command line interface reference, commands i - q, … line interface reference, modes i - q, ......

1868
Command Line Interface Reference, Modes I - Q, StarOS Release 19 First Published: 2015-09-30 Last Modified: 2017-01-12 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

Upload: trandiep

Post on 19-May-2018

282 views

Category:

Documents


2 download

TRANSCRIPT

  • Command Line Interface Reference, Modes I - Q, StarOS Release 19First Published: 2015-09-30

    Last Modified: 2017-01-12

    Americas HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706USAhttp://www.cisco.comTel: 408 526-4000 800 553-NETS (6387)Fax: 408 527-0883

  • THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

    THE SOFTWARE LICENSE AND LIMITEDWARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITHTHE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

    The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain versionof the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.

    NOTWITHSTANDINGANYOTHERWARRANTYHEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS"WITH ALL FAULTS.CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OFMERCHANTABILITY, FITNESS FORA PARTICULAR PURPOSEANDNONINFRINGEMENTORARISING FROMACOURSEOFDEALING, USAGE, OR TRADE PRACTICE.

    IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUTLIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERSHAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

    Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, networktopology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentionaland coincidental.

    Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnershiprelationship between Cisco and any other company. (1110R)

    2017 Cisco Systems, Inc. All rights reserved.

    http://www.cisco.com/go/trademarkshttp://www.cisco.com/go/trademarks

  • C O N T E N T S

    C H A P T E R 1 IGMP Profile Configuration Mode Commands 1

    default ip igmp 2

    end 3

    exit 4

    ip igmp query 5

    ip igmp require router-alert 6

    ip igmp robustness 7

    ip igmp unsolicited-report-interval 8

    ip igmp version 9

    C H A P T E R 2 IKEv2 Security Association Configuration Mode Commands 11

    default 12

    encryption 13

    end 15

    exit 16

    group 17

    hmac 19

    lifetime 21

    prf 22

    C H A P T E R 3 IMEI Profile Configuration Mode 25

    associate 26

    blacklist 27

    description 28

    direct-tunnel 29

    end 30

    exit 31

    ggsn-address 32

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 iii

  • ignore-pdp-data-inactivity 33

    pdp-activate 35

    C H A P T E R 4 IMEI-TAC-Group Configuration Mode Commands 37

    end 38

    exit 39

    tac 40

    tac-range 41

    C H A P T E R 5 IMS Authorization Service Configuration Mode Commands 43

    end 44

    exit 45

    p-cscf discovery 46

    p-cscf table 48

    policy-control 51

    qos-update-timeout 52

    reauth-trigger 53

    signaling-flag 55

    signaling-flow 57

    traffic-policy 59

    C H A P T E R 6 IMS Sh Service Configuration Mode Commands 61

    diameter 62

    end 64

    exit 65

    failure-handling 66

    request 68

    C H A P T E R 7 IPMS Client Configuration Mode Commands 69

    end 70

    exit 71

    export keys 72

    heartbeat 73

    server 75

    source 77

    Command Line Interface Reference, Modes I - Q, StarOS Release 19iv

    Contents

  • C H A P T E R 8 IPNE Endpoint Configuration Mode Commands 79

    bind 80

    end 81

    exit 82

    peer 83

    C H A P T E R 9 IPNE Service Configuration Mode Commands 85

    end 86

    exit 87

    ipne-endpoint 88

    C H A P T E R 1 0 IPSec Transform Set Configuration Mode Commands 89

    encryption 90

    end 93

    esn 94

    exit 96

    group 97

    hmac 99

    mode 101

    C H A P T E R 1 1 IPSG RADIUS Snoop Configuration Mode Commands 103

    bind 104

    connection authorization 105

    end 107

    exit 108

    profile 109

    radius 110

    sess-replacement 113

    setup-timeout 115

    C H A P T E R 1 2 IPSG RADIUS Server Configuration Mode Commands 117

    accounting-context 119

    associate sgtp-service 120

    bind 122

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 v

    Contents

  • connection authorization 125

    end 127

    exit 128

    gtp max-contexts-per-imsi 129

    gtp peer-ip-address 131

    ip 132

    map ue-mac-to-imei 135

    overlapping-ip-address 136

    plmn id 137

    profile 139

    radius accounting 141

    radius dictionary 145

    respond-to-non-existing-session 147

    sess-replacement 148

    setup-timeout 150

    w-apn 151

    C H A P T E R 1 3 IPSP Configuration Mode Commands 153

    dead-interval 154

    end 155

    exit 156

    reserved-free-percentage 157

    C H A P T E R 1 4 IPv6 ACL Configuration Mode Commands 159

    deny/permit (by source IP address masking) 161

    deny/permit (any) 164

    deny/permit (by host IP address) 166

    deny/permit (by source ICMP packets) 168

    deny/permit (by IP packets) 172

    deny/permit (by TCP/UDP packets) 176

    end 181

    exit 182

    readdress server 183

    redirect context (by IP address masking) 187

    redirect context (any) 190

    Command Line Interface Reference, Modes I - Q, StarOS Release 19vi

    Contents

  • redirect context (by host IP address) 192

    redirect context (by source ICMP packets) 194

    redirect context (by IP packets) 198

    redirect context (by TCP/UDP packets) 202

    redirect css delivery-sequence 207

    redirect css service (any) 208

    redirect css service (by host IP address) 211

    redirect css service (by ICMP packets) 213

    redirect css service (by IP packets) 217

    redirect css service (by source IP address masking) 221

    redirect css service (by TCP/UDP packets) 224

    redirect css service (for downlink, any) 229

    redirect css service (for downlink, by host IP address) 232

    redirect css service (for downlink, by ICMP packets) 234

    redirect css service (for downlink, by IP packets) 238

    redirect css service (for downlink, by source IP address masking) 242

    redirect css service (for downlink, by TCP/UDP packets) 245

    redirect css service (for uplink, any) 250

    redirect css service (for uplink, by host IP address) 253

    redirect css service (for uplink, by ICMP packets) 255

    redirect css service (for uplink, by IP packets) 259

    redirect css service (for uplink, by source IP address masking) 262

    redirect css service (for uplink, by TCP/UDP packets) 264

    redirect nexthop (by IP address masking) 269

    redirect nexthop (any) 272

    redirect nexthop (by host IP address) 275

    redirect nexthop (by source ICMP packets) 278

    redirect nexthop (by IP packets) 282

    redirect nexthop (by TCP/UDP packets) 285

    C H A P T E R 1 5 IPv6 to IPv4 Tunnel Interface Configuration Mode Commands 291

    destination address 292

    end 293

    exit 294

    mode 295

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 vii

    Contents

  • source 296

    tos 298

    ttl 299

    C H A P T E R 1 6 IP VRF Context Configuration Mode Commands 301

    associate l2-mapping-table 302

    description 304

    end 305

    exit 306

    ip aggregate-address 307

    ip guarantee 308

    ip maximum-routes 309

    mpls map-dscp-to-exp 311

    mpls map-exp-to-dscp 313

    C H A P T E R 1 7 ISAKMP Configuration Mode Commands 315

    authentication 316

    encryption 317

    end 319

    exit 320

    group 321

    hash 323

    lifetime 324

    C H A P T E R 1 8 IuPS Service Configuration Mode Commands 325

    access-protocol 327

    associate 328

    blacklist-timeout-gtpu-bind-addresses 330

    empty-cr 331

    end 333

    exit 334

    force-authenticate consecutive-security-failure 335

    gtpu 337

    inter-rnc-procedures 339

    iu-hold-connection 340

    Command Line Interface Reference, Modes I - Q, StarOS Release 19viii

    Contents

  • iu-recovery 342

    iu-release-complete-timeout 343

    loss-of-radio-coverage ranap-cause 344

    mbms 346

    network-sharing cs-ps-coordination 347

    network-sharing failure-code 349

    network-sharing non-shared 351

    network-sharing stop-redirect-reject-cause 352

    plmn 353

    rab-assignment-response-timeout 355

    radio-network-controller 356

    rai-skip-validation 358

    relocation-alloc-timeout 359

    relocation-complete-timeout 360

    reset 361

    rnc 363

    security-mode-complete-timeout 364

    service-request-follow-on 365

    srns-context-response-timeout 366

    tigoc-timeout 367

    tintc-timeout 368

    C H A P T E R 1 9 LAC Service Configuration Mode Commands 369

    allow 371

    bind 373

    data sequence-number 375

    default 376

    end 378

    exit 379

    hide-attributes 380

    keepalive-interval 381

    load-balancing 383

    local-receive-window 385

    max-retransmission 386

    max-session-per-tunnel 387

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 ix

    Contents

  • max-tunnel-challenge-length 388

    max-tunnels 389

    peer-lns 390

    proxy-lcp-authentication 392

    retransmission-timeout-first 393

    retransmission-timeout-max 394

    single-port-mode 395

    snoop framed-ip-address 397

    trap 399

    tunnel selection-key 400

    tunnel-authentication 402

    C H A P T E R 2 0 Line Configuration Mode Commands 403

    end 404

    exit 405

    length 406

    width 407

    C H A P T E R 2 1 Link Configuration Mode Commands 409

    arbitration 411

    end 412

    exit 413

    mtp2-aerm-emergency-threshold 414

    mtp2-aerm-normal-threshold 415

    mtp2-eim-decrement 416

    mtp2-eim-increment 417

    mtp2-eim-threshold 418

    mtp2-error-correction 419

    mtp2-lssu-len 420

    mtp2-max-outstand-frames 421

    mtp2-suerm-threshold 422

    mtp3-discard-priority 423

    mtp3-max-slt-try 424

    mtp3-msg-priority 425

    mtp3-msg-size 426

    Command Line Interface Reference, Modes I - Q, StarOS Release 19x

    Contents

  • mtp3-p1-qlen 427

    mtp3-p2-qlen 428

    mtp3-p3-qlen 429

    mtp3-test-pattern 430

    priority 431

    signaling-link-code 432

    sscf-nni-n1 433

    sscop-max-cc 434

    sscop-max-pd 435

    sscop-max-stat 436

    timeout 437

    C H A P T E R 2 2 Linkset Configuration Mode Commands 443

    adjacent-point-code 444

    end 445

    exit 446

    link 447

    self-point-code 449

    C H A P T E R 2 3 LMA Service Configuration Mode Commands 451

    aaa accounting 453

    alt-coa-allowed 454

    bind address 456

    end 458

    exit 459

    heartbeat 460

    mobility-option-type-value 462

    refresh-advice-option 463

    refresh-interval-percent 464

    reg-lifetime 466

    revocation 467

    sequence-number-validate 469

    setup-timeout 470

    signalling-packets 471

    simul-bindings 472

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 xi

    Contents

  • standalone 473

    timestamp-option-validation 474

    timestamp-replay-protection 475

    C H A P T E R 2 4 LNS Service Configuration Mode Commands 477

    aaa accounting 479

    authentication 480

    avp map called-number apn 483

    bind 484

    data sequence-number 486

    default 487

    end 490

    exit 491

    ip source-violation 492

    keepalive-interval 494

    local-receive-window 496

    max-retransmission 497

    max-session-per-tunnel 498

    max-tunnel-challenge-length 499

    max-tunnels 500

    nai-construction domain 501

    newcall 502

    peer-lac 503

    proxy-lcp-authentication 505

    retransmission-timeout-first 506

    retransmission-timeout-max 507

    setup-timeout 508

    single-port-mode 509

    trap 510

    tunnel-authentication 511

    tunnel-switching 512

    C H A P T E R 2 5 Local Policy Actiondef Configuration Mode Commands 513

    action 514

    end 517

    Command Line Interface Reference, Modes I - Q, StarOS Release 19xii

    Contents

  • exit 518

    C H A P T E R 2 6 Local Policy Eventbase Configuration Mode Commands 519

    end 520

    exit 521

    rule 522

    C H A P T E R 2 7 Local Policy Ruledef Configuration Mode Commands 525

    condition 526

    end 530

    exit 531

    C H A P T E R 2 8 Local Policy Service Configuration Mode Commands 533

    actiondef 534

    end 536

    exit 537

    eventbase 538

    ruledef 540

    C H A P T E R 2 9 Location Service Configuration Mode Commands 543

    associate 544

    destination-host 546

    end 547

    exit 548

    timeout 549

    C H A P T E R 3 0 Logical eNode Configuration Mode Commands 551

    associate mme-pool 552

    associate tai-list-db 553

    bind s1-mme 554

    end 555

    exit 556

    s1-mme ip qos-dscp 557

    s1-mme sctp port 559

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 xiii

    Contents

  • C H A P T E R 3 1 Loopback Interface Configuration Mode Commands 561

    crypto-map 562

    description 563

    end 564

    exit 565

    ip address 566

    ip ranged-address 567

    ip vrf 568

    ipv6 address 569

    ipv6 ospf 570

    C H A P T E R 3 2 LTE Custom TAI List Configuration Mode Commands 573

    end 574

    exit 575

    tai 576

    C H A P T E R 3 3 LTE Emergency Profile Configuration Mode Commands 579

    ambr 580

    apn 581

    associate 583

    end 584

    exit 585

    lcs-qos 586

    local-emergency-num 588

    local-emergency-num-ie 589

    pgw 590

    qos 592

    ue-validation-level 594

    C H A P T E R 3 4 LTE Forbidden Location Area Configuration Mode Commands 597

    end 598

    exit 599

    lac 600

    Command Line Interface Reference, Modes I - Q, StarOS Release 19xiv

    Contents

  • C H A P T E R 3 5 LTE Forbidden Tracking Area Configuration Mode Commands 601

    end 602

    exit 603

    tac 604

    C H A P T E R 3 6 LTE Foreign PLMN GUTI Management Database Configuration Mode Commands 605

    end 606

    exit 607

    plmn 608

    C H A P T E R 3 7 LTE HeNBGWMME Pool Configuration Mode Commands 611

    end 612

    exit 613

    mme 614

    C H A P T E R 3 8 LTE Handover Restriction List Configuration Mode Commands 617

    end 618

    exit 619

    forbidden 620

    C H A P T E R 3 9 LTE MME HeNB-GWManagement Database Configuration Mode Commands 623

    end 624

    exit 625

    henbgw-global-enbid 626

    C H A P T E R 4 0 LTE Network Global MME ID Management Database Configuration Mode Commands 629

