CSCF Service Configuration Mode Commands


CSCF Service Configuration Mode Commands
 
 
The CSCF Service Configuration Mode is used to create and manage CSCF services within the current context.
 
Important: The commands or keywords/variables that are available are dependent on platform type, product version, and installed license(s).
 
access-service
Configures the name of the P-CSCF/A-BG access service from which the system receives requests and sends responses. The access service lets the core service know where a packet needs to be routed.
Product
SCM (P-CSCF, A-BG)
Privilege
Administrator
Syntax
access-service name name
no access-service [ name name ]
name name
Specifies the name of the P-CSCF/A-BG access service from which the system receives requests and sends responses.
name must be from 1 to 63 alpha and/or numeric characters.
Important: This command should only be issued in the core service configuration, however, multiple access services may be configured per core service.
no
Removes the access service.
Usage
Use this command to identify the name of the P-CSCF/A-BG access service from which the system receives requests and sends responses from/to the UEs. This command is used in systems that deploy two P-CSCF/A-BG services in bridging (Back-to-Back User Agent) mode configurations where an access service P-CSCF/A-BG faces the UE network and a core P-CSCF/A-BG faces the public network.
Example
The following command identifies the P-CSCF/A-BG access service named to the CSCF/A-BG core service:
access-service name HA3
 
access-type
Specifies the access types for IMS core.
Product
SCM (P-CSCF, A-BG)
Privilege
Administrator
Syntax
access-type { 3gpp-geran | 3gpp-utran-fdd | 3gpp-utran-tdd | 3gpp2-1x | 3gpp2-1x-hrpd | 3gpp2-umb | adsl | adsl2 | adsl2p | docsis | gshdsl | hdsl | hdsl2 | idsl | ieee-80211 | ieee-80211a | ieee-80211b | ieee-80211g | ieee-80216e | radsl | sdsl | vdsl } access-profile { default | name access_profile_name } | ue-ip-address-range name ue_ip_name { address ip_address_mask | range start_ip_address end_ip_address }
no access-type { 3gpp-geran | 3gpp-utran-fdd | 3gpp-utran-tdd | 3gpp2-1x | 3gpp2-1x-hrpd | 3gpp2-umb | adsl | adsl2 | adsl2p | docsis | gshdsl | hdsl | hdsl2 | idsl | ieee-80211 | ieee-80211a | ieee-80211b | ieee-80211g | ieee-80216e | radsl | sdsl | vdsl } [ access-profile | ue-ip-address-range [ name ue_ip_name ] ]
access-type { 3gpp-geran | 3gpp-utran-fdd | 3gpp-utran-tdd | 3gpp2-1x | 3gpp2-1x-hrpd | 3gpp2-umb | adsl | adsl2 | adsl2p | docsis | gshdsl | hdsl | hdsl2 | idsl | ieee-80211 | ieee-80211a | ieee-80211b | ieee-80211g | ieee-80216e | radsl | sdsl | vdsl }
3gpp-geran: 3GPP Access Type
3gpp-utran-fdd: 3GPP Access Type
3gpp-utran-tdd: 3GPP Access type
3gpp2-1x: 3GPP2 Access Type
3gpp2-1x-hrpd: 3GPP2 Access Type
3gpp2-umb: 3GPP2-UMB
adsl: FixedLine Access Type
adsl2: FixedLine Access Type
adsl2p: FixedLine Access Type ADSL2+
docsis: DOCSIS
gshdsl: FixedLine Access Type G.SHDSL
hdsl: FixedLine Access Type
hdsl2: FixedLine Access Type
idsl: FixedLine Access Type
ieee-80211: WLAN Access Type
ieee-80211a: WLAN Access Type
ieee-80211b: WLAN Access Type
ieee-80211g: WLAN Access Type
ieee-80216e: Wireless MAN Access Type
radsl: FixedLine Access Type
sdsl: FixedLine Access Type
vdsl: FixedLine Access Type
access-profile {default | name access_profile_name }
Associates an access type with a CSCF access profile. Different access types can refer to the same access profile.
ue-ip-address-range name ue_ip_name { address ip_address_mask | range start_ip_address end_ip_address }
Configures UE IP address/range for a specific access type.
ue_ip_name must be from 1 to 79 alpha and/or numeric characters.
address ip_address_mask: Specifies a combined IP address subnet mask bits to indicate what IP addresses the specific access-type applies to. ip_address_mask must be specified using the form “IP Address/Mask Bits” where the IP address must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6, and the mask bits are a numeric value, which is the number of bits in the subnet mask.
range start_ip_address end_ip_address: Configure UE IP range for specific access-type.
start_ip_address specifies the beginning of the range of addresses.
end_ip_address specifies the end of the range of addresses .
ip_address must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6.
no access-type { 3gpp-geran | 3gpp-utran-fdd | 3gpp-utran-tdd | 3gpp2-1x | 3gpp2-1x-hrpd | 3gpp2-umb | adsl | adsl2 | adsl2p | docsis | gshdsl | hdsl | hdsl2 | idsl | ieee-80211 | ieee-80211a | ieee-80211b | ieee-80211g | ieee-80216e | radsl | sdsl | vdsl } [ access-profile | ue-ip-address-range [ name ue_ip_name ] ]
Removes the specified access type from a CSCF access profile or UE IP address/range.
Usage
Use this command to associated the access types for a specified CSCF access profile or UE IP address/range name.
Important: Use the sip-header command to enable SIP P-Access-Network-Info (PANI) header insertion. CSCF Proxy-CSCF Configuration Mode commands are defined in the CSCF Proxy-CSCF Configuration Mode Commands chapter in this guide.
Example
The following command identifies the access type adsl and assigns it to access profile ap1:
access-type adsl access-profile name ap1
 
