- IGMP Profile Configuration Mode Commands
- IKEv2 Security Association Configuration Mode Commands
- IMEI Profile Configuration Mode
- IMEI-TAC-Group Configuration Mode Commands
- IMS Authorization Service Configuration Mode Commands
- IMS Sh Service Configuration Mode Commands
- IPMS Client Configuration Mode Commands
- IPNE Endpoint Configuration Mode Commands
- IPNE Service Configuration Mode Commands
- IPSec Transform Set Configuration Mode Commands
- IPSG RADIUS Snoop Configuration Mode Commands
- IPSG RADIUS Server Configuration Mode Commands
- IPSP Configuration Mode Commands
- IPv6 ACL Configuration Mode Commands
- IPv6 to IPv4 Tunnel Interface Configuration Mode Commands
- IP VRF Context Configuration Mode Commands
- ISAKMP Configuration Mode Commands
- IuPS Service Configuration Mode Commands
- LAC Service Configuration Mode Commands
- Line Configuration Mode Commands
- Link Configuration Mode Commands
- Linkset Configuration Mode Commands
- LMA Service Configuration Mode Commands
- LNS Service Configuration Mode Commands
- Local Policy Actiondef Configuration Mode Commands
- Local Policy Eventbase Configuration Mode Commands
- Local Policy Ruledef Configuration Mode Commands
- Local Policy Service Configuration Mode Commands
- Location Service Configuration Mode Commands
- Logical eNode Configuration Mode Commands
- Loopback Interface Configuration Mode Commands
- LTE Custom TAI List Configuration Mode Commands
- LTE Emergency Profile Configuration Mode Commands
- LTE Forbidden Location Area Configuration Mode Commands
- LTE Forbidden Tracking Area Configuration Mode Commands
- LTE Foreign PLMN GUTI Management Database Configuration Mode Commands
- LTE HeNBGW MME Pool Configuration Mode Commands
- LTE Handover Restriction List Configuration Mode Commands
- LTE MME HeNB-GW Management Database Configuration Mode Commands
- LTE Network Global MME ID Management Database Configuration Mode Commands
- LTE Paging Map Configuration Mode Commands
- LTE Paging Profile Configuration Mode Commands
- LTE Peer Map Configuration Mode Commands
- LTE Policy Configuration Mode Commands
- LTE Subscriber Map Configuration Mode Commands
- LTE TAI Management Database Configuration Mode Commands
- LTE TAI Management Object Configuration Mode Commands
- MAG Service Configuration Mode Commands
- MAP Service Configuration Mode Commands
- MIP HA Assignment Table Configuration Mode Commands
- MPLS-LDP Configuration Mode Commands
- MIPv6 HA Service Configuration Mode Commands
- MME-eMBMS Service Configuration Mode Commands
- MME LAC Pool Area Configuration Mode Commands
- MME MSC Pool Area Configuration Mode
- MME SGs Service Configuration Mode Commands
- MME Service Configuration Mode Commands
- MPLS-IP Configuration Mode Commands
- MRME Service Configuration Mode Commands
- Network Service Entity- IP Local Configuration Mode Commands
- Network Service Entity - Peer NSEI Configuration Mode Commands
- Network Service Virtual Connection Configuration Mode Commands
- Network Service Virtual Link Configuration Mode Commands
- NTP Configuration Mode Commands
- NTSR Pool Configuration Mode Commands
- Operator Policy Configuration Mode
- ORBEM Configuration Mode Commands
- OSPF Configuration Mode Commands
- OSPFv3 Configuration Mode Commands
- OSPF VRF Configuration Mode Commands
- Out-Address Configuration Mode Commands
- P2P Advertisement Server Group Configuration Mode Commands
- PCC-Action-Set Configuration Mode Commands
- PCC-AF-Service Configuration Mode Commands
- PCC-Condition-Group Configuration Mode Commands
- PCC-Data-Service Configuration Mode Commands
- PCC-Event-Notification-Interface-Endpoint Configuration Mode Commands
- PCC-Policy-Service Configuration Mode Commands
- PCC-Service-Profile Configuration Mode Commands
- PCC-QoS-Profile Configuration Mode Commands
- PCC-Quota Service Configuration Mode Commands
- PCC-Sp-Endpoint Configuration Mode Commands
- PCC-Service Addon Configuration Mode Commands
- PCC-TimeDef Configuration Mode Commands
- PCP Configuration Mode Commands
- PCP Policy Control Configuration Mode Commands
- PDIF Service Configuration Mode Commands
- PDG Service Configuration Mode Commands
- PDSN Service Configuration Mode Commands
- PDSN Service RoHC Configuration Mode Commands
- Peer List Configuration Mode Commands
- Peer Profile Configuration Mode Commands
- Peer-Server Configuration Mode Commands
- P-GW Service Configuration Mode Commands
- Policy Control Configuration Mode Commands
- Plugin Configuration Mode Commands
- PVC Configuration Mode Commands
- PVC Interface Configuration Mode Commands
- QCI - QoS Mapping Configuration Mode Commands
- QCI - RAN ID Mapping Configuration Mode Commands
- QoS L2 Mapping Configuration Mode Commands
- QoS Profile Configuration Mode Commands
- Index
MRME Service Configuration
Mode Commands
Mode
The MRME Service Configuration Mode provides commands to enable a trusted WLAN network to provide access to the Evolved Packet Core (EPC) using a AAA peer functionality.
