Upload
others
View
69
Download
0
Embed Size (px)
Citation preview
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3First Published: 2017-07-27
Americas HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706USAhttp://www.cisco.comTel: 408 526-4000 800 553-NETS (6387)Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITEDWARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITHTHE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain versionof the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDINGANYOTHERWARRANTYHEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS"WITH ALL FAULTS.CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OFMERCHANTABILITY, FITNESS FORA PARTICULAR PURPOSEANDNONINFRINGEMENTORARISING FROMACOURSEOFDEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUTLIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERSHAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, networktopology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentionaland coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnershiprelationship between Cisco and any other company. (1110R)
© 2017 Cisco Systems, Inc. All rights reserved.
http://www.cisco.com/go/trademarkshttp://www.cisco.com/go/trademarks
C O N T E N T S
C H A P T E R 1 Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 1
C H A P T E R 2 IGMP Profile Configuration Mode Commands 3
default ip igmp 3
end 4
exit 4
ip igmp query 5
ip igmp require router-alert 6
ip igmp robustness 6
ip igmp unsolicited-report-interval 7
ip igmp version 8
C H A P T E R 3 IKEv2 Security Association Configuration Mode Commands 11
default 12
encryption 12
end 14
exit 14
group 15
hmac 16
lifetime 17
prf 18
C H A P T E R 4 IMEI Profile Configuration Mode 21
associate 22
blacklist 23
description 23
direct-tunnel 24
end 25
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 iii
exit 25
ggsn-address 26
ignore-pdp-data-inactivity 27
pdp-activate 28
C H A P T E R 5 IMEI-TAC-Group Configuration Mode Commands 31
end 31
exit 32
tac 32
tac-range 33
C H A P T E R 6 IMS Authorization Service Configuration Mode Commands 35
end 36
exit 36
p-cscf discovery 36
p-cscf table 38
policy-control 40
qos-update-timeout 41
reauth-trigger 42
signaling-flag 44
signaling-flow 45
traffic-policy 47
C H A P T E R 7 IMS Sh Service Configuration Mode Commands 49
diameter 49
end 51
exit 51
failure-handling 52
request 53
C H A P T E R 8 IPMS Client Configuration Mode Commands 55
end 55
exit 56
export keys 56
heartbeat 57
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3iv
Contents
server 58
source 60
C H A P T E R 9 IPNE Endpoint Configuration Mode Commands 61
bind 61
end 62
exit 63
peer 63
C H A P T E R 1 0 IPNE Service Configuration Mode Commands 65
end 65
exit 66
ipne-endpoint 66
C H A P T E R 1 1 IPSec Transform Set Configuration Mode Commands 69
encryption 69
end 72
esn 72
exit 73
group 74
hmac 75
mode 77
C H A P T E R 1 2 IPSG RADIUS Snoop Configuration Mode Commands 79
bind 80
connection authorization 81
end 82
exit 82
profile 83
radius 84
sess-replacement 86
setup-timeout 87
C H A P T E R 1 3 IPSG RADIUS Server Configuration Mode Commands 89
accounting-context 90
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 v
Contents
associate sgtp-service 91
bind 92
connection authorization 95
end 96
exit 96
gtp max-contexts-per-imsi 97
gtp peer-ip-address 98
ip 99
map ue-mac-to-imei 101
overlapping-ip-address 102
plmn id 103
profile 104
radius accounting 106
radius dictionary 109
respond-to-non-existing-session 111
sess-replacement 112
setup-timeout 113
w-apn 114
C H A P T E R 1 4 IPSP Configuration Mode Commands 117
dead-interval 117
end 118
exit 119
reserved-free-percentage 119
C H A P T E R 1 5 IPv6 ACL Configuration Mode Commands 121
deny/permit (by source IP address masking) 122
deny/permit (any) 125
deny/permit (by host IP address) 127
deny/permit (by source ICMP packets) 129
deny/permit (by IP packets) 132
deny/permit (by TCP/UDP packets) 135
end 139
exit 140
readdress server 140
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3vi
Contents
redirect context (by IP address masking) 143
redirect context (any) 146
redirect context (by host IP address) 148
redirect context (by source ICMP packets) 150
redirect context (by IP packets) 153
redirect context (by TCP/UDP packets) 156
redirect css delivery-sequence 160
redirect css service (any) 160
redirect css service (by host IP address) 162
redirect css service (by ICMP packets) 164
redirect css service (by IP packets) 167
redirect css service (by source IP address masking) 171
redirect css service (by TCP/UDP packets) 173
redirect css service (for downlink, any) 177
redirect css service (for downlink, by host IP address) 179
redirect css service (for downlink, by ICMP packets) 181
redirect css service (for downlink, by IP packets) 185
redirect css service (for downlink, by source IP address masking) 188
redirect css service (for downlink, by TCP/UDP packets) 190
redirect css service (for uplink, any) 194
redirect css service (for uplink, by host IP address) 196
redirect css service (for uplink, by ICMP packets) 198
redirect css service (for uplink, by IP packets) 202
redirect css service (for uplink, by source IP address masking) 205
redirect css service (for uplink, by TCP/UDP packets) 206
redirect nexthop (by IP address masking) 210
redirect nexthop (any) 213
redirect nexthop (by host IP address) 215
redirect nexthop (by source ICMP packets) 217
redirect nexthop (by IP packets) 221
redirect nexthop (by TCP/UDP packets) 224
C H A P T E R 1 6 IPv6 to IPv4 Tunnel Interface Configuration Mode Commands 229
destination address 230
do show 230
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 vii
Contents
end 231
exit 231
mode 232
source 233
tos 234
ttl 235
C H A P T E R 1 7 IP VRF Context Configuration Mode Commands 237
associate l2-mapping-table 237
description 239
end 239
exit 240
ip aggregate-address 240
ip guarantee 241
ip maximum-routes 242
mpls map-dscp-to-exp 243
mpls map-exp-to-dscp 244
C H A P T E R 1 8 ISAKMP Configuration Mode Commands 247
authentication 247
encryption 248
end 250
exit 250
group 250
hash 251
lifetime 252
C H A P T E R 1 9 IuPS Service Configuration Mode Commands 255
access-protocol 256
associate 257
blacklist-timeout-gtpu-bind-addresses 258
do show 259
empty-cr 260
end 261
exit 261
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3viii
Contents
force-authenticate consecutive-security-failure 262
gtpu 263
inter-rnc-procedures 265
iu-hold-connection 266
iu-recovery 267
iu-release-complete-timeout 268
loss-of-radio-coverage ranap-cause 269
mbms 270
network-sharing cs-ps-coordination 270
network-sharing failure-code 271
network-sharing non-shared 273
network-sharing stop-redirect-reject-cause 274
plmn 275
rab-assignment-response-timeout 276
radio-network-controller 277
rai-skip-validation 278
relocation-alloc-timeout 279
relocation-complete-timeout 280
reset 281
rnc 282
security-mode-complete-timeout 283
service-request-follow-on 284
srns-context-response-timeout 285
tigoc-timeout 286
tintc-timeout 287
C H A P T E R 2 0 LAC Service Configuration Mode Commands 289
allow 290
bind 291
data sequence-number 293
default 293
end 295
exit 296
hide-attributes 296
keepalive-interval 297
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 ix
Contents
load-balancing 298
local-receive-window 299
max-retransmission 300
max-session-per-tunnel 301
max-tunnel-challenge-length 302
max-tunnels 303
peer-lns 304
proxy-lcp-authentication 305
retransmission-timeout-first 306
retransmission-timeout-max 307
single-port-mode 308
snoop framed-ip-address 309
trap 310
tunnel selection-key 311
tunnel-authentication 313
C H A P T E R 2 1 Line Configuration Mode Commands 315
end 315
exit 316
length 316
width 317
C H A P T E R 2 2 Link Configuration Mode Commands 319
arbitration 320
do show 321
end 322
exit 322
mtp2-aerm-emergency-threshold 322
mtp2-aerm-normal-threshold 323
mtp2-eim-decrement 324
mtp2-eim-increment 325
