The tunnel accounting feature enhances AAA accounting by adding the ability to include tunnel-related statistics in the RADIUS
information. Before you can collect tunnel usage information, you must configure the following attributes on the RADIUS server:
-
Acct-Tunnel-Connection—Specifies the identifier assigned to the tunnel session. This attribute and the Tunnel-Client-Endpoint
and Tunnel-Server-Endpoint attributes provide a way to uniquely identify a tunnel session for auditing purposes.
-
Acct-Tunnel-Packets-Lost—Specifies the number of packets lost on a given link.
The table below describes the values for the Acct-Status-Type attribute that support tunnel accounting on the RADIUS server.
Table 1. Acct-Status-Type Values for RADIUS Tunnel Accounting
Acct-Status-Type Values
|
Value
|
Description
|
Tunnel-Link-Reject
|
14
|
Marks the rejection of the establishment of a new link in an existing tunnel.
|
Tunnel-Link-Start
|
12
|
Marks the creation of a tunnel link within an L2TP tunnel that carries multiple links.
|
Tunnel-Link-Stop
|
13
|
Marks the destruction of a tunnel link within an L2TP tunnel that carries multiple links.
|
Tunnel-Reject
|
11
|
Marks the rejection of the establishment of a tunnel with another device.
|
Tunnel-Start
|
9
|
Marks the establishment of a tunnel with another device.
|
Tunnel-Stop
|
10
|
Marks the destruction of a tunnel to or from another device.
|
For more information about the RADIUS tunnel accounting attributes or the Acct-Status-Type values that support RADIUS tunnel
accounting, see RFC 2867, RADIUS Accounting Modifications for Tunnel Protocol Support.
For information about RADIUS accounting attributes supported on the Cisco ASR 1000 Series Aggregation Services Routers, see
the “RADIUS Attributes” chapter in the Cisco IOS XE Security Configuration Guide: Securing User Services.
For more information on configuring RADIUS, see your RADIUS user documentation.