allow-dereg
Allows the CSCF to send de-registration requests. Feature is disabled by default.
Product
SCM
Privilege
Administrator
Syntax
[ no ] allow-dereg
no
Disables the feature.
Usage
Use this command to allow the CSCF service to send de-registration requests.
If the UE stops sending keepalive packets, which ends the connection between the UE and the proxy, UE information is cleared from the Proxy-CSCF (P-CSCF) or Access Border Gateway (A-BG). If de-registration requests are enabled, any UE-related information that is shared with the Serving-CSCF (S-CSCF) will also be cleared.
 
bind
Binds the CSCF service to a logical IP interface and specifies the maximum number of sessions that can access this service over the specified interface.
Product
SCM (P-CSCF, A-BG)
Privilege
Administrator
Syntax
bind address ip_address [ access-ipsec-crypto-template template ] [ cscf-hostname host_name ] [ max-sessions max# ] [ port number ] [ reserved-call-capacity percentage] [ transport tcp ] [ use-serviceport-towards-network ]
no bind address
address ip_address
Specifies the IP address of the interface to which the service is being bound.
ip_address must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6.
access-ipsec-crypto-template template
Specifies the name of an existing IPSec CSCF crypto template to be used for accessing CSCF service by user equipment. Valid only for P-CSCF or A-BG.
template must be an existing IPSec CSCF crypto template and be from 1 to 127 alpha and/or numeric characters.
Important: The IPSec CSCF crypto template should be configured in the same context in which the P-CSCF is configured.
cscf-hostname host_name
Specifies the local host name of the CSCF service.
host_name must be an existing CSCF service name and be from 1 to 127 alpha and/or numeric characters.
Configuring this keyword associates the CSCF service with the AOR domain configured in the default-aor-domain command and uses the domain name in SIP headers.
Important: If this keyword is not configured, SIP headers will contain the IP address of the CSCF service instead of the domain name.
max-sessions max#
Default: 500,000
Specifies the maximum number of sessions managed by this service on this interface.
max# must be configured to any integer value from 0 to 500,000.
Important: The total session capacity of the system is 500,000. max-sessions is also limited by the capacity in the license generated for the service. If licenses for PDSN/GGSN/HA are generated for x number of sessions, then the license for the CSCF service will be generated at 500,000-x. Hardware configuration and installed features can also affect the maximum number of sessions that can be supported.
port number
Default: 5060
Specifies the UDP port number.
number must be an integer value from 1 to 65534.
reserved-call-capacity percentage
Default: 10
Specifies the call capacity percentage per session manager (sessmgr).
percentage must be an integer value from 1 to 50.
transport tcp
Enables TCP transport for the address.
use-serviceport-towards-network
Enables use of service port for sending and receiving UDP messages from network elements.
no bind address
Removes the binding of the service to a specified interface.
Usage
Use this command to associated the service with a specific logical IP address. This command also configures the identity of the CSCF in SIP headers as either the domain name of the CSCF service or the IP address.
Important: Multiple keywords can be used per bind command.
Example
The following command binds the CSCF service to a logical interface with an IP address of 1.2.3.4 and sets the maximum number of supported sessions for this interface at 250000:
bind address 1.2.3.4 max-sessions 250000
 
charging
Enables Rf charging in this CSCF service for SIP messages.
Product
SCM
Privilege
Administrator
Syntax
[ default | no ] charging
default
Enables Rf charging in this CSCF service for SIP messages.
no
Disables Rf charging for this service.
Usage
Use this command to enable the RF charging feature in this service and enter the CSCF Charging Configuration Mode.
Entering this command results in the following prompt:
[context_name]hostname(config-cscf-charging)#
CSCF Charging Configuration Mode commands are defined in the CSCF Charging Configuration Mode Commands chapter in this guide.
 
cnsa-media-profile
Configures the media profile id to be set for a previously created service policy.
Product
SCM (S-CSCF)
Privilege
Administrator
Syntax
[ no ] cnsa-media-profile profile_id cscf-service-policy policy_name content-type { application-3gpp-ims-xml | application-pidf-diff-xml | application-pidf-partial-xml | application-pidf-xml | application-reginfo-xml | application-sdp | application-xml | message-sipfrag | multipart-mixed | multipart-related | text-plain }
no
Removes the media profile from the service policy.
cnsa-media-profile profile_id
Specifies the media profile id.
profile_id must be an integer from 0 to 10 and be an existing media profile id in the system. CNSA media profile ids are created and maintained in the CSCF ISC Template Configuration Mode.
cscf-service-policy policy_name
Assigns the media profile id to a service policy.
policy_name must be from 1 to 63 alpha and/or numeric characters and be an existing policy name in the system. Service policies are created and maintained in the CSCF Policy Configuration Mode.
content-type { application-3gpp-ims-xml | application-pidf-diff-xml | application-pidf-partial-xml | application-pidf-xml | application-reginfo-xml | application-sdp | application-xml | message-sipfrag | multipart-mixed | multipart-related | text-plain }
Specifies the content type(s).
application-3gpp-ims-xml - format for exchanging information in SIP Requests and Responses as used within the 3GPP IM CN Subsystem
application-pidf-diff-xml - contains changed presence elements. Contains full presence document when there are many changes
application-pidf-partial-xml - contains only changed parts of PIDF-based presence information
application-pidf-xml - XML MIME entity that contains presence information
application-reginfo-xml - used in Notifications to SIP user agents about registration expiry
application-sdp - SDP session description
application-xml - content type for generic xml documents
message-sipfrag - contains subsets of well formed SIP messages
multipart-mixed - intended for use when the body parts are independent and need to be bundled in a particular order
multipart-related - intended for compound objects consisting of several inter-related body parts
text-plain - plain text
Important: You may specify multiple types of content.
Usage
Use this command to assign a media profile id to a service policy. The policies defined in the service policy apply to all subscribers using this service.
CNSA media profile ids are created and maintained in the CSCF ISC Template Configuration Mode. Service policies are created and maintained in the CSCF Policy Configuration Mode.
Example
The following command defines the media profile id as 2 and assigns it to serv_policy3 with plain text content type.
cnsa-media-profile 2 cscf-service-policy serv_policy3 content-type text-plain
 
