- IGMP Profile Configuration Mode Commands
- IKEv2 Security Association Configuration Mode Commands
- IMEI Profile Configuration Mode
- IMEI-TAC-Group Configuration Mode Commands
- IMS Authorization Service Configuration Mode Commands
- IMS Sh Service Configuration Mode Commands
- IPMS Client Configuration Mode Commands
- IPNE Endpoint Configuration Mode Commands
- IPNE Service Configuration Mode Commands
- IPSec Transform Set Configuration Mode Commands
- IPSG RADIUS Snoop Configuration Mode Commands
- IPSG RADIUS Server Configuration Mode Commands
- IPSP Configuration Mode Commands
- IPv6 ACL Configuration Mode Commands
- IPv6 to IPv4 Tunnel Interface Configuration Mode Commands
- IP VRF Context Configuration Mode Commands
- ISAKMP Configuration Mode Commands
- IuPS Service Configuration Mode Commands
- LAC Service Configuration Mode Commands
- Line Configuration Mode Commands
- Link Configuration Mode Commands
- Linkset Configuration Mode Commands
- LMA Service Configuration Mode Commands
- LNS Service Configuration Mode Commands
- Local Policy Actiondef Configuration Mode Commands
- Local Policy Eventbase Configuration Mode Commands
- Local Policy Ruledef Configuration Mode Commands
- Local Policy Service Configuration Mode Commands
- Location Service Configuration Mode Commands
- Logical eNode Configuration Mode Commands
- Loopback Interface Configuration Mode Commands
- LTE Custom TAI List Configuration Mode Commands
- LTE Emergency Profile Configuration Mode Commands
- LTE Forbidden Location Area Configuration Mode Commands
- LTE Forbidden Tracking Area Configuration Mode Commands
- LTE Foreign PLMN GUTI Management Database Configuration Mode Commands
- LTE HeNBGW MME Pool Configuration Mode Commands
- LTE Handover Restriction List Configuration Mode Commands
- LTE MME HeNB-GW Management Database Configuration Mode Commands
- LTE Network Global MME ID Management Database Configuration Mode Commands
- LTE Paging Map Configuration Mode Commands
- LTE Paging Profile Configuration Mode Commands
- LTE Peer Map Configuration Mode Commands
- LTE Policy Configuration Mode Commands
- LTE Subscriber Map Configuration Mode Commands
- LTE TAI Management Database Configuration Mode Commands
- LTE TAI Management Object Configuration Mode Commands
- MAG Service Configuration Mode Commands
- MAP Service Configuration Mode Commands
- MIP HA Assignment Table Configuration Mode Commands
- MPLS-LDP Configuration Mode Commands
- MIPv6 HA Service Configuration Mode Commands
- MME-eMBMS Service Configuration Mode Commands
- MME LAC Pool Area Configuration Mode Commands
- MME MSC Pool Area Configuration Mode
- MME SGs Service Configuration Mode Commands
- MME Service Configuration Mode Commands
- MPLS-IP Configuration Mode Commands
- MRME Service Configuration Mode Commands
- Network Service Entity- IP Local Configuration Mode Commands
- Network Service Entity - Peer NSEI Configuration Mode Commands
- Network Service Virtual Connection Configuration Mode Commands
- Network Service Virtual Link Configuration Mode Commands
- NTP Configuration Mode Commands
- NTSR Pool Configuration Mode Commands
- Operator Policy Configuration Mode
- ORBEM Configuration Mode Commands
- OSPF Configuration Mode Commands
- OSPFv3 Configuration Mode Commands
- OSPF VRF Configuration Mode Commands
- Out-Address Configuration Mode Commands
- P2P Advertisement Server Group Configuration Mode Commands
- PCC-Action-Set Configuration Mode Commands
- PCC-AF-Service Configuration Mode Commands
- PCC-Condition-Group Configuration Mode Commands
- PCC-Data-Service Configuration Mode Commands
- PCC-Event-Notification-Interface-Endpoint Configuration Mode Commands
- PCC-Policy-Service Configuration Mode Commands
- PCC-Service-Profile Configuration Mode Commands
- PCC-QoS-Profile Configuration Mode Commands
- PCC-Quota Service Configuration Mode Commands
- PCC-Sp-Endpoint Configuration Mode Commands
- PCC-Service Addon Configuration Mode Commands
- PCC-TimeDef Configuration Mode Commands
- PCP Configuration Mode Commands
- PCP Policy Control Configuration Mode Commands
- PDIF Service Configuration Mode Commands
- PDG Service Configuration Mode Commands
- PDSN Service Configuration Mode Commands
- PDSN Service RoHC Configuration Mode Commands
- Peer List Configuration Mode Commands
- Peer Profile Configuration Mode Commands
- Peer-Server Configuration Mode Commands
- P-GW Service Configuration Mode Commands
- Policy Control Configuration Mode Commands
- Plugin Configuration Mode Commands
- PVC Configuration Mode Commands
- PVC Interface Configuration Mode Commands
- QCI - QoS Mapping Configuration Mode Commands
- QCI - RAN ID Mapping Configuration Mode Commands
- QoS L2 Mapping Configuration Mode Commands
- QoS Profile Configuration Mode Commands
- Index
PDIF Service Configuration
Mode Commands
The PDIF Service Configuration Mode is used to configure the properties required for a mobile station to interface with a Packet Data Interworking Function (PDIF).
