Академический Документы
Профессиональный Документы
Культура Документы
Nortel GGSN
User’s Guide
While the information in this document is believed to be accurate and reliable, except as otherwise expressly agreed to in writing
NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS OR
IMPLIED. The information and/or products described in this document are subject to change without notice.
Nortel, Nortel Networks, the Nortel logo, and the Globemark are trademarks of Nortel Networks.
Publication history
September
GGSN 6.0 Standard 11.06.
Case 080909-56998 has been resolved. Table 9-4 and Table 9-8 have
been updated to correct ordering of the Direct Tunnel related counters.
August 2008
GGSN 6.0, Standard 11.05. This is the standard release of this
document.
May 2008
GGSN 6.0, Preliminary 11.04.
May 2008
GGSN 6.0, Preliminary 11.03. This is the preliminary release of this
document.
February 2008
GGSN 6.0, Draft 11.02. Updated information regarding the Continuous
Time Period Time Event Charging feature.
December 2007
GGSN 6.0, Draft 11.01. Updated information regarding the following
features
December 2006
GGSN 5.0.1, Standard 10.35.
June 2006
GGSN 5.0, Standard10.07. This is the standard release of this
document.
April 2006
GGSN 5.0, Preliminary 10.06. Updated for change requests.
February 2006
GGSN 5.0, Preliminary 10.04. Updated for change requests.
January 2006
GGSN 5.0, Preliminary 10.03. Updated for SME comments and
change requests.
December 2005
GGSN 5.0, Preliminary 10.02.
October 2005
GPRS 7.0/UMTS 5.0, GGSN 5.0 10.01. This is the initial draft release
of this document for GGSN 5.0.
September 2005
GPRS 6.0/UMTS 4.0, 09.06. This Preliminary version incorporates
updates for the following CRs:
• Q01080072-01 (OAM)
• Q01081352-01 (“Outgoing to Internet and Intranet using GRE
tunnel”)
• Q01085756 (OAM)
• Q01093522 (“Diameter Credit Control (DCC) Event Logs”)
• Q01075378 (Redundancy)
• Q01084380 (OAM)
• Q01093522 (OAM)
• Q01094475 (IP Services)
• Q01100746 (“Route redundancy”)
• Q01109982-02 (Provisioning)
• Q01123395 (IP Services)
• Q01160679 (Appendix B: Detailed Protocol Information)
• Q01170977 (Product Limitations chapter) - added per CR, then
removed
• remove “Upgrade strategy” procedures and add reference to
Upgrade NTP
• add overview and pointer to “SCS backup and restore” procedures
in Upgrade NTP
March 2005
GPRS 6.0/UMTS 4.0, 09.03. Incorporated updates to parameter
definitions and values, and branding changes for Nortel, SER 5500,
VPN Router, W-NMS.
February 2005
• GPRS 6.0/UMTS 4.0 09.02. Incorporated change to CR
Q01065148 and updated screen captures.
• GPRS 6.0/UMTS 4.0 09.01. This draft version for the GPRS 6.0
and UMTS 4.0 (GGSNS 4.1) releases includes updates for GGSN
4.1.
January 2005
GPRS 6.0/UMTS 4.0, 08.05. This Preliminary version for the GPRS
6.0 and UMTS 4.0 (GGSNS 4.0) releases includes updates for CRs.
December 2004
GPRS 6.0/UMTS 4.0, 08.04. This Preliminary version for the GPRS
6.0 and UMTS 4.0 (GGSNS 4.0) releases includes technical updates
for CRs and review comments.
December 2004
GPRS 6.0/UMTS 4.0, 08.03. This Preliminary version for the GPRS
6.0 and UMTS 4.0 (GGSNS 4.0) releases includes information for
GGSNS 4.0.1.
September 2004
GPRS 6.0/UMTS 4.0, 08.02. This Preliminary version is updated for
the GPRS 6.0 and UMTS 4.0 (GGSNS 4.0) releases.
July 2004
GPRS 6.0/UMTS 4.0, 08.01. This Draft version is updated for the
GPRS 6.0 and UMTS 4.0 (GGSNS 4.0) releases.
The organization of this document has the following changes from the
GGSNS 3.2 version:
• The chapter “Configuration procedures” was removed. All
configuration information is contained in GPRS/UMTS Nortel
Networks GGSN Procedures Reference Manual (411-5221-927).
• The appendix “Univity GGSN CLI” was removed. All CLI
information is contained in GPRS/UMTS Nortel Networks GGSN
Command Line Interface Guide (411-5221-922).
• Information on the RADIUS protocol is removed from appendix
“Detailed protocol information”. RADIUS protocol information is
contained in Nortel Networks GGSN RADIUS Interface Guide (411-
5221-928).
The name “Univity GGSN” is replaced with “Nortel Networks GGSN.”
May 2004
GPRS 5.0/UMTS 3.0, 07.03. This Standard version contains updated
information for the GPRS 5.0 and UMTS 3.0 (GGSNS 3.2) releases.
May 2004
GPRS 5.0/UMTS 3.0, 07.02. This is the Standard version for the
GPRS 5.0 and UMTS 3.0 (GGSNS 3.2) releases.
January 2004
GPRS 5.0/UMTS 3.0, 07.01. This Preliminary version for the GPRS
5.0 and UMTS 3.0 releases is updated for the GGSNS 3.2 release of
the GGSN software.
October 2003
GPRS 5.0/UMTS 3.0, 06.05. This Standard version includes updated
information for the GPRS 5.0 and UMTS 3.0 releases.
August 2003
GPRS 5.0/UMTS 3.0, 06.04. This Standard version for the GPRS5 .0
and UMTS 3.0 releases includes information for the GGSNS 3.1
release of the Shasta GGSN software.
June 2003
GPRS 5.0/UMTS 3.0, 06.03. This is the Standard version for the
GPRS 5.0 and UMTS 3.0 releases.
November 2002
GPRS 5.0/UMTS 3.0, 06.02. This Preliminary version contains
updated information for the GPRS5.0 and UMTS3.0 releases.
September 2002
GPRS 5.0/UMTS 3.0, 06.01. This Draft version contains updated
information for the GPRS5.0 and UMTS3.0 releases.
September 2002
GPRS 4.0/UMTS 2.0, 05.05. This is the Standard version for the
GPRS 4.0 and UMTS 2.0 releases.
August 2002
GPRS 4.0/UMTS 2.0, 05.04. This Preliminary version includes
updates for Change Requests (CRs) and information about GRE VPN.
May 2002
GPRS 4.0/UMTS 2.0, 05.03. This Preliminary version contains
updated information for the GPRS 4.0 and UMTS 2.0 releases.
April 2002
GPRS 4.0/UMTS 2.0, 05.02. This Preliminary version contains
updated information for the GPRS 4.0 and UMTS 2.0 releases.
March 2002
GPRS 4.0/UMTS 2.0, 05.01. This Draft version contains updated
information for the GPRS 4.0 and UMTS 2.0 releases.
February 2002
GPRS 3.0/UMTS 1.2, 04.03. This is the Standard version for the
GPRS 3.0 and UMTS 1.2 releases.
October 2001
GPRS 3.0/UMTS 1.2, 04.02. This is the Preliminary version for the
GPRS 3.0 and UMTS 1.2 releases.
October 2001
GPRS 3.0, 04.01. This Draft version contains updated information for
the GPRS 3.0 release.
September 2001
GPRS 2.1, 02.02. This is the Standard version for the GPRS 2.1
release.
July 2001
UMTS 1.1, Preliminary 03.01. This Preliminary version contains
updated information for the UMTS 1.1 release.
July 2001
GPRS 2.1, 02.01. This Preliminary version contains updated
information for the GPRS 2.1 release.
June 2001
GPRS 2.0/UMTS 1.0, 01.04. This Preliminary version contains
updated information for the GPRS 2.0 release.
May 2001
UMTS 1.0, 01.03. This Preliminary version contains updated
information for the UMTS 1.0 release.
January 2001
UMTS 1.0, 01.02. Release for the UMTS 1.0 Alpha trial.
December 2000
UMTS 1.0, Draft 01.01. Document creation.
Contents 1
Introduction 2- 1
GGSN interfaces 2-3
Ga interface protocol 2-3
Gc interface protocol 2-4
Gn/Gp interface protocol 2-4
Gi interface protocols 2-6
Gy Interface Protocol 2-6
Gx Interface Protocol 2-7
Functional description 3- 1
Overview 3-1
Functional concepts 3-3
Internet Service Provider (ISP) 3-3
Access Point Name 3-12
Subscriber Template 3-13
RAT Mapping 3-13
GTP protocol 3-14
Multiple primary PDP contexts 3-14
Secondary PDP Context 3-15
Protocol interaction 3-15
IP PDU type 3-15
PPP PDU type 3-18
Path management 3-21
Idle Session Verification 3-22
Direct Tunnel 3-23
GTP-U sequence numbers 3-23
APN Selection Mode 3-23
Subscriber Username 3-24
P-CSCF discovery 3-24
IM CN Subsystem Signalling flag 3-24
HSDPA Parameters 3-25
QoS Signalling Indication 3-25
Single Access Point Name 3-25
Vendor Specific Attributes (VSA) 3-27
VPN membership 3-27
IP Services 3-30
Real-time charging subscription 3-31
Outbound tunneling 3-31
IP Address Pool 3-34
Single APN Accounting 3-34
Aggregation Access Point Name 3-35
Subscriber Access Control 3-35
Visiting GGSN (V-GGSN) Access Control 3-35
Subscriber authentication 3-36
IP address allocation 3-39
RADIUS 3-39
DHCP 3-40
Local address pool 3-46
Static IP address 3-46
GGSN accounting 3-47
GTP accounting 3-47
Regular billing 3-49
Hot billing 3-50
GTP’ protocol 3-51
Tariff Based Billing 3-52
Accounting record generation 3-53
Automated Accounting Record Transfer 3-58
IP services 5- 1
Overview 5-1
Policy merging 5-2
IP Services for IP in IP 5-3
Firewall 5-5
Traffic Policing 5-5
Traffic Shaping 5-7
Policy-Based Forwarding 5-8
Web Steering 5-8
Personal Content Portals 5-9
DiffServ Marking 5-9
Anti-Spoofing 5-10
WAP 1.2/2.0 and HTTP 1.1 Redirection 5-10
WAP Connection-oriented Mode 5-11
WAP Packet Rating 5-12
HTTP 1.1 Redirection 5-16
Content Based Billing 5-17
WAP filter overview 5-21
WAP overview 5-21
WSP connection-mode and connectionless session services 5-22
WAP and MMS 5-22
WAP filter 5-22
Event Based Billing 5-24
Event definition and triggers 5-24
Event and Non-Event Traffic 5-25
Event completion optionality 5-27
Per-GET billing for HTTP and WSP 5-27
Dynamic Policy Control 5-27
Charging Rule Modification 5-28
Content Filtering 5-31
ISP security services 5-33
ISP Node Services 5-33
Management Services 5-39
Security Policy definition 5-39
Security Policy examples 5-39
Application of Management Services 5-41
Traffic Performance Optimizer (TPO) Interworking 5-41
Flow Management 5-43
IP routing 6- 1
Overview 6-1
Wireless ISP model routing 6-2
Aggregation APN 6-4
L2TP VPN model 6-4
GUI Provisioning 8- 1
Overview 8-1
SCS Graphical User Interface 8-1
Access Properties Provisioning 8-1
GGSN Profiles and Templates 8-3
CORBA API User Interface 8-229
OA&M 9- 1
Overview 9-1
Operation Measurements 9-1
Historical Statistics 9-2
SER Base OMs 9-119
SER Base CLI statistics 9-124
Alarms 9-125
SNMP Traps 9-126
GGSN SNMP Traps 9-127
SER Base SNMP Traps 9-169
SNMP Traps 9-229
Event Logs 9-229
GGSN Event Logs 9-231
Patch profile verification started 9-264
Patch Profile Verification Completed 9-264
Information on patch profile 9-267
SER Base Event Logs 9-272
Event Trace 9-311
Event Trace Logs 9-312
Standard Event Logs 9-321
System Time 9-322
Software Optionality Control (SOC) 9-323
Active Session Management (ASM) 9-323
CLI Command 9-330
Patching System 9-330
Upgrade Strategy 9-331
SCS Backup and Restore 9-331
Functional Description 9-331
Local Full System Backup/Restore 9-332
Essential Data Backup/Restore 9-332
Archival and Retrieval of Dynamic Data 9-334
Restrictions / Limitations 9-334
GDC Tool (GGSN Data Collector) 9-335
Background: 9-335
Introducing GDC (GGSN Data Collector) 9-336
Recommendations: 9-336
Running GDC: 9-336
Products and Releases: 9-337
APN 10-10
Prepaid Service 10-11
IP Services 10-12
IP Routing 10-16
Restrictions for the VLAN BGP VPN Solution 10-16
Redundancy 11- 1
Nortel GGSN 11-1
Control and Management Card (CMC) redundancy 11-1
Subscriber Service Module (SSM) redundancy 11-1
Switch Fabric Card (SFC) redundancy 11-3
Interface redundancy 11-4
GRE Tunnel redundancy 11-4
ATM port redundancy 11-4
Service Creation System (SCS) Server 11-5
Charging Gateway Function (CGF) 11-5
Prepaid Server 11-6
Diameter Credit Control Server 11-6
Application Server 11-6
RADIUS Server 11-7
RADIUS Authentication Server 11-7
RADIUS Accounting Server 11-7
DHCP Server 11-9
FTP Server 11-9
Traffic Performance Optimizer (TPO) Server 11-9
Related documents 1
Roadmap to Packet Core 05 documentation
Figure i shows the NTPs in the documentation suite for PC05.
Figure i
PC05 Documentation Roadmap
F a u lt a n d
P la n n in g a n d In s ta lla tio n a n d O p e ra tio n s a nd P e rfo rm a nc e
C o n c e p ts U p g ra d in g
E n g ine e rin g C o m m is s io n in g A d m in is tra tio n M anagem ent
Specifications
For more information about the GSM, UMTS, and other standards
specifications referred to in this document, refer to the following
documents:
• 3GPP TS 03.60, version 7.9.0, Service Description
• 3GPP TS 09.60, version 7.10.0, GPRS Tunnelling Protocol (GTP)
across the Gn and Gp Interface
• 3GPP TS 09.61, version 7.10.0, Interworking between the Public
Land Mobile Network (PLMN) and Packet Data Network (PDN)
• 3GPP TS 23.060, version 4.9.0, Service Description
• 3GPP TS 23.107, version 4.6.0, UMTS QoS Concept and
Architecture
• 3GPP TS 29.060, version 4.10.0, GPRS Tunnelling Protocol (GTP)
across the Gn and Gp Interface
• 3GPP TS 29.061, version 4.8.0, Interworking between the Public
Land Mobile Network (PLMN) supporting Packet Based Services
and Packet Data Network (PDN)
• 3GPP TS 32.015, version 3.2.0, Charging and Billing
• 3GPP TS 32.015, version 3.6.0, Charging and Billing
• ITU-T X.680 (07/94), OSI Networking and System Aspect -
Abstract Syntax Notation One (ASN.1)
• RFC 1661, The Point-to-Point Protocol (PPP)
• RFC 1701, Generic Routing Encapsulation (GRE)
• RFC 1702, Generic Routing Encapsulation (GRE) over IPv4
Networks
• RFC 1771, A Border Gateway Protocol 4 (BGP-4)
• RFC 2002, IP Mobility Support
• RFC 2131, Dynamic Host Configuration Protocol (DHCP)
• RFC 2236, Internet Group Management Protocol
• RFC 2283, Multiprotocol Extensions for BGP-4
• RFC 2401, Security Architecture for IP
• RFC 2406, IP Encapsulating Security Payload (ESP)
• RFC 2409, The Internet Key Exchange (IKE)
• RFC 2474, Definition of the Differentiated Services Field in the
IPv4 and IPv6 Headers
• RFC 2475, An Architecture for Differentiated Services
Related training 1
For questions regarding training courses for the Nortel GGSN, please
contact your local Nortel* representative for the latest course
identification, availability, and training center location.
Nortel branding 1
Nortel is changing the branding of some of its product lines. Part of this
effort includes changing the names of the products. New product names
have been created using the following format:
Nortel <function> <model>
where:
For example, the Baystack 450 product has been renamed as the
Nortel Ethernet Switch 450. Some of the new product names are
quite lengthy. To make our documents easier to read, the product
names are shortened after their first occurrence. For example, the
Nortel Ethernet Switch 450 product name is referred to as the
Ethernet Switch 450 for second and subsequent occurrences.
Table i
Original product names mapped to new names
CCN HLR Nortel GSM/UMTS HLR 100 HLR 100 Home Location
(DMS HLR) Register
DMS Gateway Mobile Nortel GSM/UMTS MSC MSC Server Mobile Switching
Switching Center Server Center
(GMSC)
—sheet 1 of 3—
Table i
Original product names mapped to new names (continued)
Offline Configuration for Wireless Provisioning System WPS for Wireless Provisioning
Access Networks for Access b Access System
(OCAN)
Univity HLR c Nortel GSM/UMTS HLR 200 HLR 200 Home Location
Register
—sheet 2 of 3—
Table i
Original product names mapped to new names (continued)
—sheet 3 of 3—
a. NIMS PrOptima™ is a sub-component of W-NMS
b. WPS for Access is a sub-component of W-NMS
c. May have also been referred to as Everest HLR
d. May have also been referred to as HP SIG
Table ii
New product names mapped to original name(s)
Nortel Applications Switch xxxx Applications Switch xxxx Alteon Application Switch
xxxx
Nortel GSM/UMTS HLR 100 HLR 100 CCN HLR, DMS HLR
—sheet 1 of 3—
Table ii
New product names mapped to original name(s) (continued)
Nortel IP Services Edge Router IP Services Edge Router 5500 Shasta 5000 BSN
5500
Nortel Multiservice Switch 7400 Multiservice Switch 7400 Passport 7400 (7K)
Nortel Multiservice Switch 15000 Multiservice Switch 15000 Passport 15000 (15K)
Nortel Multiservice Switch 20000 Multiservice Switch 20000 Passport 20000 (20K)
Nortel VPN Router xxxx VPN Router xxxx Contivity xxxx Secure IP
Services Gateway,
Nortel Networks Secure
Router xxxx
—sheet 2 of 3—
Table ii
New product names mapped to original name(s) (continued)
Nortel Web Switch 184 Web Switch 184 Alteon Web Switch 184
Wireless Provisioning System for WPS for Access Offline Configuration for
Access d Access Networks (OCAN)
—sheet 3 of 3—
a. May also have been referred to as Everest HLR
b. May also have been referred to as HP SIG
c. NIMS PrOptima™ is a sub-component of W-NMS
d. WPS for Access is a sub-component of W-NMS
• DHCP Client
• Service Edge Router VPRN
• IPSec Branch Office
• RIPv2 Routing
• Routing - OSPFv2
• Service Edge Router Stateful Firewall
• Data Plane Redundancy
• GGSN Prepaid
• Border Gateway Protocol v4
• Policing
• Traffic Shaping
• Policy Based Routing
• DiffServ Marking on Gi interface
• Gn over Ethernet
• GTP version 0 and version 1
Feature Description
A number of features have been introduced in the GGSN 3.2 and prior
releases which are detailed in the following table:
Table 1-1
UMTS 3.0/GPRS 5.0 GGSN Features
1009 (In GPRS Provide PDP Support of PDP context during handoff
2.1 release) context support between SGSNs including fallback/
for inter SGSN fallforward between GTP version 0 and
handoff version 1 SGSNs
1022 (In GPRS GPRS Billing Provide 3GPP TS 32.015 compliance for
2.1 release) GSM TS 32.015 GGSN accounting function.
content
conformance
1033 (In GPRS Hot Billing Support of passing CDRs to CGF in real
2.1 release) time
Table 1-1
UMTS 3.0/GPRS 5.0 GGSN Features (continued)
Table 1-1
UMTS 3.0/GPRS 5.0 GGSN Features (continued)
19231 SCS GUI Active This feature enhances the Nortel GGSN
Session OAM capabilities by providing a SCS
Management GUI for the display of selected statistic
values and the execution of Active
Session Management (ASM) commands.
Table 1-1
UMTS 3.0/GPRS 5.0 GGSN Features (continued)
Table 1-1
UMTS 3.0/GPRS 5.0 GGSN Features (continued)
11818 DiffServ EF/CS The DSCP marking of EF, CS7, CS6 and
Marking DE in the IP packet header is supported
on the Gn and Gp interfaces for the
downlink packets.
20587 Secure GGSN The SSH for CLI login ensures that all
Management command line interface traffic is
Traffic encrypted and secure. The SSL between
SCS client and SCS server ensures that
all management traffic is encrypted and
secure.
Table 1-1
UMTS 3.0/GPRS 5.0 GGSN Features (continued)
• The configuration of TCP port number for Prepaid Service via SCS
is moved from the General page to the new Device page in the
Tariff Profile. The TCP port is provisioned on a per device basis.
• The configuration of DHCP pool name via SCS is moved from the
Subscriber Template to the DHCP Profile. When the ISP/APN
spans across multiple devices, the pool name can be assigned on
a per device basis.
• The incoming requests for creating new PDP contexts can be
disallowed via the configuration of GTP Tunnel Device page via
SCS. It provides the option to choose the way to reject the requests
on a per device basis. This function will be used for software
upgrade on Nortel GGSN node.
• A new Ga ISP is introduced for the Ga interface. The billing
information can be transferred using the Gn ISP or the Ga ISP. The
new Ga ISP option is to prevent any IP packets from tandeming
through the Nortel GGSN between PLMN network and OAM
network.
• Based on the configuration of RADIUS Profile and Application
Profile, the MSISDN is optionally added to the Calling-Station-Id
attribute in the RADIUS Access-Request, Accounting-Request
Start/Stop/Interim-Update messages.
• When receiving an Update PDP Context Request message due to
the inter-SGSN Routing Area Update (including fallforward and
fallback), an Accounting Request Interim-Update is sent to
RADIUS Server with the 3GPP-SGSN-Address attribute. This only
occurs when the RADIUS accounting or WAP Service is enabled.
• If the subscriber requests a static IP address or an IP address is
specified with the PPP PDU type, then the End User Address
Information Element (IE) is included in the Create PDP Context
Response message without the PDP Address field.
• Add the APN historical statistics for the Update PDP Context
Request messages sent from the Nortel GGSN in addition to the
statistics for the same request messages sent from the SGSN.
• The support of multiple primary PDP contexts is added to the
Nortel GGSN.
• Two different formats of the Cell Global Identification of GTP
version 0 and Service Area Identifier (SAI) of GTP version 1 in the
GTP private extension are supported by the Nortel GGSN. The
different formats are identified by different Length values in the
private extension IE.
• The range of Periodic Billing - Volume Limit configuration on the
APN Group Accounting Billing page has been changed to 128 -
5000 KBytes.
• The range of Response Time configuration on Tariff Profile General
page has been changed to 1 - 15 seconds.
• GGSN 4.0
• GGSN 4.1.
GGSN 4.0 Description
The GGSN 4.0 is part of UMTS 4.0/GPRS 6.0 product release. There
are a number of functions being added to GGSN 4.0 which are
detailed in the following table:
Table 1-2
GGSN 4.0 Features in UMTS 4.0/GPRS 6.0
11832 ATM Service Classes: Improve the shaping capability for UMTS
CBR, VBR QoS traffic classes over ATM.
Specifically, it provides the multiple VC
support of CBR, rt-VBR and nrt-VBR.
Table 1-2
GGSN 4.0 Features in UMTS 4.0/GPRS 6.0 (continued)
22987 GGSN HW for PC04 - The SFC2 hardware provides support for
SFC2 expanded ATM service classes as well
as robustness and failover
improvements.
25058 SCS - Local Full This feature provides the offline ability to
System and perform a full backup and full restore of
Centralized Data the Solaris OS, third-party software, SCS
Backup and Restore application and all server data. In
addition, this feature automates the data
backup/restore for SCS from centralized
PWI backup/restore solution.
—sheet 2 of 5—
Table 1-2
GGSN 4.0 Features in UMTS 4.0/GPRS 6.0 (continued)
Table 1-2
GGSN 4.0 Features in UMTS 4.0/GPRS 6.0 (continued)
Table 1-2
GGSN 4.0 Features in UMTS 4.0/GPRS 6.0 (continued)
28188 CBB Usage Time This activity enhances the existing CBB
Accounting functionality by filtering different layer 7
Enhancements applications and report usage based on
time.
28308 DCC Failure Handling This feature enables Nortel GGSN with
CCFH capability for a CCA timeout. If the
CCFH value for the session is
CONTINUE, session is continued as a
non-prepaid session.
28317 HTTP Pipelining and This feature enhances the existing CBB
WAP Buffering service to correctly rate the pipelined and
fragmented HTTP requests and their
responses.
—sheet 5 of 5—
• The Nortel GGSN is rebased to the Shasta base iSOS 4.5 software
load.
• The disk overload control is enhanced with introducing new event
logs and lowering the alarm threshold for disk overload.
• The WAP Push Service Object is supported for provisioning an
URL list in the CBB policy.
26514 SCS Command Line Support of the CORBA Shell on the SCS
Interface server for GGSN provisioning.
Table 1-3
GGSN 4.1 Features in UMTS 4.1/GPRS 6.0 (continued)
Table 1-3
GGSN 4.1 Features in UMTS 4.1/GPRS 6.0 (continued)
Table 1-3
GGSN 4.1 Features in UMTS 4.1/GPRS 6.0 (continued)
Table 1-3
GGSN 4.1 Features in UMTS 4.1/GPRS 6.0 (continued)
24655 Event Based Billing Event based billing provides the ability to
charge on a per event (e.g. MMS, e-mail,
IM) basis, and not based on the quantity
of data. This function follows current
SMS charging architecture.
GGSN 5.0 1
Nortel GGSN 5.0 release is deployed to both GPRS and UMTS
networks.
Functionalities Description
GGSN 5.0 is part of UMTS 5.0 product line release. There are a
number of functions being added to the GGSN 5.0 release which are
detailed in the following table:
Table 1-4
GGSN 5.0 Features
Table 1-4
GGSN 5.0 Features
27566 Nortel GGSN Content This feature provides support for content
Filtering filtering allowing to filter Internet requests
from the user. Internet requests can be
HTTP or WAP based and are directed to
a content filtering server.
Table 1-4
GGSN 5.0 Features
Table 1-4
GGSN 5.0 Features
30077 SGSN Grouping and Provide the SGSN grouping function and
RAT Mapping allow the mapping of serving Radio
Function Access Technology if it is not received
from the SGSN.
GGSN 5.0.1 1
Nortel GGSN 5.0.1 release is deployed to both GPRS and UMTS
networks.
Functionalities Description
GGSN 5.0.1 is part of UMTS 5.0 product line release. There are a
number of functions being added to the GGSN 5.0.1 release which are
detailed in the following table:
Table 1-5
GGSN 5.0.1 Features
Table 1-5
GGSN 5.0.1 Features
Q01086721-03 Secure PAP/CHAP This feature provides the GGSN with the
L2TP Authentication capability to negotiate up to CHAP from
PAP with bringing up an L2TP tunnel for
a mobile subscriber. Please refer to
Chapter 3, “L2TP secure PAP/ CHAP” on
page 76.
GGSN 6.0 1
Nortel GGSN 6.0 release is deployed to both GPRS and UMTS
networks.
Functionalities Description
GGSN 6.0 is part of UMTS 6.0 product line release. There are a
number of functions being added to the GGSN 6.0 release which are
detailed in the following table:
Table 1-6
GGSN 6.0 Features
Table 1-6
GGSN 6.0 Features
Introduction 2
Gateway GPRS Support Node (GGSN) functionality is common
between GPRS and Universal Mobile Telecommunication System
(UMTS) networks. The GGSN is the element defined the GPRS/UMTS
system to provide interconnection between the GPRS/UMTS IP
backbone network and the external data packet network.
Figure 2-1
GGSN network connectivity
SGSN
GGSN
SGSN Public
Packet Data
GGSN Network
SGSN
Home PLMN SGSN
BG
SGSN GGSN
Visiting PLMN
BG - Border Gateway
GGSN interfaces 2
Following is a summary of the GGSN standard interfaces that are
defined by the GPRS/UMTS standards. Figure 2-2 shows the GGSN
standard interfaces.
Figure 2-2
GGSN standard interfaces
Gc Gx
Gy
Gn Gi
SGSN GGSN PDN TE
Gp
Ga
Billing
SGSN CGF
CGF System
Other PLMN
Ga interface protocol
The Ga interface is defined in 3GPP TS 32.015, version 3.6.0,
“Charging and Billing”. The specification defines the signaling and data
transfer procedure for the GTP’ protocol used between the GGSN and
the CGF for GGSN accounting. The GGSN accounting records are
transferred from the GGSN to the CGF using GTP’ protocol in ASN.1
format.
The following GTP’ messages are supported between the Nortel GGSN
and CGFs:
• Node Alive Request
• Node Alive Response
• Redirection Request
• Redirection Response
• Echo Request
• Echo Response
• Data Record Transfer Request
• Data Record Transfer Response
• Version not Supported
Gc interface protocol
The Nortel GGSN does not support the Gc interface.
Figure 2-3 shows the protocol stack for the control plane of GTP
between SGSN and GGSN.
Figure 2-3
Control Plane of SGSN-GGSN
GTP-C GTP-C
UDP UDP
IP IP
L2 L2
L1 L1
GSN Gn/Gp GSN
The User Plane between the SGSN and the GGSN for GPRS
networks and UMTS networks is the same. Figure 2-4 shows the
protocol stack for the User Plane between SGSN and GGSN.
Figure 2-4
User Plane of SGSN-GGSN
Application
Relay GTP-U
GTP-U
UDP UDP
IP IP
L2 L2
L1 L1
Gn Gi
SGSN GGSN
Gi interface protocols
IPv4 is the basis for interworking with external PDNs. Mobile
subscribers can access the external public data network with IP PDU
type or PPP PDU type. Some access modes require tunneling
between the GGSN and the remote Intranet, which means that
tunneling protocols are required on the Gi interface. Tunneling
protocols are supported on the Gi interface between the GGSN and
the remote Intranet to provide security when connectivity is
established across an insecure network (for example, Internet).
The following tunneling protocols are supported on the Nortel GGSN for
the Gi interface:
• L2TP
• L2TP over IPSec
• IPSec
• GRE
• ATM-VC VPN
• MPLS VPN
Gy Interface Protocol
The Gy interface is defined in “3GPP TS 32.299, version 6.1.0,
Diameter Charging Applications.” Diameter Credit Control (DCC)
facilitates GGSN online, real-time charging interoperability and system
integration with 3rd party credit control servers through the use of a
standard based Diameter interface.
Gx Interface Protocol
The Gx interface is defined in “3GPP TS 29.210, version 6.0.0,
Charging rule provisioning over Gx interface” and provided for the
policy control of PDP context. The Gx interface is based on Diameter
as specified in “RFC 3588, Diameter Base Protocol” and Diameter
Credit Control (DCC) Application as specified in “IETF Draft draft-ietf-
aaa-diameter-credit-control-05_04.rtf Diameter Credit-Control
Application.” DCC is also known as the Gy interface. Gx specific AVPs
are supported over the existing DCC protocol. With regard to the
Diameter protocol, the GGSN acts as the Diameter client (network
element requesting charging rules) and the CRF acts as the Diameter
server.
GGSN services 2
In addition to the standard interfaces, Nortel GGSN supports a variety
of GGSN services. Depending on what services PLMN operators want
to offer to the subscribers, different kinds of configuration profiles can
be provisioned. These profiles are feasible through the service
functions provided by the Nortel GGSN. For example, access to the
Intranet, Internet or ISP may involve specific service functions, such as
user authentication, user authorization, address allocation and end-to-
end encryption between the mobile and the Intranet/ISP.
• Accounting
— GTP Accounting
– G-CDR Auditing
– Tariff Based Billing (Time of Day billing)
– Automated G-CDR Transfer
— RADIUS Accounting
• OA&M
— Operational Measurements
— Event Logs
— Alarms
— Active Session Management (ASM)
— Command Line Interface (CLI)
— CORBA Interface
— Patching
• Wireless Services
— GGSN QoS
— Tariffing (i.e. Prepaid, GeoZone)
— Wireless Application Protocol (WAP)
• IP Services
— Firewall
— Traffic Policing
— Traffic Shaping
— Policy-Based Forwarding
— Web Steering
— Personal Content Portals
— DiffServ Marking
— Anti-Spoofing
— Content Based Billing(CBB)
— Event Based billing (EBB)
— Node and Management ISP services
— Wap 1.2/2.0 and HTTP 1.1 Redirection
— Traffic Performance Optimizer (TPO) Interworking
— Content Filtering
— Flow Management
• IP Routing
— OSPF
— RIP
— BGP
— IS-IS
— IP Multicast
— MPLS
Functional description 3
Overview 3
Nortel GGSN functionality is built on the base on the Nortel Services
Edge Router 5500 (SER 5500) platform. In this chapter, only GGSN
specific functionality is described.
Figure 3-1
GGSN interworking components
Top-Up Server
Legend:
- CFS - Content Filtering
- CGF: Charging Gateway Function
- CRF: Charging Rule Function
- CTP: Card Telephony Protocol
- DCC: Diameter Credit Control Application
- DHCP: Dynamic Host Configuration Protocol
- GTP: GPRS Tunneling Protocol
- GTP’: GPRS Tunneling Protocol Prime
- LIG: Lawful Interception Gateway
- OSS: Operations Support System
- RADIUS: Remote Authentication Dial In User Ser-
vice
- SMP: Shasta Management Protocol
- SNMP: Simple Network Management Protocol
- TPO: Traffic Performance Optimizer
Functional concepts 3
The following sections explain concepts that are fundamental to the
GGSN.
The GGSN uses the ISP concept to define the OAM interface, Gn
interface, the Ga interface and one or more Gi interfaces, the ADMF/
DF2/DF3 interface, and the Traffic Performance Optimizer (TPO)
interface. This is accomplished by creating an ISP for the Gn interface
which implements the GTP protocol, an ISP for the Ga interface which
handles the GGSN GTP accounting, one or more ISPs for the Gi
interfaces that implements Access Point Name (APN) associated
services and protocols, an ISP for the interface to LIG which provides
the lawful intercept function, and an ISP for the interface to TPO
Server which provides the data optimization and compression
functions. An ISP is automatically created for the OAM interface to the
SCS Server. GGSN needs a resync via SCS GUI if the IP address of
any ISP on the GGSN is changed.
Attention: The GGSN must be re-synced using the SCS GUI if the
IP address of any ISP on the GGSN is changed.
Figure 3-2
GGSN ISP logical configuration
GGSN
Connection
APN
Gi
ISP
APN
Gn
Gn ISP
SGSN
SGSN APN
SGSN Connection
ISP
APN
Packet Data
APN
Network
APN
Connection
LI ISP
ISP
APN
APN
TPO ISP
LIG
Default
Ga ISP
ISP
Ga OAM
TPO
Server
OAM
Network
Only one Gn ISP, one Ga ISP, one LI ISP, and one TPO ISP can be
supported per Nortel GGSN. If more than one Gn ISP, Ga ISP, LI ISP,
or TPO ISP is configured on Nortel GGSN, it is considered a
configuration error. However, the Ga interface with the GTP’ protocol
has the option to be configured in the Gn ISP. If the Ga interface in the
Gn ISP option is chosen, the configuration of Ga ISP is not required.
Only one Ga interface can be configured on Nortel GGSN, which can
be located in the Gn ISP or the Ga ISP. Figure 3-3 “GGSN ISP logical
configuration without Ga ISP” shows the relationship between the Gn
ISP and the connection ISPs without a Ga ISP.
Figure 3-3
GGSN ISP logical configuration without Ga ISP
GGSN TPO
TPO ISP
Server
Connection
SGSN APN
SGSN
ISP
SGSN APN
Gn ISP
Gn
APN
Connection
ISP
APN
APN
Ga
APN
Connection
Default ISP
ISP
APN
OAM APN
Network OAM
LI ISP
LIG
If more than one Connection ISP is configured with the same APN,
then a match is made with the Connection ISP that was configured
first. Any other ISPs with that APN are never used.
Default ISP
The Default ISP is configured using the command line interface during
initial installation of the GGSN. The role of the Default ISP is to permit
communications between the GGSN and the SCS Server. Only when
communication has been established, the SCS Server can be used to
further provision the GGSN.
Gn ISP
The Gn ISP implements the Gn interface on the Nortel GGSN. This is
achieved by configuring the ISP with a GTP tunnel. The configured
GTP tunnel on the Gn ISP is a logical entity to identify the Gn interface.
One or more SGSNs can communicate with the Nortel GGSN using
one Gn ISP. The Nortel GGSN node IP address should be used for the
GGSN routing on the DNS servers instead of Gn interface address.
Figure 3-4
Gn ISP configuration diagram
Gn ISP
Access Properties
GTP Tunnel GTP’ Profile
GTP’ Profiles
CGF Profiles
Ga ISP
The Ga ISP is an optional ISP that is configured for the billing
information transfer using the Ga interface. The advantage of
configuring a dedicated ISP for the billing transfer is to separate the
interfaces to the bearer network and to the OAM network. In this case,
the IP packets will not be tandemed between these two networks
through the GGSN.
Figure 3-5
Ga ISP configuration diagram
Ga ISP
Access Properties
GTP’ Profile
GTP’ Profiles
CGF Profile
CGF Profiles
Connection ISP
The Connection ISP implements a Gi interface on the GGSN. This is
achieved by configuring an ISP with an APN. The Gi interface on the
Connection ISPs should be configured as trunk connection.
Tariff Profiles and Application Profiles are also assigned to the APN if it
uses either of these services. Since a Connection ISP can span
multiple devices, the Tariff or Application Profile is specified on a per
device basis.
Figure 3-6
Connection ISP configuration diagram
Connection ISP
Access Properties
APN
PPP Profiles
Subscriber Application Tariff GGSNQoS ToD Admin
Billing Template Profile Profile Profile Profile State
Application Profiles
Tariff Profiles
ToD Profiles
RADIUS Profiles
DHCP Profiles
DHCP Profile RADIUS Profile IP Address pools
Connection Template
Service Policies
LI ISP
LI is configured as a separate ISP on the GGSN. This ISP can only be
accessed by authorized users. Using a separate ISP restricts access
to the LI configuration and parameters. The password for the LI ISP
must be known to access the LI configuration.
TPO ISP
The Traffic Performance Optimizer (TPO) ISP on the GGSN is used to
communicate with the TPO Server. The IP address of TPO ISP is used
by the TPO Server to send IP packets to the GGSN. There can be only
one TPO ISP per GGSN and it has to be a separate ISP, in other
words, can not configure Gn, LI, Ga, or Connection ISP to be a TPO
ISP.
Based on the APN received within the Create PDP Context Request,
matching is done with the APN against all APN records in the
configuration database. When the match is found, the APN record with
the specific APN and ISP is retrieved. The APN record has GGSN
accounting information in it and a subscriber template listed. Using the
subscriber template listed in the APN record, all the subscriber specific
information is determined.
With the APN Session Limit, the maximum number of concurrent PDP
sessions allowed to use the APN can be specified on a per device
basis. The cause value for PDP session reject after the limit is reached
is “No Resources Available.” Once the APN session limit has been
reached, the GGSN generates a MINOR level alarm. After five
minutes, this alarm is automatically cleared if the number of sessions
using the APN has dropped below the configured limit.
Subscriber Template
The Subscriber Template is used to provision a group of subscribers
that share the same profiles and services. An instance of a subscriber
is created after matching to a specific Subscriber Template. The
GGSN matches a mobile subscriber with a Subscriber Template using
the APN specified in the Create PDP Context Request. When an APN
is provisioned, it is associated with a specific Subscriber Template that
in turn has all user profiles (for example, RADIUS Profile) and Service
Profiles (for example, IP Service Profile and Policies) associated with
it.
RAT Mapping
RAT Mapping is SOC activated on a per SCS basis. The function RAT
Mapping is triggered on a per APN basis. The serving RAT is
provisionable in SGSN Mapping table. When RAT Mapping is enabled,
the GGSN derives the serving RAT from the table if it is not received in
Create/Update PDP Context Request messages.
Matching entry in the Use the Use the RAT of the matching entry
SGSN Mapping table received RAT
found
Matching entry in the Use the Default entry in the SGSN Use the RAT of
SGSN Mapping table not received RAT Mapping table provisioned the default entry
found
Default entry in the SGSN Use “Unknown”
Mapping table not (0)
provisioned
GTP protocol 3
One of the main functions of the GGSN is to provide routing and
tunneling functionality for the PLMN. To provide the routing and
tunneling capability, a GTP tunnel is established between the GGSN
and other SGSNs within the same or another PLMN. The GTP tunnel
implements the GTP protocol. The GGSN supports GTP Version 0
defined in 3GPP TS 09.60, and Version 1 defined in 3GPP TS 29.060
version 3.12.0, for both PPP and IP PDU types.
Protocol interaction
The GGSN supports GTP fallback and fallforward functionality as
defined in 3GPP TS 23.060, version 3.11.0, “Service Description”.
GTP fallback functionality is the ability for an established Version 1
PDP context to be updated to Version 0, when the mobile moves from
a Version 1 SGSN to a Version 0 SGSN. GTP fallforward functionality
is the ability for an established Version 0 PDP context to be updated to
Version 1, when the mobile moves from a Version 0 SGSN to a
Version 1 SGSN.
IP PDU type
For the IP PDU type, the PPP session is established between the
Terminal Equipment (TE) and the Mobile Station (MS). The PPP
information is captured in the Protocol Configuration Options (PCO) IE
within the Create PDP Context Request and sent to the GGSN from
Figure 3-7 “IP/PPP sessions for IP PDU type” shows the IP session
and PPP session in the GPRS/UMTS network for the IP PDU type.
Figure 3-7
IP/PPP sessions for IP PDU type
IP
PPP
Packet Data
Network
GTP Tunnel
PLMN SGSN GGSN
TE
IP
PPP PPP
IP
PPP
charging server, the PDP Context Request is rejected and the GTP
tunnel is not set up.
Figure 3-8 “GTP tunnel setup for IP PDU type” summarizes the PDP
context activation procedure for the IP PDU type on the GGSN. For
more information on the PDP context activation procedure, refer to
3GPP TS 03.60, version 7.8.0, “Service Description” and 3GPP TS
23.060,version 3.11.0 “Service Description”.
Figure 3-8
GTP tunnel setup for IP PDU type
SGSN GGSN
The method of
authentication (if required)
and the method of IP
address allocation can be
specified by configuration.
Create PDP Context Response
(End User Address, Protocol Configuration Options, etc.)
Once the GTP tunnel is established between the GGSN and the
SGSN, data packets can be transferred between the mobile and the
PDN in both directions.
The following services can be applied only to PPP sessions that are
terminated on the GGSN:
• Mobile subscriber authentication
• IP address allocation
• Tariff Service
• WAP Services
• IP Services
For PPP sessions that pass through the GGSN with GTP-L2TP tunnel
switching, only Tariff service among the services listed above is
supported.
Figure 3-9 “IP/PPP sessions for PPP PDU type” shows the support of
the PPP PDU type on the GGSN.
Figure 3-9
IP/PPP sessions for PPP PDU type
IP
PPP
Packet Data
Network
GTP Tunnel
SGSN
TE
IP
PPP
Private Data
GTP Tunnel L2TP Tunnel Network
SGSN IPSec
TE (Optional)
GGSN
PLMN IP
PPP Private Data
Network
GTP Tunnel IPSec Tunnel
SGSN
TE
IP
PPP Private Data
Network
SGSN GTP Tunnel GRE Tunnel
TE
For PPP sessions terminated on the GGSN, the GTP tunnel must be
set up before Link Control Protocol (LCP) negotiation for the PPP
session. The PPP LCP negotiation messages are also counted for
GTP accounting and RADIUS accounting methods. Figure 3-10 “GTP
tunnel setup for PPP PDU type” summarizes the PDP context
activation procedure for PPP PDU type.
Figure 3-10
GTP tunnel setup for PPP PDU type
MS SGSN GGSN
LCP Negotiation
Path management
The GGSN supports path management for GTP Version 0 and Version
1 protocols by sending Echo Request and Echo Response messages
on established paths for both GTP-C and GTP-U.
The GGSN keeps track of the peer SGSN IP addresses that have
active sessions. If the number of active sessions becomes 0 for a
given SGSN IP address, the corresponding SGSN IP address is no
longer stored. The GGSN maintains information regarding the number
of active sessions with all SGSN peers as well as their Restart Counter
value. If the Echo Timer is non-zero, the GGSN will start a timer for
each path with active sessions. Once a timer expires, the GGSN will
send an Echo Request to the standard port of the peer SGSN.
set to a value other than zero and there is no uplink data before the
Idle Verification Timer expires, the GGSN sends an Update PDP
Context Request to the SGSN for verifying the context.
Direct Tunnel
The Direct Tunnel Flags IE (with DTI bit set to 1) is sent in the Update
PDP context request from SGSN which invokes Direct Tunnel. The
DTI flag in the IE shall be set by SGSN while sending Direct Tunnel
Update Request if the SGSN decides to establish a Direct Tunnel.
Once the GGSN receives a Direct Tunnel Update Request the user
plane is created between the RNC and GGSN.
Subscriber Username
The GGSN supports a maximum of 253 characters as the length of the
PCO IE. If the total length of the Username + Domain exceeds 253, it
is truncated to 253 characters.
P-CSCF discovery
In order for an IMS client to communicate with another client, it must
first obtain the addresses of the P-CSCFs that it may connect to. P-
CSCF discovery allows the mobile to request the list of P-CSCF
addresses from the GGSN.
HSDPA Parameters
Nortel Networks GGSN receives the new HSDPA values in the Quality
of Service (QoS) parameter IE. HSDPA parameters in the QoS IE are
optional parameters. When a QoS parameter is sent with Rel 5 QoS
parameters, then the first 12 octets are sent as the negotiated R99
QoS parameters. If octet Maximum bit rate for downlink (extended) or
Guaranteed bit rate for downlink (extended) is received with a value
greater than 0x4A, Nortel Networks GGSN returns a value of 0x4A in
the response.
The single APN concept enables APN consolidation by storing the per-
subscriber information on the RADIUS Server instead of grouping the
services into different APNs on the GGSN. The services that do not
depend on the APN on the GGSN and can be provisioned on a per-
subscriber basis on the RADIUS Server include:
• VPN membership
• IP Services
• Real-time Charging Subscription
• Outbound Tunneling
• Address Pool
When the Single APN attributes are returned from the RADIUS Server
to the GGSN, these attribute values overwrite the APN configuration
provisioned through SCS. This approach effectively associates the
services with individual subscriber, not the destined APN for this PDP
session.
If the RADIUS Server does not return any Single APN attributes, the
configuration provisioned through SCS is used. Returning these Single
APN attributes from the RADIUS Server is optional. Nevertheless, the
configuration of multiple APNs for different VPN memberships can still
be used on the GGSN instead of having the per-subscriber information
provisioned on the RADIUS Server.
VPN membership
The VPN Name (SHASTA-VPN VSA) returned in the RADIUS Access-
Accept message is used to specify the appropriate VPN membership
for the subscriber.
Note that neither the IPSec tunnel nor the GRE tunnel are dynamically
established once the RADIUS SHASTA-VPN attribute is returned. The
tunnel must be pre-configured through SCS.
An invalid VPN name returned from the RADIUS Server triggers a log
from the Event Manager. A returned VPN name is invalid only if it can
not be found within the VPRN Manager. In this case the invalid VPN
name is ignored and the PDP session setup continues.
Figure 3-11
APN configuration for Single APN
APN
Figure 3-12
APN configuration with new VPN Profiles
APN
When replacing the existing access group setting with a new VPN setting
in the APN configuration, the following rules are applied:
• The RADIUS Profile provisioned in the VPN needs to be the same
as the RADIUS Profile in the existing Access Group configuration.
If no RADIUS Profile is provided in VPN, the one in the Access
Group is used.
• The DHCP Profile in the VPN may be different from the one in the
existing Access Group. The interaction between those two DHCP
Profiles is specified in Table 3-2.
Table 3-2
DHCP Profile interaction between existing Access Group and new VPN
—sheet 1 of 2—
Table 3-2
DHCP Profile interaction between existing Access Group and new VPN
—sheet 2 of 2—
IP Services
The Service Profile (i.e. SHASTA-SERVICE-PROFILE VSA) in the
Access-Accept message returned from the RADIUS Server identifies
the IP Services available to the subscriber.
An invalid Service Profile returned from the RADIUS Server will trigger
a log from the Event Manager. A returned Service Profile is invalid only
if it cannot be found within the Service Policy Manager. Also, if an
invalid Service Profile is returned, the PDP session is taken down.
A value ‘NULL’ returned in the attribute will not turn on the real-time
charging service and the PDP session remains established. An invalid
Tariff Profile returned from the RADIUS Server will trigger a log from
the Event Manager and stop the PDP session setup. A returned Tariff
Profile is invalid only if it can not be found within the Access Properties
Manager.
Outbound tunneling
A PDP session with IP PDU type or PPP PDU type can perform GTP-
L2TP tunnel switching with the outbound tunnel being returned from
the RADIUS Server instead of being provisioned through SCS.
• TUNNEL-SERVER-AUTH-ID (OPTIONAL)
• TUNNEL-SERVER-ENDPOINT (MANDATORY)
• TUNNEL-MEDIUM-TYPE (MANDATORY)
• TUNNEL-CLIENT-ENDPOINT (OPTIONAL)
• TUNNEL-PASSWORD (OPTIONAL)
• TUNNEL-ASSIGNMENT-ID (MANDATORY)
• TUNNEL-PREFERENCE (OPTIONAL)
Table 3-3
L2TP-GTP Tunnel Switching configuration interaction for Single APN
a. LNS must be configured with LAC Host Name “l2tp-host”. GGSN using “l2tp-host” in Dynamic
L2TP VPN mode, when L2TP tunnel does not pre-configured.
IP Address Pool
Single APN enables the wireless operator to select and assign IP
address pools to specific user groups within the same APN. An
example of this capability is to use a single APN for consumers with
private IP addresses and corporate subscribers with public
addresses.The address pools can be classified by the following
options:
• Reserved / Unreserved
• Activation / Deactivation
The option of Reserved /Unreserved address pools will prioritize
address pools for the Framed-Pool attribute. Based on the availability
of an address pool for new address assignment, address pools can be
marked as Deactivated /Activated.
The Connection ISPs, which must have the device configured with
subnet dedication and without individual route advertisement, enable
aggregation mode for APNs. While the Connection ISP configuration
enables all APNs on a device to offer increased levels of activation
rate and simultaneous session support, this benefit is maximized for
the Aggregation APNs.
MNC size is checked for consistency for each Access Control Profile.
Either 2 or 3 digit MNCs are allowed to be entered per MCC within the
profile.
Subscriber authentication
The GGSN supports normal user authentication and anonymous
mode user authentication when operating in non-transparent mode.
For a GTP tunnel with IP PDU type, the PCO IE of the Create PDP
Context Request carries the authentication attributes for the user
authentication. If authentication is successful, then the
acknowledgements are passed back to the mobile in the PCO IE of the
Create PDP Context Response. The CHAP re-challenge is not
supported for a PDP session with IP PDU type.
For the PDP session with PPP PDU type, authentication is part of the
PPP negotiation. The PPP negotiation is sub-divided into three parts:
1. The LCP negotiation
The PPP session is ready for data packets when NCP negotiation is
completed. The CHAP re-challenge is supported for PDP sessions
with PPP PDU type.
As indicated in the IPCP part of the PCO IE for IP PDU type or the
NCP negotiation for PPP PDU type, the mobile subscriber may
request for Domain Name Server IP address or NetBIOS Name Server
IP address. Supposed that vendor specific attributes, MS-Primary-
DNS-Server, MS-Secondary-DNS-Server, MS-Primary-NBNS-Server,
MS-Secondary-NBNS-Server and/or Cisco-Primary-Secondary-DNS-
Server (Vendor Type: 1), have been configured on the RADIUS Server
for the subscriber, IP address value of those attributes will be used to
respond to the subscriber’s requests.
The GGSN accepts the VSA received without any data from RADIUS
for the vendor specific attributes Shasta Service Profile and Shasta
Prepaid Server based on the APN Configuration.
Also for IP and PPP PDU types, if PCO IE(included in the create PDP
Context Request) is received with only username and no password,
then the GGSN supports the following different behaviors as
mentioned below in Table 3-4. This is controlled by APN configuration:
RADIUS Authentication Type, as mentioned in Chapter 8, Table 8-17.
Table 3-4
Radius Authentication Type configuration values & corresponding GGSN
behavior
Table 3-4
Radius Authentication Type configuration values & corresponding GGSN
behavior
IP address allocation 3
The following IP address allocation methods are supported by the
GGSN:
• RADIUS
• DHCP
• Local IP address pools
• Static IP address from Home Location Register (HLR) (that is, the
IP address specified in the Create PDP Context Request)
RADIUS
In the Wireless GRE/VLAN Access model, it is possible to send
RADIUS messages through GRE tunnel or VLAN access connection.
The determination of whether the messages go through the tunnel or
outside the tunnel is based on routing (matching destination IP
address with routing table entries on the GGSN).
All PDP contexts for GTP version 0 and version 1 include the 3GPP-
Session-Stop-Indicator attribute in the WRAP or RADIUS Accounting
STOP message. This attribute is mandatory for release of the IP
address on the RADIUS server.
DHCP
The GGSN supports IP address allocation using the DHCP Server.
The GGSN can function as a DHCP Client on behalf of a mobile or as
a relay agent between DHCP Server and mobile.
DHCP Client
The GGSN DHCP Client is responsible for negotiating IP address
allocation for the mobile subscriber, renewing the lease of an IP
address before the lease expires, and releasing the IP address after
the mobile finishes using the IP address. Multiple DHCP Servers can
be configured; the DHCP Client unicasts to all configured servers and
selects the first response. The multiple DHCP Servers configuration
provides fault tolerance and redundancy to IP address allocation using
DHCP.
In the Wireless GRE Access model and Wireless VLAN Access model,
it is possible to send DHCP messages through a GRE tunnel or VLAN
access connection. The determination of whether the messages go
through the tunnel is based on routing (that is, matching destination IP
address with routing table entries).
If the DHCP Client is configured for the APN, the IP address returned
from the RADIUS Server has higher precedence than the IP address
through the DHCP Client. In another words, the DHCP Client address
allocation will not occur if an IP address has already been allocated
through the RADIUS Server.
If the “DHCP uses VPN routing context” box is checked in the VPRN
configuration through the SCS GUI, the DHCP Client on the GGSN
goes through the VPN to reach the DHCP Server. Otherwise, the
DHCP Server can be located in the public network and shared by
multiple VPNs for address allocation.
The DHCP Client uses the DHCP Relay Agent to send and receive
appropriate messages. Therefore, both DHCP Client and DHCP Relay
Agent historical statistics are incremented for the DHCP Client
configuration.
Figure 3-13 “GGSN DHCP Client message flow” on page 42. shows
the DHCP Client message flow using the User Class Option for
identification of an Address Pool to use for a specific APN.
Figure 3-13
GGSN DHCP Client message flow
DHCPDISCOVER
(User Class = CDE)
DHCPOFFER
(IP Address from pool with
User Class = CDE)
DHCPREQUEST
DHCPACK
Create PDP Context Response
(End User Address, Protocol Configuration
Options, etc.)
If the IP address allocation on the GGSN for the APN subscriber is set
to DHCP Relay Agent, the GGSN does not take part in the negotiation
for the IP address for the mobile. It is not responsible for renewing the
lease for the IP address either. The DHCP Client running on the
mobile is responsible for IP address allocation, renewal and releasing
of the address after the session is terminated.
If the DHCP Relay Agent is configured for the APN, the IP address
returned from the DHCP Relay Agent has the highest precedence. In
other words, when a session is configured using DHCP Relay Agent
provisioned in the DHCP Profile associated with the Access Group,
the DHCP Relay Agent is the only address allocation method accepted
even if the “RADIUS/Local” button is checked on the addressing page
of Subscriber Template. If during a DHCP Relay Agent session the
RADIUS Server returns an IP address, then the Create PDP Context
Request is rejected and the session is brought down.
When the GGSN receives a Create PDP Context Request for an APN
that has been configured to use the DHCP Relay Agent, it records the
End User Address IE of 0.0.0.0 and sends it to the SGSN in the Create
PDP Context Response message. The IP PDUs are passed from
subscriber’s DHCP Client to the DHCP Server through the GGSN after
the PDP session is established. After DHCP negotiation and after
receiving a DHCP ACK from the DHCP Server, the GGSN sends the
Update PDP Context Request message to the SGSN with an End
User Address IE. Since the IP address allocation is negotiated
between the DHCP Client on the mobile and the DHCP Server, the
DHCP Client on the mobile is responsible for renewing the lease of the
IP address with the DHCP Server.
Figure 3-14 “GGSN DHCP Relay Agent message flow” on page 44.
shows the DHCP Relay Agent message flow.
Figure 3-14
GGSN DHCP Relay Agent message flow
DHCPDISCOVER
DHCPOFFER
DHCPREQUEST
DHCPACK
IP address is allocated
at the DHCP Server
Update PDP Context Request
End User Address
In the Wireless ISP model, the DHCP Server is located in the public
Internet network. The DHCP Server can serve multiple APNs and
some of the APNs may span over multiple devices. If the operator
wants to allocate a pool of IP addresses for each device, a specific
DHCP Relay Agent address can be used for each device and a pool of
addresses can be configured for each DHCP Relay Agent address on
the DHCP Server crossing multiple APNs. If the operator wants to
have different pools of IP addresses for different APNs, a DHCP Relay
Agent address can be configured for each APN on the device.
In the GRE VPN model, the DHCP Server is likely to be located in the
private Intranet network. See “Outgoing to Internet and Intranet using
GRE tunnel” on page 3-82. In the private Intranet, the DHCP Server
can serve one GGSN via a point-to-point GRE tunnel. A pool of IP
addresses can be configured to associate with a DHCP Relay Agent
address on the DHCP Server for that GGSN. The same DHCP Relay
Agent address value can be used in different GRE VPNs on different
DHCP Servers. Multiple GRE VPNs can be configured on the same
GGSN and multiple DHCP Relay Agent address values can be
provisioned for sending DHCP response messages back to the same
GGSN. The DHCP Relay Agent address value is configured on a per
VPN per GGSN basis.
To route the DHCP response messages back to the GGSN from the
private Intranet network, the DHCP Relay Agent address must be
provisioned so that the default ISP address will not be used. The
default ISP address may conflict with the local IP address of GRE
tunnel. On the other end of the GRE tunnel, the DHCP relay Agent
address needs to be configured for the tunnel reachability on the
Intranet CPE.
In the VLAN VPN model, the DHCP Server can be located with the
private VLAN VPN. A pool of IP addresses can be configured to
associate with a DHCP Relay Agent address on the DHCP Server for
that VLAN VPN. The DHCP Relay Agent address value is configured
on a per VPN per GGSN basis.
Both option #77 and DHCP Relay Agent address can be added to the
DHCP Profile at the same time. In this case, the giaddr parameter field
is set to the provisioned DHCP Relay Agent address value and the
User Class option parameter field is included in the messages. Note
that the option #77 applies only to the DHCP Client configuration. The
DHCP Relay Agent address applies to both DHCP Client and DHCP
Relay Agent configurations. If the DHCP Relay Agent address is not
provided in the DHCP Profile, the Connection ISP default address will
be used for the giaddr parameter field in the DHCP request and
response messages.
If the DHCP Relay Agent option is configured for the DHCP Profile, the
DHCP Relay Agent address based address allocation cannot interact
with Single APN. In other words, the DHCP Relay Agent address
value configured for an Access Group or a VPN works only when no
VPN name is returned from the RADIUS authentication.
When the DHCP Relay Agent address value is modified in the DHCP
Profile, the change will not be reflected in the existing PDP contexts
using the old DHCP Relay Agent address. Subsequent activated PDP
contexts will use the new DHCP Relay Agent address value.
Static IP address
If an IP address is included in the End User Address IE within the
Create PDP Context Request which is derived from the subscriber
configuration on the HLR, the GGSN attempts to use the IP address
provided as the subscriber IP address for the PDP session.
If the IP address in the Create PDP Context Request does not match
the IP address returned from RADIUS Server after user
GGSN accounting 3
The billing function on the GGSN is achieved through GTP accounting
and the RADIUS accounting. GTP accounting is a billing mechanism
to deliver G-CDR records to the CGF using GTP’ protocol. RADIUS
accounting is a billing mechanism to deliver accounting related
information to the RADIUS Accounting Server using the RADIUS
protocol.
GTP accounting 3
GTP Accounting is supported by the GGSN. The accounting
procedure and the protocol used for GGSN accounting is specified in
the GPRS specification defined in 3GPP TS 32.015, version 3.6.0,
“Charging and Billing”. The GTP’ protocol is used for transferring the
GGSN accounting record (G-CDR) from the GGSN to the Charging
Gateway Function (CGF).
The GGSN is the anchor of the GPRS/UMTS data call and has most of
the information contained in the PDP context. The GGSN is
responsible for collecting charging information related to the external
data network usage and charging information on usage of the GPRS/
The GGSN billing function is distributed across the CMC and SSC cards.
