Important: The commands or keywords/variables that are available are dependent on platform type, product version, and installed license(s).
name must be from 1 to 63 alpha and/or numeric characters.
Important: This command should only be issued in the core service configuration, however, multiple access services may be configured per core service.
3gpp-geran: 3GPP Access Type
3gpp-utran-fdd: 3GPP Access Type
3gpp-utran-tdd: 3GPP Access type
3gpp2-1x: 3GPP2 Access Type
3gpp2-1x-hrpd: 3GPP2 Access Type
adsl: FixedLine Access Type
adsl2: FixedLine Access Type
adsl2p: FixedLine Access Type ADSL2+
gshdsl: FixedLine Access Type G.SHDSL
hdsl: FixedLine Access Type
hdsl2: FixedLine Access Type
idsl: FixedLine Access Type
ieee-80211: WLAN Access Type
ieee-80211a: WLAN Access Type
ieee-80211b: WLAN Access Type
ieee-80211g: WLAN Access Type
ieee-80216e: Wireless MAN Access Type
radsl: FixedLine Access Type
sdsl: FixedLine Access Type
vdsl: FixedLine Access Type
ue-ip-address-range name ue_ip_name { address ip_address_mask | range start_ip_address end_ip_address }
ue_ip_name must be from 1 to 79 alpha and/or numeric characters.
address ip_address_mask: Specifies a combined IP address subnet mask bits to indicate what IP addresses the specific access-type applies to.
ip_address_mask must be specified using the form “IP Address/Mask Bits” where the IP address must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6, and the mask bits are a numeric value, which is the number of bits in the subnet mask.
range start_ip_address end_ip_address: Configure UE IP range for specific access-type.
•
|
ip_address must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6.
|
Important: Use the
sip-header command to enable SIP P-Access-Network-Info (PANI) header insertion. CSCF Proxy-CSCF Configuration Mode commands are defined in the
CSCF Proxy-CSCF Configuration Mode Commands chapter in this guide.
bind address ip_address [ access-ipsec-crypto-template template ] [ cscf-hostname host_name ] [ max-sessions max# ] [ port number ] [ reserved-call-capacity percentage] [ transport tcp ] [ use-serviceport-towards-network ]
ip_address must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6.
template must be an existing IPSec CSCF crypto template and be from 1 to 127 alpha and/or numeric characters.
Important: The IPSec CSCF crypto template should be configured in the same context in which the P-CSCF is configured.
host_name must be an existing CSCF service name and be from 1 to 127 alpha and/or numeric characters.
Important: If this keyword is not configured, SIP headers will contain the IP address of the CSCF service instead of the domain name.
max# must be configured to any integer value from 0 to 500,000.
Important: The total session capacity of the system is 500,000.
max-sessions is also limited by the capacity in the license generated for the service. If licenses for PDSN/GGSN/HA are generated for
x number of sessions, then the license for the CSCF service will be generated at 500,000-
x. Hardware configuration and installed features can also affect the maximum number of sessions that can be supported.
number must be an integer value from 1 to 65534.
percentage must be an integer value from 1 to 50.
Important: Multiple keywords can be used per bind command.
[context_name]
hostname(config-cscf-charging)#
CSCF Charging Configuration Mode commands are defined in the CSCF Charging Configuration Mode Commands chapter in this guide.
[ no ] cnsa-media-profile profile_id cscf-service-policy policy_name content-type { application-3gpp-ims-xml | application-pidf-diff-xml | application-pidf-partial-xml | application-pidf-xml | application-reginfo-xml | application-sdp | application-xml | message-sipfrag | multipart-mixed | multipart-related | text-plain }
profile_id must be an integer from 0 to 10 and be an existing media profile id in the system. CNSA media profile ids are created and maintained in the CSCF ISC Template Configuration Mode.
policy_name must be from 1 to 63 alpha and/or numeric characters and be an existing policy name in the system. Service policies are created and maintained in the CSCF Policy Configuration Mode.
application-3gpp-ims-xml - format for exchanging information in SIP Requests and Responses as used within the 3GPP IM CN Subsystem
application-pidf-diff-xml - contains changed presence elements. Contains full presence document when there are many changes
application-pidf-partial-xml - contains only changed parts of PIDF-based presence information
application-pidf-xml - XML MIME entity that contains presence information
application-reginfo-xml - used in Notifications to SIP user agents about registration expiry
application-sdp - SDP session description
application-xml - content type for generic xml documents
message-sipfrag - contains subsets of well formed SIP messages
multipart-mixed - intended for use when the body parts are independent and need to be bundled in a particular order
multipart-related - intended for compound objects consisting of several inter-related body parts
Important: You may specify multiple types of content.
The following command defines the media profile id as 2 and assigns it to
serv_policy3 with plain text content type.
service_name must be from 1 to 80 alpha and/or numeric characters.
alias is the name of the domain for this service and must be from 1 to 79 alpha and/or numeric characters in length.
