-
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3First Published: 2017-07-27
Americas HeadquartersCisco Systems, Inc.170 West Tasman DriveSan
Jose, CA 95134-1706USAhttp://www.cisco.comTel: 408 526-4000 800
553-NETS (6387)Fax: 408 527-0883
-
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN
THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS,INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE
BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY
KIND,EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR
THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITEDWARRANTY FOR THE ACCOMPANYING
PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED
WITHTHE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF
YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED
WARRANTY,CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an
adaptation of a program developed by the University of California,
Berkeley (UCB) as part of UCB's public domain versionof the UNIX
operating system. All rights reserved. Copyright © 1981, Regents of
the University of California.
NOTWITHSTANDINGANYOTHERWARRANTYHEREIN, ALL DOCUMENT FILES AND
SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS"WITH ALL
FAULTS.CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES,
EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE
OFMERCHANTABILITY, FITNESS FORA PARTICULAR
PURPOSEANDNONINFRINGEMENTORARISING FROMACOURSEOFDEALING, USAGE, OR
TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY
INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUTLIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING
OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR
ITS SUPPLIERSHAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in
this document are not intended to be actual addresses and phone
numbers. Any examples, command display output, networktopology
diagrams, and other figures included in the document are shown for
illustrative purposes only. Any use of actual IP addresses or phone
numbers in illustrative content is unintentionaland
coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks
of Cisco and/or its affiliates in the U.S. and other countries. To
view a list of Cisco trademarks, go to this URL:
http://www.cisco.com/go/trademarks. Third-party trademarks
mentioned are the property of their respective owners. The use of
the word partner does not imply a partnershiprelationship between
Cisco and any other company. (1110R)
© 2017 Cisco Systems, Inc. All rights reserved.
http://www.cisco.com/go/trademarkshttp://www.cisco.com/go/trademarks
-
C O N T E N T S
C H A P T E R 1 Command Line Interface Reference, Modes I - Q,
StarOS Release 21.3 1
C H A P T E R 2 IGMP Profile Configuration Mode Commands 3
default ip igmp 3
end 4
exit 4
ip igmp query 5
ip igmp require router-alert 6
ip igmp robustness 6
ip igmp unsolicited-report-interval 7
ip igmp version 8
C H A P T E R 3 IKEv2 Security Association Configuration Mode
Commands 11
default 12
encryption 12
end 14
exit 14
group 15
hmac 16
lifetime 17
prf 18
C H A P T E R 4 IMEI Profile Configuration Mode 21
associate 22
blacklist 23
description 23
direct-tunnel 24
end 25
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 iii
-
exit 25
ggsn-address 26
ignore-pdp-data-inactivity 27
pdp-activate 28
C H A P T E R 5 IMEI-TAC-Group Configuration Mode Commands
31
end 31
exit 32
tac 32
tac-range 33
C H A P T E R 6 IMS Authorization Service Configuration Mode
Commands 35
end 36
exit 36
p-cscf discovery 36
p-cscf table 38
policy-control 40
qos-update-timeout 41
reauth-trigger 42
signaling-flag 44
signaling-flow 45
traffic-policy 47
C H A P T E R 7 IMS Sh Service Configuration Mode Commands
49
diameter 49
end 51
exit 51
failure-handling 52
request 53
C H A P T E R 8 IPMS Client Configuration Mode Commands 55
end 55
exit 56
export keys 56
heartbeat 57
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3iv
Contents
-
server 58
source 60
C H A P T E R 9 IPNE Endpoint Configuration Mode Commands 61
bind 61
end 62
exit 63
peer 63
C H A P T E R 1 0 IPNE Service Configuration Mode Commands
65
end 65
exit 66
ipne-endpoint 66
C H A P T E R 1 1 IPSec Transform Set Configuration Mode
Commands 69
encryption 69
end 72
esn 72
exit 73
group 74
hmac 75
mode 77
C H A P T E R 1 2 IPSG RADIUS Snoop Configuration Mode Commands
79
bind 80
connection authorization 81
end 82
exit 82
profile 83
radius 84
sess-replacement 86
setup-timeout 87
C H A P T E R 1 3 IPSG RADIUS Server Configuration Mode Commands
89
accounting-context 90
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 v
Contents
-
associate sgtp-service 91
bind 92
connection authorization 95
end 96
exit 96
gtp max-contexts-per-imsi 97
gtp peer-ip-address 98
ip 99
map ue-mac-to-imei 101
overlapping-ip-address 102
plmn id 103
profile 104
radius accounting 106
radius dictionary 109
respond-to-non-existing-session 111
sess-replacement 112
setup-timeout 113
w-apn 114
C H A P T E R 1 4 IPSP Configuration Mode Commands 117
dead-interval 117
end 118
exit 119
reserved-free-percentage 119
C H A P T E R 1 5 IPv6 ACL Configuration Mode Commands 121
deny/permit (by source IP address masking) 122
deny/permit (any) 125
deny/permit (by host IP address) 127
deny/permit (by source ICMP packets) 129
deny/permit (by IP packets) 132
deny/permit (by TCP/UDP packets) 135
end 139
exit 140
readdress server 140
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3vi
Contents
-
redirect context (by IP address masking) 143
redirect context (any) 146
redirect context (by host IP address) 148
redirect context (by source ICMP packets) 150
redirect context (by IP packets) 153
redirect context (by TCP/UDP packets) 156
redirect css delivery-sequence 160
redirect css service (any) 160
redirect css service (by host IP address) 162
redirect css service (by ICMP packets) 164
redirect css service (by IP packets) 167
redirect css service (by source IP address masking) 171
redirect css service (by TCP/UDP packets) 173
redirect css service (for downlink, any) 177
redirect css service (for downlink, by host IP address) 179
redirect css service (for downlink, by ICMP packets) 181
redirect css service (for downlink, by IP packets) 185
redirect css service (for downlink, by source IP address
masking) 188
redirect css service (for downlink, by TCP/UDP packets) 190
redirect css service (for uplink, any) 194
redirect css service (for uplink, by host IP address) 196
redirect css service (for uplink, by ICMP packets) 198
redirect css service (for uplink, by IP packets) 202
redirect css service (for uplink, by source IP address masking)
205
redirect css service (for uplink, by TCP/UDP packets) 206
redirect nexthop (by IP address masking) 210
redirect nexthop (any) 213
redirect nexthop (by host IP address) 215
redirect nexthop (by source ICMP packets) 217
redirect nexthop (by IP packets) 221
redirect nexthop (by TCP/UDP packets) 224
C H A P T E R 1 6 IPv6 to IPv4 Tunnel Interface Configuration
Mode Commands 229
destination address 230
do show 230
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 vii
Contents
-
end 231
exit 231
mode 232
source 233
tos 234
ttl 235
C H A P T E R 1 7 IP VRF Context Configuration Mode Commands
237
associate l2-mapping-table 237
description 239
end 239
exit 240
ip aggregate-address 240
ip guarantee 241
ip maximum-routes 242
mpls map-dscp-to-exp 243
mpls map-exp-to-dscp 244
C H A P T E R 1 8 ISAKMP Configuration Mode Commands 247
authentication 247
encryption 248
end 250
exit 250
group 250
hash 251
lifetime 252
C H A P T E R 1 9 IuPS Service Configuration Mode Commands
255
access-protocol 256
associate 257
blacklist-timeout-gtpu-bind-addresses 258
do show 259
empty-cr 260
end 261
exit 261
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3viii
Contents
-
force-authenticate consecutive-security-failure 262
gtpu 263
inter-rnc-procedures 265
iu-hold-connection 266
iu-recovery 267
iu-release-complete-timeout 268
loss-of-radio-coverage ranap-cause 269
mbms 270
network-sharing cs-ps-coordination 270
network-sharing failure-code 271
network-sharing non-shared 273
network-sharing stop-redirect-reject-cause 274
plmn 275
rab-assignment-response-timeout 276
radio-network-controller 277
rai-skip-validation 278
relocation-alloc-timeout 279
relocation-complete-timeout 280
reset 281
rnc 282
security-mode-complete-timeout 283
service-request-follow-on 284
