13.912139 removePrivateData: sdb_remove_app_defined_data for sdb table type session, oper, uid L2tpSession 0xa
    Oct 24 10:13:13.912197 removePrivateData: sdb_remove_app_defined_data for sdb table type session, config, uid L2tpSession 0xa

     

     

    I'm not really sure what I am looking for here.... the passwords are the same, the connectivity is there and it appears to see the far end (LAC) when trying to communicate.... I am missing something obvious, but just unsure as to what that is....



  • 5.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-24-2017 03:29

    Apologies. I forgot to add the client information on the other end of the LAC serial interface link. It is another Cisco 1841 configured as below on the serial interface connecting to the LAC...

     

    interface Serial0/1/0
     ip address negotiated
     encapsulation ppp
     no fair-queue
     clock rate 2000000
     ppp pap sent-username testuser@network.com password 0 testing123



  • 6.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-24-2017 04:10

    Maybe this will help..... Completing a debug on the Cisco 1841 LAC gives me the following:

     

    *Oct 24 11:11:57.065: VPDN CALL [uid:605]: Requesting connection
    *Oct 24 11:11:57.065: VPDN CALL [uid:605]: Call request sent
    *Oct 24 11:11:57.069: VPDN MGR [uid:605]: Initiating compulsory connection to 195.80.0.17
    *Oct 24 11:11:57.073: L2X: Punting to L2TP control message queue
    *Oct 24 11:11:57.073: L2X: Punting to L2TP control message queue
    *Oct 24 11:11:57.077: VPDN MGR [uid:605]: Succeed to forward testuser@network.com
    *Oct 24 11:11:57.077: VPDN CALL [uid:605]: Connection succeeded
    *Oct 24 11:11:57.077: L2X: Punting to L2TP control message queue
    *Oct 24 11:11:57.077: VPDN MGR [uid:605]: Remote disconnected testuser@network.com
    *Oct 24 11:11:57.077: VPDN MGR [uid:605]: accounting stop sent
    *Oct 24 11:11:57.081: VPDN CALL [uid:605]: Server disconnected call
    *Oct 24 11:11:57.081: VPDN CALL [uid:605]: Free request
    *Oct 24 11:12:12.085: L2X: Punting to L2TP control message queue

     

    Given that it is sending a Username, realm and password, surely the LNS needs that information too for the tunnel? Or is that not the case? As it seems the tunnel is up/down, up/down, up/down



  • 7.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-24-2017 08:44

    Hi,

     

    Please share the following.

     

    1. Output of "LNS> show interfaces terse | grep si-"

    2. L2TP Traceoption.

     

    LNS# show services                                         
    l2tp {
        traceoptions {
            file jl2tp size 100m;
            level all;
            flag all;
        }
    }

     

    3. Configuration

     

    Regards,

    Rahul



  • 8.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-24-2017 09:24

    Hi Rahul,

     

    Thanks again. I do think it is a password issue.... but I shall include all your requirements here (not sure about the traceoptions file as that is huge and just repeats the same lines over and over):

     

    1: Clive@THW-LNS-01> show interfaces terse | grep si
    si-1/2/0                up    up
    si-1/2/0.0            up    up   inet
    lsi                          up    up

     

    2: Last 50 lines of traceoptions:

    Clive@THW-LNS-01# run show log ninel2tp | last 100
    Oct 24 16:18:18.304492 setMibState: Changing mibState from established to disconnecting
    Oct 24 16:18:18.304512 setMibState: L2tpSession 0xc7, LocalSessionId 0x72c8, L2tpTunnel 0xc6, LocalTunnelId 0xb13d, Changing session mibState from established to disconnecting
    Oct 24 16:18:18.304527 run: lnsIncomingSession: state = txCdnOpen, event = terminate, next state = txCdnOpen
    Oct 24 16:18:18.304541 run: SM lnsIncomingSession, L2tpSession 0xc7, enter State txCdnOpen, exit State txCdnOpen, current event terminate
    Oct 24 16:18:18.304555 run: lnsIncomingSession: state = txCdnOpen, event = reset, next state = txCdnOpen
    Oct 24 16:18:18.304569 run: SM lnsIncomingSession, L2tpSession 0xc7, enter State txCdnOpen, exit State txCdnOpen, current event reset
    Oct 24 16:18:18.305182 receive: received L2TP packet type zlb, from remote address 195.80.0.18, remote port  1701, for local address 195.80.0.17, local port 1701, tunnel Id 0x45373, session Id 0x0
    Oct 24 16:18:18.305207 run: lnsIncomingSession: state = txCdnOpen, event = txComplete, next state = resetIdle
    Oct 24 16:18:18.305222 run: SM lnsIncomingSession, L2tpSession 0xc7, enter State txCdnOpen, exit State resetIdle, current event txComplete
    Oct 24 16:18:18.305236 run: lnsIncomingSession: state = resetIdle, event = reset, next state = idle
    Oct 24 16:18:18.305251 run: SM lnsIncomingSession, L2tpSession 0xc7, enter State resetIdle, exit State idle, current event reset
    Oct 24 16:18:18.305268 disableSession : erased session from sessionLocalSidTable, session L2tpSession 0xc7, size: 0
    Oct 24 16:18:18.305282 decrementSessionCount: Host Profile 21CN Session Count 0
    Oct 24 16:18:18.305296 setMibState: Changing mibState from disconnecting to idle
    Oct 24 16:18:18.305311 setMibState: L2tpSession 0xc7, LocalSessionId 0x72c8, L2tpTunnel 0xc6, LocalTunnelId 0xb13d, Changing session mibState from disconnecting to idle
    Oct 24 16:18:18.305326 run: lnsIncomingSession: state = idle, event = dying, next state = dying
    Oct 24 16:18:18.305340 run: SM lnsIncomingSession, L2tpSession 0xc7, enter State idle, exit State dying, current event dying
    Oct 24 16:18:18.305356 checkpointMsOper: L2tpSession 0xc7, LocalSessionId 0x72c8, L2tpTunnel 0xc6, LocalTunnelId 0xb13d, Changing session checkpointMsOper from c5(down) to c6(dying)
    Oct 24 16:18:18.305405 run: lnsIncomingSession: state = dying, event = dead, next state = dead
    Oct 24 16:18:18.305425 run: SM lnsIncomingSession, L2tpSession 0xc7, enter State dying, exit State dead, current event dead
    Oct 24 16:18:18.305438 dead: starting destruct timer
    Oct 24 16:18:23.910291 updateActiveFpTunnels: Peer Resync Mechanism changed From: silent failover, To: not configured
    Oct 24 16:18:23.910326 removeEntry: Entry not found for Id = 56752
    Oct 24 16:18:23.910351 removePrivateData: sdb_remove_app_defined_data for sdb table type tunnel, oper, uid L2tpTunnel 0xc3
    Oct 24 16:18:23.910424 removePrivateData: sdb_remove_app_defined_data for sdb table type tunnel, config, uid L2tpTunnel 0xc3
    Oct 24 16:18:33.300917 receive: received L2TP packet type stopCcn, from remote address 195.80.0.18, remote port  1701, for local address 195.80.0.17, local port 1701, tunnel Id 0x45373, session Id 0x0
    Oct 24 16:18:33.300961 receive: Processing incoming in-sequence stopCcn from 1 0x0 195.80.0.18 - controlHeader.Ns = 4, nextReceiveNs = 4
    Oct 24 16:18:33.300979 load: AVP Header: type = message, length = 8, flags = M ~H
    Oct 24 16:18:33.300996 load: AVP Header: type = resultCode, length = 10, flags = M ~H
    Oct 24 16:18:33.301011 load: AVP Header: type = assignedTunnelId, length = 8, flags = M ~H
    Oct 24 16:18:33.301028 receiveStopCcn: Received stopCcn from 1 0x0 195.80.0.18 - result code = clearChannel
    Oct 24 16:18:33.301046 run: tunnel: state = established, event = stopCcn, next state = disconnecting
    Oct 24 16:18:33.301062 run: SM tunnel, L2tpTunnel 0xc6, enter State established, exit State disconnecting, current event stopCcn
    Oct 24 16:18:33.301079 run: tunnelRecovery: state = idle, event = terminate, next state = idle

    Oct 24 16:18:33.301094 run: SM tunnelRecovery, L2tpTunnel 0xc6, enter State idle, exit State idle, current event terminate
    Oct 24 16:18:33.301109 setIfOperStatus: L2tpTunnel 0xc6, LocalTunnelId 0xb13d, Changing tunnel ifOperStatus from Up to Down
    Oct 24 16:18:33.301130 checkpointMsOper: L2tpTunnel 0xc6, LocalTunnelId 0xb13d, Changing tunnel checkpointMsOper from c3(up) to c4(downTriggered)
    Oct 24 16:18:33.301217 tunnelDown: skipping rtslib deleteTunnel for inline LNS destination.
    Oct 24 16:18:33.301239 buildL2tpLongRoutePrefix: lac long route formulated prefixLen =136
    Oct 24 16:18:33.301256 195.80.0.17.195.80.0.18.17.6.165.6.165.0.0.0.0
    Oct 24 16:18:33.301338 deleteCtrlDiscardRoute: lac-ctrl route delete succeeded for rttId = 0, localAddr = 195.80.0.17, remoteAddr = 0x195.80.0.18, err = 0
    Oct 24 16:18:33.301395 deleteCtrlDiscardRoute: lac-discard route delete succeeded for rttId = 0, localAddr = 195.80.0.17, remoteAddr = 195.80.0.18, err = 0
    Oct 24 16:18:33.301416 checkpointMsOper: L2tpTunnel 0xc6, LocalTunnelId 0xb13d, Changing tunnel checkpointMsOper from c4(downTriggered) to c5(down)
    Oct 24 16:18:33.301525 addModifySfTunnelInfo: returning err = 0
    Oct 24 16:18:33.301553 deleteTunnelInfo: error = 0 No error: 0 genCfgKey/index = 0x0/0x0 genCfgKey/index =0/0
    Oct 24 16:18:33.301572 setMibState: L2tpTunnel 0xc6, LocalTunnelId 0xb13d, Changing tunnel mibState from established to disconnecting
    Oct 24 16:18:33.301588 removePrivateData: sdb_remove_app_defined_data for sdb table type tunnel, rx remote host name, uid L2tpTunnel 0xc6
    Oct 24 16:18:33.301646 removePrivateData: getSdbTableType failed, uidL2tpTunnel 0xc6 #16435
    Oct 24 16:18:33.301667 removePrivateData: sdb_remove_app_defined_data for sdb table type tunnel, rx remote vendor name, uid L2tpTunnel 0xc6
    Oct 24 16:18:33.301714 removePrivateData: getSdbTableType failed, uidL2tpTunnel 0xc6 #16435
    Oct 24 16:18:33.301776 sendZLB: send L2TP packet type zlb, for remote  address 195.80.0.18, remote port 1701, from local address 195.80.0.17, local port 1701, L2tpTunnel 0xc6, tunnel Id 36848, session Id 0, Ns 3, Nr 5

     

    3: Configuration (only including the L2TP - all other deleted):

     

    dynamic-profiles {
        dyn-lns-profile {
            routing-instances {
                "$junos-routing-instance" {
                    interface "$junos-interface-name";
                    routing-options {
                        access {
                            route $junos-framed-route-ip-address-prefix {
                                next-hop "$junos-framed-route-nexthop";
                                metric "$junos-framed-route-cost";
                                preference "$junos-framed-route-distance";
                            }
                        }
                        access-internal {
                            route $junos-subscriber-ip-address {
                                qualified-next-hop "$junos-interface-name";
                            }
                        }
                    }
                }
            }
            interfaces {
                "$junos-interface-ifd-name" {
                    unit "$junos-interface-unit" {
                        dial-options {
                            l2tp-interface-id l2tp-encapsulation;
                            dedicated;
                        }
                        no-traps;
                        family inet {
                            unnumbered-address "$junos-loopback-interface";

    fpc 1 {
            pic 2 {
                tunnel-services {
                    bandwidth 1g;
                }
                inline-services {
                    bandwidth 1g;
                }
                max-queues-per-interface 8;
            }
        }
        network-services enhanced-ip;
    }
    services {
        l2tp {
            tunnel-group LAC {
                l2tp-access-profile l2tp-profile;
                aaa-access-profile none;
                local-gateway {
                    address 195.80.0.17;
                }
                service-device-pool lns;
                dynamic-profile dyn-lns-profile;
            }
            traceoptions {
                file ninel2tp size 100m;
                level all;
                flag all;

     service-device-pools {
            pool lns {
                interface si-1/2/0;

     si-1/2/0 {
            hierarchical-scheduler maximum-hierarchy-levels 2;
            encapsulation generic-services;
            unit 0 {
                family inet;
                family inet6;

    lo0 {

            unit 0 {
                family inet {
                    address 195.80.0.251/32;

    access {
        group-profile l2tp-group-profile {
            ppp {
                idle-timeout 200;
                ppp-options {
                    pap;
                }
                keepalive 30;
                primary-dns 8.8.8.8;
                secondary-dns 8.8.4.4;
            }
        }
        profile l2tp-profile {
            client 21CN {

     l2tp {
                    maximum-sessions-per-tunnel 4000;
                    interface-id l2tp-encapsulation;
                    lcp-renegotiation;
                    shared-secret "$9$5T6AB1hrK8Ec87dsJZqmfTn/Ap0IhS"; ## SECRET-DATA
                }
                user-group-profile l2tp-group-profile;
            }
        }
        profile none {
            authentication-order none;
        }
        address-assignment {
            pool POOL {
                family inet {
                    network 192.168.1.0/24;
                    range lns {
                        low 192.168.1.1;
                        high 192.168.1.254;
                    }
                }
            }

     

    Apologies for not supplying the whole config. There is a lot of MPLS and IS-IS that is not required to be seen and all of that is working fine. I just have this issue with the LNS. Thank you again for all of your help. If we ever meet up I owe you some beers 🙂



  • 9.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-24-2017 09:29

    As an add on.... If the Cisco 1841 LAC end is forwarding a username and password to the LNS of a client, surely that should be presented somewhere for the LNS to respond? Maybe I am completely wrong..... we are going to be using a RADIUS, but I just need a basic working config for now.... I can then build on that...... thank you 🙂



  • 10.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-24-2017 09:54

    Hi,

     

    Thank you for the details. Logs shared is not enough to confirm the root cause as configuration looks fine.