core-service
Configures a core service if:
 
By default, no core-service name will be present.
Product
SCM (CSCF, A-BG)
Privilege
Administrator
Syntax
[ no ] core-service name service_name
no
Removes the core service.
core-service name service_name
Specifies the name of the core service.
service_name must be from 1 to 80 alpha and/or numeric characters.
Usage
Use this command to assign a core service to the CSCF/A-BG service.
Example
The following command identifies the core service:
core-service name service1
 
default-aor-domain
Configures the domain name of the service.
Product
SCM
Privilege
Administrator
Syntax
[ no ] default-aor-domain alias
no
Removes the domain name from the service.
default-aor-domain alias
Specifies the domain name for the service.
alias is the name of the domain for this service and must be from 1 to 79 alpha and/or numeric characters in length.
Usage
Use this command to define the domain name of the service.
Example
The following command defines the domain name of the CSCF service as business.com:
default-aor-domain business.com
 
emergency-cscf
Enables the Emergency-CSCF for the service and enters the Emergency-CSCF Configuration Mode. Default is disabled.
Product
SCM
Privilege
Administrator
Syntax
[ no ] emergency-cscf
no
Disables the E-CSCF for the service.
Usage
Use this command to enable the Emergency-CSCF feature and enter the Emergency-CSCF Configuration Mode.
Entering this command results in the following prompt:
[context_name]hostname(config-cscf-service-emergency-cscf)#
Emergency-CSCF Configuration Mode commands are defined in the CSCF Emergency-CSCF Configuration Mode Commands chapter in this guide.
Important: Only one function (P-CSCF, S-CSCF, E-CSCF, SIP Proxy, or A-BG) can be enabled per service.
 
end
Exits the current mode and returns to the Exec Mode.
Product
All
Privilege
Administrator
Syntax
end
Usage
Change the mode back to the Exec mode.
 
exit
Exits the current mode and returns to the previous mode.
Product
All
Privilege
Administrator
Syntax
exit
Usage
Return to the previous mode.
 
history-info
Enables the addition of the history-info header to SIP requests in order to capture request URI information. By default, this command is disabled.
Product
SCM
Privilege
Administrator
Syntax
[ default | no ] history-info
default | no
Disables the inclusion of the history-info header.
Usage
Use this command to include the history-info header in SIP requests to capture the request URI information for routing or translation.
 
interface
Enables interface SIP statistic collection.
Product
SCM
Privilege
Administrator
Syntax
[ no ] interface statistics sip
default | no
Disables interface SIP statistic collection for this service.
Usage
Use this command to enable the collection of interface SIP statistics in this service.
 
ipv4-ipv6-interworking
Allows the P-CSCF to provide IPv4-IPv6 interworking when UEs are IPv6-only and the IMS core network is IPv4-only. Feature is disabled by default.
Product
SCM (P-CSCF)
Privilege
Administrator
Syntax
[ no ] ipv4-ipv6-interworking
no
Disables the feature.
Usage
Use this command to allow IPv4-IPv6 interworking functionality.
 
keepalive
Configures the CSCF to receive and respond to different types of keep-alive requests.
Product
SCM
Privilege
Administrator
Syntax
keepalive [ expire-timer sec [ max-retry num ] | max-retry num [ expire-timer sec ] | method { crlf | stun } [ expire-timer sec [ max-retry num ] | max-retry num [ expire-timer sec ] ] ]
default keepalive [ expire-timer | max-retry [ expire-timer ] | method [ expire-timer | max-retry ] ]
no keepalive [ method { crlf | stun } ]
expire-timer sec
Default: 29
This value is used according to timed-keepalives parameter present in Path header. UEs are expected to send keepalive messages according to this time interval.
sec must be an integer from 24 to 150.
max-retry num
Default: 3
Specifies the maximum number of times the CSCF waits for the UE to send a keepalive request before it deletes the user information.
num must be an integer from 1 to 10.
method { crlf | stun }
Default: both methods enabled.
Specifies the method of keepalive messages supported by the CSCF.
crlf: “\r\n” string (CRLF packets) sent by UE
stun: STUN protocol messages (rfc3489-bis)
default keepalive [ expire-timer | max-retry [ expire-timer ] | method [ expire-timer | max-retry ] ]
Returns the command to the default settings. All methods are enabled by default. See keywords above for specific defaults.
no keepalive [ method { crlf | stun } ]
Disables the specified method of keepalive messages.
Usage
Use this command to configure how the CSCF manages keepalive requests.
Example
The following example sets the expire timer to 40 and the maximum retry parameter to 5:
keepalive expire-timer 40 max-retry 5
 