mtp2-eim-threshold 326
mtp2-error-correction 327
mtp2-lssu-len 328
mtp2-max-outstand-frames 329
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3x
Contents
mtp2-suerm-threshold 330
mtp3-discard-priority 331
mtp3-max-slt-try 331
mtp3-msg-priority 332
mtp3-msg-size 333
mtp3-p1-qlen 334
mtp3-p2-qlen 335
mtp3-p3-qlen 336
mtp3-test-pattern 337
priority 337
signaling-link-code 338
sscf-nni-n1 339
sscop-max-cc 340
sscop-max-pd 341
sscop-max-stat 342
timeout 343
C H A P T E R 2 3 Linkset Configuration Mode Commands 349
adjacent-point-code 349
do show 350
end 351
exit 351
link 352
self-point-code 353
C H A P T E R 2 4 LMA Service Configuration Mode Commands 355
aaa accounting 356
alt-coa-allowed 357
bind address 358
end 360
exit 360
heartbeat 361
mobility-option-type-value 362
refresh-advice-option 363
refresh-interval-percent 364
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 xi
Contents
reg-lifetime 365
revocation 366
sequence-number-validate 367
setup-timeout 368
signalling-packets 369
simul-bindings 369
standalone 370
timestamp-option-validation 371
timestamp-replay-protection 371
C H A P T E R 2 5 LNS Service Configuration Mode Commands 373
aaa accounting 374
authentication 375
avp map called-number apn 377
bind 378
data sequence-number 379
default 380
end 382
exit 383
ip source-violation 383
keepalive-interval 385
local-receive-window 386
max-retransmission 387
max-session-per-tunnel 388
max-tunnel-challenge-length 388
max-tunnels 389
nai-construction domain 390
newcall 391
peer-lac 392
proxy-lcp-authentication 393
retransmission-timeout-first 394
retransmission-timeout-max 395
setup-timeout 396
single-port-mode 397
trap 398
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3xii
Contents
tunnel-authentication 399
tunnel-switching 399
C H A P T E R 2 6 Local Policy Actiondef Configuration Mode Commands 401
action 401
end 404
exit 405
C H A P T E R 2 7 Local Policy Eventbase Configuration Mode Commands 407
end 407
exit 408
rule 408
C H A P T E R 2 8 Local Policy Ruledef Configuration Mode Commands 411
condition 411
end 416
exit 416
C H A P T E R 2 9 Local Policy Service Configuration Mode Commands 417
actiondef 417
end 419
exit 419
eventbase 420
ruledef 421
suppress-cra 422
C H A P T E R 3 0 Location Service Configuration Mode Commands 425
associate 425
destination-host 427
end 428
exit 428
slr 429
timeout 430
C H A P T E R 3 1 Logical eNode Configuration Mode Commands 433
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 xiii
Contents
associate mme-pool 434
associate tai-list-db 435
bind s1-mme 436
end 437
exit 437
s1-mme ip qos-dscp 437
s1-mme sctp port 439
C H A P T E R 3 2 Loopback Interface Configuration Mode Commands 441
crypto-map 442
description 442
end 443
exit 443
ip address 444
ip ranged-address 445
ip vrf 446
ipv6 address 447
ipv6 ospf 447
C H A P T E R 3 3 LTE Custom TAI List Configuration Mode Commands 451
end 451
exit 452
tai 452
C H A P T E R 3 4 LTE Emergency Profile Configuration Mode Commands 455
ambr 456
apn 457
associate 458
end 459
exit 459
lcs-qos 460
local-emergency-num 461
local-emergency-num-ie 462
pgw 463
qos 464
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3xiv
Contents
ue-validation-level 465
C H A P T E R 3 5 LTE Forbidden Location Area Configuration Mode Commands 467
end 467
exit 468
lac 468
C H A P T E R 3 6 LTE Forbidden Tracking Area Configuration Mode Commands 471
end 471
exit 472
tac 472
C H A P T E R 3 7 LTE Foreign PLMN GUTI Management Database Configuration Mode Commands 475
end 475
exit 476
plmn 476
C H A P T E R 3 8 LTE HeNBGWMME Pool Configuration Mode Commands 479
end 479
exit 480
mme 480
C H A P T E R 3 9 LTE Handover Restriction List Configuration Mode Commands 483
end 483
exit 484
forbidden 484
C H A P T E R 4 0 LTE MME HeNB-GWManagement Database Configuration Mode Commands 487
end 487
exit 488
henbgw-global-enbid 488
C H A P T E R 4 1 LTE Network Global MME ID Management Database Configuration Mode Commands 491
end 491
exit 492
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 xv
Contents
plmn 492
C H A P T E R 4 2 LTE Paging Map Configuration Mode Commands 495
end 495
exit 496
precedence 496
C H A P T E R 4 3 LTE Paging Profile Configuration Mode Commands 501
end 501
exit 502
paging-stage 502
C H A P T E R 4 4 LTE Peer Map Configuration Mode Commands 505
end 505
exit 506
precedence 506
C H A P T E R 4 5 LTE Policy Configuration Mode Commands 509
cause-code-group 510
congestion-action-profile 511
end 512
exit 513
foreign-plmn-guti-mgmt-db 513
henbgw mme-pool 514
henbgw overload-control 516
henbgw qci-dscp-mapping-table 517
henbgw s1-reset 518
henbgw session-recovery idle-timeout 519
ho-restrict-list 520
imei-tac-group 521
lte-emergency-profile 522
mme henb mgmt-db 523
mme paging cache 524
network-global-mme-id-mgmt-db 526
paging-map 527
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3xvi
Contents
paging-profile 528
peer-map 529
sgsn-mme 530
subscriber-map 531
tai-list-db 532
tai-mgmt-db 533
C H A P T E R 4 6 LTE Subscriber Map Configuration Mode Commands 537
end 537
exit 538
precedence 538
C H A P T E R 4 7 LTE TAI Management Database Configuration Mode Commands 543
access-type 543
end 544
exit 545
network-name 545
tai-custom-list 546
tai-mgmt-obj 547
timezone 548
C H A P T E R 4 8 LTE TAI Management Object Configuration Mode Commands 551
access-type 552
emergency-services-not-supported 552
end 553
exit 554
ims-voice-over-ps 554
lai 555
network-name 556
rai 557
sgw-address 558
sgw-address-resolution-mode 560
tai 561
timezone 562
zone-code 563
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 xvii
Contents
C H A P T E R 4 9 MAG Service Configuration Mode Commands 565
bind 566
encapsulation 567
end 568
exit 569
heartbeat 569
information-element-set 571
max-retransmissions 572
mobility-header-checksum 573
mobility-option-type-value 574
policy 575
reg-lifetime 576
renew-percent-time 577
retransmission-policy 578
retransmission-timeout 579
signalling-packets 580
C H A P T E R 5 0 MAP Service Configuration Mode Commands 583
access-protocol 584
application-context-name 585
auth-vectors 586
do show 587
end 588
equipment-identity-register 588
exit 590
gmlc 590
hlr 592
policy 593
short-message-service 594
timeout 594
C H A P T E R 5 1 MIP HA Assignment Table Configuration Mode Commands 597
end 597
exit 598
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3xviii
Contents
hoa-range 598
C H A P T E R 5 2 MPLS-LDP Configuration Mode Commands 601
advertise-labels 601
discovery 603
enable 604
end 605
exit 605
router-id 606
session 607
C H A P T E R 5 3 MIPv6 HA Service Configuration Mode Commands 609
aaa accounting 610
bind 610
default 612
end 613
exit 614
refresh-advice-option 614
refresh-interval-percent 615
reg-lifetime 616
sequence-number-validate 617
setup-timeout 617
simul-bindings 618
timestamp-replay-protection tolerance 619
C H A P T E R 5 4 MME-eMBMS Service Configuration Mode Commands 621
associate 621
bind 623
end 624
exit 624
mmemgr-recovery 625
plmn-id 626
sctp port 627
setup-timeout 627
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 xix
Contents
C H A P T E R 5 5 MME LAC Pool Area Configuration Mode Commands 629
end 629
exit 630
hash-value 630
lac 632
plmnid 633
C H A P T E R 5 6 MMEMSC Pool Area Configuration Mode 635
end 635
exit 636
hash-value 636
plmn-id 637
use-msc 639
C H A P T E R 5 7 MME SGs Service Configuration Mode Commands 641
associate 642
bind 643
end 644
exit 644
ip 645
non-pool-area 646
pool-area 647
sctp 648
tac-to-lac-mapping 649
timer 650
vlr 652
vlr-failure 653
C H A P T E R 5 8 MME Service Configuration Mode Commands 657
associate 660
bind s1-mme 665
csg-change-notification 666
dns 667
edrx 669
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3xx
Contents
emm 670
enb-cache-timeout 682
encryption-algorithm-lte 683
end 684
esm 685
exit 688
gtpv2 688
henbgw henb-type 689
heuristic-paging 690
ho-resource-release-timeout 691
integrity-algorithm-lte 692
inter-rat-nnsf 694
isda 696
