cc/td/doc/product/software/ios124/124tcr
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table Of Contents

gprs gtp echo-timer dynamic enable

gprs gtp echo-timer dynamic minimum

gprs gtp echo-timer dynamic smooth-factor

gprs gtp error-indication throttle

gprs gtp ip udp ignore checksum

gprs gtp map signalling tos

gprs gtp n3-buffer-size

gprs gtp n3-requests

gprs gtp path-echo-interval

gprs gtp pdp-context timeout idle

gprs gtp pdp-context timeout session

gprs gtp ppp vtemplate

gprs gtp ppp-regeneration vtemplate

gprs gtp response-message pco ipcp nack

gprs gtp response-message wait-accounting

gprs gtp t3-response

gprs idle-pdp-context purge-timer

gprs maximum-pdp-context-allowed

gprs mcc mnc

gprs memory threshold

gprs ms-address exclude-range

gprs ni-pdp cache-timeout

gprs ni-pdp discard-period

gprs ni-pdp ip-imsi single

gprs ni-pdp pdp-buffer

gprs ni-pdp percentage

gprs plmn ip address

gprs qos bandwidth-pool

gprs qos cac-policy

gprs qos default-response requested

gprs qos map canonical-qos

gprs qos map delay

gprs qos map umts

gprs radius attribute chap-challenge

gprs radius attribute session-timeout

gprs radius msisdn first-byte

gprs redundancy

gprs redundancy charging sync-window cdr rec-seqnum

gprs redundancy charging sync-window gtpp seqnum

gprs service-aware

gprs service-mode test imsi

gprs service-mode

gprs slb mode

gprs slb notify

gprs slb vserver

gprs throughput interval

gprs umts-qos dscp unmodified

gprs umts-qos map diffserv-phb

gprs umts-qos map traffic-class

gtp pdp-context single pdp-session

gtp pdp-context timeout idle

gtp pdp-context timeout session

gtp response-message wait-accounting

interface

ip access-group

ip address-pool

ip probe path

limit duration

limit sgsn-change

limit volume

maximum delay-class

maximum pdp-context

maximum peak-throughput

maximum traffic-class

mbr traffic-class

msisdn suppression

n3-requests

nbns primary

network-behind-mobile

network-request-activation

port

ppp-regeneration

radius attribute nas-id

radius attribute suppress imsi

radius attribute suppress qos

radius attribute suppress sgsn-address

radius attribute user-name msisdn

real-address

redirect all ip

redirect intermobile ip

security verify

service-aware

service gprs ggsn

service-mode

service-policy

session-failover

session idle-time


gprs gtp echo-timer dynamic enable

To enable the dynamic echo timer on the gateway GPRS support node (GGSN), use the gprs gtp echo-timer dynamic enable command in global configuration mode. To disable the dynamic echo timer, use the no form of this command.

gprs gtp echo-timer dynamic enable

no gprs gtp echo-timer dynamic enable

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(3)T.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.


12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

For a GTP path to be active, the SGSN needs to be active. To determine that an SGSN is active, the GGSN and SGSN exchange echo messages. Although the GGSN supports different methods of echo message timing, the basic echo flow begins when the GGSN sends an echo request message to the SGSN. The SGSN sends a corresponding echo response message back to the GGSN.

If the GGSN does not receive a response after a certain number of retries (a configurable value), the GGSN assumes that the SGSN is not active. This indicates a GTP path failure, and the GGSN clears all PDP context requests associated with that path.

The GGSN supports two different methods of echo timing—the default echo timer and the dynamic echo timer.

The GGSN's default echo timer can not be configured to accommodate network congestion and therefore the GTP path could be cleared prematurely. The dynamic echo timer feature enables the GGSN to better manage the GTP path during periods of network congestion. Use the gprs gtp echo-timer dynamic enable command to enable the GGSN to perform dynamic echo timing.

Default echo timer

The dynamic echo timer is based on the default echo timer in the GGSN. A description of the default echo timer follows as a means of comparison.

The default echo timer configuration uses the following commands:

gprs gtp n3-requests—Specifies maximum number of times that the GGSN attempts to send a echo-request message. The default is 5 times.

gprs gtp path-echo-interval—Specifies the number of seconds that the GGSN waits before sending an echo-request message. The default is 60 seconds.

gprs gtp t3-response—Specifies the number of seconds that the GGSN waits before resending an echo-request message after the path echo interval has expired and the echo response has not been received. The default is 1 second.

If the GGSN receives the echo response within the path echo interval (as specified in the gprs gtp path-echo-interval command; default is 60 seconds), it sends another echo request message after 60 seconds (or whatever time was configured in the gprs gtp path-echo-interval command). This message flow continues as long as the GGSN receives an echo response message within the specified path echo interval.

If the GGSN fails to receive an echo response message within the path echo interval, it resends echo request messages until the N3-requests counter is reached (as specified by the gprs gtp n3-requests command; default is 5). Because the initial request message is included in the N3-requests counter, the total number of retries is N3-1. The T3 timer increases by a factor of two for each retry (the factor value is not configurable).

For example, if N3 is set to the default of 5, and T3 is set to the default of 1 second, the GGSN will resend 4 echo request messages (the initial request + 4 retries=5). The T3 time increments for each additional echo request, by a factor of 2 seconds. So, the GGSN resends a message in 2 seconds, 4 seconds, 8 seconds, and 16 seconds. If the GGSN fails to receive an echo response message within the time period of the N3-requests counter, it clears the GTP path and deletes all of the PDP contexts.

For the above example, the total elapsed time from when the first request message is sent, to when the GTP path is cleared, is: 60+2+4+8+16=90 seconds,

where 60 is the initial value of the path echo interval, and the remaining 4 time periods are the increments of the T3 timer for the subsequent retries.

Dynamic echo timer

The dynamic echo timer method is different from the default echo timer method on the GGSN because it uses a calculated round-trip timer (RTT), as well as a configurable factor or multiplier to be applied to the RTT statistic.

The dynamic echo timer configuration uses the following commands:

gprs gtp echo-timer dynamic enable—Enables the dynamic echo timer on the GGSN.

gprs gtp echo-timer dynamic minimum—Specifies the minimum time period (in seconds) for the dynamic echo timer. If the RTT is less than this value, the GGSN uses the value set in this command.

gprs gtp echo-timer dynamic smooth-factor—Configures the multiplier that the dynamic echo timer uses when calculating the time to wait to send retries, when it has not received a response from the SGSN within the path echo interval.

gprs gtp n3-requests—Specifies the maximum number of times that the GGSN attempts to send an echo-request message. The default is 5 times.

gprs gtp path-echo-interval—Specifies the number of seconds within which the GGSN expects to receive an echo response. This is the period of time that the GGSN waits before sending another echo-request message. The default is 60 seconds.

The GGSN calculates the RTT statistic for use by the dynamic echo timer feature. The RTT is the amount of time between sending a particular echo request message and receiving the corresponding echo response message. RTT is calculated for the first echo response received; the GGSN records this statistic. Because the RTT value might be a very small number, there is a minimum time for the dynamic echo timer to use. This value is configured using the gprs gtp echo-timer dynamic minimum command.

If the GGSN fails to receive an echo response message within the path echo interval, it goes into retransmission, or path failure mode. During path failure mode, the GGSN uses a value referred to as the T-dynamic. The T-dynamic is the greater of either the dynamic minimum, or the RTT statistic multiplied by the smooth factor.

The T-dynamic essentially replaces the use of the gprs gtp t3-response command, which is used in the default echo timer method on the GGSN. The T-dynamic timer increases by a factor of two for each retry (again, this factor is not configurable), until the N3-requests counter is reached (N3-requests counter includes the initial request message).

For example, if the RTT is 6 seconds, N3 is set to 5, and the smooth factor is set to 3, the GGSN will resend 4 echo request messages in path failure mode. The T-dynamic value is 18 (RTT x smooth factor), so the GGSN sends a retry echo request message in 36 seconds, 72 seconds, 144 seconds, and 288 seconds. If the GGSN fails to receive an echo response message in this time period, it clears the GTP path and deletes all PDP contexts. The total elapsed time from when the first request message is sent to when the GTP path is cleared is: 60+36+72+144+288=600 seconds,

where 60 is the initial value of the path echo interval, and the remaining 4 time periods are the increments of the T-dynamic for the subsequent retries.

Examples

The following example turns on the dynamic echo timer, sets the minimum value to 5 seconds, and configures a smooth factor of 3:

gprs gtp echo-timer dynamic enable
gprs gtp echo-timer dynamic minimum 5
gprs gtp echo-timer dynamic smooth-factor 3

Related Commands

Command
Description

gprs gtp echo-timer dynamic minimum

Specifies the minimum time period used by the dynamic echo timer.

gprs gtp echo-timer dynamic smooth-factor

Configures the multiplier that the GGSN uses to calculate the time to wait to send retries of the dynamic echo timer.

gprs gtp n3-requests

Specifies the maximum number of times that the GGSN attempts to send a signaling request.

gprs gtp path-echo-interval

Specifies the number of seconds that the GGSN waits before sending an echo-request message.


gprs gtp echo-timer dynamic minimum

To specify the minimum time period used by the dynamic echo timer, use the gprs gtp echo-timer dynamic minimum command in global configuration mode. To return to the default value, use the no form of this command.

gprs gtp echo-timer dynamic minimum number

no gprs gtp echo-timer dynamic minimum number

Syntax Description

number

Minimum time period (between 1 and 60 seconds) of the dynamic echo timer. Value must be an integer. The default value is 5 seconds.


Defaults

5 seconds

Command Modes

Global configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use this command to specify the minimum time period (in seconds) used by the dynamic echo timer, also referred to as the T-dynamic. If the GGSN's current calculation of the round-trip timer (RTT) statistic, multiplied by the smooth factor, is less than the configured dynamic minimum value, then the GGSN uses the configured minimum as the T-dynamic.

The GGSN calculates the RTT statistic for use by the dynamic echo timer feature. The RTT is the amount of time between sending a particular echo request message and receiving the corresponding echo response message. RTT is calculated for the first echo response received; the GGSN records this statistic. Because the RTT value might be a very small number, there is a minimum time for the dynamic echo timer to use. This value is configured using the gprs gtp echo-timer dynamic minimum command.

If the GGSN fails to receive an echo response message from the SGSN within the path echo interval, it goes into retransmission, or path failure mode. During path failure mode, the GGSN uses a value referred to as the T-dynamic. The T-dynamic is the greater of either the dynamic minimum, or the RTT statistic multiplied by the smooth factor.

The T-dynamic essentially replaces the use of the gprs gtp t3-response command, which is used in the default echo timer method on the GGSN. The T-dynamic timer increases by a factor of two for each retry (again, this factor is not configurable), until the N3-requests counter is reached (N3-requests counter includes the initial request message).


Note For more information about the dynamic echo timer on the GGSN, refer to the Usage Guidelines section for the gprs gtp echo-timer dynamic enable command.