    end 630

    exit 631

    plmn 632

    C H A P T E R 4 1 LTE Paging Map Configuration Mode Commands 635

    end 636

    exit 637

    precedence 638

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 xv

    Contents

  • C H A P T E R 4 2 LTE Paging Profile Configuration Mode Commands 641

    end 642

    exit 643

    paging-stage 644

    C H A P T E R 4 3 LTE Peer Map Configuration Mode Commands 647

    end 648

    exit 649

    precedence 650

    C H A P T E R 4 4 LTE Policy Configuration Mode Commands 653

    cause-code-group 655

    congestion-action-profile 657

    end 659

    exit 660

    foreign-plmn-guti-mgmt-db 661

    henbgw mme-pool 663

    henbgw overload-control 665

    henbgw qci-dscp-mapping-table 666

    henbgw s1-reset 667

    henbgw session-recovery idle-timeout 668

    ho-restrict-list 669

    imei-tac-group 671

    lte-emergency-profile 673

    mme henb mgmt-db 675

    mme paging cache 677

    network-global-mme-id-mgmt-db 679

    paging-map 680

    paging-profile 682

    peer-map 684

    sgsn-mme 686

    subscriber-map 687

    tai-list-db 689

    tai-mgmt-db 691

    Command Line Interface Reference, Modes I - Q, StarOS Release 19xvi

    Contents

  • C H A P T E R 4 5 LTE Subscriber Map Configuration Mode Commands 693

    end 694

    exit 695

    precedence 696

    C H A P T E R 4 6 LTE TAI Management Database Configuration Mode Commands 699

    end 700

    exit 701

    network-name 702

    tai-custom-list 703

    tai-mgmt-obj 705

    timezone 707

    C H A P T E R 4 7 LTE TAI Management Object Configuration Mode Commands 709

    emergency-services-not-supported 710

    end 711

    exit 712

    ims-voice-over-ps 713

    lai 714

    network-name 715

    rai 716

    sgw-address 718

    sgw-address-resolution-mode 720

    tai 721

    timezone 723

    zone-code 725

    C H A P T E R 4 8 MAG Service Configuration Mode Commands 727

    bind 729

    encapsulation 731

    end 733

    exit 734

    heartbeat 735

    information-element-set 737

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 xvii

    Contents

  • max-retransmissions 739

    mobility-header-checksum 740

    mobility-option-type-value 741

    policy 742

    reg-lifetime 744

    renew-percent-time 745

    retransmission-policy 746

    retransmission-timeout 747

    signalling-packets 749

    C H A P T E R 4 9 MAP Service Configuration Mode Commands 751

    access-protocol 752

    application-context-name 753

    auth-vectors 755

    end 756

    equipment-identity-register 757

    exit 759

    gmlc 760

    hlr 762

    policy 763

    short-message-service 764

    timeout 765

    C H A P T E R 5 0 MIP HA Assignment Table Configuration Mode Commands 767

    end 768

    exit 769

    hoa-range 770

    C H A P T E R 5 1 MPLS-LDP Configuration Mode Commands 773

    advertise-labels 774

    discovery 776

    enable 778

    end 779

    exit 780

    router-id 781

    Command Line Interface Reference, Modes I - Q, StarOS Release 19xviii

    Contents

  • session 782

    C H A P T E R 5 2 MIPv6 HA Service Configuration Mode Commands 785

    aaa accounting 786

    bind 787

    default 789

    end 791

    exit 792

    refresh-advice-option 793

    refresh-interval-percent 794

    reg-lifetime 795

    sequence-number-validate 796

    setup-timeout 797

    simul-bindings 798

    timestamp-replay-protection tolerance 799

    C H A P T E R 5 3 MME-eMBMS Service Configuration Mode Commands 801

    associate 802

    bind 804

    end 805

    exit 806

    mmemgr-recovery 807

    plmn-id 808

    sctp port 809

    setup-timeout 810

    C H A P T E R 5 4 MME LAC Pool Area Configuration Mode Commands 811

    end 812

    exit 813

    hash-value 814

    lac 816

    plmnid 817

    C H A P T E R 5 5 MMEMSC Pool Area Configuration Mode 819

    end 820

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 xix

    Contents

  • exit 821

    hash-value 822

    plmn-id 824

    use-msc 826

    C H A P T E R 5 6 MME SGs Service Configuration Mode Commands 827

    associate 828

    bind 830

    end 832

    exit 833

    non-pool-area 834

    pool-area 836

    sctp 838

    tac-to-lac-mapping 839

    timer 841

    vlr 843

    vlr-failure 845

    C H A P T E R 5 7 MME Service Configuration Mode Commands 847

    associate 851

    bind s1-mme 856

    csg-change-notification 858

    dns 859

    emm 861

    enb-cache-timeout 871

    encryption-algorithm-lte 872

    end 874

    esm 875

    exit 879

    gtpv2 880

    heuristic-paging 881

    ho-resource-release-timeout 883

    integrity-algorithm-lte 884

    inter-rat-nnsf 886

    isda-guard-timeout 889

    Command Line Interface Reference, Modes I - Q, StarOS Release 19xx

    Contents

  • isr-capability 891

    legacy-tai-list-encoding 892

    local-cause-code-mapping apn-mismatch 893

    local-cause-code-mapping apn-not-subscribed 895

    local-cause-code-mapping apn-not-supported-in-plmn-rat 896

    local-cause-code-mapping auth-failure 898

    local-cause-code-mapping congestion 900

    local-cause-code-mapping ctxt-xfer-fail-mme 902

    local-cause-code-mapping ctxt-xfer-fail-sgsn 904

    local-cause-code-mapping gw-unreachable 906

    local-cause-code-mapping hss-unavailable 908

    local-cause-code-mapping newcall-policy-restrict 910

    local-cause-code-mapping no-active-bearers 912

    local-cause-code-mapping odb packet-services 914

    local-cause-code-mapping odb roamer-to-vplmn 916

    local-cause-code-mapping peer-node-unknown 918

    local-cause-code-mapping pgw-selection-failure 920

    local-cause-code-mapping restricted-zone-code 922

    local-cause-code-mapping sgw-selection-failure 924

    local-cause-code-mapping vlr-down 926

    local-cause-code-mapping vlr-unreachable 928

    location-reporting 930

    mapping 931

    max-bearers per-subscriber 933

    max-paging-attempts 934

    max-pdns per-subscriber 936

    mme-id 937

    mmemgr-recovery 939

    msc 940

    msc-mapping 942

    nas gmm-qos-ie-mapping 943

    nas-max-retransmission 944

    network-sharing 945

    nri 947

    peer-mme 949

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxi

    Contents

  • peer-sgsn rai 951

    peer-sgsn rnc-id 953

    pgw-address 955

    plmn-id 957

    policy attach 959

    policy idle-mode 961

    policy inter-rat 963

    policy network 965

    policy overcharge-protection 966

    policy overload 968

    policy pdn-connect 969

    policy pdn-deactivate 970

    policy pdn-modify 972

    policy pdn-reconnection 974

    policy s1-reset 976

    policy sctp-down 977

    policy service-request 978

    policy srvcc 980

    policy tau 982

    pool-area 985

    ps-lte 987

    relative-capacity 989

    s1-mme ip 990

    s1-mme sctp port 992

