Command Line Interface Reference, Modes I - Q, StarOS Release 21.19First Published: 2020-04-30
Last Modified: 2020-05-11
Americas HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706USAhttp://www.cisco.comTel: 408 526-4000
800 553-NETS (6387)Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITHTHE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version ofthe UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHERWARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OFMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUTLIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERSHAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, networktopology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentionaland coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.comgo trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and anyother company. (1721R)
© 2020 Cisco Systems, Inc. All rights reserved.
www.cisco.com/go/trademarkswww.cisco.com/go/trademarks
C O N T E N T S
About this Guide xxxviiP R E F A C E
CLI Command Sections xxxvii
Conventions Used xxxviii
Supported Documents and Resources xl
Related Documentation xl
Contacting Customer Support xl
Common Commands 1C H A P T E R 1
do show 1
end 1
exit 2
IFTask Boot-Options Configuration Mode Commands 3C H A P T E R 2
priority 3
sfc 4
IGMP Profile Configuration Mode Commands 7C H A P T E R 3
default ip igmp 7
ip igmp query 8
ip igmp require router-alert 8
ip igmp robustness 9
ip igmp unsolicited-report-interval 10
ip igmp version 10
IKEv2 Security Association Configuration Mode Commands 13C H A P T E R 4
default 13
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19iii
encryption 14
group 15
hmac 16
lifetime 18
prf 18
IMEI Profile Configuration Mode 21C H A P T E R 5
associate 22
blacklist 22
description 23
direct-tunnel 24
ggsn-address 24
ignore-pdp-data-inactivity 25
pdp-activate 26
IMEI-TAC-Group Configuration Mode Commands 29C H A P T E R 6
tac 29
tac-range 30
IMS Authorization Service Configuration Mode Commands 33C H A P T E R 7
p-cscf discovery 33
p-cscf table 35
policy-control 37
qos-update-timeout 38
reauth-trigger 39
signaling-flag 41
signaling-flow 42
traffic-policy 43
IMSI Group Configuration Mode Commands 45C H A P T E R 8
imsi 45
range 46
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19iv
Contents
IMS Sh Service Configuration Mode Commands 49C H A P T E R 9
diameter 49
failure-handling 50
request 52
IPMS Client Configuration Mode Commands 55C H A P T E R 1 0
export keys 55
heartbeat 56
server 57
source 58
IPNE Endpoint Configuration Mode Commands 61C H A P T E R 1 1
bind 61
peer 62
IPNE Service Configuration Mode Commands 65C H A P T E R 1 2
ipne-endpoint 65
IPSec Transform Set Configuration Mode Commands 67C H A P T E R 1 3
encryption 67
esn 70
group 71
hmac 72
mode 73
IPSG RADIUS Snoop Configuration Mode Commands 75C H A P T E R 1 4
bind 75
connection authorization 76
profile 77
radius 78
sess-replacement 80
setup-timeout 81
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19v
Contents
IPSG RADIUS Server Configuration Mode Commands 83C H A P T E R 1 5
accounting-context 84
associate sgtp-service 84
bind 85
connection authorization 88
gtp max-contexts-per-imsi 89
gtp peer-ip-address 90
ip 91
map ue-mac-to-imei 94
overlapping-ip-address 94
plmn id 95
profile 96
radius accounting 97
radius dictionary 101
respond-to-non-existing-session 103
sess-replacement 104
setup-timeout 105
w-apn 106
IPSP Configuration Mode Commands 109C H A P T E R 1 6
dead-interval 109
reserved-free-percentage 110
IPv6 ACL Configuration Mode Commands 113C H A P T E R 1 7
deny/permit (by source IP address masking) 114
deny/permit (any) 116
deny/permit (by host IP address) 118
deny/permit (by source ICMP packets) 120
deny/permit (by IP packets) 123
deny/permit (by TCP/UDP packets) 127
readdress server 131
redirect context (by IP address masking) 134
redirect context (any) 136
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19vi
Contents
redirect context (by host IP address) 138
redirect context (by source ICMP packets) 140
redirect context (by IP packets) 143
redirect context (by TCP/UDP packets) 146
redirect css delivery-sequence 150
redirect css service (any) 151
redirect css service (by host IP address) 153
redirect css service (by ICMP packets) 154
redirect css service (by IP packets) 158
redirect css service (by source IP address masking) 161
redirect css service (by TCP/UDP packets) 163
redirect css service (for downlink, any) 167
redirect css service (for downlink, by host IP address) 169
redirect css service (for downlink, by ICMP packets) 171
redirect css service (for downlink, by IP packets) 175
redirect css service (for downlink, by source IP address masking) 178
redirect css service (for downlink, by TCP/UDP packets) 180
redirect css service (for uplink, any) 184
redirect css service (for uplink, by host IP address) 186
redirect css service (for uplink, by ICMP packets) 188
redirect css service (for uplink, by IP packets) 192
redirect css service (for uplink, by source IP address masking) 195
redirect css service (for uplink, by TCP/UDP packets) 196
redirect nexthop (by IP address masking) 200
redirect nexthop (any) 203
redirect nexthop (by host IP address) 205
redirect nexthop (by source ICMP packets) 207
redirect nexthop (by IP packets) 210
redirect nexthop (by TCP/UDP packets) 213
IPv6 to IPv4 Tunnel Interface Configuration Mode Commands 219C H A P T E R 1 8
destination address 219
mode 220
source 221
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19vii
Contents
tos 222
ttl 223
IP VRF Context Configuration Mode Commands 225C H A P T E R 1 9
associate l2-mapping-table 225
description 226
ip aggregate-address 227
ip guarantee 228
ip maximum-routes 229
mpls map-dscp-to-exp 230
mpls map-exp-to-dscp 231
ISAKMP Configuration Mode Commands 233C H A P T E R 2 0
authentication 233
encryption 234
group 235
hash 236
lifetime 237
IuPS Service Configuration Mode Commands 239C H A P T E R 2 1
access-protocol 240
associate 241
blacklist-timeout-gtpu-bind-addresses 242
empty-cr 242
force-authenticate consecutive-security-failure 243
gtpu 245
inter-rnc-procedures 246
iu-hold-connection 247
iu-recovery 248
iu-release-complete-timeout 249
loss-of-radio-coverage ranap-cause 250
mbms 251
network-sharing cs-ps-coordination 251
network-sharing failure-code 252
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19viii
Contents
network-sharing non-shared 254
network-sharing stop-redirect-reject-cause 254
plmn 255
rab-assignment-response-timeout 257
radio-network-controller 258
rai-skip-validation 259
relocation-alloc-timeout 259
relocation-complete-timeout 260
reset 261
rnc 262
security-mode-complete-timeout 263
service-request-follow-on 264
srns-context-response-timeout 265
tigoc-timeout 265
tintc-timeout 266
LAC Service Configuration Mode Commands 269C H A P T E R 2 2
allow 270
bind 271
data sequence-number 272
default 273
hide-attributes 275
keepalive-interval 276
load-balancing 277
local-receive-window 278
max-retransmission 278
max-session-per-tunnel 279
max-tunnel-challenge-length 280
max-tunnels 281
peer-lns 281
proxy-lcp-authentication 283
retransmission-timeout-first 284
retransmission-timeout-max 285
single-port-mode 285
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19ix
Contents
snoop framed-ip-address 286
trap 287
tunnel selection-key 288
tunnel-authentication 289
Line Configuration Mode Commands 291C H A P T E R 2 3
length 291
width 292
Link Configuration Mode Commands 295C H A P T E R 2 4
arbitration 296
mtp2-aerm-emergency-threshold 297
mtp2-aerm-normal-threshold 297
mtp2-eim-decrement 298
mtp2-eim-increment 299
mtp2-eim-threshold 299
mtp2-error-correction 300
mtp2-lssu-len 301
mtp2-max-outstand-frames 302
mtp2-suerm-threshold 303