Examples

The following example turns on the dynamic echo timer, sets the minimum value to 6 seconds, and configures a smooth factor of 2:

gprs gtp echo-timer dynamic enable
gprs gtp echo-timer dynamic minimum 6
gprs gtp echo-timer dynamic smooth-factor 2

Related Commands

Command
Description

gprs gtp echo-timer dynamic minimum

Enables the dynamic echo timer on the GGSN.

gprs gtp echo-timer dynamic smooth-factor

Configures the multiplier that the GGSN uses to calculate the time to wait to send retries of the dynamic echo timer.

gprs gtp n3-requests

Specifies the maximum number of times that the GGSN attempts to send a signaling request.

gprs gtp path-echo-interval

Specifies the number of seconds that the GGSN waits before sending an echo-request message to the SGSN.


gprs gtp echo-timer dynamic smooth-factor

To configure the multiplier that the gateway GPRS support node (GGSN) uses to calculate the time to wait to send retries of the dynamic echo timer, use the gprs gtp echo-timer dynamic smooth-factor command in global configuration mode. To return to the default value, use the no form of this command.

gprs gtp echo-timer dynamic smooth-factor number

no gprs gtp echo-timer dynamic smooth-factor number

Syntax Description

number

Integer (between 1 and 100) used by the GGSN as a multiplier for the RTT statistic, to calculate the T-dynamic. The default is 2.


Defaults

2

Command Modes

Global configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

The dynamic echo timer uses the smooth factor to calculate what is known as the T-dynamic. The T-dynamic is calculated by multiplying the RTT (or the value configured in the gprs gtp echo-timer dynamic minimum, whichever is greater) times the smooth-factor.


Note Refer to the Usage Guidelines section for the gprs gtp echo-timer dynamic enable command for a detailed explanation of how the dynamic echo timer works.


Examples

The following example turns on the dynamic echo timer, sets the minimum value to 1 second, and configures a smooth factor of 2:

gprs gtp echo-timer dynamic enable
gprs gtp echo-timer dynamic minimum 1
gprs gtp echo-timer dynamic smooth-factor 2

Related Commands

Command
Description

gprs gtp echo-timer dynamic smooth-factor

Enables the dynamic echo timer on the GGSN.

gprs gtp echo-timer dynamic smooth-factor

Specifies the minimum time period used by the dynamic echo timer.

gprs gtp n3-requests

Specifies the maximum number of times that the GGSN attempts to send a signaling request.

gprs gtp path-echo-interval

Specifies the number of seconds that the GGSN waits before sending an echo-request message to the SGSN.

gprs gtp t3-response

Specifies the initial time that the GGSN waits before resending a signaling request message when a response to a request has not been received


gprs gtp error-indication throttle

To specify the maximum number of error indication messages that the GGSN sends out in one second, use the gprs gtp error-indication throttle command. To disable the GGSN from sending error indication messages, use the no form of this command.

gprs gtp error-indication throttle window-size size

no gprs gtp error-indication throttle

Syntax Description

size

Integer (between 0 and 256) that specifies the maximum number of error indication messages that the GGSN sends in one second.


Defaults

Disabled

Command Modes

Global configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the gprs gtp error-indication throttle command to specify the maximum number of error indication messages that are sent by the GGSN in one second. This provides a way to implement flow control for transmission of GTP error messages. The GGSN maintains a counter that decrements each time that an error indication message is sent. The GGSN resets this counter to the configured throttle value after one second.

If you do not issue the command, error indication throttling is not enabled. To restore the default value (error indication throttling is disabled) use the no form of this command.

Examples

The following example shows a throttle value of 150:

gprs gtp error-indication throttle window-size 150

gprs gtp ip udp ignore checksum

To configure the gateway GPRS support node (GGSN) to ignore user datagram protocol (UDP) checksums (in order to support Cisco Express Forwarding [CEF] switching on the GGSN), use the gprs gtp ip udp ignore checksum global configuration command. To disable the ignoring of UDP checksums on the GGSN, use the no form of this command.

gprs gtp ip udp ignore checksum

no gprs gtp ip udp ignore checksum

Syntax Description

This command has no arguments or keywords.

Defaults

By default, the GGSN verifies UDP checksums.

Command Modes

Global configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

UDP checksum verification can prohibit operation of CEF switching processing on the GGSN if the checksum should have a non-zero result. Therefore, if you want to enable CEF switching on the GGSN, ensure that the GGSN is configured to ignore UPD checksums (the default).

If UDP checksum verification remains enabled on the GGSN and a non-zero result occurs, the GTP T-PDUs will be process switched, even if you have configured the GGSN for CEF switching.

The gprs gtp ip udp ignore checksum command does not apply if you are only using process switching on the GGSN.

For more information about switching processes, refer to the Cisco IOS Switching Services Configuration Guide.

Examples

The following example disables UDP checksum verification on the GGSN:

gprs gtp ip udp ignore checksum

Related Commands

Command
Description

ip cef

Enables CEF on the route processor card.


gprs gtp map signalling tos

To specify an IP ToS mapping for GPRS tunneling protocol (GTP) signaling packets, use the gprs gtp map signalling tos global configuration command. To return to the default value, use the no form of this command.

gprs gtp map signalling tos tos-value

no gprs gtp map signalling tos tos-value

Syntax Description

tos-value

Value between 0 and 7 that specifies the IP ToS mapping. The default value is 5.


Defaults

ToS value 5

Command Modes

Global configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the gprs gtp map signalling tos command to specify the IP ToS mapping for GTP signaling packets transmitted by the GGSN. The higher the value, the higher the class of service provided to the packets.

Examples

The following example specifies a IP ToS mapping value of 3:

gprs gtp map signalling tos 3

Related Commands

Command
Description

gprs canonical-qos map tos

Specifies a QoS mapping from the canonical QoS classes to an IP ToS category.

gprs charging container volume-threshold

Specifies the maximum number of bytes that the GGSN maintains in a user's charging container before closing the charging container and updating the CDR.

gprs charging map data tos

Specifies an IP ToS mapping for GPRS charging data packets.

gprs charging packet-queue-size

Specifies the maximum number of unacknowledged charging data transfer requests that the GGSN maintains in its queue.

gprs charging message transfer-response number-responded

Specifies the number of seconds that the GGSN waits before it transfers charging data to the charging gateway.


gprs gtp n3-buffer-size

To specify the size of the receive buffer that the GGSN uses to receive GTP signaling messages and packets sent through the tunneling protocol, use the gprs gtp n3-buffer-size global configuration command. To return to the default value, use the no form of this command.

gprs gtp n3-buffer-size bytes

no gprs gtp n3-buffer-size

Syntax Description

bytes

Number of bytes (between 2048 and 65535) that specifies the size of the N3 buffer. The default is 8192 bytes.


Defaults

8192 bytes

Command Modes

Global configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the gprs gtp n3-buffer-size command to specify the size of the GTP N3 buffer on the GGSN. The N3 buffer is a receive buffer that the GGSN uses to receive GTP signaling messages and packets sent through the tunneling protocol. The recommended value for the N3 buffer size is 8192 (the default size).

Examples

The following example specifies a buffer size of 2084 bytes:

gprs gtp n3-buffer-size 2048

gprs gtp n3-requests

To specify the maximum number of times that the GGSN attempts to send a signaling request to an SGSN, use the gprs gtp n3-requests global configuration command. To return to the default value, use the no form of this command.

gprs gtp n3-requests requests

no gprs gtp n3-requests requests

Syntax Description

requests

A number between 1 and 65535 that specifies the number of times a request is attempted. The default is 5 requests.


Defaults

5 requests

Command Modes

Global configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

The value of the gprs gtp n3-requests command is used for all signaling requests on the GGSN.

The GGSN supports two different methods of echo timing—the default echo timer and the dynamic echo timer. The gprs gtp n3-requests command is used by the GGSN to perform either type of echo processing.

Examples

The following example shows the GGSN attempting to send a signaling request 3 times:
gprs gtp n3-requests 3

Related Commands

Command
Description

gprs gtp echo-timer dynamic enable

Enables the dynamic echo timer on the GGSN.

gprs gtp n3-buffer-size

Specifies the size of the receive buffer that the GGSN uses to receive GTP signaling messages and packets sent through the tunneling protocol.

gprs gtp path-echo-interval

Specifies the number of seconds that the GGSN waits before sending an echo-request message to the SGSN.

gprs gtp t3-response

Specifies the initial time that the GGSN waits before resending a signaling request message when a response to a request has not been received.


gprs gtp path-echo-interval

To specify the number of seconds that the GGSN waits before sending an echo-request message to the SGSN or charging gateway, use the gprs gtp path-echo-interval global configuration command. To return to the default value, use the no form of this command.

gprs gtp path-echo-interval interval

no gprs gtp path-echo-interval interval

Syntax Description

interval

Number of seconds that the GGSN waits before sending an echo-request message. Specify a value between 60 and 65535 seconds. The value 0 disables the echo-request feature. The default is 60 seconds.


Defaults

60 seconds

Command Modes

Global configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

The GGSN supports two different methods of echo timing—the default echo timer and the dynamic echo timer. The gprs gtp path-echo-interval command is used on the GGSN to perform either type of echo processing.

Use the gprs gtp path-echo-interval command to specify the interval that the GGSN waits before sending an echo-request message to the SGSN or charging gateway to check for GTP path failure.


Note A value of 0 seconds disables echo requests on the GGSN.


Examples

The following example shows the GGSN waiting 90 seconds before sending an echo-request message:

gprs gtp path echo-interval 90

Related Commands

Command
Description

gprs gtp echo-timer dynamic enable

Enables the dynamic echo timer on the GGSN.

gprs gtp n3-requests

Specifies the maximum number of times that the GGSN attempts to send a signaling request to an SGSN.

gprs gtp t3-response

Specifies the initial time that the GGSN waits before resending a signaling request message when a response to a request has not been received.


gprs gtp pdp-context timeout idle

To specify the time, in seconds, that a GGSN allows a session to remain idle at any access point before purging the PDP context, use the gprs gtp pdp-context timeout idle global configuration command. To return to the default value, use the no form of this command.

gprs gtp pdp-context timeout idle seconds [uplink]

no gprs gtp pdp-context timeout idle

Syntax Description

seconds

Time, in seconds, that the GGSN allows a PDP context to remain idle on any access point before terminating the context. Specify a value between 30 and 4294967 seconds.

uplink

(Optional) Enables the session idle timer in the uplink direction only. When the uplink keyword option is not specified, the session idle timer is enabled in both directions (uplink and downlink).


Defaults

259200 seconds (72 hours)

Command Modes

Global configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(8)XU1

This command was integrated into Cisco IOS Release 12.3(8)XU1 and the uplink keyword option was added.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

The GGSN supports the RADIUS Idle-Timeout (Attribute 28) field. The GGSN stores the attribute 28 value if it is present in the access request packets sent by the AAA server. When a PDP context is idle for an amount of time that exceeds the session idle timeout duration, the GGSN terminates it.

The duration specified for the session idle timer applies to all PDP contexts of a session, however, a session idle timer is started for each PDP context. Therefore, the session idle timer is per-PDP, but the timer duration is per-session.

On the GGSN, the session idle timer can be configured globally and at the APN. The value configured at the APN level using the gtp pdp-context timeout idle access-point configuration command overrides the value configured globally using the gprs gtp pdp-context timeout idle global configuration command. The value configured in the user profile on the RADIUS server overrides the value configured at the APN.


Note The session idle timer started for a PDP context is reset by TPDU traffic and GTP signaling messages for that PDP context. For example, if an Update PDP Context request is received, the session idle timer is reset for that PDP context.


You can disable the session idle timer for a particular user by configuring 0 as the session idle time duration in the user profile on the RADIUS server. If a user is authenticated by RADIUS, the session idle time cannot be disabled.


Note The session idle timeout (RADIUS Attribute 28) support applies to IP PDPs, PPP PDPs terminated at the GGSN, and PPP regenerated PDPs (not PPP L2TP PDPs). The absolute session timeout (RADIUS Attribute 27) support applies to IP PDPs and PPP PDPs terminated at the GGSN (not PPP Regen or PPP L2TP PDPs).

When configured, a session idle timer is started on every PDP context. An absolute session timer is started on the session.



