It is recommended that you select the configuration example that best meets your service model, and configure the required elements for that model, as described in Packet Data Serving Node Administration Guide for PDSN/FA service and Home Agent Administration Guide for HA service, before using the procedures in this chapter.Important: The IMS Authorization Service feature described in this chapter is only available if you have purchased and installed a Dynamic Policy Interface feature license on chassis. If you have not previously purchased this enhanced feature, contact your sales representative for more information.
•Important: The system supports IMS authorization for IMS subscribers with Ty interface in cdma2000 networks. IMS authorization support is a license enabled feature and you must obtain and install a license key to enable it.
• Binding Information: The binding information associates a bearer to the IP flows of a session. The binding information is based on IMS session information for IMS sessions and sent by UE. The system receives the binding information from the UE during bearer activation or modification. The binding information consists of flow identifiers, QoS information, and flow description, if any for the IMS session.
• Flow Identifier: In an IMS session an IP flow is indicated uniquely by means of a flow identifier. The flow identifier is created based on the ordinal number of the flow stream and of the IP flow in the session where the IP flows are arranged based on the ports used.
• Binding Mechanism: This mechanism is used to associate a bearer with the IP flow(s) of an IMS session in the PDF.
• Service-based Local Policy (SBLP): This term refers to the instantiation of a policy for use of bearer resources in the access network based on Authorization by a service. In the context of Ty interface this is the combined QoS given to a set of IP flows for an IMS session.
• Service Based Authorization: This term refers to the authorization for use of bearer resources in the access network based on a determination by the application, possibly due to negotiation involving the user. In general, bearer resources are authorized if the resources requested at the bearer do not exceed the resources negotiated or requested at the service level.
• Charging Rule: This is a set of information that contains the key to identify the packet flow(s) and defines how the flow(s) is to be charged. The Traffic Plane Function (TPF)/ PCEF installs the charging rules either statically or dynamically.
• Dynamic Charging Rule: The charging rules that depend upon real time analysis of the IP flow data being negotiated at the time of the session setup.
• Main A10: This is the primary bearer used for all the signaling. The traffic TFTs can be associated with both main A10 and auxiliary A10.
• Auxiliary A10: This is the secondary bearer used for data traffic only.Important: The system does not need any static configuration knowledge of traffic categories (Rating-Groups) dynamically received by CRF/PCRF and packets dropped due to the closure of “gate” are not counted against the quota for the matching category.
The charging rule definitions returned by the PCRF are translated in the policy infrastructure for the AGW. The section Maintaining the Dynamic Policy-Group defines the mapping of different entities in the policy infrastructure for the dynamic policy-group.This section defines the mapping of the Charging-Rule-Install AVP to the dynamic policy-group and related policy infrastructure. The rules for creating a dynamic policy group are as follows:Important: For more information on Class-Map, Policy-Map, and Policy-Group, refer to the Intelligent Traffic Control chapter.
context <name>p-cscf discovery <option>
• context <name>diameter origin endpoint <endpoint_name>diameter dictionary <dictionary_type>failure-handling <handling_option>diameter host-select row-precedence <precedence_value>
• failure-handling specifies the handling of the failure of Enhanced-Policy Decision Function (E-PDF).
• diameter host-select adds or appends rows with primary and/or secondary host name to a Diameter host table with precedence.
• reselect subscriber-limit defines the pacing of the reselection or switching of the Enhanced-Policy Decision Function (E-PDF) after a change occurs in table configuration for an IMS Authorization Service.
• Optional. Define the method or algorithm to select Diameter host table by entering diameter host-select table { 1 | 2 } [ algorithm { ip-address-modulus | msisdn-modulus | round-robin } ]Important: A maximum of 16 authorization services can be configured globally in the system. There is also a system limit for maximum number of total configured services.
Step 1Important: For more information on keywords/options of the show ims-authorization command, refer to the Executive Mode Commands chapter in Command Line Interface Reference.
Step 2 Save your configuration as described in Saving Your Configuration chapter.context <name>pdsn-service <pdsn_svc_name>show dynamic-policy statistics pdsn-service <pdsn_svc_name>
Step 2 Save your configuration as described in Saving Your Configuration chapter.qos user-datagram dscp-marking <dscp_code>class-map name <class_name>policy-group name <policy_group>
• Save your configuration as described in Saving Your Configuration chapter.This configuration example assumes that you are at the context configuration mode level of the same context as specified in the Configuring IMS Authorization Service sectioncontext <name>subscriber name <subs_name>ims-auth-service <ims_auth_name>
• context <context_name>
Step 2 Save your configuration as described in Saving Your Configuration chapter.
![]() |
Cisco Systems Inc. |
Tel: 408-526-4000 |
Fax: 408-527-0883 |