mtp3-discard-priority 303
mtp3-max-slt-try 304
mtp3-msg-priority 305
mtp3-msg-size 305
mtp3-p1-qlen 306
mtp3-p2-qlen 307
mtp3-p3-qlen 308
mtp3-test-pattern 308
priority 309
signaling-link-code 310
sscf-nni-n1 310
sscop-max-cc 311
sscop-max-pd 312
sscop-max-stat 313
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19x
Contents
timeout 313
Linkset Configuration Mode Commands 319C H A P T E R 2 5
adjacent-point-code 319
link 320
self-point-code 321
LMA Service Configuration Mode Commands 323C H A P T E R 2 6
aaa accounting 324
alt-coa-allowed 324
bind address 326
heartbeat 327
heartbeat monitor-max-peers 329
mobility-option-type-value 329
refresh-advice-option 330
refresh-interval-percent 331
reg-lifetime 332
revocation 333
sequence-number-validate 334
setup-timeout 334
signalling-packets 335
simul-bindings 336
standalone 336
timestamp-option-validation 337
timestamp-replay-protection 337
LNS Service Configuration Mode Commands 339C H A P T E R 2 7
aaa accounting 340
authentication 341
avp map called-number apn 343
bind 343
data sequence-number 344
default 345
ip source-violation 347
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xi
Contents
keepalive-interval 349
local-receive-window 350
max-retransmission 351
max-session-per-tunnel 351
max-tunnel-challenge-length 352
max-tunnels 353
nai-construction domain 353
newcall 354
peer-lac 355
proxy-lcp-authentication 356
retransmission-timeout-first 357
retransmission-timeout-max 358
setup-timeout 359
single-port-mode 359
trap 360
tunnel-authentication 361
tunnel-switching 361
Local Policy Actiondef Configuration Mode Commands 363C H A P T E R 2 8
action 363
Local Policy Eventbase Configuration Mode Commands 367C H A P T E R 2 9
rule 367
Local Policy Ruledef Configuration Mode Commands 371C H A P T E R 3 0
condition 371
Local Policy Service Configuration Mode Commands 377C H A P T E R 3 1
actiondef 377
eventbase 379
ruledef 380
suppress-cra 381
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xii
Contents
Location Service Configuration Mode Commands 383C H A P T E R 3 2
associate 383
destination-host 385
pla 386
slr 386
timeout 387
Logical eNode Configuration Mode Commands 389C H A P T E R 3 3
associate mme-pool 390
associate tai-list-db 390
bind s1-mme 391
s1-mme ip qos-dscp 392
s1-mme sctp port 394
Loopback Interface Configuration Mode Commands 395C H A P T E R 3 4
crypto-map 395
description 396
ip address 397
ip ranged-address 398
ip vrf 399
ipv6 address 400
ipv6 ospf 401
LTE Custom TAI List Configuration Mode Commands 403C H A P T E R 3 5
tai 403
LTE Emergency Profile Configuration Mode Commands 407C H A P T E R 3 6
ambr 407
apn 408
associate 409
lcs-qos 410
local-emergency-num 411
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xiii
Contents
local-emergency-num-ie 412
pgw fqdn 413
pgw ip-address 414
qos 415
ue-validation-level 416
LTE Forbidden Location Area Configuration Mode Commands 419C H A P T E R 3 7
lac 419
LTE Forbidden Tracking Area Configuration Mode Commands 421C H A P T E R 3 8
tac 421
LTE Foreign PLMN GUTI Management Database Configuration Mode Commands 423C H A P T E R 3 9
plmn 423
LTE HeNBGW MME Pool Configuration Mode Commands 427C H A P T E R 4 0
mme 427
LTE Handover Restriction List Configuration Mode Commands 429C H A P T E R 4 1
forbidden 429
LTE MME HeNB-GW Management Database Configuration Mode Commands 433C H A P T E R 4 2
henbgw-global-enbid 433
LTE Network Global MME ID Management Database Configuration Mode Commands 435C H A P T E R 4 3
plmn 435
LTE Paging Map Configuration Mode Commands 437C H A P T E R 4 4
precedence 437
LTE Paging Profile Configuration Mode Commands 441C H A P T E R 4 5
critical 441
paging-stage 442
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xiv
Contents
LTE Peer Map Configuration Mode Commands 445C H A P T E R 4 6
precedence 445
LTE Policy Configuration Mode Commands 449C H A P T E R 4 7
cause-code-group 451
congestion-action-profile 452
enb-group 453
foreign-plmn-guti-mgmt-db 454
henbgw mme-pool 455
henbgw overload-control 456
henbgw qci-dscp-mapping-table 457
henbgw s1-reset 458
henbgw session-recovery idle-timeout 458
ho-restrict-list 459
imei-tac-group 460
imsi-group 461
lte-emergency-profile 462
mec-tai-grp 463
mme henbgw mgmt-db 464
mme paging cache 465
network-global-mme-id-mgmt-db 466
paging-map 467
paging-profile 468
peer-map 469
sgsn-mme 470
subscriber-map 471
tai-list-db 472
tai-mgmt-db 473
LTE Subscriber Map Configuration Mode Commands 475C H A P T E R 4 8
precedence 475
LTE TAI Management Database Configuration Mode Commands 479C H A P T E R 4 9
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xv
Contents
access-type 479
network-name 480
tai-custom-list 481
tai-mgmt-obj 482
timezone 483
LTE TAI Management Object Configuration Mode Commands 485C H A P T E R 5 0
access-type 486
emergency-services-not-supported 486
ims-voice-over-ps 487
lai 488
network-name 489
rai 489
sgw-address 490
sgw-address-resolution-mode 492
tai 493
timezone 494
up-address 495
zone-code 496
MAG Service Configuration Mode Commands 499C H A P T E R 5 1
bind 500
encapsulation 501
heartbeat 502
information-element-set 504
max-retransmissions 505
mobility-header-checksum 506
mobility-option-type-value 507
policy 507
reg-lifetime 508
renew-percent-time 509
retransmission-policy 510
retransmission-timeout 511
signalling-packets 512
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xvi
Contents
MEC TAI Group Configuration Mode Commands 515C H A P T E R 5 2
tai 515
up-address 516
MAP Service Configuration Mode Commands 519C H A P T E R 5 3
access-protocol 520
application-context-name 520
auth-vectors 522
equipment-identity-register 523
gmlc 524
hlr 526
policy 526
short-message-service 527
timeout 528
MIP HA Assignment Table Configuration Mode Commands 529C H A P T E R 5 4
hoa-range 529
MPLS-LDP Configuration Mode Commands 531C H A P T E R 5 5
advertise-labels 531
discovery 532
enable 534
router-id 534
session 535
MIPv6 HA Service Configuration Mode Commands 537C H A P T E R 5 6
aaa accounting 537
bind 538
default 540
refresh-advice-option 541
refresh-interval-percent 541
reg-lifetime 542
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xvii
Contents
sequence-number-validate 543
setup-timeout 543
simul-bindings 544
timestamp-replay-protection tolerance 545
MME-eMBMS Service Configuration Mode Commands 547C H A P T E R 5 7
associate 547
bind 549
mmemgr-recovery 549
plmn-id 550
sctp port 551
setup-timeout 552
MME LAC Pool Area Configuration Mode Commands 553C H A P T E R 5 8
hash-value 553
lac 555
plmnid 555
MME Manager Configuration Mode Commands 557C H A P T E R 5 9
congestion-control 557
MME MSC Pool Area Configuration Mode 559C H A P T E R 6 0
hash-value 559
plmn-id 560
use-msc 562
MME Service Configuration Mode Commands 563C H A P T E R 6 1
associate 566
bind s1-mme 571
cp-data-max-retransmissions 573
csg-change-notification 573
dcnr 574
ddn-delay 574
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xviii
Contents
decor 575
dns 576
edrx hsfn-reference 578
edrx hsfn-start 579
emm 580
enb-cache-timeout 593
encryption-algorithm-lte 594
esm 596
gtpv2 599
henbgw henb-type 600
henbgw selection 601
heuristic-paging 602
ho-resource-release-timeout 603
integrity-algorithm-lte 604
inter-rat-nnsf 606
isda 608
isda-guard-timeout 608
isr-capability 609
legacy-tai-list-encoding 610
local-cause-code-mapping apn-mismatch 611
local-cause-code-mapping apn-not-subscribed 612
local-cause-code-mapping apn-not-supported-in-plmn-rat 613
local-cause-code-mapping auth-failure 614
local-cause-code-mapping congestion 616
local-cause-code-mapping ctxt-xfer-fail-mme 617
local-cause-code-mapping ctxt-xfer-fail-sgsn 618
local-cause-code-mapping gw-unreachable 619
local-cause-code-mapping hss-unavailable 621
local-cause-code-mapping newcall-policy-restrict 622