Note Alternately, you can configure the idle timer globally using the gprs idle-pdp-context purge-timer hours global configuration command, however, the two methods cannot be configured at the same time.


Examples

The following example shows configuring the GGSN to wait 18000 seconds before ending an idle PDP context:

gprs gtp pdp-context timeout idle 18000

Related Commands

Command
Description

gprs gtp pdp-context timeout session

Specifies the time, in seconds, that the GGSN allows a session to be active on any access point before terminating the session.

gprs idle-pdp-context purge-time

Specifies the time, in hours, that the GGSN waits before purging idle mobile sessions.

gtp pdp-context timeout idle

Specifies the time, in seconds, that a GGSN allows a session to be idle at a particular APN before terminating the session.

gtp pdp-context timeout session

Specifies the time, in seconds, that a GGSN allows a session to be active at a particular APN before terminating the session.

session idle-time

Specifies the time, in hours, that the GGSN waits before purging idle mobile sessions for an access point.

show gprs gtp pdp-context

Displays a list of the currently active PDP contexts (mobile sessions).


gprs gtp pdp-context timeout session

To specify the time, in seconds, that the GGSN allows a session to exist at any access point before terminating the session, use the gprs gtp pdp-context timeout session global configuration command. To return to the default value, use the no form of this command.

gprs gtp pdp-context timeout session seconds

no gprs gtp pdp-context timeout session

Syntax Description

seconds

Time, in seconds, that the GGSN allows a session to exist at any access point. Specify a value between 30 and 4294967 seconds.


Defaults

Disabled

Command Modes

Global configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

When enabled using the gprs radius attribute session-timeout command, the GGSN supports the RADIUS Session-Timeout (Attribute 27). The GGSN stores the attribute timeout value received in access-accept packets sent by the AAA server and when the duration of a session exceeds the duration configured as absolute session timer, the GGSN terminates the sessionand all PDP contexts belonging to the session (those with the same IMSI or MS address).


Note The session idle timeout (RADIUS Attribute 28) support applies to IP PDPs, PPP PDPs terminated at the GGSN, and PPP regenerated PDPs (not PPP L2TP PDPs). The absolute session timeout (RADIUS Attribute 27) support applies to IP PDPs and PPP PDPs terminated at the GGSN (not PPP Regen or PPP L2TP PDPs).

When configured, a session idle timer is started on every PDP context. An absolute session timer is started on the session.



Note The active session timeout feature requires that the gprs radius attribute session-timeout command has been enabled.


On the GGSN, the absolute session timer can be configured globally and at the APN. The value configured at the APN level using the gtp pdp-context timeout session access-point configuration command overrides the value configured globally using the gprs gtp pdp-context timeout session global configuration command. The value configured in the user profile on the RADIUS server overrides the value configured at the APN.

Examples

The following example shows configuring the GGSN to end any session that exceeds 86400 seconds in duration:

gprs gtp pdp-context timeout session 86400

Related Commands

Command
Description

gprs gtp pdp-context timeout idle

Specifies the time, in seconds, that a GGSN allows a session to be idle at any access point before terminating the session.

gprs idle-pdp-context purge-timer

Specifies the time, in hours, that the GGSN waits before purging idle mobile sessions.

gtp pdp-context timeout idle

Specifies the time, in seconds, that a GGSN allows a session to be idle at a particular APN before terminating the session.

gtp pdp-context timeout session

Specifies the time, in seconds, that a GGSN allows a session to be active at a particular APN before terminating the session.

session idle-time

Specifies the time, in hours, that the GGSN waits before purging idle mobile sessions for an access point.

show gprs gtp pdp-context

Displays a list of the currently active PDP contexts (mobile sessions).


gprs gtp ppp vtemplate

To associate the virtual template interface that defines the PPP characteristics with support for the PPP packet data protocol (PDP) type over GPRS tunneling protocol (GTP) on the gateway GPRS support node (GGSN), use the gprs gtp ppp vtemplate command in global configuration mode. To remove specification of the PPP virtual template interface for GTP on the GGSN, use the no form of this command.

gprs gtp ppp vtemplate number

no gprs gtp ppp vtemplate

Syntax Description

number

Integer identifier of the virtual template interface over which the PPP characteristics are defined on the GGSN. This number must match the number configured in the corresponding interface virtual-template command.


Defaults

No default behavior or values.

Command Modes

Global configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Before you configure the gprs gtp ppp vtemplate command, you must configure the virtual template interface with the necessary PPP characteristics. The number that you configure for the virtual template interface that defines the PPP characteristics, must correspond to the number that you specify in the gprs gtp ppp vtemplate command.

Examples

The following example configures two virtual template interfaces on the GGSN, one for GTP encapsulation and one for PPP, and specifies the PPP virtual template interface for GTP on the GGSN.


Note The virtual template interface for PPP is a different virtual template interface than the GPRS virtual template interface for GTP encapsulation.


The first section of commands configures the GPRS virtual template interface for GTP:

interface Virtual-Template 1
 ip unnumber loopback 1
 no ip directed-broadcast
 encapsulation gtp
 no ip route-cache
 gprs access-point-list gprs

The following example configures a virtual template interface for PPP and associates the virtual template for support of the PPP PDP type over GTP on the GGSN:

interface Virtual-Template 2
 ip unnumbered FastEthernet 1/0
 no ip directed-broadcast
 no peer default ip address
 ppp authentication chap
 ppp timeout retry 30

gprs gtp ppp vtemplate 2

Related Commands

Command
Description

interface virtual-template

Creates a virtual template interface that can be configured and applied dynamically in creating virtual access interfaces.


gprs gtp ppp-regeneration vtemplate

To associate the virtual template interface that is configured for PPP encapsulation with support for regenerated PPP sessions on the gateway GPRS support node (GGSN), use the gprs gtp ppp-regeneration vtemplate command in global configuration mode. To remove specification of the PPP virtual template interface for regenerated PPP sessions on the GGSN, use the no form of this command.

gprs gtp ppp-regeneration vtemplate number

no gprs gtp ppp-regeneration vtemplate

Syntax Description

number

Integer identifier of the virtual template interface which defines PPP encapsulation on the GGSN. This number must match the number configured in the corresponding interface virtual-template command.


Defaults

No default behavior or values.

Command Modes

Global configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Before you configure the gprs gtp ppp-regeneration vtemplate command, you must configure the virtual template interface for PPP encapsulation using the encapsulation ppp command. In addition, you must also configure the ip address negotiated command and the no peer neighbor-route command at the virtual template interface for PPP encapsulation.

The number that you configure for the virtual template interface to support PPP encapsulation, must correspond to the number that you specify in the gprs gtp ppp-regeneration vtemplate command.

Examples

The following example configures two virtual template interfaces on the GGSN, one for GTP encapsulation for communication between the GGSN and the SGSN, and one for PPP regeneration. The virtual template interface for PPP regeneration supports the creation of PPP sessions from the GGSN over Layer 2 Tunneling Protocol (L2TP) tunnels to an L2TP network server (LNS).


Note The virtual template interface for PPP regeneration is a different virtual template interface than the GPRS virtual template interface for PPP PDP type support and for GTP encapsulation.


The first section of commands configures the GPRS virtual template interface for GTP:

interface Virtual-Template 1
 ip unnumber loopback 1
 no ip directed-broadcast
 encapsulation gtp
 no ip route-cache
 gprs access-point-list gprs

The following example configures a virtual template interface for PPP regeneration:

interface Virtual-Template 11
 ip address negotiated
 no peer neighbor-route
 encapsulation ppp


Note The encapsulation ppp configuration will not display in a show running configuration because it is the default encapsulation.



The following example specifies virtual template interface 11 for PPP regeneration on the GGSN:

gprs gtp ppp-regeneration vtemplate 11

Related Commands

Command
Description

interface virtual-template

Creates a virtual template interface that can be configured and applied dynamically in creating virtual access interfaces.


gprs gtp response-message pco ipcp nack

To configure the gateway GPRS support node (GGSN) to return an IP control protocol (IPCP) Conf-Nack (Code 03) in the GPRS tunneling protocol (GTP) protocol configuration option (PCO) information element (IE) of a create packet data protocol (PDP) context response when returning IPCP options for which the granted values (non-zero) differ from those requested (IPCP Conf-Reject [Code 04] for those options for which the returned address values are zero), use the gprs gtp response-message pco ipcp nack command in global configuration mode. To return to the default, use the no form of the command.

gprs gtp response-message pco ipcp nack

no gprs gtp response-message pco ipcp nack

Syntax Description

This command has no arguments or keywords.

Defaults

The GGSN sends an IPCP Conf-Ack (Code 2) in the PCO IE of the create PDP context response for the IPCP options for all the requested IPCP address options supported by the GGSN. The values being returned might be the same as or differ from those requested, or be zero.

For unsupported options, an IPCP Conf-Reject is returned.

Command Modes

Global configuration

Command History

Release
Modification

12.3(2)XB1

This command was introduced.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the gprs gtp response-message pco ipcp nack command to configure the GGSN to return an IPCP Conf-Nack in the PCO IE of a create PDP context response when returning IPCP options for which the granted values differ from those requested.

When the gprs gtp response-message pco ipcp nack command is configured, and the PCO IE of the create PDP context request contains IPCP options, the PCO IE in the create PDP response includes the following, depending on the whether options are supported by (and values are acceptable to) the GGSN:

IPCP Conf-Ack—One or (zero) IPCP Conf-Ack for the IPCP options for which the requested values are acceptable by the GGSN.

IPCP Conf-Nack—One or (zero) IPCP Conf-Nack containing the IPCP options for which the granted values differ from those requested.

IPCP Conf-Reject—One (or zero) IPCP Conf-Reject containing the requested options which are not supported by the GGSN, or, if supported, for which no values can be granted.

gprs gtp response-message wait-accounting

To configure the gateway GPRS support node (GGSN) to wait for a RADIUS accounting response before sending a create packet data protocol (PDP) context response to the serving GPRS support node (SGSN) for create PDP context requests received across all access points, use the gprs gtp response-message wait-accounting command in global configuration mode. To configure the GGSN to send a create PDP context response to the SGSN after sending a RADIUS start accounting message to the RADIUS server (without waiting for a response from the RADIUS accounting server), use the no form of this command.

gprs gtp response-message wait-accounting

no gprs gtp response-message wait-accounting

Syntax Description

This command has no arguments or keywords.

Defaults

The GGSN sends a create PDP context response to the SGSN after sending a RADIUS start accounting message to the RADIUS accounting server. The GGSN does not wait for a RADIUS accounting response from the RADIUS accounting server.

Command Modes

Global configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the gprs gtp response-message wait-accounting command to configure the GGSN to wait for a RADIUS accounting response from the RADIUS accounting server before sending a create PDP context response to the SGSN for create PDP context requests received across all access points.

If the GGSN does not receive a response from the RADIUS accounting server when you have configured the gprs gtp response-message wait-accounting command, it rejects the PDP context request.

When broadcast accounting is used (accounting requests are sent to multiple RADIUS servers), if a RADIUS server responds with an accounting response, the GGSN sends a create PDP context response and does not wait for the other RADIUS servers to respond.

The GGSN supports configuration of RADIUS response message waiting at both the global and access-point configuration levels. You can minimize your configuration by specifying the configuration that you want to support across most APNs, at the global configuration level. Then, at the access-point configuration level, you can selectively modify the behavior that you want to support at a particular APN. Therefore, at the APN configuration level, you can override the global configuration of RADIUS response message waiting.