     

    1. Clear traceoption and collect fresh log file. We need complete traceoption to identify the issue.

    2. Check the license. Do you have "l2tp-inline-lns" license?  Please share the output of show system license.

    3. Remove lcp-renegotiation and check once.

    4. Authentication is set as none so what ever username/password comes from LAC, MX will accept it.

    you can set it in global level using below coomand.

     

    LNS# show access-profile       
    none;



  • 11.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-25-2017 01:22

    Hi rnayar,

     

    Looks like I am going to end up owing you a whole brewery 🙂

     

    Please find attached a new logfile.

    We have the required licenses as can be seen below.

    License usage:
                                     Licenses     Licenses    Licenses    Expiry
      Feature name                       used    installed      needed
      subscriber-accounting                 0            1           0    permanent
      subscriber-authentication             0            1           0    permanent
      subscriber-address-assignment         1            1           0    permanent
      subscriber-vlan                       0            1           0    permanent
      subscriber-ip                         0            1           0    permanent
      service-dc                            0            1           0    permanent
      service-accounting                    0            1           0    permanent
      service-qos                           0            1           0    permanent
      service-ancp                          0            1           0    permanent
      service-cbsp                          0            1           0    permanent
      scale-subscriber                      0        16000           0    permanent
      scale-l2tp                            0         1000           0    permanent
      scale-mobile-ip                       0         1000           0    permanent
      mobile-next-scaling                   0         1000           0    permanent
      mobile-next-http-app-scaling          0         1000           0    permanent
      mobile-next-policy-prepaid-scaling        0      1000          0    permanent
      l2tp-inline-lns                       1            1           0    permanent

    Licenses installed:
      License identifier: E400185416
      License version: 4
      Features:
        subscriber-accounting - Per Subscriber Radius Accounting
          permanent
        subscriber-authentication - Per Subscriber Radius Authentication
          permanent
        subscriber-address-assignment - Radius/SRC Address Pool Assignment
          permanent
        subscriber-vlan  - Dynamic Auto-sensed Vlan
          permanent
        subscriber-ip    - Dynamic and Static IP
          permanent

      License identifier: E400461716
      License version: 4
      Features:
        scale-subscriber-16k - Subscriber Tier 8K - 16K
          permanent

      License identifier: E401171420
      License version: 4
      Features:
        service-dc       - Service Definition Capability
          permanent
        service-accounting - Per Service Accounting
          permanent
        service-qos      - Dynamic QOS Policy
          permanent
        service-ancp     - ANCP Based QOS Adjustment
          permanent
        service-cbsp     - Cell Based Shaping and Policing
          permanent

      License identifier: E403226704
      License version: 4
      Features:
        l2tp-inline-lns  - L2TP Inline LNS
          permanent

     

    I will try removing the "lcp-renegotiation" configuraiton and test and let you know the results.

     

    Thank you again for your time and effort... it is appreciated.

     

     



  • 12.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-25-2017 01:24

    It's not letting me attach the logfile for some reason.... when I post, it does nothing.... do you have an e-mail address or somewhere I can post it?



  • 13.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-25-2017 01:32

    I think the below log snapshot should be enough, as it just keeps repeating the same information over and over:

     