The CMC and SSC perform the following tasks for GGSN billing:
• Call Detail Record creation and closure
• Partial record generation
• ASN.1 formatting of G-CDRs prior to transfer to the CGF or storage
to local disk
• Support of the GTP’ protocol stack used to transfer the G-CDRs to
the CGF
• Support of a primary and secondary CGF for redundancy
Two CGFs can be configured for each GGSN. The primary CGF is
used for normal accounting record transfer. The secondary CGF is
used only when the primary CGF is not accessible. If the primary CGF
later becomes accessible, a manual switch-over must be performed by
the operator. If both CGFs are not accessible, the accounting records
are stored on the local disk. If accounting records are sent to local
disk, the operator must periodically delete the accounting records to
prevent disk overflow. If the local disk is full, new accounting records
will be dropped.
GGSN
Accounting
Regular billing
For regular billing, the GGSN uses a buffering mechanism to improve
efficiency of the accounting system. There may be a delay involved
due to buffering of the accounting records. If the accounting records
are required to be transferred to the CGF immediately after the
records are generated, Hot Billing should be used. If regular billing is
selected, some delay may be encountered between accounting
records being generated and transferred to the CGF.
Figure 3-16
GGSN regular billing
GGSN
Accounting
Hot billing
Another accounting option supported on the GGSN is hot billing. Hot
billing can be selected for an individual APN. With this accounting
option, the associated subscriber accounting records are encoded and
transferred to CGF immediately after the records are generated
without being queued in the buffer queue. Hot billing records
generated by the GGSN include the Charging Characteristic element
in the record.
Figure 3-17 “GGSN hot billing” on page 51. shows the hot billing
accounting option and its functions.
Figure 3-17
GGSN hot billing
GGSN
Accounting
GTP’ protocol
The GTP’ protocol defined in 3GPP TS 32.015, versions 3.2.0 and 3.6.0,
“Charging and Billing” is used for transferring GGSN accounting records
from the GGSN to a CGF. GTP’ on the GGSN provides the following
functions:
• When a CGF is not responding, the GGSN continues to send Echo
Requests to the CGF at the interval specified in the provisioning. If
Echo Request times out, it is not retransmitted until the next
periodic echo is scheduled.
• Upon receipt of an Echo Request or a Node Alive Request
message on the GGSN, a response message is sent back to CGF
and the echo timer is restarted. When the echo timer expires, an
Echo Request message is sent to the CGF.
• The provisioned packet timeout value is used for each
retransmitted message.
• Recognizes a CDR-handling node advertising its transfer
capabilities after a period of downtime.
• Reduces the possibility of sending duplicate G-CDRs to the CGF
that might arise during redundancy operations.
• Supports both GTP version 0 and version 1 header formats.
• Released or cancelled packets will be retransmitted up to the
maximum number of times specified in the CGF Profile “Maximum
Retries” option (see “CGF Profile”).
Since the UDP source port used for GTP' messages is dynamically
allocated, changes to the port number may occur without warning
following a CMC reboot, switchover or software upgrade. It is
recommended to configure the downstream CGF to respond to the
port number referenced in the GTP' message header.
The CDR packets are responded to and are retransmitted to the CGF
after the normal response timeout period. If they are not successfully
acknowledged after the maximum number of retransmits, the normal
CDR duplicate prevention mechanism is followed (the CDRs are
transmitted as possibly duplicate to the secondary CGF or written to
disk).
The operator defines the tariff boundaries through a Time of Day (ToD)
profile. In the profile, the specific hours to close the container are
selected, and the profile is added to the APN. Subscribers using the
APN with the configured ToD profile close and open new traffic volume
containers according to the selected tariff boundaries. This
functionality is supported only for GTP Accounting.
The ToD Profile provisioned for a APN configuration at the time a PDP
session is activated will remain for the duration of the PDP session
regardless of any subsequent changes to the APN configuration. Any
changes made to the APN configuration do not take effect until the
next time a new PDP session is activated. However, changes made to
the ToD profile linked to the APN such as setting or un-setting tariff
boundaries take effect in all circumstances, even for active PDP
sessions.
A partial record is generated when the time limit or data volume limit
condition is met. The time and data volume counts are reset when a
partial record is generated. The Interim Record Session counts reflect
the cumulative totals over the entire lifetime of the PDP context. Only
Partial Records are supported for GTP Accounting. Interim Records
can be generated using RADIUS Accounting (see “RADIUS
Accounting” on page 3-65).
roamers. If the partial billing for roamers is enabled, the time limit
and data volume limit configured in the GTP tunnel are used when
subscriber activates a PDP context in a PLMN or roams to a
VPLMN. This partial billing function allows billing information to be
sent to the CGF in order to prevent loss of data when PDP contexts
have been open for a long period of time. The GGSN G-CDR
timestamps and duration values are accurate to within 1 whole
second. The data volume limit is the sum of the uplink and
downlink data passed through the GTP tunnel.
G-CDR identification
The G-CDR contains PDP Context related billing information
consisting of uplink and downlink data volume counts, requested QoS
in the negotiated QoS field and the duration of the PDP context. The
partial record reason code “Maximum number of containers” is
supported with a maximum of 4 containers per G-CDR.
immediately written back to the file on disk and also sent to the
inactive CMC.
In the event that the active CGF server loses connection or becomes
uncommunicative with the GGSN, G-CDR records will automatically
be redirected to the standby CGF (if provisioned and available). If
there is no standby CGF server or it is also uncommunicative, the G-
CDR records will be written to the disk on the active CMC of the
GGSN. Additionally, a CRITICAL alarm will be raised. When one of the
provisioned CGF servers becomes available, G-CDR records are
automatically redirected again to use the available CGF server (the
server now becomes the active CGF) and the CRITICAL alarm is
cleared. Any G-CDR record files on the GGSN disk will not be
automatically transferred to the active CGF server.
For any G-CDR records that are sent to the local disk, the GGSN first
places the records in a RAM buffer which is flushed to disk when either
the CDR-file open-time limit or CDR-file size limit is reached. Since the
records are initially stored in RAM, there may be a loss of data if the
GGSN is rebooted or suffers a power loss prior to flushing the RAM
buffer to disk.
files contend for disk space on an equal basis with any other
application or service using the disk.
The configured stop time cannot be same as the configured start time.
If the configured stop time is less than the configured start time, the
transfer will be stopped on the next day at the configured stop time.
The operator can also always enable the feature instead of specifying
a transfer time frame. This enables the G-CDRs transfer to be initiated
at any time. If the CGF is accessible and if the GGSN overload
conditions are satisfied, any G-CDRs stored on the hard disk are
immediately transferred to the CGF.
Disabled No transfer in CLI command “gtpbill Start transfer of G-CDRs from disk
progress disksend allow”
Enabled with Any state CLI command “gtpbill Disallowed with a CLI error message
“Always On” disksend allow” or
set “gtpbill disksend off”
—sheet 1 of 2—
Table 3-6
Interaction between automatic and manual G-CDR transfer (continued)
Enabled with No transfer in CLI command “gtpbill Start transfer of G-CDRs from disk
a configured progress disksend allow”
start & stop
time CLI command “gtpbill No change in transfer status
disksend off”
due to start CLI command “gtpbill Stop transfer of G-CDRs from disk.
time trigger disksend off” Auto transfer will re-attempt at the
configured start time
due to CLI CLI command “gtpbill Stop transfer of G-CDR from disk.
command disksend off” Auto transfer will be attempted at the
configured start time.
—sheet 2 of 2—
It is recommended that the configured FTP start time for G-CDR audit
files should not fall between the configured start and stop time for
automated G-CDR transfer. This is to avoid any potential CPU
overload conditions due to the FTP of a large number of G-CDR audit
files.
G-CDR Auditing
G-CDR Auditing can be enabled per GGSN device. Each accounting
record (CDR) generated on the GGSN results in an audit entry in the
CDR audit file if G-CDR Auditing is enabled. This audit entry indicates
whether the CDR produced is valid or incomplete. The audit entries
are first stored in RAM buffer and flushed to CDR audit files when the
contents of the buffer has reached 1 MB in size or has been open for
more than 1 hour. An audit file is not generated if there have not been
any CDRs audited during the 1 hour duration. The files are stored on
disk and may be transferred by FTP to another node on the network at
a time specified by the operator. Once the file has been successfully
transferred by FTP, it is deleted.
The following fields are repeated for each CDR audit entry. Each one
of these fields are separated by a comma and a new line character is
appended at the end of each audit entry.
,70/01/09
05:55:18,012345678901234,1,1,012345678901234567,235,70,4,0,Y
FTP function
If the FTP function is enabled, the auditing files will be transferred by
FTP to another node on the network at the time specified by the
operator. The standard FTP port of 21 is used and it is assumed that
the user is placed in the appropriate directory upon login to the node.
When transferring CDR audit files, all FTP activity originates from the
management interface (default ISP).
RADIUS Accounting 3
The GGSN supports RADIUS Accounting on the Gi interface. RADIUS
Accounting provides connection ISPs with the billing capability of
wireless data services. RADIUS Accounting can be enabled on a per
APN basis through the SCS GUI. GTP Accounting and RADIUS
Accounting can be enabled for an APN in the same time. RADIUS
Interim Accounting records are generated when “Enable RADIUS
Interim Messages” is enabled on the APN. An alternate RADIUS
Interim Accounting time limit is present which is independent of GTP
Partial billing time limit. This option can also be used to enable/disable
the generation of radius interim accounting for roamers.
IMSI profile and GTP tunnel profile interact to determine the active
interim time value for RADIUS accounting.
Table 3-7
Alternate Radius Interim Accounting Time Limit examples
selected unselected greyed out 60 IMSI profile is not 40 20 20 APN default value
associated with the is overridden by
APN profile or Roamer default
mobile does not time limit. Alt. time
match profile is disabled on
APN so it is
ignored from the
roamer profile.
* 0 means there will be no Radius Interim Accounting Records generated due to time limit.
For any RADIUS Accounting records that are sent to the local disk, the
GGSN first places the records in a RAM buffer which is flushed to disk
each time the buffer is filled, or when contact is reestablished. Since
the records are initially stored in RAM, there may be a loss of data if
the GGSN is rebooted or suffers a power loss prior to flushing the
RAM buffer to disk.
For any RADIUS Accounting records that are sent to the local disk, the
GGSN first places the records in a RAM buffer which is flushed to disk
each time the buffer is filled, or when contact is reestablished. Since
the records are initially stored in RAM, there may be a loss of data if
the GGSN is rebooted or suffers a power loss prior to flushing the
RAM buffer to disk.
This feature can optionally be turned off from the SCS Console. With
the “RADIUS Disk Write” option, the APN can be configured to either
write or not write records to the disk in the case of connection loss.
where:
• M is the month (1-9, Oct = A, Nov = B, Dec = C)
• DD is the day (1-31)
If both time and volume limits are configured, the update is performed
based on whichever limit is hit first. The feature is disabled by default
and if the intervals configured exceed the partial billing intervals.
Once the GTP tunnel is set up, LCP negotiation is performed between
the MS and the GGSN. At the LCP user authentication stage, the
Figure 3-18 “GTP tunnel setup in GTP-L2TP tunnel switching for PPP
PDU type” shows the message flow for the PPP session setup in the
GTP-L2TP tunnel switching scenario. One GTP tunnel is mapped to a
single L2TP session within the L2TP tunnel. Multiple L2TP sessions
can be set up within a L2TP tunnel.
Figure 3-18
GTP tunnel setup in GTP-L2TP tunnel switching for PPP PDU type
LCP Negotiation
*SCCRQ
*SCCRP
*SCCCN
*ZLB ACK
L2TP Tunnel established
ICRQ
ICRP
ICCN
L2TP Session established
When a Create PDP Context Request is received at the GGSN for the
IP PDU and the subscriber template associated to the APN has an
Attention: The LCP options within the PCO IE are not proxied over
because these options are only applied to the PPP session
between the TE and MS. GGSN and LNS can negotiate a new set
of LCP options. Also, when authentication is applied, the
information in the Access-Accept message from the RADIUS
Server is not propagated into the PCO IE of Create PDP Context
Response message.
If the LNS does not agree with the default LCP options or is configured
for the LCP re-negotiation, the LCP re-negotiation is performed
between the GGSN and the LNS. After the LCP negotiation,
authentication is conducted at the LNS.
The following diagram shows the message flow for setting up the GTP/
L2TP tunnel switching scenario for IP PDU with PAP.
Figure 3-19
GTP tunnel setup in GTP-L2TP tunnel switching for IP PDU type
ICRQ
ICRP
ICCN
with proxy LCP and
authentication info
LCP re-negotiation**
The username and password are only sent after the LNS forces the
GGSN to negotiate authentication.
The GGSN can negotiate up to CHAP from PAP in the PCO. In other
words, if the LNS challenges the GGSN to provide CHAP
authentication information, the GGSN responds successfully to CHAP
challenges from the LNS by sending the username and password in
encrypted form. If the LNS wants to negotiate PAP, the GGSN sends
the required authentication information as clear text. This security
option applies to both static and dynamic L2TP tunnel setup.
interface through the IPSec tunnel that is associated with the Access
Subscriber node. The Access Subscriber node is provisioned as an
Access Subscriber that is associated to the IPSec tunnel in the VPN
group.
Figure 3-20 “IPSec VPN configuration” shows the IPSec access tunnel
between the GGSN and a remote CPE that is the gateway to the
private Intranet. The IPSec tunnel is point to point between the two
nodes.
Figure 3-20
IPSec VPN configuration
SCS
Server
Nortel
GGSN
Private
PLMN Intranet
IPSec Tunnel
CPE
Figure 3-21
GTP-IPSec tunnel message flow
To support the link between GGSN VPRN and the private Intranet, an
access connection is configured as shown in Figure 3-22 “GGSN
VPRN to Intranet through access connection”. It can be optionally
configured as an IPSec tunnel as shown in Figure 3-23 “GGSN VPRN
to Intranet through IPSec tunnel” or an ATM 1483/R VC as shown in
Figure 3-24 “GGSN VPRN to Intranet through ATM 1483/R VC”. The
ATM VC connection does not have any tunneling associated with it
and can be configured without the VPRN on the GGSN for private
Intranet access.
connection to the private Intranet. From this GGSN node, the traffic is
forwarded to the CPE which is the gateway of the Intranet.
Attention: All GGSN nodes configured with the same VPRN group
need to run the same software release load in order to synchronize
with the SCS Server.
Figure 3-22
GGSN VPRN to Intranet through access connection
SCS
Server GGSN
IPSec Tunnel
Nortel CPE
IPSec Tunnel
GGSN Private
Intranet
PLMN
Access Connection
IPSec Tunnel
GGSN
Figure 3-23
GGSN VPRN to Intranet through IPSec tunnel
SCS
Server GGSN
IPSec Tunnel
GGSN IPSec Tunnel
Figure 3-24
GGSN VPRN to Intranet through ATM 1483/R VC
SCS
Server GGSN
Private
IPSec Tunnel Intranet
Nortel Router
GGSN IPSec Tunnel
PLMN ATM 1483/R VC
IPSec Tunnel ATM/
Frame Relay
GGSN Access Network
Figure 3-25 “Wireless ISP GRE configuration” shows the GRE tunnels
between the GGSN and remote networks in the GRE wireless ISP
model. The GRE tunnel is point-to-point between two network nodes.
Figure 3-25
Wireless ISP GRE configuration
SCS
Server
GRE Tunnel Public
Internet
Nortel
GGSN
PLMN
GRE Tunnel
Private
Intranet
Figure 3-26 “GRE VPN configuration” shows the GRE tunnel between
the GGSN and a remote CPE which is the gateway to the private
Intranet. The GRE tunnel is point-to-point between two network nodes.
Figure 3-26
GRE VPN configuration
SCS
Server
Nortel
GGSN
Private
PLMN CPE
GRE Tunnel Intranet
Figure 3-27 “GTP-GRE tunnel message flow” shows the message flow
for setting up a GTP tunnel with outgoing GRE tunnel to the remote
private Intranet.
Figure 3-27
GTP-GRE tunnel message flow
Figure 3-28
VLAN Wireless ISP configuration
SCS
Server
Nortel
Private
GGSN
Intranet
PLMN CPE
VLAN tagged Router
Ethernet
Public
Internet
Figure 3-29
VLAN VPN configuration
SCS
Server
Nortel
Private
GGSN
Intranet
PLMN CPE
VLAN tagged Router
Ethernet
Within the Gi MPLS Network, the GGSN will primarily serve as a PE,
also called a Label Edge Router (LER). See “MPLS VPN model” for
MPLS Network Architecture.
Figure 3-30
MPLS VPN configuration
SCS
Server
Nortel Private
GGSN
Intranet
PLMN CPE
MPLS
Backbone
For GTP version 0, the service level is defined by applying to the data
session a provisioned default Service Profile which contains a DiffServ
policy to mark packets exiting the Gi interface and optionally additional
IP services. A provisioned default DSCP is applied to GTP packets
exiting the Gn interface. These services are applied to all data packets
in both directions. GTP control packets may also be marked with
specific DSCP.
Figure 3-31
DSCP marking for the packets from Gi interface to Gn interface
EF 10111000
CS7 11100000
CS6 11000000
AF43 10011000
AF42 10010000
AF41 10001000
AF33 01111000
AF32 01110000
AF31 01101000
AF23 01011000
AF22 01010000
AF21 01001000
—sheet 1 of 2—
Table 3-8
Mapping of DSCP marking to TOS value (continued)
AF13 00111000
AF12 00110000
AF11 00101000
DE 00000000
—sheet 2 of 2—
Note that the Service Profile provisioned in the GGSN QoS Profile
takes precedence over a Service Profile or individual IP services
provisioned in the subscriber template for the APN.
parameters that are configured at the time the subscriber PDP context
is created. Subscriber PDP contexts created after the GGSN QoS
profile is modified inherit the new values.
If a GGSN QoS profile is modified through SCS, the changes are not
applied to existing subscriber PDP contexts using the GGSN QoS
profile. Existing subscriber PDP contexts continue with the values and
parameters which were configured at the time the subscriber PDP
context was created.
QoS change is applied immediately to the GTP control packets and the
GTP’ packets associated with the GTP tunnel.
CBR - X - -
VBR-RT X X - X
VBR-NRT X X - X
UBR - X X -
The ATM L2 service classes and the traffic shaping parameters for
each ATM service class will be stored in the traffic (shaping) profile via
SCS (Service Creation System) configuration.
Note that the ATM service class(es) and the traffic (shaping)
parameter(s) are applicable to the outgoing ATM trunk connections,
not for the incoming ATM trunk connections. (For the incoming traffic
on the ATM trunk connection, the data is manipulated using the VPI/
VCI mapping, not managed by the ATM service class or the traffic
parameters.)
Gi Interface Availability
Gi interface availability has the following capabilities:
• ISP Operational State monitoring
• APN Administrative State control
When an APN is set to DOWN from the SCS GUI, an INFO alarm is
generated. New Create PDP Context Request messages for the
specific APN are rejected according to the Redirect Response Cause
set for the GTP Tunnel. This could be no response or one of the cause
values - No Resources Available or System Failure.
Table 3-10
ISP Operational State and APN Administrative State interaction
Overload control
The GPRS/UMTS network can present more messages to a GGSN
over a given time than it is possible to process in that time. This
consumes resources, and processing work cannot be successfully
completed. This situation degrades overall performance of the GGSN
node. Overload controls permit the GGSN to maintain processing
throughput when the offered load exceeds the supported load.
Three levels of overload are defined for the GGSN. Each level of
overload control provides more aggressive control of access to the
GGSN than does the prior level. The entry and exit criteria for each
level are well defined. The following sections provide additional
description of the actions taken for each level of overload.
Figure 3-32
GGSN overload control
System Output
with Overload Control Overload Entry Point
Serviced Input
Time
Figure 3-33
CPU overload control message flow
GGSN SCS
SGSN
Monitor CPU
Occupancy
CPU0 Overloaded
Generate Alarm
—sheet 1 of 2—
Table 3-11
CPU overload level descriptions (continued)
—sheet 2 of 2—
If the GGSN Average CPU Occupancy is above 80% the GGSN stops
accepting new Create PDP Context Request. However the existing
sessions are not dropped.
Figure 3-34
Memory overload control message flow
GGSN SCS
SGSN
Monitor System Memory
Occupancy
Create PDP Context Request
System Memory Overloaded
Table 3-12
Memory overload level descriptions
If the GGSN Memory Usage is above 70% the GGSN stops accepting
new Create PDP Context Request. However, the existing sessions are
not dropped. Memory resources may also enter an overload level
when a free memory block of defined size (in kBytes) is not available
in the processor memory. Memory resources exit an overload level
Level 1 512 kB 512 kB When the Free Memory Block is below 512 kB
this alarm is raised. This overload condition is
exited after the availability of the Free Memory
Block of 512 kB. Any transitions to other levels
follow the Entry Hysteresis and Exit
Hysteresis.
Level 2 256 kB 256 kB When the Free Memory Block is below 256 kB
this alarm is raised. This overload condition is
exited after the availability of the Free Memory
Block of 256 kB. Any transitions to other levels
follow the Entry Hysteresis and Exit
Hysteresis.
APN Blacklisting
The APN blacklist functionality provides protection to the system from
repeated PDP context activation failures for an individual APN and
enhances system performance.
During the blackout period all the PDP create requests will be rejected
with cause code as “No resource available”. Upon expiry of the
blackout period, the APN is unblocked and is returned to service. The
administrator can make a blacklisted APN available for service before
the blackout period expires via CLI command.
This functionality is OFF by default for all APNs. If the APN has been
manually disabled by the administrator, this functionality is inactive for
the specific APN on that GGSN.
The SSH daemon listens for connections from clients and spawns a
new daemon for each connection received. This new daemon handles
key exchange, encryption, authentication, command execution and
data exchange. Key exchange between the client and server employs
DSA (Digital Signature Algorithm) to identify the hosts. This key is
used to encrypt the all further communications during the session
using a symmetric cipher that the client selects from those offered by
the server. User authentication is performed using public key or
traditional password.
First, the client and the server exchange public host keys. If the client
machine has never encountered a given public key before, SSH asks
the user whether to accept the untrusted key. Next they use these to
negotiate a session key that is used to encrypt all subsequent session
data using a block cipher.
PDP contexts are not getting created, the Health Check Monitor
detects this condition and an alarm is generated to inform the operator.
This functionality also provides configurable alarm thresholds to the
administrator in case of specific network performance requirements.
Health Check Monitor alarms are not intended for the use of
calculation of outage time.
Wireless services 3
The GGSN supports tariff services (real-time charging and GeoZone)
and WAP service. It interworks with the real-time charging server for
tariff services. It interworks with the WAP gateway or the Application
Server for WAP service.
The GGSN will check the length of the received packet against the
remaining granted volume quota resources prior to forwarding the
subscriber packets. If the packet's length fits within the remaining
quota, the GGSN will consume the volume from the granted resources
and forward the packet to/from the subscriber. However, if the packet's
length exceeds the remaining quota(i.e. over consume the granted
quota) then the GGSN triggers a quota exhaustion reauthorization and
discards the packet.
Initial authorization
When a Create PDP Context Request is received on the Nortel
GGSN, the Tariff Profile associated with the APN for the specific
device is retrieved if it is provisioned. This is how the GGSN identifies
the session as real-time charging. There are two different scenarios for
tunnel establishment for subscribers with real-time charging service.
Scenarios depend upon the PDU type of the PDP session.
The following diagram shows the message flow for real-time charging
service supported for IP PDU type on the Nortel GGSN.
Figure 3-35
GGSN real-time charging service message flow for IP PDU type
If the PDP session is the PPP PDU type, the GTP tunnel needs to be
set up before the LCP negotiation for the PPP session. The real-time
charging service is involved after a successful PPP authentication.
This means the GTP tunnel is established before the Service Request
message is sent to real-time charging server. If the Service Response
indicates a success, the GTP tunnel will remain up and the subscriber
data transferred prior to receiving the successful Service Response
will be charged for. If the Service Response indicates a failure, the
GTP tunnel will be taken down. The volume count of the GTP
accounting and RADIUS accounting will be different from the real-time
charging service. This is because PPP LCP negotiation messages are
counted for GTP accounting and RADIUS accounting but not for real-
time charging service.
The following diagram show the message flow for real-time charging
service supported for PPP PDU type on Nortel GGSN.
Figure 3-36
GGSN real-time charging service message flow for PPP PDU type
In both scenarios, from this point in the PDP session, the coupons will
be managed as needed with reauthorization requests until termination.
Mid-call reauthorization
The subscriber browses the web and uses resources associated with
the coupon (time or volume). The GGSN requests a new coupon once
the provisioned threshold value is reached, the real-time charging
server explicitly request the GGSN to reauthorize a coupon, or if a
provisioned trigger event occurs. In the request for a new coupon, the
GGSN reports the resources used since the last report. While the real-
time charging Server is processing the request, depending on
provisioning, the GGSN either allows data to flow or blocks data for the
rate identified by the coupon until the response is received.
Once the real-time charging server responds with a new coupon and
assuming the GGSN is provisioned to allow data to flow while waiting
for new coupons, the GGSN subtracts from the new coupon any
resources used while waiting for the response. Any residual resources
associated with the old coupon are discarded. If the real-time charging
server responds with a denial coupon, the GGSN immediately blocks
traffic or it tears down the PDP context associated with the denied
coupon. Any resources used while the request was outstanding are
reported in the final message to the real-time charging server.
The GGSN also has the capability to return coupons that have been
idle for a period of time. This may be triggered through provisioning or
from a request from the real-time charging server.
Call termination
Once the PDP session is terminated, the GGSN sends a final request
to the real-time charging server. This request contains an end of call
indication as well as the consumed resources in last segment. The
real-time charging service updates the subscriber’s balance based on
the consumed resources. The real-time charging server sends an
acknowledgement back to the GGSN.
is reported separately for both of the coupons: before the tariff change
and after the tariff change.
Triggers
Real-time charging triggers provide a mechanism whereby the GGSN
executes two primary functions of the real-time charging service:
• Validate the subscriber’s request for services.
• Count the report consumed resources usage.
In CTP version 3 and DCC, the reauthorization threshold value is
configurable from 50% to 100% of the authorized resource. If the
resource is time, the above mechanism works the same way. The
threshold value is configurable per tariff profile or, for CTP version 3, it
can be returned as part of the coupon by the real-time charging server
which overrides any provisioned value on the GGSN.
Failure handling
If the real-time charging server is out of service, the proper SNMP trap
is generated to indicate the problem.
Non-rated coupon
CTP version 3 contains a non-rated coupon to take on the function of
single coupon billing. When this coupon is in use, all data packets in
the PDP session are counted against this coupon.
Rated coupon
Rated coupon is similar to non-rated coupon except it specifies a
coupon rate ID. The coupon rate ID identifies the rated group of data
traffic that the resources authorized in the coupon will be applied to.
The coupon rate ID is specified and enabled using a CBB Service
Policy. At any point in time, a single PDP session can have zero to
many rated coupons. Each Rated Coupon transferred between the
GGSN and real-time charging server contains either usage or
authorization information for a single coupon rate. Multiple Rated
Coupons can exist in a single real-time charging request or response
message. Multi-rate coupons are not supported in the L2TP Network
Model.
With rated coupons, new coupon rates can be requested both during
initial authorization and once the context is established. Individual
coupons may be re-authorized or returned during a session by
including the rated coupon for each of the corresponding coupon rates
in a re-authorization message. The Rated Coupon includes the
resource usage for the coupon rate being re-authorized or returned. All
coupons including denied coupons that are held at the end of a
session are returned with a Rated Coupon that reports their individual
usage.
If rated coupons are in use and data packets come through that do not
match any CBB filtering criteria, then the data packets will not be rated
and thus they will not be billed. It will be reported in the total counts for
GTP Accounting and RADIUS Accounting.
Rate Request
During initial authorization of the session, the GGSN can request the
real-time charging server to authorize a set of rated coupons. This is
accomplished by including the Rate Request for every new rate in an
initial request message to the real-time charging server. During the
initial authorization, this is treated as a hint to the real-time charging
server. The real-time charging server can ignore the requested rates
altogether and authorize a different set of rates or a partial set of the
requested rates. Once a session has been established, the real-time
charging server must respond to each rate requested with a coupon.
Each coupon will either have authorized resources or will indicate that
the rate is denied.
Triggers
Triggers provide a mechanism to specify actions for the GGSN to take
when certain real-time charging events happen. An event could be
SGSN address change and the action would be coupon re-
authorization. Another event could be an idle coupon timeout and the
action would be returning the coupon to real-time charging server.
For CTP version 3, triggers may also be returned from the real-time
charging server. Multiple triggers can be included in each coupon. A
single trigger consists of a trigger type, a trigger action and possibly a
trigger value. The trigger type specifies which event triggers the action.
The trigger action indicates the GGSN what to do with the coupon
when the trigger event happens. The trigger value field conditionally
stores extra information needed to watch for the event such as a time
value or a threshold value.
the real-time charging server that are not being used so that the
money allotted to them can be added back into the account balance.
This is the reason for the existence of the coupon idle timer.
If the idle timer is set too long, or the account balance is getting low,
then the idle timer may not be responsive enough. In this case, the
CTP protocol allows the real-time charging server to ask the GGSN to
return whatever coupons it deems to be most likely idle. The real-time
charging server cannot initiate a message to the GGSN, but it can use
one of a few special coupon include reasons in a response message
to request the return of idle coupons. When the GGSN receives one of
these special include reasons, it will analyze the coupons held by that
subscriber. It will return coupons that it considers to be idle up to half of
the total number of coupons held, but not more than twenty coupons.
A coupon is treated as a Idle Coupon if it has been idle for at least 30
seconds and longer than 50% of Idle Coupon Timer. After a re-auth
event the idle timeout for idle coupons is re-calculated. The new value
is the remaining idle time
The requested coupons from the CBB policy marked for “Request on
Service Start” can be merged with the coupons provisioned in the Tariff
Profile to form an optimized coupon list for both CTPv3 and Diameter.
The coupons provisioned in the CBB policy have priority over those
defined in the Tariff Profile. After the completion of the merge, the
optimized list of Coupons is included in the Initial Authorization
message and presented to the real-time charging/DCC server for
service negotiation.
Table 3-14
CBB Policy Merge Matrix
Table 3-14
CBB Policy Merge Matrix
Service Redirect
When a subscriber’s real-time charging balance on any coupon falls to
zero, a Reauth Request is sent to the Real Time Charging Server. If
the account is out of funds, the real-time charging server can deny the
request and provide the URI of a Top-Up server where the subscriber
can replenish their account.
The next time the subscriber tries to initiate normal browsing, the
GGSN intercepts the Request and initiates messaging between the
subscriber and GGSN that causes the subscriber’s browser to be
redirected to the Top-Up server. Once “topped-up”, the real-time
charging server must signal the GGSN in order to allow the
Figure 3-37
Service Redirect configuration
Subscriber Yahoo
real-time
charging
server
SGSN Gn Gi
GGSN Internet
Top-Up
Server
Amazon
Figure 3-38
CTPv3 Redirection Messaging
GGSN Real-time charging server
1
Service Request (reauthorization)
2
Service Response (Denied, Redirection URI)
3
Reauthorization Command
Reauthorization Command
4
Reauthorization Command ACK
5
Service Request (reauthorization)
present for one coupon ID, packets rated against other coupon IDs are
unaffected.
It is assumed that the URI can be used for both WAP and HTTP/TCP
redirection. The Top-Up site should be simple enough for a WAP
gateway to translate it into WML. For HTTP/TCP connection, the
Connection Sequence occur prior to the HTTP Request messages.
The HTTP Request and the Connection Sequence are charged
against the rate assigned to the HTTP Request. After the Connection
Sequence, if no HTTP Request arrives on the Nortel GGSN, the
Connection Sequence is rated against the Default Coupon. The
charging of the TCP Connection Sequence is provisionable. The
operator may charge these initial packets towards the Default Coupon,
or towards the first HTTP Request. In case of depleted prepaid funds,
since the Subscriber is re-located to a Top-Up Server, the messages
are charged against the coupon ID provisioned against the Redirect
URL. If this URL is provisioned in the CBB policy filter’s URL list, all
Service Redirect messages are counted towards this coupon else the
messages are counted against the Default Coupon ID.
The GGSN tracks the coupon time and volume usage before and after
the tariff time change. No messaging is initiated by the GGSN when
the tariff time change occurs. Instead, the usage report is contained
within the two coupons. The first containing the usage before the tariff
change and the second contains the usage after the tariff change.
Tariff time changes are configurable on the GGSN through the SCS
GUI. The GGSN can be configured with many different tariff time
change profiles to provide different groups of users with different tariff
time plans. The tariff time profile that is used for each user session can
be configured statically on the APN ToD profile.
Figure 3-39
Tariff Time Change message flow
GGSN
Real-time
charging server
1 GPRS Service Request message - Initial Auth Request
Dual Coupon
The GGSN supports the dual coupon option in which the Online
Charging Server separately authorizes quota to be used before and
after the tariff boundary. This is done by granting two instances of the
same coupon id - one for before and one after the tariff boundary.
Any usage that occurs before the tariff boundary is consumed from the
before-coupon. When a tariff switch occurs, the GGSN closes the
before-coupon and subsequently deducts any usage that occurs after
the boundary from the after-coupon.
Table 3-15
CTPv3 Tariff Change Functionality
N Y Y Invalid combination. A
particular coupon cannot
use both trigger types.
This is a parsing error; an
error response is
generated by the GGSN.
Y N N No Tariff Change occurs.
Y Y Y Invalid combination. A
particular coupon cannot
use both trigger types.
This is a parsing error; an
error response is
generated by the GGSN.
Table 3-16
DCC Tariff Change Functionality
N N N No Tariff Change
occurs.
N N Y No Tariff Change
occurs.
GeoZone service
GeoZone service is another tariff service supported on the GGSN. It
allows different tariff based on where the subscriber originates the
PDP context geographically. This is indicated in the Cell Global ID
(GTP Private Extension IE) of the Create PDP Context Request
message. In GeoZone service, the mid-call Service Request is not
triggered by receiving the Update PDP Context Request message.
The real-time charging server expects only the begin-call Service
Request for GeoZone service. GeoZone service is supported only with
CTP version 1. Newer versions of real-time charging are not enabled
for GeoZone.
WAP service
The GGSN supports Wireless Application Protocol (WAP) service by
communicating with the Application server through the Wireless
RADIUS Application Protocol (WRAP), configured in the Application
Profile, or by proxying through the RADIUS Accounting Server using
RADIUS protocol. For more information see “WAP Service”.
Figure 3-40
WAP service message flow for IP PDU type in Service Mode
Figure 3-41
WAP service message flow for IP PDU type in Session Mode
Application
SGSN GGSN Server
For IP PDU type, authentication
Create PDP Context Request and IP address allocation are done
for subscribers.
The method of authentication (if
required) and method of IP
address allocation are specified by
configuration.
Figure 3-42
WAP service message flow for PPP PDU type
Policy merging 3
Policy merging is the functionality the GGSN uses to determine the
correct and complete set of IP services that are applied to a particular
subscriber. Policy merging takes input from one or more sources.
These sources include the real-time charging server, RADIUS Server,
GGSN QoS Profile, and subscriber template. Each of these sources
can supply one or more IP Service Profiles, each containing one or
more IP service policies, to be applied to a subscriber’s PDP session.
The function of policy merging is to sort through all these inputs,
prioritize the offered inputs, and select the final set of IP service
policies which are then applied to the PDP session.
SGSN Grouping 3
When an inter-SGSN handover occurs, an Update PDP Context
Request is sent from the new SGSN to the GGSN. In some network
configurations, inter-SGSN handover can result in a significant
signalling load due to the presence of multiple SGSNs serving an
area. SGSN grouping is made to limit the amount of messaging in
such cases.
The GGSN compares the Group Identifier of the new SGSN and that
of the old SGSN. If the Group Identifiers match, the GGSN does not
signal Diameter Credit Control (DCC) Update Credit Control Request
(CCR(U)) message, RADIUS Accounting Request Interim-Update
message, and CTP Re-Auth Request message.
Handover between SGSNs, in which either the old or the new SGSN
does not belong to a group, is considered as SGSN change. Therefore
no signaling optimization is performed.G-CDR record generation to the
CGF servers is not affected by this functionality.
Matching entry in the SGSN Use the SGSN Group Identifier of the matching entry
Mapping table found
Matching entry in the SGSN Default entry in the SGSN Use the SGSN Group
Mapping table not found Mapping table provisioned Identifier of the default entry
The GGSN (as AF) interfaces with ADMF and DF using Nortel
Network’s proprietary protocol, Lawful Interception Common Protocol
(LICP) and Lawful Interception Access Protocol (LIAP). LICP/LIAP
uses TCP/IP as the transport layer.
In this document, the ADMF, DF2, and DF3 are generally referred to
as the Lawful Interception Gateway (LIG). Also, for convenience both
DF2 and DF3 are referred as DF. Figure 3-43 “Nortel implementation
of Lawful Interception” shows the Nortel implementation of the Lawful
Interception model.
Figure 3-43
Nortel implementation of Lawful Interception
LICP/LIAP
ADMF DF2/DF3
LIG
CF
... CF
LEA LEA
GGSN as the AF and the interface between the GGSN and the LIG
are discussed. Also, the CF implementation and interface to LEAs are
not addressed in this document.
Client-server mode
This mode is where client software is installed on the mobile device.
This results in the performance optimization in exchanging data
between the TPO client on the mobile device and the TPO server. The
method of transport of data and the protocol optimization performed is
typically proprietary to the TPO vendor and may not be compliant to
IETF specifications. For example, the optimization of HTTP made by
the TPO client-server mode typically results in the GGSN not being
able to perform deep packet inspection on the data flow to extract the
URL. TPO client-server mode typically provides a greater level of
optimization and compression performance than TPO clientless mode.
Although the principal driver for TPO is the interworking of the GGSN
CBB for both real-time charging and postpaid, it allows the
interworking of all GGSN IP services and functionality with the
optimized data flow. Without seeing the un-optimized data packets, the
For this purpose, a loopback interface between the GGSN and TPO is
implemented. GRE tunneling is used for the loopback interface
between the GGSN and the TPO.
TPO supports all network models for both IP PDU and PPP PDU types
as well as for both primary and secondary PDP contexts. Each context
on a GGSN is uniquely identified by the GRE key and user IP address.
The TPO uniquely identifies each context using the GRE key, user IP
address, and the GGSN TPO IP address.
Network models 4
The network models that the GGSN supports are:
• Wireless ISP model
• L2TP Virtual Private Network (VPN) model
• VPN Variants
— IPSec VPN model
— Generic Routing Encapsulation (GRE) VPN model
— ATM VPN model
— VLAN VPN model
— GGSN VPRN model
— MPLS VPN model
— VLAN eBGP VPN model
Configuration Wireless ISP Wireless ISP L2TP VPN model VPN variants
option model with model with (including IPSec
traditional APN Aggregation VPN, GRE VPN,
APN ATM VPN, VLAN
VPN, MPLS
VPN, and GGSN
VPRN models
—sheet 1 of 3—
Table 4-1
Network model configuration options (continued)
Configuration Wireless ISP Wireless ISP L2TP VPN model VPN variants
option model with model with (including IPSec
traditional APN Aggregation VPN, GRE VPN,
APN ATM VPN, VLAN
VPN, MPLS
VPN, and GGSN
VPRN models
WAP Service Supported via Supported via Not supported Supported via
RADIUS RADIUS RADIUS
Accounting or Accounting Accounting
Application Profile
Roamer Partial Supported based Supported based Supported based Supported based
Billing on configuration on configuration on configuration on configuration
Single APN Supported based Supported for Supported based Supported based
on configuration Prepaid on configuration on configuration
Subscription and
IP Services
—sheet 2 of 3—
Table 4-1
Network model configuration options (continued)
Configuration Wireless ISP Wireless ISP L2TP VPN model VPN variants
option model with model with (including IPSec
traditional APN Aggregation VPN, GRE VPN,
APN ATM VPN, VLAN
VPN, MPLS
VPN, and GGSN
VPRN models
Tariff Based Supported based Supported based Supported based Supported based
Billing on configuration on configuration on configuration on configuration
—sheet 3 of 3—
Figure 4-1
Wireless ISP network model
SCS
CGF
DNS FTP
(APN OAM
resolution)
SGSN
GGSN
Internet
PLMN
DNS
(ISP
GTP tunnel service)
In this GRE access, a GRE tunnel between the GGSN and the remote
network is defined. If the destination address of a GTP data packet
from the mobile matches the reachability of a GRE tunnel Access
Subscriber, this data packet is routed through GRE tunnel associated
with this access subscriber to the public Internet or private Intranet.
Figure 4-2
Wireless ISP GRE access
FTP SCS
Internet
DNS
(APN CGF OAM
resolution)
SGSN
GGSN
PLMN Intranet/ISP
Figure 4-3
Wireless ISP VLAN access
FTP SCS
Intranet
DNS
(APN CGF OAM
resolution)
SGSN
GGSN
PLMN Internet
For the PPP PDU type, the GGSN proxies all PPP packets from the
mobile to the remote LNS. For the IP PDU type, the GGSN packs the
IP packets from the mobile with a PPP header and sends them to an
L2TP tunnel. On the receiving side, the header of the PPP packets is
removed and GGSN sends the packets to the mobile.
Figure 4-4
L2TP VPN network model
FTP SCS
Intranet/ISP
*AAA LNS
DNS
(APN CGF OAM
resolution) Firewall
SGSN
GGSN
Internet
PLMN LAC
*AAA - Authorization/Authentication/Accounting
VPN variants 4
The GGSN provides a number of VPN variants. All are conceptually
similar, but differ in certain specifics. At the heart of each VPN variant
is the creation of a VPN within one or more GGSNs. A VPN is
essentially a small, private routing table within an existing ISP of a
GGSN. Only members of the VPN have access to the routing table, so
only members can send packets to the various destinations within the
VPN. Refer to Nortel Services Edge Router 5500 Provisioning VPNs,
VLANs, and Tunnels for more information about configuring VPNs.
Mobile subscribers access a VPN in the same manner for each VPN
variant. The difference among the VPN variants is in the manner in
which Access Subscribers are configured in the VPN. An Access
Subscriber represents the connection of a corporate or private Intranet
to the VPN. Hence the Access Subscriber is not an individual person,
but rather an entity or organization. The Access Subscriber represents
the CPE through which mobile subscribers who are members of the
VPN access the corporate network.
In this VPN model, an IPSec tunnel between the GGSN and the
corporate network is defined. An Access Subscriber is created to
represent the corporate network. This Access Subscriber is then
bound to the IPSec tunnel (all data to and from the Access Subscriber
must utilize the IPSec tunnel) and is also made a member of the VPN.
A single point to point IPSec tunnel can be configured from the GGSN
to the remote Intranet gateway (see Figure 4-5). It has the same
PLMN and OAM network configuration as the Wireless ISP model.
Figure 4-5
IPSec VPN network model
FTP SCS
Intranet/ISP
DNS
(APN CGF OAM
resolution)
SGSN
GGSN
Internet
PLMN
In this VPN model, a GRE tunnel between the GGSN and the
corporate network is defined. An Access Subscriber is created to
represent the corporate network. This Access Subscriber is then
bound to the GRE tunnel (all data to/from the access subscriber must
use the GRE tunnel) and is also made a member of the VPN.
Figure 4-6
GRE VPN network model
FTP SCS
Intranet/ISP
DNS
(APN CGF OAM
resolution)
SGSN
GGSN
Internet
PLMN
A single ATM PVC connection can be configured from the GGSN to the
remote Intranet gateway. Figure 4-7 shows the network layout of the
ATM VPN model. It has the same PLMN and OAM configuration as the
Wireless ISP model.
Figure 4-7
ATM VPN network model
FTP SCS
Intranet/ISP
DNS
(APN CGF OAM
resolution)
SGSN
GGSN
Internet
PLMN
Figure 4-8
VLAN VPN network model
FTP SCS
Intranet/ISP
DNS
(APN CGF OAM
resolution)
SGSN
GGSN
PLMN
This VPN model addresses the needs of VPNs which must support
very large numbers of subscribers and/or that require access to
multiple GGSNs for redundancy purposes.
This VPN model supports both static address and dynamic address as
well as providing both transparent and non-transparent access modes.
Both IP PDU and PPP PDU types are supported in this model. If PPP
PDU type is used, the PPP session is terminated on the GGSN and
the IP packets are forwarded to the VPRN.
Figure 4-9
GGSN VPRN network model
SCS Intranet/ISP
FTP
DNS
(APN CGF OAM
resolution)
SGSN GGSN
GGSN VPRN
PLMN
GGSN
Within the Gi MPLS Network, the GGSN will primarily serve as a PE,
also called a Label Edge Router (LER), as seen in the following figure.
Figure 4-10
UMTS/GPRS MPLS network architecture
Site A Site B
(in VPN X) (in VPN Y)
CE
CE
MPLS Backbone
PE
PE
P Site C
(in VPN X)
GGSN,
acting as
a PE
P
CE
SGSN PE
RADIUS
DHCP Site D
P: Provider Router CE
Mobile Subscribers (in VPN Y)
belonging to VPN Y PE: Provider Edge Router
CE: Customer Edge Router
Mobile Subscribers
belonging to VPN X DHCP
RADIUS
If all sites in a VPN are owned by a single enterprise, then the VPN is
a corporate “intranet”. If there exist sites that are owned by different
enterprises then the VPN is an “extranet”. From the protocol point-of-
view there are no differences. The two scenarios are achieved by
explicit provisioning.
Figure 4-11
VLAN eBGP VPN model
Topology Details
• A VLAN VPN is configured on the GGSN. Ethernet and Gigabit
Ethernet ports can be used
• BGP is turned on for the VPN.
• Determine the BGP AS number for the MPLS core.
WAP Service
The WAP service on the GGSN can be deployed in one of the two
ways shown in Figure 4-12:
GGSN
RADIUS
APN 2
WRAP Application Application
w/o RADIUS
Accounting Server Server
Figure 4-13
Static RADIUS address allocation service deployment
RADIUS
Accounting
DNS Server
SGSN
GGSN
Gn Gi Service
PLMN Network
Application
Server
RADIUS
GTP tunnel Authentication
Server
Figure 4-14
Dynamic RADIUS address allocation service deployment
CGF
SGSN
GGSN
Gn Gi Service
PLMN Network
Application
Server
RADIUS
GTP tunnel Server
IP services 5
Overview 5
This chapter describes Nortel Services Edge Router 5500 IP services
that are supported on the Nortel GGSN. The IP services mentioned
here apply only to the subscriber’s data traffic on the Gi interface. For
information on provisioning these IP services using the SCS GUI, refer
to Nortel Services Edge Router 5500 Provisioning Service Policies
and GPRS/UMTS Nortel GGSN Provisioning Procedures (411-5221-
927).
Policy merging 5
An IP service policy is a generic way of referring to an IP service which
has been previously configured on the GGSN. For example, a firewall
policy is an IP service policy. An IP service profile is a collection of
specific IP service policies. For example, a profile may consist of a
CBB policy and a firewall policy.
If two or more Service Profiles are returned from a single source (for
example, from a RADIUS Server), there must not be any overlap in the
IP service policies identified by the profiles.
Both SCP and RADIUS Server may return more than one IP Service
Profile. In such case the first profile identified from SCP has the
highest precedence. A maximum of six IP Service Profiles can be
merged. If more than six profiles are supplied, all those beyond the
first six are ignored. If the SCP, RADIUS, or Personal Content Portal
server returns an invalid Service Profile, the PDP context is taken
down. A Service Profile is invalid if it can not be found within the
Service Policy Manager.
If the CBB policy or the service profile contributing the CBB policy is
obtained from the subscriber template, GGSN sends subscriber
template name prefixed with a special character to the prepaid server.
If prepaid server returns the same name in the response message,
GGSN ignores the Service Profile and allows the PDP context to
establish as normal.
IP Services for IP in IP 5
IP Services for IP in IP enables the Nortel GGSN to apply certain IP
services to IP in IP encapsulated packets. Such encapsulation is used
by the Mobile IP (MIP) protocol. The enhancements permit the GGSN
to apply IP services based upon the inner IP header and payload,
Firewall 5
Firewalls prevent unwanted or unauthorized traffic from leaving or
entering a subscriber’s site. The services are created based on
policies that are defined by mapping actions to pre-defined addresses
and services. Firewall addresses can be subscriber address or
address ranges, services can be ports or protocols, and actions can
include packet accept, reject or drop.
Traffic Policing 5
The purpose of a Traffic Policing policy is to restrict the data
throughput coming from the subscriber side (from the Gn interface to
the Gi interface). It protects the IP network from traffic in excess of the
subscriber’s contracted rate. On the GGSN, the Traffic Policing policy
can also restrict the data throughput coming from the Internet (from
the Gi interface to the Gn interface) for the IPSec VPN model, GRE
VPN model, and ATM VPN model. This scenario occurs when a Traffic
Policing policy is configured for the access connection on the Gi
interface. The policing function relies on the results of the DiffServ
marking in conjunction with bandwidth limits to set different packet
drop priorities.
Figure 5-1 illustrates the way that the parameters of a policing policy
work for a Single-Rate Three-Color Marker (srTCM).
Figure 5-1
Policing parameters for single-rate three-color marker
Traffic Rate
Red
Excess Burst Size
Yellow
Committed Burst Size
Green
Committed Rate
Time
Traffic Shaping 5
Traffic Shaping allows overall rate limits and per connection rate limits
to be applied to traffic coming from the Internet. On the GGSN, the
Traffic Shaping can also apply to the traffic coming from the
subscribers for the IPSec VPN model. This scenario occurs when
Traffic Shaping is configured for the access connection on the Gi
interface.
For each flow, the Rate Weight, Rate Limit, Per Connection Rate Limit,
and Queue Length must be defined. These parameters take effect only
during times of congestion.
• Rate Weight - determines what percentage of the available
bandwidth that a given traffic type (for example, Web traffic) can be
used during times of congestion.
• Rate Limit - the maximum bandwidth available to a given traffic
type across the link.
• Per Connection Rate Limit - the maximum bandwidth available to
a given traffic type for a single connection.
• Queue Length - the maximum queue length (packets) available to
a given traffic type across the link. The maximum queue length can
not be exceed 128 (packets).
Policy-Based Forwarding 5
Policy-Based Forwarding allows traffic from subscribers to be
redirected based on a set of policies or rules. It essentially forwards
packets of matching conversations (flows) out the interface chosen by
performing a route lookup on the IP address specified in the matching
rules action. The destination of the packet must be only a single hop
away from the current location where the packet is being forwarded.
Web Steering 5
Web Steering service provides capability for HTTP targeted traffic to
be redirected to a proxy cache server at port 80 without the knowledge
of the web client. This policy has rule-based format as other policies
that can specify which IP conversations should be redirected and
which IP conversations should continue to be directed to the original
port 80. Each HTTP connection that matches a rule is redirected to
one of the servers listed in the corresponding IP-farm object. The IP-
farm object has a list of IP addresses that refer to the proxy cache
servers.
After the PDP session is initialized with PCP service policy, a new
service profile can be sent from the PCP server upon successful
authentication. The existing service profile can be replaced by the new
set of services for the PDP session. If the PCP service policy is not
included in the new service profile, the captive portal function will not
be enabled for the PDP session. To ensure that PDP sessions can be
re-captured based on the idle timeout value, it is recommended that
the service profile sent from the PCP server include the same PCP
service policy used during PDP session activation.
DiffServ Marking 5
DiffServ Marking allows scalable service differentiation within a
network. There are four AF classes - 1 (worst) to 4 (best) - which
describe the relative priority of the traffic. Within each AF class, there
are three different levels of Drop Precedence (DP) - 1 (best) to 3
(worst) - which define how likely the traffic will be discarded if the
network experiences congestion or if the subscriber exceeds the traffic
contract. In addition to the AF/DP 12 classes of service, there are EF
(Expedited Forwarding), CS7 (Class Selector 7), CS6 (Class Selector
6), and DE (Best Effort Forwarding or Default Forwarding) classes of
service available on the GGSN. Therefore, DiffServ Marking can mark
the IP packets for 16 different classes of service. It is also possible to
Anti-Spoofing 5
Anti-Spoofing ensures protection from Internet attacks by preventing a
malicious subscriber from masquerading as a third party, or a
malicious third party from masquerading as a subscriber. Security is
achieved by filtering arriving traffic based on the expected source IP
address of the traffic.
the Gn interface. The original WAP Request to the WAP Gateway, will
be dropped. The WAP browser will then issue a new transaction to the
URI in the location field of the received WSP Reply. The Handset must
be able to receive the HTTP1.1 Redirect messages.
After the Nortel GGSN issues a WSP Reply for the original WAP
request, any other subsequent message from the Client or Server
belonging to that transaction, will be dropped on the Nortel GGSN.
Figure 5-2
WAP Redirection (Connection-Oriented and Connection-less calls)
WTP Ack
(connection-oriented only)
WSP Get/Post
URL=wap.yahoo.com
TID = x
WTP Ack
(connection-oriented only)
TID = x
WSP Get
URL www.topup.com
TID = x+1
Figure 5-3
WAP Redirection (Concatenated PDU example)
Figure 5-4
WAP Redirection (SAR Example)
WTP Ack
TID=x, Group 1
WTP Ack
TID=x, Group 2
WTP Ack
TID=x, Group 3
WTP Ack
(connection-oriented only)
TID = x
The uplink and downlink byte count for each charging category is
separately reported to the billing system. For the purposes of CBB,
uplink is defined as packets sent by the mobile toward the Gi interface
and downlink consists of traffic sent toward the subscriber.
CBB criteria and the associated rate or coupon IDs are stored on the
GGSN as an IP service policy. Many CBB rules can be applied to
subscribers, enabling support of many special rated sites or services.
When a subscriber accesses a site or service which matches a CBB
policy rule, the packet flow is marked with the special rate. As packets
are sent or received in response to the access, they are marked with
the special rate.
The GGSN collects both a cumulative byte count and individual byte
counts for each special rate category. Any packets which do not match
any of the provisioned CBB filter policies are counted only in the
standard uplink or downlink count of the CDR. Packets which match a
CBB filter policy are counted both in the special rate ID/coupon
assigned for the filter policy and in the total count within the CDR.
The CBB counts are sent from SSC to CMC every time Fault Tolerant
Limit is reached in order to minimize the amount of information lost
due to SSC card failure.
WAP overview
WAP has been designed using current Internet standards such as
HTML, HTTP, XML, TCP, IP, and UDP as its basis. The main goals in
developing this new protocol were to optimize performance in low
bandwidth wireless networks and flexibility to work with small screens
of different shapes as typically found on mobile devices. Bandwidth
requirements are reduced by transferring all information in binary
format and not as plain text as in similar protocols like HTTP. Header
information is optimized to be small and the page markup language
supports making applications small and flexible.
WAP defines a specific protocol stack that operates between the WAP
Devices and the WAP. The various layers of this protocol stack are
described below.
WDP/Bearer
WDP is a general datagram service defined by WAP. For GPRS and
UMTS networks WDP is defined to be UDP.
WAP filter
The WAP filter sniffs the packet stream flowing between the WAP
enabled mobile and a WAP gateway. It compares each packet to the
rules provisioned in the Filter. Each packet is assigned to a rate
category, whether special rated or full rate. The bytes transferred for
each packet are charged at the rate category to which that packet has
been assigned.
The WAP filter is similar to the HTTP filter in that it contains two levels
of filtering. As with HTTP the first level filter is the basic GGSN Source/
Destination/Service tuple. The second level filter is a URL filter. In
addition, the WAP filter supports the concept of default rates for WAP
and MMS requests that do not match a provisioned URL.
The URLs provisioned by the service provider are partial URLs. They
must include the hostname (or server IP address), and may include
one or more levels of the directory path of the complete URL. The
complete URL including the filename cannot be provisioned. In
addition to URL matching, the WAP filter includes the concept of
default rates for both WAP and MMS traffic. A default rate is applied to
a transaction when the URL for that transaction does not match any of
the provisioned URLs. The default rate can be any of the permitted
rates; a special rate or full rate. The determination whether to apply the
WAP or MMS default rate is made by examining the message type
and/or application in the message header.
When using the WAP filter to charge differentially for web versus MMS
service, it is necessary to provision the URL of the MMS server in the
URL list. Not all MMS messages can be identified as distinct from web
requests; hence the URL is necessary for complete and accurate
filtering of MMS requests distinct from web page requests.
The WAP CBB filter is bidirectional. Phrased another way, the WAP
CBB filter operates on WAP flows initiated by the mobile device and
also on WAP flows initiated by the WAP gateway. Different rules in the
WAP CBB policy can be created to apply special rates only to mobile
initiated flows, only to WAP gateway initiated flows, or to any flow. The
“_subaddr” and “Any” (wildcard) objects can be used in WAP CBB
policy rules to control to which flows the rules apply. For example, use
of the “_subaddr” object in the Source field insures the rule applies
only to subscriber initiated flows. Use of the “_subaddr” object in the
Destination field insures the rule applies only to WAP gateway initiated
flows. Use of the Any object in both the Source and Destination fields
applies the rule to both mobile and gateway initiated flows.
Email POP3
Email IMAP4
Email SMTP
The direction is logical and is relevant from the point of view of the
mobile subscriber and should not be confused with the direction of the
The Nortel GGSN supports the event definition listed below for Event
Based Billing triggers for CBB.
Table 5-3
Event definition and triggers
The following figure provides a generic view on CBB rating for event/
non-event messages.
Figure 5-5
Generic CBB rating for event based billing
}
User Login (Username and Password Exchange) or coupon id for the specific application
protocol. uplink and downlink volume us-
age is counted separately based on the
configuration for the specific applica-
Application message(s) exchange
but not event specific
: tion protocol.
:
} the event specific content type id and/or
coupon id for the specific application
protocol.
: If “Event Completion” is disabled, the event
usage count is incremented for the content
}
: type id and/or decremented for coupon id
based on the configuration for the specific
application protocol.
Application messages
Event
The dynamic policy control capability is provided on the GGSN for IMS
and non-IMS contexts. The Gx interface enables the GGSN to support
dynamic CBB policies and packet inspection rules on a per PDP
context basis.
Table 5-4 shows the type of CBB policy applied to a context after
interacting with the CRF.
Table 5-4
CBB policy applied to context after CRF interactions
Current CBB Charging Rule Charging Rule Result CBB Policy assigned to context
policy Base Name Definitions
assigned to from CRF from CRF
context
None CBB policy A rules 1, 2, 3 Dynamic policy with rules of CBB policy A
and rules 1, 2, 3
CBB policy A None rules 1, 2, 3 Dynamic policy with rules of CBB policy A
and rules 1, 2, 3
CBB policy A CBB policy B rules 1, 2, 3 Dynamic policy with rules of CBB policy B
and rules 1, 2, 3
Dynamic None rules 1, 2, 3 Rules 1, 2, 3 from CRF are merged with the
policy current dynamic policy
—sheet 1 of 2—
Table 5-4
CBB policy applied to context after CRF interactions (continued)
Current CBB Charging Rule Charging Rule Result CBB Policy assigned to context
policy Base Name Definitions
assigned to from CRF from CRF
context
—sheet 2 of 2—
Figure 5-6
Dynamic CBB policy
CBB Policy
Assigned to Context
CBB Policy A
Dynamic CBB Policy
Rule 1
Charging Rule 1 highest
precedence
Rule 2
Charging Rule 2
Rule 3
Charging Rule 3
Content Filtering 5
The Content Filter functionality adds to the GGSN the functionality of
filtering HTTP and WAP requests, through the use of third party
content filter products. When the Content Filter Service is provisioned
for a subscriber, all HTTP and WAP content requests (containing
methods currently supported by Content-Based billing) sent from
mobile are intercepted by the GGSN. For each HTTP/WAP request
the GGSN sends a request to one of its available provisioned Content
Filter Servers, asking permission on behalf of the subscriber to allow
the HTTP or WAP request to pass through the GGSN. The Content
Filter Server then responds back to the GGSN with a decision to do
one of the following:
Figure 5-7
GGSN ISP logical configuration
Content Filter
GGSN Servers
HTTP/WAP
Servers
For VPN subscribers, the Content Filter Servers may reside within the
VPN routing domain, depending on the type of VPN. The following
figure shows example deployment for VPN Only model.
Figure 5-8
GGSN VPN Only Logical Deployment Configuration
VPN
GGSN
Content Filter
Connection
Mobile SGSN Servers
ISP
Gn ISP VPN
HTTP/WAP
Servers
VPN Only deployments must have the Content Filter Servers inside
the routing domain of the VPN.
Figure 5-9
Content protocols
Filter
HTTP/WAP HTTP/WAP
TCP/UDP TCP/UDP
IP IP IP
UDP/IP UDP/IP
L2/L1 L2/L1
to any TCP port. It is, for example, impossible to telnet or FTP to any
IP address of a standard ISP context. The only exception is TCP Port
8888 which is used for Personal Content Portal. An attempt to telnet to
an ISP context IP address will result in a RST (connection refused).
Figure 5-10
Default Node Services Security Policy
Note that this policy prevents any incoming flow into the ISP context.
For example, it is not possible to ping, open IPSec, L2TP or GRE
tunnels into the ISP context.
This policy may also interfere with the operation of RIP or the
establishment of adjacencies if the ISP context is running OSPF.
A note about the “Action” column of the table. A “Drop” action silently
discards packets. A “Reject” action will send a RST packet for TCP
connections (thus providing faster feedback and potentially more
information to intruders).
Figure 5-11
Node Services Security Policy example
Note that all outgoing connections are still permitted by Rule 1 in the
Security Policy example.
Figure 5-12
GTP-99-C Service Object definition and Network Object definition
Note that port ranges (for example, 2920-2930) are also allowed in the
service object definition. Additionally, it is possible to group non-
contiguous services into a service entity.