isda-guard-timeout 697
isr-capability 698
legacy-tai-list-encoding 699
local-cause-code-mapping apn-mismatch 700
local-cause-code-mapping apn-not-subscribed 701
local-cause-code-mapping apn-not-supported-in-plmn-rat 702
local-cause-code-mapping auth-failure 704
local-cause-code-mapping congestion 705
local-cause-code-mapping ctxt-xfer-fail-mme 707
local-cause-code-mapping ctxt-xfer-fail-sgsn 708
local-cause-code-mapping gw-unreachable 710
local-cause-code-mapping hss-unavailable 711
local-cause-code-mapping newcall-policy-restrict 713
local-cause-code-mapping no-active-bearers 714
local-cause-code-mapping odb packet-services 715
local-cause-code-mapping odb roamer-to-vplmn 716
local-cause-code-mapping peer-node-unknown 717
local-cause-code-mapping pgw-selection-failure 719
local-cause-code-mapping restricted-zone-code 720
local-cause-code-mapping sgw-selection-failure 721
local-cause-code-mapping vlr-down 722
local-cause-code-mapping vlr-unreachable 724
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 xxi
Contents
location-reporting 725
mapping 726
max-bearers per-subscriber 727
max-paging-attempts 728
max-pdns per-subscriber 729
mme-id 730
mmemgr-recovery 731
msc 732
msc-mapping 734
nas gmm-qos-ie-mapping 735
nas-max-retransmission 736
network-sharing 737
nri 738
peer-mme 739
peer-sgsn rai 741
peer-sgsn rnc-id 743
pgw-address 744
plmn-id 746
policy attach 747
policy idle-mode 749
policy inter-rat 750
policy network 751
policy overcharge-protection 752
policy overload 753
policy pdn-connect 754
policy pdn-deactivate 755
policy pdn-modify 757
policy pdn-reconnection 758
policy s1-reset 759
policy sctp-down 760
policy service-request 761
policy srvcc 762
policy tau 763
pool-area 765
ps-lte 767
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3xxii
Contents
relative-capacity 768
s13 769
s1-mme ip 770
s1-mme sctp port 771
s1-ue-context-release 772
setup-timeout 775
sgw-blacklist 776
sgw-retry-max 777
snmp trap 779
statistics 780
ue-db 781
C H A P T E R 5 9 MPLS-IP Configuration Mode Commands 783
end 783
exit 784
protocol ldp 784
C H A P T E R 6 0 MRME Service Configuration Mode Commands 787
aaa 788
associate 789
attribute 790
bind 791
disconnect 793
dns-P-GW 794
do show 795
end 796
exit 796
fqdn 797
pgw-selection 798
radius 799
setup-timeout 801
C H A P T E R 6 1 NETCONF Protocol Configuration Mode Commands 803
autosave-config 803
bulkstats 804
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 xxiii
Contents
confd-user 805
do show 806
end 807
exit 807
netconf 808
rest 809
C H A P T E R 6 2 Network Service Entity- IP Local Configuration Mode Commands 813
all-nsvc-failure-action 814
associate 815
bssgp-timer 816
do show 816
end 817
exit 817
max-ns-retransmissions 817
ns-timer 818
nsvc-failure-action 819
nsvl 820
peer-network-service-entity 821
retry-count 821
timer 821
C H A P T E R 6 3 Network Service Entity - Peer NSEI Configuration Mode Commands 823
bssgp-timer 823
do show 824
end 824
exit 825
ns-reset-mode 825
ns-vc 826
C H A P T E R 6 4 Network Service Virtual Connection Configuration Mode Commands 829
do show 829
end 830
exit 830
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3xxiv
Contents
C H A P T E R 6 5 Network Service Virtual Link Configuration Mode Commands 833
do show 833
end 834
exit 834
nsvl-address 835
weight 836
C H A P T E R 6 6 NTP Configuration Mode Commands 837
do show 837
enable 838
end 839
exit 839
server 840
C H A P T E R 6 7 NTSR Pool Configuration Mode Commands 843
do show 844
end 844
exit 845
peer-ip-address 845
C H A P T E R 6 8 Operator Policy Configuration Mode 847
apn 848
associate 849
description 850
do show 851
end 852
exit 852
imei 853
C H A P T E R 6 9 ORBEM Configuration Mode Commands 855
activate client id 856
client id 857
do show 858
end 858
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 xxv
Contents
event-notif-iiop-port 859
event-notif-service 860
event-notif-siop-port 871
exit 872
iiop-port 872
iiop-transport 873
iop-address 874
max-attempt 875
session-timeout 876
siop-port 877
ssl-auth-policy 878
ssl-certificate 879
ssl-private-key 880
C H A P T E R 7 0 OSPF Configuration Mode Commands 883
area authentication 884
area default-cost 885
area nssa 886
area stub 888
area virtual-link 889
area virtual link authentication 890
area virtual-link authentication-key 891
area virtual link intervals 892
area virtual link message-digest-key 894
bfd-all-interfaces 895
capability graceful-restart 896
default-information originate 897
default-metric 898
distance 899
distribute-list 900
do show 902
end 902
exit 903
ip vrf 903
neighbor 904
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3xxvi
Contents
network area 905
ospf graceful-restart 906
ospf router-id 907
passive-interface 908
redistribute 909
refresh timer 910
router-id 911
timers spf 912
C H A P T E R 7 1 OSPFv3 Configuration Mode Commands 915
area 915
default-metric 917
do show 918
end 918
exit 919
passive-interface 919
redistribute 920
router-id 921
timers spf 922
C H A P T E R 7 2 OSPF VRF Configuration Mode Commands 925
area 926
default-information originate 929
default-metric 930
distance 931
distribute-list 932
do show 933
end 934
exit 934
neighbor 935
network 936
ospf router-id 937
passive-interface 938
redistribute 939
refresh timer 940
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 xxvii
Contents
router-id 941
timers spf 942
C H A P T E R 7 3 Out-Address Configuration Mode Commands 945
do show 945
end 946
exit 947
gt-address 947
gt-format 948
ni-indicator 949
point-code 949
routing-indicator 950
ssf 951
ssn 952
C H A P T E R 7 4 P2P Advertisement Server Group Configuration Mode Commands 953
ad-source 953
do show 955
end 955
exit 956
map-to-application 956
C H A P T E R 7 5 PCC-Action-Set Configuration Mode Commands 959
af-media-type 960
associate monitoring-key 962
authorize 963
dissociate monitoring-key 965
dynamic-rule-install 966
dynamic-rule-uninstall 970
end 971
exit 972
log-event 972
notify-user 973
offline-charging-server 974
online-charging-server 975
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3xxviii
Contents
request-usage-report monitoring-key 977
rule-activate 978
rule-deactivate 979
rulebase-activate 980
rulebase-deactivate 982
service-tag 983
terminate-session 984
usage-monitor 985
C H A P T E R 7 6 PCC-AF-Service Configuration Mode Commands 987
associate pcc-service 988
diameter dictionary 989
diameter origin end-point 990
end 991
exit 991
C H A P T E R 7 7 PCC-Condition-Group Configuration Mode Commands 993
af-application-id 994
af-media-codec 996
af-media-type 998
af-service-urn 999
an-gw-address 1001
authorized-qci 1003
base-station-id 1004
bearer-count 1006
connectivity-access-network 1007
end 1009
eval-condition-group 1010
event-time 1011
event-trigger 1012
exit 1014
imsi 1015
msisdn 1016
multi-line-or 1017
nai 1018
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 xxix
Contents
out-of-credit rulename 1020
out-of-credit rulebase-name 1021
pcef-address 1022
pdn-id 1024
profile-attribute 1025
radio-access-technology 1027
sgsn-ip 1028
sgsn-mcc-mnc 1030
subscription-attribute 1032
spr-profile-not-found 1033
threshold-condition usage-monitor 1034
user-access-network 1036
user-equipment-info esn 1038
user-equipment-info eui64 1039
user-equipment-info imeisv 1040
user-equipment-info mac 1042
user-equipment-info meid 1043
user-equipment-info modified-eui64 1045
user-location-info 1046
C H A P T E R 7 8 PCC-Data-Service Configuration Mode Commands 1049
end 1050
exit 1050
flow direction in 1051
flow direction out 1052
metering-method 1054
monitoring-key 1055
precedence 1056
qos-profile 1057
rating-group 1058
reporting-level 1058
service-identifier 1059
C H A P T E R 7 9 PCC-Event-Notification-Interface-Endpoint Configuration Mode Commands 1061
address 1062
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3xxx
Contents
end 1062
exit 1063
peer name 1063
peer select-algorithm 1064
peer select-peer 1065
C H A P T E R 8 0 PCC-Policy-Service Configuration Mode Commands 1067