    Oct 25 08:05:24 THW-LNS-01 clear-log[13082]: logfile cleared
    Oct 25 08:05:45.457872 load: AVP Header: type = message, length = 8, flags = M ~H
    Oct 25 08:05:45.457900 load: AVP Header: type = protocolVersion, length = 8, flags = M ~H
    Oct 25 08:05:45.457914 load: AVP Header: type = firmwareRevision, length = 8, flags = ~M ~H
    Oct 25 08:05:45.457927 load: AVP Header: type = hostName, length = 10, flags = M ~H
    Oct 25 08:05:45.457940 load: AVP Header: type = vendorName, length = 25, flags = ~M ~H
    Oct 25 08:05:45.457953 load: AVP Header: type = receiveWindowSize, length = 8, flags = M ~H
    Oct 25 08:05:45.457965 load: AVP Header: type = challenge, length = 22, flags = M ~H
    Oct 25 08:05:45.457977 load: AVP Header: type = assignedTunnelId, length = 8, flags = M ~H
    Oct 25 08:05:45.457992 load: AVP Header: type = message, length = 8, flags = M ~H
    Oct 25 08:05:45.458004 load: AVP Header: type = protocolVersion, length = 8, flags = M ~H
    Oct 25 08:05:45.458017 load: AVP Header: type = firmwareRevision, length = 8, flags = ~M ~H
    Oct 25 08:05:45.458029 load: AVP Header: type = hostName, length = 10, flags = M ~H
    Oct 25 08:05:45.458041 load: AVP Header: type = vendorName, length = 25, flags = ~M ~H
    Oct 25 08:05:45.458053 load: AVP Header: type = receiveWindowSize, length = 8, flags = M ~H
    Oct 25 08:05:45.458065 load: AVP Header: type = challenge, length = 22, flags = M ~H
    Oct 25 08:05:45.458077 load: AVP Header: type = assignedTunnelId, length = 8, flags = M ~H
    Oct 25 08:05:45.458089 load: AVP Header: type = framingCapabilities, length = 10, flags = M ~H
    Oct 25 08:05:45.458102 load: AVP Header: type = bearerCapabilities, length = 10, flags = M ~H
    Oct 25 08:05:45.458115 load: AVP Header: type = vendor (0x0009) type (0x006e), length = 6, flags = ~M ~H
    Oct 25 08:05:45.458134 receive: Creating dynamic tunnel for incoming sccrq from 1 0x0 195.80.0.18 - attempt to start already existing tunnel
    Oct 25 08:05:45.458164 allocateLocalTunnelId: got localTunnelId 13883
    Oct 25 08:05:45.458293 updateIpTransport: Update IP transport config: local address = 195.80.0.17, remote address = 195.80.0.18
    Oct 25 08:05:45.458312 updateActiveFpTunnels: Peer Resync Mechanism changed From: not configured, To: not configured
    Oct 25 08:05:45.458329 checkpointMsOper: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel checkpointMsOper from c1(connecting) to c1(connecting)
    Oct 25 08:05:45.458384 updateAdminState: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel effective adminState from disabled to enabled
    Oct 25 08:05:45.458403 run: tunnel: state = closeDown, event = open, next state = openDown
    Oct 25 08:05:45.458417 run: SM tunnel, L2tpTunnel 0xce, enter State closeDown, exit State openDown, current event open
    Oct 25 08:05:45.458431 run: tunnelRecovery: state = closeDown, event = open, next state = openDown
    Oct 25 08:05:45.458444 run: SM tunnelRecovery, L2tpTunnel 0xce, enter State closeDown, exit State openDown, current event open
    Oct 25 08:05:45.458461 setIfOperStatus: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel ifOperStatus from LowerLayerDown to Down
    Oct 25 08:05:45.458476 run: tunnel: state = openDown, event = upPassive, next state = idle
    Oct 25 08:05:45.458489 run: SM tunnel, L2tpTunnel 0xce, enter State openDown, exit State idle, current event upPassive
    Oct 25 08:05:45.458503 run: tunnelRecovery: state = openDown, event = up, next state = idle
    Oct 25 08:05:45.458517 run: SM tunnelRecovery, L2tpTunnel 0xce, enter State openDown, exit State idle, current event up
    Oct 25 08:05:45.458535 receive: received L2TP packet type sccrq, from remote address 195.80.0.18, remote port  1701, for local address 195.80.0.17, local port 1701, tunnel Id 0x0, session Id 0x0
    Oct 25 08:05:45.458555 receive: Processing incoming in-sequence sccrq from 1 0x0 195.80.0.18 - controlHeader.Ns = 0, nextReceiveNs = 0
    Oct 25 08:05:45.458569 load: AVP Header: type = message, length = 8, flags = M ~H
    Oct 25 08:05:45.458583 load: AVP Header: type = protocolVersion, length = 8, flags = M ~H
    Oct 25 08:05:45.458595 load: AVP Header: type = firmwareRevision, length = 8, flags = ~M ~H
    Oct 25 08:05:45.458654 load: AVP Header: type = hostName, length = 10, flags = M ~H
    Oct 25 08:05:45.458669 checkHostName: rxRemoteHostName 21CN, isHostProfileRequired() true, isConfigRemoteHostName() false
    Oct 25 08:05:45.458686 setHostProfile: remoteHostName 21CN, multilink = 0
    Oct 25 08:05:45.458701 updateIpTransport: Update IP transport config: local address = 195.80.0.17, remote address = 195.80.0.18
    Oct 25 08:05:45.458715 updateActiveFpTunnels: Peer Resync Mechanism changed From: not configured, To: failover protocol fallback to silent failover
    Oct 25 08:05:45.458729 load: AVP Header: type = protocolVersion, length = 8, flags = M ~H
    Oct 25 08:05:45.458742 load: AVP Header: type = firmwareRevision, length = 8, flags = ~M ~H
    Oct 25 08:05:45.458755 load: AVP Header: type = hostName, length = 10, flags = M ~H
    Oct 25 08:05:45.458768 load: AVP Header: type = vendorName, length = 25, flags = ~M ~H
    Oct 25 08:05:45.458781 load: AVP Header: type = receiveWindowSize, length = 8, flags = M ~H
    Oct 25 08:05:45.458794 load: AVP Header: type = challenge, length = 22, flags = M ~H
    Oct 25 08:05:45.458807 load: AVP Header: type = assignedTunnelId, length = 8, flags = M ~H
    Oct 25 08:05:45.458821 load: AVP Header: type = framingCapabilities, length = 10, flags = M ~H
    Oct 25 08:05:45.458834 load: AVP Header: type = bearerCapabilities, length = 10, flags = M ~H
    Oct 25 08:05:45.458849 load: AVP Header: type = vendor (0x0009) type (0x006e), length = 6, flags = ~M ~H
    Oct 25 08:05:45.458866 calculateChallengeResponse: secretString testing123, secretString len 10, challengeLength 16
    Oct 25 08:05:45.458884 run: tunnel: state = idle, event = sccrq, next state = txSccrp
    Oct 25 08:05:45.458898 run: SM tunnel, L2tpTunnel 0xce, enter State idle, exit State txSccrp, current event sccrq
    Oct 25 08:05:45.458934 store: AVP Header: type = message, length = 8, flags = M ~H
    Oct 25 08:05:45.458948 store: AVP Header: type = protocolVersion, length = 8, flags = M ~H
    Oct 25 08:05:45.458969 store: AVP Header: type = hostName, length = 16, flags = M ~H
    Oct 25 08:05:45.458982 store: AVP Header: type = framingCapabilities, length = 10, flags = M ~H
    Oct 25 08:05:45.458995 store: AVP Header: type = assignedTunnelId, length = 8, flags = M ~H
    Oct 25 08:05:45.459007 store: AVP Header: type = challenge, length = 25, flags = M ~H
    Oct 25 08:05:45.459019 store: AVP Header: type = challengeResponse, length = 22, flags = M ~H
    Oct 25 08:05:45.459032 store: AVP Header: type = firmwareRevision, length = 8, flags = ~M ~H
    Oct 25 08:05:45.459044 store: AVP Header: type = vendorName, length = 27, flags = ~M ~H
    Oct 25 08:05:45.459063 send: send L2TP packet type sccrp, for remote  address 195.80.0.18, remote port 1701, from local address 195.80.0.17, local port 1701, L2tpTunnel 0xce, tunnel Id 53283, session Id 0, Ns 0, Nr 1, re-tries 0
    Oct 25 08:05:45.459115 setMibState: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel mibState from idle to connecting
    Oct 25 08:05:45.461381 receive: received L2TP packet type scccn, from remote address 195.80.0.18, remote port  1701, for local address 195.80.0.17, local port 1701, tunnel Id 0x13883, session Id 0x0
    Oct 25 08:05:45.461410 run: tunnel: state = txSccrp, event = txComplete, next state = waitCtlConn
    Oct 25 08:05:45.461427 run: SM tunnel, L2tpTunnel 0xce, enter State txSccrp, exit State waitCtlConn, current event txComplete
    Oct 25 08:05:45.461446 receive: Processing incoming in-sequence scccn from 1 0x0 195.80.0.18 - controlHeader.Ns = 1, nextReceiveNs = 1
    Oct 25 08:05:45.461460 load: AVP Header: type = message, length = 8, flags = M ~H
    Oct 25 08:05:45.461474 load: AVP Header: type = challengeResponse, length = 22, flags = M ~H
    Oct 25 08:05:45.461490 calculateChallengeResponse: secretString testing123, secretString len 10, challengeLength 19
    Oct 25 08:05:45.461502 checkChallengeResponse, challenge.getLen() 19
    Oct 25 08:05:45.461515 run: tunnel: state = waitCtlConn, event = scccn, next state = established
    Oct 25 08:05:45.461528 run: SM tunnel, L2tpTunnel 0xce, enter State waitCtlConn, exit State established, current event scccn
    Oct 25 08:05:45.461544 setIfOperStatus: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel ifOperStatus from Down to Up
    Oct 25 08:05:45.461567 updateActiveFpTunnels: Peer Resync Mechanism changed From: failover protocol fallback to silent failover, To: silent failover
    Oct 25 08:05:45.461655 checkpointMsOper: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel checkpointMsOper from c1(connecting) to c2(upTriggered)
    Oct 25 08:05:45.461785 addModifySfTunnelInfo: returning err = 17
    Oct 25 08:05:45.461805 addTunnelInfo: cannot addModifySfTunnelInfo gencfg err = 17 op = \x01
    Oct 25 08:05:45.461873 addModifySfTunnelInfo: returning err = 0
    Oct 25 08:05:45.461895 addTunnelInfo: error = 0 No error: 0 genCfgKey/index = 0x0/0x0 genCfgKey/index =0/0
    Oct 25 08:05:45.461912 tunnelUp: skipping rtslib addTunnel for inline LNS destination.
    Oct 25 08:05:45.461927 buildL2tpLongRoutePrefix: lac long route formulated prefixLen =136
    Oct 25 08:05:45.461943 195.80.0.17.195.80.0.18.17.6.165.6.165.0.0.0.0
    Oct 25 08:05:45.461976 getL2tpCtrlRouteParams: rttId = 0, localAddr = 195.80.0.17
    Oct 25 08:05:45.462025 getL2tpCtrlRouteParams: successfully retrieved the IF route for rttId = 0, localAddr = 195.80.0.17, ifl-id = 0, nh-id = 593, rtm_nhifidx = 0, rt_flags = 0x10080, rtm_nhflags = 0x0
    Oct 25 08:05:45.462044 addCtrlDiscardRoute: getL2tpCtrlRouteParams for rttId = 0, localAddr = 195.80.0.17, requested ifl-id = 0, requested nh-id = 593, paramsRet = 1
    Oct 25 08:05:45.462119 addCtrlDiscardRoute: lac-ctrl route add succeeded for rttId = 0, localAddr = 195.80.0.17, remoteAddr = 195.80.0.18, requested ifl-id = 0, requested nh-id = 593, err = 0
    Oct 25 08:05:45.462188 addCtrlDiscardRoute: lac-discard route add succeeded for rttId = 0, localAddr = 195.80.0.17, remoteAddr = 195.80.0.18
    Oct 25 08:05:45.462211 addModifyL2tpCtrlDiscardRoute: L2tpTunnel 0xce, LocalTunnelId 0x363b, Add/Modify L2tp control discard route for peer to the ctrlDiscardRouteTable =  rttId = 0 local Addr = 195.80.0.17 remoteAddr = 195.80.0.18
    Oct 25 08:05:45.462227 checkpointMsOper: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel checkpointMsOper from c2(upTriggered) to c3(up)
    Oct 25 08:05:45.462279 setMibState: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel mibState from connecting to established
    Oct 25 08:05:45.462318 receive: received L2TP packet type icrq, from remote address 195.80.0.18, remote port  1701, for local address 195.80.0.17, local port 1701, tunnel Id 0x13883, session Id 0x0
    Oct 25 08:05:45.462338 receive: Processing incoming in-sequence icrq from 1 0x0 195.80.0.18 - controlHeader.Ns = 2, nextReceiveNs = 2
    Oct 25 08:05:45.462352 load: AVP Header: type = message, length = 8, flags = M ~H
    Oct 25 08:05:45.462366 load: AVP Header: type = callSerialNumber, length = 10, flags = M ~H
    Oct 25 08:05:45.462383 load: AVP Header: type = assignedSessionId, length = 8, flags = M ~H
    Oct 25 08:05:45.462400 createResponderSession: sessionTable.size = 2, deadSessions.size = 2
    Oct 25 08:05:45.462412 allocateLocalSessionId: got localSessionId 1045
    Oct 25 08:05:45.462494 L2tpSession: connectSpeedUpdates 0 #687
    Oct 25 08:05:45.462519 checkpointMsOper: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session checkpointMsOper from c1(connecting) to c1(connecting)
    Oct 25 08:05:45.462562 setSession: adding session id L2tpSession 0xd0, to sessionTable
    Oct 25 08:05:45.462583 incrementSessionCount: Host Profile 21CN Session Count 1
    Oct 25 08:05:45.462598 enableSession: inserted session in sessionLocalSidTable, session UID L2tpSession 0xd0, sid: 1045, size: 1
    Oct 25 08:05:45.462612 setIfOperStatus: Changing ifOperStatus from LowerLayerDown to Down
    Oct 25 08:05:45.462626 setIfOperStatus: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session ifOperStatus from LowerLayerDown to Down
    Oct 25 08:05:45.462643 run: lnsIncomingSession: state = closeDown, event = up, next state = closed
    Oct 25 08:05:45.462656 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State closeDown, exit State closed, current event up
    Oct 25 08:05:45.462670 updateAdminState: Changing effective adminState from disabled to enabled
    Oct 25 08:05:45.462692 updateAdminState: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session effective adminState from disabled to enabled
    Oct 25 08:05:45.462707 run: lnsIncomingSession: state = closed, event = open, next state = idle
    Oct 25 08:05:45.462720 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State closed, exit State idle, current event open
    Oct 25 08:05:45.462738 load: AVP Header: type = callSerialNumber, length = 10, flags = M ~H
    Oct 25 08:05:45.462752 load: AVP Header: type = assignedSessionId, length = 8, flags = M ~H
    Oct 25 08:05:45.462766 load: AVP Header: type = bearerType, length = 10, flags = M ~H
    Oct 25 08:05:45.462780 load: AVP Header: type = vendor (0x0009) type (0x0064), length = 17, flags = ~M ~H
    Oct 25 08:05:45.462798 receiveIcrq: Error in incoming icrq from 1 0x0 195.80.0.18 - invalid non-mandatory AVP (131343)
    Oct 25 08:05:45.462813 run: lnsIncomingSession: state = idle, event = icrq, next state = txIcrp
    Oct 25 08:05:45.462826 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State idle, exit State txIcrp, current event icrq
    Oct 25 08:05:45.462843 store: AVP Header: type = message, length = 8, flags = M ~H
    Oct 25 08:05:45.462856 store: AVP Header: type = assignedSessionId, length = 8, flags = M ~H
    Oct 25 08:05:45.462874 send: send L2TP packet type icrp, for remote  address 195.80.0.18, remote port 1701, from local address 195.80.0.17, local port 1701, L2tpTunnel 0xce, tunnel Id 53283, session Id 13904, Ns 1, Nr 3, re-tries 0
    Oct 25 08:05:45.462916 setMibState: Changing mibState from idle to connecting
    Oct 25 08:05:45.462935 setMibState: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session mibState from idle to connecting
    Oct 25 08:05:45.462949 run: lnsIncomingSession: state = txIcrp, event = txStarted, next state = waitConnected
    Oct 25 08:05:45.462962 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State txIcrp, exit State waitConnected, current event txStarted
    Oct 25 08:05:45.464622 receive: received L2TP packet type iccn, from remote address 195.80.0.18, remote port  1701, for local address 195.80.0.17, local port 1701, tunnel Id 0x13883, session Id 0x1045
    Oct 25 08:05:45.464648 receive: Processing incoming in-sequence iccn from 1 0x0 195.80.0.18 - controlHeader.Ns = 3, nextReceiveNs = 3
    Oct 25 08:05:45.464663 load: AVP Header: type = message, length = 8, flags = M ~H
    Oct 25 08:05:45.464678 load: AVP Header: type = connectSpeed, length = 10, flags = M ~H
    Oct 25 08:05:45.464695 load: AVP Header: type = framingType, length = 10, flags = M ~H
    Oct 25 08:05:45.464708 load: AVP Header: type = lastSentLcpConfReq, length = 16, flags = ~M ~H
    Oct 25 08:05:45.464722 load: AVP Header: type = lastReceivedLcpConfReq, length = 12, flags = ~M ~H
    Oct 25 08:05:45.464735 load: AVP Header: type = proxyAuthenId, length = 8, flags = ~M ~H