    s1-ue-context-release 993

    setup-timeout 997

    sgw-retry-max 998

    snmp trap 1000

    statistics 1001

    ue-db 1003

    C H A P T E R 5 8 MPLS-IP Configuration Mode Commands 1005

    end 1006

    exit 1007

    protocol ldp 1008

    Command Line Interface Reference, Modes I - Q, StarOS Release 19xxii

    Contents

  • C H A P T E R 5 9 MRME Service Configuration Mode Commands 1009

    aaa 1010

    associate 1011

    attribute 1012

    bind 1014

    disconnect 1017

    dns-P-GW 1019

    end 1021

    exit 1022

    fqdn 1023

    radius 1024

    setup-timeout 1026

    C H A P T E R 6 0 Network Service Entity- IP Local Configuration Mode Commands 1027

    all-nsvc-failure-action 1029

    associate 1030

    bssgp-timer 1032

    end 1033

    exit 1034

    max-ns-retransmissions 1035

    ns-timer 1036

    nsvc-failure-action 1038

    nsvl 1039

    peer-network-service-entity 1040

    retry-count 1041

    timer 1042

    C H A P T E R 6 1 Network Service Entity - Peer NSEI Configuration Mode Commands 1043

    bssgp-timer 1044

    end 1045

    exit 1046

    ns-reset-mode 1047

    ns-vc 1049

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxiii

    Contents

  • C H A P T E R 6 2 Network Service Virtual Connection Configuration Mode Commands 1051

    end 1052

    exit 1053

    C H A P T E R 6 3 Network Service Virtual Link Configuration Mode Commands 1055

    end 1056

    exit 1057

    nsvl-address 1058

    weight 1059

    C H A P T E R 6 4 NTP Configuration Mode Commands 1061

    enable 1062

    end 1064

    exit 1065

    server 1066

    C H A P T E R 6 5 NTSR Pool Configuration Mode Commands 1069

    end 1070

    exit 1071

    peer-ip-address 1072

    C H A P T E R 6 6 Operator Policy Configuration Mode 1073

    apn 1075

    associate 1077

    description 1079

    end 1080

    exit 1081

    imei 1082

    C H A P T E R 6 7 ORBEM Configuration Mode Commands 1085

    activate client id 1087

    client id 1088

    end 1090

    event-notif-iiop-port 1091

    Command Line Interface Reference, Modes I - Q, StarOS Release 19xxiv

    Contents

  • event-notif-service 1092

    event-notif-siop-port 1103

    exit 1104

    iiop-port 1105

    iiop-transport 1106

    iop-address 1107

    max-attempt 1108

    session-timeout 1109

    siop-port 1110

    ssl-auth-policy 1111

    ssl-certificate 1112

    ssl-private-key 1114

    C H A P T E R 6 8 OSPF Configuration Mode Commands 1117

    area authentication 1119

    area default-cost 1121

    area nssa 1122

    area stub 1124

    area virtual-link 1125

    area virtual link authentication 1127

    area virtual-link authentication-key 1129

    area virtual link intervals 1131

    area virtual link message-digest-key 1133

    bfd-all-interfaces 1135

    capability graceful-restart 1136

    default-information originate 1137

    default-metric 1139

    distance 1140

    distribute-list 1142

    end 1144

    exit 1145

    ip vrf 1146

    neighbor 1147

    network area 1149

    ospf graceful-restart 1151

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxv

    Contents

  • ospf router-id 1153

    passive-interface 1154

    redistribute 1155

    refresh timer 1157

    router-id 1158

    timers spf 1159

    C H A P T E R 6 9 OSPFv3 Configuration Mode Commands 1161

    area 1162

    default-metric 1164

    end 1165

    exit 1166

    passive-interface 1167

    redistribute 1168

    router-id 1170

    timers spf 1171

    C H A P T E R 7 0 OSPF VRF Configuration Mode Commands 1173

    area 1175

    default-information originate 1179

    default-metric 1181

    distance 1182

    distribute-list 1184

    end 1186

    exit 1187

    neighbor 1188

    network 1190

    ospf router-id 1192

    passive-interface 1193

    redistribute 1194

    refresh timer 1196

    router-id 1197

    timers spf 1198

    C H A P T E R 7 1 Out-Address Configuration Mode Commands 1201

    Command Line Interface Reference, Modes I - Q, StarOS Release 19xxvi

    Contents

  • end 1202

    exit 1203

    gt-address 1204

    gt-format 1205

    ni-indicator 1206

    point-code 1207

    routing-indicator 1208

    ssf 1209

    ssn 1210

    C H A P T E R 7 2 P2P Advertisement Server Group Configuration Mode Commands 1211

    ad-source 1212

    end 1214

    exit 1215

    map-to-application 1216

    C H A P T E R 7 3 PCC-Action-Set Configuration Mode Commands 1217

    af-media-type 1219

    associate monitoring-key 1222

    authorize 1224

    dissociate monitoring-key 1226

    dynamic-rule-install 1228

    dynamic-rule-uninstall 1232

    end 1234

    exit 1235

    log-event 1236

    notify-user 1237

    offline-charging-server 1239

    online-charging-server 1241

    request-usage-report monitoring-key 1243

    rule-activate 1245

    rule-deactivate 1247

    rulebase-activate 1249

    rulebase-deactivate 1251

    service-tag 1253

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxvii

    Contents

  • terminate-session 1255

    usage-monitor 1257

    C H A P T E R 7 4 PCC-AF-Service Configuration Mode Commands 1259

    associate pcc-service 1260

    diameter dictionary 1262

    diameter origin end-point 1264

    end 1266

    exit 1267

    C H A P T E R 7 5 PCC-Condition-Group Configuration Mode Commands 1269

    af-application-id 1271

    af-media-codec 1273

    af-media-type 1275

    af-service-urn 1277

    an-gw-address 1279

    authorized-qci 1281

    base-station-id 1283

    bearer-count 1285

    connectivity-access-network 1287

    end 1289

    eval-condition-group 1290

    event-time 1292

    event-trigger 1294

    exit 1296

    imsi 1297

    msisdn 1299

    multi-line-or 1301

    nai 1302

    out-of-credit rulename 1304

    out-of-credit rulebase-name 1306

    pcef-address 1308

    pdn-id 1310

    profile-attribute 1312

    radio-access-technology 1314

    Command Line Interface Reference, Modes I - Q, StarOS Release 19xxviii

    Contents

  • sgsn-ip 1316

    sgsn-mcc-mnc 1318

    subscription-attribute 1320

    spr-profile-not-found 1322

    threshold-condition usage-monitor 1323

    user-access-network 1326

    user-equipment-info esn 1328

    user-equipment-info eui64 1330

    user-equipment-info imeisv 1332

    user-equipment-info mac 1334

    user-equipment-info meid 1336

    user-equipment-info modified-eui64 1338

    user-location-info 1340

    C H A P T E R 7 6 PCC-Data-Service Configuration Mode Commands 1343

    end 1345

    exit 1346

    flow direction in 1347

    flow direction out 1349

    metering-method 1351

    monitoring-key 1353

    precedence 1354

    qos-profile 1355

    rating-group 1356

    reporting-level 1357

    service-identifier 1359

    C H A P T E R 7 7 PCC-Event-Notification-Interface-Endpoint Configuration Mode Commands 1361