srns-context-response-timeout 285
tigoc-timeout 286
tintc-timeout 287
C H A P T E R 2 0 LAC Service Configuration Mode Commands
289
allow 290
bind 291
data sequence-number 293
default 293
end 295
exit 296
hide-attributes 296
keepalive-interval 297
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 ix
Contents
-
load-balancing 298
local-receive-window 299
max-retransmission 300
max-session-per-tunnel 301
max-tunnel-challenge-length 302
max-tunnels 303
peer-lns 304
proxy-lcp-authentication 305
retransmission-timeout-first 306
retransmission-timeout-max 307
single-port-mode 308
snoop framed-ip-address 309
trap 310
tunnel selection-key 311
tunnel-authentication 313
C H A P T E R 2 1 Line Configuration Mode Commands 315
end 315
exit 316
length 316
width 317
C H A P T E R 2 2 Link Configuration Mode Commands 319
arbitration 320
do show 321
end 322
exit 322
mtp2-aerm-emergency-threshold 322
mtp2-aerm-normal-threshold 323
mtp2-eim-decrement 324
mtp2-eim-increment 325
mtp2-eim-threshold 326
mtp2-error-correction 327
mtp2-lssu-len 328
mtp2-max-outstand-frames 329
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3x
Contents
-
mtp2-suerm-threshold 330
mtp3-discard-priority 331
mtp3-max-slt-try 331
mtp3-msg-priority 332
mtp3-msg-size 333
mtp3-p1-qlen 334
mtp3-p2-qlen 335
mtp3-p3-qlen 336
mtp3-test-pattern 337
priority 337
signaling-link-code 338
sscf-nni-n1 339
sscop-max-cc 340
sscop-max-pd 341
sscop-max-stat 342
timeout 343
C H A P T E R 2 3 Linkset Configuration Mode Commands 349
adjacent-point-code 349
do show 350
end 351
exit 351
link 352
self-point-code 353
C H A P T E R 2 4 LMA Service Configuration Mode Commands
355
aaa accounting 356
alt-coa-allowed 357
bind address 358
end 360
exit 360
heartbeat 361
mobility-option-type-value 362
refresh-advice-option 363
refresh-interval-percent 364
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 xi
Contents
-
reg-lifetime 365
revocation 366
sequence-number-validate 367
setup-timeout 368
signalling-packets 369
simul-bindings 369
standalone 370
timestamp-option-validation 371
timestamp-replay-protection 371
C H A P T E R 2 5 LNS Service Configuration Mode Commands
373
aaa accounting 374
authentication 375
avp map called-number apn 377
bind 378
data sequence-number 379
default 380
end 382
exit 383
ip source-violation 383
keepalive-interval 385
local-receive-window 386
max-retransmission 387
max-session-per-tunnel 388
max-tunnel-challenge-length 388
max-tunnels 389
nai-construction domain 390
newcall 391
peer-lac 392
proxy-lcp-authentication 393
retransmission-timeout-first 394
retransmission-timeout-max 395
setup-timeout 396
single-port-mode 397
trap 398
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3xii
Contents
-
tunnel-authentication 399
tunnel-switching 399
C H A P T E R 2 6 Local Policy Actiondef Configuration Mode
Commands 401
action 401
end 404
exit 405
C H A P T E R 2 7 Local Policy Eventbase Configuration Mode
Commands 407
end 407
exit 408
rule 408
C H A P T E R 2 8 Local Policy Ruledef Configuration Mode
Commands 411
condition 411
end 416
exit 416
C H A P T E R 2 9 Local Policy Service Configuration Mode
Commands 417
actiondef 417
end 419
exit 419
eventbase 420
ruledef 421
suppress-cra 422
C H A P T E R 3 0 Location Service Configuration Mode Commands
425
associate 425
destination-host 427
end 428
exit 428
slr 429
timeout 430
C H A P T E R 3 1 Logical eNode Configuration Mode Commands
433
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 xiii
Contents
-
associate mme-pool 434
associate tai-list-db 435
bind s1-mme 436
end 437
exit 437
s1-mme ip qos-dscp 437
s1-mme sctp port 439
C H A P T E R 3 2 Loopback Interface Configuration Mode Commands
441
crypto-map 442
description 442
end 443
exit 443
ip address 444
ip ranged-address 445
ip vrf 446
ipv6 address 447
ipv6 ospf 447
C H A P T E R 3 3 LTE Custom TAI List Configuration Mode
Commands 451
end 451
exit 452
tai 452
C H A P T E R 3 4 LTE Emergency Profile Configuration Mode
Commands 455
ambr 456
apn 457
associate 458
end 459
exit 459
lcs-qos 460
local-emergency-num 461
local-emergency-num-ie 462
pgw 463
qos 464
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3xiv
Contents
-
ue-validation-level 465
C H A P T E R 3 5 LTE Forbidden Location Area Configuration Mode
Commands 467
end 467
exit 468
lac 468
C H A P T E R 3 6 LTE Forbidden Tracking Area Configuration Mode
Commands 471
end 471
exit 472
tac 472
C H A P T E R 3 7 LTE Foreign PLMN GUTI Management Database
Configuration Mode Commands 475
end 475
exit 476
plmn 476
C H A P T E R 3 8 LTE HeNBGWMME Pool Configuration Mode Commands
479
end 479
exit 480
mme 480
C H A P T E R 3 9 LTE Handover Restriction List Configuration
Mode Commands 483
end 483
exit 484
forbidden 484
C H A P T E R 4 0 LTE MME HeNB-GWManagement Database
Configuration Mode Commands 487
end 487
exit 488
henbgw-global-enbid 488
C H A P T E R 4 1 LTE Network Global MME ID Management Database
Configuration Mode Commands 491
end 491
exit 492
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 xv
Contents
-
plmn 492
C H A P T E R 4 2 LTE Paging Map Configuration Mode Commands
495
end 495
exit 496
precedence 496
C H A P T E R 4 3 LTE Paging Profile Configuration Mode Commands
501
end 501
exit 502
paging-stage 502
C H A P T E R 4 4 LTE Peer Map Configuration Mode Commands
505
end 505
exit 506
precedence 506
C H A P T E R 4 5 LTE Policy Configuration Mode Commands 509
cause-code-group 510
congestion-action-profile 511
end 512
exit 513
foreign-plmn-guti-mgmt-db 513
henbgw mme-pool 514
henbgw overload-control 516
henbgw qci-dscp-mapping-table 517
henbgw s1-reset 518
henbgw session-recovery idle-timeout 519
ho-restrict-list 520
imei-tac-group 521
lte-emergency-profile 522
mme henb mgmt-db 523
mme paging cache 524
network-global-mme-id-mgmt-db 526
paging-map 527
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3xvi
Contents
-
paging-profile 528
peer-map 529
sgsn-mme 530
subscriber-map 531
tai-list-db 532
tai-mgmt-db 533
C H A P T E R 4 6 LTE Subscriber Map Configuration Mode Commands
537
end 537
exit 538
precedence 538
C H A P T E R 4 7 LTE TAI Management Database Configuration Mode
Commands 543
access-type 543
end 544
exit 545
network-name 545
tai-custom-list 546
tai-mgmt-obj 547
timezone 548
C H A P T E R 4 8 LTE TAI Management Object Configuration Mode
Commands 551
access-type 552
emergency-services-not-supported 552
end 553
exit 554
ims-voice-over-ps 554
lai 555
network-name 556
rai 557
sgw-address 558
sgw-address-resolution-mode 560
tai 561
timezone 562
zone-code 563
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 xvii
Contents
-
C H A P T E R 4 9 MAG Service Configuration Mode Commands
565
bind 566
encapsulation 567
end 568
exit 569
heartbeat 569
information-element-set 571
max-retransmissions 572
mobility-header-checksum 573
mobility-option-type-value 574
policy 575
reg-lifetime 576
renew-percent-time 577
retransmission-policy 578
retransmission-timeout 579
signalling-packets 580
C H A P T E R 5 0 MAP Service Configuration Mode Commands
583
access-protocol 584
application-context-name 585
auth-vectors 586
do show 587
end 588
equipment-identity-register 588
exit 590
gmlc 590
hlr 592
policy 593
short-message-service 594
timeout 594
C H A P T E R 5 1 MIP HA Assignment Table Configuration Mode
Commands 597
end 597
exit 598
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3xviii
Contents
-
hoa-range 598
C H A P T E R 5 2 MPLS-LDP Configuration Mode Commands 601
advertise-labels 601
discovery 603
enable 604
end 605
exit 605
router-id 606
session 607
C H A P T E R 5 3 MIPv6 HA Service Configuration Mode Commands
609
aaa accounting 610
bind 610
default 612
end 613
exit 614
refresh-advice-option 614
refresh-interval-percent 615
reg-lifetime 616
sequence-number-validate 617
setup-timeout 617
simul-bindings 618
timestamp-replay-protection tolerance 619
C H A P T E R 5 4 MME-eMBMS Service Configuration Mode Commands
621
associate 621
bind 623
end 624
exit 624
mmemgr-recovery 625
plmn-id 626
sctp port 627
setup-timeout 627
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 xix
Contents
-
C H A P T E R 5 5 MME LAC Pool Area Configuration Mode Commands
629
end 629
exit 630
hash-value 630
lac 632
plmnid 633
C H A P T E R 5 6 MMEMSC Pool Area Configuration Mode 635
end 635
exit 636
hash-value 636
plmn-id 637
use-msc 639
C H A P T E R 5 7 MME SGs Service Configuration Mode Commands