local-cause-code-mapping no-active-bearers 623
local-cause-code-mapping odb packet-services 624
local-cause-code-mapping odb roamer-to-vplmn 625
local-cause-code-mapping peer-node-unknown 626
local-cause-code-mapping pgw-selection-failure 627
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xix
Contents
local-cause-code-mapping restricted-zone-code 628
local-cause-code-mapping sgw-selection-failure 629
local-cause-code-mapping vlr-down 630
local-cause-code-mapping vlr-unreachable 631
location-reporting 632
mapping 633
max-bearers per-subscriber 634
max-paging-attempts 635
max-pdns per-subscriber 636
minimization-drive-test 637
mme-id 637
mmemgr-recovery 638
monitoring-events 639
msc 640
msc-mapping 641
nas gmm-qos-ie-mapping 642
nas-max-retransmission 643
network-sharing 644
nri 645
NR UE Capability IE 646
peer-mme 647
peer-sgsn rai 649
peer-sgsn-echo-params 651
peer-sgsn rnc-id 652
pgw-address 653
plmn-id 655
policy attach 656
policy erab-setup-rsp-fail 658
policy idle-mode 659
policy inter-rat 660
policy network 661
policy overcharge-protection 662
policy overload 663
policy pdn-connect 664
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xx
Contents
policy pdn-deactivate 664
policy pdn-modify 666
policy pdn-reconnection 667
policy s1-reset 668
policy sctp-down 669
policy service-request 670
policy srvcc 671
policy tau 672
pool-area 674
ps-lte 675
relative-capacity 676
s13 677
s1-mme ip 678
s1-mme sctp port 679
s1-ue-context-release 680
s1-ue-retention 683
secondary-rat 684
setup-timeout 685
sgw-blacklist 685
sgw-restoration 686
sgw-retry-max 687
snmp trap 689
statistics 689
tai 690
trace cell-traffic 691
ue-db 692
MME SGs Service Configuration Mode Commands 695C H A P T E R 6 2
associate 696
bind 697
ip 698
non-pool-area 698
pool-area 700
sctp 701
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxi
Contents
tac-to-lac-mapping 701
timer 702
vlr 704
vlr-failure 705
MME SMSC Service Configuration Mode Commands 709C H A P T E R 6 3
diameter 709
mme-address 710
tmsi 711
MPLS-IP Configuration Mode Commands 713C H A P T E R 6 4
protocol ldp 713
MRME Service Configuration Mode Commands 715C H A P T E R 6 5
aaa 715
associate 716
attribute 717
bind 718
disconnect 720
dns-P-GW 721
fqdn 722
pgw-selection 723
radius 724
setup-timeout 726
MSISDN Group Configuration Mode Commands 727C H A P T E R 6 6
msisdn cc 727
range 728
NETCONF Protocol Configuration Mode Commands 731C H A P T E R 6 7
autosave-config 731
bulkstats 732
confd-user 733
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxii
Contents
kpi 734
netconf 735
rest 736
Network Service Entity- IP Local Configuration Mode Commands 741C H A P T E R 6 8
all-nsvc-failure-action 742
associate 742
bssgp-timer 743
max-ns-retransmissions 743
ns-timer 744
nsvc-failure-action 745
nsvl 746
peer-network-service-entity 747
retry-count 747
timer 747
Network Service Entity - Peer NSEI Configuration Mode Commands 749C H A P T E R 6 9
bssgp-timer 749
ns-reset-mode 749
ns-vc 751
Network Service Header - Fields Configuration Mode Commands 753C H A P T E R 7 0
tag-value 753
Network Service Header - Format Configuration Mode Commands 755C H A P T E R 7 1
decode 755
encode 756
encoding-frequency 757
Network Service Virtual Connection Configuration Mode Commands 759C H A P T E R 7 2
Network Service Virtual Link Configuration Mode Commands 761C H A P T E R 7 3
nsvl-address 761
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxiii
Contents
weight 762
NTP Configuration Mode Commands 765C H A P T E R 7 4
enable 765
server 766
NTSR Pool Configuration Mode Commands 769C H A P T E R 7 5
peer-ip-address 770
Operator Policy Configuration Mode 771C H A P T E R 7 6
apn 772
associate 773
description 774
imei 775
ORBEM Force Configuration Mode Commands 777C H A P T E R 7 7
activate client id 778
client id 778
event-notif-iiop-port 779
event-notif-service 780
event-notif-siop-port 792
iiop-port 793
iiop-transport 793
iop-address 794
max-attempt 795
session-timeout 795
siop-port 796
ssl-auth-policy 797
ssl-certificate 798
ssl-private-key 799
OSPF Configuration Mode Commands 801C H A P T E R 7 8
area authentication 802
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxiv
Contents
area default-cost 803
area nssa 804
area stub 805
area virtual-link 806
area virtual link authentication 807
area virtual-link authentication-key 808
area virtual link intervals 809
area virtual link message-digest-key 811
bfd-all-interfaces 812
capability graceful-restart 813
default-information originate 813
default-metric 814
distance 815
distribute-list 816
ip vrf 817
neighbor 818
network area 819
ospf graceful-restart 820
ospf router-id 821
passive-interface 822
redistribute 822
refresh timer 824
router-id 824
timers spf 825
OSPFv3 Configuration Mode Commands 827C H A P T E R 7 9
area 827
default-metric 829
passive-interface 830
redistribute 830
router-id 831
timers spf 832
OSPF VRF Configuration Mode Commands 835C H A P T E R 8 0
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxv
Contents
area 836
default-information originate 839
default-metric 840
distance 841
distribute-list 842
neighbor 843
network 844
ospf router-id 845
passive-interface 846
redistribute 846
refresh timer 848
router-id 848
timers spf 849
Out-Address Configuration Mode Commands 851C H A P T E R 8 1
gt-address 851
gt-format 852
ni-indicator 853
point-code 853
routing-indicator 854
ssf 855
ssn 855
P2P Advertisement Server Group Configuration Mode Commands 857C H A P T E R 8 2
ad-source 857
map-to-application 858
PCC-Action-Set Configuration Mode Commands 861C H A P T E R 8 3
af-media-type 862
associate monitoring-key 864
authorize 865
dissociate monitoring-key 866
dynamic-rule-install 867
dynamic-rule-uninstall 871
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxvi
Contents
log-event 872
notify-user 873
offline-charging-server 874
online-charging-server 875
request-usage-report monitoring-key 876
rule-activate 877
rule-deactivate 878
rulebase-activate 879
rulebase-deactivate 880
service-tag 882
terminate-session 883
usage-monitor 884
PCC-AF-Service Configuration Mode Commands 887C H A P T E R 8 4
associate pcc-service 888
diameter dictionary 889
diameter origin end-point 890
PCC-Condition-Group Configuration Mode Commands 891C H A P T E R 8 5
af-application-id 892
af-media-codec 893
af-media-type 895
af-service-urn 897
an-gw-address 898
authorized-qci 900
base-station-id 901
bearer-count 903
connectivity-access-network 904
eval-condition-group 906
event-time 907
event-trigger 908
imsi 910
msisdn 911
multi-line-or 912
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxvii
Contents
nai 913
out-of-credit rulename 914
out-of-credit rulebase-name 915
pcef-address 916
pdn-id 918
profile-attribute 919
radio-access-technology 921
sgsn-ip 922
sgsn-mcc-mnc 924
subscription-attribute 925
spr-profile-not-found 926
threshold-condition usage-monitor 927
user-access-network 929
user-equipment-info esn 931
user-equipment-info eui64 932
user-equipment-info imeisv 933
user-equipment-info mac 935
user-equipment-info meid 936
user-equipment-info modified-eui64 937
user-location-info 938
PCC-Data-Service Configuration Mode Commands 941C H A P T E R 8 6
flow direction in 942
flow direction out 943
metering-method 944
monitoring-key 945
precedence 946
qos-profile 947
rating-group 948
reporting-level 948
service-identifier 949
PCC-Event-Notification-Interface-Endpoint Configuration Mode Commands 951C H A P T E R 8 7
address 952
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxviii
Contents
peer name 952
peer select-algorithm 953
peer select-peer 954
PCC-Policy-Service Configuration Mode Commands 957C H A P T E R 8 8
associate pcc-service 958
diameter dictionary 959
diameter origin end-point 960
ehrpd-access-bcm 961
gprs-access-bcm 962
max policy-sessions 963