Figure 5-13
Application of Node Services
If the SCS user has “ISP_Profile” privileges and does not belong to the
Default ISP (that is, Device_Owner ISP shown on the User Manager
screen), only the “ISP Node Policies” and “ISP Node Service Profiles”
panels are displayed. If the SCS user has “Device Owner” privileges
and belongs to the Default ISP, only the “Management Service
Profiles” and “Management Policies” panels are displayed. In the
example in Figure 5-13, the SCS user has both ISP Profile and Device
Owner privileges.
are security policies. Thus the “Profile” panels in these screens are
seldom used and generally reserved for future use, though they are
functional.
Management Services 5
Management services are essentially “Node Services” applied to the
Default ISP context which owns the management ports of the GGSN.
Recall that the management ports are used for communication
between the GGSN and SCS, GGSN and log server, etc.
Figure 5-14
Default Management Services Security Policy
Figure 5-15
Management Services Security Policy
Note that SPM – “Subscriber Policy Manager” is the old name for SCS
(“Service Creation System”). _IspAddr resolves to the IP addresses of
the management ports plus the _IspDefaultAddress of the default ISP
context (if defined via CLI).
When the GGSN receives a packet from the MS, the packet is handled
by the Gn ISP. The packet is then delivered to the Gi ISP. A set of IP
services is executed on the packet on the Gi ISP, the first service that
is applied to the packet is the TPO service. The TPO service detects
that the packet needs to be forwarded to the TPO server. The packet is
then handed over to the TPO ISP before it goes through the rest of the
IP services. The packet is then sent to the TPO server over the
GGSN-TPO GRE loop back interface. The TPO process the packet
and then send it back to the GGSN using the TPO ISP IP address. The
packet is received on the TPO ISP and then delivered to the Gi ISP to
go through the rest of the IP services and then out to the destination
(web server). The downlink packet goes through similar path.
Figure 5-16
Network with multiple GGSNs and multiple bytemobile TPOs
GPRS/PLMN
Mobile Stations
Load Balancers
(Mandatory)
Loopback Loopback
GGSNs
Bytemobile
TPOs
Packet Data
Network
Flow Management 5
It has been observed that an individual wireless subscriber can
potentially allocate thousands of flow cache resources on the GGSN.
This can occur when the wireless subscriber is infected with a virus or
worm or when the subscriber uses applications such as file sharing.
File sharing can be slow or may not terminate a TCP connection
leading to this type of issue. This can result in PDP activation failures,
throughput issues, RPC timeouts and missed poll event logs.
The above issues result when there is no limitation put on the number
of flow cache resources that an individual wireless subscriber is
allowed to allocate.
Due to the nature of the GGSN architecture, the flow is still created
and bound to the subscriber. Once the GGSN can determine the
subscriber has too many flows, it will put the flow in the drop list. After
10 seconds or immediately upon request for a new resource if the
corresponding free list has been exhausted the flow is destroyed and
unbound from the subscriber. Although there is a small window where
the flow is still allocated, activating this feature helps to greatly control
and alleviate the described symptoms.
Due to the high impact this issue has, it is strongly recommended that
the flow management service policy be active on every in service
GGSN.
IP routing 6
Overview 6
The Nortel GGSN incorporates many attributes and much of the same
functionality as a router or layer 3 switch. This chapter discusses the
router-like functionalities of the GGSN.
In Figure 6-1, each of the four ISPs shown - the Gn ISP and three
Connection ISPs - are separate and distinct virtual routers within the
GGSN. A virtual router is a logically distinct entity containing a unique
routing table, Forwarding Information Base (FIB), static routes, routing
protocols, etc. Each virtual router is unique, completely separate from
other virtual routers contained within the platform. Virtual routers
cannot pass packets to other virtual routers. A virtual router can
receive packets upon and forward packets out connections which are
assigned to it. These rules are true of the GGSN, with one very
significant exception. The Gn ISP is capable of passing packets
received on the Gn interface to the connection ISPs. The connection
ISPs then treat these packets as if they were received upon a
conventional interface, such as an Ethernet link. Similarly, the
connection ISPs can pass subscriber packets to the Gn ISP for GTP
encapsulation and forwarding into the core network.
that connection. All packets match the 0.0.0.0 netmask, hence all
packets are forwarded through the associated connection on the
GGSN to the default router.
Figure 6-1
Wireless ISP routing example
Gi
Connection
APN
ISP
APN
Gn
Connection
APN
Gn ISP
SGSN GTP Tunnel
ISP
SGSN APN
SGSN
APN
Connection
APN 10.0.0.0
ISP
APN
APN Internet
GGSN
Aggregation APN
One variant of the Wireless ISP model is the ability to configure APNs
belonging to Connection ISPs as Aggregation APNs. Aggregation
APNs offer the ability to support increased numbers of subscriber’s
PDP sessions.
When using the Wireless ISP model for Aggregation APN, certain
engineering and configuration rules must be considered for end user
IP address assignment.
However, routing still comes into play for this network model. To tunnel
a subscriber packet through the network, the GGSN creates a new
packet and places the entire subscriber packet, including IP header,
into the new packet. The GGSN builds the IP header for this
encapsulating packet. Routing information is then used to forward the
L2TP packet toward the LNS. As with the wireless ISP model, either
static or dynamic routes can be used to forward L2TP packets.
However, as in the IPSec case, routing still comes into play for this
network model. To tunnel a user packet through the network, the
GGSN creates a new packet and places the entire user packet,
including IP header, into the new packet. The GGSN builds the IP
header for this encapsulating packet. Routing information is then
utilized to forward the GRE packet toward the CPE. As with the
wireless ISP model, either static or dynamic routes can be used to
forward GRE packets.
For this release, a single label is distributed for all the routes in a VRF.
This label forms the inner label of the two-label stack used during
forwarding.
In GGSN 4.1, the GGSN includes support for the BGP ROUTE-
REFRESH capability, as well as Outbound Route Filtering (ORF). In
order to understand the benefit of this capability, consider the following
scenario. The BGP peers of GGSN nodes typically (a) implement
automatic filtering of inbound routes (b) depend on the route refresh
ability to deal with changes in input policies. When a new MPLS VRF
is provisioned on one of these BGP peers, it would (assuming that the
GGSN advertised support for the BGP ROUTE-REFRESH capability)
originate a BGP ROUTE-REFRESH message and expect the GGSN
to re-send the VPN routes the local PE may have discarded earlier,
due to automatic route filtering. If the GGSN did not support the BGP
ROUTE-REFRESH capability, the only option left to the remote PE is
to reset the TCP connection, which would cause all existing routes to
be discarded at the GGSN node as well as at the remote BGP peer,
and then subsequently reacquired. The support for BGP ORF allows
the GGSN to further limit the re-sent routes to the set of routes of
interest to the originator of the BGP ROUTE-REFRESH message.
MPLS Signalling
Based on routing information stored in the VRF, packets are forwarded
to their destinations using MPLS tunnels.
LDP-DU
LDP is a signaling protocol used for setting up best effort LSPs. LDP
operates in downstream-unsolicited mode. Essentially, each PE router
distributes a label for itself on establishing a session with a peer. In the
case of the GGSN, a label is distributed for the ISP IP address by
default. LDP is defined in RFC 3036.
RSVP-TE
RSVP-TE is a signaling protocol used to setup Traffic Engineered
LSPs. RSVP-TE extends the basic IP reservation scheme, the
“classical” Resource Reservation Protocol by adding support for MPLS
Labels Specification of the path for the tunnels. TE tunnels are
configured between end-points and can consist of multiple LSPs for
redundancy support. The following RSVP-TE capabilities are
supported:
MPLS Forwarding
Once the LSPs are set up, they are used to forward the VRF traffic. In
this release, best effort LSPs will be used to carry the VRF traffic. The
Figure 6-2
MPLS Packet Forwarding
Site A
(10.1.1.0/24)
Site B
pkt to 10.1.1.1
CE-B
CE-B
P-N P-1 pkt to 10.1.1.1
PE-B PE-A
IGPLabel (PE-B)-y IGPLabel (PE-B)-x IGPLabel (PE-B)
BGPLabel (L1) BGPLabel (L1) BGPLabel (L1)
Actiona Description
Yes/No No No Yes This is the most specific mapping possible. The flow
makes use of the specified tunnel, if one of its
underlying LSP tunnels are in the established state.
Yes/No Yes Yes No In this case the system searches for Tunnels with the
specified Egress Router as the destination address,
and having the preference specified by the user.
Table 6-1
Actions in EFEC policies
Actiona Description
Yes/No Yes No No The system looks for tunnels which have the specified
preference value, and which have the specific PE
advertising the BGP route as the destination node. This
rule is applicable only in the case of EFEC policies
provisioned against VRFs.
If the received packet does not match the rules contained in any of the
EFEC service policies: the following actions are taken when the packet
processing occurs at the VPN/VRF context:
the connectivity between the PEs. In this release, only full-mesh and
route reflector (client) based topologies are supported.
E-LSP support
Only the configuration of DSCP->EXP bit mapping in the ingress
direction for the outer label will be supported in this release. This
configuration is via SCS per device, under MPLS Properties. By
default, if an EXP mapping is not specified for a particular DSCP
value, a default EXP is used. This default EXP can be selected to be
any one of the possible 8 values.
On a per ISP basis, the user can select the default DSCP->EXP
mapping that will set the outer label EXP.
On a per MPLS trunk interface basis, the user can select the DSCP-
>EXP mapping that will set the outer label EXP for all LSPs on that
interface.
The method for selecting which DSCP value to use for the DSCP-
>EXP mapping entries is provided via a DiffServ marking policy
(analogous to the existing DiffServ marking policy). This provides an
“internally used” DSCP value for the mapping to the EXP bits for the
outer label (that is, the DSCP value of the packet header is not
affected). The user can select “copy from inner (IP header)” which
uses the IP header DSCP value (set by selecting Diffserv policy for
subscriber), or the user can select a specific DSCP value at the VRF
screen (applied to all subscribers part of the VRF).
The VRF is enhanced with inbound and outbound route policies, that
help in selectively advertising or rejecting inbound and outbound
routes. The match policy of a Route Policy was also enhanced with
Route Target Support. This feature will also help in setting path
attributes for outgoing and incoming updates, and deny or accept
specific prefixes.
OSPF-TE 6
In order to support TE networks, OSPF has been extended to support
the network-wide distribution of resource availability, and resource
attributes. These extensions enable all the nodes participating in
OSPF-TE to receive the complete network state (in terms of resource
availability, resource attributes etc.) periodically (or when significant
changes have occurred), and use the acquired information to setup
LSPs to satisfy various constraints (such as bandwidth, QoS etc.).
IS-IS routing 6
Intermediate System to Intermediate System (IS-IS) is an OSI link-
state hierarchical routing protocol where routers exchange adjacency
information, as well as the metric(s) associated with interfaces, to
automatically discover the network topology. GGSN supports the IS-IS
protocol, as defined in ISO 10589, extended as specified in RFC 1195
to support IPv4 intermediate systems (routers) and end-systems
(hosts).
When a Level 1 router needs to send data to a system outside its own
area, it forwards the packet to some Level 2 router that resides in its
own area. Level 2 routers maintain topology information about other
Level 2 routers, and facilitate packet forwarding based on the area
address contained in the packet. Once the packet reaches the correct
Level 2 router, it is forwarded to the intended destination using the
Level 1 forwarding mechanism.
Summary routes are used to reduce the number and size of routing
updates required within the network. A summary route is a single route
that covers a range of IP addresses rather than a single IP address.
An efficient network design dedicates a range of IP addresses to a
particular GGSN. A summary route is then published by the GGSN
covering that range of addresses.
IP Subnet Dedication
IP Subnet Dedication on the GGSN allows the management of
subscribers’ PDP sessions by assigning end user address pools
(ranges or subnets of IP addresses) to dedicated GGSN nodes. This
approach provides more efficient management of scarce end user IP
address resources. At the same time, it reduces the amount of routing
protocol traffic required on the Gi interface.
The implication of using the IP Subnet Dedication is that all end user
IP addresses within a subnet range must be assigned to the PDP
sessions on the same GGSN node. Therefore, the allocation of the
end user IP addresses must be carefully planned and configured
within the IP network.
The Fast Ethernet Line Card (FELC) and Gigabit Ethernet Line Card
(GELC) are supported for IP Subnet Dedication on the Connection
ISP. IP Subnet Dedication must be configured for the PDP sessions
that belong to Aggregation APN. It is also the recommended
configuration for the Traditional APN.
PDP session with PPP PDU type can not take advantage of IP Subnet
Dedication. It is not applicable for the GGSN DHCP Relay Agent, VPN
or any outbound tunneling on the Gi interface.
Figure 6-3
Example configuration of RADIUS address allocation
address based on the GGSN that sends the DHCP Discover message.
The pool name configured on the GGSN is sent to the DHCP Server in
the User Class ID Option.
On the GGSN, the pool names are configured in the DHCP Profile.
This pool name is sent to the DHCP Server. In order to request an IP
address that matches the summary route information, the pool name
must be unique in the IP network on the DHCP Server. Figure 6-4
shows an example of DHCP address pool configuration when IP
Subnet Dedication is enabled on the GGSNs. In this example, the
address pools configured on the DHCP Servers are unique and the
starting address and pool size are matched exactly by the summary
route configuration on the GGSN where the pool is used.
Figure 6-4
Example configuration of DHCP address allocation
Route redundancy 6
The GGSN supports Equal Cost Multi-Path (ECMP) routing. ECMP is
a method to increase both the bandwidth and availability of
connectivity between the GGSN and the network. In ECMP, more than
For GTP control traffic, the routing decision is made on the CMC card.
The CMC chooses one interface to return all GTP-C packets back to a
particular SGSN, and that interface is used until the interface goes
down or the CMC is forced to use another interface, or until there are
no packets between the GGSN and that particular SGSN and it times
out. Since each GGSN has one (active) CMC card processing all GTP-
C messages, all traffic back to a given SGSN is sent out on a particular
interface. This interface is used for the duration of the flow. Traffic to a
set of SGSNs is spread across all available interfaces.
Gn Interface ECMP
On the Gn interface all traffic is encapsulated within GTP between the
GGSN Gn ISP and an SGSN. Although this is frequently referred to as
one GTP tunnel, the GGSN can forward these GTP packets out of
several Gn interfaces. Each SSP independently chooses an interface
from which to forward GTP packets, resulting in a distribution of GTP
packets across the available interfaces.
be used between the GGSN and the layer 2 network. The router will
respond to network ARP requests on behalf of the GGSN.
Gratuitous ARP
The GGSN supports Gratuitous ARP defined in RFC 2002, “IP Mobility
Support” on all trunk interfaces with Ethernet card. The GGSN
gratuitously sends an ARP message for each trunk interface when
initially brought in-service or upon a GGSN restart to inform the next-
hop routers of the trunk interface’s IP address and MAC address.
Gratuitous ARP enables the re-establishment of service in the event of
a GGSN restart, especially when not using a static MAC address.
IP multicast 6
IP multicast is a one-to-many transmission methodology which
provides the transmission of an IP datagram to a host group. The host
group is a set of zero or more hosts (subscribers) identified by a single
IP destination address. The multicast datagrams are identified as
those packets whose destinations are class D IP addresses. A
multicast datagram is delivered to all members of its destination host
group. The membership is dynamic; that is, subscribers can join and
leave groups at any time using Internet Group Management Protocol
(IGMP) messaging or group timer. The static IP multicast group
provisioning through the SCS is not supported on the GGSN.
The IGMP protocol is used by the GGSN to learn the existence of host
group members on all locally attached IP interfaces. The GGSN acts
as a IGMP proxy. This means the GGSN plays the role of a multicast
router toward subscribers by periodically sending IGMP Membership
Query to all its subscribers. The IGMP message is encapsulated in a
GTP tunnel on the Gn interface. Both IP and PPP PDU types are
supported for IGMP proxy. The GGSN also plays the role of a
multicast host to the upstream multicast routers by sending the IGMP
Membership Report message and Leave Group message on behalf of
its subscribers. The IGMP membership Report message is sent when
the first member is joining the group or a Membership Query message
is received. The Leave Group message is sent when the last member
in the group is leaving. The IGMP proxy function only works with the
Wireless ISP model due to the inability to recognize IGMP messages
on the Gi interface in other network models. IGMPv2 defined in RFC
2236, “Internet Group Management Protocol, Version 2” is supported
by the GGSN and it is backward compatible with IGMPv1.
GTP Version 0
GTP version 0 packets may be addressed to either the Gn ISP
loopback address or an interface address on the Gn ISP. As discussed
previously there are significant advantages to using the loopback
address.
Version 0 GTP-U packets are always forwarded to the SGSN using the
Gn ISP loopback address as the source IP address of the packet.
(Note this applies only to the outer IP header used for GTP
encapsulation. The inner IP header associated with the subscriber
packet is not modified.)
GTP Version 1
GTP version 1 packets may be addressed to either the Gn ISP
loopback address or an interface address on the Gn ISP. As discussed
previously there are significant advantages to using the loopback
address.
Version 1 GTP-U packets are always forwarded to the SGSN using the
Gn ISP loopback address as the source IP address of the packet. This
applies only to the outer IP header used for GTP encapsulation. The
inner IP header associated with the subscriber packet is not modified.
Table 6-3
Source address in RADIUS message
For the DHCP messages the following table provides the source IP
address selected for all the scenarios.
Table 6-4
Source address in DHCP message
Table 6-4
Source address in DHCP message
SINK routes 6
A SINK route is a route provisioned in the GGSN Forwarding
Information Base (FIB) which causes packets to be discarded rather
than forwarded. SINK routes are useful tools to prevent bounced
packets.
Bounced packets may occur when packets arrive at the GGSN for a
deleted PDP context. This situation can occur when subscribers close
their PDP context in the middle of a transaction, when the mobile
moves out of radio coverage, etc. Because the GGSN does not have
an active subscriber using the IP address to which the packet is
addressed, it uses the next best matching route in the FIB to forward
the packet. The next best match is frequently a default route directing
the packet back to the next hop router from which it originated. The
next hop router in turn forwards the packet back to the GGSN, and the
cycle repeats. Default routes are commonly used to forward all IP
packets not destined for mobile subscribers out of the GGSN toward
intranets, the Internet, etc.
Summary routes are available only within ISPs. VPNs do not currently
support summary routes.
The Services Edge Router hardware platform provides the data packet
processing functionality for the GGSN. The SCS server and client are
used for configuring the GGSN. A single SCS server and client can be
used to provision multiple GGSNs in the GPRS/UMTS network. To
support GGSN functionality, the software loads with GGSN
functionality are required for both SCS and Services Edge Router
platform hardware platforms.
Physical connectivity
The GGSN supports the following line cards as physical interfaces on
the Gn, Gp and Gi interfaces:
• 4 port ATM STM-1/OC-3 SM (NTJT30AA)
• 4 port ATM STM-1/OC-3 MM (NTJT30BA)
• 8 port Fast Ethernet (NTJT36CA)
• 1 port Gigabit Ethernet SM (NTJT36KA)
• 1 port Gigabit Ethernet MM (NTJT36JA)
GGSN function ATM line card Fast Ethernet line Gigabit Ethernet line
card card
—sheet 1 of 2—
Table 7-1
GGSN line card function limitations (continued)
GGSN function ATM line card Fast Ethernet line Gigabit Ethernet line
card card
Attention: When an
incoming IP packet
cannot be mapped to a
specific SSP using the
address entries lookup,
this IP packet is
forwarded to the default
SSP.
VLAN tagging access Not Supported Maximum 32752 Maximum 4094 VLAN
interface VLAN tag IDs can be tag IDs can be used for
used for IP frame IP frame differentiation
differentiation if Fast if Gigabit Ethernet line
Ethernet line card is card is used on the Gi
used on the Gi interface
interface
ATM access interface Supported if ATM line Not Supported Not Supported
in ATM VPN card is used on the Gi
interface
—sheet 2 of 2—
Attention: Inserting a new FELC card into a non high density slot
(green colour on the chassis) will result in session errors on the SCS
for ports 5 through 8.
All servers are supported for the software upgrade from older
releases. The E450 and E250 servers are not recommended for the
new software installation. The SFv880 server is recommended for all
SCS Server hardware platforms in order to achieve the synergies
within the Nortel UMTS/GPRS wireless product line.
Table 7-2 through Table 7-7 list the minimum system requirements for
each hardware platform.
Table 7-2
Minimum system requirements for Sun SFv880
Table 7-3
Minimum system requirements for Sun SFv890
Table 7-4
Minimum system requirements for Sun SFv250
CPUs 2 CPUs
Table 7-5
Minimum system requirements for Sun E450
Table 7-6
Minimum system requirements for Sun E250
Table 7-7
Minimum system requirements for Sun Netra 240
Software versioning
The SCS Server software releases incorporate a number of third party
software packages. Some of these packages are: SOLID Embedded
Engine, Netscape Directory Server (NDS) LDAP and Sun operating
system. Table 7-8 specifies the versioning of the incorporated
software packages:
Table 7-8
Third party software versioning
—sheet 1 of 2—
Table 7-9
SCS server disk partitioning (continued)
—sheet 2 of 2—
OS Hardening
OS Hardening modifies the Solaris Operating Environment to secure
the system against unauthorized access and modification. Solaris
services that present security risks are restricted or stopped. Refer to
411-5221-309, Nortel SCS and GGSN Upgrade Manual for detailed
information on the OS hardening procedure.
GGSN configuration
Minimum configuration
The minimum configuration for the GGSN consists of the following
components:
• 1 Services Edge Router platform for packet processing
• 1 SCS server and client for GGSN configuration
Scalable configuration
Based on the capacity requirements, the Services Edge Router platform
configuration can be scalable for the GGSN. The following lists the
scalability of each card:
• 1 Services Edge Router chassis
• 1 to 2 CMCs with redundancy
• 1 to 2 SFCs with redundancy
• 1 to 6 SSCs with 4 SSMII on each card
• 1 to 4 line cards on both Gn and Gi interfaces
Engineering configuration 7
To support GGSN functionality, a list of GGSN specific parameters are
configured on the GGSN as well as on the external components. This
section lists GGSN configurable parameters and their impacts to the
GGSN.
setting of these fields or the more frequently the QoS changes or ToD
tariff boundary occurs, the more often the billing containers and partial
billing records are generated. This may impact the performance of the
GGSN. The ToD settings, in particular, should be used with care.
Unlike the other settings, ToD closures happen exactly at the same
time making it even more likely that an overload of system resources
may occur, particularly if the ToD tariff changes are set very often.
The defaults are the recommended settings for the APN configuration
fields. The APN also contains an option to have Hot Billing for the APN
subscriber.
In the event that the LNS is not an SER 5500 or the sequence number
is required in the L2TP header, SSM redundancy is not supported
during card failure.
CTP Version 1
When configuring volume based limits on a Nortel ServiceBuilder SCP
for Prepaid Service, operator has the option of Octet, KiloOctet (1024
bytes) and MegaOctet (1,048,576 bytes) segment units. The
maximum number of segment units allowed for MegaOctets is 4095. If
a value greater than the maximum number is configured, it will be
reduced to 4095.
Selecting segment units other than Octet results in the rounding of the
final message sent to the SCP equal to less than 1% of the segment
unit. Thus the total session volume reported to the SCP may be
different from the GTP Accounting and RADIUS Accounting counts by
up to 10 Octets when KiloOctets segment unit is used or 10,485
Octets when MegaOctet segment unit is used. To avoid this difference,
use only the Octet segment unit.
CTP Version 3
CTP version 3 simplifies the units allowed for volume and time-based
segment units. KiloOctets, MegaOctets, minutes, and hours are no
longer valid segment units. The only valid segment units are bytes and
seconds. Up to 4GB of volume or 136 years of time can be specified
using these units. These units are used for the Resource Authorization
within the Rated or Non-Rated Coupons.
GUI Provisioning 8
Overview 8
This chapter describes the provisioning information of Nortel GGSN
via SCS GUI. It covers only the user interfaces of GGSN related
functionality. The user interfaces of SER base functionality is not
covered here.
• SNMP Profile
• IGMP Profile
• Connection Template
• Accounting Profile
• Accounting Element
• GTP Tunnel
• SNMP Profile
• Notification Profile
The following is a list of access properties that are applicable for the
configuration of a Ga ISP:
• GTP’ Profile
• CGF Profile
• SNMP Profile
• Notification Profile
The following is a list of access properties that are applicable for the
configuration of Connection ISP:
• RADIUS Profile
• DHCP Profile
• IPSec Profile
• IKE Profile
• PPP Profile
• SNMP Profile
• Notification Profile
• IGMP Profile
• Tariff Profile
• Coupon Lists
• Coupon Profile
• Content Type Profile
• Application Profile
• ToD Profile
• GGSN QoS Profile
• Global Attributes Profile
• Redundancy Profile
• IPSec Policy
• Access Group
• APN Group
• User Agent Profile
• Connection Template
• Accounting Profile
• Accounting Element
• L2TP Tunnel
• IPSec Tunnel
• GRE Tunnel
• Access Control Profile
• Diameter Profile
• IMSI Rules List and Billing Profile
• IMS Profile
• Content Filter Profiles
• HA Profile
The following is a list of access properties that are applicable for the
configuration of a LI ISP using IPSec connection:
• IPSec Profile
• IKE Profile
• SNMP Profile
• Notification Profile
• IPSec Policy
• IPSec Tunnel
• Lawful Interception (LI) Profile
The following is a list of access properties that are applicable for the
configuration of a LI ISP using VLAN access connection:
• SNMP Profile
• Notification Profile
• Lawful Interception (LI) Profile
There is no access property required for the configuration of a TPO
ISP. The TPO ISP is a separate ISP from other Gn ISP, Ga ISP,
Connection ISP and LI ISP. Only trunk interface and routing are
needed for the configuration of a TPO ISP.
• Tariff Profiles
Figure 8-1
Access Properties Manager
GTP’ Profile
The GTP’ Profile is added to the Access Properties for provisioning the
association between the devices and CGF Profiles when the ISP
spans over multiple devices. The DSCP selection for the QoS of the
GTP’ control packets is also included in this page on a per device
basis. This profile can be provisioned in the Gn ISP or the Ga ISP. The
following diagram shows the GTP’ Profile configuration page.
Figure 8-2
GTP’ Profile Configuration Page
Table 8-1
GTP’ Profile Configuration Tab
CGF Profile Any configured None CGF profile associated with this
CGF profiles for device
the ISP
Device Devices span None This field specifies the CGF profile for
by the ISP the specific device.
DSCP CS7, CS6, EF, DE (best DSCP marking for GTP’ control
AF43, AF42, effort) packets from GGSN to CGF
AF41, AF33,
AF32, AF31,
AF23, AF22,
AF21, AF13,
AF12, AF11, DE
PPP Profile
A PPP profile defines the properties Nortel GGSN applies when
negotiating with Point-to-Point Protocol, a protocol that encapsulates
and transmits data over point-to-point links. The PPP Profile
Configuration dialog box lets you configure new PPP profiles and edit
the parameters of current PPP profiles. The following figure and table
describe the items in this dialog box.
Figure 8-3
PPP Profile Dialog
Table 8-2
PPP Profile Configuration
—sheet 1 of 2—
Table 8-2
PPP Profile Configuration
MTU Size 0 - 65536 1500 Greatest size packet that the PPP connection
can support.
Async Selected or Not Not Selected Select to enable or disable flow control using
Control Selected Async Control Character Map (ACCM).
Character
Map
—sheet 2 of 2—
CGF Profile
The CGF Profile is added to the Access Properties of SCS menu for
supporting GGSN functionality. The following figure shows the CGF
Profile configuration in an ISP.
Figure 8-4
General Tab of the CGF Profile Dialog
Table 8-3
CGF Profile General Tab
—sheet 1 of 3—
Table 8-3
CGF Profile General Tab (continued)
GCDR V3.2 or V3.6 V3.2 G-CDR for GGSN billing record as specified in
Record 32.015 V3.2/V3.6
Version
Include CBB Selected or Not Not Selected Enable/Disable including Content Based Billing
Selected Management Extension.
CDR file 10 minutes to 30 minutes Maximum amount of time that a G-CDR-file ram
open time 1440 minutes buffer will remain open before being closed by
limit (24 hours) in 1 the billing system (see note below for CDR file
minute size limit)
increments
CDR file size 100 KBytes to 1024 KBytes Size limit for G-CDR file
limit 1024 KBytes in
1 KByte The G-CDR-file ram buffer is closed when the
increments buffer reaches either the size limit or the open-
time limit, whichever limit is reached first
—sheet 2 of 3—
Table 8-3
CGF Profile General Tab (continued)
Include IMEI- Selected or Not Not Selected Enable/disable including IMEI-SV management
SV Selected extension.
(Disabled)
Include RAT Selected or Not Not Selected Enable/disable including RAT management
Selected extension.
(Disabled)
Include Selected or Not Not Selected Enables/disables the user’s Location Information
Location Info Selected to be included in the G-CDR record.
(Disabled)
Include DCC Select or Not Not Selected Enable/disable DCC events to be included in the
Event Select G-CDR record.
—sheet 3 of 3—
Figure 8-5
CGF Profile Server Page
Table 8-4
CGF Profile Server Tab
Table 8-4
CGF Profile Server Tab
Echo Interval Disabled, 60 - 300 Echo timer for Echo Request and Response between
900 seconds Nortel GGSN and CGF
“Automated Selected or Not Not This check box can only be checked when there is at
G-CDR Selected Selected least one CGF server provisioned.
Transfer”
check box Enables or disables automatically sending G-CDR
files to CGF from disk.
“Always On” Selected or Not Selected If the check box “Automated G-CDR Transfer” is
Button Selected selected, the user must select one of the two radio
buttons - “Always On” or “Set Time”. If the user
selects “Always On”, the G-CDRs on the disk will
always be sent to the CGF
“Set Time” Selected or Not Not This button is used to enable the user to set disksend
Button Selected Selected start time and stop time
Start Time 00:01 - 23:59 None Start time for initiating automated transfer of G-CDRs
from the disk to CGF.
Stop Time 00:01 - 23:59 None Stop time for stopping automated transfer of G-
CDRs from the disk to CGF.
Figure 8-6
CGF Profile CDR Audit Page
Table 8-5
CGF Profile CDR Audit Tab
Table 8-5
CGF Profile CDR Audit Tab
User Name 8 characters of None User Name with account on the ftp server
string
The FTP servers configured via the CDR Audit Tab refer to FTP
servers external to the GGSN to which the GGSN connects for the
periodic transfer of CDR Audit files. They are not associated with the
retrieval of the G-CDR files via FTP pull.
Figure 8-7
TOD Profile General Page
Table 8-6
TOD Profile General Tab
Profile Name 32 Characters None Name of the Time of Day (ToD) Profile
string
The default value “None” for the Time of Day is not the recommended
value for the ToD billing function.
Do not put the GGSN’s busy hour as a tariff boundary in the ToD
profile configuration. This puts an additional capacity impact to the
GGSN during the busy hour.
GTP Tunnel
The GTP Tunnel is a tunnel option in the Access Properties for
supporting GGSN functionality. The following figure shows the GTP
Configuration page for a Gn ISP.
Figure 8-8
GTP Tunnel Configuration/General Page
Table 8-7
GTP Tunnel components for a Gn ISP
Table 8-7
GTP Tunnel components for a Gn ISP
Connection All configured None Connection Template associated with the tunnel
Template connection
templates
Echo Timer Disabled, 1 - 0 The timer for sending out Echo Request messages
300 mins (Disabled) to SGSNs to check if SGSN is still alive.
Control CS7, CS6, EF, DE (best DSCP marking for control packets from GGSN to
Packet AF43, AF42, effort) SGSN
DSCP AF41, AF33,
AF32, AF31,
AF23, AF22,
AF21, AF13,
AF12, AF11, DE
Device Devices span None If Gn ISP spans multiple devices, this field specifies
by Gn the Gn the specific device for the Gn ISP. If Gn ISP only
ISP belongs to one Univity GGSN, this device should
be the Univity GGSN. A device must be selected to
save a configuration.
Table 8-7
GTP Tunnel components for a Gn ISP
ISP Monitor Selected or Not Selected Determines behavior when an ISP is down. If
Redirect Selected selected, when an ISP is down, new Create PDP
Context Requests for the ISP are disallowed, and
existing context volume based billing is disabled.
Disallow Selected or Not Not Determines whether or not new Create PDP
PDP Context Selected Selected Context Requests are allowed on that Univity
Creations GGSN Device. This checkbox enables/disables the
“Terminate Existing PDP Contexts”.
Redirect {No Resources No When new PDP Session Creations are disallowed
Response Available (199), Resources on the Univity GGSN Device, ISP, or APN, this is
Cause System Failure Available the response cause which is returned in the create
(204), <NO (199) request failure response message.
RESPONSE>}
L2TP Secure Selected or Not Not Configuration to support enable/disable the secure
PAP Selected Selected PAP L2TP tunnel.
Figure 8-9
GTP tunnel Device configuration on Gn ISP
Table 8-8
GTP Tunnel device specific components for a Gn ISP
Table 8-8
GTP Tunnel device specific components for a Gn ISP
Figure 8-10
GTP Tunnel Configuration/SGSN Mapping Page
Table 8-9
SGSN Mapping Configuration
Enable Selected or Not Not Selected If selected partial billing for roamers
Partial Billing Selected will be enabled
for Roamers
Table 8-9
SGSN Mapping Configuration
SGSN Group 0 (No group), 1- 0 (No group) The SGSN Group ID is provided to
255 group SGSNs for the purpose of
optimizing Prepaid Reauth signaling
and Radius Interim Billing.
UTRAN
GERAN
WLAN
a. 1 KByte = 1024 bytes
Figure 8-11
Home MCC / MNC Records Creation
Table 8-10
Home MCC / MNC
Figure 8-12 shows adding a new PLMN ID Mapping and the right is for
the default value.
Figure 8-12
SGSN Mapping
Table 8-11
SGSN Mapping
Netmask IPv4 net mask format /24 Home SGSN net mask
(255.255.
255.0)
Table 8-11
SGSN Mapping
SGSN Group ID 0 (No group), 1-255 0 (No The SGSN Group ID is provided to
group) group SGSNs for the purpose of
optimizing Pre-paid Reauth signaling
and Radius Interim Billing.
UTRAN
GERAN
WLAN
RAT Mapping is SOC activated on a per SCS basis. The function RAT
Mapping is triggered on a per APN basis. The serving RAT is
configurable in SGSN Mapping table. When RAT Mapping is enabled,
the GGSN derives the serving RAT from the table if it is not received in
Create/Update PDP Context Request messages.
Table 8-12
Derived RAT Mapping Logic
With “RAT Mapping” RAT RAT not received in GTP
enabled received in
GTP
Matching entry in the Use the Use the RAT of the matching entry
SGSN Mapping table received RAT
found
Matching entry in the Use the Default entry in the SGSN Use the RAT of
SGSN Mapping table not received RAT Mapping table provisioned the default entry
found Default entry in the SGSN Use “Unknown”
Mapping table not (0)
provisioned
The GGSN QoS Profile contains the service profile and DSCP data
packet marking selections for every combination of Allocation/
Retention Priority (three) and Traffic Class (four) defined in the QoS
information element of the GTP Create PDP Context Request for GTP
version 1 users. A default service profile and DSCP marking is also
available from the GGSN QoS Profile exclusively for users of the GTP
version 0 QoS information element. The following figure shows to
configuration for a GGSN QoS Profile
Figure 8-13
GGSN QoS Profile
Table 8-13
GGSN QoS Profile
Table 8-13
GGSN QoS Profile
APN Group
The APN is added as an option to the Access Properties of the SCS
menu for supporting GGSN functionality. Multiple APNs can be
datafilled per ISP.
The first dialog box that appears when the ADD APN button is
selected is illustrated in the following figure. Here the APN name is
entered and the subscriber template that the APN is to associated to is
selected.
Figure 8-14
Add APN Page
[A-Za-z0-9]+{[A-Za-z0-9-.]}*
Figure 8-15
APN Group dialog
Table 8-14
APN Group General Tab
Subscriber All configured None Subscriber Template associated with the APN.
Template subscriber
template
IMS Profile All Configured None The IMS Profile to be returned to the mobile when P-
IMS Profile CSCF discovery is requested.
Aggregation Selected or Not Not Designates this APN as supporting only Aggregation
Selected Selected mode GTP Sessions with subset of available
features & services.
WAP Selected or Not Not Select if Session Mode is required for the APN.
Session Selected Selected
Mode
GGSN QoS All configured N/A GGSN QoS Profile associated with the APN.
Profile GGSN QoS
profiles
Table 8-14
APN Group General Tab
Support QoS Selected or not Not Enables/Disables to support the Release 5 QoS
Release 5 Selected Selected format needed to support HSDPA.
Format
Allow QoS Selected or Not Not If this checkbox is not selected, any QoS profiles
Signalling Selected Selected received will be downgraded (i.e. the Signalling
Indication Indication in the PDP response will be set to No)
APN blacklist Selected or Not Not Indicates whether APN blacklist is enabled.
enabled Selected Selected
APN blacklist 1 - 7200 Integer 100 Once the provisioned threshold is crossed, the APN
failure is blacklisted for that specific GGSN throughout the
threshold interval described below.
APN 1 - 86400 300 Blackout time interval in seconds during which time
blackout Integer all PDP context requests to the APN are blocked.
interval
TCP MSS Selected or Not Not This checkbox is used to enable/disable TCP MSS
Clamping Selected Selected Clamping feature.
enabled
TCP 536 - 1460 1424 Configured value for TCP MSS attribute in a range
Maximum from 536 - 1460. The default value is 1424.
Segment
Size This field is enabled only if “TCP MSS
Clamping“checkbox is checked.
The following figure shows the device specific configuration page for
adding Tariff Profile/WAP profile to an APN.
Figure 8-16
APN Device Specific Configuration Page
The Tariff and/or WAP profiles selected are applied only to the device
that is selected.
Table 8-15
APN Specific Device Configuration Tab
Tariff All configured None Specify SCP profile used for Prepaid Service and
Tariff Profiles on GeoZone service for APN.
the ISP
Credit Control All configured None Specify Credit Control profile used for Credit
Diameter Credit Control Service for APN.
Control and
Diameter Credit Attention: Diameter Credit + Policy Control profile
+ Policy Control can be specified for this field to provide Credit
profiles on the Control and Policy Control Service for APN.
device
Policy Control All configured None Specify Policy Control profile used for Policy
Diameter Policy Control Service for APN.
Control profiles
on the device
Table 8-15
APN Specific Device Configuration Tab
AppServer All configured None Specify Application profile used for WAP Service
AppServer for APN.
Profile on the
ISP
Figure 8-17
APN Group Accounting/Billing Page
Table 8-16
APN Group Accounting/Billing Tab
TOD Profile All configured None TOD Profile associated with the APN.
GGSN TOD
profiles
IMSI Billing IMSI Billing blank This field will contain the IMSI Billing profile to be
Profile profiles used for this APN.
configured on
the provisioned
ISP
Periodic Disabled or 1 - 1440 Time limit for triggering periodic billing records.
Billing - Time 1440 (min)
Limit
Periodic Disabled or 1- 1000 Volume limit for triggering periodic billing records.
Billing - 1000000
Volume Limit (KBytes)
Exclude QCT Selected or Not Not Select this field to enable the functionality of
Timeout Selected selected Exclude QCT Timeout.
Attention: This option applies to postpaid and
prepaid billing subscribers.
Max SGSN Selected or Not Selected Use to determine if Partial billing record should be
Change Selected generated every time the maximum limit of SGSN
Partial Billing address changes is reached. This field is ignored if
“SGSN Change Partial Billing” is selected.
Table 8-16
APN Group Accounting/Billing Tab
Fixed Billing Selected or Not Not This field indicates whether the Fixed Billing
Interval Selected Selected Interval is enabled or disabled on specific APN.
Generate Selected or not Selected If not selected, Zero Volume Zero Duration (ZVZD)
ZVZD G- selected containers and records that are generated by the
CDRs occurrence of a periodic billing time limit are
suppressed.
Session Selected or Not Not Enable or Disable RADIUS session mode. This
Mode Selected Selected check box will be enabled only if RADIUS
Accounting is selected.
Table 8-16
APN Group Accounting/Billing Tab
Session 1 - 120 second 15 Session Mode Timer. This field will be enabled only
Mode Timer if Session Mode check box is selected. This timer
controls the time the GGSN waits for the RADIUS
START response from the RADIUS server.
Allow Write Selected or Not Selected Enable or Disable RADIUS Accounting Records to
to Disk Selected be written to the local Disk.
Hot Billing Selected or Not Not Select if Hot Billing is required for the APN.
selected selected
Report DTP At Start/ On At Start Report Discrete Time Period (DTP) either ‘at Start’
Expiry or ‘on Expiry’ of the DTP envelope.
Enabling the log to report the access deny on APN Group Access
page must be exercised with caution. The performance of the GGSN
can be adversely affected when large quantities of logs are generated
in the case of faulty home network entry.
Figure 8-18
APN Group Access Page
Table 8-17
APN Group Access Tab
Access Deny Selected or Not Not Access Deny Log reports all rejected IMSI
Log Selected Selected
APN Session Selected or Not Not When selected it only allows the number of PDP
Limit Selected Selected sessions specified to be set up in this APN. The
range of APN Session Limit is1 - 2147483647
Send padded
and encrypted
blank character If this value is selected and the password received
as password to from PCO IE is NULL,GGSN sends a padded and
RADIUS encrypted blank as password to RADIUS.
Table 8-17
APN Group Access Tab
Ignore invalid Selected or Not Selected If selected, the GGSN ignores NULL values
Shasta Service Selected received for the Shasta Service Profile or Shasta
Profile and Prepaid Server VSAs and continues with the PDP
Shasta Prepaid context activation using the GGSN configured
Server values. NULL value means VSA with no data.
Add APN as Selected or Not Not If selected, APN name is added as the domain
domain selected Selected appended to the anonymous username. This field
is grayed out if "Anonymous RADIUS
Authentication" is disabled.
Override Mobile Selected or Not Not If selected, any username supplied in the PCO and
supplied selected Selected PAP protocol is overridden and the anonymous
username username (MSISDN or IMSI or configured
username) is used for RADIUS authentication. This
field is grayed out if "Anonymous RADIUS
Authentication" is disabled.
APN Selection Selected or Not Not If it is selected, the PDP session is rejected when
Mode - MS/ Selected Selected ‘MS or Network Provided APN, Subscribed Verified’
Ntwk Provided selection mode value is received.
Subscription
Required
Table 8-17
APN Group Access Tab
APN Selection Selected or Not Not If it is selected, the PDP session is rejected when
Mode - MS Selected Selected ‘MS Provided APN, Subscription not Verified’
Provided selection mode value is received.
Subscription
not Required
APN Selection Selected or Not Not If it is selected, the PDP session is rejected when
Mode - Ntwk Selected Selected ‘Network Provided APN, Subscription not Verified’
Provided selection mode value is received.
Subscription
Not Required
Attention: Only one User Agent Profile may be configured per ISP.
Figure 8-19
New User Agent Profile
Table 8-18
New User Agent Profile
User Agent 32 character None The name of the User Agent Profile to
Profile Name string be added
After providing a name for the new User Agent Profile, the following
dialog is used to display and edit the currently provisioned User Agent
Profile.
Figure 8-20
User Agent Profile Configuration Dialog
Table 8-19
User Agent field description
Figure 8-21
User Agent Add/Modify Dialog
IMS Profile
An IMS Profile is added by clicking on the Add button when the IMS
Profile folder is selected in the Access Properties Manager. The
following dialog is used to provide a name for the new IMS profile.
Figure 8-22
New IMS Profile
Table 8-20
New IMS profile
After providing a name for the new IMS Profile (or when editing an
existing Profile) the following dialog is used to display and edit the
currently provisioned IMS Profile.
Figure 8-23
IMS Profile GUI
Table 8-21
IMS profile GUI
Figure 8-24
P-CSCF Address List
Add IP Address
The following dialog is used to add a new IP address to the list. The
edit dialog will look very similar.
Figure 8-25
Add IP Address
Table 8-22
Add IP address
[1..255].[0..255]
.[0..255].[0.254]
except loopback
(127.x.y.z) and
multicast
([224..239].x.y.z
)
Tariff Profile
The Tariff Profile is part of the Access Properties. Within the Tariff
Profile page, there are 4 tabs - General tab, Servers tab, Device tab
and CTP Version 3 Setting tab.
Figure 8-26
Tariff Profile General Page
Table 8-23
Tariff Profile General Tab
Table 8-23
Tariff Profile General Tab
Login Response 1-5 2 Maximum time to wait for the login response from the
Time (Seconds) Tariff Server
Figure 8-27
Tariff Profile Servers Page
Table 8-24
Tariff profile server tab
Figure 8-28
Tariff Profile Device Page
Table 8-25
Tariff Profile Device Tab
Device Devices None Device name which is configured with specific ISP.
configured
for specific
ISP
Figure 8-29
Tariff Profile Device Configuration Page
Table 8-26
Tariff Profile Device Configuration Tab
Device Devices None Device name which is configured with specific ISP.
configured
for specific
ISP
Figure 8-30
Tariff Profile CTP Settings Page for version 1
Table 8-27
Tariff Profile CTP Settings Tab
Table 8-28
Tariff Profile CTP Settings Tab for Version 1
1-5
(Hours)
Figure 8-31
Tariff Profile CTP Settings for Version 3
Table 8-29
Tariff Profile CTP Settings Tab for Version 3
Block Selected or Not If this option is selected - GGSN will block packets
packets Not Selected of a specific rate until a new coupon has been
until the Selected activated or an existing coupon has been
new reauthenticated.
coupon
has been
activated
Block data Selected or Selected If this option is selected - GGSN will block data for
for that Not that coupon rate id only when the coupon request
coupon Selected is denied. If enabled, configure the Re-auth Guard
rate id Timer.
only
Re-auth 10 - 600 60 sec This timer is started upon receiving a coupon from
Guard sec the Prepaid Server with one of the following
timer denied reasons: General Error, Insufficient Funds,
or Too Many Coupons in Use. The GGSN will not
attempt to re-authorize the coupon until this timer
expires. If a coupon is denied for some other
reason, the timer is not started and the coupon
becomes unusable for the life of the PDP context.
Tear down Selected or Not If this option is selected - GGSN will tear down the
the Not Selected context associated with denied coupon and report
context Selected back unused coupon usage when the coupon
associated request is denied.
with the
denied
coupon
Table 8-29
Tariff Profile CTP Settings Tab for Version 3
Default re- 50 - 100% 100% Specifies the default re-auth threshold value for
auth coupons. This can be overridden by a threshold
threshold (Disabled) trigger set in the coupon itself. This threshold
value applies to volume and time based coupons.
The percentage value indicates how much of the
resource must be used before a re-auth will be
triggered.
Idle 0 - 3600 0 sec Specifies the default time a coupon can remain
coupon sec (Disabled) idle before it is returned to the SCP server. This
timer can be overridden by a threshold trigger set in the
coupon itself.
Keep Alive 1 - 120 20 second Keep Alive message interval. Only used by CTP
Idle Time second version 3.
Keep Alive 1 - 30 5 second Keep Alive allowed response time. Only used by
Response second CTP version 3.
Time
Response timers on the GGSN need to be aligned
with what is configured on the Tariff server.
Table 8-29
Tariff Profile CTP Settings Tab for Version 3
Figure 8-32
Application Server Profile General Page
Table 8-30
WAP Profile General Tab
Table 8-30
WAP Profile General Tab
Figure 8-33
Application Server Profile Servers Page
Table 8-31
Application Server Profile Server Tab
Figure 8-34
Global Attributes Profile Page
Table 8-32
Global Attributes Profile Tab
Figure 8-35
User List
Currently, the previous Login user name and a list of SCS server
addresses connected to previously are preserved so that the next time
a user logs into the SCS GUI client, the user does not have to retype
the information. To protect the identity of the LI user, the LI user name,
“_li_user”, is not saved for the SCS Login window.
Figure 8-36
SCS Login Window
The privilege settings are fixed for the LI user view profile. All users
are not allowed to modify the name or settings of the profile. The LI
user view profile is not visible to users logged into the SCS GUI.
Figure 8-37 shows the SCS options available to the LI user when
logged into the LI ISP. The options are based on the LI user view
profile privileges.
Figure 8-37
SCS Available Options for LI ISP
LI ISP
The new LI ISP isolates the LI provisioned data. All LI configuration
must be added by logging into the LI ISP as the LI user. An ISP with
the name of “li_default_isp” is created at the time of SCS installation or
upgrade. The LI ISP name is unique to the SCS and is not
configurable by users. The LI ISP name can not be modified.
ISPs are listed in the “ISP Manager”. The LI ISP is only visible to the LI
user and not visible to other users logged into the SCS GUI.
Figure 8-38
ISP List
Attention: When LI ISP is provisioned for the 2nd SSG (or when LI
ISP is provisioned for more than 1 SSG) on the SCS server, LI ISP
(default_li_isp) appears as a VPRN.LI ISP is configured with IKE
(needed for IPSec).Anytime an ISP (even non-LI ISPs) is
configured with IKE and more than 1 SSG is added to the ISP, the
CLI commands like “show interface”, “show vprn” or “show ike sa”
start showing the ISP as VPRN even though the VPRN
configuration is not quite complete. To complete a VPRN
configuration, a VPRN group needs to be added.But as VPRN is
not supported for LI ISP configuration of VPRN is prevented. As
such, because of the side effect of configuring two or more SSG on
the same LI ISP, it appears as VPRN.
Figure 8-39
LI ISP Device Manager
LI Profile
The new LI profile is used to configure the ADMF information. LI
profiles are configured using the LI ISP and are under the “LI Profiles”
option of the “Access Properties Manager”. Only one LI profile is
allowed to be configured for a device. LI profiles are only visible to the
LI user.
Figure 8-40
LI Profile Configuration
Table 8-33
LI Profile Configuration
Table 8-33
LI Profile Configuration
Intercept Only Selected or Not Not Select to intercept only roaming target
When Roaming Selected Selected mobile subscribers. Otherwise,
intercept all target mobile subscribers.
Figure 8-41
Access Properties Manager Menu / Access Control Profiles
Figure 8-42
Add New Access Control Profile
Table 8-34
Configured Access Control List Profile
Figure 8-43
Access Control Profile General Tab
Figure 8-44
Access Control Profile MCC
Table 8-35
Access Control Profile MCC Table
Specify Menu of 2 2 digits Specify the digit MNC. The range for 2 digits is 00-
Digits for or 3 digits 99 and for 3 digits is 000-999
MNC
MCC/MNC Consistency
A warning dialog will pop up if no MNC is configured.
Figure 8-45
Access Control Profile MNC
Figure 8-46
Warning dialog if no MNC is configured
Figure 8-47
Add MNC Dialog
Table 8-36
Access Control Profile MNC Table
Mobile Three or None Mobile Network Code. The range for 2 digits MNC
Network two digit is 00-99 and for 3 digits MNC is 000-999.
Code Integer
Diameter Profile
Diameter Credit Control configuration can be added from the Diameter
Profiles tab of the Access properties list. If Diameter Credit Control is
disabled, the GGSN does not process any DCC configuration
message from SCS GUI or CORBA API. While DCC is disabled,
configuration of DCC profile will result in ‘out of sync’ GGSN with
session error for DCC Profile configuration.
Once the function is enabled it can only be disabled after deletion of all
DCC profiles from SCS. If DCC is disabled via SOC after having been
enabled, the DCC functionality is available for existing APN's with
DCC Profiles until the GSSN is resynced.
When adding a new Diameter Credit Control profile from the newly
created Diameter Credit Control tab of the Access properties list, the
window in Figure 8-48 will be displayed. There are three application
options:
Figure 8-48
New Diameter Profile from Access Properties “Diameter Profiles”
Table 8-37
New Diameter Profile
Application A drop down box with Credit Control if Application type of the Diameter
the following values: DCC feature Profile.
enabled.
Credit Control
Otherwise,
Policy Control Policy Control if
DPC feature
Credit + Policy Control enabled and
DCC feature not
enabled.
Figure 8-49
Diameter Profile General Tab
Table 8-38
Diameter Profile General Tab
Profile Name 32 character None Name previously entered for the Diameter
string Profile. Cannot be changed in this dialog.
Table 8-38
Diameter Profile General Tab
Application Credit Control, Application Indicates the application type of the profile. This
Policy Control, type from field is not modifiable.
Credit + Policy “New
Control Diameter
Profile”
Report DCC Selected or Not Selected Use Report Diameter CC Time Event Billing in
Time Event Selected G-CDR PM Extension instead of Content Type
Billing in G- Profile
CDR PM
Extension
Other, <string> Empty When checked, users can enter any string. If
Please the value is an unknown string, the GGSN will
specify behave as if “v1.ggsn.r7@nortel.com” was
entered.
Figure 8-50
Diameter Profile Servers Tab
Table 8-39
Diameter Profile - Servers tab
Figure 8-51
Diameter Server Profile General Tab
Table 8-40
Diameter Server Profile General Tab
Peer Radio Button Proxy Set agent type of the DCC peer.
When either “Proxy” or “Relay” is
(Proxy, Relay, selected, the DCC client will set the P
and Direct) bit in all Credit Control Request
messages that are sent to this peer.
Figure 8-52
Diameter Server Profile Device Specific Tab
Figure 8-53
New Diameter Server Device Specific Settings
Table 8-41
New Diameter Server Device Specific Settings
IPSec Profile IPSec profile None The IPSec profile that defines the
name security protocol for the IPSec policy.
Right-click the icon to access the
configuration dialog box. This field is
for future use and cannot be altered.
Table 8-41
New Diameter Server Device Specific Settings
ASCII text Text string None The ASCII text string used for the pre-
input shared key. This field is for future use
and cannot be altered.
Primary Selected or Not Not Selected Indicates that this server is the
Selected primary server in the profile. When
this server is available and
communicating, it is the server used
for new session establishment. This
server is also the server used initially
after GGSN system restart.
Figure 8-54
Server IP Address Locked Out
Also, for a given Device Specific record, if it is in the “Online” state, the
IPSec information cannot be modified (See “IPSec Profile and Key
Locked Out”).
Figure 8-55
IPSec Profile and Key Locked Out
To modify either of these values, the operator must first set the server
to “Offline” to modify the IPSec info, and must set all servers to
“Offline” to modify the server IP address.
Figure 8-56
Diameter Profile Credit Control Tab (Triggers)
Table 8-42
Diameter Profile-Credit Control Tab (Trigger)
Table 8-42
Diameter Profile-Credit Control Tab (Trigger)
Idle coupon 0 - 3600 0 seconds Specifies the default time a coupon can remain idle
timer seconds (Disabled) before it is returned to the DCC server. This can be
overridden by a threshold trigger set in the coupon
itself.
Reset Idle Selected or Not Not This field determines if the Idle coupon time is reset
time on CCA Selected Selected on CCA receipt for coupons received in the CCA.
Table 8-42
Diameter Profile-Credit Control Tab (Trigger)
Default re- 50 - 100 100 Specifies the default re-auth threshold value for
auth coupons. This can be overridden by a threshold
threshold - (when % button trigger set in the coupon itself. This threshold value
Time is checked) applies to volume and time based coupons. The
percentage value indicates how much of the
resource must be used before a re-auth will be
triggered.
Default re- 50 - 100 100 Default value for volume quota threshold in
auth percentage of DCC server granted units
threshold - (when % button
Volume is checked) (the threshold value is GrantedUnits x
SCSConfiguredPercentage)
Figure 8-57
Credit Usage Reporting Dialog
Table 8-43
Credit usage reporting dialog
Figure 8-58
Diameter Profile Credit Control Tab (Rating Group ID)
Add Rate-Id
Figure 8-59
Add Rate Id Window
Table 8-44
Add Rate-id window
Figure 8-60
Diameter Profile Credit Control Tab (Authorization Behavior)
Table 8-45
Diameter Profile Credit Control (Authorization Behavior)
Figure 8-61
Diameter Profile Credit Control Tab - Denied Coupon Behavior
Table 8-46
Diameter Profile-Credit Control Tab (Denied Coupon Behavior
Denied coupon behavior 10 - 600 sec. 60 sec. This timer is started upon receiving a
- Re-auth Guard timer coupon from the Prepaid Server with
one of the following denied reasons:
General Error, Insufficient Funds, or
Too Many Coupons in Use. The
GGSN will not attempt to re-authorize
the coupon until this timer expires. If a
coupon is denied for some other
reason, the timer is not started and
the coupon becomes unusable for the
life of the PDP context.
Denied coupon behavior Selected or Not Selected If this option is selected, GGSN
- Block data for that Selected blocks data for that coupon rate id
coupon rate id only only when the coupon request is
denied. If enabled, configure the Re-
auth Guard Timer.
Denied coupon behavior Selected or Not Not If this option is selected, GGSN tears
- Tear down the context Selected selected down the context associated with a
associated with the denied coupon and report back
denied coupon unused coupon usage when the
coupon request is denied.
Figure 8-62
Diameter Profile Request Failure Tab
Table 8-47
Diameter Profile Request Failure Tab
Session Failover Selected or not Not selected When selected, the DCC client
Support selected supports failover, i.e. failed DCC
requests is re-directed to alternative
DCC servers. This is applicable to all
sessions.
Tx Event Critical 10-65535 and 0 (disabled) Critical Threshold values for Tx Timer
Threshold greater than Event
above threshold
(or disabled)
Each IMSI rule list supports the definition of multiple IMSI rules. One
or more IMSI rule lists can be associated with one or more IMSI billing
profiles. A Rules List can be added when clicking on the Add button
with the Rules list folder selected.
Figure 8-63
IMSI Rules Configuration
Once the Rule list has been created, click on the add box to create a
rule.
Figure 8-64
New IMSI Rule
Once the rules are provisioned in a list, individual rules may be moved
up or down in the list. This is done by highlighting a rule, then right
mouse click and a “move up or move down” menu will show. Simply
click on the direction you want the rule to move. An IMSI is compared
with rules starting with the first rule in a list so the order the rules are
provisioned is important.
Figure 8-65
IMSI Billing Profile Page
Figure 8-66
IMSI Billing Element Page
Table 8-49
IMSI Profile Fields
Time Limit Disabled or 1 - 1440 Time limit for triggering periodic billing records.
1440 (min)
(used for
both GTP
and Radius
billing)
Volume Limit Disabled or 1 - 1000 Volume limit for triggering periodic billing records.
(used for 1000000
both GTP (Kbytes)
and Radius
billing)
Table 8-49
IMSI Profile Fields
Set Prepaid Checked or Unchecked If checked, set the prepaid bit in the charging
CC Unchecked characteristic.
(used for
both GTP
and Radius
billing)
Once lists are provisioned in a billing profile, the lists can be moved
around. To move a list up or down in a profile right mouse click on the
list and menu will pop up. On the menu select “move up” or “move
down” and the list will move in the direction selected. When an IMSI is
compared to a list of rules it starts with the first list provisioned in a
profile, so the order the lists are provisioned in a profile is important.
Figure 8-67
New SOC Activation Window
Table 8-50
New SOC Activation
Figure 8-68
Error dialog for invalid license key
Figure 8-69
SOC Activation Configuration Window
Table 8-51
SOC Activation Configuration
The following new GUI screen allows user(s) to edit feature activation
status from “Disabled” to “Enabled” & vice versa.
Figure 8-70
SOC Activation Configuration
Table 8-52
SOC Activation Configuration
Feature 256 characters None Optional feature name currently available for
Name (string) configuration.
License Key 32 characters None License key providing access to optional feature.
(string)
Figure 8-71
Warning dialog for disabling feature with SCS Configuration
Figure 8-72
Dialog for POP3 Event Description
Table 8-53
POP3 event description
Table 8-53
POP3 event description
The following is used to configure the coupon id, content type id and
Event completion for POP3 Receive Event.
Figure 8-73
POP3 Receive Event Configuration
Table 8-54
POP3 receive event configuration
Table 8-54
POP3 receive event configuration
Figure 8-74
Edit Default ID’s for POP3
Table 8-55
POP3 default configuration
Uplink Content Type 0-65535 None Content Type ID for uplink data
ID packets count
Envelope Reporting “Time Only”, Time Indicates the type of info to report in
“Time,Volume Only the G-CDR PM management
and Events” extension.
Envelope Reporting “Time Only”, Time Indicates the type of info to report in
“Time,Volume Only the G-CDR PM management
and Events” extension.
Table 8-55
POP3 default configuration
Envelope Reporting “Do Not Report“, Do Not Indicates the type of info to report in
“Time Only” and Report the G-CDR PM management
“Time,Volume extension.
and Events”
Envelope Reporting “Do Not Report“, Do Not Indicates the type of info to report in
“Time Only” and Report the G-CDR PM management
“Time,Volume extension.
and Events”
Figure 8-75
Dialog for SMTP Event Description
Table 8-56
SMTP event description
Table 8-56
SMTP event description
The following is used to configure the coupon id, content type id and
Event completion for SMTP Send Event.
Figure 8-76
SMTP Send Event Configuration
Table 8-57
SMTP send event configuration
Envelope “Time Only”, Time Only Indicates the type of info to report in
Reporting “Time,Volume the G-CDR PM management
and Events” extension.
Table 8-57
SMTP send event configuration
Figure 8-77
SMTP Default Configuration
Table 8-58
SMTP default configuration
Envelope Reporting “Time Only”, Time Indicates the type of info to report in
“Time,Volume Only the G-CDR PM management
and Events” extension.
Table 8-58
SMTP default configuration
Envelope Reporting “Time Only”, Time Indicates the type of info to report in
“Time,Volume Only the G-CDR PM management
and Events” extension.
Envelope Reporting “Do Not Do Not Indicates the type of info to report in
Report“, “Time Report the G-CDR PM management
Only” and extension.
“Time,Volume
and Events”
Envelope Reporting “Do Not Do Not Indicates the type of info to report in
Report“, “Time Report the G-CDR PM management
Only” and extension.