Mode
Exec > Global Configuration > Context Configuration > PDIF Service Configuration
configure > context context_name > pdif-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-pdif-service)#
The commands or keywords/variables that are available are dependent on platform type, product version, and installed license(s).
- aaa attribute
- aaa authentication
- bind
- default
- duplicate-session-detection
- end
- exit
- hss
- ims-sh-service
- ip source-violation
- mobile-ip
- setup-timeout
- username
aaa attribute
Sets the system attributes for AAA messages.
Product
PDIF
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > PDIF Service Configuration
configure > context context_name > pdif-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-pdif-service)#
Syntax
Syntax Description
aaa attribute { 3gpp2-bsid string | 3gpp2-service-option integer | calling-station-id integer | 3gpp2-serving-pcf ip-address } no aaa attribute default aaa attribute 3gpp2-service-option integer
no
Removes a previously configured AAA attribute.
default
Returns the specified aaa attribute to the original default system settings.
3gpp2-bsid string
Specifies the base-station ID and consists of the SID + NID + CELLID.
string must contain 12 hexadecimal upper-case ASCII characters.
3gpp2-service-option integer
Specifies the radius attribute value when sending authentication and accounting messages as an integer from 0 through 32767. Default: 4095
calling-station-id integer
Specifies the calling station phone number as a sequence of 1 through 15 digits.
3gpp2-serving-pcf ip-address
Use this command to generate attribute values without creating a new ASR 5000ASR 5500 image.
Usage Guidelines
If the RADIUS protocol is being used, accounting messages can be sent over a AAA interface to the RADIUS server.
3gpp2-serving-pcf attribute value (if configured) is sent in both RADIUS authentication and accounting messages. If the attribute value is not configured (or explicitly "not configured" using the no keyword), RADIUS attributes are still included with just type and length. This is because inclusion/exclusion of RADIUS attributes are still controlled through the dictionary, not via the CLI.
Examples
aaa attribute 3gpp2-bsid 0ab2389acb3
aaa authentication
Sets the aaa authentication for first and second phase authentication when multiple authentication is configured on the system.
Product
PDIF
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > PDIF Service Configuration
configure > context context_name > pdif-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-pdif-service)#
Syntax
Syntax Description
aaa authentication { { first-phase | second-phase } | { context-name name aaa-group name } } no aaa authentication { first-phase | second-phase }
no aaa authentication { first-phase | second-phase }
Removes any existing authentication configuration.
first-phase context-name name aaa-group name
First phase authentication is mandatory when multiple authentication is configured on the system.
- context-name name: Specifies the context where the aaa server group is defined as an alphanumeric string of 1 through 79 characters.
- aaa-group name: Specifies the name of the aaa-group to be used for authentication as an alphanumeric string of 1 through 79 characters.
second-phase context-name name aaa-group name
- context-name name: Specifies the context where aaa server group is defined as an alphanumeric string of 1 through 79 characters.
- aaa-group name: Specifies the name of the aaa-group to be used for authentication as an alphanumeric string of 1 through 63 characters.
Usage Guidelines
Two phase-authentication happens in IKEv2 setup for setting up the IPSec session. The first authentication uses Diameter AAA EAP method and second authentication uses RADIUS AAA authentication. The same AAA context may be used for both authentications. PDIF service allows you to specify only a single AAA group, which could normally be used for the first authentication method.
A given AAA group only supports either Diameter or RADIUS authentication. If the NAI in the first authentication is different from NAI in the second authentication each NAI can point to a different domain profile in the PDIF. Each domain profile may be configured with each AAA group, one for Diameter and the other for RADIUS.
Examples
first-phase context-name pdif aaa-group aaa-10
bind
Binds the service IP address to a crypto template and configures the number of sessions the PDIF can support.