641
associate 642
bind 643
end 644
exit 644
ip 645
non-pool-area 646
pool-area 647
sctp 648
tac-to-lac-mapping 649
timer 650
vlr 652
vlr-failure 653
C H A P T E R 5 8 MME Service Configuration Mode Commands
657
associate 660
bind s1-mme 665
csg-change-notification 666
dns 667
edrx 669
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3xx
Contents
-
emm 670
enb-cache-timeout 682
encryption-algorithm-lte 683
end 684
esm 685
exit 688
gtpv2 688
henbgw henb-type 689
heuristic-paging 690
ho-resource-release-timeout 691
integrity-algorithm-lte 692
inter-rat-nnsf 694
isda 696
isda-guard-timeout 697
isr-capability 698
legacy-tai-list-encoding 699
local-cause-code-mapping apn-mismatch 700
local-cause-code-mapping apn-not-subscribed 701
local-cause-code-mapping apn-not-supported-in-plmn-rat 702
local-cause-code-mapping auth-failure 704
local-cause-code-mapping congestion 705
local-cause-code-mapping ctxt-xfer-fail-mme 707
local-cause-code-mapping ctxt-xfer-fail-sgsn 708
local-cause-code-mapping gw-unreachable 710
local-cause-code-mapping hss-unavailable 711
local-cause-code-mapping newcall-policy-restrict 713
local-cause-code-mapping no-active-bearers 714
local-cause-code-mapping odb packet-services 715
local-cause-code-mapping odb roamer-to-vplmn 716
local-cause-code-mapping peer-node-unknown 717
local-cause-code-mapping pgw-selection-failure 719
local-cause-code-mapping restricted-zone-code 720
local-cause-code-mapping sgw-selection-failure 721
local-cause-code-mapping vlr-down 722
local-cause-code-mapping vlr-unreachable 724
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 xxi
Contents
-
location-reporting 725
mapping 726
max-bearers per-subscriber 727
max-paging-attempts 728
max-pdns per-subscriber 729
mme-id 730
mmemgr-recovery 731
msc 732
msc-mapping 734
nas gmm-qos-ie-mapping 735
nas-max-retransmission 736
network-sharing 737
nri 738
peer-mme 739
peer-sgsn rai 741
peer-sgsn rnc-id 743
pgw-address 744
plmn-id 746
policy attach 747
policy idle-mode 749
policy inter-rat 750
policy network 751
policy overcharge-protection 752
policy overload 753
policy pdn-connect 754
policy pdn-deactivate 755
policy pdn-modify 757
policy pdn-reconnection 758
policy s1-reset 759
policy sctp-down 760
policy service-request 761
policy srvcc 762
policy tau 763
pool-area 765
ps-lte 767
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3xxii
Contents
-
relative-capacity 768
s13 769
s1-mme ip 770
s1-mme sctp port 771
s1-ue-context-release 772
setup-timeout 775
sgw-blacklist 776
sgw-retry-max 777
snmp trap 779
statistics 780
ue-db 781
C H A P T E R 5 9 MPLS-IP Configuration Mode Commands 783
end 783
exit 784
protocol ldp 784
C H A P T E R 6 0 MRME Service Configuration Mode Commands
787
aaa 788
associate 789
attribute 790
bind 791
disconnect 793
dns-P-GW 794
do show 795
end 796
exit 796
fqdn 797
pgw-selection 798
radius 799
setup-timeout 801
C H A P T E R 6 1 NETCONF Protocol Configuration Mode Commands
803
autosave-config 803
bulkstats 804
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 xxiii
Contents
-
confd-user 805
do show 806
end 807
exit 807
netconf 808
rest 809
C H A P T E R 6 2 Network Service Entity- IP Local Configuration
Mode Commands 813
all-nsvc-failure-action 814
associate 815
bssgp-timer 816
do show 816
end 817
exit 817
max-ns-retransmissions 817
ns-timer 818
nsvc-failure-action 819
nsvl 820
peer-network-service-entity 821
retry-count 821
timer 821
C H A P T E R 6 3 Network Service Entity - Peer NSEI
Configuration Mode Commands 823
bssgp-timer 823
do show 824
end 824
exit 825
ns-reset-mode 825
ns-vc 826
C H A P T E R 6 4 Network Service Virtual Connection
Configuration Mode Commands 829
do show 829
end 830
exit 830
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3xxiv
Contents
-
C H A P T E R 6 5 Network Service Virtual Link Configuration
Mode Commands 833
do show 833
end 834
exit 834
nsvl-address 835
weight 836
C H A P T E R 6 6 NTP Configuration Mode Commands 837
do show 837
enable 838
end 839
exit 839
server 840
C H A P T E R 6 7 NTSR Pool Configuration Mode Commands 843
do show 844
end 844
exit 845
peer-ip-address 845
C H A P T E R 6 8 Operator Policy Configuration Mode 847
apn 848
associate 849
description 850
do show 851
end 852
exit 852
imei 853
C H A P T E R 6 9 ORBEM Configuration Mode Commands 855
activate client id 856
client id 857
do show 858
end 858
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 xxv
Contents
-
event-notif-iiop-port 859
event-notif-service 860
event-notif-siop-port 871
exit 872
iiop-port 872
iiop-transport 873
iop-address 874
max-attempt 875
session-timeout 876
siop-port 877
ssl-auth-policy 878
ssl-certificate 879
ssl-private-key 880
C H A P T E R 7 0 OSPF Configuration Mode Commands 883
area authentication 884
area default-cost 885
area nssa 886
area stub 888
area virtual-link 889
area virtual link authentication 890
area virtual-link authentication-key 891
area virtual link intervals 892
area virtual link message-digest-key 894
bfd-all-interfaces 895
capability graceful-restart 896
default-information originate 897
default-metric 898
distance 899
distribute-list 900
do show 902
end 902
exit 903
ip vrf 903
neighbor 904
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3xxvi
Contents
-
network area 905
ospf graceful-restart 906
ospf router-id 907
passive-interface 908
redistribute 909
refresh timer 910
router-id 911
timers spf 912
C H A P T E R 7 1 OSPFv3 Configuration Mode Commands 915
area 915
default-metric 917
do show 918
end 918
exit 919
passive-interface 919
redistribute 920
router-id 921
timers spf 922
C H A P T E R 7 2 OSPF VRF Configuration Mode Commands 925
area 926
default-information originate 929
default-metric 930
distance 931
distribute-list 932
do show 933
end 934
exit 934
neighbor 935
network 936
ospf router-id 937
passive-interface 938
redistribute 939
refresh timer 940
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 xxvii
Contents
-
router-id 941
timers spf 942
C H A P T E R 7 3 Out-Address Configuration Mode Commands
945
do show 945
end 946
exit 947
gt-address 947
gt-format 948
ni-indicator 949
point-code 949
routing-indicator 950
ssf 951
ssn 952
C H A P T E R 7 4 P2P Advertisement Server Group Configuration
Mode Commands 953
ad-source 953
do show 955
end 955
exit 956
map-to-application 956
C H A P T E R 7 5 PCC-Action-Set Configuration Mode Commands
959
af-media-type 960
associate monitoring-key 962
authorize 963
dissociate monitoring-key 965
dynamic-rule-install 966
dynamic-rule-uninstall 970
end 971
exit 972
log-event 972
notify-user 973
offline-charging-server 974
online-charging-server 975
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3xxviii
Contents
-
request-usage-report monitoring-key 977
rule-activate 978
rule-deactivate 979
rulebase-activate 980
rulebase-deactivate 982
service-tag 983
terminate-session 984
usage-monitor 985
C H A P T E R 7 6 PCC-AF-Service Configuration Mode Commands
987
associate pcc-service 988
diameter dictionary 989
diameter origin end-point 990
end 991
exit 991
C H A P T E R 7 7 PCC-Condition-Group Configuration Mode
Commands 993
af-application-id 994
af-media-codec 996
af-media-type 998
af-service-urn 999
an-gw-address 1001
authorized-qci 1003
base-station-id 1004
bearer-count 1006
connectivity-access-network 1007
end 1009
eval-condition-group 1010
event-time 1011
event-trigger 1012
exit 1014
imsi 1015
msisdn 1016
multi-line-or 1017
nai 1018
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 xxix
Contents
-
out-of-credit rulename 1020
out-of-credit rulebase-name 1021
pcef-address 1022
pdn-id 1024
profile-attribute 1025
radio-access-technology 1027
sgsn-ip 1028
sgsn-mcc-mnc 1030
subscription-attribute 1032
spr-profile-not-found 1033
threshold-condition usage-monitor 1034
user-access-network 1036
user-equipment-info esn 1038
user-equipment-info eui64 1039
user-equipment-info imeisv 1040
user-equipment-info mac 1042
user-equipment-info meid 1043
user-equipment-info modified-eui64 1045
user-location-info 1046
C H A P T E R 7 8 PCC-Data-Service Configuration Mode Commands
1049
end 1050
exit 1050
flow direction in 1051
flow direction out 1052
metering-method 1054
monitoring-key 1055
precedence 1056
qos-profile 1057
rating-group 1058
reporting-level 1058
service-identifier 1059
C H A P T E R 7 9 PCC-Event-Notification-Interface-Endpoint
Configuration Mode Commands 1061
address 1062