    Oct 25 08:05:45.464749 load: AVP Header: type = proxyAuthenName, length = 26, flags = ~M ~H
    Oct 25 08:05:45.464762 load: AVP Header: type = proxyAuthenResponse, length = 16, flags = ~M ~H
    Oct 25 08:05:45.464775 load: AVP Header: type = proxyAuthenType, length = 8, flags = ~M ~H
    Oct 25 08:05:45.464792 receiveIccn: Discarding proxy LCP data in incoming iccn from 1 0x0 195.80.0.18 - proxy LCP disabled
    Oct 25 08:05:45.464806 run: lnsIncomingSession: state = waitConnected, event = iccn, next state = established
    Oct 25 08:05:45.464821 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State waitConnected, exit State established, current event iccn
    Oct 25 08:05:45.464834 setIfOperStatus: Changing ifOperStatus from Down to Up
    Oct 25 08:05:45.464848 setIfOperStatus: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session ifOperStatus from Down to Up
    Oct 25 08:05:45.464867 mirrorConnectSpeedUpdateEnabled: isConnectSpeedUpdates false
    Oct 25 08:05:45.464882 checkpointMsOper: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session checkpointMsOper from c1(connecting) to c2(upTriggered)
    Oct 25 08:05:45.464939 getLnsDynamicProfileName: found tunnel group dyn profile dyn-lns-profile
    Oct 25 08:05:45.464956 sessionUp Setting the dynamic Profile dyn-lns-profile
    Oct 25 08:05:45.464968 sessionDbCreateClientLns: entered
    Oct 25 08:05:45.464981 getNextServiceInterface: Returned interface: si-1/2/0 totalRequests: 208
    Oct 25 08:05:45.464994 getPoolNextUpServiceInterface: Selected service interface: si-1/2/0 from pool: lns
    Oct 25 08:05:45.465038 sessionDbCreateClientLns: setAttribute CallingStationId not set for IFL Index P0 SessionID 1045
    Oct 25 08:05:45.465061 liblic_subs_limit_valid 682 total subs:0 state:0x0 limit valid
    Oct 25 08:05:45.465150 state:0 to index:2
    Oct 25 08:05:45.465164 sdb_summary_counter_increment: sdb counter for index:2 changed to:1
    Oct 25 08:05:45.465174 sdb_summary_counter_increment: sdb counter for index:8 changed to:1
    Oct 25 08:05:45.465184 sdb_create_extended_client_session 10525: incremented counter for state:0 for sid:208
    Oct 25 08:05:45.465194 client type:0 to index:17
    Oct 25 08:05:45.465204 sdb_summary_counter_increment: sdb counter for index:17 changed to:1
    Oct 25 08:05:45.465213 sdb_summary_counter_increment: sdb counter for index:26 changed to:1
    Oct 25 08:05:45.465223 sdb_summary_counter_increment: sdb counter for index:0 changed to:1
    Oct 25 08:05:45.465232 sdb_create_extended_client_session 10550: incremented total counter for sid:208
    Oct 25 08:05:45.465242 sdb_summary_counter_increment: sdb counter for index:1 changed to:1
    Oct 25 08:05:45.465251 sdb_create_extended_client_session 10565: incremented counter for legacy for session id 208
    Oct 25 08:05:45.465274 sessionDbCreateClientLns: Session create returned success for IFL index 0 SessionID 1045 session entry ID is 208
    Oct 25 08:05:45.465303 sessionDbCreateClientLns: pppAccessProfile l2tp-group-profile tunnel.getOperLocalAddress 195.80.0.17 tunnel.getLocalTunnelId 13883 session.getLocalSessionId 1045 tunnel.getRemoteAddress 195.80.0.18 tunnel.getRemoteTunnelId() 53283 session.getRemoteSessionId 13904 tunnel group ID 1 tunnelRttId 0 riName set is default aaaAccessProfileName set is none
    Oct 25 08:05:45.465329 instantiateDynamicProfile: profileName = dyn-lns-profile: config bits = 0x3 0 0 0 0 0
    Oct 25 08:05:45.465361 instantiateDynamicProfile: profileName = dyn-lns-profile: instantiation failed result = 107, errno = 1
    Oct 25 08:05:45.465377 sessionUp: profile Activate failed sessionId L2tpSession 0xd0
    Oct 25 08:05:45.465393 deleteSession: Unable to delete session while in use
    Oct 25 08:05:45.465406 sessionUp deleteSession Failed. Error = session in use sessionId = L2tpSession 0xd0
    Oct 25 08:05:45.465568 state:0 to index:2
    Oct 25 08:05:45.465585 sdb_summary_counter_decrement: sdb counter for index:2 changed from:1
    Oct 25 08:05:45.465595 sdb_summary_counter_decrement: sdb counter for index:8 changed from:1
    Oct 25 08:05:45.465605 sdb_remove_bundled_client_session: decremented counter for client sid:208 for state:0
    Oct 25 08:05:45.465615 client type:0 to index:17
    Oct 25 08:05:45.465625 sdb_summary_counter_decrement: sdb counter for index:17 changed from:1
    Oct 25 08:05:45.465634 sdb_summary_counter_decrement: sdb counter for index:26 changed from:1
    Oct 25 08:05:45.465644 sdb_summary_counter_decrement: sdb counter for index:0 changed from:1
    Oct 25 08:05:45.465654 sdb_remove_bundled_client_session: decremented total summary counter for sid:208
    Oct 25 08:05:45.465663 sdb_summary_counter_decrement: sdb counter for index:1 changed from:1
    Oct 25 08:05:45.465673 sdb_remove_bundled_client_session: decremented legacy summ count for client:208
    Oct 25 08:05:45.465702 sessionUp Removed SDB entry. sdbId = 208
    Oct 25 08:05:45.465717 sessionUp: l2tpProgramPic = 1: sessionType = 2: addSession  status = dynamic Profile Instantion failed
    Oct 25 08:05:45.465731 setMibState: Changing mibState from connecting to established
    Oct 25 08:05:45.465747 setMibState: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session mibState from connecting to established
    Oct 25 08:05:45.465760 run: lnsIncomingSession: state = established, event = terminate, next state = txCdnOpen
    Oct 25 08:05:45.465779 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State established, exit State txCdnOpen, current event terminate
    Oct 25 08:05:45.465799 store: AVP Header: type = message, length = 8, flags = M ~H
    Oct 25 08:05:45.465812 store: AVP Header: type = assignedSessionId, length = 8, flags = M ~H
    Oct 25 08:05:45.465825 store: AVP Header: type = resultCode, length = 10, flags = M ~H
    Oct 25 08:05:45.465844 send: send L2TP packet type cdn, for remote  address 195.80.0.18, remote port 1701, from local address 195.80.0.17, local port 1701, L2tpTunnel 0xce, tunnel Id 53283, session Id 13904, Ns 2, Nr 4, re-tries 0
    Oct 25 08:05:45.465894 recordSessionDownTime: sdbId 208, session end time 585885.514698
    Oct 25 08:05:45.465911 setIfOperStatus: Changing ifOperStatus from Up to Down
    Oct 25 08:05:45.465926 setIfOperStatus: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session ifOperStatus from Up to Down
    Oct 25 08:05:45.465943 checkpointMsOper: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session checkpointMsOper from c2(upTriggered) to c4(downTriggered)
    Oct 25 08:05:45.465996 deInstantiateDynamicProfile: sdbId = 208: L2tpSession 0xd0: profileName = dyn-lns-profile: config bits = 0xe238807f 0x2 0 0 0 0
    Oct 25 08:05:45.466029 deInstantiateDynamicProfile: sdbId = 208: L2tpSession 0xd0: profileName = dyn-lns-profile: instantion failed result = 107, errno = 1
    Oct 25 08:05:45.466045 sessionDown: dynamic profile desinstantiation failed for sdbId = 208IflInfo is NULL
    Oct 25 08:05:45.466059 sessionDown: l2tpProgramPic = 1 deleteSession returned status = normal, successful completion
    Oct 25 08:05:45.466074 checkpointMsOper: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session checkpointMsOper from c4(downTriggered) to c5(down)
    Oct 25 08:05:45.466116 setMibState: Changing mibState from established to disconnecting
    Oct 25 08:05:45.466135 setMibState: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session mibState from established to disconnecting
    Oct 25 08:05:45.466149 run: lnsIncomingSession: state = txCdnOpen, event = terminate, next state = txCdnOpen
    Oct 25 08:05:45.466162 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State txCdnOpen, exit State txCdnOpen, current event terminate
    Oct 25 08:05:45.466175 run: lnsIncomingSession: state = txCdnOpen, event = reset, next state = txCdnOpen
    Oct 25 08:05:45.466189 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State txCdnOpen, exit State txCdnOpen, current event reset
    Oct 25 08:05:45.468958 receive: received L2TP packet type zlb, from remote address 195.80.0.18, remote port  1701, for local address 195.80.0.17, local port 1701, tunnel Id 0x13883, session Id 0x0
    Oct 25 08:05:45.468980 run: lnsIncomingSession: state = txCdnOpen, event = txComplete, next state = resetIdle
    Oct 25 08:05:45.468995 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State txCdnOpen, exit State resetIdle, current event txComplete
    Oct 25 08:05:45.469009 run: lnsIncomingSession: state = resetIdle, event = reset, next state = idle
    Oct 25 08:05:45.469022 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State resetIdle, exit State idle, current event reset
    Oct 25 08:05:45.469037 disableSession : erased session from sessionLocalSidTable, session L2tpSession 0xd0, size: 0
    Oct 25 08:05:45.469051 decrementSessionCount: Host Profile 21CN Session Count 0
    Oct 25 08:05:45.469064 setMibState: Changing mibState from disconnecting to idle
    Oct 25 08:05:45.469078 setMibState: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session mibState from disconnecting to idle
    Oct 25 08:05:45.469091 run: lnsIncomingSession: state = idle, event = dying, next state = dying
    Oct 25 08:05:45.469104 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State idle, exit State dying, current event dying
    Oct 25 08:05:45.469120 checkpointMsOper: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session checkpointMsOper from c5(down) to c6(dying)
    Oct 25 08:05:45.469174 run: lnsIncomingSession: state = dying, event = dead, next state = dead
    Oct 25 08:05:45.469193 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State dying, exit State dead, current event dead
    Oct 25 08:05:45.469206 dead: starting destruct timer
    Oct 25 08:06:00.466370 receive: received L2TP packet type stopCcn, from remote address 195.80.0.18, remote port  1701, for local address 195.80.0.17, local port 1701, tunnel Id 0x13883, session Id 0x0
    Oct 25 08:06:00.466408 receive: Processing incoming in-sequence stopCcn from 1 0x0 195.80.0.18 - controlHeader.Ns = 4, nextReceiveNs = 4
    Oct 25 08:06:00.466425 load: AVP Header: type = message, length = 8, flags = M ~H
    Oct 25 08:06:00.466440 load: AVP Header: type = resultCode, length = 10, flags = M ~H
    Oct 25 08:06:00.466454 load: AVP Header: type = assignedTunnelId, length = 8, flags = M ~H
    Oct 25 08:06:00.466470 receiveStopCcn: Received stopCcn from 1 0x0 195.80.0.18 - result code = clearChannel
    Oct 25 08:06:00.466487 run: tunnel: state = established, event = stopCcn, next state = disconnecting
    Oct 25 08:06:00.466502 run: SM tunnel, L2tpTunnel 0xce, enter State established, exit State disconnecting, current event stopCcn
    Oct 25 08:06:00.466519 run: tunnelRecovery: state = idle, event = terminate, next state = idle
    Oct 25 08:06:00.466532 run: SM tunnelRecovery, L2tpTunnel 0xce, enter State idle, exit State idle, current event terminate
    Oct 25 08:06:00.466547 setIfOperStatus: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel ifOperStatus from Up to Down
    Oct 25 08:06:00.466566 checkpointMsOper: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel checkpointMsOper from c3(up) to c4(downTriggered)
    Oct 25 08:06:00.466652 tunnelDown: skipping rtslib deleteTunnel for inline LNS destination.
    Oct 25 08:06:00.466673 buildL2tpLongRoutePrefix: lac long route formulated prefixLen =136
    Oct 25 08:06:00.466693 195.80.0.17.195.80.0.18.17.6.165.6.165.0.0.0.0
    Oct 25 08:06:00.466770 deleteCtrlDiscardRoute: lac-ctrl route delete succeeded for rttId = 0, localAddr = 195.80.0.17, remoteAddr = 0x195.80.0.18, err = 0
    Oct 25 08:06:00.466826 deleteCtrlDiscardRoute: lac-discard route delete succeeded for rttId = 0, localAddr = 195.80.0.17, remoteAddr = 195.80.0.18, err = 0
    Oct 25 08:06:00.466846 checkpointMsOper: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel checkpointMsOper from c4(downTriggered) to c5(down)
    Oct 25 08:06:00.466955 addModifySfTunnelInfo: returning err = 0
    Oct 25 08:06:00.466981 deleteTunnelInfo: error = 0 No error: 0 genCfgKey/index = 0x0/0x0 genCfgKey/index =0/0
    Oct 25 08:06:00.466998 setMibState: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel mibState from established to disconnecting
    Oct 25 08:06:00.467014 removePrivateData: sdb_remove_app_defined_data for sdb table type tunnel, rx remote host name, uid L2tpTunnel 0xce
    Oct 25 08:06:00.467068 removePrivateData: getSdbTableType failed, uidL2tpTunnel 0xce #16435
    Oct 25 08:06:00.467088 removePrivateData: sdb_remove_app_defined_data for sdb table type tunnel, rx remote vendor name, uid L2tpTunnel 0xce
    Oct 25 08:06:00.467133 removePrivateData: getSdbTableType failed, uidL2tpTunnel 0xce #16435
    Oct 25 08:06:00.467194 sendZLB: send L2TP packet type zlb, for remote  address 195.80.0.18, remote port 1701, from local address 195.80.0.17, local port 1701, L2tpTunnel 0xce, tunnel Id 53283, session Id 0, Ns 3, Nr 5
    Oct 25 08:06:31.512530 run: tunnel: state = disconnecting, event = controlChannelDrained, next state = idle
    Oct 25 08:06:31.512582 run: SM tunnel, L2tpTunnel 0xce, enter State disconnecting, exit State idle, current event controlChannelDrained
    Oct 25 08:06:31.512610 checkpointMsOper: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel checkpointMsOper from c5(down) to c6(dying)
    Oct 25 08:06:31.512700 setMibState: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel mibState from disconnecting to idle
    Oct 25 08:06:31.512720 run: tunnel: state = idle, event = dying, next state = dying
    Oct 25 08:06:31.512744 run: SM tunnel, L2tpTunnel 0xce, enter State idle, exit State dying, current event dying
    Oct 25 08:07:37.637927 load: AVP Header: type = message, length = 8, flags = M ~H
    Oct 25 08:07:37.637959 load: AVP Header: type = protocolVersion, length = 8, flags = M ~H
    Oct 25 08:07:37.637973 load: AVP Header: type = firmwareRevision, length = 8, flags = ~M ~H
    Oct 25 08:07:37.637986 load: AVP Header: type = hostName, length = 10, flags = M ~H
    Oct 25 08:07:37.637999 load: AVP Header: type = vendorName, length = 25, flags = ~M ~H
    Oct 25 08:07:37.638012 load: AVP Header: type = receiveWindowSize, length = 8, flags = M ~H
    Oct 25 08:07:37.638025 load: AVP Header: type = challenge, length = 22, flags = M ~H
    Oct 25 08:07:37.638037 load: AVP Header: type = assignedTunnelId, length = 8, flags = M ~H
    Oct 25 08:07:37.638052 load: AVP Header: type = message, length = 8, flags = M ~H
    Oct 25 08:07:37.638064 load: AVP Header: type = protocolVersion, length = 8, flags = M ~H
    Oct 25 08:07:37.638077 load: AVP Header: type = firmwareRevision, length = 8, flags = ~M ~H
    Oct 25 08:07:37.638089 load: AVP Header: type = hostName, length = 10, flags = M ~H
    Oct 25 08:07:37.638102 load: AVP Header: type = vendorName, length = 25, flags = ~M ~H
    Oct 25 08:07:37.638114 load: AVP Header: type = receiveWindowSize, length = 8, flags = M ~H
    Oct 25 08:07:37.638126 load: AVP Header: type = challenge, length = 22, flags = M ~H
    Oct 25 08:07:37.638139 load: AVP Header: type = assignedTunnelId, length = 8, flags = M ~H
    Oct 25 08:07:37.638151 load: AVP Header: type = framingCapabilities, length = 10, flags = M ~H
    Oct 25 08:07:37.638163 load: AVP Header: type = bearerCapabilities, length = 10, flags = M ~H
    Oct 25 08:07:37.638177 load: AVP Header: type = vendor (0x0009) type (0x006e), length = 6, flags = ~M ~H
    Oct 25 08:07:37.638196 receive: Creating dynamic tunnel for incoming sccrq from 1 0x0 195.80.0.18 - attempt to start already existing tunnel



