Command Line Interface Reference, Modes I - Q, StarOS Release 19First Published: 2015-09-30
Last Modified: 2017-01-12
Americas HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706USAhttp://www.cisco.comTel: 408 526-4000 800 553-NETS (6387)Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITEDWARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITHTHE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain versionof the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.
NOTWITHSTANDINGANYOTHERWARRANTYHEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS"WITH ALL FAULTS.CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OFMERCHANTABILITY, FITNESS FORA PARTICULAR PURPOSEANDNONINFRINGEMENTORARISING FROMACOURSEOFDEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUTLIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERSHAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, networktopology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentionaland coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnershiprelationship between Cisco and any other company. (1110R)
2017 Cisco Systems, Inc. All rights reserved.
http://www.cisco.com/go/trademarkshttp://www.cisco.com/go/trademarks
C O N T E N T S
C H A P T E R 1 IGMP Profile Configuration Mode Commands 1
default ip igmp 2
end 3
exit 4
ip igmp query 5
ip igmp require router-alert 6
ip igmp robustness 7
ip igmp unsolicited-report-interval 8
ip igmp version 9
C H A P T E R 2 IKEv2 Security Association Configuration Mode Commands 11
default 12
encryption 13
end 15
exit 16
group 17
hmac 19
lifetime 21
prf 22
C H A P T E R 3 IMEI Profile Configuration Mode 25
associate 26
blacklist 27
description 28
direct-tunnel 29
end 30
exit 31
ggsn-address 32
Command Line Interface Reference, Modes I - Q, StarOS Release 19 iii
ignore-pdp-data-inactivity 33
pdp-activate 35
C H A P T E R 4 IMEI-TAC-Group Configuration Mode Commands 37
end 38
exit 39
tac 40
tac-range 41
C H A P T E R 5 IMS Authorization Service Configuration Mode Commands 43
end 44
exit 45
p-cscf discovery 46
p-cscf table 48
policy-control 51
qos-update-timeout 52
reauth-trigger 53
signaling-flag 55
signaling-flow 57
traffic-policy 59
C H A P T E R 6 IMS Sh Service Configuration Mode Commands 61
diameter 62
end 64
exit 65
failure-handling 66
request 68
C H A P T E R 7 IPMS Client Configuration Mode Commands 69
end 70
exit 71
export keys 72
heartbeat 73
server 75
source 77
Command Line Interface Reference, Modes I - Q, StarOS Release 19iv
Contents
C H A P T E R 8 IPNE Endpoint Configuration Mode Commands 79
bind 80
end 81
exit 82
peer 83
C H A P T E R 9 IPNE Service Configuration Mode Commands 85
end 86
exit 87
ipne-endpoint 88
C H A P T E R 1 0 IPSec Transform Set Configuration Mode Commands 89
encryption 90
end 93
esn 94
exit 96
group 97
hmac 99
mode 101
C H A P T E R 1 1 IPSG RADIUS Snoop Configuration Mode Commands 103
bind 104
connection authorization 105
end 107
exit 108
profile 109
radius 110
sess-replacement 113
setup-timeout 115
C H A P T E R 1 2 IPSG RADIUS Server Configuration Mode Commands 117
accounting-context 119
associate sgtp-service 120
bind 122
Command Line Interface Reference, Modes I - Q, StarOS Release 19 v
Contents
connection authorization 125
end 127
exit 128
gtp max-contexts-per-imsi 129
gtp peer-ip-address 131
ip 132
map ue-mac-to-imei 135
overlapping-ip-address 136
plmn id 137
profile 139
radius accounting 141
radius dictionary 145
respond-to-non-existing-session 147
sess-replacement 148
setup-timeout 150
w-apn 151
C H A P T E R 1 3 IPSP Configuration Mode Commands 153
dead-interval 154
end 155
exit 156
reserved-free-percentage 157
C H A P T E R 1 4 IPv6 ACL Configuration Mode Commands 159
deny/permit (by source IP address masking) 161
deny/permit (any) 164
deny/permit (by host IP address) 166
deny/permit (by source ICMP packets) 168
deny/permit (by IP packets) 172
deny/permit (by TCP/UDP packets) 176
end 181
exit 182
readdress server 183
redirect context (by IP address masking) 187
redirect context (any) 190
Command Line Interface Reference, Modes I - Q, StarOS Release 19vi
Contents
redirect context (by host IP address) 192
redirect context (by source ICMP packets) 194
redirect context (by IP packets) 198
redirect context (by TCP/UDP packets) 202
redirect css delivery-sequence 207
redirect css service (any) 208
redirect css service (by host IP address) 211
redirect css service (by ICMP packets) 213
redirect css service (by IP packets) 217
redirect css service (by source IP address masking) 221
redirect css service (by TCP/UDP packets) 224
redirect css service (for downlink, any) 229
redirect css service (for downlink, by host IP address) 232
redirect css service (for downlink, by ICMP packets) 234
redirect css service (for downlink, by IP packets) 238
redirect css service (for downlink, by source IP address masking) 242
redirect css service (for downlink, by TCP/UDP packets) 245
redirect css service (for uplink, any) 250
redirect css service (for uplink, by host IP address) 253
redirect css service (for uplink, by ICMP packets) 255
redirect css service (for uplink, by IP packets) 259
redirect css service (for uplink, by source IP address masking) 262
redirect css service (for uplink, by TCP/UDP packets) 264
redirect nexthop (by IP address masking) 269
redirect nexthop (any) 272
redirect nexthop (by host IP address) 275
redirect nexthop (by source ICMP packets) 278
redirect nexthop (by IP packets) 282
redirect nexthop (by TCP/UDP packets) 285
C H A P T E R 1 5 IPv6 to IPv4 Tunnel Interface Configuration Mode Commands 291
destination address 292
end 293
exit 294
mode 295
Command Line Interface Reference, Modes I - Q, StarOS Release 19 vii
Contents
source 296
tos 298
ttl 299
C H A P T E R 1 6 IP VRF Context Configuration Mode Commands 301
associate l2-mapping-table 302
description 304
end 305
exit 306
ip aggregate-address 307
ip guarantee 308
ip maximum-routes 309
mpls map-dscp-to-exp 311
mpls map-exp-to-dscp 313
C H A P T E R 1 7 ISAKMP Configuration Mode Commands 315
authentication 316
encryption 317
end 319
exit 320
group 321
hash 323
lifetime 324
C H A P T E R 1 8 IuPS Service Configuration Mode Commands 325
access-protocol 327
associate 328
blacklist-timeout-gtpu-bind-addresses 330
empty-cr 331
end 333
exit 334
force-authenticate consecutive-security-failure 335
gtpu 337
inter-rnc-procedures 339
iu-hold-connection 340
Command Line Interface Reference, Modes I - Q, StarOS Release 19viii
Contents
iu-recovery 342
iu-release-complete-timeout 343
loss-of-radio-coverage ranap-cause 344
mbms 346
network-sharing cs-ps-coordination 347
network-sharing failure-code 349
network-sharing non-shared 351
network-sharing stop-redirect-reject-cause 352
plmn 353
rab-assignment-response-timeout 355
radio-network-controller 356
rai-skip-validation 358
relocation-alloc-timeout 359
relocation-complete-timeout 360
reset 361
rnc 363
security-mode-complete-timeout 364
service-request-follow-on 365
srns-context-response-timeout 366
tigoc-timeout 367
tintc-timeout 368
C H A P T E R 1 9 LAC Service Configuration Mode Commands 369
allow 371
bind 373
data sequence-number 375
default 376
end 378
exit 379
hide-attributes 380
keepalive-interval 381
load-balancing 383
local-receive-window 385
max-retransmission 386
max-session-per-tunnel 387
Command Line Interface Reference, Modes I - Q, StarOS Release 19 ix
Contents
max-tunnel-challenge-length 388
max-tunnels 389
peer-lns 390
proxy-lcp-authentication 392
retransmission-timeout-first 393
retransmission-timeout-max 394
single-port-mode 395
snoop framed-ip-address 397
trap 399
tunnel selection-key 400
tunnel-authentication 402
C H A P T E R 2 0 Line Configuration Mode Commands 403
end 404
exit 405
length 406
width 407
C H A P T E R 2 1 Link Configuration Mode Commands 409