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3xxx
Contents
-
end 1062
exit 1063
peer name 1063
peer select-algorithm 1064
peer select-peer 1065
C H A P T E R 8 0 PCC-Policy-Service Configuration Mode Commands
1067
associate pcc-service 1068
diameter dictionary 1069
diameter origin end-point 1070
ehrpd-access-bcm 1071
end 1072
exit 1073
gprs-access-bcm 1073
max policy-sessions 1074
subscriber-binding-identifier 1075
subscription-id-absence-action 1077
unsolicited-provisioning 1078
C H A P T E R 8 1 PCC-Service-Profile Configuration Mode
Commands 1081
default-rulebase-name 1082
end 1083
eval-priority 1083
exit 1085
service-tag 1085
timeout long-duration 1087
usage-monitor 1088
unknown-services-treatment 1090
C H A P T E R 8 2 PCC-QoS-Profile Configuration Mode Commands
1093
arp-priority 1094
end 1095
exit 1095
guaranteed-bitrate 1096
max-bitrate 1097
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 xxxi
Contents
-
qci 1098
C H A P T E R 8 3 PCC-Quota Service Configuration Mode Commands
1101
associate pcc-service 1102
diameter dictionary 1103
diameter origin end-point 1103
end 1104
exit 1105
max total-charging-sessions 1105
C H A P T E R 8 4 PCC-Sp-Endpoint Configuration Mode Commands
1107
access-type 1108
diameter dictionary 1109
diameter origin end-point 1110
diameter peer-select 1111
end 1114
exit 1114
profile-data 1114
profile-update-notification 1116
spr subscriber identifier 1117
C H A P T E R 8 5 PCC-Service Addon Configuration Mode Commands
1119
associate-addon-state 1119
description 1121
duration 1122
end 1123
exit 1123
status active 1124
time-allowance 1125
volume-allowance 1126
C H A P T E R 8 6 PCC-TimeDef Configuration Mode Commands
1129
end 1129
exit 1130
start date 1130
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3xxxii
Contents
-
start day 1132
start time 1134
time-slot 1135
C H A P T E R 8 7 PCP Configuration Mode Commands 1139
do show 1139
end 1140
exit 1140
policy-control 1141
server 1142
C H A P T E R 8 8 PCP Policy Control Configuration Mode Commands
1145
do show 1145
end 1146
exit 1146
request-opcode 1147
response-opcode 1148
C H A P T E R 8 9 PDIF Service Configuration Mode Commands
1151
aaa attribute 1152
aaa authentication 1153
bind 1154
default 1155
do show 1157
duplicate-session-detection 1157
end 1158
exit 1159
hss 1159
ims-sh-service 1161
ip source-violation 1161
mobile-ip 1163
setup-timeout 1163
username 1164
C H A P T E R 9 0 PDG Service Configuration Mode Commands
1167
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 xxxiii
Contents
-
aaa attribute 1168
associate sgtp-service 1169
certificate-selection 1170
bind 1171
do show 1173
end 1173
exit 1174
ip gnp-qos-dscp 1174
ip qos-dscp 1178
ip source-violation 1181
max-tunnels-per-ue 1182
plmn id 1183
setup-timeout 1184
C H A P T E R 9 1 PDSN Service Configuration Mode Commands
1187
a11-signalling-packets 1189
aaa 3gpp2-service-option 1190
aaa nas-ip-address 1191
access-flow traffic-validation 1192
access-network 1193
airlink bad-sequence-number 1194
allow alt-ppp 1195
always-on-indication 1196
associate 1197
authentication 1198
bcmcs 1200
bind 1201
data-available-indicator 1203
data-over-signaling 1204
default subscriber 1205
direct-lte-indicator 1206
dormant-transition 1207
end 1208
enhanced-pcf-redirection 1208
exit 1209
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3xxxiv
Contents
-
fragment 1209
gre 1210
inter-pdsn-handoff mobility-event-indicator 1213
inter-pdsn-handover 1214
ip header-compression rohc 1215
ip local-port 1216
ip source-violation 1217
lifetime 1218
max-retransmissions 1219
mobile-ip foreign-agent context 1220
mobile-ipv6 1221
msid length 1222
nai-construction 1223
new-call conflict 1224
pcf-monitor 1225
pcf-session-id-change restart-ppp 1227
pdsn type0-tft attempt-inner-match 1228
peer-pcf 1229
pma-capability-indicator 1230
policy 1231
ppp 1234
qos-profile-id-mapping 1235
qos update 1237
radius accounting dropped-pkts 1239
registration-accept 1240
registration-ack-deny terminate-session-on-error 1240
registration-deny 1241
registration-discard 1243
registration-update 1245
retransmission-timeout 1246
service-option 1247
setup-timeout 1249
simple-ip allow 1250
spi 1251
tft-validation wait-timeout 1253
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 xxxv
Contents
-
threshold a11-ppp-send-discard 1254
threshold a11-rac-msg-discard 1255
threshold a11-rrp-failure 1256
threshold a11-rrq-msg-discard 1258
threshold init-rrq-rcvd-rate 1259
C H A P T E R 9 2 PDSN Service RoHC Configuration Mode Commands
1261
cid-mode 1261
do show 1262
end 1263
exit 1264
mrru 1264
profile 1265
C H A P T E R 9 3 Peer List Configuration Mode Commands 1267
address 1267
do show 1268
end 1269
exit 1269
C H A P T E R 9 4 Peer Profile Configuration Mode Commands
1271
arp-mapping 1271
description 1272
end 1273
exit 1274
gtpc 1274
lawful-intercept 1276
no-qos-negotiation 1276
upgrade-qos-supported 1277
C H A P T E R 9 5 Peer-Server Configuration Mode Commands
1279
do show 1279
end 1280
exit 1280
mode 1281
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3xxxvi
Contents
-
name 1282
psp 1283
routing-context 1284
self-point-code 1285
C H A P T E R 9 6 P-GW Service Configuration Mode Commands
1287
associate 1288
authorize-with-hss 1290
dns-client 1292
do show 1293
egtp 1293
end 1296
exit 1297
fqdn 1297
gtpc handle-collision upc nrupc 1299
gx-li 1300
map-initial-setup-auth-fail-to-gtp-cause-user-auth-fail 1300
message-timestamp-drift 1301
newcall 1303
pcscf-restoration 1304
plmn id 1306
session-delete-delay 1307
setup-timeout 1308
C H A P T E R 9 7 Policy Control Configuration Mode Commands
1311
apn-name-to-be-included 1312
arp-priority-level 1313
associate 1314
cc-profile 1316
custom-reauth-trigger 1318
diameter 3gpp-r9-flow-direction 1320
diameter clear-session 1321
diameter dictionary 1322
diameter encode-event-avps 1325
diameter encode-supported-features 1326
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 xxxvii
Contents
-
diameter host-select reselect 1333
diameter host-select row-precedence 1335
diameter host-select table 1337
diameter host-select-template 1340
diameter map 1341
diameter origin endpoint 1342
diameter request-timeout 1343
diameter session-prioritization 1344
diameter sgsn-change-reporting 1345
diameter update-dictionary-avps 1347
do show 1349
end 1350
endpoint-peer-select 1350
event-report-indication 1351
event-update 1353
exit 1355
failure-handling 1355
li-secret 1359
max-outstanding-ccr-u 1359
subscription-id service-type 1360
C H A P T E R 9 8 Plugin Configuration Mode Commands 1363
attribute 1363
do show 1364
end 1364
exit 1365
module priority 1365
C H A P T E R 9 9 PVC Configuration Mode Commands 1367
bind 1367
do show 1369
encapsulation aal5 1369
end 1370
exit 1371
shaping 1371
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3xxxviii
Contents
-
shutdown 1372
C H A P T E R 1 0 0 PVC Interface Configuration Mode Commands
1375
description 1376
do show 1377
end 1377
exit 1378
ip 1378
ip access-group 1378
ip address 1380
ip mtu 1381
ip ospf authentication-key 1382
ip ospf authentication-type 1383
ip ospf cost 1384
ip ospf dead-interval 1384
ip ospf hello-interval 1385
ip ospf message-digest-key 1386
ip ospf network 1387
ip ospf priority 1388
ip ospf retransmit-interval 1389
ip ospf transmit-delay 1390
C H A P T E R 1 0 1 QCI - QoS Mapping Configuration Mode
Commands 1393
do show 1393
end 1394
exit 1394
operator-defined-qci 1395
qci 1398
C H A P T E R 1 0 2 QCI - RAN ID Mapping Configuration Mode
Commands 1405
do show 1405
end 1406
exit 1406
profile-id 1407
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 xxxix
Contents
-
C H A P T E R 1 0 3 QoS L2 Mapping Configuration Mode Commands
1409
do show 1409
end 1410
exit 1410
internal-priority 1411
C H A P T E R 1 0 4 QoS Profile Configuration Mode Commands
1413
apn-ambr 1413
associate 1415
class 1416
description 1424
do show 1424
end 1425
epc-qos-params-in-gtpv1 1425
exit 1426
operator-defined-qci 1427
prefer-as-cap 1428
prefer-tc 1429
qci-when-missing-in-subscription 1430
qci-reject 1431
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3xl
Contents
-
C H A P T E R 1Command Line Interface Reference, Modes I -
Q,StarOS Release 21.3
TheASR 5000 hardware platform has reached end of life and is not
supported in this release. Any referencesto the ASR 5000 (specific
or implied) or its components in this document are coincidental.