To configure the GGSN to wait for a RADIUS accounting response as the default behavior for all APNs, use the gprs gtp response-message wait-accounting global configuration command. To disable this behavior for a particular APN, use the no response-message wait-accounting access-point configuration command.

To verify whether RADIUS response message waiting is enabled or disabled at an APN, you can use the show gprs access-point command and observe the value reported in the wait_accounting output field.

Examples

The following example globally configures the GGSN to wait for a RADIUS accounting response from the RADIUS accounting server before sending an activate PDP context response to the SGSN, for PDP context requests received across all access points except access-point 1. RADIUS response message waiting has been overridden at access-point 1 using the no gtp response-message wait-accounting command:


Note This example shows only a partial configuration of the GGSN, to highlight those commands related to implementing RADIUS response message waiting. Additional configuration statements are required to complete a full configuration of the GGSN.


aaa new-model
!
aaa group server radius grp
 server 10.2.3.4
 server 10.6.7.8
!
aaa authentication ppp grp group grp
aaa authorization network default group radius
aaa accounting exec default start-stop group grp
!
gprs access-point-list gprs
 access-point 1
  access-mode non-transparent
  access-point-name www.pdn1.com
  aaa-group authentication grp
  no gtp response-message wait-accounting
  exit
 access-point 2
  access-mode non-transparent
  access-point-name www.pdn2.com
  aaa-group authentication grp
!
gprs gtp response-message wait-accounting
!
radius-server host 10.2.3.4 auth-port 1645 acct-port 1646 non-standard
radius-server host 10.6.7.8 auth-port 1645 acct-port 1646 non-standard
radius-server key ggsntel

Related Commands

Command
Description

gtp response-message wait-accounting

Configures the GGSN to wait for a RADIUS accounting response before sending a create PDP context response to the SGSN, for create PDP context requests received at a particular APN.

show gprs access-point

Displays information about access points on the GGSN.


gprs gtp t3-response

To specify the initial time that the GGSN waits before resending a signaling request message when a response to a request has not been received, use the gprs gtp t3-response global configuration command. To return to the default value, use the no form of this command.

gprs gtp t3-response response-interval

no gprs gtp t3-response response-interval

Syntax Description

response-interval

A value between 1 and 65535 that specifies the length of the T3 response interval, in seconds. The default is 1 second.


Defaults

1 second

Command Modes

Global configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

The gprs gtp t3-response command is used by the GGSN to process delete PDP context requests and to perform the default method of echo timing.

For delete PDP context requests, the gprs gtp t3-response command is used by the GGSN to specify how long the GGSN waits before sending a retry of the delete PDP context request when a response is not received from the SGSN, until the gprs gtp n3-requests limit is reached.

The GGSN supports two echo timer implementations—the default echo timer and the dynamic echo timer. The gprs gtp t3-response command also is used on the GGSN to perform the default type of echo processing, when the dynamic echo timer is not enabled.

If the GGSN receives the echo response within the path echo interval (as specified in the gprs gtp path-echo-interval command; default is 60 seconds), it sends another echo request message after 60 seconds (or whatever time was configured in the gprs gtp path-echo-interval command). This message flow continues as long as the GGSN receives an echo response message within the specified path echo interval.

If the GGSN fails to receive an echo response message from the SGSN within the path echo interval, it resends echo request messages until the N3-requests counter is reached (as specified by the gprs gtp n3-requests command; default is 5). Because the initial request message is included in the N3-requests counter, the total number of retries is N3-1. The T3 timer increases by a factor of two for each retry (the factor value is not configurable).

For example, if N3 is set to the default of 5, and T3 is set to the default of 1 second, the GGSN will resend 4 echo request messages (the initial request + 4 retries=5). The T3 time increments for each additional echo request, by a factor of 2 seconds. So, the GGSN resends a message in 2 seconds, 4 seconds, 8 seconds, and 16 seconds. If the GGSN fails to receive an echo response message from the SGSN within the time period of the N3-requests counter, it clears the GTP path and deletes all of the PDP contexts.

For the above example, the total elapsed time from when the first request message is sent, to when the GTP path is cleared, is: 60+2+4+8+16=90 seconds,

where 60 is the initial value of the path echo interval, and the remaining 4 time periods are the increments of the T3 timer for the subsequent retries.

Examples

The following example shows a T3 interval response interval of 524 seconds:

gprs gtp t3-response 524

Related Commands

Command
Description

gprs gtp n3-requests

Specifies the maximum number of times that the GGSN attempts to send a signaling request to an SGSN.

gprs gtp path-echo-interval

Specifies the number of seconds that the GGSN waits before sending an echo-request message to the SGSN.


gprs idle-pdp-context purge-timer

To specify the time, in hours, that the GGSN waits before purging idle mobile sessions, use the gprs idle-pdp-context purge-timer global configuration command. To return to the default value, use the no form of this command.

gprs idle-pdp-context purge-timer hours

no gprs idle-pdp-context purge-timer hours

Syntax Description

hours

Value between 0 and 255 that specifies the number of hours that the GGSN waits before purging idle sessions. The value 0 disables the purge timer. The default is 72 hours.


Defaults

72 hours

Command Modes

Global configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

To specify the time that the GGSN waits before purging idle mobile sessions, use the gprs idle-pdp-context purge-timer command. To disable this feature, specify a purge-timer value of 0.

You can override the value of the global purge timer using the session idle-time access-point configuration command.


Note With GGSN Release 5.0 and later, you can also configure the session idle timer globally using the gprs gtp pdp-context timeout idle access-point configuration command, however, the two methods cannot be configured at the same time.


Examples

The following example specifies that the GGSN wait for 60 hours before purging idle sessions:

gprs idle-pdp-context purge-timer 60

Related Commands

Command
Description

gprs gtp pdp-context timeout idle

Specifies the number of seconds that a GGSN allows a session to be idle before terminating the session.

gprs gtp pdp-context timeout session

Specifies the number of seconds that the GGSN allows a session to be active before terminating the session.

gtp pdp-context timeout idle

Specifies the number of seconds that a GGSN allows a session to be idle at a particular APN before terminating the session.

gtp pdp-context timeout session

Specifies the number of seconds that a GGSN allows a session to be active at a particular APN before terminating the session.

session idle-time

Specifies the time that the GGSN waits before purging idle mobile sessions for the current access point.


gprs maximum-pdp-context-allowed

To specify the maximum number of PDP contexts (mobile sessions) that can be activated on the GGSN, use the gprs maximum-pdp-context-allowed global configuration command. To return to the default value, use the no form of this command.

gprs maximum-pdp-context-allowed pdp-contexts

no gprs maximum-pdp-context-allowed pdp-contexts

Syntax Description

pdp-contexts

Integer between 1 and 4294967295 that specifies the number of active PDP contexts allowed. The default is 10000 PDP contexts.


Defaults

10000 PDP contexts

Command Modes

Global configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX, and the default value was changed from 1000 to 10000.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the gprs maximum-pdp-context-allowed command to specify the maximum number of PDP contexts allowed on the GGSN. When the maximum allowable number of PDP contexts is reached, the GGSN refuses new PDP contexts (mobile sessions) until sessions are available.

The practical upper limit for the maximum number of PDP contexts supported on a GGSN is dependent on the memory and platform in use and the GGSN configuration (for example, whether or not a method of Point to Point Protocol [PPP] has been configured to forward packets beyond the terminal equipment and mobile termination, whether Dynamic Feedback Protocol [DFP] is being used or the memory protection feature is enabled, and the rate of PDP context creation to be supported).


Note DFP weighs PPP PDPs against IP PDPs with one PPP PDP being equals to 8 IP PDPs.


Cisco 7200 Series Router

The following list shows the maximum number of PDP contexts supported on the GGSN according to the memory and Cisco 7206 router series in use when a method of PPP has not been configured:

Cisco 7206 VXR NPE-300 with 256 Mb RAM—80,000 IP PDP contexts.

Cisco 7206 VXR NPE-400 router with 512 Mb RAM—135,000 IP PDP contexts.

Catalyst 6500 Series Switch / Cisco 7600 Series Router

The Cisco MWAM can support up to 60,000 IP PDP contexts per GGSN instance with a maximum number of 300,000 IP PDP contexts per MWAM on which five GGSNs are configured.


Note When the maximum allowable number of PDP contexts is reached, the GGSN refuses new PDP contexts (mobile sessions) until sessions are available.



Note If you use DFP with GTP load balancing, you must also specify a maximum number of PDP contexts for each GGSN, using the gprs maximum-pdp-context-allowed command. Do not accept the default value of 10000 PDP contexts. Significantly lower values can impact performance in a GPRS load-balancing environment.

DFP weighs PPP PDPs against IP PDPs with one PPP PDP being equal to 8 IP PDPs. therefore when using DFP, be aware that the configured maximum number of PDP contexts affects the GGSN weight. The lower the maximum number of PDP contexts, the lower the weight when all other parameters remain the same.



Note For more information about configuring GTP load balancing, see the IOS Server Load Balancing, documentation located at Cisco.com.


Examples

In the following example 15000 PDP contexts are allowed on the GGSN:

gprs maximum-pdp-context-allowed 15000

Related Commands

Command
Description

gprs idle-pdp-context purge-timer

Specifies the time that the GGSN waits before purging idle mobile sessions.


gprs mcc mnc

To configure the mobile country code and mobile network code that the GGSN uses to determine if a create PDP context request is from a roamer, use the gprs mcc mnc global configuration command. To return to the default values, use the no form of this command.

gprs mcc mcc-num mnc mnc-num [trusted]

no gprs mcc mcc-num mnc mnc-num [trusted]

Syntax Description

mcc mcc-num

3-digit decimal number for the mobile country code. The valid ranges for the MCC are 000-999. The default value is 000, which is not a valid code.

mnc mnc-num

2- or 3-digit decimal number for the mobile network code. The valid ranges for the MNC are 00-999. The default value is 000, which is not a valid code.

trusted

Specifies that the MCC and MNC defined are those of a trusted PLMN. Up to 5 trusted PLMNs can configured as trusted.


Defaults

000—For both the MCC and MNC. A valid code must be a non-zero value.

Command Modes

Global configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU and the trusted keyword option added.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the gprs mcc mnc command as part of the configuration required on the GGSN to support creation of CDRs for roaming mobile subscribers, or to block roamers from being able to create PDP context requests.

The MCC and MNC together identify a GPRS/UMTS PLMN. The values you configure using the gprs mcc mnc command without the trusted keyword option specified are those of the home PLMN ID - the PLMN to which the GGSN belongs. Only one home PLMN can be defined for a GGSN at a time. The GGSN uses the values that you configure in this command to compare with the IMSI in a create PDP context request.

The GGSN automatically specifies values of 000 for the MCC and MNC. However, you must configure non-zero values for both the MCC and MNC before you can enable the GGSN to create charging CDRs for roamers.

To properly issue the gprs mcc mnc command, you must specify both the mcc keyword with its argument and the mnc keyword with its argument. You cannot issue the command without specifying both keywords.

It is important that you configure the gprs mcc mnc and gprs charging roamers commands in their proper order. After you configure the MCC and MNC values, use the gprs charging roamers command to enable charging for roamers on the GGSN. You can change the MCC and MNC values by reissuing the gprs mcc mnc command.

Using the gprs mcc mnc command, you can also configure up to 5 "trusted" PLMNs by specifying the trusted keyword. A create PDP context request from a mobile subscriber in a trusted PLMN is treated the same as a create PDP context request from a mobile subscriber in the home PLMN.

To verify your configuration of these codes on the GGSN, use the show gprs charging parameters command.