Exec > Global Configuration > Context Configuration > MRME Service Configuration
configure > context context_name > mrme-service mrme_service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-mrme-service)#
Available commands or keywords/variables vary based on platform type, product version, and installed license(s).
aaa
This command allows you to control the range of EAP-payload size, or restrict the Framed-MTU AVP from being forwarded in the Auth-Request message to the AAA server.
Product
SaMOG
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > MRME Service Configuration
configure > context context_name > mrme-service mrme_service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-mrme-service)#
Syntax
Syntax Description
aaa send framed-mtu eap_payload_size no aaa send framed-mtu
no
Disables SaMOG from forwarding Framed-MTU AVP in the Auth-Request message to the AAA server.
eap_payload_size
Specifies the EAP payload limit for the AAA server to use during the Auth-Response on the link between the NAS and the peer.
twan_profile_name must be an integer from 64 through 1500.
Usage Guidelines
This command enables SaMOG to support EAP TLS and EAP TTLS-based authentication. Use this command to control the range of EAP-payload size, or restrict the Framed-MTU AVP from being forwarded in the Auth-Request to the AAA server.
Examples
The following command sets the EAP payload size to 1000:
aaa send framed-mtu 1000
associate
This command associates one or more TWAN profile with this MRME service.
Product
SaMOG
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > MRME Service Configuration
configure > context context_name > mrme-service mrme_service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-mrme-service)#
Syntax
Syntax Description
[ no ] associate twan-profile twan_profile_name
no
Removes the association of the TWAN profile with the MRME service.
twan_profile_name
Specifies the twan profile to associate with the MRME service.
twan_profile_name must be an integer from 1 through 64.
Usage Guidelines
Use this command to associate one or more TWAN profile with the MRME service. Once a TWAN profile is associated with the MRME service, SaMOG uses the Radius clients and access type for the clients configured under the TWAN Profile while processing the Radius messages from WLC.
For more information on configuring the Radius clients and access type, refer the TWAN Profile Configuration Mode Commands section.
Examples
The following command associates the TWAN profile twan1 with this MRME service.
associate twan-profile twan1
attribute
This command allows you to include SSID and Calling-Stationd-Id AVP values as part of DER messages over STa Interfaces.
Product
SaMOG
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > MRME Service Configuration
configure > context context_name > mrme-service mrme_service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-mrme-service)#
Syntax
Syntax Description
attribute sta { anid { called-station-id | ssid | ssid-wlan-prefix | wlan-string } | calling-station-id { imsi | ue-mac } } default attribute sta { anid | calling-station-id }
default
Sets the configuration to its default value.
Default calling-station-id: imsi
Default anid: wlan-string
anid { called-station-id | ssid | ssid-wlan-prefix | wlan-string }
Specifies to include the information from the ANID AVP in the DER message.
called-station-id: Include the called station ID from the WLC/AP in the ANID AVP.
ssid: Include the SSID information from the ANID AVP.
ssid-wlan-prefix: Include the SSID WLAN prefix information from the ANID AVP.
wlan-string: Include the WLAN string information from the ANID AVP.
calling-station-id { imsi | ue-mac }
Specifies to include the calling station ID in the DER message.
imsi: Include the IMSI information.
ue-mac: Include the UE MAC information.
