This preface describes who should read the Cisco Service Control Application for Broadband Reference Guide, how it is organized, its document conventions, and how to obtain documentation and technical assistance.
This guide assumes a basic familiarity with the concept of the Cisco Service Control solution, the Service Control Engine (SCE) platforms, and related components.
Cisco Service Control Release |
Part Number |
Publication Date |
---|---|---|
Release 3.0.5 |
OL-8410-03 |
November, 2006 |
Added the following new feature:
Cisco Service Control Release |
Part Number |
Publication Date |
---|---|---|
Release 3.0.3 |
OL-8410-02 |
May, 2006 |
Added the following new feature:
Media Flow RDR (see also Table RPT_MEDIA)
Added the following section to the document:
Cisco Service Control Release |
Part Number |
Publication Date |
---|---|---|
Release 3.0.0 |
OL-8410-01 |
December, 2005 |
Created the Cisco Service Control Application for Broadband Reference Guide.
Chapters 1, 2, 3 of this document are based on Appendixes B, C, D of the Release 2.5.5 Cisco Service Control Application for Broadband User Guide.
This guide provides information about the data structures created and used by SCA BB. It is intended for:
The administrator who is responsible for daily operation of the Cisco Service Control solution
Integrators who are developing applications on top of SCA BB
This guide is organized as follows:
Chapter |
Title |
Description |
---|---|---|
Chapter 1 |
Describes the default service configuration provided with the Service Control Application for Broadband (SCA BB). | |
Chapter 2 |
Lists the various RDRs produced by the Service Control Engine (SCE) platform and gives their structure, describes the columns and fields of each RDR, and states under what conditions each kind of RDR is generated. Also provides field-content information for fields generated by Service Control components (such as tags), and a description of the Periodic RDR Zero Adjustment Mechanism. | |
Chapter 3 |
Presents the different database tables used for storing RDRs (after their conversion by an adapter), and a description of the table columns (field names and types). | |
Chapter 4 |
Describes the location and structure of CSV files pertaining to service configuration, subscriber management, and data collection management. | |
Chapter 5 |
Describes that part of the Cisco SCE proprietary MIB that provides configuration and runtime status for SCA BB. |
The following publications are available for the Service Control Application for Broadband:
Cisco Service Control Application for Broadband User Guide
Cisco Service Control Application for Broadband Service Configuration API Programmer Guide
Cisco Service Control Management Suite Collection Manager User Guide
Cisco Service Control Management Suite Subscriber Manager User Guide
Cisco Service Control Application Reporter User Guide
Cisco Service Control Engine (SCE) Software Configuration Guide
This document uses the following conventions:
Convention |
Description |
---|---|
boldface font |
Commands and keywords are in boldface. |
italic font |
Arguments for which you supply values are in italics. |
[ ] |
Elements in square brackets are optional. |
{x | y | z} |
Alternative keywords are grouped in braces and separated by vertical bars. |
[x | y | z] |
Optional alternative keywords are grouped in brackets and separated by vertical bars. |
string |
A nonquoted set of characters. Do not use quotation marks around the string, or the string will include the quotation marks. |
|
Terminal sessions and information that the system displays are in |
|
Information you must enter is in |
|
Arguments for which you supply values are in |
< > |
Nonprinting characters, such as passwords, are in angle brackets. |
[ ] |
Default responses to system prompts are in square brackets. |
!, # |
An exclamation point (!) or a pound sign (#) at the beginning of a line of code indicates a comment line. |
Means reader take note. Notes contain helpful suggestions or references to materials not covered in this manual.
Means reader be careful. In this situation, you might do something that could result in loss of data.
The following sections provide sources for obtaining documentation from Cisco Systems.
You can access the most current Cisco documentation on the World Wide Web at the following sites:
Cisco documentation and additional literature are available in a CD-ROM package that ships with your product. The Documentation CD-ROM is updated monthly and may be more current than printed documentation. The CD-ROM package is available as a single unit or as an annual subscription.
Cisco documentation is available in the following ways:
Registered Cisco Direct Customers can order Cisco Product documentation from the networking Products MarketPlace:
Registered Cisco.com users can order the Documentation CD-ROM through the online Subscription Store:
Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco corporate headquarters (California, USA) at 408 526-7208 or, in North America, by calling 800 553-NETS(6387).
If you are reading Cisco product documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco.
You can e-mail your comments to bug-doc@cisco.com.
To submit your comments by mail, use the response card behind the front cover of your document, or write to the following address:
Attn Document Resource Connection Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-9883
We appreciate your comments.
Cisco provides Cisco.com as a starting point for all technical assistance. Customers and partners can obtain documentation, troubleshooting tips, and sample configurations from online tools. For Cisco.com registered users, additional troubleshooting tools are available from the TAC website.
Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at any time, from anywhere in the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco.
Cisco.com provides a broad range of features and services to help customers and partners streamline business processes and improve productivity. Through Cisco.com, you can find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online technical support, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available.
Customers and partners can self-register on Cisco.com to obtain additional personalized information and services. Registered users can order products, check on the status of an order, access technical support, and view benefits specific to their relationships with Cisco.
To access Cisco.com, go to http://www.cisco.com.
The Cisco Technical Assistance Center (TAC) website is available to all customers who need technical assistance with a Cisco product or technology that is under warranty or covered by a maintenance contract.
If you have a priority level 3 (P3) or priority level 4 (P4) problem, contact TAC by going to the TAC website http://www.cisco.com/tac.
P3 and P4 level problems are defined as follows:
P3—Your network is degraded. Network functionality is noticeably impaired, but most business operations continue.
P4—You need information or assistance on Cisco product capabilities, product installation, or basic product configuration.
In each of the above cases, use the Cisco TAC website to quickly find answers to your questions.
To register for Cisco.com, go to http://tools.cisco.com/RPF/register/register.do.
If you cannot resolve your technical issue by using the TAC online resources, Cisco.com registered users can open a case online by using the TAC Case Open tool at http://www.cisco.com/tac/caseopen.
If you have a priority level 1 (P1) or priority level 2 (P2) problem, contact TAC by telephone and immediately open a case. To obtain a directory of toll-free numbers for your country, go to http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml.
P1 and P2 level problems are defined as follows:
P1—Your production network is down, causing a critical impact to business operations if service is not restored quickly. No workaround is available.
P2—Your production network is severely degraded, affecting significant aspects of your business operations. No workaround is available.
This chapter describes the default service configuration provided with the Service Control Application for Broadband (SCA BB). The default service configuration serves as a starting point for creating a service configuration tailored to customers’ needs.
Filter rules allow you to instruct the Service Control Engine (SCE) platform to ignore some types of flow based on the flow’s Layer 3 and Layer 4 properties, and transmit the flows unchanged.
The following table lists the filter rules defined in the default service configuration.
Table 1.1. Filter Rules
Flow Filter Name |
Default State |
Description |
---|---|---|
ICMP Filter |
Active |
Applies to ICMP packets, packets bypass the policy engine and are mapped to CoS BE |
DNS (to network) |
Active |
Applies to UDP packets, network-side port is equal to 53, packets bypass the policy engine and are mapped to CoS BE |
DNS (to subscriber) |
Active |
Applies to UDP packets, subscriber-side port is equal to 53, packets bypass the policy engine and are mapped to CoS BE |
net-bios (to network) |
Active |
Applies to UDP packets, network-side port is equal to 137, packets bypass the policy engine and are mapped to CoS BE |
net-bios (to subscriber) |
Active |
Applies to UDP packets, subscriber-side port is equal to 137, packets bypass the policy engine and are mapped to CoS BE |
eDonkey UDP (to network) |
Active |
Applies to UDP packets, network-side ports in the range 4661 to 4665, packets bypass the policy engine and are mapped to CoS BE |
eDonkey UDP (to subscriber) |
Active |
Applies to UDP packets, subscriber-side ports in the range 4661 to 4665, packets bypass the policy engine and are mapped to CoS BE |
eMule UDP (to network) |
Active |
Applies to UDP packets, network-side ports in the range 4670 to 4674, packets bypass the policy engine and are mapped to CoS BE |
eMule UDP (to subscriber) |
Active |
Applies to UDP packets, subscriber-side ports in the range 4670 to 4674, packets bypass the policy engine and are mapped to CoS BE |
eMule UDP 2 (to network) |
Active |
Applies to UDP packets, network-side ports in the range 5670 to 5674, packets bypass the policy engine and are mapped to CoS BE |
eMule UDP 2 (to subscriber) |
Active |
Applies to UDP packets, subscriber-side ports in the range 5670 to 5674, packets bypass the policy engine and are mapped to CoS BE |
eMule UDP 3 (to network) |
Active |
Applies to UDP packets, network-side ports in the range 5780 to 5784, packets bypass the policy engine and are mapped to CoS BE |
eMule UDP 3 (to subscriber) |
Active |
Applies to UDP packets, subscriber-side ports in the range 5780 to 5784, packets bypass the policy engine and are mapped to CoS BE |
BGP Filter |
Inactive |
Applies to TCP packets, network-side port is equal to 179, packets bypass the policy engine and are mapped to CoS BE |
DHCP Filter |
Inactive |
Applies to UDP packets, network-side ports in the range 67 to 68, packets bypass the policy engine and are mapped to CoS BE |
OSPF Filter |
Inactive |
Applies to OSPFIGP packets, packets bypass the policy engine and are mapped to CoS BE |
IS-IS Filter |
Inactive |
Applies to ISIS packets, packets bypass the policy engine and are mapped to CoS BE |
IGRP Filter |
Inactive |
Applies to IGP packets, packets bypass the policy engine and are mapped to CoS BE |
EIGRP Filter |
Inactive |
Applies to EIGRP packets, packets bypass the policy engine and are mapped to CoS BE |
HSRP Filter 1 |
Inactive |
Applies to UDP packets, network-side IP is equal to 224.0.0.2, packets bypass the policy engine and are mapped to CoS BE |
HSRP Filter 2 |
Inactive |
Applies to UDP packets, network-side port is equal to 1985, packets bypass the policy engine and are mapped to CoS BE |
HSRP Filter 3 |
Inactive |
Applies to UDP packets, subscriber-side port is equal to 1985, packets bypass the policy engine and are mapped to CoS BE |
RIP Filter 1 |
Inactive |
Applies to UDP packets, network-side IP is equal to 224.0.0.9, packets bypass the policy engine and are mapped to CoS BE |
RIP Filter 2 |
Inactive |
Applies to UDP packets, network-side port is equal to 520, packets bypass the policy engine and are mapped to CoS BE |
RIP Filter 3 |
Inactive |
Applies to UDP packets, subscriber-side port is equal to 520, packets bypass the policy engine and are mapped to CoS BE |
RADIUS Filter |
Inactive |
Applies to UDP packets, network-side port is equal to 1812, packets bypass the policy engine and are mapped to CoS BE |
RADIUS Filter (early deployment) |
Inactive |
Applies to UDP packets, network-side ports in the range 1645 to 1646, packets bypass the policy engine and are mapped to CoS BE |
Protocols are divided into four groups:
Generic Protocols—These protocols are used for transactions that were not mapped to a service by one of the more specific protocol types.
Signature-Based Protocols—Protocols classified according to a Layer 7 application signature. This group includes the most common protocols, such as HTTP and FTP, and a large group of popular P2P protocols.
IP Protocols—Protocols (such as ICMP), other than TCP and UDP protocols, identified according to the IP protocol number of the transaction.
Port-Based Protocols—TCP and UDP protocols that are classified according to their well-known ports. The default configuration includes more than 600 common port-based protocols.
You may add new protocols (for example, to classify a new gaming protocol that uses a specific port) and edit or remove existing ones.
The tables in the following sections list the protocols defined in the default service configuration.
The three generic protocols (IP, TCP, and UDP) serve as default containers for classifying transactions of the relevant type (IP, TCP, or UDP) that were not classified as belonging to a more specific protocol.
A transaction is classified as belonging to one of the generic protocols if it meets both the following conditions:
It was not classified as belonging to a signature-based protocol.
It was not classified as belonging to an IP or port-based protocol that is specifically mapped to a service.
Table 1.2. Generic Protocols
Protocol Name |
ID |
Description |
---|---|---|
Generic IP |
10 |
Any non-TCP/UDP transaction where the related IP protocol is not specifically mapped to a service. |
Generic TCP |
0 |
Any TCP transaction that does not match any signature-based protocol, and where the related port-based protocol (if it exists) is not specifically mapped to a service. |
Generic UDP |
1 |
Any UDP transaction that does not match any signature-based protocol, and where the related port-based protocol (if it exists) is not specifically mapped to a service. |
A transaction is classified as belonging to one of the signature-based protocols if it is carried on the protocol’s well-known port or matches the protocol’s signature.
Table 1.3. Signature-Based Protocols
Protocol Name |
ID |
TCP Ports |
UDP Ports |
---|---|---|---|
CUWorld |
117 |
|
|
DHCP Sniff |
33 |
|
|
DingoTel |
42 |
|
|
DNS |
933 |
|
|
FTP |
4 |
21 |
|
Generic Non-Established TCP See note following table |
126 |
|
|
Generic Upload/Download See note following table |
127 |
|
|
GoogleEarth |
118 |
|
|
Hopster |
115 |
|
|
HTTP Browsing |
2 |
80, 8080 |
|
HTTP Tunnel |
55 |
|
|
ICQ |
119 |
|
|
IRC |
62 |
|
|
Jabber |
116 |
|
|
MMS |
6 |
1755 |
|
Mobile MMS |
46 |
|
|
NNTP |
15 |
119 |
|
NTP |
54 |
|
|
POP3 |
9 |
110 |
|
PTT Winphoria |
61 |
|
|
|
52 |
|
|
RTSP Streaming |
5 |
554, 1554, 7070 |
|
Sling |
112 |
|
|
SMTP |
8 |
25 |
|
STUN |
114 |
|
|
Thunder |
50 |
|
|
UC |
48 |
|
|
Yahoo Messenger |
40 |
5000-5001 |
5000-5001 |
imap |
59 |
143 |
143 |
radius |
738 |
|
|
tftp |
60 |
69 |
69 |
Generic Non-Established TCP—TCP flows that are not established properly (syn-ack is missing) are mapped to this protocol.
Generic Upload/Download—Transactions that have download packet flow characteristics and do not match a more specific signature are classified to this protocol. This protocol applies to downloads both from the network side and from the subscriber side.
Table 1.4. Signature-Based P2P Protocols
Protocol Name |
ID |
TCP Ports |
UDP Ports |
---|---|---|---|
AntsP2P |
113 |
|
|
BaiBao |
43 |
|
|
BitTorrent |
24 |
6881-6889 |
|
Dijjer |
120 |
|
|
DirectConnect |
19 |
411-413 |
|
Entropy |
125 |
|
|
Exosee |
121 |
|
|
FastTrack KaZaA File Transfer |
14 |
|
|
FastTrack KaZaA Networking |
13 |
1214 |
|
Filetopia |
31 |
|
|
Freenet |
107 |
|
|
Furthur |
123 |
|
|
Gnutella File Transfer |
12 |
|
|
Gnutella Networking |
11 |
6346-6349 |
|
Hotline |
20 |
|
|
Konspire2b |
1031 |
6085 |
6085 |
Kontiki |
124 |
|
|
LOCO |
5123 |
|
|
Manolito |
22 |
|
|
Mute |
34 |
|
|
Napster |
32 |
|
|
NeoNet |
37 |
|
|
NodeZilla |
35 |
|
|
PeerEnabler |
122 |
|
|
Poco |
51 |
|
|
PPLive |
44 |
|
|
PPStream |
49 |
|
|
Rodi |
111 |
|
|
Share |
27 |
|
|
Soulseek |
29 |
|
|
SSDP |
53 |
|
|
TVAnts |
109 |
|
|
Warez/FileCroc |
39 |
|
|
Waste |
36 |
|
|
WinMX/OpenNap |
16 |
6257, 6699 |
6257 |
Winny |
17 |
7742-7745, 7773 |
|
eDonkey |
18 |
4661-4665, 4672-4673, 4711, 5662, 5773, 5783 |
4661-4665, 4672-4673, 4711, 5662, 5773, 5783 |
guruguru |
66 |
|
|
iTunes |
30 |
|
|
kuro |
67 |
|
|
soribada |
69 |
|
|
v-share |
71 |
|
|
Table 1.5. Signature-Based VoIP Protocols
Protocol Name |
ID |
TCP Ports |
UDP Ports |
---|---|---|---|
H323 |
28 |
1720 |
|
ICQ VoIP |
110 |
|
|
MGCP |
38 |
|
2427, 2727 |
Primus |
108 |
|
|
RTP |
57 |
|
|
SIP |
23 |
5060-5061 |
5060-5061 |
Skinny |
41 |
|
|
Skype |
25 |
|
|
Yahoo Messenger VoIP |
45 |
33033 |
|
This section lists the IP protocols supported by SCA BB.
Table 1.6. IP Protocols
IP Protocol Number |
Protocol Name |
Protocol ID |
---|---|---|
0 |
HOPOPT |
756 |
1 |
ICMP |
757 |
2 |
IGMP |
758 |
3 |
GGP |
759 |
4 |
IP |
760 |
5 |
ST |
761 |
6 |
Generic TCP |
0 |
7 |
CBT |
762 |
8 |
EGP |
763 |
9 |
IGP |
764 |
10 |
BBN-RCC-MON |
765 |
11 |
NVP-II |
766 |
12 |
PUP |
767 |
13 |
ARGUS |
768 |
14 |
EMCON |
769 |
15 |
XNET |
770 |
16 |
CHAOS |
771 |
17 |
Generic UDP |
1 |
18 |
MUX |
772 |
19 |
DCN-MEAS |
773 |
20 |
HMP |
774 |
21 |
PRM |
775 |
22 |
XNS-IDP |
776 |
23 |
TRUNK-1 |
777 |
24 |
TRUNK-2 |
778 |
25 |
LEAF-1 |
779 |
26 |
LEAF-2 |
780 |
27 |
RDP |
781 |
28 |
IRTP |
782 |
29 |
ISO-TP4 |
783 |
30 |
NETBLT |
784 |
31 |
MFE-NSP |
785 |
32 |
MERIT-INP |
786 |
33 |
SEP |
787 |
34 |
3PC |
788 |
35 |
IDPR |
789 |
36 |
XTP |
790 |
37 |
DDP |
791 |
38 |
IDPR-CMTP |
792 |
39 |
TP++ |
793 |
40 |
IL |
794 |
41 |
IPv6-Over-IPv4 |
795 |
42 |
SDRP |
796 |
43 |
IPv6-Route |
797 |
44 |
IPv6-Frag |
798 |
45 |
IDRP |
799 |
46 |
RSVP |
800 |
47 |
GRE |
801 |
48 |
MHRP |
802 |
49 |
BNA |
803 |
50 |
ESP |
804 |
51 |
AH |
805 |
52 |
I-NLSP |
806 |
53 |
SWIPE |
807 |
54 |
NARP |
808 |
55 |
MOBILE |
809 |
56 |
TLSP |
810 |
57 |
SKIP |
811 |
58 |
IPv6-ICMP |
812 |
59 |
IPv6-NoNxt |
813 |
60 |
IPv6-Opts |
814 |
61 |
any host internal protocol |
815 |
62 |
CFTP |
816 |
63 |
any local network |
817 |
64 |
SAT-EXPAK |
818 |
65 |
KRYPTOLAN |
819 |
66 |
RVD |
820 |
67 |
IPPC |
821 |
68 |
any distributed file system |
822 |
69 |
SAT-MON |
823 |
70 |
VISA |
824 |
71 |
IPCV |
825 |
72 |
CPNX |
826 |
73 |
CPHB |
827 |
74 |
WSN |
828 |
75 |
PVP |
829 |
76 |
BR-SAT-MON |
830 |
77 |
SUN-ND |
831 |
78 |
WB-MON |
832 |
79 |
WB-EXPAK |
833 |
80 |
ISO-IP |
834 |
81 |
VMTP |
835 |
82 |
SECURE-VMTP |
836 |
83 |
VINES |
837 |
84 |
TTP |
838 |
85 |
NSFNET-IGP |
839 |
86 |
DGP |
840 |
87 |
TCF |
841 |
88 |
EIGRP |
842 |
89 |
OSPFIGP |
843 |
90 |
Sprite-RPC |
844 |
91 |
LARP |
845 |
92 |
MTP |
846 |
93 |
AX.25 |
847 |
94 |
IPIP |
848 |
95 |
MICP |
849 |
96 |
SCC-SP |
850 |
97 |
ETHERIP |
851 |
98 |
ENCAP |
852 |
99 |
any private encryption scheme |
853 |
100 |
GMTP |
854 |
101 |
IFMP |
855 |
102 |
PNNI |
856 |
103 |
PIM |
857 |
104 |
ARIS |
858 |
105 |
SCPS |
859 |
106 |
QNX |
860 |
107 |
A/N |
861 |
108 |
IPComp |
862 |
109 |
SNP |
863 |
110 |
Compaq-Peer |
864 |
111 |
IPX-in-IP |
865 |
112 |
VRRP |
866 |
113 |
PGM |
867 |
114 |
any 0-hop protocol |
868 |
115 |
L2TP |
869 |
116 |
DDX |
870 |
117 |
IATP |
871 |
118 |
STP |
872 |
119 |
SRP |
873 |
120 |
UTI |
874 |
121 |
SMP |
875 |
122 |
SM |
876 |
123 |
PTP |
877 |
124 |
ISIS |
878 |
125 |
FIRE |
879 |
126 |
CRTP |
880 |
This section lists the TCP/UDP port-based protocols defined in the SCA BB default service configuration.