subscriber-binding-identifier 964
subscription-id-absence-action 965
unsolicited-provisioning 966
PCC-Service-Profile Configuration Mode Commands 969C H A P T E R 8 9
default-rulebase-name 970
eval-priority 970
service-tag 972
timeout long-duration 973
usage-monitor 975
unknown-services-treatment 976
PCC-QoS-Profile Configuration Mode Commands 979C H A P T E R 9 0
arp-priority 979
guaranteed-bitrate 981
max-bitrate 982
qci 983
PCC-Quota Service Configuration Mode Commands 985C H A P T E R 9 1
associate pcc-service 985
diameter dictionary 986
diameter origin end-point 987
max total-charging-sessions 988
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxix
Contents
PCC-Sp-Endpoint Configuration Mode Commands 991C H A P T E R 9 2
access-type 992
diameter dictionary 993
diameter origin end-point 994
diameter peer-select 995
profile-data 997
profile-update-notification 998
spr subscriber identifier 999
PCC-Service Addon Configuration Mode Commands 1001C H A P T E R 9 3
associate-addon-state 1001
description 1003
duration 1004
status active 1005
time-allowance 1006
volume-allowance 1007
PCC-TimeDef Configuration Mode Commands 1009C H A P T E R 9 4
start date 1009
start day 1011
start time 1012
time-slot 1013
PCP Configuration Mode Commands 1017C H A P T E R 9 5
policy-control 1017
server 1018
PCP Policy Control Configuration Mode Commands 1021C H A P T E R 9 6
request-opcode 1021
response-opcode 1022
PDIF Service Configuration Mode Commands 1025C H A P T E R 9 7
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxx
Contents
aaa attribute 1025
aaa authentication 1027
bind 1028
default 1029
duplicate-session-detection 1030
hss 1031
ims-sh-service 1032
ip source-violation 1033
mobile-ip 1034
setup-timeout 1035
username 1036
PDG Service Configuration Mode Commands 1037C H A P T E R 9 8
aaa attribute 1037
associate sgtp-service 1038
certificate-selection 1039
bind 1040
ip gnp-qos-dscp 1042
ip qos-dscp 1045
ip source-violation 1047
max-tunnels-per-ue 1049
plmn id 1049
setup-timeout 1050
PDSN Service Configuration Mode Commands 1053C H A P T E R 9 9
a11-signalling-packets 1055
aaa 3gpp2-service-option 1055
aaa nas-ip-address 1056
access-flow traffic-validation 1057
access-network 1058
airlink bad-sequence-number 1059
allow alt-ppp 1060
always-on-indication 1060
associate 1061
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxxi
Contents
authentication 1062
bcmcs 1064
bind 1065
data-available-indicator 1067
data-over-signaling 1067
default subscriber 1068
direct-lte-indicator 1069
dormant-transition 1070
enhanced-pcf-redirection 1070
fragment 1071
gre 1072
inter-pdsn-handoff mobility-event-indicator 1074
inter-pdsn-handover 1075
ip header-compression rohc 1076
ip local-port 1077
ip source-violation 1078
lifetime 1079
max-retransmissions 1080
mobile-ip foreign-agent context 1081
mobile-ipv6 1082
msid length 1083
nai-construction 1084
new-call conflict 1085
pcf-monitor 1085
pcf-session-id-change restart-ppp 1087
pdsn type0-tft attempt-inner-match 1088
peer-pcf 1089
pma-capability-indicator 1090
policy 1090
ppp 1093
qos-profile-id-mapping 1095
qos update 1097
radius accounting dropped-pkts 1098
registration-accept 1099
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxxii
Contents
registration-ack-deny terminate-session-on-error 1099
registration-deny 1100
registration-discard 1102
registration-update 1103
retransmission-timeout 1105
service-option 1106
setup-timeout 1107
simple-ip allow 1108
spi 1109
tft-validation wait-timeout 1111
threshold a11-ppp-send-discard 1112
threshold a11-rac-msg-discard 1113
threshold a11-rrp-failure 1114
threshold a11-rrq-msg-discard 1115
threshold init-rrq-rcvd-rate 1116
PDSN Service RoHC Configuration Mode Commands 1119C H A P T E R 1 0 0
cid-mode 1119
mrru 1120
profile 1121
Peer List Configuration Mode Commands 1123C H A P T E R 1 0 1
address 1123
Peer Profile Configuration Mode Commands 1125C H A P T E R 1 0 2
arp-mapping 1125
description 1126
gtpc 1127
lawful-intercept 1128
no-qos-negotiation 1128
upgrade-qos-supported 1129
Peer-Server Configuration Mode Commands 1131C H A P T E R 1 0 3
mode 1131
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxxiii
Contents
name 1132
psp 1133
routing-context 1134
self-point-code 1135
P-GW Service Configuration Mode Commands 1137C H A P T E R 1 0 4
associate 1138
authorize-with-hss 1140
dcnr 1141
dns-client 1142
egtp 1143
fqdn 1146
gtpc handle-collision upc nrupc 1148
gx-li 1149
map-initial-setup-auth-fail-to-gtp-cause-user-auth-fail 1149
message-timestamp-drift 1150
newcall 1151
pcscf-restoration 1152
plmn id 1154
session-delete-delay 1155
setup-timeout 1156
Policy Control Configuration Mode Commands 1159C H A P T E R 1 0 5
apn-name-to-be-included 1160
arp-priority-level 1161
associate 1162
cc-profile 1164
custom-reauth-trigger 1165
diameter 3gpp-r9-flow-direction 1167
diameter clear-session 1168
diameter dictionary 1169
diameter encode-event-avps 1171
diameter encode-supported-features 1172
diameter host-select reselect 1180
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxxiv
Contents
diameter host-select row-precedence 1181
diameter host-select table 1184
diameter host-select-template 1186
diameter map 1187
diameter origin endpoint 1189
diameter request-timeout 1189
diameter session-prioritization 1190
diameter sgsn-change-reporting 1192
diameter update-dictionary-avps 1193
endpoint-peer-select 1196
event-report-indication 1197
event-update 1198
failure-handling 1200
li-secret 1204
max-outstanding-ccr-u 1204
subscription-id service-type 1205
Plugin Configuration Mode Commands 1209C H A P T E R 1 0 6
attribute 1209
module priority 1210
PVC Configuration Mode Commands 1213C H A P T E R 1 0 7
bind 1213
encapsulation aal5 1214
shaping 1215
shutdown 1216
PVC Interface Configuration Mode Commands 1219C H A P T E R 1 0 8
description 1220
ip 1220
ip access-group 1220
ip address 1222
ip mtu 1223
ip ospf authentication-key 1223
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxxv
Contents
ip ospf authentication-type 1224
ip ospf cost 1225
ip ospf dead-interval 1226
ip ospf hello-interval 1227
ip ospf message-digest-key 1227
ip ospf network 1228
ip ospf priority 1229
ip ospf retransmit-interval 1230
ip ospf transmit-delay 1231
QCI - QoS Mapping Configuration Mode Commands 1233C H A P T E R 1 0 9
operator-defined-qci 1233
qci 1236
QCI - RAN ID Mapping Configuration Mode Commands 1245C H A P T E R 1 1 0
profile-id 1245
QoS L2 Mapping Configuration Mode Commands 1247C H A P T E R 1 1 1
internal-priority 1247
QoS Profile Configuration Mode Commands 1249C H A P T E R 1 1 2
apn-ambr 1249
associate 1251
class 1252
description 1258
epc-qos-params-in-gtpv1 1259
operator-defined-qci 1260
prefer-as-cap 1260
prefer-tc 1261
qci-when-missing-in-subscription 1262
qci-reject 1263
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxxvi
Contents
About this Guide
The ASR 5000 hardware platform has reached end of life and is not supported in this release. Any referencesto the ASR 5000 (specific or implied) or its components in this document are coincidental. Full details on theASR 5000 hardware platform end of life are available at:https://www.cisco.com/c/en/us/products/collateral/wireless/asr-5000-series/eos-eol-notice-c51-735573.html.
Note
The HA, HSGW, PDSN, and SecGW products have reached end of life and are not supported in this release.Any references to these products (specific or implied) their components or functions including CLI commandsand parameters in this document are coincidental and are not supported. Full details on the end of life for theseproducts are available at:https://www.cisco.com/c/en/us/products/collateral/wireless/asr-5000-series/eos-eol-notice-c51-740422.html.
Note
This preface describes the Command Line Interface Reference and its document conventions.