associate pcc-service 1068
diameter dictionary 1069
diameter origin end-point 1070
ehrpd-access-bcm 1071
end 1072
exit 1073
gprs-access-bcm 1073
max policy-sessions 1074
subscriber-binding-identifier 1075
subscription-id-absence-action 1077
unsolicited-provisioning 1078
C H A P T E R 8 1 PCC-Service-Profile Configuration Mode Commands 1081
default-rulebase-name 1082
end 1083
eval-priority 1083
exit 1085
service-tag 1085
timeout long-duration 1087
usage-monitor 1088
unknown-services-treatment 1090
C H A P T E R 8 2 PCC-QoS-Profile Configuration Mode Commands 1093
arp-priority 1094
end 1095
exit 1095
guaranteed-bitrate 1096
max-bitrate 1097
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 xxxi
Contents
qci 1098
C H A P T E R 8 3 PCC-Quota Service Configuration Mode Commands 1101
associate pcc-service 1102
diameter dictionary 1103
diameter origin end-point 1103
end 1104
exit 1105
max total-charging-sessions 1105
C H A P T E R 8 4 PCC-Sp-Endpoint Configuration Mode Commands 1107
access-type 1108
diameter dictionary 1109
diameter origin end-point 1110
diameter peer-select 1111
end 1114
exit 1114
profile-data 1114
profile-update-notification 1116
spr subscriber identifier 1117
C H A P T E R 8 5 PCC-Service Addon Configuration Mode Commands 1119
associate-addon-state 1119
description 1121
duration 1122
end 1123
exit 1123
status active 1124
time-allowance 1125
volume-allowance 1126
C H A P T E R 8 6 PCC-TimeDef Configuration Mode Commands 1129
end 1129
exit 1130
start date 1130
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3xxxii
Contents
start day 1132
start time 1134
time-slot 1135
C H A P T E R 8 7 PCP Configuration Mode Commands 1139
do show 1139
end 1140
exit 1140
policy-control 1141
server 1142
C H A P T E R 8 8 PCP Policy Control Configuration Mode Commands 1145
do show 1145
end 1146
exit 1146
request-opcode 1147
response-opcode 1148
C H A P T E R 8 9 PDIF Service Configuration Mode Commands 1151
aaa attribute 1152
aaa authentication 1153
bind 1154
default 1155
do show 1157
duplicate-session-detection 1157
end 1158
exit 1159
hss 1159
ims-sh-service 1161
ip source-violation 1161
mobile-ip 1163
setup-timeout 1163
username 1164
C H A P T E R 9 0 PDG Service Configuration Mode Commands 1167
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 xxxiii
Contents
aaa attribute 1168
associate sgtp-service 1169
certificate-selection 1170
bind 1171
do show 1173
end 1173
exit 1174
ip gnp-qos-dscp 1174
ip qos-dscp 1178
ip source-violation 1181
max-tunnels-per-ue 1182
plmn id 1183
setup-timeout 1184
C H A P T E R 9 1 PDSN Service Configuration Mode Commands 1187
a11-signalling-packets 1189
aaa 3gpp2-service-option 1190
aaa nas-ip-address 1191
access-flow traffic-validation 1192
access-network 1193
airlink bad-sequence-number 1194
allow alt-ppp 1195
always-on-indication 1196
associate 1197
authentication 1198
bcmcs 1200
bind 1201
data-available-indicator 1203
data-over-signaling 1204
default subscriber 1205
direct-lte-indicator 1206
dormant-transition 1207
end 1208
enhanced-pcf-redirection 1208
exit 1209
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3xxxiv
Contents
fragment 1209
gre 1210
inter-pdsn-handoff mobility-event-indicator 1213
inter-pdsn-handover 1214
ip header-compression rohc 1215
ip local-port 1216
ip source-violation 1217
lifetime 1218
max-retransmissions 1219
mobile-ip foreign-agent context 1220
mobile-ipv6 1221
msid length 1222
nai-construction 1223
new-call conflict 1224
pcf-monitor 1225
pcf-session-id-change restart-ppp 1227
pdsn type0-tft attempt-inner-match 1228
peer-pcf 1229
pma-capability-indicator 1230
policy 1231
ppp 1234
qos-profile-id-mapping 1235
qos update 1237
radius accounting dropped-pkts 1239
registration-accept 1240
registration-ack-deny terminate-session-on-error 1240
registration-deny 1241
registration-discard 1243
registration-update 1245
retransmission-timeout 1246
service-option 1247
setup-timeout 1249
simple-ip allow 1250
spi 1251
tft-validation wait-timeout 1253
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 xxxv
Contents
threshold a11-ppp-send-discard 1254
threshold a11-rac-msg-discard 1255
threshold a11-rrp-failure 1256
threshold a11-rrq-msg-discard 1258
threshold init-rrq-rcvd-rate 1259
C H A P T E R 9 2 PDSN Service RoHC Configuration Mode Commands 1261
cid-mode 1261
do show 1262
end 1263
exit 1264
mrru 1264
profile 1265
C H A P T E R 9 3 Peer List Configuration Mode Commands 1267
address 1267
do show 1268
end 1269
exit 1269
C H A P T E R 9 4 Peer Profile Configuration Mode Commands 1271
arp-mapping 1271
description 1272
end 1273
exit 1274
gtpc 1274
lawful-intercept 1276
no-qos-negotiation 1276
upgrade-qos-supported 1277
C H A P T E R 9 5 Peer-Server Configuration Mode Commands 1279
do show 1279
end 1280
exit 1280
mode 1281
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3xxxvi
Contents
name 1282
psp 1283
routing-context 1284
self-point-code 1285
C H A P T E R 9 6 P-GW Service Configuration Mode Commands 1287
associate 1288
authorize-with-hss 1290
dns-client 1292
do show 1293
egtp 1293
end 1296
exit 1297
fqdn 1297
gtpc handle-collision upc nrupc 1299
gx-li 1300
map-initial-setup-auth-fail-to-gtp-cause-user-auth-fail 1300
message-timestamp-drift 1301
newcall 1303
pcscf-restoration 1304
plmn id 1306
session-delete-delay 1307
setup-timeout 1308
C H A P T E R 9 7 Policy Control Configuration Mode Commands 1311
apn-name-to-be-included 1312
arp-priority-level 1313
associate 1314
cc-profile 1316
custom-reauth-trigger 1318
diameter 3gpp-r9-flow-direction 1320
diameter clear-session 1321
diameter dictionary 1322
diameter encode-event-avps 1325
diameter encode-supported-features 1326
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 xxxvii
Contents
diameter host-select reselect 1333
diameter host-select row-precedence 1335
diameter host-select table 1337
diameter host-select-template 1340
diameter map 1341
diameter origin endpoint 1342
diameter request-timeout 1343
diameter session-prioritization 1344
diameter sgsn-change-reporting 1345
diameter update-dictionary-avps 1347
do show 1349
end 1350
endpoint-peer-select 1350
event-report-indication 1351
event-update 1353
exit 1355
failure-handling 1355
li-secret 1359
max-outstanding-ccr-u 1359
subscription-id service-type 1360
C H A P T E R 9 8 Plugin Configuration Mode Commands 1363
attribute 1363
do show 1364
end 1364
exit 1365
module priority 1365
C H A P T E R 9 9 PVC Configuration Mode Commands 1367
bind 1367
do show 1369
encapsulation aal5 1369
end 1370
exit 1371
shaping 1371
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3xxxviii
Contents
shutdown 1372
C H A P T E R 1 0 0 PVC Interface Configuration Mode Commands 1375
description 1376
do show 1377
end 1377
exit 1378
ip 1378
ip access-group 1378
ip address 1380
ip mtu 1381
ip ospf authentication-key 1382
ip ospf authentication-type 1383
ip ospf cost 1384
ip ospf dead-interval 1384
ip ospf hello-interval 1385
ip ospf message-digest-key 1386
ip ospf network 1387
ip ospf priority 1388
ip ospf retransmit-interval 1389
ip ospf transmit-delay 1390
C H A P T E R 1 0 1 QCI - QoS Mapping Configuration Mode Commands 1393
do show 1393
end 1394
exit 1394
operator-defined-qci 1395
qci 1398
C H A P T E R 1 0 2 QCI - RAN ID Mapping Configuration Mode Commands 1405
do show 1405
end 1406
exit 1406
profile-id 1407
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 xxxix
Contents
C H A P T E R 1 0 3 QoS L2 Mapping Configuration Mode Commands 1409
do show 1409
end 1410
exit 1410
internal-priority 1411
C H A P T E R 1 0 4 QoS Profile Configuration Mode Commands 1413
apn-ambr 1413
associate 1415
class 1416
description 1424
do show 1424
end 1425
epc-qos-params-in-gtpv1 1425
exit 1426
operator-defined-qci 1427
prefer-as-cap 1428
prefer-tc 1429
qci-when-missing-in-subscription 1430
qci-reject 1431
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3xl
Contents
C H A P T E R 1Command Line Interface Reference, Modes I - Q,StarOS Release 21.3