Table 1.7. Port-Based Protocols (Ports 1 to 500)
Protocol Name |
ID |
TCP Ports |
UDP Ports |
---|---|---|---|
compressnet |
900 |
2-3 |
2-3 |
RJE |
901 |
5 |
5 |
Echo |
902 |
7 |
7 |
Discard |
903 |
9 |
9 |
systat |
904 |
11 |
11 |
daytime |
905 |
13 |
13 |
qotd |
906 |
17 |
17 |
msp |
907 |
18 |
18 |
chargen |
908 |
19 |
19 |
ftp-data |
909 |
20 |
20 |
ssh |
910 |
22 |
22 |
telnet |
911 |
23 |
23 |
nsw-fe |
912 |
27 |
27 |
msg-icp |
913 |
29 |
29 |
msg-auth |
916 |
31 |
31 |
dsp |
917 |
33 |
33 |
time |
918 |
37 |
37 |
rap |
919 |
38 |
38 |
rlp |
920 |
39 |
39 |
graphics |
921 |
41 |
41 |
name |
922 |
42 |
42 |
nicname |
923 |
43 |
43 |
mpm-flags |
924 |
44 |
44 |
mpm |
925 |
45 |
45 |
mpm-snd |
926 |
46 |
46 |
ni-ftp |
927 |
47 |
47 |
auditd |
928 |
48 |
48 |
tacacs |
929 |
49 |
49 |
re-mail-ck |
930 |
50 |
50 |
la-maint |
931 |
51 |
51 |
xns-time |
932 |
52 |
52 |
xns-ch |
934 |
54 |
54 |
isi-gl |
935 |
55 |
55 |
xns-auth |
936 |
56 |
56 |
xns-mail |
937 |
58 |
58 |
ni-mail |
938 |
61 |
61 |
acas |
939 |
62 |
62 |
whois |
940 |
63 |
63 |
covia |
941 |
64 |
64 |
tacacs-ds |
942 |
65 |
65 |
sql*net |
943 |
66 |
66 |
bootps |
944 |
67 |
67 |
bootpc |
945 |
68 |
68 |
gopher |
947 |
70 |
70 |
netrjs-1 |
948 |
71 |
71 |
netrjs-2 |
949 |
72 |
72 |
netrjs-3 |
950 |
73 |
73 |
netrjs-4 |
951 |
74 |
74 |
deos |
952 |
76 |
76 |
finger |
953 |
79 |
79 |
hosts2-ns |
954 |
81 |
81 |
xfer |
955 |
82 |
82 |
mit-ml-dev |
956 |
83, 85 |
83, 85 |
ctf |
957 |
84 |
84 |
mfcobol |
958 |
86 |
86 |
kerberos |
959 |
88 |
88 |
su-mit-tg |
960 |
89 |
89 |
dnsix |
961 |
90 |
90 |
mit-dov |
962 |
91 |
91 |
npp |
963 |
92 |
92 |
dcp |
964 |
93 |
93 |
objcall |
965 |
94 |
94 |
supdup |
966 |
95 |
95 |
dixie |
967 |
96 |
96 |
swift-rvf |
968 |
97 |
97 |
tacnews |
969 |
98 |
98 |
metagram |
970 |
99 |
99 |
newacct |
971 |
100 |
|
hostname |
972 |
101 |
101 |
iso-tsap |
973 |
102 |
102 |
gppitnp |
974 |
103 |
103 |
acr-nema |
975 |
104 |
104 |
csnet-ns |
976 |
105 |
105 |
3com-tsmux |
977 |
106 |
106 |
rtelnet |
978 |
107 |
107 |
snagas |
979 |
108 |
108 |
pop2 |
980 |
109 |
109 |
sunrpc |
981 |
111 |
111 |
mcidas |
982 |
112 |
112 |
auth |
983 |
113 |
113 |
audionews |
984 |
114 |
114 |
sftp |
985 |
115 |
115 |
ansanotify |
986 |
116 |
116 |
uucp-path |
987 |
117 |
117 |
sqlserv |
988 |
118 |
118 |
cfdptkt |
989 |
120 |
120 |
erpc |
990 |
121 |
121 |
smakynet |
991 |
122 |
122 |
NTP |
992 |
123 |
123 |
ansatrader |
993 |
124 |
124 |
locus-map |
994 |
125 |
125 |
nxedit |
995 |
126 |
126 |
locus-con |
996 |
127 |
127 |
gss-xlicen |
997 |
128 |
128 |
pwdgen |
998 |
129 |
129 |
cisco-fna |
999 |
130 |
130 |
cisco-tna |
1000 |
131 |
131 |
cisco-sys |
1001 |
132 |
132 |
statsrv |
1002 |
133 |
133 |
ingres-net |
1003 |
134 |
134 |
epmap |
128 |
135 |
135 |
profile |
129 |
136 |
136 |
netbios-ns |
130 |
137 |
137 |
netbios-dgm |
131 |
138 |
138 |
netbios-ssn |
132 |
139 |
139 |
emfis-data |
133 |
140 |
140 |
emfis-cntl |
134 |
141 |
141 |
bl-idm |
135 |
142 |
142 |
uma |
137 |
144 |
144 |
uaac |
138 |
145 |
145 |
iso-tp0 |
139 |
146 |
146 |
iso-ip |
140 |
147 |
147 |
jargon |
141 |
148 |
148 |
aed-512 |
142 |
149 |
149 |
sql-net |
143 |
150 |
150 |
hems |
144 |
151 |
151 |
bftp |
145 |
152 |
152 |
sgmp |
146 |
153 |
153 |
netsc-prod |
147 |
154 |
154 |
netsc-dev |
148 |
155 |
155 |
sqlsrv |
149 |
156 |
156 |
knet-cmp |
150 |
157 |
157 |
pcmail-srv |
151 |
158 |
158 |
nss-routing |
152 |
159 |
159 |
sgmp-traps |
153 |
160 |
160 |
snmp |
154 |
161 |
161 |
snmptrap |
155 |
162 |
162 |
cmip-man |
156 |
163 |
163 |
cmip-agent |
157 |
164 |
164 |
xns-courier |
158 |
165 |
165 |
s-net |
159 |
166 |
166 |
namp |
160 |
167 |
167 |
rsvd |
161 |
168 |
168 |
send |
162 |
169 |
169 |
print-srv |
163 |
170 |
170 |
multiplex |
164 |
171 |
171 |
cl/1 |
165 |
172 |
172 |
xyplex-mux |
166 |
173 |
173 |
mailq |
167 |
174 |
174 |
vmnet |
168 |
175 |
175 |
genrad-mux |
169 |
176 |
176 |
xdmcp |
170 |
177 |
177 |
nextstep |
171 |
178 |
178 |
bgp |
172 |
179 |
179 |
ris |
173 |
180 |
180 |
unify |
174 |
181 |
181 |
audit |
175 |
182 |
182 |
ocbinder |
176 |
183 |
183 |
ocserver |
177 |
184 |
184 |
remote-kis |
178 |
185 |
185 |
kis |
179 |
186 |
186 |
aci |
180 |
187 |
187 |
mumps |
181 |
188 |
188 |
qft |
182 |
189 |
189 |
gacp |
183 |
190 |
190 |
prospero |
184 |
191 |
191 |
osu-nms |
185 |
192 |
192 |
srmp |
186 |
193 |
193 |
IRC |
187 |
194 |
194 |
dn6-nlm-aud |
188 |
195 |
195 |
dn6-smm-red |
189 |
196 |
196 |
dls |
190 |
197 |
197 |
dls-mon |
191 |
198 |
198 |
smux |
192 |
199 |
199 |
src |
193 |
200 |
200 |
at-rtmp |
194 |
201 |
201 |
at-nbp |
195 |
202 |
202 |
at-3 |
196 |
203 |
203 |
at-echo |
197 |
204 |
204 |
at-5 |
198 |
205 |
205 |
at-zis |
199 |
206 |
206 |
at-7 |
200 |
207 |
207 |
at-8 |
201 |
208 |
208 |
qmtp |
202 |
209 |
209 |
z39.50 |
203 |
210 |
210 |
914c/g |
204 |
211 |
211 |
anet |
205 |
212 |
212 |
ipx |
206 |
213 |
213 |
vmpwscs |
207 |
214 |
214 |
softpc |
208 |
215 |
215 |
CAIlic |
209 |
216 |
216 |
dbase |
210 |
217 |
217 |
mpp |
211 |
218 |
218 |
uarps |
212 |
219 |
219 |
imap3 |
213 |
220 |
220 |
fln-spx |
214 |
221 |
221 |
rsh-spx |
215 |
222 |
222 |
cdc |
216 |
223 |
223 |
masqdialer |
217 |
224 |
224 |
direct |
218 |
242 |
242 |
sur-meas |
219 |
243 |
243 |
inbusiness |
220 |
244 |
244 |
link |
221 |
245 |
245 |
dsp3270 |
222 |
246 |
246 |
subntbcst_tftp |
223 |
247 |
247 |
bhfhs |
224 |
248 |
248 |
set |
225 |
257 |
257 |
yak-chat |
226 |
258 |
258 |
esro-gen |
227 |
259 |
259 |
openport |
228 |
260 |
260 |
nsiiops |
229 |
261 |
261 |
arcisdms |
230 |
262 |
262 |
hdap |
231 |
263 |
263 |
bgmp |
232 |
264 |
264 |
x-bone-ctl |
233 |
265 |
265 |
sst |
234 |
266 |
266 |
td-service |
235 |
267 |
267 |
td-replica |
236 |
268 |
268 |
http-mgmt |
237 |
280 |
280 |
personal-link |
238 |
281 |
281 |
cableport-ax |
239 |
282 |
282 |
rescap |
240 |
283 |
283 |
corerjd |
241 |
284 |
284 |
fxp-1 |
242 |
286 |
286 |
k-block |
243 |
287 |
287 |
novastorbakcup |
244 |
308 |
308 |
entrusttime |
245 |
309 |
309 |
bhmds |
246 |
310 |
310 |
asip-webadmin |
247 |
311 |
311 |
vslmp |
248 |
312 |
312 |
magenta-logic |
249 |
313 |
313 |
opalis-robot |
250 |
314 |
314 |
dpsi |
251 |
315 |
315 |
decauth |
252 |
316 |
316 |
zannet |
253 |
317 |
317 |
pkix-timestamp |
254 |
318 |
318 |
ptp-event |
255 |
319 |
319 |
ptp-general |
256 |
320 |
320 |
pip |
257 |
321 |
321 |
rtsps |
258 |
322 |
322 |
texar |
259 |
333 |
333 |
pdap |
260 |
344 |
344 |
pawserv |
261 |
345 |
345 |
zserv |
262 |
346 |
346 |
fatserv |
263 |
347 |
347 |
csi-sgwp |
264 |
348 |
348 |
mftp |
265 |
349 |
349 |
matip-type-a |
266 |
350 |
350 |
matip-type-b |
267 |
351 |
351 |
dtag-ste-sb |
268 |
352 |
352 |
ndsauth |
269 |
353 |
353 |
bh611 |
270 |
354 |
354 |
datex-asn |
271 |
355 |
355 |
cloanto-net-1 |
272 |
356 |
356 |
bhevent |
273 |
357 |
357 |
shrinkwrap |
274 |
358 |
358 |
nsrmp |
275 |
359 |
359 |
scoi2odialog |
276 |
360 |
360 |
semantix |
277 |
361 |
361 |
srssend |
278 |
362 |
362 |
rsvp_tunnel |
279 |
363 |
363 |
aurora-cmgr |
280 |
364 |
364 |
dtk |
281 |
365 |
365 |
odmr |
282 |
366 |
366 |
mortgageware |
283 |
367 |
367 |
qbikgdp |
284 |
368 |
368 |
rpc2portmap |
285 |
369 |
369 |
codaauth2 |
286 |
370 |
370 |
clearcase |
287 |
371 |
371 |
ulistproc |
288 |
372 |
372 |
legent-1 |
289 |
373 |
373 |
legent-2 |
290 |
374 |
374 |
hassle |
291 |
375 |
375 |
nip |
292 |
376 |
376 |
tnETOS |
293 |
377 |
377 |
dsETOS |
294 |
378 |
378 |
is99c |
295 |
379 |
379 |
is99s |
296 |
380 |
380 |
hp-collector |
297 |
381 |
381 |
hp-managed-node |
298 |
382 |
382 |
hp-alarm-mgr |
299 |
383 |
383 |
arns |
300 |
384 |
384 |
ibm-app |
301 |
385 |
385 |
asa |
302 |
386 |
386 |
aurp |
303 |
387 |
387 |
unidata-ldm |
304 |
388 |
388 |
ldap |
305 |
|
389 |
uis |
306 |
390 |
390 |
synotics-relay |
307 |
391 |
391 |
synotics-broker |
308 |
392 |
392 |
meta5 |
309 |
393 |
393 |
embl-ndt |
310 |
394 |
394 |
netware-ip |
311 |
396 |
396 |
mptn |
312 |
397 |
397 |
kryptolan |
313 |
398 |
398 |
iso-tsap-c2 |
314 |
399 |
399 |
work-sol |
315 |
400 |
400 |
ups |
316 |
401 |
401 |
genie |
317 |
402 |
402 |
decap |
318 |
403 |
403 |
nced |
319 |
404 |
404 |
ncld |
320 |
405 |
405 |
imsp |
321 |
406 |
406 |
timbuktu |
322 |
407 |
407 |
prm-sm |
323 |
408 |
408 |
prm-nm |
324 |
409 |
409 |
decladebug |
325 |
410 |
410 |
rmt |
326 |
|
411 |
synoptics-trap |
327 |
|
412 |
smsp |
328 |
|
413 |
infoseek |
329 |
414 |
414 |
bnet |
330 |
415 |
415 |
silverplatter |
331 |
416 |
416 |
onmux |
332 |
417 |
417 |
hyper-g |
333 |
418 |
418 |
ariel1 |
334 |
419 |
419 |
smpte |
335 |
420 |
420 |
ariel2 |
336 |
421 |
421 |
ariel3 |
337 |
422 |
422 |
opc-job-start |
338 |
423 |
423 |
opc-job-track |
339 |
424 |
424 |
icad-el |
340 |
425 |
425 |
smartsdp |
341 |
426 |
426 |
svrloc |
342 |
427 |
427 |
ocs_cmu |
343 |
428 |
428 |
ocs_amu |
344 |
429 |
429 |
utmpsd |
345 |
430 |
430 |
utmpcd |
346 |
431 |
431 |
iasd |
347 |
432 |
432 |
nnsp |
348 |
433 |
433 |
mobileip-agent |
349 |
434 |
434 |
mobilip-mn |
350 |
435 |
435 |
dna-cml |
351 |
436 |
436 |
comscm |
352 |
437 |
437 |
dsfgw |
353 |
438 |
438 |
dasp |
354 |
439 |
439 |
sgcp |
355 |
440 |
440 |
decvms-sysmgt |
356 |
441 |
441 |
cvc_hostd |
357 |
442 |
442 |
https |
358 |
443 |
|
snpp |
359 |
444 |
444 |
microsoft-ds |
360 |
445 |
445 |
ddm-rdb |
361 |
446 |
446 |
ddm-dfm |
362 |
447 |
447 |
ddm-ssl |
363 |
448 |
448 |
as-servermap |
364 |
449 |
449 |
tserver |
365 |
450 |
450 |
sfs-smp-net |
366 |
451 |
451 |
sfs-config |
367 |
452 |
452 |
creativeserver |
368 |
453 |
453 |
contentserver |
369 |
454 |
454 |
creativepartnr |
370 |
455 |
455 |
scohelp |
371 |
457 |
457 |
appleqtc |
372 |
458 |
458 |
ampr-rcmd |
373 |
459 |
459 |
skronk |
374 |
460 |
460 |
datasurfsrv |
375 |
461 |
461 |
datasurfsrvsec |
376 |
462 |
462 |
alpes |
377 |
463 |
463 |
kpasswd |
378 |
464 |
464 |
url-rendezvous |
379 |
465 |
465 |
digital-vrc |
380 |
466 |
466 |
mylex-mapd |
381 |
467 |
467 |
photuris |
382 |
468 |
468 |
rcp |
383 |
469 |
469 |
scx-proxy |
384 |
470 |
470 |
mondex |
385 |
471 |
471 |
ljk-login |
386 |
472 |
472 |
hybrid-pop |
387 |
473 |
473 |
tn-tl-w1 |
388 |
474 |
|
tn-tl-w2 |
389 |
|
474 |
tn-tl-fd1 |
390 |
476 |
476 |
ss7ns |
391 |
477 |
477 |
spsc |
392 |
478 |
478 |
iafserver |
393 |
479 |
479 |
iafdbase |
394 |
480 |
480 |
ph |
395 |
481 |
481 |
bgs-nsi |
396 |
482 |
482 |
ulpnet |
397 |
483 |
483 |
integra-sme |
398 |
484 |
484 |
powerburst |
399 |
485 |
485 |
avian |
400 |
486 |
486 |
saft |
401 |
487 |
487 |
gss-http |
402 |
488 |
488 |
nest-protocol |
403 |
489 |
489 |
micom-pfs |
404 |
490 |
490 |
go-login |
405 |
491 |
491 |
ticf-1 |
406 |
492 |
492 |
ticf-2 |
407 |
493 |
493 |
pov-ray |
408 |
494 |
494 |
intecourier |
409 |
495 |
495 |
pim-rp-disc |
410 |
496 |
496 |
dantz |
411 |
497 |
497 |
siam |
412 |
498 |
498 |
iso-ill |
413 |
499 |
499 |
isakmp |
414 |
500 |
500 |
Table 1.8. Port-Based Protocols (Ports 501 to 1000)
Protocol Name |
ID |
TCP Ports |
UDP Ports |
---|---|---|---|
stmf |
415 |
501 |
501 |
asa-appl-proto |
416 |
502 |
502 |
intrinsa |
417 |
503 |
503 |
citadel |
418 |
504 |
504 |
mailbox-lm |
419 |
505 |
505 |
ohimsrv |
420 |
506 |
506 |
crs |
421 |
507 |
507 |
xvttp |
422 |
508 |
508 |
snare |
423 |
509 |
509 |
fcp |
424 |
510 |
510 |
passgo |
425 |
511 |
511 |
exec |
426 |
512 |
|
biff |
427 |
|
512 |
login |
428 |
513 |
|
who |
429 |
|
513 |
shell |
430 |
514 |
|
syslog |
431 |
|
514 |
printer |
432 |
515 |
515 |
videotex |
433 |
516 |
516 |
talk |
434 |
517 |
517 |
ntalk |
435 |
518 |
518 |
utime |
436 |
519 |
519 |
efs |
437 |
520 |
|
router |
438 |
|
520 |
ripng |
439 |
521 |
521 |
ulp |
440 |
522 |
522 |
ibm-db2 |
441 |
523 |
523 |
ncp |
442 |
524 |
524 |
timed |
443 |
525 |
525 |
tempo |
444 |
526 |
526 |
stx |
445 |
527 |
527 |
custix |
446 |
528 |
528 |
irc-serv |
447 |
529 |
529 |
courier |
448 |
530 |
530 |
conference |
449 |
531 |
531 |
netnews |
450 |
532 |
532 |
netwall |
451 |
533 |
533 |
mm-admin |
452 |
534 |
534 |
iiop |
453 |
535 |
535 |
opalis-rdv |
454 |
536 |
536 |
nmsp |
455 |
537 |
537 |
gdomap |
456 |
538 |
538 |
apertus-ldp |
457 |
539 |
539 |
uucp |
458 |
540 |
540 |
uucp-rlogin |
459 |
541 |
541 |
commerce |
460 |
542 |
542 |
klogin |
461 |
543 |
543 |
kshell |
462 |
544 |
544 |
appleqtcsrvr |
463 |
545 |
545 |
dhcpv6-client |
464 |
546 |
546 |
dhcpv6-server |
465 |
547 |
547 |
idfp |
466 |
549 |
549 |
new-rwho |
467 |
550 |
550 |
cybercash |
468 |
551 |
551 |
deviceshare |
469 |
552 |
552 |
pirp |
470 |
553 |
553 |
remotefs |
471 |
556 |
556 |
openvms-sysipc |
472 |
557 |
557 |
sdnskmp |
473 |
558 |
558 |
teedtap |
474 |
559 |
559 |
rmonitor |
475 |
560 |
560 |
monitor |
476 |
561 |
561 |
chshell |
477 |
562 |
562 |
nntps |
478 |
563 |
563 |
9pfs |
479 |
564 |
564 |
whoami |
480 |
565 |
565 |
streettalk |
481 |
566 |
566 |
banyan-rpc |
482 |
567 |
567 |
ms-shuttle |
483 |
568 |
568 |
ms-rome |
484 |
569 |
569 |
meter |
485 |
570-571 |
570-571 |
sonar |
486 |
572 |
572 |
banyan-vip |
487 |
573 |
573 |
ftp-agent |
488 |
574 |
574 |
vemmi |
489 |
575 |
575 |
ipcd |
490 |
576 |
576 |
vnas |
491 |
577 |
577 |
ipdd |
492 |
578 |
578 |
decbsrv |
493 |
579 |
579 |
sntp-heartbeat |
494 |
580 |
580 |
bdp |
495 |
581 |
581 |
scc-security |
496 |
582 |
582 |
philips-vc |
497 |
583 |
583 |
keyserver |
498 |
584 |
584 |
imap4-ssl |
499 |
585 |
585 |
password-chg |
500 |
586 |
586 |
submission |
501 |
587 |
587 |
cal |
502 |
588 |
588 |
eyelink |
503 |
589 |
589 |
tns-cml |
504 |
590 |
590 |
http-alt |
505 |
591 |
591 |
eudora-set |
506 |
592 |
592 |
http-rpc-epmap |
507 |
593 |
593 |
tpip |
508 |
594 |
594 |
cab-protocol |
509 |
595 |
595 |
smsd |
510 |
596 |
596 |
ptcnameservice |
511 |
597 |
597 |
sco-websrvrmg3 |
512 |
598 |
598 |
acp |
513 |
599 |
599 |
ipcserver |
514 |
600 |
600 |
urm |
515 |
606 |
606 |
nqs |
516 |
607 |
607 |
sift-uft |
517 |
608 |
608 |
npmp-trap |
518 |
609 |
609 |
npmp-local |
519 |
610 |
610 |
npmp-gui |
520 |
611 |
611 |
hmmp-ind |
521 |
612 |
612 |
hmmp-op |
522 |
613 |
613 |
sshell |
523 |
614 |
614 |
sco-inetmgr |
524 |
615 |
615 |
sco-sysmgr |
525 |
616 |
616 |
sco-dtmgr |
526 |
617 |
617 |
dei-icda |
527 |
618 |
618 |
digital-evm |
528 |
619 |
619 |
sco-websrvrmgr |
529 |
620 |
620 |
escp-ip |
530 |
621 |
621 |
collaborator |
531 |
622 |
622 |
aux_bus_shunt |
532 |
623 |
623 |
cryptoadmin |
533 |
624 |
624 |
dec_dlm |
534 |
625 |
625 |
asia |
535 |
626 |
626 |
passgo-tivoli |
536 |
627 |
627 |
qmqp |
537 |
628 |
628 |
3com-amp3 |
538 |
629 |
629 |
rda |
539 |
630 |
630 |
ipp |
540 |
631 |
631 |
bmpp |
541 |
632 |
632 |
servstat |
542 |
633 |
633 |
ginad |
543 |
634 |
634 |
rlzdbase |
544 |
635 |
635 |
ldaps |