[context_name]
hostname(config-cscf-service-emergency-cscf)#
Emergency-CSCF Configuration Mode commands are defined in the CSCF Emergency-CSCF Configuration Mode Commands chapter in this guide.
Important: Only one function (P-CSCF, S-CSCF, E-CSCF, SIP Proxy, or A-BG) can be enabled per service.
keepalive [ expire-timer sec [ max-retry num ] | max-retry num [ expire-timer sec ] | method { crlf | stun } [ expire-timer sec [ max-retry num ] | max-retry num [ expire-timer sec ] ] ]
sec must be an integer from 24 to 150.
num must be an integer from 1 to 10.
crlf: “\r\n” string (CRLF packets) sent by UE
stun: STUN protocol messages (rfc3489-bis)
endpoint_name must be a string of 1 through 63 characters in length.
peer_name must be a string of 1 through 63 characters in length.
peer_realm must be a string of 1 through 63 characters in length.
secondary-peer sec_peer_name
sec_peer_name must be a string of 1 through 63 characters in length.
sec-peer-realm sec_peer_realm
sec_peer_realm must be a string of 1 through 63 characters in length.
limit must be an integer from 1024 to 65535.
Important: Maximum SIP message size should be more than the message-max-size set in the CSCF Proxy-CSCF Configuration Mode.
nat-policy policy_name {
private-address {
address ip_address_mask |
default | range start_ip_address end_ip_address } |
bridge-network {
address ip_address_mask |
range start_ip_address end_ip_address }
policy_name must be from 1 to 79 alpha and/or numeric characters.
private-address { address ip_address_mask | default|range start_ip_address end_ip_address }
address ip_address_mask: Address for nat-policy policy type for nat-pool. Specifies a combined IP address subnet mask bits to indicate what IP addresses the specific policy type applies to.
ip_address_mask must be specified using the form “IP Address/Mask Bits” where the IP address must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6, and the mask bits are a numeric value, which is the number of bits in the subnet mask.
default: Default for nat-policy policy type for nat-pool. Default is defined as the address range specified by rfc1918.
range start_ip_address end_ip_address: Range for nat-policy policy type for nat-pool.
•
|
ip_address must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6.
|
bridge-network { address ip_address_mask | range start_ip_address end_ip_address }
address ip_address_mask: Address for bridge-network policy type for S-CSCF bridging. Specifies a combined IP address subnet mask bits to indicate what IP addresses the specific policy type applies to.
ip_address_mask must be specified using the form “IP Address/Mask Bits” here the IP address must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6, and the mask bits are a numeric value, which is the number of bits in the subnet mask.
range start_ip_address end_ip_address: Range for bridge-network policy type for S-CSCF bridging.
•
|
ip_address must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6.
|
The following command identifies the NAT policy named policy1 with a private-address policy type of
10.10.10.10 255.255.255.0:
nat-policy policy1 private-address address 10.10.10.10 255.255.255.0
The following command identifies the NAT policy named policy2 with a private-address range policy type of
172.162.23.23 172.162.23.230:
nat-policy policy2 private-address address 172.162.23.23 172.162.23.230
pool_name must be from 1 to 32 alpha and/or numeric characters.
Important: NAT pools are created in Context Configuration Mode with the
ip pool command.
percent is an integer value from 1 to 25.
Important: When congestion is triggered, new CSCF calls are not rejected.
name must be from 1 to 79 alpha and/or numeric characters and be an existing policy name in the system. Service policies are created and maintained in the CSCF Policy Configuration Mode.
[context_name]
hostname(config-cscf-service-proxy-cscf)#
Proxy-CSCF Configuration Mode commands are defined in the CSCF Proxy-CSCF Configuration Mode Commands chapter in this guide.
Important: The Proxy-CSCF is a license-enabled function of the Session Control Manager. Only one function (P-CSCF, S-CSCF, E-CSCF, SIP Proxy, or A-BG) can be enabled per service.
[context_name]
hostname(config-cscf-service-rfc3261-proxy)#
SIP Proxy Configuration Mode commands are defined in the CSCF SIP Proxy Configuration Mode Commands chapter in this guide.
Important: The SIP Proxy is a license-enabled function of the Session Control Manager. Only one function (P-CSCF, S-CSCF, E-CSCF, SIP Proxy, or A-BG) can be enabled per service.
[context_name]
hostname(config-cscf-service-serving-cscf)#
Serving-CSCF Configuration Mode commands are defined in the CSCF Serving-CSCF Configuration Mode Commands chapter in this guide.
Important: The Serving-CSCF is a license-enabled function of the Session Control Manager. Only one function (P-CSCF, S-CSCF, E-CSCF, SIP Proxy, or A-BG) can be enabled per service.
[ no ]
serving-cscf-list server {
address address |
domain domain } {
capability value |
port num {
capability value } }
server { address address | domain domain }
address address: IP addresses must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6.
domain domain: Domain names must be entered using from 1 to 80 alpha and/or numeric characters.
Specifies the capability of the S-CSCF server. value is assigned by the Service Provider and may be an integer from 1 to 999999.