li-packet-cable
Enables the lawful intercept packet cable feature and configures Diameter for Lawful Intercept.
Product
SCM (P-CSCF, A-BG)
Privilege
Administrator
Syntax
li-packet-cable diameter { dictionary li-standard | origin endpoint endpoint_name | peer-select peer peer_name [ peer-realm peer_realm ] [ secondary-peer sec_peer_name ] [ sec-peer-realm sec_peer_realm ] }
default li-packet-cable diameter dictionary
no li-packet-cable diameter { origin endpoint | peer-select }
dictionary li-standard
Configures the li-standard Diameter dictionary.
origin endpoint endpoint_name
Specifies the Diameter endpoint.
endpoint_name must be a string of 1 through 63 characters in length.
peer-select peer peer_name
Specifies the Diameter lawful intercept peer.
peer_name must be a string of 1 through 63 characters in length.
peer-realm peer_realm
Specifies the Diameter lawful intercept peer realm.
peer_realm must be a string of 1 through 63 characters in length.
secondary-peer sec_peer_name
Specifies the Diameter lawful intercept secondary peer.
sec_peer_name must be a string of 1 through 63 characters in length.
sec-peer-realm sec_peer_realm
Specifies the Diameter lawful intercept secondary peer realm.
sec_peer_realm must be a string of 1 through 63 characters in length.
default li-packet-cable diameter dictionary
Configures the li-standard Diameter dictionary.
no li-packet-cable diameter { origin endpoint | peer-select }
Disables Diameter Lawful Intercept for the specified function.
Usage
Use this command to enable the lawful intercept packet cable feature and configure Diameter for Lawful Intercept.
Example
The following command defines a Diameter lawful intercept peer named li-peer1:
li-packet-cable diameter peer-select peer li-peer1
 
max-sipmsg-size
Configures the maximum SIP message size.
Product
SCM
Privilege
Administrator
Syntax
max-sipmsg-size limit
[ default | no ] max-sipmsg-size
limit
Default: 4096
Configures the SIP message size limit in bytes.
limit must be an integer from 1024 to 65535.
Important: Maximum SIP message size should be more than the message-max-size set in the CSCF Proxy-CSCF Configuration Mode.
default | no
Returns/sets the maximum SIP message size to 4096 bytes.
Usage
Use this command to configure the maximum SIP message size.
Example
The following command limits the SIP message size to 4500 bytes:
max-sipmsg-size 4500
 
media-bridging
Enables SDP modification that terminate media on CSCF. Feature is disabled by default.
Product
SCM (P-CSCF)
Privilege
Administrator
Syntax
[ no ] media-bridging
no
Disables the feature.
Usage
Use this command to allow termination of media on CSCF.
 
nat-policy
Configures a NAT (Network Address Translation) policy for the service if the CSCF service is performing one of the following functions:
 
Product
SCM(CSCF, A-BG)
Privilege
Administrator
Syntax
nat-policy policy_name { private-address { address ip_address_mask | default | range start_ip_address end_ip_address } | bridge-network { address ip_address_mask | range start_ip_address end_ip_address }
no nat-policy policy_name
nat-policy policy_name
Specifies a name for the NAT policy.
policy_name must be from 1 to 79 alpha and/or numeric characters.
private-address { address ip_address_mask | default|range start_ip_address end_ip_address }
Specifies the private-address policy type for nat-pool.
address ip_address_mask: Address for nat-policy policy type for nat-pool. Specifies a combined IP address subnet mask bits to indicate what IP addresses the specific policy type applies to. ip_address_mask must be specified using the form “IP Address/Mask Bits” where the IP address must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6, and the mask bits are a numeric value, which is the number of bits in the subnet mask.
default: Default for nat-policy policy type for nat-pool. Default is defined as the address range specified by rfc1918.
range start_ip_address end_ip_address: Range for nat-policy policy type for nat-pool.
start_ip_address specifies the beginning of the range of addresses.
end_ip_address specifies the end of the range of addresses .
ip_address must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6.
bridge-network { address ip_address_mask | range start_ip_address end_ip_address }
Specifies the bridge-network policy type for S-CSCF bridging.
address ip_address_mask: Address for bridge-network policy type for S-CSCF bridging. Specifies a combined IP address subnet mask bits to indicate what IP addresses the specific policy type applies to. ip_address_mask must be specified using the form “IP Address/Mask Bits” here the IP address must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6, and the mask bits are a numeric value, which is the number of bits in the subnet mask.
range start_ip_address end_ip_address: Range for bridge-network policy type for S-CSCF bridging.
start_ip_address specifies the beginning of the range of addresses.
end_ip_address specifies the end of the range of addresses .
ip_address must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6.
no nat-policy policy_name
Removes the specified NAT policy from the service.
Usage
Generally, if a SIP packet has a VIA address (physical address that identifies where the service is located) different from the Source address, ALG functionality is invoked. Even if the VIA and Source addresses are the same, however, this command allows the ALG functionality to be started. For ALG to start, the VIA address should belong to one of the nat-policy address ranges.
Example
The following command identifies the NAT policy named policy1 with a private-address policy type of 10.10.10.10 255.255.255.0:
nat-policy policy1 private-address address 10.10.10.10 255.255.255.0
The following command identifies the NAT policy named policy2 with a private-address range policy type of 172.162.23.23 172.162.23.230:
nat-policy policy2 private-address address 172.162.23.23 172.162.23.230
The following command identifies the NAT policy named policy3 with a default policy type:
nat-policy policy3 private-address default
 
nat-pool
Configures a NAT (Network Address Translation) pool for the service if the CSCF service is performing one of the following functions:
 