“Time,Volume
and Events”
Figure 8-78
Dialog for IMAP4 Event Description
Table 8-59
IMAP4 event description
Table 8-59
IMAP4 event description
Content Type ID 0-65535 None Content Type ID for both uplink and
downlink data packets count and
event usage count for the EVENT
The following is used to configure the coupon id, content type id and
Event completion for IMAP4 Send Event.
Figure 8-79
IMAP4 Send Event Configuration
Table 8-60
IMAP4 send event configuration
Content Type 0-65535 None Content Type id for uplink/downlink data packets
ID count and event usage count.
Envelope “Time Only”, Time Indicates the type of info to report in the G-CDR
Reporting “Time,Volume Only PM management extension.
and Events”
Table 8-60
IMAP4 send event configuration
Envelope “Do Not Do Not Indicates the type of info to report in the G-CDR
Reporting Report“, “Time Report PM management extension.
Only” and
“Time,Volume
and Events”
Event Selected or Not Not If Event Completion is set to Disabled, the event is
Completion Selected Selected counted when the event trigger is detected.
(Disable
d) If Event Completion is set to Enabled, the event is
only counted when the event is completed
successfully.
The following is used to configure the coupon id, content type id and
Event completion for IMAP4 Receive Event.
Figure 8-80
IMAP4 Receive Event Configuration
Table 8-61
IMAP4 receive event configuration
Table 8-61
IMAP4 receive event configuration
Figure 8-81
IMAP4 Default Configuration
Table 8-62
IMAP4 default configuration
Envelope Reporting “Time Only”, Time Indicates the type of info to report in
“Time,Volume Only the G-CDR PM management
and Events” extension.
Table 8-62
IMAP4 default configuration
Envelope Reporting “Time Only”, Time Indicates the type of info to report in
“Time,Volume Only the G-CDR PM management
and Events” extension.
Envelope Reporting “Do Not Do Not Indicates the type of info to report in
Report“, “Time Report the G-CDR PM management
Only” and extension.
“Time,Volume
and Events”
Envelope Reporting “Do Not Do Not Indicates the type of info to report in
Report“, “Time Report the G-CDR PM management
Only” and extension.
“Time,Volume
and Events”
Figure 8-82
Dialog Displaying General HTTP and Content Type
Table 8-63
General HTTP and content type
Table 8-63
General HTTP and content type
Figure 8-83
Provisioning Content Type (MMS)
Table 8-64
Provisioning content type (MMS)
Table 8-64
Provisioning content type (MMS)
Figure 8-84
MMS Configuration
Table 8-65
MMS configuration
Uplink Content Type 0-65535 None Content Type ID for uplink data
ID packets count
Envelope Reporting “Time Only”, Time Indicates the type of info to report in
“Time,Volume Only the G-CDR PM management
and Events” extension.
Table 8-65
MMS configuration
Envelope Reporting “Time Only”, Time Indicates the type of info to report in
“Time,Volume Only the G-CDR PM management
and Events” extension.
Envelope Reporting “Do Not Do Not Indicates the type of info to report in
Report“, “Time Report the G-CDR PM management
Only” and extension.
“Time,Volume
and Events”
Envelope Reporting “Do Not Do Not Indicates the type of info to report in
Report“, “Time Report the G-CDR PM management
Only” and extension.
“Time,Volume
and Events”
Figure 8-85
Provisioning Content Type (Wireless Village)
Table 8-66
Provisioning content type (Wireless Village)
Content Type 0-65535 None Content Type ID for both uplink and
ID downlink data packets count and
event usage count for the EVENT
Table 8-66
Provisioning content type (Wireless Village)
The following is used to configure the coupon id, content type id and
Event completion for Wireless Village Send Event.
Figure 8-86
Wireless Village Send Event Configuration
Table 8-67
Wireless Village send event configuration
Envelope “Time Only”, Time Only Indicates the type of info to report in
Reporting “Time,Volume the G-CDR PM management
and Events” extension.
Table 8-67
Wireless Village send event configuration
The following is used to configure the coupon id, content type id and
Event completion for Wireless Village Receive Event.
Figure 8-87
Wireless Village Receive Event Configuration
Table 8-68
Wireless Village receive event configuration
Envelope “Time Only”, Time Only Indicates the type of info to report in
Reporting “Time,Volume the G-CDR PM management
and Events” extension.
Table 8-68
Wireless Village receive event configuration
Figure 8-88
Default HTTP Configuration
Table 8-69
Default HTTP configuration
Uplink Content Type 0-65535 None Content Type ID for uplink data
ID packets count
Envelope Reporting “Time Only”, Time Only Indicates the type of info to report in
“Time,Volume the G-CDR PM management
and Events” extension.
Table 8-69
Default HTTP configuration
Envelope Reporting “Time Only”, Time Only Indicates the type of info to report in
“Time,Volume the G-CDR PM management
and Events” extension.
Envelope Reporting “Do Not Do Not Indicates the type of info to report in
Report“, “Time Report the G-CDR PM management
Only” and extension.
“Time,Volume
and Events”
Envelope Reporting “Do Not Do Not Indicates the type of info to report in
Report“, “Time Report the G-CDR PM management
Only” and extension.
“Time,Volume
and Events”
Figure 8-89
HTTP Misc Tab
Table 8-70
HTTP Misc tab
Table 8-70
HTTP Misc tab
Envelope “Do Not Report“, Do Not Report Indicates the type of info to report in
Reporting “Time Only” and the G-CDR PM management
“Time,Volume extension.
and Events”
Figure 8-90
Dialog Displaying General WAP and Content Type
Table 8-71
General WAP and content type
Table 8-71
General WAP and content type
Figure 8-91
Provisioning Content Type (MMS)
Table 8-72
Provisioning content type (MMS)
Table 8-72
Provisioning content type (MMS)
Figure 8-92
Provisioning Content Type (Wireless Village)
Table 8-73
Provisioning content type (Wireless Village)
Table 8-73
Provisioning content type (Wireless Village)
Content Type ID 0-65535 None Content Type ID for both uplink and
downlink data packets count and
event usage count for the EVENT
Figure 8-93
Default WAP Configuration
Table 8-74
Default WAP configuration
Uplink Content Type 0-65535 None Content Type ID for uplink data
ID packets count
Envelope Reporting “Time Only”, Time Indicates the type of info to report in
“Time,Volume Only the G-CDR PM management
and Events” extension.
Table 8-74
Default WAP configuration
Envelope Reporting “Time Only”, Time Indicates the type of info to report in
“Time,Volume Only the G-CDR PM management
and Events” extension.
Envelope Reporting “Do Not Do Not Indicates the type of info to report in
Report“, “Time Report the G-CDR PM management
Only” and extension.
“Time,Volume
and Events”
Envelope Reporting “Do Not Do Not Indicates the type of info to report in
Report“, “Time Report the G-CDR PM management
Only” and extension.
“Time,Volume
and Events”
Figure 8-94
WAP Misc Tab
Table 8-75
WAP Misc tab
Table 8-75
WAP Misc tab
Envelope “Do Not Report“, Do Not Report Indicates the type of info to report in
Reporting “Time Only” and the G-CDR PM management
“Time,Volume extension.
and Events”
Figure 8-95
Device Access Properties
Figure 8-96
TPO ISP Selection
TPO IP Service
The TPO IP service is responsible for re-directing a packet to the TPO
server based on the TPO IP service policy configuration. The TPO IP
service is configured on the Gi ISP. In SCS GUI, the TPO Service
policy entry is added in the Service Policies selection tree. TPO Data
configuration is part of the TPO IP service configuration. The TPO
Data specifies the TPO Interface type. Type A is the only type that is
supported in this feature. TPO Interface type A is used when
interworking with Bytemobile TPO. The TPO profile configuration is
shown in Figure 8-97.
Figure 8-97
IPO data configuration
Redundancy Profiles
Figure 8-98
New Redundancy Profile Dialog
Figure 8-99
Edit Redundancy Profile Dialog--General Redundancy Panel
Figure 8-100
Edit Redundancy Profile Dialog--SSM Redundancy Panel
Table 8-76
Redundancy profile tab
Coupon Lists
The Coupon Lists is present in the Access Properties to provision
Coupon Lists and Coupon IDs.The Coupon List resides at the ISP
level. There is only one table called Coupon IDs on this profile. The
Coupon List can be accessible with ISP privilege. The “Coupon List”
Figure 8-101
Coupon List
Figure 8-102
Add and Edit Coupon
Table 8-77
Add coupon ID tab
Coupon Profile
Coupon Profile dialog is used to configure mappings between Coupon
Id and its attributes. This feature introduces the Base Time Interval,
Time Quota Type and Envelope Reporting as attributes of a Coupon
Id. The value of Base Time Interval is in seconds, Time Quota Type is
“Discrete“or “Continuous“, Envelope Reporting is “Do Not Report“,
“Time Only“or “Time, Volume and Events“. The maximum number of
Coupon Ids allowed in a Coupon Profile is 255.
Figure 8-103
Coupon Profile
Table 8-78
New Coupon Profile
Figure 8-104
Coupon Profile
Figure 8-105
Coupon Attributes Dialog
Table 8-79
Parameters for Coupon Profile
“Discrete” is used for DTP and “Continuous” is used for CTP. When
both “TIME EVENT BILLING” and “CTP TIME EVENT BILLING” SOCs
are enabled, “Discrete” option is set as default value. Otherwise, either
“Discrete” or “Continuous” will be visible when one of two SOCs above
is enabled.
Figure 8-106
Content Type Profile
Table 8-80
New Content Type Profile
Figure 8-107
Content Type Profile
Figure 8-108
Content Type Attributes Dialog
Table 8-81
Parameters for Content Type Profile
Envelope “Time Only” and Time Indicates the type of info to report in
Reporting “Time,Volume Only the G-CDR PM management
and Events” extension.
“Discrete” is used for DTP and “Continuous” is used for CTP. When
both “TIME EVENT BILLING” and “CTP TIME EVENT BILLING” SOCs
are enabled, “Discrete” option is set as default value. Otherwise, either
“Discrete” or “Continuous” will be visible when one of two SOCs above
is enabled.
HCM Profiles
A new profile at the device level named “HCM Profile” is added to
provision the HCM alarm threshold values. There is one checkbox and
three editable text fields on this profile dialog.
Figure 8-109
New HCM Profile Dialog
Table 8-82
Parameters for new HCM profile
Profile Name 32 character None Name of the HCM Profile. The first
string letter should be [a-z], the valid letter
should be [a-z0-9_-./:'#&%$]
Figure 8-110
Edit HCM profile Dialog
Table 8-83
Parameters for edit HCM profile
Table 8-83
Parameters for edit HCM profile
• IP Address
• Port Number (used for both TCP and UDP communications)
• Server Protocol Type (i.e., Nortel Content Filter Protocol v1.0,
Websense Server Protocol v4.2)
• Request Timeout
Figure 8-111
New Content Filter Profile
Table 8-84
Content Filter Profile Configuration Parameters
Port 16-bit unsigned For Websense The port number of the Content
Integer, 1-65535 type server, the Filter Server
default value is
15868. For Nortel
Proprietary type
server, the default
value is 1344
1=Nortel Networks,
2=Websense
Figure 8-112
Add Content Filter Profile
Table 8-85
Content Filter Profile Configuration Parameters
Port 16-bit unsigned For Websense The port number of the Content
Integer, 1-65535 type server, the Filter Server
default value is
15868. For Nortel
Proprietary type
server, the default
value is 1344
1=Nortel Networks,
2=Websense
Figure 8-113
Content Filter Profile Server List
Figure 8-114
Service Policy Manager Content Filter Policy
HA Profile
A new HA Profile is introduced. The new profile contains a list of Home
Agents for which GGSN IP services are to be applied.Each APN may
have a single HA profile assigned. A given HA profile may be assigned
to many APNs.
Figure 8-115
New HA Profile
Table 8-86
New HA profile
Figure 8-116
HA Profile
Clicking the Add or Edit button brings up the “New HA Server Address”
dialog. An example is shown in Figure 8-117.
Figure 8-117
HA Server Address
Table 8-87
HA server address
Connection Template
Connection Template under Access Properties is modified to support
GTP type and match by APN. Connection ISP within the Connection
Template can be used to specify which ISP the matching of APN.
Figure 8-118
Connection Template General Page
On the Subscriber template the user can specify the MTU value. The
MTU value can be configured in the range of 68-1950 bytes. The
default MTU value is 1500 bytes.
DHCP Profile
The DHCP profile is used to enable the DHCP Client or DHCP Relay
Agent functionality on the Nortel GGSN for the IP address allocation
from the DHCP Server. Four fields are added to the DHCP Profile -
Pool Name, DHCP Relay Agent Address, Use ISP Address as Source
Address and DHCP Client ID options.
The DHCP Relay Agent Address can not be provisioned with the same
address as the Connection ISP or Trunk Interface. If the DHCP Profile
is associated with a VPN, the Access Subscriber local address can not
be used for the DHCP Relay Agent Address either.
Figure 8-119
DHCP Profile Configuration
Table 8-89
DHCP Profile General Tab
Table 8-89
DHCP Profile General Tab
DHCP Relay IPv4 address format None The DHCP relay agent address for
Agent the giaddr parameter field in the
Address DHCP messages.
Use ISP Selected or Not Not Select for using the ISP IP address as
address as Selected Selected source address.
source
address
DHCP Relay Selected or Not Not Enables you to select the 32-bit
Agent Selected Selected integer and String Hostname options.
Options -
Circuit ID
DHCP Relay Selected or Not Not Provides a slot, port and vpi/vci
Agent Selected Selected address that enables the identification
Options - 32- of a Nortel GGSN. (ID=slot/port/vpi/
bit integer vci)
DHCP Relay Selected or Not Not Provides a text String that identifies a
Agent Selected Selected Nortel GGSN. The string is mapped to
Options - the following data: slot/port/VP/VCI.
String
Hostname
Table 8-89
DHCP Profile General Tab
DHCP Relay Selected or Not Not Netmask of the Nortel GGSN inteface
Agent Selected Selected receiving the DHCP request.
Options -
Subnet Mask
Figure 8-120
Subscriber Outbound Tunneling Page
Table 8-90
Subscriber Outbound Tunneling Tab
Figure 8-121
Subscriber Account Page
Table 8-91
Subscriber Account Tab
Accounting Element
Accounting Element are found under Access Properties. The available
set of accounting types is based on user privilege. For example, the
set of Accounting Elements which are available for Device Owner User
Figure 8-122
Accounting Element Type Page
The collection interval for these accounting types can be one of five
possible values: 0, 5, 15, 30, 60 minutes. These collection intervals
are aligned on the hour. Figure 8-123 illustrates how the interval drop
down list will be visible. The default value for each accounting element
is 15 minutes. Configuration of the value zero (0) for the accounting
interval disables collection for that accounting group
Figure 8-123
Accounting Element Interval Page
Table 8-92
Accounting Element Selection Tab
Table 8-92
Accounting Element Selection Tab
Table 8-92
Accounting Element Selection Tab
Table 8-92
Accounting Element Selection Tab
Table 8-92
Accounting Element Selection Tab
RADIUS Profile
A number of checkbox are added to the General page of RADIUS
Profile. On the RADIUS Servers page, up to 8 primary and 8 backup
servers can be provisioned for the RADIUS Profile. On the Advanced
Setting page, several RADIUS parameters are provisioned.
Figure 8-124
Radius Profile Configuration
Table 8-93
Radius Profile General Tab
Table 8-93
Radius Profile General Tab
Trim Domain Selected or Not Not When checked GGSN removes the
Name Selected Selected domain portion of the subscriber
name before sending it to the
RADIUS server.
Trim Realm Selected or Not Not When checked the GGSN trims the
Selected Selected ISP by realm during ISP selection,
using the login format domain/user
instead of usre@domain.
Trim User Selected or Not Not When checked, the SER 5500 strips
Name Selected Selected the username from a fully-qualified
domain name (FQDN) received from
a PPP user, and forwards only the
domain name to the RADIUS server
for authentication.
Table 8-93
Radius Profile General Tab
Use ISP Selected or Not Not Select this field to send the ISP IP
address as Selected Selected address as source address for all the
source packets that are sent from GGSN to
address the Radius Server.
Figure 8-125
Radius Profile, Radius Servers Tab
Figure 8-126
RADIUS Profile Advanced Setting Page
Table 8-94
RADIUS Profile Advanced Setting Tab
Figure 8-127
Service Policy Manager Page
Figure 8-128
Action Filters For POP3
Figure 8-129
Action Filters For SMTP
Figure 8-130
Action of Filters For IMAP4
Figure 8-131
Edit/Add URL Ids (Per-get Billing)
Table 8-95
Edit/add URL IDs
URL Path Selected or Not Not Indicates if the URL string is case
Case Selected Selected sensitive or not.
Sensitive
Table 8-95
Edit/add URL IDs
Figure 8-132
CBB Policy Dialog
Figure 8-133
Configure IDs
Figure 8-134
Modify Coupon Attributes
Figure 8-135
Modify Content Type Attributes
Figure 8-136
Add Coupon Attributes
Figure 8-137
Add Content Type Attributes
Figure 8-138
XML Option on Save Dialog
When user choose ‘*.xml’ option, the CBB policy will be exported to an
XML file. If the file name specified in ‘File Name’ field does not
contains ‘.xml’, an ‘xml’ extension will be automatically appended.
Figure 8-139
Access Properties Profiles and Keys Page
Table 8-96
Access Properties Profiles and Keys Tab
Global string default The Global Attributes profile associated with this
Attributes device.
Profile
Table 8-96
Access Properties Profiles and Keys Tab
Default 1..480 1 Provision the default extended life timeout for the
Extended Life device. The GGSN marks a LNS server as
Timeout (in unusable if there is no response from the LNS for
minutes) 54 secs. The Servers will be tried again only after
the expiry of l2tp_default_extended_life_timeout
value.
Figure 8-140
Address Pool Configuration Page
Table 8-97
Address Pool Configuration Table
ISP Configuration
Figure 8-141
MCC and MNC configuration on ISP Configuration / ISP’s Devices
Table 8-98
GGSN-MCC-MNC configuration
Notification Profiles
Notification Profiles can be found under Access Properties. New
GGSN specific event categories are added to the event category list
under “Category Selection” dialog-box as shown below.
Figure 8-142
Category Selection Dialog
Table 8-99
Event categories list
Figure 8-143
Access Group Configuration
Table 8-100
Access Group Configuration, Group Management Tab
Inherit Selected or Not Not If selected, all unspecified field will use
Unspecified Selected Selected values inherit from Default Group.
Values from
Default Group
Figure 8-144
Editing Access Group Settings for Device dialog
Table 8-101
Editing Access Group Settings for Device dialog
RADIUS Profile Alphanumeric None RADIUS profile assigned for the device to
string (read-only) override Access Group setting. Click Select
to choose a RADIUS profile from a Selection
dialog box. Click Clear to erase the current
profile.
DHCP Profile Alphanumeric None DHCP profile assigned for the device to
string (read-only) override Access Group setting. Click Select
to choose a DHCP profile from a Selection
dialog box. Click Clear to erase the current
profile.
CFS Profile Alphanumeric None CFS profile assigned for the device to
string (read-only) override Access Group setting. Click Select
to choose a CFS profile from a Selection
dialog box. Click Clear to erase the current
profile.
IGMP Profile Alphanumeric None IGMP profile assigned for the device to
string (read-only) override Access Group setting. Click Select
to choose an IGMP profile from a Selection
dialog box. Click Clear to erase the current
profile.
Import Route Alphanumeric None Import Route Target profile assigned for the
Target Profile string (read-only) device to override Access Group setting.
Click Select to choose an Import Route
Target profile from a Selection dialog box.
Click Clear to erase the current profile.
Export Route Alphanumeric None Export Route Target profile assigned for the
Target Profile string (read-only) device to override Access Group setting.
Click Select to choose an Export Route
Target profile from a Selection dialog box.
Click Clear to erase the current profile.
Vrf BGP Configuration None Click to open the dialog to config Vrf BGP
Aggregates Button Aggregates for the specific device
Alarm Set 0%, 35% - 95% 0% The entered number is a relative value of the
address usage of the total address pool
category (Reserved, Unreserved) per access
group is allowed to be, before the Address
Pool Alarm is raised. As Example, if from 100
unreserved IP addresses 90 are already in
use, alarm is raised. This value has to be at
least 5% higher than the value to clear the
alarm. If both (Alarm Set and Alarm Clear)
are set to 0%, no alarm is generated.
Alarm Clear 0%, 30% - 90% 0% The entered number is a relative value of the
address usage of the total address pool
category (Reserved, Unreserved) per access
group is allowed to be, before the Address
Pool Alarm is cleared after it has been raised.
As Example, if the pool category was 90% in
use and has dropped to 80%, the alarm for
that pool category is cleared again. This
value has to be This is value has to be at
least 5% lower than the value to set the
alarm. If both (Alarm Set and Alarm Clear)
are set to 0%, no alarm is generated.
DNS Primary IPv4 IP address None The domain name server used for the device
Address format to override access group setting.
DNS Secondary IPv4 IP address None The alternate domain name server used for
Address format the device to override access group setting.
NBNS Primary IPv4 IP address None The NETBIOS name Service server address
Address format used for the device to override access group
setting.
NBNS IPv4 IP address None The backup address of the NBNS server
Secondary format used for the device to override access group
Address setting.
Idle Verification 0 (disabled) or 10- 0 Configured value for Idle Verification Timeout
Timeout (min) 64800. Must be 0 attribute. It is periodic interval that specifies
or less than Idle how often to verify that an idle context still
Timeout value. exists on the SGSN. Minimum value is 10
(minutes).
Figure 8-145
Access Group Configuration Group Settings Page
Table 8-102
Access Group Configuration, Group Settings Tab
DHCP Profile Alphanumeric None DHCP profile assigned to the access group.
string (read-only) Click Select to choose a DHCP profile from a
Selection dialog box. Click Clear to erase the
current profile.
CFS Profile Alphanumeric None CFS profile assigned to the access group.
string (read-only) Click Select to choose a CFS profile from a
Selection dialog box. Click Clear to erase the
current profile.
IGMP Profile Alphanumeric None IGMP profile assigned to the access group.
string (read-only) Click Select to choose an IGMP profile from a
Selection dialog box. Click Clear to erase the
current profile.
Specify Session Selected or Not Not Enables the fields for configuring session
Parameters Selected Selected parameters.
DNS Primary IPv4 IP address None The domain name server used for the access
Address format group.
DNS Secondary IPv4 IP address None The alternate domain name server used for
Address format the access group.
NBNS Primary IPv4 IP address None The NETBIOS name Service server address.
Address format NBNS automatically matches a computer's
address and domain name once the
computer registers its name on the NBNS
server.
NBNS IPv4 IP address None The backup address of the NBNS server.
Secondary format
Address
Idle Verification 0 (disabled) or 10- 0 Configured value for Idle Verification Timeout
Timeout (min) 64800. Must be 0 attribute. It is periodic interval that specifies
or less than Idle how often to verify that an idle context still
Timeout value. exists on the SGSN. Minimum value is 10
(minutes).
Alarm Set 0%, 35% - 95% 0% The entered number is a relative value of the
address usage of the total address pool
category (Reserved, Unreserved) per access
group is allowed to be, before the Address
Pool Alarm is raised. As Example, if from 100
unreserved IP addresses 90 are already in
use, alarm is raised. This value has to be at
least 5% higher than the value to clear the
alarm. If both (Alarm Set and Alarm Clear)
are set to 0%, no alarm is generated.
Alarm Clear 0%, 30% - 90% 0% The entered number is a relative value of the
address usage of the total address pool
category (Reserved, Unreserved) per access
group is allowed to be, before the Address
Pool Alarm is cleared after it has been raised.
As Example, if the pool category was 90% in
use and has dropped to 80%, the alarm for
that pool category is cleared again. This
value has to be This is value has to be at
least 5% lower than the value to set the
alarm. If both (Alarm Set and Alarm Clear)
are set to 0%, no alarm is generated.
All provisioning should be done through the SCS GUI, SCS CORBA
API or CORBA Shell command.
OA&M 9
Overview 9
This Operation, Administration, and Maintenance (OA&M) chapter
describes the OA&M functions of Nortel GGSN in the following
aspects:
Operation Measurements 9
This section defines the Operation Measurements relevant to the
GGSN functionality which includes:
• Historical Statistics
• SER Base Operation Measurements
• SER Base CLI Statistics
Nortel GGSN statistics are collected using a flexible mechanism that
allows configurable collection interval and different ways to display.
Two separate methods are supported for collecting statistics as
mentioned below:
The first statistics method involves polling the OMs from the SCS
Server and displaying them on the client GUI as needed. The OMs are
viewed from the SCS Device Monitoring window while polling is
activated. The polling interval may be adjusted from the GUI within the
minimum and maximum allowable ranges. Only partial Historical
Statistics is supported by using this method.
The CSV files are generated for Historical Statistics from ACC OM files
and waiting for FTP to the OAM Server. The CSV files will not be
generated for SER base OMs and the SER Base CLI Statistics.
The ACC OM files can be viewed on the SCS Log Server via the
SCSLogCat utility program which is provided with the SCS servers
and installed in the SER binary directory. The SCSLogCat command,
issued without arguments, will show the usage syntax. With the -i
argument, SCSLogCat displays the current contents of the specified
log file and creates a bookmark indicating the last record displayed.
Subsequent SCSLogCat -i commands will display only new records
appended to the OM file.
These same ACC OM files can be viewed from the Log Manager
window of the SCS Client GUI. OM files can become very large over
time, up to 100MB, and viewing them via the SCS Client GUI not only
creates burdensome network traffic, but also slows down GUI display
update.
Historical Statistics
Nortel GGSN provides many different performance statistics for use by
a customer’s operation support systems. These statistics, collected as
members of accounting groups, characterize the capacity and
performance of the Nortel GGSN. Nortel GGSN statistics are collected
within the following accounting groups.
• Memory
• Session Management
• GTP Data
• GTP Accounting
• RADIUS
• APN
• CGF
• L2TP
• L2TP over IPSec (L2IP)
• IPSec
• Overload
• Wireless Services
• GRE
• SCP
• ISP-IP
• Ancillary APN
• APN Data Plane
• MPLS
• VRF Accounting
• DCC
• DHCP
• Local Address Pool
• Content Filter
All statistics are initialized to zero at system startup. All counter
statistics are then reset at the end of each corresponding collection
period. Statistics indicating a “high-water” mark are reset to the current
level after reporting statistics to the SCS Log Server. Gauge counters
are never reset, as they are simply incremented and decremented to
reflect the current state of the Nortel GGSN. The CGF, SCP, RADIUS
and DHCP statistics for a particular CGF, SCP, RADIUS or DHCP
server are also reset whenever the IP address of the server changes.
Table 9-1
Scope of Nortel GGSN accounting groups
illustrates the version numbers used for each release in the supported
Nortel GGSN deployment.
Table 9-2
Accounting Group Version Number
Accounting GGSN 2.0 GGSN 3.2 GGSN 4.0 GGSN 4.1 GGSN GGSN 6.0
Group 5.0
Memory 1 2 2 3
Session 1 3 4 5 6 7
Management
GTP Data 1 3 3 4 5
GTP 1 3 3 4
Accounting
RADIUS 1 2 2 3
APN 1 3 4 5 6 7
CGF 1 3 3 4
L2TP 1 2 2 3
L2IP 1 2 2 3
IPSec 1 2 2 3
Overload 1 3 3 4
Wireless 1 2 2 3
Services
GRE n/a 1 1 2
SCP n/a 1 2 3
ISP-IP n/a 3 3 4
Ancillary n/a 2 2 3
APN
Table 9-2
Accounting Group Version Number
Accounting GGSN 2.0 GGSN 3.2 GGSN 4.0 GGSN 4.1 GGSN GGSN 6.0
Group 5.0
Collection Method
The collection method in the statistics tables indicates the collection
mechanism for the statistics information. The following is a list of
collection method:
Table 9-3
Memory Counters
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This counter gives the time difference in seconds between the start and stop of the
statistics collection period. This counter facilitates a more accurate analysis of the
statistics for a given accounting interval.
Counter element Reporting MEM.ReportingInter Gauge 32
interval val
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This measurement provides the current amount of system memory in use on the active
CMC. The measurement takes into account both static and dynamic memory and these
counters are for CMC P0 processor.
Current System Memory MEM.totSystemMem Gauge 32
Usage Util
This measurement provides the current amount of system memory that is free on the active
CMC. The measurement takes into account both static and dynamic memory and these
counters are for CMC P0 processor.
Current System Memory MEM.totSystemMem Gauge 32
Free Free
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter MEM.spare1 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter MEM.spare2 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter MEM.spare3 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter MEM.spare4 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter MEM.spare5 TBD 32
Table 9-4
Session Management Counters
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This counter gives the time difference in seconds between the start and stop of the
statistics collection period. This counter facilitates a more accurate analysis of the
statistics for a given accounting interval.
Counter element Reporting SM.ReportingInterval Gauge 32
interval
This counter counts all attempted sessions and is incremented upon receipt of a Create
PDP Context Request
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Attempted Session SM.AttActPdpCtxt Counter 32
Establishments
This counter counts all duplicate create requests and is incremented upon receipt of a
Create PDP Context Request for which a PDP context already exists. It takes into account
requests from the same SGSN.
The SM.AttActPdpCtxt counter is pegged at the first determination that a GTP packet is a
Create PDP Request, the SM.DupAttActPdpCtxt counter is pegged at determination that
the create request was received for a pre-existing PDP Context. Since there exists multiple
reasons (e.g. memory exhaustion, parse failure, etc.) why a create request may be dropped
after first determination and prior to determination of a pre-existing context.
Duplicate Attempts to SM.DupAttActPdpCtxt Counter 32
Establish Session
This counter provides the current number of active sessions present at the end of the
recording period.
Number of Simultaneous SM.NbrActPdpCtxt Gauge 32
Active Sessions
This counter provides the maximum number of active sessions present during the
recording period.
Peak Number of SM.MaxNbrActPdpCtxt High Tidemark 32
Simultaneous Active Gauge
Sessions
These counters provide the number of non-duplicate, attempted session establishments,
pegged by the traffic class (or delay class for Version 0) and allocation/retention priority
(or precedence class for Version 0) indicated in the QoS profile of the Create PDP Context
Request message. See 3GPP TS 23.107 for mappings between Version 0 and Version 1
QoS attribute mappings. This measurement will not include those contexts which are
rejected before their QoS is determined (although such contexts may be counted as part of
the FailActPdpCtxt counters).
The counters are pegged in idle state when a create request is received.
Attempted Session SM.AttActPdpCtxt.Bgrd.Low Counter 32
Establishments: Traffic
Class (TC): Background;
Allocation/Retention (A/R):
Low
TC: Interactive; A/R Low SM.AttActPdpCtxt.Intact.Low Counter 32
TC: Streaming; A/R Low SM.AttActPdpCtxt.Strm.Low Counter 32
TC: Conversational; A/R: SM.AttActPdpCtxt.Conv.Low Counter 32
Low
TC: Background; A/R: SM.AttActPdpCtxt.Bgrd.Medi Counter 32
Medium um
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
TC: Interactive; A/R SM.AttActPdpCtxt.Intact.Med Counter 32
Medium ium
TC: Streaming; A/R Medium SM.AttActPdpCtxt.Strm.Medi Counter 32
um
TC: Conversational; A/R: SM.AttActPdpCtxt.Conv.Medi Counter 32
Medium um
TC: Background; A/R: High SM.AttActPdpCtxt.Bgrd.High Counter 32
TC: Interactive; A/R High SM.AttActPdpCtxt.Intact.Hig Counter 32
h
TC: Streaming; A/R High SM.AttActPdpCtxt.Strm.High Counter 32
TC: Conversational; A/R: SM.AttActPdpCtxt.Conv.High Counter 32
High
These counters provide the number of sessions successfully established, pegged by
traffic class (or delay class for Version 0) and allocation/retention priority (or precedence
class for Version 0) indicated in the QoS profile of the Create PDP Context Request
message. See 3GPP TS 23.107 for mappings between Version 0 and Version 1 QoS
attribute mappings. The measurement is incremented on transmission of a Create PDP
Context Response with cause set to “Request Accepted” corresponding to a non-duplicate
Create PDP Context Request message.
Successful Session SM.SuccActPdpCtxt.Bgrd.Lo Counter 32
Establishments w
TC: Background; A/R: Low
TC: Interactive; A/R Low SM.SuccActPdpCtxt.Intact.L Counter 32
ow
TC: Streaming; A/R Low SM.SuccActPdpCtxt.Strm.Lo Counter 32
w
TC: Conversational; A/R: SM.SuccActPdpCtxt.Conv.Lo Counter 32
Low w
TC: Background; A/R: SM.SuccActPdpCtxt.Bgrd.Me Counter 32
Medium dium
TC: Interactive; A/R SM.SuccActPdpCtxt.Intact.M Counter 32
Medium edium
TC: Streaming; A/R Medium SM.SuccActPdpCtxt.Strm.Me Counter 32
dium
TC: Conversational; A/R: SM.SuccActPdpCtxt.Conv.M Counter 32
Medium edium
TC: Background; A/R: High SM.SuccActPdpCtxt.Bgrd.Hi Counter 32
gh
TC: Interactive; A/R High SM.SuccActPdpCtxt.Intact.Hi Counter 32
gh
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
TC: Streaming; A/R High SM.SuccActPdpCtxt.Strm.Hi Counter 32
gh
TC: Conversational; A/R: SM.SuccActPdpCtxt.Conv.Hi Counter 32
High gh
This measurement provides the number of session establishment failures and is
incremented upon transmission of a non-duplicate Create PDP Context Response with
failure cause NORA(No Resources Available).
Failed Session SM.FailActPdpCtxt.NORA Counter 32
Establishments
This measurement provides the number of PDP context activations failed with return code
“No Resource Available” due to configuration settings. Pegged in cases where GTP
creates are disabled and the return code is configured as No Resources Available or APN
session limit is exceeded
Failed Session SM.FailActPdpCtxt.NORA.Ad Counter 32
Establishments min
This measurement provides the number of PDP context activations failed with return code
“No Resource Available”. Pegged when no addresses left in the local address pool
(GTPv0).
Failed Session SM.FailActPdpCtxt.NORA.All Counter 32
Establishments DynamicAddressesOccupied
This measurement provides the number of PDP context activations failed with return code
“No Resource Available” due to overload conditions. Pegged in cases where there is a
Selective Reject due to CPU Overload or a Selective Reject due to Mem Overload (GTPv0)
Failed Session SM.FailActPdpCtxt.NORA.Ov Counter 32
Establishments erload
This measurement provides the number of PDP context activations failed with return code
“No Resource Available” due to memory exhaustion (GTPv0)
Failed Session SM.FailActPdpCtxt.NORA.No Counter 32
Establishments Memory
This measurement provides the number of session establishment failures and is
incremented whenever there is an PDP context activation attempt after an APN is
blacklisted.
Failed Session SM.FailActPdpCtxt.NORA.Ap Counter 32
Establishments nBlacklist
This measurement provides the number of PDP context activations failed with return code
“No Resource Available” due to reasons other than “Admin”,
“AllDynamicAddressesOccupied”, “Overload”, “NoMemory” and “ApnBlacklist”.
Failed Session SM.FailActPdpCtxt.NORA.Ot Counter 32
Establishments her
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This measurement provides the number of session establishment failures and is
incremented upon transmission of a non-duplicate Create PDP Context Response with
failure cause ADAO(All Dynamic Addresses Occupied). The reasons for this could be:
Local address pools are depleted (GTPv1).
Failed Session SM.FailActPdpCtxt.ADAO Counter 32
Establishments
This measurement provides the number of session establishment failures and is
incremented upon transmission of a non-duplicate Create PDP Context Response with
failure cause NOMA(No Memory Available).
Failed Session SM.FailActPdpCtxt.NOMA Counter 32
Establishments
This measurement provides the number of session establishment failures and is
incremented upon transmission of a non-duplicate Create PDP Context Response with
failure cause MAPN(Missing or Unknown APN). The reasons for this could be: GGSN does
not have the APN provisioned, specified in the Create PDP Context Request(GTPv1).
Failed Session SM.FailActPdpCtxt.MAPN Counter 32
Establishments
This measurement provides the number of session establishment failures and is
incremented upon transmission of a non-duplicate Create PDP Context Response with
failure cause UPAT(Unknown PDP Address or PDP Type). The reasons for this could be:
PDU type in the Create PDP Context Request is not IP or PPP (GTPv1)
Failed Session SM.FailActPdpCtxt.UPAT Counter 32
Establishments
This measurement provides the number of session establishment failures and is
incremented upon transmission of a non-duplicate Create PDP Context Response with
failure cause UAUF(User Authentication Failure).
Failed Session SM.FailActPdpCtxt.UAUF Counter 32
Establishments
This measurement provides the number of PDP context activations failed with return code
“User Authentication Failure” due to external error conditions. Pegged in the following
cases:
The LNS initiating take down for a IP over GTP-L2TP context with a User Error termination
cause
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Failed Session SM.FailActPdpCtxt.UAUF.Ext Counter 32
Establishments ernal
This measurement provides the number of PDP context activations failed with return code
“User Authentication Failure” due to internal error conditions.
Failed Session SM.FailActPdpCtxt.UAUF.Int Counter 32
Establishments ernal
This measurement provides the number of PDP context activations failed with return code
“User Authentication Failure” due to reasons other than “External” and “Internal”.
Failed Session SM.FailActPdpCtxt.UAUF.Oth Counter 32
Establishments er
This measurement provides the number of session establishment failures and is
incremented upon transmission of a non-duplicate Create PDP Context Response with
failure cause SYSF (System Failure).The Reason for this could be: GGSN administratively
configured to return "System Failure" for Create PDP Context Request Messages, RADIUS/
DCHP returns Address to the GGSN that it already has assigned to a different subscriber,
LNS returns a cause other than User Error to GGSN and L2TP tunnel establishment fails or
other errors due to resource shortage, unexpected messaging, etc.
Failed Session SM.FailActPdpCtxt.SYSF Counter 32
Establishments
This measurement provides the number of PDP context activations failed with return code
“System Failure” due to configuration settings. Pegged in the following cases:
GTP creates being disabled and the return code is configured as System Failure.
Session mode being enabled without RADIUS Accounting being enabled (GTPv1).
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This measurement provides the number of session establishment failures and is
incremented upon transmission of a non-duplicate Create PDP Context Response with
failure cause IEIN(Mandatory IE Incorrect, IE missing or Optional IE Incorrect). The reasons
for this could be: Length of mandatory/optional IE within message does not match with
actual length specified or Mandatory IE missing from message.
Failed Session SM.FailActPdpCtxt.IEIN counter 32
Establishments
This measurement provides the number of session establishment failures and is
incremented upon transmission of a non-duplicate Create PDP Context Response with
failure cause IMFT(Invalid Message Format). The reasons for this could be: Length of GTP
packet in header does not match with actual length,Out of Order IE or No GSN address or
TEID in message.
Failed Session SM.FailActPdpCtxt.IMFT counter 32
Establishments
This measurement provides the number of session establishment failures and is
incremented upon transmission of a non-duplicate Create PDP Context Response with
failure cause OVLD(Overload). The reasons for this could be: Create request selectively
rejected due to CMC P0 CPU overload status or Create request selectively rejected due to
CMC P0 Memory overload status. Note that SM.FailActPdpCtxt.NORA is also pegged in this
scenario.
Failed Session SM.FailActPdpCtxt.OVLD counter 32
Establishments
This measurement provides the number of session establishment failures and is
incremented upon transmission of a non-duplicate Create PDP Context Response with
failure cause SVNS(Service Not Supported).
Failed Session SM.FailActPdpCtxt.SVNS counter 32
Establishments
This measurement provides the number of PDP context activations failed with return code
“Service Not Specified” due to an invalid APN received.
Failed Session SM.FailActPdpCtxt.SVNS.Mis counter 32
Establishments singAPN
This measurement provides the number of PDP context activations failed with return code
“Service Not Specified” due to an unknown PDP Address Type specified in the Create
request.
Failed Session SM.FailActPdpCtxt.SVNS.Un counter 32
Establishments knownPDPAddressType
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This measurement provides the number of PDP context activations failed with return code
“Service Not Specified” due to configuration settings. Pegged in the following cases for
GTPv0:
Create PDP Context Request from different SGSN is received with TID already stored in
GGSN(GTPv0).
Create PDP Context Request from different SGSN is received with IMSI and NSAPI already
stored in GGSN(GTPv1).
Failed Session SM.FailActPdpCtxt.NoResp.S counter 32
Establishments GSNChange
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This counter counts duplicate create requests for which no response is sent. This counter
is incremented upon receipt of a Create PDP Context Request for which a PDP context is
being established or being torn down.
Failed Session SM.FailActPdpCtxt.NoResp.D counter 32
Establishments uplicate
This measurement provides the number of failed PDP context activations for which no
response is sent due to a fallback/fallforward scenario wherein a second Create PDP
Context Request is received instead of an Update PDP Context Request.
Failed Session SM.FailActPdpCtxt.NoResp.F counter 32
Establishments allBackFallForward
This measurement provides the number of PDP create requests rejected with cause code
“No Response Sent” due to the depth of the GTP UDP socket buffer exceeding its
threshold.
Failed Session SM.FailActPdpCtxt.NoResp.U Counter 32
Establishments DPThresholdReject
This measurement provides the number of PDP context activations failed with return code
“No Response Sent” due to error conditions other than “Admin”, “SGSNChange”,
“Duplicate”, “FallBackFallForward” and “UDPThresholdReject”.
Failed Session SM.FailActPdpCtxt.NoResp. counter 32
Establishments Other
This measurement provides the number of PDP context attempted to move to the target
ssp during SSM Redundancy, and is incremented by 1 as it is attempted to move.
Attempted move PDP SM.AttSsmrPdpCtxt Counter 32
contexts - SSM
Redundancy
This measurement provides the number of PDP context attempted to move to the target
ssp during SSM Redundancy and is incremented by 1 when a PDP contexts is successfully
moved to the target ssp.
Successfully moved PDP SM.SuccSsmrPdpCtxt Counter 32
contexts - SSM
Redundancy
This measurement provides the number of PDP context deactivations initiated by SGSN,
and is incremented on receipt of a Delete PDP Context Request message.
Attempted MS & SGSN SM.AttDeactPdpCtxtMsAndS Counter 32
Initiated PDP Context gsn
Deactivations
This measurement provides the number of PDP Context Deactivations initiated by GGSN.
This is a general counter which gets incremented for one of the following reasons:
Whenever a delete command is issued from the CLI, a delete command is issued from the
SCS or there is a deactivate PDP context request received from the RADIUS/DCC(Manual),
Idle Timeout(ITO), expiry of maximum session duration timer (Maxdur), SGSN
Restart(SGSNRstrt) or expiry of the N3 timer.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Attempted GGSN Initiated SM.AttDeactPdpCtxtGgsn Counter 32
PDP Context Deactivations
This measurement provides the number of PDP Context Deactivations initiated by GGSN
during SSM Redundancy. It is incremented by 1 as it is attempted to removed a PDP
Context from GGSN.
Attempted GGSN initiated SM.AttDeactPdpCtxtGgsn.Ss Counter 32
deactivation - SSM mr
Redundancy
This measurement provides the number of PDP Context Successful Deactivations initiated
by GGSN during SSM Redundancy. It is incremented by 1 when a PDP Context is
successfully removed from GGSN.
Successful GGSN initiated SM.SuccDeactPdpCtxtGgsn. Counter 32
deactivation - SSM Ssmr
Redundancy
This measurement provides the number of Basic Access Mode sessions created. Basic
Access Mode is one in which tunneling is not present between the GGSN and the remote
intranet. The counter gets incremented when a Basic Access Mode session is created.
Successful Basic Access SM.SuccActBamCtxt Counter 32
Mode Session Activations
This measurement provides the number of simultaneous active sessions using basic
access mode. The measurement is incremented when an untunneled session is
successfully created and decremented when an untunneled session is successfully
deleted.
Simultaneous Active SM.NbrActBamCtxt Gauge 32
Sessions Using Basic
Access Mode
This measurement provides the number of IPSec access mode sessions created, and is
incremented whenever a session which indicates that it uses IPSec is successfully
created.
Successful IPSec Session SM.SuccActIpsecCtxt Counter 32
Activations
This measurement provides the current number of simultaneous active sessions using
IPSec access mode. The measurement is incremented when a session which uses IPSec
access mode is successfully created and decremented when a session using IPSec access
mode is successfully deleted.
Simultaneous Active SM.NbrActIpsecCtxt Gauge 32
Sessions Using IPSec
Access Mode (member of a
VPRN)
This measurement provides the number of L2TP/IPSec access mode sessions created, and
is incremented whenever a session which indicates that it uses L2TP/IPSec is successfully
created.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Successful L2TP/IPSec SM.SuccActL2ipCtxt Counter 32
Session Activations
This measurement provides the current number of simultaneous active sessions using
L2TP/IPSec access mode. The measurement is incremented when a session which uses
L2TP/IPSec access mode is successfully created and decremented when a session using
L2TP/IPSec access mode is successfully deleted.
Simultaneous Active SM.NbrActL2ipCtxt Gauge 32
Sessions Using L2TP/IPSec
Access Mode
This measurement provides the number of L2TP access mode sessions created, and is
incremented whenever a session is successfully created which indicates that it uses L2TP
not over IPSec.
Successful L2TP Session SM.SuccActL2tpCtxt Counter 32
Activations
This measurement provides the current number of simultaneous active sessions using
L2TP access mode. The measurement is incremented when a session which uses L2TP
access mode is successfully created and decremented when a session using L2TP access
mode is successfully deleted.
Simultaneous Active SM.NbrActL2tpCtxt Gauge 32
Sessions Using L2TP
Access Mode
This measurement provides the number of outbound roamer sessions serviced. The
measurement is incremented when a outbound roamer session is successfully established
or when a subscriber roams into a VPLMN. This statistic is enabled only if Enable Partial
Billing for Roamers is selected in the GTP Tunnel Configuration.
Number of Outbound SM.SuccActRoamerCtxt Counter 32
Roamer Sessions Serviced
This measurement provides the current number of simultaneous active outbound roamer
sessions. The measurement is incremented when a outbound roamer session is
successfully established or when a subscriber roams into a VPLMN. It is decremented
when a session is deleted or when a subscriber roams out of the VPLMN. This statistic is
enabled only if Enable Partial Billing for Roamers is selected in the GTP Tunnel
Configuration.
Number of Active SM.NbrActRoamerCtxt Gauge 32
Outbound Roamer
Sessions
This counter shows the number of GTP messages that are received at the GGSN which has
Bad Header. This counter is incremented only for GTP-C control messages.
Number of GTP messages SM.NbrBadGTPHeader Counter 32
with bad header
This counter shows the number of GTP messages that are received at the GGSN which has
a bad packet size. This counter is incremented only for GTP-C control messages.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Number of GTP messages SM.NbrBadGTPPktSize Counter 32
with bad packet size
This counter is incremented when a GGSN attempts to deactivate a GTP context due to
manual intervention. This is calculated as the sum of deactivation attempts due to the
following reasons: Deactivate context requests received from the CLI of the GGSN,
Deactivate context requests received from the SCS and Deactivate context requests
received from DCC or RADIUS.
Attempted GGSN Initiated SM.AttDeactPdpCtxtGgsn.Ma Counter 32
Deactivation - Manual nual
This counter is incremented when a GGSN completes deactivation of a GTP context due to
manual intervention. This is calculated as the sum of: Successful deactivations of contexts
issued from the CLI of the GGSN, Deactivate context requests received from the SCS and
Deactivate context requests received from DCC or RADIUS.
Successful GGSN Initiated SM.SuccDeactPdpCtxtGgsn. Counter 32
Deactivation - Manual Manual
This counter is incremented when a GGSN attempts to deactivate a GTP context due to
expiry of the idle timer. This timer sets the number of minutes a PDP session waits to
receive a data packet.
Attempted GGSN Initiated SM.AttDeactPdpCtxtGgsn.IT Counter 32
Deactivation - Idle Timer O
This counter is incremented when a GGSN completes deactivation of a GTP context due to
expiry of the idle timer. This timer sets the number of minutes a PDP session waits to
receive a data packet.
Successful GGSN Initiated SM.SuccDeactPdpCtxtGgsn.I Counter 32
Deactivation - Idle Timer TO
This counter is incremented whenever the GGSN attempts to deactivate a GTP session
because the GTP session timer has exceeded the Maximum session duration for that GTP
session.
Attempted GGSN Initiated SM.AttDeactPdpCtxtGgsn.Ma Counter 32
Deactivation - Max Session xDur
Duration
This counter is incremented whenever the GGSN successfully completes deactivation of a
GTP session because the GTP session timer has exceeded the Maximum session duration
for that GTP session.
Successful GGSN Initiated SM.SuccDeactPdpCtxtGgsn. Counter 32
Deactivation - Max Session MaxDur
Duration
This counter is incremented when a GGSN attempts to deactivate a GTP context due to a
SGSN restart. This happens if the restart counter value received in the Recovery IE of the
incoming message is different from the value stored by the GGSN for that particular SGSN.
These values of restart counter are checked in Create and Update PDP context requests
and also in Echo requests.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Attempted GGSN Initiated SM.AttDeactPdpCtxtGgsn.Sg Counter 32
Deactivation - SGSN snRstrt
Restart
This counter is incremented when a GGSN completes deactivation of a GTP context due to
a SGSN restart. This happens if the restart counter value received in the Recovery IE of the
incoming message is different from the value stored by the GGSN for that particular SGSN.
These values of restart counter are checked in Create and Update PDP context requests
and also in Echo requests.
Successful GGSN Initiated SM.SuccDeactPdpCtxtGgsn. Counter 32
Deactivation - SGSN SgsnRstrt
Restart
This measurement provides the number of PDP Context Deactivation Attempt initiated by
GGSN due to no resource on the target SSP during SSM Redundancy. It is incremented by
1 as the process of removing the PDP Context starts in GGSN.
Attempted GGSN initiated SM.AttDeactPdpCtxtGgsn.Ss Counter 32
deactivation - SSM mr.NoResource
Redundancy No Resource
This measurement provides the number of PDP Context Successful Deactivations initiated
by GGSN due to no resource on target ssp during SSM Redundancy and is incremented. It
is incremented by 1 when PDP Context is successfully taken down from GGSN
Successful GGSN initiated SM.SuccDeactPdpCtxtGgsn. Counter 32
deactivation - SSM Ssmr.NoResource
Redundancy No Resource
This measurement provides the number of aggregation PDP Context Deactivation Attempt
initiated by GGSN as the second move is not allowed during SSM Redundancy. It is
incremented by 1 as the process of removing the PDP Context starts in GGSN.
Attempted GGSN initiated SM.AttDeactPdpCtxtGgsn.Ss Counter 32
deactivation - SSM mr.NoSecondMove
Redundancy No Second
Move
This measurement provides the number of aggregation PDP Context Successful
Deactivations initiated by GGSN as the second move is not allowed during SSM
Redundancy. It is incremented by 1 when PDP Context is successfully taken down from
GGSN
Successful GGSN initiated SM.SuccDeactPdpCtxtGgsn. Counter 32
deactivation - SSM Ssmr.NoSecondMove
Redundancy No Second
Move
This measurement provides the number of PDP Context Deactivation Attempt initiated by
GGSN due to system failure during SSM Redundancy. It is incremented by 1 as the process
of removing the PDP Context starts in GGSN.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Attempted GGSN initiated SM.AttDeactPdpCtxtGgsn.Ss Counter 32
deactivation - SSM mr.SystemFailure
Redundancy System
Failure
This measurement provides the number of PDP Context Successful Deactivations initiated
by GGSN due to system failure during SSM Redundancy. It is incremented by 1 when PDP
Context is successfully taken down from GGSN.
Successful GGSN initiated SM.SuccDeactPdpCtxtGgsn. Counter 32
deactivation - SSM Ssmr.SystemFailure
Redundancy System
Failure
This measurement provides the number of aggregation PDP Context Deactivation Attempt
initiated by GGSN as the SSM redundancy for Aggregation was not Enabled and is
incremented. It is incremented by 1 as the process of removing the PDP Context starts in
GGSN.
Attempted GGSN initiated SM.AttDeactPdpCtxtGgsn.Ss Counter 32
deactivation - SSM mr.Disabled
Redundancy for
Aggregation is disabled
This measurement provides the number of aggregation PDP Context Successful
Deactivations initiated by GGSN as the SSM redundancy for Aggregation is not Enabled. It
is incremented by 1 when PDP Context is successfully taken down from GGSN.
Successful GGSN initiated SM.SuccDeactPdpCtxtGgsn. Counter 32
deactivation - SSM Ssmr.Disabled
Redundancy for
Aggregation is disabled
This counter shows the number of non-duplicate, attempted aggregation context
establishments. This counter is incremented upon receipt of a Create PDP Context
Request message indicating an APN which is configured for aggregation
Attempted establishment of SM.AttActAggrCtxt Counter 32
an Aggregation session
This counter shows the number of successful aggregation context establishments. This
counter is incremented upon transmission of a Create PDP Context Response message
with cause value “request accepted”
Successful establishments SM.SuccActAggrCtxt Counter 32
of an Aggregation session
This counter shows the number of active aggregation sessions. This counters is
incremented after successful establishment and decremented at session end.
Number of currently active SM.NbrActAggrCtxt Gauge 32
Aggregation sessions
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This counter shows the number of times that an attempted aggregation session
establishment encountered on-board or off-board provisioning of functionality that is not
supported on an APN configured for aggregation.
Number of configuration SM.NbrConfigMism Counter 32
mis-matches encountered
This counter shows the number of non-duplicate PPP sessions that were processed by an
APN configured for aggregation.
Number of attempted PPP SM.AttActAggrPPP Counter 32
session establishments on
an Aggregation APN.
This measurement provides the number of GRE access mode sessions created, and is
incremented whenever a session which indicates that it uses GRE is successfully created.
Successful GRE Session SM.SuccActGreCtxt Counter 32
Activations
This measurement provides the current number of simultaneous active sessions using
GRE access mode. The measurement is incremented when a session which uses GRE
access mode is successfully created and decremented when a session using GRE access
mode is successfully deleted.
Simultaneous Active SM.NbrActGreCtxt Gauge 32
Sessions Using GRE
Access Mode (member of a
VPRN)
This measurement provides the current number of simultaneous active sessions using
Prepaid. The measurement is incremented when a prepaid session is successfully created
and decremented when a prepaid session is successfully deleted. This includes prepaid
services that use CTP as well as DCC.
Simultaneous Active SM.NbrActPrepaidCtxt Gauge 32
Prepaid Sessions
This counter provides the maximum number of active Basic Access Mode (untunneled)
sessions present during the recording period.
Peak Number of SM.MaxNbrActBamCtxt High Tidemark 32
Simultaneous Active Basic Gauge
Access Mode Sessions
This counter provides the maximum number of active IPSec sessions present during the
recording period.
Peak Number of SM.MaxNbrActIPSecCtxt High Tidemark 32
Simultaneous Active IPSec Gauge
Sessions
This counter provides the maximum number of active L2TP sessions present during the
recording period.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Peak Number of SM.MaxNbrActL2tpCtxt High Tidemark 32
Simultaneous Active L2TP Gauge
Sessions
This counter provides the maximum number of active L2TP/IPSec sessions present during
the recording period.
Peak Number of SM.MaxNbrActL2ipCtxt High Tidemark 32
Simultaneous Active L2TP/ Gauge
IPSec Sessions
This counter provides the maximum number of active GRE sessions present during the
recording period.
Peak Number of SM.MaxNbrActGreCtxt High Tidemark 32
Simultaneous Active GRE Gauge
Sessions
This counter provides the maximum number of active prepaid sessions present during the
recording period. This includes prepaid services that use CTP as well as DCC.
Peak Number of SM.MaxNbrActPrepaidCtxt High Tidemark 32
Simultaneous Active Gauge
Prepaid Sessions
This counter provides the maximum number of active aggregation sessions present during
the recording period.
Peak Number of SM.MaxNbrAggrActCtxt High Tidemark 32
Simultaneous Active Gauge
Aggregation Sessions
This measurement provides the maximum number of Simultaneous Active sessions of
Services APN without IP Subnet Dedication for the Wireless ISP network model present
during the recording period.
Peak number of SM.MaxNbrSvcActCtxt High Tidemark 32
Simultaneous Active Gauge
Services sessions without
IP Subnet Dedication
This counter provides the number of non-duplicate, attempted Secondary PDP Context
establishments. The counter is incremented by 1 upon receipt of a Create PDP Context
request for a secondary PDP context.
Number of Attempted SM.AttActSecPdpCtxt Counter 32
Secondary PDP Context
Establishments
This counter provides the number of successful Secondary PDP Context establishments.
The counter is incremented by 1 upon successful secondary context creation and before
sending the create response to the SGSN.
Number of Successful SM.SuccActSecPdpCtxt Counter 32
Secondary PDP Context
Establishments
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This counter provides the current number of simultaneous active Secondary PDP Context
establishments. When there is more than one PDP context in the bundle, deletion of any
PDP context will cause this counter to decrement by one. When there is only one PDP
context left in the bundle, it is considered the primary PDP context and deletion of it will
not decrement this counter.
Current Number of SM.NbrActSecPdpCtxt Gauge 32
Simultaneous Secondary
PDP Context
Establishments
This counter provides the current number of mobile subscribers using Secondary PDP
contexts. It will be incremented once there is more than one PDP context in the PDP
bundle. It will be decremented once the PDP bundle contains only one context.
This counter gets incremented when the first secondary of a bundle is created and gets
decremented when the last secondary of the bundle is deleted.
Current Number of Mobile SM.NbrActMsSecInUse Gauge 32
Subscribers using
Secondary PDP Contexts
This counter provides the maximum number of mobile subscribers using Secondary PDP
contexts.
Peak Number of Mobile SM.MaxNbrActMsSecInUse High Tidemark 32
Subscribers using Gauge
Secondary PDP Contexts
This measurement provides the number of MPLS access mode sessions created, and is
incremented whenever a session is successfully created which indicates that it uses
MPLS.
Successful MPLS Session SM.SuccActMPLSCtxt Counter 32
Activations
This measurement provides the current number of simultaneous active sessions using
MPLS access mode. The measurement is incremented when a session which uses MPLS
access mode is successfully created and decremented when a session using MPLS access
mode is successfully deleted.
Simultaneous Active SM.NbrActMPLSCtxt Gauge 32
Sessions Using MPLS
Access Mode
This counter provides the maximum number of active MPLS sessions present during the
recording period.
Peak Number of SM.MaxNbrActMPLSCtxt High Tidemark 32
Simultaneous Active MPLS Gauge
Sessions
This measurement provides the number of sessions that were created with Content
Filtering enabled.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Total Sessions with CF SM.SuccActCfCtxt Counter 32
This measurement provides the number of CBB sessions that were created with Content
Based Billing enabled.
Total Sessions with CBB SM.SuccActCbbCtxt Counter 32
This measurement provides the number of simultaneous active sessions that were created
with Content Based Billing enabled.
Active Sessions with CBB SM.NbrActCbbCtxt Gauge 32
This measurement provides the maximum number of sessions present during the
recording period that were created with Content Based Billing enabled.
Peak Simultaneous SM.MaxNbrActCbbCtxt High Tidemark 32
Sessions with CBB Gauge
Number of GTP packets dropped at UDP level due to UDP queue overflow on the CMC.
GTP Control packet lost SM.GTPDropPktUDPQueueO Counter 32
vfl
This measurement shows the number of successfully established contexts requesting P-
CSCF Address Discovery. This counter is incremented even if the P-CSCF Address
Discovery request is not fulfilled.
P-CSCF Address Requests SM.SuccActCtxtPcscfDiscRe Counter 32
q
This measurement shows the number of successfully established contexts requesting P-
CSCF Address Discovery where the P-CSCF Address Discovery request could not be
fulfilled. This could be because there is no IMS Profile associated with the APN or the
associated profile contained no addresses.
P-CSCF Address Request SM.SuccActCtxtPcscfDiscFai Counter 32
Failed led
This measurement provides the current number of active context bundles that
successfully requested P-CSCF Address Discovery.
Simultaneous Active SM.NbrActPcscfDiscCtxt Gauge 32
Sessions Requesting P-
CSCF Discovery
This measurement provides the maximum number of simultaneous active context bundles
that successfully requested P-CSCF Address Discovery.
Peak Number of SM.MaxNbrActPcscfDiscCtxt High Tidemark 32
Simultaneous Active Gauge
Sessions Requesting P-
CSCF Discovery
This counter provides the current number of successful aggregation context activations
with policy control.
This counter is incremented for each successful aggregation context that interacts with
the PDF server for policy control during activation.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Number of Successful SM.SuccActCtxt.Aggr.PolCtrl Counter 32
Aggregation Context
Activations with Policy
Control
This counter provides the current number of PDF server initiated policy control updates for
aggregation contexts.
This counter is incremented for each RAR request from the PDF server for an aggregation
context.
Number of PDF Initiated SM.Aggr.PolCtrlPdfUpd Counter 32
Policy Control Updates
This counter provides the current number of GGSN initiated policy control updates for
aggregation contexts.
This counter is incremented each time the GGSN sends a CCR (Update) to the PDF server
for policy control updates of an aggregation context.
Number of GGSN Initiated SM.Aggr.PolCtrlGgsnUpd Counter 32
Policy Control Updates
This counter provides the current number of dynamic policy control rule operations (add,
modify, delete) performed on aggregation contexts.
This counter is incremented for each time a dynamic policy control rule is added, modified,
or deleted for an aggregation context.