arbitration 411
end 412
exit 413
mtp2-aerm-emergency-threshold 414
mtp2-aerm-normal-threshold 415
mtp2-eim-decrement 416
mtp2-eim-increment 417
mtp2-eim-threshold 418
mtp2-error-correction 419
mtp2-lssu-len 420
mtp2-max-outstand-frames 421
mtp2-suerm-threshold 422
mtp3-discard-priority 423
mtp3-max-slt-try 424
mtp3-msg-priority 425
mtp3-msg-size 426
Command Line Interface Reference, Modes I - Q, StarOS Release 19x
Contents
mtp3-p1-qlen 427
mtp3-p2-qlen 428
mtp3-p3-qlen 429
mtp3-test-pattern 430
priority 431
signaling-link-code 432
sscf-nni-n1 433
sscop-max-cc 434
sscop-max-pd 435
sscop-max-stat 436
timeout 437
C H A P T E R 2 2 Linkset Configuration Mode Commands 443
adjacent-point-code 444
end 445
exit 446
link 447
self-point-code 449
C H A P T E R 2 3 LMA Service Configuration Mode Commands 451
aaa accounting 453
alt-coa-allowed 454
bind address 456
end 458
exit 459
heartbeat 460
mobility-option-type-value 462
refresh-advice-option 463
refresh-interval-percent 464
reg-lifetime 466
revocation 467
sequence-number-validate 469
setup-timeout 470
signalling-packets 471
simul-bindings 472
Command Line Interface Reference, Modes I - Q, StarOS Release 19 xi
Contents
standalone 473
timestamp-option-validation 474
timestamp-replay-protection 475
C H A P T E R 2 4 LNS Service Configuration Mode Commands 477
aaa accounting 479
authentication 480
avp map called-number apn 483
bind 484
data sequence-number 486
default 487
end 490
exit 491
ip source-violation 492
keepalive-interval 494
local-receive-window 496
max-retransmission 497
max-session-per-tunnel 498
max-tunnel-challenge-length 499
max-tunnels 500
nai-construction domain 501
newcall 502
peer-lac 503
proxy-lcp-authentication 505
retransmission-timeout-first 506
retransmission-timeout-max 507
setup-timeout 508
single-port-mode 509
trap 510
tunnel-authentication 511
tunnel-switching 512
C H A P T E R 2 5 Local Policy Actiondef Configuration Mode Commands 513
action 514
end 517
Command Line Interface Reference, Modes I - Q, StarOS Release 19xii
Contents
exit 518
C H A P T E R 2 6 Local Policy Eventbase Configuration Mode Commands 519
end 520
exit 521
rule 522
C H A P T E R 2 7 Local Policy Ruledef Configuration Mode Commands 525
condition 526
end 530
exit 531
C H A P T E R 2 8 Local Policy Service Configuration Mode Commands 533
actiondef 534
end 536
exit 537
eventbase 538
ruledef 540
C H A P T E R 2 9 Location Service Configuration Mode Commands 543
associate 544
destination-host 546
end 547
exit 548
timeout 549
C H A P T E R 3 0 Logical eNode Configuration Mode Commands 551
associate mme-pool 552
associate tai-list-db 553
bind s1-mme 554
end 555
exit 556
s1-mme ip qos-dscp 557
s1-mme sctp port 559
Command Line Interface Reference, Modes I - Q, StarOS Release 19 xiii
Contents
C H A P T E R 3 1 Loopback Interface Configuration Mode Commands 561
crypto-map 562
description 563
end 564
exit 565
ip address 566
ip ranged-address 567
ip vrf 568
ipv6 address 569
ipv6 ospf 570
C H A P T E R 3 2 LTE Custom TAI List Configuration Mode Commands 573
end 574
exit 575
tai 576
C H A P T E R 3 3 LTE Emergency Profile Configuration Mode Commands 579
ambr 580
apn 581
associate 583
end 584
exit 585
lcs-qos 586
local-emergency-num 588
local-emergency-num-ie 589
pgw 590
qos 592
ue-validation-level 594
C H A P T E R 3 4 LTE Forbidden Location Area Configuration Mode Commands 597
end 598
exit 599
lac 600
Command Line Interface Reference, Modes I - Q, StarOS Release 19xiv
Contents
C H A P T E R 3 5 LTE Forbidden Tracking Area Configuration Mode Commands 601
end 602
exit 603
tac 604
C H A P T E R 3 6 LTE Foreign PLMN GUTI Management Database Configuration Mode Commands 605
end 606
exit 607
plmn 608
C H A P T E R 3 7 LTE HeNBGWMME Pool Configuration Mode Commands 611
end 612
exit 613
mme 614
C H A P T E R 3 8 LTE Handover Restriction List Configuration Mode Commands 617
end 618
exit 619
forbidden 620
C H A P T E R 3 9 LTE MME HeNB-GWManagement Database Configuration Mode Commands 623
end 624
exit 625
henbgw-global-enbid 626
C H A P T E R 4 0 LTE Network Global MME ID Management Database Configuration Mode Commands 629
end 630
exit 631
plmn 632
C H A P T E R 4 1 LTE Paging Map Configuration Mode Commands 635
end 636
exit 637
precedence 638
Command Line Interface Reference, Modes I - Q, StarOS Release 19 xv
Contents
C H A P T E R 4 2 LTE Paging Profile Configuration Mode Commands 641
end 642
exit 643
paging-stage 644
C H A P T E R 4 3 LTE Peer Map Configuration Mode Commands 647
end 648
exit 649
precedence 650
C H A P T E R 4 4 LTE Policy Configuration Mode Commands 653
cause-code-group 655
congestion-action-profile 657
end 659
exit 660
foreign-plmn-guti-mgmt-db 661
henbgw mme-pool 663
henbgw overload-control 665
henbgw qci-dscp-mapping-table 666
henbgw s1-reset 667
henbgw session-recovery idle-timeout 668
ho-restrict-list 669
imei-tac-group 671
lte-emergency-profile 673
mme henb mgmt-db 675
mme paging cache 677
network-global-mme-id-mgmt-db 679
paging-map 680
paging-profile 682
peer-map 684
sgsn-mme 686
subscriber-map 687
tai-list-db 689
tai-mgmt-db 691
Command Line Interface Reference, Modes I - Q, StarOS Release 19xvi
Contents
C H A P T E R 4 5 LTE Subscriber Map Configuration Mode Commands 693
end 694
exit 695
precedence 696
C H A P T E R 4 6 LTE TAI Management Database Configuration Mode Commands 699
end 700
exit 701
network-name 702
tai-custom-list 703
tai-mgmt-obj 705
timezone 707
C H A P T E R 4 7 LTE TAI Management Object Configuration Mode Commands 709
emergency-services-not-supported 710
end 711
exit 712
ims-voice-over-ps 713
lai 714
network-name 715
rai 716
sgw-address 718
sgw-address-resolution-mode 720
tai 721
timezone 723
zone-code 725
C H A P T E R 4 8 MAG Service Configuration Mode Commands 727
bind 729
encapsulation 731
end 733
exit 734
heartbeat 735
information-element-set 737
Command Line Interface Reference, Modes I - Q, StarOS Release 19 xvii
Contents
max-retransmissions 739
mobility-header-checksum 740
mobility-option-type-value 741
policy 742
reg-lifetime 744
renew-percent-time 745
retransmission-policy 746
retransmission-timeout 747
signalling-packets 749
C H A P T E R 4 9 MAP Service Configuration Mode Commands 751
access-protocol 752
application-context-name 753
auth-vectors 755
end 756
equipment-identity-register 757
exit 759
gmlc 760
hlr 762
policy 763
short-message-service 764
timeout 765
C H A P T E R 5 0 MIP HA Assignment Table Configuration Mode Commands 767
end 768
exit 769
hoa-range 770
C H A P T E R 5 1 MPLS-LDP Configuration Mode Commands 773
advertise-labels 774
discovery 776
enable 778
end 779
exit 780
router-id 781
Command Line Interface Reference, Modes I - Q, StarOS Release 19xviii
Contents
session 782
C H A P T E R 5 2 MIPv6 HA Service Configuration Mode Commands 785
aaa accounting 786
bind 787
default 789
end 791
exit 792
refresh-advice-option 793
refresh-interval-percent 794
reg-lifetime 795
sequence-number-validate 796
setup-timeout 797
simul-bindings 798
timestamp-replay-protection tolerance 799
C H A P T E R 5 3 MME-eMBMS Service Configuration Mode Commands 801
associate 802
bind 804
end 805
exit 806
mmemgr-recovery 807
plmn-id 808
sctp port 809
setup-timeout 810
C H A P T E R 5 4 MME LAC Pool Area Configuration Mode Commands 811
end 812
exit 813
hash-value 814
lac 816
plmnid 817
C H A P T E R 5 5 MMEMSC Pool Area Configuration Mode 819
end 820
Command Line Interface Reference, Modes I - Q, StarOS Release 19 xix
Contents
exit 821
hash-value 822
plmn-id 824
use-msc 826
C H A P T E R 5 6 MME SGs Service Configuration Mode Commands 827
associate 828
bind 830
end 832
exit 833
non-pool-area 834
pool-area 836
sctp 838
tac-to-lac-mapping 839
timer 841
vlr 843
vlr-failure 845
C H A P T E R 5 7 MME Service Configuration Mode Commands 847
associate 851
bind s1-mme 856
csg-change-notification 858