By default, no nat-pool name will be present.
Product
SCM(P-CSCF, A-BG)
Privilege
Administrator
Syntax
[ no ] nat-pool name pool_name
no
Removes the NAT pool from the service.
nat-pool name pool_name
Specifies the name of an existing NAT pool.
pool_name must be from 1 to 32 alpha and/or numeric characters.
Important: NAT pools are created in Context Configuration Mode with the ip pool command.
Usage
Use this command to assign a NAT pool to the P-CSCF/A-BG service.
Example
The following command identifies the NAT pool:
nat-pool name pool2
 
policy
Enables or disables early media support in P-CSCF and configures the congestion control threshold values that are to be monitored on this CSCF service.
Product
SCM (P-CSCF, A-BG)
Privilege
Administrator
Syntax
policy { allow-early-media | threshold congestion-control [ system-cpu-utilization percent ] [ tolerance percent ] }
[ default | no ] policy { allow-early-media | threshold congestion-control tolerance }
allow-early-media
Default: Enabled
Allows early media by doing QoS commit during QoS Authorization in P-CSCF.
threshold congestion-control
Enables congestion-control.
system-cpu-utilization percent
Default: 80
The average percent utilization of a CPU in a PSC/PSC2 running the CSCF service as measured in 10 second intervals.
percent can be configured to any integer value from 0 to 100. This value becomes the upper threshold for triggering the CPU-based congestion for CSCF services.
tolerance percent
Default: 5
The percentage under a configured threshold that dictates the point at which the condition is cleared.
percent is an integer value from 1 to 25.
default
Returns the command to the default settings. See keywords above for specific defaults.
no
Disables the functionality.
Usage
Use this command to set QoS support during either the initial SDP response or the 200OK response to the INVITE. When this CLI is enabled, QoS commit is done during initial SDP answer. When disabled, QoS commit is done during 200OK INVITE. By default, this command is enabled.
In addition, thresholds dictate the conditions for which congestion control is to be enabled and establish limits for defining the state of the CSCF service (congested or clear). The tolerance parameter establishes the threshold at which the condition is cleared.
Important: When congestion is triggered, new CSCF calls are not rejected.
Example
The following command sets the upper threshold for CPU utilization for triggering congestion control at 90%.
policy threshold congestion-control system-cpu-utilization 90
The following command sets the tolerance to its default value of 5.
default policy threshold congestion-control tolerance
 
policy-name
Assigns a previously created service policy to this service.
Product
SCM
Privilege
Administrator
Syntax
policy-name name
no policy-name
policy-name name
Specifies the name of the service policy being assigned to this service.
name must be from 1 to 79 alpha and/or numeric characters and be an existing policy name in the system. Service policies are created and maintained in the CSCF Policy Configuration Mode.
no
Remove the assigned service policy from this service.
Usage
Use this command to assign a service policy to this service. The policies defined in the service policy apply to all subscribers using this service. Service policies are created and maintained in the CSCF Policy Configuration Mode.
Example
The following command assigns a service policy named serv_policy3 to this service:
policy-name serv_policy3
 
proxy-cscf
Enables the Proxy-CSCF for the service and enters the Proxy-CSCF Configuration Mode. Default is disabled.
Product
SCM (P-CSCF)
Privilege
Administrator
Syntax
[ no ] proxy-cscf
no
Disables the P-CSCF for the service.
Usage
Use this command to enable the Proxy-CSCF feature and enter the Proxy-CSCF Configuration Mode.
Entering this command results in the following prompt:
[context_name]hostname(config-cscf-service-proxy-cscf)#
Proxy-CSCF Configuration Mode commands are defined in the CSCF Proxy-CSCF Configuration Mode Commands chapter in this guide.
Important: The Proxy-CSCF is a license-enabled function of the Session Control Manager. Only one function (P-CSCF, S-CSCF, E-CSCF, SIP Proxy, or A-BG) can be enabled per service.
 
recurse-on-redirect-resp
Enables the 3xx recursion feature. If enabled, the service will send further invites to the contacts specified upon receiving a 3xx redirect response. Default is disabled.
Product
SCM
Privilege
Administrator
Syntax
[ no ] recurse-on-redirect-resp
no
Disables the 3xx recursion feature.
Usage
When enabled and on receipt of a 3xx response, the service will collect the SIP URIs present in the Contact header(s) of 3xx and recursively contact each one of them until the call succeeds. The contacts are tried serially. There is a maximum implementation limit of 50 URIs. Each contact, in turn, can send a 3xx response. The service will honor them and append the new contacts. When disabled, the service treats a 3xx response as the final failure response and declares the call attempt “failed”. By default, this feature is disabled.
Example
Enable recursion on 3xx:
recurse-on-redirect-resp
Disable recursion on 3xx:
no recurse-on-redirect-resp
 