    address 1362

    end 1363

    exit 1364

    peer name 1365

    peer select-algorithm 1367

    peer select-peer 1369

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxix

    Contents

  • C H A P T E R 7 8 PCC-Policy-Service Configuration Mode Commands 1371

    associate pcc-service 1373

    diameter dictionary 1374

    diameter origin end-point 1376

    ehrpd-access-bcm 1378

    end 1380

    exit 1381

    gprs-access-bcm 1382

    max policy-sessions 1384

    subscriber-binding-identifier 1385

    subscription-id-absence-action 1387

    unsolicited-provisioning 1389

    C H A P T E R 7 9 PCC-Service-Profile Configuration Mode Commands 1391

    default-rulebase-name 1393

    end 1394

    eval-priority 1395

    exit 1397

    service-tag 1398

    timeout long-duration 1400

    usage-monitor 1402

    unknown-services-treatment 1404

    C H A P T E R 8 0 PCC-QoS-Profile Configuration Mode Commands 1407

    arp-priority 1408

    end 1410

    exit 1411

    guaranteed-bitrate 1412

    max-bitrate 1414

    qci 1416

    C H A P T E R 8 1 PCC-Quota Service Configuration Mode Commands 1417

    associate pcc-service 1418

    diameter dictionary 1419

    Command Line Interface Reference, Modes I - Q, StarOS Release 19xxx

    Contents

  • diameter origin end-point 1420

    end 1422

    exit 1423

    max total-charging-sessions 1424

    C H A P T E R 8 2 PCC-Sp-Endpoint Configuration Mode Commands 1425

    access-type 1426

    diameter dictionary 1428

    diameter origin end-point 1430

    diameter peer-select 1432

    end 1435

    exit 1436

    profile-data 1437

    profile-update-notification 1439

    spr subscriber identifier 1441

    C H A P T E R 8 3 PCC-Service Addon Configuration Mode Commands 1443

    associate-addon-state 1444

    description 1446

    duration 1448

    end 1450

    exit 1451

    status active 1452

    time-allowance 1454

    volume-allowance 1456

    C H A P T E R 8 4 PCC-TimeDef Configuration Mode Commands 1459

    end 1460

    exit 1461

    start date 1462

    start day 1464

    start time 1466

    time-slot 1468

    C H A P T E R 8 5 PCP Configuration Mode Commands 1473

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxxi

    Contents

  • end 1474

    exit 1475

    policy-control 1476

    server 1477

    C H A P T E R 8 6 PCP Policy Control Configuration Mode Commands 1479

    end 1480

    exit 1481

    request-opcode 1482

    response-opcode 1484

    C H A P T E R 8 7 PDIF Service Configuration Mode Commands 1487

    aaa attribute 1488

    aaa authentication 1490

    bind 1492

    default 1494

    duplicate-session-detection 1496

    end 1498

    exit 1499

    hss 1500

    ims-sh-service 1502

    ip source-violation 1503

    mobile-ip 1505

    setup-timeout 1506

    username 1507

    C H A P T E R 8 8 PDG Service Configuration Mode Commands 1509

    aaa attribute 1510

    associate sgtp-service 1511

    certificate-selection 1513

    bind 1514

    end 1516

    exit 1517

    ip gnp-qos-dscp 1518

    ip qos-dscp 1522

    Command Line Interface Reference, Modes I - Q, StarOS Release 19xxxii

    Contents

  • ip source-violation 1525

    max-tunnels-per-ue 1527

    plmn id 1528

    setup-timeout 1529

    C H A P T E R 8 9 PDSN Service Configuration Mode Commands 1531

    a11-signalling-packets 1534

    aaa 3gpp2-service-option 1535

    aaa nas-ip-address 1536

    access-flow traffic-validation 1537

    access-network 1538

    airlink bad-sequence-number 1539

    allow alt-ppp 1541

    always-on-indication 1542

    associate 1543

    authentication 1544

    bcmcs 1547

    bind 1549

    data-available-indicator 1551

    data-over-signaling 1552

    default subscriber 1553

    direct-lte-indicator 1554

    dormant-transition 1555

    end 1556

    enhanced-pcf-redirection 1557

    exit 1558

    fragment 1559

    gre 1560

    inter-pdsn-handoff mobility-event-indicator 1563

    inter-pdsn-handover 1564

    ip header-compression rohc 1565

    ip local-port 1566

    ip source-violation 1567

    lifetime 1569

    max-retransmissions 1571

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxxiii

    Contents

  • mobile-ip foreign-agent context 1572

    mobile-ipv6 1573

    msid length 1574

    nai-construction 1575

    new-call conflict 1577

    pcf-monitor 1578

    pcf-session-id-change restart-ppp 1580

    pdsn type0-tft attempt-inner-match 1582

    peer-pcf 1583

    pma-capability-indicator 1584

    policy 1585

    ppp 1589

    qos-profile-id-mapping 1591

    qos update 1594

    registration-accept 1596

    registration-ack-deny terminate-session-on-error 1597

    registration-deny 1598

    registration-discard 1601

    registration-update 1603

    retransmission-timeout 1605

    service-option 1607

    setup-timeout 1609

    simple-ip allow 1610

    spi 1611

    tft-validation wait-timeout 1614

    threshold a11-ppp-send-discard 1615

    threshold a11-rac-msg-discard 1617

    threshold a11-rrp-failure 1619

    threshold a11-rrq-msg-discard 1621

    threshold init-rrq-rcvd-rate 1623

    C H A P T E R 9 0 PDSN Service RoHC Configuration Mode Commands 1625

    cid-mode 1626

    end 1628

    exit 1629

    Command Line Interface Reference, Modes I - Q, StarOS Release 19xxxiv

    Contents

  • mrru 1630

    profile 1631

    C H A P T E R 9 1 Peer List Configuration Mode Commands 1633

    address 1634

    end 1636

    exit 1637

    C H A P T E R 9 2 Peer Profile Configuration Mode Commands 1639

    arp-mapping 1640

    description 1641

    end 1642

    exit 1643

    gtpc 1644

    lawful-intercept 1646

    no-qos-negotiation 1647

    upgrade-qos-supported 1648

    C H A P T E R 9 3 Peer-Server Configuration Mode Commands 1649

    end 1650

    exit 1651

    mode 1652

    name 1653

    psp 1654

    routing-context 1655

    self-point-code 1656

    C H A P T E R 9 4 P-GW Service Configuration Mode Commands 1659

    associate 1661

    authorize-with-hss 1663

    dns-client 1665

    egtp 1666

    end 1669

    exit 1670

    fqdn 1671

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxxv

    Contents

  • gx-li 1673

    map-initial-setup-auth-fail-to-gtp-cause-user-auth-fail 1674

    message-timestamp-drift 1675

    newcall 1677

    pcscf-restoration 1679

    plmn id 1681

    session-delete-delay 1683

    setup-timeout 1684

    C H A P T E R 9 5 Policy Control Configuration Mode Commands 1685

    apn-name-to-be-included 1687

    arp-priority-level 1689

    associate 1690

    cc-profile 1692

    custom-reauth-trigger 1694

    diameter dictionary 1696

    diameter encode-event-avps 1699

    diameter encode-supported-features 1700

    diameter host-select reselect 1706

    diameter host-select row-precedence 1708

    diameter host-select table 1711

    diameter host-select-template 1714

    diameter map 1716

    diameter origin endpoint 1718

    diameter request-timeout 1719

    diameter sgsn-change-reporting 1721

    diameter update-dictionary-avps 1723

    end 1726

    endpoint-peer-select 1727

    event-report-indication 1729

    event-update 1731

    exit 1734

    failure-handling 1735

    li-secret 1739

    max-outstanding-ccr-u 1740

    Command Line Interface Reference, Modes I - Q, StarOS Release 19xxxvi

    Contents

  • subscription-id service-type 1742

    C H A P T E R 9 6 Plugin Configuration Mode Commands 1745

    attribute 1746

    end 1747

    exit 1748

    module priority 1749

    C H A P T E R 9 7 PVC Configuration Mode Commands 1751

    bind 1752

    encapsulation aal5 1754

    end 1755

    exit 1756

    shaping 1757

    shutdown 1759

    C H A P T E R 9 8 PVC Interface Configuration Mode Commands 1761

    description 1763

    end 1764

    exit 1765

    ip 1766

    ip access-group 1767

    ip address 1769

    ip mtu 1771

    ip ospf authentication-key 1772

    ip ospf authentication-type 1773

    ip ospf cost 1774

    ip ospf dead-interval 1775

    ip ospf hello-interval 1776

    ip ospf message-digest-key 1777

    ip ospf network 1778

    ip ospf priority 1780

    ip ospf retransmit-interval 1781

    ip ospf transmit-delay 1782

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 xxxvii

    Contents

  • C H A P T E R 9 9 QCI - QoS Mapping Configuration Mode Commands 1783

    end 1784

    exit 1785

    operator-defined-qci 1786

    qci 1789

    C H A P T E R 1 0 0 QCI - RAN ID Mapping Configuration Mode Commands 1797

    end 1798

    exit 1799

    profile-id 1800

    C H A P T E R 1 0 1 QoS L2 Mapping Configuration Mode Commands 1803

    end 1804

    exit 1805

    internal-priority 1806

    C H A P T E R 1 0 2 QoS Profile Configuration Mode Commands 1809

    apn-ambr 1810

    associate 1812

    class 1814

    description 1822

    end 1823

    epc-qos-params-in-gtpv1 1824

    exit 1825

    prefer-as-cap 1826

    prefer-tc 1827

    qci-reject 1829

    Command Line Interface Reference, Modes I - Q, StarOS Release 19xxxviii

    Contents

  • IGMP Profile Configuration Mode Commands

    The Internet GroupManagement Protocol (IGMP) Profile ConfigurationMode is used to create and managethe IGMP parameters for an Ethernet interface.

    Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration

    configure > context context_name > ip igmp profile profile_name

    Entering the above command sequence results in the following prompt:

    [context_name]host_name(config-igmp-profile-)#

    Available commands or keywords/variables vary based on platform type, product version, and installedlicense(s).