dns 859
emm 861
enb-cache-timeout 871
encryption-algorithm-lte 872
end 874
esm 875
exit 879
gtpv2 880
heuristic-paging 881
ho-resource-release-timeout 883
integrity-algorithm-lte 884
inter-rat-nnsf 886
isda-guard-timeout 889
Command Line Interface Reference, Modes I - Q, StarOS Release 19xx
Contents
isr-capability 891
legacy-tai-list-encoding 892
local-cause-code-mapping apn-mismatch 893
local-cause-code-mapping apn-not-subscribed 895
local-cause-code-mapping apn-not-supported-in-plmn-rat 896
local-cause-code-mapping auth-failure 898
local-cause-code-mapping congestion 900
local-cause-code-mapping ctxt-xfer-fail-mme 902
local-cause-code-mapping ctxt-xfer-fail-sgsn 904
local-cause-code-mapping gw-unreachable 906
local-cause-code-mapping hss-unavailable 908
local-cause-code-mapping newcall-policy-restrict 910
local-cause-code-mapping no-active-bearers 912
local-cause-code-mapping odb packet-services 914
local-cause-code-mapping odb roamer-to-vplmn 916
local-cause-code-mapping peer-node-unknown 918
local-cause-code-mapping pgw-selection-failure 920
local-cause-code-mapping restricted-zone-code 922
local-cause-code-mapping sgw-selection-failure 924
local-cause-code-mapping vlr-down 926
local-cause-code-mapping vlr-unreachable 928
location-reporting 930
mapping 931
max-bearers per-subscriber 933
max-paging-attempts 934
max-pdns per-subscriber 936
mme-id 937
mmemgr-recovery 939
msc 940
msc-mapping 942
nas gmm-qos-ie-mapping 943
nas-max-retransmission 944
network-sharing 945
nri 947
peer-mme 949
Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxi
Contents
peer-sgsn rai 951
peer-sgsn rnc-id 953
pgw-address 955
plmn-id 957
policy attach 959
policy idle-mode 961
policy inter-rat 963
policy network 965
policy overcharge-protection 966
policy overload 968
policy pdn-connect 969
policy pdn-deactivate 970
policy pdn-modify 972
policy pdn-reconnection 974
policy s1-reset 976
policy sctp-down 977
policy service-request 978
policy srvcc 980
policy tau 982
pool-area 985
ps-lte 987
relative-capacity 989
s1-mme ip 990
s1-mme sctp port 992
s1-ue-context-release 993
setup-timeout 997
sgw-retry-max 998
snmp trap 1000
statistics 1001
ue-db 1003
C H A P T E R 5 8 MPLS-IP Configuration Mode Commands 1005
end 1006
exit 1007
protocol ldp 1008
Command Line Interface Reference, Modes I - Q, StarOS Release 19xxii
Contents
C H A P T E R 5 9 MRME Service Configuration Mode Commands 1009
aaa 1010
associate 1011
attribute 1012
bind 1014
disconnect 1017
dns-P-GW 1019
end 1021
exit 1022
fqdn 1023
radius 1024
setup-timeout 1026
C H A P T E R 6 0 Network Service Entity- IP Local Configuration Mode Commands 1027
all-nsvc-failure-action 1029
associate 1030
bssgp-timer 1032
end 1033
exit 1034
max-ns-retransmissions 1035
ns-timer 1036
nsvc-failure-action 1038
nsvl 1039
peer-network-service-entity 1040
retry-count 1041
timer 1042
C H A P T E R 6 1 Network Service Entity - Peer NSEI Configuration Mode Commands 1043
bssgp-timer 1044
end 1045
exit 1046
ns-reset-mode 1047
ns-vc 1049
Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxiii
Contents
C H A P T E R 6 2 Network Service Virtual Connection Configuration Mode Commands 1051
end 1052
exit 1053
C H A P T E R 6 3 Network Service Virtual Link Configuration Mode Commands 1055
end 1056
exit 1057
nsvl-address 1058
weight 1059
C H A P T E R 6 4 NTP Configuration Mode Commands 1061
enable 1062
end 1064
exit 1065
server 1066
C H A P T E R 6 5 NTSR Pool Configuration Mode Commands 1069
end 1070
exit 1071
peer-ip-address 1072
C H A P T E R 6 6 Operator Policy Configuration Mode 1073
apn 1075
associate 1077
description 1079
end 1080
exit 1081
imei 1082
C H A P T E R 6 7 ORBEM Configuration Mode Commands 1085
activate client id 1087
client id 1088
end 1090
event-notif-iiop-port 1091
Command Line Interface Reference, Modes I - Q, StarOS Release 19xxiv
Contents
event-notif-service 1092
event-notif-siop-port 1103
exit 1104
iiop-port 1105
iiop-transport 1106
iop-address 1107
max-attempt 1108
session-timeout 1109
siop-port 1110
ssl-auth-policy 1111
ssl-certificate 1112
ssl-private-key 1114
C H A P T E R 6 8 OSPF Configuration Mode Commands 1117
area authentication 1119
area default-cost 1121
area nssa 1122
area stub 1124
area virtual-link 1125
area virtual link authentication 1127
area virtual-link authentication-key 1129
area virtual link intervals 1131
area virtual link message-digest-key 1133
bfd-all-interfaces 1135
capability graceful-restart 1136
default-information originate 1137
default-metric 1139
distance 1140
distribute-list 1142
end 1144
exit 1145
ip vrf 1146
neighbor 1147
network area 1149
ospf graceful-restart 1151
Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxv
Contents
ospf router-id 1153
passive-interface 1154
redistribute 1155
refresh timer 1157
router-id 1158
timers spf 1159
C H A P T E R 6 9 OSPFv3 Configuration Mode Commands 1161
area 1162
default-metric 1164
end 1165
exit 1166
passive-interface 1167
redistribute 1168
router-id 1170
timers spf 1171
C H A P T E R 7 0 OSPF VRF Configuration Mode Commands 1173
area 1175
default-information originate 1179
default-metric 1181
distance 1182
distribute-list 1184
end 1186
exit 1187
neighbor 1188
network 1190
ospf router-id 1192
passive-interface 1193
redistribute 1194
refresh timer 1196
router-id 1197
timers spf 1198
C H A P T E R 7 1 Out-Address Configuration Mode Commands 1201
Command Line Interface Reference, Modes I - Q, StarOS Release 19xxvi
Contents
end 1202
exit 1203
gt-address 1204
gt-format 1205
ni-indicator 1206
point-code 1207
routing-indicator 1208
ssf 1209
ssn 1210
C H A P T E R 7 2 P2P Advertisement Server Group Configuration Mode Commands 1211
ad-source 1212
end 1214
exit 1215
map-to-application 1216
C H A P T E R 7 3 PCC-Action-Set Configuration Mode Commands 1217
af-media-type 1219
associate monitoring-key 1222
authorize 1224
dissociate monitoring-key 1226
dynamic-rule-install 1228
dynamic-rule-uninstall 1232
end 1234
exit 1235
log-event 1236
notify-user 1237
offline-charging-server 1239
online-charging-server 1241
request-usage-report monitoring-key 1243
rule-activate 1245
rule-deactivate 1247
rulebase-activate 1249
rulebase-deactivate 1251
service-tag 1253
Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxvii
Contents
terminate-session 1255
usage-monitor 1257
C H A P T E R 7 4 PCC-AF-Service Configuration Mode Commands 1259
associate pcc-service 1260
diameter dictionary 1262
diameter origin end-point 1264
end 1266
exit 1267
C H A P T E R 7 5 PCC-Condition-Group Configuration Mode Commands 1269
af-application-id 1271
af-media-codec 1273
af-media-type 1275
af-service-urn 1277
an-gw-address 1279
authorized-qci 1281
base-station-id 1283
bearer-count 1285
connectivity-access-network 1287
end 1289
eval-condition-group 1290
event-time 1292
event-trigger 1294
exit 1296
imsi 1297
msisdn 1299
multi-line-or 1301
nai 1302
out-of-credit rulename 1304
out-of-credit rulebase-name 1306
pcef-address 1308
pdn-id 1310
profile-attribute 1312
radio-access-technology 1314
Command Line Interface Reference, Modes I - Q, StarOS Release 19xxviii
Contents
sgsn-ip 1316
sgsn-mcc-mnc 1318
subscription-attribute 1320
spr-profile-not-found 1322
threshold-condition usage-monitor 1323
user-access-network 1326
user-equipment-info esn 1328
user-equipment-info eui64 1330
user-equipment-info imeisv 1332
user-equipment-info mac 1334
user-equipment-info meid 1336
user-equipment-info modified-eui64 1338
user-location-info 1340
C H A P T E R 7 6 PCC-Data-Service Configuration Mode Commands 1343
end 1345
exit 1346
flow direction in 1347
flow direction out 1349
metering-method 1351
monitoring-key 1353
precedence 1354
qos-profile 1355
rating-group 1356
reporting-level 1357
service-identifier 1359
C H A P T E R 7 7 PCC-Event-Notification-Interface-Endpoint Configuration Mode Commands 1361