This reference describes how to use the command line interface (CLI) to interact with the products supportedby the StarOS™. The CLI commands are organized by command modes in the code and in this reference. Thecommandmodes are presented alphabetically. The description of each command states the command's function,describes its syntax, presents limitations when applicable, and offers an example of its usage.
• CLI Command Sections, on page xxxvii• Conventions Used, on page xxxviii• Supported Documents and Resources, on page xl• Contacting Customer Support, on page xl
CLI Command SectionsThe following table describes the individual sections in the command descriptions presented in this reference.
DescriptionSection
The product(s) supporting the CLI command.Product
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxxvii
https://www.cisco.com/c/en/us/products/collateral/wireless/asr-5000-series/eos-eol-notice-c51-735573.htmlhttps://www.cisco.com/c/en/us/products/collateral/wireless/asr-5000-series/eos-eol-notice-c51-740422.html
DescriptionSection
The user privilege levels having access to the CLIcommand.
For more information on user types and userprivileges, refer to the CLI Administrative Userssection in the Command Line Interface Overviewchapter.
Privilege
The command and configuration mode sequences tothe CLI configuration mode for the CLI command.
For more information on command modes, refer tothe CLI Command Modes section in the CommandLine Interface Overview chapter.
Mode
The command's syntax.
For more information on CLI command syntax, referto the CLI Command Syntax section in the CommandLine Interface Overview chapter.
Syntax
Description of the keyword(s) and variable(s) in thecommand.
Information about the command's usage includingdependencies and limitations, if any.
Usage
Example(s) of the command.Example
Conventions UsedThe following tables describe the conventions used throughout this documentation.
DescriptionNotice Type
Provides information about important features orinstructions.
Information Note
Alerts you of potential damage to a program, device,or system.
Caution
Alerts you of potential personal injury or fatality. Mayalso alert you of potential electrical hazards.
Warning
DescriptionTypeface Conventions
This typeface represents displays that appear on yourterminal screen, for example:
Login:
Text represented as a screen display
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxxviii
About this GuideConventions Used
DescriptionTypeface Conventions
This typeface represents commands that you enter,for example:
show ip access-list
This document always gives the full form of acommand in lowercase letters. Commands are notcase sensitive.
Text represented as commands
This typeface represents a variable that is part of acommand, for example:
show card slot_number
slot_number is a variable representing the desiredchassis slot number.
Text represented as a command variable
This typeface represents menus and sub-menus thatyou access within a software application, for example:
Click the File menu, then click New
Text represented as menu or sub-menu names
DescriptionCommand Syntax Conventions
Required keyword options and variables are thosecomponents that are required to be entered as part ofthe command syntax.
Required keyword options and variables aresurrounded by grouped braces { }. For example:
sctp-max-data-chunks { limit max_chunks| mtu-limit }
If a keyword or variable is not enclosed in braces orbrackets, it is mandatory. For example:
snmp trap link-status
{ keyword or variable }
Optional keywords or variables, or those that a usermay or may not choose to use, are surrounded bybrackets.
[ keyword or variable ]
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xxxix
About this GuideAbout this Guide
DescriptionCommand Syntax Conventions
Some commands support multiple options. These aredocumented within braces or brackets by separatingeach option with a vertical bar.
These options can be used in conjunction withrequired or optional keywords or variables. Forexample:
action activate-flow-detection {intitiation | termination }
or
ip address [ count number_of_packets |size number_of_bytes ]
|
Supported Documents and Resources
Related DocumentationThe most up-to-date information for this product is available in the product Release Notes provided with eachsoftware release.
The following related product documents are also available:
• AAA Interface Administration and Reference
• GTPP Interface Administration and Reference
• IPSec Reference
• Platform-specific System Administration Guides
• Product-specific Administration Guides
• Release Change Reference
• SNMP MIB Reference
• Statistics and Counters Reference
• Statistics and Counters Reference - Bulk Statistics Descriptions
• Thresholding Configuration Guide
Contacting Customer SupportUse the information in this section to contact customer support.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xl
About this GuideSupported Documents and Resources
Refer to the support area of http://www.cisco.com for up-to-date product documentation or to submit a servicerequest. A valid username and password are required to access this site. Please contact your Cisco sales orservice representative for additional information.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xli
About this GuideAbout this Guide
Command Line Interface Reference, Modes I - Q, StarOS Release 21.19xlii
About this GuideAbout this Guide
C H A P T E R 1Common Commands
This chapter describes the common commands available in each CLI configuration mode.
• do show, on page 1• end, on page 1• exit, on page 2
do showExecutes all show commands while in Configuration mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description do show
Usage Guidelines Use this command to run all Exec mode show commands while in Configuration mode. It is not necessary toexit the Config mode to run a show command.
The pipe character | is only available if the command is valid in the Exec mode.
There are some Exec mode show commands which are too resource intensive to run fromConfig mode. Theseinclude: do show support collection, do show support details, do show support record and do showsupport summary. If there is a restriction on a specific show command, the following error message isdisplayed:Failure: Cannot execute 'do show support' command from Config mode.
Caution
endExits the current configuration mode and returns to the Exec mode.
Product All
Command Line Interface Reference, Modes I - Q, StarOS Release 21.191
Privilege Security Administrator, Administrator
Syntax Description end
Usage Guidelines Use this command to return to the Exec mode.
exitExits the current mode and returns to the parent configuration mode.
Product All
Privilege Security Administrator, Administrator
Syntax Description exit
Usage Guidelines Use this command to return to the parent configuration mode.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.192
Common Commandsexit
C H A P T E R 2IFTask Boot-Options Configuration ModeCommands
The iftask boot-options Configuration Mode is used to configure startup configuration parameters on theVPC-DI.
Command Modes Exec > Global Configuration > IFTask Boot-Options Configuration
configure > iftask boot-options
Entering the above command sequence results in the following prompt:[local]host_name(config-iftask-boot-options)#
For information on common commands available in this configurationmode, refer to the Common Commands,on page 1 chapter.
Important
• priority, on page 3• sfc, on page 4
prioritySets the priority for the boot configuration parameters to take effect on the VPC-DI.
Product All
Privilege Administrator
Mode
Exec > Global Configuration > IFTask Boot-Options Configuration
configure > iftask boot-options
Entering the above command sequence results in the following prompt:[local]host_name(config-iftask-boot-options)#
Syntax Description priority { cli | cdrom }
Command Line Interface Reference, Modes I - Q, StarOS Release 21.193
cli
Sets the CLI-configured boot parameters as priority.
cdrom
Sets the CDROM configuration as priority. If the CDROM configuration is not present, then default bootparameters are applied.
Usage Guidelines Use this command to set the priority for the boot configuration parameters to take effect on the VPC-DI.
Example
The following command specifies the priority to CDROM for the VPC-DI:
priority cdrom
sfcConfigures the startup configuration parameters for the Service Function Card (SFC) on the VPC-DI.
Product All
Privilege Administrator
Mode
Exec > Global Configuration > IFTask Boot-Options Configuration
configure > iftask boot-options
Entering the above command sequence results in the following prompt:[local]host_name(config-iftask-boot-options)#
Syntax Description [ no ] sfc { cores [ crypto | mcdma ] percentage | thread-enable { control| mcdma } }
no sfc cores
Disables IFTask cores percentage. This parameter must be enabled for other configured parameters to takeeffect.
no sfc cores crypto mcdma
Disables crypto cores, percentage, and mcdma cores percentage for SF card.
no sfc thread-enable control mcdma
Disables thread-enable, control, and mcdma SF card parameters.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.194
IFTask Boot-Options Configuration Mode Commandssfc
The no keyword is not applicable to priority because it is mandatory to have a default priority set.Note
sfc cores [ crypto | mcdma ] percentage
Specifies the cores allocation for crypto or mcdma on the SF card with the percentage of the maximum numberof IFTASK cores configured with this CLI. For cores percentage, the limits are checked in iftask.py file.Therefore, any value from 1 to 100 is supported.
sfc cores percentage
Specifies the cores allocation for IFTASK in general for crypto or mcdma on the SF card with the percentageof the maximum number of IFTASK cores present in the system. For cores percentage, the limits are checkedin iftask.py file. Therefore, any value from 1 to 100 is supported.
thread-enable { control | mcdma }
Enables control thread or mcdma thread.
Usage Guidelines Use this command to configure the startup configuration parameters for the Service Function Card (SFC) onthe VPC-DI.