  • 14.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-25-2017 03:05

    While trying to troubleshoot this myself, I notice the following line on the Cisco 1841 LAC debug output:

     

     Se0/1/0 Tnl/Sn 37415/13964 L2TP: disconnect (L2X) IETF: 9/nas-error Ascend: 62/VPDN No Resources

     

    The "VPDN No Resources" part causes the session to go down, which in turn, I think, tears down the tunnel. From what I have read, it could be that, like most tunnels, there is requirement to account for the overhead of extra headers.... so therefore should the MSS/MTU size be altered? For example, make it 1460 instead of 1500 default?

     

    Thanks



  • 15.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-25-2017 07:16

    Hi, 

     

    Going through the logs I noticed the dynamic profile instantiation is failing:

    Oct 25 08:05:45.464956 sessionUp Setting the dynamic Profile dyn-lns-profile
    Oct 25 08:05:45.465329 instantiateDynamicProfile: profileName = dyn-lns-profile: config bits = 0x3 0 0 0 0 0
    Oct 25 08:05:45.465361 instantiateDynamicProfile: profileName = dyn-lns-profile: instantiation failed result = 107, errno = 1
    Oct 25 08:05:45.465717 sessionUp: l2tpProgramPic = 1: sessionType = 2: addSession  status = dynamic Profile Instantion failed
    Oct 25 08:05:45.465996 deInstantiateDynamicProfile: sdbId = 208: L2tpSession 0xd0: profileName = dyn-lns-profile: config bits = 0xe238807f 0x2 0 0 0 0
    Oct 25 08:05:45.466029 deInstantiateDynamicProfile: sdbId = 208: L2tpSession 0xd0: profileName = dyn-lns-profile: instantion failed result = 107, errno = 1
    Oct 25 08:05:45.466045 sessionDown: dynamic profile desinstantiation failed for sdbId = 208IflInfo is NULL

    After which the LNS is sending CDN [Call Disconnect Notify] and the session is teared down and eventually I assume the LAC disconnects the tunnel [StopCCN]:

    Spoiler
    Oct 25 08:05:45.462519 checkpointMsOper: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session checkpointMsOper from c1(connecting) to c1(connecting)
    Oct 25 08:05:45.462562 setSession: adding session id L2tpSession 0xd0, to sessionTable
    Oct 25 08:05:45.462598 enableSession: inserted session in sessionLocalSidTable, session UID L2tpSession 0xd0, sid: 1045, size: 1
    Oct 25 08:05:45.462626 setIfOperStatus: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session ifOperStatus from LowerLayerDown to Down
    Oct 25 08:05:45.462656 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State closeDown, exit State closed, current event up
    Oct 25 08:05:45.462692 updateAdminState: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session effective adminState from disabled to enabled
    Oct 25 08:05:45.462720 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State closed, exit State idle, current event open
    Oct 25 08:05:45.462826 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State idle, exit State txIcrp, current event icrq
    Oct 25 08:05:45.462935 setMibState: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session mibState from idle to connecting
    Oct 25 08:05:45.462962 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State txIcrp, exit State waitConnected, current event txStarted
    Oct 25 08:05:45.464821 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State waitConnected, exit State established, current event iccn
    Oct 25 08:05:45.464848 setIfOperStatus: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session ifOperStatus from Down to Up
    Oct 25 08:05:45.464882 checkpointMsOper: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session checkpointMsOper from c1(connecting) to c2(upTriggered)
    Oct 25 08:05:45.464956 sessionUp Setting the dynamic Profile dyn-lns-profile
    Oct 25 08:05:45.465329 instantiateDynamicProfile: profileName = dyn-lns-profile: config bits = 0x3 0 0 0 0 0
    Oct 25 08:05:45.465361 instantiateDynamicProfile: profileName = dyn-lns-profile: instantiation failed result = 107, errno = 1
    Oct 25 08:05:45.465377 sessionUp: profile Activate failed sessionId L2tpSession 0xd0
    Oct 25 08:05:45.465406 sessionUp deleteSession Failed. Error = session in use sessionId = L2tpSession 0xd0
    Oct 25 08:05:45.465717 sessionUp: l2tpProgramPic = 1: sessionType = 2: addSession status = dynamic Profile Instantion failed
    Oct 25 08:05:45.465747 setMibState: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session mibState from connecting to established
    Oct 25 08:05:45.465779 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State established, exit State txCdnOpen, current event terminate
    Oct 25 08:05:45.465926 setIfOperStatus: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session ifOperStatus from Up to Down
    Oct 25 08:05:45.465943 checkpointMsOper: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session checkpointMsOper from c2(upTriggered) to c4(downTriggered)
    Oct 25 08:05:45.465996 deInstantiateDynamicProfile: sdbId = 208: L2tpSession 0xd0: profileName = dyn-lns-profile: config bits = 0xe238807f 0x2 0 0 0 0
    Oct 25 08:05:45.466029 deInstantiateDynamicProfile: sdbId = 208: L2tpSession 0xd0: profileName = dyn-lns-profile: instantion failed result = 107, errno = 1
    Oct 25 08:05:45.466045 sessionDown: dynamic profile desinstantiation failed for sdbId = 208IflInfo is NULL
    Oct 25 08:05:45.466074 checkpointMsOper: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session checkpointMsOper from c4(downTriggered) to c5(down)
    Oct 25 08:05:45.466135 setMibState: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session mibState from established to disconnecting
    Oct 25 08:05:45.466162 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State txCdnOpen, exit State txCdnOpen, current event terminate
    Oct 25 08:05:45.466189 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State txCdnOpen, exit State txCdnOpen, current event reset
    Oct 25 08:05:45.468995 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State txCdnOpen, exit State resetIdle, current event txComplete
    Oct 25 08:05:45.469022 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State resetIdle, exit State idle, current event reset
    Oct 25 08:05:45.469037 disableSession : erased session from sessionLocalSidTable, session L2tpSession 0xd0, size: 0
    Oct 25 08:05:45.469078 setMibState: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session mibState from disconnecting to idle
    Oct 25 08:05:45.469104 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State idle, exit State dying, current event dying
    Oct 25 08:05:45.469120 checkpointMsOper: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session checkpointMsOper from c5(down) to c6(dying)
    Oct 25 08:05:45.469193 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State dying, exit State dead, current event dead

    Oct 25 08:05:45.465844 send: send L2TP packet type cdn, for remote address 195.80.0.18, remote port 1701, from local address 195.80.0.17, local port 1701, L2tpTunnel 0xce, tunnel Id 53283, session Id 13904, Ns 2, Nr 4, re-tries 0
    Oct 25 08:05:45.468958 receive: received L2TP packet type zlb, from remote address 195.80.0.18, remote port 1701, for local address 195.80.0.17, local port 1701, tunnel Id 0x13883, session Id 0x0
    Oct 25 08:06:00.466370 receive: received L2TP packet type stopCcn, from remote address 195.80.0.18, remote port 1701, for local address 195.80.0.17, local port 1701, tunnel Id 0x13883, session Id 0x0
    Oct 25 08:06:00.466408 receive: Processing incoming in-sequence stopCcn from 1 0x0 195.80.0.18 - controlHeader.Ns = 4, nextReceiveNs = 4
    Oct 25 08:06:00.466470 receiveStopCcn: Received stopCcn from 1 0x0 195.80.0.18 - result code = clearChannel
    Oct 25 08:06:00.466487 run: tunnel: state = established, event = stopCcn, next state = disconnecting
    Oct 25 08:06:00.466502 run: SM tunnel, L2tpTunnel 0xce, enter State established, exit State disconnecting, current event stopCcn

    Although am not sure this will help, could you try adding the gateway-name to the l2tp tunnel-group as per below:

    https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/gateway-name-edit-services-l2tp-tunnel-group.html

     

    Could you also take a packet capture on the incoming/outgoing interface for the l2tp packets to try debug:

    monitor traffic interface x/x/x matching "udp port 1701" detail

    Cheers,

    Ashvin

     

     



  • 16.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-25-2017 08:41

    Hi Ashvin,

     

    I noticed that too....

     

    On the Cisco 1841 LAC the following is configured:

    vpdn enable
    vpdn search-order domain
    !
    vpdn-group TESTNETWORK
     request-dialin
      protocol l2tp
      domain network.com
     initiate-to ip 195.80.0.17
     local name 21CN
     l2tp tunnel password 0 testing123

     

    So, you are after the "initiate-to ip" section. That is configured already on the LNS, only not as the name but as such:

     

    set services l2tp tunnel-group LAC local-gateway address 195.80.0.17

     

    I'm guessing that the IP address of the peers is all that is required? These addresses are the physical interface addresses... so, on the Juniper LNS that is ge-1/3/1 and on the Cisco, it is fa0/0.... Okay, there may be one other issue causing a problem, but I do not think it is or the tunnel would not be established..... I have one switch that is gig capable but it is being used like a hub, as the 1841 is only 100mb.... so, the 1841 LAC connects to a Cisco 3560 which connects to the Juniper. As the Juniper is ONLY gig capable then I have to do it like this.

     

    I will get the port monitoring informaiton for you ASAP.

     

    Thanks

     



  • 17.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-25-2017 08:50

    Output of port monitoring to the "StopCCN" AVP:

     

    15:49:48.674305  In IP (tos 0xc0, ttl 255, id 0, offset 0, flags [none], proto: UDP (17), length: 163) 195.80.0.18.l2f > 195.80.0.17.l2f:  l2tp:[TLS](0/0)Ns=0,Nr=0 *MSGTYPE(SCCRQ) *PROTO_VER(1.0) FIRM_VER(4400) *HOST_NAME(21CN) VENDOR_NAME(Cisco Systems, Inc.) *RECV_WIN_SIZE(1200) *CHALLENGE(b14b79a47344ac7da66c164eebbc5c1e) *ASSND_TUN_ID(33254) *FRAMING_CAP() *BEARER_CAP() vendor=0009 AVP-#110
    15:49:48.675784 Out IP (tos 0xe0, ttl  64, id 48310, offset 0, flags [none], proto: UDP (17), length: 178) 195.80.0.17.l2f > 195.80.0.18.l2f:  l2tp:[TLS](33254/0)Ns=0,Nr=1 *MSGTYPE(SCCRP) *PROTO_VER(1.0) *HOST_NAME(THW-LNS-01) *FRAMING_CAP(S) *ASSND_TUN_ID(13636) *CHALLENGE(328f750231391ad23ef351a862572a5e577ec34bfa121958d9) *CHALLENGE_RESP(02731823144315d3117286a12a3e19df) FIRM_VER(1) VENDOR_NAME(Juniper Networks, Inc)
    15:49:48.684905  In IP (tos 0xc0, ttl 255, id 1, offset 0, flags [none], proto: UDP (17), length: 70) 195.80.0.18.l2f > 195.80.0.17.l2f:  l2tp:[TLS](13636/0)Ns=1,Nr=1 *MSGTYPE(SCCCN) *CHALLENGE_RESP(73a73b77d04ad55cc974f8cb2d2f5692)
    15:49:48.688045  In IP (tos 0xc0, ttl 255, id 2, offset 0, flags [none], proto: UDP (17), length: 93) 195.80.0.18.l2f > 195.80.0.17.l2f:  l2tp:[TLS](13636/0)Ns=2,Nr=1 *MSGTYPE(ICRQ) *CALL_SER_NUM(2074000373) *ASSND_SESS_ID(14910) *BEARER_TYPE(A) vendor=0009 AVP-#100 53657269616c302f312f30
    15:49:48.688710 Out IP (tos 0xe0, ttl  64, id 48313, offset 0, flags [none], proto: UDP (17), length: 56) 195.80.0.17.l2f > 195.80.0.18.l2f:  l2tp:[TLS](33254/14910)Ns=1,Nr=3 *MSGTYPE(ICRP) *ASSND_SESS_ID(15735)
    15:49:48.697449  In IP (tos 0xc0, ttl 255, id 3, offset 0, flags [none], proto: UDP (17), length: 154) 195.80.0.18.l2f > 195.80.0.17.l2f:  l2tp:[TLS](13636/15735)Ns=3,Nr=2 *MSGTYPE(ICCN) *TX_CONN_SPEED(1544000) *FRAMING_TYPE(S) LAST_SENT_LCP(0304c023050632c79839) LAST_RECV_LCP(05062fa262fa) PROXY_AUTH_ID(232) PROXY_AUTH_NAME(7465737475736572406e6574776f726b2e636f6d) PROXY_AUTH_RESP(74657374696e67313233) PROXY_AUTH_TYPE(PAP)
    15:49:48.698802 Out IP (tos 0xe0, ttl  64, id 48316, offset 0, flags [none], proto: UDP (17), length: 66) 195.80.0.17.l2f > 195.80.0.18.l2f:  l2tp:[TLS](33254/14910)Ns=2,Nr=4 *MSGTYPE(CDN) *ASSND_SESS_ID(15735) *RESULT_CODE(4/6)
    15:49:48.702823  In IP (tos 0xc0, ttl 255, id 4, offset 0, flags [none], proto: UDP (17), length: 40) 195.80.0.18.l2f > 195.80.0.17.l2f:  l2tp:[TLS](13636/0)Ns=4,Nr=3 ZLB
    ^C



  • 18.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-25-2017 09:58

    L2TP phase look clean. profile initiation is getting fail for some reason.

    Now it's time to check ppp-service and authd logs. Please enable versioning and collect ppp-service and authd logs.

    LNS# show system dynamic-profile-options
    versioning;

    1. Deactivate dynamic-profile

    2. Activate versioning

    3. Activate dynamic-profile.

    By default, MTU negotiated is 1492.

     

    LNS# show protocols ppp-service
    traceoptions {
        file jpppd size 800m files 15;
        level all;
        flag all;
    }

    LNS# show system processes general-authentication-service
    traceoptions {
        file authd size 1000m files 10;
        flag radius;
        flag all;
    }



  • 19.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 00:55

    Hi,

    I will get that information for you ASAP.