address 1362
end 1363
exit 1364
peer name 1365
peer select-algorithm 1367
peer select-peer 1369
Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxix
Contents
C H A P T E R 7 8 PCC-Policy-Service Configuration Mode Commands 1371
associate pcc-service 1373
diameter dictionary 1374
diameter origin end-point 1376
ehrpd-access-bcm 1378
end 1380
exit 1381
gprs-access-bcm 1382
max policy-sessions 1384
subscriber-binding-identifier 1385
subscription-id-absence-action 1387
unsolicited-provisioning 1389
C H A P T E R 7 9 PCC-Service-Profile Configuration Mode Commands 1391
default-rulebase-name 1393
end 1394
eval-priority 1395
exit 1397
service-tag 1398
timeout long-duration 1400
usage-monitor 1402
unknown-services-treatment 1404
C H A P T E R 8 0 PCC-QoS-Profile Configuration Mode Commands 1407
arp-priority 1408
end 1410
exit 1411
guaranteed-bitrate 1412
max-bitrate 1414
qci 1416
C H A P T E R 8 1 PCC-Quota Service Configuration Mode Commands 1417
associate pcc-service 1418
diameter dictionary 1419
Command Line Interface Reference, Modes I - Q, StarOS Release 19xxx
Contents
diameter origin end-point 1420
end 1422
exit 1423
max total-charging-sessions 1424
C H A P T E R 8 2 PCC-Sp-Endpoint Configuration Mode Commands 1425
access-type 1426
diameter dictionary 1428
diameter origin end-point 1430
diameter peer-select 1432
end 1435
exit 1436
profile-data 1437
profile-update-notification 1439
spr subscriber identifier 1441
C H A P T E R 8 3 PCC-Service Addon Configuration Mode Commands 1443
associate-addon-state 1444
description 1446
duration 1448
end 1450
exit 1451
status active 1452
time-allowance 1454
volume-allowance 1456
C H A P T E R 8 4 PCC-TimeDef Configuration Mode Commands 1459
end 1460
exit 1461
start date 1462
start day 1464
start time 1466
time-slot 1468
C H A P T E R 8 5 PCP Configuration Mode Commands 1473
Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxxi
Contents
end 1474
exit 1475
policy-control 1476
server 1477
C H A P T E R 8 6 PCP Policy Control Configuration Mode Commands 1479
end 1480
exit 1481
request-opcode 1482
response-opcode 1484
C H A P T E R 8 7 PDIF Service Configuration Mode Commands 1487
aaa attribute 1488
aaa authentication 1490
bind 1492
default 1494
duplicate-session-detection 1496
end 1498
exit 1499
hss 1500
ims-sh-service 1502
ip source-violation 1503
mobile-ip 1505
setup-timeout 1506
username 1507
C H A P T E R 8 8 PDG Service Configuration Mode Commands 1509
aaa attribute 1510
associate sgtp-service 1511
certificate-selection 1513
bind 1514
end 1516
exit 1517
ip gnp-qos-dscp 1518
ip qos-dscp 1522
Command Line Interface Reference, Modes I - Q, StarOS Release 19xxxii
Contents
ip source-violation 1525
max-tunnels-per-ue 1527
plmn id 1528
setup-timeout 1529
C H A P T E R 8 9 PDSN Service Configuration Mode Commands 1531
a11-signalling-packets 1534
aaa 3gpp2-service-option 1535
aaa nas-ip-address 1536
access-flow traffic-validation 1537
access-network 1538
airlink bad-sequence-number 1539
allow alt-ppp 1541
always-on-indication 1542
associate 1543
authentication 1544
bcmcs 1547
bind 1549
data-available-indicator 1551
data-over-signaling 1552
default subscriber 1553
direct-lte-indicator 1554
dormant-transition 1555
end 1556
enhanced-pcf-redirection 1557
exit 1558
fragment 1559
gre 1560
inter-pdsn-handoff mobility-event-indicator 1563
inter-pdsn-handover 1564
ip header-compression rohc 1565
ip local-port 1566
ip source-violation 1567
lifetime 1569
max-retransmissions 1571
Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxxiii
Contents
mobile-ip foreign-agent context 1572
mobile-ipv6 1573
msid length 1574
nai-construction 1575
new-call conflict 1577
pcf-monitor 1578
pcf-session-id-change restart-ppp 1580
pdsn type0-tft attempt-inner-match 1582
peer-pcf 1583
pma-capability-indicator 1584
policy 1585
ppp 1589
qos-profile-id-mapping 1591
qos update 1594
registration-accept 1596
registration-ack-deny terminate-session-on-error 1597
registration-deny 1598
registration-discard 1601
registration-update 1603
retransmission-timeout 1605
service-option 1607
setup-timeout 1609
simple-ip allow 1610
spi 1611
tft-validation wait-timeout 1614
threshold a11-ppp-send-discard 1615
threshold a11-rac-msg-discard 1617
threshold a11-rrp-failure 1619
threshold a11-rrq-msg-discard 1621
threshold init-rrq-rcvd-rate 1623
C H A P T E R 9 0 PDSN Service RoHC Configuration Mode Commands 1625
cid-mode 1626
end 1628
exit 1629
Command Line Interface Reference, Modes I - Q, StarOS Release 19xxxiv
Contents
mrru 1630
profile 1631
C H A P T E R 9 1 Peer List Configuration Mode Commands 1633
address 1634
end 1636
exit 1637
C H A P T E R 9 2 Peer Profile Configuration Mode Commands 1639
arp-mapping 1640
description 1641
end 1642
exit 1643
gtpc 1644
lawful-intercept 1646
no-qos-negotiation 1647
upgrade-qos-supported 1648
C H A P T E R 9 3 Peer-Server Configuration Mode Commands 1649
end 1650
exit 1651
mode 1652
name 1653
psp 1654
routing-context 1655
self-point-code 1656
C H A P T E R 9 4 P-GW Service Configuration Mode Commands 1659
associate 1661
authorize-with-hss 1663
dns-client 1665
egtp 1666
end 1669
exit 1670
fqdn 1671
Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxxv
Contents
gx-li 1673
map-initial-setup-auth-fail-to-gtp-cause-user-auth-fail 1674
message-timestamp-drift 1675
newcall 1677
pcscf-restoration 1679
plmn id 1681
session-delete-delay 1683
setup-timeout 1684
C H A P T E R 9 5 Policy Control Configuration Mode Commands 1685
apn-name-to-be-included 1687
arp-priority-level 1689
associate 1690
cc-profile 1692
custom-reauth-trigger 1694
diameter dictionary 1696
diameter encode-event-avps 1699
diameter encode-supported-features 1700
diameter host-select reselect 1706
diameter host-select row-precedence 1708
diameter host-select table 1711
diameter host-select-template 1714
diameter map 1716
diameter origin endpoint 1718
diameter request-timeout 1719
diameter sgsn-change-reporting 1721
diameter update-dictionary-avps 1723
end 1726
endpoint-peer-select 1727
event-report-indication 1729
event-update 1731
exit 1734
failure-handling 1735
li-secret 1739
max-outstanding-ccr-u 1740
Command Line Interface Reference, Modes I - Q, StarOS Release 19xxxvi
Contents
subscription-id service-type 1742
C H A P T E R 9 6 Plugin Configuration Mode Commands 1745
attribute 1746
end 1747
exit 1748
module priority 1749
C H A P T E R 9 7 PVC Configuration Mode Commands 1751
bind 1752
encapsulation aal5 1754
end 1755
exit 1756
shaping 1757
shutdown 1759
C H A P T E R 9 8 PVC Interface Configuration Mode Commands 1761
description 1763
end 1764
exit 1765
ip 1766
ip access-group 1767
ip address 1769
ip mtu 1771
ip ospf authentication-key 1772
ip ospf authentication-type 1773
ip ospf cost 1774
ip ospf dead-interval 1775
ip ospf hello-interval 1776
ip ospf message-digest-key 1777
ip ospf network 1778
ip ospf priority 1780
ip ospf retransmit-interval 1781
ip ospf transmit-delay 1782
Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxxvii
Contents
C H A P T E R 9 9 QCI - QoS Mapping Configuration Mode Commands 1783
end 1784
exit 1785
operator-defined-qci 1786
qci 1789
C H A P T E R 1 0 0 QCI - RAN ID Mapping Configuration Mode Commands 1797
end 1798
exit 1799
profile-id 1800
C H A P T E R 1 0 1 QoS L2 Mapping Configuration Mode Commands 1803
end 1804
exit 1805
internal-priority 1806
C H A P T E R 1 0 2 QoS Profile Configuration Mode Commands 1809
apn-ambr 1810
associate 1812
class 1814
description 1822
end 1823
epc-qos-params-in-gtpv1 1824
exit 1825
prefer-as-cap 1826
prefer-tc 1827
qci-reject 1829
Command Line Interface Reference, Modes I - Q, StarOS Release 19xxxviii
Contents
IGMP Profile Configuration Mode Commands
The Internet GroupManagement Protocol (IGMP) Profile ConfigurationMode is used to create and managethe IGMP parameters for an Ethernet interface.