TheASR 5000 hardware platform has reached end of life and is not supported in this release. Any referencesto the ASR 5000 (specific or implied) or its components in this document are coincidental. Full details onthe ASR 5000 hardware platform end of life are available at:https://www.cisco.com/c/en/us/products/collateral/wireless/asr-5000-series/eos-eol-notice-c51-735573.html
Important
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 1
Command Line Interface Reference, Modes I - Q, StarOS Release 21.32
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3
C H A P T E R 2IGMP Profile Configuration Mode Commands
The Internet GroupManagement Protocol (IGMP) Profile ConfigurationMode is used to create and managethe IGMP parameters for an Ethernet interface.
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-igmp-profile-)#
Available commands or keywords/variables vary based on platform type, product version, and installedlicense(s).
Important
• default ip igmp, page 3
• end, page 4
• exit, page 4
• ip igmp query, page 5
• ip igmp require router-alert, page 6
• ip igmp robustness, page 6
• ip igmp unsolicited-report-interval, page 7
• ip igmp version, page 8
default ip igmpConfigures default IGMP parameters.
Product All
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 3
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description default ip igmp { query | require | robustness | unsolicited-report-interval | version }
Usage Guidelines Specify the IGMP parameters for the default profile. Refer to the remaining command description in thischapter for additional information.
Example
To apply enable echo mode on this interface, use the following command:bfd echo
endExits the current configuration mode and returns to the Exec mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description end
Usage Guidelines Use this command to return to the Exec mode.
exitExits the current mode and returns to the parent configuration mode.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.34
IGMP Profile Configuration Mode Commandsend
Product All
Privilege Security Administrator, Administrator
Syntax Description exit
Usage Guidelines Use this command to return to the parent configuration mode.
ip igmp queryConfigures the maximum response time for IGMP queries.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description ip igmp query max-response-time seconds
max-response-time seconds
Specify the maximum number of seconds that the system will wait for an IGMP response as an integer from1 through 25.
Usage Guidelines Specify the maximum response time for IGMP queries.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 5
IGMP Profile Configuration Mode Commandsip igmp query
Example
ip igmp query max-response-time 10
ip igmp require router-alertSets the router alert flag to ON in IP IGMP packets.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description [ no ] ip igmp require router-alert
no
Sets the router alert flag to OFF in IP IGMP packets.
Usage Guidelines Sets the router alert flag to ON in IP IGMP packets.
Example
ip igmp require router-alert
ip igmp robustnessSets the Robustness value in IP IGMP packets. The Robustness variable allows tuning for the expected packetloss on a subnet. If a subnet is expected to be lossy, the Robustness variable may be increased. IGMP is robustto packet losses. The Robustness variable should not be set to 1 (one).
Product All
Command Line Interface Reference, Modes I - Q, StarOS Release 21.36
IGMP Profile Configuration Mode Commandsip igmp require router-alert
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description ip igmp robustness value
value
Sets the robustness value as an integer from 1 through 10. Default: 2
Usage Guidelines Sets the robustness value in IP IGMP packets.
Example
ip igmp robustness 7
ip igmp unsolicited-report-intervalSets the Unsolicited Report Interval which is the time between repetitions of a host's initial report of membershipin a group.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description ip igmp unsolicited-report-interval seconds
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 7
IGMP Profile Configuration Mode Commandsip igmp unsolicited-report-interval
seconds
Specifies the number of seconds between repetitions of a host's initial report of membership in a group as aninteger from 1 through 25. Default: 10
Usage Guidelines Set the Unsolicited Report Interval which is the time between repetitions of a host's initial report of membershipin a group.
Example
ip igmp unsolicited-report-interval 15
ip igmp versionSets the IGMP version to be supported by this interface.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description ip igmp version { v1 | v2 | v3 }
v1 | v2 | v3
Specifies the IGMP Version number:
• v1: Version 1, RFC 1112
• v2: Version 2, RFC 2236
• v3: Version 3, RFC 4604
Usage Guidelines Set the IGMP version to be supported by this interface.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.38
IGMP Profile Configuration Mode Commandsip igmp version
Example
ip igmp version v2
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 9
IGMP Profile Configuration Mode Commandsip igmp version
Command Line Interface Reference, Modes I - Q, StarOS Release 21.310
IGMP Profile Configuration Mode Commandsip igmp version
C H A P T E R 3IKEv2 Security Association Configuration ModeCommands
The IKEv2 Security Association Configuration Mode is used to configure a Security Association (SA) atthe outset of an IPSec session. A security association is the collection of algorithms and parameters (suchas keys) that is being used to encrypt and authenticate a particular flow in one direction. In normalbi-directional traffic, the flows are secured by a pair of security associations.
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
The commands or keywords/variables that are available are dependent on platform type, product version,and installed license(s).
Important
• default, page 12
• encryption, page 12
• end, page 14
• exit, page 14
• group, page 15
• hmac, page 16
• lifetime , page 17
• prf, page 18
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 11
defaultSets the default properties for the selected parameter.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description default { encryption | group | hmac | lifetime | prf }Set the defaults for the following parameters:
• encryption: Default algorithm for the IKEv2 IKE SA is AES-CBC-128.
• group: Default Diffie-Hellman group is Group 2.
• hmac: Default IKEv2 IKE SA hashing algorithm is SHA1-96.
• lifetime: Default lifetime for SAs derived from this transform-set is 86400 seconds.
• prf: Default PRF for the IKEv2 IKE SA is SHA1.
Usage Guidelines Configure default parameters for the IKEv2 IKE SA transform-set.
Example
Use the following configuration to set the default encryption algorithm:default encryption
encryptionConfigures the appropriate encryption algorithm and encryption key length for the IKEv2 IKE securityassociation. AES-CBC-128 is the default.
Product ePDG
Command Line Interface Reference, Modes I - Q, StarOS Release 21.312
IKEv2 Security Association Configuration Mode Commandsdefault
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description encryption { 3des-cbc | aes-cbc-128 | aes-cbc-256 | des-cbc | null }default encryption
3des-cbc
Data Encryption Standard Cipher Block Chaining encryption applied to the message three times using threedifferent cypher keys (triple DES).
aes-cbc-128
Advanced Encryption Standard Cipher Block Chaining with a key length of 128 bits.
aes-cbc-256
Advanced Encryption Standard Cipher Block Chaining with a key length of 256 bits.
des-cbc
Data Encryption Standard Cipher Block Chaining. Encryption using a 56-bit key size. Relatively insecure.
null
Configures no IKEv2 IKE Security Association Encryption Algorithm. All IKEv2 IPsec Child SecurityAssociation protected traffic will be sent in the clear.