Note To see a list of some established MCC and MNC codes, refer to the "Table of MCC and MNC Codes" appendix in the Cisco IOS Mobile Wireless Configuration Guide. To find more information about MCC and MNC codes, see the ITU E.212 recommendation, Identification Plan for Land Mobile Stations.


Examples

The following example replaces the default values of 000 on the GGSN, and specifies an MCC code of 310 for the USA and an MNC code of 15 for the Bell South service provider:

gprs mcc 310 mnc 15

Related Commands

Command
Description

block-foreign-ms

Restricts GPRS access based on the mobile user's home PLMN.

gprs charging roamers

Enables charging for roamers on the GGSN.

show gprs charging parameters

Displays information about the current GPRS charging configuration.


gprs memory threshold

To prevent the gateway GPRS support node (GGSN) from draining processor memory during abnormal conditions (such as charging gateways [CGs] being down), use the gprs memory threshold command in global configuration mode to configure a memory threshold, that when reached, activates the memory protection feature on the GGSN.

gprs memory threshold threshold

Syntax Description

threshold

Memory threshold, that when fallen below enables the memory protection feature on the GGSN. Valid range is 0 to 1024.


Defaults

The default is 10% of the total memory available at the time GGSN services are enabled.

Command Modes

Global configuration

Command History

Release
Modification

12.3(2)XB

This command was introduced.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU and changed to enabled by default.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

The GGSN memory protection feature prevents processor memory from being drained during periods of abnormal conditions (such as when all charging gateways are down and the GGSN is buffering CDRs into memory.

By default, the memory threshold is 10% of the total memory available at the time GGSN services are enabled using the gprs ggsn service global configuration command. You can use the gprs memory threshold global configuration command to configure the threshold according to the router and memory size.

When the amount of memory remaining on the system reaches the defined threshold, the memory protection feature activates and the GGSN performs the following actions to keep the processor memory from falling below the threshold:

Rejects new create PDP requests with the cause value "No Resource."

Drops any existing PDPs for which an update is received with the cause value "Management Intervention."

Drops any PDPs for which a volume trigger has occurred.

Examples

The following example sets the memory threshold to 50 KB:

gprs memory threshold 512

gprs ms-address exclude-range

To specify the IP address range(s) used by the GPRS/UMTS network, and thereby excluded from the mobile station (MS) IP address range, use the gprs ms-address exclude-range global configuration command. To remove the specified range(s), use the no form of this command.

gprs ms-address exclude-range start-ip end-ip

no gprs ms-address exclude-range start-ip end-ip

Syntax Description

start-ip

IP address at the beginning of the range.

end-ip

IP address at the end of the range.


Defaults

No default behavior or values.

Command Modes

Global configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

An MS can not have the same IP address as another GPRS network entity. Use the gprs ms-address exclude-range command to reserve certain IP address ranges for use by the GPRS network, and to disallow them from use by an MS.

During a create PDP context request, the GGSN verifies whether the IP address of an MS falls within the specified excluded range. If there is an overlap of the MS IP address with an excluded range, then the PDP context request is rejected. This measure prevents duplicate IP addressing in the network.

You can configure up to 100 IP address ranges. A range can be one or more addresses. However, you can configure only one IP address range per command entry. To exclude a single IP address, you can repeat the IP address in the start-ip and end-ip arguments. IP addresses are 32-bit values.

Examples

Example 1

The following example specifies the IP address ranges used by the GPRS network (which are thereby excluded from the MS IP address range:

gprs ms-address exclude-range 10.0.0.1 10.20.40.50
gprs ms-address exclude-range 172.16.150.200 172.30.200.255
gprs ms-address exclude-range 192.168.100.100 192.168.200.255

Example 2

The following example excludes an MS from using the IP address of 10.10.10.1:

gprs ms-address exclude-range 10.10.10.1 10.10.10.1

Related Commands

Command
Description

show gprs ms-address exclude-range

Displays the IP address range(s) configured on the GGSN for the GPRS network.


gprs ni-pdp cache-timeout

To specify the maximum amount of time that the GGSN caches an SGSN address for an MS after an unsuccessful network-initiated PDP context attempt, use the gprs ni-pdp cache-timeout global configuration command. To return to the default value, use the no form of this command.

gprs ni-pdp cache-timeout number

no gprs ni-pdp cache-timeout number

Syntax Description

number

Number of seconds from 0 to 65535. The default value is 600 (10 minutes).


Defaults

600 seconds (10 minutes)

Command Modes

Global configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

The GGSN obtains the SGSN address for an MS from the HLR and caches it for the period of time specified by the gprs ni-pdp cache-timeout command, for unsuccessful network-initiated PDP context attempts with a cause of "MS not reachable" or "MS refuses." The GGSN needs the SGSN address if the MS is not reachable or if the MS refuses the PDP PDU.

Examples

The following example specifies that the GGSN caches the SGSN address for an MS for 300 seconds (5 minutes):

gprs ni-pdp cache-timeout 300

Related Commands

Command
Description

gprs ni-pdp discard-period

Specifies the amount of time that the GGSN discards subsequent PDP PDUs received on the Gi interface for an MS, after an unsuccessful network-initiated PDP context attempt.

gprs ni-pdp pdp-buffer

Specifies the maximum size of the GGSN buffer to be used for each network-initiated PDP request.

gprs ni-pdp percentage

Specifies the maximum number of PDP contexts on the GGSN that can be network-initiated, as a percentage of the maximum number of PDP contexts allowed on the GGSN.


gprs ni-pdp discard-period

To specify the amount of time that the GGSN discards subsequent PDP PDUs received on the Gi interface for an MS, after an unsuccessful network-initiated PDP context attempt, use the gprs ni-pdp discard-period global configuration command. To return to the default value, use the no form of this command.

gprs ni-pdp discard-period number

no gprs ni-pdp discard-period number

Syntax Description

number

Number of seconds from 0 to 65535. The default value is 300 (5 minutes).


Defaults

300 seconds (5 minutes)

Command Modes

Global configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

Used the gprs ni-pdp discard-period command to specify how long the GGSN discards subsequent PDUs for a PDP context from an MS, after an unsuccessful network-initiated PDP context attempt.

Examples

The following example specifies that, after an unsuccessful network-initiated PDP delivery attempt, the GGSN discards subsequent PDP PDUs received on the Gi interface for 180 seconds (3 minutes):

gprs ni-pdp discard-period 180

Related Commands

Command
Description

gprs ni-pdp cache-timeout

Specifies the maximum amount of time that the GGSN caches an SGSN address for an MS, after an unsuccessful network-initiated PDP context attempt.

gprs ni-pdp pdp-buffer

Specifies the maximum size of the GGSN buffer to be used for each network-initiated PDP request.

gprs ni-pdp percentage

Specifies the maximum number of PDP contexts on the GGSN that can be network-initiated, as a percentage of the maximum number of PDP contexts allowed on the GGSN.


gprs ni-pdp ip-imsi single

To specify a static IP address to IMSI mapping for a single MS for network-initiated PDP requests from a particular APN, use the gprs ni-pdp ip-imsi single global configuration command. To remove the static mapping, use the no form of this command.

gprs ni-pdp ip-imsi single apn-index ip-address imsi

no gprs ni-pdp ip-imsi single apn-number ip-address imsi

Syntax Description

apn-index

Integer from 1 to 65535 that identifies a GPRS access point.

ip-address

IP address for the specified IMSI to be used as the PDP address.

imsi

16-digit hexadecimal value of the international mobile subscriber identity for the mobile station.


Defaults

No default behavior or values.

Command Modes

Global configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

The GGSN supports a single IP address and APN combination for the gprs ni-pdp ip-imsi single command. The IMSI must be unique for each IP and APN combination.

You can configure multiple instances of the gprs ni-pdp ip-imsi single command.

In addition to configuring the gprs ni-pdp ip-imsi single command, you must configure the following other commands to support network-initiated PDP requests on the GGSN:

gprs default map-converting-gsn

network-request-activation


Note The IMSI digits are packed in the same format as the TID. The second to last hexadecimal digit is overwritten as "F", resulting in a 15-digit hexadecimal IMSI.


Examples

The following example configures a static IP address 10.10.10.10 for a network-initiated PDP request from access point 200 for an MS with an IMSI of 18273645546374.

gprs ni-pdp ip-imsi single 200 10.10.10.10 18273645546374
gprs default map-converting-gsn 172.16.10.10
!
gprs access-point-list abc
access-point 200
network-request-activation

Note that the gprs default map-converting-gsn global configuration command and the network-request-activation command at access point 200 are also required to implement the network-initiated PDP support at access point 200.

Related Commands

Command
Description

gprs default map-converting-gsn

Specifies the IP address or host name of the primary (and backup) GSN to communicate with the HLR in sending and receiving MAP messages.

network-request-activation

Enables an access point to support network-initiated PDP requests to a MS.


gprs ni-pdp pdp-buffer

To specify the maximum size of the GGSN buffer to be used for each network-initiated PDP request, use the gprs ni-pdp pdp-buffer global configuration command. To return to the default value, use the no form of this command.

gprs ni-pdp pdp-buffer number

no gprs ni-pdp pdp-buffer number

Syntax Description

number

Number of bytes from 0 to 65535. The default is 2000.


Defaults

2000 bytes

Command Modes

Global configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

The GGSN supports three options that together determine the maximum possible memory that the GGSN allocates to buffer any PDU data before a network-initiated PDP request has completed:

Maximum number of PDP contexts allowed

Maximum network-initiated PDP percentage

Maximum buffer size per network-initiated PDP request

Use the following formula to determine the maximum possible memory that the GGSN allocated for buffering of any PDU data for each network-initiated PDP request. The corresponding value for each command should be substituted into the following equation:

(gprs maximum-pdp-context-allowed x gprs ni-pdp percentage / 100) x gprs ni-pdp pdp-buffer

By default, the GGSN allocates the following amount of memory for network-initiated PDP request data buffering: (10000 x 10/100) x 2000 bytes = 2,000,000 bytes.

Use the gprs maximum-pdp-context-allowed command to configure the total maximum number of active PDP contexts supported by the GGSN—both mobile-initiated and network-initiated PDP requests combined. The maximum number of PDP contexts supported on the GGSN is router dependent. For more information, see the "Restrictions" section in the "Planning to Configure the GGSN" chapter of the Cisco IOS Mobile Wireless Configuration Guide.

The GGSN allocates buffer space as needed and does not preallocate memory. Therefore, it is possible that other functions requiring memory by the GGSN can prevent memory from being available for allocation to the network-initiated PDP requests—even though the buffer has been configured.

In addition, if an entire PDU requiring caching does not fit in the remaining available buffer space, the PDU is discarded.

Examples

The following example configures 3000 bytes as the maximum size of the GGSN buffer to be used for each network-initiated PDP request:

gprs ni-pdp pdp-buffer 3000

Related Commands

Command
Description

gprs ni-pdp cache-timeout

Specifies the maximum amount of time that the GGSN caches an SGSN address for an MS, after an unsuccessful network-initiated PDP context attempt.

gprs ni-pdp discard-period

Specifies the amount of time that the GGSN discards subsequent PDP PDUs received on the Gi interface for an MS, after an unsuccessful network-initiated PDP context attempt.

gprs ni-pdp percentage

Specifies the maximum number of PDP contexts on the GGSN that can be network-initiated, as a percentage of the maximum number of PDP contexts allowed on the GGSN.


gprs ni-pdp percentage

To specify the maximum number of PDP contexts on the GGSN that can be network-initiated, as a percentage of the maximum number of PDP contexts allowed on the GGSN, use the gprs ni-pdp percentage global configuration command. To return to the default value, use the no form of this command.

gprs ni-pdp percentage percentage-number

no gprs ni-pdp percentage percentage-number

Syntax Description

percentage-number

Percentage from 0 to 100 of the total number of PDP contexts that can be network-initiated. The default is 10 percent.