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-igmp-profile-)#
Available commands or keywords/variables vary based on platform type, product version, and installedlicense(s).
Important
default ip igmp, page 2
end, page 3
exit, page 4
ip igmp query, page 5
ip igmp require router-alert, page 6
ip igmp robustness, page 7
ip igmp unsolicited-report-interval, page 8
ip igmp version, page 9
Command Line Interface Reference, Modes I - Q, StarOS Release 19 1
default ip igmpConfigures default IGMP parameters.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description default ip igmp { query | require | robustness | unsolicited-report-interval | version }
Usage Guidelines Specify the IGMP parameters for the default profile. Refer to the remaining command description in thischapter for additional information.
Examples To apply enable echo mode on this interface, use the following command:bfd echo
Command Line Interface Reference, Modes I - Q, StarOS Release 192
IGMP Profile Configuration Mode Commandsdefault ip igmp
endExits the current configuration mode and returns to the Exec mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description end
Usage Guidelines Use this command to return to the Exec mode.
Command Line Interface Reference, Modes I - Q, StarOS Release 19 3
IGMP Profile Configuration Mode Commandsend
exitExits the current mode and returns to the parent configuration mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description exit
Usage Guidelines Use this command to return to the parent configuration mode.
Command Line Interface Reference, Modes I - Q, StarOS Release 194
IGMP Profile Configuration Mode Commandsexit
ip igmp queryConfigures the maximum response time for IGMP queries.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description ip igmp query max-response-time seconds
max-response-time seconds
Specify the maximum number of seconds that the system will wait for an IGMP response as an integer from1 through 25.
Usage Guidelines Specify the maximum response time for IGMP queries.
Examples ip igmp query max-response-time 10
Command Line Interface Reference, Modes I - Q, StarOS Release 19 5
IGMP Profile Configuration Mode Commandsip igmp query
ip igmp require router-alertSets the router alert flag to ON in IP IGMP packets.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description [ no ] ip igmp require router-alert
no
Sets the router alert flag to OFF in IP IGMP packets.
Usage Guidelines Sets the router alert flag to ON in IP IGMP packets.
Examples ip igmp require router-alert
Command Line Interface Reference, Modes I - Q, StarOS Release 196
IGMP Profile Configuration Mode Commandsip igmp require router-alert
ip igmp robustnessSets the Robustness value in IP IGMP packets. The Robustness variable allows tuning for the expected packetloss on a subnet. If a subnet is expected to be lossy, the Robustness variable may be increased. IGMP is robustto packet losses. The Robustness variable should not be set to 1 (one).
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description ip igmp robustness value
value
Sets the robustness value as an integer from 1 through 10. Default: 2
Usage Guidelines Sets the robustness value in IP IGMP packets.
Examples ip igmp robustness 7
Command Line Interface Reference, Modes I - Q, StarOS Release 19 7
IGMP Profile Configuration Mode Commandsip igmp robustness
ip igmp unsolicited-report-intervalSets the Unsolicited Report Interval which is the time between repetitions of a host's initial report of membershipin a group.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description ip igmp unsolicited-report-interval seconds
seconds
Specifies the number of seconds between repetitions of a host's initial report of membership in a group as aninteger from 1 through 25. Default: 10
Usage Guidelines Set the Unsolicited Report Interval which is the time between repetitions of a host's initial report of membershipin a group.
Examples ip igmp unsolicited-report-interval 15
Command Line Interface Reference, Modes I - Q, StarOS Release 198
IGMP Profile Configuration Mode Commandsip igmp unsolicited-report-interval
ip igmp versionSets the IGMP version to be supported by this interface.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-igmp-profile-)#
Syntax Description ip igmp version { v1 | v2 | v3 }
v1 | v2 | v3
Specifies the IGMP Version number:
v1: Version 1, RFC 1112
v2: Version 2, RFC 2236
v3: Version 3, RFC 4604
Usage Guidelines Set the IGMP version to be supported by this interface.
Examples ip igmp version v2
Command Line Interface Reference, Modes I - Q, StarOS Release 19 9
IGMP Profile Configuration Mode Commandsip igmp version
Command Line Interface Reference, Modes I - Q, StarOS Release 1910
IGMP Profile Configuration Mode Commandsip igmp version
IKEv2 Security Association Configuration ModeCommands
The IKEv2 Security Association Configuration Mode is used to configure a Security Association (SA) atthe outset of an IPSec session. A security association is the collection of algorithms and parameters (suchas keys) that is being used to encrypt and authenticate a particular flow in one direction. In normalbi-directional traffic, the flows are secured by a pair of security associations.
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
The commands or keywords/variables that are available are dependent on platform type, product version,and installed license(s).
Important
default, page 12
encryption, page 13
end, page 15
exit, page 16
group, page 17
hmac, page 19
lifetime , page 21
prf, page 22
Command Line Interface Reference, Modes I - Q, StarOS Release 19 11
defaultSets the default properties for the selected parameter.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description default { encryption | group | hmac | lifetime | prf }Set the defaults for the following parameters:
encryption: Default algorithm for the IKEv2 IKE SA is AES-CBC-128.
group: Default Diffie-Hellman group is Group 2.
hmac: Default IKEv2 IKE SA hashing algorithm is SHA1-96.
lifetime: Default lifetime for SAs derived from this transform-set is 86400 seconds.
prf: Default PRF for the IKEv2 IKE SA is SHA1.
Usage Guidelines Configure default parameters for the IKEv2 IKE SA transform-set.
Examples Use the following configuration to set the default encryption algorithm:default encryption
Command Line Interface Reference, Modes I - Q, StarOS Release 1912
IKEv2 Security Association Configuration Mode Commandsdefault
encryptionConfigures the appropriate encryption algorithm and encryption key length for the IKEv2 IKE securityassociation. AES-CBC-128 is the default.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description encryption { 3des-cbc | aes-cbc-128 | aes-cbc-256 | des-cbc | null }default encryption
3des-cbc
Data Encryption Standard Cipher Block Chaining encryption applied to the message three times using threedifferent cypher keys (triple DES).
aes-cbc-128
Advanced Encryption Standard Cipher Block Chaining with a key length of 128 bits.
aes-cbc-256
Advanced Encryption Standard Cipher Block Chaining with a key length of 256 bits.
des-cbc
Data Encryption Standard Cipher Block Chaining. Encryption using a 56-bit key size. Relatively insecure.
null
Configures no IKEv2 IKE Security Association Encryption Algorithm. All IKEv2 IPsec Child SecurityAssociation protected traffic will be sent in the clear.
Command Line Interface Reference, Modes I - Q, StarOS Release 19 13
IKEv2 Security Association Configuration Mode Commandsencryption
USE OF THIS ALGORITHM FOR IKE_SA ENCRYPTION IS A VIOLATION OF RFC 4306. THISALGORITHM SHOULD ONLY BE USED FOR TESTING PURPOSES.
Note
Usage Guidelines IKEv2 requires a confidentiality algorithm to be applied in order to work.
In cipher block cryptography, the plaintext is broken into blocks usually of 64 or 128 bits in length. In cipherblock chaining (CBC) each encrypted block is chained into the next block of plaintext to be encrypted. Arandomly-generated vector is applied to the first block of plaintext in lieu of an encrypted block. CBC providesconfidentiality, but not message integrity.
Because RFC 4307 calls for interoperability between IPSec and IKEv2, the IKEv2 confidentiality algorithmsmust be the same as those configured for IPSec in order for there to be an acceptable match during the IKEmessage exchange. Because of RFC4307, in IKEv2, there is no viable NULL option, it is available for testingonly.
Examples The following command configures the encryption to be aes-cbc-128:encryption aes-cbc-128
Command Line Interface Reference, Modes I - Q, StarOS Release 1914
IKEv2 Security Association Configuration Mode Commandsencryption
endExits the current configuration mode and returns to the Exec mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description end
Usage Guidelines Use this command to return to the Exec mode.
Command Line Interface Reference, Modes I - Q, StarOS Release 19 15
IKEv2 Security Association Configuration Mode Commandsend
exitExits the current mode and returns to the parent configuration mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description exit
Usage Guidelines Use this command to return to the parent configuration mode.