    Important

    default ip igmp, page 2

    end, page 3

    exit, page 4

    ip igmp query, page 5

    ip igmp require router-alert, page 6

    ip igmp robustness, page 7

    ip igmp unsolicited-report-interval, page 8

    ip igmp version, page 9

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 1

  • default ip igmpConfigures default IGMP parameters.

    Product All

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration

    configure > context context_name > ip igmp profile profile_name

    Entering the above command sequence results in the following prompt:

    [context_name]host_name(config-igmp-profile-)#

    Syntax Description default ip igmp { query | require | robustness | unsolicited-report-interval | version }

    Usage Guidelines Specify the IGMP parameters for the default profile. Refer to the remaining command description in thischapter for additional information.

    Examples To apply enable echo mode on this interface, use the following command:bfd echo

    Command Line Interface Reference, Modes I - Q, StarOS Release 192

    IGMP Profile Configuration Mode Commandsdefault ip igmp

  • endExits the current configuration mode and returns to the Exec mode.

    Product All

    Privilege Security Administrator, Administrator

    Syntax Description end

    Usage Guidelines Use this command to return to the Exec mode.

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 3

    IGMP Profile Configuration Mode Commandsend

  • exitExits the current mode and returns to the parent configuration mode.

    Product All

    Privilege Security Administrator, Administrator

    Syntax Description exit

    Usage Guidelines Use this command to return to the parent configuration mode.

    Command Line Interface Reference, Modes I - Q, StarOS Release 194

    IGMP Profile Configuration Mode Commandsexit

  • ip igmp queryConfigures the maximum response time for IGMP queries.

    Product All

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration

    configure > context context_name > ip igmp profile profile_name

    Entering the above command sequence results in the following prompt:

    [context_name]host_name(config-igmp-profile-)#

    Syntax Description ip igmp query max-response-time seconds

    max-response-time seconds

    Specify the maximum number of seconds that the system will wait for an IGMP response as an integer from1 through 25.

    Usage Guidelines Specify the maximum response time for IGMP queries.

    Examples ip igmp query max-response-time 10

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 5

    IGMP Profile Configuration Mode Commandsip igmp query

  • ip igmp require router-alertSets the router alert flag to ON in IP IGMP packets.

    Product All

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration

    configure > context context_name > ip igmp profile profile_name

    Entering the above command sequence results in the following prompt:

    [context_name]host_name(config-igmp-profile-)#

    Syntax Description [ no ] ip igmp require router-alert

    no

    Sets the router alert flag to OFF in IP IGMP packets.

    Usage Guidelines Sets the router alert flag to ON in IP IGMP packets.

    Examples ip igmp require router-alert

    Command Line Interface Reference, Modes I - Q, StarOS Release 196

    IGMP Profile Configuration Mode Commandsip igmp require router-alert

  • ip igmp robustnessSets the Robustness value in IP IGMP packets. The Robustness variable allows tuning for the expected packetloss on a subnet. If a subnet is expected to be lossy, the Robustness variable may be increased. IGMP is robustto packet losses. The Robustness variable should not be set to 1 (one).

    Product All

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration

    configure > context context_name > ip igmp profile profile_name

    Entering the above command sequence results in the following prompt:

    [context_name]host_name(config-igmp-profile-)#

    Syntax Description ip igmp robustness value

    value

    Sets the robustness value as an integer from 1 through 10. Default: 2

    Usage Guidelines Sets the robustness value in IP IGMP packets.

    Examples ip igmp robustness 7

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 7

    IGMP Profile Configuration Mode Commandsip igmp robustness

  • ip igmp unsolicited-report-intervalSets the Unsolicited Report Interval which is the time between repetitions of a host's initial report of membershipin a group.

    Product All

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration

    configure > context context_name > ip igmp profile profile_name

    Entering the above command sequence results in the following prompt:

    [context_name]host_name(config-igmp-profile-)#

    Syntax Description ip igmp unsolicited-report-interval seconds

    seconds

    Specifies the number of seconds between repetitions of a host's initial report of membership in a group as aninteger from 1 through 25. Default: 10

    Usage Guidelines Set the Unsolicited Report Interval which is the time between repetitions of a host's initial report of membershipin a group.

    Examples ip igmp unsolicited-report-interval 15

    Command Line Interface Reference, Modes I - Q, StarOS Release 198

    IGMP Profile Configuration Mode Commandsip igmp unsolicited-report-interval

  • ip igmp versionSets the IGMP version to be supported by this interface.

    Product All

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > Context Configuration > IGMP Profile Configuration

    configure > context context_name > ip igmp profile profile_name

    Entering the above command sequence results in the following prompt:

    [context_name]host_name(config-igmp-profile-)#

    Syntax Description ip igmp version { v1 | v2 | v3 }

    v1 | v2 | v3

    Specifies the IGMP Version number:

    v1: Version 1, RFC 1112

    v2: Version 2, RFC 2236

    v3: Version 3, RFC 4604

    Usage Guidelines Set the IGMP version to be supported by this interface.

    Examples ip igmp version v2

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 9

    IGMP Profile Configuration Mode Commandsip igmp version

  • Command Line Interface Reference, Modes I - Q, StarOS Release 1910

    IGMP Profile Configuration Mode Commandsip igmp version

  • IKEv2 Security Association Configuration ModeCommands

    The IKEv2 Security Association Configuration Mode is used to configure a Security Association (SA) atthe outset of an IPSec session. A security association is the collection of algorithms and parameters (suchas keys) that is being used to encrypt and authenticate a particular flow in one direction. In normalbi-directional traffic, the flows are secured by a pair of security associations.

    Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration

    configure > context context_name > ikev2-ikesa transform-set set_name

    Entering the above command sequence results in the following prompt:

    [context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#

    The commands or keywords/variables that are available are dependent on platform type, product version,and installed license(s).

    Important

    default, page 12

    encryption, page 13

    end, page 15

    exit, page 16

    group, page 17

    hmac, page 19

    lifetime , page 21

    prf, page 22

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 11

  • defaultSets the default properties for the selected parameter.

    Product ePDG

    PDIF

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration

    configure > context context_name > ikev2-ikesa transform-set set_name

    Entering the above command sequence results in the following prompt:

    [context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#

    Syntax Description default { encryption | group | hmac | lifetime | prf }Set the defaults for the following parameters:

    encryption: Default algorithm for the IKEv2 IKE SA is AES-CBC-128.

    group: Default Diffie-Hellman group is Group 2.

    hmac: Default IKEv2 IKE SA hashing algorithm is SHA1-96.

    lifetime: Default lifetime for SAs derived from this transform-set is 86400 seconds.

    prf: Default PRF for the IKEv2 IKE SA is SHA1.

    Usage Guidelines Configure default parameters for the IKEv2 IKE SA transform-set.

    Examples Use the following configuration to set the default encryption algorithm:default encryption

    Command Line Interface Reference, Modes I - Q, StarOS Release 1912

    IKEv2 Security Association Configuration Mode Commandsdefault

  • encryptionConfigures the appropriate encryption algorithm and encryption key length for the IKEv2 IKE securityassociation. AES-CBC-128 is the default.

    Product ePDG

    PDIF

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration

    configure > context context_name > ikev2-ikesa transform-set set_name

    Entering the above command sequence results in the following prompt:

    [context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#

    Syntax Description encryption { 3des-cbc | aes-cbc-128 | aes-cbc-256 | des-cbc | null }default encryption

    3des-cbc

    Data Encryption Standard Cipher Block Chaining encryption applied to the message three times using threedifferent cypher keys (triple DES).

    aes-cbc-128

    Advanced Encryption Standard Cipher Block Chaining with a key length of 128 bits.

    aes-cbc-256

    Advanced Encryption Standard Cipher Block Chaining with a key length of 256 bits.

    des-cbc

    Data Encryption Standard Cipher Block Chaining. Encryption using a 56-bit key size. Relatively insecure.

    null

    Configures no IKEv2 IKE Security Association Encryption Algorithm. All IKEv2 IPsec Child SecurityAssociation protected traffic will be sent in the clear.

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 13

    IKEv2 Security Association Configuration Mode Commandsencryption

  • USE OF THIS ALGORITHM FOR IKE_SA ENCRYPTION IS A VIOLATION OF RFC 4306. THISALGORITHM SHOULD ONLY BE USED FOR TESTING PURPOSES.

    Note

    Usage Guidelines IKEv2 requires a confidentiality algorithm to be applied in order to work.

    In cipher block cryptography, the plaintext is broken into blocks usually of 64 or 128 bits in length. In cipherblock chaining (CBC) each encrypted block is chained into the next block of plaintext to be encrypted. Arandomly-generated vector is applied to the first block of plaintext in lieu of an encrypted block. CBC providesconfidentiality, but not message integrity.

    Because RFC 4307 calls for interoperability between IPSec and IKEv2, the IKEv2 confidentiality algorithmsmust be the same as those configured for IPSec in order for there to be an acceptable match during the IKEmessage exchange. Because of RFC4307, in IKEv2, there is no viable NULL option, it is available for testingonly.

    Examples The following command configures the encryption to be aes-cbc-128:encryption aes-cbc-128

    Command Line Interface Reference, Modes I - Q, StarOS Release 1914

    IKEv2 Security Association Configuration Mode Commandsencryption

  • endExits the current configuration mode and returns to the Exec mode.

    Product All

    Privilege Security Administrator, Administrator

    Syntax Description end

    Usage Guidelines Use this command to return to the Exec mode.

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 15

    IKEv2 Security Association Configuration Mode Commandsend

  • exitExits the current mode and returns to the parent configuration mode.