USE OF THIS ALGORITHM FOR IKE_SA ENCRYPTION IS A VIOLATION OF RFC 4306. THISALGORITHM SHOULD ONLY BE USED FOR TESTING PURPOSES.
Note
Usage Guidelines IKEv2 requires a confidentiality algorithm to be applied in order to work.
In cipher block cryptography, the plaintext is broken into blocks usually of 64 or 128 bits in length. In cipherblock chaining (CBC) each encrypted block is chained into the next block of plaintext to be encrypted. Arandomly-generated vector is applied to the first block of plaintext in lieu of an encrypted block. CBC providesconfidentiality, but not message integrity.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 13
IKEv2 Security Association Configuration Mode Commandsencryption
Because RFC 4307 calls for interoperability between IPSec and IKEv2, the IKEv2 confidentiality algorithmsmust be the same as those configured for IPSec in order for there to be an acceptable match during the IKEmessage exchange. Because of RFC4307, in IKEv2, there is no viable NULL option, it is available for testingonly.
Example
The following command configures the encryption to be aes-cbc-128:encryption aes-cbc-128
endExits the current configuration mode and returns to the Exec mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description end
Usage Guidelines Use this command to return to the Exec mode.
exitExits the current mode and returns to the parent configuration mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description exit
Usage Guidelines Use this command to return to the parent configuration mode.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.314
IKEv2 Security Association Configuration Mode Commandsend
groupConfigures the appropriate key exchange cryptographic strength by applying a Diffie-Hellman group. Defaultis Group 2.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description group { 1 | 2 | 5 | 14 }default group
1
Configures crypto strength at the Group 1 level. Lowest security.
2
Configures crypto strength at the Group 2 (default) level. Medium security.
This is the default setting for this command.
5
Configures crypto strength at the Group 5 level. Higher security.
14
Configures crypto strength at the Group 14 level. Highest security
Usage Guidelines Diffie-Hellman groups are used to determine the length of the base prime numbers used during the keyexchange process in IKEv2. The cryptographic strength of any key derived depends, in part, on the strengthof the Diffie-Hellman group upon which the prime numbers are based.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 15
IKEv2 Security Association Configuration Mode Commandsgroup
Group 1 provides 768 bits of keying strength, Group 2 provides 1024 bits, Group 5 provides 1536 bits andGroup 14 provides 2048 bits of encryption strength.
Configuring a DH group also enables Perfect Forward Secrecy, which is disabled by default.
Example
This command configures crypto strength at the Group 14 level. Highest security group 14:default group
hmacConfigures the IKEv2 IKE SA integrity algorithm. Default is SHA1-96.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description hmac { aes-xcbc-96 | md5-96 | sha1-96 | sha2-256-128 | sha2-384-192 | sha2-512-256 }default hmac
aes-xcbc-96
HMAC-AES-XCBC uses a 128-bit secret key and produces a 128-bit authenticator value.
md5-96
HMAC-MD5 uses a 128-bit secret key and produces a 128-bit authenticator value.
sha1-96
HMAC-SHA-1 uses a 160-bit secret key and produces a 160-bit authenticator value. This is the default settingfor this command.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.316
IKEv2 Security Association Configuration Mode Commandshmac
sha2-256-128
HMAC-SHA-256 uses a 256-bit secret key and produces a 128-bit authenticator value.
sha2-384-192
HMAC-SHA-384 uses a 384-bit secret key and produces a 192-bit authenticator value.
sha2-512-256
HMAC-SHA-512 uses a 512-bit secret key and produces a 256-bit authenticator value.
Usage Guidelines IKEv2 requires an integrity algorithm be configured in order to work.
A keyed-Hash Message Authentication Code, or HMAC, is a type of message authentication code (MAC)calculated using a cryptographic hash function in combination with a secret key to verify both data integrityand message authenticity. A hash takes a message of any size and transforms it into a message of a fixed size:the authenticator value. This is truncated and transmitted. The authenticator value is reconstituted by thereceiver and the first truncated bits are compared for a 100 percent match.
Example
This command configures HMAC value md5-96:hmac md5-96
lifetimeConfigures the lifetime of a security association (SA) in seconds.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description lifetime secdefault lifetime
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 17
IKEv2 Security Association Configuration Mode Commandslifetime
lifetime sec
Sets the value of the timeout parameter in seconds as an integer from 60 through 86400. Default: 86400
Usage Guidelines The secret keys that are used for various aspects of a configuration should only be used for a limited amountof time before timing out. This exposes a limited amount of data to the possibility of hacking. If the SA expires,the options are then to either close the SA and open an new one, or renew the existing SA.
Example
The following command sets the lifetime timeout to 120 seconds:lifetime 120
prfSelects one of the HMAC integrity algorithms to act as the IKE Pseudo-Random Function. A PRF producesa string of bits that an attacker cannot distinguish from random bit string without knowledge of the secret key.The default is SHA1.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description prf { aes-xcbc-128 | md5 | sha1 | sha2-256 | sha2-384 | sha2-512 }default prf
aes-xcbc-128
Configure IKEv2 IKE Security Association Pseudo Algorithm to be AES-XCBC-128.
md5
MD5 uses a 128-bit secret key and produces a 128-bit authenticator value.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.318
IKEv2 Security Association Configuration Mode Commandsprf
sha1
SHA-1 uses a 160-bit secret key and produces a 160-bit authenticator value.
SHA-1 is considered cryptographically stronger than MD5, but it takes more CPU cycles to compute.
This is the default setting for this command.
sha2-256
PRF-HMAC-SHA-256 uses a 256-bit secret key.
sha2-384
PRF-HMAC-SHA-384 uses a 384-bit secret key.
sha2-512
PRF-HMAC-SHA-512 uses a 512-bit secret key.
Usage Guidelines This command generates keying material for all the cryptographic algorithms used in both the IKE_SA andthe CHILD_SAs.
Example
This configuration sets the PRF to be value sha2-256:prf sha2-256
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 19
IKEv2 Security Association Configuration Mode Commandsprf
Command Line Interface Reference, Modes I - Q, StarOS Release 21.320
IKEv2 Security Association Configuration Mode Commandsprf
C H A P T E R 4IMEI Profile Configuration Mode
Essentially, an IMEI profile is a template which groups a set of device-specific commands that may beapplicable to one or more IMEIs. The same IMEI profile can be associated with multiple IMEI ranges andmultiple operator policies.
An SGSN supports a total of 1000 IMEI profile configurations.
The IMEI profile configuration mode defines a set of parameters controlling the SGSN behavior when aRequest is received from a device in the specified IMEI (International Mobile Equipment Identity) range.An IMEI profile is a key element in the Operator Policy feature and an IMEI profile is not used or validunless it is associated with an IMEI range and this association is specified in an operator policy (see theOperator Policy ConfigurationModeCommands chapter elsewhere in theCommand Line Interface Reference).
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:
[local]host_name(config-imei-profile-profile_name)#
The commands or keywords/variables that are available are dependent on platform type, product version,and installed license(s).
Important
• associate, page 22
• blacklist, page 23
• description, page 23
• direct-tunnel, page 24
• end, page 25
• exit, page 25
• ggsn-address, page 26
• ignore-pdp-data-inactivity, page 27
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 21
• pdp-activate, page 28
associateAssociate an APN remap table with this IMEI profile.
Note that an APN remap table can be associated with an IMEI profile before the table has actually beencreated/configured.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description associate apn-remap-table table_nameno associate apn-remap-table
no
Disables the configured remap table association.
table_name
Define the name of an APN remap table that is to be associated with this IMEI profile for call routing basedin IMEI.
Usage Guidelines Use this command to associate an APN remap table with this IMEI profile. With such an association, it ispossible to override an APN call-routing based on an IMEI.