Command Line Interface Reference, Modes I - Q, StarOS Release 1916
IKEv2 Security Association Configuration Mode Commandsexit
groupConfigures the appropriate key exchange cryptographic strength by applying a Diffie-Hellman group. Defaultis Group 2.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description group { 1 | 2 | 5 | 14 }default group
1
Configures crypto strength at the Group 1 level. Lowest security.
2
Configures crypto strength at the Group 2 (default) level. Medium security.
This is the default setting for this command.
5
Configures crypto strength at the Group 5 level. Higher security.
14
Configures crypto strength at the Group 14 level. Highest security
Usage Guidelines Diffie-Hellman groups are used to determine the length of the base prime numbers used during the keyexchange process in IKEv2. The cryptographic strength of any key derived depends, in part, on the strengthof the Diffie-Hellman group upon which the prime numbers are based.
Command Line Interface Reference, Modes I - Q, StarOS Release 19 17
IKEv2 Security Association Configuration Mode Commandsgroup
Group 1 provides 768 bits of keying strength, Group 2 provides 1024 bits, Group 5 provides 1536 bits andGroup 14 provides 2048 bits of encryption strength.
Configuring a DH group also enables Perfect Forward Secrecy, which is disabled by default.
Examples This command configures crypto strength at the Group 14 level. Highest security group 14:default group
Command Line Interface Reference, Modes I - Q, StarOS Release 1918
IKEv2 Security Association Configuration Mode Commandsgroup
hmacConfigures the IKEv2 IKE SA integrity algorithm. Default is SHA1-96.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description hmac { aes-xcbc-96 | md5-96 | sha1-96 | sha2-256-128 | sha2-384-192 | sha2-512-256 }default hmac
aes-xcbc-96
HMAC-AES-XCBC uses a 128-bit secret key and produces a 128-bit authenticator value.
md5-96
HMAC-MD5 uses a 128-bit secret key and produces a 128-bit authenticator value.
sha1-96
HMAC-SHA-1 uses a 160-bit secret key and produces a 160-bit authenticator value. This is the default settingfor this command.
sha2-256-128
HMAC-SHA-256 uses a 256-bit secret key and produces a 128-bit authenticator value.
sha2-384-192
HMAC-SHA-384 uses a 384-bit secret key and produces a 192-bit authenticator value.
sha2-512-256
HMAC-SHA-512 uses a 512-bit secret key and produces a 256-bit authenticator value.
Command Line Interface Reference, Modes I - Q, StarOS Release 19 19
IKEv2 Security Association Configuration Mode Commandshmac
Usage Guidelines IKEv2 requires an integrity algorithm be configured in order to work.
A keyed-Hash Message Authentication Code, or HMAC, is a type of message authentication code (MAC)calculated using a cryptographic hash function in combination with a secret key to verify both data integrityand message authenticity. A hash takes a message of any size and transforms it into a message of a fixed size:the authenticator value. This is truncated and transmitted. The authenticator value is reconstituted by thereceiver and the first truncated bits are compared for a 100 percent match.
Examples This command configures HMAC value md5-96:hmac md5-96
Command Line Interface Reference, Modes I - Q, StarOS Release 1920
IKEv2 Security Association Configuration Mode Commandshmac
lifetimeConfigures the lifetime of a security association (SA) in seconds.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description lifetime secdefault lifetime
lifetime sec
Sets the value of the timeout parameter in seconds as an integer from 60 through 86400. Default: 86400
Usage Guidelines The secret keys that are used for various aspects of a configuration should only be used for a limited amountof time before timing out. This exposes a limited amount of data to the possibility of hacking. If the SA expires,the options are then to either close the SA and open an new one, or renew the existing SA.
Examples The following command sets the lifetime timeout to 120 seconds:lifetime 120
Command Line Interface Reference, Modes I - Q, StarOS Release 19 21
IKEv2 Security Association Configuration Mode Commandslifetime
prfSelects one of the HMAC integrity algorithms to act as the IKE Pseudo-Random Function. A PRF producesa string of bits that an attacker cannot distinguish from random bit string without knowledge of the secret key.The default is SHA1.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description prf { aes-xcbc-128 | md5 | sha1 | sha2-256 | sha2-384 | sha2-512 }default prf
aes-xcbc-128
Configure IKEv2 IKE Security Association Pseudo Algorithm to be AES-XCBC-128.
md5
MD5 uses a 128-bit secret key and produces a 128-bit authenticator value.
sha1
SHA-1 uses a 160-bit secret key and produces a 160-bit authenticator value.
SHA-1 is considered cryptographically stronger than MD5, but it takes more CPU cycles to compute.
This is the default setting for this command.
sha2-256
PRF-HMAC-SHA-256 uses a 256-bit secret key.
sha2-384
PRF-HMAC-SHA-384 uses a 384-bit secret key.
Command Line Interface Reference, Modes I - Q, StarOS Release 1922
IKEv2 Security Association Configuration Mode Commandsprf
sha2-512
PRF-HMAC-SHA-512 uses a 512-bit secret key.
Usage Guidelines This command generates keying material for all the cryptographic algorithms used in both the IKE_SA andthe CHILD_SAs.
Examples This configuration sets the PRF to be value sha2-256:prf sha2-256
Command Line Interface Reference, Modes I - Q, StarOS Release 19 23
IKEv2 Security Association Configuration Mode Commandsprf
Command Line Interface Reference, Modes I - Q, StarOS Release 1924
IKEv2 Security Association Configuration Mode Commandsprf
IMEI Profile Configuration Mode
Essentially, an IMEI profile is a template which groups a set of device-specific commands that may beapplicable to one or more IMEIs. The same IMEI profile can be associated with multiple IMEI ranges andmultiple operator policies.
An SGSN supports a total of 1000 IMEI profile configurations.
The IMEI profile configuration mode defines a set of parameters controlling the SGSN behavior when aRequest is received from a device in the specified IMEI (International Mobile Equipment Identity) range.An IMEI profile is a key element in the Operator Policy feature and an IMEI profile is not used or validunless it is associated with an IMEI range and this association is specified in an operator policy (see theOperator Policy ConfigurationModeCommands chapter elsewhere in theCommand Line Interface Reference).
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:
[local]host_name(config-imei-profile-profile_name)#
The commands or keywords/variables that are available are dependent on platform type, product version,and installed license(s).
Important
associate, page 26
blacklist, page 27
description, page 28
direct-tunnel, page 29
end, page 30
exit, page 31
ggsn-address, page 32
ignore-pdp-data-inactivity, page 33
pdp-activate, page 35
Command Line Interface Reference, Modes I - Q, StarOS Release 19 25
associateAssociate an APN remap table with this IMEI profile.
Note that an APN remap table can be associated with an IMEI profile before the table has actually beencreated/configured.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description associate apn-remap-table table_nameno associate apn-remap-table
no
Disables the configured remap table association.
table_name
Define the name of an APN remap table that is to be associated with this IMEI profile for call routing basedin IMEI.
Usage Guidelines Use this command to associate an APN remap table with this IMEI profile. With such an association, it ispossible to override an APN call-routing based on an IMEI.
For example, with the APN exceptions defined in an APN remap table (refer to the APN Remap TableConfigurationMode chapter), a blank APN or an incorrect APN could be overriden. So during PDPActivationfor in incoming call, the call could be rerouted based on an IMEI in the range defined for the IMEI profile.
Examples Associate the APN remap table 'remapHO' (remaps all calls with blank APNS to the head-office) to this IMEIprofile:associate apn-remap-table remapHO
Command Line Interface Reference, Modes I - Q, StarOS Release 1926
IMEI Profile Configuration Modeassociate
blacklistBlacklist all mobile devices that fit the IMEI definitions associated with this IMEI profile.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description blacklistremove blacklist
remove
Including this keywordwith the command, removes the blacklist command from the IMEI profile configuration.
Usage Guidelines Blacklists subscribers whose devices bear IMEI that match the defined IMEI range for this profile.
Examples Use this command to black list all subscribers with IMEI that fall within the range set for this IMEI profile:blacklist
Command Line Interface Reference, Modes I - Q, StarOS Release 19 27
IMEI Profile Configuration Modeblacklist
descriptionDefine a descriptive string relevant to the specific APN profile.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description description descriptionremove description
remove
Removes the configured description from this APN profile.
description
Enter an alphanumeric string of 1 to 100 alphanumeric characters. The string may include spaces, punctuation,and case-sensitive letters if the string is enclosed in double quotes ( " ).
Usage Guidelines Define information that identifies this particularly APN profile.
Examples Indicate that this IMEI profile IMEIprof1 is to be used for customers in the United Kingdom and that theprofile:description "IMEIprof1 defines routing actions based on IMEI for customers in the UK."