    Product All

    Privilege Security Administrator, Administrator

    Syntax Description exit

    Usage Guidelines Use this command to return to the parent configuration mode.

    Command Line Interface Reference, Modes I - Q, StarOS Release 1916

    IKEv2 Security Association Configuration Mode Commandsexit

  • groupConfigures the appropriate key exchange cryptographic strength by applying a Diffie-Hellman group. Defaultis Group 2.

    Product ePDG

    PDIF

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration

    configure > context context_name > ikev2-ikesa transform-set set_name

    Entering the above command sequence results in the following prompt:

    [context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#

    Syntax Description group { 1 | 2 | 5 | 14 }default group

    1

    Configures crypto strength at the Group 1 level. Lowest security.

    2

    Configures crypto strength at the Group 2 (default) level. Medium security.

    This is the default setting for this command.

    5

    Configures crypto strength at the Group 5 level. Higher security.

    14

    Configures crypto strength at the Group 14 level. Highest security

    Usage Guidelines Diffie-Hellman groups are used to determine the length of the base prime numbers used during the keyexchange process in IKEv2. The cryptographic strength of any key derived depends, in part, on the strengthof the Diffie-Hellman group upon which the prime numbers are based.

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 17

    IKEv2 Security Association Configuration Mode Commandsgroup

  • Group 1 provides 768 bits of keying strength, Group 2 provides 1024 bits, Group 5 provides 1536 bits andGroup 14 provides 2048 bits of encryption strength.

    Configuring a DH group also enables Perfect Forward Secrecy, which is disabled by default.

    Examples This command configures crypto strength at the Group 14 level. Highest security group 14:default group

    Command Line Interface Reference, Modes I - Q, StarOS Release 1918

    IKEv2 Security Association Configuration Mode Commandsgroup

  • hmacConfigures the IKEv2 IKE SA integrity algorithm. Default is SHA1-96.

    Product ePDG

    PDIF

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration

    configure > context context_name > ikev2-ikesa transform-set set_name

    Entering the above command sequence results in the following prompt:

    [context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#

    Syntax Description hmac { aes-xcbc-96 | md5-96 | sha1-96 | sha2-256-128 | sha2-384-192 | sha2-512-256 }default hmac

    aes-xcbc-96

    HMAC-AES-XCBC uses a 128-bit secret key and produces a 128-bit authenticator value.

    md5-96

    HMAC-MD5 uses a 128-bit secret key and produces a 128-bit authenticator value.

    sha1-96

    HMAC-SHA-1 uses a 160-bit secret key and produces a 160-bit authenticator value. This is the default settingfor this command.

    sha2-256-128

    HMAC-SHA-256 uses a 256-bit secret key and produces a 128-bit authenticator value.

    sha2-384-192

    HMAC-SHA-384 uses a 384-bit secret key and produces a 192-bit authenticator value.

    sha2-512-256

    HMAC-SHA-512 uses a 512-bit secret key and produces a 256-bit authenticator value.

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 19

    IKEv2 Security Association Configuration Mode Commandshmac

  • Usage Guidelines IKEv2 requires an integrity algorithm be configured in order to work.

    A keyed-Hash Message Authentication Code, or HMAC, is a type of message authentication code (MAC)calculated using a cryptographic hash function in combination with a secret key to verify both data integrityand message authenticity. A hash takes a message of any size and transforms it into a message of a fixed size:the authenticator value. This is truncated and transmitted. The authenticator value is reconstituted by thereceiver and the first truncated bits are compared for a 100 percent match.

    Examples This command configures HMAC value md5-96:hmac md5-96

    Command Line Interface Reference, Modes I - Q, StarOS Release 1920

    IKEv2 Security Association Configuration Mode Commandshmac

  • lifetimeConfigures the lifetime of a security association (SA) in seconds.

    Product ePDG

    PDIF

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration

    configure > context context_name > ikev2-ikesa transform-set set_name

    Entering the above command sequence results in the following prompt:

    [context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#

    Syntax Description lifetime secdefault lifetime

    lifetime sec

    Sets the value of the timeout parameter in seconds as an integer from 60 through 86400. Default: 86400

    Usage Guidelines The secret keys that are used for various aspects of a configuration should only be used for a limited amountof time before timing out. This exposes a limited amount of data to the possibility of hacking. If the SA expires,the options are then to either close the SA and open an new one, or renew the existing SA.

    Examples The following command sets the lifetime timeout to 120 seconds:lifetime 120

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 21

    IKEv2 Security Association Configuration Mode Commandslifetime

  • prfSelects one of the HMAC integrity algorithms to act as the IKE Pseudo-Random Function. A PRF producesa string of bits that an attacker cannot distinguish from random bit string without knowledge of the secret key.The default is SHA1.

    Product ePDG

    PDIF

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > Context Configuration > IKEv2 Security Association Configuration

    configure > context context_name > ikev2-ikesa transform-set set_name

    Entering the above command sequence results in the following prompt:

    [context_name]host_name(cfg-ctx-ikev2ikesa-tran-set)#

    Syntax Description prf { aes-xcbc-128 | md5 | sha1 | sha2-256 | sha2-384 | sha2-512 }default prf

    aes-xcbc-128

    Configure IKEv2 IKE Security Association Pseudo Algorithm to be AES-XCBC-128.

    md5

    MD5 uses a 128-bit secret key and produces a 128-bit authenticator value.

    sha1

    SHA-1 uses a 160-bit secret key and produces a 160-bit authenticator value.

    SHA-1 is considered cryptographically stronger than MD5, but it takes more CPU cycles to compute.

    This is the default setting for this command.

    sha2-256

    PRF-HMAC-SHA-256 uses a 256-bit secret key.

    sha2-384

    PRF-HMAC-SHA-384 uses a 384-bit secret key.

    Command Line Interface Reference, Modes I - Q, StarOS Release 1922

    IKEv2 Security Association Configuration Mode Commandsprf

  • sha2-512

    PRF-HMAC-SHA-512 uses a 512-bit secret key.

    Usage Guidelines This command generates keying material for all the cryptographic algorithms used in both the IKE_SA andthe CHILD_SAs.

    Examples This configuration sets the PRF to be value sha2-256:prf sha2-256

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 23

    IKEv2 Security Association Configuration Mode Commandsprf

  • Command Line Interface Reference, Modes I - Q, StarOS Release 1924

    IKEv2 Security Association Configuration Mode Commandsprf

  • IMEI Profile Configuration Mode

    Essentially, an IMEI profile is a template which groups a set of device-specific commands that may beapplicable to one or more IMEIs. The same IMEI profile can be associated with multiple IMEI ranges andmultiple operator policies.

    An SGSN supports a total of 1000 IMEI profile configurations.

    The IMEI profile configuration mode defines a set of parameters controlling the SGSN behavior when aRequest is received from a device in the specified IMEI (International Mobile Equipment Identity) range.An IMEI profile is a key element in the Operator Policy feature and an IMEI profile is not used or validunless it is associated with an IMEI range and this association is specified in an operator policy (see theOperator Policy ConfigurationModeCommands chapter elsewhere in theCommand Line Interface Reference).

    Command Modes Exec > Global Configuration > IMEI Profile Configuration

    configure > imei-profile profile_name

    Entering the above command sequence results in the following prompt:

    [local]host_name(config-imei-profile-profile_name)#

    The commands or keywords/variables that are available are dependent on platform type, product version,and installed license(s).

    Important

    associate, page 26

    blacklist, page 27

    description, page 28

    direct-tunnel, page 29

    end, page 30

    exit, page 31

    ggsn-address, page 32

    ignore-pdp-data-inactivity, page 33

    pdp-activate, page 35

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 25

  • associateAssociate an APN remap table with this IMEI profile.

    Note that an APN remap table can be associated with an IMEI profile before the table has actually beencreated/configured.

    Product SGSN

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > IMEI Profile Configuration

    configure > imei-profile profile_name

    Entering the above command sequence results in the following prompt:

    [local]host_name(config-imei-profile-profile_name)#

    Syntax Description associate apn-remap-table table_nameno associate apn-remap-table

    no

    Disables the configured remap table association.

    table_name

    Define the name of an APN remap table that is to be associated with this IMEI profile for call routing basedin IMEI.

    Usage Guidelines Use this command to associate an APN remap table with this IMEI profile. With such an association, it ispossible to override an APN call-routing based on an IMEI.

    For example, with the APN exceptions defined in an APN remap table (refer to the APN Remap TableConfigurationMode chapter), a blank APN or an incorrect APN could be overriden. So during PDPActivationfor in incoming call, the call could be rerouted based on an IMEI in the range defined for the IMEI profile.

    Examples Associate the APN remap table 'remapHO' (remaps all calls with blank APNS to the head-office) to this IMEIprofile:associate apn-remap-table remapHO

    Command Line Interface Reference, Modes I - Q, StarOS Release 1926

    IMEI Profile Configuration Modeassociate

  • blacklistBlacklist all mobile devices that fit the IMEI definitions associated with this IMEI profile.

    Product SGSN

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > IMEI Profile Configuration

    configure > imei-profile profile_name

    Entering the above command sequence results in the following prompt:

    [local]host_name(config-imei-profile-profile_name)#

    Syntax Description blacklistremove blacklist

    remove

    Including this keywordwith the command, removes the blacklist command from the IMEI profile configuration.

    Usage Guidelines Blacklists subscribers whose devices bear IMEI that match the defined IMEI range for this profile.

    Examples Use this command to black list all subscribers with IMEI that fall within the range set for this IMEI profile:blacklist

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 27

    IMEI Profile Configuration Modeblacklist

  • descriptionDefine a descriptive string relevant to the specific APN profile.