     

    Just as a little side note. The wireshark trace shows the CDN reason as: 

     

    AVP Type: Result-Error code (1)

    Result code: Appropriate facilities unavailable (temporary condition) (4)

    Error code: A generic vendor-specific error occurred (6)


    And when looking at the result codes on the following site : https://tools.ietf.org/html/rfc3145

    it shows that code 6 means the following:  

    No recognizable LCP packets were received

     

    So, it seems this is the cause of the disconnect, but have to figure out "Why"  🙂

     

    Thank you....



  • 20.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 01:39

    Please provide the logs. It will help to understand whether it is failing in LCP/NCP phase.

    Did you enabled versioning?



  • 21.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 02:54

    Hi,

     

    Thank you again....

     

    Log file jpppd:

    Clive@THW-LNS-01# run show log jpppd
    Oct 26 09:41:41 Options: level: 0x00000005, flag_all: 0xffffffff, syslog: 0x0000
    Oct 26 09:41:41 Options: default: /var/log/jpppd, name: /var/log/jpppd
    Oct 26 09:41:41.390993 readGroupProfiles
    Oct 26 09:41:41.391037 readGroupProfiles: cannot get the access node for configuration read
    Oct 26 09:41:41.391065 extractServiceDevicePool: no service device pool configuration read, isConfigUpdate: true
    Oct 26 09:41:41.391080 processServiceDevicePoolConfig: entered
    Oct 26 09:41:41.391092 deleteAllServiceDevicePools: Deleted all service pools
    Oct 26 09:41:41.391104 purgeServiceDevicePoolConfig: entered
    Oct 26 09:41:41.391130 handleConfigChange: rts writes removal performance boost enabled
    Oct 26 09:41:41.391152 handleConfigChange: unable to read DNS group profile
    Oct 26 09:41:41.391174 handleConfigChange: Delay NCP open for activation of family services enabled
    Oct 26 09:41:41.391196 handleConfigChange: System level on-demand-ip-address: disabled
    Oct 26 09:41:41.391217 handleConfigChange: System level reject-unauthorized-ip6cp: disabled
    Oct 26 09:41:41.391238 handleConfigChange: Enforce RFC 2516 MUST requirements for FCS, ACFC and ACCMdisabled
    Oct 26 09:41:41.391787 dynProfileOpenDaxSchema ddax_open_db succeeded
    Oct 26 09:41:41.391808 handleConfigChange: sdb api trace enabled
    Oct 26 09:41:41.391820 handleConfigChange: authd api trace enabled
    Oct 26 09:41:41.391831 handleConfigChange: profile api trace enabled
    Oct 26 09:41:41.391844 handleConfigChange: libstats api trace enabled
    Oct 26 09:41:41.391855 handleConfigChange: Tunneling PCL trace enabled
    Oct 26 09:41:41.391866 handleConfigChange: PPPoE PCL trace enabled

     

    I will try and attach the Auth log file but it is large..... not sure if it will let me.....

     

    There was no option to activate "Versioning".... under "activate" it was not there... 😞

     



  • 22.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 02:57

    Hi,

     

    I am sorry, again, it would not let me post with an attachment.... here is the, rather lengthy, authd log file output.. My apologies:

     

    Oct 26 09:42:59.922782 authd_config_read: old seq 58 and new one 59
    Oct 26 09:42:59.922873  Termintate-code: no configuration
    Oct 26 09:42:59.922896 host-name changed in system config
    Oct 26 09:42:59.922922 Extensible Services mode turned OFF
    Oct 26 09:42:59.922942  accounting-backup-options: no configuration
    Oct 26 09:42:59.922953 AaaService::configRead
    Oct 26 09:42:59.922962 AaaService::configReadAccess
    Oct 26 09:42:59.922994 lookForTheMissing callback: default:default
    Oct 26 09:42:59.923030 Config changed for a AaaService
    Oct 26 09:42:59.923042 Config changed for routing context default:default
    Oct 26 09:42:59.923071 Duplicate Address Protection disabled for routing context default:default
    Oct 26 09:42:59.923112 Config changed for pool POOL
    Oct 26 09:42:59.923136 Updating pool POOL, network 192.168.1.0/24
    Oct 26 09:42:59.923151 xauthAttrsSet: start
    Oct 26 09:42:59.923162 xauthAttrsSet: xauth does not be configed
    Oct 26 09:42:59.923184 Config changed for range lns
    Oct 26 09:42:59.923206 Deleting all hosts in pool POOL
    Oct 26 09:42:59.923235 Domain-map config changed. Routing context:default:default
    Oct 26 09:42:59.923248 Domain-map config deleted. Routing context:default:default
    Oct 26 09:42:59.923280 configReadTunnelSwitchProfiles: no tunnel-switch profiles configured
    Oct 26 09:42:59.923293 AaaService::configReadAaaAttachment
    Oct 26 09:42:59.923303 delVrfTable: deleting vrf table
    Oct 26 09:42:59.923434 addVrfEntry: Added VRF to table default; 0
    Oct 26 09:42:59.923451 Config deleted for AAA routing context default:default
    Oct 26 09:42:59.923477 Config deleted for AAA routing context default:default
    Oct 26 09:42:59.923499 Config deleted for AAA routing context default:default
    Oct 26 09:42:59.923539 Clearing rule list
    Oct 26 09:42:59.923554 Clearing rule list
    Oct 26 09:42:59.923566 Adding rule External-Authority for client jdhcpd-client
    Oct 26 09:42:59.923577 Adding rule Network-Match for client jdhcpd-client
    Oct 26 09:42:59.923587 Adding rule External-Authority for client jdhcpd-test-client
    Oct 26 09:42:59.923598 Adding rule Network-Match for client jdhcpd-test-client
    Oct 26 09:42:59.923628 authd_access_server_read: Reading Configuration for access
    Oct 26 09:42:59.923639 authd_access_server_free: Deleting Configuration 954c6a4
    Oct 26 09:42:59.923655 authd_access_profile_pending_acct_data_cache:Access profile unint
     exit: PendAPTable empty = 1
    Oct 26 09:42:59.923681 authd_check_and_send_acct_off: Not sending ACCT-OFF for profile: l2tp-profile, as send_acct_status_on_config_change flag not enabled.
    Oct 26 09:42:59.923695 Deleting RADIUS request queue for profile: l2tp-profile
    Oct 26 09:42:59.923704 disable RADIUS request queue disabled for profile: l2tp-profile
    Oct 26 09:42:59.923719 authd_access_server_free: Deleting Configuration 9e79dd4
    Oct 26 09:42:59.923740 authd_check_and_send_acct_off: Not sending ACCT-OFF for profile: none, as send_acct_status_on_config_change flag not enabled.
    Oct 26 09:42:59.923752 Deleting RADIUS request queue for profile: none
    Oct 26 09:42:59.923762 disable RADIUS request queue disabled for profile: none
    Oct 26 09:42:59.923773 authd_access_server_free: Deleting Configuration 9e7a2d4
    Oct 26 09:42:59.923791 authorization order called
    Oct 26 09:42:59.923801 provisioning order called
    Oct 26 09:42:59.923811 read accounting configurations
    Oct 26 09:42:59.923825 Acc-order is NOT configured
    Oct 26 09:42:59.923839 Accounting option: accounting-stop-on-failure NOT configured
    Oct 26 09:42:59.923852 Accounting option: accounting-stop-on-deny NOT configured
    Oct 26 09:42:59.923864 Accounting option: immediate-update NOT configured
    Oct 26 09:42:59.923876 Accounting option: acc_wait_for_acct_on_ack NOT configured
    Oct 26 09:42:59.923889 Accounting option: send_acct_status_on_config_change NOT configured
    Oct 26 09:42:59.923905 Accounting option: ancp_speed_change_immediate_update NOT configured
    Oct 26 09:42:59.923916  Accounting Interval not configured
    Oct 26 09:42:59.923926  Accounting Interval not configured
    Oct 26 09:42:59.923938 Accounting option: duplication NOT configured
    Oct 26 09:42:59.923951 Accounting option: duplication filter is not configured
    Oct 26 09:42:59.924000 Accounting option: duplication-vrf NOT configured
    Oct 26 09:42:59.924015  Service acct-order not configured
    Oct 26 09:42:59.924028 Service acct-stats-type not configured
    Oct 26 09:42:59.924038 Service acct-interval not configured
    Oct 26 09:42:59.924053  Accounting coa-no-override not configured
    Oct 26 09:42:59.924063 address-assignment pool called
    Oct 26 09:42:59.924072 authd_config_read_addralloc_options: not config address-assignment pool
    Oct 26 09:42:59.924081 authd_config_read_radius_attributes radius stanza not cfg under profile:d012dca4
    Oct 26 09:42:59.924091 authd_access_server_read: Reading Configuration for profile
    Oct 26 09:42:59.924100 authd_access_server_free: Deleting Configuration 9e79dd4
    Oct 26 09:42:59.924110 authd_access_profile_config_read_params l2tp-profile status 1
    Oct 26 09:42:59.924121 Creating RADIUS request queue for profile: l2tp-profile
    Oct 26 09:42:59.924140 got authentication order value 5
    Oct 26 09:42:59.924152 authorization order called
    Oct 26 09:42:59.924161 provisioning order called
    Oct 26 09:42:59.924170 read accounting configurations
    Oct 26 09:42:59.924183 Acc-order is NOT configured
    Oct 26 09:42:59.924196 Accounting option: accounting-stop-on-failure NOT configured
    Oct 26 09:42:59.924209 Accounting option: accounting-stop-on-deny NOT configured
    Oct 26 09:42:59.924222 Accounting option: immediate-update NOT configured
    Oct 26 09:42:59.924234 Accounting option: acc_wait_for_acct_on_ack NOT configured
    Oct 26 09:42:59.924246 Accounting option: send_acct_status_on_config_change NOT configured
    Oct 26 09:42:59.924262 Accounting option: ancp_speed_change_immediate_update NOT configured
    Oct 26 09:42:59.924273  Accounting Interval not configured
    Oct 26 09:42:59.924284  Accounting Interval not configured
    Oct 26 09:42:59.924295 Accounting option: duplication NOT configured
    Oct 26 09:42:59.924309 Accounting option: duplication filter is not configured
    Oct 26 09:42:59.924322 Accounting option: duplication-vrf NOT configured
    Oct 26 09:42:59.924337  Service acct-order not configured
    Oct 26 09:42:59.924350 Service acct-stats-type not configured
    Oct 26 09:42:59.924361 Service acct-interval not configured
    Oct 26 09:42:59.924375  Accounting coa-no-override not configured
    Oct 26 09:42:59.924385 address-assignment pool called
    Oct 26 09:42:59.924394 authd_config_read_addralloc_options: not config address-assignment pool
    Oct 26 09:42:59.924403 authd_config_read_radius_attributes radius stanza not cfg under profile:d012e524
    Oct 26 09:42:59.924412 authd_access_server_read: Reading Configuration for profile
    Oct 26 09:42:59.924421 authd_access_server_free: Deleting Configuration 9e7a2d4
    Oct 26 09:42:59.924431 authd_access_profile_config_read_params none status 1
    Oct 26 09:42:59.924442 Creating RADIUS request queue for profile: none
    Oct 26 09:42:59.924454 Dumping Profile l2tp-profile
    Oct 26 09:42:59.924463 Auth order count=1, order = 1 0
    Oct 26 09:42:59.924472 Accounting Options: Accounting Order=0, stop_on_aaa_fail=0, stop_on_access_deny=0, immediate_update=0, coa_immediate_update=0, address_change_immediate_update=0, interval=0, stat_type=1, dup_en=0
    Oct 26 09:42:59.924482 Session Options: groups_len=0, idle_timeout=0, session_timeout=0
    Oct 26 09:42:59.924491 Client name filter: domain=[], count=0, separator=@
    Oct 26 09:42:59.924500 Dumping Profile none
    Oct 26 09:42:59.924508 Auth order count=1, order = 5 0
    Oct 26 09:42:59.924517 Accounting Options: Accounting Order=0, stop_on_aaa_fail=0, stop_on_access_deny=0, immediate_update=0, coa_immediate_update=0, address_change_immediate_update=0, interval=0, stat_type=1, dup_en=0
    Oct 26 09:42:59.924527 Session Options: groups_len=0, idle_timeout=0, session_timeout=0
    Oct 26 09:42:59.924536 Client name filter: domain=[], count=0, separator=@
    Oct 26 09:42:59.924548 authd_radius_module_config_init: result=SUCCESS
    Oct 26 09:42:59.924565 authd_read_profiles_radius_callback: Read radius server under [access profile l2tp-profile]
    Oct 26 09:42:59.924579 authd_read_profiles_radius_callback: Read radius server under [access profile none]
    Oct 26 09:42:59.924600 Got the profile name:l2tp-profile
    Oct 26 09:42:59.924611 No Radius options configured for the profile: l2tp-profile
    Oct 26 09:42:59.929652 Cleanup ignore list for profile:l2tp-profile for all msg-types
    Oct 26 09:42:59.929692 Cleanup exclude list for profile:l2tp-profile for all msg-types
    Oct 26 09:42:59.929736 Got the profile name:none
    Oct 26 09:42:59.929749 No Radius options configured for the profile: none
    Oct 26 09:42:59.929758 Cleanup ignore list for profile:none for all msg-types
    Oct 26 09:42:59.929777 Cleanup exclude list for profile:none for all msg-types
    Oct 26 09:42:59.929807 Dumping Access radius config -----------