Command Line Interface Reference, Modes I - Q, StarOS Release 1928
IMEI Profile Configuration Modedescription
direct-tunnelInstruct the SGSN to enable/disable a direct tunnel between the RNC and the GGSN based on the IuPS serviceconfiguration.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description direct-tunnel check-iups-serviceno direct-tunnel
no direct-tunnel
This command instructs the SGSN to disable the direct tunnel function between the GGSN and the RNC.
Usage Guidelines Direct tunnel is enabled by default on the GGSN and often on the RNC. This leaves it to the SGSN'sconfiguration to actually enable or disable a direct tunnel.
With the SGSN, the options for configuring a direct tunnel are complex -- enable/disable on the basis of APNs,or RNCs, or GGSNs, or on the basis of the IMEI range. Refer to the SGSN Administration Guide forconfiguration details.
Examples Assuming the IuPS service configuration has enabled DT for associated RNCs, then use this command toenable DT from the RNC to the GGSN associated with this IMEI profile:direct tunnel check-iups-service
Command Line Interface Reference, Modes I - Q, StarOS Release 19 29
IMEI Profile Configuration Modedirect-tunnel
endExits the current configuration mode and returns to the Exec mode.
Product SGSN
Privilege Security Administrator, Administrator
Syntax Description end
Usage Guidelines Return to the Exec mode.
Command Line Interface Reference, Modes I - Q, StarOS Release 1930
IMEI Profile Configuration Modeend
exitExits the current configuration mode and returns to the context configuration mode.
Product SGSN
Privilege Security Administrator, Administrator
Syntax Description exit
Usage Guidelines Move to the previous configuration mode.
Command Line Interface Reference, Modes I - Q, StarOS Release 19 31
IMEI Profile Configuration Modeexit
ggsn-addressIdentify the target GGSN for traffic being managed by this IMEI profile.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description ggsn-address IPv4/IPv6_address
IPv4/IPv6_address
Enter the IP address of the target GGSN. Enter the address in either standard IPv4 dotted decimal format orin standard IPv6 colon notation format.
Usage Guidelines Use this command to define the IP address of the target GGSN to be associated with this IMEI profile.
Examples The following command identifes the address of the GGSN associated with this IMEI profile as 123.123.11.1
ggsn-address 123.123.11.1
Command Line Interface Reference, Modes I - Q, StarOS Release 1932
IMEI Profile Configuration Modeggsn-address
ignore-pdp-data-inactivityOn executing this command the SGSN ignores PDP Data Inactivity configuration under the APN profile forone or more matching IMEIs.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description ignore-pdp-data-inactivityremove ignore-pdp-data-inactivity
remove
This command is used to disable or remove the option to ignore PDP data inactivity from the IMEI profile.
Usage Guidelines The SGSN supports options to configure PDP Data Inactivity detection duration and actions to be performedon timeout under the APN-Profile. The following configurable actions are supported under APN-Profile incase of PDP Data Inactivity detection in the PDP context:
1 De-activate all PDPs of the subscriber2 De-activate all PDPs of the bundle (all linked PDPs)3 Detach the subscriber. This action is triggered when:
Data in-activity is detected for all PDPs
Data in-activity is detected for any of the PDPs
On the Detection of the PDPData Inactivity, depending on the configuration option the SGSN either de-activatesthe PDP or detaches the subscriber.
The ignore-pdp-data-inactivity CLI is added to provide an option under the IMEI-Profile to ignore PDPData Inactivity configuration for one or more IMEIs. On configuring this CLI, the SGSN ignores the applicationof in-activity configuration (configured in the APN-Profile) for a specified set of IMEI's.
Command Line Interface Reference, Modes I - Q, StarOS Release 19 33
IMEI Profile Configuration Modeignore-pdp-data-inactivity
The IMEI range or set of IMEI's are mapped to specific IMEI-Profile using the CLI configuration optionunder Operator-policy.
Note
Examples Use this command to ignore PDPData Inactivity configuration under the APN profile for one or more matchingIMEIs.
ignore-pdp-data-inactivity
Command Line Interface Reference, Modes I - Q, StarOS Release 1934
IMEI Profile Configuration Modeignore-pdp-data-inactivity
pdp-activateThis command enables the operator to configure the SGSN to reject Secondary PDPActivation Requests fromthe UE based on IMEI range.
Product SGSN
Privilege Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:
[local]host_name(config-imei-profile-profile_name)#
Syntax Description [ remove ] pdp-activate { drop | restrict } secondary-activation access-type { gprs | umts }
remove
Removes the configured value and returns the pdp-activate configuration to the default 'not configured' state.
drop
This keyword causes the GSN to ignore the Request.
restrict
This keyword instructs the SGSN to reject Secondary PDP Activation Requests.
access-type { gprs | umts }
This keyword instructs the SGSN to ignore or reject Secondary PDP Activation Requests on the basis of theUE's access network type:
gprs : from a 2G network.
umts : from a 3G network.
Usage Guidelines The SGSN administrator can use this command to configure the IMEI profile in the operator policy to eitherignore or reject Secondary PDP Activation Requests from UEs based on an IMEI range and UE access-type.
Command Line Interface Reference, Modes I - Q, StarOS Release 19 35
IMEI Profile Configuration Modepdp-activate
Restricting secondary PDP activation based on the IMEI (in the IMEI profile) takes precedence over secondaryPDP activation that might be configured in the call control profile.
Examples Enable rejection of Secondary PDP Activation Requests for 2G callers:
pdp-activate restrict secondary-activation access-type gprs
Command Line Interface Reference, Modes I - Q, StarOS Release 1936
IMEI Profile Configuration Modepdp-activate
IMEI-TAC-Group Configuration Mode Commands
The IMEI-TAC-GroupConfigurationMode provides access to the commands used to configure the IMEI-TACvalues and ranges included in the IMEI-TAC groups. These IMEI-TAC values and ranges are used as theselection criteria for operator policy selection based on IMEI-TAC. For details about this functionality, referto the Operator Policy Selection Based on IMEI-TAC chapter in theMME Administration Guide.
Command Modes Exec > Global Configuration > LTE Policy Configuration > IMEI-TAC-Group
configure > lte-policy > imei-tac-groupgroup_name
Entering the above command sequence results in the following prompt:
[local]host_name(imei-tac-group)#
The commands or keywords/variables that are available are dependent on platform type, product version,and installed license(s).
Important
end, page 38
exit, page 39
tac, page 40
tac-range, page 41
Command Line Interface Reference, Modes I - Q, StarOS Release 19 37
endExits the current configuration mode and returns to the Exec mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description end
Usage Guidelines Use this command to return to the Exec mode.
Command Line Interface Reference, Modes I - Q, StarOS Release 1938
IMEI-TAC-Group Configuration Mode Commandsend
exitExits the current mode and returns to the parent configuration mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description exit
Usage Guidelines Use this command to return to the parent configuration mode.
Command Line Interface Reference, Modes I - Q, StarOS Release 19 39
IMEI-TAC-Group Configuration Mode Commandsexit
tacConfitures individual TAC (type allocation code) values to be included in a IMEI-TAC group which will beused as criteria for operator policy selection.
Product MME
Privilege Administrator
Command Modes Exec > Global Configuration > LTE Policy Configuration > IMEI-TAC-Group
configure > lte-policy > imei-tac-groupgroup_name
Entering the above command sequence results in the following prompt:
[local]host_name(imei-tac-group)#
Syntax Description [ no ] tac tac_value [ tac_value tac_value + ]
no
Removes the identified TAC from the IMEI-TAC group configuration.
tac_value
Specifies the 8-digit number that identifies a specific "type allocation code". When entering more than oneTAC, simply use a space between each TAC. Additional TAC values can be added at any time after theIMEI-TAC group is configured.
Usage Guidelines Use this command to enter one or more individual TAC (type allocation code) values to the IMEI-TAC group.Up to 500 unique IMEI-TAC values can be included in an IMEI-TAC group.
The TAC, the first eight digits of the 15-digit IMEI or 16-digit IMEI-SV, identifies the equipment manufacturer,the wireless device type and the model number (if there is one); for example, TAC of 35201906 identifies anApple iPhone 5S.
Examples The following command adds four IMEI-TAC to an IMEI-TAC group:tac 31441551 77777777 87650506 87654321
Command Line Interface Reference, Modes I - Q, StarOS Release 1940
IMEI-TAC-Group Configuration Mode Commandstac
tac-rangeDefines a range of IMEI-TAC values to be included in a IMEI-TAC group which will be used as criteria foroperator policy selection.