Full details onthe ASR 5000 hardware platform end of life are
available
at:https://www.cisco.com/c/en/us/products/collateral/wireless/asr-5000-series/eos-eol-notice-c51-735573.html
Important
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 1
-
Command Line Interface Reference, Modes I - Q, StarOS Release
21.32
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3
-
C H A P T E R 2IGMP Profile Configuration Mode Commands
The Internet GroupManagement Protocol (IGMP) Profile
ConfigurationMode is used to create and managethe IGMP parameters
for an Ethernet interface.
Command Modes Exec > Global Configuration > Context
Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile
profile_name
Entering the above command sequence results in the following
prompt:
[context_name]host_name(config-igmp-profile-)#
Available commands or keywords/variables vary based on platform
type, product version, and installedlicense(s).
Important
• default ip igmp, page 3
• end, page 4
• exit, page 4
• ip igmp query, page 5
• ip igmp require router-alert, page 6
• ip igmp robustness, page 6
• ip igmp unsolicited-report-interval, page 7
• ip igmp version, page 8
default ip igmpConfigures default IGMP parameters.
Product All
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 3
-
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context
Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile
profile_name
Entering the above command sequence results in the following
prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description default ip igmp { query | require |
robustness | unsolicited-report-interval | version }
Usage Guidelines Specify the IGMP parameters for the default
profile. Refer to the remaining command description in thischapter
for additional information.
Example
To apply enable echo mode on this interface, use the following
command:bfd echo
endExits the current configuration mode and returns to the Exec
mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description end
Usage Guidelines Use this command to return to the Exec
mode.
exitExits the current mode and returns to the parent
configuration mode.
Command Line Interface Reference, Modes I - Q, StarOS Release
21.34
IGMP Profile Configuration Mode Commandsend
-
Product All
Privilege Security Administrator, Administrator
Syntax Description exit
Usage Guidelines Use this command to return to the parent
configuration mode.
ip igmp queryConfigures the maximum response time for IGMP
queries.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context
Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile
profile_name
Entering the above command sequence results in the following
prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description ip igmp query max-response-time seconds
max-response-time seconds
Specify the maximum number of seconds that the system will wait
for an IGMP response as an integer from1 through 25.
Usage Guidelines Specify the maximum response time for IGMP
queries.
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 5
IGMP Profile Configuration Mode Commandsip igmp query
-
Example
ip igmp query max-response-time 10
ip igmp require router-alertSets the router alert flag to ON in
IP IGMP packets.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context
Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile
profile_name
Entering the above command sequence results in the following
prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description [ no ] ip igmp require router-alert
no
Sets the router alert flag to OFF in IP IGMP packets.
Usage Guidelines Sets the router alert flag to ON in IP IGMP
packets.
Example
ip igmp require router-alert
ip igmp robustnessSets the Robustness value in IP IGMP packets.
The Robustness variable allows tuning for the expected packetloss
on a subnet. If a subnet is expected to be lossy, the Robustness
variable may be increased. IGMP is robustto packet losses. The
Robustness variable should not be set to 1 (one).
Product All
Command Line Interface Reference, Modes I - Q, StarOS Release
21.36
IGMP Profile Configuration Mode Commandsip igmp require
router-alert
-
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context
Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile
profile_name
Entering the above command sequence results in the following
prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description ip igmp robustness value
value
Sets the robustness value as an integer from 1 through 10.
Default: 2
Usage Guidelines Sets the robustness value in IP IGMP
packets.
Example
ip igmp robustness 7
ip igmp unsolicited-report-intervalSets the Unsolicited Report
Interval which is the time between repetitions of a host's initial
report of membershipin a group.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context
Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile
profile_name
Entering the above command sequence results in the following
prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description ip igmp unsolicited-report-interval
seconds
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 7
IGMP Profile Configuration Mode Commandsip igmp
unsolicited-report-interval
-
seconds
Specifies the number of seconds between repetitions of a host's
initial report of membership in a group as aninteger from 1 through
25. Default: 10
Usage Guidelines Set the Unsolicited Report Interval which is
the time between repetitions of a host's initial report of
membershipin a group.
Example
ip igmp unsolicited-report-interval 15
ip igmp versionSets the IGMP version to be supported by this
interface.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context
Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile
profile_name
Entering the above command sequence results in the following
prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description ip igmp version { v1 | v2 | v3 }
v1 | v2 | v3
Specifies the IGMP Version number:
• v1: Version 1, RFC 1112
• v2: Version 2, RFC 2236
• v3: Version 3, RFC 4604
Usage Guidelines Set the IGMP version to be supported by this
interface.
Command Line Interface Reference, Modes I - Q, StarOS Release
21.38
IGMP Profile Configuration Mode Commandsip igmp version
-
Example
ip igmp version v2
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 9
IGMP Profile Configuration Mode Commandsip igmp version
-
Command Line Interface Reference, Modes I - Q, StarOS Release
21.310
IGMP Profile Configuration Mode Commandsip igmp version
-
C H A P T E R 3IKEv2 Security Association Configuration
ModeCommands
The IKEv2 Security Association Configuration Mode is used to
configure a Security Association (SA) atthe outset of an IPSec
session. A security association is the collection of algorithms and
parameters (suchas keys) that is being used to encrypt and
authenticate a particular flow in one direction. In
normalbi-directional traffic, the flows are secured by a pair of
security associations.
Command Modes Exec > Global Configuration > Context
Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa
transform-set set_name
Entering the above command sequence results in the following
prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
The commands or keywords/variables that are available are
dependent on platform type, product version,and installed
license(s).
Important
• default, page 12
• encryption, page 12
• end, page 14
• exit, page 14
• group, page 15
• hmac, page 16
• lifetime , page 17
• prf, page 18
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 11
-
defaultSets the default properties for the selected
parameter.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context
Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa
transform-set set_name
Entering the above command sequence results in the following
prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description default { encryption | group | hmac |
lifetime | prf }Set the defaults for the following parameters:
• encryption: Default algorithm for the IKEv2 IKE SA is
AES-CBC-128.
• group: Default Diffie-Hellman group is Group 2.
• hmac: Default IKEv2 IKE SA hashing algorithm is SHA1-96.
• lifetime: Default lifetime for SAs derived from this
transform-set is 86400 seconds.
• prf: Default PRF for the IKEv2 IKE SA is SHA1.
Usage Guidelines Configure default parameters for the IKEv2 IKE
SA transform-set.
Example
Use the following configuration to set the default encryption
algorithm:default encryption
encryptionConfigures the appropriate encryption algorithm and
encryption key length for the IKEv2 IKE securityassociation.
AES-CBC-128 is the default.
Product ePDG
Command Line Interface Reference, Modes I - Q, StarOS Release
21.312
IKEv2 Security Association Configuration Mode
Commandsdefault
-
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context
Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa
transform-set set_name
Entering the above command sequence results in the following
prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description encryption { 3des-cbc | aes-cbc-128 |
aes-cbc-256 | des-cbc | null }default encryption
3des-cbc
Data Encryption Standard Cipher Block Chaining encryption
applied to the message three times using threedifferent cypher keys
(triple DES).
aes-cbc-128
Advanced Encryption Standard Cipher Block Chaining with a key
length of 128 bits.
aes-cbc-256
Advanced Encryption Standard Cipher Block Chaining with a key
length of 256 bits.
des-cbc
Data Encryption Standard Cipher Block Chaining. Encryption using
a 56-bit key size. Relatively insecure.
null
Configures no IKEv2 IKE Security Association Encryption
Algorithm. All IKEv2 IPsec Child SecurityAssociation protected
traffic will be sent in the clear.