545 |
636 |
636 |
lanserver |
546 |
637 |
637 |
mcns-sec |
547 |
638 |
638 |
msdp |
548 |
639 |
639 |
entrust-sps |
549 |
640 |
640 |
repcmd |
550 |
641 |
641 |
esro-emsdp |
551 |
642 |
642 |
sanity |
552 |
643 |
643 |
dwr |
553 |
644 |
644 |
pssc |
554 |
645 |
645 |
ldp |
555 |
646 |
646 |
dhcp-failover |
556 |
647 |
647 |
rrp |
557 |
648 |
648 |
aminet |
558 |
649 |
649 |
obex |
559 |
650 |
650 |
ieee-mms |
560 |
651 |
651 |
hello-port |
561 |
652 |
652 |
repscmd |
562 |
653 |
653 |
aodv |
563 |
654 |
654 |
tinc |
564 |
655 |
655 |
spmp |
565 |
656 |
656 |
rmc |
566 |
657 |
657 |
tenfold |
567 |
658 |
658 |
mac-srvr-admin |
568 |
660 |
660 |
hap |
569 |
661 |
661 |
pftp |
570 |
662 |
662 |
purenoise |
571 |
663 |
663 |
secure-aux-bus |
572 |
664 |
664 |
sun-dr |
573 |
665 |
665 |
doom |
574 |
666 |
666 |
disclose |
575 |
667 |
667 |
mecomm |
576 |
668 |
668 |
meregister |
577 |
669 |
669 |
vacdsm-sws |
578 |
670 |
670 |
vacdsm-app |
579 |
671 |
671 |
vpps-qua |
580 |
672 |
672 |
cimplex |
581 |
673 |
673 |
acap |
582 |
674 |
674 |
dctp |
583 |
675 |
675 |
vpps-via |
584 |
676 |
676 |
vpp |
585 |
677 |
677 |
ggf-ncp |
586 |
678 |
678 |
mrm |
587 |
679 |
679 |
entrust-aaas |
588 |
680 |
680 |
entrust-aams |
589 |
681 |
681 |
xfr |
590 |
682 |
682 |
corba-iiop |
591 |
683 |
683 |
corba-iiop-ssl |
592 |
684 |
684 |
mdc-portmapper |
593 |
685 |
685 |
hcp-wismar |
594 |
686 |
686 |
asipregistry |
595 |
687 |
687 |
realm-rusd |
596 |
688 |
688 |
nmap |
597 |
689 |
689 |
vatp |
598 |
690 |
690 |
msexch-routing |
599 |
691 |
691 |
hyperwave-isp |
600 |
692 |
692 |
connendp |
601 |
693 |
693 |
ha-cluster |
602 |
694 |
694 |
ieee-mms-ssl |
603 |
695 |
695 |
rushd |
604 |
696 |
696 |
uuidgen |
605 |
697 |
697 |
olsr |
606 |
698 |
698 |
accessnetwork |
607 |
699 |
699 |
elcsd |
608 |
704 |
704 |
agentx |
609 |
705 |
705 |
silc |
610 |
706 |
706 |
borland-dsj |
611 |
707 |
707 |
entrust-kmsh |
612 |
709 |
709 |
entrust-ash |
613 |
710 |
710 |
cisco-tdp |
614 |
711 |
711 |
netviewdm1 |
615 |
729 |
729 |
netviewdm2 |
616 |
730 |
730 |
netviewdm3 |
617 |
731 |
731 |
netgw |
618 |
741 |
741 |
netrcs |
619 |
742 |
742 |
flexlm |
620 |
744 |
744 |
fujitsu-dev |
621 |
747 |
747 |
ris-cm |
622 |
748 |
748 |
kerberos-adm |
623 |
749 |
749 |
rfile |
624 |
750 |
|
kerberos-iv |
625 |
|
750 |
pump |
626 |
751 |
751 |
qrh |
627 |
752 |
752 |
rrh |
628 |
753 |
753 |
tell |
629 |
754 |
754 |
nlogin |
630 |
758 |
758 |
con |
631 |
759 |
759 |
ns |
632 |
760 |
760 |
rxe |
633 |
761 |
761 |
quotad |
634 |
762 |
762 |
cycleserv |
635 |
763 |
763 |
omserv |
636 |
764 |
764 |
webster |
637 |
765 |
765 |
phonebook |
638 |
767 |
767 |
vid |
639 |
769 |
769 |
cadlock |
640 |
770 |
770 |
rtip |
641 |
771 |
771 |
cycleserv2 |
642 |
772 |
772 |
submit |
643 |
773 |
|
notify |
644 |
|
773 |
rpasswd |
645 |
774 |
|
acmaint_dbd |
646 |
|
774 |
entomb |
647 |
775 |
|
acmaint_transd |
648 |
|
775 |
wpages |
649 |
776 |
776 |
multiling-http |
650 |
777 |
777 |
wpgs |
651 |
780 |
780 |
concert |
652 |
786 |
786 |
qsc |
653 |
|
787 |
mdbs_daemon |
654 |
800 |
800 |
device |
655 |
801 |
801 |
itm-mcell-s |
656 |
828 |
828 |
pkix-3-ca-ra |
657 |
829 |
829 |
dhcp-failover2 |
658 |
847 |
847 |
rsync |
659 |
873 |
873 |
iclcnet-locate |
660 |
886 |
886 |
iclcnet_svinfo |
661 |
887 |
887 |
accessbuilder |
662 |
888 |
888 |
omginitialrefs |
663 |
900 |
900 |
smpnameres |
664 |
901 |
901 |
ideafarm-chat |
665 |
902 |
902 |
ideafarm-catch |
666 |
903 |
903 |
xact-backup |
667 |
911 |
911 |
ftps-data |
668 |
989 |
989 |
ftps |
669 |
990 |
990 |
nas |
670 |
991 |
991 |
telnets |
671 |
992 |
992 |
imaps |
672 |
993 |
993 |
ircs |
673 |
994 |
994 |
pop3s |
674 |
995 |
995 |
vsinet |
675 |
996 |
996 |
maitrd |
676 |
997 |
997 |
busboy |
677 |
998 |
|
puparp |
678 |
|
998 |
garcon |
679 |
999 |
|
applix |
680 |
|
999 |
Table 1.9. Port-Based Protocols (Ports 1000+)
Protocol Name |
ID |
TCP Ports |
UDP Ports |
---|---|---|---|
surf |
681 |
1010 |
1010 |
Need For Speed 3 |
1018 |
1030 |
1030 |
rmiactivation |
682 |
1098 |
1098 |
rmiregistry |
683 |
1099 |
1099 |
Westwood Online |
1028 |
1140, 1234 |
1140, 1234 |
GLT Poliane |
882 |
1201 |
|
ms-sql-s |
684 |
1433 |
1433 |
ms-sql-m |
685 |
1434 |
1434 |
oracle |
690 |
1521 |
1521 |
orasrv |
691 |
1525 |
1525 |
tlisrv |
692 |
1527 |
1527 |
coauthor |
693 |
1529 |
1529 |
micromuse-lm |
702 |
1534 |
1534 |
orbixd |
703 |
1570 |
1570 |
rdb-dbs-disp |
694 |
1571 |
1571 |
oraclenames |
695 |
1575 |
1575 |
shockwave |
707 |
1626 |
1626 |
oraclenet8cman |
696 |
1630 |
1630 |
l2tp |
742 |
1701 |
1701 |
pptp |
739 |
1723 |
1723 |
net8-cman |
697 |
1830 |
1830 |
msnp |
713 |
1836 |
1836 |
MSN Messenger |
883 |
1863 |
1863 |
gtp-user |
740 |
2152 |
2152 |
kali |
718 |
2213 |
2213 |
directplay |
716 |
2234 |
2234 |
Rainbox six |
1026 |
2346 |
2346 |
ms-olap |
686 |
2382-2383, 2393-2394 |
2382-2383, 2393-2394 |
groove |
715 |
2492 |
2492 |
citrixima |
698 |
2512 |
2512 |
citrixadmin |
699 |
2513 |
2513 |
worldfusion |
719 |
2595-2596 |
2595-2596 |
citriximaclient |
701 |
2598 |
2598 |
Black And White |
1006 |
2611-2612 |
|
sitaraserver |
708 |
2629 |
2629 |
sitaramgmt |
709 |
2630 |
2630 |
sitaradir |
710 |
2631 |
2631 |
wta-wsp-s |
724 |
2805 |
2805 |
citrix-rtmp |
700 |
2897 |
2897 |
wap-push |
725 |
2948 |
2948 |
wap-pushsecure |
726 |
2949 |
2949 |
xbox live |
898 |
3074 |
3074 |
orbix-locator |
704 |
3075 |
3075 |
orbix-config |
705 |
3076 |
3076 |
orbix-loc-ssl |
706 |
3077 |
3077 |
xdtp |
741 |
3088 |
3088 |
Delta Force |
1025 |
3100, 3999 |
3100, 3999, 3568, 3569 |
msft-gc |
687 |
3268 |
3268 |
msft-gc-ssl |
688 |
3269 |
3269 |
net-assistant |
712 |
3283 |
3283 |
mysql |
711 |
3306 |
3306 |
directv-web |
720 |
3334 |
3334 |
directv-soft |
721 |
3335 |
3335 |
directv-tick |
722 |
3336 |
3336 |
directv-catlg |
723 |
3337 |
3337 |
ms-term-services |
689 |
3389 |
3389 |
Myth |
1016 |
3453 |
3453 |
Warcraft |
1023 |
3724 |
3724 |
Kohan Immortal Sovereigns |
1014 |
3855, 17437 |
3855, 17437 |
F16 |
1011 |
|
3862, 3863 |
F22 Simulator (lightning 3) |
1012 |
|
3874-3875, 4533, 4534 |
wap-push-http |
727 |
4035 |
4035 |
wap-push-https |
728 |
4036 |
4036 |
Ultima |
1022 |
5002-5010, 7775-7777, 8888, 9999, 7875 |
|
aim |
714 |
5190-5193 |
|
Google Talk |
1030 |
5222 |
|
Outlaws |
1020 |
5310 |
5310 |
directplay8 |
717 |
6073 |
6073 |
Operation Flash Point |
1019 |
47624, 6073 |
6073 |
Konspire2b |
1031 |
6085 |
6085 |
fsgs |
743 |
6112 |
6112 |
Diablo |
1009 |
6113-6119 |
6113-6119 |
game-spy |
755 |
6500, 28900, 29000 |
6515, 27900 |
parsec-game |
744 |
6582 |
6582 |
ibprotocol |
737 |
6714 |
6714 |
Anarchy |
1004 |
7013, 7500-7501 |
7013, 7500-7501 |
UnReal_UT |
745 |
7778 |
7777-7783 |
Znes |
1024 |
|
7845 |
Asherons Call |
1005 |
9000-9013 |
9000-9013 |
wap-wsp |
729 |
9200 |
9200 |
wap-wsp-wtp |
730 |
9201 |
9201 |
wap-wsp-s |
731 |
9202 |
9202 |
wap-wsp-wtp-s |
732 |
9203 |
9203 |
wap-vcard |
733 |
9204 |
9204 |
wap-vcal |
734 |
9205 |
9205 |
wap-vcard-s |
735 |
9206 |
9206 |
wap-vcal-s |
736 |
9207 |
9207 |
Need For Speed |
1017 |
9442 |
9442 |
ps2 |
899 |
10070-10080 |
10070 |
Yahoo Games |
1029 |
11999 |
|
Motorhead |
1015 |
16000, 16010-16030 |
16000, 16010-16030 |
Swat3 |
1021 |
16639 |
16638 |
SiN |
746 |
22450 |
22450 |
Elite Force |
1010 |
|
26000, 27500 |
Dark Reign |
1008 |
26214 |
26214 |
Hexen |
1013 |
|
26900 |
halflife |
747 |
|
27015 |
Counter strike |
1007 |
27020-27039 |
1200, 27000-27014 |
quake-server |
754 |
27960 |
27910, 27960 |
tribes |
748 |
28001 |
28001 |
heretic2 |
749 |
28910 |
|
Soldier of fortune |
1027 |
|
28911-28915 |
starsiege |
750 |
|
29001-29009 |
game-search |
751 |
29001 |
|
KingPin |
752 |
31510 |
31510 |
runescape |
753 |
43594 |
|
Services are the building blocks of service configurations. Classification of a transaction to a service determines the accounting and control that applies to the transaction. Services are organized in a hierarchal structure used for both accounting and control.
The following table lists the services defined in the default service configuration. Both service counters, which are used to accumulate information on transactions classified to the service, have the same name.
Table 1.10. Installed Services
Name |
ID |
Name of Parent Service |
Global Counter and Subscriber Counter |
---|---|---|---|
Default Service |
0 |
|
Default Service* |
Generic |
1 |
Default Service |
Default Service* |
Generic TCP |
2 |
Generic |
Generic TCP |
Generic UDP |
3 |
Generic |
Generic UDP |
Generic IP |
6 |
Generic |
Generic IP |
Generic Upload/Download |
39 |
Generic |
Generic Upload/Download |
|
4 |
Default Service |
E-Mail* |
POP3 |
21 |
|
E-Mail* |
SMTP |
22 |
|
E-Mail* |
IMAP |
23 |
|
E-Mail* |
Browsing |
7 |
Default Service |
Browsing* |
HTTP |
16 |
Browsing |
Browsing* |
HTTPS |
17 |
Browsing |
Browsing* |
Newsgroups |
8 |
Default Service |
Newsgroups |
P2P |
9 |
Default Service |
P2P |
eDonkey/eMule |
14 |
P2P |
eDonkey/eMule |
Kazaa |
15 |
P2P |
Kazaa |
BitTorrent |
24 |
P2P |
BitTorrent |
Commercial File Sharing |
26 |
P2P |
Commercial File Sharing |
Winny |
27 |
P2P |
Winny |
Gnutella |
30 |
P2P |
Gnutella |
WinMX |
31 |
P2P |
WinMX |
VoIP |
12 |
Default Service |
VoIP |
MGCP |
5 |
VoIP |
MGCP |
SIP |
10 |
VoIP |
SIP |
H323 |
11 |
VoIP |
H323 |
Vonage |
13 |
VoIP |
Vonage |
Skype |
25 |
VoIP |
Skype |
Skinny |
35 |
VoIP |
Skinny |
DingoTel |
36 |
VoIP |
DingoTel |
Yahoo Messenger VoIP |
37 |
VoIP |
Yahoo Messenger VoIP |
ICQ VoIP |
40 |
VoIP |
ICQ VoIP |
Instant Messaging |
28 |
Default Service |
Instant Messaging |
Gaming |
29 |
Default Service |
Gaming |
FTP |
32 |
Default Service |
FTP |
Net Admin |
33 |
Default Service |
Net Admin |
Streaming |
34 |
Default Service |
Streaming* |
Streaming over HTTP |
18 |
Streaming |
Streaming* |
RTSP |
19 |
Streaming |
Streaming* |
MMS |
20 |
Streaming |
Streaming* |
Tunneling |
38 |
Default Service |
Tunneling |
An asterisk is appended to a service counter name whenever the counter applies to more than one service.
SCE platforms generate and transmit Raw Data Records (RDRs) that contain a wide variety of information and statistics, depending on the configuration of the system.
Table 1.11. Default RDR Settings
RDR Family |
RDR Name |
State |
Rate |
Rate Limit |
Notes |
---|---|---|---|---|---|
Usage |
Link |
ON |
Every 5 minutes |
|
|
Package |
ON |
Every 5 minutes |
|
| |
Subscriber |
ON |
Every 10 minutes |
200 per second |
| |
Transaction |
Transaction |
ON |
|
100 per second |
All services have the same relative weight. |
Transaction Usage |
Transaction Usage (TUR) |
OFF |
|
|
No threshold. |
Interim TUR |
OFF |
|
|
| |
Media Flow |
ON |
|
|
| |
Quota
|
Breach |
OFF |
|
|
|
Remaining |
OFF |
Every 5 minutes |
100 per second |
| |
Threshold |
OFF |
|
|
Generate RDR when balance goes below 10MB. | |
Restore Quota |
OFF |
|
|
Generated upon subscriber introduction. | |
Log |
Block |
ON |
|
20 per second |
|
Real-Time Subscriber |
Real-Time Subscriber Usage |
ON |
Every 1 minutes |
100 per second |
Enable for each subscriber separately, using CLI. |
Real-Time Signaling |
Flow Signaling |
OFF |
|
|
|
Attack Signaling |
OFF |
|
|
| |
Malicious Traffic |
Malicious Traffic |
ON |
|
|
|
Rules are set of configurable instructions telling the application how to handle flows classified to a service.
The default service configuration contains a single rule for the default service. Until the user creates other rules, the default service rule applies to all traffic processed by the SCE platform.
The default service rule places no restrictions on traffic:
Flows are routed through the default BWCs, which have unlimited BW.
No quota limitations are applied to the flows.
This chapter contains a list of the Raw Data Records (RDRs) produced by the SCE platform and a full description of the fields contained in each RDR.
The chapter also contains field-content information for those fields that are generated by Service Control components.
RDRs are the collection of fields that are sent by the Service Control Engine (SCE) platforms to the Cisco Service Control Management Suite (SCMS) Collection Manager (CM).
Fields that are common to many of the RDRs are described in the next section, before the individual RDRs are described.
This section contains descriptions of fields that are common to many RDRs. The first two fields, SUBSCRIBER_ID and PACKAGE_ID, appear in almost all the RDRs. The other fields are listed in alphabetic order.
SUBSCRIBER_ID—The subscriber identification string, introduced through the subscriber management interfaces. It may contain up to 40 characters. For unknown subscribers this field may contain an empty string.
PACKAGE_ID—The ID of the Package assigned to the subscriber whose traffic is being reported. An assigned Package ID is an integer value between 0 and maximum_number_of_packages. The value maximum_number_of_packages is reserved for unknown subscribers.
ACCESS_STRING—A Layer 7 property, extracted from the transaction. For possible values, see String Fields.
BREACH_STATE—This field indicates whether the subscriber’s quota was breached.
0—Not breached
1—Breached
CLIENT_IP—The IP address of the client side of the reported session. (The client side is defined as the initiator of the networking session.) The IP address is in a 32-bit binary format.
CLIENT_PORT—For TCP/UDP-based sessions, the port number of the client side (initiator) of the networking session. For non-TCP/UDP sessions, this field has the value zero.
CONFIGURED_DURATION—For periodic RDRs, the configured period, in seconds, between successive RDRs.
END_TIME—Ending time stamp of this RDR. The field is in UNIX time_t format, which is the number of seconds since midnight of 1 January 1970.
INFO_STRING—A Layer 7 property extracted from the transaction. For possible values, see String Fields.
INITIATING_SIDE—On which side of the SCE platform the initiator of the transaction resides.
0—The subscriber side
1—The network side
PROTOCOL_ID—This field contains the unique ID of the protocol associated with the reported session.
For port-based protocols (for example, TCP port 666 for DOOM) and IP-protocol-based protocols (for example, IP protocol 1 for ICMP), the PROTOCOL_ID will be the TCP_GENERIC / UDP_GENERIC / IP_PROTOCOL value, according to the specific base protocol of the transaction.
PROTOCOL_SIGNATURE—This field contains the ID of the protocol signature associated with this session.
ZONE_ID—This field contains the ID of the zone associated with this session.
FLAVOR_ID—For protocol signatures that have flavors, this field contains the ID of the flavor associated with this session.