Example
The following command specifies the percentage of cores, crypto cores, and mcdma cores on theSFC card:
sfc cores 40 crypto 40 mcdma 40
Command Line Interface Reference, Modes I - Q, StarOS Release 21.195
IFTask Boot-Options Configuration Mode Commandssfc
Command Line Interface Reference, Modes I - Q, StarOS Release 21.196
IFTask Boot-Options Configuration Mode Commandssfc
C H A P T E R 3IGMP Profile Configuration Mode Commands
Command Modes The Internet Group Management Protocol (IGMP) Profile Configuration Mode is used to create and managethe IGMP parameters for an Ethernet interface.
Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:[context_name]host_name(config-igmp-profile-)#
Available commands or keywords/variables vary based on platform type, product version, and installedlicense(s).
Important
For information on common commands available in this configurationmode, refer to the Common Commands,on page 1 chapter.
Important
• default ip igmp, on page 7• ip igmp query, on page 8• ip igmp require router-alert, on page 8• ip igmp robustness, on page 9• ip igmp unsolicited-report-interval, on page 10• ip igmp version, on page 10
default ip igmpConfigures default IGMP parameters.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
Command Line Interface Reference, Modes I - Q, StarOS Release 21.197
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:[context_name]host_name(config-igmp-profile-)#
Syntax Description default ip igmp { query | require | robustness |unsolicited-report-interval | version }
Usage Guidelines Specify the IGMP parameters for the default profile. Refer to the remaining command description in thischapter for additional information.
Example
To apply enable echo mode on this interface, use the following command:
bfd echo
ip igmp queryConfigures the maximum response time for IGMP queries.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:[context_name]host_name(config-igmp-profile-)#
Syntax Description ip igmp query max-response-time seconds
max-response-time seconds
Specify the maximum number of seconds that the system will wait for an IGMP response as an integer from1 through 25.
Usage Guidelines Specify the maximum response time for IGMP queries.
Example
ip igmp query max-response-time 10
ip igmp require router-alertSets the router alert flag to ON in IP IGMP packets.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.198
IGMP Profile Configuration Mode Commandsip igmp query
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:[context_name]host_name(config-igmp-profile-)#
Syntax Description [ no ] ip igmp require router-alert
no
Sets the router alert flag to OFF in IP IGMP packets.
Usage Guidelines Sets the router alert flag to ON in IP IGMP packets.
Example
ip igmp require router-alert
ip igmp robustnessSets the Robustness value in IP IGMP packets. The Robustness variable allows tuning for the expected packetloss on a subnet. If a subnet is expected to be lossy, the Robustness variable may be increased. IGMP is robustto packet losses. The Robustness variable should not be set to 1 (one).
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:[context_name]host_name(config-igmp-profile-)#
Syntax Description ip igmp robustness value
value
Sets the robustness value as an integer from 1 through 10. Default: 2
Usage Guidelines Sets the robustness value in IP IGMP packets.
Example
ip igmp robustness 7
Command Line Interface Reference, Modes I - Q, StarOS Release 21.199
IGMP Profile Configuration Mode Commandsip igmp robustness
ip igmp unsolicited-report-intervalSets the Unsolicited Report Interval which is the time between repetitions of a host's initial report of membershipin a group.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:[context_name]host_name(config-igmp-profile-)#
Syntax Description ip igmp unsolicited-report-interval seconds
seconds
Specifies the number of seconds between repetitions of a host's initial report of membership in a group as aninteger from 1 through 25. Default: 10
Usage Guidelines Set the Unsolicited Report Interval which is the time between repetitions of a host's initial report of membershipin a group.
Example
ip igmp unsolicited-report-interval 15
ip igmp versionSets the IGMP version to be supported by this interface.
Product All
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration
configure > context context_name > ip igmp profile profile_name
Entering the above command sequence results in the following prompt:[context_name]host_name(config-igmp-profile-)#
Syntax Description ip igmp version { v1 | v2 | v3 }
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1910
IGMP Profile Configuration Mode Commandsip igmp unsolicited-report-interval
v1 | v2 | v3
Specifies the IGMP Version number:
• v1: Version 1, RFC 1112
• v2: Version 2, RFC 2236
• v3: Version 3, RFC 4604
Usage Guidelines Set the IGMP version to be supported by this interface.
Example
ip igmp version v2
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1911
IGMP Profile Configuration Mode Commandsip igmp version
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1912
IGMP Profile Configuration Mode Commandsip igmp version
C H A P T E R 4IKEv2 Security Association Configuration ModeCommands
The IKEv2 Security Association Configuration Mode is used to configure a Security Association (SA) at theoutset of an IPSec session. A security association is the collection of algorithms and parameters (such as keys)that is being used to encrypt and authenticate a particular flow in one direction. In normal bi-directional traffic,the flows are secured by a pair of security associations.
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
The commands or keywords/variables that are available are dependent on platform type, product version, andinstalled license(s).
Important
For information on common commands available in this configurationmode, refer to the Common Commands,on page 1 chapter.
Important
• default, on page 13• encryption, on page 14• group, on page 15• hmac, on page 16• lifetime , on page 18• prf, on page 18
defaultSets the default properties for the selected parameter.
Product ePDG
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1913
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description default { encryption | group | hmac | lifetime | prf }
Set the defaults for the following parameters:
• encryption: Default algorithm for the IKEv2 IKE SA is AES-CBC-128.• group: Default Diffie-Hellman group is Group 2.• hmac: Default IKEv2 IKE SA hashing algorithm is SHA1-96.• lifetime: Default lifetime for SAs derived from this transform-set is 86400 seconds.• prf: Default PRF for the IKEv2 IKE SA is SHA1.
Usage Guidelines Configure default parameters for the IKEv2 IKE SA transform-set.
Example
Use the following configuration to set the default encryption algorithm:
default encryption
encryptionConfigures the appropriate encryption algorithm and encryption key length for the IKEv2 IKE securityassociation. AES-CBC-128 is the default.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description encryption { 3des-cbc | aes-cbc-128 | aes-cbc-256 | des-cbc | null }default encryption
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1914
IKEv2 Security Association Configuration Mode Commandsencryption
3des-cbc
Data Encryption Standard Cipher Block Chaining encryption applied to the message three times using threedifferent cypher keys (triple DES).
aes-cbc-128
Advanced Encryption Standard Cipher Block Chaining with a key length of 128 bits.
aes-cbc-256
Advanced Encryption Standard Cipher Block Chaining with a key length of 256 bits.
des-cbc
Data Encryption Standard Cipher Block Chaining. Encryption using a 56-bit key size. Relatively insecure.
null
Configures no IKEv2 IKE Security Association Encryption Algorithm. All IKEv2 IPsec Child SecurityAssociation protected traffic will be sent in the clear.
USE OF THIS ALGORITHM FOR IKE_SA ENCRYPTION IS A VIOLATION OF RFC 4306. THISALGORITHM SHOULD ONLY BE USED FOR TESTING PURPOSES.
Note
Usage Guidelines IKEv2 requires a confidentiality algorithm to be applied in order to work.
In cipher block cryptography, the plaintext is broken into blocks usually of 64 or 128 bits in length. In cipherblock chaining (CBC) each encrypted block is chained into the next block of plaintext to be encrypted. Arandomly-generated vector is applied to the first block of plaintext in lieu of an encrypted block. CBC providesconfidentiality, but not message integrity.
Because RFC 4307 calls for interoperability between IPSec and IKEv2, the IKEv2 confidentiality algorithmsmust be the same as those configured for IPSec in order for there to be an acceptable match during the IKEmessage exchange. Because of RFC4307, in IKEv2, there is no viable NULL option, it is available for testingonly.
Example
The following command configures the encryption to be aes-cbc-128:
encryption aes-cbc-128
groupConfigures the appropriate key exchange cryptographic strength by applying a Diffie-Hellman group. Defaultis Group 2.
Product ePDG
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1915
IKEv2 Security Association Configuration Mode Commandsgroup
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description group { 1 | 2 | 5 | 14 }default group
1
Configures crypto strength at the Group 1 level. Lowest security.
2
Configures crypto strength at the Group 2 (default) level. Medium security.
This is the default setting for this command.
5
Configures crypto strength at the Group 5 level. Higher security.
14
Configures crypto strength at the Group 14 level. Highest security
Usage Guidelines Diffie-Hellman groups are used to determine the length of the base prime numbers used during the keyexchange process in IKEv2. The cryptographic strength of any key derived depends, in part, on the strengthof the Diffie-Hellman group upon which the prime numbers are based.