Usage Guidelines
Use this command to include the received SSID and Calling-Station-Id values in the ANID/ Calling-Station-Id AVP as part of DER messages over STa Interfaces.
Examples
The following command includes ue-mac information from the calling-station-id in the DER message.
attribute sta calling-station-id ue-mac
bind
This command allows you to configure an IPv4 and/or IPv6 address to be used as the connection point for establishing SaMOG sessions to handle authentication and accounting messages.
Product
SaMOG
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > MRME Service Configuration
configure > context context_name > mrme-service mrme_service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-mrme-service)#
Syntax
Syntax Description
Release 19 and later:
bind { ipv4-address ipv4_address [ ipv6-address ipv6_address ] | ipv6-address ipv6_address [ ipv4-address ipv4_address ] }[ auth-port auth_port_number ] [ acct-port acct_port_number ] [ max-subscribers max_subscriber_number ]
no bind { ipv4-address [ ipv6-address ] | ipv6-address [ ipv4-address ] }
Release 18 and earlier:
bind address ipv4_address [ auth-port auth_port_number ] [ acct-port acct_port_number ] [ max-subscribers max_subscriber_number ] no bind
no
Removes a previously configured binding.
address ipv4_address
This option is obsolete from Release 19 onwards.
Specifies the IP address of an interface to be used as the connection point for establishing SaMOG sessions.
ipv4_address must be an IPv4 address expressed in dotted-decimal notation.
To define more than one NAS IP address per context, in Global Configuration Mode, use the aaa large-configuration command.
ipv4-address ipv4_address [ ipv6-address ipv6_address ] | ipv6-address ipv6_address [ ipv4-address ipv4_address ]
In this release, the configuration of the IPv6 bind address is supported as lab quality only.
Specifies the IPv4 or IPv6 address to be used as the connection point between the WLC and the SaMOG gateway for the RADIUS interface. You can optionally bind a secondary IPv4 address (if the primary bind address is an IPv6 address) or IPv6 address (if the primary bind address is an IPv4 address) to the MRME service.
The second bind address can be bond in the same command or separate commands. When the second bind address is provided, the MRME service restarts and existing sessions are lost for the other bind address.
ipv4_address must be an IPv4 address expressed in dotted-decimal notation.
ipv6_address must be an IPv6 address expressed in colon (or double-colon) notation.
auth-port auth_port_number
Specifies the authentication port number of the interface where authentication requests are received. The system binds the default authentication port to 1812.
In addition to the authentication port, the accounting port and maximum subscriber limit can also be configured optionally.
auth_port_number must be an integer from 1 through 65535.
acct-port acct_port_number
Specified the accounting port number of the interface where accounting requests are received. The system binds the default accounting port to 1813.
In addition to the accounting port, the maximum subscriber limit can also be configured optionally.
acct_port_number must be an integer from 1 through 65535.
max-subscribers max_subscriber_number
Specifies the maximum number of subscriber sessions allowed.
max_subscriber_number must be an integer from 0 through 4,000,000.
Usage Guidelines
Use this command to configure the IPv4 address to be used as the connection point for establishing SAMOG sessions for handling authentication and accounting messages.
Examples
Release 19 and later: The following command binds the MRME service with the IPv6 address of 192.168.1.254 and a secondary IPv6 address of 7777::101:1 with an accounting port number of 58 and maximum subscriber limit of 1000.
bind ipv4-address 192.168.1.254 ipv6-address 7777::101:1 acct-port 58 max-subscribers 1000
Release 18 and earlier: The following command binds the service with an IP address of 196.10.2.3 with an accounting port number of 58 and maximum subscriber limit of 1000.
bind address 196.10.2.3 acct-port 58 max-subscribers 1000
disconnect
This command allows you to specify the delay duration before which the call is disconnected.
Product
SaMOG
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > MRME Service Configuration
configure > context context_name > mrme-service mrme_service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-mrme-service)#
Syntax
Syntax Description
disconnect { delay-time seconds | wait-time seconds } default disconnect { delay-time | wait-time }
default
Configures this command to its default setting.
delay-time default: 30 seconds
wait-time default: 10 seconds
delay-time seconds
Specifies to configure the timer to retain the session on receiving an Accounting Stop, and for roaming scenarios, session continuity on receiving an Accounting Start.
seconds must be an integer from 1 through 60.
wait-time seconds
Specifies to configure the timer to wait for accounting start message from the new WLC after processing the accounting stop message from the old WLC.
seconds must be an integer of 10 through 300.
Usage Guidelines
Specifies to configure the timer to wait for accounting stop message after triggering a Disconnect Req Message to WLC for an SAMOG session.
Examples
The following command sets the disconnect wait time to 60 seconds.
disconnect wait-time 60
dns-P-GW
This command allows you to configure the source context in which the DNS client is configured, or enable/disable P-GW selection based on topology and load-balancing of P-GWs, based on weights from DNS.
Product
SaMOG
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > MRME Service Configuration
configure > context context_name > mrme-service mrme_service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-mrme-service)#
Syntax
Syntax Description
dns-pgw { context context_name | selection { topology [ weight ] | weight } } { default | no } dns-pgw { context | selection { topology [ weight ] | weight } }
default
Returns the command to its default value.
default dns-pgw context: MRME will fetch the dns-client configuration from the current context.
default dns-pgw selection topology: MRME will perform P-GW selection based on the topology.
no
If previously configured, removes the dns-pgw configuration.
context context_name
Specifies to configure the source context in which the DNS client is configured.
context_name must be an alphanumeric string of 1 through 79 characters.
selection { topology [ weight ] | weight }
Specifies to enable/disable P-GW selection based on topology and load-balancing of P-GWs based on weights from DNS.
Usage Guidelines
Use this command to configure the source context in which the DNS client is configured, or enable/disable P-GW selection based on topology and load-balancing of P-GWs, based on weights from DNS.
In case of topology-based selection, when the DNS procedure outputs a list of P-GW host names for the APN FQDN, MRME performs the longest suffix match and selects the P-GW which is topologically closest to the MRME/subscriber. In case of weight-based selection, if there are multiple entries with the same priority in the list of P-GW host names for the APN FQDN in the output from the DNS procedure, calls are distributed to the P-GWs according to the weight field in RRs. The weight field specifies a relative weight for entries with the same priority.
Examples
This command will configure the source context in which the DNS client is configured to "mrmectx".
dns-P-GW context mrmectx
end
Exits the current configuration mode and returns to the Exec mode.
Product
All
Privilege
Security Administrator, Administrator
Syntax
Syntax Description
end
Usage Guidelines
Use this command to return to the Exec mode.
exit
Exits the current mode and returns to the parent configuration mode.
Product
All
Privilege
Security Administrator, Administrator
Syntax
Syntax Description
exit
Usage Guidelines
Use this command to return to the parent configuration mode.
fqdn
This command allows you to configure the MRME fully qualified domain name (FQDN) to match the longest suffix during dynamic allocation.
Product
SaMOG
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > MRME Service Configuration
configure > context context_name > mrme-service mrme_service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-mrme-service)#
Syntax
Syntax Description
fqdn fqdn_name { default | no } fqdn
default
Returns the command to the default setting of "null".
no
Removes the configured FQDN from the MRME service configuration.
fqdn_name
Specifies the MRME FQDN name that will be used for the longest suffix match during dynamic allocation.
fqdn_name must be an alphanumeric string of 1 to 255 characters.
Usage Guidelines
Use this command to configure the MRME FQDN under MRME service to match the longest suffix during dynamic allocation.
Examples
The following command sets an MRME FQDN value of "topon.eth.mrme.north.blore.3gppnetwork.org".
fqdn topon.eth.mrme.north.blore.3gppnetwork.org
pgw-selection
This command provides P-GW selection related parameters for this MRME service.
Product
SaMOG
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > MRME Service Configuration
configure > context context_name > mrme-service mrme_service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-mrme-service)#
Syntax
Syntax Description
[ no ] pgw-selection { fallback pgw-id | local-configuration-preferred }
no
Removes the configuration.
local-configuration-preferred
Specifies the SaMOG Gateway to perform P-GW selection based on local configuration.
When this keyword is enabled,
-
In the case of dynamic P-GW selection from the AAA server (APN FQDN based selection), the SaMOG Gateway first tries to establish session with the locally configured P-GWs. If the locally configured P-GWs are not reachable, APN FQDN resolution is performed, and SaMOG Gateway tries to establish session with the resolved IP addresses.
-
In the case of static P-GW selection from the AAA server (IP address or P-GW FQDN ), SaMOG tries to establish session with the AAA server provided P-GW address (IP address or resolved P-GW FQDN). If the AAA server provided P-GW addresses are not reachable, session setup fails.
fallback pgw-id
Specifies the SaMOG Gateway to trigger fall back to locally configured P-GW addresses (or DNS resolved P-GW addresses using APN FQDN) when session establishment with AAA provided P-GW address or DNS provided P-GW address for P-GW FQDN fails.
Usage Guidelines
Use this command to enable SaMOG Gateway to perform P-GW selection based on local configuration.
When the local-configuration-preferred keyword is enabled, SaMOG first uses the locally configured P-GW addresses to fall-back to. When the locally configured P-GW addresses are not reachable, SaMOG then uses APN FQDN based P-GW address resolution.
When the local-configuration-preferred keyword is not enabled, SaMOG first uses APN FQDN based P-GW address resolution to fall-back to. When the P-GW address resolved using APN FQDN is not reachable, SaMOG then uses the locally configured P-GW addresses.
When session establishment with AAA provided P-GW address or DNS provided P-GW address for P-GW FQDN fails, fall-back is triggered when the fallback pgw-id keyword is enabled.
Examples
The following command enables the SaMOG Gateway to use locally configured P-GW addresses first for P-GW resolution:
pgw-selection local-configuration-preferred
radius
This command allows you to specify the IP address and shared secret of the RADIUS accounting and authentication client from which RADIUS accounting and authentication requests are received.
From release 16.0 onwards, this command has been deprecated. Instead, use the radius command described under the TWAN Profile Configuration Mode Commands section.
Product
SaMOG
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > MRME Service Configuration
configure > context context_name > mrme-service mrme_service_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-mrme-service)#
Syntax
Syntax Description
radius client ipv4_address[/mask] { [ encrypted ] key key [ [ disconnect-message [ dest-port port_number ] ] [ acct-onoff { [ aaa-context aaa_context_name ] [ aaa-group aaa_group_name ] [ clear-sessions ] } ] } no radius client ipv4_address[/mask]
no
Removes a previously configured RADIUS client.
ipv4_address[/mask]
Specifies the IP address, and optional subnet mask of the RADIUS client from which RADIUS accounting and authentication requests are received.
ipv4_address[/mask] must be an IPv4 address expressed in dotted-decimal notation.
[ encrypted ] key key
- encrypted: Specifies that the shared key between the RADIUS client and this service is encrypted.
- key
key: Specifies the shared
key between the RADIUS client and this service.
key with encryption must be an alphanumeric string of 1 through 288 characters, and without encryption an alphanumeric string of 1 through 127 characters. Note that key is case sensitive.
disconnect-message [ dest-port port_number ]
Specifies to send RADIUS disconnect messages to the configured RADIUS accounting client in call failure scenarios.
- dest-port
port_number
: Specifies a port number to which the disconnect
message must be sent.
port_number must be an integer from 1 through 65535.
acct-onoff { [ aaa-context context_name ] [ aaa-group group_name ] [ clear-sessions ] }
The acct-onff keyword is currently not supported in this release.
Usage Guidelines
Use this command to specify the IP address and shared secret of the RADIUS accounting and authentication client from which RADIUS accounting and authentication requests are received.
Examples
The following command configures the service to communicate with a RADIUS client with an IP address of 190.21.33.40 and an encrypted shared secret of key1234Ax3Z, and clear the session when accounting on/off messages are received:
radius client 190.21.33.40 encrypted key 123 4Ax3Z acct-onoff clear-sessions
setup-timeout
This command is currently not supported in this release.
Feedback