For example, with the APN exceptions defined in an APN remap table (refer to the APN Remap TableConfigurationMode chapter), a blank APN or an incorrect APN could be overriden. So during PDPActivationfor in incoming call, the call could be rerouted based on an IMEI in the range defined for the IMEI profile.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.322
IMEI Profile Configuration Modeassociate
Example
Associate the APN remap table 'remapHO' (remaps all calls with blank APNS to the head-office) to this IMEIprofile:associate apn-remap-table remapHO
blacklistBlacklist all mobile devices that fit the IMEI definitions associated with this IMEI profile.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description blacklistremove blacklist
remove
Including this keywordwith the command, removes the blacklist command from the IMEI profile configuration.
Usage Guidelines Blacklists subscribers whose devices bear IMEI that match the defined IMEI range for this profile.
Example
Use this command to black list all subscribers with IMEI that fall within the range set for this IMEI profile:blacklist
descriptionDefine a descriptive string relevant to the specific APN profile.
Product SGSN
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 23
IMEI Profile Configuration Modeblacklist
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description description descriptionremove description
remove
Removes the configured description from this APN profile.
description
Enter an alphanumeric string of 1 to 100 alphanumeric characters. The string may include spaces, punctuation,and case-sensitive letters if the string is enclosed in double quotes ( " ).
Usage Guidelines Define information that identifies this particularly APN profile.
Example
Indicate that this IMEI profile IMEIprof1 is to be used for customers in the United Kingdom and that theprofile:description "IMEIprof1 defines routing actions based on IMEI for customers in the UK."
direct-tunnelInstruct the SGSN to enable/disable a direct tunnel between the RNC and the GGSN based on the IuPS serviceconfiguration.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
Command Line Interface Reference, Modes I - Q, StarOS Release 21.324
IMEI Profile Configuration Modedirect-tunnel
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description direct-tunnel check-iups-serviceno direct-tunnel
no direct-tunnel
This command instructs the SGSN to disable the direct tunnel function between the GGSN and the RNC.
Usage Guidelines Direct tunnel is enabled by default on the GGSN and often on the RNC. This leaves it to the SGSN'sconfiguration to actually enable or disable a direct tunnel.
With the SGSN, the options for configuring a direct tunnel are complex -- enable/disable on the basis of APNs,or RNCs, or GGSNs, or on the basis of the IMEI range. Refer to the SGSN Administration Guide forconfiguration details.
Example
Assuming the IuPS service configuration has enabled DT for associated RNCs, then use this command toenable DT from the RNC to the GGSN associated with this IMEI profile:direct tunnel check-iups-service
endExits the current configuration mode and returns to the Exec mode.
Product SGSN
Privilege Security Administrator, Administrator
Syntax Description end
Usage Guidelines Return to the Exec mode.
exitExits the current configuration mode and returns to the context configuration mode.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 25
IMEI Profile Configuration Modeend
Product SGSN
Privilege Security Administrator, Administrator
Syntax Description exit
Usage Guidelines Move to the previous configuration mode.
ggsn-addressIdentify the target GGSN for traffic being managed by this IMEI profile.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description ggsn-address IPv4/IPv6_address
IPv4/IPv6_address
Enter the IP address of the target GGSN. Enter the address in either standard IPv4 dotted decimal format orin standard IPv6 colon notation format.
Usage Guidelines Use this command to define the IP address of the target GGSN to be associated with this IMEI profile.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.326
IMEI Profile Configuration Modeggsn-address
Example
The following command identifes the address of the GGSN associated with this IMEI profile as 123.123.11.1
ggsn-address 123.123.11.1
ignore-pdp-data-inactivityOn executing this command the SGSN ignores PDP Data Inactivity configuration under the APN profile forone or more matching IMEIs.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description ignore-pdp-data-inactivityremove ignore-pdp-data-inactivity
remove
This command is used to disable or remove the option to ignore PDP data inactivity from the IMEI profile.
Usage Guidelines The SGSN supports options to configure PDP Data Inactivity detection duration and actions to be performedon timeout under the APN-Profile. The following configurable actions are supported under APN-Profile incase of PDP Data Inactivity detection in the PDP context:
1 De-activate all PDPs of the subscriber2 De-activate all PDPs of the bundle (all linked PDPs)3 Detach the subscriber. This action is triggered when:
• Data in-activity is detected for all PDPs
• Data in-activity is detected for any of the PDPs
On the Detection of the PDPData Inactivity, depending on the configuration option the SGSN either de-activatesthe PDP or detaches the subscriber.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 27
IMEI Profile Configuration Modeignore-pdp-data-inactivity
The ignore-pdp-data-inactivity CLI is added to provide an option under the IMEI-Profile to ignore PDPData Inactivity configuration for one or more IMEIs. On configuring this CLI, the SGSN ignores the applicationof in-activity configuration (configured in the APN-Profile) for a specified set of IMEI's.
The IMEI range or set of IMEI's are mapped to specific IMEI-Profile using the CLI configuration optionunder Operator-policy.
Note
Example
Use this command to ignore PDPData Inactivity configuration under the APN profile for one or more matchingIMEIs.
ignore-pdp-data-inactivity
pdp-activateThis command enables the operator to configure the SGSN to reject Secondary PDPActivation Requests fromthe UE based on IMEI range.
Product SGSN
Privilege Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description [ remove ] pdp-activate { drop | restrict } secondary-activation access-type { gprs | umts }
remove
Removes the configured value and returns the pdp-activate configuration to the default 'not configured' state.
drop
This keyword causes the GSN to ignore the Request.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.328
IMEI Profile Configuration Modepdp-activate
restrict
This keyword instructs the SGSN to reject Secondary PDP Activation Requests.
access-type { gprs | umts }
This keyword instructs the SGSN to ignore or reject Secondary PDP Activation Requests on the basis of theUE's access network type:
• gprs : from a 2G network.
• umts : from a 3G network.
Usage Guidelines The SGSN administrator can use this command to configure the IMEI profile in the operator policy to eitherignore or reject Secondary PDP Activation Requests from UEs based on an IMEI range and UE access-type.
Restricting secondary PDP activation based on the IMEI (in the IMEI profile) takes precedence over secondaryPDP activation that might be configured in the call control profile.
Example
Enable rejection of Secondary PDP Activation Requests for 2G callers:
pdp-activate restrict secondary-activation access-type gprs
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 29
IMEI Profile Configuration Modepdp-activate
Command Line Interface Reference, Modes I - Q, StarOS Release 21.330
IMEI Profile Configuration Modepdp-activate
C H A P T E R 5IMEI-TAC-Group Configuration Mode Commands
The IMEI-TAC-GroupConfigurationMode provides access to the commands used to configure the IMEI-TACvalues and ranges included in the IMEI-TAC groups. These IMEI-TAC values and ranges are used as theselection criteria for operator policy selection based on IMEI-TAC. For details about this functionality, referto the Operator Policy Selection Based on IMEI-TAC chapter in theMME Administration Guide.
Command Modes Exec > Global Configuration > LTE Policy Configuration > IMEI-TAC-Group
configure > lte-policy > imei-tac-groupgroup_name
Entering the above command sequence results in the following prompt:
[local]host_name(imei-tac-group)#
The commands or keywords/variables that are available are dependent on platform type, product version,and installed license(s).
Important
• end, page 31
• exit, page 32
• tac, page 32
• tac-range, page 33
endExits the current configuration mode and returns to the Exec mode.
Product All
Privilege Security Administrator, Administrator
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 31
Syntax Description end
Usage Guidelines Use this command to return to the Exec mode.
exitExits the current mode and returns to the parent configuration mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description exit
Usage Guidelines Use this command to return to the parent configuration mode.
tacConfitures individual TAC (type allocation code) values to be included in a IMEI-TAC group which will beused as criteria for operator policy selection.
Product MME
Privilege Administrator
Command Modes Exec > Global Configuration > LTE Policy Configuration > IMEI-TAC-Group
configure > lte-policy > imei-tac-groupgroup_name
Entering the above command sequence results in the following prompt:
[local]host_name(imei-tac-group)#
Command Line Interface Reference, Modes I - Q, StarOS Release 21.332
IMEI-TAC-Group Configuration Mode Commandsexit
Syntax Description [ no ] tac tac_value [ tac_value tac_value + ]
no
Removes the identified TAC from the IMEI-TAC group configuration.
tac_value
Specifies the 8-digit number that identifies a specific "type allocation code". When entering more than oneTAC, simply use a space between each TAC. Additional TAC values can be added at any time after theIMEI-TAC group is configured.