REPORT_TIME—Ending time stamp of this RDR. The field is in UNIX time_t format, which is the number of seconds since midnight of 1 January 1970.
SERVER_IP—Contains the destination IP address of the reported session. (The destination is defined as the server or the listener of the networking session.) The IP address is in a 32-bit binary format.
SERVER_PORT—For TCP/UDP-based sessions, this field contains the destination port number of the networking session. For non-TCP/UDP sessions, this field contains the IP protocol number of the session flow.
SERVICE_ID—This field indicates the service classification of the reported session. For example, in the Transaction RDR this field indicates which service was accessed, and in the Breaching RDR this field indicates which service was breached.
TIME_FRAME—The system supports time-dependent policies, by using different rules for different time frames. This field indicates the time frame during which the RDR was generated. The field’s value can be in the range 0 to 3, indicating which of the four time frames was used.
All volumes in RDRs are reported in L3 bytes.
The TRANSACTION_RDR may be generated at the end of a session, according to a user-configurable sampling mechanism—configuring number-of-transaction-RDRs-per-second sets the number of Transaction RDRs generated per-second. This RDR is not generated for sessions that were blocked by a rule.
The RDR tag of the TRANSACTION_RDR is 0xf0f0f010 / 4042321936.
The following table lists the RDR fields and their descriptions.
Table 2.1. Transaction RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
PACKAGE_ID |
INT16 |
See Universal RDR Fields. |
SERVICE_ID |
INT32 |
See Universal RDR Fields. |
PROTOCOL_ID |
INT16 |
See Universal RDR Fields. |
SKIPPED_SESSIONS |
INT32 |
The number of unreported sessions since the previous RDR. |
SERVER_IP |
UINT32 |
See Universal RDR Fields. |
SERVER_PORT |
UINT16 |
See Universal RDR Fields. |
ACCESS_STRING |
STRING |
See Universal RDR Fields. |
INFO_STRING |
STRING |
See Universal RDR Fields. |
CLIENT_IP |
UINT32 |
See Universal RDR Fields. |
CLIENT_PORT |
UINT16 |
See Universal RDR Fields. |
INITIATING_SIDE |
INT8 |
See Universal RDR Fields. |
REPORT_TIME |
INT32 |
See Universal RDR Fields. |
MILLISEC_DURATION |
INT32 |
Duration, in milliseconds, of the transaction reported in this RDR. |
TIME_FRAME |
INT8 |
See Universal RDR Fields. |
SESSION_UPSTREAM_VOLUME |
UINT32 |
Upstream volume of the transaction, in bytes. The volume refers to the aggregated upstream volume on both links of all the flows bundled in the transaction. |
SESSION_DOWNSTREAM_VOLUME |
UINT32 |
Downstream volume of the transaction, in bytes. The volume refers to the aggregated downstream volume on both links of all the flows bundled in the transaction. |
SUBSCRIBER_COUNTER_ID |
UINT16 |
Each service is mapped to a counter. There are 32 subscriber counters. |
GLOBAL_COUNTER_ID |
UINT16 |
Each service is mapped to a counter. There are 64 global counters. |
PACKAGE_COUNTER_ID |
UINT16 |
Each package is mapped to a counter. There are 1024 package counters. |
IP_PROTOCOL |
UINT8 |
IP protocol type. |
PROTOCOL_SIGNATURE |
INT32 |
See Universal RDR Fields. |
ZONE_ID |
INT32 |
See Universal RDR Fields. |
FLAVOR_ID |
INT32 |
See Universal RDR Fields. |
FLOW_CLOSE_MODE |
UINT8 |
The reason for the end of flow. |
The TRANSACTION_USAGE_RDR is generated at the end of a session, for all transactions on packages and services that are configured to generate such an RDR. This RDR is not generated for sessions that were blocked by a rule.
By default, packages and services are disabled from generating this RDR.
This RDR is designed for services and packages where specific, per-transaction RDRs are required (for example, transaction level billing). It is easy to configure this RDR, in error, so that it is generated for every transaction, which may result in an excessive RDR rate. Configure the generation scheme for this RDR with extra care.
The RDR tag of the TRANSACTION_USAGE_RDR is 0xf0f0f438 / 4042323000.
The following table lists the RDR fields and their descriptions.
Table 2.2. Transaction Usage RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
PACKAGE_ID |
UINT16 |
See Universal RDR Fields. |
SERVICE_ID |
INT32 |
See Universal RDR Fields. |
PROTOCOL_ID |
INT16 |
See Universal RDR Fields. |
SKIPPED_SESSIONS |
INT32 |
Number of unreported sessions since the previous RDR. |
SERVER_IP |
UINT32 |
See Universal RDR Fields. |
SERVER_PORT |
UINT16 |
See Universal RDR Fields. |
ACCESS_STRING |
STRING |
See Universal RDR Fields. |
INFO_STRING |
STRING |
See Universal RDR Fields. |
CLIENT_IP |
UINT32 |
See Universal RDR Fields. |
CLIENT_PORT |
UINT16 |
See Universal RDR Fields. |
INITIATING_SIDE |
INT8 |
See Universal RDR Fields. |
REPORT_TIME |
INT32 |
See Universal RDR Fields. |
MILLISEC_DURATION |
UINT32 |
Duration, in milliseconds, of the transaction reported in this RDR. |
TIME_FRAME |
INT8 |
See Universal RDR Fields. |
SESSION_UPSTREAM_VOLUME |
UINT32 |
Upstream volume of the transaction, in bytes. The volume refers to the aggregated upstream volume on both links of all the flows bundled in the transaction. |
SESSION_DOWNSTREAM_VOLUME |
UINT32 |
Downstream volume of the transaction, in bytes. The volume refers to the aggregated stream volume on both links of all the flows bundled in the transaction. |
SUBSCRIBER_COUNTER_ID |
UINT16 |
Each service is mapped to a counter. There are 32 subscriber counters. |
GLOBAL_COUNTER_ID |
UINT16 |
Each service is mapped to a counter. There are 64 global counters. |
PACKAGE_COUNTER_ID |
UINT16 |
Each package is mapped to a counter. There are 1024 package counters. |
IP_PROTOCOL |
UINT8 |
IP protocol type. |
PROTOCOL_SIGNATURE |
INT32 |
See Universal RDR Fields. |
ZONE_ID |
INT32 |
See Universal RDR Fields. |
FLAVOR_ID |
INT32 |
See Universal RDR Fields. |
FLOW_CLOSE_MODE |
UINT8 |
The reason for the end of flow. |
The HTTP_TRANSACTION_USAGE_RDR is generated at the end of an HTTP session, for all transactions on packages and services that are configured to generate a Transaction Usage RDR. This RDR is not generated for sessions that were blocked by a rule.
By default, packages and services are disabled from generating this RDR.
This RDR is designed for services and packages where specific, per-transaction RDRs are required (for example, transaction level billing). It is easy to configure this RDR, in error, so that it is generated for every transaction, which may result in an excessive RDR rate. Configure the generation scheme for this RDR with extra care.
The RDR tag of the HTTP_TRANSACTION_USAGE_RDR is 0xf0f0f43C / 4042323004.
The following table lists the RDR fields and their descriptions.
Table 2.3. HTTP Transaction Usage RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
PACKAGE_ID |
UINT16 |
See Universal RDR Fields. |
SERVICE_ID |
INT32 |
See Universal RDR Fields. |
PROTOCOL_ID |
INT16 |
See Universal RDR Fields. |
SKIPPED_SESSIONS |
INT32 |
Number of unreported sessions since the previous RDR. |
SERVER_IP |
UINT32 |
See Universal RDR Fields. |
SERVER_PORT |
UINT16 |
See Universal RDR Fields. |
ACCESS_STRING |
STRING |
See Universal RDR Fields. |
INFO_STRING |
STRING |
See Universal RDR Fields. |
CLIENT_IP |
UINT32 |
See Universal RDR Fields. |
CLIENT_PORT |
UINT16 |
See Universal RDR Fields. |
INITIATING_SIDE |
INT8 |
See Universal RDR Fields. |
REPORT_TIME |
INT32 |
See Universal RDR Fields. |
MILLISEC_DURATION |
UINT32 |
Duration, in milliseconds, of the transaction reported in this RDR. |
TIME_FRAME |
INT8 |
See Universal RDR Fields. |
SESSION_UPSTREAM_VOLUME |
UINT32 |
Upstream volume of the transaction, in bytes. The volume refers to the aggregated upstream volume on both links of all the flows bundled in the transaction. |
SESSION_DOWNSTREAM_VOLUME |
UINT32 |
Downstream volume of the transaction, in bytes. The volume refers to the aggregated stream volume on both links of all the flows bundled in the transaction. |
SUBSCRIBER_COUNTER_ID |
UINT16 |
Each service is mapped to a counter. There are 32 subscriber counters. |
GLOBAL_COUNTER_ID |
UINT16 |
Each service is mapped to a counter. There are 64 global counters. |
PACKAGE_COUNTER_ID |
UINT16 |
Each package is mapped to a counter. There are 1024 package counters. |
IP_PROTOCOL |
UINT8 |
IP protocol type. |
PROTOCOL_SIGNATURE |
INT32 |
See Universal RDR Fields. |
ZONE_ID |
INT32 |
See Universal RDR Fields. |
FLAVOR_ID |
INT32 |
See Universal RDR Fields. |
FLOW_CLOSE_MODE |
UINT8 |
The reason for the end of flow. |
USER_AGENT |
STRING |
The user agent field extracted from the HTTP transaction. |
HTTP_URL |
STRING |
The URL extracted from the HTTP transaction. |
The RTSP_TRANSACTION_USAGE_RDR is generated at the end of a session, for all RTSP transactions on packages and services that are configured to generate a Transaction Usage RDR. This RDR is not generated for sessions that were blocked by a rule.
By default, packages and services are disabled from generating this RDR.
This RDR is designed for services and packages where specific, per-transaction RDRs are required (for example, transaction level billing). It is easy to configure this RDR, in error, so that it is generated for every transaction, which may result in an excessive RDR rate. Configure the generation scheme for this RDR with extra care.
The RDR tag of the RTSP_TRANSACTION_USAGE_RDR is 0xf0f0f440 / 4042323008.
The following table lists the RDR fields and their descriptions.
Table 2.4. RTSP Transaction Usage RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
PACKAGE_ID |
UINT16 |
See Universal RDR Fields. |
SERVICE_ID |
INT32 |
See Universal RDR Fields. |
PROTOCOL_ID |
INT16 |
See Universal RDR Fields. |
SKIPPED_SESSIONS |
INT32 |
Number of unreported sessions since the previous RDR. |
SERVER_IP |
UINT32 |
See Universal RDR Fields. |
SERVER_PORT |
UINT16 |
See Universal RDR Fields. |
ACCESS_STRING |
STRING |
See Universal RDR Fields. |
INFO_STRING |
STRING |
See Universal RDR Fields. |
CLIENT_IP |
UINT32 |
See Universal RDR Fields. |
CLIENT_PORT |
UINT16 |
See Universal RDR Fields. |
INITIATING_SIDE |
INT8 |
See Universal RDR Fields. |
REPORT_TIME |
INT32 |
See Universal RDR Fields. |
MILLISEC_DURATION |
UINT32 |
Duration, in milliseconds, of the transaction reported in this RDR. |
TIME_FRAME |
INT8 |
See Universal RDR Fields. |
SESSION_UPSTREAM_VOLUME |
UINT32 |
Upstream volume of the transaction, in bytes. The volume refers to the aggregated upstream volume on both links of all the flows bundled in the transaction. |
SESSION_DOWNSTREAM_VOLUME |
UINT32 |
Downstream volume of the transaction, in bytes. The volume refers to the aggregated stream volume on both links of all the flows bundled in the transaction. |
SUBSCRIBER_COUNTER_ID |
UINT16 |
Each service is mapped to a counter. There are 32 subscriber counters. |
GLOBAL_COUNTER_ID |
UINT16 |
Each service is mapped to a counter. There are 64 global counters. |
PACKAGE_COUNTER_ID |
UINT16 |
Each package is mapped to a counter. There are 1024 package counters. |
IP_PROTOCOL |
UINT8 |
IP protocol type. |
PROTOCOL_SIGNATURE |
INT32 |
See Universal RDR Fields. |
ZONE_ID |
INT32 |
See Universal RDR Fields. |
FLAVOR_ID |
INT32 |
See Universal RDR Fields. |
FLOW_CLOSE_MODE |
UINT8 |
The reason for the end of flow. |
RTSP_SESSION_ID |
STRING |
RTSP session ID as seen on an RTSP SETUP request. |
RTSP_URL |
STRING |
RTSP URL. |
RESPONSE_DATE |
STRING |
RTSP DESCRIBE date. |
TOTAL_ENCODING_RATE |
UINT32 |
Sum of encoding rates of data flows. |
NUMBER_OF_VIDEO_STREAMS |
UINT8 |
Number of video streams for this RTSP session. |
NUMBER_OF_AUDIO_STREAMS |
UINT8 |
Number of audio streams for this RTSP session. |
SESSION_TITLE |
STRING |
Title for this RTSP stream. |
SERVER_NAME |
STRING |
Name of the RTSP server. |
The VOIP_TRANSACTION_USAGE_RDR is generated at the end of a session, for all transactions on packages and services that are configured to generate such an RDR. This RDR is not generated for sessions that were blocked by a rule.
By default, packages and services are disabled from generating this RDR.
The VoIP Transaction Usage RDR is enabled automatically when the Transaction Usage RDR is enabled; both RDRs will be generated when the session ends. Currently, the VoIP Transaction Usage RDR is generated for H323, Skinny, SIP, and MGCP sessions.
This RDR is designed for services and packages where specific, per-transaction RDRs are required (for example, transaction level billing). It is easy to configure this RDR, in error, so that it is generated for every transaction, which may result in an excessive RDR rate. Configure the generation scheme for this RDR with extra care.
The RDR tag of the VOIP_TRANSACTION_USAGE_RDR is 0xf0f0f46a / 4042323050.
The following table lists the RDR fields and their descriptions.
Table 2.5. VoIP Transaction RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
PACKAGE_ID |
UINT16 |
See Universal RDR Fields. |
SERVICE_ID |
INT32 |
See Universal RDR Fields. |
PROTOCOL_ID |
INT16 |
See Universal RDR Fields. |
SKIPPED_SESSIONS |
INT32 |
Number of unreported sessions since the previous RDR |
SERVER_IP |
UINT32 |
See Universal RDR Fields. |
SERVER_PORT |
UINT16 |
See Universal RDR Fields. |
ACCESS_STRING |
STRING |
See Universal RDR Fields. |
INFO_STRING |
STRING |
See Universal RDR Fields. |
CLIENT_IP |
UINT32 |
See Universal RDR Fields. |
CLIENT_PORT |
UINT16 |
See Universal RDR Fields. |
INITIATING_SIDE |
INT8 |
See Universal RDR Fields. |
REPORT_TIME |
INT32 |
See Universal RDR Fields. |
MILLISEC_DURATION |
UINT32 |
Duration, in milliseconds, of the transaction reported in this RDR. |
TIME_FRAME |
INT8 |
See Universal RDR Fields. |
SESSION_UPSTREAM_VOLUME |
UINT32 |
Upstream volume of the transaction, in bytes. The volume refers to the aggregated upstream volume on both links of all the flows bundled in the transaction. |
SESSION_DOWNSTREAM_VOLUME |
UINT32 |
Downstream volume of the transaction, in bytes. The volume refers to the aggregated downstream volume on both links of all the flows bundled in the transaction. |
SUBSCRIBER_COUNTER_ID |
UINT16 |
Each service is mapped to a counter. There are 32 subscriber counters. |
GLOBAL_COUNTER_ID |
UINT16 |
Each service is mapped to a counter. There are 64 global counters. |
PACKAGE_COUNTER_ID |
UINT16 |
Each package is mapped to a counter. There are 1024 package counters. |
IP_PROTOCOL |
UINT8 |
IP protocol type. |
PROTOCOL_SIGNATURE |
INT32 |
See Universal RDR Fields. |
ZONE_ID |
INT32 |
See Universal RDR Fields. |
FLAVOR_ID |
INT32 |
See Universal RDR Fields. |
FLOW_CLOSE_MODE |
UINT8 |
The reason for the end of flow. |
APPLICATION_ID |
UINT32 |
The ITU-U vendor ID of the application. A value of 0xFFFFFFFF indicates that this field was not found in the traffic. |
UPSTREAM_PACKET_LOSS |
UINT16 |
The average fractional upstream packet loss for the session, taken from the RTCP flow. (Refer to the note following this table for an explanation of this value.) A value of 0xFFFF indicates that this field is undefined (no RTCP flows were opened). |
DOWNSTREAM_PACKET_LOSS |
UINT16 |
The average fractional downstream packet loss for the session, taken from the RTCP flow. (Refer to the note following this table for an explanation of this value.) A value of 0xFFFF indicates that this field is undefined (no RTCP flows were opened). |
UPSTREAM_AVERAGE_JITTER |
UINT32 |
The average upstream jitter for the session in units of 1/65 millisecond, taken from the RTCP flow. (Refer to the note following this table for an explanation of this value.) A value of 0xFFFFFFFF indicates that this field is undefined (no RTCP flows were opened). |
DOWNSTREAM_AVERAGE_JITTER |
UINT32 |
The average downstream jitter for the session in units of 1/65 millisecond, taken from the RTCP flow. (Refer to the note following this table for an explanation of this value.) A value of 0xFFFFFFFF indicates that this field is undefined (no RTCP flows were opened). |
CALL_DESTINATION |
STRING |
The Q931 Alias address of the session destination. A value of N/A indicates that this field was not found in the traffic. |
CALL_SOURCE |
STRING |
The Q931 Alias address of the session source. A value of N/A indicates that this field was not found in the traffic. |
UPSTREAM_PAYLOAD_TYPE |
UINT8 |
The upstream RTP payload type for the session. A value of 0xFF indicates that this field was not available (no RTP flows were opened). |
DOWNSTREAM_PAYLOAD_TYPE |
UINT8 |
The downstream RTP payload type for the session. A value of 0xFF indicates that this field is undefined (no RTP flows were opened). |
CALL_TYPE |
UINT8 |
The call type (taken from H225 packet). A value of 0xFF indicates that this field is undefined (no RTP flows were opened). |
MEDIA_CHANNELS |
UINT8 |
The number of data flows that were opened during the session. |
Packet Loss
This field is taken from the RTCP field “fraction lost”. It is the average value of all RTCP packets seen during the flow life for the specified direction. The value is the numerator of a fraction whose denominator is 256. To get the packet loss value as percentage, divide this value by 2.56.
Average Jitter
This field is taken from the RTCP field “interval jitter”. The reported value is the average value of all RTCP packets seen during the flow life for the specified direction. This value is multiplied by the NTP time-stamp delta (middle 32 bits) and divided by the RTCP time-stamp delta to convert it to normal time units. These two time stamps are also taken from the RTCP packet. The reported value is the average jitter in units of 1/65536 second. To convert to milliseconds divide by 65.536.
See RFC 1889 for further information about the RCP/RTCP standard.
The SUBSCRIBER_USAGE_RDR is generated periodically, at user-configured intervals, if the subscriber consumed resources associated with the service during the current reporting period.
At fixed, user-configurable intervals (for example, every 30 minutes), there is a periodic SUBSCRIBER_USAGE_RDR generation point. Whether or not a Subscriber Usage RDR for a particular subscriber is actually generated depends on the following:
If the subscriber consumed resources associated with the service since the previous RDR generation point, a Subscriber Usage RDR is generated.
If the subscriber did not consume resources associated with the service since the previous RDR generation point, no Subscriber Usage RDR is generated now.
Unlike other Usage RDRs, the generation logic for Subscriber Usage RDRs does NOT use the zeroing methodology (as described in Periodic RDR Zero Adjustment Mechanism).
A Subscriber Usage RDR may also be generated in the following situation:
The subscriber performed a logout in a subscriber-integrated installation or was un-introduced from the SCE platform. If the subscriber consumed resources associated with the service since the previous Subscriber Usage RDR, a Subscriber Usage RDR is generated now. If the subscriber did not consume resources since the previous RDR, no RDR is generated for that service.
The RDR tag of the SUBSCRIBER_USAGE_RDR is 0xf0f0f000 / 4042321920.
The following table lists the RDR fields and their descriptions.
Table 2.6. Subscriber Usage RDR
RDR Field Name |
Type |
Description |
---|---|---|
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
PACKAGE_ID |
INT16 |
See Universal RDR Fields. |
SERVICE_USAGE_COUNTER_ID |
UINT16 |
Each service is mapped to a counter. There are 32 counters in the subscriber scope. |
BREACH_STATE |
UINT8 |
See Universal RDR Fields. Holds the breach state of a service. However, this RDR reports usage counters, which cannot be breached, so the value is always zero. |
REASON |
UINT8 |
Reason for RDR generation:
|
CONFIGURED_DURATION |
INT32 |
See Universal RDR Fields. |
DURATION |
INT32 |
This release—Not implemented (always the same as CONFIGURED_DURATION). Future release—Indicates the number of seconds that have passed since the previous SUBSCRIBER_USAGE_RDR. |
END_TIME |
INT32 |
See Universal RDR Fields. |
UPSTREAM_VOLUME |
INT32 |
Aggregated upstream volume on both links of all sessions, in kilobytes, for the current reporting period. |
DOWNSTREAM_VOLUME |
INT32 |
Aggregated downstream volume on both links of all sessions, in kilobytes, for the current reporting period. |
SESSIONS |
UINT16 |
Aggregated number of sessions for the reported service, for the current reporting period. |
SECONDS |
UINT16 |
Aggregated number of session seconds for the reported service, for the current reporting period. |
The REALTIME_SUBSCRIBER_USAGE_RDR is generated periodically, at user-configured intervals, if the subscriber consumed resources associated with the service during the current reporting period.
A Real-Time Subscriber Usage RDR will be generated only for those subscribers with real-time monitoring enabled. For information about enabling real-time monitoring, see the “Additional Management Tools and Interfaces” chapter of the Cisco Service Control Application for Broadband User Guide.
At fixed, user-configurable intervals (for example, every 30 minutes), there is a periodic REALTIME_SUBSCRIBER_USAGE_RDR generation point. The REALTIME_SUBSCRIBER_USAGE_RDR reports the same usage information as the SUBSCRIBER_USAGE_RDR, but is generated more frequently to provide a more detailed picture of subscriber activity. It is used by the Cisco Service Control Application Reporter to generate reports on the activities of single subscribers over time.
Whether or not a Real-Time Subscriber Usage RDR for a particular subscriber is actually generated depends on the following:
If the subscriber consumed resources associated with the service since the previous RDR generation point, a Real-Time Subscriber Usage RDR is generated.
If the subscriber did not consume resources associated with the service since the previous RDR generation point, no Real-Time Subscriber Usage RDR is generated now.
However, the generation logic for Subscriber Usage RDRs uses the zeroing methodology (as described in Periodic RDR Zero Adjustment Mechanism); if the subscriber consumes resources associated with the service at some later time, this will cause the immediate generation of either one or two zero-consumption Real-Time Subscriber Usage RDRs. (In addition to the eventual generation of the Real-Time Subscriber Usage RDR associated with this latest consumption of resources).
If there was only one interval (for example, 0805–0810) for which there was no subscriber consumption of resources, only one zero-consumption Real-Time Subscriber Usage RDR is generated.
If there were multiple consecutive intervals (for example, 0805–0810, 0810–0815, 0815–0820, 0820–0825) for which there was no subscriber consumption of resources, two zero-consumption Real-Time Subscriber Usage RDRs are generated: one for the first such time interval (0805–0810) and one for the last (0820–0825).
Real-Time Subscriber Usage RDRs may also be generated in the following situation:
The subscriber performed a logout in a subscriber-integrated installation or was un-introduced from the SCE platform:
If the subscriber consumed resources associated with the service since the previous Real-Time Subscriber Usage RDR, a Real-Time Subscriber Usage RDR is generated and then a zero-consumption Real-Time Subscriber Usage RDR is generated.
If the subscriber did not consume resources since the previous RDR, no RDR is generated for that service.
A zero-consumption Real-Time Subscriber Usage RDR will also be generated for a subscriber in the following situation:
The subscriber performed a login in a subscriber-integrated installation or was introduced from the SCE platform:
Before the first time Real-Time Subscriber Usage RDR is generated for this service for this subscriber, a zero-consumption Real-Time Subscriber Usage RDR is generated.
The RDR tag of the REALTIME_SUBSCRIBER_USAGE_RDR is 0xf0f0f002 / 4042321922.
The following table lists the RDR fields and their descriptions.
Table 2.7. Real-Time Subscriber Usage RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
PACKAGE_ID |
INT16 |
See Universal RDR Fields. |
SERVICE_USAGE_COUNTER_ID |
UINT16 |
Each service is mapped to a counter. There are 32 counters in the subscriber scope. |
AGGREGATION_OBJECT_ID |
INT16 |
Externally assigned:
|
BREACH_STATE |
UINT8 |
See Universal RDR Fields. Holds the breach state of a service. However, this RDR reports usage counters, which cannot be breached, so the value is always zero. |
REASON |
UINT8 |
Reason for RDR generation:
|
CONFIGURED_DURATION |
INT32 |
See Universal RDR Fields. |
DURATION |
INT32 |
This release—Not implemented (always the same as CONFIGURED_DURATION). Future release—Indicates the number of seconds that have passed since the previous SUBSCRIBER_USAGE_RDR. |
END_TIME |
INT32 |
See Universal RDR Fields. |
UPSTREAM_VOLUME |
INT32 |
Aggregated upstream volume on both links of all sessions, in kilobytes, for the current reporting period. |
DOWNSTREAM_VOLUME |
INT32 |
Aggregated downstream volume on both links of all sessions, in kilobytes, for the current reporting period. |
SESSIONS |
UINT16 |
Aggregated number of sessions for the reported service, for the current reporting period. |
SECONDS |
UINT16 |
Aggregated number of session seconds for the reported service, for the current reporting period. |
The LINK_USAGE_RDR is generated periodically, at user-configured intervals, if the subscriber consumed resources associated with the service during the current reporting period.
At fixed, user-configurable intervals (for example, every 30 minutes), there is a periodic LINK_USAGE_RDR generation point. Whether or not a Link Usage RDR is actually generated depends on the following:
If network resources associated with the service were consumed since the previous RDR generation point, a Link Usage RDR is generated.
If network resources associated with the service were not consumed since the previous RDR generation point, no Link Usage RDR is generated.
However, the generation logic for Link Usage RDRs uses the zeroing methodology (as described in Periodic RDR Zero Adjustment Mechanism); if network resources associated with the service are again consumed at some later time, this will cause the immediate generation of either one or two zero-consumption Link Usage RDRs. (In addition to the eventual generation of the Link Usage RDR associated with this latest consumption of network resources).
If there was only one interval (for example, 0830–0900) for which there was no consumption of network resources, only one zero-consumption Link Usage RDR is generated.
If there were multiple consecutive intervals (for example, 0830–0900, 0900–0930, 0930–1000, 1000–1030) for which there was no consumption of network resources, two zero-consumption Link Usage RDR are generated: one for the first such time interval (0830–0900) and one for the last (1000–1030).
A separate RDR is generated for each link (on a single traffic processor) in the SCE platform, where each RDR represents the total traffic processed and analyzed by that processor. To compute the total traffic in any given time frame, take the sum of the RDRs of all the processors. (A traffic processor that did not process any traffic of a specific service will not generate the corresponding RDR.)
The RDR tag of the LINK_USAGE_RDR is 0xf0f0f005 / 4042321925.
The following table lists the RDR fields and their descriptions.
Table 2.8. Link Usage RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
LINK_ID |
INT8 |
A numeric value associated with the reported network link. Possible values are 0 and 1 (referring to physical links 1 and 2 respectively). For future use. |
GENERATOR_ID |
INT8 |
A numeric value identifying the processor generating the RDR. Possible values are 0 to 3. |
SERVICE_USAGE_COUNTER_ID |
UINT16 |
Each service is mapped to a counter. There are 64 global counters. |
CONFIGURED_DURATION |
INT32 |
See Universal RDR Fields. |
DURATION |
INT32 |
This release—Not implemented (always the same as CONFIGURED_DURATION). Future release—Indicates the number of seconds that have passed since the previous SUBSCRIBER_USAGE_RDR. |
END_TIME |
INT32 |
See Universal RDR Fields. |
UPSTREAM_VOLUME |
INT32 |
Aggregated upstream volume of all sessions, in kilobytes, for the current reporting period. |
DOWNSTREAM_VOLUME |
INT32 |
Aggregated downstream volume of all sessions, in kilobytes, for the current reporting period. |
SESSIONS |
INT32 |
Aggregated number of sessions for the reported service, for the current reporting period. |
SECONDS |
INT32 |
Aggregated number of session seconds for the reported service, for the current reporting period. |
CONCURRENT_SESSIONS |
INT32 |
Concurrent number of sessions using the reported service at this point in time. |
ACTIVE_SUBSCRIBERS |
INT32 |
Concurrent number of subscribers using the reported service at this point in time. |
TOTAL_ACTIVE_SUBSCRIBERS |
INT32 |
Concurrent number of subscribers in the system at this point in time. |
The PACKAGE_USAGE_RDR aggregates network usage information for all subscribers to the same package.
At fixed, user-configurable intervals (for example, every 5 minutes), there is a periodic PACKAGE_USAGE_RDR generation point. Whether or not a Package Usage RDR is actually generated depends on the following:
If network resources associated with the service were consumed by a subscriber of the Package since the previous RDR generation point, a Package Usage RDR is generated.
If a subscriber of the Package has not consumed network resources associated with the service since the previous RDR generation point, no Package Usage RDR is generated.
However, the generation logic for Package Usage RDRs uses the zeroing methodology (as described in Periodic RDR Zero Adjustment Mechanism); if network resources associated with the service are again consumed by a subscriber of the Package at some later time, this will cause the immediate generation of either one or two zero-consumption Package Usage RDRs. (In addition to the eventual generation of the Package Usage RDR associated with this latest consumption of network resources by a subscriber of the Package).
If there was only one interval (for example, 0805–0810) for which there was no consumption of network resources by a subscriber of the Package, only one zero-consumption Package Usage RDR is generated.
If there were multiple consecutive intervals (for example, 0805–0810, 0810–0815, 0815–0820, 0820–0825) for which there was no consumption of network resources by a subscriber of the Package, two zero-consumption Package Usage RDR are generated: one for the first such time interval (0805–0810) and one for the last (0820–0825).
Each traffic processor in the SCE platform generates a separate RDR, where each RDR represents the total traffic processed and analyzed by that processor. To compute the total traffic (for a package) in any given time frame, take the sum of the RDRs of all the processors. (A traffic processor that did not process any traffic of a specific service for a specific package will not generate the corresponding RDR.)
The RDR tag of the PACKAGE_USAGE_RDR is 0xf0f0f004 / 4042321924.
The following table lists the RDR fields and their descriptions.
Table 2.9. Package Usage RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
PACKAGE_COUNTER_ID |
UINT16 |
Each package is mapped to a counter. There are 1024 package counters. |
GENERATOR_ID |
INT8 |
A numeric value identifying the processor generating the RDR. |
SERVICE_USAGE_COUNTER_ID |
UINT16 |
Each service is mapped to a counter. There are 64 global counters. |
CONFIGURED_DURATION |
INT32 |
See Universal RDR Fields. |
DURATION |
INT32 |
This release—Not implemented (always the same as CONFIGURED_DURATION). Future release—Indicates the number of seconds that have passed since the previous SUBSCRIBER_USAGE_RDR. |
END_TIME |
INT32 |
See Universal RDR Fields. |
UPSTREAM_VOLUME |
INT32 |
Aggregated upstream volume on both links (for a single processor) of all sessions, in kilobytes, for the current reporting period. |
DOWNSTREAM_VOLUME |
INT32 |
Aggregated downstream volume on both links (for a single processor) of all sessions, in kilobytes, for the current reporting period. |
SESSIONS |
INT32 |
Aggregated number of sessions for the reported service, for the current reporting period. |
SECONDS |
INT32 |
Aggregated number of session seconds for the reported service, for the current reporting period. |
CONCURRENT_SESSIONS |
INT32 |
Concurrent number of sessions using the reported service in the reported package at this point in time. |
ACTIVE_SUBSCRIBERS |
INT32 |
Concurrent number of subscribers using the reported service in the reported package at this point in time. |
TOTAL_ACTIVE_SUBSCRIBERS |
INT32 |
Concurrent number of subscribers in the system at this point in time. |
The SERVICE_BLOCK_RDR is generated each time a transaction is blocked, and the profile and the rate/quota limitations indicate that this RDR should be generated.
Note the following regarding RDR generation:
This RDR is generated when a session is blocked. A session may be blocked for various reasons; for example, access is blocked or concurrent session limit is reached.
Generation of this RDR is subject to two limitations:
Quota—The maximum number of Blocking RDRs that SCA BB can generate for a subscriber in a specific aggregation period (day, week, month, and so forth). The quota is package-dependent; its value is set according to the package assigned to the subscriber.
Rate—The global, maximum number of Blocking RDRs that an SCE platform can generate per second. The rate is a global value that sets an upper limit for the total number of RDRs that are generated for all subscribers.
The RDR tag of the SERVICE_BLOCK_RDR is 0xf0f0f040 / 4042321984.
The following table lists the RDR fields and their descriptions.
Table 2.10. Blocking RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
PACKAGE_ID |
UINT16 |
See Universal RDR Fields. |
SERVICE_ID |
INT32 |
See Universal RDR Fields. |
PROTOCOL_ID |
INT16 |
See Universal RDR Fields. |
CLIENT_IP |
UINT32 |
See Universal RDR Fields. |
CLIENT_PORT |
UINT16 |
See Universal RDR Fields. |
SERVER_IP |
UINT32 |
See Universal RDR Fields. |
SERVER_PORT |
UINT16 |
See Universal RDR Fields. |
INITIATING_SIDE |
INT8 |
See Universal RDR Fields. |
ACCESS_STRING |
STRING |
See Universal RDR Fields. |
INFO_STRING |
STRING |
See Universal RDR Fields. |
BLOCK_REASON |
UINT8 |
Indicates the reason why this session was blocked. See Block Reason (uint8) for possible values and their interpretation. |
BLOCK_RDR_COUNT |
INT32 |
Total number of blocked flows reported so far (from the beginning of the current time frame). |
REDIRECTED |
INT8 |
Indicates whether the flow has been redirected after being blocked.
Redirection is performed only for HTTP and RTSP flows that were mapped to a rule ordering them to be blocked and redirected. |
REPORT_TIME |
INT32 |
See Universal RDR Fields. |
The QUOTA_BREACH_RDR is generated each time a bucket is breached for the first time in a session.
This RDR does not have a rate limit; it is generated whenever a quota breach occurs, provided that the RDR is enabled.
This RDR is generated subject to the following conditions:
One of the Subscriber’s buckets was depleted.
Quota Breach RDRs are enabled.
This is the first time this subscriber has breached this bucket.
The RDR tag of the QUOTA_BREACH_RDR is 0xf0f0f022 / 4042321954.
The following table lists the RDR fields and their descriptions.
Table 2.11. Quota Breach RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
PACKAGE_ID |
UINT16 |
See Universal RDR Fields. |
BUCKET_ID |
UINT8 |
1 to 16, according to the number of the breached bucket. |
END_TIME |
INT32 |
See Universal RDR Fields. |
BUCKET_QUOTA |
INT32 |
The remaining quota in the indicated bucket:
|
AGGREGATION_PERIOD_TYPE |
UINT8 |
Defines how often the bucket is refilled. See Aggregation period (uint8) for possible values and their interpretations. |
The REMAINING_QUOTA_RDR is generated periodically, at user-configured intervals, if the RDR is enabled.
A Remaining Quota RDR will be generated only for those subscribers whose policy requires the generation of such an RDR
At fixed, user-configurable intervals (for example, every 30 minutes), there is a periodic REMAINING_QUOTA_RDR generation point. If REMAINING_QUOTA_RDRs are enabled, they will be generated at the specified times.
The user can set total limit enforcement on the number of these RDRs that are generated per second.
This RDR is also generated after a subscriber performs a logout in a subscriber-integrated installation or is un-introduced from the SCE platform, or when the subscriber’s package-ID is changed.
The RDR tag of the REMAINING_QUOTA_RDR is 0xf0f0f030 / 4042321968.
The following table lists the RDR fields and descriptions.
Table 2.12. Remaining Quota RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
PACKAGE_ID |
UINT16 |
See Universal RDR Fields. |
RDR_REASON |
UINT8 |
|
END_TIME |
INT32 |
See Universal RDR Fields. |
REMAINING_QUOTA_1 through REMAINING_QUOTA_16 |
INT32 |
The remaining quota in the bucket that was breached, in kilobytes. There are sixteen Remaining Quota fields, one for each bucket. |
TOTAL_VOLUME_USAGE |
UINT32 |
Total Volume Usage for all services that are not quota provisioned, in kilobytes, for the current reporting period. |
The QUOTA_THRESHOLD_BREACH_RDR is generated each time a bucket exceeds the global threshold.
This RDR does not have a rate limit; it is generated whenever a threshold is exceeded, provided that the RDR is enabled.
The RDR tag of the QUOTA_THRESHOLD_BREACH_RDR is 0xf0f0f031 / 4042321969.
The following table lists the RDR fields and their descriptions.
Table 2.13. Quota Threshold Breach RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
PACKAGE_ID |
UINT16 |
See Universal RDR Fields. |
BUCKET_ID |
UINT8 |
1 to 16, according to the number of the breached bucket. |
GLOBAL_THRESHOLD |
UINT32 |
The globally configured threshold in kilobytes. |
END_TIME |
INT32 |
See Universal RDR Fields. |
BUCKET_QUOTA |
INT32 |
The remaining quota in the indicated bucket in kilobytes. |
The QUOTA_STATE_RESTORE_RDR is generated each time a subscriber is introduced.
The RDR tag of the QUOTA_STATE_RESTORE_RDR is 0xF0F0F032 / 4042321970.
The following table lists the RDR fields and their descriptions.
Table 2.14. Quota Threshold Breach RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
PACKAGE_ID |
UINT16 |
See Universal RDR Fields. |
RDR_REASON |
UINT8 |
The reason the RDR was sent:
|
END_TIME |
INT32 |
See Universal RDR Fields. |
The DHCP_RDR is generated each time a DHCP message of a specified type is intercepted.
DHCP RDRs are generated only if activated by a subscriber integration system, such as the SCMS Subscriber Manager (SM) DHCP LEG.
For each message read, the Service Control Application for Broadband (SCA BB) extracts several option fields. You can configure which fields to extract. An RDR will be generated even if none of the fields were found.
The RDR tag of the DHCP_RDR is 0xf0f0f042 / 4042321986
The following table lists the RDR fields and descriptions.
Table 2.15. DHCP RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
CPE_MAC |
STRING |
A DHCP protocol field. |
CMTS_IP |
UINT32 |
A DHCP protocol field. |
ASSIGNED_IP |
UINT32 |
A DHCP protocol field. |
RELEASED_IP |
UINT32 |
A DHCP protocol field. |
TRANSACTION_ID |
UINT32 |
A DHCP protocol field. |
MESSAGE_TYPE |
UINT8 |
DHCP message type. |
OPTION_TYPE_0 through OPTION_TYPE_7 |
UINT8 |
A list of DHCP options extracted from the message. |
OPTION_VALUE_0 through OPTION_VALUE_7 |
STRING |
The values associated with the above DHCP options. |
END_TIME |
INT32 |
See Universal RDR Fields. |
The RADIUS_RDR is generated each time a RADIUS message of a specified type is intercepted.
RADIUS RDRs are generated only if activated by a subscriber integration system, such as the SCMS-SM RADIUS LEG.
For each message read, SCA BB extracts several option fields. You can configure which fields to extract. An RDR will be generated even if none of the fields were found.
The RDR tag of the RADIUS_RDR is 0xf0f0f043 / 4042321987
The following table lists the RDR fields and descriptions.
Table 2.16. RADIUS RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
SERVER_IP |
UINT32 |
See Universal RDR Fields. |
SERVER_PORT |
UINT16 |
See Universal RDR Fields. |
CLIENT_IP |
UINT32 |
See Universal RDR Fields. |
CLIENT_PORT |
UINT16 |
See Universal RDR Fields. |
INITIATING_SIDE |
INT8 |
See Universal RDR Fields. |
RADIUS_PACKET_CODE |
UINT8 |
The type of the RADIUS message intercepted. |
RADIUS_ID |
UINT8 |
The RADIUS transaction ID. |
ATTRIBUTE_VALUE_1 through ATTRIBUTE_VALUE_20 |
STRING |
Attributes extracted from the message. Sent as string format TLV. The last attribute field filled takes the value 0. |
The FLOW_START_RDR is generated when a flow starts, for any flow on packages and services that are configured to generate such an RDR.
This RDR is designed for services and packages where specific, per-transaction RDRs are required (for example, transaction level billing). It is easy to configure this RDR, in error, so that it is generated for every transaction, which may result in an excessive RDR rate. Configure the generation scheme for this RDR with extra care.
The RDR tag of the FLOW_START_RDR is 0xf0f0f016 / 4042321942.
The following table lists the RDR fields and their descriptions.
Table 2.17. Flow Start RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
PACKAGE_ID |
UINT16 |
See Universal RDR Fields. |
SERVICE_ID |
INT32 |
See Universal RDR Fields. |
IP_PROTOCOL |
UINT8 |
IP protocol type. |
SERVER_IP |
UINT32 |
See Universal RDR Fields. |
SERVER_PORT |
UINT16 |
See Universal RDR Fields. |
CLIENT_IP |
UINT32 |
See Universal RDR Fields. |
CLIENT_PORT |
UINT16 |
See Universal RDR Fields. |
INITIATING_SIDE |
INT8 |
See Universal RDR Fields. |
START_TIME |
UINT32 |
Flow start time. |
REPORT_TIME |
INT32 |
See Universal RDR Fields. |
BREACH_STATE |
INT8 |
See Universal RDR Fields. |
FLOW ID |
UINT32 |
Internal flow ID. |
GENERATOR_ID |
INT8 |
A numeric value identifying the processor generating the RDR. |
The FLOW_END_RDR is generated when a flow stops, for any flow that generated a FLOW_START_RDR.
This RDR is designed for services and packages where specific, per-transaction RDRs are required (for example, transaction level billing). It is easy to configure this RDR, in error, so that it is generated for every transaction, which may result in an excessive RDR rate. Configure the generation scheme for this RDR with extra care.
The RDR tag of the FLOW_END_RDR is 0xf0f0f018 / 4042321944.
The following table lists the RDR fields and their descriptions.
Table 2.18. Flow End RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
PACKAGE_ID |
UINT16 |
See Universal RDR Fields. |
SERVICE_ID |
INT32 |
See Universal RDR Fields. |
IP_PROTOCOL |
UINT8 |
IP protocol type. |
SERVER_IP |
UINT32 |
See Universal RDR Fields. |
SERVER_PORT |
UINT16 |
See Universal RDR Fields. |
CLIENT_IP |
UINT32 |
See Universal RDR Fields. |
CLIENT_PORT |
UINT16 |
See Universal RDR Fields. |
INITIATING_SIDE |
INT8 |
See Universal RDR Fields. |
START_TIME |
UINT32 |
Flow start time. |
REPORT_TIME |
INT32 |
See Universal RDR Fields. |
BREACH_STATE |
INT8 |
See Universal RDR Fields. |
FLOW ID |
UINT32 |
Internal flow ID. |
GENERATOR_ID |
INT8 |
A numeric value identifying the processor generating the RDR. |
The FLOW_ONGOING_RDR is generated at set time intervals during the life of a flow, for any flow that generated a FLOW_START_RDR, if the system is configured to issue such RDR.
This RDR is designed for services and packages where specific, per-transaction RDRs are required (for example, transaction level billing). It is easy to configure this RDR, in error, so that it is generated for every transaction, which may result in an excessive RDR rate. Configure the generation scheme for this RDR with extra care.
The RDR tag of the FLOW_ONGOING_RDR is 0xf0f0f017 / 4042321943.
The following table lists the RDR fields and their descriptions.
Table 2.19. Ongoing Flow RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
PACKAGE_ID |
UINT16 |
See Universal RDR Fields. |
SERVICE_ID |
INT32 |
See Universal RDR Fields. |
IP_PROTOCOL |
UINT8 |
IP protocol type. |
SERVER_IP |
UINT32 |
See Universal RDR Fields. |
SERVER_PORT |
UINT16 |
See Universal RDR Fields. |
CLIENT_IP |
UINT32 |
See Universal RDR Fields. |
CLIENT_PORT |
UINT16 |
See Universal RDR Fields. |
INITIATING_SIDE |
INT8 |
See Universal RDR Fields. |
START_TIME |
UINT32 |
Flow start time. |
REPORT_TIME |
INT32 |
See Universal RDR Fields. |
BREACH_STATE |
INT8 |
See Universal RDR Fields. |
FLOW ID |
UINT32 |
Internal flow ID. |
GENERATOR_ID |
INT8 |
A numeric value identifying the processor generating the RDR. |
The MEDIA_FLOW_RDR is generated at the end of every SIP or Skype media flow:
For SIP, this RDR is generated when a media channel is closed.
For Skype, this RDR is generated when an end-of-call is detected.
SIP includes all SIP based applications (such as Vonage and Yahoo Messenger VoIP).
The RDR tag of the MEDIA_FLOW_RDR is 0xF0F0F46C / 4042323052.
The following table lists the RDR fields and their descriptions.
Table 2.20. Media Flow RDR Fields
Field name |
Type |
Description |
---|---|---|
SUBSCRIBER_ID |
String |
See Universal RDR Fields. |
PACKAGE_ID |
INT16 |
See Universal RDR Fields. |
SERVICE_ID |
INT32 |
See Universal RDR Fields. |
PROTOCOL_ID |
INT16 |
See Universal RDR Fields. |
DESTINATION_IP |
UINT32 |
SIP: Destination IP of RTP flow. Skype: Destination IP of Skype flow. |
DESTINATION_PORT |
UINT16 |
SIP: Destination port of RTP flow. Skype: Destination port of Skype flow. |
SOURCE_IP |
UINT32 |
SIP: Source IP of RTP flow. Skype: Source IP of Skype flow. |
SOURCE_PORT |
UINT16 |
SIP: Source port of RTP flow. Skype: Source port of Skype flow. |
INITIATING_SIDE |
INT8 |
See Universal RDR Fields. For Skype, this is the initiating side of the flow (not necessarily the initiating side of the voice call). |
ZONE_ID |
Int32 |
See Universal RDR Fields. |
FLAVOR_ID |
Int32 |
See Universal RDR Fields. |
SIP_DOMAIN |
String |
SIP: Domain name extracted from SIP header. |
SIP_USER_AGENT |
String |
SIP: User-Agent field extracted from SIP header. |
START_TIME |
UINT32 |
Flow start time. |
REPORT_TIME |
UINT32 |
See Universal RDR Fields. |
DURATION_SECONDS |
INT32 |
SIP: The active duration of the RTP flow, not including aging time. Skype: The time between the start-of-call and end-of-call detection events. |
UPSTREAM_VOLUME |
UINT32 |
SIP: The upstream volume of the RTP flow. Skype: The upstream volume between the start-of-call and end-of-call detection events. |
DOWNSTREAM_VOLUME |
UINT32 |
SIP: The downstream volume of the RTP flow. Skype: The downstream volume between the start-of-call and end-of-call detection events. |
IP_PROTOCOL |
UINT8 |
IP protocol type:
|
FLOW_TYPE |
INT8 |
|
SESSION_ID |
UINT32 |
SIP: The flow-context ID of the control flow. Skype: The flow-context ID of the flow. |
UPSTREAM_JITTER |
UINT32 |
SIP: The average upstream jitter for the session, taken from the RTCP flow: N/A (0xFFFFFFFF) if RTCP flow is missing. Skype: N/A (0xFFFFFFFF). |
DOWNSTREAM_JITTER |
UINT32 |
SIP: The average downstream jitter for the session, taken from the RTCP flow: N/A (0xFFFFFFFF) if RTCP flow is missing. Skype: N/A (0xFFFFFFFF). |
UPSTREAM_PACKET_LOSS |
UINT16 |
SIP: The average fractional upstream packet loss for the session, taken from the RTCP flow: N/A (0xFFFF) if RTCP flow is missing. Skype: N/A (0xFFFF). |
DOWNSTREAM_PACKET_LOSS |
UINT16 |
SIP: The average fractional downstream packet loss for the session, taken from the RTCP flow: N/A (0xFFFF) if RTCP flow is missing. Skype: N/A (0xFFFF). |
UPSTREAM_PAYLOAD_TYPE |
UINT8 |
SIP: The upstream RTP payload type for the session. Skype: N/A (0xFF). |
DOWNSTREAM_PAYLOAD_TYPE |
UINT8 |
SIP: The downstream RTP payload type for the session. Skype: N/A (0xFF). |
Packet Loss
This field is taken from the RTCP field “fraction lost”. It is the average value of all RTCP packets seen during the flow life for the specified direction. The value is the numerator of a fraction whose denominator is 256. To get the packet loss value as percentage, divide this value by 2.56.
Average Jitter
This field is taken from the RTCP field “interval jitter”. The reported value is the average value of all RTCP packets seen during the flow life for the specified direction. This value is multiplied by the NTP time-stamp delta (middle 32 bits) and divided by the RTCP time-stamp delta to convert it to normal time units. These two time stamps are also taken from the RTCP packet. The reported value is the average jitter in units of 1/65536 second. To convert to milliseconds divide by 65.536.
See RFC 1889 for further information about the RCP/RTCP standard.
The ATTACK_START_RDR is generated at the beginning of an attack for all attack types that are configured to generate such an RDR. (To enable and configure the generation of these RDRs, see “The Service Security Dashboard” in the “Using the Service Configuration Editor: Additional Options” chapter of the Cisco Service Control Application for Broadband User Guide.)
The RDR tag of the ATTACK_START_RDR is 0xf0f0f019 / 4042321945.
The following table lists the RDR fields and their descriptions.
Table 2.21. Attack Start RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
ATTACK_ID |
UINT32 |
Unique attack ID. |
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
ATTACKING_IP |
UINT32 |
The IP address related to the attack (for example: in a DDoS, this will be the IP address under attack; in a scan this will be the IP address of the source of the scan). |
ATTACKED_IP |
UINT32 |
The other IP address related to the attack, if one exists; otherwise, 0xFFFFFFFF. |
ATTACKED_PORT |
UINT16 |
Attacked port: 0xFFFF if not present. |
ATTACKING_SIDE |
INT8 |
On which side of the SCE ATTACKING_IP resides:
|
IP_PROTOCOL |
UINT8 |
IP protocol type. |
ATTACK_TYPE |
UINT32 |
To whom ATTACKING_IP belongs:
|
GENERATOR_ID |
INT8 |
A numeric value identifying the processor generating the RDR. |
ATTACK_TIME |
UINT32 |
Time since attack started in seconds. |
REPORT_TIME |
INT32 |
See Universal RDR Fields. |
The ATTACK_END_RDR is generated at the end of an attack for any attack that caused the generation of an ATTACK_START_RDR.
The RDR tag of the ATTACK_END_RDR is 0xf0f0f01a / 4042321946.
The following table lists the RDR fields and their descriptions.
Table 2.22. Attack End RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
ATTACK_ID |
UINT32 |
Unique attack ID. |
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
ATTACKING_IP |
UINT32 |
The IP address related to the attack (for example: in a DDoS, this will be the IP address under attack; in a scan this will be the IP address of the source of the scan). |
ATTACKED_IP |
UINT32 |
The other IP address related to the attack, if one exists; otherwise, 0xFFFFFFFF. |
ATTACKED_PORT |
UINT16 |
Attacked port: 0xFFFF if not present. |
ATTACKING_SIDE |
INT8 |
On which side of the SCE ATTACKING_IP resides:
|
IP_PROTOCOL |
UINT8 |
IP protocol type. |
ATTACK_TYPE |
UINT32 |
To whom ATTACKING_IP belongs:
|
GENERATOR_ID |
INT8 |
A numeric value identifying the processor generating the RDR. |
ATTACK_TIME |
UINT32 |
Time since attack started in seconds. |
REPORT_TIME |
INT32 |
See Universal RDR Fields. |
The MALICIOUS_TRAFFIC_PERIODIC_RDR is generated when an attack is detected. A MALICIOUS_TRAFFIC_PERIODIC_RDR is then generated periodically, at user-configured intervals, for the duration of the attack. The MALICIOUS_TRAFFIC_PERIODIC_RDR reports the details of the attack or malicious traffic.
After the attack ends, a report of the resources consumed since the start of the attack is sent.
The RDR tag of the MALICIOUS_TRAFFIC_PERIODIC_RDR is 0xf0f0f050 / 4042322000.
The following table lists the RDR fields and their descriptions.
Table 2.23. Malicious Traffic Periodic RDR Fields
RDR Field Name |
Type |
Description |
---|---|---|
ATTACK_ID |
INT32 |
Unique attack ID. |
SUBSCRIBER_ID |
STRING |
See Universal RDR Fields. |
ATTACK_IP |
UINT32 |
The IP address related to this attack. |
OTHER_IP |
UINT32 |
The other IP address related to this attack, if such exists (if this is a DOS attack), or -1 otherwise. |
PORT_NUMBER |
UINT16 |
The port number related to this attack, if such exists (if this is an IP scan, for example), or -1 otherwise. |
ATTACK_TYPE |
INT32 |
Who ATTACK_IP belongs to:
|
SIDE |
INT8 |
The IP address side:
|
IP_PROTOCOL |
UINT8 |
IP protocol type:
|
CONFIGURED_DURATION |
INT32 |
See Universal RDR Fields. |
DURATION |
INT32 |
Indicates the number of seconds that have passed since the previous MALICIOUS_TRAFFIC_RDR. |
END_TIME |
INT32 |
See Universal RDR Fields. |
ATTACKS |
INT8 |
The number of attacks in the current reporting period. Since this report is generated per attack, the value is 0 or 1. |
MALICIOUS_SESSIONS |
INT32 |
Aggregated number of sessions for the reported attack, for the current reporting period. If the SCE platform blocks the attack, this field takes the value -1. |
You can identify the type of attack (scan, DDOS, or DOS) from Malicious Traffic Periodic RDR data:
Scan—OTHER_IP=-1 and ATTACK_TYPE=1 (the RDR contains the source (attacker) IP address)
DDOS attack—OTHER_IP=-1 and ATTACK_TYPE=0 (the RDR contains the destination (attacked) IP address)
DOS attack—OTHER_IP contains an IP address (the RDR contains two IP addresses)
The following sections list possible values for the RDR enumeration fields.
The BLOCK_REASON field is a bit field. The following table lists the meanings of the bits of this field.
Table 2.24. Block Reason Field Bit Values
Bits Number |
Value and Description |
---|---|
7 (msb) |
Always ON. |
6 |
0—The action of the effective rule is block. 1—The concurrent session limit of the effective rule was reached. |
5 |
0—The effective rule was in pre-breach state. 1—The effective rule was in post-breach state. |
4 to 0 (lsb) |
The number of the breached bucket (1 to 16). |
The following table lists the ACCESS_STRING and INFO_STRING field values.
Table 2.25. String Field Values
Name |
TR ACCESS_STRING |
TR INFO_STRING |
Description |
---|---|---|---|
PROTOCOL_TCP_GENERIC |
Null |
Null |
|
PROTOCOL_UDP_GENERIC |
Null |
Null |
|
PROTOCOL_HTTP_BROWSING |
Host name |
URL |
|
PROTOCOL_HTTP_STREAMING |
Host name |
URL |
|
PROTOCOL_FTP |
Null |
Null |
|
PROTOCOL_RTSP |
Host name |
Null |
|
PROTOCOL_MMS |
Null |
Null |
|
PROTOCOL_PROXY_HTTP |
Host name |
Null |
|
PROTOCOL_SMTP |
Server IP |
Sender |
|
PROTOCOL_POP3 |
Server name |
Login name |
|
PROTOCOL_IP_GENERIC |
Null |
Null |
Non–TCP/UDP transaction |
PROTOCOL_GNUTELLA_NETWORKING |
Null |
Null |
Peer to peer |
PROTOCOL_GNUTELLA_FILE_TRANSFER |
Null |
Null |
Peer to peer |
PROTOCOL_FASTTRACK_NETWORKING |
Null |
Null |
Peer to peer |
PROTOCOL_FASTTRACK_TRANSFER |
Network name |
Null |
Peer to peer |
PROTOCOL_NNTP |
Null |
Group name |
|
PROTOCOL_NAP_WINMX_TRANSFER |
Null |
Null |
Peer to peer |
PROTOCOL_WINNY |
Null |
Null |
Peer to peer |
PROTOCOL_EDONKEY |
Null |
Null |
Peer to peer |
PROTOCOL_DIRECT_CONNECT |
Null |
Null |
Peer to peer |
PROTOCOL_HOTLINE |
Null |
Null |
Peer to peer |
PROTOCOL_DYNAMIC_SIGNATURE |
Null |
Null |
|
PROTOCOL_MANOLITO |
Null |
Null |
Peer to peer |
PROTOCOL_SIP |
SIP Method |
SIP Domain |
|
PROTOCOL_BITTORRENT |
Null |
Null |
Peer to peer |
PROTOCOL_SKYPE |
Null |
Null |
Peer to peer |
PROTOCOL_VONAGE |
SIP Method |
SIP Subscriber ID |
|
PROTOCOL_SHARE |
Null |
Null |
Peer to peer |
PROTOCOL_H323 |
Null |
Is FastStart |
|
PROTOCOL_SOULSEEK |
Null |
Null |
Peer to peer |
PROTOCOL_ITUNES |
Null |
Null |
Peer to peer |
PROTOCOL_FILETOPIA |
Null |
Null |
Peer to peer |
PROTOCOL_NAPSTER |
Null |
Null |
Peer to peer |
PROTOCOL_DHCP |
Null |
Null |
|
PROTOCOL_MUTE |
Null |
Null |
Peer to peer |
PROTOCOL_NODEZILLA |
Null |
Null |
Peer to peer |
PROTOCOL_WASTE |
Null |
Null |
Peer to peer |
PROTOCOL_NEONET |
Null |
Null |
Peer to peer |
PROTOCOL_MGCP |
Null |
Null |
|
PROTOCOL_WAREZ |
Null |
Null |
Peer to peer |
The following table lists the AGG_PERIOD field values.
Table 2.26. AGG_PERIOD Field Values
Name |
Value |
Description |
---|---|---|
AGGREGATE_HOURLY |
0 |
Hourly aggregate—Every hour, on the hour. |
AGGREGATE_DAILY |
1 |
Daily aggregate—Every day at midnight. |
AGGREGATE_WEEKLY |
2 |
Deprecated in 3.0. |
AGGREGATE_MONTHLY |
3 |
Deprecated in 3.0. |
EXTERNAL_QUOTA_PROVISION |
4 |
The quota is externally provisioned and managed by a third-party source. |
The following is a summary of RDR tag assignments.
You can configure the RDR categories using the SCE CLI. See the Cisco Service Control Engine (SCE) CLI Command Reference for more information.
Table 2.28. RDR Tag Assignments
RDR Name |
Default Category (explained below) |
Tag Value (decimal) |
Tag Value (hexa) |
---|---|---|---|
SUBSCRIBER USAGE RDR (NUR) |
CM-DB (1) |
4,042,321,920 |
F0 F0 F0 00 |
REALTIME SUBSCRIBER USAGE RDR (SUR) |
CM-DB (1) |
4,042,321,922 |
F0 F0 F0 02 |
PACKAGE USAGE RDR |
CM-DB (1) |
4,042,321,924 |
F0 F0 F0 04 |
LINK USAGE RDR |
CM-DB (1) |
4,042,321,925 |
F0 F0 F0 05 |
TRANSACTION RDR |
CM-DB (1) |
4,042,321,936 |
F0 F0 F0 10 |
TRANSACTION USAGE RDR |
CM-CSV (1) |
4,042,323,000 |
F0 F0 F4 38 |
HTTP TRANSACTION USAGE RDR |
CM-CSV (1) |
4,042,323,004 |
F0 F0 F4 3C |
RTSP TRANSACTION USAGE RDR |
CM-CSV (1) |
4,042,323,008 |
F0 F0 F4 40 |
VOIP TRANSACTION USAGE RDR |
CM-CSV (1) |
4,042,323,050 |
F0 F0 F4 6A |
BLOCKING RDR |
CM-CSV (1) |
4,042,321,984 |
F0 F0 F0 40 |
QUOTA BREACH RDR |
QP (4) |
4,042,321,954 |
F0 F0 F0 22 |
REMAINING QUOTA RDR |
QP (4) |
4,042,321,968 |
F0 F0 F0 30 |
QUOTA THRESHOLD RDR |
QP (4) |
4,042,321,969 |
F0 F0 F0 31 |
QUOTA STATE RESTORE RDR |
QP (4) |
4,042,321,970 |
F0 F0 F0 32 |
RADIUS RDR |
SM (3) |
4,042,321,987 |
F0 F0 F0 43 |
DHCP RDR |
SM (3) |
4,042,321,986 |
F0 F0 F0 42 |
FLOW START RDR |
RT (2) |
4,042,321,942 |
F0 F0 F0 16 |
FLOW END RDR |
RT (2) |
4,042,321,944 |
F0 F0 F0 18 |
MEDIA FLOW RDR |
CM-DB (1) |
4,042,323,052 |
F0 F0 F4 6C |
FLOW ONGOING RDR |
RT (2) |
4,042,321,943 |
F0 F0 F0 17 |
ATTACK_START RDR |
RT (2) |
4,042,321,945 |
F0 F0 F0 19 |
ATTACK_END RDR |
RT (2) |
4,042,321,946 |
F0 F0 F0 1A |
MALICIOUS TRAFFIC RDR |
DC-DB (1) |
4,042,322,000 |
F0 F0 F0 50 |
Table 2.29. RDR Tag Default Categories
Default Category |
Intended Destination and Use |
---|---|
CM-DB (1) |
The CM database. Used by the SCA Reporter to generate reports. |
CM-CSV (1) |
The CM. Stored as CSV files. |
RT (2) |
Other network devices. Typically used for functionality that requires a real-time response, such as QoS, provisioning, and deletion. |
SM (3) |
SM’s DHCP and RADIUS legs. |
QP (4) |
External quota provisioning systems. Used as notifications of the SCE Subscribers API. |
The Periodic RDRs (or Network Usage RDRs) include the Link Usage, Package Usage, and Real-Time Subscriber Usage RDRs. When there is traffic for a particular service or package, the appropriate Usage RDRs are generated periodically, according to user-configured intervals. The RDR includes a time stamp of the end of the interval during which the traffic was recorded.
When there is no traffic (and therefore no consumed resources) for a particular service or package during a given period of time, the SCA BB application uses the Periodic RDR Zero Adjustment Mechanism, also called the zeroing methodology, to reduce the number of Usage RDRs generated for that service or package. This technique also simplifies collection for external systems by reducing the number of RDRs that they need to handle.
Unlike other Usage RDRs, the generation logic for Subscriber Usage RDRs does NOT use the zeroing methodology.
The zeroing methodology algorithm works as follows: for any number of consecutive time intervals having no traffic for a particular service or package, zero-consumption RDRs are generated for the first and last zero-consumption time intervals, but not for the intermediate time intervals. These two zero-consumption RDRs are generated when the next traffic arrives.
The Real-Time Subscriber Usage RDR (for a given subscriber) has a generation period of 30 minutes. There is subscriber traffic during the interval 1200–1230, no subscriber traffic during the following five intervals (1230–1300, 1300–1330, 1330–1400, 1400–1430, 1430–1500), and the next subscriber traffic occurs at 1522. The following Real-Time Subscriber Usage RDRs are generated:
At 1230, one RDR with the values of the consumed resources for the interval 1200–1230, and with the time stamp 1230.
At 1522, one zero-consumption RDR having the time stamp (1300) of the end of the first interval (1230–1300) with no traffic for that subscriber.
At 1522, one zero-consumption RDR having the time stamp (1500) of the end of the last interval (1430–1500) with no traffic for that subscriber.
No RDR is generated for the three intermediate zero-consumption intervals (1300–1330, 1330–1400, and 1400–1430).
At 1530, one RDR with the values of the consumed resources for the interval 1500–1530, and with the time stamp 1530.
The Real-Time Subscriber Usage RDR (for a given subscriber) has a generation period of 30 minutes. There is subscriber traffic during the interval 1200–1230, no subscriber traffic during the following interval 1230–1300, and the next subscriber traffic occurs at 1322. The following Real-Time Subscriber Usage RDRs are generated:
At 1230, one RDR with the values of the consumed resources for the interval 1200–1230, and with the time stamp 1230.
At 1322, one zero-consumption RDR having the time stamp (1300) of the single interval (1230–1300) with no traffic for that subscriber.
At 1330, one RDR with the values of the consumed resources for the interval 1300–1330, and with the time stamp 1330.
Each Raw Data Record (RDR) is sent to the Cisco Service Control Management Suite (SCMS) Collection Manager (CM). On the CM, adapters convert the RDRs and store them in database tables. There is a separate table for each RDR type. This chapter presents these tables and their columns (field names and types).
For additional information, such as RDR structure, RDR column and field descriptions, and how the RDRs are generated, see Raw Data Records: Formats and Field Contents.
Each RDR is routed to the appropriate adapter—the JDBC Adapter or the Topper/Aggregator (TA) Adapter—converted, and written into a database table row. There is a separate table for each RDR type, with a column designated for each RDR field.
In addition to the RDR fields that are specific to each RDR type, the tables RPT_NUR, RPT_SUR, RPT_PUR, RPT_LUR, and RPT_TR contain two universal columns: TIME_STAMP and RECORD_SOURCE. The following values are placed in these two universal columns (field numbers 1 and 2, respectively):
TIME_STAMP—The RDR time stamp assigned by the SCMS-CM. The field is in UNIX time_t format, which is the number of seconds since midnight of 1 January 1970.
RECORD_SOURCE—Contains the IP address of the Service Control Engine (SCE) platform that generated the RDR.
The IP address is in 32-bit binary format (displayed as a 4-byte integer).
Database table RPT_NUR stores data from SUBSCRIBER_USAGE_RDRs.
This table is not part of the default configuration.
These RDRs have the tag 4042321920.
Table 3.1. Columns for Table RPT_NUR
Field Name |
Type |
---|---|
TIME_STAMP |
DateTime |
RECORD_SOURCE |
Number |
SUBSCRIBER_ID |
String |
PACKAGE_ID |
Number |
SUBS_USG_CNT_ID |
Number |
BREACH_STATE |
Number |
REASON |
Number |
CONFIGURED_DURATION |
Number |
DURATION |
Number |
END_TIME |
Number |
UPSTREAM_VOLUME |
Number |
DOWNSTREAM_VOLUME |
Number |
SESSIONS |
Number |
SECONDS |
Number |
Database table RPT_SUR stores data from REALTIME_SUBSCRIBER_USAGE_RDRs.
These RDRs have the tag 4042321922.
Table 3.2. Columns for Table RPT_SUR
Field Name |
Type |
---|---|
TIME_STAMP |
DateTime |
RECORD_SOURCE |
Number |
SUBSCRIBER_ID |
String |
PACKAGE_ID |
Number |
SUBS_USG_CNT_ID |
Number |
MONITORED_OBJECT_ID |
Number |
BREACH_STATE |
Number |
REASON |
Number |
CONFIGURED_DURATION |
Number |
DURATION |
Number |
END_TIME |
Number |
UPSTREAM_VOLUME |
Number |
DOWNSTREAM_VOLUME |
Number |
SESSIONS |
Number |
SECONDS |
Number |
Database table RPT_PUR stores data from PACKAGE_USAGE_RDRs.
These RDRs have the tag 4042321924.
Table 3.3. Columns for Table RPT_PUR
Field Name |
Type |
---|---|
TIME_STAMP |
DateTime |
RECORD_SOURCE |
Number |
PKG_USG_CNT_ID |
Number |
GENERATOR_ID |
Number |
GLBL_USG_CNT_ID |
Number |
CONFIGURED_DURATION |
Number |
DURATION |
Number |
END_TIME |
Number |
UPSTREAM_VOLUME |
Number |
DOWNSTREAM_VOLUME |
Number |
SESSIONS |
Number |
SECONDS |
Number |
CONCURRENT_SESSIONS |
Number |
ACTIVE_SUBSCRIBERS |
Number |
TOTAL_ACTIVE_SUBSCRIBERS |
Number |
Database table RPT_LUR stores data from LINK_USAGE_RDRs.
These RDRs have the tag 4042321925.
Table 3.4. Columns for Table RPT_LUR
Field Name |
Type |
---|---|
TIME_STAMP |
DateTime |
RECORD_SOURCE |
Number |
LINK_ID |
Number |
GENERATOR_ID |
Number |
GLBL_USG_CNT_ID |
Number |
CONFIGURED_DURATION |
Number |
DURATION |
Number |
END_TIME |
Number |
UPSTREAM_VOLUME |
Number |
DOWNSTREAM_VOLUME |
Number |
SESSIONS |
Number |
SECONDS |
Number |
CONCURRENT_SESSIONS |
Number |
ACTIVE_SUBSCRIBERS |
Number |
TOTAL_ACTIVE_SUBSCRIBERS |
Number |
Database table RPT_TR stores data from TRANSACTION_RDRs.
These RDRs have the tag 4042321936.
Table 3.5. Columns for Table RPT_TR
Field Name |
Type |
---|---|
TIME_STAMP |
DateTime |
RECORD_SOURCE |
Number |
SUBSCRIBER_ID |
String |
PACKAGE_ID |
Number |
SERVICE_ID |
Number |
PROTOCOL_ID |
Number |
SAMPLE_SIZE |
Number |
PEER_IP |
Number |
PEER_PORT |
Number |
ACCESS_String |
String |
INFO_String |
String |
SOURCE_IP |
Number |
SOURCE_PORT |
Number |
INITIATING_SIDE |
Number |
END_TIME |
Number |
MILISEC_DURATION |
Number |
TIME_FRAME |
Number |
UPSTREAM_VOLUME |
Number |
DOWNSTREAM_VOLUME |
Number |
SUBS_CNT_ID |
Number |
GLBL_CNT_ID |
Number |
PKG_USG_CNT_ID |
Number |
IP_PROTOCOL |
Number |
PROTOCOL_SIGNATURE |
Number |
ZONE_ID |
Number |
FLAVOR_ID |
Number |
FLOW_CLOSE_MODE |
Number |
Database table RPT_MEDIA stores data from MEDIA_FLOW_RDRs.
These RDRs have the tag 4042323052.
Table 3.6. Columns for Table RPT_MEDIA
Field Name |
Type |
---|---|
TIME_STAMP |
DateTime |
RECORD_SOURCE |
Number |
SUBSCRIBER_ID |
String |
PACKAGE_ID |
Number |
SERVICE_ID |
Number |
PROTOCOL_ID |
Number |
PEER_IP |
Number |
PEER_PORT |
Number |
SOURCE_IP |
Number |
SOURCE_PORT |
Number |
INITIATING_SIDE |
Number |
ZONE_ID |
Number |
FLAVOR_ID |
Number |
SIP_DOMAIN |
String |
SIP_USER_AGENT |
String |
START_TIME |
Number |
END_TIME |
Number |
SEC_DURATION |
Number |
UPSTREAM_VOLUME |
Number |
DOWNSTREAM_VOLUME |
Number |
IP_PROTOCOL |
Number |
FLOW_TYPE |
Number |
SESSION_ID |
Number |
UPSTREAM_AVERAGE_JITTER |
Number |
DOWNSTREAM_AVERAGE_JITTER |
Number |
UPSTREAM_PACKET_LOSS |
Number |
DOWNSTREAM_PACKET_LOSS |
Number |
UPSTREAM_PAYLOAD_TYPE |
Number |
DOWNSTREAM_PAYLOAD_TYPE |
Number |
Database table RPT_MALUR stores data from MALICIOUS_TRAFFIC_PERIODIC_RDRs.
These RDRs have the tag 4042322000.
Table 3.7. Columns for Table RPT_MALUR
Field Name |
Type |
---|---|
TIME_STAMP |
DateTime |
RECORD_SOURCE |
Number |
ATTACK_ID |
Number |
SUBSCRIBER_ID |
String |
ATTACK_IP |
Number |
OTHER_IP |
Number |
PORT_NUMBER |
Number |
ATTACK_TYPE |
Number |
SIDE |
Number |
IP_PROTOCOL |
Number |
CONFIGURED_DURATION |
Number |
DURATION |
Number |
END_TIME |
Number |
ATTACKS |
Number |
MALICIOUS_SESSIONS |
Number |
The Topper/Aggregator (TA) Adapter generates database table RPT_TOPS_PERIOD0 for its shorter aggregation interval (by default, one hour).
Table 3.8. Columns for Table RPT_TOPS_PERIOD0
Field Name |
Type |
---|---|
RECORD_SOURCE |
Number |
METRIC_ID |
Number |
SUBS_USG_CNT_ID |
Number |
TIME_STAMP |
DateTime |
AGG_PERIOD |
Number |
SUBSCRIBER_ID |
String |
CONSUMPTION |
Number |
For each Top Report, the TA Adapter sorts the subscriber/consumption pairs from the highest consumption to lowest. At the end of each report is a statistic giving the sum of all subscribers for this metric.
If the report is empty, typically when no traffic was reported for the designated service/metric pair during the aggregation period, the DB will still be updated, but the only row in the report will be the final row showing a total consumption of zero. The DB is updated to avoid the perception in the Cisco Service Control Application (SCA) Reporter that the report is not there because of a malfunction.
The possible values for the field METRIC_ID are presented in the following table.
Table 3.9. Metric_ID Values
Metric_ID |
Metric |
---|---|
0 |
Up Volume |
1 |
Down Volume |
2 |
Combined Volume |
3 |
Sessions |
4 |
Seconds |
The Topper/Aggregator (TA) Adapter generates database table RPT_TOPS_PERIOD1 for its longer aggregation interval (by default, 24 hour).
Table 3.10. Columns for Table RPT_TOPS_PERIOD1
Field Name |
Type |
---|---|
RECORD_SOURCE |
Number |
METRIC_ID |
Number |
SUBS_USG_CNT_ID |
Number |
TIME_STAMP |
DateTime |
AGG_PERIOD |
Number |
SUBSCRIBER_ID |
String |
CONSUMPTION |
Number |
For each Top Report, the TA Adapter sorts the subscriber/consumption pairs from the highest consumption to lowest. At the end of each report is a statistic giving the sum of all subscribers for this metric.
If the report is empty, typically when no traffic was reported for the designated service/metric pair during the aggregation period, the DB will still be updated, but the only row in the report will be the final row showing a total consumption of zero. The DB is updated to avoid the perception in the SCA Reporter that the report is not there because of a malfunction.
The possible values for the field METRIC_ID are presented in the following table.
Table 3.11. Metric_ID Values
Metric_ID |
Metric |
---|---|
0 |
Up Volume |
1 |
Down Volume |
2 |
Combined Volume |
3 |
Sessions |
4 |
Seconds |
Database table INI_VALUES is updated whenever the service configuration is applied to the SCE platform. This table contains, for each SCE IP address, mappings between numeric identifiers and textual representation for services, packages, and other service configuration components. The mapping is represented as a standard properties file in string form, where each mapping file is stored in one row. The SCA Reporter uses the mappings contained in this table.
Table 3.12. Columns for Table INI_VALUES
Field Name |
Type |
Description |
---|---|---|
TIME_STAMP |
DateTime |
|
SE_IP |
String |
Identification of the SCE platform where these values were applied. |
VALUE_TYPE |
Number |
Key/Value family type. The possible values are: 1—Service ID / service name 2—Package ID / package name 3—TCP port number / port name 4—Time frame ID / time frame name 5—SCE address 32-bit / dotted notation 6—IP protocol number / IP protocol name 7—Signature protocol ID / protocol name 8—P2P signature protocol ID / protocol name 11—Global service counter ID / counter name 12—Subscriber service counter ID / counter name 13—Package counter ID / counter name 15—UDP port number / port name 1002—VoIP signature protocol ID / protocol name 2001—P2P subscriber service counter ID / counter 2002—VoIP subscriber service counter ID / counter 3001—P2P global service counter ID / counter 3002—VoIP global service counter ID / counter |
VALUE_KEY |
String |
Key name. For example: Gold, Silver, or Adult Browsing. |
VALUE |
Number |
Numeric reference. |
The Service Control Application for Broadband (SCA BB) provides several types of Comma-Separated Value (CSV) flat files that you can review and configure using third-party applications such as Excel.
This section describes the file formats of the CSV files created when exporting service configuration entities into CSV files. The same format must be used for importing such entities into service configurations.
For more information about exporting and importing service configuration entities, see “Managing Service Configurations” in the “Using the Service Configuration Editor” chapter of the Cisco Service Control Application for Broadband User Guide.
There is no need to repeat the same values in subsequent rows of the CSV file. If a field is left empty in a row, the value of that field from the previous row is used.
Lines in Service CSV files have the following fixed format:
service name, service numeric ID, [description], sample rate, parent name,
global counter index, subscriber counter index, [flavor], initiating side,
protocol, [zone]
The only service that does not have a parent service is the default service.
The default service is the parent of all other services.
If the service will be counted with its parent, it must have a counter index of -1.
One service can have multiple entries in the file (see the following example). There is no need to state the service properties for each of its items.
Some fields can take a null value (see the last line of the following example).
The following is an example of a service CSV file:
P2P,9,,10,Default Service,9,9,,EitherSide,DirectConnect,zone1
P2P,9,,10,Default Service,9,9,flavor1,EitherSide,Manolito, zone1
,,,,,,,,EitherSide,Hotline, zone1
,,,,,,, flavor2,EitherSide,Share, zone1
Generic,1,,10,Default Service,-1,-1,No items,null,null,null
Lines in Protocol CSV files have the following fixed format:
protocol name, protocol index, [IP protocol], [port range], signatureOne protocol can have multiple entries in the file (see the following example).
Port range
has the format: MinPort-MaxPort
. For example, 1024-5000
means port 1024 to port 5000.
Example
The following is an example of a protocol CSV file:
HTTP Browsing,2,TCP,80-80,Generic
HTTP Browsing,2,TCP,8080-8080,Generic
HTTP Browsing,2,,,HTTP
Lines in Zone CSV files have the following fixed format:
zone name, zone index, IP rangewhere IP range
is an IP address in dotted notation, followed by a mask.
Example
The following is an example of a zone CSV file:
zone1,1,10.1.1.0/24
,,10.1.2.0/24
The format of flavor CSV files depends on the flavor type.
Each line of every flavor CSV files begins with the same three fields:
flavor name, flavor index, flavor type[, flavor specific field[s]]The formats of the CSV files of different flavors are described in the following sections.
Example
The following is an example of a line from a flavor CSV file:
HttpUrlFlavor,1,HTTP_URL
Lines in HTTP URL CSV files have the following fixed format:
flavor name, flavor index, flavor type, host suffix, params prefix,
URI suffix, URI prefixExample
The following is an example of an HTTP URL CSV file:
NEWS,0,HTTP_URL,*.reuters.com,,,/news/*
,,,*.msnbc.msn.com,,,
,,,*.wired.com,,,/news/technology/*
,,,*.cbsnews.com,,,/sections/world/*
,,,*.cnn.com,,,/WORLD/*
Lines in HTTP User Agent CSV files have the following fixed format:
flavor name, flavor index, flavor type, user agent
Lines in HTTP Composite CSV files have the following fixed format:
flavor name, flavor index, flavor type, HTTP_URL_name, HTTP_User_Agent_name
where HTTP_URL_name
and HTTP_User_Agent_name
are the names of existing flavors of types HTTP URL and HTTP User Agent respectively
Lines in RTSP User Agent CSV files have the following fixed format:
flavor name, flavor index, flavor type, user agent
Lines in RTSP Host Name CSV files have the following fixed format:
flavor name, flavor index, flavor type, host suffix
Lines in HTTP Composite CSV files have the following fixed format:
flavor name, flavor index, flavor type, RTSP_Host_Name, RTSP_User_Agent_name
where RTSP_Host_Name
and RTSP_User_Agent_name
are the names of existing flavors of types RTSP Host Name and RTSP User Agent respectively
Lines in SIP Destination Domain CSV files have the following fixed format:
flavor name, flavor index, flavor type, host suffix
Lines in SIP Source Domain CSV files have the following fixed format:
flavor name, flavor index, flavor type, host suffix
Lines in HTTP Composite CSV files have the following fixed format:
flavor name, flavor index, flavor type, SIP_Destination_Domain_name,
SIP_Source_Domain_namewhere SIP_Destination_Domain_name
and SIP_Source_Domain_name
are the names of existing flavors of types SIP Destination Domain and SIP Source Domain respectively
This section describes the file formats of various subscriber CSV files used by the Cisco Service Control Management Suite (SCMS) Subscriber Manager(SM). For more information regarding these CSV file formats, see “Subscriber Files” in the “Managing Subscribers” chapter of the Cisco Service Control Engine (SCE) Software Configuration Guide and see the Cisco Service Control Management Suite Subscriber Manager User Guide.
Some of the CSV files include a mappings field. This field can include one or more of the following values delimited by colons (“:”) or semicolons (“;”):
A single IP address in dotted notation (xx.xx.xx.xx).
An IP address range in dotted notation (xx.xx.xx.xx/mask).
A single VLAN (xx) as an integer in decimal notation in the range of 0 to 2044.
A VLAN range (xx-yy) where both values are integers in decimal notation in the range of 0 to 2044.
Specifying VLAN and IP Mappings together in the same line is not allowed.
Multiple IP mappings—10.1.1.0/24;10.1.2.238
Multiple VLAN mappings—450:896-907
Lines in SCE Subscriber CSV files have the following fixed format:
subscriber-id, mappings, package-id
The following is a sample CSV file for use with the SCE CLI:
JerryS,80.179.152.159;80.179.152.179,0 ElainB,194.90.12.2,3
Lines in SCMS SM Subscriber CSV files have the following fixed format:
subscriber-id, domain, mappings, package-idIf no domain is specified, the default domain (subscribers) is assigned.
Example
The following is a sample CSV file for use with the SM CLI:
JerryS,subscribers,80.179.152.159,0
ElainB,,194.90.12.2,3
Lines in SCE Anonymous Group CSV files have the following fixed format:
anonymous-group-name, IP-range[, subscriber-template-number]If no subscriber-template-number is specified, then the anonymous subscribers of that group will use the default template (equivalent to using a subscriber-template-number value of zero).
The mapping between subscriber-template-number and package-id is defined in the SCE Subscriber Template CSV file, which is described in the following section.
Lines in Subscriber Template CSV files have the following fixed format, as described below:
subscriber-template-number, package-id
SCA BB includes a default one-to-one mapping between package-id and subscriber-template-number for values from 0 to 63.
Subscriber-template-numbers can take values between 0 and 199. You can map more than one subscriber-template-number to the same package-id.
For complete information about this file, see the Cisco Service Control Engine (SCE) Software Configuration Guide.
This section describes the file formats of the CSV files created by adapters of the Cisco Service Control Management Suite (SCMS) Collection Manager (CM). For more information about the CM and its adapters, see the Cisco Service Control Management Suite Collection Manager User Guide.
Each RDR is routed to the appropriate adapter—the Comma-Separated Value (CSV) Adapter, the Topper/Aggregator (TA Adapter), or the Real-Time Aggregating (RAG) Adapter—converted, and written to a CSV file.
By default, the CSV Adapter writes files to subdirectories of ~/cm/adapters/CSVAdapter/csvfiles
, where each subdirectory name is the RDR tag of the RDR that generated the CSV file.
Each CSV file created by the CSV Adapter has a structure matching the RDR that is represented in the file. (See Raw Data Records: Formats and Field Contents.)
The TA Adapter receives Subscriber Usage RDRs, aggregates the data they contain, and outputs statistics to CSV files. By default, these files are created once every 24 hours, at midnight.
The name of the CSV file is the date and time of its creation. The default format of the file name is yyyy-MM-dd_HH-mm-ss.csv
(for example, 2005-09-27_18-30-01.csv
). By default, the location of the CSV files is ~/cm/adapters/TAAdapter/csvfiles
.
By default, the fields in each row of the CSV file are as follows:
TIMESTAMP, TAG, subsID, svcALLup, svcALLdown, svcALLsessions, svcALLseconds, svc0up, svc0down, svc0sessions, svc0seconds, svc1up, svc1down, svc1sessions, svc1seconds, ..., svcNup, svcNdown, svcNsessions, svcNsecondswhere
subsID
is the Subscriber ID andsvcXY
is the aggregated volume of metric Y for service X. (The N insvcN
is the highest service number, which is the configured number of services minus 1.)The combined volume is not stored in the CSV file, since it is easily obtained by adding the upstream and downstream volumes.
You can configure the adapter to insert a comment at the beginning of every CSV file. This comment contains a time stamp showing when the file was created, and an explanation of its format. By default, this feature is disabled. To turn this option on, edit the file
csvadapter.conf
and change the value ofincludeRecordSource
.
The RAG Adapter processes RDRs of one or more types and aggregates the data from predesignated field positions into buckets. When a RAG Adapter bucket is flushed, its content is written as a single line into a CSV file, one file per RDR, in the adapters’ CSV repository.
The name of the CSV file is the date and time of its creation. The default format of the file name is yyyy-MM-dd_HH-mm-ss.csv
(for example, 2005-09-27_18-30-01.csv
). By default, the CSV repository is flat (all CSV files in one directory), and located at ~/cm/adapters/RAGAdapter/csvfiles
. Alternatively, you can configure the adapter to use a subdirectory structure; the CSV files are written to subdirectories of ~/cm/adapters/RAGAdapter/csvfiles
, where each subdirectory name is the RDR tag of the RDR type that was written to this CSV file.
Each line written to the CSV file may have some synthesized fields added to it, such as time stamps of the first and last RDRs that contributed to this bucket and the total number of RDRs in this bucket. Other fields may be removed altogether. Fields in the output line that are not used for aggregation will have values corresponding to the values in the first RDR that contributed to the bucket. However, the time stamp field that is prepended to the line in the CSV file will have a value corresponding to the time stamp of the last RDR in the bucket.
This chapter describes the proprietary CISCO-SCAS-BB Management Information Base (MIB) supported by the Service Control Engine (SCE) platform.
A MIB is a database of objects that can be monitored by a network management system (NMS). The SCE platform supports both the standard MIB-II and the proprietary Cisco Service Control Enterprise MIB. The CISCO-SCAS-BB MIB is the part of the Service Control Enterprise MIB that enables the external management system to monitor counters and metrics specific to the Service Control Application for Broadband (SCA BB).
This section explains how to configure the SNMP interface, and how to load the MIB files.
Before using the SNMP interface:
Enable SNMP access on the SCE platform (by default, SNMP access is disabled).
Set the values of SNMP parameters:
The community string to be used for client authentication.
(Optional, recommended as a security measure) An access-list (ACL) of IP addresses. This limits access to SNMP information to a set of known locations. You can define a different community string for each ACL.
The destination IP address to which the SCE platform will send SNMP traps.
NoteYou can enable or disable specific traps.For complete documentation of SNMP configuration, see “SNMP Configuration and Management” in the “Configuring the Management Interface and Security” chapter of the Cisco Service Control Engine (SCE) Software Configuration Guide.
To access the SNMP variables on the SCE platform, you must load the SNMP browser with a standard MIB file (SNMPv2.mib
) and proprietary Cisco MIB files (pcube.mib
, pcubeSEMib.mib
, and PCubeEngageMib.mib
).
The SCA BB proprietary MIB uses definitions that are defined in other MIBs, such as SNMPv2.mib
and pcube.mib
.
This means that the order in which the MIBs are loaded is important; to avoid errors, the MIBs must be loaded in the correct order.
You can download the CISCO-SCAS-BB MIB file (PCubeEngageMib.mib
) and other MIB files (pcube.mib
and pcubeSEMib.mib
) from ftp://ftp.cisco.com/pub/mibs/.
The Service Control Enterprise MIB splits into four main groups: Products, Modules, Management, and Workgroup. The Service Control enterprise tree structure is defined in a MIB file named pcube.mib
.
The pcubeProducts subtree contains the sysObjectIDs of the Service Control products.
Service Control product sysObjectIDs are defined in a MIB file named Pcube-Products-MIB
.
The pcubeModules subtree provides a root object identifier from which MIB modules are defined.
The pcubeMgmt subtree contains the configuration copy MIB:
pcubeConfigCopyMib
enables saving the running configuration of Cisco products. This MIB is documented in the “Proprietary MIB Reference” appendix of the Cisco Service Control Engine (SCE) Software Configuration Guide.
The pcubeWorkgroup subtree contains:
pcubeSeEvents
and pcubeSEObjs
—pcubeSeMib
, the SCE MIB, is the main MIB for the Service Control products and provides a wide variety of configuration and runtime statistics. This MIB is also documented in the “Proprietary MIB Reference” appendix of the Cisco Service Control Engine (SCE) Software Configuration Guide.
pcubeEngageObjs
—The CISCO-SCAS-BB MIB provides configuration and runtime status for SCA BB, and is described in the following section.
The following figure illustrates the Service Control Enterprise MIB structure.
The following object identifier represents the Service Control Enterprise MIB:
1.3.6.1.4.1.5655
or iso.org.dod.internet.private.enterprise.pcube
.
The CISCO-SCAS-BB MIB provides access to service counters through the SNMP interface. Using this MIB, a network administrator can collect usage information per service at link, package, or subscriber granularity.
The CISCO-SCAS-BB MIB is defined in the file PCubeEngageMib.mib
.
The MIB is documented in the remainder of this chapter.
This reference is divided into sections according to the MIB object groups. For each object, information is presented in the following format:
<Description of the object>
Access access control associated with the object
Units unit of measurement used for the object
{Indexes used by the table}
Syntax
OBJECT DATA TYPE
{
The general format of the object
}
The pcubeEngageObjs objects provide current information about packages, service, and subscribers.
This is a list of the pcubeEngageObjs objects. Each object consists of a number of subordinate object types, as summarized in the following section.
|
|
|
|
|
|
|
|
|
|
This is a summary of the structure of pcubeEngageObjs. Note the table structure for objects that may have multiple entries.
serviceGrp
serviceTable—deprecated
linkGrp
linkServiceUsageTable
linkServiceUsageEntry
linkServiceUsageUpVolume
linkServiceUsageDownVolume
linkServiceUsageNumSessions
linkServiceUsageDuration
linkServiceUsageConcurrentSessions
linkServiceUsageActiveSubscribers
linkServiceUpDroppedPackets
linkServiceDownDroppedPackets
linkServiceUpDroppedBytes
linkServiceDownDroppedBytes
packageGrp
packageCounterTable
packageCounterEntry
packageCounterIndex
packageCounterStatus
packageCounterName
packageCounterActiveSubscribers
packageServiceUsageTable
packageServiceUsageEntry
packageServiceUsageUpVolume
packageServiceUsageDownVolume
packageServiceUsageNumSessions
packageServiceUsageDuration
packageServiceUsageConcurrentSessions
packageServiceUsageActiveSubscribers
packageServiceUpDroppedPackets
packageServiceDownDroppedPackets
packageServiceUpDroppedBytes
packageServiceDownDroppedBytes
subscriberGrp
subscribersTable
subscriberEntry
subscriberPackageIndex
subscriberServiceUsageTable
subscriberServiceUsageEntry
subscriberServiceUsageUpVolume
subscriberServiceUsageDownVolume
subscriberServiceUsageNumSessions
subscriberServiceUsageDuration
serviceCounterGrp
globalScopeServiceCounterTable
globalScopeServiceCounterEntry
globalScopeServiceCounterIndex
globalScopeServiceCounterStatus
globalScopeServiceCounterName
subscriberScopeServiceCounterTable
subscriberScopeServiceCounterEntry
subscriberScopeServiceCounterIndex
subscriberScopeServiceCounterStatus
subscriberScopeServiceCounterName
The Service Group is deprecated. Use the Service Counter Group.
The Link Service group provides usage information per link for each global-scope service counter (for example, traffic statistics of a service for all subscribers using a particular link).
The Link Service Usage table provides usage information per link for each global-scope service counter.
Access not-accessible
SEQUENCE OF linkServiceUsageEntry
A Link Service Usage table entry containing parameters defining resource usage of one link for services included in one global-scope service counter.
Access not-accessible
{linkModuleIndex, linkIndex, globalScopeServiceCounterIndex}
SEQUENCE
{
linkServiceUsageUpVolume
linkServiceUsageDownVolume
linkServiceUsageNumSessions
linkServiceUsageDuration
linkServiceUsageConcurrentSessions
linkServiceUsageActiveSubscribers
linkServiceUpDroppedPackets
linkServiceDownDroppedPackets
linkServiceUpDroppedBytes
linkServiceDownDroppedBytes
}
The upstream volume of services in this service counter carried over the link.
Access read-only
Units kilobytes
Counter32
Note
Although volume counters on the SCE platform hold 32-bit integers, CISCO-SCAS-BB MIB volume counters wraparound (turn back to zero) when the maximum 29-bit integer value (0x1FFFFFFF) is reached.
The downstream volume of services in this service counter carried over the link.
Access read-only
Units kilobytes
Counter32
The number of sessions of services in this service counter carried over the link.
Access read-only
Units sessions
Counter32
The aggregated session duration of services in this service counter carried over the link.
Access read-only
Units seconds
Counter32
The number of concurrent sessions of services in this service counter carried over the link.
Access read-only
Units sessions
Counter32
The number of active subscribers of services in this service counter carried over the link.
Access read-only
Unit subscribers
Counter32
The number of dropped upstream packets of services in this service counter carried over the link.
Access read-only
Units packets
Counter32
To enable the SCE application to count dropped packets and dropped bytes, disable the accelerate-packet-drops
feature on the SCE platform; if accelerate-packet-drops
is enabled, the MIB dropped packets and dropped bytes counters constantly show the value 0xFFFFFFFF.
For more information about the accelerate-packet-drops
feature, see “Counting Dropped Packets” in the “Configuring the Line Interface” chapter of the Cisco Service Control Engine (SCE) Software Configuration Guide.
The number of dropped downstream packets of services in this service counter carried over the link.
Access read-only
Units packets
Counter32
To enable the SCE application to count dropped packets and dropped bytes, disable the accelerate-packet-drops
feature on the SCE platform; if accelerate-packet-drops
is enabled, the MIB dropped packets and dropped bytes counters constantly show the value 0xFFFFFFFF.
For more information about the accelerate-packet-drops
feature, see “Counting Dropped Packets” in the “Configuring the Line Interface” chapter of the Cisco Service Control Engine (SCE) Software Configuration Guide.
The number of dropped upstream bytes of services in this service counter carried over the link.
Access read-only
Units bytes
Counter32
To enable the SCE application to count dropped packets and dropped bytes, disable the accelerate-packet-drops
feature on the SCE platform; if accelerate-packet-drops
is enabled, the MIB dropped packets and dropped bytes counters constantly show the value 0xFFFFFFFF.
For more information about the accelerate-packet-drops
feature, see “Counting Dropped Packets” in the “Configuring the Line Interface” chapter of the Cisco Service Control Engine (SCE) Software Configuration Guide.
The link service-counter number of dropped downstream bytes of services in this service counter carried over the link.
Access read-only
Units bytes
Counter32
To enable the SCE application to count dropped packets and dropped bytes, disable the accelerate-packet-drops
feature on the SCE platform; if accelerate-packet-drops
is enabled, the MIB dropped packets and dropped bytes counters constantly show the value 0xFFFFFFFF.
For more information about the accelerate-packet-drops
feature, see “Counting Dropped Packets” in the “Configuring the Line Interface” chapter of the Cisco Service Control Engine (SCE) Software Configuration Guide.
The Package group provides general and usage information for each global-scope package counter (for example, traffic statistics of a service for all subscribers assigned to a particular package or group of packages).
The Package Counter table provides information for each package counter.
Access not-accessible
SEQUENCE OF packageCounterEntry
A Package Counter table entry containing parameters defining one package counter.
Access not-accessible
{pmoduleIndex, packageCounterIndex}
SEQUENCE
{
packageCounterIndex
packageCounterStatus
packageCounterName
packageCounterActiveSubscribers
}
The total number of active subscribers of packages included in the package counter.
Access read-only
Counter32
The Package Service Usage table provides usage information for each global-scope package counter.
Access not-accessible
SEQUENCE OF packageServiceUsageEntry
A Package Service Usage table entry containing parameters defining resource usage of packages included in one global-scope package counter.
Access not-accessible
{pmoduleIndex, packageCounterIndex, globalScopeServiceCounterIndex}
SEQUENCE
{
packageServiceUsageUpVolume
packageServiceUsageDownVolume
packageServiceUsageNumSessions
packageServiceUsageDuration
packageServiceUsageConcurrentSessions
packageServiceUsageActiveSubscribers
packageServiceUpDroppedPackets
packageServiceDownDroppedPackets
packageServiceUpDroppedBytes
packageServiceDownDroppedBytes
}
The upstream volume of packages in this package counter.
Access read-only
Units kilobytes
Counter32
Note
Although volume counters on the SCE platform hold 32-bit integers, CISCO-SCAS-BB MIB volume counters wraparound (turn back to zero) when the maximum 29-bit integer value (0x1FFFFFFF) is reached.
The downstream volume of packages in this package counter.
Access read-only
Units kilobytes
Counter32
The number of sessions of packages in this package counter.
Access read-only
Units sessions
Counter32
The aggregated session duration seconds of packages in this package counter.
Access read-only
Units seconds
Counter32
The number of concurrent sessions of packages in this package counter.
Access read-only
Units sessions
Counter32
The number of active subscribers of packages in this package counter.
Access read-only
Units subscribers
Counter32
The number of dropped upstream packets of packages in this package counter.
Access read-only
Units packets
Counter32
To enable the SCE application to count dropped packets and dropped bytes, disable the accelerate-packet-drops
feature on the SCE platform; if accelerate-packet-drops
is enabled, the MIB dropped packets and dropped bytes counters constantly show the value 0xFFFFFFFF.
For more information about the accelerate-packet-drops
feature, see “Counting Dropped Packets” in the “Configuring the Line Interface” chapter of the Cisco Service Control Engine (SCE) Software Configuration Guide.
The number of dropped downstream packets of packages in this package counter.
Access read-only
Units packets
Counter32
To enable the SCE application to count dropped packets and dropped bytes, disable the accelerate-packet-drops
feature on the SCE platform; if accelerate-packet-drops
is enabled, the MIB dropped packets and dropped bytes counters constantly show the value 0xFFFFFFFF.
For more information about the accelerate-packet-drops
feature, see “Counting Dropped Packets” in the “Configuring the Line Interface” chapter of the Cisco Service Control Engine (SCE) Software Configuration Guide.
The number of dropped upstream bytes of packages in this package counter.
Access read-only
Units bytes
Counter32
To enable the SCE application to count dropped packets and dropped bytes, disable the accelerate-packet-drops
feature on the SCE platform; if accelerate-packet-drops
is enabled, the MIB dropped packets and dropped bytes counters constantly show the value 0xFFFFFFFF.
For more information about the accelerate-packet-drops
feature, see “Counting Dropped Packets” in the “Configuring the Line Interface” chapter of the Cisco Service Control Engine (SCE) Software Configuration Guide.
The number of dropped downstream bytes of packages in this package counter.
Access read-only
Units bytes
Counter32
To enable the SCE application to count dropped packets and dropped bytes, disable the accelerate-packet-drops
feature on the SCE platform; if accelerate-packet-drops
is enabled, the MIB dropped packets and dropped bytes counters constantly show the value 0xFFFFFFFF.
For more information about the accelerate-packet-drops
feature, see “Counting Dropped Packets” in the “Configuring the Line Interface” chapter of the Cisco Service Control Engine (SCE) Software Configuration Guide.
The Subscriber group provides general information for each subscriber and usage information per service counter for each subscriber (for example, traffic statistics of a service for a particular subscriber that is defined in the system).
To use the tables in this group, first create an entry to reference a particular subscriber in the subscribersPropertiesValueTable object of the subscriberGrp in the SCE MIB (not the CISCO-SCAS-BB MIB). Using the index of this table (spvIndex), information about the subscriber can be collected. See Accessing Subscriber Information (the spvIndex) for more information on how to access subscriber-level information using the SNMP interface.
The Subscribers Table provides information for each subscriber.
Access not-accessible
SEQUENCE OF subscribersEntry
A Subscribers Table entry containing the package index of each subscriber.
Access not-accessible
{pmoduleIndex, spvIndex}
SEQUENCE
{
subscriberPackageIndex
}
The Subscriber Service Usage table provides usage information per service counter for each subscriber.
Access not-accessible
Sequence of subscriberServiceUsageEntry
A Subscriber Service Usage table entry containing parameters defining resource usage by one subscriber of services included in one service counter.
Access not-accessible
{pmoduleIndex, spvIndex, subscriberScopeServiceCounterIndex}
Syntax
SEQUENCE
{
subscriberServiceUsageUpVolume
subscriberServiceUsageDownVolume
subscriberServiceUsageNumSessions
subscriberServiceUsageDuration
}
The upstream volume of services in this service counter used by this subscriber.
Access read-only
Unit kilobytes
Counter32
Although volume counters on the SCE platform hold 32-bit integers, CISCO-SCAS-BB MIB volume counters wraparound (turn back to zero) when the maximum 29-bit integer value (0x1FFFFFFF) is reached.
The downstream volume of services in this service counter used by this subscriber.
Access read-only
Unit kilobytes
Counter32
Although volume counters on the SCE platform hold 32-bit integers, CISCO-SCAS-BB MIB volume counters wraparound (turn back to zero) when the maximum 29-bit integer value (0x1FFFFFFF) is reached.
The Service Counter group provides general information for each global-scope and subscriber-scope service counter. You can use it, for example, to read the names of the services as defined in a SCA BB service configuration.
The Global-Scope Service Counter table consists of data regarding each service counter used by the link and by packages.
Access not-accessible
SEQUENCE OF globalScopeServiceCounterEntry
A Global-Scope Service Counter table entry containing parameters defining one global-scope service counter.
Access not-accessible
{pmoduleIndex, globalScopeServiceCounterIndex}
SEQUENCE
{
globalScopeServiceCounterIndex
globalScopeServiceCounterStatus
globalScopeServiceCounterName
}
The Subscriber-Scope Service Counter table consists of data regarding each service counter used by subscribers.
Access not-accessible
SEQUENCE OF subscriberScopeServiceCounterEntry
A Subscriber-Scope Service Counter table entry containing parameters defining one subscriber-scope service counter.
Access not-accessible
{pmoduleIndex, subscriberScopeServiceCounterIndex}
SEQUENCE
{
subscriberScopeServiceCounterIndex
subscriberScopeServiceCounterStatus
subscriberScopeServiceCounterName
}
This section provides guidelines to help access SNMP information on the SCE platform using the CISCO-SCAS-BB MIB.
Indices in SNMP start from 1; SCA BB indices start from 0. When accessing a counter in the SCA BB SNMP MIB by its index, add 1 to the index of the entity. For example, the Global Counter with index 0 will be located at globalScopeServiceCounter index 1.
Although volume counters on the SCE platform hold 32-bit integers, CISCO-SCAS-BB MIB volume counters wraparound (turn back to zero) when the maximum 29-bit integer value (0x1FFFFFFF) is reached.
To enable the SCE application to count dropped packets and dropped bytes, disable the accelerate-packet-drops
feature on the SCE platform; if accelerate-packet-drops
is enabled, the MIB dropped packets and dropped bytes counters constantly show the value 0xFFFFFFFF.
For more information about the accelerate-packet-drops
feature, see “Counting Dropped Packets” in the “Configuring the Line Interface” chapter of the Cisco Service Control Engine (SCE) Software Configuration Guide.
The index of a service counter as defined in a SCA BB service configuration is used to reference services in the CISCO-SCAS-BB MIB. Since MIB index values count from 1, but SCA BB indices count from 0, the index used in the MIB must always be one greater than the index of the service it is referencing.
For example, to get the number of upstream bytes used by a service on a link, use LinkServiceTable.lnkServiceUpVolume
(part of the linkGrp
). The value assigned to serviceIndex
for this table must be one greater than service index defined for this service in the service configuration.
To identify or change the index of a service, go to the Advanced tab of the Service Settings dialog box in the Console (see the “Using the Service Configuration Editor: Traffic Classification” chapter of the Cisco Service Control Application for Broadband User Guide). For example, to reference the P2P service (which has a (default) service index of 9) in the MIB, a serviceIndex
of 10 (= 9 + 1) must be used.
The package index, defined in a SCA BB service configuration, is used to reference entries in packageTable
and packageServiceTable
(part of the packageGrp
). As with serviceIndex
the value assigned to packageIndex
must be one greater than the package index in the service configuration.
To identify or change the index of a package, go to the Advanced tab of the Package Settings dialog box in the Console (see the “Using the Service Configuration Editor: Traffic Control” chapter of the Cisco Service Control Application for Broadband User Guide). For example, to reference the default package (which has a package index of 0) in the MIB, a packageIndex
of 1 (= 0 + 1) must be used.
In order to collect subscriber-level information using the SNMP interface, you must first create an entry in the subscriberPropertiesValuesTable
part of the subscriberGrp
in pcubeSEMib
(not PCubeEngageMib
). After an entry in this table is created and associated with a subscriber name, its index (spvIndex
) can be referred to in PCubeEngageMib
to collect usage statistics for this subscriber.
An entry is created in the subscriberPropertiesValuesTable
table by setting the entry spvRowStatus
object with CreateAndGo(4)
then setting the name of the subscriber in the spvSubName
property and the spvIndex
variable to be used as an index to the subscriber.
For example, to poll the downstream volume of subscriber “sub123” for the P2P service using PCubeEngageMib
, perform the following steps.
Obtain the index of the P2P service from the Console. (This is a one-time operation that should be performed only if services are changed in the policy.) [In this example, assume that the P2P service index has its default value of 9.]
Create an entry in SEMib:subscriberGrp:subscriberPropertiesValuesTable
.
Set the object indices:
For pmoduleIndex
use 1.
Set spvIndex
to the desired value. [In this example we will use 1.]
Set spvRowStatus
to 4 (using CreateAndGo
).
Set spvSubName
to “sub123”.
Read the subscriberServiceDownVolume
property out of EngageMib:subscriberGrp:subscriberServiceTable
where spvIndex
is set to 1 and serviceIndex
is set to 10.