    Product SGSN

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > IMEI Profile Configuration

    configure > imei-profile profile_name

    Entering the above command sequence results in the following prompt:

    [local]host_name(config-imei-profile-profile_name)#

    Syntax Description description descriptionremove description

    remove

    Removes the configured description from this APN profile.

    description

    Enter an alphanumeric string of 1 to 100 alphanumeric characters. The string may include spaces, punctuation,and case-sensitive letters if the string is enclosed in double quotes ( " ).

    Usage Guidelines Define information that identifies this particularly APN profile.

    Examples Indicate that this IMEI profile IMEIprof1 is to be used for customers in the United Kingdom and that theprofile:description "IMEIprof1 defines routing actions based on IMEI for customers in the UK."

    Command Line Interface Reference, Modes I - Q, StarOS Release 1928

    IMEI Profile Configuration Modedescription

  • direct-tunnelInstruct the SGSN to enable/disable a direct tunnel between the RNC and the GGSN based on the IuPS serviceconfiguration.

    Product SGSN

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > IMEI Profile Configuration

    configure > imei-profile profile_name

    Entering the above command sequence results in the following prompt:

    [local]host_name(config-imei-profile-profile_name)#

    Syntax Description direct-tunnel check-iups-serviceno direct-tunnel

    no direct-tunnel

    This command instructs the SGSN to disable the direct tunnel function between the GGSN and the RNC.

    Usage Guidelines Direct tunnel is enabled by default on the GGSN and often on the RNC. This leaves it to the SGSN'sconfiguration to actually enable or disable a direct tunnel.

    With the SGSN, the options for configuring a direct tunnel are complex -- enable/disable on the basis of APNs,or RNCs, or GGSNs, or on the basis of the IMEI range. Refer to the SGSN Administration Guide forconfiguration details.

    Examples Assuming the IuPS service configuration has enabled DT for associated RNCs, then use this command toenable DT from the RNC to the GGSN associated with this IMEI profile:direct tunnel check-iups-service

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 29

    IMEI Profile Configuration Modedirect-tunnel

  • endExits the current configuration mode and returns to the Exec mode.

    Product SGSN

    Privilege Security Administrator, Administrator

    Syntax Description end

    Usage Guidelines Return to the Exec mode.

    Command Line Interface Reference, Modes I - Q, StarOS Release 1930

    IMEI Profile Configuration Modeend

  • exitExits the current configuration mode and returns to the context configuration mode.

    Product SGSN

    Privilege Security Administrator, Administrator

    Syntax Description exit

    Usage Guidelines Move to the previous configuration mode.

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 31

    IMEI Profile Configuration Modeexit

  • ggsn-addressIdentify the target GGSN for traffic being managed by this IMEI profile.

    Product SGSN

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > IMEI Profile Configuration

    configure > imei-profile profile_name

    Entering the above command sequence results in the following prompt:

    [local]host_name(config-imei-profile-profile_name)#

    Syntax Description ggsn-address IPv4/IPv6_address

    IPv4/IPv6_address

    Enter the IP address of the target GGSN. Enter the address in either standard IPv4 dotted decimal format orin standard IPv6 colon notation format.

    Usage Guidelines Use this command to define the IP address of the target GGSN to be associated with this IMEI profile.

    Examples The following command identifes the address of the GGSN associated with this IMEI profile as 123.123.11.1

    ggsn-address 123.123.11.1

    Command Line Interface Reference, Modes I - Q, StarOS Release 1932

    IMEI Profile Configuration Modeggsn-address

  • ignore-pdp-data-inactivityOn executing this command the SGSN ignores PDP Data Inactivity configuration under the APN profile forone or more matching IMEIs.

    Product SGSN

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > IMEI Profile Configuration

    configure > imei-profile profile_name

    Entering the above command sequence results in the following prompt:

    [local]host_name(config-imei-profile-profile_name)#

    Syntax Description ignore-pdp-data-inactivityremove ignore-pdp-data-inactivity

    remove

    This command is used to disable or remove the option to ignore PDP data inactivity from the IMEI profile.

    Usage Guidelines The SGSN supports options to configure PDP Data Inactivity detection duration and actions to be performedon timeout under the APN-Profile. The following configurable actions are supported under APN-Profile incase of PDP Data Inactivity detection in the PDP context:

    1 De-activate all PDPs of the subscriber2 De-activate all PDPs of the bundle (all linked PDPs)3 Detach the subscriber. This action is triggered when:

    Data in-activity is detected for all PDPs

    Data in-activity is detected for any of the PDPs

    On the Detection of the PDPData Inactivity, depending on the configuration option the SGSN either de-activatesthe PDP or detaches the subscriber.

    The ignore-pdp-data-inactivity CLI is added to provide an option under the IMEI-Profile to ignore PDPData Inactivity configuration for one or more IMEIs. On configuring this CLI, the SGSN ignores the applicationof in-activity configuration (configured in the APN-Profile) for a specified set of IMEI's.

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 33

    IMEI Profile Configuration Modeignore-pdp-data-inactivity

  • The IMEI range or set of IMEI's are mapped to specific IMEI-Profile using the CLI configuration optionunder Operator-policy.

    Note

    Examples Use this command to ignore PDPData Inactivity configuration under the APN profile for one or more matchingIMEIs.

    ignore-pdp-data-inactivity

    Command Line Interface Reference, Modes I - Q, StarOS Release 1934

    IMEI Profile Configuration Modeignore-pdp-data-inactivity

  • pdp-activateThis command enables the operator to configure the SGSN to reject Secondary PDPActivation Requests fromthe UE based on IMEI range.

    Product SGSN

    Privilege Administrator

    Command Modes Exec > Global Configuration > IMEI Profile Configuration

    configure > imei-profile profile_name

    Entering the above command sequence results in the following prompt:

    [local]host_name(config-imei-profile-profile_name)#

    Syntax Description [ remove ] pdp-activate { drop | restrict } secondary-activation access-type { gprs | umts }

    remove

    Removes the configured value and returns the pdp-activate configuration to the default 'not configured' state.

    drop

    This keyword causes the GSN to ignore the Request.

    restrict

    This keyword instructs the SGSN to reject Secondary PDP Activation Requests.

    access-type { gprs | umts }

    This keyword instructs the SGSN to ignore or reject Secondary PDP Activation Requests on the basis of theUE's access network type:

    gprs : from a 2G network.

    umts : from a 3G network.

    Usage Guidelines The SGSN administrator can use this command to configure the IMEI profile in the operator policy to eitherignore or reject Secondary PDP Activation Requests from UEs based on an IMEI range and UE access-type.

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 35

    IMEI Profile Configuration Modepdp-activate

  • Restricting secondary PDP activation based on the IMEI (in the IMEI profile) takes precedence over secondaryPDP activation that might be configured in the call control profile.

    Examples Enable rejection of Secondary PDP Activation Requests for 2G callers:

    pdp-activate restrict secondary-activation access-type gprs

    Command Line Interface Reference, Modes I - Q, StarOS Release 1936

    IMEI Profile Configuration Modepdp-activate

  • IMEI-TAC-Group Configuration Mode Commands

    The IMEI-TAC-GroupConfigurationMode provides access to the commands used to configure the IMEI-TACvalues and ranges included in the IMEI-TAC groups. These IMEI-TAC values and ranges are used as theselection criteria for operator policy selection based on IMEI-TAC. For details about this functionality, referto the Operator Policy Selection Based on IMEI-TAC chapter in theMME Administration Guide.

    Command Modes Exec > Global Configuration > LTE Policy Configuration > IMEI-TAC-Group

    configure > lte-policy > imei-tac-groupgroup_name

    Entering the above command sequence results in the following prompt:

    [local]host_name(imei-tac-group)#

    The commands or keywords/variables that are available are dependent on platform type, product version,and installed license(s).

    Important

    end, page 38

    exit, page 39

    tac, page 40

    tac-range, page 41

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 37

  • endExits the current configuration mode and returns to the Exec mode.

    Product All

    Privilege Security Administrator, Administrator

    Syntax Description end

    Usage Guidelines Use this command to return to the Exec mode.

    Command Line Interface Reference, Modes I - Q, StarOS Release 1938

    IMEI-TAC-Group Configuration Mode Commandsend

  • exitExits the current mode and returns to the parent configuration mode.

    Product All

    Privilege Security Administrator, Administrator

    Syntax Description exit

    Usage Guidelines Use this command to return to the parent configuration mode.

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 39

    IMEI-TAC-Group Configuration Mode Commandsexit

  • tacConfitures individual TAC (type allocation code) values to be included in a IMEI-TAC group which will beused as criteria for operator policy selection.

    Product MME

    Privilege Administrator

    Command Modes Exec > Global Configuration > LTE Policy Configuration > IMEI-TAC-Group

    configure > lte-policy > imei-tac-groupgroup_name

    Entering the above command sequence results in the following prompt:

    [local]host_name(imei-tac-group)#

    Syntax Description [ no ] tac tac_value [ tac_value tac_value + ]

    no

    Removes the identified TAC from the IMEI-TAC group configuration.

    tac_value

    Specifies the 8-digit number that identifies a specific "type allocation code". When entering more than oneTAC, simply use a space between each TAC. Additional TAC values can be added at any time after theIMEI-TAC group is configured.

    Usage Guidelines Use this command to enter one or more individual TAC (type allocation code) values to the IMEI-TAC group.Up to 500 unique IMEI-TAC values can be included in an IMEI-TAC group.

    The TAC, the first eight digits of the 15-digit IMEI or 16-digit IMEI-SV, identifies the equipment manufacturer,the wireless device type and the model number (if there is one); for example, TAC of 35201906 identifies anApple iPhone 5S.

    Examples The following command adds four IMEI-TAC to an IMEI-TAC group:tac 31441551 77777777 87650506 87654321

    Command Line Interface Reference, Modes I - Q, StarOS Release 1940

    IMEI-TAC-Group Configuration Mode Commandstac

  • tac-rangeDefines a range of IMEI-TAC values to be included in a IMEI-TAC group which will be used as criteria foroperator policy selection.