USE OF THIS ALGORITHM FOR IKE_SA ENCRYPTION IS A VIOLATION OF
RFC 4306. THISALGORITHM SHOULD ONLY BE USED FOR TESTING
PURPOSES.
Note
Usage Guidelines IKEv2 requires a confidentiality algorithm to
be applied in order to work.
In cipher block cryptography, the plaintext is broken into
blocks usually of 64 or 128 bits in length. In cipherblock chaining
(CBC) each encrypted block is chained into the next block of
plaintext to be encrypted. Arandomly-generated vector is applied to
the first block of plaintext in lieu of an encrypted block. CBC
providesconfidentiality, but not message integrity.
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 13
IKEv2 Security Association Configuration Mode
Commandsencryption
-
Because RFC 4307 calls for interoperability between IPSec and
IKEv2, the IKEv2 confidentiality algorithmsmust be the same as
those configured for IPSec in order for there to be an acceptable
match during the IKEmessage exchange. Because of RFC4307, in IKEv2,
there is no viable NULL option, it is available for
testingonly.
Example
The following command configures the encryption to be
aes-cbc-128:encryption aes-cbc-128
endExits the current configuration mode and returns to the Exec
mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description end
Usage Guidelines Use this command to return to the Exec
mode.
exitExits the current mode and returns to the parent
configuration mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description exit
Usage Guidelines Use this command to return to the parent
configuration mode.
Command Line Interface Reference, Modes I - Q, StarOS Release
21.314
IKEv2 Security Association Configuration Mode Commandsend
-
groupConfigures the appropriate key exchange cryptographic
strength by applying a Diffie-Hellman group. Defaultis Group 2.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context
Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa
transform-set set_name
Entering the above command sequence results in the following
prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description group { 1 | 2 | 5 | 14 }default group
1
Configures crypto strength at the Group 1 level. Lowest
security.
2
Configures crypto strength at the Group 2 (default) level.
Medium security.
This is the default setting for this command.
5
Configures crypto strength at the Group 5 level. Higher
security.
14
Configures crypto strength at the Group 14 level. Highest
security
Usage Guidelines Diffie-Hellman groups are used to determine the
length of the base prime numbers used during the keyexchange
process in IKEv2. The cryptographic strength of any key derived
depends, in part, on the strengthof the Diffie-Hellman group upon
which the prime numbers are based.
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 15
IKEv2 Security Association Configuration Mode Commandsgroup
-
Group 1 provides 768 bits of keying strength, Group 2 provides
1024 bits, Group 5 provides 1536 bits andGroup 14 provides 2048
bits of encryption strength.
Configuring a DH group also enables Perfect Forward Secrecy,
which is disabled by default.
Example
This command configures crypto strength at the Group 14 level.
Highest security group 14:default group
hmacConfigures the IKEv2 IKE SA integrity algorithm. Default is
SHA1-96.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context
Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa
transform-set set_name
Entering the above command sequence results in the following
prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description hmac { aes-xcbc-96 | md5-96 | sha1-96 |
sha2-256-128 | sha2-384-192 | sha2-512-256 }default hmac
aes-xcbc-96
HMAC-AES-XCBC uses a 128-bit secret key and produces a 128-bit
authenticator value.
md5-96
HMAC-MD5 uses a 128-bit secret key and produces a 128-bit
authenticator value.
sha1-96
HMAC-SHA-1 uses a 160-bit secret key and produces a 160-bit
authenticator value. This is the default settingfor this
command.
Command Line Interface Reference, Modes I - Q, StarOS Release
21.316
IKEv2 Security Association Configuration Mode Commandshmac
-
sha2-256-128
HMAC-SHA-256 uses a 256-bit secret key and produces a 128-bit
authenticator value.
sha2-384-192
HMAC-SHA-384 uses a 384-bit secret key and produces a 192-bit
authenticator value.
sha2-512-256
HMAC-SHA-512 uses a 512-bit secret key and produces a 256-bit
authenticator value.
Usage Guidelines IKEv2 requires an integrity algorithm be
configured in order to work.
A keyed-Hash Message Authentication Code, or HMAC, is a type of
message authentication code (MAC)calculated using a cryptographic
hash function in combination with a secret key to verify both data
integrityand message authenticity. A hash takes a message of any
size and transforms it into a message of a fixed size:the
authenticator value. This is truncated and transmitted. The
authenticator value is reconstituted by thereceiver and the first
truncated bits are compared for a 100 percent match.
Example
This command configures HMAC value md5-96:hmac md5-96
lifetimeConfigures the lifetime of a security association (SA)
in seconds.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context
Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa
transform-set set_name
Entering the above command sequence results in the following
prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description lifetime secdefault lifetime
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 17
IKEv2 Security Association Configuration Mode
Commandslifetime
-
lifetime sec
Sets the value of the timeout parameter in seconds as an integer
from 60 through 86400. Default: 86400
Usage Guidelines The secret keys that are used for various
aspects of a configuration should only be used for a limited
amountof time before timing out. This exposes a limited amount of
data to the possibility of hacking. If the SA expires,the options
are then to either close the SA and open an new one, or renew the
existing SA.
Example
The following command sets the lifetime timeout to 120
seconds:lifetime 120
prfSelects one of the HMAC integrity algorithms to act as the
IKE Pseudo-Random Function. A PRF producesa string of bits that an
attacker cannot distinguish from random bit string without
knowledge of the secret key.The default is SHA1.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context
Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa
transform-set set_name
Entering the above command sequence results in the following
prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description prf { aes-xcbc-128 | md5 | sha1 | sha2-256 |
sha2-384 | sha2-512 }default prf
aes-xcbc-128
Configure IKEv2 IKE Security Association Pseudo Algorithm to be
AES-XCBC-128.
md5
MD5 uses a 128-bit secret key and produces a 128-bit
authenticator value.
Command Line Interface Reference, Modes I - Q, StarOS Release
21.318
IKEv2 Security Association Configuration Mode Commandsprf
-
sha1
SHA-1 uses a 160-bit secret key and produces a 160-bit
authenticator value.
SHA-1 is considered cryptographically stronger than MD5, but it
takes more CPU cycles to compute.
This is the default setting for this command.
sha2-256
PRF-HMAC-SHA-256 uses a 256-bit secret key.
sha2-384
PRF-HMAC-SHA-384 uses a 384-bit secret key.
sha2-512
PRF-HMAC-SHA-512 uses a 512-bit secret key.
Usage Guidelines This command generates keying material for all
the cryptographic algorithms used in both the IKE_SA andthe
CHILD_SAs.
Example
This configuration sets the PRF to be value sha2-256:prf
sha2-256
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 19
IKEv2 Security Association Configuration Mode Commandsprf
-
Command Line Interface Reference, Modes I - Q, StarOS Release
21.320
IKEv2 Security Association Configuration Mode Commandsprf
-
C H A P T E R 4IMEI Profile Configuration Mode
Essentially, an IMEI profile is a template which groups a set of
device-specific commands that may beapplicable to one or more
IMEIs. The same IMEI profile can be associated with multiple IMEI
ranges andmultiple operator policies.
An SGSN supports a total of 1000 IMEI profile
configurations.
The IMEI profile configuration mode defines a set of parameters
controlling the SGSN behavior when aRequest is received from a
device in the specified IMEI (International Mobile Equipment
Identity) range.An IMEI profile is a key element in the Operator
Policy feature and an IMEI profile is not used or validunless it is
associated with an IMEI range and this association is specified in
an operator policy (see theOperator Policy
ConfigurationModeCommands chapter elsewhere in theCommand Line
Interface Reference).
Command Modes Exec > Global Configuration > IMEI Profile
Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following
prompt:
[local]host_name(config-imei-profile-profile_name)#
The commands or keywords/variables that are available are
dependent on platform type, product version,and installed
license(s).
Important
• associate, page 22
• blacklist, page 23
• description, page 23
• direct-tunnel, page 24
• end, page 25
• exit, page 25
• ggsn-address, page 26
• ignore-pdp-data-inactivity, page 27
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 21
-
• pdp-activate, page 28
associateAssociate an APN remap table with this IMEI
profile.
Note that an APN remap table can be associated with an IMEI
profile before the table has actually beencreated/configured.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile
Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following
prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description associate apn-remap-table table_nameno
associate apn-remap-table
no
Disables the configured remap table association.
table_name
Define the name of an APN remap table that is to be associated
with this IMEI profile for call routing basedin IMEI.
Usage Guidelines Use this command to associate an APN remap
table with this IMEI profile. With such an association, it
ispossible to override an APN call-routing based on an IMEI.
For example, with the APN exceptions defined in an APN remap
table (refer to the APN Remap TableConfigurationMode chapter), a
blank APN or an incorrect APN could be overriden. So during
PDPActivationfor in incoming call, the call could be rerouted based
on an IMEI in the range defined for the IMEI profile.