Product MME
Privilege Administrator
Command Modes Exec > Global Configuration > LTE Policy Configuration > IMEI-TAC-Group
configure > lte-policy > imei-tac-groupgroup_name
Entering the above command sequence results in the following prompt:
[local]host_name(imei-tac-group)#
Syntax Description [ no ] tac-range from start_tac_value to end_tac_value
no
Removes the identified TAC range from the IMEI-TAC group configuration.
start_tac_value to end_tac_value
tac_value - Specifies the 8-digit number that identifies a specific "type allocation code". The start TAC isthe first TAC in the range. The end TAC is the last TAC in the range.
Usage Guidelines Use this command to enter up to 20 IMEI-TAC value ranges. Ranges can be overlapping.
The TAC, the first eight digits of the 15-digit IMEI or 16-digit IMEI-SV, identifies the equipment manufacturer,the wireless device type and the model number (if there is one); for example, TAC of 35201906 identifies anApple mobile phone. Defining ranges would enable carriers to select operator policies for call handling basedon multiple device types.
Examples The following command defines a TAC range to be added to the IMEI-TAC group:tac-range from 23456789 to 23456889
Command Line Interface Reference, Modes I - Q, StarOS Release 19 41
IMEI-TAC-Group Configuration Mode Commandstac-range
Command Line Interface Reference, Modes I - Q, StarOS Release 1942
IMEI-TAC-Group Configuration Mode Commandstac-range
IMS Authorization Service Configuration ModeCommands
The IMS Authorization Service Configuration Mode enables to configure IP Multimedia Subsystem (IMS)authorization services to manage policy control functions and Gx interface support.
Command Modes Exec > Global Configuration > Context Configuration > IMS Authorization Service Configuration
configure > context context_name > ims-auth-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-imsa-service)#
The commands or keywords/variables that are available are dependent on platform type, product version,and installed license(s).
Important
end, page 44
exit, page 45
p-cscf discovery, page 46
p-cscf table, page 48
policy-control, page 51
qos-update-timeout, page 52
reauth-trigger, page 53
signaling-flag, page 55
signaling-flow, page 57
traffic-policy, page 59
Command Line Interface Reference, Modes I - Q, StarOS Release 19 43
endExits the current configuration mode and returns to the Exec mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description end
Usage Guidelines Use this command to return to the Exec mode.
Command Line Interface Reference, Modes I - Q, StarOS Release 1944
IMS Authorization Service Configuration Mode Commandsend
exitExits the current mode and returns to the parent configuration mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description exit
Usage Guidelines Use this command to return to the parent configuration mode.
Command Line Interface Reference, Modes I - Q, StarOS Release 19 45
IMS Authorization Service Configuration Mode Commandsexit
p-cscf discoveryThis command defines the method of Proxy-Call Session Control Function (P-CSCF) discovery to be used.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IMS Authorization Service Configuration
configure > context context_name > ims-auth-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-imsa-service)#
Syntax Description p-cscf discovery { table { 1 | 2 } [ algorithm { ip-address-modulus | msisdn-modulus | round-robin } ] |diameter-configured }[ default | no ] p-cscf discovery
default
Sets the P-CSCF discovery to default parameter.
no
Removes/deletes configured parameters for P-CSCF discovery.
table { 1 | 2 }
Specifies that which P-CSCF table is to be used to obtain the primary and secondary P-CSCF addresses. Total2 tables can be configured for P-CSCF discovery.
algorithm { ip-address-modulus | msisdn-modulus | round-robin }
Specifies the algorithm to select the row from the P-CSCF table to be used for P-CSCF discovery.
ip-address-modulus: This algorithm divides the IP address, in binary, of the subscriber by the numberof rows in the table, and the remainder is used as an index into the specified table to select the row.
msisdn-modulus: This algorithm divides the MSISDN value, in binary without the leading "+", of thesubscriber by the number of rows in the table, and the remainder is used as an index in the specific tableto select the row.
round-robin: This algorithm rotates all rows in the active table for selection of the row in round-robinway. If no algorithm is specified this is the default behavior.
Command Line Interface Reference, Modes I - Q, StarOS Release 1946
IMS Authorization Service Configuration Mode Commandsp-cscf discovery
Default: round-robin
diameter-configured
This option enables the table number and algorithm specified by the diameter host-select table configurationin Policy Control Configuration mode.
Usage Guidelines Use this command to configure the table and row selection methods to select IP address/host address forP-CSCF discovery.
Examples The following command specifies table 1 with round-robin algorithm to select the rows with IP address forP-CSCF discovery.p-cscf discovery table 1 algorithm round-robin
Command Line Interface Reference, Modes I - Q, StarOS Release 19 47
IMS Authorization Service Configuration Mode Commandsp-cscf discovery
p-cscf tableThis command adds/appends rows with primary and/or secondary IPv4/IPv6 addresses to a P-CSCF discoverytable with precedence for P-CSCF discovery.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IMS Authorization Service Configuration
configure > context context_name > ims-auth-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-imsa-service)#
Syntax Description In releases prior to 18:
p-cscf table { 1 | 2 } row-precedence precedence_value { address ipv4_address | ipv6-address ipv6_address} [ secondary { address ipv4_address | ipv6-address ipv6_address } ] [ weight value ]no p-cscf table { 1 | 2 } row-precedence precedence_valueIn 18 and later releases:
p-cscf table { 1 | 2 } row-precedence precedence_value { ipv4-address ipv4_address [ ipv6-addressipv6_address ] | ipv6-address ipv6_address [ ipv4-address ipv4_address ] } [ secondary { ipv4-addressipv4_address [ ipv6-address ipv6_address ] | ipv6-address ipv6_address [ ipv4-address ipv4_address ] } [weight value ]no p-cscf table { 1 | 2 } row-precedence precedence_value
no
Removes/deletes configured row with precedence in specified table for P-CSCF discovery address.
{ 1 | 2 }
Specifies which P-CSCF table is to be used to add/append the primary and secondary P-CSCF addresses. Twotables can be configured for P-CSCF discovery address.
row-precedence precedence_value
This keyword adds/appends the row with the specified row-precedence to the P-CSCF address table.
In 8.1 and later releases, precedence_value must be an integer from 1 through 128, and a maximum of 128rows can be added to a table.
Command Line Interface Reference, Modes I - Q, StarOS Release 1948
IMS Authorization Service Configuration Mode Commandsp-cscf table
In release 8.0, precedence_value must be an integer from 1 through 100, and a maximum of 16 rows can beadded to a table.
secondary
Specifies the secondary IPv4/IPv6 address to be entered in P-CSCF table rows.
address ip_address
Specifies the primary and/or secondary IPv4 address for P-CSCF discovery table. This keyword, if used withsecondary keyword, specifies the secondary IPv4 address.
This keyword is available only in releases prior to 18. In 18 and later releases, this keyword is concealedand is replaced with ipv4-address to support the PDN type v4v6 request for VoLTE setup.
Important
ip_address must be entered in IPv4 dotted-decimal notation.
ipv4-address ipv4_address
Specifies the primary and/or secondary IPv4 address for P-CSCF discovery table. This keyword, if used withsecondary keyword, specifies the secondary IPv4 address.
ipv4_address must be entered in IPv4 dotted-decimal notation.
This keyword is available in 18 and later releases to support the PDN type v4v6 request for VoLTE setup.Important
In releases prior to 18, the P-CSCF configuration accepts only one primary and one secondary P-CSCF IPaddresses both IPv4 and IPv6 addresses per row in the P-CSCF address table. Two IP addresses are notsufficient enough to address the requirement with PDN type v4v6 request for VoLTE setup. Hence, in release18, the P-CSCF configuration has been enhanced to allow users to configure a maximum of two IPv4 addresses(primary/secondary) and two IPv6 addresses (primary/secondary) per P-CSCF table row.
ipv6-address ipv6_address
Specifies the primary and/or secondary IPv6 address for P-CSCF discovery table. This keyword, if used withsecondary keyword, specifies the secondary IPv6 address.
ipv6_address must be entered in IPv6 colon-separated-hexadecimal notation.
In releases prior to 18, the P-CSCF configuration accepts only one primary and one secondary P-CSCF IPaddresses both IPv4 and IPv6 addresses per row in the P-CSCF address table. Two IP addresses are notsufficient enough to address the requirement with PDN type v4v6 request for VoLTE setup. Hence, in release18, the P-CSCF configuration has been enhanced to allow users to configure a maximum of two IPv4 addresses(primary/secondary) and two IPv6 addresses (primary/secondary) per P-CSCF table row.
weight value
This keyword designates weight to a row-precedence relative to other row-precedences configured under thistable, Default value is 1. value must be an integer from 1 through 10.
Within the IMS Authorization configuration, the P-CSCF address is selected based on round robin fashion.This feature allows the customer to perform P-CSCF selection based on weight factor.
Command Line Interface Reference, Modes I - Q, StarOS Release 19 49
IMS Authorization Service Configuration Mode Commandsp-cscf table
With this CLI option, the user can configure