Home > Cisco > Network Hardware > Cisco Prime Nerk 43 User Guide

Cisco Prime Nerk 43 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Prime Nerk 43 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 1168
    							  
    27-137
    Cisco Prime Network 4.3.2 User Guide
    EDCS-1524415
    Chapter 27      Managing Mobile Networks
      LTE Networks
    Notify Payload - Half 
    Open Session StartThe initial count of the number of half-open sessions per IPSec manager. 
    Transmission of information will start only when the number of half-open 
    sessions currently open exceed the starting count.
    NoteA session is considered half open if a Packet Data Interworking 
    Function (PDIF) has responded to an IKEv2 INIT request with an 
    IKEv2 INIT response, but no further messages were received on the 
    particular IKE SA.
    Notify Payload - Half 
    Open Session EndThe maximum count of half open sessions per IPSec manager. Transmission 
    of information will stop when the number of half-open sessions currently 
    open is less than this count. 
    Authentication Local The local gateway key used for authentication.
    Authentication Remote The remote gateway key used for authentication.
    Keepalive Interval The period of time (in seconds) that must elapse before the next keepalive 
    request is sent.
    Keepalive  Retries The period of time (in seconds) that must elapse before the keepalive request 
    is resent. 
    Keepalive Timeout The keepalive time (in terms of seconds) for dead peer detection.
    Maxchild  SA  Count The maximum number of child SA per IKEv2 policy, which can be any value 
    between 1 and 4.
    Maxchild SA Overload 
    ActionThe action to be taken when the specified soft limit for the maximum number 
    of SA is reached, which can be any one of the following:
    Ignore—The IKEv2 stack ignores the specified soft limit for the SA and 
    allows new SA to be created.
    Terminate—The IKEv2 stack does not allow new child SA to be created 
    when the specified soft limit is reached.
    NAI CustomIDr The unique user specified identification number to be used in the crypto 
    template for Network Access Identifier (NAI).
    Crypto Template Payloads
    Payload Instance The payload instance configured for the crypto template.
    Payload Name The unique name of the crypto template payload.
    Ignore Rekeying 
    RequestsIndicates whether IKESA rekeying requests must be ignored.
    IP Address Allocation The IP Address Allocation scheme configured for the crypto template 
    payload.
    Lifetime The lifetime (in seconds) for the IPSec Child Security Associations derived 
    from the crypto template.
    Lifetime  (KB) The lifetime (in kilo bytes) for the IPSec Child Security Associations derived 
    from the crypto template.
    Crypto Template IKESA
    IKESA Instance The IKESA instance configured for the crypto template.
    Table 27-88 Crypto Template Details (continued)
    Field Description 
    						
    							  
    27-138
    Cisco Prime Network 4.3.2 User Guide
    EDCS-1524415
    Chapter 27      Managing Mobile Networks
      LTE Networks
    Allow  Empty  IKESA Indicates whether empty IKESA is allowed. By default, empty IKESA is not 
    allowed.
    Certificate Sign The certificate sign to be used. This field defaults to pkcs1.5.
    Ignore Notify Protocol 
    IDIndicates whether the IKEv2 Exchange Notify Payload Protocol-ID values 
    must be ignored for strict RFCA 4306 compliance.
    Ignore Rekeying 
    RequestsIndicates whether IKESA rekeying requests must be ignored.
    Keepalive User Activity Indicates whether the user inactivity timer must be reset when keepalive 
    messages are received from the peer.
    Max Retransmission 
    CountThe maximum number of retransmissions of an IKEv2 IKE exchange request 
    that is allowed if a corresponding IKEv2 IKE exchange response is not 
    received.
    Policy Congestion 
    Rejection Notify StatusIndicates whether an error notification message must be sent in response to 
    an IKE_SA INIT exchange, when IKESA sessions cannot be established 
    anymore.
    Policy Error Notification Indicates whether an error notification message must be sent for invalid 
    IKEv2 exchange message ID and syntax.
    Rekey Indicates whether IKESA rekeying must occur before the configured 
    lifetime expires (which is approximately at 90% of the lifetime interval). By 
    default, rekeying is not allowed. 
    Retransmission  Timeout The time period (in milliseconds) that must elapse before a retransmission of 
    an IKEv2 IKE exchange request is sent when a corresponding response is not 
    received. 
    Setup Timer The number of seconds before a IKEv2 security association, which is not 
    fully established, is terminated.
    Mobike Indicates that Mobike attribute is enabled for IKESA.
    RFC Notification Shows that RFC 5996 notifications is sent or received.
    Ignore Notify Protocol 
    IDIndicates that IKEv2 Informational Exchange Notify Payload protocol ID is 
    ignored for strict RFC 4306 compliance.
    Notify Payload Error Message Attributes
    Notify UE Displays the value for UE related errors.
    Network Transient Minor Displays the value for minor transient network errors.
    Network Transient Major Displays the value for major transient network errors.
    Network Permanent Displays the value for permanent network errors.
    OCSP Attributes
    OCSP Responder 
    AddressDisplays the OCSP responder IPv4 address.
    OCSP Responder Port Displays the OCSP responder IPv4 port.
    OCSP HTTP Version Shows a http version 1.0 or 1.1 that is used for OCSP responder.
    Table 27-88 Crypto Template Details (continued)
    Field Description 
    						