Important: This command can be entered multiple times to identify multiple Serving CSCFs.
The following command adds a S-CSCF with an IP address of 1.2.3.4 and a capability value of
75 to this service’s list:
default sec: Specifies the default amount of time that a subscription can exist on the system.
sec must be an integer from 60 to max sec -1. Default is 3761. default sec must be < or = to max sec and > or = to min sec.
max sec: Specifies the maximum amount of time that a subscription can exist on the system.
sec must be an integer from 60 to 2147483646. Default is 86400. max sec must be > or = to min sec.
min sec: Specifies the minimum amount of time that a subscription can exist on the system.
sec must be an integer from 60 to max sec -1. Default is 60. min sec must be < or = to max sec.
port_number must be an integer from 1 to 65534.
Important: This value is ignored for the Alert model. In addition, if this value is not configured for the Alarm model, the system assumes it is identical to the high threshold.
The following command configures a route failures threshold of 1000 and a low threshold of
500 for a system using the Alarm thresholding model:
timeout { hss-wait sec | no-answer sec | policy-interface sec | sip { 3gpp-d sec | 3gpp-t1 msec | 3gpp-t2 sec | 3gpp-t4 sec | d sec | idle-tcp-connection msec | invite-expiry sec | t1 msec | t2 sec | t4 sec } }
sec must be an integer from 0 to 2147483646.
sec must be an integer from 0 to 2147483646.
sec must be an integer from 0 to 2147483646.
sip { 3gpp-d sec | 3gpp-t1 msec | 3gpp-t2 sec | 3gpp-t4 sec | d sec | idle-tcp-connection msec | invite-expiry sec | t1 msec | t2 sec | t4 sec }
•
|
3gpp-d sec: This timer is used to control the retransmission of 200OK messages to INVITEs after an ACK is sent. The ACK transaction is cleared after this period. This timer is applicable only for unreliable transport. sec must be an integer from 0 to 2147483646. Default: 64*T1 (128 seconds, recommended minimum)
|
•
|
3gpp-t1 msec: This timer is used to control the time interval between each retransmission. The interval doubles after each retransmission. This is used by P-CSCF/A-BG only when it sending message toward the UE. Example: T1, 2T1, 4T2, etc. This timer is applicable only for unreliable transport. msec must be an integer from 0 to 4294967294. Default: 2000 ms (2 secs, recommended minimum).
|
•
|
3gpp-t2 sec: This timer is used to control the period for which the request continues to get retransmitted. This is used by P-CSCF/A-BG only when it sending message toward the UE. This timer is applicable both for reliable and unreliable transport. sec must be an integer from 0 to 2147483646. Default: 16 seconds (recommended minimum).
|
•
|
3gpp-t4 sec: This timer is used to control the period for which the final response to non-invite transaction should be buffered. The buffered response for the retransmitted non-invite request should be sent within that interval. This timer is applicable only for unreliable transport. sec must be an integer from 0 to 2147483646. Default: 17 seconds (recommended minimum).
|
•
|
d sec: This timer is used to control the retransmission of 200OK to INVITE after ACK is sent. The ACK transaction will be cleared after this interval. This timer is applicable only for unreliable transport. sec must be an integer from 0 to 2147483646. Default: 64*T1 (32 seconds, recommended minimum)
|
•
|
idle-tcp-connection msec: This timer is used for closing idle TCP connections. If there is not activity in the TCP connection for the configuration duration, then the connection will be closed. msec must be an integer from 1000 (recommended minimum) to 4294967294. Default: 42000 milliseconds .
|
•
|
invite-expiry sec: This timer is used by SIP while acting as UA Role and no final response is received for the INVITE request sent. This timer is applicable for both reliable and unreliable transport. sec must be an integer from 0 to 2147483646. Default: 100 seconds (recommended minimum).
|
•
|
t1 msec: Specifies the time interval (in microseconds) between each retransmission. The interval doubles after each retransmission, for example: T1, 2T1, 4T2, etc. This timer is applicable only for unreliable transport. msec must be an integer from 0 to 2147483646. Default: 500 milliseconds (recommended minimum).
|
•
|
t2 sec: This timer is used to control the period for which the request keeps getting retransmitted. This timer is applicable both for reliable and unreliable transport. sec must be an integer from 0 to 2147483646. The recommended minimum value for this parameter is 4 seconds. Default: 64*T1 (32 seconds)
|
•
|
t4 sec: This timer is used to control the period for which the final response to non-invite transaction should be buffered so as to send the buffered response for the retransmitted non-invite request within that interval. This timer is applicable only for unreliable transport. sec must be an integer from 0 to 2147483646. Default: 5 seconds (recommended minimum).
|
size can be configured to any integer value between 1300 and 65535.
Specifies the IP address of the network node identified as a trusted entity by this service. address must be either an IP address or a domain name. IP addresses must be expressed in dotted decimal notation for IPv4 or colon notation for IPv6. Domain names must be entered using from 1 to 80 alpha and/or numeric characters.
Important: This command can be entered multiple times to identify multiple trusted network entities.