Defaults

10 percent

Command Modes

Global configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

The GGSN supports three options that together determine the maximum possible memory that the GGSN allocates to buffer any PDU data before a network-initiated PDP request has completed:

Maximum number of PDP contexts allowed

Maximum network-initiated PDP percentage

Maximum buffer size per network-initiated PDP request

Use the following formula to determine the maximum possible memory that the GGSN allocated for buffering of any PDU data for each network-initiated PDP request. The corresponding value for each command should be substituted into the following equation:

(gprs maximum-pdp-context-allowed x gprs ni-pdp percentage / 100) x gprs ni-pdp pdp-buffer

By default, the GGSN allocates the following amount of memory for network-initiated PDP request data buffering: (10000 x 10/100) x 2000 bytes = 2,000,000 bytes.

Use the gprs maximum-pdp-context-allowed command to configure the total maximum number of active PDP contexts supported by the GGSN—both mobile-initiated and network-initiated PDP requests combined. The maximum number of PDP contexts supported on the GGSN is router dependent. For more information, see the Restrictions section of the "Planning to Configure the GGSN" chapter in the Cisco IOS Mobile Wireless Configuration Guide.

The GGSN allocates buffer space as needed and does not preallocate memory. Therefore, it is possible that other functions requiring memory by the GGSN can prevent memory from being available for allocation to the network-initiated PDP requests—even though the buffer has been configured.

Examples

The following example configures 25 percent as the maximum number of network-initiated PDP requests supported by the GGSN:

gprs ni-pdp percentage 25

Related Commands

Command
Description

gprs ni-pdp pdp-buffer

Specifies the maximum size (in bytes) of the GGSN buffer to be used for each network-initiated PDP request.

gprs maximum-pdp-context-allowed

Specifies the maximum number of PDP contexts (mobile sessions) that can be activated on the GGSN.


gprs plmn ip address

To specify the IP address range of a public land mobile network (PLMN), use the gprs plmn ip address command in global configuration mode.

gprs plmn ip address start_ip end_ip [sgsn]

Syntax Description

start_ip

IP address at the beginning of the range.

end_ip

IP address at the end of the range.

sgsn

(Optional) Specifies that only the PLMN IP address ranges defined with the sgsn keyword specified be used to determine if an SGSN is located in a PLMN other than the GGSN.


Defaults

No default behavior or values.

Command Modes

Global configuration

Command History

Release
Modification

12.2(8)YW

This command was introduced.

12.3(2)XB

This command was intergrated into Cisco IOS Release 12.3(2)XB.

12.3(8)T

This command was intergrated into Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was integrated into Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the gprs plmn ip address global configuration command to specify the IP address range of the PLMN.

The gprs plmn ip address command defines addresses that belong to a PLMN. To indicate that the addresses are SGSN addresses within the PLMN, issue the gprs plmn ip address command with the sgsn keyword option specified. This option is used by the charging for roamers feature (gprs charging roamers command).

When using the gprs plmn ip address command with the GGSN charging for roamers feature, depending on how the PLMN IP address ranges have been defined using the gprs plmn ip address start_ip end_ip [sgsn] command, the charging for roamers feature operates as follows:

If no PLMN IP address ranges are configured using the gprs plmn ip address start_ip end_ip [sgsn] command, the GGSN generates CDRs for all initiated PDP contexts regardless of whether the GGSN and SGSN are located within the same PLMN.

If a list of PLMN IP address ranges has been configured using the gprs plmn ip address start_ip end_ip [sgsn] command, and one or more of those ranges has been defined using the sgsn key word, the GGSN uses those ranges defined with the sgsn keyword to determine whether an SGSN is located within the same PLMN.

With this configuration, the following scenarios outline how the charging for roamers feature will function:

MS1 is subscribed to PLMN1 and attaches to an SGSN in PLMN2. From PLMN2, MS1 initiates a PDP context with the GGSN in PLMN1. In this case, MS1 is a roamer and the GGSN generates a CDR because it determines that the SGSN is located in a different PLMN.

MS1 is subscribed to PLMN1 and attaches to an SGSN in PLMN2. From PLMN2, MS1 initiates a PDP context with the GGSN in PLMN2. In this case, MS1 is not a roamer because the SGSN and GGSN are in the same PLMN. The GGSN does not create a G-CDR.

Configuration Guidelines

To enable charging for roamers on the GGSN, you should first define a set of IP address ranges for a PLMN using the gprs plmn ip address command.

It is important that you configure the gprs plmn ip address and gprs charging roamers commands in their proper order. After you configure the IP address range for a PLMN, use the gprs charging roamers command to enable charging for roamers on the GGSN. You can change the IP address range by reissuing the gprs plmn ip address command.

To verify your configuration, use the show gprs charging parameters command to see if the charging for roamers command is enabled. To verify your PLMN IP address ranges, use the show gprs plmn ip address command.

Examples

The following example specifies the IP address range of a PLMN:

gprs plmn ip address 10.0.0.1 10.20.40.50

Related Commands

Command
Description

gprs charging roamers

Enables charging for roamers on the GGSN.

show gprs plmn ip address

Displays a list of IP address ranges defined for the PLMN.


gprs qos bandwidth-pool

To create or modify a Call Admission Control (CAC) bandwidth pool that can be attached to one or more APNs, use the gprs qos bandwidth-pool global configuration command. To delete the bandwidth pool, use the no form of this command.

gprs qos bandwidth-pool pool-name

no gprs qos bandwidth-pool pool-name

Syntax Description

pool-name

Name of the bandwidth pool (between 1 and 40 characters).


Defaults

No bandwidth pools are configured.

Command Modes

Global configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

The CAC feature ensures that required network resources are available for real-time data traffic (such as voice, video, etc.). The CAC feature consists of two functions: maximum QoS authorization using CAC maximum QoS policies and bandwidth management.

The CAC bandwidth management function ensures that there is sufficient bandwidth for real-time PDP contexts during the PDP context activation and modification process.

The CAC feature uses user-defined bandwidth pools to negotiate and reserve bandwidth. In these pools, you define the total bandwidth allocated to that pool and then allocate a percentage of that bandwidth to each traffic class.

In the following example, bandwidth pool (pool A) has been created with 100000 kbps allocated to it. Additionally, a percentage of that 100000 kbps of bandwidth has been allocated to each traffic class, creating four "traffic class-based" bandwidth pools.

gprs bandwidth-pool A
  bandwidth 100000
  traffic-class conversational percent 40
  traffic-class streaming percent 30
  traffic-class interactive percent 20
  traffic-class background percent 10

Note The CAC feature requires that UMTS QoS is enabled on the GGSN. For more information on configuring UMTS QoS on the GGSN, see the GGSN Release 5.1 Configuration Guide.


Once a bandwidth pool is allocated for a traffic class, it cannot be borrowed by the other sub pools allocated for the different traffic classes. The request is only admitted within the bandwidth pool to which the traffic class belongs.

Use the gprs qos bandwidth-pool command to create or modify a CAC bandwidth pool and apply the bandwidth pool to one or more APNs using the bandwidth-pool access point configuration command.

Examples

The following example creates a bandwidth pool named "pool a":

gprs qos bandwidth pool a

Related Commands

Command
Description

bandwidth

Defines the total bandwidth, in kilobits per second, for a bandwidth pool. Valid values are 1 to 4292967295.

bandwidth-pool

Enables the CAC bandwidth management function and applies a bandwidth pool to an APN.

gprs qos bandwidth-pool

Creates or modifies a bandwidth pool.

traffic-class

Allocates bandwidth pool bandwidth to a specific traffic class.


gprs qos cac-policy

To create or modify a Call Admission Control (CAC) maximum QoS policy that can be attached to one or more APNs, and enter CAC maximum QoS policy configuration mode, use the gprs qos cac-policy global configuration command. To return to the default value, use the no form of this command.

gprs qos cac-policy policy-name

no gprs qos cac-policy policy-name

Syntax Description

policy-name

Name of the maximum QoS policy (between 1 and 40 characters).


Defaults

No default behavior or values.

Command Modes

Global configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

The CAC feature on the GGSN ensures that required network resources are available for real-time data traffic such as voice and video. CAC is applied at the APN and consists of two functions: maximum QoS authorization and bandwidth management.

The CAC maximum QoS authorization function ensures that the QoS requested by a create PDP context does not exceed the maximum QoS configured within an APN. Using a CAC maximum QoS policy, you define certain QoS parameters within a policy and attach the policy to an APN. The CAC maximum QoS policy limits the QoS requested by the PDP during its creation and modification process.

Use the gprs qos cac-policy command to create or modify a CAC maximum QoS policy and apply the policy to an APN using the cac-policy access point configuration command.


Note The CAC feature requires that UMTS QoS has been configured. For information on configuring UMTS QoS, see the GGSN Release 5.1 Configuration Guide.


Once you have entered policy configuration mode using the gprs qos cac-policy command, you can configure the following QoS parameters in a policy and apply the policy to an APN:

Maximum number of active PDP contexts (maximum pdp-context command)

Maximum bit rate (mbr traffic-class command)

Guaranteed bit rate (gbr traffic-class command)

Maximum traffic class (maximum traffic-class command)

Traffic handling priority (maximum traffic-class command with priority option)

Delay class (maximum delay-class command)

Peak throughput class (maximum peak-throughput command)

Examples

The following example creates a CAC maximum QoS policy named "policy a":

gprs qos cac-policy a

Related Commands

Command
Description

cac-policy

Enables the maximum QoS policy function of the CAC feature and applies a policy to an APN.

gbr traffic-class

Specifies the maximum guaranteed bit rate (GBR) that can be allowed in uplink and downlink directions for real-time classes (conversational and streaming) at an APN.

maximum delay-class

Defines the maximum delay class for R97/R98 (GPRS) QoS that can be accepted.

maximum peak-throughput

Defines the maximum peak throughput for R97/R98 (GPRS) QoS that can be accepted.

maximum pdp-context

Specifies the maximum number PDP contexts that can be created for a particular APN.

maximum traffic-class

Defines the highest traffic class that can be accepted.

mbr traffic-class

Specifies the maximum bit rate (MBR) that can be allowed for each traffic class in both directions (downlink and uplink).


gprs qos default-response requested

To specify that the GGSN sets its default QoS values in the response message exactly as requested in the create PDP context request message, use the gprs qos default-response requested global configuration command. To return to the default QoS, use the no form of this command.

gprs qos default-response requested

no gprs qos default-response requested

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled. The GGSN sets its QoS default to the best-effort class.

Command Modes

Global configuration

Command History

Release
Modification

12.2(2)

This command was introduced.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

The gprs qos default-response requested command is only useful when canonical QoS is not configured on the GGSN. Canonical QoS is enabled using the gprs qos map canonical-qos command.

When canonical QoS is not enabled, and the gprs qos default-response requested command has not been configured on the GGSN, the GGSN always sets its QoS values to best-effort in the response message.

Examples

The following example enables the GGSN to set its QoS values in the response message according to the QoS values requested in the create PDP context request message:

gprs qos default-response requested

Related Commands

Command
Description

gprs qos map canonical-qos

Enables mapping of GPRS QoS categories to a canonical QoS method that includes best-effort, normal, and premium QoS classes.


gprs qos map canonical-qos

To enable mapping of GPRS QoS categories to a canonical QoS method that includes best-effort, normal, and premium QoS classes, use the gprs qos map canonical-qos global configuration command. To disable canonical mapping, use the no form of this command.

gprs qos map canonical-qos

no gprs qos map canonical-qos

Syntax Description

This command has no arguments or keywords.