    Product MME

    Privilege Administrator

    Command Modes Exec > Global Configuration > LTE Policy Configuration > IMEI-TAC-Group

    configure > lte-policy > imei-tac-groupgroup_name

    Entering the above command sequence results in the following prompt:

    [local]host_name(imei-tac-group)#

    Syntax Description [ no ] tac-range from start_tac_value to end_tac_value

    no

    Removes the identified TAC range from the IMEI-TAC group configuration.

    start_tac_value to end_tac_value

    tac_value - Specifies the 8-digit number that identifies a specific "type allocation code". The start TAC isthe first TAC in the range. The end TAC is the last TAC in the range.

    Usage Guidelines Use this command to enter up to 20 IMEI-TAC value ranges. Ranges can be overlapping.

    The TAC, the first eight digits of the 15-digit IMEI or 16-digit IMEI-SV, identifies the equipment manufacturer,the wireless device type and the model number (if there is one); for example, TAC of 35201906 identifies anApple mobile phone. Defining ranges would enable carriers to select operator policies for call handling basedon multiple device types.

    Examples The following command defines a TAC range to be added to the IMEI-TAC group:tac-range from 23456789 to 23456889

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 41

    IMEI-TAC-Group Configuration Mode Commandstac-range

  • Command Line Interface Reference, Modes I - Q, StarOS Release 1942

    IMEI-TAC-Group Configuration Mode Commandstac-range

  • IMS Authorization Service Configuration ModeCommands

    The IMS Authorization Service Configuration Mode enables to configure IP Multimedia Subsystem (IMS)authorization services to manage policy control functions and Gx interface support.

    Command Modes Exec > Global Configuration > Context Configuration > IMS Authorization Service Configuration

    configure > context context_name > ims-auth-service service_name

    Entering the above command sequence results in the following prompt:

    [context_name]host_name(config-imsa-service)#

    The commands or keywords/variables that are available are dependent on platform type, product version,and installed license(s).

    Important

    end, page 44

    exit, page 45

    p-cscf discovery, page 46

    p-cscf table, page 48

    policy-control, page 51

    qos-update-timeout, page 52

    reauth-trigger, page 53

    signaling-flag, page 55

    signaling-flow, page 57

    traffic-policy, page 59

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 43

  • endExits the current configuration mode and returns to the Exec mode.

    Product All

    Privilege Security Administrator, Administrator

    Syntax Description end

    Usage Guidelines Use this command to return to the Exec mode.

    Command Line Interface Reference, Modes I - Q, StarOS Release 1944

    IMS Authorization Service Configuration Mode Commandsend

  • exitExits the current mode and returns to the parent configuration mode.

    Product All

    Privilege Security Administrator, Administrator

    Syntax Description exit

    Usage Guidelines Use this command to return to the parent configuration mode.

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 45

    IMS Authorization Service Configuration Mode Commandsexit

  • p-cscf discoveryThis command defines the method of Proxy-Call Session Control Function (P-CSCF) discovery to be used.

    Product All

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > Context Configuration > IMS Authorization Service Configuration

    configure > context context_name > ims-auth-service service_name

    Entering the above command sequence results in the following prompt:

    [context_name]host_name(config-imsa-service)#

    Syntax Description p-cscf discovery { table { 1 | 2 } [ algorithm { ip-address-modulus | msisdn-modulus | round-robin } ] |diameter-configured }[ default | no ] p-cscf discovery

    default

    Sets the P-CSCF discovery to default parameter.

    no

    Removes/deletes configured parameters for P-CSCF discovery.

    table { 1 | 2 }

    Specifies that which P-CSCF table is to be used to obtain the primary and secondary P-CSCF addresses. Total2 tables can be configured for P-CSCF discovery.

    algorithm { ip-address-modulus | msisdn-modulus | round-robin }

    Specifies the algorithm to select the row from the P-CSCF table to be used for P-CSCF discovery.

    ip-address-modulus: This algorithm divides the IP address, in binary, of the subscriber by the numberof rows in the table, and the remainder is used as an index into the specified table to select the row.

    msisdn-modulus: This algorithm divides the MSISDN value, in binary without the leading "+", of thesubscriber by the number of rows in the table, and the remainder is used as an index in the specific tableto select the row.

    round-robin: This algorithm rotates all rows in the active table for selection of the row in round-robinway. If no algorithm is specified this is the default behavior.

    Command Line Interface Reference, Modes I - Q, StarOS Release 1946

    IMS Authorization Service Configuration Mode Commandsp-cscf discovery

  • Default: round-robin

    diameter-configured

    This option enables the table number and algorithm specified by the diameter host-select table configurationin Policy Control Configuration mode.

    Usage Guidelines Use this command to configure the table and row selection methods to select IP address/host address forP-CSCF discovery.

    Examples The following command specifies table 1 with round-robin algorithm to select the rows with IP address forP-CSCF discovery.p-cscf discovery table 1 algorithm round-robin

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 47

    IMS Authorization Service Configuration Mode Commandsp-cscf discovery

  • p-cscf tableThis command adds/appends rows with primary and/or secondary IPv4/IPv6 addresses to a P-CSCF discoverytable with precedence for P-CSCF discovery.

    Product All

    Privilege Security Administrator, Administrator

    Command Modes Exec > Global Configuration > Context Configuration > IMS Authorization Service Configuration

    configure > context context_name > ims-auth-service service_name

    Entering the above command sequence results in the following prompt:

    [context_name]host_name(config-imsa-service)#

    Syntax Description In releases prior to 18:

    p-cscf table { 1 | 2 } row-precedence precedence_value { address ipv4_address | ipv6-address ipv6_address} [ secondary { address ipv4_address | ipv6-address ipv6_address } ] [ weight value ]no p-cscf table { 1 | 2 } row-precedence precedence_valueIn 18 and later releases:

    p-cscf table { 1 | 2 } row-precedence precedence_value { ipv4-address ipv4_address [ ipv6-addressipv6_address ] | ipv6-address ipv6_address [ ipv4-address ipv4_address ] } [ secondary { ipv4-addressipv4_address [ ipv6-address ipv6_address ] | ipv6-address ipv6_address [ ipv4-address ipv4_address ] } [weight value ]no p-cscf table { 1 | 2 } row-precedence precedence_value

    no

    Removes/deletes configured row with precedence in specified table for P-CSCF discovery address.

    { 1 | 2 }

    Specifies which P-CSCF table is to be used to add/append the primary and secondary P-CSCF addresses. Twotables can be configured for P-CSCF discovery address.

    row-precedence precedence_value

    This keyword adds/appends the row with the specified row-precedence to the P-CSCF address table.

    In 8.1 and later releases, precedence_value must be an integer from 1 through 128, and a maximum of 128rows can be added to a table.

    Command Line Interface Reference, Modes I - Q, StarOS Release 1948

    IMS Authorization Service Configuration Mode Commandsp-cscf table

  • In release 8.0, precedence_value must be an integer from 1 through 100, and a maximum of 16 rows can beadded to a table.

    secondary

    Specifies the secondary IPv4/IPv6 address to be entered in P-CSCF table rows.

    address ip_address

    Specifies the primary and/or secondary IPv4 address for P-CSCF discovery table. This keyword, if used withsecondary keyword, specifies the secondary IPv4 address.

    This keyword is available only in releases prior to 18. In 18 and later releases, this keyword is concealedand is replaced with ipv4-address to support the PDN type v4v6 request for VoLTE setup.

    Important

    ip_address must be entered in IPv4 dotted-decimal notation.

    ipv4-address ipv4_address

    Specifies the primary and/or secondary IPv4 address for P-CSCF discovery table. This keyword, if used withsecondary keyword, specifies the secondary IPv4 address.

    ipv4_address must be entered in IPv4 dotted-decimal notation.

    This keyword is available in 18 and later releases to support the PDN type v4v6 request for VoLTE setup.Important

    In releases prior to 18, the P-CSCF configuration accepts only one primary and one secondary P-CSCF IPaddresses both IPv4 and IPv6 addresses per row in the P-CSCF address table. Two IP addresses are notsufficient enough to address the requirement with PDN type v4v6 request for VoLTE setup. Hence, in release18, the P-CSCF configuration has been enhanced to allow users to configure a maximum of two IPv4 addresses(primary/secondary) and two IPv6 addresses (primary/secondary) per P-CSCF table row.

    ipv6-address ipv6_address

    Specifies the primary and/or secondary IPv6 address for P-CSCF discovery table. This keyword, if used withsecondary keyword, specifies the secondary IPv6 address.

    ipv6_address must be entered in IPv6 colon-separated-hexadecimal notation.

    In releases prior to 18, the P-CSCF configuration accepts only one primary and one secondary P-CSCF IPaddresses both IPv4 and IPv6 addresses per row in the P-CSCF address table. Two IP addresses are notsufficient enough to address the requirement with PDN type v4v6 request for VoLTE setup. Hence, in release18, the P-CSCF configuration has been enhanced to allow users to configure a maximum of two IPv4 addresses(primary/secondary) and two IPv6 addresses (primary/secondary) per P-CSCF table row.

    weight value

    This keyword designates weight to a row-precedence relative to other row-precedences configured under thistable, Default value is 1. value must be an integer from 1 through 10.

    Within the IMS Authorization configuration, the P-CSCF address is selected based on round robin fashion.This feature allows the customer to perform P-CSCF selection based on weight factor.

    Command Line Interface Reference, Modes I - Q, StarOS Release 19 49

    IMS Authorization Service Configuration Mode Commandsp-cscf table

  • With this CLI option, the user can configure