Group 1 provides 768 bits of keying strength, Group 2 provides 1024 bits, Group 5 provides 1536 bits andGroup 14 provides 2048 bits of encryption strength.
Configuring a DH group also enables Perfect Forward Secrecy, which is disabled by default.
Example
This command configures crypto strength at the Group 14 level. Highest security group 14:
default group
hmacConfigures the IKEv2 IKE SA integrity algorithm. Default is SHA1-96.
Product ePDG
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1916
IKEv2 Security Association Configuration Mode Commandshmac
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description hmac { aes-xcbc-96 | md5-96 | sha1-96 | sha2-256-128 | sha2-384-192 |sha2-512-256 }default hmac
aes-xcbc-96
HMAC-AES-XCBC uses a 128-bit secret key and produces a 128-bit authenticator value.
md5-96
HMAC-MD5 uses a 128-bit secret key and produces a 128-bit authenticator value.
sha1-96
HMAC-SHA-1 uses a 160-bit secret key and produces a 160-bit authenticator value. This is the default settingfor this command.
sha2-256-128
HMAC-SHA-256 uses a 256-bit secret key and produces a 128-bit authenticator value.
sha2-384-192
HMAC-SHA-384 uses a 384-bit secret key and produces a 192-bit authenticator value.
sha2-512-256
HMAC-SHA-512 uses a 512-bit secret key and produces a 256-bit authenticator value.
Usage Guidelines IKEv2 requires an integrity algorithm be configured in order to work.
A keyed-Hash Message Authentication Code, or HMAC, is a type of message authentication code (MAC)calculated using a cryptographic hash function in combination with a secret key to verify both data integrityand message authenticity. A hash takes a message of any size and transforms it into a message of a fixed size:the authenticator value. This is truncated and transmitted. The authenticator value is reconstituted by thereceiver and the first truncated bits are compared for a 100 percent match.
Example
This command configures HMAC value md5-96:
hmac md5-96
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1917
IKEv2 Security Association Configuration Mode Commandshmac
lifetimeConfigures the lifetime of a security association (SA) in seconds.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description lifetime secdefault lifetime
lifetime sec
Sets the value of the timeout parameter in seconds as an integer from 60 through 86400. Default: 86400
Usage Guidelines The secret keys that are used for various aspects of a configuration should only be used for a limited amountof time before timing out. This exposes a limited amount of data to the possibility of hacking. If the SA expires,the options are then to either close the SA and open an new one, or renew the existing SA.
Example
The following command sets the lifetime timeout to 120 seconds:
lifetime 120
prfSelects one of the HMAC integrity algorithms to act as the IKE Pseudo-Random Function. A PRF producesa string of bits that an attacker cannot distinguish from random bit string without knowledge of the secret key.The default is SHA1.
Product ePDG
PDIF
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration
configure > context context_name > ikev2-ikesa transform-set set_name
Entering the above command sequence results in the following prompt:
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1918
IKEv2 Security Association Configuration Mode Commandslifetime
[context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#
Syntax Description prf { aes-xcbc-128 | md5 | sha1 | sha2-256 | sha2-384 | sha2-512 }default prf
aes-xcbc-128
Configure IKEv2 IKE Security Association Pseudo Algorithm to be AES-XCBC-128.
md5
MD5 uses a 128-bit secret key and produces a 128-bit authenticator value.
sha1
SHA-1 uses a 160-bit secret key and produces a 160-bit authenticator value.
SHA-1 is considered cryptographically stronger than MD5, but it takes more CPU cycles to compute.
This is the default setting for this command.
sha2-256
PRF-HMAC-SHA-256 uses a 256-bit secret key.
sha2-384
PRF-HMAC-SHA-384 uses a 384-bit secret key.
sha2-512
PRF-HMAC-SHA-512 uses a 512-bit secret key.
Usage Guidelines This command generates keying material for all the cryptographic algorithms used in both the IKE_SA andthe CHILD_SAs.
Example
This configuration sets the PRF to be value sha2-256:
prf sha2-256
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1919
IKEv2 Security Association Configuration Mode Commandsprf
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1920
IKEv2 Security Association Configuration Mode Commandsprf
C H A P T E R 5IMEI Profile Configuration Mode
Essentially, an IMEI profile is a template which groups a set of device-specific commands that may beapplicable to one or more IMEIs. The same IMEI profile can be associated with multiple IMEI ranges andmultiple operator policies.
An SGSN supports a total of 1000 IMEI profile configurations.
Command Modes The IMEI profile configuration mode defines a set of parameters controlling the SGSN behavior when aRequest is received from a device in the specified IMEI (International Mobile Equipment Identity) range. AnIMEI profile is a key element in the Operator Policy feature and an IMEI profile is not used or valid unlessit is associated with an IMEI range and this association is specified in an operator policy (see the OperatorPolicy Configuration Mode Commands chapter elsewhere in the Command Line Interface Reference).
Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:[local]host_name(config-imei-profile-profile_name)#
The commands or keywords/variables that are available are dependent on platform type, product version, andinstalled license(s).
Important
For information on common commands available in this configurationmode, refer to the Common Commands,on page 1 chapter.
Important
• associate, on page 22• blacklist, on page 22• description, on page 23• direct-tunnel, on page 24• ggsn-address, on page 24• ignore-pdp-data-inactivity, on page 25• pdp-activate, on page 26
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1921
associateAssociate an APN remap table with this IMEI profile.
Note that an APN remap table can be associated with an IMEI profile before the table has actually beencreated/configured.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:[local]host_name(config-imei-profile-profile_name)#
Syntax Description associate apn-remap-table table_nameno associate apn-remap-table
no
Disables the configured remap table association.
table_name
Define the name of an APN remap table that is to be associated with this IMEI profile for call routing basedin IMEI.
Usage Guidelines Use this command to associate an APN remap table with this IMEI profile. With such an association, it ispossible to override an APN call-routing based on an IMEI.
For example, with the APN exceptions defined in an APN remap table (refer to the APN Remap TableConfiguration Mode chapter), a blank APN or an incorrect APN could be overriden. So during PDPActivationfor in incoming call, the call could be rerouted based on an IMEI in the range defined for the IMEI profile.
Example
Associate the APN remap table 'remapHO' (remaps all calls with blank APNS to the head-office) tothis IMEI profile:
associate apn-remap-table remapHO
blacklistBlacklist all mobile devices that fit the IMEI definitions associated with this IMEI profile.
Product SGSN
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1922
IMEI Profile Configuration Modeassociate
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:[local]host_name(config-imei-profile-profile_name)#
Syntax Description blacklistremove blacklist
remove
Including this keywordwith the command, removes the blacklist command from the IMEI profile configuration.
Usage Guidelines Blacklists subscribers whose devices bear IMEI that match the defined IMEI range for this profile.
Example
Use this command to black list all subscribers with IMEI that fall within the range set for this IMEIprofile:
blacklist
descriptionDefine a descriptive string relevant to the specific APN profile.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:[local]host_name(config-imei-profile-profile_name)#
Syntax Description description descriptionremove description
remove
Removes the configured description from this APN profile.
description
Enter an alphanumeric string of 1 to 100 alphanumeric characters. The string may include spaces, punctuation,and case-sensitive letters if the string is enclosed in double quotes ( " ).
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1923
IMEI Profile Configuration Modedescription
Usage Guidelines Define information that identifies this particularly APN profile.
Example
Indicate that this IMEI profile IMEIprof1 is to be used for customers in the United Kingdom andthat the profile:
description "IMEIprof1 defines routing actions based on IMEI for customers in the UK."
direct-tunnelInstruct the SGSN to enable/disable a direct tunnel between the RNC and the GGSN based on the IuPS serviceconfiguration.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:[local]host_name(config-imei-profile-profile_name)#
Syntax Description direct-tunnel check-iups-serviceno direct-tunnel
no direct-tunnel
This command instructs the SGSN to disable the direct tunnel function between the GGSN and the RNC.
Usage Guidelines Direct tunnel is enabled by default on the GGSN and often on the RNC. This leaves it to the SGSN'sconfiguration to actually enable or disable a direct tunnel.
With the SGSN, the options for configuring a direct tunnel are complex -- enable/disable on the basis of APNs,or RNCs, or GGSNs, or on the basis of the IMEI range. Refer to the SGSN Administration Guide forconfiguration details.