Number of Policy Control SM.Aggr.PolCtrlRuleOps Counter 32
Rule Operations
This gauge provides the current number of simultaneous dynamic policy control rules
present for active aggregation contexts.
This counter is incremented for each dynamic policy control rule added to active
aggregation contexts and decremented for each dynamic policy control rule removed from
aggregation contexts.
Number of Active SM.Aggr.ActivePolCtrlRules Gauge 32
Simultaneous Policy
Control Rules
This gauge provides the highest number of simultaneous dynamic policy control rules
present for active aggregation contexts during the recording period.
High Tidemark of SM.Aggr.MaxNbrPolCtrlRule High Tidemark 32
Simultaneous Policy s Gauge
Control Rules
This measurement provides the number of successful establishment of VPN (VPN variants
include IPSec, GRE, ATM, VLAN, MPLS and GGSN VPRN) sessions. This counter is
incremented upon transmission of a Create PDP Context Response message with cause
value “request accepted”.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Successful VPN session SM.SuccActVpnCtxt Counter 32
activations
This measurement provides the number of successful establishment of Services session
with IP Subnet Dedication for the Wireless ISP network model. This counter is incremented
upon transmission of a Create PDP Context Response message with cause value “request
accepted”.
Successful Services SM.SuccActSvcSubnetCtxt Counter 32
session activations with IP
Subnet Dedication
This measurement provides the number of successful establishment of Services session
without IP Subnet Dedication for the Wireless ISP network model. This counter is
incremented upon transmission of a Create PDP Context Response message with cause
value “request accepted”.
Successful Services SM.SuccActSvcCtxt Counter 32
session activations without
IP Subnet Dedication
This measurement provides the maximum number of Simultaneous Active VPN (VPN
variants include IPSec, GRE, ATM, VLAN, MPLS and GGSN VPRN) sessions present during
the recording period.
Peak number of SM.MaxNbrActVpnCtxt High Tidemark 32
Simultaneous Active VPN Gauge
sessions
This measurement provides the maximum number of Simultaneous Active sessions of
Services APN with IP Subnet Dedication for the Wireless ISP network model present during
the recording period.
Peak number of SM.MaxNbrSvcSubnetActCtx High Tidemark 32
Simultaneous Active t Gauge
Services sessions with IP
Subnet Dedication
This measurement provides the number of successfully deleted Aggregation sessions.
This counter is incremented when an established PDP context or the entire bundle (in case
of teardown indicator been set in the Delete PDP Context Request message) is removed
from the system for any reason.
Successful Aggregation SM.SuccAggrCtxtDelete Counter 32
PDP Context deletions
This measurement provides the number of successfully deleted VPN (VPN variants include
IPSec, GRE, ATM, VLAN, MPLS and GGSN VPRN) sessions. This counter is incremented
when an established PDP context or the entire bundle (in case of teardown indicator been
set in the Delete PDP Context Request message) is removed from the system for any
reason.
Successful VPN PDP SM.SuccVpnCtxtDelete Counter 32
Context deletions
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This measurement provides the number of successfully deleted Services sessions with IP
Subnet Dedication for the Wireless ISP network model. This counter is incremented when
an established PDP context or the entire bundle (in case of teardown indicator been set in
the Delete PDP Context Request message) is removed from the system for any reason.
Successful Services with IP SM.SuccSvcSubnetCtxtDelet Counter 32
Subnet Dedication PDP e
Context deletions
This measurement provides the number of successfully deleted Services sessions without
IP Subnet Dedication for the Wireless ISP network model. This counter is incremented
when an established PDP context or the entire bundle (in case of teardown indicator been
set in the Delete PDP Context Request message) is removed from the system for any
reason.
Successful Services SM.SuccSvcCtxtDelete Counter 32
without IP Subnet
Dedication PDP Context
deletions
This measurement provides the number of successfully deleted L2TP VPN (applicable only
to L2TP without IPSec tunnel configuration) sessions. This counter is incremented when
an established PDP context or the entire bundle (in case of teardown indicator been set in
the Delete PDP Context Request message) is removed from the system for any reason.
Successful L2TP VPN PDP SM.SuccL2tpCtxtDelete Counter 32
Context deletions
This measurement provides the number of successfully performed PDP context updates
initiated by both the MS/SGSN and the GGSN for the Aggregation APN. This counter is
incremented on the transmission/receipt of an Update PDP Context Response message
with cause “Request Accepted”.
Successful Aggregation SM.SuccAggrCtxtUpdate Counter 32
PDP Context Updates
This measurement provides the number of successfully performed PDP context updates
initiated by both the MS/SGSN and the GGSN for the VPN (VPN variants include IPSec,
GRE, ATM, VLAN, MPLS and GGSN VPRN). This counter is incremented on the
transmission/receipt of an Update PDP Context Response message with cause “Request
Accepted”.
Successful VPN PDP SM.SuccVpnCtxtUpdate Counter 32
Context Updates
This measurement provides the number of successfully performed PDP context updates
initiated by both the MS/SGSN and the GGSN for the Services APN with IP Subnet
Dedication for the Wireless ISP network model. This counter is incremented on the
transmission/receipt of an Update PDP Context Response message with cause “Request
Accepted”.
Successful Services with IP SM.SuccSvcSubnetCtxtUpda Counter 32
Subnet Dedication PDP te
Context Updates
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This measurement provides the number of successfully performed PDP context updates
initiated by both the MS/SGSN and the GGSN for the Services APN without IP Subnet
Dedication for the Wireless ISP network model. This counter is incremented on the
transmission/receipt of an Update PDP Context Response message with cause “Request
Accepted”.
Successful Services SM.SuccSvcCtxtUpdate Counter 32
without IP Subnet
Dedication PDP Context
Updates
This measurement provides the number of successfully performed PDP context updates
initiated by both the MS/SGSN and the GGSN for the L2TP VPN (applicable only to L2TP
without IPSec tunnel configuration). This counter is incremented on the transmission/
receipt of an Update PDP Context Response message with cause “Request Accepted”.
Successful L2TP VPN PDP SM.SuccL2tpCtxtUpdate Counter 32
Context Updates
This measurement provides the number of active sessions of Aggregation APN using GTP
accounting. This counter is incremented if an active session is using GTP accounting and
decremented at session end.
Active Aggregation SM.NbrActAggrCtxt.GtpAcct Gauge 32
sessions using GTP
accounting
This measurement provides the number of active sessions of VPN (VPN variants include
IPSec, GRE, ATM, VLAN, MPLS and GGSN VPRN) using GTP accounting. This counter is
incremented if an active session is using GTP accounting and decremented at session
end.
Active VPN sessions using SM.NbrActVpnCtxt.GtpAcct Gauge 32
GTP accounting
This measurement provides the number of active sessions of Services APN with IP Subnet
Dedication for the Wireless ISP network model using GTP accounting. This counter is
incremented if an active session is using GTP accounting and decremented at session
end.
Active Services sessions SM.NbrActSvcSubnetCtxt.Gt Gauge 32
with IP Subnet Dedication pAcct
using GTP accounting
This measurement provides the number of active sessions of Services APN without IP
Subnet Dedication for the Wireless ISP network model using GTP accounting. This counter
is incremented if an active session is using GTP accounting and decremented at session
end.
Active Services sessions SM.NbrActSvcCtxt.GtpAcct Gauge 32
without IP Subnet
Dedication using GTP
accounting
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This measurement provides the number of active sessions of L2TP VPN (applicable only to
L2TP without IPSec tunnel configuration) using GTP accounting. This counter is
incremented if an active session is using GTP accounting and decremented at session
end.
Active L2TP VPN sessions SM.NbrActL2tpCtxt.GtpAcct Gauge 32
using GTP accounting
This measurement provides the number of successful activations of Aggregation APN
using DHCP. This counter is incremented for successful primary PDP context creations
using DHCP based IP address allocation.
Successful Aggregation SM.SuccActAggrCtxt.Dhcp Counter 32
session activations using
DHCP
This measurement provides the number of successful activations of VPN (VPN variants
include IPSec, GRE, ATM, VLAN, MPLS and GGSN VPRN) using DHCP. This counter is
incremented for successful primary PDP context creations using DHCP based IP address
allocation.
Successful VPN session SM.SuccActVpnCtxt.Dhcp Counter 32
activations using DHCP
This measurement provides the number of successful activations of Services APN with IP
Subnet Dedication for the Wireless ISP network model using DHCP. This counter is
incremented for successful primary PDP context creations using DHCP based IP address
allocation.
Successful Services SM.SuccActSvcSubnetCtxt.D Counter 32
session activations with IP hcp
Subnet Dedication using
DHCP
This measurement provides the number of successful activations of Services APN without
IP Subnet Dedication for the Wireless ISP network model using DHCP. This counter is
incremented for successful primary PDP context creations using DHCP based IP address
allocation.
Successful Services SM.SuccActSvcCtxt.Dhcp Counter 32
session activations without
IP Subnet Dedication using
DHCP
This measurement provides the current number of Simultaneous Active VPN (VPN variants
include IPSec, GRE, ATM, VLAN, MPLS and GGSN VPRN) sessions. This counter is
incremented after successful establishment and decremented at session end.
Number of currently active SM.NbrActVpnCtxt Gauge 32
VPN sessions
This measurement provides the current number of Simultaneous Active Services sessions
with IP Subnet Dedication for the Wireless ISP network model. This counter is incremented
after successful establishment and decremented at session end.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Number of currently active SM.NbrActSvcSubnetCtxt Gauge 32
Services sessions with IP
Subnet Dedication
This measurement provides the current number of Simultaneous Active Services sessions
without IP Subnet Dedication for the Wireless ISP network model. This counter is
incremented after successful establishment and decremented at session end.
Number of currently active SM.NbrActSvcCtxt Gauge 32
Services sessions without
IP Subnet Dedication
This measurement provides the number of successful establishment of sessions using
Radius Authentication. This counter is incremented for successful primary PDP context
creations using Radius Authentication.
Successful session SM.SuccActCtxt.RadiusAuth Counter 32
activations using Radius
Authentication
This measurement provides the number of successful establishment of sessions using
Radius Accounting. This counter is incremented for successfully established sessions
using Radius Accounting.
Successful session SM.SuccActCtxt.RadiusAcct Counter 32
activations using Radius
Accounting
This measurement provides the number of successful establishment of sessions using
Prepaid solution (DCC or CTP).
Successful session SM.SuccActPrepaidCtxt Counter 32
activations using Prepaid
solution
This measurement provides the number of successful re-authentication with Prepaid
server (DCC or CTP).
Successful re- SM.SuccPrepaidReAuth Counter 32
authentication with Prepaid
server
This measurement provides the number of successful establishment of sessions using
Content Based Billing for the Aggregation APN.
Successful Aggregation SM.SuccActAggrCtxt.Cbb Counter 32
session activations with
Content Based Billing
This measurement provides the number of successful establishment of sessions using
firewall for the Aggregation APN.
Successful Aggregation SM.SuccActAggrCtxt.Fw Counter 32
session activations with
firewall
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This measurement provides the number of successful establishment of sessions using
Anti-spoofing for the Aggregation APN.
Successful Aggregation SM.SuccActAggrCtxt.Aspoof Counter 32
session activations with
Anti-spoofing
This measurement provides the number of successful establishment of sessions using
Policy Based Forwarding for the Aggregation APN.
Successful Aggregation SM.SuccActAggrCtxt.Pbf Counter 32
session activations with
Policy Based Forwarding
This measurement provides the number of successful establishment of sessions using
Traffic Shaping for the Aggregation APN.
Successful Aggregation SM.SuccActAggrCtxt.Shape Counter 32
session activations with
Traffic Shaping
This measurement provides the number of successful establishment of sessions using
Policing for the Aggregation APN.
Successful Aggregation SM.SuccActAggrCtxt.Police Counter 32
session activations with
Policing
Indicates the number of Attempts of SGSN Update PDP Request for Direct Tunnel
Establishment. This stat is incremented irrespective of “DIRECT TUNNEL” SOC state (i.e.
SOC enabled/disabled)
Attempted Direct Tunnel SM.AttUpdPdpCtxtMsAndSg Counter 32
Activate Updates sn.DT
Indicates the number of Successful SGSN Update PDP context requests for Direct Tunnel
when SOC is Enabled. This stat is not incremented when “DIRECT TUNNEL” SOC is
disabled.
Successful Direct Tunnel SM.SuccUpdPdpCtxtMsAndS Counter 32
Activate Updates gsn.DT
Indicates the number of attempts of GGSN initiated Update request(s) due to Error
Indication Handling for a Direct Tunnel context. This stat is incremented irrespective of
“DIRECT TUNNEL” SOC state.
Attempted GGSN Initiated SM.AttUpdPdpCtxtGgsn.DT Counter 32
Update Requests for Error
Indication received on
GGSN for context in Direct
Tunnel
Indicates the number of successful GGSN initiated Update request(s) due to Error Indication
Handling for a Direct Tunnel context. This stat is incremented irrespective of “DIRECT
TUNNEL” SOC state.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Successful GGSN Initiated SM.SuccUpdPdpCtxtGgsn.D Counter 32
Update Requests for Error T
Indication received on
GGSN for context in Direct
Tunnel
Indicates the number of Attempts of SGSN Update Request sent to deactivate the Direct
Tunnel. This stat is incremented irrespective of “DIRECT TUNNEL” SOC state.
Attempted Direct Tunnel SM.AttUpdPdpCtxtMsAndSg Counter 32
De-activate Update sn.deactDT
requests
Indicates the number of Successful SGSN Update Request sent to deactivate the Direct
Tunnel. This stat is incremented irrespective of “DIRECT TUNNEL” SOC state.
Successful Direct Tunnel SM.SuccUpdPdpCtxtMsAndS Counter 32
De-activate Update gsn.deactDT
requests
This measurement indicates the number of failed Update responses encountered by GGSN
for the GGSN Initiated Update request sent during Error Indication Handling for Direct
Tunnel context. This stat is incremented irrespective of “DIRECT TUNNEL” SOC state.
Failed Update Response SM.FailUpdPdpCtxtGgsn.DT Counter 32
from SGSN for GGSN
Initiated Update Request for
Error Indication Handling
for context in Direct Tunnel
Indicates the current number of sessions in Direct Tunnel when SOC is Enabled. This stat
is not incremented when “DIRECT TUNNEL” SOC is disabled.
Number of Active Direct SM.NbrDirectTunnels Gauge 32
Tunnel Sessions
Indicates the number of attempts of the GGSN initiated Update PDP Context Request(s) due
to Idle Session Verification, that has been sent to the SGSN.
Counter 32
Number of attempts the SM.AttUpdPdpCtxtGgsn.Ctxt
GGSN sent Update PDP Verify
Context Request to verify a
context
Indicates the number of Successful GGSN initiated Update PDP Context Request(s) for Idle
Session Verification.
Counter 32
Number of SGSN Update SM.SuccUpdPdpCtxtGgsn.Ct
PDP Context Responses xtVerify
indicating context is valid
This measurement indicates the number of failed Update responses encountered by GGSN
for the GGSN Initiated Update PDP Context Request sent for Idle Session Verification.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Counter 32
Failed Update Response SM.FailUpdPdpCtxtGgsn.Ctx
from SGSN for GGSN tVerify
Initiated Update PDP
Context Request for Idle
Session Verification.
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter SM.spare1 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter SM.spare2 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter SM.spare3 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter SM.spare4 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter SM.spare5 TBD 32
Table 9-5
GTP Data Counters
Description
Measurement Name 3GPP Name Collection Method Size (bits)
This counter gives the time difference in seconds between the start and stop of the
statistics collection period. This counter facilitates a more accurate analysis of the
statistics for a given accounting interval.
Counter element Reporting GTP.ReportingInterval Gauge 32
interval
This measurement provides the number of GTP data packets discarded in the uplink
direction and is incremented whenever an uplink GTP data packet is discarded. The GTP
packet is discarded if there is a GTP packet format error.
Discarded GTP Data GTP.DiscDataPkt Counter 32
Packets
This measurement provides the number of GTP data packets received on the Gn
interface, and is incremented on receipt of a GTP data packet on the Gn interface. This
measurement is pegged by traffic class and allocation/retention priority.
Description
Measurement Name 3GPP Name Collection Method Size (bits)
Received GTP Data Packets GTP.IncDataPkt.Bgrd.Lo Counter 64
w
Traffic Class (TC):
Background; Allocation/
Retention (A/R): Low
TC: Interactive; A/R Low GTP.IncDataPkt.Intact.L Counter 64
ow
TC: Streaming; A/R Low GTP.IncDataPkt.Strm.Lo Counter 64
w
TC: Conversational; A/R: GTP.IncDataPkt.Conv.Lo Counter 64
Low w
TC: Background; A/R: GTP.IncDataPkt.Bgrd.Me Counter 64
Medium dium
TC: Interactive; A/R GTP.IncDataPkt.Intact.M Counter 64
Medium edium
TC: Streaming; A/R Medium GTP.IncDataPkt.Strm.Me Counter 64
dium
TC: Conversational; A/R: GTP.IncDataPkt.Conv.M Counter 64
Medium edium
TC: Background; A/R: High GTP.IncDataPkt.Bgrd.Hi Counter 64
gh
TC: Interactive; A/R High GTP.IncDataPkt.Intact.Hi Counter 64
gh
TC: Streaming; A/R High GTP.IncDataPkt.Strm.Hi Counter 64
gh
TC: Conversational; A/R: GTP.IncDataPkt.Conv.Hi Counter 64
High gh
This measurement provides the number of GTP data packets sent on the Gn interface,
and is incremented on transmission of a GTP packet on the Gn interface. This
measurement is pegged by traffic class and allocation/retention priority.
Sent GTP Data Packets GTP.OutDataPkt.Bgrd.Lo Counter 64
w
Traffic Class (TC):
Background; Allocation/
Retention (A/R): Low
TC: Interactive; A/R Low GTP.OutDataPkt.Intact.L Counter 64
ow
TC: Streaming; A/R Low GTP.OutDataPkt.Strm.Lo Counter 64
w
TC: Conversational; A/R: GTP.OutDataPkt.Conv.L Counter 64
Low ow
Description
Measurement Name 3GPP Name Collection Method Size (bits)
TC: Background; A/R: GTP.OutDataPkt.Bgrd.M Counter 64
Medium edium
TC: Interactive; A/R GTP.OutDataPkt.Intact.M Counter 64
Medium edium
TC: Streaming; A/R Medium GTP.OutDataPkt.Strm.M Counter 64
edium
TC: Conversational; A/R: GTP.OutDataPkt.Conv.M Counter 64
Medium edium
TC: Background; A/R: High GTP.OutDataPkt.Bgrd.Hi Counter 64
gh
TC: Interactive; A/R High GTP.OutDataPkt.Intact.H Counter 64
igh
TC: Streaming; A/R High GTP.OutDataPkt.Strm.Hi Counter 64
gh
TC: Conversational; A/R: GTP.OutDataPkt.Conv.Hi Counter 64
High gh
This measurement provides the number of GTP payload octets received, and is
incremented on receipt of a GTP data packet on the Gn interface. The data packet size is
extracted from the GTP header and added on to the measurement value. This
measurement is pegged by traffic class and allocation/retention priority. These counters
do not include GTP transport layer octets.
Received GTP Payload GTP.IncDataOct.Bgrd.Lo Counter 64
Octets w
TC: Interactive; A/R Low GTP.IncDataOct.Intact.L Counter 64
ow
TC: Streaming; A/R Low GTP.IncDataOct.Strm.Lo Counter 64
w
TC: Conversational; A/R: GTP.IncDataOct.Conv.Lo Counter 64
Low w
TC: Background; A/R: GTP.IncDataOct.Bgrd.Me Counter 64
Medium dium
TC: Interactive; A/R GTP.IncDataOct.Intact.M Counter 64
Medium edium
TC: Streaming; A/R Medium GTP.IncDataOct.Strm.Me Counter 64
dium
TC: Conversational; A/R: GTP.IncDataOct.Conv.M Counter 64
Medium edium
TC: Background; A/R: High GTP.IncDataOct.Bgrd.Hi Counter 64
gh
TC: Interactive; A/R High GTP.IncDataOct.Intact.Hi Counter 64
gh
Description
Measurement Name 3GPP Name Collection Method Size (bits)
TC: Streaming; A/R High GTP.IncDataOct.Strm.Hi Counter 64
gh
TC: Conversational; A/R: GTP.IncDataOct.Conv.Hi Counter 64
High gh
This measurement provides the number of GTP payload octets sent, and is incremented
on transmission of a GTP data packet on the Gn interface. The data packet size is
extracted from the GTP header and added on to the measurement value. This
measurement is pegged by traffic class and allocation/retention priority. These counters
do not include GTP transport layer octets.
Sent GTP Payload Octets GTP.OutDataOct.Bgrd.L Counter 64
ow
TC: Interactive; A/R Low GTP.OutDataOct.Intact.L Counter 64
ow
TC: Streaming; A/R Low GTP.OutDataOct.Strm.L Counter 64
ow
TC: Conversational; A/R: GTP.OutDataOct.Conv.L Counter 64
Low ow
TC: Background; A/R: GTP.OutDataOct.Bgrd.M Counter 64
Medium edium
TC: Interactive; A/R GTP.OutDataOct.Intact. Counter 64
Medium Medium
TC: Streaming; A/R Medium GTP.OutDataOct.Strm.M Counter 64
edium
TC: Conversational; A/R: GTP.OutDataOct.Conv.M Counter 64
Medium edium
TC: Background; A/R: High GTP.OutDataOct.Bgrd.Hi Counter 64
gh
TC: Interactive; A/R High GTP.OutDataOct.Intact.H Counter 64
igh
TC: Streaming; A/R High GTP.OutDataOct.Strm.Hi Counter 64
gh
TC: Conversational; A/R: GTP.OutDataOct.Conv.H Counter 64
High igh
This counter shows the number of Error Indication messages received by the GGSN. The
counter gets pegged when an Error Indication message is received by the GGSN if it
sends a G-PDU for which no PDP context exists.
Error indication received GTP.IncErrIndMsg Counter 32
This counter shows the number of Error Indication messages sent by the GGSN.The
counter gets pegged when an Error Indication message is sent by the GGSN if it receives
a G-PDU for which no PDP context exists.
Error indication sent GTP.OutErrIndMsg Counter 32
Description
Measurement Name 3GPP Name Collection Method Size (bits)
Indicates number of Error Indication message ignored by GGSN
Number of Incoming Error GTP.IncErrIndMsgIgnd Counter 32
Indication Message Ignored
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter GTP.spare1 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter GTP.spare2 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter GTP.spare3 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter GTP.spare4 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter GTP.spare5 TBD 64
If GTP Accounting record retries are enabled for the CGF Servers,
CDR transfer failures followed by a successful CDR transfer on a retry
will increment the successful CDR transfer statistic and the applicable
failure CDR transfer statistic one or more times.
Table 9-6
GTP Accounting Counters
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This counter gives the time difference in seconds between the start and stop of the
statistics collection period. This counter facilitates a more accurate analysis of the
statistics for a given accounting interval.
Counter element Reporting GTPP.ReportingInterval Gauge 32
interval
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This measurement provides the number of CDR information transfers attempted due
to a certain cause value, and is incremented when the Data Record Transfer Request
with the corresponding cause value is sent to a CGF without having been saved to
disk or the CDR is saved to disk. The cause values are CDR Closure/Normal Release
(CDRC), Abnormal Release (AREL), Data Volume Limit (DVLM), Maximum Number of
Charging Condition Changes (MCCC), Management Intervention (MGTI), Time Limit
(TLEX) and SGSN Change (SCHG).
Attempted CDR Information GTPP.CdrTransfReq.CD Counter 32
Transfers RC
GTPP.CdrTransfReq.AR Counter 32
EL
GTPP.CdrTransfReq.DV Counter 32
LM
GTPP.CdrTransfReq.MC Counter 32
CC
GTPP.CdrTransfReq.MG Counter 32
TI
GTPP.CdrTransfReq.TLE Counter 32
X
GTPP.CdrTransfReq.SC Counter 32
HG
These measurements provide a measure of the response of the CGF regarding the
DRT’s received by the CGF (one DRT may contain more than one CDR) due to a certain
cause value and are incremented upon the receipt of a DRT(Data Record Transfer)
response with the corresponding cause value. Supported cause values are Successful
CDR Transfer, Request Already Fulfilled (FQAF), No Resource Available (NRAV),
Request Not Fulfilled (RQNF), System Failure (SYSF) and Version Not Supported
(VNSU). Cause values that are not supported are Invalid Message Format (INMF),
Mandatory IE Incorrect (MIEI), Mandatory IE Missing (MIEM), Optional IE Incorrect
(OIEI) and Service Not Supported (SVNS).
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Successful/Failed CDR GTPP.SuccCdrTransf Counter 32
Information Transfers GTPP.FailCdrTransf.FQA Counter 32
F
GTPP.FailCdrTransf.INM Counter 32
F (not supported)
GTPP.FailCdrTransf.MIEI Counter 32
(not supported)
GTPP.FailCdrTransf.MIE Counter 32
M (not supported)
GTPP.FailCdrTransf.NR Counter 32
AV
GTPP.FailCdrTransf.OIEI Counter 32
(not supported)
GTPP.FailCdrTransf.RQ Counter 32
NF
GTPP.FailCdrTransf.SVN Counter 32
S (not supported)
GTPP.FailCdrTransf.SYS Counter 32
F
GTPP.FailCdrTransf.VNS Counter 32
U
This measurement provides the number of redirection requests received by GTP
accounting
Number of GTP accounting GTPP.RedirRequestRecv Counter 32
Redirection Requests d
received
This measurement provides the number of GTP accounting packets that are sent to
the CGFs but did not get an acknowledgement before timeout period set in the
configuration
Number of time-outs for GTPP.NbrGTPPTimeouts Counter 32
GTP accounting packets
This measurement provides the number of GTP accounting packets that are sent to
the CGFs but did not get a response after maximum retry set in the configuration.
Number of “no responses” GTPP.NbrGTPPNoResp Counter 32
for GTP accounting packets
This measurement provides the number of GTP accounting protocol errors that have
occurred in the GGSN
Number of GTP accounting GTPP.NbrProtErrors Counter 32
protocol errors
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Spare counter GTPP.spare1 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter GTPP.spare2 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter GTPP.spare3 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter GTPP.spare4 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter GTPP.spare5 TBD 32
RADIUS Statistics
Table 9-7 describes the statistics that will be collected as part of the
RADIUS accounting Element group.
Table 9-7
RADIUS Counters
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This counter gives the time difference in seconds between the start and stop of the
statistics collection period. This counter facilitates a more accurate analysis of the
statistics for a given accounting interval.
Counter element Reporting RAD.ReportingInte Gauge 32
interval rval
The IP Address of the RADIUS server.
RADIUS Server RAD.Server Identifier 32
This counter is pegged upon first transmission of RADIUS Accounting On and Off
messages, RADIUS Accounting Start and Stop messages.
Attempted CDR Information RAD.AcctTransfRe Counter 32
Transfers q
This counter is pegged on retransmission of a RADIUS Accounting On, RADIUS
Accounting Off, RADIUS Accounting Start or RADIUS Accounting Stop message.
CDR Information RAD.AcctRetrans Counter 32
Retransmissions
This counter is pegged on receipt of a RADIUS Accounting Response.
Successful CDR RAD.AcctRespons Counter 32
Information Transfers eRcvd
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
RADIUS Accounting Client Average Round Trip Time in ms between transmission of
Accounting Request message and receipt of Accounting Response message within the
set accounting interval.
The Total Round Trip Time is accumulated on a per-Accounting transaction basis for a
particular RADIUS server during the accounting interval. At the end of the accounting
interval, the Total Round Trip Time is divided by the number of accounting transactions
performed during the accounting interval to arrive at the RADIUS Accounting Client
Average Round Trip Time.
Increment this counter whenever an Accounting Request message is sent out to RADIUS
server.
Decrement this counter once an Accounting Response is received from RADIUS server
OR a timeout occurs.
RADIUS Acc Client Pending RAD.AcctPending Gauge 32
Requests Requests
The peak of the pending RADIUS accounting requests during the last reporting interval.
Remains unchanged.
This counter is reset to the AcctPendingRequests counter value at the start of the next
accounting interval.
RADIUS Acc Client Max RAD.AcctMaxPend High Tidemark 32
Pending Requests ingRequests Gauge
Number of Accounting Requests that timed out waiting for Accounting Response from
the RADIUS server.
RADIUS AccClient Time- RAD.AcctTimeOut Counter 32
outs s
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
Number of malformed Accounting Response packets received from the RADIUS server.
Malformed packets include packets with an invalid length (packet length is “less than the
minimum header length” OR “greater than the maximum allowed RADIUS packet
length”). Bad Authenticators and unknown types are not included as malformed access
responses.
RADIUS AccClient RAD.AcctMalforme Counter 32
Malformed Responses dResponses
Number of Accounting Response packets received from the RADIUS server which
contained invalid authenticators.
RADIUS Acc Client Bad RAD.AcctBadAuth Counter 32
Authenticators enticators
Number of RADIUS packets of unknown type which are received on the Accounting Port.
Packet of unknown type corresponds to the packet with message type other than
Accounting Response received on the RADIUS accounting port.
RADIUS AccClient RAD.AcctUnknown Counter 32
Unknown Types Types
Number of RADIUS packets received on the Accounting Port which are dropped for
failure reasons other than one of the existing counters.
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
RADIUS Authentication Client Average Round Trip Time in ms between transmission of
Access Request message and receipt of Access Response (Access Accept/Challenge/
Reject) message within the set accounting interval.
The Total Round Trip Time is accumulated on a per-Authentication transaction basis for
a particular RADIUS server during the accounting interval. At the end of the accounting
interval, the Total Round Trip Time is divided by the number of authentication
transactions performed during the accounting interval to arrive at the RADIUS
Authentication Client Average Round Trip Time.
Increment this counter whenever an Access Request message is sent out to RADIUS
server.
Decrement this counter once an Access Response is received from RADIUS server OR a
timeout occurs.
RADIUS Auth Client RAD.AuthPending Gauge 32
Pending Requests Requests
The peak of the pending RADIUS auth requests during the last reporting interval.
Remains unchanged.
This counter is reset to the AuthPendingRequests counter value at the start of the next
accounting interval.
RADIUS Auth Client Max RAD.AuthMaxPend High Tidemark 32
Pending Requests ingRequests Gauge
Number of Access Requests that timed out waiting for Access Response from the
RADIUS server.
RADIUS Auth Client Time- RAD.AuthTimeouts Counter 32
outs
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
Number of malformed Access Response packets received from the RADIUS server.
Malformed packets include packets with an invalid length (packet length is “less than the
minimum header length” OR “greater than the maximum allowed RADIUS packet
length”). Bad Authenticators, Signature Attributes, and unknown types are not included
as malformed access responses.
RADIUS Auth Client RAD.AuthMalforme Counter 32
Malformed Access dAccessResponse
Responses s
Number of Access Response packets received from the RADIUS server which had
invalid authenticators or signature attributes.
RADIUS Auth Client Bad RAD.AuthBadAuth Counter 32
Authenticators enticators
Number of RADIUS packets of unknown type which are received on the Authentication
Port.
Packet of unknown type corresponds to the packet with message type other than Access
Accept/Reject received on the RADIUS authentication port.
RADIUS Auth Client RAD.AuthUnknow Counter 32
Unknown Types nTypes
Number of RADIUS packets received on the Authentication Port which are dropped for
failure reasons other than one of the existing counters.
APN Statistics
Table 9-8 describes the statistics that will be collected as part of the
APN Accounting Element group.
Table 9-8
APN Counters
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This counter gives the time difference in seconds between the start and stop of the
statistics collection period. This counter facilitates a more accurate analysis of the
statistics for a given accounting interval.
Counter element SM.ReportingInterval.Apn Gauge 32
Reporting interval
The provisioned name of the APN.
APN Name SPM_APN_NAME Identifier 64
character
s
These Gauge measurements provide the current number of active sessions per APN,
pegged by traffic class and allocation/retention priority indicated in the QoS profile.
They are incremented on transmission of a Create PDP Context Response with cause
“Request Accepted” and decremented on transmission or receipt of a Delete PDP
Context Response. In the case of a successful QoS update for an active PDP context,
the counter corresponding to the old QoS will be decremented and the counter
corresponding to the new QoS will be incremented.
TC: Background; A/R: SM.NbrActPdpCtxt.Apn.Bgrd. Gauge 32
Low Low
TC: Interactive; A/R: SM.NbrActPdpCtxt.Apn.Intact. Gauge 32
Low Low
TC: Streaming; A/R SM.NbrActPdpCtxt.Apn.Strm. Gauge 32
Low Low
TC: Conversational; SM.NbrActPdpCtxt.Apn.Conv. Gauge 32
A/R Low Low
TC: Background; A/R: SM.NbrActPdpCtxt.Apn.Bgrd. Gauge 32
Medium Medium
TC: Interactive; A/R: SM.NbrActPdpCtxt.Apn.Intact. Gauge 32
Medium Medium
TC: Streaming; A/R SM.NbrActPdpCtxt.Apn.Strm. Gauge 32
Medium Medium
TC: Conversational; SM.NbrActPdpCtxt.Apn.Conv. Gauge 32
A/R Medium Medium
TC: Background; A/R: SM.NbrActPdpCtxt.Apn.Bgrd. Gauge 32
High High
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
TC: Interactive; A/R: SM.NbrActPdpCtxt.Apn.Intact. Gauge 32
High High
TC: Streaming; A/R SM.NbrActPdpCtxt.Apn.Strm. Gauge 32
High High
TC: Conversational; SM.NbrActPdpCtxt.Apn.Conv. Gauge 32
A/R High High
This measurement provides the number of non-duplicate, PDP context activation
procedures initiated by the MS, and is incremented on receipt of a Create PDP
Context Request message from the SGSN. This measurement will not include those
measurements dropped before their APN is determined.
Attempted MS- SM.AttActPdpCtxt.Apn Counter 32
Initiated Sessions
This measurement provides the number of successfully completed activations of
PDP contexts, and is incremented on transmission of a Create PDP Context
Response message with cause “Request Accepted”.
Successfully SM.SuccActPdpCtxt.Apn Counter 32
Established MS-
Initiated sessions
This measurement provides the number of non-duplicate, dynamic PDP context
activation procedures initiated by the MS where a dynamic PDP address is requested,
and is incremented on receipt of a Create PDP Context Request message with an
empty PDP address. This measurement will not include those messages that are
dropped before the PDP address is determined.
Attempted MS- SM.AttDynActPdpCtxt.Apn Counter 32
Initiated Session
Activations with
Dynamic PDP
Address Allocation
Required
This measurement provides the number of successfully established sessions where
a dynamic PDP address is requested, and is incremented on transmission of a Create
PDP Context Response message with cause “Request Accepted”, where the PDP
address has been dynamically assigned.
Successfully SM.SuccDynActPdpCtxt.Apn Counter 32
Established MS-
Initiated sessions
with Dynamic PDP
Address Allocation
Required
This measurement provides the number of non-duplicate, PDP context activation
procedures for which user authentication is required, and is incremented when a
Create PDP Context Request message is received for which the APN indicates that
user authentication is required.
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
Attempted Session SM.AttActPdpCtxtAutReq.Apn Counter 32
Establishments with
User Authentication
Required
This measurement provides the number of PDP context activation procedures which
failed due to AAA and SCP authentication failure.
Failed Session SM.FailActPdpCtxtAutReq.Ap Counter 32
Establishments Due n
to AAA and SCP
Authentication
Failure
This measurement provides the number of session establishment failures per APN
and is incremented whenever there is a Radius related failure for an APN
Failed Session SM.FailActPdpCtxtAuthReq.R Counter 32
Establishments Due adius.Apn
to RADIUS Failure
This measurement provides the number of session establishment failures per APN
and is incremented whenever there is a SCP related failure for an APN
Failed Session SM.FailActPdpCtxtAuthReq.S Counter 32
Establishments Due CP.Apn
to SCP Failure
This measurement provides the number of session establishment failures per APN
and is incremented whenever there is a Diameter related failure for an APN
Failed Session SM.FailActPdpCtxtAuthReq.Di Counter 32
Establishments Due ameter.Apn
to Diameter Failure
This measurement provides the number of PDP context attempted to move to the
target ssp during SSM Redundancy and is incremented for the user APN by 1 as it is
attempted to move.
Attempted move PDP SM.AttSsmrPdpCtxt.Apn Counter 32
contexts - SSM
Redundancy
This measurement provides the number of PDP context attempted to move to the
target ssp during SSM Redundancy and is incremented for the user APN by 1 when a
PDP contexts is successfully moved to the target ssp.
Successfully moved SM.SuccSsmrPdpCtxt.Apn Counter 32
PDP contexts - SSM
Redundancy
This measurement provides the number of PDP context deactivation procedures
initiated by either the MS or SGSN, and is incremented on receipt of a Delete PDP
Context Request message from the SGSN for an existing PDP context.
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
Attempted MS- and SM.AttDeactPdpCtxtMsAndSg Counter 32
SGSN-Initiated sn.Apn
Session Conclusions
This measurement provides the number of successfully completed PDP context
deactivation procedures initiated by either the MS or SGSN, and is incremented on
transmission of a Delete PDP Context Response message with cause “Request
Accepted” to the SGSN for an existing context which is successfully deleted.
Successful MS- and SM.SuccDeactPdpCtxtMsAnd Counter 32
SGSN-Initiated Sgsn.Apn
Session Conclusions
This measurement provides the number of PDP context deactivation procedures
initiated by the GGSN, and is incremented on transmission of a Delete PDP Context
Request message to the SGSN.
Attempted GGSN- SM.AttDeactPdpCtxtGgsn.Apn Counter 32
Initiated Session
Conclusions
This measurement provides the number of successfully completed PDP context
deactivation procedures initiated by the GGSN, and is incremented when a context is
successfully deleted due to a Delete PDP Context Response message with cause
“Request Accepted” from the SGSN, N3 Timer expiry or successful silent deletion.
Successful GGSN- SM.SuccDeactPdpCtxtGgsn.A Counter 32
Initiated Session pn
Conclusions
This measurement provides the number of PDP Context Deactivations initiated by
GGSN during SSM Redundancy. It is incremented for the user APN by 1 as the
process of removing a PDP Context starts in GGSN.
Attempted GGSN SM.AttDeactPdpCtxtGgsn.Ss Counter 32
initiated deactivation mr.Apn
- SSM Redundancy
This measurement provides the number of PDP Context Successful Deactivations
initiated by GGSN during SSM Redundancy. It is incremented for the user APN by 1
when a PDP Context is successfully removed from GGSN.
Successful GGSN SM.SuccDeactPdpCtxtGgsn.S Counter 32
initiated deactivation smr.Apn
- SSM Redundancy
This measurement provides the peak number of active PDP contexts in GGSN during
the interval period, and is obtained by comparing an update on the actual number of
active PDP contexts in the GGSN and the current maximum value of the
measurement.
Peak Number of SM.MaxNbrActPdpCtxt.Apn High Tidemark 32
Simultaneous Active Gauge
Sessions
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This measurement provides the number of PDP context updates attempted, and is
incremented on receipt of an Update PDP Context Request message for an existing
PDP context.
Attempted MS- & SM.AttUpdPdpCtxtMsAndSgs Counter 32
SGSN-Initiated PDP n.Apn
Context Updates
This measurement provides the number of successfully performed PDP context
updates, and is incremented on transmission of an Update PDP Context message
with cause “Request Accepted”.
Successfully SM.SuccUpdPdpCtxtMsAndS Counter 32
Performed MS- & gsn.Apn
SGSN-Initiated PDP
Context Updates
This measurement provides the number of PDP context updates generated by the
GGSN, retransmissions excluded.
Attempted GGSN- SM.AttUpdPdpCtxtGgsn.Apn Counter 32
Initiated PDP Context
Updates
This measurement provides the number of successfully performed PDP context
updates, and is incremented on receipt of an Update PDP Context response message
with cause “Request Accepted”.
Successfully SM.SuccUpdPdpCtxtGgsn.Ap Counter 32
Performed GGSN- n
Initiated PDP Context
Updates
Counts number of context creation requests rejected due to either APN
administrative state disabled, or ISP operational state down.
PDP Context failed SM.FailActPdpCtxtApnDown. Counter 32
due to APN down. Apn
Counts number of context creation requests rejected due to IP address unavailability
from local address pools.
PDP Context failed SM.FailActPdpCtxtNoIPfound. Counter 32
due to unavailable IP Apn
addresses in local
address pools.
These Gauge measurements provide the current number of active sessions per APN,
pegged by the type of IP address allocated for the session. They are incremented on
transmission of a Create PDP Context Response with cause “Request Accepted” and
decremented on transmission or receipt of a Delete PDP Context Response.
Active PDP Contexts SM.NbrDynActPdpCtxt.Apn Gauge 32
with Dynamic IP
Address
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
Active PDP Context SM.NbrStaticActPdpCtxt.Apn Gauge 32
with Static IP Address
This counter is incremented when a GGSN attempts to deactivate a GTP context due
to manual intervention.
Attempted GGSN SM.AttDeactPdpCtxtGgsn.Ma Counter 32
Initiated Deactivation nual.Apn
- Manual
This counter is incremented when a GGSN completes deactivation of a GTP context
due to manual intervention
Successful GGSN SM.SuccDeactPdpCtxtGgsn.M Counter 32
Initiated Deactivation anual.Apn
- Manual
This counter is incremented when a GGSN attempts to deactivate a GTP context due
to expiry of the idle timer.
Attempted GGSN SM.AttDeactPdpCtxtGgsn.ITO. Counter 32
Initiated Deactivation Apn
- Idle Timer
This counter is incremented when a GGSN completes deactivation of a GTP context
due to expiry of the idle timer.
Successful GGSN SM.SuccDeactPdpCtxtGgsn.IT Counter 32
Initiated Deactivation O.Apn
- Idle Timer
This counter is incremented when a GGSN attempts to deactivate a GTP context due
to expiry of the maximum session duration timer.
Attempted GGSN SM.AttDeactPdpCtxtGgsn.Max Counter 32
Initiated Deactivation Dur.Apn
- Max Session
Duration
This counter is incremented when a GGSN completes deactivation of a GTP context
due to expiry of the maximum session duration timer.
Successful GGSN SM.SuccDeactPdpCtxtGgsn.M Counter 32
Initiated Deactivation axDur.Apn
- Max Session
Duration
This counter is incremented when a GGSN attempts to deactivate a GTP context due
to a SGSN restart.
Attempted GGSN SM.AttDeactPdpCtxtGgsn.Sgs Counter 32
Initiated Deactivation nRstrt.Apn
- SGSN Restart
This counter is incremented when a GGSN completes deactivation of a GTP context
due to a SGSN restart.
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
Successful GGSN SM.SuccDeactPdpCtxtGgsn.S Counter 32
Initiated Deactivation gsnRstrt.Apn
- SGSN Restart
This measurement provides the number of PDP Context Deactivation Attempt
initiated by GGSN due to no resource on the target SSP during SSM Redundancy. It is
incremented for user APN by 1 as the process of removing the PDP Context starts in
GGSN.
Attempted GGSN SM.AttDeactPdpCtxtGgsn.Ss Counter 32
initiated deactivation mr.NoResource.Apn
- SSM Redundancy
No Resource
This measurement provides the number of PDP Context Successful Deactivations
initiated by GGSN due to no resource on target ssp during SSM Redundancy.It is
incremented for user APN by 1 when PDP Context is successfully taken down from
GGSN.
Successful GGSN SM.SuccDeactPdpCtxtGgsn.S Counter 32
initiated deactivation smr.NoResource.Apn
- SSM Redundancy
No Resource
This measurement provides the number of aggregation PDP Context Deactivations
initiated by GGSN as the second move is not allowed during SSM Redundancy. It is
incremented for user APN by 1 as the process of removing the PDP Context starts in
GGSN.
Attempted GGSN SM.AttDeactPdpCtxtGgsn.Ss Counter 32
initiated deactivation mr.NoSecondMove.Apn
- SSM Redundancy
No Second Move
This measurement provides the number of aggregation PDP Context Successful
Deactivations initiated by GGSN as the second move is not allowed during SSM
Redundancy. It is incremented for user APN by 1 when PDP Context is successfully
taken down from GGSN.
Successful GGSN SM.SuccDeactPdpCtxtGgsn.S Counter 32
initiated deactivation smr.NoSecondMove.Apn
- SSM Redundancy
No Second Move
This measurement provides the number of PDP Context Deactivation Attempt
initiated by GGSN due to system failure during SSM Redundancy. It is incremented
for user APN by 1 as the process of removing the PDP Context starts in GGSN.
Attempted GGSN SM.AttDeactPdpCtxtGgsn.Ss Counter 32
initiated deactivation mr.SystemFailure.Apn
- SSM Redundancy
System Failure
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This measurement provides the number of PDP Context Successful Deactivations
initiated by GGSN due to system failure during SSM Redundancy. It is incremented
for user APN by 1 when PDP Context is successfully taken down from GGSN.
Successful GGSN SM.SuccDeactPdpCtxtGgsn.S Counter 32
initiated deactivation smr.SystemFailure.Apn
- SSM Redundancy
System Failure
This measurement provides the number of aggregation PDP Context Deactivations
initiated by GGSN as the SSM redundancy for Aggregation was not Enabled. It is
incremented for user APN by 1 as the process of removing the PDP Context starts in
GGSN.
Attempted GGSN SM.AttDeactPdpCtxtGgsn.Ss Counter 32
initiated deactivation mr.Disabled.Apn
- SSM Redundancy
for Aggregation is
disabled
This measurement provides the number of aggregation PDP Context Successful
Deactivations initiated by GGSN as the SSM redundancy for Aggregation is not
Enabled. It is incremented for user APN by 1 when PDP Context is successfully taken
down from GGSN
Successful GGSN SM.SuccDeactPdpCtxtGgsn.S Counter 32
initiated deactivation smr.Disabled.Apn
- SSM Redundancy
for Aggregation is
disabled
This measurement provides the number of PDP context activation procedures which
failed due to the Visited GGSN Access Control rejection, incremented when a Create
PDP Context Response message with cause “User Authentication Failed” is sent.
Failed Session SM.PdpCtxtAclRej.Apn Counter 32
Establishments Due
to Access Control
rejection
This Gauge measurement provides the current number of active prepaid sessions per
APN. This includes prepaid services that use CTP as well as DCC.
Active Prepaid SM.NbrActCtxtPrepaid.Apn Gauge 32
Contexts
This measurement provides the number of successfully established sessions using
Basic Access Mode (untunneled).
Successfully SM.SuccActBamCtxt.Apn Counter 32
Established Basic
Access Mode
sessions
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This measurement provides the number of successfully established sessions using
IPSec.
Successfully SM.SuccActIpsecCtxt.Apn Counter 32
Established IPSec
sessions
This measurement provides the number of successfully established sessions using
GRE.
Successfully SM.SuccActGreCtxt.Apn Counter 32
Established GRE
sessions
This measurement provides the number of successfully established sessions using
L2TP.
Successfully SM.SuccActL2tpCtxt.Apn Counter 32
Established L2TP
sessions
This measurement provides the number of successfully established sessions using
L2TP/IPSec.
Successfully SM.SuccActL2ipCtxt.Apn Counter 32
Established L2TP/
IPSec sessions
This counter provides the number of non-duplicate, attempted Secondary PDP
Context establishments. A Secondary PDP Context is classified during parsing of the
Create PDP Context request. If the GGSN control TEID in the GTP header has already
been assigned and no IMSI is present, this counter will be incremented.
Number of Attempted SM.AttActSecPdpCtxt.Apn Counter 32
Secondary PDP
Context
Establishments
This counter provides the number of successful Secondary PDP Context
establishments.
Number of SM.SuccActSecPdpCtxt.Apn Counter 32
Successful
Secondary PDP
Context
Establishments
This counter provides the number of failed Secondary PDP contexts due to no
resources in the data plane.
Number of Failed SM.FailActSecPdpCtxt.NoData Counter 32
Secondary PDP PlaneRsrc.Apn
Contexts due to No
Resources in the Data
Plane
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This measurement provides the number of primary PDP contexts created on an APN
with their billing parameters overridden by the IMSI Billing profile associated with that
APN. This counter is incremented by one when a Create PDP Context Request is
received from the SGSN containing an APN with an IMSI Billing profile configured and
the IMSI present in the request matches at least one rule in the profile. Note that for
APNs with no IMSI Billing profile configured, this counter will never be incremented.
Successful IMSI SM.IMSIRuleMatchSucc.Apn Counter 32
Billing Match
This measurement provides the number of primary PDP contexts created on an APN
with an IMSI Billing profile with their APN Billing parameters NOT overridden by the
IMSI Billing profile for that APN. This counter is incremented by one when a Create
PDP Context Request is received from the SGSN containing an APN with an IMSI
Billing profile configured and the IMSI present in the request does not match at least
one rule in the profile. Note that for APNs with no IMSI Billing profile configured, this
counter will never be incremented.
UnSuccessful IMSI SM.IMSIRuleMatchFail.Apn Counter 32
Billing Match
This measurement provides the number of rule comparisons made for APNs with an
IMSI Billing profile. This counter is incremented by one for each rule comparison
made when a Create PDP Context Request is received from the SGSN containing an
APN with an IMSI Billing profile configured. Note that for APNs with no IMSI Billing
profile configured, this counter will never be incremented.
Total number of IMSI SM.IMSITotRuleComparisons. Counter 32
Billing rule Apn
comparisons
This measurement provides the number of successfully established sessions using
MPLS.
Successfully SM.SuccActMPLSCtxt.Apn Counter 32
Established MPLS
sessions
This measurement provides the number of simultaneous active sessions that were
created with Content Based Billing enabled per APN.
Total Sessions with SM.SuccActCbbCtxt.Apn Counter 32
CBB
This measurement provides the current number of simultaneous active sessions
were successfully created with Content Based Billing enabled per APN.
Active Sessions with SM.NbrActCbbCtxt.Apn Gauge 32
CBB
This measurement provides the maximum number of sessions present during the
recording period that were created with Content Based Billing enabled.
Peak Simultaneous SM.MaxNbrActCbbCtxt.Apn High Tidemark 32
Sessions with CBB Gauge
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This measurement shows the number of successfully established contexts
requesting P-CSCF Address Discovery. This counter is incremented even if the P-
CSCF Address Discovery request is not fulfilled.
P-CSCF Address SM.SuccActCtxtPcscfDiscReq Counter 32
Requests .Apn
This measurement shows the number of successfully established contexts
requesting P-CSCF Address Discovery where the P-CSCF Address Discovery request
could not be fulfilled. This could be because there is no IMS Profile associated with
the APN or the associated profile contained no addresses.
P-CSCF Address SM.SuccActCtxtPcscfDiscFail Counter 32
Request Failed ed.Apn
This measurement provides the current number of active context bundles that
successfully requested P-CSCF Address Discovery.
Simultaneous Active SM.NbrActPcscfDiscCtxt.Apn Gauge 32
Sessions Requesting
P-CSCF Discovery
This measurement provides the maximum number of simultaneous active context
bundles that successfully requested P-CSCF Address Discovery.
Peak Number of SM.MaxNbrActPcscfDiscCtxt. High Tidemark 32
Simultaneous Active Apn Gauge
Sessions Requesting
P-CSCF Discovery
This measurement provides the number of times the APN has been blacklisted during
the historical collection period and is incremented whenever the APN is blacklisted.
This measurement is reported on a per-APN basis
Number of times the SM.NbrBlacklist.Apn Counter 32
APN has been
Blacklisted
This measurement provides the number of session establishment failures per APN
and is incremented whenever there is an PDP context activation attempt after an APN
is blacklisted.
Failed Session SM.FailActPdpCtxtApnBlackli Counter 32
Establishments Due st.Apn
to APN being
Blacklisted
This measurement provides the number of session establishment failures per APN
and is incremented upon transmission of a non-duplicate Create PDP Context
Response with failure cause NORA (No Resources Available)
Failed Session SM.FailActPdpCtxt.NORA.Apn Counter 32
Establishments Due
to No Resource
Available
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This measurement provides the number of session establishment failures per APN
and is incremented upon transmission of a non-duplicate Create PDP Context
Response with failure cause ADAO (All Dynamic Addresses Occupied). The reasons
for this could be: Address pools for the APN are exhausted (GTPv1).
Failed Session SM.FailActPdpCtxt.ADAO.Apn Counter 32
Establishments Due
to exhaustion of
address pools
This measurement provides the number of session establishment failures per APN
and is incremented upon transmission of a non-duplicate Create PDP Context
Response with failure cause UAUF (User Authentication Failure).
Failed Session SM.FailActPdpCtxt.UAUF.Apn Counter 32
Establishments Due
to User
Authentication
Failure
This measurement provides the number of session establishment failures per APN
and is incremented upon transmission of a non-duplicate Create PDP Context
Response with failure cause SYSF (System Failure).
Failed Session SM.FailActPdpCtxt.SYSF.Apn Counter 32
Establishments Due
to System Failure
This measurement provides the number of session establishment failures per APN
and is incremented upon transmission of a non-duplicate Create PDP Context
Response with failure cause SEME (Semantic or Syntactic TFT or Packet Filter Error).
The reasons for this could be: Invalid traffic flow template format (GTPv1). This
counter is not pegged and is meant for future use.
Failed Session SM.FailActPdpCtxt.SEME.Apn Counter 32
Establishments Due
to Semantic or
Syntactic TFT or
Packet Filter Error
This measurement provides the number of session establishment failures per APN
and is incremented upon transmission of a non-duplicate Create PDP Context
Response with failure cause IEIN (Mandatory IE Incorrect, IE missing or Optional IE
Incorrect). The reasons for this could be: Length of mandatory/optional IE within
message does not match with actual length specified or Mandatory IE missing from
message. This counter is not pegged and is meant for future use.
Failed Session SM.FailActPdpCtxt.IEIN.Apn Counter 32
Establishments Due
to Mandatory IE
Incorrect, IE missing
or Optional IE
Incorrect
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This measurement provides the number of session establishment failures per APN
and is incremented upon transmission of a non-duplicate Create PDP Context
Response with failure cause IMFT (Invalid Message Format). The reasons for this
could be: Length of GTP packet in header does not match with actual length, Out of
Order IE or No GSN address or TEID in message. This counter is not pegged and is
meant for future use
Failed Session SM.FailActPdpCtxt.IMFT.Apn Counter 32
Establishments Due
to Invalid Message
Format
This measurement provides the number of session establishment failures per APN
and is incremented upon transmission of a non-duplicate Create PDP Context
Response with failure cause SVNS (Service Not Supported).
Failed Session SM.FailActPdpCtxt.SVNS.Apn Counter 32
Establishments Due
to Service Not
Supported
This measurement provides the number of session establishment failures per APN
and is incremented upon transmission of a non-duplicate Create PDP Context
Response with failure cause NoResp (No Response) which is not sent. This counter is
only pegged in the following cases:
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
Number of contexts SM.NbrCtxtPrepaidToNonPrep Counter 32
converted to postpaid aid.CCFH.Apn
due to DCC Failure
Handling
This counter shows the number of context converted to non-prepaid upon reception
of CC-Not-Applicable result code.
Number of contexts SM.NbrCtxtPrepaidToNonPrep Counter 32
converted to postpaid aid.CCNotApp.Apn
upon reception of
DCC Not Applicable
This counter shows the Number of contexts terminated by DCC server direction as
described below
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
Attempted GGSN SM.AttUpdPdpCtxtGgsn.DT.A Counter 32
Initiated pn
Update Requests for
Error Indication
received on GGSN for
a context in Direct
Tunnel for particular
APN
Indicates the number of Successful GGSN initiated Update request(s) due to Error
Indication Handling for context involved in Direct Tunnel on per APN basis. This stat
is incremented irrespective of “DIRECT TUNNEL” SOC state.
Successful GGSN SM.SuccUpdPdpCtxtGgsn.DT. Counter 32
Initiated Apn
Update Requests for
Error Indication
received on GGSN for
context in Direct
Tunnel for particular
APN
Indicates the number of Attempts of SGSN Update Request sent to deactivate the
Direct Tunnel on per APN basis. This stat is incremented irrespective of “DIRECT
TUNNEL” SOC state.
Attempted Direct SM.AttUpdPdpCtxtMsAndSgs Counter 32
Tunnel De-activate n.deactDT.Apn
Update request for
particular APN
Indicates the number of Successful SGSN Update Request sent to deactivate the
Direct Tunnel on per APN basis. This stat is incremented irrespective of “DIRECT
TUNNEL” SOC state.
Successful Direct SM.SuccUpdPdpCtxtMsAndS Counter 32
Tunnel De-activate gsn.deactDT.APN
Update request for
particular APN
This measurement indicates the number of failed Update responses encountered by
GGSN for the GGSN Initiated Update request sent for Error Indication Handling for a
context involved in Direct Tunnel on per APN basis. This stat is incremented
irrespective of “DIRECT TUNNEL” SOC state.
Failed Update SM.FailUpdPdpCtxtGgsn.DT.A Counter 32
Response from SGSN pn
for GGSN Initiated
Update Request for
Error Indication
Handling for context
in Direct Tunnel
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
Indicates the current number of Sessions in Direct Tunnel on per APN basis when SOC
is Enabled. This stat is not incremented when “DIRECT TUNNEL” SOC is disabled.
Number of Active SM.NbrDirectTunnels.Apn Gauge 32
Direct Tunnel
sessions for
particular APN
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter SM.spare1.Apn TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter SM.spare2.Apn TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter SM.spare3.Apn TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter SM.spare4.Apn TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter SM.spare5.Apn TBD 32
CGF Statistics
Table 9-9 describes the counters that will be collected as part of the CGF
Accounting Element group.
Table 9-9
CGF Counters
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This counter gives the time difference in seconds between the start and stop of
the statistics collection period. This counter facilitates a more accurate analysis
of the statistics for a given accounting interval.
Counter element Reporting CGF.ReportingInte Gauge 32
interval rval
The IP Address of the CGF server.
CGF Server Address CGF.Server Identifier 18
character
s
This measurement provides the number of Echo Request messages sent. This
measurement is incremented on transmission of an Echo Request message to a
CGF via the Ga interface.
Number of Echo Request CGF.EchoReqSent Counter 32
Messages Sent
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This measurement provides the number of Echo Response messages sent. This
measurement is incremented on transmission of an Echo Response to a CGF via
the Ga interface.
Number of Echo Response CGF.EchoRespSe Counter 32
Messages Sent nt
This measurement provides the number of Node Alive Request messages sent.
This measurement is incremented on transmission of a Node Alive Request
message to a CGF via the Ga interface.
Number of Node Alive CGF.NodeAliveRe Counter 32
Requests Sent q
This measurement provides the number of Node Alive Response messages
receive. This measurement is incremented on receipt of a Node Alive Response
message from a CGF via the Ga interface.
Number of Node Alive CGF.NodeAliveRe Counter 32
Responses Received sp
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter CGF.spare1 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter CGF.spare2 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter CGF.spare3 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter CGF.spare4 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter CGF.spare5 TBD 32
L2TP Statistics
Table 9-10 describes the counters that will be collected as part of
the L2TP Accounting Element group.
Table 9-10
L2TP Counters
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This counter gives the time difference in seconds between the start and stop of
the statistics collection period. This counter facilitates a more accurate analysis
of the statistics for a given accounting interval.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Counter element Reporting L2TP.ReportingInt Gauge 32
interval erval
This measurement provides the current number of active L2TP tunnels (not over
IPSec), and is incremented on the creation of an L2TP tunnel on the Gi interface
and decremented on removal of an L2TP tunnel on the Gi interface.
Simultaneous L2TP tunnels L2TP.NbrTunnels Gauge 32
on Gi Interface
This measurement provides the number of L2TP octets received and is
incremented on receipt of an IP packet in an L2TP tunnel on the Gi interface. The
data packet size is extracted from the packet header and added on to the
measurement value.
L2TP Octets Received L2TP.IncDataOct Counter 64
This measurement provides the number of L2TP octets sent and is incremented
on transmission of an IP packet in an L2TP tunnel on the Gi interface. The data
packet size is extracted from the packet header and added on to the
measurement value.
L2TP Octets Sent L2TP.OutDataOct Counter 64
This measurement provides the number of incoming L2TP packets discarded
and is incremented whenever an IP packet received in an L2TP tunnel is
discarded.
Discarded L2TP Data L2TP.DiscDataPkt Counter 64
Packets
This measurement provides the number of L2TP packets received and is
incremented on receipt of an IP packet in an L2TP tunnel on the Gi interface.
Received L2TP Data L2TP.IncDataPkt Counter 64
Packets
This measurement provides the number of L2TP packets sent and is
incremented on transmission of an IP packet in an L2TP tunnel on the Gi
interface.
L2TP Data Packets Sent L2TP.OutDataPkt Counter 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter L2TP.spare1 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter L2TP.spare2 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter L2TP.spare3 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter L2TP.spare4 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Spare counter L2TP.spare5 TBD 64
L2IP Statistics
Table 9-11 describes the counters that will be collected as part of the
L2TP over IPSec (L2IP) Accounting Element group.
Table 9-11
L2IP Counters
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This counter gives the time difference in seconds between the start and stop of
the statistics collection period. This counter facilitates a more accurate analysis
of the statistics for a given accounting interval.
Counter element Reporting L2IP.ReportingInte Gauge 32
interval rval
This measurement provides the current number of active L2TP over IPSec
tunnels, and is incremented on the creation of an L2TP/IPSec tunnel on the Gi
interface and decremented on removal of an L2TP/IPSec tunnel on the Gi
interface.
Simultaneous L2TP/IPSec L2IP.NbrTunnels Gauge 32
tunnels on Gi Interface
This measurement provides the number of L2TP/IPSec octets received and is
incremented on receipt of an IP packet in an L2TP/IPSec tunnel on the Gi
interface. The data packet size is extracted from the packet header and added on
to the measurement value.
L2TP/IPSec Octets L2IP.IncDataOct Counter 64
Received
This measurement provides the number of L2TP/IPSec octets sent and is
incremented on transmission of an IP packet in an L2TP/IPSec tunnel on the Gi
interface. The data packet size is extracted from the packet header and added on
to the measurement value.
L2TP/IPSec Octets Sent L2IP.OutDataOct Counter 64
This measurement provides the number of incoming L2TP/IPSec packets
discarded and is incremented whenever an IP packet received in an L2TP/IPSec
tunnel is discarded
Discarded L2TP/IPSec Data L2IP.DiscDataPkt Counter 64
Packets
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This measurement provides the number of L2TP/IPSec packets received and is
incremented on receipt of an IP packet in an L2TP/IPSec tunnel on the Gi
interface.
Received L2TP/IPSec Data L2IP.IncDataPkt Counter 64
Packets
This measurement provides the number of L2TP/IPSec packets sent and is
incremented on transmission of an IP packet in an L2TP/IPSec tunnel on the Gi
interface
L2TP/IPSec Data Packets L2IP.OutDataPkt Counter 64
Sent
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter L2IP.spare1 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter L2IP.spare2 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter L2IP.spare3 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter L2IP.spare4 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter L2IP.spare5 TBD 64
IPSec Statistics
Table 9-12 describes the counters that will be collected as part of the
IPSec Accounting Element group.
Table 9-12
IPSec Counters
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This counter gives the time difference in seconds between the start and stop of
the statistics collection period. This counter facilitates a more accurate analysis
of the statistics for a given accounting interval.
Counter element Reporting IPSec.ReportingInt Gauge 32
interval erval
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This measurement provides the number of IPSec octets received and is
incremented on receipt of an IP packet in an IPSec tunnel on the Gi interface.
The data packet size is extracted from the packet header and added on to the
measurement value.
IPSec Octets Received IPSec.IncDataOct Counter 64
This measurement provides the number of IPSec octets sent and is incremented
on transmission of an IP packet in an IPSec tunnel on the Gi interface. The data
packet size is extracted from the packet header and added on to the
measurement value.
IPSec Octets Sent IPSec.OutDataOct Counter 64
This measurement provides the number of incoming IPSec packets discarded
and is incremented when an IP packet received in an IPSec tunnel is discarded.
IPSec Packets Discarded IPSec.DiscDataPkt Counter 64
This measurement provides the number of IPSec packets received and is
incremented on receipt of an IP packet in an IPSec tunnel on the Gi interface.
IPSec Packets Received IPSec.IncDataPkt Counter 64
This measurement provides the number of IPSec packets sent and is
incremented on transmission of an IP packet in an IPSec tunnel on the Gi
interface.
IPSec Packets Sent IPSec.OutDataPkt Counter 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter IPSec.spare1 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter IPSec.spare2 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter IPSec.spare3 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter IPSec.spare4 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter IPSec.spare5 TBD 64
Overload Statistics
Each resource that is monitored by overload control has it’s own set of
statistics. Currently - CPU total, CPU interrupt and system memory
resources are being monitored by overload control on CMC Processor
0, CMC Processor 1, and on the SSC SSM processors. These
statistics are incremented when the resource enters into an overload
level and gets reset to zero after the OMs have been collected. The
resource overload statistics have been captured in Table 9-13.
Table 9-13
CMC Resource Overload Counters
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This counter gives the time difference in seconds between the start and stop of the
statistics collection period. This counter facilitates a more accurate analysis of the
statistics for a given accounting interval.
Counter element Reporting Ovld.ReportingInterval Gauge 32
interval
Slot - Chassis slot of the card from which the OMs are collected.
Indicates the slot number Ovld.Slot Identifier 16
of the card where the OMs
are collected from.
Port - the port of the Slot from which the OMs are collected from.
Indicates the port number Ovld.Port Identifier 16
where the OMs are
collected from.
Proc - the processor on the specified port where the OMs are collected from.
Indicates the processor Ovld.Proc Identifier 16
number from which the
OMs are collected from.
This is the highest weighted average percentage of CPU Total occupancy. This OM gets
reset to zero after the OM has been collected.
Highest weighted average Ovld.CpuTot.HighestAvgPc High Tidemark 16
percentage of CPU total t Gauge
occupancy.
This measurement provides the lowest percentage of CPU occupancy of the processor.
The CPU occupancy values are obtained every update interval and the lowest weighted
average of these values is reported by this OM.This OM gets reset to zero after the OM
has been collected.
Minimum weighted average Ovld.CpuTot.LowestAvgPct Low Tidemark 16
percentage of CPU total Gauge
occupancy
This measurement provides the average percentage of CPU occupancy of the processor.
The CPU occupancy values are obtained every update interval and a simple average of
these values is reported by this OM. This OM gets reset to zero after the OM has been
collected.
Average percentage of CPU Ovld.CpuTot.AvgPct gauge 16
total occupancy
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This is the overload level at the start of the OM collection period for CPU Total occupancy.
This OM gets reset to zero after the OM has been collected.
Overload level of CPU total Ovld.CpuTot.StartLevel Gauge 16
at the start of OM collection
period.
Number of times ovld Normal was entered (transitions from L1 to Normal and from L2 to
Normal and from L3 to Normal) for CPU Total occupancy. This OM gets reset to zero after
the OM has been collected.
Number of times ovld Ovld.CpuTot.NormEntry Counter 16
Normal was entered for
CPU total.
Number of times ovld L1 was entered (transitions from Normal to L1) for CPU Total
occupancy. This OM gets reset to zero after the OM has been collected.
Number of times ovld L1 Ovld.CpuTot.L1Entry Counter 16
was entered for CPU total.
Number of times ovld L2 was entered (transitions from Normal to L2 and from L1 to L2)
for CPU Total occupancy. This OM gets reset to zero after the OM has been collected.
Number of times ovld L2 Ovld.CpuTot.L2Entry Counter 16
was entered for CPU total.
Number of times ovld L3 was entered (transitions from Normal to L3 and from L1 to L3
and from L2 to L3) for CPU Total occupancy. This OM gets reset to zero after the OM has
been collected.
Number of times ovld L3 Ovld.CpuTot.L3Entry Counter 16
was entered for CPU total.
Number of times ovld L2 was entered with a jump from Normal (transitions from Normal
to L2) for CPU Total occupancy. This OM gets reset to zero after the OM has been
collected.
Number of times ovld L2 Ovld.CpuTot.NormToL2Ent Counter 16
was entered from Normal ry
Number of times ovld L3 was entered with a jump from Normal (transitions from Normal
to L3) for CPU Total occupancy. This OM gets reset to zero after the OM has been
collected.
Number of times ovld L3 Ovld.CpuTot.NormToL3Ent Counter 16
was entered from Normal ry
Number of times ovld L3 was entered with a jump from L1 (transitions from L1to L3) for
CPU Total occupancy. This OM gets reset to zero after the OM has been collected.
Number of times ovld L3 Ovld.CpuTot.L1ToL3Entry Counter 16
was entered from L1
This is the highest weighted average percentage of CPU Interrupt occupancy. This OM
gets reset to zero after the OM has been collected.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Highest weighted average Ovld.CpuInt.HighestAvgPct High Tidemark 16
percentage of CPU Gauge
Interrupt occupancy.
This is the overload level at the start of the OM collection period for CPU Interrupt
occupancy. This OM gets reset to zero after the OM has been collected.
Overload level of CPU Int at Ovld.CpuInt.StartLevel Gauge 16
the start of OM collection
period.
Number of times ovld Normal was entered (transitions from L1 to Normal and from L2 to
Normal and from L3 to Normal) for CPU Interrupt occupancy. This OM gets reset to zero
after the OM has been collected.
Number of times ovld Ovld.CpuInt.NormEntry Counter 16
Normal was entered for
CPU Int.
Number of times ovld L1 was entered (transitions from Normal to L1) for CPU Interrupt
occupancy. This OM gets reset to zero after the OM has been collected.
Number of times ovld L1 Ovld.CpuInt.L1Entry Counter 16
was entered for CPU Int.
Number of times ovld L2 was entered (transitions from Normal to L2 and from L1 to L2)
for CPU Interrupt occupancy. This OM gets reset to zero after the OM has been collected.
Number of times ovld L2 Ovld.CpuInt.L2Entry Counter 16
was entered for CPU Int.
Number of times ovld L3 was entered (transitions from Normal to L3 and from L1 to L3
and from L2 to L3) for CPU Interrupt occupancy. This OM gets reset to zero after the OM
has been collected.
Number of times ovld L3 Ovld.CpuInt.L3Entry Counter 16
was entered for CPU Int.
Number of times ovld L2 was entered with a jump from Normal (transitions from Normal
to L2) for CPU Interrupt occupancy. This OM gets reset to zero after the OM has been
collected.
Number of times ovld L2 Ovld.CpuInt.NormToL2Entr Counter 16
was entered from Normal. y
Number of times ovld L3 was entered with a jump from Normal (transitions from Normal
to L3) for CPU Interrupt occupancy. This OM gets reset to zero after the OM has been
collected.
Number of times ovld L3 Ovld.CpuInt.NormToL3Entr Counter 16
was entered from Normal y
Number of times ovld L3 was entered with a jump from L1 (transitions from L1to L3) for
CPU Interrupt occupancy. This OM gets reset to zero after the OM has been collected.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Number of times ovld L3 Ovld.CpuInt.L1ToL3Entry Counter 16
was entered from L1
This is the highest number of allocated mega bytes of system memory. This OM gets
reset to zero after the OM has been collected.
Highest number of system Ovld.Mem.HighestAllocate High Tidemark 16
memory allocated in MB. d Gauge
This is the fragmentation check lowest block size available in system memory. This OM
gets reset to highest value (all 1’s 16-bit value) after the OM has been collected.
Fragmentation check Ovld.Mem.LowestFragBlkSi Low Tidemark 16
lowest block size available ze Gauge
in system memory in KB.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Number of times ovld L2 Ovld.Mem.L2Entry Counter 16
was entered for system
memory.
Number of times ovld L3 was entered (transitions from Normal to L3 and from L1 to L3
and from L2 to L3) for system memory occupancy. This OM gets reset to zero after the
OM has been collected.
Number of times ovld L3 Ovld.Mem.L3Entry Counter 16
was entered for system
memory.
Number of times ovld L2 was entered with a jump from Normal (transitions from Normal
to L2) for system memory occupancy. This OM gets reset to zero after the OM has been
collected.
Number of times ovld L2 Ovld.Mem.NormToL2Entry Counter 16
was entered from Normal
Number of times ovld L3 was entered with a jump from Normal (transitions from Normal
to L3) for system memory occupancy. This OM gets reset to zero after the OM has been
collected.
Number of times ovld L3 Ovld.Mem.NormToL3Entry Counter 16
was entered from Normal
Number of times ovld L3 was entered with a jump from L1 (transitions from L1to L3) for
system memory occupancy. This OM gets reset to zero after the OM has been collected.
Number of times ovld L3 Ovld.Mem.L1ToL3Entry Counter 16
was entered from L1
Total disk space un-used in megabytes.Total unused disk space is calculated/reported in
this counter at the time of reporting.
Free disk space on CMC Ovld.CmcDisk.AvailableSp Gauge 32
ace
Total disk space used in megabytes.Total used disk space is calculated/reported in this
counter at the time of reporting.
Used disk space on CMC. Ovld.CmcDisk.UsedSpace Gauge 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter Ovld.spare1 TBD 16
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter Ovld.spare2 TBD 16
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter Ovld.spare3 TBD 16
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter Ovld.spare4 TBD 16
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Spare counter Ovld.spare5 TBD 16
Table 9-14
Wireless Services Counters
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This counter gives the time difference in seconds between the start and stop of the
statistics collection period. This counter facilitates a more accurate analysis of the
statistics for a given accounting interval.
Counter element Reporting SERV.ReportingInterval Gauge 32
interval
This counter shows the number of Application Service Requests sent from the GGSN to
the Application Server/Gateway.
Number of application SERV.WAP.ReqSent Counter 32
service request messages
sent
This counter shows the number of Application Service Responses received by the GGSN
from the Application Server/Gateway.
Number of application SERV.WAP.RespRcvd Counter 32
service response
messages received
This counter shows the number of bad response from Application Server due to unknown
message type and bad authenticator
Number of invalid SERV.WAP.InvalidRespRcv Counter 32
application service d
response messages
received
This counter shows the number of prepaid request messages sent from the GGSN to a
CTP based Prepaid Server. This includes Initial Authorization, Mid-Call Authorization, and
Final Report messages.
Number of Service SERV.PrePaid.ReqSent Counter 32
Authorization request
messages sent
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This counter shows the number of prepaid response messages received by the GGSN
from a CTP based Prepaid Server. This includes responses to Initial Authorization, Mid-
Call Authorization, and Final Report messages.
Number of Service SERV.PrePaid.RespRcvd Counter 32
Authorization response
messages received
This counter shows the number of failed prepaid response messages received by the
GGSN from a CTP based Prepaid Server. This includes responses to Initial Authorization,
Mid-Call Authorization, and Final Report messages. A failed prepaid response message is
any response message with a failure value for the Service Response Code, or a Reauth
response message with at least one prepaid coupon that is not approved.
Number of Failed Auth SERV.PrePaid.FailedAuthR Counter 32
Response messages espRcvd
received
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter SERV.spare1 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter SERV.spare2 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter SERV.spare3 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter SERV.spare4 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter SERV.spare5 TBD 32
GRE Statistics
Table 9-15 describes the counters that will be collected as part of the
GRE Accounting Element group.
Table 9-15
GRE Counters
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This counter gives the time difference in seconds between the start and stop of the
statistics collection period. This counter facilitates a more accurate analysis of the
statistics for a given accounting interval.
Counter element Reporting GRE.ReportingInterval Gauge 32
interval
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This measurement provides the number of GRE octets received and is incremented
on receipt of an IP packet in an GRE tunnel on the Gi interface. The data packet size is
extracted from the packet header and added on to the measurement value.
GRE Octets Received GRE.IncDataOct Counter 64
This measurement provides the number of GRE octets sent and is incremented on
transmission of an IP packet in an GRE tunnel on the Gi interface. The data packet
size is extracted from the packet header and added on to the measurement value.
GRE Octets Sent GRE.OutDataOct Counter 64
This measurement provides the number of GRE packets received and is incremented
on receipt of an IP packet in an GRE tunnel on the Gi interface.
GRE Packets Received GRE.IncDataPkt Counter 64
This measurement provides the number of GRE packets sent and is incremented on
transmission of an IP packet in an GRE tunnel on the Gi interface.
GRE Packets Sent GRE.OutDataPkt Counter 64
This measurement provides the number of incoming GRE packets discarded due to
memory issues.
GRE Packets Discarded GRE.DiscDataPkt.Mem Counter 64
due to Memory Issues
This measurement provides the number of incoming GRE packets discarded due to a
non-existent tunnel.
GRE Packets Discarded GRE.DiscDataPkt.NoTun Counter 64
due to Non-Existent Tunnel
This measurement provides the number of incoming GRE packets discarded due to
routing issues.
GRE Packets Discarded GRE.DiscDataPkt.NoRoute Counter 64
due to Routing Issues
This measurement provides the number of incoming GRE packets discarded due to
ethertype issues.
GRE Packets Discarded GRE.DiscDataPkt.Eth Counter 64
due to Ethertype Issues
This measurement provides the number of incoming GRE packets discarded due to
unsupported strict source routing.
GRE Packets Discarded GRE.DiscDataPkt.SSR Counter 64
due to Unsupported Strict
Source Routing
This measurement provides the number of incoming GRE packets discarded due to
bad checksum.
GRE Packets Discarded GRE.DiscDataPkt.BadCksum Counter 64
due to Bad Checksum
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This measurement provides the number of incoming GRE packets discarded due to
bad key.
GRE Packets Discarded GRE.DiscDataPkt.BadKey Counter 64
due to Bad Key
This measurement provides the number of incoming GRE packets discarded due to
bad sequence number.
GRE Packets Discarded GRE.DiscDataPkt.SeqNum Counter 64
due to Bad Sequence
Number
This measurement provides the number of incoming GRE packets discarded due to
no connection interface.
GRE Packets Discarded GRE.DiscDataPkt.NoIF Counter 64
due to No Connection
Interface
This measurement provides the number of incoming GRE packets discarded due to IP
interrupt queue full.
GRE Packets Discarded GRE.DiscDataPkt.IPQFull Counter 64
due to IP Interrupt Queue
Full
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter GRE.spare1 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter GRE.spare2 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter GRE.spare3 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter GRE.spare4 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter GRE.spare5 TBD 64
SCP Statistics
Table 9-16 describes the statistics that will be collected as part of the
SCP Accounting Element group. All statistics in this group apply only
to CTP servers.
Table 9-16
SCP Counters
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This counter gives the time difference in seconds between the start and stop of the
statistics collection period. This counter facilitates a more accurate analysis of the
statistics for a given accounting interval.
Counter element Reporting SCP.ReportingInterval Gauge 32
interval
The IP Address of the SCP server.
SCP Server SCP.Server Identifier 32
This counter shows the number of Initial Authorizations sent from the GGSN to a
Prepaid server. An Initial Authorization is either an Initial Authorization request
message, or a coupon being newly requested in a Mid-Call Authorization request
message. An Initial Authorization request message always counts as one Initial
Authorization, regardless of whether it includes suggested coupon rates (such as in
a CTPv3 Rate Request IE).
once for each rated coupon included in a successful Mid-Call Authorization response
message whose coupon rate was included in a CTPv3 Rate Request IE in the
corresponding request, and whose Include Reason indicates a successful
authorization.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This counter shows the number of Reauthorizations sent from the GGSN to a Prepaid
server. A Reauthorization is either a request to authorize additional prepaid
resources for a GTP context, or a request to authorize additional prepaid resources
for a specific prepaid coupon of a GTP context.
once for each Mid-Call Authorization request message sent that contains no prepaid
coupons; and
once for each prepaid coupon included in a Mid-Call Authorization request message
whose Include Reason indicates a reauthorization is being requested (i.e. a return is
not being requested).
This counter is not incremented for coupon rates included in a CTPv3 Rate Request
IE in a Mid-Call Authorization request message.
Number of SCP.AttReauthReq Counter 32
Reauthorizations sent
This counter shows the number of successful Reauthorizations. A Reauthorization is
defined in the description of SCP.AttReauthReq. A successful Reauthorization is a
Reauthorization that is approved by a Prepaid server.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This counter shows the number of successful Final Report response messages
received by the GGSN from a Prepaid server.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This counter shows the number of denied Authorizations. An Authorization is either
an Initial Authorization (defined in the description of SCP.AttAuthReq) or a
Reauthorization (defined in the description of SCP.AttReauthReq). A denied
Authorization is an Authorization that is denied by a Prepaid Server.
once for each unsuccessful Mid-Call Authorization response message for which the
corresponding request message included no prepaid coupons;
once for each prepaid coupon that is explicitly denied in a successful Mid-Call
Authorization response message, and that is also included in the set of coupons
being either newly requested or reauthorized (but not returned) in the corresponding
request message.
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Number of returned SCP.ReturnCoupon.LifeTim Counter 32
coupons due to Lifetime eExpiry
Expiry.
This counter shows the number of GTP contexts taken down because rated coupons
are returned by a Prepaid server for a GTP context to which no CBB policy applies
ISP-IP Statistics
Table 9-17 describes the counters that will be collected as part of the
ISP-IP Accounting Element group. The ISP-IP statistics counts all IP
traffic that is sent and received on a particular ISP, not just subscriber
data plane traffic.
Table 9-17
ISP-IP Counters
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This counter gives the time difference in seconds between the start and stop of
the statistics collection period. This counter facilitates a more accurate analysis
of the statistics for a given accounting interval.
Counter element Reporting IP.ReportingInterval Gauge 32
interval
This measurement provides the number of IP packets received and is
incremented on receipt of an IP packet on the Gi interface.
IP Packets Received IP.IncDataPkt Counter 64
This measurement provides the number of IP packets sent and is incremented
on transmission of an IP packet on the Gi interface.
IP Packets Sent IP.OutDataPkt Counter 64
This measurement provides the number of IP octets received and is incremented
on receipt of an IP packet on the Gi interface.
IP Octets Received IP.IncDataOct Counter 64
This measurement provides the number of IP octets sent and is incremented on
transmission of an IP packet on the Gi interface.
IP Octets Sent IP.OutDataOct Counter 64
This measurement provides the number of incoming IP packets delivered locally
to an upper level of the protocol stack on the GGSN. (For e.g.: TCP, UDP, ICMP
etc) These IP packets are processed locally on the GGSN and not forwarded.
Number of IP packets IP.LocalDlvdPkt Counter 32
delivered locally
These are locally generated packets on the GGSN (For e.g.: CTP requests,
RADIUS requests etc.) and not received from any outside network element.
Number of IP packets IP.LocalGenPkt Counter 32
locally generated
This measurement provides the number of IP packets that have been fragmented
before transmission.
Number of fragmented IP IP.FragmentedPkt Counter 32
packets
This measurement provides the number of IP packets that have been
reassembled after being received.
Number of reassembled IP IP.ReassembledPkt Counter 32
packets
This measurement provides the number of IP fragments transmitted.
Number of transmitted IP IP.OutFragments Counter 32
fragments
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
This measurement provides the number of IP packets that could not be
fragmented before transmission.
Number of IP packets that IP.NoFragmentPkt Counter 32
could not be fragmented
This measurement provides the total number of bad IP packets. Packets are
classified as bad if they have a bad checksum, the packet length is too short, not
enough data is contained within the packet, the IP header length is bad, or the IP
version is bad.
Total number of bad IP IP.BadPkt Counter 32
packets
This measurement provides the number of incoming IP packets received which
are for an unreachable destination.
Number of IP packets IP.DestUnrchPkt Counter 32
received for an unreachable
destination
This measurement provides the total number of dropped IP packets. Packets are
dropped due to lack of memory, lack of buffer space, an interface is down, or
due to packet classification.
Total number of dropped IP IP.DropPkt Counter 32
packets
This measurement provides the total number of IP packets dropped by indexed
services. The indexed services refer to IP services which are supported by the
GGSN and are applied to the subscriber’s data on the Gi interface. This counter
is also incremented when a Content Filter Service drops an IP packet. Packets
can be dropped by the Content Filter Service for several reasons. Some of them
are:
Mobile originated packet is received while waiting for a TCP FIN response packet
from mobile, after GGSN closes connection (following a block/redirect).
Description
Measurement Name 3GPP Name Collection Size
Method (bits)
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter IP.spare1 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter IP.spare2 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter IP.spare3 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter IP.spare4 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter IP.spare5 TBD 32
Table 9-18
Ancillary APN Counters
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This counter gives the time difference in seconds between the start and stop of the
statistics collection period. This counter facilitates a more accurate analysis of the
statistics for a given accounting interval.
Counter element Reporting RAD.ReportingInterval.Apn Gauge 32
interval
The provisioned name of the APN.
APN Name SPM_APN_NAME Identifier 64
character
s
This measurement is incremented upon transmission of RADIUS Accounting Start
messages.
Number of Radius RAD.AcctStartMsgSent.Apn Counter 32
Accounting Start Messages
Sent
This measurement is incremented on receipt of a RADIUS Accounting Start response
message.
Number of Radius RAD.AcctStartResponseRcv Counter 32
Accounting Start d.Apn
Responses Received
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This measurement is incremented on transmission of a RADIUS Accounting Interim
Update message.
Number of Radius RAD.AcctInterimMsgSent.A Counter 32
Accounting Interim Update pn
Messages Sent
This measurement is incremented on receipt of a RADIUS Accounting Interim Update
response message.
Number of Radius RAD.AcctInterimResponseR Counter 32
Accounting Interim Update cvd.Apn
Responses Received
This measurement is incremented upon transmission of RADIUS Accounting Stop
messages.
Number of Radius RAD.AcctStopMsgSent.Apn Counter 32
Accounting Stop Messages
Sent
This measurement is incremented on receipt of a RADIUS Accounting Stop response
message.
Number of Radius RAD.AcctStopResponseRcv Counter 32
Accounting Stop d.Apn
Responses Received
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter RAD.spare1.Apn TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter RAD.spare2.Apn TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter RAD.spare3.Apn TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter RAD.spare4.Apn TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter RAD.spare5.Apn TBD 32
Table 9-19
APN Data Plane Counters
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This counter gives the time difference in seconds between the start and stop of
the statistics collection period. This counter facilitates a more accurate
analysis of the statistics for a given accounting interval.
Counter element Reporting IP.ReportingInterval.A Gauge 32
interval pn
The provisioned name of the APN.
APN Name SPM_APN_NAME Identifier 64
character
s
This measurement provides the number of downlink IP packets received per
APN and is incremented on receipt of a downlink IP packet.
IP Downlink Packets IP.IncDataPkt.Apn Counter 64
Received
This measurement provides the number of uplink IP packets sent and is
incremented on transmission of an uplink IP packet.
IP Uplink Packets Sent IP.OutDataPkt.Apn Counter 64
This measurement provides the number of downlink subscriber data plane IP
octets received and is incremented on receipt of a downlink IP packet.
IP Downlink Octets IP.IncDataOct.Apn Counter 64
Received
This measurement provides the number of uplink subscriber data plane IP
octets sent and is incremented on transmission of an uplink IP packet.
IP Uplink Octets Sent IP.OutDataOct.Apn Counter 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter IP.spare1.Apn TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter IP.spare2.Apn TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter IP.spare3.Apn TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter IP.spare4.Apn TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter IP.spare5.Apn TBD 64
MPLS Statistics
Table 9-20 describes the statistics that will be collected as part of the
MPLS Accounting Element group.
Table 9-20
MPLS Counters
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This counter gives the time difference in seconds between the start and stop of
the statistics collection period. This counter facilitates a more accurate analysis
of the statistics for a given accounting interval.
Counter element Reporting MPLS.ReportingInterva Gauge 32
interval l
This is the VRF ID.
VRF ID MPLS.SpmVrfId Identifier 32
This measurement provides the number of MPLS octets received and is
incremented on receipt of an IP packet on a MPLS interface. The data packet
size is extracted from the packet header and added on to the measurement
value.
MPLS Octets Received MPLS.IncDataOct Counter 64
This measurement provides the number of MPLS octets sent and is incremented
on transmission of an IP packet on a MPLS interface. The data packet size is
extracted from the packet header and added on to the measurement value.
MPLS Octets Sent MPLS.OutDataOct Counter 64
This measurement provides the number of MPLS packets received and is
incremented on receipt of an IP packet on a MPLS interface.
MPLS Packets Received MPLS.IncDataPkt Counter 64
This measurement provides the number of MPLS packets sent and is
incremented on transmission of an IP packet on a MPLS interface.
MPLS Packets Sent MPLS.OutDataPkt Counter 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter MPLS.spare1 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter MPLS.spare2 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter MPLS.spare3 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter MPLS.spare4 TBD 64
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter MPLS.spare5 TBD 64
VRF Statistics
Table 9-21 describes the statistics that will be collected as part of the
VRF Accounting Element group.
Table 9-21
VRF Counters
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This counter gives the time difference in seconds between the start and stop of
the statistics collection period. This counter facilitates a more accurate analysis
of the statistics for a given accounting interval.
Counter element Reporting VRF.ReportingInterval Gauge 32
interval
This is the VRF ID.
VRF ID VRF.SpmVrfId Identifier 32
This measurement provides the total number of packets received by the VRF.
VRF Received Packets VRF.ReceivedPkts Counter 64
This measurement provides the total number of packets forwarded through the
VRF.
VRF Forwarded Packets VRF.ForwardedPkts Counter 64
This measurement provides the total number of packets destined for the VRF.
VRF Delivered Packets VRF.DeliveredPkts Counter 32
This measurement provides the total number of packets generated by the VRF.
VRF Originated Packets VRF.LocalOutPkts Counter 32
This measurement provides the total number of bad IP packets received by the
VRF. Packets are classified as bad if they have a bad checksum, the packet length
is too short, not enough data is contained within the packet, the IP header length
is bad, or the IP version is bad.
VRF Bad packets VRF.BadPkt Counter 32
This measurement provides the number of incoming VRF IP packets received
which cannot be forwarded due to various errors.
VRF Packets Not VRF.CantForward Counter 32
Forwarded.
This measurement provides the total number of dropped VRF IP packets. Packets
are dropped due to lack of memory, lack of buffer space, an interface is down, or
due to packet classification.
VRF Dropped Packets VRF.DropPkt Counter 32
This measurement provides the total number of VRF IP packets dropped by
indexed services. This counter is pegged only for VPN-only VRFs.
VRF Dropped Packets by VRF.DropIndxSvcPkt Counter 32
Indexed Services.
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter VRF.spare1 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter VRF.spare2 TBD 32
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter VRF.spare3 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter VRF.spare4 TBD 32
Spare counter for future enhancement purpose.Initialized to 0 and not pegged.
Spare counter VRF.spare5 TBD 32
DCC Statistics
Table 9-22 describes the statistics that will be collected as part of the
Diameter Credit Control (DCC) Accounting Element group. Diameter
Policy Control is based on DCC. The DCC Accounting Element group
is also used for Diameter Policy Control. The statistics are collected on
a per Diameter server per Diameter profile per ISP basis. The
statistics are collected for the following types of servers:
Table 9-22
DCC Counters
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This counter gives the time difference in seconds between the start and stop of
the statistics collection period. This counter facilitates a more accurate analysis
of the statistics for a given accounting interval.
Counter element Reporting DCC.ReportingInterval Gauge 32
interval
The name of the Diameter Profile.
Diameter Profile Name DCC.ProfileName Identifier 32
character
s
The IP Address of the Diameter server.
Server DCC.Server Identifier 32
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This counter shows the number of Initial Credit Control Requests (CCR) sent
from the GGSN to a Diameter server.
This counter is incremented once for each Credit Control Request message sent
where the CC-Request-Type AVP value is set to INITIAL_REQUEST. However,
the counter is only incremented when the request is sent for the first time. It is
not incremented for requests that are resent via an alternate peer.
This counter is incremented as follows once for each successful Credit Control
Answer message received where the CC-Request-Type AVP value is set to
INITIAL_REQUEST.
This counter is incremented once for each Credit Control Request message sent
where the CC-Request-Type AVP value is set to UPDATE_REQUEST. However,
the counter is only incremented when the request is sent for the first time. It is
not incremented for requests that are resent via an alternate peer.
This counter is incremented as follows once for each successful Credit Control
Answer message received where the CC-Request-Type AVP value is set to
UPDATE_REQUEST.
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
Successful Update Credit DCC.SuccUpdateCCA Counter 32
Control Answer Messages
Received
This counter shows the number of Termination Credit Control Requests (CCR)
sent from the GGSN to a Diameter server.
This counter is incremented once for each Credit Control Request message sent
where the CC-Request-Type AVP value is set to TERMINATION_REQUEST.
However, the counter is only incremented when the request is sent for the first
time. It is not incremented for requests that are resent via an alternate peer.
This counter is incremented as follows once for each successful Credit Control
Answer message received where the CC-Request-Type AVP value is set to
TERMINATION_REQUEST.
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
Re-Auth Request Messages DCC.RARMsgsRcvd Counter 32
Received
This counter shows the number of new rate requests sent from the GGSN to a
Diameter server. An new rate request corresponds to a Rating-Group being
newly requested in an Update Credit Control Request message.
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This counter shows the number of successful Reauthorizations. A
Reauthorization is defined in the description of DCC.AttReauthReq. A
successful Reauthorization is a Reauthorization that is approved by a Diameter
server.
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This counter shows the number of Credit Control messages that the Diameter
server failed due to protocol errors. This counter is incremented when the
GGSN receives a response from the Diameter server with any of the following
Return-Code AVP values:
3001 - DIAMETER_COMMAND_UNSUPPORTED
3002 - DIAMETER_UNABLE_TO_DELIVER
3003 - DIAMETER_REALM_NOT_SERVED
3004 - DIAMETER_TOO_BUSY
3005 - DIAMETER_LOOP_DETECTED
3006 - DIAMETER_REDIRECT_INDICATION
3007 - DIAMETER_APPLICATION_UNSUPPORTED
3008 - DIAMETER_INVALID_HDR_BITS
3009 - DIAMETER_INVALID_AVP_BITS
3010 - DIAMETER_UNKNOWN_PEER (CER only)
4002 - DIAMETER_OUT_OF_SPACE
4003 - ELECTION_LOST
5001 - DIAMETER_AVP_UNSUPPORTED
5010 - DIAMETER_NO_COMMON_APPLICATION
5011 - DIAMETER_UNSUPPORTED_VERSION
5012 - DIAMETER_UNABLE_TO_COMPLY
5013 - DIAMETER_INVALID_BIT_IN_HEADER
5017 - DIAMETER_NO_COMMON_SECURITY
5004 - DIAMETER_INVALID_AVP_VALUE
5005 - DIAMETER_MISSING_AVP
5006 - DIAMETER_RESOURCES_EXCEEDED
5007 - DIAMETER_CONTRADICTING_AVPS
5008 - DIAMETER_AVP_NOT_ALLOWED
5009 - DIAMETER_AVP_OCCURS_TOO_MANY_TIMES
5013 - DIAMETER_INVALID_BIT_IN_HEADER
5014 - DIAMETER_INVALID_AVP_LENGTH
5015 - DIAMETER_INVALID_MESSAGE_LENGTH
5016 - DIAMETER_INVALID_AVP_BIT_COMBO
5140 - DIAMETER_ERROR_INITIAL_PARAMETERS
5141 - DIAMETER_ERROR_TRIGGER_EVENT
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This counter shows the number of Credit Control Requests (Initial, Update, or
Final) denied by the Diameter server because of authentication failure.
For all Diameter servers, once for each unsuccessful Initial Credit Control
Answer message received (irrespective of the set of Rating-Groups included in
the corresponding request);
For DCC and Gx over Gy servers, once for each Rating-Group that is denied in
an Update Credit Control Answer message that is included in the set of Rating-
Groups being either newly requested or reauthorized (but not returned) in the
corresponding request;
For Gx servers, once for each unsuccessful Update Credit Control Answer
message received;
For all Diameter servers, once for each unsuccessful Final Credit Control
Answer message received.
Request failures explicitly DCC.DeniedReq.Authe Counter 32
denied for Authentication ntication
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This counter shows the number of Credit Control Requests (Initial, Update, or
Final) denied by the Diameter server because of authorization failure.
For all Diameter servers, once for each unsuccessful Initial Credit Control
Answer message received (irrespective of the set of Rating-Groups included in
the corresponding request);
For DCC and Gx over Gy servers, once for each unsuccessful Update Credit
Control Answer message for which the corresponding request message
included no Multiple-Services-Credit-Control AVP;
For DCC and Gx over Gy servers, once for each Rating-Group that is denied in
an Update Credit Control Answer message that is included in the set of Rating-
Groups being either newly requested or reauthorized (but not returned) in the
corresponding request;
For Gx servers, once for each unsuccessful Update Credit Control Answer
message received;
For all Diameter servers, once for each unsuccessful Final Credit Control
Answer message received.
Request failures explicitly DCC.DeniedReq.Autho Counter 32
denied for Authorization rization
This counter shows the number of Termination Credit Control Requests sent
with non-exceptional Termination-Reason AVP.
1 - DIAMETER_LOGOUT
2 - DIAMETER_SERVICE_NOT_PROVIDED
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This counter shows the number of Termination Credit Control Requests sent
with a Termination-Reason AVP value of:
3 - DIAMETER_BAD_ANSWER
4- DIAMETER_ADMINISTRATIVE
5- DIAMETER_LINK_BROKEN
6- DIAMETER_SESSION_TIMEOUT
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This counter shows the number of context continued (converted to non-prepaid)
as a result of any failure and Failure Handling is set to “Continue”.
This counter is incremented once for each invalid Charging Rule Base received.
This counter is incremented once for each invalid Charging Rule received.
DHCP Statistics
Table 9-23 describes the statistics that will be collected as part of the
Dynamic Host Configuration Protocol (DHCP) Accounting Element
group.
Table 9-23
DHCP Counters
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
This counter gives the time difference in seconds between the start and stop of
the statistics collection period. This counter facilitates a more accurate analysis
of the statistics for a given accounting interval.
Counter element Reporting DHCP.ReportingInterv Gauge 32
interval al
The IP address of the DHCP server.
DHCP Server DHCP.Server Identifier 32
Number of DHCP Discover messages sent by the GGSN to the DHCP server.
Description
Measurement Name 3GPP Name Collection Size (bits)
Method
Number of DHCP packets that were received from the DHCP server and dropped.
Table 9-24
Local Address Pool Counters
Description
Measurement Name 3GPP Name Collectio Size (bits)
n Method
This counter gives the time difference in seconds between the start and stop of the
statistics collection period. This counter facilitates a more accurate analysis of the
statistics for a given accounting interval.
Counter element Reporting AddrPool.ReportingInterval Gauge 32
interval
IP Address Pool name
Local Address Pool Name AddrPool.AddressPoolNam Identifier 33
e Character
s
Description
Measurement Name 3GPP Name Collectio Size (bits)
n Method
Access Group name
Decremented when an IP address is allocated from the given Local Address pool.
Incremented when an IP address is deallocated for the given Local Address pool.
Free address in the Local AddrPool.FreeAddr Gauge 32
address pool
Number of IP Address which are in use in the address pool.
Incremented when an IP address is allocated from the given Local Address pool.
Decremented when an IP address is deallocated for the given Local Address pool.
Address in use in the local AddrPool.UsedAddr Gauge 32
address pool
The peak of the IP addresses usage during the last reporting interval.
- Incremented during IP Address allocation from the given Local Address Pool.
Remains unchanged.
This counter is reset to the UsedAddr counter value at the start of the next
accounting interval.
Maximum address used. AddrPool.MaxAddrUsed High 32
Tidemark
Gauge
Number of times an IP address is requested from the address pool.
Incremented when an IP address is requested from the given Local Address pool.
Description
Measurement Name 3GPP Name Collectio Size (bits)
n Method
Total attempts to allocate AddrPool.AttAddrAllocation Counter 32
address s
Number of times an IP address is successfully allocated from the address pool.
Incremented when an IP address is allocated from the given Local Address pool.
Total successful attempts AddrPool.SuccAddrAllocati Counter 32
to allocate address. ons
Number of times an IP address is NOT successfully allocated from the address pool
because no address is available.
Incremented when an IP address cannot be allocated from the given Local Address
pool, due to unavailability of IP address.
Address allocation failures AddrPool.FailAddrAllocatio Counter 32
due to unavailability of ns.NoAddr
addresses
Number of times an IP address is released back to the address pool.
Incremented when an IP address is deallocated for the given Local Address pool.
Address released by GGSN AddrPool.TotalAddrFrees Counter 32
Number of addresses that are in Blackout.
Table 9-25
Content Filter Service Statistics
Description
Measurement Name New 3GPP Name Collection Size (bits)
Method
This counter gives the time difference in seconds between the start and stop of the
statistics collection period. This counter facilitates a more accurate analysis of the
statistics for a given accounting interval.
Counter element Reporting CFS.ReportingInter Gauge 32
interval val
The name of the Content Filter Service (CFS) Profile.
CFS Profile Name CFS.ProfileName Identifier 32 characters
The IP address of the CFS server.
IP Address CFS.IpAddress Identifier 32
The port of the CFS server.
Port CFS.Port Identifier 16
The VPN name (if applicable) of the CFS server. If this server is not part of a VPN, this
value will be “NONE”, in which case the accounting element corresponds to the non-VPN
server entry on the ISP. Whether or not the VPN name field is “NONE” depends on
whether or not the Content Filter profile is associated with a VPN or not. Note that a
profile may be used both with a VPN and with the non-VPN domain, simultaneously, in
which case there will be distinct accounting elements reported.
VPN Name CFS.VpnName Identifier 32 characters
The number of Content Decision Requests sent to this server.
Content Decision Requests CFS.RequestsSent Counter 32
Sent
The number of Content Decisions that allow the request to pass through.
Pass through responses CFS.PassThrough Counter 32
received
The number of Content Decisions that redirect the request to another location.
Respond to subscriber CFS.RespToSub.Re Counter 32
redirection response direct
received
The number of Content Decisions that block the request.
Respond to subscriber CFS.RespToSub.Fo Counter 32
forbidden response rbidden
received
The number of Content Decisions where some protocol error occurs.
Protocol error in response CFS.ProtocolError Counter 32
The number of Content Decision Requests that do not receive a response within the
timeout period.
Request time outs CFS.Timeouts Counter 32
Description
Measurement Name New 3GPP Name Collection Size (bits)
Method
Spare counter for future enhancement purposes. Initialized to 0 and not pegged.
Spare counter CFS.spare1 TBD 32
Spare counter for future enhancement purposes. Initialized to 0 and not pegged.
Spare counter CFS.spare2 TBD 32
Spare counter for future enhancement purposes. Initialized to 0 and not pegged.
Spare counter CFS.spare3 TBD 32
Spare counter for future enhancement purposes. Initialized to 0 and not pegged.
Spare counter CFS.spare4 TBD 32
Spare counter for future enhancement purposes. Initialized to 0 and not pegged.
Spare counter CFS.spare5 TBD 32
• Memory - “~/log/region<n>/device<n>/mem.acc”
• Session Mgmt - “~/log/region<n>/device<n>/isp<n>/sm.acc”
• GTP Data - “~/log/region<n>/device<n>/isp<n>/gtp.acc”
• GTP Accounting - “~/log/region<n>/device<n>/isp<n>/gtpp.acc”
• RADIUS - “~/log/region<n>/device<n>/isp<n>/rad.acc”
• APN - “~/log/region<n>/device<n>/isp<n>/apn.acc”
• CGF - “~/log/region<n>/device<n>/isp<n>/cgf.acc”
• L2TP - “~/log/region<n>/device<n>/isp<n>/l2tp.acc”
• L2IP - “~/log/region<n>/device<n>/isp<n>/l2ip.acc”
• IPSec - “~/log/region<n>/device<n>/isp<n>/ipsec.acc”
• Overload - “~/log/region<n>/device<n>/overload.acc”
• Wireless Services - “~/log/region<n>/device<n>/isp<n>/
wireless.acc”
• ISP-IP - “~/log/region<n>/device<n>/isp<n>/isp.acc”
• SCP - “~/log/region<n>/device<n>/isp<n>/scp.acc”
• GRE - “~/log/region<n>/device<n>/isp<n>/gre.acc”
• Ancillary APN - “~/log/region<n>/device<n>/isp<n>/
ancillary_apn.acc”
• APN Data - “~/log/region<n>/device<n>/isp<n>/apndata.acc”
• MPLS - “~/log/region<n>/device<n>/isp<n>/mpls.acc”
• VRF - “~/log/region<n>/device<n>/isp<n>/vrf.acc”
• DCC - “~/log/region<n>/device<n>/isp<n>/dcc.acc”
• DHCP - “~/log/region<n>/device<n>isp<n>/dhcp.acc”
• Local Address Pool - “~/log/region<n>/device<n>isp<n>/
localaddrpool.acc”
• VPRN - “~/log/region<n>/device<n>/isp<n>/vprn.acc”
• VPRN Link - “~/log/region<n>/device<n>/isp<n>/vprnlink.acc”
• CFS - “~/log/region<n>/device<n>/isp<n>/cfs.acc”
CSV File Creation and Removal
Figure 9-1
CSV File Generation on SCS Log Server
At the end of the collection interval for accounting elements, the data
for that interval are stored in a holding container on the GGSN. Within
the next five minutes, each accounting element instance which has
been saved in a holding container is reported randomly to the SCS
Log Server. As each instance is received, the Log Server writes the
data received into the corresponding accounting element-specific ACC
file. At the same time, the Log Server also writes those same data
records into the CSV file corresponding to the region and device of the
statistics received. The ACC is a binary file and CSV is a comma
delimited ASCII file. The Log Server continuously starts an internal
timer based on the values it reads from the input file ‘~/log/
To summarize, there are three different time intervals that are relevant
to CSV file creation:
Figure 9-2
CSV File Generation Time Periods
External
Device
SCS CSV
File Generation
Period
SSG
Reporting
Period
SSG
Collection
Period
Memory 7 GGSN_Mem_Stat
s
RADIUS 17 RADIUS_ACCT_St
ats
APN 10 perAPN_Stats
CGF 12 per_CGF_Stats
L2TP 16 L2TP_Stats
L2IP 15 L2TP_IPSec_Stats
IPSec 14 IPSec_Stats
Overload 8 GGSN_Overload_
Stats
Wireless Services 18 Wireless_Service
s_Stats
ISP-IP 3 ISP_IP_Stats
SCP 21 SCP_Stats
GRE 20 GRE_Stats
VRF 23 VRF_Stats
MPLS 29 MPLS_Stats
DCC 30 DCC_Stats
DHCP 32 DHCP_Stats
CFS 34 CFS_Stats
conditions between the GGSN’s to the SCS Log Servers, and the
processing capacity of the SCS Log Servers, it is possible that the
CSV file may not contain all the records from the previous SSG
Collection Period. A record may be processed into a later CSV file if
the factors listed above are severe enough to cause statistical record
processing at the SCS Log Server to overflow the CSV file generation
period. The timestamp data fields in the records should accurately
indicate the SSG Collection Period during which the data was
collected.
The SCS Log Server writes the CSV file in the specific directory
depending on the region and device. The device based CSV file is
located at:
“~/log/preside/region<x>/device<y>/
region<x>_device<y>_<timestamp>_<seq. #>.csv”
where ‘x’ and ‘y’ are the region and device numbers.
The directory ‘~’ in this example is the SCS head directory where the
SCS Server software is installed.
“~/log/preside/region1/device1/
region1_device1_200211272230_055.csv”
Figure 9-3
An Example of Device Based CSV File
The timestamps in the CSV file are as per the Log Server time. For
example, if there is a GGSN in different time zone (e.g. Pacific time
zone or Eastern time zone) and the SCS Log server is in the Central
time zone, then all the records generated at 9:00 AM Central time (i.e.
7:00 AM pacific and 10:00 AM Eastern) have the same time string
“09:00:00 CST”.
Figure 9-4
Sample SCSLogTimerInterval.config file
#The valid values for Timer Interval is 0, 5, 15, 30, and 60 minutes.
#The value of 0 will stop generating *.csv files.
#Thu Mar 27 13:57:10 CST 2003
CSVFileInterval=5
Figure 9-5
Sample SCSCronCleancsv.txt
#59 23 is 11:59pm
#SCSHead is /opt/SER
#days old is 7
#user id is pmuser
#This script wakes up every 24 hours to clean *.csv that are
59 23 * * * ksh -e '/opt/SER/bin/SCSCleanLogcsv.ksh 7 pmuser‘
# __ days old.
Follow these steps to run the cron job on the SCS Log Server:
The View Privileges column indicates the view privileges needed for
the user profile to be able to monitor the accounting element. The real-
time monitoring doesn’t cover all counters in each accounting
element. Only the counters with Gauge collection method are included
in the historical statistics monitoring.
Table 9-27
Real-time Statistics Monitoring
SM.NbrActL2tpCtxt
SM.NbrActL2ipCtxt
SM.NbrActRoamerCtxt
SM.NbrActGreCtxt
SM.NbrActPrepaidCtxt
SM.NbrActMPLSCtxt
SM.MaxNbrActPdpCtxt.Apn
SM.NbrActPdpCtxt.Apn.Bgrd.Low
SM.NbrActPdpCtxt.Apn.Intact.Low
SM.NbrActPdpCtxt.Apn.Strm.Low
SM.NbrActPdpCtxt.Apn.Conv.Low
SM.NbrActPdpCtxt.Apn.Bgrd.Medium
SM.NbrActPdpCtxt.Apn.Intact.Medium
SM.NbrActPdpCtxt.Apn.Strm.Medium
SM.NbrActPdpCtxt.Apn.Conv.Medium
SM.NbrActPdpCtxt.Apn.Bgrd.High
SM.NbrActPdpCtxt.Apn.Intact.High
SM.NbrActPdpCtxt.Apn.Strm.High
SM.NbrActPdpCtxt.Apn.Conv.High
SM.NbrDynActPdpCtxt.Apn
SM.NbrStaticActPdpCtxt.Apn
Figure 9-6
Device Monitoring HistStats Page - Device View
Figure 9-7
Device Monitoring HistStats Page - Connection ISP view
Figure 9-8
Device Monitoring HistStats Page - Gn ISP view
Figure 9-9
Monitoring Window example - APN
The polling interval at the bottom of the screen sets the interval for
retrieving the counters values from 5 - 300 seconds and the default is
30 seconds. Notice the LastPollTime column indicates the same time
differences as the set polling interval.
• Device OMs
• Trunk OMs
• VPRN OMs
• VPRN Link OMs
When using SCSLogCat utility to view the SER Base OM ACC files on
the SCS Log Server, the start time and the stop time are the same and
it is the OM collection timestamp.
Device OMs
The device OMs are summarized in Table 9-28.
Table 9-28
SER Base Device OMs
Trunk OMs
The trunk OMs are summarized in Table 9-29.
Table 9-29
SER Base Trunk OMs
VPRN OMs
The VPRN OMs are summarized in Table 9-30.
Table 9-30
SER Base VPRN OMs
Table 9-31
SER Base VPRN Link OMs
OM Monitoring
OM monitoring can be triggered and viewed by clicking on any tab on
Device Manager Monitoring page. The OM for that tab can be
monitored and saved to a disk file. The OM log file is located in “~/log/
Monitor_log/Device#” directory. The OM monitoring is on a per device
basis, the OM belongs to one group on a device is stored in one file.
All these OM files are in binary format, they can be viewed via
SCSLogCat utility.
• Multicast
• ARP
• IP
• ICMP
• IPSec
• TCP
• UDP
• IGMP
• GRE
Please refer to GGSN CLI Reference Guide (411-5221-922) for the
detailed information of CLI statistics on the Nortel GGSN node. The
CLI statistics are different from the historical statistics and other OMs
in that these CLI statistics only exist when the protocols or tunnels are
active. IPSec and GRE statistics are persistent for the life of the
associated ISP.
Alarms 9
The Nortel GGSN contains a SNMP Agent which is used for SNMP
trap management. The SNMP Agent notifies SNMP Managers of
many different types of traps utilizing different trap MIB objects. The
SNMP traps are sent from SNMP Agent to the managers for trap
notification purpose.
The SNMP Agent generates different types of traps and the following
SNMP traps are relevant to the Nortel GGSN:
The SNMP Agent on the Nortel GGSN sends all SNMP traps to the
SCS Server. It can also be configured to forward traps directly to other
SNMP Managers.
The Nortel GGSN generates alarms which originate from the event
manager.
Figure 9-10
Nortel GGSN SNMP Alarm System
Nortel GGSN
ps
P Tra
M
SN
SCS Server
Event SNMP
Manager Agent SNM
P Tr
aps
Other SNMP
Managers
A replay facility for the SNMP traps is now supported. The GGSN
maintains a list of all the recent traps associated with the alarms for the
all entities that are not included in the MIB. When requested, it can
replay the traps in the order they were originally sent, effectively
repopulating the Fault management system with the current alarm list.
The trigger to send the trap list is a CLI command on the GGSN. 100
recently generated traps are saved. The replay facility of the SNMP
traps may contain duplicate traps.
Table 9-32
GGSN AAAmgr Address Pool Category Alarms
Table 9-33
New MIB Notification Object Name
ssg5000TrapAddressPoolName string
ssg5000TrapIspName string
ssg5000TrapThresholdLevel integer32 (0..100)
ssg5000TrapTotalAddr integer32
ssg5000TrapTotalAddrUsed integer32
ssg5000TrapOccurClearTag alarmOccur(1),
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel GGSN
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
The OID for the Address Pool Alarm Notification object is:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000HAddressPoolAlarmNotification(
14)
Table 9-35
SNMP GGSN GTP ALARM MIB Notification Object
gtpApnDisabled(2)
gtpApnSessionLmtReached(3)
gtpApnBlacklisted(4)
ssg5000TrapOccurClearTag alarmOccur(1),
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000GTPAlarmNotification(56)
Table 9-36
GGSN GTP Events
Table 9-37
SNMP GGSN GTP EVENT MIB Notification Object
gtpGgsnAclApnAssoc(2)
gtpGgsnAclApnDisassoc(3)
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000GTPEventNotification(57)
Table 9-38
GGSN GTP Accounting Alarms
Table 9-39
SNMP GGSN GTP Accounting ALARM MIB Notification Object
gtpAcctNoCgfAvailable(2)
gtpAcctFtpServerDown(3)
gtpAcctFtpAllServersDown(4)
alarmClear(2)
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000GTPAcctAlarmNotification(58)
Table 9-40
GGSN GTP Accounting Events
Table 9-41
SNMP GGSN GTP EVENT MIB Notification Object
ssg5000GtpAcctEventId gtpAcctCgfSwact(1)
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
Below is an OID for the SNMP GTP Account event notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000GTPAcctEventNotification(59)
Table 9-42
SNMP Generic Event MIB Notification Object
ssg5000EventCategory 76
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000EventNotification(24)
Table 9-43
GGSN Prepaid Service Alarms
Table 9-44
SNMP GGSN Prepaid Service Alarm MIB Notification Object
ssg5000SCPAlarmId noScpAvailable(1)
ssg5000TrapOccurClearTag alarmOccur(1),
alarmClear(2)
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000SCPAlarmNotification(60)
Table 9-45
GGSN WAP Alarms
Table 9-46
SNMP GGSN WAP Alarm MIB Notification Object
wrlsAppServerUnactivated(2)
ssg5000TrapOccurClearTag alarmOccur(1),
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel GGSN
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000WrapAlarmNotification(61)
Table 9-47
GGSN ISP Manager Alarms
Table 9-48
SNMP GGSN ISP Manager Alarm MIB Notification Object
ssg5000ISPAlarmId ispOperStateDown(1)
ssg5000TrapOccurClearTag alarmOccur(1),
alarmClear(2)
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000ISPAlarmNotification(62)
Table 9-49
GGSN ISP Manager Events
Table 9-50
SNMP GGSN ISP Manager Event MIB Notification Object
ssg5000ISPEventId ispAddFailed(1)
ispAddrPoolActivationFailed(2)
ssg5000TrapIspName A trap variable object for providing
the ISP Name
major(2),
minor(4),
info(8)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000ISPEventNotification(63)
Table 9-51
GGSN RADIUS Accounting Alarms
Table 9-52
SNMP GGSN RADIUS Accounting Alarm MIB Notification Object
ssg5000AAAAlarmId aaaDiskWriteError(1),
aaaWritingToDisk(2),
aaaAuthServerUnreachable(3)
ssg5000TrapOccurClearTag alarmOccur(1),
alarmClear(2)
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000AAAAlarmNotification(64)
Table 9-53
GGSN RADIUS Accounting Events
Table 9-54
SNMP GGSN RADIUS Accounting Event MIB Notification Object
ssg5000GGSNAAAEventId aaaNoAcctProfile(1),
aaaNoAcctServer(2),
aaaNoPrimaryServer(3),
aaaAcctOffTimeout(4),
aaaAddrPoolDeletionFailed(5)
major(2),
minor(4),
info(8)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000GGSNAAAEventNotification(65)
Table 9-55
GGSN LI Alarms
A 5-minute timer is
started when the
alarm is raised.
The alarm clears
only after the timer
expires and the
TCP connections
to all DFs are up.
Otherwise, the
alarm remains
raised and the
timer is restarted.
Table 9-56
SNMP GGSN LI Alarm MIB Notification Object
liDfLinksDown(2)
ssg5000TrapOccurClearTag alarmOccur(1),
alarmClear(2)
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000LIAlarmNotification(66)
CPU Alarms
Each CMC card has two CPUs - Processor 0 and Processor 1 and
each SSC card has four CPUs. When any one of these processors is
overloaded, an alarm indication is sent. A MIB notification object has
been created to send overload alarm notification. These alarms are
informational only, no action is required from the operator. “CPU Total
Overload” and “CPU Interrupt Overload” have been defined for
overload alarms. The overload condition alarms are given in Table 9-
57.
Table 9-57
CPU Overload Condition Alarms
Memory Alarms
When Processor 0 system memory on the active CMC card is over
utilized an alarm indication is sent. These alarms are informational
only, no action is required from the operator. An “Memory Overload”
alarm type is defined for overload alarms. The overload condition
alarms are illustrated in Table 9-58.
Table 9-58
Memory Overload Condition Alarms
>= 512 KB
block sizes
Level 1 < 100 MB Free MINOR Memory Overload
OR Level 1
< 64 KB block
sizes
Table 9-59
Disk Capacity Overload Condition Alarms
Table 9-60
RADIUS Accounting File Alarm
Level 2 > 5000 & < 6000 MAJOR "WARNING: %s [dirname] has
%d
[ssg5000TrapOverloadResour
ceValue] files (suggested
maximum is %d [maxnum]
Table 9-61
GTP Accounting File Alarm
Table 9-62
SNMP Overload Alarm MIB Notification Object
P0=1
P1=2
P2=3
P3=4
CPU_INTERRUPT_OVERLO
AD = 1
MEMORY_OVERLOAD =2
BANDWIDTH_OVERLOAD=
3
SSP_RESOURCE_OVERLO
AD=4
RPC_BUFFER_OVERLOAD
=5
DISK_CAPACITY_OVERLO
AD=6
ENCRYPTION_SSP_OVERL
OAD=7
ssg5000TrapOverloadLevel NORMAL =0
LEVEL_1 = 1
LEVEL_2 = 2
LEVEL_3 = 3
ssg5000TrapOverloadResourc integer
eValue
ssg5000TrapOverloadAlarmDe A valid text string
scription
ssg5000TrapSSGHostAddress IP address of GGSN
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
ssg5000EventCategory Disk Capacity category (81)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000OverloadAlarmNotification(18)
The following table shows new objects that are defined for the Nortel
GGSN to support an overload MIB notification object.
Table 9-63
Nortel GGSN Overload MIB Notification
Table 9-64
SNMP Generic Event MIB Notification Object
ssg5000EventId 4
ssg5000EventCategory 81
Table 9-65
SNMP Generic Event MIB Notification Object
ssg5000EventId 5
ssg5000EventCategory 81
ssg5000TrapSeverity info(8)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000EventNotification(24)
Table 9-66
Patch Manager Alarms
Table 9-67
Trap Patch Alarm MIB Notification Object
major(2),
minor(4),
info(8)
ssg5000TrapPatchSyncStatus 0 - In Sync
1 - Out of Sync
ssg5000TrapSSGHostAddress IP address of GGSN
ssg5000TrapOccurClearTag alarmOccur(1),
alarmClear(2)
Below is the OID for the SNMP Trap Patch Alarm Notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000TrapPatchAlarmNotification(72)
Table 9-68
GGSN DCC Alarms
Table 9-69
SNMP GGSN DCC Alarm MIB Notification Object
dccOnlineServerUnreachable(2)
Server IP Address.
ssg5000TrapOccurClearTag alarmOccur(1),
alarmClear(2)
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000DCCAlarmNotification(69)
Table 9-70
GGSN DCC SNMP Events
Table 9-71
SNMP GGSN DCC Event MIB Notification Object
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000DCCEventNotification(81)
Table 9-72
GGSN Health Check Monitor Alarms
Table 9-73
SNMP GGSN Health Check Monitor Alarm MIB Notification Object
hcmNetworkActivationSuccessRateD
rop(2),
hcmNoActivationAttempt(3)
Attempted activations.
ssg5000TrapOccurClearTag alarmOccur(1),
alarmClear(2)
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
Below is the OID for the Health Check Monitor Alarm Notification
object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000HCMAlarmNotification(82)
Content Filter
The following new alarms are added for the Content Filter functional
area.
Table 9-74
GGSN CFS Alarms
Table 9-75
SNMP GGSN CFS Alarm MIB Notification Object
cfsServerUnavailable(2)
ssg5000TrapIspName A trap variable object for
displaying the ISP name.
ssg5000TrapVPNName A trap variable object for
displaying the VPN name, if
applicable or <none> if the profile
is not in use on a VPN
ssg5000TrapProfileName A trap variable object indicating
the profile name.
ssg5000ServerIpAddr A trap variable object for
displaying the CFS server IP
address.
ssg5000TrapPortId A trap variable object for
displaying the CFS server port.
ssg5000TrapOccurClearTag alarmOccur(1),
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000CfsAlarmNotification(70)
Table 9-76
SNMP AAA Events
Table 9-77
SNMP AAA Event MIB Notification Object
aaaDisconnectSuccess(2)
aaaDisconnectFailure(3)
aaaDisconnectIgnore(4)
aaaAcctNullUsername(5)
aaaAcctLongUsername(6)
aaaFreeBadReply(7)
aaa2ndSessionForConn(8)
aaaFreeBadAuth(9)
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000AAAEventNotification(26)
Table 9-78
SER Base SNMP SCS Sync Alarms
Table 9-79 defines the SER base SNMP SCS Sync alarms MIB object.
The notification signals that the SNMP agent detects the alarm status
of the synchronization between SCS region server and GGSN.
Table 9-79
SNMP SCS Sync Alarm MIB Notification Object
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
Below is an OID for the SER base SCS Sync alarm notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000SCSSyncNotification(20)
Table 9-80
SER Base SNMP SCS Server Alarms
Table 9-81 defines the SER base SNMP SCS Server alarms MIB
object. The notification signals that the SNMP agent detects the alarm
status of the connection between SCS server and GGSN is up or
down and SCS Server location.
Table 9-81
SNMP SCS Server Alarm MIB Notification Object
logServerLog(2)
pullServer(3)
regionServer(4)
monitoringServer(5)
logServerAccounting(6)
ssg5000TrapSCSServerIpAddr A trap variable object for
providing the SCS IP address
ssg5000TrapSCSServerPortNu A trap variable object for
mber providing the SCS Server Port
number
ssg5000TrapOccurClearTag alarmOccur(1)
alarmClear(2)
major(2),
minor(4),
info(8)
Below is an OID for the SER base SCS Server alarm notification
object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000SCSServerNotification(21)
Table 9-82
SER Base SNMP System Alarms
Table 9-83 defines the SER base SNMP System alarm MIB object.
The notification signal the SNMP agent detects an alarm status in the
system.
Table 9-83
SNMP System Alarm MIB Notification Object
nodeReboot(2)
fanDead(3)
fanFailure(4)
temperatureOverheat(5)
dcPowerFailure(6)
acDcShelfFailure(7)
acDcShelfOverheat(8)
batteryFailure(9)
batteryOverheat(10)
pcmciaCardInserted(11)
pcmciaCardRemoved(12)
sysSSMsAreUp(13),
multipleFanFailure(14)
ssg5000TrapOccurClearTag alarmOccur(1)
alarmClear(2)
major(2),
minor(4),
info(8)
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000SysAlarmNotification(2)
MAJOR alarmOccu Card out of service The card has been removed
r from its slot.
CRITICAL alarmOccu Card failed in boot The card has failed one or
r more diagnostics tests
during booting.
CRITICAL alarmOccu Card dead CMC can not talk to the card.
r
Card INFORMA alarmOccu PCMCIA card inserted PCMCIA card has been
TION r inserted into the chassis or
detected at boot time.
Table 9-85 defines the SER base SNMP Card alarms MIB object. The
notification signal the SNMP agent detects an alarm status in the card.
Table 9-85
SNMP Card Alarm MIB Notification Object
cardInserted(2)
cardRemoved(3)
cardMismatch(4)
cardBoot(5)
cardReboot(6)
cardRevMismatch(7)
cardFailed(8)
cardMalfunction(9)
cardFailDiag(10)
cardDead(11)
cardSwitchToActive(12)
cardStandbyNotInRedundant(13)
cardPcmciaInserted(14)
cardPcmciaRemoved(15)
cardSwitchoverInitiatedByUser(1
6)
cardSwitchoverInitiatedInternal(1
7)
cardEnable(18)
cardDisable(19)
cardUp(20)
cardUnconfigured(21)
ssg5000TrapSlotId A trap slot ID for slot number
controlManagementCard(1)
subscriberServiceCard(2)
switchFabricCard(3)
oc3AtmLineCard(4)
ds3AtmLineCard(5)
hsiLineCard(6)
e3AtmLineCard(7)
oc12SAtmLineCard(8)
oc12DAtmLineCard(9)
cardTypeUnknown(10)
ds3ChannelizedFrameCard(11)
ethernetLineCard(12)
gigabitEthernetLineCard(13)
oc3stm1ChannelizedFrameCard(
14)
controlManagementCard3(19)
subscriberServiceCard3(22)
switchFabricCard2(24)
ssg5000TrapOccurClearTag alarmOccur(1)
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1)
major(2)
minor(4)
info(8)
Below is an OID for the SER base Card alarm notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000CardAlarmNotification(3)
Table 9-86
SER Base SNMP Card Events
Table 9-87 defines the SER base SNMP Card Event MIB object.
Table 9-87
SNMP Card Event MIB Notification Object
cardIgnored(2)
cardFoundUnusable(3)
cardLeftDown(4)
cardReprogrammedSuccess(5)
cardReprogrammedFail(6)
ssg5000TrapSlotId A trap slot ID for slot number
ssg5000EventDescr A trap object for describing card
manager event
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1)
major(2)
minor(4)
info(8)
Below is an OID for the SER base Card Event notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000CardEventNotification(28)
Table 9-88
SER Base SNMP Port Alarms
ALC INFORMATION alarmClear ALC Port The port on the ALC card family
Port Up is administratively enabled.
MAJOR alarmOc- ALC Port The port on the ALC card family
cur Down is administratively disabled or
some alarms (i.e. LOS, LOF)
caused the port to become dis-
abled operationally.
ALC INFORMATION alarmClear ALC Line Line layer RDI (Remote Defect
Port RDI Indication) condition has been
cleared
Table 9-89 defines the SER base SNMP ATM Port alarms MIB object.
The notification signals that the SNMP agent detects an alarm status
in the ATM port.
Table 9-89
SNMP ATM Port Alarm MIB Notification Object
portDown(2),
portLoop(3),
portLOS(4),
portLOF(5),
portLAIS(6),
portLRDI(7),
portLOP(8),
portPAIS(9),
portPRDI(10),
portLCD(11),
ssg5000TrapSlotId A trap slot ID for slot number
controlManagementCard(1)
subscriberServiceCard(2)
switchFabricCard(3)
oc3AtmLineCard(4)
ds3AtmLineCard(5)
hsiLineCard(6)
e3AtmLineCard(7)
oc12SAtmLineCard(8)
oc12DAtmLineCard(9)
cardTypeUnknown(10)
ds3ChannelizedFrameCard(11)
controlManagementCard3(19)
ssg5000TrapPortId A trap port ID for port number
ssg5000TrapOccurClearTag alarmOccur(1)
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1),
major(2),
minor(4),
info(8)
Below is an OID for the SER base ATM Port alarm notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000PortAlarmNotification(4).
Table 9-90
SER Base SNMP ALC Events
Table 9-91 defines the SER base SNMP ALC Event MIB object.
Table 9-91
SNMP ALC Event MIB Notification Object
alcPortYellow(2)
alcIcpFailed(3)
ssg5000EventDescr A trap object for describing ALC
event
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1)
major(2)
minor(4)
info(8)
Below is an OID for the SER base ALC Event notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000ALCEventNotification(27)
Table 9-92
SER Base SNMP SSM Alarms
Table 9-93 defines the SER base SNMP SSM alarms MIB object. The
notification signal the agent detects an alarm status in the SSM.
Table 9-93
SNMP SSM Alarm MIB Notification Object
ssmReset(2)
ssmUp(3)
ssmDead(4)
ssmDown(5)
ssg5000TrapSlotId A trap slot ID for slot number
ssg5000TrapCardType cardAbsent(0)
controlManagementCard(1)
subscriberServiceCard(2)
switchFabricCard(3)
oc3AtmLineCard(4)
ds3AtmLineCard(5)
hsiLineCard(6)
e3AtmLineCard(7)
oc12SAtmLineCard(8)
oc12DAtmLineCard(9)
cardTypeUnknown(10)
ds3ChannelizedFrameCard(11)
controlManagementCard3(19)
ssg5000TrapPortId A trap port ID for port number
ssg5000TrapOccurClearTag alarmOccur(1)
alarmClear(2)
major(2)
minor(4)
info(8)
Below is an OID for the SER base SSM alarm notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ER
Experiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPrefix
(2).ssgMIBNotification(0).ssg5000SSMAlarmNotification(5)
Table 9-94
SER Base SNMP SSM Events
MAJOR Core Dump failed for SSM SSM failed to dump core
<portId> in slot <slotId>
Error <errorcode>
MAJOR Reset SSC Card in slot Error detected and SSC card got
<slotId> reset
MAJOR All SSM in slot <slotId> ALL SSM on specific slot have failed
have failed
INFO SSC in slot <slotId> reset SSC has successfully been reset
successfully
(<number_of_ticks>)
MINOR CMC received hello from CMC received invalid slop/port in the
SSM with invalid slot/port: hello message from SSM
<slotId> <portId>
Table 9-95 defines the SER base SNMP SSM Events MIB object.
Table 9-95
SNMP SSM Event MIB Notification Object
ssmErratic(2)
ssmErraticDownload(3)
ssmStartDump(4)
ssmDumpError(5)
ssmFinishDump(6)
ssmRemoveDone(7)
epifChannelDied(8)
sscCardRest(9)
ssmAllFailed(10)
ssmMissPoll(11)
sscConnectionReset(12)
sscConnectionResetOK(13)
ssmBadHello(14)
ssg5000EventDescr A trap object for describing SSM
Info event
ssg5000TrapPortId A trap port ID for port number
major(2)
minor(4)
info(8)
Below is an OID for the SER base SSM Event notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000SSMEventNotification(31)
Table 9-96
SER Base SNMP Ethernet Port Alarms
ETH Port MAJOR alarmOccu ETH Link Down The port is either
r administratively down or
because of some problem
the attached interface is
operationally down.
Table 9-97 defines the SER base SNMP Ethernet Port alarms MIB
object. The notification signals that the SNMP agent detects an alarm
status in the Ethernet port.
Table 9-97
SNMP Ethernet Port Alarm MIB Notification Object
controlManagementCard(1)
subscriberServiceCard(2)
switchFabricCard(3)
oc3AtmLineCard(4)
ds3AtmLineCard(5)
hsiLineCard(6)
e3AtmLineCard(7)
oc12SAtmLineCard(8)
oc12DAtmLineCard(9)
cardTypeUnknown(10)
ds3ChannelizedFrameCard(11)
controlManagementCard3(19)
ssg5000TrapPortId A trap port ID for port number
ssg5000TrapOccurClearTag alarmOccur(1)
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1)
major(2)
minor(4)
info(8)
Below is an OID for the SER base Ethernet Port alarm notification
object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000ETHPortAlarmNotification(8)
Table 9-98
SER Base SNMP ELC Events
Table 9-99 defines the SER base SNMP ELC Event MIB object.
Table 9-99
SNMP ELC Event MIB Notification Object
major(2)
minor(4)
info(8)
Below is an OID for the SER base ELC Event notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ER
Experiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPrefix
(2).ss gMIBNotification(0).ssg5000ELCEventNotification(30)
Table 9-100
SER Base SNMP Config Info Events
Table 9-101 defines the SER base SNMP Configuration Events MIB
object.
Table 9-101
SNMP Config Info MIB Notification Object
configPhase1Failed(2)
configPhase2Loaded(3)
configPhase2Failed(4)
configQsP1Loaded(5)
configQsP1Failed(6)
configQsP2Loaded(7)
configQsP2Failed(8)
configInitialized(9)
configBadCommand(10)
configDbOpError(11)
configProtectImageFiles(12)
configNotProtectImageFiles(13)
ssg5000EventDescr A trap object for describing
config info event
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1)
major(2)
minor(4)
info(8)
Below is an OID for the SER base Config Info notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000ConfigInfoNotification(29)
Table 9-102
Config Object Changes MIB Notification Object
major(2)
minor(4)
info(8)
Below is an OID for the base SER Service alarm notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000ConfigObjectChangesNotificatio
n(22)
Table 9-103
GGSN Memory changed event
CMC INFO Redundant CMC has sent Memory of CMC has been
memory size to Active CMC changed
Table 9-104 defines the base SER BSN Memory Changed Event. The
GGSN Memory Changed Event indicates that the redundant CMC has
Table 9-104
SNMP GGSN Memory Changed MIB Notification Object
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).SE
RExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPrefix(
2).ssgM IBNotification(0).ssg5000MemoryChangeNotification(23)
Table 9-105
SER Base SNMP VPN Mesh Alarms
Table 9-106 defines the SER base SNMP VPN Mesh alarms MIB
object. The notification signals that the SNMP agent detects an alarm
status in VPN.
Table 9-106
SNMP VPN Mesh Alarm MIB Notification Object
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1)
major(2)
minor(4)
info(8)
Below is an OID for the SER base VPN Mesh alarm notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ER
Experiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPrefix
(2).ss gMIBNotification(0).ssg5000VPNMeshtAlarmNotification(13)
Table 9-107
SER Base SNMP System Monitor Alarms
Table 9-108 defines the SER base SNMP VPN Mesh alarms MIB object.
Table 9-108
SNMP System Monitor Alarm MIB Notification Object
controlManagementCard(1)
subscriberServiceCard(2)
switchFabricCard(3)
oc3AtmLineCard(4)
ds3AtmLineCard (5)
hsiLineCard(6)
e3AtmLineCard(7)
oc12SAtmLineCard(8)
oc12DAtmLineCard(9)
cardTypeUnknown(10)
ds3ChannelizedFrameCard(11)
controlManagementCard3(19)
ssg5000TrapPortId A trap port ID for port number
ssg5000TrapThresholdLevel A trap variable object for
providing the threshold level
ssg5000TrapSubscriberCount A trap variable object for
providing the subscriber count
ssg5000TrapOccurClearTag alarmOccur(1)
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1)
major(2)
minor(4)
info(8)
Below is an OID for the SER base System Monitor alarm notification
object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ER
Experiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPrefix
(2).ssgMIBNotification(0).ssg5000SysmonAlarmNotification(25)
Table 9-109
SER Base SNMP L2TP Alarms
Table 9-110 defines the SER base SNMP L2TP alarms MIB object.
The notification signals that the SNMP agent detects an alarm status
in L2TP tunnel.
Table 9-110
SNMP L2TP Alarm MIB Notification Object
alarmClear(2)
major(2)
minor(4)
info(8)
Below is an OID for the SER base L2tp Tunnel alarm notification
object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ER
Experiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPrefix
(2).ss gMIBNotification(0).ssg5000L2tpTunnelAlarmNotification(17)
Table 9-111
SER Base SNMP PVC Alarms
Table 9-112 defines the SER base SNMP PVC alarms MIB object.
The notification signals that the SNMP agent detects an alarm status
in a PVC.
Table 9-112
SNMP PVC Alarm MIB Notification Object
controlManagementCard(1)
subscriberServiceCard(2)
switchFabricCard(3)
oc3AtmLineCard(4)
ds3AtmLineCard(5)
hsiLineCard(6)
e3AtmLineCard(7)
oc12SAtmLineCard(8)
oc12DAtmLineCard(9)
cardTypeUnknown(10)
ds3ChannelizedFrameCard(11)
controlManagementCard3(19)
ssg5000TrapPortId A trap port ID for port number
ssg5000TrapInterfaceNumber A trap variable object for
providing Interface number
ssg5000TrapVPINumber A trap variable object for
providing VPI number
ssg5000TrapVCINumber A trap variable object for
providing VCI number
ssg5000TrapOccurClearTag alarmOccur(1)
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapConnectionName A trap variable object for
providing the connection Name
ssg5000TrapSubscriberName A trap variable object for
providing the subscriber Name
major(2)
minor(4)
info(8)
Below is an OID for the SER base PVC alarm notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ER
Experiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPrefix
(2).ss gMIBNotification(0).ssg5000PVCAlarmNotification(6)
Table 9-113
SER Base SNMP Serial Port Alarms
Table 9-114 defines the SER base SNMP PVC alarms MIB object.
The notification signals that the SNMP agent detects an alarm status
in a Serial Port.
Table 9-114
SNMP Serial Port Alarm MIB Notification Object
controlManagementCard(1)
subscriberServiceCard(2)
switchFabricCard(3)
oc3AtmLineCard(4)
ds3AtmLineCard(5)
hsiLineCard(6)
e3AtmLineCard(7)
oc12SAtmLineCard(8)
oc12DAtmLineCard(9)
cardTypeUnknown(10)
ds3ChannelizedFrameCard(11)
controlManagementCard3(19)
ssg5000TrapPortId A trap port ID for port number
ssg5000TrapOccurClearTag alarmOccur(1)
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1)
major(2)
minor(4)
info(8)
Below is an OID for the SER base Serial Port alarm notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ER
Experiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPrefix
(2).ss gMIBNotification(0).ssg5000SerialPortAlarmNotification(19)
Table 9-115
SER Base SNMP Serial Port Configuration Change Event
Table 9-116 defines the associated Alarm MIB object. The notification
signals that the SNMP agent detects a change in the configuration of a
Serial Port.
Table 9-116
SNMP Configuration Change Alarm MIB Notification Object
controlManagementCard(1)
subscriberServiceCard(2)
switchFabricCard(3)
oc3AtmLineCard(4)
ds3AtmLineCard(5)
hsiLineCard(6)
e3AtmLineCard(7)
oc12SAtmLineCard(8)
oc12DAtmLineCard(9)
cardTypeUnknown(10)
ds3ChannelizedFrameCard(11)
controlManagementCard3(19)
ssg5000TrapPortId A trap port ID for port number
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1)
major(2)
minor(4)
info(8)
Below is an OID for the SER base Serial Port alarm notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ER
Experiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPrefix
(2).ss
gMIBNotification(0).ssg5000SerialPortAlarmConfigChangeNotification
(55)
Table 9-117
SER Base SNMP VRF Alarms
Table 9-118 defines the SER base SNMP VRF alarms MIB object. The
notification signals that the SNMP agent detects an alarm status for
VRF.
Table 9-118
SNMP VRF Alarm MIB Notification Object
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1)
major(2)
minor(4)
info(8)
Below is an OID for the SER base VRF alarm notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ER
Experiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPrefix
(2).ss gMIBNotification(0).ssg5000VRFAlarmNotification(38)
Table 9-119
SER Base SNMP LFIB E-LSP Alarms
Table 9-120 defines the SER base SNMP LFIB E-LSP alarms MIB
object. The notification signals that the SNMP agent detects an alarm
status in the E-LSP map.
Table 9-120
SNMP LFIB E-LSP Alarm MIB Notification Object
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1)
major(2)
minor(4)
info(8)
Below is an OID for the SER base LFIB E-LSP alarm notification
object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ER
Experiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPrefix
(2).ss gMIBNotification(0).ssg5000LFIBAlarmNotification(32)
Table 9-121
SER Base SNMP MPLS BE-LSP Alarms
Table 9-122 defines the SER base SNMP MPLS BE-LSP alarms MIB
object. The notification signals that the SNMP agent detects an alarm
status for MPLS BE-LSP.
Table 9-122
SNMP MPLS BE-LSP Alarm MIB Notification Object
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1)
major(2)
minor(4)
info(8)
Below is an OID for the SER base MPLS BE-LSP alarm notification
object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ER
Experiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPrefix
(2).ss gMIBNotification(0).ssg5000MPLSBELSPAlarmNotification(33)
Table 9-123
SER Base SNMP MPLS LDP Alarms
Table 9-124 defines the SER base SNMP MPLS LDP alarms MIB
object. The notification signals that the SNMP agent detects an alarm
status for MPLS LDP.
Table 9-124
SNMP MPLS LDP Alarm MIB Notification Object
alarmClear(2)
major(2)
minor(4)
info(8)
Below is an OID for the SER base MPLS LDP alarm notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ER
Experiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPrefix
(2).ss gMIBNotification(0).ssg5000MPLSLDPAlarmNotification(35)
Table 9-125
SER Base SNMP MPLS TE-LSP Alarms
Table 9-128 defines the SER base SNMP MPLS TE-LSP alarms MIB
object. The notification signals that the SNMP agent detects an alarm
status for MPLS TE-LSP.
Table 9-126
SNMP MPLS TE-LSP Alarm MIB Notification Object
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1)
major(2)
minor(4)
info(8)
ssg5000TrapAdminStatus up (1),
down (2)
ssg5000TrapOperStatus up (1),
down (2)
Below is an OID for the SER base MPLS TE-LSP alarm notification
object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ER
Experiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPrefix
(2).ssgMIBNotification(0).ssg5000MPLSTELSPAlarmNotification(34)
Table 9-127
SER Base SNMP MPLS RSVP-TE Alarms
Table 9-128 defines the SER base SNMP MPLS RSVP-TE alarms
MIB object. The notification signals that the SNMP agent detects an
alarm status for MPLS RSVP-TE.
Table 9-128
SNMP MPLS RSVP-TE Alarm MIB Notification Object
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1)
major(2)
minor(4)
info(8)
Below is an OID for the SER base MPLS RSVP-TE alarm notification
object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).SER
Experiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPrefix(2)
.ssgMIBNotification(0).ssg5000MPLSRSVPTEAlarmNotification(36)
Table 9-129
SER Base SNMP MPLS ISP Interface Alarms
Table 9-130 defines the SER base SNMP MPLS ISP Interface alarms
MIB object. The notification signals that the SNMP agent detects an
alarm status for MPLS ISP Interface.
Table 9-130
SNMP MPLS ISP Interface Alarm MIB Notification Object
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1)
major(2)
minor(4)
info(8)
Below is an OID for the SER base MPLS ISP Interface alarm
notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000MPLSINTFAlarmNotification(37)
Table 9-131
SER Base SNMP MP-BGP Alarms
Table 9-132 defines the SER base SNMP MP-BGP alarms MIB object.
The notification signals that the SNMP agent detects an alarm status
for MP-BGP.
Table 9-132
SNMP MP-BGP MIB Notification Object
alarmClear(2)
ssg5000TrapSSGHostAddress The IP address of the Nortel
GGSN
ssg5000TrapSeverity critical(1)
major(2)
minor(4)
info(8)
Below is an OID for the SER base MP-BGP alarm notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ER
Experiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPrefix
(2).ss gMIBNotification(0).ssg5000BGPAlarmNotification(39)
Table 9-133
SER Base SNMP IKE Tunnel Start Event
Table 9-134 defines the SER base SNMP IKE Tunnel Start Event MIB
object.
Table 9-134
SNMP IKE Tunnel Start Event MIB Notification Object
major (2)
minor(4)
info(8)
Below is an OID for the SER base IKE Event notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000IKETunnelStartNotification(48)
Table 9-135
SER Base SNMP IKE Tunnel Stop Event
IKE INFO IKE tunnel stops with The notification signals the
local Address end of IKE tunnel phase 1.
<ip_addr>, remote
Address <ip_addr>,
subscriber name
<sub_name>, SA Id
<id_number>, VPN Id
<id_number>, tunnel
life time <lifetime> and
cause code
<cause_code>.
Table 9-136 defines the SER base SNMP IKE Tunnel Stop Event MIB
object.
Table 9-136
SNMP IKE Tunnel Stop Event MIB Notification Object
major (2)
minor(4)
info(8)
Below is an OID for the SER base IKE Event notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000IKETunnelStopNotification(49)
Table 9-137
SER Base SNMP IKE Tunnel Not Established Event
Table 9-138 defines the SER base SNMP IKE Tunnel Not Established
Event MIB object.
Table 9-138
SNMP IKE Tunnel Not Established Event MIB Notification Object
major (2)
minor(4)
info(8)
Below is an OID for the SER base IKE Event notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000IKETunnelNotEstablishedNotific
ation(50)
Table 9-139
SER Base SNMP IKE SA Peer Dead Event
Table 9-140
SER Base SNMP IPSEC Tunnel Start Event
Table 9-141 defines the SER base SNMP IPSEC Tunnel Start Event
MIB object.
Table 9-141
SNMP IPSEC Tunnel Start Event MIB Notification Object
major (2)
minor(4)
info(8)
Below is an OID for the SER base IPSEC Event notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000IPSECTunnelStartNotification(5
1)
Table 9-142
SER Base SNMP IPSEC Tunnel Stop Event
IPSEC INFO IPsec tunnel stops with The notification signals the
interface name end of IPSEC tunnel phase
<interface_name>, 2.
tunnel name
<tunnel_name>,
subscriber name
<sub_name> and
cause code
<cause_code_value>.
Table 9-143 defines the SER base SNMP IPSEC Tunnel Stop Event
MIB object.
Table 9-143
SNMP IPSEC Tunnel Stop Event MIB Notification Object
major (2)
minor(4)
info(8)
Below is an OID for the SER base IPSEC Event notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000IPSECTunnelStopNotification(5
2)
Table 9-144
SER Base SNMP IPSEC Tunnel Not Established Event
Table 9-145 defines the SER base SNMP IPSEC Tunnel Not
Established Event MIB object.
Table 9-145
SNMP IPSEC Tunnel Not Established Event MIB Notification Object
major (2)
minor(4)
info(8)
Below is an OID for the SER base IPSEC Event notification object:
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).SER(3199).S
ERExperiment(10).ssg5000ChasisMIB(28).ssg5000MIBNotificationPr
efix(2).ssgMIBNotification(0).ssg5000IPSECTunnelNotEstablishedNot
ification(53)
SNMP Traps
SNMP Authentication Failure Alarm
The detailed information of SNMP Authentication Failure Alarm is
given in Table 9-146.
Table 9-146
SER Base SNMP Authentication Failure Alarm
iso(1).org(3).dod(6).internet(1).snmpV2(6).snmpModules(3).snmpMIB
(1).snmpMIBObjects(1).snmpTraps(5).authenticationFailure(5).
Event Logs 9
The event manager on the Nortel GGSN is used to report and log
events for the GGSN services and functions which includes:
Due to the significant impacts to the CPU utilization when writing all
event logs to the local disk, it is recommended that only event logs
with CRITICAL log type is sent to the log files on the local disk. The
SYSLOG utility is recommended to use for capturing event logs on a
remote server.
Figure 9-11
Nortel GGSN Event Management
log files
Nortel GGSN
Event Logs
(Event Number,
Log Type,
Trap Flag,
Event Text)
Functional Event SNMP
Module Manager Agent
sy
CII
slo
AS
The Subscriber Service Logs on the Logs Manager window via SCS
GUI is not supported by the Nortel GGSN. Displaying the service logs
would impact the system performance greatly.
Table 9-147
GTP Tunnel Event Logs
10 MINOR MINOR <gtp> APN: <apn name> The WAP session can’t be
Session Mode enabled established because of an
and the WAP session invalid response (such as
could not be established incorrect authenticator
on Application Server: value) received from the
<application server application server or
profile name>. insufficient internal
resource available.
Table 9-148
GTP Accounting Event Logs
Table 9-149
FTP Service Event Logs
Table 9-150
RADIUS Accounting Event Logs
15 MAJOR MAJOR ISP <isp> RADIUS Profile Could not contact any
<profile> Cannot contact RADIUS server for the
RADIUS server. Writing specified RADIUS profile.
to disk.
Table 9-151
Prepaid Service Event Logs
3 MINOR MINOR Prepaid CTP invalid IE One of the IEs in the CTP
<Tariff Profile Name = message was incorrectly
“profile name”> <IE Name formatted. Either it was
= “ie name”> <Field Name not possible to decode, or
= “field name”> <Field an invalid value was
Value = “value”> included in one of the IE
fields.
Table 9-152
Disk Capacity Event Logs
If the available disk space is lesser or equal to the reserve disk space,
GTP billing and Radius accounting records won't be saved to the disk.
Two new events will be logged depending on the status of the disk:
The second event will be logged if the available disk space goes over
the reserve space threshold. The value of 'free' in the event message
is greater than the value of 'reserved' space in kilobytes.
If a Standby CMC is available all the disk capacity event logs would be
generated on the standby CMC as well. But the corresponding SNMP
trap is not generated for the standby CMC.
Table 9-153
WAP Service Event Logs
Table 9-154
LI Event Logs
Table 9-155
Overload LOM Event Logs
Table 9-156
Overload COM Event Logs
Table 9-157
ISP Manager Event Logs
Global throttle Rate Limit: This restricts the maximum number of GTP
and GTP Accounting event logs generated per minute. By default this
limit is set to 100 logs/minute.
Per Subsystem Throttle Rate Limit: GTP and GTP Accounting modules
are subdivided into multiple subsystems. This limits the maximum
number of error and warning logs generated per subsystem of GTP
and GTP Accounting. The per subsystem throttle rate is 10 error logs
and 5 warning logs per minute.
The system checks the number of throttled logs every minute and
generates a Warning Event log at console to report the number of logs
throttled The throttling report is generated only if the logs are throttled.
The parameters of throttling functionality survives system reboots.
The event logs related to Log Throttler are detailed in Table 9-158.
Table 9-158
Log Throttler Event Logs
Table 9-159
Memory Trampler Detection Event Logs
Example:
Stack Trace:
Table 9-160
Memory Audit Event Logs
Event SysLog Event Disk & Console Event Text Event Description
Number Severity Log Event
Severity
Event SysLog Event Disk & Console Event Text Event Description
Number Severity Log Event
Severity
Table 9-161
Patching Event Log
OK to apply profile
OK to apply profile log is generated when the user requests to verify
that a profile can be applied. A series of checks are made on the SSG
to determine that the profile will successfully apply. If all checks pass,
this log is generated.
Example:
Action:
No action required.
Example:
Action:
No action required.
Example:
Action:
If this profile is needed, the user should first unapply the current profile
(if any) and resync the device. Once the resync is complete, the
desired profile can then be applied.
Example:
07-Feb-2008 03:26:47 14/1/1:patchmgr,0: 4, 1, MINOR, There was a
failure when downloading patch Q000123456.
Action:
Patch Applied
This is an informational log that records a patch has been successfully
applied.
Example:
Action:
No action required.
Patch Activated
This is an informational log that records a patch has been successfully
activated.
Example:
Action:
No action required.
Patch Deactivated
This is an informational log that records a patch has been successfully
deactivated.
Example:
Action:
No action required.
Example:
Action:
Example:
Action:
Example:
Action:
No action required.
Example:
Action:
No action required.
Example:
07-Feb-2008 03:27:46 14/1/1:patchmgr,0: 13, 1,
INFO, Failed to load patch Q000123456.
Action:
Example:
07-Feb-2008 03:28:00 14/1/1:patchmgr,0: 14, 1, INFO,
Internal error. Max jump distance exceeded when
attempting to apply patch Q000123456.
Action:
Example:
Action:
Example:
Action:
No action required.
Example:
Action:
No action required.
Example:
07-Feb-2008 03:28:01 14/1/1:patchmgr,0: 18, 1, INFO, Failed
to apply patch Q000123456 because there is not enough memory
in the patch partition.
Action:
Example:
Action:
Remove the patch from the profile. Add the patch back into the profile.
Example:
07-Feb-2008 03:28:24 14/11:patchmgr,0: 20, 1,
INFO, Patch operation blocked because the target
patcher is busy.
Action:
Example:
Action:
Patch Unapplied
This is an informational log that records a patch has been successfully
unapplied.
Example:
Action:
No action required.
Example:
Action:
No action required.
Example:
Action:
No action required.
Example:
07-Feb-2008 03:28:38 14/1/1:patchmgr,0: 25, 1, CLEAR, Patch status
in Sync, slot 2 card type 2, port 3 proc 3
Action:
No action required.
Example:
Action:
No action required.
Example:
Action:
No action required.
Example:
07-Feb-2008 03:28:47 14/1/1:patchmgr,0: 28,
1, INFO, TFTP download started for profile
MyProfile.
Action:
No action required.
Example:
Action:
No action required.
Example:
Action:
No action required.
Example:
Action:
No action required.
Example:
07-Feb-2008 00:10:34 14/1/1:patchmgr,0: 32, 1, INFO, Cannot apply
profile MyProfile.
Action:
Example:
Action:
No action required.
Example:
Action:
No action required.
Example:
Action:
No action required.
Example:
Action:
No action required
Example:
Action:
No action required.
Example:
Action:
No action required.
Example:
Action:
No action required.
Table 9-162
SOC Event Logs
Table 9-164
Health Check Monitor Event Logs
Table 9-165
Content Filtering Service (CFS) Event Logs
Table 9-166
System Level Event Logs
Table 9-167
Card Level Event Logs
Table 9-168
ATM Line Card Event Logs
Table 9-169
SSM Event Logs
Table 9-170
RPC Timeout Event Logs
Table 9-171
AAA Manager Event Logs
Table 9-172
FIB Manager Event Logs
Table 9-173
SNTP Event Logs
Table 9-174
Interface Manager Event Logs
In the event that the static data on CMC card or SSC card is
overridden, the bad memory event log (i.e. event number 7) is
generated for reporting the software violation. In this case, Nortel
personnel should be notified.
In the event that unaligned data access occurred on CMC3, the CMC3
unaligned address event log (i.e. event number 14) is generated for
reporting the software error. These errors are not critical because the
unaligned access that was requested is completed. For each
Table 9-175
System Manager Event Logs
Table 9-176
Task Manager Event Logs
Table 9-177
Configuration Manager Event Logs
Table 9-178
Subscriber Manager Event Logs
Table 9-179
PPP Event Logs
Table 9-180
CMC Redundancy Event Logs
Table 9-181
User Manager Event Logs
Table 9-182
IKE Event Logs
Table 9-183
VPN Event Logs
Table 9-184
Ethernet Line Card Event Logs
Table 9-185
L2TP Event Logs
Table 9-186
ISP Manager Event Logs
Table 9-187
SCS Event Logs
Table 9-188
MPLS Event Logs
Table 9-189
OAM Event Logs
Table 9-190
SPS Event Logs
Table 9-191
LFIB Event Logs
Table 9-192
IGMP Event Logs
Table 9-193
IPHC Event Logs
Table 9-194
MPLS VRF Event Logs
Table 9-195
PPPOE Event Logs
Table 9-196
System Monitor Event Logs
Table 9-197
Flow Management Event Logs
Table 9-198
CLI Event Logs
Table 9-199
BGP Event Logs
Event Syslog Event Disk and Console Event Text Event Description
Number Severity Event Severity
Event Syslog Event Disk and Console Event Text Event Description
Number Severity Event Severity
Table 9-200
DHCP Event Logs
the error without system impact. The Guard Bytes prevent the SSM
from crashing.
Event Trace 9
Event trace provides operators with the ability to target specific PDP
sessions for tracing by allowing operators to provision subscribers’
MSISDN or IMSI. Once a PDP Create Request message is received,
the trace target database is searched. If a match occurs, the trace is
turned on for that session and the trace information is delivered to the
event queue. The event queue is read by the trace task which formats
and displays to the required output device. The output device may be
CLI (i.e. Telnet session or GGSN console) or local disk.
CLI commands are provided to activate and deactivate the event trace
and to add/modify/delete/show up to a maximum of 10 tracing entries.
Each entry can be activated or deactivated and survives the system
reboot. During CPU and memory overload conditions, the event trace
logs will not be generated.
Trace events delivered to disk are written to separate trace files under
path ‘/disk/log’. The filename can be input by the operators during
provisioning. These files are checked for removal during add, modify
and delete targets CLIs. During disk overload, files are not written to
disk.
There are two kinds of event logs generated for the event trace:
If a PDP Create Request would match more than a single entry in the
trace-tool database, it may be difficult to determine in advance which
trace-tool session will be activated for that PDP session. For GTP
version 0, the GGSN software searches for a matching IMSI in the
trace-tool database before searching for an MSISDN match. For GTP
version 1, the search order depends on the order of the IEs within the
PDP Create Request message.
23-Oct-2007 08:04:05
Node: 2/4/2 Message Timestamp: Tue 23-Oct-2007 08:04:03.841 Sending Radius
Authentication Message To Event
Trace Session ID: 8
Caller ID: 8388610
Src Addr: 47.104.188.106
Dest Addr: 47.104.153.117
ISPID: 11
VPNID: 11
Retry Count: 0
23-Oct-2007 08:04:05
Node: 2/4/2 Message Timestamp: Tue 23-Oct-2007 08:04:03.841 Sending Radius
Access Request Message
Trace Session ID: 8
Hex Dump
7a8afb18> 01 00 01 2F 00 00 41 C6 00 00 16 7E 00 00 27 81 00 00 44 6B
7a8afb2c> 1E 12 67 69 63 72 61 64 6C 6F 63 72 74 65 61 75 74 68 1A 0D
7a8afb40> 00 00 28 AF 12 07 39 30 31 35 30 1A 21 00 00 28 AF 05 1B 39
7a8afb54> 39 2D 32 32 31 33 31 46 39 33 31 34 30 31 30 31 32 32 30 36
7a8afb68> 30 31 30 31 1A 10 00 00 28 AF 16 0A 01 09 F1 05 05 03 01 00
7a8afb7c> 01 06 74 65 73 74 02 12 A5 30 D1 53 14 EE C7 69 F9 21 F2 94
7a8afb90> 65 1C FB EB 04 06 2F 68 BC 6A 1A 3B 00 00 0C 7F 04 35 53 68
7a8afba4> 61 73 74 61 20 35 30 30 30 3A 20 69 53 4F 53 20 28 74 6D 29
7a8afbb8> 2C 20 47 47 53 4E 53 36 2E 30 49 2D 6A 79 6F 74 68 69 5F 74
7a8afbcc> 63 70 5F 6D 73 73 2D 33 33 2C 12 32 46 36 38 42 43 36 39 33
7a8afbe0> 38 31 43 39 46 43 32 06 06 00 00 00 02 07 06 00 00 00 07 3D
7a8afbf4> 06 00 00 00 12 1A 0C 00 00 28 AF 03 06 00 00 00 00 1A 0C 00
7a8afc08> 00 28 AF 06 06 2F 68 99 55 1A 09 00 00 28 AF 15 03 01 1F 0C
7a8afc1c> 37 39 36 32 34 38 30 31 36 37 1A 09 00 00 28 AF 0A 03 35 1A
7a8afc30> 0C 00 00 28 AF 0D 06 30 30 30 38 1A 0C 00 00 28 AF 02 06 38
7a8afc44> 1C 9F C2
Table 9-201
Event Trace Log Types
Log Type Description
GTP Trace Events
Receiving Create Request Event PDP Create Request message
received by GTP
Receiving PDP Create Request Hex Dump of incoming message
Message
Context Creation Success Event Internal GTP data structure created
Transitioning to New State Event Internal GTP state change
Authentication Request Event An internal AAA event that
indicates GGSN is about to send an
authentication request
Radius Access Request Message A decoded Authentication Request
Event message to be sent to RADIUS
Radius Access Accept Reply Event A decoded Access Accept message
received from RADIUS
Address Allocation Requesting Event Internal GTP to AAA Manager Event
Event
Authorization Pending Event Waiting for response from AAA
Manager
Accounting Request Event Internal AAA event to prior to
sending Accounting Request
message
Radius Accounting Request Session A decoded RADIUS Accounting
Start Event Start message to be sent to
RADIUS
Accounting Request Success Event An internal AAA event to indicate
RADIUS Accounting message has
been sent to RADIUS server
Table 9-202
Trace Manager Event Logs
Notes:
Notes:
System Time 9
The system time on the Nortel GGSN can be set via the CLI
command, SCS GUI or through communication with an Simple
Network Time Protocol (SNTP) server. Internally, the GGSN system
clock uses UTC time. Changes to the system time should be made
when there are no active PDP sessions on the Nortel GGSN. Abrupt
changes to the system time by using the CLI command or the SCS
GUI may result in incorrect time calculations in billing records for
active PDP sessions.
The time zone should be set and used to adjust for local time which
will automatically be adjusted for daylight saving time. This can be
done from the SCS GUI. Therefore, the time zone setting must be
used in order to set the local time and allow for daylight saving
changes. The system clock and time should not be altered for these
purposes.
Two main search criteria are the MSISDN and IP Address with
optional VPRN name. Figure 9-12 shows the MSISDN query window.
Figure 9-12
Device Monitoring ASM Page - MSISDN Query
Figure 9-13
Device Monitoring ASM Page - IP Query
The following table lists the range and default value of each field on
the ASM window.
Table 9-203
Device Monitoring ASM Tab
Default
Field Range Description
Value
Table 9-203
Device Monitoring ASM Tab
Default
Field Range Description
Value
Table 9-203
Device Monitoring ASM Tab
Default
Field Range Description
Value
Table 9-204
Displayed PDP Session Information
CLI Command 9
GGSN CLI command is available through a terminal connected to the
GGSN, either through a Telnet session or connected directly to the console
port connector at the front of the CMC card. Using GGSN CLI commands
for provisioning is not recommended and supported on the Nortel
GGSN. Running off-board Unix scripts is also not supported on
GGSN. Unexpected behaviors may happen by doing so.
Patching System 9
There is a need to patch a live system without impacting the operation
of the tasks being executed by any particular processor. The Services
Edge Router 5500 has a variety of card types with variable numbers of
processors. This patching system addresses the requirements to
patch the CMC card and SSC card.
The primary User Interface is the SCS GUI. Patch statuses are
recorded for synchronization, robustness and reporting. Each patching
action for a device generates a System Information Log. These logs,
along with other system information logs, are displayed as Session
Logs for the device.
Upgrade Strategy 9
The SCS Server is upgraded before the GGSN. Newer GGSN
software is not compatible with older versions of the SCS Server.
However, the SCS Server is backwards compatible for two major
versions of GGSN.
Functional Description
This feature provides the customer the capability to backup the SCS
server either in its entirety or partially so that if the SCS server is
corrupted, the user can restore the previous backup version to bring
the system to the latest functional state. It provides a suite of functions
that separated into two categories: local or centralized.
Background:
For issues that are found in the field, cases are sometimes opened
without sufficient preliminary data.This is due to several reasons
including:
1. Manual data collection on the GGSN can be a time consuming and
tedious task.
2. There is a potential to miss critical information during manual data
collection.
3. Sometimes there is not enough time to manually enter all the
necessary commands before service recovery.
Recommendations:
Customers should run GGSN Data Collector during the time window in
which the GGSN is experiencing a problem. The output should then be
made available to Nortel at the time of case creation.
Running GDC:
GDC has several options that allow the user to select the type of data
to be collected. If you’re not certain about which type of data to collect
for the issue you’re seeing, you may choose all of the applicable
options, or the “-all” option.
Examples:
Some GDC options are listed below. Enter “./gdc -help” to see a full
list of options and detailed usage instructions, and note the warnings
section.
Table 9-206
GDC Options
Option Description
-ggsn Collect data from the GGSN: show commands, log files,
etc.
Product limitations 10
This chapter specifies the limitations of GGSN functionality on the Nortel
GGSN. The limitations are grouped into the following functional areas:
• GGSN Hardware
• GGSN and SCS Software
• GTP and GTP’ Protocol Interface
• RADIUS Authentication and Accounting
• DHCP Address Allocation
• SCS Provisioning
• OA&M
• GGSN QoS
• APN
• Prepaid Service
• IP Services
• IP Routing
GGSN Hardware 10
1. Two USB ports are present on the CMC3 faceplate, however, they
are not supported. No USB ports are present on the CMC2 card.
2. If the last SSM or SSC goes out of service or is disabled, all access
subscribers on the GGSN also go out of service and do not come
in service once the SSM or SSC is brought in service. To bring the
access subscribers back in service, access subscribers should be
reconfigured from the SCS.
3. If the last SSM or SSC goes out of service or disabled, all the VRF
subscribers may not come up after the SSM or SSC is brought in
service. To bring the VRF subscribers back in service, theVRF and
the subscribers should be reconfigured from the SCS.
4. The SSC3 is incompatible with the SFC1 and should only be used
with a CMC3 card and a SFC2 card.
Receiving a Redirection Accept the request and Accept the request and
Request message with find alternate CGF. If mark the sender is down.
no Recommended alternate CGF is not
Address IE available, write to the
local disk and mark the
sender is down.
—sheet 1 of 2—
Table 10-1
Receiving Redirection Request scenarios (continued)
Receiving a Redirection Accept the request and Accept the request and
Request message with a try to switch to the mark the sender is down.
Recommended Address recommended address.
IE that is known and If unable to switch, write
different from sender to the local disk and mark
the sender is down.
—sheet 2 of 2—
8. When reporting the service profile name, tariff profile name, or VPN
name used in a G-CDR or VSA only the first 16 characters are
used. If the name is longer than 16 characters it is truncated.
9. When OID version 1.2.840.113533.4.10.1.1.2 of the CBB
Management extension is used and counts for Content Type Ids
not supported by version 2 are received, the counts for that
Content Type Id will not be placed in the G-CDR. The counts are
counted as usual in the traffic volume container.
10. Secondary PDP context is not supported for PPP PDU. If a
secondary create request is received for the PPP PDU, the call is
rejected with cause value “Unknown PDP Address or PDP Type.”
11. TFT filtering by IPv6 address and/or flow label is not supported as
the GGSN does not currently support IPv6. If these filter types are
included, the GGSN will reject the TFT with the cause code
“Semantic errors in packet filters.”
12. Secondary PDP context is not supported for L2TP VPN or secure
L2TP VPN model for IP PDU. If an APN is requested in a Create
PDP Context Request that is provisioned to use L2TP tunnelling,
the GGSN will reject the request with cause “System Failure”.
13. Uniqueness of the packet filters in a TFT IE or for a bundle is not
verified on the GGSN as the filter precedence will be used. The
TFT filter that first matches the packet, in the precedence order, will
be applied on the packet even though another filter may also match
the packet.
14. For multiple L2TP tunnels from RADIUS, once a tunnel is selected
for a session and that tunnel does not come up, the session will
fail. No other valid tunnels or candidate tunnels are considered
again for the same session.
15. If the system time is changed after configuring the start and stop
times, the change in time will be effective for the automated
transfer only after the current start/stop time expires. After a
system time change, the G-CDR file transfer will be initiated and
stopped at the old system time for the first time. Subsequent
transfers will be initiated and stopped at the new system time.
16. Performing a switch SFC on the Nortel GGSN may result in the
loss of existing PDP sessions or data traffic. Switch SFC may also
affect the PDP context creation, updating and deletion. When
OSPF is in use, the repopulation of OSPF learned routes following
a switch SFC can take significant time. The population time for
OSPF routes increases with an increase in the number of
subscribers present. New contexts and data traffic may not be
possible until the OSPF routes are populated.
17. TCP Out of Sequence Packets - Dropped packets due to TCP out
of sequence scenario for postpaid billing and CTP V1 billing will not
be counted for billing.
10. Session billing information could be lost due to failure of SSP card
if the failure occurs when Nortel GGSN is trying to send the
message to server or if the information is in active batch buffer.
11. In a VPN call model setup, when the RADIUS authentication and
accounting messages are sent, the RADIUS response messages
could be dropped if the ISP Firewall policy is configured to accept
only packets from ISP IP address to RADIUS server and reject all
other packets. This is a limitation of distributed AAA and could be
overcome by adding another rule to the firewall policy to accept
packets in the reverse direction i.e. from RADIUS server to ISP IP
address.
SCS Provisioning 10
Provisioning limitations for the GGSN are as follows:
1. Only one Gn ISP and one Ga ISP are supported per GGSN. If
multiple GTP tunnels are configured on a GGSN, this is considered
a configuration error and this configuration is NOT supported.
2. Duplicate APN names on different ISPs on the same GGSN is not
supported. If the same APN is provisioned on different ISPs on the
same GGSN, the APN and subscriber template used for GTP
tunnel setup is undetermined.
3. Error checking for valid ranges of fields used in provisioning is
performed by the SCS Client. If the CORBA API or SCS CLI are
used for provisioning, the operator is responsible for the
correctness of the provisioning information. There may be a
serious performance impact if the provisioned values are out of
range as supported by provisioning through the SCS Client.
4. Interoperability testing is required for the CORBA API between the
customer equipment and GGSN prior to using the CORBA API
provisioning.
5. The Virtual Circuit Identifier (VCI) value in ATM Connection
configuration enforces the restriction that the value cannot be set in
the range of 0 to 31 inclusively since these values are designated
as reserved by the ITU-T and ATM forum. Due to the restriction
change, it is possible that the VCI field may contain these reserved
values from previous releases. The presence of these reserved
values does not affect the operation of the GGSN. However,
subsequent SCS GUI changes to this configuration will require that
the non-standard VCI values be modified.
6. For SCS backup and restore, it is assumed all components (LDAP,
domain server, region server, etc.) are co-located in one box.
7. For local essential data backup, each backup is kept on a separate
tape. Multiplexing multiple backups into single tape is not
supported.
8. For centralized essential data restore and dynamic data retrieval,
the local Veritas NetBackup agent should be installed.
9. For SCS essential data restore and dynamic data retrieval, the
version of backup SCS data must match to the running software.
10. During SCS backup, patches and upgrades cannot be applied.
11. SCS CORBA clients do not get notifications when essential data is
backed up or restored.
12. When provisioning URL Rates or URL IDs for CBB Policy, the
following restrictions are enforced:
— The colon character ( : ) and its equivalent Hex Escape “%3A”
or “%3a” is not allowed in Domain Name. The port number is
configured as part of the five tuple rule used to provision any
CBB policy.
— The number sign character ( # ) is not allowed as part of URL.
— The left parenthesis ( ( ), right parenthesis ( ) ) and double
quotation mark ( “ ) characters are SCS reserved characters
OA&M 10
1. Requests for statistics to be collected and sent to the Log Server
may be discarded before being collected when
a) in high capacity/high traffic circumstances or
b) address pool is being modified (Delete/Add operation)
This is because of the low priority of statistical collections. The
statistics that would have been gathered if the request was not
dropped will be grouped with the statistics from next time interval.
2. Private AAA and DHCP server IP addresses are not guaranteed to
be unique. In the case where two or more private AAA/DHCP
server IP addresses collide within the same Gi ISP context, the
counters for the multiple servers will be aggregated. If multiple
AAA/DHCP servers with the same private IP addresses must be
deployed on the same GGSN, it is recommended that separate Gi
ISP contexts be created to avoid the collision of IP addresses and
subsequent aggregation of counters.
3. The timestamp that shows up in the replayed alarm will not be the
timestamp when the event occurred, rather it will be the time when
it was replayed.
4. When requested to replay the traps will be sent to all configured
SNMP agents without any filtering. (Notification profile filters will
not be applied when re-sending the traps).
5. List of saved traps will not survive the reboot or CMC switchover
6. Event trace is not supported with the following deployment models:
L2TP VPN and IPsec VPN.
7. Aggregation APN Sessions Cannot Be Monitored on SCS Client:
PDP sessions, which are associated with services APN calls, can
also be monitored under Monitor---> ISP window. However, PDP
sessions, which are associated with Aggregation APNs, will not be
reflected in the counters under Monitor --->ISP window.
GGSN QoS 10
GGSN QoS limitations are:
1. The GGSN supports QoS only in the marking of data and control
packets. Requests for bandwidth, delay and maximum throughput
are not supported at this time. No resource decisions are made
based on these parameters.
2. The QoS negotiation is not supported on the GGSN. The values of
Allocation/Retention Priority and Traffic Class are the same as
received in the Create PDP Context Response message. The
Reliability Class will be changed to 2 in the Create PDP Context
Response message if it is larger than 2.
3. Support of GTP data packets based on the QoS IE value mapping
to DSCP marking is only for GTP version 1. For GTP version 0, the
QoS IE is not used for determining the DSCP marking for GTP data
packets. A provisioned “default” setting is used for GTP version 0
QoS.
4. The QoS functionality is not supported when interfacing with non-
Nortel equipment that does not send allocation/retention priority
and traffic class information to the GGSN.
APN 10
Limitations of APN are:
1. When single APN is used for redirecting PDP sessions to different
VPNs on a subscriber basis, the RADIUS Profiles provisioned in
different VPNs are required to be the same as single APN. In this
case, all authentication, address allocation and RADIUS
Accounting messages are sent to the same RADIUS Server. It may
be necessary to proxy those messages to different VPNs from the
RADIUS Server.
2. When single APN is used for redirecting PDP sessions to different
VPNs on a subscriber basis, the DHCP Relay Agent is not allowed
to be provisioned in the VPNs.
3. To support the dynamic L2TP VPN for GTP-L2TP tunnel switching,
a dedicated APN is needed for the Single APN configuration.
4. The PDP sessions that encounter unsupported configurations will
be rejected in an aggregation APN.
5. IP Subnet Dedication is required for the Connection ISPs that have
APNs configured for aggregation mode.
6. IP Subnet Dedication requires provisioning summary routes for all
address allocation methods including DHCP and RADIUS address
allocation.
Prepaid Service 10
Limitations for Prepaid Service are:
1. Existing CBB limitations are inherently imposed upon multi-rate
coupons because prepaid depends on the rate markings generated
by CBB.
2. The Service Profile changes are applied to the existing PDP
sessions for Traditional APNs. However, when the CBB Service
Policy is removed from the Service Profile of existing PDP contexts
that are using Rated Coupons, the time/volume usage is no longer
reported and no further reauthorizations occur. For IP PDU, these
PDP contexts are brought down when any new data arrives. For
PPP PDU, PDP contexts remain active without Prepaid billing
function.
3. Service Redirect requires the use of variable rate prepaid rated
coupons. Non-rated coupons are not supported.
IP Services 10
Limitations for IP Services are:
1. URL filtering for streams that are compressed, encrypted, or
otherwise distort the IP packet is not supported.
2. HTTP version 1.0 may not include the host name in the GET
request packet. In this case, Content Based Billing will try to use
the destination IP address as the host name for the received URL
to compare against the provisioned URL.
3. HTTP version 1.1 supports the pipelining of request packets and
response packets. It causes multiple request packets queued up
before receiving any response packets for previous requests. In
this scenario, the accounting rate of the last request packet in the
pipeline is applied to the response packets received in this TCP
connection.
4. The logs for Content Based Billing when filtering by HTTP only
reflect the default rate because the URL matching for determining
the rate of HTTP packets hasn’t occurred when the log is
generated.
5. Uplink data packets are rated after being processed for the GTP
accounting. If the CBB uplink packet causes a G-CDR to be
generated, the rate count of the packet will not be reflected in this
G-CDR. It will be included in the following G-CDR’s rate count.
18. If the client on the MS is turned on for a subscriber that does not
have the TPO IP service applied, the GGSN would route the
packets if they were regular un-compressed packets. Note that
TPO IP service may be removed when the session is active (e.g.
Qos changes).
19. Only Fast Ethernet (FE) and Gigabit Ethernet (GE) Line Cards are
supported for interworking with the TPO server.
20. TPO only supports interworking for TCP traffic. UDP and other type
of traffic are not supported.
21. The two new TPO RADIUS VSAs that are introduced by TPO are
sent in the RADIUS Accounting START/STOP messages only if
TPO ISP is properly configured and the TPO IP service is applied
to the subscriber at the time of session setup. If TPO IP Service is
added or deleted in the middle of the session, the inclusion of
these new VSAs in the RADIUS Accounting STOP follows the
behavior in the RADIUS Accounting START at the time of the
session setup.
22. For PPP PDU calls type, the GGSN TPO ISP IP Address and the
TPO GRE Key VSAs will not be sent in RADIUS Accounting
START/STOP messages.
23. The configuration of any IP service on a VLAN Access Subscriber
is not supported. This includes both VLAN Wireless ISP and VLAN
VPN network models. IP services can be provisioned via the SCS
GUI, but GGSN will not apply them to the VLAN Access
Subscriber. However, there is no impact to the IP services
configured on the mobile subscribers.
24. Dynamic policy control capability is only supported for aggregation
sessions. If service sessions are configured to interact with a CRF
for dynamic policy control, the GGSN ignores the configuration and
does not contact the CRF for dynamic charging rules.
25. While waiting for a response from the Content Filter Server, any
subsequent HTTP packets on the same connection are dropped.
26. After sending the HTTP block or redirect response to the mobile,
the TCP connection to both the mobile and the HTTP content
server are reset.
27. No blacklisting or caching of response for similar requests is done
within the content filter service of the GGSN.
28. Loss of connection to a Content Filter Server may not be detected
for a maximum of two minutes.
29. The Content Filter Server is connected to the Gi interface of the
GGSN. If VPNs are used, the Content Filter server must be
routable within the VPN.
IP Routing 10
1. MPLS is supported only on Trunk Interfaces. The following MPLS
areas are not supported in GGSNS4.0:
— RSVP-TE/TE Tunnels
— ER-LSPs
— Route-Reflector Server
— Hub-and-Spoke VRF support
2. OSPF routing protocol is not supported on CMC management port.
However this port can still support static routes. If OSPF is used in
default ISP for the management network, auxiliary management
ports on line cards and CMC server ports can be provisioned for it.
3. Scaling numbers from Network Engineering suggests that we can
have 512 OSPF adjacencies when subscribers are all area 0 and
part of backbone and also 512 when subscribers are all area 1 and
part of backbone 0. For subscribers all in unique areas but part of
backbone the number of adjacencies is 256. When all subscribers
are running a unique instance of OSPF the number is 95.
4. Other vendors like Cisco will need to implement the DPD keepalive
(as outlined in RFC3706) in order to interwork with the GGSN,
since this is the only keepalive mechanism GGSN plans to support
for non-wildcard IPSec.
5. IPSec MIB Enhancement is not configurable through CORBA.
6. No support for QoS based route selection. The tunnel bandwidth is
used only for signaling via RSVP-TE and not used for path
selection.
Redundancy 11
This chapter discusses redundancy of the Nortel GGSN components
as well as redundancy of external components in the IP network. The
GGSN uses the software redundancy infrastructure of the Nortel
Services Edge Router 5500 to achieve product reliability. The GGSN
also provides physical connection redundancy to a variety of servers in
the IP network.
Nortel GGSN 11
The Nortel GGSN inherits support of hardware and software
redundancy from the Nortel Services Edge Router 5500 (SER 5500).
Redundancy of the various components of the GGSN are described in
the following sections.
Press the reset button on the active CMC card or on the standby CMC
card will reboot the whole Nortel GGSN shelf.
During the CMC2 to CMC3 upgrade window, the CMC2 and CMC3
can coexist in the same chassis, but redundancy is not supported.
The CMC core dump flag is ignored when the other CMC is not
redundant. A new event log is used to indicate that if the CMC core
dump is disabled.
down, the software on the CMC gets a notification and uses the
existing session information on the CMC to move the active sessions
that were on the failed SSM to a new functional SSM. PDP Sessions
activated on both Aggregation and non-Aggregation APNs are moved
during SSM failure.If all the functional SSMs on the GGSN are fully
occupied, the active PDP sessions on an SSM that fails will not be
able to be moved. The PDP session is taken down.
When an SSM fails, all sessions on a failed SSP are moved to a new
SSP. These sessions cannot be distributed to different SSPs. If the
number of sessions moved to the new SSP plus the number of existing
sessions on the SSP exceeds the SSP capacity limit, the sessions
beyond the capacity limit will be taken down.
When a single SSC card failure occurs, the active PDP sessions on
the card will be moved to the SSMs on the other available SSC cards.
However, this scenario is not supported for multiple SSC card failure
on the GGSN.
The sequence number in the GTP header is reset by the GGSN during
the tunnel move. For both GTP version 0 and version 1, the sequence
number is not used on the GGSN.
The charging data volume on the failed SSM is lost but the charging
duration of PDP contexts are still valid.
When the active SFC card is pulled without doing a switch SFC, the
fabric will lose its clocking, possibly causing the CMC to crash. Before
pulling the SFC card, a switch SFC command needs to be executed so
the redundant SFC will become active and be responsible for the
switch clock. In the advent of a real active SFC failure, the inactive
SFC will become the active SFC automatically and take over the clock.
Interface redundancy
Interface redundancy is supported as part of the Services Edge Router
functionality. This redundancy works only when the GGSN node IP
address is provisioned on the DNS Server. It is recommended to
provision a minimum of two interfaces on the Gn ISP and on each
Connection ISP on the GGSN for redundancy purposes.
The ATM card generates event logs when the following events occur:
• An APS group has been administratively changed (added,
modified, or deleted).
• A switchover occurred in an APS group due to an SF condition.
• An APS group became unavailable (all ports failed).
The OC-3 cards generate physical port alarms (LOS, LOF, etc.) on
APS ports as well as non-APS ports. However, the ALC card interprets
and handles physical port alarms differently for APS versus non-APS
ports. When a non-APS port is in alarm, the ALC card marks all the
interfaces on that port as “down”. When a non-APS port comes out of
alarm, its interfaces are brought back up. The interface for an APS port
remains up as long as at least one of the ports is up. When a port goes
up/down (both APS and non-APS), the ALC card accordingly clears/
generates port down alarms.
SCS server redundancy can be provided by two SCS servers with the
same IP address. SCS Resiliency script is responsible for transferring
the SCS data from active SCS server to standby SCS server
periodically.
Two CGFs are supported on the GGSN for each device within the ISP
that has the Ga interface provisioned. This provides redundancy for
the GGSN in case the connection to one of the CGFs fails.
Prepaid Server 11
Two Prepaid Servers are supported on the GGSN per APN. This
provides redundancy to the GGSN for Prepaid/GeoZone Service in
case the connection to one of the Prepaid Servers is down. The GGSN
communicates to one Prepaid Server at a time; if the primary Prepaid
Server is not responding, the backup Prepaid Server takes over.
When the active server exits the connected state and the secondary
server of the CTP Tariff Profile is in the connected state, then the
secondary server becomes the active server.
Application Server 11
A single Application Server is supported on the GGSN per APN. To
provide redundancy, the Application Server can be configured in
duplex mode. This duplex mode is provided by the Application Server
itself and is external to the GGSN.
RADIUS Server 11
Multiple RADIUS Servers are supported on the GGSN for each device
within a Connection ISP. Each RADIUS Profile supports up to 8
primary and 8 backup servers. Each RADIUS Server can be
configured as primary server or backup server as well as each
RADIUS Server can be configured as Authentication server,
Accounting server or both.
DHCP Server 11
Multiple DHCP Servers are supported on the GGSN for each device
within a Connection ISP. The DHCP message is unicast to each of the
DHCP Servers for address soliciting. One of the DHCP Servers is
selected to provide the address.
FTP Server 11
Two FTP Servers are supported on the GGSN for each device. These
servers are used to transfer G-CDR Auditing files via the FTP protocol.
This provides redundancy for the GGSN in case the connection to one
of the FTP Servers fails.
When a load balancer goes down, another one takes over, this does
not affect the GGSN, the GGSN keeps sending the traffic to the pre
configured IP address as mentioned above. The GGSN does not know
about all the redundancy activities on the TPO which is transparent to
the GGSN.
Product Conformance 12
Overview 12
This chapter specifies the State of Compliancy (SOC) of Nortel GGSN
product. The SOC contains the standard conformance information of
the GGSN related standard documentation:
Table 12-1
Summary of conformation to GTP version 0 specification
Section Section Title Conformance
1 Scope Supported.
2 References Supported.
3 Definitions and abbreviation Supported.
4 General Supported.
5 Transmission order and bit Supported.
definitions
6 GTP Header Supported.
7 Signalling Plane Supported.
7.1 Signalling protocol Supported.
7.2 Signalling Message Formats Please refer to individual message
section for conformance information.
7.3 Usage of the GTP Header Supported.
7.4 Path Management messages Supported.
7.4.1 Echo Request Supported.
7.4.2 Echo Response Supported.
7.4.3 Version Not Supported Supported.
7.5 Tunnel Management messages Supported.
Table 12-2
Summary of conformation to GPRS PLMN/PDN interworking specification
Section Section Title Conformance
1 Scope Supported
2 References Supported
3 Definitions, abbreviations and Supported
symbols
4 Network characteristics Supported
5 Interwoking classifications Supported
6 Access reference configuration Supported
7 Interface to GPRS Bearer Services Supported.
Table 12-3
Summary of conformance to GPRS Service Description
Section Section Title Conformance
1 Scope Supported.
2 References Supported.
3 Definitions, abbreviations and symbols Supported.
4 Main Concept Supported.
5 General GPRS Architecture and Supported.
Transmission Mechanism
5.1 GPRS Access Interfaces and Supported.
Reference Points
Table 12-4
Summary of conformance to service description for GPRS
Table 12-5
Summary of conformance to QoS Concept and Architecture
Section Section Title Conformance
1 Scope Supported.
2 References Supported.
3 Abbreviations Supported.
4 High Level Requirements Supported.
4.1 End User QoS Requirements Supported.
4.2 General Requirements for QoS Supported.
4.3 Technical Requirements for QoS Supported.
5 CS QoS in release 1999 Not Supported.
6 QoS Architecture Supported
6.1 Overview of Different Levels of QoS Supported.
6.1.1 The End-to-End Service and UMTS Supported.
Bearer Service
6.1.2 The Radio Access Bearer Service and Supported.
the Core Network Bearer Service
6.1.3 The Radio Bearer Service and the Not Applicable.
RAN Access Bearer Service
6.1.4 The Backbone Network Service Not Applicable.
6.2 QoS Management Functions in the Supported.
Network
6.2.1 Description of Functions Partially Supported.
Table 12-6
Summary of conformance to GTP version 1 specification
Section Section Title Conformance
1 Scope Supported.
2 References Supported.
3 Definitions and abbreviation Supported.
4 General Supported.
5 Transmission Order and Bit Definitions Supported.
6 GTP Header Supported.
6.1 Extension headers Partially Supported.
Table 12-7
Summary of conformation to UMTS PLMN/PDN interworking specification
Section Section Title Conformance
7.7.81 Direct Tunnel Flags Supported.
Table 12-8
Summary of conformation to UMTS PLMN/PDN interworking specification
Section Section Title Conformance
1 Scope Supported.
2 References Supported.
3 Definitions, abbreviations and Supported.
symbols
4 Network characteristics Supported.
5 Interwoking classifications Supported.
6 Access reference configuration Supported.
7 Interface to Packet Domain Bearer Supported.
Services
7.1 A/Gb mode Supported.
7.2 Lu mode Supported.
8 Subscription checking Supported.
8A Prevention of IP spoofing Supported.
9 Message Screening Supported.
Table 12-9
Summary of conformation to 3GPP 29.210 specification
Section Section Title Conformance
1 Scope Supported.
2 References Supported.
3 Definitions, symbols, and Supported.
abbreviations
3.3 Definitions Supported.
4 Gx reference point Supported.
4.1 Overview Supported.
Service-Identifier, Reporting-Level,
Metering Method, Precedence, AF-
Charging-Identifier, and Flows not
supported.
If received Charging-Rule-Definition
AVP matches an existing charging rule,
the charging rule is overwritten.
Attributes not provided within the AVP
are set with default values.
5.2.5 Charging-Rule-Base-Name AVP Supported.
5.2.6 Charging-Rule-Name AVP Supported.
5.2.7 Event-Trigger AVP Supported.
5.2.8 Metering-Method AVP Not supported.
5.2.9 Offline AVP Supported.
5.2.10 Online AVP Supported.
3GPP-SGSN-IPv6-Address, AF-
Charging-Identifier, CC-Sub-Session-
Id, Flows, Framed-IPv6-Prefix,
Service-Identifier, and User-
Equipment-Info AVPs not supported.
5.4 Gx specific Experimental-Result- Supported.
Code AVP values
5.4.1 Success Supported.
5.4.2 Permanent Failures Supported.
6 Gx Messages Partially supported.
CC-Sub-Session-Id, Framed-IPv6-
Prefix, User-Equipment-Info, 3GPP-
SGSN-IPv6-Address, Proxy-Info, and
Route-Record AVPs not supported for
this message.
3GPP-GGSN-Address, 3GPP-
Charging-Id, 3GPP-IMSI, and 3GPP-
NSAPI AVPs added to CCR as pre-
standard optional AVPs.
6.1.2 CC-Answer (CCA) Command Partially supported.
CC-Sub-Session-Id, Primary-CCF-
Address, Secondary-CCF-Address,
Primary-OCF-Address, Secondary-
OCF-Address, Error-Message, Error-
Reporting-Host, Failed-AVP, Proxy-
Info, and Route-Record AVPs not
supported for this message.
6.1.3 Re-Auth-Request (RAR) Command Partially supported.
Destination-Realm, Destination-Host,
Re-Auth-Request-Type, CC-Sub-
Session-Id, and Origin-State-Id AVPs
not supported for this message.
6.1.4 Re-Auth-Answer (RAA) Command Partially supported.
Experimental-Result, CC-Sub-
Session-Id, Error-Message, Error-
Reporting-Host, and Failed-AVP AVPs
not supported for this message.
6.2 Gx over Gy Application Supported.
6.2.1 Simultaneous charging rule Supported.
provision and credit authorization
Table 12-10
Summary of conformance to GTP’ version 3.2.0
Section Section Title Conformance
1 Scope Supported.
2 Reference Supported.
3 Definitions, abbreviations and symbols Supported.
4 Architecture Supported.
4.1 Charging Gateway Functionality Partially Supported.
If msisdn_stuff_remove is
enabled, check for stuffed bytes
in MSISDN. If stuffed bytes
present, remove the stuffed
bytes.
6.1.6.27 Served PDP Address Supported.
6.1.6.28 Service Centre Address Not Applicable.
6.1.6.29 SGSN Address Supported.
6.1.6.30 SGSN Change Not Applicable.
6.1.6.31 Short Message Service (SMS) Result Not Applicable.
6.1.6.32 System Type Not Supported.
7 Charging Protocols Supported.
7.1 GPRS CDR Collection by GTP’ Partially Supported.
Protocol
Redirection of G-CDR to another
un-provisioned CGF is not
supported.
7.1.1 SGSN - CGF communication Not Applicable.
7.1.2 GGSN - CGF communication Supported.
7.1.3 CGF - CGF communication Not Applicable.
7.1.4 Port usage Supported.
7.1.4.1 UDP as the Path Protocol Supported.
7.1.4.2 TCP as Path Protocol Not Supported.
7.1.4.3 Network layer and lower layers Supported.
7.1.5 Charging related requirements for Supported.
GPRS nodes
7.2 The GTP’ charging protocol Supported.
7.2.1 Usage of GTP Header in charging Supported.
7.2.2 Information elements Supported.
7.3 GTP’ Message Types Supported.
Table 12-11
Summary of conformance to GTP’ version 3.6.0
Section Section Title Conformance
1 Scope Supported.
2 Reference Supported.
3 Definitions, abbreviations and symbols Supported.
4 Architecture Supported.
4.1 Charging Gateway Functionality Partially Supported.
Table 12-12
Summary of Conformance to TS 32.299 version 7.6.0
RFC Specifications 12
RFC 2131 - Dynamic Host Configuration Protocol (DHCP)
The following table summarizes the Nortel GGSN conformance to the
DHCP RFC in March 1997 version.
Table 12-13
Summary of conformance to DHCP
Section Section Title Conformance
1 Introduction Supported.
1.1 Changes to RFC1541 Partially Supported.
protocol
4.1 Constructing and sending DHCP Partially Supported.
messages
GGSN only supports DHCP
Client and Relay functionality.
GGSN DHCP Client forwards the
message through a relay task
which sets the source address to
the ISP Gi address.
4.2 DHCP server administration controls Partially Supported.
Table 12-14
Summary of conformance to RADIUS
Section Section Title Conformance
1.0 Introduction Supported.
1.1 Specification of Requirements Noted.
1.2 Terminology Noted.
2 Operation Supported.
2.1 Challenge/Response Supported.
2.2 Interoperation with PAP and CHAP‘ Supported.
2.3 Proxy Not Applicable. This concept
applies to Radius Server.
2.4 Why UDP Supported.
2.5 Retransmission Hints Supported.
2.6 Keep-Alive Considered Harmful Supported.
3 Packet Format Supported.
4 Packet Type Supported.
Table 12-15
Summary of conformance to RADIUS Accounting
Section Section Title Conformance
1.0 Introduction Supported.
1.1 Specification of Requirements Noted.
1.2 Terminology Noted.
2.0 Operation Supported.
2.1 Proxy Not Applicable. GGSN acts as
NAS.
3.0 Packet Format Supported.
4.0 Packet Types Supported.
4.1 Accounting-Request Supported.
4.2 Accounting-Response Supported.
5.0 Attributes Supported.
5.1 Acct-Status-Type Supported.
5.2 Acct-Delay-Time Supported.
5.3 Acct-Input-Octets Supported.
5.4 Acct-Output-Octets Supported.
5.5 Acct-Session-Id Supported.
5.6 Acct-Authentic Supported.
5.7 Acct-Session-Time Supported.
5.8 Acct-Input-Packets Supported.
5.9 Acct-Output-Packets Supported.
5.10 Acct-Terminate-Cause Supported.
5.11 Acct-Multi-Session-Id Not Supported.
Table 12-16
Summary of conformance to PPP
Section Section Title Conformance
1 Introduction Noted
1.1 Specification of Requirements Noted
1.2 Terminology Noted
2 PPP Encapsulation Supported
3.1 Overview Supported.
3.2 Phase Diagram Supported.
3.3 Link Dead (physical-layer not ready) Supported.
3.4 Link Established phase Supported.
3.5 Authentication Phase Supported
3.6 Network-Layer Protocol Phase Supported.
3.7 Link Termination Phase Supported.
4 The Option Negotiation Automation Noted
4.1 State Transition Table Supported
4.2 States Supported
4.3 Events Supported.
4.4 Actions Supported
4.5 Loop Avoidance Noted
4.6 Counters and Timers Supported
5 LCP Packet Format Supported
5.1 Configure-Request Supported.
5.2 Configure-Ack Supported
5.3 Configure-Nak Supported.
5.4 Configure-Reject Supported.
5.5 Terminate-Request and Terminate-Ack Supported.
5.6 Code-Reject Supported. On receipt of code-
reject, it is recommended that the
connection being dropped.
Current implementation just
ignores the message.
5.7 Protocol-Reject Supported.
5.8 Echo-Request and Echo-Reply Supported
5.9 Discard-Request Supported.
6 LCP Configuration Options Supported.
Table 12-17
Summary of conformance to L2TP
Section Section Title Conformance
1.0 Introduction Supported.
1.1 Specification of Requirements Noted.
1.2 Terminology Noted.
2.0 Topology Supported. GGSN can act as
LAC only.
3.0 Protocol Overview Supported.
3.1 L2TP Header Format Supported.
3.2 Control Message Types Supported.
Table 12-18
RFC 2547bis Conformance
- PE peer in different AS
- Inbound filtering
17 Acknowledgements Noted
Table 12-19
RFC3036 Conformance
(Attention: Address
prefixes are not supported
as a FEC element type.)
(Attention: Downstream
On Demand distribution is
not supported)
(Attention: Downstream
On Demand distribution is
not supported)
8 Acknowledgements Noted
9 References Noted
Table 12-20
RFC2616 Conformance
Table 12-21
RFC 2702 conformance
Section Section Title Conformance
5.0 Traffic Trunk attributes
Table 12-22
RFC 2205 Compliance (continued)
Table 12-23
RFC 3209 Conformance (continued)
Table 12-23
RFC 3209 Conformance (continued)
4.7.3 Support for setup & holding priorities Only passes information downstream
Table 12-24
RFC 3630 Conformance (continued)
Patching System A
GGSN CMC and SSC patching
From time to time, patches will need to be applied to a live GGSN
without impacting the operation of the tasks being executed by any
particular GGSN processor. The GGSN incorporates a variety of card
types with variable numbers of processors. The GGSN patch manager
addresses the requirements to patch the Control and Management
Card (CMC) and the Subscriber Service Card (SSC).
GGSN patches can be applied from the SCS client. Patch status are
recorded on the SCS client for synchronization and reporting. Each
patching action for a GGSN generates a System Information Log.
These logs, along with other System Information Logs, are displayed
as Session Logs for the device.
Patch Package
Beginning with GGSN 5.0.1 release, the GGSN can be patched with a
patch package. A patch package is a bundle of patches that can be
Patching functions
Persistency operation
The persistency operation sets the state of a patch for the entire
system. The possible persistency operations are Persistent and Non-
Persistent. Persistent means that the patch is to be automatically
loaded when the GGSN reboots; the user marks patches persistent
after sanity of the patch has been verified. Non-persistent means that
the patch is not automatically reapplied if the GGSN reboots. Patches
can move between the persistent state and the non-persistent state.
Patching directives
The Activate operation turns on special functionality that the patch
writer built into the patch. This operation gives the patch writer the
flexibility of applying the patch before completely turning on all new
functionality. The user can activate a patch by setting the directive in
the patch rule; it can also be invoked through the “Sync States”
operation (explained later).
The Deactivate operation turns off the special functionality that has
been coded into the patch. The user can deactivate a patch by setting
the patch directive in the patch rule; it can also be invoked through the
“Sync States” operation.
Verify operation
The Verify operation performs many of the patch verification steps to
see if the patch profile can be applied to a particular GGSN. Among
other things, this operation makes sure the device can download the
patches in the profile. The GGSN decompresses the patch files and
verifies basic file integrity. The device also makes sure the patches for
the current system release fit into the available patch memory. The
device always generates an event log when a verify operation is
performed. This operation does not affect patch status.
Query operation
The Query operation allows the user to query the available patch
memory and the status of patches on particular nodes. This operation
does not affect the patch status on the GGSN, but it may update the
current status of the patches on the SCS.
Sync operation
The Sync operation causes the GGSN to make sure that it has all
patches that the SCS thinks it should have. Discrepancies may have
been created due to network connectivity issues or other race
conditions. The Sync operation may cause the GGSN to apply,
unapply, activate or deactivate patches.
Unapply Operation
This operation causes a patch to be removed from the GGSN. All
configuration information and associated patch files are permanently
deleted.
Patching privileges
By default, only ‘device_owner’ user on the SCS client is given
access to Add/ Modify/ Delete patch functionality. To access the
patching functionality, the ‘device_owner’ user selects the patch icon
in the Image Panel or the Patch Manager item in the View menu.
Reference
Please refer to GGSN NTP: Nortel GGSN Provisioning Procedures
(411-5221-927) for GGSN 5.0.1 for detailed instructions of GGSN
patching functionality.
Private Extension IE
On the Nortel GGSN, the following Private Extension IE is included in
the Create PDP Context Request message and Update PDP Context
Request message sent from the SGSN. The Extension Identifier field
is the value of the Private Enterprise number defined in RFC 1700.
The Cell Global Identification of GTP version 0 and the Service Area
Identifier (SAI) of GTP version 1 are the information included in the
Extension Value field.
The Opcode Type is set to 2 for GTP version 0 and set to 3 for GTP
version 1 in the private extension. The Routing Area Code (RAC) field
of Cell Global ID and SAI is optional. As a result, there are 2 formats
for the Cell Global ID and SAI which is identified by the Length field in
the private extension. The format of Extension IE for GTP version 0 is
specified in Figure B-1 and the format for GTP version 1 is specified in
Figure B-2.
Figure B-1
The Private Extension IE Format for GTP Version 0
Bits
Octets 8 7 6 5 4 3 2 1
1 Type = 255 (Decimal)
2 -3 Length
13 - 14 Cell Identity
Figure B-2
The Private Extension IE Format for GTP Version 1
Bits
Octets 8 7 6 5 4 3 2 1
1 Type = 255 (Decimal)
2 -3 Length
7
Mobile Country Code
8
Table B-1
IPv4 mapped IPv6 P-CSCF Address format
0x01
0x00
0x00
0x00
0x00
0x00
0x00
0x00
0x00
0x00
Mapped 0xFF
address Ind
0xFF
0xXX
0xXX
Table B-2
IPv4 P-CSCF Address format
0x01
0xXX
0xXX
0xXX
The tables below depict all the mandatory, conditional, and optional
fields supported in the G-CDR, as well as the format and sizes of the
fields when transferred to the CGF compliant to 32.015 version 3.2.0
and version 3.6.0. The fields are encoded in the least amount of bytes
possible per the encoding rules of the encoding format used.
Table B-3
G-CDR Fields and Descriptions for 32.015 version 3.2.0
Served IMSI M IMSI of the served party (if Anonymous Access BCD- 3-8
Indicator is FALSE or not supplied). encoded
Octet
String
Charging ID M PDP context identifier used to identify this PDP Unsigned 1-4
context in different records created by GSNs. Integer
SGSN M List of SGSN addresses used during the open Hex-value 4 bytes
Address lifetime of the record Octet per
String address
Access Point M The logical name of the connected access point to IA5 String 1 - 63
Name the external packet data network (network
Network identifier par of APN).
Identifier
List of Traffic M A list of changes in charging conditions for this Table B-7
Data PDP context, each time stamped.
Volumes
Cause of M The reason for the release of record from this Integer 1-4
Record GGSN.
Closing
Table B-4
G-CDR fields and descriptions for 32.015 version 3.6.0
SGSN M List of SGSN addresses used during the open Hex-value 4 bytes
Address lifetime of the record Octet per
String address
Access Point M The logical name of the connected access point to IA5 String 1 - 63
Name the external packet data network (network
Network identifier par of APN).
Identifier
APN O An index indicating how the APN was selected. Unsigned 1-4
Selection Integer
Mode
List of Traffic M A list of changes in charging conditions for this Table B-7
Data PDP context, each time stamped.
Volumes
Cause of M The reason for the release of record from this Integer 1-4
Record GGSN.
Closing
Table B-5
Subsequent Partial G-CDR Billing Record Fields version 3.2.0
Field Description
Cause of Record M The reason for the release of record from this
Closing GGSN.
Record C Partial record sequence number, only present in
Sequence case of partial records.
Number
Field Description
Table B-6
Subsequent Partial G-CDR Billing Record Fields for 32.105 version 3.6.0
Filed Description
Filed Description
Cause of Record M The reason for the release of record from this
Closing GGSN.
The table below depicts the format of the Traffic Data Volume
Container.
The fields are encoded in the least amount of bytes possible per the
encoding rules of the encoding format used.
Table B-7
G-CDR Traffic Data Volume Container
Uplink Data M Uncompressed data count (octets) received from Integer 1-4
Volume Gn interface.
Change Time M Timestamp when new volume counts are started BCD- 9
or CDR is closed encoded
Octet
String
Table B-8
Best Effort Values
The fields are encoded in the least amount of bytes possible per the
encoding rules of the encoding format used.
Table B-9
Management Extension Format
Table B-10
CBB Version 2 Information field detailed description
Octet Bits
s
8 7 6 5 4 3 2 1
1 Tag = 0x04
Octet Bits
s
8 7 6 5 4 3 2 1
2 Length
3 Reserved Rate Container
5
6
9
10
11
Reserved
• The reserved field is not used at present. Both bits are set to the
value 1.
Rate
rate 0 (free) 0
rate 1 1
rate 2 2
rate 3 3
rate 4 4
Container
• The count field contains the number of bytes for the specified rate,
in the uplink (mobile -> GGSN) direction, for the specified
container.
Downlink Byte Count
• The count field contains the number of bytes for the specified rate,
in the downlink (GGSN -> mobile) direction, for the specified
container.
As mentioned above the information string in the management
extension is composed of a tag, a length and a value. Given an
example string - ‘04 09 C1 00 00 00 F0 00 00 00 F0’
CBB Version 3
The ObjectID field for CBB Version 3 is “1.2.840.113533.4.10.1.1.3”.
This value is passed as an ASCII string. The data placed into this field
are encoded as an octet string with tag 0x04.
Table B-11
CBB Version 3 Information Field
Octet Bits
s
8 7 6 5 4 3 2 1
1 Tag = 0x04
2 Length
3 Container ID Number of Content Type IDs
4 Content Type ID
6 Uplink Count
10 Downlink Count
11
12
13
CBB Version 4
Version 4 CBB Management extension version is introduced to
support reporting time usage for a particular content type identifier
within the G-CDR container.
Table B-12
CBB version 4 management extension
Octet Bits
s
8 7 6 5 4 3 2 1
1 Tag = 0x04
2 Length
4 Content Type ID
6 Uplink Count
7
8
10 Downlink Count
11
12
13
14 Time Usage
15
16
17
Time Usage
• The time usage field contains the total usage time for the specified
context typeid in seconds.
Octet 3 represents the traffic volume container ID in which the content
IDs were captured along with the number of content IDs captured in
the container. This octet may be repeated when there are multiple
containers in a billing record and content types are captured in multiple
traffic volume containers. The bytes from 4 to 17 can be repeated up to
9 times within a container. Furthermore we can have up to 4
containers in CBB management extension. Once a PDP session uses
10 content type IDs in a container, a partial billing record is generated
with Cause of Record Closing field set to Management Intervention.
This G-CDR generated will include the first 9 unique content type IDs
accessed while the corresponding traffic volume container was open.
The 10th rate will be included in the next partial record generated.
It is decoded below:
CBB Version 5
Version 5 CBB Management extension version is introduced to
support reporting time usage for a particular content type identifier
within the G-CDR container.
Table B-13
CBB version 5 management extension
Octet Bits
s
8 7 6 5 4 3 2 1
1 Tag = 0x04
2 Length
4 Content Type ID
5
6 Uplink Count
8
9
10 Downlink Count
11
12
13
14 Time Usage
15
16
17
19
20
21
23
Time Usage
• The time usage field contains the total usage time for the specified
content typeid in seconds.
• The First packet timestamp contains the timestamp of the first
packet sent/received for the specified content typeid.
• The remaining inactivity time contains the unaccounted inactivity
time for the specified content typeid in seconds.
Octet 3 represents the traffic volume container ID in which the content
IDs were captured along with the number of content IDs captured in
the container. This octet may be repeated when there are multiple
containers in a billing record and content types are captured in multiple
It is decoded below:
CBB Version 6
New CBB Management extension version (version 6) is introduced to
support reporting event usage for a particular content type identifier
within the G-CDR container. Upgrade of the CGF to support this
management extension version is required before changing the
configuration of CBB management extension version setting in CGF
Profile on GGSN to prevent loss of billing information.
Table B-14
CGF CBB Management Extension version 6
Octet Bits
s
8 7 6 5 4 3 2 1
1 Tag = 0x04
2 Length
4 Content Type ID
6 Uplink Count
7
8
10 Downlink Count
11
12
13
15
16
17
20
21
23
24 Event Count
25
26
27
Table B-15
Shasta Service Profile Information Field
Octet Bits
s
8 7 6 5 4 3 2 1
1 Tag = 0x16
2 Length
Example:
16 10 69 70 5F 73 65 72 76 69 63 65 5F 70 72 6F 66 69
69 70 5F 73 65 72 76 69 63 65 5F 70 72 6F 66 69 = ip_service_profi
Octet Bits
s
8 7 6 5 4 3 2 1
1 Tag = 0x16
2 Length
This extension contains the name of the VPN profile the subscriber
has been assigned. This Management Extension is present if
SHASTA-VPN VSA is returned in RADIUS Access-Accept message.
The Object ID for SHASTA-VPN is assigned
“1.2.840.113533.4.10.1.3.1”.
Example:
16 0D 76 70 6E 5F 70 72 6F 66 69 6C 65 5F 31
76 70 6E 5F 70 72 6F 66 69 6C 65 5F 31 = vpn_profile_1
Table B-17
Shasta Prepaid Profile Information Field
Octet Bits
s
8 7 6 5 4 3 2 1
1 Tag = 0x16
2 Length
3-18 SHASTA-PREPAID_SERVER (up to 16 characters of Prepaid Server
name)
Example:
16 10 70 72 65 70 61 69 64 5F 70 72 6F 66 69 6C 65 5F
70 72 65 70 61 69 64 5F 70 72 6F 66 69 6C 65 5F = prepaid_profile_
Table B-18
Tunnel Server Endpoint IP Address Information Field
Octet Bits
s
8 7 6 5 4 3 2 1
1 Tag = 0x04
2 Length
Example
Length = 0x04
Tag= 0x04
Example:
04 08 54 45 53 54 2d 56 53 41
54 45 53 54 2d 56 53 41 = TEST-VSA
Table B-19
Transparent Data VSA Information Field Description
Octet Bits
s
8 7 6 5 4 3 2 1
1 Tag = 0x04
2 Length
Tag
Table B-20
IMEISV in G-CDR
Octet Bits
s
8 7 6 5 4 3 2 1
1 Tag = 0x04
2 Length (8)
3 TAC Digit 2 TAC Digit 1
RAT Type
RAT Type management extension records the RAT Type for all the
containers in the G-CDR. Inclusion of RAT Type management
extension is configurable per CGF profile. The objectId of RAT Type
The values supported for RAT Type are, Unknown (0), UTRAN(1),
GERAN(2), and WLAN(3). GERAN represents GPRS access
technology and UTRAN represents UMTS access technology. If the
RAT Type is not available, RAT Type is set to Unknown.
Table B-21
RAT Type management extension
Octet Bits
s
8 7 6 5 4 3 2 1
1 Tag = 0x02
2 Length = 1
3 RAT Type for RAT Type for RAT Type for RAT Type for
container #4 container #3 container #2 container #1
The information field encodes RAT Type for the containers in the G-
CDR. Bits 1, 2 encode RAT Type for first container. Bits 3, 4 encode
RAT Type for second container. Bits 5, 6 encode RAT Type for third
container. Bits 7, 8 encode RAT Type for fourth container. The RAT
Type is encoded as follows:
Example for RAT Type management extension (all values are in hex):
25 = a bit field, encoding the RAT Type for the four containers. 0x25 is
00100101 in binary.
PLMN Identifier
PLMN Identifier, either received from SGSN or derived on the GGSN,
is recorded as an optional management extension in G-CDR. Inclusion
of PLMN ID management extension is configurable per CGF profile.
The data in the management extension is a table of PLMN identifiers.
Each change in SGSN results in recording the corresponding PLMN
Identifier, if available. The PLMN identifiers are chronologically
ordered with the most recent as the last PLMN identifier. The ObjectID
field for PLMN Identifier in G-CDR Management extension is
“1.2.840.113533.4.10.1.9.1”. The tag for the management extension is
0x04. PLMN Identifier management extension will be included in all G-
CDRs. The format for PLMN identifiers in G-CDR is shown in Table B-
10.
Table B-22
PLMN in G-CDR
Octet Bits
s
8 7 6 5 4 3 2 1
1 Tag = 0x04
Octet Bits
s
8 7 6 5 4 3 2 1
3- x MCC2 MCC1
MNC1 MCC3
MNC3 MNC2
Table B-23
PLMN encoded in BCD
Octet Bits
s
8 7 6 5 4 3 2 1
1 Tag = 0x04
2 Length (6)
HSDPA
Nortel Networks GGSN sends the HSDPA values to CGF in the G-
CDR management extensions. When a QoS parameter is sent with
Rel 5 QoS parameters, then the first 12 octets are sent as the
negotiated R99 QoS parameters in G-CDR and only the octets 14 to
16 which include the HSDPA parameters are sent in the G-CDR
management extension. If octet 15 or 16 is received with a value
greater than 0x4A, Nortel Networks GGSN returns a value of 0x4A in
the response. HSDPA parameters are sent to GTP Accounting in
Management Extension with octet tag 0x04 and object id
1.2.840.113533.4.10.1.12.1.
If there is a QoS change for the PDP context, old and new HSDPA
related parameters of QoS is captured in the new management
extension with reference to the Container number. Please refer to
Table B-24 for the example of HSDPA management extension.
Table B-24
HSDPA management extension
Octet Bits
s
8 7 6 5 4 3 2 1
1 Tag = 0x04
2 Length = 1-13
Octet Bits
s
8 7 6 5 4 3 2 1
3 Container Indicator
4-6 HSDPA information Container # 1
Table B-25
Parking Meter Management extension
Octet Bits
s
8 7 6 5 4 3 2 1
1 Tag = 0x04
2 Length (0x1A)
Octet Bits
s
8 7 6 5 4 3 2 1
Container ID: The Container ID field identifies the value of one of the
QoS containers within the G-CDR. Maximum number of Containers
being supported are 4.
Number of Parking Meter for the Container: This field’s value identifies
number of Parking Meters in the container mentioned in container ID
field.
Parking Meter Content Type: This field’s value identifies the Content
Type for the Parking Meter.
Parking Meter Duration: This field’s value identifies the time duration
for the Parking Meter in seconds.The range for this value is between
60 to 3600.
Example 1:
Configuration:
CTP and DTP SOC enabled,
DTP configured to be reported at Expiry and
Maximum number of Closed Envelopes is 30.
Example 2:
Configuration:
Only DTP SOC enabled,
DTP configured to be reported at Start and
Maximum number of Closed Envelopes is 10.
Table B-26
Parking Meter Management Extension Version 2
Octets Bits
8 7 6 5 4 3 2 1
1 Tag = 0x04
2 Length
n (Max Length
129)
Octets Bits
8 7 6 5 4 3 2 1
n+3 Parking Meter Content Type (2 bytes)
Octets (n+3) to (n+21) are repeated for each Parking Meter or CTP
series in the container. Octets (n+1) to(n+21) may be repeated when
there are multiple containers in the billing record.
Length Octets
The length field is encoded in two forms: short (for lengths between 0
and 127), and long (for lengths greater than 127).
Short form: 1 octet. Bit 8 has value "0" and bits 7-1 give the length.
Long form: 2 to 127 octets. Bit 8 of first octet has value "1" and bits 7-1
give the number of additional length octets. Second and following
octets give the length.
Container ID
The Container ID field identifies the value of one of the QoS
containers within the G-CDR. Value of container id is supported in the
range 1-4.
Octet 12 indicates set of optional fields reported for the Parking meter:
• Reserved (3 bits)
The reserved field is not used at present. All 3 bits are set to the
value 0
• Envelope Closed
This bit field is used to indicate the end of a CTP series. For DTP
Time Event Charging this bit is always set
• Event count present
The fourth bit is set if event count is not 0 and is included in the
report for this time-envelope
• Downlink byte count present
The third bit is set if downlink byte count is not 0 and is included
in the report for this time-envelope
• Uplink byte count present
The second bit is set if uplink byte count is not 0 and is included
in the report for this time-envelope
• Number of Consecutive Parking Meters present
The first bit is set if the Number of Consecutive Parking Meters
field is included for a CTP series. For DTP this bit is set to zero.
Table B-27
Updating bit fields of the PM Management Extension Version 2
Feature Limitation
Parking Meter provisioning does not apply to contexts interfacing
with CTP prepaid servers and does not apply to PPP contexts.
DCC Events
This management extension reports Diameter CC real-time charging
cause codes in G-CDR record for the following exception cases:
Table B-28
DCC Event Cause Codes
The GGSN terminates the subscriber's PDP context due to failure handling 5
procedures (i.e. Terminate or Retry and Terminate behavior)
The GGSN opens a non-prepaid (i.e. postpaid assuming G-CDR records are 6
generated for the APN) PDP context due to failure handling procedures (i.e.
Continue behavior) following a CCR Initial
The GGSN converts the subscriber's PDP context to non-prepaid, such as after 10
receiving a Diameter CC Not Applicable, due to failure handling procedures
(i.e. Continue behavior) following a CCR Update
The GGSN receives a User Unknown result code from the Diameter CC server 25
a. If RulebaseID AVP is present, then the new management extension with the
event code will NOT appear in the G-CDR.
Along with the event code, a timestamp of the DCC Event will also be
captured in the G-CDR in a new GGSN Event Diagnostic management
extension, which initially will contain the DCC Event information but
which could also be used for other diagnostic purposes.
Table B-29
GGSN Event Diagnostic in G-CDR
Octet Bits
s
8 7 6 5 4 3 2 1
1 Tag = 0x04
4 Event Code
6
7
8 Timestamp
9
10
11
Given an Event Code of 15, the encoded string might be- ‘04 09 01 00
00 00 0F 42 B1 DE D5’
Table B-30
ULI Management Extension in G-CDR
Octet Bits
s 8 7 6 5 4 3 2 1
1 Tag = 0x04
2 Length
7
LAC
8
9
CI / SAC
10
Example:
Figure B-3
Example of ULI in G-CDR
CGI: MCC=123
MNC=456
LAC=0011
CI = 0022
04 08 00 21 63 54 00 11 00 22
CI = 0022
LAC = 0011
MNC = 456
MCC = 123
Geo. Loc. Type = CGI
Length
Tag = Octet String
Timestamp format
The Opening and the ChangeOfCharCondition timestamps in the G-
CDR are reported in local time. The contents of these fields are a
compact form of the Universal Time (UTC) format containing local time
(plus an offset to universal time). Binary coded decimal encoding is
employed for the digits to reduce the storage and transmission
overhead.
The data volumes counted on the Nortel GGSN cover the amount of
data transferred between the UDP and GTP protocol layers. The data
volumes are required to reflect the application data as precisely as
possible as delivered from/to the subscriber. The following rules apply
to the measurement of uplink & downlink data volumes on Nortel
GGSN:
When the file size reaches the operator defined size limit or when the
maximum open-time limit is reached, the file will be closed and a new
one opened. The SCS GUI or the CLI can also be used to manually
close the open G-CDR Billing file by changing the G-CDR file open-
time limit. This command will flush the G-CDR file RAM buffer to local
disk.
The following table describes the format of the G-CDR Billing Disk File
header.
Table B-31
Billing Disk File Header Format
Octet Bits
s
8 7 6 5 4 3 2 1
1-4 Offset
All of the fields in the header are signed 32-bit values in big-endian
format (network byte order). The descriptions of the fields are as
follows:
Offset field above). It contains the number of CDRs read from the
file for sending to the CGF. For files in which none of the records
have been sent to a CGF, the value of CDRs Read from File is
zero.
• File size - This field indicates the total size of the file in octets,
including the file header.
• G-CDR Record Version - This field indicates the record version as
specified in 32.015 V3.2/3.6. A value of 1 indicates V3.2; a value of
7 indicates V3.6.
Following the header, there are one or more encoded G-CDR records,
each of which is preceded by four octets describing the length of the
encoded record.
Table B-32
Billing Disk File Record Format
Octet Bits
s
8 7 6 5 4 3 2 1
When a file has been completely processed (i.e. all the G-CDRs in the
file have been sent to a CGF), the file will be deleted from the Nortel
GGSN local disk.
Step Action
4 Provide a name in the New Profile window, and select OK. The CGF
Profile General page will appear and the configuration can be changed if
desired
Figure B-4
Warning display for the creation of the CGF Profile
Step Action
9 Click on the Select button next to the CGF field for a list of available CGF
Profiles.
10 Click on the Select button next to the Device field for a list of devices and
select the GGSN on which the CGF Profile will be installed
RADIUS Protocol
Please refer to Nortel GGSN RADIUS Interface Guide (411-5221-928),
for detailed information regarding RADIUS protocol interface on the
WRAP Protocol
RFC Attributes
This section specifies the RFC attributes used in the WRAP protocol.
Table B-33
RFC WRAP protocol attributes
Type Attribute Name Description
1 User-Name IP PDU type: User name from PCO
Information Element from Create PDP
Context Request. If Anonymous Mode of
RADIUS Authentication is supported and
PCO is not included, MSISDN is used in
the User-Name parameter send to the
RADIUS Server.
4 NAS-IP Address IP address of the NAS requesting
authentication. (GGSN Gi ISP address)
8 Framed IP Address IP address returned from RADIUS Server
or local address pool or DHCP after
authentication.
25 Class Returned by NAS unmodified in
Accounting-Request. There are up to 4
Class attributes that can be stored on
GGSN and returned to RADIUS Server.
26 Vendor Specific See 3GPP VSA descriptions.
30 Called-Station-ID APN from the Create PDP Context
Request.
31 Calling-Station-ID MSISDN of the mobile subscriber. SCS
Selectable see note 1.
40 Acct-Status-Type START, STOP, INTERIM
44 Acct-Session-ID Unique Accounting ID to make it easy to
match start and stop records. GGSN uses
GGSN Gn IP + Charging ID for this.
46 Acct-Session-Time Indicates how many seconds the user
has received service for. Only present in
INTERIM & STOP messages.
55 Event-Timestamp The timestamp of the event.
Location Information
The Nortel UMTS/GPRS network architecture supports roaming for
prepaid subscribers in a transparent way. Using GTP Private
Extension IE, the subscriber can be located and the appropriate tariff
is applied. The parameters describing subscriber’s location are Mobile
Country Code (MCC), Mobile Network Code (MNC), Local Area Code
(LAC) and Cell ID (CI) in the Cell Global ID. When there is no GTP
Nortel Private Extension or these parameters are not present in the
GTP message, the SGSN IP address is included in the Service
Request message and sent to the Prepaid Server. The SGSN IP
address is carried in the LAC and CI fields of the CTP protocol. The
Prepaid Server will map the address to the associated MCC and MNC
thus enabling the Prepaid Server to differentiate billing by originating
network.
Multiple Sessions
When a prepaid data subscriber initiates multiple simultaneous data
sessions, each session is treated separately, i.e. each session
undergoes the authorization and re-authorization process
independently and the cost of each session is debited from the
subscriber’s account independently.
Reauthorization Timer
A re-authorization timer can be configured to force periodic re-
authorization if the authorized volume is not exhausted within the
specified time. The timeout period is specified in the SCS GUI and
defaults to Disabled. This timeout is supported for CTP version 1. CTP
version 3 has similar functionality, but it exists as part of the coupon
definition instead of being specified in the SCS GUI.
If multiple rates are not desired, then the new Non-Rated Coupon IE
can be used to provide an enhanced version of the coupon used in the
Basic Single-Coupon service.
Non-Rated Coupon
CTP version 3 contains a non-rated coupon to take on the function of
single coupon billing. When this coupon is in use, all data packets in
the PDP session are counted against this coupon. Note that prepaid
Coupon ID zero (i.e. rate ID zero) is not a free rate and is reported like
any other rate. If operator wants to support a free rate, then they
should use rated coupons.
For non-rated single coupon, if the coupon is denied, the PDP session
is taken down irrespective of what the Denied Coupon Behavior on the
SCS GUI. Also, the coupon Authorization Behavior is not applied to
non-rated sessions. Coupon Authorization Behavior is specified via
the field Authorization Behavior which is part of CTP version 3 settings
on the SCS GUI. So data packets are always allowed for non-rated
sessions during re-authorization irrespective of the configured
authorization behavior.
Rated Coupon
The Prepaid Server initiates the tariff time change functionality by
authorizing a rated coupon with a trigger subtype IE containing the
tariff time change trigger. The trigger subtype IE has an action of use
tariff change coupon.
During a tariff time change, the usage is preserved within the first
coupon along with the time in which the tariff change occurred. A
second coupon is created to track the usage after the tariff change.
Once the coupons need to be re-authorized or returned, the first
coupon contains the coupon include reason of Return Coupon - usage
before tariff change. The time stamp subtype IE is populated with the
time the tariff change occurred. The usage report subtype IEs contain
the resource usage prior to the tariff change. Immediately following is
the second coupon with the normal coupon include reason indicating
why the coupon is being returned along with the subtype IEs reporting
the usage after the tariff change. Both coupons must contain the same
rate ID.
Triggers
Triggers can be included as a sub-IE within either the Rated Coupon
or Non-Rated Coupon IE. Multiple triggers can be included in each
coupon IE. A single trigger consists of a trigger type, a trigger action
and possibly a trigger value. The trigger type specifies which event
triggers the action. The trigger action indicates the GGSN what to do
with the coupon when the trigger event happens. The trigger value
field conditionally stores extra information needed to watch for the
event such as a time value or a threshold value.
type and coupon timing. The following table gives the valid trigger
scenarios for the trigger actions being taken. The invalid trigger
scenario will bring down the PDP session.
Table B-35
Valid trigger actions for various trigger scenarios
Trigger Type Coupon Type Coupon Timing Trigger
Action
QoS Change Rated Re-Authorize Valid
Coupon
Return Coupon Invalid
Use tariff change Invalid
coupon
Non-Rated Re-Authorize Valid
Coupon
Return Coupon Invalid
Use tariff change Invalid
coupon
SGSN Rated Re-Authorize Valid
Address Coupon
Change Return Coupon Invalid
Use tariff change Invalid
coupon
Non-Rated Re-Authorize Valid
Coupon
Return Coupon Invalid
Use tariff change Invalid
coupon
Idle Coupon Rated Re-Authorize Invalid
Timeout Coupon
Return Coupon Valid
Use tariff change Invalid
coupon
Non-Rated Re-Authorize Invalid
Coupon
Return Coupon Invalid
Use tariff change Invalid
coupon
Table B-35
Valid trigger actions for various trigger scenarios
Trigger Type Coupon Type Coupon Timing Trigger
Action
Coupon Rated Re-Authorize Valid
Absolute Coupon
Lifetime Return Coupon Valid
Use tariff change Invalid
coupon
Non-Rated Re-Authorize Valid
Coupon
Return Coupon Invalid
Use tariff change Invalid
coupon
Coupon Rated Re-Authorize Valid
Relative Coupon
Lifetime Return Coupon Valid
Use tariff change Invalid
coupon
Non-Rated Re-Authorize Valid
Coupon
Return Coupon Invalid
Use tariff change Invalid
coupon
Re- Rated Re-Authorize Valid
Authorization Coupon
Threshold Return Coupon Invalid
Use tariff change Invalid
coupon
Non-Rated Re-Authorize Valid
Coupon
Return Coupon Invalid
Use tariff change Invalid
coupon
Tariff Time Rated Re-Authorize Invalid
Change Coupon
Return Coupon Invalid
Use tariff change Valid
coupon
Non-Rated Re-Authorize Invalid
Coupon
Return Coupon Invalid
Use tariff change Invalid
coupon
Table B-35
Valid trigger actions for various trigger scenarios
Trigger Type Coupon Type Coupon Timing Trigger
Action
RAT Change Rated Re-Authorize Valid
Coupon
Return Coupon Invalid
Use tariff change Invalid
coupon
Non-Rated Re-Authorize Valid
Coupon
Return Coupon Invalid
Use tariff change Invalid
coupon
Transparent Data
The Transparent Data IE contains vendor specific information for the
current session. This IE provides vendor specific information, possibly
obtained via RADIUS, that can be used by the server for billing
purposes. The Transparent Data IE is optional, but can be sent in the
CTP Service Request Initial Authorization, Re-authorization and Final
messages, only if the Transparent Data was received from RADIUS
during the session setup.
• Re-Auth Request
• Final Report
Even though multiple CBB policies may be received, only the service
profile containing the active CBB policy is sent to the Prepaid Server.
If a CBB policy is not available, then the Service Profile Name IE is not
included in the GPRS service request messages.
Time Stamp
The Time Stamp IE contains the coupon reporting or authorization
time. For the GGSN, this timestamp indicates when the authorization
request or coupon report was generated. For the Prepaid Server,
indicates when the coupons was authorized.
If the GGSN requests for coupons and a tariff time change occurs prior
to the response, this timestamp IE is used to determine if the tariff
change should be applied to the received coupons.
Figure B-5
Message Flow with ToD Event
S1 Coupon allocation
ToD Event: time for
S1 = 12:00:00
ToD Time = 12:00:00
S2
T2 S2 = 11:59:59
T3
Initial Auth Response
12:00:00 or Re-auth Response
If the time value is prior to the tariff time change (S2), then the coupons
are treated as if the tariff change has occurred. For initial responses,
the first coupon reports zero usage and the second coupon contains
all the usage. For re-authorization responses, the first coupon reports
the usage between the time the request was sent and the response
was received. The second coupon contains the remaining usage. For
both the initial response and reauthorization scenarios, the timestamp
contains the time the response was received.
Dual Coupons
Nortel GGSN supports “Return Coupon - unused tariff change coupon”
Coupon Include Reason for the GPRS service request message and
two Coupon Include Reason for the GPRS service response,
Successful - Coupon for after tariff change and Denied - Coupon for
after tariff change. These include reasons are only allowed in Rated
Coupon IEs. The Successful - Coupon for after tariff change and
Denied - Coupon for after tariff change include reasons are the only
reasons that the GGSN accepts in the after-coupon
After the Create PDP context is received, the GGSN may perform user
authentication to a RADIUS server as normal. Once the GGSN
receives a positive response from the authentication, the Diameter
Credit Control messaging can begin to authorize the session. The
Initial Credit Control Request (CCR) contains the subscriber
information such as IMSI, MSISDN, IP address and user name when
available. Additionally, the Initial request may contain requests for
service quota if the GGSN Diameter Credit Control profile has been
configured for this.
The Credit Control Answer (CCA) may contain service quota in the
form of Granted-Service-Units (Bytes, seconds, etc.) if the subscriber
account has sufficient funds available and usage has been authorized.
Multiple instances of service quota may be present, each to be used
for a particular traffic or service type as tracked by the GGSN.
At the end of the subscriber’s session, the GGSN sends a Final CCR
to the Diameter Credit Control server to report the amount of the quota
allocation that has been used. At the same time the RADIUS STOP
message is also sent to the RADIUS Accounting server and a G-CDR
is generated if GTP’ accounting is enabled.
The GGSN then redirects any subscriber traffic for the service being
redirected towards the URL provided by the server. At this point the
subscriber may top-up the account. This prompts the Diameter server
to issue a Re-Authorize Request to the GGSN for that session. This
instructs the GGSN to request new quota for the session, which in the
example below, allows the subscriber to use the service.
The Parking Meter Model supports postpaid services when the DCC
Server returns a Credit Control Not Applicable (CCNA) response in the
Credit Control Answer (CCA) initial at context set-up. The DCC Server
identifies rating groups for which the Parking Meter model is to be
applied by including a MSCC AVP with the TQM AVP for each such
rating group. The TQM AVP defines Parking Meter duration for that
rating group. The GGSN supports receiving MSCC AVPs in the CCA-I
message level or within the Offline-Charging AVP of the CCA-I. The
attributes received in the MSCC level within the Offline-Charging AVP
override the attributes received in the MSCC level within the CCA-I
message level. If one or more MSCC AVPs are received in the Offline-
Charging AVP, all MSCC AVPs in the CCA-I message level are
ignored.
The GGSN can also receive the TQM AVP in the Offline-Charging
AVP. This TQM is used as default if the TQM AVP is not specified in
the MSCC AVP.
Feature Limitation
Parking Meter provisioning does not apply to contexts interfacing with
CTP prepaid servers and does not apply to PPP contexts.
A timer value Tw which detects the transport layer failure and a user
response timer Tx which provides real-time response for subscriber’s
credit control requests are defined. In addition, a request timeout timer
Tr is defined. If a credit control request issued by the DCC client has
not been answered for the duration of Tr, the request is no longer
considered valid.
First, the expiration of the Tx timer triggers the failure handling process
for a DCC request. This timer expires because the answer for the
request did not come soon enough. The underlying network may or
may not have problem. The requested message could be late because
of busy network. However, DCC client needs to respond to the end
user quickly because of the real-time nature of credit control process.
After Tx expires, if CCFH setting is TERMINATE, the DCC client will
terminate the PDP context associated with the current DCC session. If
CCFH is not TERMINATE, the DCC client will continue to allow the
subscriber to use the current service without a renewed coupon.
In reality, the distinction between these stages may not be very clear.
For example, since Tw applies to the DCC client and its peer, while Tx
applies to individual DCC request, it is possible that Tw expires before
a particular Tx expires. If this happens, the DCC client will handle the
situation as specified by the CCFH setting.
Table B-36
Session Failure Handling
RETRY_AND_TERMINATE
RETRY_AND_TERMINATE
The CCFH setting is also used to handle certain situation when the
received reply message contains error result code. The result can be
either Permanent Failure or Temporary Failure, as defined by
Diameter Base document. The handling processes are listed in the
following table.
Table B-37
Roared Reply Handling
RETRY_AND_TERMINATE
RETRY_AND_TERMINATE
CONTINUE
RETRY_AND_TERMINATE
When a DCC client fails to receive any answer from a DCC server, the
DCC client also check the agent type of next available DCC peer to
determine if a failover should be initiated. If the next available DCC
peer is a DCC proxy or a relay, a failover is initiated regardless of the
setting of CC-Session-Failover, as show in table below. The
destination host in the new update CCR message in this case will
remain to be the same as the failed CCR message. Such handling can
reduces number of request failures caused by bad connection to the
immediate DCC peer.
When the Tx timer expires on CCR(I) and the CCFH is continue then
the call is converted to postpaid otherwise it is Terminated.
When the Tx timer expires on CCR(F) the request time out timer is
started and the call waits for a possible late response or a failure over
condition is detected then the request is retransmitted. If no response
comes back and the Request Timeout timer times out. Then all
resources are cleaned.
Table B-38
DCC Agent Type and DCC Failover
FAILOVER_NOT_SUPPORTED No
FAILOVER_NOT_SUPPORTED Yes
Proxy/Relay Server FAILOVER_SUPPORTED Yes
FAILOVER_NOT_SUPPORTED No
When the interval is configured, a timer starts at that point. The SNMP
trap can only occur at the end of the interval. At that time, the number
of Tx Expirations that occurred during that interval is compared to the
configured thresholds. If the number is greater than or equal to the
Major threshold, but less than the Critical threshold, then a Major
event is raised. If the count is greater than the Critical threshold, then a
Critical event is raised. The internal timer and counter used for this
calculation are then reset. Note that since the calculation is only made
at the end of the interval, any changes to the configured threshold
values during an interval will be in effect at the end of that interval,
However, a change to the interval value itself will result in restarting
the timer and resetting the counter.
• “Set Prepaid CC” is marked for the set of rules, for the IMSI profile
associated with the APN, that matches IMSI of the subscriber
• Charging Characteristics supplied by the SGSN is marked as
prepaid
IPSec Support
The IPSec feature is enabled. Its configuration is described below.
Figure B-6
IPSec Tunnels in Diameter Network
GGSN Diameter
Server
Diameter
Proxy
GGSN Configured
IPSec Tunnels IPSec Tunnels not
Configured by GGSN
Diameter
Relay
Any data that the GGSN receives from the Diameter Peer must be IKE
traffic (for tunnel configuration and keep-alive) or IPSec traffic (the
actual data). Any data that is not IKE or IPSec will be silently discarded
by the GGSN using the configured ISP security policy. Any IPSec data
that the GGSN receives that it cannot authenticate using existing
IPSec Security Associations will be silently discarded as well. The
Diameter or DCC applications will not have any knowledge of these
packets as they will be dropped at the IPSec layer.
Triggers
GGSN uses triggers to initiate re-authorization when certain system
information is changed. For example, when an SGSN trigger is
enabled, GGSN generates a re-auth request when SGSN changes.
Similarly, triggers can be configured for QoS change, RAT change,
etc.
If the initial CCA to a PDP context does not include any trigger AVPs,
the default trigger setting will be used for all coupons included in the
CCA. The default setting remains effective until a trigger AVP is
received.
When at least one trigger AVP is received in the initial CCA or any
update CCA, the triggers with types corresponding to the received
trigger AVPs will be enabled. All other triggers will be disabled. If no
trigger AVPs are received in an update CCA, all trigger settings on the
current coupon will be the same as in the previous coupon of the same
rating group.
SGSN change trigger, QoS change trigger, and RAT change trigger
are supported.
Quota Threshold
Quota threshold allows a coupon be re-authorized before the quota is
exhausted.
quota, regardless if the quota type is time or volume. All DCC sessions
using the same Diameter profile have the same quota threshold
setting for all coupons on all of the sessions.
Both AVPs contains absolute value of quota threshold. The time quota
threshold AVP contains threshold for time based quota in seconds.
The volume quota threshold AVP contains threshold for volume based
quota in number of bytes.
A zero valued quota threshold AVP disables the quota threshold for
that quota type. The threshold values contained in quota threshold
AVPs cannot be larger than the corresponding quota values. If the
threshold value is larger than the quota value, it is set to zero, i.e.
quota threshold is disabled.
Table B-39
Effect of Default Quota Threshold Trigger
Both time quota threshold AVP and volume quota threshold AVP can
be included within a single MSCC AVP. In that case, only the threshold
with the same type as the quota type will be used. If the MSCC also
contain two quota type, i.e. both time and volume quota, both
threshold values will be sent to GTP backend for prepaid checking.
Whichever threshold being crossed first will trigger a re-authorization
on that coupon.
When a DCC session is setup, all coupons in the session shall have
the same quota idle time as that provisioned in the Diameter profile
until a quota idle time AVP is received for the rating group.
If a quota idle time AVP is included in the received MSCC, either in the
initial CCA or the update CCA, the quota idle time of the coupon will be
set according to the value contained in the quota idle time AVP, i.e.
zero to disable and non-zero to enable.
If the quota idle time AVP is not included in the received MSCC AVP,
the quota idle time of the coupon will be the same as the previous
coupon of the same rating group.
The quota idle time applies to both time based and volume based
quota.
When quota idle time AVP is received by the DCC client together with
quota inactivity time (see later section), the quota idle time value must
be larger than or equal to that for quota inactivity time. If received
quota idle time is less than quota inactivity time, the setting of both
quota idle time and quota inactivity time from the previous coupon of
the same rating group will be used.
The quota inactivity time can be provisioned via Diameter profile from
SCS.
When a DCC session is setup, all coupons in the session shall have
the same quota inactivity time as that provisioned in the Diameter
profile until a quota inactivity time AVP is received for the rating group.
If the quota inactivity time AVP is not included in the received MSCC
AVP, the quota inactivity time of the coupon will be the same as the
previous coupon of the same rating group.
The quota inactivity time AVP is only valid when the quota is time
based. If a quota inactivity time AVP is included in a MSCC AVP that
contains only a volume based quota, the AVP is ignored.
The GGSN provides the optionality to exclude the QCT Time from the
reported usage for prepaid PDP contexts. If the option is set to exclude
QCT Time, the following is the time usage reporting behaviour:
• Not including the QCT Time period if the Idle Time between two
consecutive packets is equal to or greater than the QCT Time.
• Not including any of the Idle Time between the last packet and a
final usage reporting.
Validity Time
Validity time of a coupon determines the relative life-time of the
coupon. If the quota contained in the coupon has not been consumed
within the validity time specified in this AVP, the GGSN will initiate a re-
authorization for the coupon.
Validity time can be configured only via the validity time AVP, i.e. no
default value can be provisioned via SCS.
Tariff Change
The tariff change mechanism allows the credit control system to apply
different charging rate before and after a specific time, i.e. tariff change
time. To achieve this in a DCC system, the DCC client needs to report
separately the resource usage before and after the tariff change time.
The ToD feature can be activated via SCS by assigning the ToD profile
with an APN. All DCC sessions using the same APN will have the
same ToD setting.
A tariff change may occur for a specific coupon at any time given by a
Tariff-Change-Time AVP that is included in Granted-Service-Unit
(GSU) AVP by the DCC server.
Table B-40
Tariff Change and ToD
Dual Coupon
CC-Total-Octets no yes
CC-Input-Octets no yes
CC-Output-Octets no yes
CC-Service- no yes
Specific-Units
List of terms C
AF
Assured forwarding
APN
Access Point Name
APS
Automatic Protection Switching
ARP
Address Resolution Protocol
ASM
Active Session Management
BG
Border Gateway
BSN
Broadband Service Node
CBB
Content Based Billing
CCFH
Credit Control Failure Handling
CCA
Credit Control Answer
CCR
Credit Control Request
CGF
Charging Gateway Function
CGI
Cell Global Identification
CHAP
Challenge Handshake Authentication Protocol
CLI
Command Line Interface
CMC
Control and Management Card
Cold Standby
A redundancy feature where configuration information is available in the
StandBy unit, but the active session information is only in the active unit.
When a fault is encountered, the standby unit will take over all activities to
support setting up new sessions. All active sessions go down as the “active”
unit goes down.
CORBA
Common Object Request Broker Architecture
CSV
Comma Separated Values
CTP
Card Telephony Protocol
CTP
Continuous Time Period
DCC
Diameter Credit Control
DHCP
Dynamic Host Configuration Protocol
DNS
Domain Name Service
DTP
Discrete Time Period
DTI
Direct Tunnel Indicator
DTF
Direct Tunnel Flags
DSCP
DiffServ Code Point
ECMP
Equal Cost Multi-Path
EI
Error Indication
FTP
File Transfer Protocol
G-CDR
GGSN Call Detail Record
GCSI
GPRS CAMEL Subscription Information
GERAN
GPRS EDGE Radio Access Network
GGSN
Gateway GPRS Support Node
GPRS
General Packet Radio Service
GRE
Generic Routing Encapsulation
GSM
Global System for Mobile communications
GSN
GPRS Support Node
GTP
GPRS Tunneling Protocol
GTP-C
GTP Control - This protocol tunnels signalling messages between SGSNs
and GGSNs, and SGSNs, in the backbone network.
GTP-U
GTP User - This protocol tunnels user data between GPRS Support Nodes
in the backbone network. All PDP PDUs are encapsulated by the GPRS
Tunneling Protocol.
HLR
Home Location Register
Hot Standby
A redundancy feature where dynamic data is stored for all current “stable”
active sessions. Sessions that are “unstable” (i.e. currently being created,
etc.) do not survive.
HPLMN
Home Public Land Mobile Network
HTTP
Hypertext Transfer Protocol
IMAP4
Internet Message Access Protocol - Version 4rel1
IMEI-SV
International Mobile Equipment Identity - Software Version
IMSI
International Mobile Subscriber Identity
IP
Internet Protocol
IPCP
IP Control Protocol
IPSec
IP Security Protocol
IRI
Interception Related Information
ISP
Internet Service Provider
L2TP
Layer 2 Tunneling Protocol
LAC
L2TP Access Concentrator
LAC
Location Area Code
LCP
Link Control Protocol
LDAP
Lightweight Directory Access Protocol
LNS
L2TP Network Server
MCC
Mobile Country Code
ME
Mobile Equipment
MMS
Multimedia Messaging Service
MNC
Mobile Network Code
MS
Mobile Station
MSS
Maximum Segment Size
NBNS
NetBIOS Name Server
NCP
Network Control Protocol
NNDCC
Nortel Networks Diameter Credit Control
NSAPI
Network Service Access Point Identifier
OSS
Operations Support System
PAP
Password Authentication Protocol
PCO
Protocol Configuration Options
PDN
Packet Data Network
PDP
Packet Data Protocol
PDU
Protocol Data Unit
PLMN
Public Land Mobile Network
PNP
Personal Network Portal
POP3
Post Office Protocol Version 3
PPP
Point-to-Point Protocol
QoS
Quality of Service
RAC
Routing Area Code
RADIUS
Remote Authentication Dial In User Service
RAT
Radio Access Technology
SAI
Service Area Identifier
SCP
Service Control Point
SCS
Service Creation System
SFC
Switch Fabric Card
SGSN
Serving GPRS Support Node
SMP
Shasta Management Protocol
SMTP
Simple Mail Transfer Protocol
SNMP
Simple Network Management Protocol
SNR
Serial Number
SNTP
Simple Network Time Protocol
SSC
Subscriber Service Card
SSG
Subscriber Service Gateway
SSH
Secure Socket Shell
SSL
Secure Socket Layer
SSM
Subscriber Service Module
SSP
Subscriber Service Processor
SMP
SER 5500 Management Protocol
SNMP
Simple Network Management Protocol
SNTP
Simple Network Time Protocol
SSH
Secure Socket Shell
SSL
Secure Socket Layer
SSM
Subscriber Service Module
SVN
Software Version Number
TAC
Type Allocation Code
TE
Terminal Equipment
TEID
Tunnel Endpoint Identifier
ToD
Time of Day
TOS
Type of Services
T-PDU
Payload that is tunnelled in the GTP tunnel
TPO
Traffic Performance Optimizer
UDP
User Datagram Protocol
UMTS
Universal Mobile Telecommunication System
URL
Uniform Resource Locator
UTC
Universal Time Coordinated
UTRAN
UMTS Terrestrial Radio Access Network
VPLMN
Visiting Public Land Mobile Network
VPN
Virtual Private Network
VPRN
Virtual Private Routing Network
VSA
Vendor Specific Attribute
Warm Standby
A redundancy feature where the redundancy device is already in-service
and is ready to take the place of the failed device. Dynamic state information
is not stored and all current sessions are lost.
WAE
Wireless Application Environment
WAP
Wireless Application Protocol
WLAN
Wireless Local Area Network
WRAP
Wireless RADIUS Application Protocol
WSP
Wireless Session Protocol
WTLS
Wireless Transport Layer Security
WTP
Wireless Transaction Protocol
WV
Wireless Village
Nortel GGSN
User’s Guide
To order documentation from Nortel Networks Global Wireless Knowledge Services, call
(1) (877) 662-5669
While the information in this document is believed to be accurate and reliable, except as otherwise expressly agreed to in writing
NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS
OR IMPLIED. The information and/or products described in this document are subject to change without notice.
Nortel, Nortel Networks, the Nortel logo, and the Globemark are trademarks of Nortel Networks.