Product
PDIF
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > PDIF Service Configuration
configure > context context_name > pdif-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-pdif-service)#
Syntax
Syntax Description
bind address address { crypto-template string } [ max-sessions number ] no bind
no
Removes a previously configured binding.
address
Specifies the IP address of the service.
crypto-template string
Specifies the name of the crypto template to be bound to the service as an alphanumeric string of 0 through 127 characters.
max-sessions number
Specifies the maximum number of sessions to be supported by the service as an integer from 0 to 3000000. Default: 3000000
If the max-sessions value is changed on an existing system, the new value takes effect immediately if it is higher than the current value. If the new value is lower than the current value, existing sessions remain established, but no new sessions are permitted until usage falls below the newly-configured value.
Usage Guidelines
Binds the IP address used as the connection point for establishing the IKEv2 sessions to the crypto template. It can also define the number of sessions the PDIF can support.
Examples
bind address 13.1.1.1 crypto-template T1 max-sessions 200000
default
Sets or restores the default condition for the selected parameter.
Product
PDIF
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > PDIF Service Configuration
configure > context context_name > pdif-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-pdif-service)#
Syntax
Syntax Description
default { { aaa attribute 3gpp2-service-option } | duplicate-session-detection | hss { failure-handling mac-address-validation-failure | mac-address-validation | update-profile } | ip source-violation { drop-limit | period } | setup-timeout | subscriber name | username mac-address-stripping } }
aaa attribute 3gpp2-service-option
Configures the default value 4095.
duplicate-session-detection
Configures the default to be NAI-based.
hss { failure-handling mac-address-validation-failure | mac-address-validation | update-profile }
Configures the HSS server defaults:
- mac-address-validation: By default, validating the MAC address is disabled.
- update-profile: By default, updating the PDIF profile is disabled.
ip source-violation ( drop-limit | period }
- drop-limit: Default number of ip source violations permitted in detection period before the call is dropped is 10.
- period: Default detection period is 120 seconds.
setup-timeout
Default call setup time limit is 60 seconds.
subscriber name
Configures the default subscriber name. name is a string of 1-127 characters.
username mac-address-stripping
Default is to disable stripping the MAC address from the username.
Usage Guidelines
Configures the default settings for a given parameter.
Examples
default setup-timeout
duplicate-session-detection
Configures the PDIF to detect duplicate call sessions using old IMSI or NAI addresses and clear old call information.
Product
PDIF
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > PDIF Service Configuration
configure > context context_name > pdif-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-pdif-service)#
Syntax
Syntax Description
[ no | default ] duplicate-session-detection { imsi-based | nai-based }
no
Stops duplicate session detection.
default
Configures the default setting, which is NAI-based detection.
imsi-based
Configures the PDIF to detect duplicate call sessions based on the IMSI address.
nai-based
Configures the PDIF to detect duplicate call sessions based on the NAI address. This is the default setting.
Usage Guidelines
If an MS leaves the Wi-Fi coverage area and subsequently comes back online, it may initiate a new session setup procedure. After both the device authentication with HSS and the subscriber authentication with AAA server are completed, PDIF runs the internal mechanism to see whether there was any other session bound with the same IMSI. If an old session is detected, PDIF starts clearing this old session by sending a proxy-MIP Deregistration request to the HA. PDIF resumes new session setup by sending a proxy-MIP registration request. When the old session is aborted, PDIF sends Diameter STR messages and RADIUS Acct STOP messages to corresponding AAA servers.
PDIF allows duplicate session detection based on either the NAI or IMSI addresses. When detecting based on NAI, it is the first-phase (device authentication) NAI that is used.
Examples
duplicate-session-detection imsi
end
Exits the current configuration mode and returns to the Exec mode.
Product
All
Privilege
Security Administrator, Administrator
Syntax
Syntax Description
end
Usage Guidelines
Use this command to return to the Exec mode.
exit
Exits the current mode and returns to the parent configuration mode.
Product
All
Privilege
Security Administrator, Administrator
Syntax
Syntax Description
exit
Usage Guidelines
Use this command to return to the parent configuration mode.
hss
Configures the Home Subscriber Server (HSS) parameters.
Product
PDIF
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > PDIF Service Configuration
configure > context context_name > pdif-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-pdif-service)#
Syntax
Syntax Description
hss { failure-handling { { mac-address-validation-failure | update-profile } action { terminate | continue } } | update-profile | mac-address-validation } [ no | default ] hss { failure-handling | update-profile | mac-address-validation }
no
Removes a previously configured HSS profile.
default
Resets the defaults for this command.
failure-handling mac-address-validation-failure
Configures how the HSS is to handle errors.