Example
Assuming the IuPS service configuration has enabled DT for associated RNCs, then use this commandto enable DT from the RNC to the GGSN associated with this IMEI profile:
direct tunnel check-iups-service
ggsn-addressIdentify the target GGSN for traffic being managed by this IMEI profile.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1924
IMEI Profile Configuration Modedirect-tunnel
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:[local]host_name(config-imei-profile-profile_name)#
Syntax Description ggsn-address IPv4/IPv6_address
IPv4/IPv6_address
Enter the IP address of the target GGSN. Enter the address in either standard IPv4 dotted decimal format orin standard IPv6 colon notation format.
Usage Guidelines Use this command to define the IP address of the target GGSN to be associated with this IMEI profile.
Example
The following command identifes the address of the GGSN associated with this IMEI profile as123.123.11.1
ggsn-address 123.123.11.1
ignore-pdp-data-inactivityOn executing this command the SGSN ignores PDP Data Inactivity configuration under the APN profile forone or more matching IMEIs.
Product SGSN
Privilege Security Administrator, Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:[local]host_name(config-imei-profile-profile_name)#
Syntax Description ignore-pdp-data-inactivityremove ignore-pdp-data-inactivity
remove
This command is used to disable or remove the option to ignore PDP data inactivity from the IMEI profile.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1925
IMEI Profile Configuration Modeignore-pdp-data-inactivity
Usage Guidelines The SGSN supports options to configure PDP Data Inactivity detection duration and actions to be performedon timeout under the APN-Profile. The following configurable actions are supported under APN-Profile incase of PDP Data Inactivity detection in the PDP context:
1. De-activate all PDPs of the subscriber2. De-activate all PDPs of the bundle (all linked PDPs)3. Detach the subscriber. This action is triggered when:
• Data in-activity is detected for all PDPs• Data in-activity is detected for any of the PDPs
On the Detection of the PDPData Inactivity, depending on the configuration option the SGSN either de-activatesthe PDP or detaches the subscriber.
The ignore-pdp-data-inactivity CLI is added to provide an option under the IMEI-Profile to ignore PDPData Inactivity configuration for one or more IMEIs. On configuring this CLI, the SGSN ignores the applicationof in-activity configuration (configured in the APN-Profile) for a specified set of IMEI's.
The IMEI range or set of IMEI's are mapped to specific IMEI-Profile using the CLI configuration optionunder Operator-policy.
Note
Example
Use this command to ignore PDP Data Inactivity configuration under the APN profile for one ormore matching IMEIs.
ignore-pdp-data-inactivity
pdp-activateThis command enables the operator to configure the SGSN to reject Secondary PDPActivation Requests fromthe UE based on IMEI range.
Product SGSN
Privilege Administrator
Command Modes Exec > Global Configuration > IMEI Profile Configuration
configure > imei-profile profile_name
Entering the above command sequence results in the following prompt:[local]host_name(config-imei-profile-profile_name)#
Syntax Description [ remove ] pdp-activate { drop | restrict } secondary-activationaccess-type { gprs | umts }
remove
Removes the configured value and returns the pdp-activate configuration to the default 'not configured' state.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1926
IMEI Profile Configuration Modepdp-activate
drop
This keyword causes the GSN to ignore the Request.
restrict
This keyword instructs the SGSN to reject Secondary PDP Activation Requests.
access-type { gprs | umts }
This keyword instructs the SGSN to ignore or reject Secondary PDP Activation Requests on the basis of theUE's access network type:
• gprs : from a 2G network.• umts : from a 3G network.
Usage Guidelines The SGSN administrator can use this command to configure the IMEI profile in the operator policy to eitherignore or reject Secondary PDP Activation Requests from UEs based on an IMEI range and UE access-type.
Restricting secondary PDP activation based on the IMEI (in the IMEI profile) takes precedence over secondaryPDP activation that might be configured in the call control profile.
Example
Enable rejection of Secondary PDP Activation Requests for 2G callers:
pdp-activate restrict secondary-activation access-type gprs
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1927
IMEI Profile Configuration Modepdp-activate
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1928
IMEI Profile Configuration Modepdp-activate
C H A P T E R 6IMEI-TAC-Group Configuration Mode Commands
The IMEI-TAC-Group ConfigurationMode provides access to the commands used to configure the IMEI-TACvalues and ranges included in the IMEI-TAC groups. These IMEI-TAC values and ranges are used as theselection criteria for operator policy selection based on IMEI-TAC. For details about this functionality, referto the Operator Policy Selection Based on IMEI-TAC chapter in the MME Administration Guide.
Command Modes Exec > Global Configuration > LTE Policy Configuration > IMEI-TAC-Group
configure > lte-policy > imei-tac-groupgroup_name
Entering the above command sequence results in the following prompt:[local]host_name(imei-tac-group)#
The commands or keywords/variables that are available are dependent on platform type, product version, andinstalled license(s).
Important
For information on common commands available in this configurationmode, refer to the Common Commands,on page 1 chapter.
Important
• tac, on page 29• tac-range, on page 30
tacConfitures individual TAC (type allocation code) values to be included in a IMEI-TAC group which will beused as criteria for operator policy selection.
Product MME
Privilege Administrator
Command Modes Exec > Global Configuration > LTE Policy Configuration > IMEI-TAC-Group
configure > lte-policy > imei-tac-groupgroup_name
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1929
Entering the above command sequence results in the following prompt:[local]host_name(imei-tac-group)#
Syntax Description [ no ] tac tac_value [ tac_value tac_value + ]
no
Removes the identified TAC from the IMEI-TAC group configuration.
tac_value
Specifies the 8-digit number that identifies a specific "type allocation code". When entering more than oneTAC, simply use a space between each TAC. Additional TAC values can be added at any time after theIMEI-TAC group is configured.
Usage Guidelines Use this command to enter one or more individual TAC (type allocation code) values to the IMEI-TAC group.Up to 500 unique IMEI-TAC values can be included in an IMEI-TAC group.
The TAC, the first eight digits of the 15-digit IMEI or 16-digit IMEI-SV, identifies the equipment manufacturer,the wireless device type and the model number (if there is one); for example, TAC of 35201906 identifies anApple iPhone 5S.
Example
The following command adds four IMEI-TAC to an IMEI-TAC group:
tac 31441551 77777777 87650506 87654321
tac-rangeDefines a range of IMEI-TAC values to be included in a IMEI-TAC group which will be used as criteria foroperator policy selection.
Product MME
Privilege Administrator
Command Modes Exec > Global Configuration > LTE Policy Configuration > IMEI-TAC-Group
configure > lte-policy > imei-tac-groupgroup_name
Entering the above command sequence results in the following prompt:[local]host_name(imei-tac-group)#
Syntax Description [ no ] tac-range from start_tac_value to end_tac_value
no
Removes the identified TAC range from the IMEI-TAC group configuration.
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1930
IMEI-TAC-Group Configuration Mode Commandstac-range
start_tac_value to end_tac_value
tac_value - Specifies the 8-digit number that identifies a specific "type allocation code". The start TAC isthe first TAC in the range. The end TAC is the last TAC in the range.
Usage Guidelines Use this command to enter up to 20 IMEI-TAC value ranges. Ranges can be overlapping.
The TAC, the first eight digits of the 15-digit IMEI or 16-digit IMEI-SV, identifies the equipment manufacturer,the wireless device type and the model number (if there is one); for example, TAC of 35201906 identifies anApple mobile phone. Defining ranges would enable carriers to select operator policies for call handling basedon multiple device types.
Example
The following command defines a TAC range to be added to the IMEI-TAC group:
tac-range from 23456789 to 23456889
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1931
IMEI-TAC-Group Configuration Mode Commandstac-range
Command Line Interface Reference, Modes I - Q, StarOS Release 21.1932
IMEI-TAC-Group Configuration Mode Commandstac-range
C H A P T E R 7IMS Authorization Service Configuration ModeCommands
The IMS Authorization Service Configuration Mode enables to configure IP Multimedia Subsystem (IMS)authorization services to manage policy control functions and Gx interface support.
Command Modes Exec > Global Configuration > Context Configuration > IMS Authorization Service Configuration
configure > context context_name > ims-auth-service service_name
Entering the above command sequence results in the following prompt:[context_name]host_name(config-imsa-service)#
The commands or keywords/variables that are available are dependent on platform type, product version, andinstalled license(s).
Important
For information on common commands available in this configurationmode, refer to the Common Commands,on page 1 chapter.
Important
• p-cscf discovery, on page 33• p-cscf table, on page 35• policy-control, on page