Defaults

Canonical QoS mapping is disabled.

Command Modes

Global configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the qprs qos map canonical-qos command to map GPRS QoS into the following canonical categories: best effort, normal, and premium.

Examples

The following example shows canonical QoS mapping enabled:

qos map canonical-qos

Related Commands

Command
Description

gprs canonical-qos best-effort bandwidth-factor

Specifies the bandwidth factor to be applied to the canonical best-effort QoS class.

gprs canonical-qos gsn-resource-factor

Specifies a value that is used by the GGSN to calculate the QoS level provided to mobile users.

gprs canonical-qos map tos

Specifies a QoS mapping from the canonical QoS classes to an IP ToS category.

gprs canonical-qos premium mean-throughput-deviation

Specifies a mean throughput deviation factor that the GGSN uses to calculate the allowable data throughput for QoS.


gprs qos map delay

To enable mapping of GPRS quality of service (QoS) categories to delay QoS classes, use the gprs qos map delay command in global configuration mode. To disable delay mapping, use the no form of this command.

gprs qos map delay

no gprs qos map delay

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was integrated into Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was integrated into Cisco IOS Release 12.2(8)YW.

12.3(4)T

This command was integrated into Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was integrated into Cisco IOS Release 12.3(8)T.

12.3(2)XB

This command was integrated into Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was integrated into Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the gprs qos map delay command to enable QoS delay mapping on the GGSN. To map the QoS delay classes (class 1, class 2, class 3, and best effort) to IP type of service (ToS) categories, use the gprs delay-qos map tos command.

Examples

The following example enables delay QoS mapping:

gprs qos map delay

Related Commands

Command
Description

gprs delay-qos map tos

Specifies a QoS mapping from the delay QoS classes to an IP type of service (ToS) category.

gprs qos map delay

Configures the GGSN to set its default QoS mapping values in a create PDP response message which has no QoS mapping selected.


gprs qos map umts

To enable UMTS quality of service (QoS) on the gateway GPRS support node (GGSN), use the gprs qos map umts command in global configuration mode. To disable this mapping and return to the default QoS mapping, use the no form of this command.

gprs qos map umts

no gprs qos map umts

Syntax Description

This command has no arguments or keywords.

Defaults

UMTS QoS mapping is disabled.

Command Modes

Global configuration

Command History

Release
Modification

12.2(8)YW

This command was introduced.

12.3(2)XB

This command was integrated into Cisco IOS Release 12.3(2)XB.

12.3(8)T

This command was integrated into Cisco IOS Release 12.3(8)T.

12.3(8)XU

This command was integrated into Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the gprs qos map umts command to enable UMTS QoS mapping.

Examples

The following example enables UMTS traffic QoS mapping:

gprs qos map umts

Related Commands

Command
Description

gprs umts-qos map traffic-class

Specifies a QoS mapping from the UMTS traffic classes to a differentiated services (DiffServ) per-hop behavior (PHB) group.

gprs umts-qos map diffserv-phb

Assigns a differentiated services code point (DSCP) to a DiffServ PHB group.

gprs umts-qos dscp unmodified

Specifies that the subscriber datagram be forwarded through the GTP path without modifying its DSCP.

show gprs qos status

Displays QoS statistics for the GGSN.

show gprs umts-qos map traffic-class

Displays UMTS QoS mapping information.


gprs radius attribute chap-challenge

To specify that the CHAP challenge always be included in the Challenge Attribute field (and not in the Authenticator field) in an Access-Request to the Remote Access Dial-In User Service (RADIUS) server, use gprs radius attribute chap-challenge global configuration command in global configuration mode. To disable, use the no form of this command.

gprs radius attribute chap-challenge

no gprs radius attribute chap-challenge

Syntax Description

This command has no arguments or keywords.

Defaults

If the CHAP challenge length is 16 bytes, it is sent in the Authenticator field of an Access-Request. If it is greater than 16 bytes, it is sent in the Challenge Attribute field.

Command Modes

Global configuration

Command History

Release
Modification

12.2(1)

This command was introduced.

12.2(4)MX

This command was integrated into Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was integrated into Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was integrated into Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was integrated into Cisco IOS Release 12.3(2)XB.

12.3(8)T

This command was integrated into Cisco IOS Release 12.3(8)T.

12.3(8)XU

This command was integrated into Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the gprs radius attribute chap-challenge command when configuring RADIUS security on the GGSN.

When the gprs radius attribute chap-challenge command is configured, the CHAP challenge is always sent in the Challenge Attribute field of an Access-Request to the RADIUS server and not in the Authenticator field. When the command is not configured, the CHAP challenge is sent in the Authenticator field unless the challenge exceeds 16 bytes, in which case, it is sent in the Challenge Attribute field of the Access-Request.

Examples

The following example configures the CHAP challenge to always be sent in an Access Request to the RADIUS server:

gprs radius msisdn first-byte

gprs radius attribute session-timeout

To specify that the Session-Timeout (Attribute 27) field be included in a Remote Access Dial-In User Service (RADIUS) request, use the gprs radius attribute session-timeout command. To disable, use the no form of this command.

gprs radius attribute session-timeout

no gprs radius attribute session-timeout

Syntax Description

This command has no arguments or keywords.

Defaults

Attribute 27 is not included.

Command Modes

Global configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the gprs radius attribute session-timeout command to configure the Session-Timeout (Attribute 27) field be included in a Remote Access Dial-In User Service (RADIUS) request.

The GGSN stores the attribute value received in Access-Accept packets sent by the AAA server and terminates the PDP context upon expiration of the time. You can configure the number of seconds the GGSN allows a session to be active before terminating the session at the global level (gprs gtp pdp-context timeout session command) and at the access-point level (gtp pdp-context timeout session command.

Examples

The following example configures Attribute 27 to always be sent in an Access Request to the RADIUS server:

gprs radius attribute session-timeout

Related Commands

Command
Description

gprs gtp pdp-context timeout session

Specifies the time, in seconds, that the GGSN allows a session to be active at any access point before terminating the session.

gtp pdp-context timeout session

Specifies the time, in seconds, that a GGSN allows a session to be active at a particular APN before terminating the session.



gprs radius msisdn first-byte

To specify that the first byte of the Mobile Stations International PSTN/ISDN (MSISDN) information element (IE) is included in a Remote Access Dial-In User Service (RADIUS) request, use the gprs radius msisdn first-byte global configuration command. To remove the first byte from the MSISDN IE in a RADIUS request, use the no form of this command.

gprs radius msisdn first-byte

no gprs radius msisdn first-byte

Syntax Description

This command has no arguments or keywords.

Defaults

The first byte is not included.

Command Modes

Global configuration

Command History

Release
Modification

12.2(1)

This command was introduced.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the gprs radius msisdn first-byte command when configuring RADIUS security on the GGSN.

The first octet of an MSISDN IE using E.164 addressing is 91 in hexadecimal, that is 10010001. In this 91 code, the 1 is the extension bit, 001 is the international number, and 0001 indicates E.164 numbering.

Examples

The following example specifies that the first byte of the MSISDN IE is included in a RADIUS request:

gprs radius msisdn first-byte


gprs redundancy

To enable GTP session redundancy (GTP-SR) on a GGSN, use the gprs redundancy global configuration command. To disable GTP-SR, use the no form of this command.

gprs redundancy

no gprs redundancy

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled.

Command Modes

Global configuration

Command History

Release
Modification

12.3(11)YJ

This command was introduced.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the gprs redundancy command to enable GTP-SR on a GGSN.

Cisco GGSN Release 5.1 and later supports Active/Standby, 1-to-1 inter-device GTP-SR. GTP-SR enables two GGSNs to appear as one network entity and ensures that continuous service is provided to mobile subscribers in the event one of the GGSNs fails.

In a GTP-SR implementation, the Active GGSN establishes and terminates PDP sessions and sends required stateful data to the Standby GGSN. To stay current on the states of active PDP sessions, the Standby GGSN receives the stateful data sent by the Active GGSN. As soon as the Standby GGSN detects that the Active GGSN has failed, it becomes active and assumes the responsibilities of the Active GGSN.


Note Before GTP-SR can be enabled on two redundant GGSNs, a GTP-SR inter-device infrastructure must be configured. For information on configuring a inter-device infrastructure, see the "Configuring GTP Session Redundancy" chapter of the Cisco GGSN Release 5.2 Configuration Guide.


Examples

The following example enables GTP-SR on a GGSN:

gprs redundancy

Related Commands

Command
Description

clear gprs redundancy statistics

Clears statistics related to GTP-SR.

gprs redundancy charging sync-window cdr rec-seqnum

Configures the window size used to determine when the CDR record sequence number needs to be synchronized to the Standby GGSN.

gprs redundancy charging sync-window gtpp seqnum

Configures the window size used to determine when the GTP' sequence number needs to be synchronized to the Standby GGSN.

show gprs redundancy

Displays statistics related to GTP-SR.


gprs redundancy charging sync-window cdr rec-seqnum

To configure the window size used to determine when the CDR record sequence number needs to be synchronized to the Standby GGSN, use the gprs redundancy charging sync-window cdr rec-seqnum global configuration command. To return to the default value, use the no form of this command.

gprs redundancy charging sync-window cdr rec-seqnum size

no gprs redundancy charging sync-window cdr rec-seqnum size

Syntax Description

size

Configures the window size used to determine when the CDR record sequence number needs to be synchronized.Valid range is 1 to 20.


Defaults

10

Command Modes

Global configuration

Command History

Release
Modification

12.3(11)YJ

This command was introduced.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the gprs redundancy charging sync-window cdr rec-seqnum command to configure the window size used to determine when the record sequence number needs to be synchronized.

The record sequence number is used by the charging gateway to detect duplicate CDRs associated with a PDP context. To minimize the amount of data being synchronized to the Standby GGSN, the record sequence number is not synchronized each time a CDR is closed. Instead, a window threshold for the record sequence number is synchronized each time a CDR closes. The current value of the record sequence number and the record number last synchronized for a PDP context is checked, and if the difference is the value configured for the window size using the gprs redundancy charging sync-window cdr rec-seqnum global configuration command, the current record sequence number is synchronized to the Standby GGSN.

When a Standby GGSN becomes the Active GGSN, it starts from the last value synchronized, plus the window size.

Examples

The following example configures a window size of 15:

gprs redundancy charging sync-window cdr rec-seqnum 15

Related Commands

Command
Description

clear gprs redundancy statistics

Clears statistics related to GTP-SR.

gprs redundancy

Enables GTP-SR on a GGSN.

gprs redundancy charging sync-window gtpp seqnum

Configures the window size used to determine when the GTP' sequence number needs to be synchronized to the Standby GGSN.

show gprs redundancy

Displays statistics related to GTP-SR.


gprs redundancy charging sync-window gtpp seqnum

To configure the window size used to determine when the GTP' sequence number needs to be synchronized to the Standby GGSN, use the gprs redundancy charging sync-window gtpp seqnum global configuration command. To return to the default value, use the no form of this command.

gprs redundancy charging sync-window gtpp seqnum size

no gprs redundancy charging sync-window gtpp seqnum size

Syntax Description

size

Configures the window size used to determine when the GTP' sequence number needs to be synchronized. Valid range is 5 to 65535.

Note Since a GGSN can transmit 128 GTP packets without any acknowledgement, we recommend that you configure the window size to be greater than 128.


Defaults

10000

Command Modes

Global configuration

Command History

Release
Modification

12.3(11)YJ

This command was introduced.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the gprs redundancy charging sync-window gtpp seqnum command to configure the window size used to determine when the GTP' sequence number needs to be synchronized.