If HSS returns a list of MAC addresses and if PDIF fails to match the subscriber MAC address against the list, the session is always terminated.
action { continue | terminate }
- continue: Ignores a mac-address-validation-failure and continue the session.
- terminate: Terminates the session on a mac-address-validation-failure.
mac-address-validation
If mac-address-validation is enabled, the PDIF queries the HSS for a list of MAC addresses associated with the Mobile Directory Number (MDN). Default: Disabled
update-profile
Update the HSS with the subscriber profile. Default: Disabled
Usage Guidelines
An HSS provides MAC address validation and store part of the subscriber profile. This command enables or disables validation and profile updates, and configures how the system responds to failures: terminate or continue a session.
An ims-sh-service and Diameter interface need to be configured to communicate with the HSS.
Examples
hss mac-address-validation
ims-sh-service
Associates the IMS-Sh-service parameters.
Product
PDIF
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > PDIF Service Configuration
configure > context context_name > pdif-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-pdif-service)#
Syntax
Syntax Description
ims-sh-service name name no ims-sh-service name name
no
Removes a previously configured IMS-Sh-service.
name
Names the IMS-Sh-service in the pdif-service context.
Usage Guidelines
This command is used to name the IMS-Sh-service.
Examples
ims-sh-service name imsi1
ip source-violation
Sets the parameters for IP source validation. Source validation is useful if packet spoofing is suspected or for verifying packet routing and labeling within the network.
Source validation requires that the source address of the received packets matches the IP address assigned to the subscriber (either statically or dynamically) during the session.
Product
PDIF
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > PDIF Service Configuration
configure > context context_name > pdif-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-pdif-service)#
Syntax
Syntax Description
ip source-violation { clear-on-valid-packet | drop-limit num | period secs } no ip source-violation clear-on-valid-packet
clear-on-valid-packet
Configures the service to reset the reneg-limit and drop-limit counters after receipt of a properly addressed packet. Default: disabled
drop-limit num
Sets the number of allowed source violations within a detection period before forcing a call disconnect. If num is not specified, the value is set to the default.
num is an integer from 1 to 1000000. Default: 10
period secs
Sets the length of time (in seconds) for a source violation detection period to last.
If secs is not specified, the value is set to the default.
secs is an integer from 1 to1000000. Default: 120
Usage Guidelines
This function is intended to allow the operator to configure a network to prevent problems such as when a user gets handed back and forth between two PDIFs a number of times during a handoff scenario.
This function operates in the following manner:
When a subscriber packet is received with a source address violation, the system increments the IP source-violation drop-limit counter and starts the timer for the IP-source violation period. Every subsequent packet received with a bad source address during the IP-source violation period causes the drop-limit counter to increment.
For example, if the drop-limit is set to 10, after 10 source violations, the call is dropped. The period timer continues to count throughout this process.
Examples
ip source-violation drop-limit 15
mobile-ip
Sets the MIP FA context for the specific PDIF service.
Product
PDIF
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > PDIF Service Configuration
configure > context context_name > pdif-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-pdif-service)#
Syntax
Syntax Description
mobile-ip foreign-agent context string [ fa-service string ] no mobile-ip
no
Removes previously configured parameters.
foreign-agent context string
Specifies the context name in which the FA is configured as an alphanumeric string of 1 through 79 characters.
fa-service string
Specifies the name of the FA service in the FA context as an alphanumeric string of 1 through 79 characters.
Usage Guidelines
Shows in which context the FA is located and names the FA service.
Examples
mobile-ip foreign-agent context fa1
setup-timeout
Configures the maximum time allowed to set up a session.
Product
PDIF
Privilege
Security-Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > PDIF Service Configuration
configure > context context_name > pdif-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-pdif-service)#
Syntax
Syntax Description
setup-timeout integer default setup-timeout
setup-timeout integer
Specifies the session setup timer (in seconds) as an integer from 2 through 300. Default: 60
default setup-timeout
Defaults the session setup timer to 60 seconds.
Usage Guidelines
PDIF clears both user session and tunnels if a call does not initiate successfully before the timer expires.
Examples
default setup-timeout
username
Configures mac-address-stripping on a username coming in from a mobile station session.
Product
PDIF
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > PDIF Service Configuration
configure > context context_name > pdif-service service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-pdif-service)#
Syntax
Syntax Description
username mac-address-stripping [ default | no ] username mac-address-stripping
username mac-address-stripping
Configures mac-address stripping from the Network Access Identifier (NAI).
default
Configures the default parameter which is disabled.
no
Returns the configuration to the default condition.
Usage Guidelines
When enabled, PDIF strips the MAC address from a mobile username NAI before sending to the RADIUS AAA server.
Examples
no username mac-address-stripping
Feedback