Command Line Interface Reference, Modes I - Q, StarOS Release
21.322
IMEI Profile Configuration Modeassociate
-
Example
Associate the APN remap table 'remapHO' (remaps all calls with
blank APNS to the head-office) to this IMEIprofile:associate
apn-remap-table remapHO
blacklistBlacklist all mobile devices that fit the IMEI
definitions associated with this IMEI profile.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile
Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following
prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description blacklistremove blacklist
remove
Including this keywordwith the command, removes the blacklist
command from the IMEI profile configuration.
Usage Guidelines Blacklists subscribers whose devices bear IMEI
that match the defined IMEI range for this profile.
Example
Use this command to black list all subscribers with IMEI that
fall within the range set for this IMEI profile:blacklist
descriptionDefine a descriptive string relevant to the specific
APN profile.
Product SGSN
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 23
IMEI Profile Configuration Modeblacklist
-
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile
Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following
prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description description descriptionremove description
remove
Removes the configured description from this APN profile.
description
Enter an alphanumeric string of 1 to 100 alphanumeric
characters. The string may include spaces, punctuation,and
case-sensitive letters if the string is enclosed in double quotes (
" ).
Usage Guidelines Define information that identifies this
particularly APN profile.
Example
Indicate that this IMEI profile IMEIprof1 is to be used for
customers in the United Kingdom and that theprofile:description
"IMEIprof1 defines routing actions based on IMEI for customers in
the UK."
direct-tunnelInstruct the SGSN to enable/disable a direct tunnel
between the RNC and the GGSN based on the IuPS
serviceconfiguration.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile
Configuration
Command Line Interface Reference, Modes I - Q, StarOS Release
21.324
IMEI Profile Configuration Modedirect-tunnel
-
configure > imei-profile profile_name
Entering the above command sequence results in the following
prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description direct-tunnel check-iups-serviceno
direct-tunnel
no direct-tunnel
This command instructs the SGSN to disable the direct tunnel
function between the GGSN and the RNC.
Usage Guidelines Direct tunnel is enabled by default on the GGSN
and often on the RNC. This leaves it to the SGSN'sconfiguration to
actually enable or disable a direct tunnel.
With the SGSN, the options for configuring a direct tunnel are
complex -- enable/disable on the basis of APNs,or RNCs, or GGSNs,
or on the basis of the IMEI range. Refer to the SGSN Administration
Guide forconfiguration details.
Example
Assuming the IuPS service configuration has enabled DT for
associated RNCs, then use this command toenable DT from the RNC to
the GGSN associated with this IMEI profile:direct tunnel
check-iups-service
endExits the current configuration mode and returns to the Exec
mode.
Product SGSN
Privilege Security Administrator, Administrator
Syntax Description end
Usage Guidelines Return to the Exec mode.
exitExits the current configuration mode and returns to the
context configuration mode.
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 25
IMEI Profile Configuration Modeend
-
Product SGSN
Privilege Security Administrator, Administrator
Syntax Description exit
Usage Guidelines Move to the previous configuration mode.
ggsn-addressIdentify the target GGSN for traffic being managed
by this IMEI profile.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile
Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following
prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description ggsn-address IPv4/IPv6_address
IPv4/IPv6_address
Enter the IP address of the target GGSN. Enter the address in
either standard IPv4 dotted decimal format orin standard IPv6 colon
notation format.
Usage Guidelines Use this command to define the IP address of
the target GGSN to be associated with this IMEI profile.
Command Line Interface Reference, Modes I - Q, StarOS Release
21.326
IMEI Profile Configuration Modeggsn-address
-
Example
The following command identifes the address of the GGSN
associated with this IMEI profile as 123.123.11.1
ggsn-address 123.123.11.1
ignore-pdp-data-inactivityOn executing this command the SGSN
ignores PDP Data Inactivity configuration under the APN profile
forone or more matching IMEIs.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile
Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following
prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description ignore-pdp-data-inactivityremove
ignore-pdp-data-inactivity
remove
This command is used to disable or remove the option to ignore
PDP data inactivity from the IMEI profile.
Usage Guidelines The SGSN supports options to configure PDP Data
Inactivity detection duration and actions to be performedon timeout
under the APN-Profile. The following configurable actions are
supported under APN-Profile incase of PDP Data Inactivity detection
in the PDP context:
1 De-activate all PDPs of the subscriber2 De-activate all PDPs
of the bundle (all linked PDPs)3 Detach the subscriber. This action
is triggered when:
• Data in-activity is detected for all PDPs
• Data in-activity is detected for any of the PDPs
On the Detection of the PDPData Inactivity, depending on the
configuration option the SGSN either de-activatesthe PDP or
detaches the subscriber.
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 27
IMEI Profile Configuration Modeignore-pdp-data-inactivity
-
The ignore-pdp-data-inactivity CLI is added to provide an option
under the IMEI-Profile to ignore PDPData Inactivity configuration
for one or more IMEIs. On configuring this CLI, the SGSN ignores
the applicationof in-activity configuration (configured in the
APN-Profile) for a specified set of IMEI's.
The IMEI range or set of IMEI's are mapped to specific
IMEI-Profile using the CLI configuration optionunder
Operator-policy.
Note
Example
Use this command to ignore PDPData Inactivity configuration
under the APN profile for one or more matchingIMEIs.
ignore-pdp-data-inactivity
pdp-activateThis command enables the operator to configure the
SGSN to reject Secondary PDPActivation Requests fromthe UE based on
IMEI range.
Product SGSN
Privilege Administrator
Command Modes Exec > Global Configuration > IMEI Profile
Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following
prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description [ remove ] pdp-activate { drop | restrict }
secondary-activation access-type { gprs | umts }
remove
Removes the configured value and returns the pdp-activate
configuration to the default 'not configured' state.
drop
This keyword causes the GSN to ignore the Request.
Command Line Interface Reference, Modes I - Q, StarOS Release
21.328
IMEI Profile Configuration Modepdp-activate
-
restrict
This keyword instructs the SGSN to reject Secondary PDP
Activation Requests.
access-type { gprs | umts }
This keyword instructs the SGSN to ignore or reject Secondary
PDP Activation Requests on the basis of theUE's access network
type:
• gprs : from a 2G network.
• umts : from a 3G network.
Usage Guidelines The SGSN administrator can use this command to
configure the IMEI profile in the operator policy to eitherignore
or reject Secondary PDP Activation Requests from UEs based on an
IMEI range and UE access-type.
Restricting secondary PDP activation based on the IMEI (in the
IMEI profile) takes precedence over secondaryPDP activation that
might be configured in the call control profile.
Example
Enable rejection of Secondary PDP Activation Requests for 2G
callers:
pdp-activate restrict secondary-activation access-type gprs
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 29
IMEI Profile Configuration Modepdp-activate
-
Command Line Interface Reference, Modes I - Q, StarOS Release
21.330
IMEI Profile Configuration Modepdp-activate
-
C H A P T E R 5IMEI-TAC-Group Configuration Mode Commands
The IMEI-TAC-GroupConfigurationMode provides access to the
commands used to configure the IMEI-TACvalues and ranges included
in the IMEI-TAC groups. These IMEI-TAC values and ranges are used
as theselection criteria for operator policy selection based on
IMEI-TAC. For details about this functionality, referto the
Operator Policy Selection Based on IMEI-TAC chapter in theMME
Administration Guide.
Command Modes Exec > Global Configuration > LTE Policy
Configuration > IMEI-TAC-Group
configure > lte-policy > imei-tac-groupgroup_name
Entering the above command sequence results in the following
prompt:
[local]host_name(imei-tac-group)#
The commands or keywords/variables that are available are
dependent on platform type, product version,and installed
license(s).
Important
• end, page 31
• exit, page 32
• tac, page 32
• tac-range, page 33
endExits the current configuration mode and returns to the Exec
mode.
Product All
Privilege Security Administrator, Administrator
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 31
-
Syntax Description end
Usage Guidelines Use this command to return to the Exec
mode.
exitExits the current mode and returns to the parent
configuration mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description exit
Usage Guidelines Use this command to return to the parent
configuration mode.
tacConfitures individual TAC (type allocation code) values to be
included in a IMEI-TAC group which will beused as criteria for
operator policy selection.
Product MME
Privilege Administrator
Command Modes Exec > Global Configuration > LTE Policy
Configuration > IMEI-TAC-Group
configure > lte-policy > imei-tac-groupgroup_name
Entering the above command sequence results in the following
prompt:
[local]host_name(imei-tac-group)#
Command Line Interface Reference, Modes I - Q, StarOS Release
21.332
IMEI-TAC-Group Configuration Mode Commandsexit
-
Syntax Description [ no ] tac tac_value [ tac_value tac_value +
]
no
Removes the identified TAC from the IMEI-TAC group
configuration.
tac_value
Specifies the 8-digit number that identifies a specific "type
allocation code". When entering more than oneTAC, simply use a
space between each TAC. Additional TAC values can be added at any
time after theIMEI-TAC group is configured.