    							  
    27-139
    Cisco Prime Network 4.3.2 User Guide
    EDCS-1524415
    Chapter 27      Managing Mobile Networks
      LTE Networks
    Viewing the EAP Profile Details
    To view the EAP Profile details:
    Step 1Right-click the required device in the Vision client and choose Inventory.
    Step 2In the Logical Inventory window, choose Logical Inventory > Context> Security Association > 
    EAP Profile. The list of profiles are displayed in the content pane.
    Step 3In the EAP Profile node, choose the profile. The profile details are displayed in the content pane. 
    Table 27-89 displays the EAP Profile details.
    Viewing the Transform Set Details
    To view the Transform Set details for IKEv2 IPSec/IKEv2:
    Step 1Right-click the required device in the Vision client and choose Inventory.
    Step 2In the Logical Inventory window, choose Logical Inventory > Context> Security Association > 
    Transform Set > IKEv2 IPSec Transform Set or IKEv2 Transform set. The list of profiles are 
    displayed in the content pane.
    Table 27-89 EAP Profile Details
    Field Description
    Name The unique name of the EAP Profile.
    Mode The operative mode of the EAP profile, which can be any one of the 
    following:
    Authenticator Pass Through—Indicates that the EAP Authentication 
    Requests must be passed to an external EAP Server.
    Authenticator Terminate—Indicates that the EAP must act as an EAP 
    Authentication Server.
    Authentication Method The EAP Authentication method to be used for the profile, which can be any 
    one of the following:
    If the Mode is Authenticator Pass Through:
    –eap-aka
    –eap-gtc
    –eap-md5
    –eap-sim
    –eap-tls
    If the Mode is Authenticator Terminate:
    –eap-gtc
    –eap-md5 
    						
    							  
    27-140
    Cisco Prime Network 4.3.2 User Guide
    EDCS-1524415
    Chapter 27      Managing Mobile Networks
      LTE Networks
    Step 3In the IKEv2 IPSec Transform Set or IKEv2 Transform set node, choose the transform set. The 
    relevant details are displayed in the content pane. 
    Table 27-90 displays the IKEv2 IPSec Transform set or IKEv2 Transform set details. 
    						
    							  
    27-141
    Cisco Prime Network 4.3.2 User Guide
    EDCS-1524415
    Chapter 27      Managing Mobile Networks
      LTE Networks
    Table 27-90 IKEv2 IPSec Transform Set/IKEv2 Transform set Details
    Field Description
    Name The name of the transform set.
    DH Group The Diffie-Hellman (DH) group for the transform set, which can be any one 
    of the following:
    1—Configure Diffie-Hellman Group 1:768-bit MODP Group
    14—Configure Diffie-Hellman Group 14:2048-bit MODP Group
    2—Configure Diffie-Hellman Group 2:1024-bit MODP Group
    5—Configure Diffie-Hellman Group 5:1536-bit MODP Group
    This field defaults to 2—Configure Diffie-Hellman Group 2:1024-bit 
    MODP Group.
    NoteThe DH group is used to determine the length of the base Prime 
    numbers used during the key exchange process in IKEv2. The 
    cryptographic strength of any key derived, depends in part, on the 
    strength of the DH group upon which the prime numbers are based.
    Cipher The appropriate encryption algorithm and encryption key length for the 
    IKEv2 IKE security association, which can be any one of the following:
    3des-cbc
    aes-cbc-128 
    aes-cbc-256
    des-cbc
    Null
    This field defaults to AESCBC-128.
    HMAC The Hash Message Authentication Code (HMAC) for the IKEv2 IPSec 
    transform set, which can be any one of the following:
    aes-xcbc-96
    md5-96
    sha1-96
    sha2-256-128
    sha2-384-192
    sha2-512-256
    This field defaults to sha1-96.
    NoteHMAC is a type of message authentication code calculated using a 
    cryptographic hash function in combination with a secret key to 
    verify both data integrity and message authenticity. A hash takes a 
    message of any size and transforms it into a message of fixed size 
    (the authenticator value), which is truncated and transmitted.  
    						
    							  
    27-142
    Cisco Prime Network 4.3.2 User Guide
    EDCS-1524415
    Chapter 27      Managing Mobile Networks
      LTE Networks
    Viewing the ePDG Configuration Details
    To view the ePDG configuration details:
    Step 1Right-click the required device in the Vision client and choose Inventory.
    Step 2In the Logical Inventory window, choose Logical Inventory > Context> Mobile > EPDG. The list of 
    EPDG services configured in Prime Network are displayed in the content pane. 
    Step 3From the EPDG node, choose an EPDG service. The EPDG service details are displayed in the content 
    pane.
    Table 27-91 displays the EPDG service details. Mode The encapsulation mode for the transform set, which can be any one of the 
    following: 
    transport
    tunnel
    ESN Enable Extended Sequence Number (ESN) for IPSec (ESP/AH).
    PRF The Pseudo-random Function (PRF) for the transform set, which can be any 
    one of the following:
    aes-xcbc-128
    md5
    sha1
    sha2-256
    sha2-384
    sha2-512
    This field defaults to SHA1. This field is applicable only for IKEv2 
    transform sets.
    NoteThis function is used to generate keying material for all 
    cryptographic algorithms. It produces a string of bits that cannot be 
    distinguished from random bit strings without the secret key. 
    Life Time The time period for which the secret keys used for various aspects of a 
    configuration is valid (before it times out). This field is applicable only for 
    IKEv2 transform sets.
    Table 27-90 IKEv2 IPSec Transform Set/IKEv2 Transform set Details
    Field Description 
    						
    							  
    27-143
    Cisco Prime Network 4.3.2 User Guide
    EDCS-1524415
    Chapter 27      Managing Mobile Networks
      LTE Networks
    Table 27-91 EPDG Service Details
    Field Description
    Service Name The unique name of the ePDG service.
    Status The status of the ePDG service, which can be any one of the following:
    Initiated
    Running
    Down
    Started
    Nonstarted
    IP Address The IPV4 address of the ePDG service.
    UDP Port The User Datagram Protocol (UDP) port of the ePDG service.
    Crypto  Template The name of the IKEv2 crypto template to be used by the ePDG service. This 
    template is used to define the cryptographic policy for the ePDG service.
    Max Sessions The maximum number of sessions allowed for the ePDG service.
    PLMN ID The unique identification code of the Public Land Mobile Network (PLMN) 
    for the ePDG service. This id is made up of the Mobile Country Code (MCC) 
    and the Mobile Network Code (MNC).
    MAG Service Context The name of the context where the Mobile Access Gateway (MAG) services 
    are configured. If a MAG service is not configured for the ePDG service, 
    then one of the MAG services defined in the context is selected.
    MAG Service The name of the MAG service that handles the mobile IPv6 sessions.
    Setup Timeout The maximum time (in seconds) allowed for the session setup.
    DNS PGWClient 
    ContextThe name of the context where the Domain Name System (DNS) client is 
    configured for the Packet Data Network Gateway (PWG) selection.
    DNS PGW Selection The criteria to select a PGW service from the DNS. This criteria is based on 
    the topology and/or weight from the DNS.
    FQDN The Fully Qualified Domain Name (FQDN), which is used for longest suffix 
    match during dynamic allocation.
    PGW Selection Agent 
    Info Error ActionThe action to be taken when the expected MIP6 agent information is not 
    received from Authentication, Authorization, and Accounting (AAA) or 
    Hosting Solution Software (HSS).
    User Name MAC 
    Address StrippingIndicates whether the MAC address in the username obtained from the user 
    equipment must be stripped.
    User Name MAC 
    Address ValidationIndicates whether the MAC address in the username obtained from the user 
    equipment must be validated.
    User Name MAC 
    Address Validation 
    Failure ActionIndicates the action that must be taken on failure of the validation of the 
    MAC address in the user name obtained from the user equipment.
    New Call Policy Indicates the busy-out policy that must be followed to reject the incoming 
    calls from individual users. 
    						
    							  
    27-144
    Cisco Prime Network 4.3.2 User Guide
    EDCS-1524415
    Chapter 27      Managing Mobile Networks
      LTE Networks
    Viewing EPDG S2b Service Interface Properties
    To view the ePDG S2b configuration details:PGW Selection 
    MechanismThe ePDG service should be configured indicating preferred method of 
    PGW selection, whether local configuration or DNS/AAA server based 
    PGW selection. Local Configuration based PGW selection as fallback 
    mechanism is default configuration behavior.
    QCI QOS Mapping It indicates the associated QCI QOS Mapping Table.
    MAC Address 
    DelimiterConfigures MAC Address Delimiter for username.
    Subscriber Map Configures subscriber map association to get PGW address locally.
    IP Fragment Chain 
    TimeoutThis command configures Internet Protocol (IP) parameters.  This option 
    configures ip fragment chain settings during TFT handling. This is the time 
    to hold an ip fragment chain. Secs is an integer value between 1 and 10. The 
    default value is 5.
    Max Out of Order 
    FragmentThis is the number of fragments to buffer per fragment chain for out-of-order 
    reception before receiving first fragment (for L4 packet filtering). Fragments 
    are an integer value between 0 and 300.
    Bind Binds the service to an ip and associated max-subscribers.
    Custom SWm-SWu 
    Error MappingCustomized mapping of SWm errors with SWu Notify Error Type.
    Custom S2b SWu Error 
    MappingAllows duplicate precedence in a TFT for a S2b ePDG session.
    Data Buffering Allows downlink packets to be buffered, while session is in the connecting 
    state. By default it is enabled.
    PDN Type Specifies the PDN type of IPv6 parameters for the ePDG service.
    GTPC Load Control 
    ProfileAssociates the GTPC load control profile for ePDG.
    GTPC Overload Control 
    ProfileAssociates the GTPC overload control profile for ePDG.
    Idle Timeout The subscribers time-to-live (TTL) settings for the EPDG service.
    Ebi End Value Indicates end value for ebi range. The end value can range greater than or 
    equal to the start value.
    Reporting Action event 
    RecordShows reporting of events.
    Micro Checkpoint 
    PeriodicityThe micro checkpoint periodicity for a subscriber.
    Micro Checkpoint 
    Deemed IdleThe micro checkpoint duration when UE is deemed idle for a subscriber. 
    Ebi  Start  Value Indicates Start value of ebi range for bearer-id allocation (applicable only for 
    GTPv2-S2b).
    Table 27-91 EPDG Service Details
    Field Description 
    						
    							  
    27-145
    Cisco Prime Network 4.3.2 User Guide
    EDCS-1524415
    Chapter 27      Managing Mobile Networks
      LTE Networks
    Step 1Right-click the required device in the Vision client and choose Inventory.
    Step 2In the Logical Inventory window, choose Logical Inventory > Context> Mobile > EPDG. The list of 
    EPDG services configured in Prime Network are displayed in the content pane. 
    Step 3From the EPDG node, choose S2b Service Interface. The EPDG S2b Service Interface details are 
    displayed in the content pane.
    Table 27-92 displays the EPDG S2b Service Interface details.
    Table 27-92 EPDG S2b Service Interface Details
    Configuration Commands for ePDG
    The following ePDG commands can be launched from the logical inventory by choosing the Context> 
    Commands> Configuration or Context> Commands>Show. Your permissions determine whether 
    you can run these commands (see Permissions Required to Perform Tasks Using the Prime Network 
    Clients, page B-1). To find out if a device supports these commands, see the Cisco Prime Network 4.3.2 
    Supported Cisco VNEs.  Field Description
    Vendor Specific DNS Server Request Configures the vendor-specific-attributes values 
    on PMIP based S2b interface. Configures the 
    DNS Server Address to be present in PCO/APCO 
    IE. Default setting is to use the APCO IE.
    Duplicate Precedence in TFT Allows duplicate precedence in a TFT for an S2b 
    ePDG session.
    Vendor Specific PCSCF Server Request The vendor-specific-attributes values on PMIP 
    based S2b interface. Configures the PCSCF 
    Server Address to be present in 
    APCO/PrivateExtn IE. Default setting is to use 
    PrivateExtension IE.
    Table 27-93 ePDG Configuration Commands
    Command Navigation Description
    Create ePDG 
    ServiceRight-click context> Commands> 
    Configuration> Mobility> Create 
    ePDGUse this command to create a new ePDG 
    service.
    Modify ePDG 
    ServiceExpand EPDG Node> right-click EPDG 
    service> Commands> ConfigurationUse this command to modify the 
    configuration details for an ePDG service.
    Delete ePDG 
    ServiceExpand EPDG Node> right-click EPDG 
    service> Commands> ConfigurationUse this command to delete an ePDG 
    service.
    Show ePDG 
    ServiceExpand EPDG Node> right-click EPDG 
    service> Commands> ShowUse this command to view and confirm the 
    configuration details of an ePDG Service. 
    						
    							  
    27-146
    Cisco Prime Network 4.3.2 User Guide
    EDCS-1524415
    Chapter 27      Managing Mobile Networks
      LTE Networks
    Monitoring Packet Data Serving Node (PDSN)
    Packet Data Serving Node, or PDSN, is a component of the Code Division Multiple Access (CDMA) 
    2000 mobile network. It acts as a connection point between the Radio Access Network (RAN) and IP 
    Network. PDSN also manages PPP sessions between the mobile provider’s core IP network and the 
    mobile node. 
    In other words, it provides access to the Internet, intranets, and applications servers for mobile stations 
    that utilize a CDMA2000 RAN. Acting as an access gateway, PDSN provides simple IP and mobile IP 
    access, foreign agent support, and packet transport for virtual private networking. It acts as a client for 
    Authentication, Authorization, and Accounting (AAA) servers and provides mobile stations with a 
    gateway to the IP network.
    PDSN Configurations
    The following paragraphs list the different configurations for PDSN:
    Simple IP—In this protocol, the mobile user is assigned an IP address dynamically. The user can use 
    this IP address within a defined geographical area, which is lost when the user moves out of the area. 
    If the user moves out of the designated area, they must register with the service provider again to 
    obtain a new IP address. Figure 27-16 depicts the working of this protocol.
    Figure 27-16 Simple IP configuration for PDSN
    
    Mobile IP—In this protocol, the mobile user is assigned a static or dynamic IP address, which is 
    basically the “home address” assigned by the user’s Home Agent (HA). Even if the user moves out 
    of the home network, the IP address does not change or is not lost. This enables the user to use 
    applications that require seamless mobility such as transferring files. How does this work? The 
    Mobile IP protocol provides a network-layer solution that allows mobile nodes to receive IP packets 
    from their home network even when they are connected to a visitor network. The PDSN in the 
    visitor’s network performs as a Foreign Agent (FA), which assigns a Care-of-Address (CoA) to the 
    mobile node and establishes a virtual session with the mobile node’s HA. IP packets are 
    encapsulated into IP tunnels and transported between the FA, HA and mobile node. Figure 27-17 
    depicts the working of this protocol.
    Radio
    To w e r Radio Access Network (RAN)
    BSC/PCF MN
    320495
    PDSN
    PPP
    Foreign AAA
    R-P Interface
    Internet
    or PDN
    IP 
    						
    All Cisco manuals Comments (0)

    Related Manuals for Cisco Prime Nerk 43 User Guide