reject-on-cnsa-failure
Enables rejection of messages on Core Network Service Authorization failure. Default is disabled.
Product
SCM
Privilege
Administrator
Syntax
[ no ] reject-on-cnsa-failure
no
Disables the rejection of messages on Core Network Service Authorization failure.
Usage
Enables rejection of messages on Core Network Service Authorization failure. By default, this feature is disabled.
In a mobile originating case, S-CSCF checks for the presence of P-Preferred-Service (PPS) header. If the header is present, media profile authentication is successful and if the incoming ICSI (IMS Communication Service Identifier) value also matches with one of the values in the service_id list, then the request will be forwarded after replacing the PPS header with PAS (P-Asserted-Service). If media profile authentication fails, S-CSCF will check reject-on-cnsa-failure. If enabled, then call is rejected with 403 message. If disabled, a default ICSI is selected from the service_id list and will be put into PAS while forwarding the request by the S-CSCF on service authentication failure.
In PPS is not received by the S-CSCF and media profile authentication is successful, an ICSI from the service_id list, if present, is selected and will be added in PAS header. If media profile authentication fails, reject-on-cnsa-failure is checked. If enabled, call is rejected with 403 message. If disabled, PAS header is added if service_id list is present with an ICSI value.
Example
Enable rejection of messages on Core Network Service Authorization failure:
reject-on-cnsa-failure
Disable rejection of messages on Core Network Service Authorization failure:
no reject-on-cnsa-failure
 
release-call-on-media-loss
Release call on detection of media loss.
Product
SCM (P-CSCF, A-BG)
Privilege
Administrator
Syntax
release-call-on-media-loss media-type audio
no release-call-on-media-loss
no
Disables the release of SIP calls upon the detection of media loss.
Usage
Use this command to enable the release of SIP calls upon the detection of media loss.
Example
Enables the release of SIP calls upon the detection of media loss:
release-call-on-media-loss media-type audio
Enables the release of SIP calls upon the detection of media loss:
no release-call-on-media-loss
 
rfc3261-proxy
Enables RFC3261 proxy (SIP Proxy) for this service and enters the SIP Proxy Configuration Mode. Default is disabled.
Product
SCM (SIP Proxy)
Privilege
Administrator
Syntax
[ default | no ] rfc3261-proxy
default | no
Disables RFC3261 proxy in this service.
Usage
Use this command to enable the Sip Proxy feature and enter the SIP Proxy Configuration Mode.
Entering this command results in the following prompt:
[context_name]hostname(config-cscf-service-rfc3261-proxy)#
SIP Proxy Configuration Mode commands are defined in the CSCF SIP Proxy Configuration Mode Commands chapter in this guide.
Important: The SIP Proxy is a license-enabled function of the Session Control Manager. Only one function (P-CSCF, S-CSCF, E-CSCF, SIP Proxy, or A-BG) can be enabled per service.
 
serving-cscf
Enables Serving-CSCF for the service and enters the Serving-CSCF Command Mode. Default is disabled.
Product
SCM (S-CSCF)
Privilege
Administrator
Syntax
[ no ] serving-cscf
no
Disables S-CSCF for the service.
Usage
Use this command to enable the Serving-CSCF feature and enter the Serving-CSCF Configuration Mode.
Entering this command results in the following prompt:
[context_name]hostname(config-cscf-service-serving-cscf)#
Serving-CSCF Configuration Mode commands are defined in the CSCF Serving-CSCF Configuration Mode Commands chapter in this guide.
Important: The Serving-CSCF is a license-enabled function of the Session Control Manager. Only one function (P-CSCF, S-CSCF, E-CSCF, SIP Proxy, or A-BG) can be enabled per service.
 
serving-cscf-list
Configure a list of Serving CSCFs and their capabilities.
Product
SCM
Privilege
Administrator
Syntax
[ no ]serving-cscf-list server { address address | domain domain } { capability value | port num { capability value } }
no trusted-domain-entity address
server { address address | domain domain }
Specifies the S-CSCF server.
address address: IP addresses must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6.
domain domain: Domain names must be entered using from 1 to 80 alpha and/or numeric characters.
capability value
Specifies the capability of the S-CSCF server. value is assigned by the Service Provider and may be an integer from 1 to 999999.
port num
Specifies the port at which service is provided by the S-CSCF server. num may be an integer from 1 to 65535.
no
Removes an entry from this list.
Usage
Use this command to configure a list of Serving CSCFs and their capabilities..
Important: This command can be entered multiple times to identify multiple Serving CSCFs.
Example
The following command adds a S-CSCF with an IP address of 1.2.3.4 and a capability value of 75 to this service’s list:
serving-cscf-list server address 1.2.3.4 capability 75
 
session-timer
Configures the session expiry for sessions (Session will expire at the configured value unless refreshed.) and the minimum number of seconds in a session timer (session-expires) value the system will allow.
Product
SCM
Privilege
Administrator
Syntax
session-timer { min-se sec [ session-expires sec ] | session-expires sec [ min-se sec ] }
default session-timer [ min-se ] [ session-expires ]
no session-timer
min-se sec
Default: 90
Specifies the minimum number of seconds the system will allow a session-expires value in a session request. sec must be an integer value between 90 and the value of the session-expires command.
session-expires sec
Default: 1800 (30 minutes)
Specifies the number of seconds a session is allowed exist before it expires. sec must be an integer value between 90 and 18000.
default session-timer [ min-se ] [ session-expires ]
Returns the command to the default settings.
no
Disables the session timer.
Usage
Use this command to set a session expiry value for all invites generated by the SCM and a minimum value for a session request session timer the system will allow. If a session is requested with a timer of less than this command’s value, the system will reject the request with a “422 Session Interval Too Small” response code.
Example
The following command sets the session expiry for all session generated by the SCM to 60 minutes:
session-timer session-expires 3600
The following command sets the minimum session lifetime value for the service to 270 seconds:
session-timer min-se 270
 
