we have the problem with ACS 5.3, that ip local pools are not supported anymore. Before we had a ACS 4.2 where the PPPoE configuration below worked (pool was dynamically configured in the user or group attributes of ACS 4.2). Now we would like to use a local DHCP pool (pool INTERNET) for some of the PPPoE clients, but at the same time we have some clients that should have a static IP (delivered via a Framed-IP-Address).
Now we have the problem, that the DHCP pool is not used for the dynamic PPPoE clients, can anybody help?
aaa authentication ppp ADSL local group radius
aaa authorization network ADSL local group radius if-authenticated
aaa accounting network ADSL start-stop group radius
aaa accounting system default start-stop group tacacs+
ip dhcp pool INTERNET - new
network 192.168.1.0 255.255.255.0
ip vrf ADSL-INTERNET
route-target export 65500:101
route-target import 65500:101
ip vrf forwarding ADSL-INTERNET
ip address 10.10.10.10 255.255.255.255
description template for incomming PPPoE sessions
ip unnumbered Loopback3
no peer default ip address - old
!peer default ip address dhcp-pool INTERNET - new
ppp mtu adaptive
ppp authentication chap ADSL
ppp authorization ADSL
ppp accounting ADSL
!ip local pool INTERNET 18.104.22.168 22.214.171.124 group ADSL - old
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :