cc/td/doc/product/software/ios123/123tcr
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table Of Contents

Cisco IOS Mobile Wireless Commands

aaa-accounting

aaa-group

access-mode

access-point

access-point-name

access-type

access-violation deactivate-pdp-context

aggregate

anonymous user

block count

block-foreign-ms

cdma pdsn a10 ahdlc engine

cdma pdsn a10 gre sequencing

cdma pdsn a10 init-ppp-after-airlink-start airlink-start-timeout

cdma pdsn a10 max-lifetime

cdma pdsn a11 dormant ppp-idle-timeout send-termreq

cdma pdsn a11 mandate presence airlink-setup

cdma pdsn accounting local-timezone

cdma pdsn accounting send

cdma pdsn accounting send cdma-ip-tech

cdma pdsn accounting time-of-day

cdma pdsn age-idle-users

cdma pdsn cluster controller

cdma pdsn cluster controller session-high

cdma pdsn cluster controller session-low

cdma pdsn cluster member

cdma pdsn compliance iosv4.1 session-reference

cdma pdsn compliance is835a esn-optional

cdma pdsn failure-history

cdma pdsn ingress-address-filtering

cdma pdsn maximum pcf

cdma pdsn maximum sessions

cdma pdsn mobile-advertisement-burst

cdma pdsn msid-authentication

cdma pdsn retransmit a11-update

cdma pdsn secure cluster

cdma pdsn secure pcf

cdma pdsn selection interface

cdma pdsn selection keepalive

cdma pdsn selection load-balancing

cdma pdsn selection session-table-size

cdma pdsn send-agent-adv

cdma pdsn timeout a11-update

cdma pdsn timeout mobile-ip-registration

cdma pdsn virtual-template

clear cdma pdsn cluster controller session records age

clear cdma pdsn selection

clear cdma pdsn session

clear cdma pdsn statistics

clear gprs access-point statistics

clear gprs charging cdr

clear gprs gtp pdp-context

clear gprs gtp statistics

clear gprs gtp-director statistics

clear ip mobile host-counters

clear ip mobile secure

clear ip mobile visitor

clear ip rtp header-compression

clear ppp mux

clear radius local-server

crypto map (global IPSec)

dhcp-gateway-address

dhcp-server

dns primary

encapsulation gtp

gprs access-point-list

gprs canonical-qos best-effort bandwidth-factor

gprs canonical-qos gsn-resource-factor

gprs canonical-qos map tos

gprs canonical-qos premium mean-throughput-deviation


Cisco IOS Mobile Wireless Commands


This book documents all of the Cisco IOS software commands in Cisco IOS Release 12.3(11)T for the Gateway GPRS Support Node (GGSN), GTP Director Module (GDM), and Packet Data Serving Node (PDSN), in alphabetical order.

aaa-accounting

To enable or disable accounting for a particular access point on the GGSN, use the aaa-accounting access-point configuration command.

aaa-accounting [enable | disable | interim update]

Syntax Description

enable

(Optional) Enables accounting on the APN. When you configure an APN for non-transparent access, this is the default value.

disable

(Optional) Disables accounting on the APN. When you configure an APN for transparent access, this is the default value.

interim update

(Optional) Enables interim accounting records to be sent to an accounting server when a routing area update (resulting in an SGSN change) or QoS change has occurred.


Defaults

enable—For non-transparent APNs

disable—For transparent APNs

Interim accounting is disabled.

Command Modes

Access-point configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.2(8)YY

This command was incorporated in GGSN 3.1 and the ability to enable interim accounting records was added.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

You can configure AAA accounting services at an access point. However, for accounting to occur, you also must complete the configuration by specifying the following other configuration elements on the GGSN:

Enable AAA services using the aaa new-model global configuration command.

Define a server group with the IP addresses of the RADIUS servers in that group using the aaa group server global configuration command.

Configure the following AAA services:

AAA authentication using the aaa authentication global configuration command

AAA authorization using the aaa authorization global configuration command

AAA accounting using the aaa accounting global configuration command

Assign the type of services that the AAA server group should provide. If you only want the server group to support accounting services, then you need to configure the server for accounting only. You can assign the AAA services to the AAA server groups either at the GPRS global configuration level using the gprs default aaa-group command, or at the APN using the aaa-group command.

Configure the RADIUS servers using the radius-server host command.


Note For more information about AAA and RADIUS global configuration commands, see the Cisco IOS Security Command Reference.


You can verify whether AAA accounting services are configured at an APN using the show gprs access-point command.

There is not a no form of this command.

Enabling and Disabling Accounting Services for an Access Point

The Cisco Systems GGSN has different defaults for enabling and disabling accounting services for transparent and non-transparent access points:

If you configure an APN for non-transparent access using the access-mode command, the GGSN automatically enables accounting with authentication at the APN.

If you configure an APN for transparent access, which is the default access mode, the GGSN automatically disables accounting at the APN.

To selectively disable accounting at specific APNs where you do not want that service, use the aaa-accounting disable access-point configuration command.

Configuring Interim Accounting for an Access Point

Using the aaa-accounting interim access-point configuration command, you can configure the GGSN to send Interim-Update Accounting requests to the AAA server when a routing area update (resulting in an SGSN change) or QoS change has occurred for a PDP context. These changes are conveyed to the GGSN by an Update PDP Context request.


Note Interim accounting support requires that accounting services be enabled for the APN and that the aaa accounting update newinfo global configuration command be configured.


There is not a no form of this command.

Examples

Example 1

The following configuration example disables accounting at access-point 1:

interface virtual-template 1
 gprs access-point-list abc
!
gprs access-point-list abc
 access-point 1
  access-point-name gprs.pdn.com   access-mode non-transparent
  aaa-accounting disable

Example 2

The following configuration example enables accounting on transparent access-point 4. Accounting is disabled on access-point 5 because it is configured for transparent mode and the aaa-accounting enable command is not explicitly configured.

Accounting is automatically enabled on access-point 1 because it has been configured for non-transparent access mode. Accounting is explicitly disabled at access-point 3, because accounting is automatically enabled for non-transparent access mode.

An example of some of the AAA and RADIUS global configuration commands are also shown:

aaa new-model
!
aaa group server radius foo
 server 10.2.3.4
 server 10.6.7.8
aaa group server radius foo1
 server 10.10.0.1
aaa group server radius foo2
 server 10.2.3.4
 server 10.10.0.1
aaa group server foo3
 server 10.6.7.8
 server 10.10.0.1
!
aaa authentication ppp foo group foo
aaa authentication ppp foo2 group foo2
aaa authorization network default group radius
aaa accounting exec default start-stop group foo
aaa accounting network foo1 start-stop group foo1
aaa accounting network foo2 start-stop group foo2
!
gprs access-point-list gprs
 access-point 1
  access-mode non-transparent
  access-point-name www.pdn1.com
  aaa-group authentication foo
!
 access-point 3
  access-point-name www.pdn2.com
  access-mode non-transparent
  aaa-accounting disable
  aaa-group authentication foo
!
 access-point 4
  access-point-name www.pdn3.com
  aaa-accounting enable
  aaa-group accounting foo1
!
 access-point 5
  access-point-name www.pdn4.com
!
gprs default aaa-group authentication foo2
gprs default aaa-group accounting foo3
!
radius-server host 10.2.3.4 auth-port 1645 acct-port 1646 non-standard
radius-server host 10.6.7.8 auth-port 1645 acct-port 1646 non-standard
radius-server host 10.10.0.1 auth-port 1645 acct-port 1646 non-standard
radius-server key ggsntel

Related Commands

Command
Description

aaa accounting

Enables AAA accounting of requested services for billing or security purposes.

aaa authorization

Sets parameters that restrict user access to a network.

aaa group server

Groups different server hosts into distinct lists and distinct methods.

aaa-group

Specifies a RADIUS server group and assigns the type of AAA services to be supported by the server group for a particular access point on the GGSN.

gprs default aaa-group

Specifies a default RADIUS server group and assigns the type of AAA services to be supported by the server group for all access points on the GGSN.

radius-server host

Specifies a RADIUS server host.

show gprs access-point

Displays information about access points on the GGSN.


aaa-group

To specify a AAA server group and assign the type of AAA services to be supported by the server group for a particular access point on the GGSN, use the aaa-group access-point configuration command. To remove a AAA server group, use the no form of this command.

aaa-group {authentication | accounting} server-group

no aaa-group {authentication | accounting} server-group

Syntax Description

authentication

Assigns the selected server group for authentication services on the APN.

accounting

Assigns the selected server group for accounting services only on the APN.

server-group

Specifies the name of a AAA server group to be used for AAA services on the APN.

Note The name of the AAA server group that you specify must correspond to a server group that you configure using the aaa group server command.


Defaults

No default behavior or values.

Command Modes

Access-point configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

The Cisco Systems GGSN supports authentication and accounting at APNs using AAA server groups. By using AAA server groups, you gain the following benefits:

You can selectively implement groups of servers for authentication and accounting at different APNs.

You can configure different server groups for authentication services and accounting services in the same APN.

You can control which RADIUS services you want to enable at a particular APN, such as AAA accounting.

The GGSN supports the implementation of AAA server groups at both the global and access-point configuration levels. You can minimize your configuration by specifying the configuration that you want to support across most APNs, at the global configuration level. Then, at the access-point configuration level, you can selectively modify the services and server groups that you want to support at a particular APN. Therefore, you can override the AAA server global configuration at the APN configuration level.

To configure a default AAA server group to be used for all APNs on the GGSN, use the gprs default aaa-group global configuration command. To specify a different AAA server group to be used at a particular APN for authentication or accounting, use the aaa-group access-point configuration command.

If accounting is enabled on the APN, then the GGSN looks for an accounting server group to be used for the APN in the following order:

First, at the APN for an accounting server group—configured in the aaa-group accounting command.

Second, for a global GPRS default accounting server group—configured in the gprs default aaa-group accounting command.

Third, at the APN for an authentication server group—configured in the aaa-group authentication command.

Last, for a global GPRS default authentication server group—configured in the gprs default aaa-group authentication command.

If none of the above commands are configured on the GGSN, then AAA accounting is not performed.

If authentication is enabled on the APN, then the GGSN first looks for an authentication server group at the APN, configured in the aaa-group authentication command. If an authentication server group is not found at the APN, then the GGSN looks for a globally configured, GPRS default authentication server group, configured in the gprs default aaa-group authentication command.

To complete the configuration, you also must specify the following configuration elements on the GGSN:

Enable AAA services using the aaa new-model global configuration command.

Configure the RADIUS servers using the radius-server host command.

Define a server group with the IP addresses of the RADIUS servers in that group using the aaa group server global configuration command.

Configure the following AAA services:

AAA authentication using the aaa authentication global configuration command

AAA authorization using the aaa authorization global configuration command

AAA accounting using the aaa accounting global configuration command

Enable the type of AAA services (accounting and authentication) to be supported on the APN.

The GGSN enables accounting by default for non-transparent APNs.

You can enable or disable accounting services at the APN using the aaa-accounting command.

Authentication is enabled by default for non-transparent APNs. There is not any specific command to enable or disable authentication. Authentication cannot be enabled for transparent APNs.

You can verify the AAA server groups that are configured for an APN using the show gprs access-point command.


Note For more information about AAA and RADIUS global configuration commands, see the Cisco IOS Security Command Reference.


Examples

The following configuration example defines four AAA server groups on the GGSN: foo, foo1, foo2, and foo3, shown by the aaa group server commands.

Using the gprs default aaa-group command, two of these server groups are globally defined as default server groups: foo2 for authentication, and foo3 for accounting.

At access-point 1, which is enabled for authentication, the default global authentication server group of foo2 is overridden and the server group named foo is designated to provide authentication services on the APN. Notice that accounting services are not explicitly configured at that access point, but are automatically enabled because authentication is enabled. Because there is a globally defined accounting server-group defined, the server named foo3 will be used for accounting services.

At access-point 2, which is enabled for authentication, the default global authentication server group of foo2 is used. Because there is a globally defined accounting server-group defined, the server named foo3 will be used for accounting services.

At access-point 4, which is enabled for accounting using the aaa-accounting enable command, the default accounting server group of foo3 is overridden and the server group named foo1 is designated to provide accounting services on the APN.

Access-point 5 does not support any AAA services because it is configured for transparent access mode, and accounting is not enabled.

aaa new-model
!
aaa group server radius foo
 server 10.2.3.4
 server 10.6.7.8
aaa group server radius foo1
 server 10.10.0.1
aaa group server radius foo2
 server 10.2.3.4
 server 10.10.0.1
aaa group server foo3
 server 10.6.7.8
 server 10.10.0.1
!
aaa authentication ppp foo group foo
aaa authentication ppp foo2 group foo2
aaa authorization network default group radius
aaa accounting exec default start-stop group foo
aaa accounting network foo1 start-stop group foo1
aaa accounting network foo2 start-stop group foo2
aaa accounting network foo3 start-stop group foo3
!
gprs access-point-list gprs
 access-point 1
  access-mode non-transparent
  access-point-name www.pdn1.com
  aaa-group authentication foo
!
 access-point 2
  access-mode non-transparent
  access-point-name www.pdn2.com
!
 access-point 4
  access-point-name www.pdn4.com
  aaa-accounting enable
  aaa-group accounting foo1
!
 access-point 5
  access-point-name www.pdn5.com
!
gprs default aaa-group authentication foo2
gprs default aaa-group accounting foo3
!
radius-server host 10.2.3.4 auth-port 1645 acct-port 1646 non-standard
radius-server host 10.6.7.8 auth-port 1645 acct-port 1646 non-standard
radius-server host 10.10.0.1 auth-port 1645 acct-port 1646 non-standard
radius-server key ggsntel

Related Commands

Command
Description

aaa accounting

Enables AAA accounting of requested services for billing or security purposes.

aaa authorization

Sets parameters that restrict user access to a network.

aaa group server

Groups different server hosts into distinct lists and distinct methods.

aaa-accounting

Enables or disables accounting for a particular access point on the GGSN.

gprs default aaa-group

Specifies a default RADIUS server group and assigns the type of AAA services to be supported by the server group for all access points on the GGSN.

radius-server host

Specifies a RADIUS server host.

show gprs access-point

Displays information about access points on the GGSN.


access-mode

To specify whether the GGSN requests user authentication at the access point to a PDN, use the access-mode access-point configuration command. To remove an access mode and return to the default value, use the no form of this command.

access-mode {transparent | non-transparent}

no access-mode {transparent | non-transparent}

Syntax Description

transparent

Specifies that the users who access the PDN through the access point associated with the current virtual template are allowed access without authorization or authentication.

non-transparent

Specifies that the users who access the PDN through the current virtual template must be authenticated by the GGSN acting as a proxy for the authentication.


Defaults

transparent

Command Modes

Access-point configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

Use the access-mode command to specify whether users accessing a PDN through a particular access point associated with the virtual template interface have transparent or non-transparent access to the network.

Transparent access means that users who access the PDN through the current virtual template are granted access without further authentication.

Non-transparent access means that users who access the PDN through the current virtual template must be authenticated by the GGSN. You must configure non-transparent access to support RADIUS services at an access point. Authentication is performed by the GGSN while establishing the PDP context.

Examples

Example 1

The following example specifies non-transparent access to the PDN, gprs.pdn.com, through access-point 1:

interface virtual-template 1
 gprs access-point-list abc
!
gprs access-point-list abc
 access-point 1
  access-point-name gprs.pdn.com   access-mode non-transparent

Example 2

The following example specifies transparent access to the PDN, gprs.pdn2.com, through access-point 2:

interface virtual-template 1
 gprs access-point-list abc
!
gprs access-point-list abc
 access-point 2
  access-point-name gprs.pdn2.com


Note Because transparent is the default access mode, it does not appear in the output of the show running-configuration command for the access point.


Related Commands

Command
Description

aaa-group

Specifies a AAA server group and assigns the type of AAA services to be supported by the server group for a particular access point on the GGSN.

access-point

Specifies an access-point number and enters access-point configuration mode.

gprs default aaa-group

Specifies a default AAA server group and assigns the type of AAA services to be supported by the server group for all access points on the GGSN.


access-point

To specify an access point number and enter access-point configuration mode, use the access-point access-point list configuration command. To remove an access point number, use the no form of this command.

access-point access-point-index

no access-point access-point-index

Syntax Description

access-point-index

Integer from 1 to 65535 that identifies a GPRS access point.


Defaults

No default behavior or values.

Command Modes

Access-point list configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.


12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

Use the access-point command to create an access point to a PDN.

To configure an access point, first set up an access-point list using the gprs access-point-list command and then add the access point to the access-point list.

You can specify access point numbers in any sequence.


Note Memory constraints might occur if you define a large number of access points to support VPN Routing and Forwarding (VRF).


Examples

The following example configures an access point with an index number of 7 in an access-point-list named "abc" on the GGSN:

gprs access-point-list abc
 access-point 7

Related Commands

Command
Description

access-point-name

Specifies the network (or domain) name for a PDN that users can access from the GGSN at a defined access point.

gprs access-point-list

Configures an access point list that you use to define PDN access points on the GGSN.


access-point-name

To specify the network (or domain) name for a PDN that users can access from the GGSN at a defined access point, use the access-point-name access-point configuration command. To remove an access point name, use the no form of this command.

access-point-name apn-name

no access-point-name apn-name

Syntax Description

apn-name

Specifies the network or domain name of the private data network that can be accessed through the current access point.


Defaults

There is no default value for this command.

Command Modes

Access-point configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

Use the access-point-name command to specify the PDN name of a network that can be accessed through a particular access point. An access-point name is mandatory for each access point.

To configure an access point, first set up an access-point list using the gprs access-point-list command and then add the access point to the access-point list.

The access-point name typically is the domain name of the service provider that users access, for example, www.isp.com.

Examples

The following example specifies the access-point name for a network:

 access-point 1
  access-point-name www.isp.com
  exit

Related Commands

Command
Description

access-point

Specifies an access point number and enters access-point configuration mode.


access-type

To specify whether an access point is real or virtual on the GGSN, use the access-type access-point configuration command. To return to the default value, use the no form of this command.

access-type {virtual | real}

no access-type {virtual | real}

Syntax Description

virtual

Specifies an APN type that is not associated with any specific physical target network on the GGSN.

real

Specifies an APN type that corresponds to an external physical network to a PDN on the GGSN. This is the default value.


Defaults

real

Command Modes

Access-point configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

Use the access-type command to specify whether an access point is real or virtual on the GGSN. You only need to configure this command for virtual access types.

Virtual access types are used to configure virtual APN support on the Cisco Systems GGSN to minimize provisioning issues in other GPRS network entities that require configuration of APN information. Using the virtual APN feature on the Cisco Systems GGSN, HLR subscription data can simply provide the name of the virtual APN. User's can still request access to specific target networks that are accessible by the GGSN without requiring each of those destination APNs to be provisioned at the HLR.

The default keyword, real, identifies a physical target network that the GGSN can reach. Real APNs must always be configured on the GGSN to reach external networks. Virtual APNs can be configured in addition to real access points to ease provisioning in the GPRS PLMN.

No other access-point configuration commands are applicable if the access type is virtual.

Examples

The following example shows configuration of a virtual access point type and a real access point type:

 access-point 1
  access-point-name corporate
  access-type virtual
  exit
 access-point 2
  access-point-name corporatea.com
  ip-address-pool dhcp-client
  dhcp-server 10.21.21.1

Related Commands

Command
Description

access-point

Specifies an access point number and enters access-point configuration mode.

access-point-name

Specifies the network (or domain) name for a PDN that users can access from the GGSN at a defined access point.


access-violation deactivate-pdp-context

To specify that a user's session be ended and the user packets discarded when a user attempts unauthorized access to a PDN through an access point, use the access-violation deactivate-pdp-context command. To return to the default value, use the no form of this command.

access-violation deactivate-pdp-context

no access-violation deactivate-pdp-context

Syntax Description

This command has no arguments or keywords.

Defaults

The user's session remains active and the user packets are discarded.

Command Modes

Access-point configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW and the discard-packets option was removed.

12.2(8)YY

This command was incorporated in Cisco IOS Release 12.2(8)YY.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

Use the access-violation deactivate-pdp-context command to specify the action that is taken if a user attempts unauthorized access through the specified access point.

The default is that the GGSN simply drops user packets when an unauthorized access is attempted. However, if you specify access-violation deactivate-pdp-context, the GGSN terminates the user's session in addition to discarding the packets.

Examples

The following example shows deactivation of a user's access in addition to discarding the user packets:

 access-point 1
  access-point-name pdn.aaaa.com
  ip-access-group 101 in
  access-violation deactivate-pdp-context
  exit

Related Commands

Command
Description

access-point-name

Specifies the network (or domain) name for a PDN that users can access from the GGSN at a defined access point.


aggregate

To configure the GGSN to create an aggregate route in its IP routing table, when receiving PDP requests from MSs on the specified network, for a particular access point on the GGSN, use the aggregate access-point configuration command. To remove an aggregate route, use the no form of this command.

aggregate {auto | ip-network-prefix{/mask-bit-length | ip-mask}}

no aggregate {auto | ip-network-prefix{/mask-bit-length | ip-mask}}

Syntax Description

auto

IP address mask sent by the DHCP or RADIUS server is used by the access point for route aggregation.

ip-network-prefix

Dotted decimal notation of the IP network address to be used by the GGSN for route aggregation, in the format a.b.c.d.

/mask-bit-length

Number of bits (as an integer) that represent the network portion of the specified IP network address. A forward slash is required before the integer.

Note There is no space between the ip-network-prefix and the slash (/).

ip-mask

Dotted decimal notation of the IP network mask (in the format e.f.g.h.), which represents the network and host portion of the specified IP network address.


Defaults

No default behavior or values.

Command Modes

Access-point configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

The GGSN uses a static host route to forward user data packets received from the Gi interface to the Gn interface using the virtual template interface of the GTP tunnel.

Without the aggregate command or gprs default aggregate command, the GGSN creates a static host route for each PDP context. For example, for 45,000 PDP contexts supported, the GGSN creates 45,000 static host routes in its IP routing table.

You can use the aggregate command to reduce the number of static routes implemented by the GGSN for PDP contexts at a particular access point. The aggregate command allows you to specify an IP network prefix to combine the routes of PDP contexts from the same network as a single route on the GGSN.

To configure the GGSN to automatically aggregate routes that are returned by a DHCP or RADIUS server, use the aggregate auto command at the APN. Automatic route aggregation can be configured at the access-point configuration level only on the GGSN. The gprs default aggregate global configuration command does not support the auto option; therefore, you cannot configure automatic route aggregation globally on the GGSN.

You can specify multiple aggregate commands at each access point to support multiple network aggregates. However, if you use the aggregate auto command at the APN, you cannot specify any other aggregate route ranges at the APN. If you need to handle other static route cases at the APN, then you will have to use the gprs default aggregate global configuration command.

To globally define an aggregate IP network address range for all access points on the GGSN for statically derived addresses, you can use the gprs default aggregate command. Then, you can use the aggregate command to override this default address range at a particular access point.

The GGSN responds in the following manner to manage routes for MSs through an access point, when route aggregation is configured in the following scenarios:

No aggregation is configured on the GGSN, at the APN or globally—The GGSN inserts the 32-bit host route of the MS into its routing table as a static route.

A default aggregate route is configured globally, but no aggregation is configured at the APN:

If a statically or dynamically derived address for an MS matches the default aggregate route range, the GGSN inserts an aggregate route into its routing table.

If the MS address does not match the default aggregate route, the GGSN inserts the 32-bit host route as a static route into the routing table.

A default aggregate route is configured globally, and automatic route aggregation is configured at the APN:

If a statically derived address for an MS matches the default aggregate route range, the GGSN inserts an aggregate route into its routing table.

If a statically derived address for an MS does not match the default aggregate route, the GGSN inserts the 32-bit host route as a static route into its routing table.

If a dynamically derived address for an MS is received, the GGSN aggregates the route based on the address and mask returned by the DHCP or RADIUS server.

A default aggregate route is configured globally, and an aggregate route is also configured at the APN:

If a statically or dynamically derived address for an MS matches the aggregate range at the APN through which it was processed, or otherwise matches the default aggregate range, the GGSN inserts an aggregate route into its routing table.

If a statically or dynamically derived address for an MS does not match either the aggregate range at the APN, or the global default aggregate range, the GGSN inserts the 32-bit host route as a static route into its routing table.

Use care when assigning IP addresses to an MS before you configure the aggregation ranges on the GGSN. A basic guideline is to aggregate as many addresses as possible, but to minimize your use of aggregation with respect to the total amount of IP address space being used by the access point.


Note The aggregate command and gprs default aggregate commands affect routing on the GGSN. Use care when planning and configuring IP address aggregation.


Use the show gprs access-point command to display information about the aggregate routes that are configured on the GGSN. The aggregate output field appears only when aggregate routes have been configured on the GGSN, or the auto option is configured.

Use the show ip route command to verify whether the static route is in the current IP routing table on the GGSN. The static route created for any PDP requests (aggregated or non-aggregated) appears with the code "U" in the routing table indicating a per-user static route.


Note The show ip route command only displays a static route for aggregated PDP contexts if PDP contexts on that network have been created on the GGSN. If you configure route aggregation on the GGSN, but no PDP requests have been received for that network, the static route does not appear.


Examples

Example 1

The following example specifies two aggregate network address ranges for access point 8. The GGSN will create aggregate routes for PDP context requests received from MSs with IP addresses on the networks 172.16.0.0 and 10.0.0.0:

gprs access-point-list gprs
 access-point 8
   access-point-name pdn.aaaa.com
   aggregate 172.16.0.0/16
   aggregate 10.0.0.0/8


Note Regardless of the format in which you configure the aggregate command, the output from the show running-configuration command always displays the network in the dotted decimal/integer notation.


Example 2

The following example shows a route aggregation configuration for access point 8 using DHCP on the GGSN, along with the associated output from the show gprs gtp pdp-context all command and the show ip route commands.

Notice that the aggregate auto command is configured at the access point where DHCP is being used. The dhcp-gateway-address command specifies the subnet addresses to be returned by the DHCP server. This address should match the IP address of a loopback interface on the GGSN. In addition, to accommodate route aggregation for another subnet 10.80.0.0, the gprs default aggregate global configuration command is used.

In this example, the GGSN aggregates routes for dynamically derived addresses for MSs through access point 8 based upon the address and mask returned by the DHCP server. For PDP context requests received for statically derived addresses on the 10.80.0.0 network, the GGSN also implements an aggregate route into its routing table, as configured by the gprs default aggregate command.

interface Loopback0
 ip address 10.80.0.1 255.255.255.255
!
interface Loopback2
 ip address 10.88.0.1 255.255.255.255
!
gprs access-point-list gprs
 access-point 8
   access-point-name pdn.aaaa.com
   ip-address-pool dhcp-proxy-client
   aggregate auto
   dhcp-server 172.16.43.35
   dhcp-gateway-address 10.88.0.1
   exit
!
gprs default aggregate 10.80.0.0 255.255.255.0

In the following output for the show gprs gtp pdp-context all command, 5 PDP context requests are active on the GGSN for pdn.aaaa.com from the 10.88.0.0/24 network:

router# show gprs gtp pdp-context all
TID              MS Addr         Source  SGSN Addr       APN
6161616161610001 10.88.0.1       DHCP    172.16.123.1    pdn.aaaa.com
6161616161610002 10.88.0.2       DHCP    172.16.123.1    pdn.aaaa.com
6161616161610003 10.88.0.3       DHCP    172.16.123.1    pdn.aaaa.com
6161616161610004 10.88.0.4       DHCP    172.16.123.1    pdn.aaaa.com
6161616161610005 10.88.0.5       DHCP    172.16.123.1    pdn.aaaa.com

The following output for the show ip route command shows a single static route in the IP routing table for the GGSN, which routes the traffic for the 10.88.0.0/24 subnet through the virtual template (or Virtual-Access1) interface:

Router# show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter
area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

10.80.0.0/16 is subnetted, 1 subnets
C 10.80.0.0 is directly connected, Loopback0
10.113.0.0/16 is subnetted, 1 subnets
C 10.113.0.0 is directly connected, Virtual-Access1
172.16.0.0/16 is variably subnetted, 3 subnets, 3 masks
C 172.16.43.192/28 is directly connected, FastEthernet0/0
S 172.16.43.0/24 is directly connected, FastEthernet0/0
S 172.16.43.35/32 is directly connected, Ethernet2/3
10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
U 10.88.0.0/24 [1/0] via 0.0.0.0, Virtual-Access1
C 10.88.0.0/16 is directly connected, Loopback2

Related Commands

Command
Description

gprs default aggregate

Configures the GGSN to create an aggregate route in its IP routing table when receiving PDP requests from MSs on the specified network for any access point on the GGSN.

show gprs access-point

Displays information about access points on the GGSN.

show ip route

Displays all static IP routes, or those installed using the AAA route download function.


anonymous user

To configure anonymous user access at an access point, use the anonymous user access-point configuration command. To remove the username configuration, use the no form of this command.

anonymous user username [password]

no anonymous user username [password]

Syntax Description

username

Alphanumeric string identifying user. The username argument can be only one word. It can contain any combination of numbers and characters.

password

Alphanumeric string. The password argument can be only one word. It can contain any combination of numbers and characters.


Defaults

No default behavior or values.

Command Modes

Access-point configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

Use this command to allow a mobile station (MS) to access a non-transparent mode APN without supplying the username and password in the GTP protocol configuration option (PCO) information element (IE) of the create PDP context request message. The GGSN will use the username and password configured on the APN for the user session.

This command enables anonymous access, which means that a PDP context can be created by an MS to a specific host without specifying a username and password.

Examples

The following example specifies the username george and the password abcd123 for anonymous access at access point 49:

gprs access-point-list abc
 access-point 49
   access-point-name www.pdn.com
   anonymous user george abcd123

block count

To lock out group members for a length of time after a set number of incorrect passwords, use the block count command in local RADIUS server group configuration mode. To remove the user block after invalid login attempts, use the no form of this command.

block count count time {seconds | infinite}

no block count count time {seconds | infinite}

Syntax Description

count

Number of failed passwords that triggers a lockout.

time

Time that the lockout should last.

seconds

Number of seconds that the lockout should last.

infinite

Length of time for the lockout is indefinite until an administrator manually unblocks the locked username.


Defaults

No default behavior or values

Command Modes

Local RADIUS server group configuration

Command History

Release
Modification

12.2(11)JA

This command was introduced on Cisco Aironet Access Point 1100 and Cisco Aironet Access Point 1200.

12.3(11)T

This command was implemented on the following platforms: Cisco 2600XM, Cisco 2691, Cisco 2811, Cisco 2821, Cisco 2851, Cisco 3700, and Cisco 3800 series routers.


Usage Guidelines

If a setting of infinite is entered, an administrator must manually unblock the locked username.

Examples

The following command locks out group members for 120 seconds after 3 incorrect passwords are entered:

block count 3 time 120

Related Commands

Command
Description

clear radius local-server

Clears the statistics display or unblocks a user.

debug radius local-server

Displays the debug information for the local server.

group

Enters user group configuration mode and configures shared setting for a user group.

nas

Adds an access point or router to the list of devices that use the local authentication server.

radius-server host

Specifies the remote RADIUS server host.

radius-server local

Enables the access point or router to be a local authentication server and enters into configuration mode for the authenticator.

reauthentication time

Specifies the time (in seconds) after which access points or wireless-aware routers must reauthenticate the members of a group.

show radius local-server statistics

Displays statistics for a local network access server.

ssid

Specifies up to 20 SSIDs to be used by a user group.

user

Authorizes a user to authenticate using the local authentication server.

vlan

Specifies a VLAN to be used by members of a user group.


block-foreign-ms

To restrict GPRS access based on the mobile user's home PLMN, use the block-foreign-ms access-point configuration command. To disable blocking of foreign subscribers, use the no form of this command.

block-foreign-ms

no block-foreign-ms

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Access-point configuration

Command History

Release
Modification

12.2(8)YD

This command was introduced.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

The block-foreign-ms command enables the GGSN to block foreign MSs from accessing the GGSN.

When you use this command, the GGSN determines if an MS is inside or outside of the PLMN based on the mobile country code (MCC) and mobile network code (MNC). The MCC and MNC are specified using the gprs mcc mnc command.

Examples

The following example blocks access to foreign MSs at access point 49:

gprs access-point-list abc
 access-point 49
   access-point-name www.pdn.com
   block-foreign-ms

Related Commands

Command
Description

gprs mcc mnc

Configures the mobile country code and mobile network code that the GGSN uses to determine whether a create PDP context request is from a foreign MS.


cdma pdsn a10 ahdlc engine

To limit the number of Asynchronous High-Level Data Link Control (AHDLC) channel resources provided by the AHDLC engine, use the cdma pdsn a10 ahdlc engine command to in global configuration mode. To reset the number of AHDLC channel resources to the default, use the no form of this command.

cdma pdsn a10 ahdlc engine slot usable-channels usable-channels

no cdma pdsn a10 ahdlc engine slot usable-channels

Syntax Description

slot

Slot number of the AHDLC.

usable-channels usable-channels

Maximum number of channels that can be opened in the AHDLC engine. Valid values range between 0 and 8000 or 20000. Specifying 0 disables the engine.


Defaults

The default number of usable channels equals the maximum channels supported by the engine; the c-5 images supports 8000 sessions, and all c-6 image support 20000 sessions.

Command Modes

Global configuration

Command History

Release
Modification

12.2(2)XC

This command was introduced.

12.2(8)BY

The maximum number of usable channels was increased to 20000.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

If the value of usable-channels is greater than default maximum channels provided by the engine, the command will fail.

If the engine has any active channels, the command will fail.

Examples

The following example limits the number of service channels provided by the AHDLC engine to 1000:

cdma pdsn a10 ahdlc engine 0 usable-channels 1000

Related Commands

Command
Description

debug cdma pdsn a10 ahdlc

Displays debug messages for the AHDLC engine.

show cdma pdsn a10 ahdlc

Displays information about the AHDLC engine.

show cdma pdsn resource

Displays AHDLC resource information.


cdma pdsn a10 gre sequencing

To enable inclusion of Generic Routing Encapsulation (GRE) sequence numbers in the packets sent over the A10 interface, use the cdma pdsn gre sequencing command in global configuration mode. To disable the inclusion of GRE sequence number in the packets sent over the A10 interface, use the no form of this command.

cdma pdsn a10 gre sequencing

no cdma pdsn a10 gre sequencing

Syntax Description

This command has no arguments or keywords.

Defaults

GRE sequence numbers are included in the packets sent over the A10 interface.

Command Modes

Global configuration

Command History

Release
Modification

12.1(3)XS

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Examples

The following example instructs Cisco PDSN to include per-session GRE sequence numbers in the packets sent over the A10 interface:

cdma pdsn a10 gre sequencing

Related Commands

Command
Description

debug cdma pdsn a10 gre

Displays debug messages for A10 GRE interface errors.

show cdma pdsn pcf

Displays information about PCFs that have R-P tunnels to the PDSN.

show cdma pdsn

Displays the current status and configuration of the PDSN gateway.



cdma pdsn a10 init-ppp-after-airlink-start airlink-start-timeout

To configure the PDSN so that Point-to-Point Protocol (PPP) negotiation with an MN will start only after the traffic channel is assigned, ( inother words, after a Registration Request with airlink-start is received), use the cdma pdsn a10 init-ppp-after-airlink-start command in global configuration mode. Use the no form of this command to revert to the default behavior.

cdma pdsn a10 init-ppp-after-airlink-start airlink-start-timeout 1-120

no cdma pdsn a10 init-ppp-after-airlink-start airlink-start-timeout 1-120

Syntax Description

1-120

Sets the timeout interval before the session is torn down.


Defaults

By default, this CLI is not enabled, therefore, the PDSN will initiate PPP negotiation immediately after a Registration Reply is sent to the initial Registration.Request.

When enabled, the default timeout interval is 10 seconds.

Command Modes

Global configuration

Command History

Release
Modification

12.2(8)ZB4a

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

The PDSN initiates PPP negotiation immediately after a Registration Reply is sent to the initial Registration Request, but the calls (for which the PPP negotiation has started before the traffic channel is assigned to MN) have failed.

When this command is enabled, the PPP negotiation withthe MN will start only after the traffic channel is assigned—after a Registration Request with airlink-start is received. If the airlink start is not received at all, the session will be torn down when timeout occurs.By default, this timeout interval is 10 seconds, or can be configured through the CLI.

The session is not torn down immediately after the timeout, so, in order to minimize the impact on the performance, there is just one timer started to keep track of all the sessions waiting for airlink-start to start PPP.

For example, take the default of 10 seconds. If the timer expires at t1 and a new call comes at t2( t2 >t1), the next run of the timer will be at t1+10. It is likely that the uptime for the call is not more than 10 seconds since t2 > t1. So the call will be checked at the next next run (t1+10+10). That is , the variation is between 1 and 10.

Examples

The following example illustrates the cdma pdsn a10 init-ppp-after-airlink-start airlink-start-timeout command:

router# cdma pdsn a10 init-ppp-after-airlink-start airlink-start-timeout 20

cdma pdsn a10 max-lifetime

To specify the maximum A10 registration lifetime accepted, use the cdma pdsn a10 max-lifetime command in global configuration mode. To return to the default length of time, use the no form of this command.

cdma pdsn a10 max-lifetime seconds

no cdma pdsn a10 max-lifetime

Syntax Description

seconds

Maximum A10 registration lifetime accepted by Cisco PDSN. The range is 1 to 65535 seconds. The default is 1800 seconds.


Defaults

1800 seconds.

Command Modes

Global configuration

Command History

Release
Modification

12.1(3)XS

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Examples

The following example specifies that the A10 interface will be maintained for 1440 seconds:

cdma pdsn a10 max-lifetime 1440

Related Commands

Command
Description

cdma pdsn a10 gre sequencing

Enables GRE sequence number checking on packets received over the A10 interface.

debug cdma pdsn a10 gre

Displays debug messages for A10.

show cdma pdsn pcf

Displays information about PCFs that have R-P tunnels to the PDSN.

show cdma pdsn

Displays the current status and configuration of the PDSN gateway.



cdma pdsn a11 dormant ppp-idle-timeout send-termreq

To specify that for dormant sessions, on ppp idle timeout, ppp termreq will be sent, use the cdma pdsn all dormant ppp-idle-timeout send-termreq command in global configuration mode. To disble this feature, use the no form of this command.

cdma pdsn all dormant ppp-idle-timeout send-termreq

no cdma pdsn all dormant ppp-idle-timeout send-termreq

Syntax Description

There are no keywords or variable for this command.

Defaults

There are no default values.

Command Modes

Global configuration

Command History

Release
Modification

12.2(8)ZB

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

Disabling this behaviour will avoid traffic channel allocation for cleaning up ppp sessions at the mobile.

Examples

router# cdma pdsn a11 dormant ppp-idle-timeout send-termreq

cdma pdsn a11 mandate presence airlink-setup

To mandate that the initial RRQ should have Airlink-Setup in Acct CVSE from PCF, use the cdma pdsn all mandate presence airlink-setup command in global configuration mode. To disable this feature, use the no form of this command.

cdma pdsn a11 mandate presence airlink-setup

no cdma pdsn a11 mandate presence airlink-setup

Syntax Description

This command has no keywords or variables.

Defaults

There are no default values.

Command Modes

Global configuration

Command History

Release
Modification

12.2(8)ZB1

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

Issuing this command mandates that the initial RRQ should have Airlink-Setup in Acct CVSE from PCF. As a result, if this Airlink setup is not present in the RRQ, the session is not created, and a RRP with error code "86H - Poorly formed request" is returned.

If you do not configure this command, or disable it, then sessions can be opened even with no accounting CVSE being present in the initial RRQ.

Examples

router# cdma pdsn a11 mandate presence airlink-setup

cdma pdsn accounting local-timezone

To specify the local time stamp for PDSN accounting events, use the cdma pdsn accounting local-timezone command in global configuration mode. To return to the default Universal Time (UTC), use the no form of this command.

cdma pdsn accounting local-timezone

no cdma pdsn accounting local-timezone

Syntax Description

This command has no arguments or keywords.

Defaults

UTC time, a standard based on GMT, is enabled.

Command Modes

Global configuration

Command History

Release
Modification

12.1(5)XS

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

You must use the clock timezone hours-offset [minutes-offset] global configuration command to reflect the difference between local time and UTC time.

Examples

The following example sets the local time in Korea:

clock timezone KOREA 9
cdma pdsn accounting local-timezone

Related Commands

Command
Description

clock timezone

Specifies the hours and minutes (optional) difference between the local time zone and UTC.

cdma pdsn accounting send start-stop

Causes the PDSN to send:

An Accounting Stop record when it receives an active stop airlink record (dormant state)

An Accounting Start record when it receives an active start airlink record (active state)


cdma pdsn accounting send

To cause the PDSN to send accounting records when the call transitions between active and dormant states, use the cdma pdsn accounting send start-stop command in global configuration mode. To stop sending accounting records, use the no form of this command.

cdma pdsn accounting send {start-stop | cdma-ip-tech}

no cdma pdsn accounting send {start-stop | cdma-ip-tech}

Syntax Description

Command
Description

start-stop

Informs the PDSN when to begin sending accounting records and when to stop sending them.

cdma-ip-tech

Accounting records are generated with special IP-Tech number.


Defaults

No default behavior or values.

Command Modes

Global configuration

Command History

Release
Modification

12.2(2)XC

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

When this feature is enabled, the PDSN will send:

An Accounting Stop record when it receives an active stop airlink record (dormant state).

An Accounting Start record when it receives an active start airlink record (active state).

Examples

The following example starts sending PDSN accounting events:

cdma pdsn accounting send start-stop

Related Commands

Command
Description

cdma pdsn accounting local-timezone

Specifies the timestamp for PDSN accounting events.

cdma pdsn accounting time-of-day

Sets the accounting information for a specific time of day.

aaa accounting network pdsn start-stop group radius

Enables AAA accounting of requested services for billing or security purposes when you use RADIUS.


cdma pdsn accounting send cdma-ip-tech

To configure specific values for the F11 attribute for proxy Mobile IP and VPDN services, use the cdma pdsn accounting send cdma-ip-tech command in global configuration mode. To deconfigure those values, use the no form of this command.

cdma pdsn accounting send cdma-ip-tech [proxy-mobile-ip | vpdn]

no cdma pdsn accounting send cdma-ip-tech [proxy-mobile-ip | vpdn]

Syntax Description

Command
Description

proxy-mobile-ip

Sets the IP-Tech proxy-mobile-ip number. Values are 3-65535.

vpdn

Sets the IP-Tech vpdn number. Values are 3-65535.


Defaults

No default behavior or values.

Command Modes

Global configuration.

Command History

Release
Modification

12.1XC

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Examples

pdsn(config)#cdma pdsn accounting send cdma-ip-tech proxy-mobile-ip 3
pdsn(config)#cdma pdsn accounting send cdma-ip-tech vpdn 4

cdma pdsn accounting time-of-day

To set the accounting information for specified times during the day, use the cdma pdsn accounting time-of-day command in global configuration mode. To disable the specification, use the no form of this command.

cdma pdsn accounting time-of-day hh:mm:ss

no cdma pdsn accounting time-of-day

Syntax Description

hh:mm:ss

Hour:minutes:seconds.


Defaults

No default behavior or values.

Command Modes

Global configuration

Command History

Release
Modification

12.1(5)XS

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

This command is used to facilitate billing when a user is charged different prices based upon the time of the day. Up to ten different accounting triggers can be configured.

Examples

The following example sets an accounting trigger for 13:30:20:

cdma pdsn accounting time-of-day 13:30:30

Related Commands

Command
Description

clock set

Sets the system clock.

debug cdma pdsn accounting time-of-day

Displays debug information for the command.

show clock

Displays the system clock.

cdma pdsn accounting send start-stop

Causes the PDSN to send:

An Accounting Stop record when it receives an active stop airlink record (dormant state)

An Accounting Start record when it receives an active start airlink record (active state)


cdma pdsn age-idle-users

To configure the aging of idle users, use the cdma pdsn age-idle-users command. To stop aging out idle users, use the no form of this command.

cdma pdsn age-idle-users [minimum-age value]

no cdma pdsn age-idle-users

Syntax Description

minimum-age value

(Optional) The minimum number of seconds a user should be idle before they are a candidate for being aged out. Possible values are 1 through 65535.


Defaults

By default, no idle users are aged out.

Command Modes

Global configuration

Command History

Release
Modification

12.2(2)XC

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

If no value is specified, the user that has been idle the longest will be aged out. If an age is specified and the user that has been idle the longest has not been idle for the specified value, then no users are aged out.

Examples

The following example sets a minimum age out value of 5 seconds:

cdma pdsn age-idle-users minimum-age 5

cdma pdsn cluster controller

To configure the PDSN to operate as a cluster controller, and to configure various parameters on the cluster controller, use the cdma pdsn cluster controller command. To disable certain cluster controller parameters, use the no form of this command.

cdma pdsn cluster controller [ interface interface-name | timeout seconds [window number] | window number ]

no cdma pdsn cluster controller [ interface interface-name | timeout seconds [window number] | window number ]

Syntax Description

interface

Interface name on which the cluster controller has IP connectivity to the cluster members.

timeout

The time the cluster controller waits to seek a member when there is no reply from that cluster member. The range is between 10 and 300 seconds, and the default value is 300 seconds.

window number

The number of sequential seek messages sent to a cluster member before it is presumed offline.


Defaults

The timeout default value is 300 seconds.

Command Modes

Global configuration

Command History

Release
Modification

12.2(2)XC

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Examples

The following example enables the cdma cluster controller:

cdma pdsn cluster controller interface FastEthernet1/0

cdma pdsn cluster controller session-high

To generate an alarm when the controller reaches the upper threshold of the maximum number of sessions it can handle, use the cdma pdsn cluster member session-high command. To disable this feature, use the no form of this command.

cdma pdsn cluster controller session-high 1-1000000

no cdma pdsn cluster controller session-high 1-1000000

Syntax Description

1-1000000

The threshold of the maximum number of sessions the controller can handle.


Defaults

The range is 1-1000000. The configured value should be more than the lower threshold value. The default value is 200000.

Command Modes

Global configuration

Command History

Release
Modification

12.2(8)ZB1

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

You should take into account the number of members in the cluster when you configure the high threshold. For example, if there are only 2 members in the cluster, the high threshold should be less than 40000.

Examples

The following example illustrates the cdma pdsn cluster contoller session-high command:

Received SNMPv1 Trap:
Community: public
Enterprise: cCdmaPdsnMIBNotifPrefix
Agent-addr: 9.15.72.15
Enterprise Specific trap.
Enterprise Specific trap: 8
Time Ticks: 9333960
cCdmaServiceAffectedLevel.0 = major(3)
cCdmaClusterSessHighThreshold.0 = 50

cdma pdsn cluster controller session-low

To generate an alarm when the controller reaches the lower threshold of the sessions (hint to NOC that the system is being under utilized), use the cdma pdsn cluster member session-low command. To disable this feature, use the no form of this command.

cdma pdsn cluster controller session-low 1-1000000

no cdma pdsn cluster controller session-low 1-1000000

Syntax Description

1-1000000

The threshold of the maximum number of sessions the controller can handle.


Defaults

The range is 0-999999. The configured value should be less than the upper threshold value. The default value is 190000.

Command Modes

Global configuration

Command History

Release
Modification

12.2(8)ZB1

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

You should take into account the number of members in the cluster when you configure the low threshold.

Examples

The following example illustrates the cdma pdsn cluster contoller session-low command:

Received SNMPv1 Trap:
Community: public
Enterprise: cCdmaPdsnMIBNotifPrefix
Agent-addr: 9.15.72.15
Enterprise Specific trap.
Enterprise Specific trap: 9
Time Ticks: 9330691
cCdmaServiceAffectedLevel.0 = major(3)
cCdmaClusterSessLowThreshold.0 = 10

cdma pdsn cluster member

To configure the PDSN to operate as a cluster member, and to configure various parameters on the cluster member, use the cdma pdsn cluster member command. To disable certain cluster controller parameters, use the no form of this command.

cdma pdsn cluster member [ controller ipaddr | interface interface-name | prohibit type | timeout seconds [window number] | window number ]

no cdma pdsn cluster member [ controller ipadd | interface interface-name | timeout seconds [window number] | window number ]

Syntax Description

controller ipaddr

The controller that a specific member is connected to, identified by the controller's IP address.

interface

Interface name on which the cluster controller has IP connectivity to the cluster members.

prohibit

The type of traffic that the member is allowed to handle, or is prohibited from handling. Administratively prohibits member from accepting new data sessions within the cluster framework.

timeout

The time the cluster controller waits to seek a member when there is no reply from that cluster member. The range is between 10 and 600 seconds, and the default value is 300 seconds.

window number

The number of sequential seek messages sent to a cluster member before it is presumed offline.


Defaults

The default timeout value for the cluster member is 300 seconds.

Command Modes

Global configuration

Command History

Release
Modification

12.2(2)XC

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

The prohibit field enables a member to administratively rid itself of its load without service interruption. When enabled, the member is no longer given any new data sessions by the controller.

Examples

The following example enables a cdma pdsn cluster member:

cdma pdsn cluster member interface FastEthernet1/0

cdma pdsn compliance iosv4.1 session-reference

3GPP2 IOS version 4.2 mandates that the Session Reference ID in the A11 Registration Request is always set to 1. To configure the PDSN to interoperate with a PCF that is not compliant with 3GPP2 IOS version 4.2, use the cdma pdsn compliance iosv4.1 session-reference command inGlobal configuration mode. To disable this configuration, use the no form of this command.

cdma pdsn compliance iosv4.1 session-reference

no cdma pdsn compliance iosv4.1 session-reference

Syntax Description

This command has no arguments or keywords.

Defaults

Session Reference ID set to 1 in the A11 registration Request is on by default.

Command Modes

Global configuration.

Command History

Release
Modification

12.2(8)BY1

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Examples

The following command instructs the PDSN to skip any checks done on the session reference id of incoming Registration Requests to ensure that they are set to 1.

router # cdma pdsn compliance iosv4.1 session-reference

Related Commands

Command
Description

debug cdma pdsn a11

Displays debug messages for A11 interface errors, events, and packets.


cdma pdsn compliance is835a esn-optional

To send an ESN value in accounting packets to the RADIUS server only if it has received an ESN value (A2) in the A11 RRQ from PCF, use the cdma pdsn compliance is835 esn-optional command in global configuration mode. To disable the specification, use the no form of this command.

cdma pdsn compliance is835 esn-optional

no cdma pdsn compliance is835 esn-optional

Syntax Description

There are no keywords or arguments for this command.

Defaults

The default behavior is to send the ESN attribute in all accounting records..

Command Modes

Global configuration

Command History

Release
Modification

12.2(8)ZB4

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

If no A2 is received in the RRQ, the PDSN will not send the ESN attribute in the accounting record. This behavior is in accordance to IS835A.

If this command is not configured, the PDSN will send the ESN value regardless whether the A2 attribute value is received from PCF or not. This is in accordance to IS835B.

cdma pdsn failure-history

To configure CDMA PDSN SNMP session failure history size, use the cdma pdsn failure-history command in global configuration mode. To return to the default length of time, use the no form of this command.

cdma pdsn failure-history entries

no cdma pdsn failure-history

Syntax Description

entries

Maximum number of entries that can be recorded in the SNMP session failure table. Possible values are 0 through 2000.


Defaults

No default behavior or values.

Command Modes

Global configuration

Command History

Release
Modification

12.1(3)XS

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Examples

The following example specifies that 1000 is the maximum number of entries that can be recorded in the SNMP session table:

cdma pdsn failure-history 1000

Related Commands

Command
Description

snmp-server enable traps cdma

Specifies the community access string to permit access to the SNMP protocol.

show cdma pdsn

Displays the current status and configuration of the PDSN gateway.


cdma pdsn ingress-address-filtering

To enable ingress address filtering, use the cdma pdsn ingress-address-filtering command in global configuration mode. To disable ingress address filtering, use the no form of this command.

cdma pdsn ingress-address-filtering

no cdma pdsn ingress-address-filtering

Syntax Description

This command has no arguments or keywords.

Defaults

Ingress address filtering is disabled.

Command Modes

Global configuration

Command History

Release
Modification

12.1(3)XS

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

When this command is configured, the PDSN checks the source IP address of every packet received on the PPP link from the mobile station. If the address is not associated with the PPP link to the mobile station and is not an MIP RRQ or Agent Solicitation, then the PDSN discards the packet and sends a request to reestablish the PPP link.

Examples

The following example enables ingress address filtering:

cdma pdsn ingress-address-filtering

Related Commands

Command
Description

show cdma pdsn

Displays the current status and configuration of the PDSN gateway.

show cdma pdsn session

Displays the session information on the PDSN.


cdma pdsn maximum pcf

To set the maximum number of PCFs that can connect to a PDSN, use the cdma pdsn maximum pcf command in global configuration mode. To disable a configured limit, use the no form of this command.

cdma pdsn maximum pcf maxpcf

no cdma pdsn maximum pcf

Syntax Description

maxpcf

Maximum number of PCFs that can communicate with a PDSN. Possible values are 1 through 2000.


Defaults

No default behavior or values.

Command Modes

Global Configuration

Command History

Release
Modification

12.1(3)XS

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

If no maximum number of PCFs is configured, the only limitation is the amount of memory.

You can configure the maximum PCFs to be less than the existing PCFs. As a result, when you issue the show cdma pdsn command, you may see more existing PCFs than the configured maximum. It is the responsibility of the user to bring down the existing PCFs to match the configured maximum.

Examples

The following example specifies that 200 PCFs can be sent:

cdma pdsn maximum pcf 200

Related Commands

Command
Description

show cdma pdsn

Displays the current status and configuration of the PDSN gateway.


cdma pdsn maximum sessions

To set the maximum number of mobile sessions allowed on a PDSN, use the cdma pdsn maximum sessions command in global configuration mode. To disable a configured limit, use the no form of this command.

cdma pdsn maximum sessions maxsessions

no cdma pdsn maximum sessions

Syntax Description

maxsessions

Maximum number of mobile sessions allowed on a PDSN. Possible values depend on which image you are using.


Defaults

The c-5 images support 8000 sessions, and the c-6 images support 20000 sessions.

Command Modes

Global Configuration.

Command History

Release
Modification

12.1(3)XS

This command was introduced.

12.2(8)BY

The maximum number of mobile sessions was raised to 20000.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

If PDSN runs out of resources before the configured number is reached, then PDSN will reject the creation of further sessions.

You can configure the maximum sessions to be less than the existing sessions. As a result, when you issue the show cdma pdsn command, you may see more existing sessions than the configured maximum. It is the responsibility of the user to bring down the existing sessions to match the configured maximum.

Examples

The following example sets the maximum number of mobile sessions to 100:

cdma pdsn maximum sessions 100

Related Commands

Command
Description

show cdma pdsn session

Displays PDSN session information.


cdma pdsn mobile-advertisement-burst

To configure the number and interval of Agent Advertisements that a PDSN FA can send, use the cdma pdsn mobile-advertisement-burst command in interface configuration mode. To reset the configuration to the defaults, use the no form of this command.

cdma pdsn mobile-advertisement-burst {number value | interval msec}

no cdma pdsn mobile-advertisement-burst {number | interval}

Syntax Description

number value

The number of agent advertisements. Possible values are 1 through 10. The default is 5.

interval msec

Specifies the interval, in milliseconds, between advertisements. Possible values are 50 through 500. The default is 200 milliseconds.


Defaults

The default number of agent advertisements to send is 5.

The default interval between advertisements is 200 milliseconds.

Command Modes

Interface Configuration.

Command History

Release
Modification

12.2(2)XC

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

You must specify at least one of the optional parameters. Otherwise, the command has no effect. When virtual-access interfaces are created from the virtual template, default values will be used for any parameters not already configured on the virtual template.

This command should be configured on virtual templates only, and only when PDSN service is configured.

Examples

The following example configures PDSN FA advertisement:

 cdma pdsn mobile-advertisement-burst number 10 interval 500

Related Commands

Command
Description

ip mobile foreign-service challenge

Configures the challenge timeout value and the number of valid recently-sent challenge values.

ip mobile foreign-service challenge forward-mfce

Enables the FA to forward MFCE and mobile station-AAA to the HA.


cdma pdsn msid-authentication

To enable MSID-based authentication and access, use the cdma pdsn msid-authentication command in global configuration mode. To disable MSID-based authentication and access, use the no form of this command.

cdma pdsn msid-authentication [close-session-on-failure][imsi number] [irm number] [min number] [profile-password password]

no cdma pdsn msid-authentication

Syntax Description

close-session-on-failure

Closes the session if authorization fails.

imsi number

(Optional) The number digits from the International Mobile Station Identifier (IMSI) that are to be used as the User-Name in the Access-Request for MSID authentication. Possible values are 1 to 15. The default is 5.

irm number

(Optional) International Roaming Mobile Identification Number and the identifier used to retrieve the network profile from the RADIUS server. Possible values are 1 through 10. The default is 4.

min number

(Optional) Mobile Identification Number and the identifier used to retrieve the network profile from the RADIUS server. Possible values are 1 through 10. The default is 6.

profile-password password

(Optional) The AAA server access password for MSID-based authentication. The default is "cisco".


Defaults

MSID authentication is disabled. When enabled, the default values are as follows:

imsi: 5

irm: 4

min: 6

profile-password: cisco

Command Modes

Global Configuration.

Command History

Release
Modification

12.1(3)XS

This command was introduced.

12.2(2)XC

The profile-password keyword was added.

12.2(8)ZB1

The close-session-on-failure keyword was added

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

MSID authentication provides Simple IP service for mobile stations that do not negotiate CHAP or PAP. Cisco PDSN retrieves a network profile based on the MSID from the RADIUS server. The network profile should include the internet realm of the home network that owns the MSID. Cisco PDSN constructs the NAI from the MSID and the realm. The constructed NAI is used in generated accounting records. If the PDSN is unable to obtain the realm, then it denies service to the mobile station.

The identifier used to retrieve the network profile from the RADIUS server depends on the format of the MSID, which can be one of the following:

International Mobile Station Identity (IMSI)

Mobile Identification Number (MIN)

International Roaming MIN (IRM)

If the mobile station uses IMSI, the default identifier that PDSN uses to retrieve network profile is of the form IMSI-nnnnn where nnnnn is the first five digits of the IMSI. The number of digits from the IMSI to be used can be configured using the command cdma pdsn msid-authentication imsi.

If the mobile station uses MIN, the default identifier that PDSN uses to retrieve network profile is of the form MIN-nnnnnn where nnnnnn is the first six digits of the MIN. The number of digits from the MIN to be used can be configured using the command cdma pdsn msid-authentication min.

If the mobile station uses IRM, the default identifier that PDSN uses to retrieve network profile is of the form IRM-nnnn where nnnn is the first four digits of the IRM. The number of digits from the IRM to be used can be configured using the command cdma pdsn msid-authentication irm.

The realm should be defined in the network profile on the RADIUS user with the Cisco AVPair attribute cdma:cdma-realm.

Examples

The following example enables MSID-based authentication and access:

cdma pdsn msid-authentication profile-password test1

Related Commands

Command
Description

show cdma pdsn

Displays the current status and configuration of the PDSN gateway.


cdma pdsn retransmit a11-update

To specify the maximum number of times an A11 Registration Update message is retransmitted, use the cdma pdsn retransmit a11-update command in global configuration mode. To return to the default of 5 retransmissions, use the no form of this command.

cdma pdsn retransmit a11-update number

no cdma pdsn retransmit a11-update

Syntax Description

number

Maximum number of times an A11 Registration Update message is retransmitted. Possible values are 0 through 9. The default is 5 retransmissions.


Defaults

5 retransmissions.

Command Modes

Global Configuration

Command History

Release
Modification

12.1(3)XS

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

PDSN may initiate the release of an A10 connection by sending an A11 Registration Update message to the PCF. In this case, the PCF is expected to send an A11 Registration Acknowledge message followed by an A11 Registration Request with Lifetime set to 0. If PDSN does not receive an A11 Registration Acknowledge or an A11 Registration Request with Lifetime set to 0, or if it receives an A11 Registration Acknowledge message with an update denied status, PDSN retransmits the A11 Registration Update. The number of retransmissions is 5 by default and is configurable using this command.

Examples

The following example specifies that A11 Registration Update messages will be retransmitted a maximum of 9 times:

cdma pdsn retransmit a11-update 9

Related Commands

Command
Description

cdma pdsn timeout a11-update

Specifies A11 Registration Update message timeout.

debug cdma pdsn a11

Displays debug messages for A11 interface errors, events, and packets.

show cdma pdsn

Displays the current status and configuration of the PDSN gateway.


cdma pdsn secure cluster

To configure one common security association for all PDSNs in a cluster, use the cdma pdsn secure cluster command. To remove this configuration, use the no form of the command.

cdma pdsn secure cluster default spi {value | inbound value outbound value} key {hex | ascii} string

no cdma pdsn secure cluster

Syntax Description

default

Specifies this is the default security configuration.

spi value

Security parameter index (SPI) used for authenticating packets. Possible values are 0x100 through 0xffffffff.

inbound value outbound value

Inbound and outbound SPI.

key {hex | ascii} string

String of ascii or hexadecimal values. No spaces are allowed.


Defaults

No default behavior or values.

Command Modes

Global Configuration

Command History

Release
Modification

12.2(2)XC

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

The SPI is the 4-byte index that selects the specific security parameters to be used to authenticate the peer. The security parameters consist of the authentication algorithm and mode, replay attack protection method, timeout, and IP address.

Examples

The following example shows a security association for a cluster of PDSNs:

cdma pdsn secure cluster spi 100 key hex 12345678123456781234567812345678

Related Commands

Command
Description

ip mobile secure

Configures the mobility security associations for mobile host, mobile visitor, foreign agent, home agent, or proxy mobile host.

cdma pdsn secure pcf

Configures the security association for one or more PCFs or the default security association for all PCFs.


cdma pdsn secure pcf

To configure the security association for one or more PCFs or the default security association for all PCFs, use the cdma pdsn secure pcf command. To remove this configuration, use the no form of the command.

cdma pdsn secure pcf {lower [upper] | default} spi {value | inbound value outbound value} key {hex | ascii} string [local-timezone]

no cdma pdsn secure pcf

Syntax Description

lower [upper]

Range of mobile host or mobile node group IP addresses. The upper end of the range is optional.

default

Specifies this is the default security configuration.

spi value

Security parameter index (SPI) used for authenticating packets. Possible values are 0x100 through 0xffffffff.

inbound value outbound value

Inbound and outbound SPI.

key {hex | ascii} string

String of ascii or hexadecimal values. No spaces are allowed.

local-timezone

Adds local timezone support for R-P messages. If this keyword is enabled, the timestamp sent in the R-P messages will contain the timestamp of the local timezone..


Defaults

There are no default behavior or values.

Command Modes

Global Configuration

Command History

Release
Modification

12.2(2)XC

This command was introduced.

12.2(8)BY1

The local-timezone keyword was added.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

The SPI is the 4-byte index that selects the specific security parameters to be used to authenticate the peer. The security parameters consist of the authentication algorithm and mode, replay attack protection method, timeout, and IP address.

You can configure several explicit and default secure PCF entries. (An explicit entry being one in which the IP address of a PCF is specified.) When the PDSN receives an A11 message from a PCF, it attempts to match the message to a secure PCF entry as follows:

The PDSN first checks the explicit entries and attempts to find a match based on the SPI value and the key.

If a match is found, the message is accepted. If no match is found, the PDSN checks the default entries (again attempting to match the SPI and the key).

If a match is found, the message is accepted. If no match is found, the message is discarded and an error message is generated.

When the PDSN receives a request from a PCF, it performs an identity check. As part of this check, the PDSN compares the timestamp of the request to its own local time and determines whether the difference is within a specified range. This range is determined by the replay time window. If the difference between the timestamp and the local time is not within this range, a request rejection message is sent back to the PCF along with the value of PDSN's local time.

Examples

The following example shows PCF 20.0.0.1, which has a key that is generated by the MD5 hash of the string:

cdma pdsn secure pcf 20.0.0.1 spi 100 key hex 12345678123456781234567812345678

The following example configures a global default replay time of 60 seconds for all PCFs and all SPIs:

cdma pdsn secure pcf default replay 60

The following example configures a default replay time of 30 seconds for a specific SPI applicable to all PCFs:

cdma pdsn secure pcf default spi 100 key ascii cisco replay 30

The following example configures a replay time of 45 seconds for a specific PCF/SPI combination:

cdma pdsn secure pcf 192.168.105.4 spi 200 key ascii cisco replay 45

Related Commands

Command
Description

ip mobile secure

Configures the mobility security associations for mobile host, mobile visitor, foreign agent, home agent, or proxy mobile host.

cdma pdsn secure cluster

Configures one common security association for all PDSNs in a cluster.


cdma pdsn selection interface

To configure the interface used to send and receive PDSN selection messages, use the cdma pdsn selection interface command in global configuration mode. To remove the configuration, use the no form of the command.

cdma pdsn selection interface interface_name

no cdma pdsn selection interface

Syntax Description

interface_name

Name (type and number) of the interface that is connected to the LAN to be used to exchange PDSN selection messages with the other PDSNs in the cluster.


Defaults

No default behavior or values.

Command Modes

Global Configuration

Command History

Release
Modification

12.1(3)XS

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

Each PDSN in a cluster maintains information about the mobile stations connected to the other PDSNs in the cluster. All PDSNs in the cluster exchange this information using periodic multicast messages. For this reason, all PDSNs in the cluster should be connected to a shared LAN.

This command identifies the interface on the PDSN that is connected to the LAN used for sending and receiving PDSN selection messages.

The Intelligent PDSN Selection feature will not work if you do not configure this interface on each PDSN in the cluster.

Examples

The following example specifies that the FastEthernet0/1 interface should be used for sending and receiving PDSN selection messages:

cdma pdsn selection interface FastEthernet0/1

Related Commands

Command
Description

cdma pdsn selection keepalive

Specifies the keepalive time.

cdma pdsn selection load-balancing

Enables the load-balancing function of the intelligent PDSN selection feature.

cdma pdsn selection session-table-size

Defines the size of the selection session database.


cdma pdsn selection keepalive

To configure the intelligent PDSN selection keepalive feature, use the cdma pdsn selection keepalive command in global configuration mode. To disable the feature, use the no form of this command.

cdma pdsn selection keepalive value

no cdma pdsn selection keepalive

Syntax Description

value

The keepalive value, in seconds. Possible values are 5 through 60.


Defaults

No default behavior or values.

Command Modes

Global Configuration

Command History

Release
Modification

12.1(3)XS

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Examples

The following example configures a keepalive value of 200 seconds:

cdma pdsn selection keepalive 200

Related Commands

Command
Description

cdma pdsn selection load-balancing

Enables the load-balancing function of the intelligent PDSN selection feature.

cdma pdsn selection session-table-size

Defines the size of the selection session database.

show cdma pdsn selection

Displays the PDSN selection session table.


cdma pdsn selection load-balancing

To enable the load-balancing function of the intelligent PDSN selection feature, use the cdma pdsn selection load-balancing command in global configuration mode. To disable the load-balancing function, use the no form of this command.

cdma pdsn selection load-balancing [threshold val [alternate]]

no cdma pdsn selection load-balancing

Syntax Description

threshold val

(Optional) The maximum number of sessions that can be load-balanced. Possible values are 1 through 20000. The default session threshold is 100.

alternate

(Optional) The Alternate option alternately suggests two other PDSNs with the least load.


Defaults

The threshold value is 100 sessions.

Command Modes

Global Configuration

Command History

Release
Modification

12.1(3)XS

This command was introduced.

12.2(8)BY

The maximum number of sessions that can be load-balanced was raised to 20000.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

You must enable PDSN selection session-table-size first. If sessions in a PDSN go beyond the threshold, PDSN selection will redirect the PCF to the PDSN that has less of a load.

Examples

The following example configures load-balancing with an advertisement interval of 2 minutes and a threshold of 50 sessions:

cdma pdsn selection load-balancing advertisement 2 threshold 50

Related Commands

Command
Description

cdma pdsn selection session-table-size

Defines the size of the selection session database.

show cdma pdsn session

Displays PDSN session information.


cdma pdsn selection session-table-size

In PDSN selection, a group of PDSNs maintains a distributed session database. To define the size of the database, use the cdma pdsn selection session-table-size command in global configuration mode. To disable PDSN selection, use the no form of this command.

cdma pdsn selection session-table-size size

no cdma pdsn selection session-table-size

Syntax Description

size

Session table size. Possible values are 2000 through 100000.


Defaults

PDSN selection is disabled.

The default session table size is undefined.

Command Modes

Global Configuration

Command History

Release
Modification

12.1(3)XS

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Examples

The following example sets the size of the distributed session database to 5000 sessions:

cdma pdsn selection session-table-size 5000

Related Commands

Command
Description

cdma pdsn selection load-balancing

Enables the load-balancing function of PDSN selection.

show cdma pdsn session

Displays PDSN session information.


cdma pdsn send-agent-adv

To enable agent advertisements to be sent over a newly formed PPP session with an unknown user class that negotiates IPCP address options, use the cdma pdsn send-agent-adv command in global configuration mode. To disable the sending of agent advertisements, use the no form of this command.

cdma pdsn send-agent-adv

no cdma pdsn send-agent-adv

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

Global Configuration

Command History

Release
Modification

12.2(2)XC

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

This command is used with multiple flows.

Examples

The following example enables agent advertisements to be sent:

cdma pdsn send-agent-adv

Related Commands

Command
Description

show cdma pdsn

Displays the current status and configuration of the PDSN gateway.


cdma pdsn timeout a11-update

To specify a A11 Registration Update message timeout, use the cdma pdsn timeout a11-update command in global configuration mode. To return to the default of 1 second, use the no form of this command.

cdma pdsn timeout a11-update seconds

no cdma pdsn timeout a11-update

Syntax Description

seconds

Maximum A11 Registration Update message timeout value, in seconds. Possible values are 0 through 5. The default is 1 second.


Defaults

1 second.

Command Modes

Global Configuration

Command History

Release
Modification

12.1(3)XS

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

PDSN may initiate the release of an A10 connection by sending an A11 Registration Update message to the PCF. In this case, the PCF is expected to send an A11 Registration Acknowledge message followed by an A11 Registration Request with Lifetime set to 0. If PDSN does not receive an A11 Registration Acknowledge or an A11 Registration Request with Lifetime set to 0, PDSN times out and retransmits the A11 Registration Update. The default timeout is 1 second and is configurable using this command.

Examples

The following example specifies an A11 Registration Update message timeout value of 5 seconds:

cdma pdsn timeout a11-update 5

Related Commands

Command
Description

cdma pdsn retransmit a11-update

Specifies the maximum number of times an A11 Registration Update message will be retransmitted.

debug cdma pdsn a11

Displays debug messages for A11 interface errors, events, and packets.

show cdma pdsn

Displays the current status and configuration of the PDSN gateway.


cdma pdsn timeout mobile-ip-registration

To set the timeout value before which Mobile IP registration should occur for a user skipping the PPP authentication, use the cdma pdsn timeout mobile-ip-registration command in global configuration mode. To return to the default 5-second timeout, use the no version of the command.

cdma pdsn timeout mobile-ip-registration timeout

no cdma pdsn timeout mobile-ip-registration

Syntax Description

timeout

Time, in seconds. Possible values are 1 through 60. The default is 5 seconds.


Defaults

5 seconds.

Command Modes

Global Configuration

Command History

Release
Modification

12.1(3)XS

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

A CDMA data user using Mobile IP will skip authentication and authorization during PPP and perform those tasks through Mobile IP registration. In order to secure the network, the traffic is filtered. The only packets allowed through the filter are the Mobile IP registration messages. As an additional protection, if the Mobile IP registration does not happen within a defined time, the PPP link is terminated.

Examples

The following example sets the timeout value for Mobile IP registration to 15 seconds:

cdma pdsn mobile-ip-timeout 15

Related Commands

Command
Description

show ip mobile interface

Displays information about interfaces that are providing FA service or are home links for mobile stations.

show cdma pdsn

Displays the current status and configuration of the PDSN gateway.


cdma pdsn virtual-template

To associate a virtual template with PPP over GRE, use the cdma pdsn virtual-template command in global configuration mode. To remove the association, use the no form of this command.

cdma pdsn virtual-template virtualtemplate_num

no cdma pdsn virtual-template virtualtemplate_num

Syntax Description

virtualtemplate_num

Virtual template number. Possible values are 1 through 25.


Defaults

No default behavior or values.

Command Modes

Global Configuration

Command History

Release
Modification

12.1(3)XS

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

PPP links are dynamically created. Each link requires an interface. The characteristics of each link are cloned from a virtual template. Because there can be multiple virtual templates defined in a single PDSN, this command is used to identify the virtual template that is used for cloning virtual accesses for PPP over GRE.

Examples

The following example associate virtual template 2 with PPP over GRE:

cdma pdsn virtual-template 2

Related Commands

Command
Description

interface virtual-template

Creates a virtual template interface.



clear cdma pdsn cluster controller session records age

To clear session records of a specified age, use the clear cdma pdsn cluster controller session records age command in privileged EXEC mode.

clear cdma pdsn cluster controller session records age days

Syntax Description

days

The number of days of the record age.


Defaults

No default keywords or arguments.

Command Modes

Privileged EXEC

Command History

Release
Modification

12.2(8)BY

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Examples

The following example shows output from the clear cdma pdsn cluster controller session records age command:

Router# clear cdma pdsn cluster controller session records age 1

clear cdma pdsn selection

To clear PDSN selection tables, use the clear cdma pdsn selection command in privileged EXEC mode.

clear cdma pdsn selection [pdsn ip-addr | msid number]

Syntax Description

pdsn ip-addr

(Optional) IP address of the PDSN selection session table to be cleared.

msid number

(Optional) Identification of the MSID to be cleared.


Command Modes

Privileged EXEC

Command History

Release
Modification

12.1(3)XS

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Examples

The following example clears the pdsn selection session table for PDSN 5.5.5.5:

clear cdma pdsn selection pdsn 5.5.5.5

Related Commands

Command
Description

cdma pdsn selection session-table-size

Enables the PDSN selection feature and defines the size of the session table.



clear cdma pdsn session

To clear one or more user sessions on the PDSN, use the clear cdma pdsn session command in privileged EXEC mode.

clear cdma pdsn session {all | pcf ip_addr | msid number}

Syntax Description

all

Keyword to clear all sessions on a given PDSN.

pcf ip_addr

IP address of the PCF sessions that are to be cleared.

msid number

Identification of the MSID to be cleared.


Defaults

No default behavior or values.

Command Modes

Privileged EXEC

Command History

Release
Modification

12.1(3)XS

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

This command terminates one or more user sessions. When this command is issued, the PDSN initiates the session release by sending an A11Registration Update message to the PCF.

The keyword all clears all sessions on a given PDSN. The keyword pcf with an IP address clears all the sessions coming from a given PCF. The keyword msid with a number will clear the session for a given MSID.

Examples

The following example clears session MSID 0000000002:

clear cdma pdsn session msid 0000000002

Related Commands

Command
Description

show cdma pdsn session

Displays PDSN session information.


clear cdma pdsn statistics

To clear the RAN-to-PDSN interface (RP) or PPP statistics on the PDSN, use the clear cdma pdsn statistics command in privileged EXEC mode.

clear cdma pdsn statistics

Syntax Description

There are no arguments or keywords for this command.

Defaults

No default behavior or values.

Command Modes

Privileged EXEC

Command History

Release
Modification

12.2(8)BY

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

Previous releases used the show cdma pdsn statistics command to show PPP and RP statistic summaries from the time the system was restarted. The clear cdma pdsn statistics command allows the user to reset the counters as desired, and to view the history since the counters were last reset.

Examples

The following example illustrates the clear cdma pdsn statistics rp command before and after the counters are reset.

Before counters are reset

Router#show cdma pdsn statistics rp
RP Interface:
Reg Request rcvd 5, accepted 5, denied 0, discarded 0

Note Non-zero values of counters.


Initial Reg Request accepted 4, denied 0
Re-registration requests accepted 0, denied 0
De-registration accepted 1, denied 0
Registration Request Errors:
Unspecified 0, Administratively prohibited 0
Resource unavailable 0, Authentication failed 0
Identification mismatch 0, Poorly formed requests 0
Unknown PDSN 0, Reverse tunnel mandatory 0
Reverse tunnel unavailable 0, Bad CVSE 0

Update sent 1, accepted 1, denied 0, not acked 0
Initial Update sent 1, retransmissions 0
Acknowledge received 1, discarded 0
Update reason lifetime expiry 0, PPP termination 1, other 0
Registration Update Errors:
Unspecified 0, Identification mismatch 0
Authentication failed 0, Administratively prohibited 0
Poorly formed request 0

Service Option:
asyncDataRate2 (12) success 4, failure 0

After the counters are reset

Router#clear cdma pdsn statistics rp
==> RESETTING COUNTERS

Router#show cdma pdsn statistics rp
RP Interface:
Reg Request rcvd 0, accepted 0, denied 0, discarded 0

Note The counter values are zeroes.


Initial Reg Request accepted 0, denied 0
Re-registration requests accepted 0, denied 0
De-registration accepted 0, denied 0
Registration Request Errors:
Unspecified 0, Administratively prohibited 0
Resource unavailable 0, Authentication failed 0
Identification mismatch 0, Poorly formed requests 0
Unknown PDSN 0, Reverse tunnel mandatory 0
Reverse tunnel unavailable 0, Bad CVSE 0

Update sent 0, accepted 0, denied 0, not acked 0
Initial Update sent 0, retransmissions 0
Acknowledge received 0, discarded 0
Update reason lifetime expiry 0, PPP termination 0, other 0
Registration Update Errors:
Unspecified 0, Identification mismatch 0
Authentication failed 0, Administratively prohibited 0
Poorly formed request 0

Service Option:
asyncDataRate2 (12) success 4, failure 0

Related Commands

Command
Description

show cdma pdsn statistics

Displays PDSN statistics.


clear gprs access-point statistics

To clear statistics counters for a specific access point or for all access points on the GGSN, use the clear gprs access-point statistics privileged EXEC command.

clear gprs access-point statistics {access-point-index | all}

Syntax Description

access-point-index

Index number of an access point. Information about that access point is cleared.

all

Information about all access points on the GGSN is cleared.


Defaults

No default behavior or values.

Command Modes

Privileged EXEC

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

This command clears the statistics that are displayed by the show gprs access-point statistics command.

Examples

The following example clears the statistics at access point 2:

clear gprs access-point statistics 2

The following example clears the statistics for all access points:

clear gprs access-point statistics all

Related Commands

Command
Description

show gprs access-point statistics

Displays data volume and PDP context activation and deactivation statistics for access points on the GGSN.


clear gprs charging cdr

To clear GPRS call detail records (CDRs), use the clear gprs charging cdr privileged EXEC configuration command.

clear gprs charging cdr {access-point access-point-index | all | partial-record | tid tunnel-id}

Syntax Description

access-point access-point-index

Closes CDRs for a specified access-point index.

all

Closes all CDRs on the GGSN.

partial-record

Closes all CDRs, and opens partial CDRs for any existing PDP contexts.

tid tunnel-id

Closes CDRs by tunnel ID.


Defaults

No default behavior or values.

Command Modes

Privileged EXEC

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX and the partial-record keyword was added.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

Use the clear gprs charging cdr command to clear the CDRs for one or more PDP contexts.

To clear CDRs by tunnel ID (TID), use the clear gprs charging cdr command with the tid keyword and specify the corresponding TID for which you want to clear the CDRs. To determine the tunnel ID (TID) of an active PDP context, you can use the show gprs gtp pdp-context all command to obtain a list of the currently active PDP contexts (mobile sessions).

To clear CDRs by access point, use the clear gprs charging cdr command with the access-point keyword and specify the corresponding access-point index for which you want to clear CDRs. To obtain a list of access points, you can use the show gprs access-point command.

When you clear CDRs for a TID, an access point, or for all access points, charging data records for the specified TID or access point(s) are sent immediately to the charging gateway. When you run these versions of this command, the following things occur:

The GGSN no longer sends charging data that has been accumulated for the PDP context to the charging gateway.

The GGSN closes the current CDRs for the specified PDP contexts.

The GGSN no longer generates CDRs for existing PDP contexts.

To close all CDRs and open partial CDRs for existing PDP contexts on the GGSN, use the clear gprs charging cdr partial-record command.

The clear gprs charging cdr command is normally used before disabling the charging function.

Examples

The following example shows how to clear CDRs by tunnel ID:

router# show gprs gtp pdp-context all
TID MS Addr Source SGSN Addr APN
1234567890123456 10.11.1.1 Radius 10.4.4.11 www.pdn1.com
2345678901234567 Pending DHCP 10.4.4.11 www.pdn2.com
3456789012345678 10.21.1.1 IPCP 10.1.4.11 www.pdn3.com
4567890123456789 10.31.1.1 IPCP 10.1.4.11 www.pdn4.com
5678901234567890 10.41.1.1 Static 10.4.4.11 www.pdn5.com

routerclear gprs gtp charging cdr tid 1234567890123456

The following example shows how to clear CDRs for access point 1:

routerclear gprs charging cdr access-point 1

Related Commands

Command
Description

show gprs charging statistics

Displays current statistics about the transfer of charging packets between the GGSN and charging gateways.

show gprs access-point

Displays information about an access point.


clear gprs gtp pdp-context

To clear one or more PDP contexts (mobile sessions), use the clear gprs gtp pdp-context privileged EXEC configuration command.

clear gprs gtp pdp-context {tid tunnel-id | imsi imsi_value | path ip-address | access-point access-point-index | all}

Syntax Description

tid tunnel-id

Tunnel ID (TID) for which PDP contexts are to be cleared.

imsi imsi_value

International Mobile Subscriber Identity (IMSI) value for which PDP contexts are to be cleared.

path ip-address

Remote SGSN IP address for which all PDP contexts associated with the SGSN are to be cleared.

access-point access-point-index

Access-point index for which PDP contexts are to be cleared.

all

Clear all currently active PDP contexts.


Defaults

No default behavior or values.

Command Modes

Privileged EXEC

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

Use the clear gprs gtp pdp-context command to clear one or more PDP contexts (mobile sessions). Use this command when operator intervention is required for administrative reasons—for example, when there are problematic user sessions or the system must be taken down for maintenance.

After the clear gprs gtp pdp-context command is issued, those users who are accessing the PDN through the specified TID, IMSI, path, or access point are disconnected.

To determine the tunnel ID of an active PDP context, you can use the show gprs gtp pdp-context command to obtain a list of the currently active PDP contexts (mobile sessions). Then, to clear a PDP context by tunnel ID, use the clear gprs gtp pdp-context command with the tid keyword and the corresponding tunnel ID that you want to clear.

To clear PDP contexts by access point, use the clear gprs gtp pdp-context command with the access-point keyword and the corresponding access-point index. To display a list of access points that are configured on the GGSN, use the show gprs access-point command.

If you know the IMSI of the PDP context, you can use the clear gprs gtp pdp-context with the imsi keyword and the corresponding IMSI of the connected user to clear the PDP context. If you want to determine the IMSI of a PDP context, you can use the show gprs gtp pdp-context all command to display a list of the currently active PDP contexts. Then, after finding the TID value that corresponds to the session that you want to clear, you can use the show gprs gtp pdp-context tid command to display the IMSI.

Examples

The following example shows how to clear PDP contexts by tunnel ID:

router# show gprs gtp pdp-context all
TID MS Addr Source SGSN Addr APN
1234567890123456 10.11.1.1 Radius 10.4.4.11 www.pdn1.com
2345678901234567 Pending DHCP 10.4.4.11 www.pdn2.com
3456789012345678 10.21.1.1 IPCP 10.1.4.11 www.pdn3.com
4567890123456789 10.31.1.1 IPCP 10.1.4.11 www.pdn4.com
5678901234567890 10.41.1.1 Static 10.4.4.11 www.pdn5.com

routerclear gprs gtp pdp-context tid 1234567890123456

The following example shows how to clear PDP contexts at access point 1:

router# clear gprs gtp pdp-context access-point 1

clear gprs gtp statistics

To clear the current GPRS GTP statistics, use the clear gprs gtp statistics privileged EXEC configuration command.

clear gprs gtp statistics

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

Privileged EXEC

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

Use the clear gprs gtp statistics command to clear the current GPRS GTP statistics. This command clears the counters that are displayed by the show gprs gtp statistics command.


Note The clear gprs gtp statistics command does not clear the counters that are displayed by the show gprs gtp status command.


Examples

The following example clears the GPRS GTP statistics:

router# clear gprs gtp statistics

clear gprs gtp-director statistics

To clear the current counters for GTP Director Module (GDM) statistics, use the clear gprs gtp-director statistics privileged EXEC configuration command.

clear gprs gtp-director statistics

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

Privileged EXEC

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.


Usage Guidelines

Use the clear gprs gtp-director statistics command to clear all of the counters that are displayed by the show gprs gtp-director statistics command.

Examples

The following example clears the GDM counters:

router# clear gprs gtp-director statistics

Related Commands

Command
Description

show gprs gtp-director statistics

Displays the current statistics for requests received and processed by GDM.


clear ip mobile host-counters

To clear the mobility counters specific to each mobile node, use the clear ip mobile host-counters command in EXEC mode.

clear ip mobile host-counters [[ip-address | nai string] undo]]

Syntax Description

ip-address

(Optional) IP address of a mobile node.

nai string

(Optional) Network access identifier of the mobile node.

undo

(Optional) Restores the previously cleared counters.


Command Modes

EXEC

Command History

Release
Modification

12.0(1)T

This command was introduced.

12.2(2)XC

The nai keyword was added.

12.2(13)T

The nai keyword was integrated into Cisco IOS Release 12.2(13)T.


Usage Guidelines

This command clears the counters that are displayed when you use the show ip mobile host command. The undo keyword restores the counters (this option is useful for debugging).

Examples

The following example shows how the counters can be used for debugging:

Router# show ip mobile host

10.0.0.1:
Allowed lifetime 10:00:00 (36000/default)
Roaming status -registered-, Home link on virtual network 20.0.0.0/8
Accepted 2, Last time 04/13/02 19:04:28
Overall service time 00:04:42
Denied 0, Last time -never-
Last code `-never- (0)'
Total violations 1
Tunnel to MN - pkts 0, bytes 0
Reverse tunnel from MN - pkts 0, bytes 0

    .
Router# clear ip mobile host-counters

Router# show ip mobile host-counters

20.0.0.1:
Allowed lifetime 10:00:00 (36000/default)
Roaming status -Unregistered-, Home link on virtual network 20.0.0.0/8
Accepted 0, Last time -never-
Overall service time -never-
Denied 0, Last time -never-
Last code `-never- (0)'
Total violations 0
Tunnel to MN - pkts 0, bytes 0
Reverse tunnel from MN - pkts 0, bytes 0

Related Commands

Command
Description

show ip mobile host

Displays mobile node counters and information.


clear ip mobile secure

To clear and retrieve remote security associations, use the clear ip mobile secure command in EXEC mode.

clear ip mobile secure {host lower [upper] | nai string | empty | all} [load]

Syntax Description

host

Mobile node host.

lower

IP address of mobile node. Can be used alone, or as lower end of a range of IP addresses.

upper

(Optional) Upper end of a range of IP addresses.

nai string

Network access identifier of the mobile node.

empty

Load in only mobile nodes without security associations. Must be used with the load keyword.

all

Clears all mobile nodes.

load

(Optional) Reload the security association from the AAA server after security association has been cleared.


Command Modes

EXEC

Command History

Release
Modification

12.0(1)T

This command was introduced.

12.2(2)XC

The nai keyword was added.

12.2(13)T

The nai keyword was integrated into Cisco IOS Release 12.2(13)T.


Usage Guidelines

Security associations are required for registration authentication. They can be stored on an AAA server. During registration, they may be stored locally after retrieval from the AAA server. The security association on the router may become stale or out of date when the security association on the AAA server changes.

This command clears security associations that have been downloaded from the AAA server.


Note Security associations that are manually configured on the router or not stored on the router after retrieval from the AAA server are not applicable.


Examples

In the following example, the AAA server has the security association for user 10.2.0.1 after registration:

Router# show ip mobile secure host 10.2.0.1

Security Associations (algorithm,mode,replay protection,key):
10.2.0.1:
    SPI 300, MD5, Prefix-suffix, Timestamp +/- 7,
Key `oldkey' 1230552d39b7c1751f86bae5205ec0c8

If you change the security association stored on the AAA server for this mobile node, the router clears the security association and reloads it from the AAA server:

Router# clear ip mobile secure host 10.2.0.1 load

Router# show ip mobile secure host 10.2.0.1

10.2.0.1:
    SPI 300, MD5, Prefix-suffix, Timestamp +/- 7,
Key `newkey' 1230552d39b7c1751f86bae5205ec0c8

Related Commands

Command
Description

ip mobile secure

Specifies the mobility security associations for mobile host, visitor, home agent, and foreign agent.


clear ip mobile visitor

To remove visitor information, use the clear ip mobile visitor command in privileged EXEC mode.

clear ip mobile visitor [ip-address | nai string [session-id string] [ip-address]]

Syntax Description

ip-address

(Optional) IP address. If not specified, visitor information will be removed for all addresses.

nai string

(Optional) Network access identifier (NAI) of the mobile node.

session-id string

(Optional) Session identifier. The string value must be fewer than 25 characters in length.

ip-address

(Optional) IP address associated with the NAI.


Command Modes

EXEC

Command History

Release
Modification

12.0(1)T

This command was introduced.

12.2(2)XC

The nai keyword and associated variables were added.

12.2(13)T

The nai keyword and associated variables were integrated into Cisco IOS Release 12.2(13)T.

12.3(4)T

The session-id keyword was added.


Usage Guidelines

The foreign agent creates a visitor entry for each accepted visitor. The visitor entry allows the mobile node to receive packets while in a visited network. Associated with the visitor entry is the Address Resolution Protocol (ARP) entry for the visitor. There should be no need to clear the entry because it expires after lifetime is reached or when the mobile node deregisters.

When a visitor entry is removed, the number of users on the tunnel is decremented and the ARP entry is removed from the ARP cache. The visitor is not notified.

If the nai string session-id string option is specified, only the visitor entry with that session identifier is cleared. If the session-id keyword is not specified, all visitor entries (potentially more than one, with different session identifiers) for that NAI are cleared. You can determine the session-id string value by using the show ip mobile visitor command.

Use this command with care because it may terminate any sessions used by the mobile node. After you use this command, the visitor will need to reregister to continue roaming.

Examples

The following example administratively stops visitor 172.21.58.16 from visiting:

Router# clear ip mobile visitor 172.21.58.16

Related Commands

Command
Description

show ip mobile visitor

Displays the table containing the visitor list of the foreign agent.


clear ip rtp header-compression

To clear Real-Time Transport Protocol (RTP) header compression structures and statistics, use the clear ip rtp header-compression command in privileged EXEC mode.

clear ip rtp header-compression [interface-type interface-number]

Syntax Description

interface-type interface-number

(Optional) Interface type and number.


Command Modes

Privileged EXEC

Command History

Release
Modification

11.3

This command was introduced.


Usage Guidelines

If this command is used without an interface type and number, it clears all RTP header compression structures and statistics.

Examples

The following example clears RTP header compression structures and statistics for serial interface 0:

Router# clear ip rtp header-compression serial 0

Related Commands

Command
Description

ip rtp header-compression

Enables RTP header compression.


clear ppp mux

To clear PPP mux statistics, use the clear ppp mux EXEC command.

clear ppp mux [interface interface]

Syntax Description

interface

(Optional) The identifier of the multilink or serial interface for which you want to clear counters.


Defaults

If no interface is specified, statistics for all multilink and serial interfaces are cleared.

Command Modes

EXEC

Command History

Release
Modification

12.2(8)MC1

This command was introduced (MGX-RPM-1FE-CP back card).

12.2(8)MC2

This command was introduced (MWR 1941-DC router).

12.3(11)T

This command was incorporated in Cisco IOS Release 12.3(11)T.


Usage Guidelines

None

Examples

The following example clears PPP mux statistics for multilink interface 1:

clear ppp mux interface multilink1

Related Commands

Command
Description

show ppp mux

Displays PPP mux counters for the specified multilink interface.


clear radius local-server

To clear the display on the local server or to unblock a locked username, use the clear radius local-server command in privileged EXEC mode.

clear radius local-server {statistics | user username}

Syntax Description

statistics

Clears the display of statistical information.

user

Unblocks the locked username specified.

username

Locked username.


Defaults

No default behavior or values

Command Modes

Privileged EXEC

Command History

Release
Modification

12.2(11)JA

This command was introduced on Cisco Aironet Access Point 1100 and Cisco Aironet Access Point 1200.

12.3(11)T

This command was implemented on the following platforms: Cisco 2600XM, Cisco 2691, Cisco 2811, Cisco 2821, Cisco 2851, Cisco 3700, and Cisco 3800 series routers.


Examples

The following example unblocks the locked username "smith":

Router# clear radius local-server user smith

Syntax Description

Command
Description

block count

Configures the parameters for locking out members of a group to help protect against unauthorized attacks.

debug radius local-server

Displays the debug information for the local server.

group

Enters user group configuration mode and configures shared setting for a user group.

nas

Adds an access point or router to the list of devices that use the local authentication server.

radius-server host

Specifies the remote RADIUS server host.

radius-server local

Enables the access point or router to be a local authentication server and enters into configuration mode for the authenticator.

reauthentication time

Specifies the time (in seconds) after which access points or wireless-aware routers must reauthenticate the members of a group.

show radius local-server statistics

Displays statistics for a local network access server.

ssid

Specifies up to 20 SSIDs to be used by a user group.

user

Authorizes a user to authenticate using the local authentication server.

vlan

Specifies a VLAN to be used by members of a user group.


crypto map (global IPSec)

To enter crypto map configuration mode and create or modify a crypto map entry, to create a crypto profile that provides a template for configuration of dynamically created crypto maps, or to configure a client accounting list, use the crypto map command in global configuration mode. To delete a crypto map entry, profile, or set, use the no form of this command.

crypto map map-name seq-num [ipsec-manual]

crypto map map-name seq-num [ipsec-isakmp] [dynamic dynamic-map-name] [discover] [profile profile-name]

crypto map map-name [client-accounting-list aaalist]

no crypto map map-name seq-num


Note Issue the crypto map map-name seq-num command without a keyword to modify an existing crypto map entry.


Syntax Description

map-name

Name that identifies the crypto map set. This is the name assigned when the crypto map was created.

seq-num

Sequence number you assign to the crypto map entry. See additional explanation for using this argument in the "Usage Guidelines" section.

ipsec-manual

(Optional) Indicates that Internet Key Exchange (IKE) will not be used to establish the IP Security (IPSec) security associations (SAs) for protecting the traffic specified by this crypto map entry.

ipsec-isakmp

(Optional) Indicates that IKE will be used to establish the IPSec SAs for protecting the traffic specified by this crypto map entry.

dynamic

(Optional) Specifies that this crypto map entry is to reference a preexisting dynamic crypto map. Dynamic crypto maps are policy templates used in processing negotiation requests from a peer IPSec device. If you use this keyword, none of the crypto map configuration commands will be available.

dynamic-map-name

(Optional) Specifies the name of the dynamic crypto map set that should be used as the policy template.

discover

(Optional) Enables peer discovery. By default, peer discovery is not enabled.

profile

(Optional) Designates a crypto map as a configuration template. The security configurations of this crypto map will be cloned as new crypto maps are created dynamically on demand.

profile-name

(Optional) Name of the crypto profile being created.

client-accounting- list

(Optional) Designates a client accounting list.

aaalist

(Optional) List name.


Defaults

No crypto maps exist.

Peer discovery is not enabled.

Command Modes

Global configuration

Command History

Release
Modification

11.2

This command was introduced.

11.3 T

The following keywords and arguments were added:

ipsec-manual

ipsec-isakmp

dynamic

dynamic-map-name

12.0(5)T

The discover keyword was added to support Tunnel Endpoint Discovery (TED).

12.2(4)T

The profile profile-name keyword and argument combination was introduced to allow the generation of a crypto map profile that is cloned to create dynamically created crypto maps on demand.

12.2(11)T

Support was added for the Cisco 1760, Cisco AS5300, Cisco AS5400, and Cisco AS5800 platforms.

12.2(15)T

The client-accounting-list keyword and aaalist argument were added.


Usage Guidelines

Use this command to create a new crypto map entry, to create a crypto map profile, or to modify an existing crypto map entry or profile.

After a crypto map entry has been created, you cannot change the parameters specified at the global configuration level because these parameters determine which of the configuration commands are valid at the crypto map level. For example, after a map entry has been created using the ipsec-isakmp keyword, you cannot change it to the option specified by the ipsec-manual keyword; you must delete and reenter the map entry.

After you define crypto map entries, you can assign the crypto map set to interfaces using the crypto map (interface IPSec) command.

Crypto Map Functions

Crypto maps provide two functions: filtering and classifying traffic to be protected and defining the policy to be applied to that traffic. The first use affects the flow of traffic on an interface; the second affects the negotiation performed (via IKE) on behalf of that traffic.

IPSec crypto maps define the following:

What traffic should be protected

To which IPSec peers the protected traffic can be forwarded—these are the peers with which an SA can be established

Which transform sets are acceptable for use with the protected traffic

How keys and security associations should be used or managed (or what the keys are, if IKE is not used)

Multiple Crypto Map Entries with the Same Map Name Form a Crypto Map Set

A crypto map set is a collection of crypto map entries, each with a different seq-num argument but the same map-name argument. Therefore, for a given interface, you could have certain traffic forwarded to one IPSec peer with specified security applied to that traffic and other traffic forwarded to the same or a different IPSec peer with different IPSec security applied. To accomplish differential forwarding you would create two crypto maps, each with the same map-name argument, but each with a different seq-num argument. Crypto profiles must have unique names within a crypto map set.

Sequence Numbers

The number you assign to the seq-num argument should not be arbitrary. This number is used to rank multiple crypto map entries within a crypto map set. Within a crypto map set, a crypto map entry with a lower seq-num is evaluated before a map entry with a higher seq-num; that is, the map entry with the lower number has a higher priority.

For example, consider a crypto map set that contains three crypto map entries: mymap 10, mymap 20, and mymap 30. The crypto map set named "mymap" is applied to serial interface 0. When traffic passes through serial interface 0, the traffic is evaluated first for mymap 10. If the traffic matches any access list permit statement entry in the extended access list in mymap 10, the traffic will be processed according to the information defined in mymap 10 (including establishing IPSec SAs when necessary). If the traffic does not match the mymap 10 access list, the traffic will be evaluated for mymap 20, and then mymap 30, until the traffic matches a permit entry in a map entry. (If the traffic does not match a permit entry in any crypto map entry, it will be forwarded without any IPSec security.)

Dynamic Crypto Maps

Refer to the "Usage Guidelines" section of the crypto dynamic-map command for a discussion on dynamic crypto maps.

Crypto map entries that reference dynamic map sets should be the lowest priority map entries, allowing inbound SA negotiation requests to try to match the static maps first. Only after the request does not match any of the static maps, do you want it to be evaluated against the dynamic map set.

To make a crypto map entry referencing a dynamic crypto map set the lowest priority map entry, give the map entry the highest seq-num of all the map entries in a crypto map set.

Create dynamic crypto map entries using the crypto dynamic-map command. After you create a dynamic crypto map set, add the dynamic crypto map set to a static crypto map set with the crypto map (global IPSec) command using the dynamic keyword.

TED

TED is an enhancement to the IPSec feature. Defining a dynamic crypto map allows you to dynamically determine an IPSec peer; however, only the receiving router has this ability. With TED, the initiating router can dynamically determine an IPSec peer for secure IPSec communications.

Dynamic TED helps to simplify IPSec configuration on the individual routers within a large network. Each node has a simple configuration that defines the local network that the router is protecting and the IPSec transforms that are required.


Note TED helps only in discovering peers; otherwise, TED does not function any differently from normal IPSec. Thus, TED does not improve the scalability of IPSec (in terms of performance or the number of peers or tunnels).


Crypto Map Profiles

Crypto map profiles are created using the profile profile-name keyword and argument combination. Crypto map profiles are used as configuration templates for dynamically creating crypto maps on demand for use with the Layer 2 Transport Protocol (L2TP) Security feature. The relevant SAs the crypto map profile will be cloned and used to protect IP traffic on the L2TP tunnel.


Note The set peer and match address commands are ignored by crypto profiles and should not be configured in the crypto map definition.


Examples

The following example shows the minimum required crypto map configuration when IKE will be used to establish the SAs:

crypto map mymap 10 ipsec-isakmp
 match address 101
 set transform-set my_t_set1
 set peer 10.0.0.1

The following example shows the minimum required crypto map configuration when the SAs are manually established:

crypto transform-set someset ah-md5-hmac esp-des
crypto map mymap 10 ipsec-manual
 match address 102
 set transform-set someset
 set peer 10.0.0.5
 set session-key inbound ah 256 98765432109876549876543210987654
 set session-key outbound ah 256 fedcbafedcbafedcfedcbafedcbafedc
 set session-key inbound esp 256 cipher 0123456789012345
 set session-key outbound esp 256 cipher abcdefabcdefabcd

The following example configures an IPSec crypto map set that includes a reference to a dynamic crypto map set.

Crypto map "mymap 10" allows SAs to be established between the router and either (or both) of two remote IPSec peers for traffic matching access list 101. Crypto map "mymap 20" allows either of two transform sets to be negotiated with the remote peer for traffic matching access list 102.

Crypto map entry "mymap 30" references the dynamic crypto map set "mydynamicmap," which can be used to process inbound SA negotiation requests that do not match "mymap" entries 10 or 20. In this case, if the peer specifies a transform set that matches one of the transform sets specified in "mydynamicmap," for a flow permitted by the access list 103, IPSec will accept the request and set up SAs with the remote peer without previously knowing about the remote peer. If the request is accepted, the resulting SAs (and temporary crypto map entry) are established according to the settings specified by the remote peer.

The access list associated with "mydynamicmap 10" is also used as a filter. Inbound packets that match any access list permit statement in this list are dropped for not being IPSec protected. (The same is true for access lists associated with static crypto maps entries.) Outbound packets that match a permit statement without an existing corresponding IPSec SA are also dropped.

crypto map mymap 10 ipsec-isakmp
 match address 101
 set transform-set my_t_set1
 set peer 10.0.0.1
 set peer 10.0.0.2
crypto map mymap 20 ipsec-isakmp
 match address 102
 set transform-set my_t_set1 my_t_set2
 set peer 10.0.0.3
crypto map mymap 30 ipsec-isakmp dynamic mydynamicmap
!
crypto dynamic-map mydynamicmap 10
 match address 103
 set transform-set my_t_set1 my_t_set2 my_t_set3

The following example configures TED on a Cisco router:

crypto map testtag 10 ipsec-isakmp dynamic dmap discover

The following example configures a crypto profile to be used as a template for dynamically created crypto maps when IPSec is used to protect an L2TP tunnel:

crypto map l2tpsec 10 ipsec-isakmp profile l2tp

Related Commands

Command
Description

crypto dynamic-map

Creates a dynamic crypto map entry and enters the crypto map configuration command mode.

crypto isakmp profile

Audits IPSec user sessions.

crypto map (interface IPSec)

Applies a previously defined crypto map set to an interface.

crypto map local-address

Specifies and names an identifying interface to be used by the crypto map for IPSec traffic.

debug crypto isakmp

Applies a previously defined crypto map set to an interface.

match address (IPSec)

Specifies an extended access list for a crypto map entry.

set peer (IPSec)

Specifies an IPSec peer in a crypto map entry.

set pfs

Specifies that IPSec should ask for PFS when requesting new SAs for this crypto map entry, or that IPSec requires PFS when receiving requests for new SAs.

set security-association level per-host

Specifies that separate IPSec SAs should be requested for each source/destination host pair.

set security-association lifetime

Overrides (for a particular crypto map entry) the global lifetime value, which is used when negotiating IPSec SAs.

set session-key

Specifies the IPSec session keys within a crypto map entry.

set transform-set

Specifies which transform sets can be used with the crypto map entry.

show crypto map (IPSec)

Displays the crypto map configuration.


dhcp-gateway-address

To specify the subnet in which the DHCP server should return addresses for DHCP requests for MS users entering a particular PDN access point, use the dhcp-gateway-address access-point configuration command. To remove a DHCP gateway address and return to the default, use the no form of this command.

dhcp-gateway-address ip-address

no dhcp-gateway-address ip-address

Syntax Description

ip-address

The IP address of the DHCP gateway to be used in DHCP requests for users who connect through the specified access point.


Defaults

When you do not configure a dhcp-gateway-address, the GGSN uses the virtual template interface address as the DHCP gateway address.

Command Modes

Access-point configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

The dhcp-gateway-address specifies the value of the giaddr field that is passed in DHCP messages between the GGSN and the DHCP server. If you do not specify a DHCP gateway address, the address assigned to the virtual template is used.

Though a default value for the virtual template address will occur, you should configure another value for the dhcp-gateway-address command whenever you are implementing DHCP services at an access point.

If the access point is configured for VRF, then the dynamic (or static addresses) returned for MSs of PDP contexts at the access point will also be part of that VRF address space. If the DHCP server is located within the VRF address space, then the corresponding loopback interface for the dhcp-gateway-address must also be configured within the VRF address space.

Examples

The following example specifies an IP address of 10.88.0.1 for the giaddr field (the dhcp-gateway-address) of DHCP server requests. Note that the IP address of a loopback interface, in this case Loopback2, matches the IP address specified in the dhcp-gateway-address command. This is required for proper configuration of DHCP on the GGSN.

interface Loopback2
 ip address 10.88.0.1 255.255.255.255
!
gprs access-point-list gprs
 access-point 8
   access-point-name pdn.aaaa.com
   ip-address-pool dhcp-proxy-client
   aggregate auto
   dhcp-server 172.16.43.35
   dhcp-gateway-address 10.88.0.1
   exit

Related Commands

Command
Description

dhcp-server

Specifies a primary (and backup) DHCP server to allocate IP addresses to MS users entering a particular PDN access point.

gprs default ip-address-pool

Specifies a dynamic address allocation method using IP address pools for the GGSN.

ip-address-pool

Specifies a dynamic address allocation method using IP address pools for the current access point.


dhcp-server

To specify a primary (and backup) DHCP server to allocate IP addresses to MS users entering a particular PDN access point, use the dhcp-server access-point configuration command. To remove the DHCP server from the access-point configuration, use the no form of this command.

dhcp-server {ip-address} [ip-address] [vrf]

no dhcp-server {ip-address} [ip-address] [vrf]

Syntax Description

ip-address

IP address of a DHCP server. The first ip-address argument specifies the IP address of the primary DHCP server. The second (optional) ip-address argument specifies the IP address of a backup DHCP server.

vrf

DHCP server uses the VPN routing and forwarding (VRF) table that is associated with the APN.


Defaults

Global routing table

Command Modes

Access-point configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX, with the following changes:

The vrf keyword was added.

The name argument, as an option for a hostname in place of the IP address of a host, has been removed.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

To configure DHCP on the GGSN, you must configure either the gprs default ip-address-pool global configuration command, or the ip-address-pool access-point configuration command with the dhcp-proxy-client keyword option.

After you configure the access point for DHCP proxy client services, use the dhcp-server command to specify a DHCP server.

Use the ip-address argument to specify the IP address of the DHCP server. The second, optional ip-address argument can be used to specify the IP address of a backup DHCP server to be used in the event that the primary DHCP server is unavailable. If you do not specify a backup DHCP server, then no backup DHCP server is available.

The DHCP server can be specified in two ways:

At the global configuration level, using the gprs default dhcp-server command.

At the access-point configuration level, using the dhcp-server command.

If you specify a DHCP server at the access-point level using the dhcp-server command, then the server address specified at the access point overrides the address specified at the global level. If you do not specify a DHCP server address at the access-point level, then the address specified at the global level is used.

Therefore, you can have a global address setting and also one or more local access-point level settings if you need to use different DHCP servers for different access points.

Use the vrf keyword when the DHCP server itself is located within the address space of a VRF interface on the GGSN. If the DHCP server is located within the VRF address space, then the corresponding loopback interface for the dhcp-gateway-address must also be configured within the VRF address space.

Examples

Example 1

The following example specifies both primary and backup DHCP servers to allocate IP addresses to mobile station users through a non-VPN access point. Because the vrf keyword is not configured, the default global routing table is used. The primary DHCP server is located at IP address 10.60.0.1, and the secondary DHCP server is located at IP address 10.60.0.2:

 access-point 2
  access-point-name xyz.com
  dhcp-server 10.60.0.1 10.60.0.2
  dhcp-gateway-address 10.60.0.1
  exit

Example 2

The following example shows a VRF configuration for vpn3 (without tunneling) using the ip vrf global configuration command. Because the ip vrf command establishes both VRF and CEF routing tables, notice that ip cef also is configured at the global configuration level to enable CEF switching at all of the interfaces.

The following other configuration elements must also associate the same VRF named vpn3:

FastEthernet0/0 is configured as the Gi interface using the ip vrf forwarding interface configuration command.

Access-point 2 implements VRF using the vrf command access-point configuration command.

The DHCP server at access-point 2 also is configured to support VRF. Notice that access-point 1 uses the same DHCP server, but is not supporting the VRF address space. The IP addresses for access-point 1 will apply to the global routing table:

aaa new-model
!
aaa group server radius foo
 server 10.2.3.4
 server 10.6.7.8
!
aaa authentication ppp foo group foo
aaa authorization network default group radius
aaa accounting exec default start-stop group foo
!
ip cef
!
ip vrf vpn3
 rd 300:3
!
interface Loopback1
 ip address 10.30.30.30 255.255.255.255
!
interface Loopback2
 ip vrf forwarding vpn3
 ip address 10.27.27.27 255.255.255.255
!
interface FastEthernet0/0
 ip vrf forwarding vpn3
 ip address 10.50.0.1 255.255.0.0
 duplex half
!
interface FastEthernet1/0
 ip address 10.70.0.1 255.255.0.0
 duplex half
!
interface Virtual-Template1
 ip address 10.8.0.1 255.255.0.0
 encapsulation gtp
 gprs access-point-list gprs
!
ip route 10.10.0.1 255.255.255.255 Virtual-Template1
ip route vrf vpn3 10.100.0.5 255.255.255.0 fa0/0 10.50.0.2
ip route 10.200.0.5 255.255.255.0 fa1/0 10.70.0.2
!
no ip http server
!
gprs access-point-list gprs
 access-point 1
  access-point-name gprs.pdn.com
  ip-address-pool dhcp-proxy-client
  dhcp-server 10.200.0.5
  dhcp-gateway-address 10.30.30.30
  network-request-activation
  exit
  !
 access-point 2
  access-point-name gprs.pdn2.com
  access-mode non-transparent
  ip-address-pool dhcp-proxy-client
  dhcp-server 10.100.0.5 10.100.0.6 vrf
  dhcp-gateway-address 10.27.27.27
  aaa-group authentication foo
  vrf vpn3
  exit
!
gprs default ip-address-pool dhcp-proxy-client
gprs gtp ip udp ignore checksum
!
radius-server host 10.2.3.4 auth-port 1645 acct-port 1646 non-standard
radius-server host 10.6.7.8 auth-port 1645 acct-port 1646 non-standard
radius-server key ggsntel

Related Commands

Command
Description

dhcp-gateway-address

Specifies the subnet in which the DHCP server should return addresses for DHCP requests for MS users entering a particular PDN access point.

ip-address-pool

Specifies a dynamic address allocation method using IP address pools for the current access point.

vrf

Configures VPN routing and forwarding at a GGSN access point and associates the access point with a particular VRF instance.


dns primary

To specify a primary (and backup) DNS to be sent in create PDP responses at the access point, use the dns primary access-point configuration command. To remove the DNS from the access-point configuration, use the no form of this command

dns primary ip-address [secondary ip-address]

Syntax Description

ip-address

IP address of the primary DNS.

secondary ip-address

(Optional) Specifies the IP address of the backup DNS.


Defaults

No default behavior or values.

Command Modes

Access-point configuration

Command History

Release
Modification

12.2(8)YY

This command was introduced.

12.3(2)XB

This command was integratedin Cisco IOS Release 12.3(2)XB.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

Use the dns primary command to specify the primary (and backup) DNS at the access point level.

This feature is benefits address allocation schemes where there is no mechanism to obtain these address. Also, for a RADIUS-based allocation scheme, it prevents the operator from having to configure a NBNS and DNS under each user profile.

The DNS address can come from three possible sources: DHCP server, RADIUS server, or local APN configuration. The criterium for selecting the DNS address depends on the IP address allocation scheme configured under the APN. Depending on the configuration, the criterium for selecting the DNS address is as follows:

1. DHCP-based IP address allocation scheme (local and external)—DNS address returned from the DHCP server is sent to the MS. If the DHCP server does not return a DNS address, the local APN configuration is used.

2. RADIUS-based IP address allocation scheme—DNS address returned from the RADIUS server (in Access-Accept responses) is used. If the RADIUS server does not return a DNS address, the local APN configuration is used.

3. Local IP Address Pool-based IP address allocation scheme—Local APN configuration is used.

4. Static IP Addresses—Local APN configuration is used.


Note The GGSN sends DNS addresses in the create PDP response only if the MS is requesting the DNS address in the PCO IE.


Examples

The following example specifies a primary and secondary DNS at the access point level:

 access-point 2
  access-point-name xyz.com
  dns primary 10.60.0.1 secondary 10.60.0.2
  exit

Related Commands

Command
Description

ip-address-pool

Specifies a dynamic address allocation method using IP address pools for the current access point.

nbns primary

Specifies a primary (and backup) NBNS at the access point level.


encapsulation gtp

To specify the GPRS tunneling protocol (GTP) as the encapsulation type for packets transmitted over the virtual template interface, use the encapsulation gtp interface configuration command. To remove the GTP encapsulation type and return to the default, use the no form of this command.

encapsulation gtp

no encapsulation gtp

Syntax Description

This command has no arguments or keywords.

Defaults

PPP encapsulation

Command Modes

Interface configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

Use the encapsulation gtp command to specify the GTP as the encapsulation type for a virtual template. This is a mandatory setting for both the GGSN and GDM.

Examples

The following example specifies the GPRS tunneling protocol (GTP) as the encapsulation type:

interface virtual-template 1
 ip address 10.10.10.1 255.255.255.0
 no ip directed-broadcast
 encapsulation gtp

gprs access-point-list

To configure an access point list that you use to define PDN access points on the GGSN, use the gprs access-point-list global configuration command. To remove an existing access-point list, use the no form of this command.

gprs access-point-list list_name

no gprs access-point-list list_name

Syntax Description

list_name

The name of the access-point list.


Defaults

No access-point list is defined.

Command Modes

Global configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

Use the gprs access-point-list command to configure an access list that you use to define PDN access points on the GGSN. Currently, only one access list can be defined per virtual template.

Examples

The following example sets up an access list that is used to define two GPRS access points:

! Virtual Template configuration
interface virtual-template 1
 ip address 10.10.10.1 255.255.255.0
 no ip directed-broadcast
 encapsulation gtp
 gprs access-point-list abc
!
! Access point list configuration
gprs access-point-list abc
 access-point 1
  access-point-name gprs.somewhere.com
  exit
!
 access-point 2
  access-point-name xyz.com
  exit

Related Commands

Command
Description

access-point

Specifies an access point number and enters access-point configuration mode.


gprs canonical-qos best-effort bandwidth-factor

To specify the bandwidth factor to be applied to the canonical best-effort Quality of Service (QoS) class, use the gprs canonical-qos best-effort bandwidth-factor global configuration command. To return to the default value, use the no form of this command.

gprs canonical-qos best-effort bandwidth-factor bandwidth-factor

no gprs canonical-qos best-effort bandwidth-factor bandwidth-factor

Syntax Description

bandwidth-factor

Integer from 1 to 4000000 that specifies the desired bandwidth factor (in bits per second). The default is 10 bits per second.


Defaults

10 bits per second

Command Modes

Global configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

The canonical qos best-effort bandwidth-factor command specifies an average bandwidth that is expected to be used by best-effort QoS class mobile sessions. The default value of 10 bps is chosen arbitrarily. If you observe that users accessing the GGSN are using a higher average bandwidth, then you should increase the bandwidth value.


Note Before configuring the average bandwidth expected to be used by the best-effort QoS class using the gprs canonical-qos best-effort bandwidth-factor command, canonical QoS must be enabled using the gprs qos map canonical-qos command.


Examples

The following example configures a bandwidth factor of 20:

gprs canonical-qos best-effort bandwidth-factor 20

Related Commands

Command
Description

gprs canonical-qos gsn-resource-factor

Specifies the total amount of resource that the GGSN uses to provide canonical QoS service levels to mobile users.


gprs canonical-qos gsn-resource-factor

To specify the total amount of resource that the GGSN uses to provide canonical QoS service levels to mobile users, use the gprs canonical-qos gsn-resource-factor global configuration command. To return to the default value, use the no form of this command.

gprs canonical-qos gsn-resource-factor resource-factor

no gprs canonical-qos gsn-resource-factor resource-factor

Syntax Description

resource-factor

Integer between 1 and 4294967295 representing an amount of resource that the GGSN calculates internally for canonical QoS processing. The default value is 3145728000.


Defaults

3,145,728,000

Command Modes

Global configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX and the default value was changed from 1,048,576 to 3,145,728,000 bits per second.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

The default value for this command was chosen to support 10000 PDP contexts with a premium QoS class. If a greater throughput is required for GPRS user data, increase the resource factor value. However, selecting a high value may result in exceeding the actual processing capacity of the GGSN.

Examples

The following example configures a resource factor of 1048576:

gprs canonical-qos gsn-resource-factor 1048576

Related Commands

Command
Description

gprs canonical-qos best-effort bandwidth-factor

Specifies the bandwidth factor to be applied to the canonical best-effort QoS class.

gprs canonical-qos premium mean-throughput-deviation

Specifies a mean throughput deviation factor that the GGSN uses to calculate the allowable data throughput for the premium QoS class.


gprs canonical-qos map tos

To specify a QoS mapping from the canonical QoS classes to an IP type of service (ToS) precedence value, use the gprs canonical-qos map tos global configuration command. To remove a QoS mapping and return to the default values, use the no form of this command.

gprs canonical-qos map tos [premium tos-value [normal tos-value [best-effort tos-value]]]

no gprs canonical-qos map tos [premium tos-value [normal tos-value [best-effort tos-value]]]

Syntax Description

premium tos-value

ToS mapping for a premium QoS. The tos-value can be a number from 0 to 5. A higher number indicates a higher service priority. The default is 2.

normal tos-value

ToS mapping for a normal QoS. The tos-value can be a number from 0 to 5. A higher number indicates a higher service priority. The default is 1.

best-effort tos-value

ToS mapping for a best effort QoS. The tos-value can be a number from 0 to 5. A higher number indicates a higher service priority. The default is 0.


Defaults

When canonical QoS is enabled on the GGSN, the default IP ToS precedence values are assigned according to the canonical QoS class as follows:

Premium—2

Normal—1

Best effort—0

Command Modes

Global configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

Use the gprs canonical-qos map tos command to specify a mapping between various QoS categories and the ToS precedence bits in the IP header for packets transmitted over the Gn (GTP tunnels) and Gi interfaces.

All the keyword arguments for the command are optional. However, if you specify a value for the normal argument, you must specify a value for the premium argument. And if you specify a value with the best-effort argument, then you must specify a value for both the premium and the normal arguments.

When a request for a user session comes in (a PDP context activation request), the GGSN determines whether the requested QoS for the session packets can be handled based on the maximum packet handling capability of the GGSN. Based on this determination, one of the following occurs:

If the requested QoS can be provided, then it is maintained.

If the requested QoS cannot be provided, then the QoS for the requested session is either lowered, or the session is rejected.

Examples

The following example specifies a QoS mapping from the canonical QoS classes to a premium ToS category of five, a normal ToS category of three, and a best-effort ToS category of two:

gprs canonical-qos map tos premium 5 normal 3 best-effort 2

Related Commands

Command
Description

gprs canonical-qos best-effort bandwidth-factor

Specifies the bandwidth factor to be applied to the canonical best-effort QoS class.

gprs canonical-qos gsn-resource-factor

Specifies the total amount of resource that the GGSN uses to provide canonical QoS service levels to mobile users.

gprs canonical-qos premium mean-throughput-deviation

Specifies a mean throughput deviation factor that the GGSN uses to calculate the allowable data throughput for the premium QoS class.

gprs qos map canonical-qos

Enables mapping of GPRS QoS categories to a canonical QoS method that includes best effort, normal, and premium QoS classes.


gprs canonical-qos premium mean-throughput-deviation

To specify a mean throughput deviation factor that the GGSN uses to calculate the allowable data throughput for the premium QoS class, use the gprs canonical-qos premium mean-throughput-deviation global configuration command. To return to the default value, use the no form of this command.

gprs canonical-qos premium mean-throughput-deviation deviation_factor

no gprs canonical-qos premium mean-throughput-deviation deviation_factor

Syntax Description

deviation_factor

Value that specifies the deviation factor. This value can range from 1 to 1000. The default value is 100.


Defaults

100

Command Modes

Global configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

The GGSN uses the gprs canonical-qos premium mean-throughput-deviation command to calculate a mean throughput value that determines the amount of data throughput used for a premium QoS. The calculation is made based on the following formula, which includes the input deviation factor:

EB = Min[p, m + a(p - m)]

Where

EB = the effective bandwidth
p = peak throughput from the GPRS QoS profile in PDP context requests
m = mean throughput from the GPRS QoS profile in PDP context requests
a = the deviation factor divided by 1000 (a/1000)

Examples

The following example configures a mean throughput deviation of 1000:

gprs canonical-qos premium mean-throughput-deviation 1000

Related Commands

Command
Description

gprs canonical-qos best-effort bandwidth-factor

Specifies the bandwidth factor to be applied to the canonical best-effort QoS class.

gprs canonical-qos gsn-resource-factor

Specifies the total amount of resource that the GGSN uses to provide canonical QoS service levels to mobile users.

gprs canonical-qos map tos

Specifies a QoS mapping from the canonical QoS classes to an IP ToS category.



hometocprevnextglossaryfeedbacksearchhelp

Posted: Mon Mar 28 00:06:40 PST 2005
All contents are Copyright © 1992--2005 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.