strict-outbound
When enabled, the CSCF rejects registration without outbound parameters from an already registered AoR (the AoR would have included outbound parameters in a previous registration). When disabled, the CSCF allows registration without outbound parameters from the previously registered AoR.
Product
SCM
Privilege
Administrator
Syntax
[ no ] strict-outbound
no
Disables the feature. This is the default behavior.
Usage
Use this command to reject registration from a previously registered AoR if the AoR fails to register with outbound parameters but included them in the previous registration.
 
subscriber-policy-override
Configures the system to allow the subscriber-based policy to override the service-based policy. Default is disabled.
Product
SCM
Privilege
Administrator
Syntax
[ default | no ] subscriber-policy-override
default | no
Removes the subscriber policy override from the service.
Usage
By default, if a conflict occurs between the subscriber-based policy and the service-based policy, the service policy takes precedence. Use this command to override the default behavior of the system and allow the subscriber-based policy to overrule the service policy.
 
subscription
Enables the registration event package for the service and configures a system-wide subscription lifetime for all subscribers to the service.
Product
SCM
Privilege
Administrator
Syntax
subscription package reg [ lifetime { default sec | max sec [ default sec ] | min sec [ max sec ] [ default sec ] } ]
[ default | no ] subscription package reg
package reg lifetime { default sec | max sec | min sec }
default sec: Specifies the default amount of time that a subscription can exist on the system. sec must be an integer from 60 to max sec -1. Default is 3761. default sec must be < or = to max sec and > or = to min sec.
The following keywords are specific to the S-CSCF functionality:
max sec: Specifies the maximum amount of time that a subscription can exist on the system. sec must be an integer from 60 to 2147483646. Default is 86400. max sec must be > or = to min sec.
min sec: Specifies the minimum amount of time that a subscription can exist on the system. sec must be an integer from 60 to max sec -1. Default is 60. min sec must be < or = to max sec.
default
Returns the command to the default settings.
no
Disables the registration event package for the service.
Usage
Use this command to enable the registration event package for the service and control the amount of time subscriptions are allowed to exist on this service.
The system responds to subscriptions in the following manner:
Using default values:
If a subscription is received missing the “Expires” value, or the value is malformed, the service will automatically respond with 3761 in the 200OK message.
Example
The following command configures the maximum subscription lifetime to 43200 (12 hours):
subscription package reg lifetime max 43200
 
tcp-proxy
Enables SIP TCP proxy for the CSCF service.
Product
SCM
Privilege
Administrator
Syntax
tcp-proxy [ port port_number ]
no tcp-proxy
port port_number
Default: 5062
Specifies the port used for SIP TCP proxy connections.
port_number must be an integer from 1 to 65534.
no
Disables SIP TCP proxy for the CSCF service
Usage
Use this command to enable SIP TCP proxy for the CSCF service.
Example
Enables SIP TCP proxy for the CSCF service on port 5062:
tcp-proxy port5062
Disables SIP TCP proxy for the CSCF service:
no tcp-proxy
 
threshold
Configures the number of route failures that will trigger an alarm.
Product
SCM
Privilege
Administrator
Syntax
threshold route-failures high_thresh [ clear low_thresh ]
default threshold route-failures
route-failures high_thresh
Default: 5
The high threshold number of route failures that must be met or exceeded within the polling interval to generate an alert or alarm. high_thresh can be configured to any integer value between 0 and 60000.
clear low_thresh
Default: 5
The low threshold number of route failures that must be met or exceeded within the polling interval to clear an alert or alarm. low_thresh can be configured to any integer value between 0 and 60000.
Important: This value is ignored for the Alert model. In addition, if this value is not configured for the Alarm model, the system assumes it is identical to the high threshold.
default threshold route-failures
Returns the command to the default settings.
Usage
Use this command to set an alert or an alarm when the number of route failures exceeds the configured level.
Alerts or alarms are triggered for the number of registration reply errors on the following rules:
Example
The following command configures a route failures threshold of 1000 and a low threshold of 500 for a system using the Alarm thresholding model:
threshold route-failures 1000 clear 500
 