    Oct 26 09:42:59.929820 Radius options options-at-default=1
    Oct 26 09:42:59.929828 Radius options revert-interval=60 request-rate=500
    Oct 26 09:42:59.929837 Radius options access-loop-id-local=0 ether-port-type-virtual=0 ether_port_type_override=15 if-desc-format-sub-if=0 if-desc-format-adapter=0 acct-session-id-format=0 vlan-nas-port-stacked-format=0 override-nas-info=0 nas-identifier=
    Oct 26 09:42:59.929847 Radius options nas-port-id-delimiter="#" nas-port-id-format NID=0 IID=0 ACI=0 ARI=0
    Oct 26 09:42:59.929856 Radius options calling-station-id-delimiter="#" calling-station-id-format NID=0 IID=0 ACI=0 ARI=0 MAC=0 ALIAS=0 SVLAN=0 VLAN=0
    Oct 26 09:42:59.929866 Radius options remote-circuit-id-delimiter="#" remote-circuit-id-format ACI=0 ARI=0 remote-circuit-id-override-CSI=0, remote-circuit-id-fallback=0
    Oct 26 09:42:59.929875 Radius options Unique-NAS-port=0 Unique-NAS-Port-chassis-id=0 Unique-NAS-Port-chassis-id-width=0
    Oct 26 09:42:59.929884 Radius options NAS-port-extended-format ae-width= 0 slot-width=0 adapter_width=0 port_width=0 pw_width=0 svlan_width=0 vlan_width=0 coa_dynamic_variable_validation=0
    Oct 26 09:42:59.929894 Radius options NAS-port-extended-format atm slot-width=0 adapter_width=0 port_width=0 vpi_width=0 vci_width=0
    Oct 26 09:42:59.929903 Radius options client_auth_algorithm=0 client_acct_algorithm=0 juniper_dsl_attributes=0
    Oct 26 09:42:59.929912 Radius options ip_address_change_notify=0 ip_address_change_notify_msg=
    Oct 26 09:42:59.929920 Radius options timeout_grace=10
    Oct 26 09:42:59.929928 Radius options extensible_service_required_at_login=FALSE
    Oct 26 09:42:59.929936 Radius options dynamic_profile_service_required_at_login=TRUE
    Oct 26 09:42:59.929945 Radius options no-radius-queues=0 no-max-outstanding=0
    Oct 26 09:42:59.929953 Done  -----------

    Oct 26 09:42:59.929964 Dumping l2tp-profile radius servers -----------

    Oct 26 09:42:59.929975 Radius options options-at-default=1
    Oct 26 09:42:59.929983 Radius options revert-interval=60 request-rate=500
    Oct 26 09:42:59.929991 Radius options access-loop-id-local=0 ether-port-type-virtual=0 ether_port_type_override=15 if-desc-format-sub-if=0 if-desc-format-adapter=0 acct-session-id-format=0 vlan-nas-port-stacked-format=0 override-nas-info=0 nas-identifier=
    Oct 26 09:42:59.930001 Radius options nas-port-id-delimiter="#" nas-port-id-format NID=0 IID=0 ACI=0 ARI=0
    Oct 26 09:42:59.930010 Radius options calling-station-id-delimiter="#" calling-station-id-format NID=0 IID=0 ACI=0 ARI=0 MAC=0 ALIAS=0 SVLAN=0 VLAN=0
    Oct 26 09:42:59.930020 Radius options remote-circuit-id-delimiter="#" remote-circuit-id-format ACI=0 ARI=0 remote-circuit-id-override-CSI=0, remote-circuit-id-fallback=0
    Oct 26 09:42:59.930030 Radius options Unique-NAS-port=0 Unique-NAS-Port-chassis-id=0 Unique-NAS-Port-chassis-id-width=0
    Oct 26 09:42:59.930038 Radius options NAS-port-extended-format ae-width= 0 slot-width=0 adapter_width=0 port_width=0 pw_width=0 svlan_width=0 vlan_width=0 coa_dynamic_variable_validation=0
    Oct 26 09:42:59.930048 Radius options NAS-port-extended-format atm slot-width=0 adapter_width=0 port_width=0 vpi_width=0 vci_width=0
    Oct 26 09:42:59.930057 Radius options client_auth_algorithm=0 client_acct_algorithm=0 juniper_dsl_attributes=0
    Oct 26 09:42:59.930066 Radius options ip_address_change_notify=0 ip_address_change_notify_msg=
    Oct 26 09:42:59.930074 Radius options timeout_grace=10
    Oct 26 09:42:59.930082 Radius options extensible_service_required_at_login=FALSE
    Oct 26 09:42:59.930095 Radius options dynamic_profile_service_required_at_login=TRUE
    Oct 26 09:42:59.930104 Done -----------

    Oct 26 09:42:59.930115 Dumping none radius servers -----------

    Oct 26 09:42:59.930125 Radius options options-at-default=1
    Oct 26 09:42:59.930134 Radius options revert-interval=60 request-rate=500
    Oct 26 09:42:59.930142 Radius options access-loop-id-local=0 ether-port-type-virtual=0 ether_port_type_override=15 if-desc-format-sub-if=0 if-desc-format-adapter=0 acct-session-id-format=0 vlan-nas-port-stacked-format=0 override-nas-info=0 nas-identifier=
    Oct 26 09:42:59.930152 Radius options nas-port-id-delimiter="#" nas-port-id-format NID=0 IID=0 ACI=0 ARI=0
    Oct 26 09:42:59.930161 Radius options calling-station-id-delimiter="#" calling-station-id-format NID=0 IID=0 ACI=0 ARI=0 MAC=0 ALIAS=0 SVLAN=0 VLAN=0
    Oct 26 09:42:59.930171 Radius options remote-circuit-id-delimiter="#" remote-circuit-id-format ACI=0 ARI=0 remote-circuit-id-override-CSI=0, remote-circuit-id-fallback=0
    Oct 26 09:42:59.930180 Radius options Unique-NAS-port=0 Unique-NAS-Port-chassis-id=0 Unique-NAS-Port-chassis-id-width=0
    Oct 26 09:42:59.930189 Radius options NAS-port-extended-format ae-width= 0 slot-width=0 adapter_width=0 port_width=0 pw_width=0 svlan_width=0 vlan_width=0 coa_dynamic_variable_validation=0
    Oct 26 09:42:59.930198 Radius options NAS-port-extended-format atm slot-width=0 adapter_width=0 port_width=0 vpi_width=0 vci_width=0
    Oct 26 09:42:59.930207 Radius options client_auth_algorithm=0 client_acct_algorithm=0 juniper_dsl_attributes=0
    Oct 26 09:42:59.930216 Radius options ip_address_change_notify=0 ip_address_change_notify_msg=
    Oct 26 09:42:59.930224 Radius options timeout_grace=10
    Oct 26 09:42:59.930232 Radius options extensible_service_required_at_login=FALSE
    Oct 26 09:42:59.930240 Radius options dynamic_profile_service_required_at_login=TRUE
    Oct 26 09:42:59.930248 Done -----------

    Oct 26 09:42:59.930280 Got the profile name:l2tp-profile
    Oct 26 09:42:59.930293 No Radius options configured for the profile: l2tp-profile
    Oct 26 09:42:59.930302 Cleanup ignore list for profile:l2tp-profile for all msg-types
    Oct 26 09:42:59.930321 Cleanup exclude list for profile:l2tp-profile for all msg-types
    Oct 26 09:42:59.930355 Got the profile name:none
    Oct 26 09:42:59.930367 No Radius options configured for the profile: none
    Oct 26 09:42:59.930376 Cleanup ignore list for profile:none for all msg-types
    Oct 26 09:42:59.930395 Cleanup exclude list for profile:none for all msg-types
    Oct 26 09:42:59.930424 Framework: CONFIG RELOAD -
    Oct 26 09:42:59.931064 Local : start authd_local_module_config_clean
    Oct 26 09:42:59.931077 Local : start profiles_tree_destroy
    Oct 26 09:42:59.931086 Local : start delete_profile_node_data
    Oct 26 09:42:59.931095 Local : delete_profile - clients tree for profile l2tp-profile destroyed
    Oct 26 09:42:59.931105 Local : profiles_tree_destroy - destroyed
    Oct 26 09:42:59.931114 Local : profiles tree destroyed successfully
    Oct 26 09:42:59.931122 Local : start authd_local_module_config_init
    Oct 26 09:42:59.931131 Local : start authd_config_read_access_profiles_clients
    Oct 26 09:42:59.931139 Local : DAX_WALK_CONFIGURED
    Oct 26 09:42:59.931152 Local : start callback walk_profiles_cb
    Oct 26 09:42:59.931162 Local : walk-flag!= DAX_WALK_DELTA
    Oct 26 09:42:59.931170 Local : Item Changed
    Oct 26 09:42:59.931182 Local : profile l2tp-profile
    Oct 26 09:42:59.931194 Local : start callback walk_clients_cb
    Oct 26 09:42:59.931203 Local : Item Changed
    Oct 26 09:42:59.931214 Local : client 21CN
    Oct 26 09:42:59.931223 Local : start add_client
    Oct 26 09:42:59.931231 Local : start add_profile
    Oct 26 09:42:59.931240 Local : creating/adding a new profile node
    Oct 26 09:42:59.931249 Local : start clients_tree_init
    Oct 26 09:42:59.931259 Local : creating/adding new client
    Oct 26 09:42:59.931268 Local : start update_client_data
    Oct 26 09:42:59.931278 Local : Client 21CN is not a firewall user
    Oct 26 09:42:59.931287 Local : Failed/Not-Care to update client 21CN in profile l2tp-profile
    Oct 26 09:42:59.931301 Local : start remove_client_node
    Oct 26 09:42:59.931314 Local : start callback walk_profiles_cb
    Oct 26 09:42:59.931323 Local : walk-flag!= DAX_WALK_DELTA
    Oct 26 09:42:59.931338 Local : Item Changed
    Oct 26 09:42:59.931348 Local : profile none
    Oct 26 09:42:59.931358 Local : Handle to clients in this profile not found
    Oct 26 09:42:59.931367 Local : Done
    Oct 26 09:42:59.931376 Local : ** PROFILE l2tp-profile **
    Oct 26 09:42:59.931385 Framework: CONFIG RELOAD -
    Oct 26 09:42:59.931396 LDAP:CONFIG: result=SUCCESS
    Oct 26 09:42:59.931411 LDAP:CONFIG: Read ldap server under [access profile l2tp-profile]
    Oct 26 09:42:59.931425 LDAP:CONFIG: Read ldap server under [access profile none]
    Oct 26 09:42:59.931435 Dumping Access ldap config -----------

    Oct 26 09:42:59.931446 Ldap options revert-interval=600, base-dn=, user-dn-search=assemble
    Oct 26 09:42:59.931455 Ldap assemble options cn=cn
    Oct 26 09:42:59.931463 Done  -----------

    Oct 26 09:42:59.931474 Dumping l2tp-profile ldap servers -----------

    Oct 26 09:42:59.931485 Ldap options revert-interval=600, base-dn=, user-dn-search=assemble
    Oct 26 09:42:59.931493 Ldap assemble options cn=cn
    Oct 26 09:42:59.931502 Done -----------

    Oct 26 09:42:59.931513 Dumping none ldap servers -----------

    Oct 26 09:42:59.931524 Ldap options revert-interval=600, base-dn=, user-dn-search=assemble
    Oct 26 09:42:59.931532 Ldap assemble options cn=cn
    Oct 26 09:42:59.931541 Done -----------

    Oct 26 09:42:59.931551 Framework: CONFIG RELOAD -
    Oct 26 09:42:59.931561 SECURID:CONFIG: securid not configured
    Oct 26 09:42:59.931570 SECURID:CONFIG: securid configuration read SUCCEEDED
    Oct 26 09:42:59.931578 Dumping Access securid config -----------

    Oct 26 09:42:59.931589 Securid server = UNCONFIGURED, file = UNCONFIGURED
    Oct 26 09:42:59.931597 Done  -----------

    Oct 26 09:42:59.931608 SECURID:CONFIG: sdconf.rec file location not configured.
    Oct 26 09:42:59.931616 Framework: CONFIG RELOAD -
    Oct 26 09:42:59.932392 authd_jsrc_read_config no options found
    Oct 26 09:42:59.932478 authd_jsrc_read_config no partitions found
    Oct 26 09:42:59.932497 Framework: CONFIG RELOAD -
    Oct 26 09:42:59.932507 Framework: CONFIG RELOAD -
    Oct 26 09:42:59.932516 authd_apply_acctg_config
    Oct 26 09:42:59.932526 authd_access_profile_apply_dynreq_config Build dynreq server list for profile:(l2tp-profile)
    Oct 26 09:42:59.932536 authd_radius_dynreq_server_create error - no radius servers configured for profile l2tp-profile
    Oct 26 09:42:59.933744 Creation of DM Server failed
    Oct 26 09:42:59.933757 authd_access_profile_apply_dynreq_config Build dynreq server list for profile:(none)
    Oct 26 09:42:59.933766 authd_radius_dynreq_server_create error - no radius servers configured for profile none
    Oct 26 09:42:59.933775 Creation of DM Server failed
    Oct 26 09:42:59.933799 authd_cfg_interfaces_cb: Interface  not interested
    Oct 26 09:42:59.933849 authd_cfg_interfaces_cb: DAX_ITEM_CHANGED [interface] ifd[xe-1/0/0]
    Oct 26 09:42:59.933897 authd_cfg_interfaces_cb: DAX_ITEM_CHANGED [interface] ifd[ge-1/2/0]
    Oct 26 09:42:59.933940 authd_cfg_interfaces_cb: Interface si-1/2/0 not interested
    Oct 26 09:42:59.933975 authd_cfg_interfaces_cb: DAX_ITEM_CHANGED [interface] ifd[ge-1/3/0]
    Oct 26 09:42:59.934015 authd_cfg_interfaces_cb: DAX_ITEM_CHANGED [interface] ifd[ge-1/3/1]
    Oct 26 09:42:59.934055 authd_cfg_interfaces_cb: DAX_ITEM_CHANGED [interface] ifd[ge-1/3/5]
    Oct 26 09:42:59.934103 authd_cfg_interfaces_cb: DAX_ITEM_CHANGED [interface] ifd[ae0]
    Oct 26 09:42:59.934149 authd_cfg_interfaces_cb: Interface fxp0 not interested
    Oct 26 09:42:59.934184 authd_cfg_interfaces_cb: Interface lo0 not interested
    Oct 26 09:42:59.934196 authd_config_read_interface: Radius-Options dax_query (interface) ret 0
    Oct 26 09:42:59.934573 === Configuration reload succeeded ===



  • 23.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 03:01

    Please configure versioining as mentioned earlier. You need to deactivate dynamic-profile, l2tp and access stanza to confgiure versioining.