Usage Guidelines Use this command to enter one or more individual TAC (type allocation code) values to the IMEI-TAC group.Up to 500 unique IMEI-TAC values can be included in an IMEI-TAC group.
The TAC, the first eight digits of the 15-digit IMEI or 16-digit IMEI-SV, identifies the equipment manufacturer,the wireless device type and the model number (if there is one); for example, TAC of 35201906 identifies anApple iPhone 5S.
Example
The following command adds four IMEI-TAC to an IMEI-TAC group:tac 31441551 77777777 87650506 87654321
tac-rangeDefines a range of IMEI-TAC values to be included in a IMEI-TAC group which will be used as criteria foroperator policy selection.
Product MME
Privilege Administrator
Command Modes Exec > Global Configuration > LTE Policy Configuration > IMEI-TAC-Group
configure > lte-policy > imei-tac-groupgroup_name
Entering the above command sequence results in the following prompt:
[local]host_name(imei-tac-group)#
Syntax Description [ no ] tac-range from start_tac_value to end_tac_value
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 33
IMEI-TAC-Group Configuration Mode Commandstac-range
no
Removes the identified TAC range from the IMEI-TAC group configuration.
start_tac_value to end_tac_value
tac_value - Specifies the 8-digit number that identifies a specific "type allocation code". The start TAC isthe first TAC in the range. The end TAC is the last TAC in the range.
Usage Guidelines Use this command to enter up to 20 IMEI-TAC value ranges. Ranges can be overlapping.
The TAC, the first eight digits of the 15-digit IMEI or 16-digit IMEI-SV, identifies the equipment manufacturer,the wireless device type and the model number (if there is one); for example, TAC of 35201906 identifies anApple mobile phone. Defining ranges would enable carriers to select operator policies for call handling basedon multiple device types.
Example
The following command defines a TAC range to be added to the IMEI-TAC group:tac-range from 23456789 to 23456889
Command Line Interface Reference, Modes I - Q, StarOS Release 21.334
IMEI-TAC-Group Configuration Mode Commandstac-range
C H A P T E R 6IMS Authorization Service Configuration ModeCommands
The IMS Authorization Service Configuration Mode enables to configure IP Multimedia Subsystem (IMS)authorization services to manage policy control functions and Gx interface support.
Command Modes Exec > Global Configuration > Context Configuration > IMS Authorization Service Configuration
configure > context context_name > ims-auth-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-imsa-service)#
The commands or keywords/variables that are available are dependent on platform type, product version,and installed license(s).
Important
• end, page 36
• exit, page 36
• p-cscf discovery, page 36
• p-cscf table, page 38
• policy-control, page 40
• qos-update-timeout, page 41
• reauth-trigger, page 42
• signaling-flag, page 44
• signaling-flow, page 45
• traffic-policy, page 47
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 35
endExits the current configuration mode and returns to the Exec mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description end
Usage Guidelines Use this command to return to the Exec mode.
exitExits the current mode and returns to the parent configuration mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description exit
Usage Guidelines Use this command to return to the parent configuration mode.
p-cscf discoveryThis command defines the method of Proxy-Call Session Control Function (P-CSCF) discovery to be used.
Product All
Command Line Interface Reference, Modes I - Q, StarOS Release 21.336
IMS Authorization Service Configuration Mode Commandsend
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IMS Authorization Service Configuration
configure > context context_name > ims-auth-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-imsa-service)#
Syntax Description p-cscf discovery { table { 1 | 2 } [ algorithm { ip-address-modulus | msisdn-modulus | round-robin } ] |diameter-configured }[ default | no ] p-cscf discovery
default
Sets the P-CSCF discovery to default parameter.
no
Removes/deletes configured parameters for P-CSCF discovery.
table { 1 | 2 }
Specifies that which P-CSCF table is to be used to obtain the primary and secondary P-CSCF addresses. Total2 tables can be configured for P-CSCF discovery.
algorithm { ip-address-modulus | msisdn-modulus | round-robin }
Specifies the algorithm to select the row from the P-CSCF table to be used for P-CSCF discovery.
• ip-address-modulus: This algorithm divides the IP address, in binary, of the subscriber by the numberof rows in the table, and the remainder is used as an index into the specified table to select the row.
• msisdn-modulus: This algorithm divides the MSISDN value, in binary without the leading "+", of thesubscriber by the number of rows in the table, and the remainder is used as an index in the specific tableto select the row.
• round-robin: This algorithm rotates all rows in the active table for selection of the row in round-robinway. If no algorithm is specified this is the default behavior.
Default: round-robin
diameter-configured
This option enables the table number and algorithm specified by the diameter host-select table configurationin Policy Control Configuration mode.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.3 37
IMS Authorization Service Configuration Mode Commandsp-cscf discovery
Usage Guidelines Use this command to configure the table and row selection methods to select IP address/host address forP-CSCF discovery.
Example
The following command specifies table 1 with round-robin algorithm to select the rows with IP address forP-CSCF discovery.p-cscf discovery table 1 algorithm round-robin
p-cscf tableThis command adds/appends rows with primary and/or secondary IPv4/IPv6 addresses to a P-CSCF discoverytable with precedence for P-CSCF discovery.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IMS Authorization Service Configuration
configure > context context_name > ims-auth-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-imsa-service)#
Syntax Description In releases prior to 18:
p-cscf table { 1 | 2 } row-precedence precedence_value { address ipv4_address | ipv6-address ipv6_address} [ secondary { address ipv4_address | ipv6-address ipv6_address } ] [ weight value ]no p-cscf table { 1 | 2 } row-precedence precedence_valueIn 18 and later releases:
p-cscf table { 1 | 2 } row-precedence precedence_value { ipv4-address ipv4_address [ ipv6-addressipv6_address ] | ipv6-address ipv6_address [ ipv4-address ipv4_address ] } [ secondary { ipv4-addressipv4_address [ ipv6-address ipv6_address ] | ipv6-address ipv6_address [ ipv4-address ipv4_address ] } [weight value ]no p-cscf table { 1 | 2 } row-precedence precedence_value
no
Removes/deletes configured row with precedence in specified table for P-CSCF discovery address.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.338
IMS Authorization Service Configuration Mode Commandsp-cscf table
{ 1 | 2 }
Specifies which P-CSCF table is to be used to add/append the primary and secondary P-CSCF addresses. Twotables can be configured for P-CSCF discovery address.
row-precedence precedence_value
This keyword adds/appends the row with the specified row-precedence to the P-CSCF address table.
In 8.1 and later releases, precedence_value must be an integer from 1 through 128, and a maximum of 128rows can be added to a table.
In release 8.0, precedence_value must be an integer from 1 through 100, and a maximum of 16 rows can beadded to a table.
secondary
Specifies the secondary IPv4/IPv6 address to be entered in P-CSCF table rows.
address ip_address
Specifies the primary and/or secondary IPv4 address for P-CSCF discovery table. This keyword, if used withsecondary keyword, specifies the secondary IPv4 address.
This keyword is available only in releases prior to 18. In 18 and later releases, this keyword is concealedand is replaced with ipv4-address to support the PDN type v4v6 request for VoLTE setup.
Important
ip_address must be entered in IPv4 dotted-decimal notation.
ipv4-address ipv4_address
Specifies the primary and/or secondary IPv4 address for P-CSCF discovery table. This keyword, if used withsecondary keyword, specifies the secondary IPv4 address.
ipv4_address must be entered in IPv4 dotted-decimal notation.
This keyword is available in 18 and later releases to support the PDN type v4v6 request for VoLTE setup.Important
In releases prior to 18, the P-CSCF configuration accepts only one primary and one secondary P-CSCF IPaddresses – both IPv4 and IPv6 addresses per row in the P-CSCF address table. Two IP addresses are notsufficient enough to address the requirement with PDN type v4v6 request for VoLTE setup. Hence, in release18, the P-CSCF configuration has been enhanced to allow users to configure a maximum of two IPv4 addresses(primary/