Usage Guidelines Use this command to enter one or more
individual TAC (type allocation code) values to the IMEI-TAC
group.Up to 500 unique IMEI-TAC values can be included in an
IMEI-TAC group.
The TAC, the first eight digits of the 15-digit IMEI or 16-digit
IMEI-SV, identifies the equipment manufacturer,the wireless device
type and the model number (if there is one); for example, TAC of
35201906 identifies anApple iPhone 5S.
Example
The following command adds four IMEI-TAC to an IMEI-TAC
group:tac 31441551 77777777 87650506 87654321
tac-rangeDefines a range of IMEI-TAC values to be included in a
IMEI-TAC group which will be used as criteria foroperator policy
selection.
Product MME
Privilege Administrator
Command Modes Exec > Global Configuration > LTE Policy
Configuration > IMEI-TAC-Group
configure > lte-policy > imei-tac-groupgroup_name
Entering the above command sequence results in the following
prompt:
[local]host_name(imei-tac-group)#
Syntax Description [ no ] tac-range from start_tac_value to
end_tac_value
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 33
IMEI-TAC-Group Configuration Mode Commandstac-range
-
no
Removes the identified TAC range from the IMEI-TAC group
configuration.
start_tac_value to end_tac_value
tac_value - Specifies the 8-digit number that identifies a
specific "type allocation code". The start TAC isthe first TAC in
the range. The end TAC is the last TAC in the range.
Usage Guidelines Use this command to enter up to 20 IMEI-TAC
value ranges. Ranges can be overlapping.
The TAC, the first eight digits of the 15-digit IMEI or 16-digit
IMEI-SV, identifies the equipment manufacturer,the wireless device
type and the model number (if there is one); for example, TAC of
35201906 identifies anApple mobile phone. Defining ranges would
enable carriers to select operator policies for call handling
basedon multiple device types.
Example
The following command defines a TAC range to be added to the
IMEI-TAC group:tac-range from 23456789 to 23456889
Command Line Interface Reference, Modes I - Q, StarOS Release
21.334
IMEI-TAC-Group Configuration Mode Commandstac-range
-
C H A P T E R 6IMS Authorization Service Configuration
ModeCommands
The IMS Authorization Service Configuration Mode enables to
configure IP Multimedia Subsystem (IMS)authorization services to
manage policy control functions and Gx interface support.
Command Modes Exec > Global Configuration > Context
Configuration > IMS Authorization Service Configuration
configure > context context_name > ims-auth-service
service_name
Entering the above command sequence results in the following
prompt:
[context_name]host_name(config-imsa-service)#
The commands or keywords/variables that are available are
dependent on platform type, product version,and installed
license(s).
Important
• end, page 36
• exit, page 36
• p-cscf discovery, page 36
• p-cscf table, page 38
• policy-control, page 40
• qos-update-timeout, page 41
• reauth-trigger, page 42
• signaling-flag, page 44
• signaling-flow, page 45
• traffic-policy, page 47
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 35
-
endExits the current configuration mode and returns to the Exec
mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description end
Usage Guidelines Use this command to return to the Exec
mode.
exitExits the current mode and returns to the parent
configuration mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description exit
Usage Guidelines Use this command to return to the parent
configuration mode.
p-cscf discoveryThis command defines the method of Proxy-Call
Session Control Function (P-CSCF) discovery to be used.
Product All
Command Line Interface Reference, Modes I - Q, StarOS Release
21.336
IMS Authorization Service Configuration Mode Commandsend
-
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context
Configuration > IMS Authorization Service Configuration
configure > context context_name > ims-auth-service
service_name
Entering the above command sequence results in the following
prompt:
[context_name]host_name(config-imsa-service)#
Syntax Description p-cscf discovery { table { 1 | 2 } [
algorithm { ip-address-modulus | msisdn-modulus | round-robin } ]
|diameter-configured }[ default | no ] p-cscf discovery
default
Sets the P-CSCF discovery to default parameter.
no
Removes/deletes configured parameters for P-CSCF discovery.
table { 1 | 2 }
Specifies that which P-CSCF table is to be used to obtain the
primary and secondary P-CSCF addresses. Total2 tables can be
configured for P-CSCF discovery.
algorithm { ip-address-modulus | msisdn-modulus | round-robin
}
Specifies the algorithm to select the row from the P-CSCF table
to be used for P-CSCF discovery.
• ip-address-modulus: This algorithm divides the IP address, in
binary, of the subscriber by the numberof rows in the table, and
the remainder is used as an index into the specified table to
select the row.
• msisdn-modulus: This algorithm divides the MSISDN value, in
binary without the leading "+", of thesubscriber by the number of
rows in the table, and the remainder is used as an index in the
specific tableto select the row.
• round-robin: This algorithm rotates all rows in the active
table for selection of the row in round-robinway. If no algorithm
is specified this is the default behavior.
Default: round-robin
diameter-configured
This option enables the table number and algorithm specified by
the diameter host-select table configurationin Policy Control
Configuration mode.
Command Line Interface Reference, Modes I - Q, StarOS Release
21.3 37
IMS Authorization Service Configuration Mode Commandsp-cscf
discovery
-
Usage Guidelines Use this command to configure the table and row
selection methods to select IP address/host address forP-CSCF
discovery.
Example
The following command specifies table 1 with round-robin
algorithm to select the rows with IP address forP-CSCF
discovery.p-cscf discovery table 1 algorithm round-robin
p-cscf tableThis command adds/appends rows with primary and/or
secondary IPv4/IPv6 addresses to a P-CSCF discoverytable with
precedence for P-CSCF discovery.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context
Configuration > IMS Authorization Service Configuration
configure > context context_name > ims-auth-service
service_name
Entering the above command sequence results in the following
prompt:
[context_name]host_name(config-imsa-service)#
Syntax Description In releases prior to 18:
p-cscf table { 1 | 2 } row-precedence precedence_value { address
ipv4_address | ipv6-address ipv6_address} [ secondary { address
ipv4_address | ipv6-address ipv6_address } ] [ weight value ]no
p-cscf table { 1 | 2 } row-precedence precedence_valueIn 18 and
later releases:
p-cscf table { 1 | 2 } row-precedence precedence_value {
ipv4-address ipv4_address [ ipv6-addressipv6_address ] |
ipv6-address ipv6_address [ ipv4-address ipv4_address ] } [
secondary { ipv4-addressipv4_address [ ipv6-address ipv6_address ]
| ipv6-address ipv6_address [ ipv4-address ipv4_address ] } [weight
value ]no p-cscf table { 1 | 2 } row-precedence
precedence_value
no
Removes/deletes configured row with precedence in specified
table for P-CSCF discovery address.
Command Line Interface Reference, Modes I - Q, StarOS Release
21.338
IMS Authorization Service Configuration Mode Commandsp-cscf
table
-
{ 1 | 2 }
Specifies which P-CSCF table is to be used to add/append the
primary and secondary P-CSCF addresses. Twotables can be configured
for P-CSCF discovery address.
row-precedence precedence_value
This keyword adds/appends the row with the specified
row-precedence to the P-CSCF address table.
In 8.1 and later releases, precedence_value must be an integer
from 1 through 128, and a maximum of 128rows can be added to a
table.
In release 8.0, precedence_value must be an integer from 1
through 100, and a maximum of 16 rows can beadded to a table.
secondary
Specifies the secondary IPv4/IPv6 address to be entered in
P-CSCF table rows.
address ip_address
Specifies the primary and/or secondary IPv4 address for P-CSCF
discovery table. This keyword, if used withsecondary keyword,
specifies the secondary IPv4 address.
This keyword is available only in releases prior to 18. In 18
and later releases, this keyword is concealedand is replaced with
ipv4-address to support the PDN type v4v6 request for VoLTE
setup.
Important
ip_address must be entered in IPv4 dotted-decimal notation.
ipv4-address ipv4_address
Specifies the primary and/or secondary IPv4 address for P-CSCF
discovery table. This keyword, if used withsecondary keyword,
specifies the secondary IPv4 address.
ipv4_address must be entered in IPv4 dotted-decimal
notation.
This keyword is available in 18 and later releases to support
the PDN type v4v6 request for VoLTE setup.Important
In releases prior to 18, the P-CSCF configuration accepts only
one primary and one secondary P-CSCF IPaddresses – both IPv4 and
IPv6 addresses per row in the P-CSCF address table. Two IP
addresses are notsufficient enough to address the requirement with
PDN type v4v6 request for VoLTE setup. Hence, in release18, the
P-CSCF configuration has been enhanced to allow users to configure
a maximum of two IPv4 addresses(primary/