timeout
Sets timeout values for CSCF and SIP transactions.
Product
SCM
Privilege
Administrator
Syntax
timeout { hss-wait sec | no-answer sec | policy-interface sec | sip { 3gpp-d sec | 3gpp-t1 msec | 3gpp-t2 sec | 3gpp-t4 sec | d sec | idle-tcp-connection msec | invite-expiry sec | t1 msec | t2 sec | t4 sec } }
timeout { hss-wait | no-answer | policy-interface | sip { 3gpp-d | 3gpp-t1 | 3gpp-t2 | 3gpp-t4 | d | idle-tcp-connection msec | invite-expiry | t1 | t2 | t4 } }
hss-wait sec
Default: 5
This timer is used by S-CSCF with HSS interface for timeout.
sec must be an integer from 0 to 2147483646.
no-answer sec
Default: 100
This timer is specially used for No-Answer Call Feature executed by S-CSCF. The timer will be started as soon as 180 Ringing response is received and No-Answer call feature is enabled. The value of this timer should be always less than INVITE Timeout used by DC-SIP.
sec must be an integer from 0 to 2147483646.
policy-interface sec
Default: 5
This timer is used by the P-CSCF/A-BG with Policy interface for timeout.
sec must be an integer from 0 to 2147483646.
sip { 3gpp-d sec | 3gpp-t1 msec | 3gpp-t2 sec | 3gpp-t4 sec | d sec | idle-tcp-connection msec | invite-expiry sec | t1 msec | t2 sec | t4 sec }
Sets transaction and expiry timers for SIP.
3gpp-d sec: This timer is used to control the retransmission of 200OK messages to INVITEs after an ACK is sent. The ACK transaction is cleared after this period. This timer is applicable only for unreliable transport. sec must be an integer from 0 to 2147483646. Default: 64*T1 (128 seconds, recommended minimum)
3gpp-t1 msec: This timer is used to control the time interval between each retransmission. The interval doubles after each retransmission. This is used by P-CSCF/A-BG only when it sending message toward the UE. Example: T1, 2T1, 4T2, etc. This timer is applicable only for unreliable transport. msec must be an integer from 0 to 4294967294. Default: 2000 ms (2 secs, recommended minimum).
3gpp-t2 sec: This timer is used to control the period for which the request continues to get retransmitted. This is used by P-CSCF/A-BG only when it sending message toward the UE. This timer is applicable both for reliable and unreliable transport. sec must be an integer from 0 to 2147483646. Default: 16 seconds (recommended minimum).
3gpp-t4 sec: This timer is used to control the period for which the final response to non-invite transaction should be buffered. The buffered response for the retransmitted non-invite request should be sent within that interval. This timer is applicable only for unreliable transport. sec must be an integer from 0 to 2147483646. Default: 17 seconds (recommended minimum).
d sec: This timer is used to control the retransmission of 200OK to INVITE after ACK is sent. The ACK transaction will be cleared after this interval. This timer is applicable only for unreliable transport. sec must be an integer from 0 to 2147483646. Default: 64*T1 (32 seconds, recommended minimum)
idle-tcp-connection msec: This timer is used for closing idle TCP connections. If there is not activity in the TCP connection for the configuration duration, then the connection will be closed. msec must be an integer from 1000 (recommended minimum) to 4294967294. Default: 42000 milliseconds .
invite-expiry sec: This timer is used by SIP while acting as UA Role and no final response is received for the INVITE request sent. This timer is applicable for both reliable and unreliable transport. sec must be an integer from 0 to 2147483646. Default: 100 seconds (recommended minimum).
t1 msec: Specifies the time interval (in microseconds) between each retransmission. The interval doubles after each retransmission, for example: T1, 2T1, 4T2, etc. This timer is applicable only for unreliable transport. msec must be an integer from 0 to 2147483646. Default: 500 milliseconds (recommended minimum).
t2 sec: This timer is used to control the period for which the request keeps getting retransmitted. This timer is applicable both for reliable and unreliable transport. sec must be an integer from 0 to 2147483646. The recommended minimum value for this parameter is 4 seconds. Default: 64*T1 (32 seconds)
t4 sec: This timer is used to control the period for which the final response to non-invite transaction should be buffered so as to send the buffered response for the retransmitted non-invite request within that interval. This timer is applicable only for unreliable transport. sec must be an integer from 0 to 2147483646. Default: 5 seconds (recommended minimum).
default
Returns the command to the default settings.
Usage
Use this command to configure SIP Stack timers and CSCF service specific timers.
Example
The following command sets the SIP d timer to 64 seconds:
timeout sip d 64
 
transport-switching
Sets the message size that triggers a transport protocol switch.
Product
SCM
Privilege
Administrator
Syntax
transport-switching policy protocol tcp trigger msg-size size
default transport-switching policy protocol tcp trigger msg-size
policy protocol tcp trigger msg-size size
Default: 1300
Specifies the size of the SIP message beyond which transport changes to TCP.
size can be configured to any integer value between 1300 and 65535.
default
Returns the size of the SIP message beyond which transport changes to TCP to 1300 bytes.
Usage
Use this command to configure the size of the SIP message beyond which transport changes to TCP.
Example
Switch to TCP transport protocol when the SIP message size is 4000 bytes or more:
transport-switching policy protocol tcp trigger msg-size 4000
 
trusted-domain-entity
Adds trusted network nodes (or entities) to a table used by this service to identify those nodes that can be trusted with subscriber information.
Product
SCM (S-CSCF)
Privilege
Administrator
Syntax
trusted-domain-entity address [ foreign-network ]
no trusted-domain-entity address
trusted-domain-entity address
Specifies the IP address of the network node identified as a trusted entity by this service. address must be either an IP address or a domain name. IP addresses must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6. Domain names must be entered using from 1 to 80 alpha and/or numeric characters.
foreign-network
Entity belongs to Foreign Network.
no
Removes an entry from this service’s trusted domain table.
Usage
Use this command to identify to the service the network entities that can be trusted with subscriber information by this service.
Important: This command can be entered multiple times to identify multiple trusted network entities.
Example
The following command adds a network node with an IP address of 1.2.3.4 to this service’s trusted domain table:
trusted-domain-entity 1.2.3.4
 
 

Cisco Systems Inc.
Tel: 408-526-4000
Fax: 408-527-0883