     

    Logs doesn't have any input. Is the subscribers dialing when you enabled the traceoption?

     

    Regards,

    Rahul N



  • 24.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 03:37

    Hi,

     

    Sorry, ignore what I put beifre. I am not using full brain functionality 🙂

     

    Okay, so I completed the following commands:

     

    deactivate services l2tp

    deactivate access

    deactivate dynamic-profiles

    commit

     

    edit system dynamic-profile-options

    set versioning

    top

    commit

     

    activate services l2tp

    activate access

    activate dynamic-profiles

    commit

     

    I shall clear the log files and then re-send 🙂

     

     



  • 25.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 03:49

    LNS# deactivate services l2tp
    LNS# set system dynamic-profile-options versioning

     

    once you sucessfully configured versioning, please share fresh l2tp,aaa amd ppp-service logs. In case you're unable to upload, please let me the place from where i can download.



  • 26.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 04:18

    Hi,

     

    Your hard work helping me is very much appreciated.

     

    Here is the new jpppd log (same as before):

     

    Clive@THW-LNS-01# run show log jpppd
    Oct 26 10:49:35 THW-LNS-01 clear-log[15252]: logfile cleared
    Oct 26 11:10:34.417922 dynProfileCloseDaxSchema
    Oct 26 11:10:34.418203 handleConfigChange: entered (UPDATE)
    Oct 26 11:11:40 Options: level: 0x00000005, flag_all: 0xffffffff, syslog: 0x0000
    Oct 26 11:11:40 Options: default: /var/log/jpppd, name: /var/log/jpppd
    Oct 26 11:11:40.499050 readGroupProfiles
    Oct 26 11:11:40.499074 readGroupProfiles: cannot get the access node for configuration read
    Oct 26 11:11:40.499098 extractServiceDevicePool: no service device pool configuration read, isConfigUpdate: true
    Oct 26 11:11:40.499112 processServiceDevicePoolConfig: entered
    Oct 26 11:11:40.499124 deleteAllServiceDevicePools: Deleted all service pools
    Oct 26 11:11:40.499138 purgeServiceDevicePoolConfig: entered
    Oct 26 11:11:40.499164 handleConfigChange: rts writes removal performance boost enabled
    Oct 26 11:11:40.499186 handleConfigChange: unable to read DNS group profile
    Oct 26 11:11:40.499208 handleConfigChange: Delay NCP open for activation of family services enabled
    Oct 26 11:11:40.499230 handleConfigChange: System level on-demand-ip-address: disabled
    Oct 26 11:11:40.499251 handleConfigChange: System level reject-unauthorized-ip6cp: disabled
    Oct 26 11:11:40.499271 handleConfigChange: Enforce RFC 2516 MUST requirements for FCS, ACFC and ACCMdisabled
    Oct 26 11:11:40.500976 dynProfileOpenDaxSchema ddax_open_db succeeded
    Oct 26 11:11:40.501001 handleConfigChange: sdb api trace enabled
    Oct 26 11:11:40.501015 handleConfigChange: authd api trace enabled
    Oct 26 11:11:40.501028 handleConfigChange: profile api trace enabled
    Oct 26 11:11:40.501040 handleConfigChange: libstats api trace enabled
    Oct 26 11:11:40.501053 handleConfigChange: Tunneling PCL trace enabled
    Oct 26 11:11:40.501065 handleConfigChange: PPPoE PCL trace enabled

     

    As for the authd log file, it is very large this time. I don't really have anywhere I can upload it to. I could e-mail it to you if I have your e-mail address?

    Thanks again



  • 27.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 04:44

    Iam still  wondering why there is no ppp logs. Did you enabled the logs like below?

     

    LNS# show protocols ppp-service                       
    traceoptions {
        file jpppd size 100m;
        level all;
        flag all;
    }



  • 28.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 04:53

    Hi,

     

    Yes. Here is the configuration on the MX240 for the traceoptions:

     

    set protocols ppp-service traceoptions file jpppd
    set protocols ppp-service traceoptions file size 800m
    set protocols ppp-service traceoptions file files 15
    set protocols ppp-service traceoptions level all
    set protocols ppp-service traceoptions flag all

     

    I apologise for this. I cannot put the system into production until I get over this hurdle.... 😞

     

    Thank you for your ongoing support with this tedious problem



  • 29.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 05:02

    Can i have your email address ?



  • 30.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 05:26

    Please share the below command output?

    LNS# run show version

     

    Regards,

    Rahul N



  • 31.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 06:06

    Hi,

     

    Output of "run show ver"

     

    Model: mx240
    Junos: 15.1F2.8
    JUNOS OS Kernel 64-bit  [20150814.313820_builder_stable_10]
    JUNOS OS runtime [20150814.313820_builder_stable_10]
    JUNOS OS time zone information [20150814.313820_builder_stable_10]
    JUNOS OS 32-bit compatibility [20150814.313820_builder_stable_10]
    JUNOS py base [20150814.204717_builder_junos_151_f2]
    JUNOS OS crypto [20150814.313820_builder_stable_10]
    JUNOS network stack and utilities [20150814.204717_builder_junos_151_f2]
    JUNOS libs compat32 [20150814.204717_builder_junos_151_f2]
    JUNOS runtime [20150814.204717_builder_junos_151_f2]
    JUNOS platform support [20150814.204717_builder_junos_151_f2]
    JUNOS modules [20150814.204717_builder_junos_151_f2]
    JUNOS libs [20150814.204717_builder_junos_151_f2]
    JUNOS daemons [20150814.204717_builder_junos_151_f2]
    JUNOS Voice Services Container package [20150814.204717_builder_junos_151_f2]
    JUNOS Services SSL [20150814.204717_builder_junos_151_f2]
    JUNOS Services Stateful Firewall [20150814.204717_builder_junos_151_f2]
    JUNOS Services RPM [20150814.204717_builder_junos_151_f2]
    JUNOS Services PTSP Container package [20150814.204717_builder_junos_151_f2]
    JUNOS Services NAT [20150814.204717_builder_junos_151_f2]
    JUNOS Services Mobile Subscriber Service Container package [20150814.204717_builder_junos_151_f2]
    JUNOS Services MobileNext Software package [20150814.204717_builder_junos_151_f2]
    JUNOS Services LL-PDF Container package [20150814.204717_builder_junos_151_f2]
    JUNOS Services Jflow Container package [20150814.204717_builder_junos_151_f2]
    JUNOS Services IPSec [20150814.204717_builder_junos_151_f2]
    JUNOS IDP Services [20150814.204717_builder_junos_151_f2]
    JUNOS Services HTTP Content Management package [20150814.204717_builder_junos_151_f2]
    JUNOS Services Crypto [20150814.204717_builder_junos_151_f2]
    JUNOS Services Captive Portal and Content Delivery Container package [20150814.204717_builder_junos_151_f2]
    JUNOS Border Gateway Function package [20150814.204717_builder_junos_151_f2]
    JUNOS AppId Services [20150814.204717_builder_junos_151_f2]
    JUNOS Services Application Level Gateways [20150814.204717_builder_junos_151_f2]
    JUNOS Services AACL Container package [20150814.204717_builder_junos_151_f2]
    JUNOS Packet Forwarding Engine Support (MX/EX92XX Common) [20150814.204717_builder_junos_151_f2]
    JUNOS Packet Forwarding Engine Support (M/T Common) [20150814.204717_builder_junos_151_f2]
    JUNOS Online Documentation [20150814.204717_builder_junos_151_f2]
    JUNOS FIPS mode utilities [20150814.204717_builder_junos_151_f2]

     

    Thank you



  • 32.  RE: Help with Basic LNS Cisco/Juniper command conversion
    Best Answer

     
    Posted 10-26-2017 06:14

    Thank you. Please upgrade the node to 15.1R6 and enable below knobs for subscriber-management.

     

    set system services subscriber-management enable

    set system configuration-database max-db-size 300m

     

    Once configured, please reboot the chassis.

     

    This should resolve the issue.

     

    Regards,

    Rahul N

     



  • 33.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 06:32

    Hi Rahul,

     

    I will get hold of a 15.1R6 and complete what you have suggested. 

     

    Thank you very much for all of your valuable help in resolving this issue. As I have said, it is very much appreciated. I will let you know what the results are from the upgrade.


    Thanks



  • 34.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 08:30

    Hi Rahul,

     

    I have upgraded to the recommended version. Completed your config changes and look at what I see on the LAC:

     

    L2TP Tunnel Information Total tunnels 1 sessions 1

    LocID RemID Remote Name   State  Remote Address  Port  Sessions L2TP Class/
                                                                    VPDN Group
    23501 0                   idle   0.0.0.0         0     1        TESTNETWORK

     

    At last.... thank you so much for all your help.... Juniper need to upgrade you to senior technical guru.... nice  🙂

     

     



  • 35.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 08:59

    Hi Rahul,

     

    Apologies, I may have spoken too soon....

     

    It seems, from the LAC Cisco end, that a tunnel exists (I can see that from the output, it was not there before the upgrade).... but on the Junipe MX240 LNS end, I run the "show services l2tp summary" command and no tunnels show, as can be seen from the output below:

     

    Clive@THW-LNS-01# run show services l2tp summary
      Administrative state is Enabled
      Failover within a preference level is Disabled
      Weighted load balancing is Disabled
      Destination equal load balancing is Disabled
      Tunnel authentication challenge is Enabled
      Calling number avp is Enabled
      Failover Protocol is Disabled
      Failover Resync Mechanism is silent failover
      Tx Connect speed method is actual
      Rx speed avp when equal is Disabled
      Tunnel assignment id format is assignment-id
      Tunnel Tx Address Change is Accept
      Min Retransmission Timeout for control packets is 1 seconds
      Max Retransmissions for Established Tunnel is 7
      Max Retransmissions for Not Established Tunnel is 5
      Tunnel Idle Timeout is 60 seconds
      Destruct Timeout is 300 seconds
      Destination Lockout Timeout is 300 seconds
      Max Packets processed per iteration is 64
      Access Line Information is Disabled, Speed Updates is Disabled
      IPv6 Services For LAC Sessions is Disabled
    Destinations: 0, Tunnels: 0, Sessions: 0, Switched sessions: 0

     

    Also, if use the l2tp tunnels, there is nothing there either..... this is weird because the LAC tells me a tunnel does exist.... any ideas please?

     

    Thanks



  • 36.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 09:10

    I need to get my brain into order.... I've spent too long troubleshooting and neglecting simple steps..... 

     

    I had to reboot the Cisco 1841 as the debug was flooding the router.... I re-configured the 1841 but forgot to put the IP address on the interface facing the LNS.... I have now completed and can see the following on the Cisco:

     

    L2TP Tunnel Information Total tunnels 1 sessions 1

    LocID RemID Remote Name   State  Remote Address  Port  Sessions L2TP Class/
                                                                    VPDN Group
    21806 31813 THW-LNS-01    est    195.80.0.17     1701  1        TESTNETWORK

    Much better.... Now let me look at the Juniper MX ....

     

    Clive@THW-LNS-01# run show services l2tp tunnel brief
      Local ID  Remote ID  Remote IP               Sessions  State
      31813     21806      195.80.0.18:1701               1  Established

     

    Hooray....

     

    Thank you Rahul



  • 37.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 21:29

    Good Work. Please help to close this thread. Please mark this as accepted solution if issue is resolved.

     

    Regards,

    Rahul N



  • 38.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-27-2017 00:50

    Accepted as solution and much Kudos given for your hard work Rahul.....

     

    Thank you.....



  • 39.  RE: Help with Basic LNS Cisco/Juniper command conversion

     
    Posted 10-26-2017 06:05

    Hi,

     

    Yes. Sure. It's adgwytc@lycos.com ..... I can send you the log files via e-mail.

     

    Thanks