Cisco Cisco Packet Data Gateway (PDG) Guide De Dépannage
PDSN Service Configuration Mode Commands
authentication ▀
Cisco ASR 5000 Series Command Line Interface Reference ▄
OL-22948-01
A
must be specified in conjunction with this option. Priorities specify which authentication
protocol should be attempted first, second, third and so on.
must be an integer from 1 through 1000. The lower the integer, the higher the preference.
PAP is enabled by default as the second highest preference.
Default: Disabled
This option configures the system to attempt to authenticate the subscriber based on their Mobile Station
Identity (MSID).
This option configures the system to attempt to authenticate the subscriber based on their Mobile Station
Identity (MSID).
Usage
Use to specify how the PDSN service should handle authentication and what protocols to use. The flexibility
is given to configure this option to accommodate the fact that not every mobile will implement the same
authentication protocols.
The chassis is shipped from the factory with the authentication options set as follows:
is given to configure this option to accommodate the fact that not every mobile will implement the same
authentication protocols.
The chassis is shipped from the factory with the authentication options set as follows:
allow-noauth disabled
chap enabled with a priority of 1
mschap disabled
msid-auth disabled
pap enabled with a priority of 2
Important:
At least one of the keywords must be used to complete the command.
Example
The following command would configure the system to allow no authentication for subscribers and would perform
accounting using the default NAI-construct of
The following command would configure the system to allow no authentication for subscribers and would perform
accounting using the default NAI-construct of
:
The following command would configure the system to attempt subscriber authentication first using CHAP, then
MSCHAP, and finally PAP. If the allow-noauth command was also issued, if all attempts to authenticate the subscriber
using these protocols fail, then the subscriber would be allowed access:
MSCHAP, and finally PAP. If the allow-noauth command was also issued, if all attempts to authenticate the subscriber
using these protocols fail, then the subscriber would be allowed access: