Configuring Gx Support

Size: px
Start display at page:

Download "Configuring Gx Support"

Transcription

1 CHAPTER 10 CSG2 provides policy control via the Gx interface. Gx is a Third Generation Partnership Project (3GPP) Diameter application. In a Gx-enabled network, a Gx reference point is located between a Policy and Charging Rules Function (PCRF) and a Policy and Charging Enforcement Function (PCEF). The Gx reference point can be used for charging control and policy control by applying Attribute Value Pairs (AVPs) relevant to the application. The PCRF acts as a Diameter server and performs the following functions: It uses the Gx interface to provision PCC rules to, and remove PCC rules from, the PCEF. It handles policy control decisions. It provides network control regarding the service data flow detection, gating, Quality of Service (QoS), and flow-based charging (except credit management) towards the PCEF. It receives session- and media-related information from Application Functions (AFs) and informs the AFs of traffic plane events. The PCEF acts as a Diameter client and performs the following functions: It uses the Gx interface to send traffic plane events to the PCRF. It enforces policy, handles flow-based charging, and controls QoS and the handling of user plane traffic. It provides service data flow detection and counting as well as online and offline charging interactions. It can report changes in the status of service data flows. In a Gx-enabled network, the PCC rules are used to: Detect a packet that belongs to a service data flow. Identify the service to which the service data flow contributes. Provide applicable charging parameters and policy control for a service data flow. PCC rules are dynamically provisioned by the PCRF to the PCEF over the Gx interface. Dynamic PCC rules are dynamically generated in the PCRF. Dynamic PCC rules can be activated, modified, and deactivated at any time. 10-1

2 Chapter 10 In a Gx-enabled network, the CSG2 acts as a PCEF, either as part of an eggsn node, with a CSG2 and a GGSN as separate cards in a Cisco 7600 Series Router, or as a stand-alone Gi-node, with interoperability from external GGSNs. In eggsn mode, the CSG2 acts as a Gx interface endpoint while the GGSN manages PDP contexts. The CSG2 and the GGSN communicate with each other using the RADIUS protocol. The CSG2 provides basic Gx support with enhancements for per-user Layer 7 rules, policy preloading, and per-user service policies. The GGSN provides GTP, PDP AAA Authentication, and QoS RAN Signaling. To enable the CSG2 to parse user profile attributes in eggsn mode, you must configure either the ip csg entries user profile radius pass command or the ip csg entries user profile radius remove command. In Gi-node mode, the stand-alone CSG2 acts as a Gx interface endpoint. Gi-node mode supports all of the same functions as eggsn mode, with the following exception: PDP Context QoS Signaling is not supported. The CSG2 supports both the eggsn mode and the Gi-node mode in both RADIUS endpoint and RADIUS proxy modes. Figure 10-1 illustrates the placement of the CSG2 in a Gx-enabled network: Figure 10-1 CSG2 in a Gx-Enabled Network Application Function Proxy Call Session Control Function V IP AAA Ri Ri PCRF Gi GPRS GGSN CS G The CSG2 provides the following Gx features: Enabling Gx on the CSG2, page 10-3 Configuring a User Profile, page 10-3 Preloading Policies, page

3 Chapter 10 Enabling Gx on the CSG2 Support for Gx TCP Signature Reporting, page 10-5 Dynamic Provisioning of 3GPP Per-User DGRs, page 10-5 Dynamic Provisioning of Cisco Per-User DGRs, page 10-6 Roaming Support, page 10-7 Volume and Duration Triggers, page 10-8 Service Flow Detection Triggers, page 10-8 Billing Plan Assignment and Modification, page 10-8 PDP Context QoS Signaling, page 10-8 Secondary PDP Context Activation, page 10-9 PCRF-Specified Service-Level and User-Level QoS, page 10-9 PCRF Failure Handling, page 10-9 User Session Continuation After PCRF Timeout, page 10-9 Restrictions for Gx, page Enabling Gx on the CSG2 To enable Gx support on the CSG2, enter the following command in global configuration mode: csg2(config)# ip csg pcc gx Enables Gx on the CSG2. Configuring a User Profile To enable Gx support for a CSG2 subscriber, define a user profile and associate that profile with the subscriber. The user profile: Enables Gx for all associated subscribers. Defines the actions that the CSG2 is to take if a PCRF fails. Defines the Mobile Policy Control & Charging (MPCC) profile to be used by the CSG2 when sending per-user Credit Control Requests (CCRs) to the PCRF. 10-3

4 Preloading Policies Chapter 10 To define a user profile, enter the following commands beginning in global configuration mode: Step 1 csg2(config)# ip csg user profile profile-name Defines a user profile to be associated with a CSG2 subscriber, and enters CSG2 user profile configuration mode. Step 2 csg2(config-csg-user-profile)# pcc gx Enables Gx for subscribers associated with a CSG2 user profile. If a RADIUS Accounting Request contains a Cisco VSA that specifies the Gx behavior of the subscriber, the RADIUS-specified behavior overrides the Gx behavior specified by the pcc gx command. Step 3 Step 4 Step 5 csg2(config-csg-user-profile)# pcrf failure [continue terminate] csg2(config-csg-user-profile)# pcrf profile mpcc-profile-name csg2(config-csg-user-profile)# pcrf timeout [continue terminate] (Optional) Defines the actions that the CSG2 is to take for a PCC user if the PCRF fails when the user session is activated. continue Create the CSG2 User Table entry for the PCC user and forward the RADIUS Accounting Start request. terminate Do not create the CSG2 User Table entry for the PCC user and do not forward the RADIUS Accounting Start request. This is the default setting. (Optional) Defines an MPCC profile to be used by the CSG2 when sending per-user CCRs to the PCRF. (Optional) Defines the actions that the CSG2 is to take for a Policy Control & Charging (PCC) user if the Policy and Charging Rule Function (PCRF) times out. To associate a user profile with a subscriber, enter the following command in global configuration mode: csg2(config)# ip csg select profile-name {any radius called-station-id csid-string} Associates a CSG2 user profile with a subscriber. The CSG2 determines that a user is a Gx user in one of the following ways: The GGSN sends a RADIUS Accounting Start Request or a RADIUS Accounting Interim Request with Cisco VSAs that indicate that the user is a Gx user. The CSG2 compares the access point name (APN) name in attribute 30 (Called-Station-Id) of the RADIUS Accounting Start against a configured list of APN names to determine that the user is a Gx user. Preloading Policies The CSG2 can preload global contents, maps, policies, billing plans, and services, as necessary, from the PCRF. If configured to do so, the CSG2 preloads policies when it boots up. However, you can also dynamically load new and changed policies at any time, without rebooting the CSG2. Note The standby CSG2 must have replicated all preloaded policy information before requesting replicated User Table, session, and service information from the active CSG

5 Chapter 10 Support for Gx TCP Signature Reporting To preload policies for the CSG2 from the PCRF without rebooting, enter the following command in privileged EXEC mode: csg2# csg start preload Begins preloading policies for the CSG2 from the PCRF. You can also configure a policy preloading retransmission delay and a retransmission number for the CSG2 to use when sending a Policy Preloading Request to the PCRF. To configure a delay and retry number, enter the following command in global configuration mode: csg2(config)# ip csg preload request delay delay-in-seconds retries number-of-retries Configures a policy preloading retransmission delay and a retransmission number for the CSG2 to use when sending a Policy Preloading Request to the PCRF. The delay is the number of seconds to wait for a policy preload response (CCA) before sending another policy preload request (CCR) to the PCRF. The number of retries is the number of times to retransmit the message. Support for Gx TCP Signature Reporting The CSG2 supports exporting the IP and TCP headers from a subscriber TCP SYN (or SYN-ACK) packet to a Policy and Charging Rule Function (PCRF) device via the Gx protocol. The PCRF selectively arms a Cisco per-user TCP Signature trigger to request the TCP signature information. The subscriber must be identified as a Gx user to allow this reporting to the PCRF. The PCRF can arm the TCP Signature trigger using a subscriber Credit Control Answer (CCA) or Resource Allocation Request (RAR) message. The CSG2 reports the TCP signature of the next TCP flow in a subscriber Credit Control Request-Update (CCR-Update) message. After the trigger is hit, it is cleared until it is armed again by the PCRF. Dynamic Provisioning of 3GPP Per-User DGRs The CSG2 uses a 3GPP-compliant PCC architecture to dynamically download 3GPP per-user Dynamic Gx Rules (DGRs) for each subscriber PDP context. The CSG2 supports unsolicited provisioning of rules by the PCRF. The eggsn, if present, establishes the PDP context only after downloading the PCC rules. The CSG2 includes a number of elements as AVPs in updates sent to the PCRF (such as SGSN Address, RAT, and so on). In addition, the CSG2 reports the time of the mobile (not of the gateway) in CCR and reauthorization answer (RAA) messages. The CSG2 can dynamically provision 3GPP per-user DGRs using both standard AVPs and Cisco AVPs. When provisioning with standard AVPs, the CSG2 uses the following procedure: 10-5

6 Dynamic Provisioning of Cisco Per-User DGRs Chapter 10 Step 1 Step 2 Step 3 After identifying a user is a Gx user, the CSG2 sends a Diameter CCR to the PCRF. The PCRF responds with a CCA message with one or more Layer 4 DGRs formatted as standard Charging-Rule-Definition AVPs. The CSG2 associates the DGRs with the User Table entry, downloads the DGRs, and sends a RADIUS CoA Request to the GGSN when complete. Note If the CSG2 is a Gi-node, it does not send a RADIUS CoA to the GGSN. Instead, it delays the proxy or acknowledgement of the RADIUS Accounting Request until it has successfully downloaded the rules. If the PCRF fails, the CSG2 does not create the User Table entry for the PCC user, and it does not forward or acknowledge the RADIUS Accounting Start request. When provisioning with Cisco AVPs, the CSG2 uses the following procedure: Step 1 Step 2 Step 3 After identifying a user is a Gx user, the CSG2 sends a Diameter CCR to the PCRF. The PCRF responds with a CCA message with one or more Layer 4 DGRs formatted as Cisco-Charging-Rule-Definition AVPs. (The use of Cisco-Charging-Rule-Definition AVPs enables features that are available with configured Gx contents.) The CSG2 associates the DGRs with the User Table entry, downloads the rules, and proxies (or ACKs) the RADIUS request when complete. Note If the CSG2 is a Gi-node, it does not send a RADIUS CoA to the GGSN. Instead, it delays the proxy or acknowledgement of the RADIUS Accounting Request until it has successfully downloaded the rules. If the PCRF fails, the CSG2 does not create the User Table entry for the PCC user, and it does not forward or acknowledge the RADIUS Accounting Start request. Dynamic Provisioning of Cisco Per-User DGRs The CSG2 supports Layer 7 DGRs by referencing global contents, policies, and services that are either configured or dynamically downloaded. The CSG2 dynamically provisions Cisco per-user DGRs using Cisco AVPs. When provisioning with standard AVPs, the CSG2 uses the following procedure: Step 1 After identifying a user is a Gx user, the CSG2 sends a Diameter CCR to the PCRF. 10-6

7 Chapter 10 Roaming Support Step 2 Step 3 The PCRF responds with a CCA message with one or more Layer 7 DGRs formatted as Cisco-Charging-Rule-Definition AVPs. The CCA can also include one or more Layer 4 DGRs formatted as either standard Charging-Rule-Definition AVPs or Cisco-Charging-Rule-Definition AVPs. The CSG2 associates the DGRs with the User Table entry, downloads the rules, and proxies (or ACKs) the RADIUS request when complete. Note If the CSG2 is a Gi-node, it does not send a RADIUS CoA to the GGSN. Instead, it delays the proxy or acknowledgement of the RADIUS Accounting Request until it has successfully downloaded the rules. If the PCRF fails, the CSG2 does not create the User Table entry for the PCC user, and it does not forward or acknowledge the RADIUS Accounting Start request. Roaming Support The CSG2 supports the use of armed event triggers to provide the following roaming features in a Gx-enabled network: Dynamic blocking of subscriber traffic, of a service, or of a change in the service-level Qos when a subscriber roams. The PCRF might also indicate that the CSG2 is to continue forwarding traffic without blocking or modifying any QoS. Blocking the establishment of the PDP context, or of traffic for specific DGRs or services when a subscriber roams. Policy reauthorization. The CSG2 supports triggers for the following per-user 3GPP events: SGSN_CHANGE (0) RAT_CHANGE (2) PLMN_CHANGE (4) IP_CAN_CHANGE (7) The CSG2 supports triggers for the following per-pdp context 3GPP events: QOS_CHANGE (1) TFT_CHANGE (3) LOSS_OF_BEARER (5) RECOVERY_OF_BEARER (6) QOS_CHANGE_EXCEEDING_AUTHORIZATION (11) 10-7

8 Volume and Duration Triggers Chapter 10 Volume and Duration Triggers The CSG2 can report excessive DGR volume usage and duration to the PCRF. The PCRF specifies the maximum DGR volume usage in an armed volume trigger. When a subscriber passes traffic that matches a DGR, and the IP byte volume (uplink plus downlink) associated with the DGR equals or exceeds the trigger value, the CSG2 reports the usage for the DGR to the PCRF in a CCR and disables the trigger. The PCRF can re-arm the trigger in the CCA. The PCRF specifies the maximum DGR duration an armed time duration trigger. When a subscriber passes traffic that matches a DGR, the CSG2 notes the timestamp of the first packet. Each time the CSG2 processes another packet, it compares the timestamp to that of the first packet. If the difference between the two timestamps exceeds the duration trigger, the CSG2 reports the usage for the DGR to the PCRF in a CCR and disables the trigger. The PCRF can re-arm the trigger in the CCA. Service Flow Detection Triggers The CSG2 can notify the PCRF when it receives the first packet that matches a DGR. The PCRF requests the notification in an armed service flow detection trigger. When a subscriber passes traffic that matches a DGR, the CSG2 notifies the PCRF in a CCR, disables the trigger, and handles the traffic. The PCRF can re-arm the trigger in the CCA. Billing Plan Assignment and Modification The PCRF can assign a new or changed billing plan to a CSG2 subscriber. The PCRF sends the billing plan assignment to the CSG2, and the CSG2 then associates the billing plan with a User Table entry. If there is already a RADIUS or quota server billing plan assigned to the subscriber, the PCRF billing plan overrides the existing billing plan. When the PCRF overrides an existing billing plan, the CSG2 immediately ends all existing user transactions and services for that subscriber. PDP Context QoS Signaling The eggsn can signal a QoS change for a PDP context by sending a PDP Update Request to the SGSN. If the SGSN rejects the QoS Update Procedure, the eggsn increments a counter. This feature is supported only on in eggsn mode, not in Gi-node mode. 10-8

9 Chapter 10 Secondary PDP Context Activation Secondary PDP Context Activation The GGSN can send a RADIUS Accounting Start Request to the CSG2, requesting a new Accounting-Session-Id for an existing subscriber. The CSG2 then sends a Diameter CCR to the PCRF, and the PCRF responds with a CCA message, provisioning zero, one, or more Layer 4 or Layer 7 DGRs formatted as either standard Charging-Rule-Definition AVPs or Cisco-Charging-Rule-Definition AVPs. PCRF-Specified Service-Level and User-Level QoS The PCRF can specify QoS parameters for the CSG2 to apply to a specific service for a user, or to all traffic for a user. PCRF Failure Handling The PCRF can fail to respond to the PCEF if all of the Diameter peers for the MPCC profile are down, too busy, unable to deliver, or looping. If that occurs, and if configured to do so, the CSG2 can take the following actions: Apply the already provisioned per-user rules to the flows Report the failed PCRF in BMA CDRs and quota server messages Switch to a standby PCRF To define PCRF failure handling for the CSG2, enter the following command in global configuration mode: csg2(config-csg-user-profile)# pcrf failure [continue terminate] (Optional) Defines the actions that the CSG2 is to take for a PCC user if the PCRF fails when the user session is activated. continue Create the CSG2 User Table entry for the PCC user and forward the RADIUS Accounting Start request. terminate Do not create the CSG2 User Table entry for the PCC user and do not forward the RADIUS Accounting Start request. This is the default setting. User Session Continuation After PCRF Timeout If configured to do so, and if all of the Diameter peers for the MPCC profile are down, the CSG2 can take the following actions in the event that the PCRF times out: The CSG2 applies the already provisioned per-user rules to the flows. The CSG2 reports the timed-out PCRF in BMA CDRs and quota server messages. The CSG2 switches to a standby PCRF. 10-9

10 Restrictions for Gx Chapter 10 To define PCRF timeout handling for the CSG2, enter the following command in global configuration mode: csg2(config-csg-user-profile)# pcrf timeout [continue terminate] (Optional) Defines the actions that the CSG2 is to take for a PCC user if the PCRF times out when the user session is activated. continue Create the CSG2 User Table entry for the PCC user and forward the RADIUS Accounting Start request. terminate Do not create the CSG2 User Table entry for the PCC user and do not forward the RADIUS Accounting Start request. This is the default setting. Restrictions for Gx For Gx, the CSG2 imposes the following restrictions: Gx is supported for only Internet Protocol version 4 (IPv4) packet data protocol (PDP) types. It is not supported for Internet Protocol version 6 (IPv6), Point-to-Point Protocol (PPP) PDP, or PPP regeneration (PPP-Regen) types. In a Gx charging rule, the flow descriptions in both the uplink and downlink directions must map to the same service. Mapping an existing flow or session to a new DGR is not supported. Provisioning of charging gateways (BMAs, quota servers, and so on) is not supported. Policy control for HTTP X-Forwarded-For data packets is not supported. Per-rule QoS enforcement is not supported. Instead, the PCRF can specify service-level QoS. If a global content update results in changed parameters, the CSG2 closes all open transactions and sessions associated with the content. Only one external preloading server can be active at any given time. If the CSG2 receives a flow before it receives per-user PCC rules from PCRF, the CSG2 matches the flow against existing CSG2 contents. Preloaded policy objects must not reference CLI-configured objects, and vice versa. For example, a preloaded billing plan must not reference a CLI-configured service. You cannot use preloading to modify a CLI-configured object, and you cannot use the CLI to modify a preloaded policy object

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen UMTS/GPRS system overview from an IP addressing perspective David Kessens Jonne Soininen Introduction 1) Introduction to 3GPP networks (GPRS, UMTS) Technical overview and concepts for 3GPP networks Mobility

More information

PCC. Policy Server. Charging Systems PCEF PDN GW PCEF GGSN. Figure 1 : Generic Policy and Charging Control Architecture

PCC. Policy Server. Charging Systems PCEF PDN GW PCEF GGSN. Figure 1 : Generic Policy and Charging Control Architecture PCC (Policy and Charging Control) Applications EFORT http://www.efort.com In a first EFORT tutorial related to PCC (Policy and Charging Control), the PCC architecture has been described with its entities,

More information

Diameter in the Evolved Packet Core

Diameter in the Evolved Packet Core Diameter in the Evolved Packet Core A Whitepaper November 2009 Page 2 DIAMETER in the Evolved Packet Core Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband

More information

Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access

Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access Configuring Timeout, Retransmission, and Key Values per RADIUS Server The Configuring Timeout, Retransmission, and Key Values per RADIUS Server feature extends the functionality of the existing radius-server

More information

Configuring Timeout, Retransmission, and Key Values Per RADIUS Server

Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Feature Summary The radius-server host command functions have been extended to include timeout, retransmission, and encryption key

More information

GSM Network and Services

GSM Network and Services GSM Network and Services GPRS - sharing of resources 1 What is the problem? Many data applications are very bursty in its traffic pattern: http, smtp, pop, telnet,... Why reserve physical resources at

More information

Interaction between an Online Charging System and a Policy Server

Interaction between an Online Charging System and a Policy Server Interaction between an Online Charging System and a Policy Server Marc Cheboldaeff Carrier Applications EMEA Alcatel-Lucent Ratingen, Germany Marc.Cheboldaeff@alcatel-lucent.com Abstract According to the

More information

NAT TCP SIP ALG Support

NAT TCP SIP ALG Support The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the

More information

Empirix xcentrix Mobile Broadband Analysis Package

Empirix xcentrix Mobile Broadband Analysis Package Datasheet Empirix xcentrix Mobile Broadband Analysis Package Predict: Timely intelligence and expert analysis reveals innovative business opportunities and enables smarter decision-making across the organization

More information

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com 1 Introduction Voice over IP over LTE (VoLTE) Impacts on LTE access EFORT http://www.efort.com IMS (IP Multimedia Subsystems) has been around for some time, and many infrastructure vendors have invested

More information

3GPP TS 23.207 V9.0.0 (2009-12)

3GPP TS 23.207 V9.0.0 (2009-12) TS 23.207 V9.0.0 (2009-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; End-to-end Quality of Service (QoS) concept and architecture

More information

Session Border Controller

Session Border Controller CHAPTER 13 This chapter describes the level of support that Cisco ANA provides for (SBC), as follows: Technology Description, page 13-1 Information Model Objects (IMOs), page 13-2 Vendor-Specific Inventory

More information

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications M2M 3GPP Standardization Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends Core Network Infrastructure and Congestion Control Technology for M2M Communications The number

More information

Configuring CSS Remote Access Methods

Configuring CSS Remote Access Methods CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller

More information

LTE Attach and Default Bearer Setup Messaging

LTE Attach and Default Bearer Setup Messaging LTE Attach and Default Bearer Setup Messaging 2012 Inc. All Rights Reserved LTE Attach Message Sequence Chart enodeb MME SGW HSS Initial UE Message Update Location Update Location Answer Create Session

More information

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to

More information

SOLUTIONS FOR ROAMING AND INTEROPERABILITY PROBLEMS BETWEEN LTE AND 2G OR 3G NETWORKS

SOLUTIONS FOR ROAMING AND INTEROPERABILITY PROBLEMS BETWEEN LTE AND 2G OR 3G NETWORKS Review of the Air Force Academy No 2 (24) 2013 SOLUTIONS FOR ROAMING AND INTEROPERABILITY PROBLEMS BETWEEN LTE AND 2G OR 3G NETWORKS Radu CURPEN, Florin SANDU, Cosmin COSTACHE, Gabriel Mihail DANCIU Transilvania

More information

Cisco IOS Flexible NetFlow Command Reference

Cisco IOS Flexible NetFlow Command Reference Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

Authentication, Authorization and Accounting (AAA) Protocols

Authentication, Authorization and Accounting (AAA) Protocols Authentication, Authorization and Accounting (AAA) Protocols Agententechnologien in der Telekommunikation Sommersemester 2009 Babak Shafieian babak.shafieian@dai-labor.de 10.06.2009 Agententechnologien

More information

ETSI TS 129 119 V9.0.0 (2010-01) Technical Specification

ETSI TS 129 119 V9.0.0 (2010-01) Technical Specification TS 129 119 V9.0.0 (2010-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; GPRS Tunnelling Protocol (GTP) specification for Gateway Location Register (GLR) (3GPP TS 29.119

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

ETSI TR 102 678 V1.2.1 (2011-05) Technical Report

ETSI TR 102 678 V1.2.1 (2011-05) Technical Report TR 102 678 V1.2.1 (2011-05) Technical Report Speech and multimedia Transmission Quality (STQ); QoS Parameter Measurements based on fixed Data Transfer Times 2 TR 102 678 V1.2.1 (2011-05) Reference RTR/STQ-00184m

More information

Signaling Delivery Controller : Control Your 4G Network

Signaling Delivery Controller : Control Your 4G Network Data Sheet Traffix Systems Signaling Delivery Controller : Control Your 4G Network The Traffix Signaling Delivery Controller (SDC) assists operators in scaling and managing services and applications in

More information

Mobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca

Mobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca Mobile IPv6 deployment opportunities in next generation 3GPP networks I. Guardini E. Demaria M. La Monaca Overview of SAE/LTE Terminology SAE (System Architecture Evolution): core network/system aspects

More information

RADIUS Authentication and Accounting

RADIUS Authentication and Accounting 5 RADIUS Authentication and Accounting Contents Overview...................................................... 5-2 Terminology................................................... 5-3 Switch Operating Rules

More information

PULSE. Pulse for Windows Phone Quick Start Guide. Release Published Date

PULSE. Pulse for Windows Phone Quick Start Guide. Release Published Date PULSE Pulse for Windows Phone Quick Start Guide Release Published Date 1.0 July 2015 Contents PART 1 Pulse for Windows Phone 4 CHAPTER 1 5 Introducing Pulse for Windows Phone 5 Pulse for Windows Phone

More information

Lecture 4b AAA protocols (Authentication Authorization Accounting)

Lecture 4b AAA protocols (Authentication Authorization Accounting) Lecture 4b AAA protocols (Authentication Authorization Accounting) Network security (19265400 / 201000086) Lecturers: Aiko Pras Pieter-Tjerk de Boer Anna Sperotto Ramin Sadre Georgios Karagiannis Lecture

More information

BRI to PRI Connection Using Data Over Voice

BRI to PRI Connection Using Data Over Voice BRI to PRI Connection Using Data Over Voice Document ID: 14962 Contents Introduction Prerequisites Requirements Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

IP Application Services Commands show vrrp. This command was introduced. If no group is specified, the status for all groups is displayed.

IP Application Services Commands show vrrp. This command was introduced. If no group is specified, the status for all groups is displayed. show vrrp show vrrp To display a brief or detailed status of one or all configured Virtual Router Redundancy Protocol (VRRP) groups on the router, use the show vrrp command in privileged EXEC mode. show

More information

HRPD Support for Emergency Services

HRPD Support for Emergency Services GPP X.S000-0 Version.0 Date: July 00 HRPD Support for Emergency Services COPYRIGHT GPP and its Organizational Partners claim copyright in this document and individual Organizational Partners may copyright

More information

NetFlow-Lite offers network administrators and engineers the following capabilities:

NetFlow-Lite offers network administrators and engineers the following capabilities: Solution Overview Cisco NetFlow-Lite Introduction As networks become more complex and organizations enable more applications, traffic patterns become more diverse and unpredictable. Organizations require

More information

Configuring Health Monitoring

Configuring Health Monitoring CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless

More information

Firewall Authentication Proxy for FTP and Telnet Sessions

Firewall Authentication Proxy for FTP and Telnet Sessions Firewall Authentication Proxy for FTP and Telnet Sessions First Published: May 14, 2003 Last Updated: August 10, 2010 Before the introduction of the Firewall Authentication Proxy for FTP and Telnet Sessions

More information

How To Manage A Network With A Network Management System (Qoe)

How To Manage A Network With A Network Management System (Qoe) ISAAR a SDN enabled QoE Framework Chemnitz University of Technology Communication Networks Thomas M. Knoll & Marcus Eckert ({knoll & marcus.eckert} @etit.tu-chemnitz.de) Page 1 Contents Motivation Architecture

More information

4G Mobile Networks At Risk

4G Mobile Networks At Risk 07.05.1203 Consortium Attack analysis and Security concepts for MObile Network infastructures supported by collaborative Information exchange 4G Mobile Networks At Risk The ASMONIA Threat and Risk Analysis

More information

Fortinet Network Security NSE4 test questions and answers:http://www.it-tests.com/NSE4.html

Fortinet Network Security NSE4 test questions and answers:http://www.it-tests.com/NSE4.html IT-TESTs.com IT Certification Guaranteed, The Easy Way! \ http://www.it-tests.com We offer free update service for one year Exam : NSE4 Title : Fortinet Network Security Expert 4 Written Exam (400) Vendor

More information

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com IP-based Mobility Management for a Distributed Radio Access Network Architecture helmut.becker@siemens.com Outline - Definition IP-based Mobility Management for a Distributed RAN Architecture Page 2 Siemens

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

SSL-Proxy-List Configuration Mode Commands

SSL-Proxy-List Configuration Mode Commands Chapter 2 The ssl-proxy list configuration mode allows you to configure an SSL proxy configuration list on an 11500 series CSS containing an SSL module. An SSL proxy configuration list is a group of related

More information

Traffic Mirroring Commands on the Cisco IOS XR Software

Traffic Mirroring Commands on the Cisco IOS XR Software Traffic Mirroring Commands on the Cisco IOS XR Software This module describes the commands used to configure and monitor traffic mirroring. acl, page 2 clear monitor-session counters, page 4 destination

More information

Configuring Health Monitoring

Configuring Health Monitoring CHAPTER 6 This chapter describes how to configure the health monitoring on the CSM and contains these sections: Configuring Probes for Health Monitoring, page 6-1 Configuring Route Health Injection, page

More information

Configuring TCP Intercept (Preventing Denial-of-Service Attacks)

Configuring TCP Intercept (Preventing Denial-of-Service Attacks) Configuring TCP Intercept (Preventing Denial-of-Service Attacks) This chapter describes how to configure your router to protect TCP servers from TCP SYN-flooding attacks, a type of denial-of-service attack.

More information

IM and Presence Service Network Setup

IM and Presence Service Network Setup Configuration changes and service restart notifications, page 1 Domain Value Configuration, page 2 Routing Information Configuration on IM and Presence Service, page 3 Configure Proxy Server Settings,

More information

Advanced SIP Series: SIP and 3GPP Operations

Advanced SIP Series: SIP and 3GPP Operations Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.

More information

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

642 523 Securing Networks with PIX and ASA

642 523 Securing Networks with PIX and ASA 642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall

More information

Configuring LLDP, LLDP-MED, and Location Service

Configuring LLDP, LLDP-MED, and Location Service 27 CHAPTER Configuring LLDP, LLDP-MED, and Location Service This chapter describes how to configure the Link Layer Discovery Protocol (LLDP), LLDP Media Endpoint Discovery (LLDP-MED), and Location Service

More information

GLBP - Gateway Load Balancing Protocol

GLBP - Gateway Load Balancing Protocol GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy

More information

11.1. Performance Monitoring

11.1. Performance Monitoring 11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts

More information

VRRPv3: Object Tracking Integration

VRRPv3: Object Tracking Integration Virtual Router Redundancy Protocol (VRRP) enables a group of devices to form a single virtual device to provide redundancy. The LAN clients then can be configured with the virtual device as the default

More information

Traffic Recognition in Cellular Networks

Traffic Recognition in Cellular Networks IT 09 010 Examensarbete 30 hp March 2009 Traffic Recognition in Cellular Networks Alexandros Tsourtis Institutionen för informationsteknologi Department of Information Technology Abstract Traffic Recognition

More information

Mobile Application Part protocol implementation in OPNET

Mobile Application Part protocol implementation in OPNET Mobile Application Part protocol implementation in OPNET Vladimir Vukadinovic and Ljiljana Trajkovic School of Engineering Science Simon Fraser University Vancouver, BC, Canada E-mail: {vladimir, ljilja}@cs.sfu.ca

More information

General Packet Radio Service (GPRS)

General Packet Radio Service (GPRS) General Packet Radio Service (GPRS) What is GPRS? GPRS (General Packet Radio Service) a packet oriented data service for IP and X.25 over GSM networks enables packet-switched services on the resources

More information

Flow-Based per Port-Channel Load Balancing

Flow-Based per Port-Channel Load Balancing The feature allows different flows of traffic over a Gigabit EtherChannel (GEC) interface to be identified based on the packet header and then mapped to the different member links of the port channel.

More information

Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver.

Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

Configuration of the DHCP server

Configuration of the DHCP server 104 Page 91 of 294 Contents This section contains information on the following topics: Overview................................................ 91 i2004 Internet Telephone....................................

More information

Using Link Layer Discovery Protocol in Multivendor Networks

Using Link Layer Discovery Protocol in Multivendor Networks Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates

More information

3G TS 29.119 V1.0.0 (1999-10)

3G TS 29.119 V1.0.0 (1999-10) 3G TS 29.119 V1.0.0 (1999-10) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network; GPRS Tunnelling Protocol (GTP) specification for GLR (3G TS 29.119

More information

3GPP TS 29.119 V7.0.0 (2007-06)

3GPP TS 29.119 V7.0.0 (2007-06) TS 29.119 V7.0.0 (2007-06) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network; GPRS Tunnelling Protocol (GTP) specification for GLR (Release 7) The present

More information

Connecting to the Firewall Services Module and Managing the Configuration

Connecting to the Firewall Services Module and Managing the Configuration CHAPTER 3 Connecting to the Firewall Services Module and This chapter describes how to access the command-line interface and work with the configuration. This chapter includes the following sections: Connecting

More information

2G/3G Mobile Communication Systems

2G/3G Mobile Communication Systems 2G/3G Mobile Communication Systems Winter 2012/13 Integrated Communication Systems Group Ilmenau University of Technology Outline 2G Review: GSM Services Architecture Protocols Call setup Mobility management

More information

Wireless Local Area Networks (WLANs)

Wireless Local Area Networks (WLANs) 4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................

More information

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1

More information

Integration with IP Phones

Integration with IP Phones Copyright 2010 Sophos Limited. All rights reserved. No part of this publication may be reproduced, stored in retrieval system, or transmitted, in any form or by any means electronic, mechanical, photocopying,

More information

Audit Troubleshooting

Audit Troubleshooting CHAPTER 2 Revised: July 2010, Introduction This chapter provides the information needed for monitoring and troubleshooting audit events and alarms. This chapter is divided into the following sections:

More information

Configuring a Load-Balancing Scheme

Configuring a Load-Balancing Scheme This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco Express Forwarding traffic. Load-balancing allows you to optimize

More information

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides

More information

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility) Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol

More information

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4 1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may

More information

Welcome. Managing the unmanageable: monetizing and controlling OTT applications. Enjoy the presentation!

Welcome. Managing the unmanageable: monetizing and controlling OTT applications. Enjoy the presentation! Presenter: Welcome Managing the unmanageable: monetizing and controlling OTT applications Thank you for joining us at this FierceLive! Webinar. We will begin momentarily. The audio will be streamed live

More information

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab Long-Term Evolution Mobile Telecommunications Networks WMNet Lab Background Long-Term Evolution Define a new packet-only wideband radio with flat architecture as part of 3GPP radio technology family 2004:

More information

Release Notes for Websense Web Endpoint (32- and 64-bit OS)

Release Notes for Websense Web Endpoint (32- and 64-bit OS) Release Notes for Websense Web Endpoint (32- and 64-bit OS) Updated: 8-Feb-2013 Applies To: Websense Cloud Web Security solutions Use the Release Notes to learn about: What s new in Websense Web Endpoint?

More information

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD NATIONAL SECURITY AGENCY Ft. George G. Meade, MD Serial: I732-010R-2008 30 April 2008 Network Infrastructure Division Systems and Network Analysis Center Activating Authentication and Encryption for Cisco

More information

7750 SR OS System Management Guide

7750 SR OS System Management Guide 7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted

More information

Troubleshooting the Firewall Services Module

Troubleshooting the Firewall Services Module CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page

More information

MBP_MSTR: Modbus Plus Master 12

MBP_MSTR: Modbus Plus Master 12 Unity Pro MBP_MSTR 33002527 07/2011 MBP_MSTR: Modbus Plus Master 12 Introduction This chapter describes the MBP_MSTR block. What s in this Chapter? This chapter contains the following topics: Topic Page

More information

Approaching these challenges with the right tools and solutions is critical for mobile operators success on the evolution to LTE.

Approaching these challenges with the right tools and solutions is critical for mobile operators success on the evolution to LTE. A Smart Approach To Signalling Challenges On The Road To LTE Flavio Muscetra, Senior Product Manager Executive Summary Over the past few years we have witnessed a radical shift in the way customers use

More information

21.4 Network Address Translation (NAT) 21.4.1 NAT concept

21.4 Network Address Translation (NAT) 21.4.1 NAT concept 21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially

More information

Static and Dynamic Network Configuration

Static and Dynamic Network Configuration CHAPTER 6 This chapter describes: Static Networks Dynamic Networks Static Networks The mobile access router can be part of a static network or a dynamic network. A static network supports stub routers

More information

Special ISDN Signaling Commands

Special ISDN Signaling Commands Special ISDN Signaling Commands This chapter describes the function and displays the syntax for special ISDN signaling commands. For more information about defaults and usage guidelines, see the corresponding

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

co Sample Configurations for Cisco 7200 Broadband Aggreg

co Sample Configurations for Cisco 7200 Broadband Aggreg co Sample Configurations for Cisco 7200 Broadband Aggreg Table of Contents Sample Configurations for Cisco 7200 Broadband Aggregation...1 Introduction...1 Configurations...1 PPPoA Session Termination:

More information

Cisco Collaboration with Microsoft Interoperability

Cisco Collaboration with Microsoft Interoperability Cisco Collaboration with Microsoft Interoperability Infrastructure Cheatsheet First Published: June 2016 Cisco Expressway X8.8 Cisco Unified Communications Manager 10.x or later Microsoft Lync Server 2010

More information

Portal Authentication Technology White Paper

Portal Authentication Technology White Paper Portal Authentication Technology White Paper Keywords: Portal, CAMS, security, authentication Abstract: Portal authentication is also called Web authentication. It authenticates users by username and password

More information

Yota PCRF. Backup and Recovery. Product version: 3.6 Document version: 1.6

Yota PCRF. Backup and Recovery. Product version: 3.6 Document version: 1.6 Yota PCRF Backup and Recovery Product version: 3.6 Document version: 1.6 Yota 2013 Revision History Date Version Author Revision 15.09.2011 1.0 Maxim Kumskoy Document created. 25.05.2012 1.1 Evgenia Martynyuk

More information

ETSI TS 129 161 V10.0.1 (2011-04) Technical Specification

ETSI TS 129 161 V10.0.1 (2011-04) Technical Specification TS 129 161 V10.0.1 (2011-04) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Interworking between the Public Land Mobile Network (PLMN) supporting packet based services

More information

Configuring the Fabric Interconnects

Configuring the Fabric Interconnects Configuring the Fabric Interconnects This chapter includes the following sections: Initial System Setup, page 1 Performing an Initial System Setup for a Standalone Configuration, page 3 Initial System

More information

ALCATEL-LUCENT 7750 SERVICE ROUTER NEXT-GENERATION MOBILE GATEWAY FOR LTE/4G AND 2G/3G AND ANCHOR FOR CELLULAR-WI-FI CONVERGENCE

ALCATEL-LUCENT 7750 SERVICE ROUTER NEXT-GENERATION MOBILE GATEWAY FOR LTE/4G AND 2G/3G AND ANCHOR FOR CELLULAR-WI-FI CONVERGENCE ALCATEL-LUCENT 7750 SERVICE ROUTER NEXT-GENERATION MOBILE GATEWAY FOR LTE/4G AND 2G/3G AND ANCHOR FOR CELLULAR-WI-FI CONVERGENCE The is a next generation mobile packet core data plane platform that supports

More information

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils 06/11/2012 1 Today s Talk Intro to LTE Networks Technical Details Attacks and Testing Defences Conclusions

More information

Grandstream Networks, Inc. UCM6100 Security Manual

Grandstream Networks, Inc. UCM6100 Security Manual Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL

More information

Group Encrypted Transport VPN

Group Encrypted Transport VPN Group Encrypted Transport VPN Petr Růžička petr.ruzicka@cisco.com Cisco Systems Czech Republic V Celnici 10, 117 21 Praha Abstract Today's networked applications, such as voice and video, are accelerating

More information

IOS Server Load Balancing

IOS Server Load Balancing IOS Server Load Balancing This feature module describes the Cisco IOS Server Load Balancing (SLB) feature. It includes the following sections: Feature Overview, page 1 Supported Platforms, page 5 Supported

More information

Towards Software Defined Cellular Networks

Towards Software Defined Cellular Networks Towards Software Defined Cellular Networks Li Erran Li (Bell Labs, Alcatel-Lucent) Morley Mao (University of Michigan) Jennifer Rexford (Princeton University) 1 Outline Critiques of LTE Architecture CellSDN

More information

Configuring RADIUS Server Support for Switch Services

Configuring RADIUS Server Support for Switch Services 7 Configuring RADIUS Server Support for Switch Services Contents Overview...................................................... 7-2 Configuring a RADIUS Server To Specify Per-Port CoS and Rate-Limiting

More information

Switch Configuration Required to Support Cisco ISE Functions

Switch Configuration Required to Support Cisco ISE Functions APPENDIXC Switch Configuration Required to Support Cisco ISE Functions To ensure Cisco ISE is able to interoperate with network switches and functions from Cisco ISE are successful across the network segment,

More information