The GTP' sequence number is used by the charging gateway to prevent the duplication of packets. The GGSN sends encoded CDRs associated with a PDP context in a GTP packet to the charging gateway. If the GTP packet is acknowledged by the charging gateway, it removes the packet from memory. If it is not acknowledged, it is retransmitted. The charging gateway cannot acknowledged GTP packets if the sequence number repeats.

To minimize the amount of data being synchronized to the Standby GGSN, the GTP' sequence number is not synchronized each time a CDR is closed. Instead, a window threshold for the GTP' sequence number is synchronized each time a CDR message is sent. The current value of the GTP' sequence number and the gtpp sequence number last synchronized for a PDP context is checked and if the difference is the value configured for the window size (using the gprs redundancy charging sync-window gtpp seqnum global configuration command), the current GTP prime sequence number is synchronized to the Standby GGSN.

When a Standby GGSN becomes the Active GGSN, it starts from the last value synchronized plus the window size.

Examples

The following example configures the window size for the GTP' sequence number synchronization to be 120:

gprs redundancy charging sync-window gtpp seqnum 120

Related Commands

Command
Description

clear gprs redundancy statistics

Clears statistics related to GTP-SR.

gprs redundancy

Enables GTP-SR on a GGSN.

gprs redundancy charging sync-window cdr rec-seqnum

Configures the window size used to determine when the CDR record sequence number needs to be synchronized to the Standby GGSN.

show grs redundancy

Displays all GTP-SR related information.


gprs service-aware

To enable service-aware billing on the GGSN, use the gprs service-aware global configuration command. To disable the support, use the no form of this command

gprs service-aware

no gprs service-aware

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled.

Command Modes

Global configuration

Command History

Release
Modification

12.3(14)YQ

This command was introduced.

12.4(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the gprs service-aware global configuration command to enable service-aware billing on the on the GGSN.


Note Service-aware billing must be enabled before configuring other enhanced service-aware billing features on the GGSN. These features include the GGSN-to-CSG interface, the GGSN-to-Diameter/DCCA interface, and support of enhanced service-level G-CDRs.


Examples

The following configuration example enables service-aware billing on a GGSN:

 gprs service-aware

Related Commands

Command
Description

service-aware

Enables service-aware billing for a particular access point.


gprs service-mode test imsi

To configure a test user for which you can create PDP contexts to test an APN configuration, use the gprs service-mode test imsi global configuration command. To remove the test user configuration, use the no form of this command.

gprs service-mode test imsi imsi-value

no gprs service-mode test imsi imsi-value

Syntax Description

imsi-value

International Mobile Subscriber Identity (IMSI) value for which PDP contexts are to be created.


Defaults

No test user is configured on the GGSN.

Command Modes

Global configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the gprs service-mode test imsi command to configure a test user for which create PDP contexts will be created to test configurations.

Only one test user can be configured per GGSN.


Note PDP context creation from a test user is only supported while a GGSN is in operational mode.


Examples

The following example creates a test user with the IMSI 211F111130000000:

gprs service-mode test imsi 211F111130000000

Related Commands

Command
Description

gprs service-mode

Configures the service-mode state of a GGSN.

service-mode

Configures the service-mode state of an APN.

show gprs service-mode

Displays the current global service mode state of the GGSN and the last time it was changed.


gprs service-mode

To configure the global service-mode state of a GGSN, use the gprs service-mode global configuration command.

gprs service-mode {operational | maintenance}

Syntax Description

operational

Specifies that the service-mode state of the GGSN is operational.

maintenance

Specifies that the service-mode state of the GGSN is maintenance.


Defaults

Operational.

Command Modes

Global configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the gprs service-mode command to place the global service-mode state of a GGSN in maintenance mode.

The GGSN service-mode function enables you to make configuration changes and test calls without affecting all active sessions on a GGSN. You can configure the service-mode state globally, for an access-point, and for the GGSN charging function. There are two service-mode states: operational and maintenance. The default is operational mode.

When a GGSN is placed in global maintenance mode, it rejects all new Create PDP Context requests. Therefore, no new PDP contexts are activated for an entire GGSN while it is in global maintenance mode.


Note When a GGSN is in global maintenance mode, all APNs are in maintenance mode as well.


Examples

The following example places a GGSN in maintenance mode:

gprs service-mode maintenance

Related Commands

Command
Description

service-mode

Configures the service-mode state of an APN.

gprs service-mode test imsi

Configures a test user for which you can create PDP contexts to test an APN configuration.

show gprs service-mode

Displays the current global service mode state of the GGSN and the last time it was changed.


gprs slb mode

To define the Cisco IOS SLB operation mode for GGSN-SLB messaging, use the gprs slb mode global configuration command.

gprs slb mode {dispatched | directed}

Syntax Description

dispatched

Specifies that the Cisco IOS SLB is operating in dispatched mode.

directed

Specifies that the Cisco IOS SLB is operating in directed server NAT mode.


Defaults

Dispatched

Command Modes

Global configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the gprs slb mode global configuration command to defined the Cisco IOS SLB operation mode. This command is used in conjunction with the gprs slb notify and the gprs slb vserver global configuration commands and is required for GGSN-SLB messaging when the Cisco IOS SLB is in directed server NAT mode.

If Cisco IOS SLB is in dispatched mode, the virtual server that forwarded the Create PDP Context request to the GGSN is known to the GGSN and the GGSn can send notification directly to that server. Therefore, only the gprs slb notify command is required to enable GGSN-SLB messaging on the GGSN.

If the Cisco IOS SLB is functioning in directed server NAT mode, the virtual server is not known to the GGSN.

Therefore, a list of virtual servers that the GGSN should notify must be defined on the GGSN using the gprs slb vserver global configuration command and the Cisco IOS SLB mode of operation must be defined using the gprs slb mode global configuration command. If the Cisco IOS SLB operation mode and virtual servers are not defined when the Cisco IOS SLB is functioning in directed server NAT mode, GGSN-SLB messaging is not enabled, even if the gprs slb notify command has been configured.


Note The gprs slb vserver and gprs slb mode global configuration commands are required for GGSN-SLB messaging when the Cisco IOS SLB is functioning in directed server NAT mode.


Examples

The following example defines Cisco IOS SLB to be in directed server NAT mode:

gprs slb mode directed

Related Commands

Command
Description

clear gprs slb statistics

Clears Cisco IOS SLB statistics.

gprs slb notify

Enables the GGSN to provide feedback to the Cisco IOS SLB when a certain condition occurs, for example, a Create PDP Create request rejection because of a Call Admission Control failure.

gprs slb vserver

Configures the Cisco IOS SLB virtual servers to be notified by the GGSN when a condition configured by the gprs slb notify command occurs and the Cisco IOS SLB is in directed server NAT mode.

show gprs slb detail

Displays Cisco IOS SLB related information, such as the operation mode, virtual servers addresses, and statistics.

show gprs slb mode

Displays the Cisco IOS SLB mode of operation defined on the GGSN.

show gprs slb statistics

Displays Cisco IOS SLB statistics.

show gprs slb vservers

Displays the list of defined Cisco IOS SLB virtual servers.


gprs slb notify

To enable the GGSN to notify the Cisco IOS SLB when a specific condition occurs, use the gprs slb notify global configuration command. To disable GGSN-IOS SLB messaging, issue the no form of this command.

Syntax Description

cac-failure

Specifies that the GGSN notify the Cisco IOS SLB when a UMTS QoS CAC or canonical QoS failure has caused a Create PDP Context request to be rejected.


Defaults

Disabled

Command Modes

Global configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the gprs slb notify command to enable GGSN-IOS SLB messaging. The GGSN-IOS SLB messaging function enables you to configure a GGSN to notify the Cisco IOS SLB when a condition exists that affects a session forwarded by the IOS SLB, and to instruct the Cisco IOS SLB on how to react to the condition. For example, if a Create PDP Context request is rejected by the GGSN because of a Call Admission Control (CAC) failure, the GGSN notifies the Cisco IOS SLB that a CAC-related failure has occurred and instructs the Cisco IOS SLB to reassign the session to another GGSN in the server farm.

Notification messages sent by the GGSN include the following information elements (IEs):

Type—Notification type (for example, reassign).

Session identifier—Session key on the Cisco IOS SLB that identifies the session to which a notification belongs.

Create response—Create response that the GGSN would send to the SGSN when a failure occurred. If there is not an alternate GGSN available to which to reassign the session, or if the maximum number of reassign attempts has been exceeded, the Cisco IOS SLB relays this information to the SGSN.

If the Cisco IOS SLB is functioning in dispatched mode, the virtual server that forwarded the Create PDP Context request to the GGSN is known to the GGSN and the GGSN can send notification directly to the server. Therefore, to enable GGSN-IOS SLB messaging when the Cisco IOS SLB is operating in dispatched mode only requires that the gprs slb notify command be configured.

If the Cisco IOS SLB is functioning in directed server NAT mode, the virtual server is not known to the GGSN. Therefore, a list of virtual servers that the GGSN should notify must be defined on the GGSN using the gprs slb vserver global configuration command and the Cisco IOS SLB mode of operation must be defined using the gprs slb mode global configuration command. If the Cisco IOS SLB operation mode and virtual servers are not defined when the Cisco IOS SLB is functioning in directed server NAT mode, GGSN-IOS SLB messaging is not enabled, even if the gprs slb notify command has been configured.

Examples

The following example configures the GGSN to notify the Cisco IOS SLB when a Create PDP Context request has been rejected because of a UMTS QoS CAC failure:

gprs slb notify cac-failure

Related Commands

Command
Description

clear gprs slb statistics

Clears Cisco IOS SLB statistics.

gprs slb mode

Defines the Cisco IOS SLB operation mode.

gprs slb vserver

Configures the Cisco IOS SLB virtual servers to be notified by the GGSN when a condition configured by the gprs slb notify command occurs and the Cisco IOS SLB is in directed server NAT mode.

show gprs slb detail

Displays Cisco IOS SLB related information, such as the operation mode, virtual servers addresses, and statistics.

show gprs slb mode

Displays the Cisco IOS SLB mode of operation defined on the GGSN.

show gprs slb statistics

Displays Cisco IOS SLB statistics.

show gprs slb vservers

Displays the list of defined Cisco IOS SLB virtual servers.


gprs slb vserver

To configure the Cisco IOS SLB virtual servers to be notified by a GGSN when a condition configured using the gprs slb notify command exists and the Cisco IOS SLB is functioning in directed server NAT mode, use the gprs slb vserver global configuration command. To remove a virtual server from the list, use the no form of this command.

gprs slb vserver ip_address

Syntax Description

ip_address

IP address of the virtual server.


Defaults

No virtual servers are defined.

Command Modes

Global configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the gprs slb vserver global configuration command to defined a list of Cisco IOS SLB virtual servers to be notified by a GGSN when GGSN-SLB messaging is enabled and the Cisco IOS SLB is functioning in directed server NAT mode. This command is used in conjunction with the gprs slb notify and the gprs slb mode global configuration commands.

If the Cisco IOS SLB is functioning in directed server NAT mode, the virtual server is not known to the GGSN. Therefore, a list of virtual servers that the GGSN should notify must be defined on the GGSN using the gprs slb vserver global configuration command and the Cisco IOS SLB mode of operation must be defined using the gprs slb mode global configuration command. If the Cisco IOS SLB operation mode and virtual servers are not defined when the Cisco IOS SLB is functioning in directed server NAT mode, GGSN-SLB messaging is not enabled, even if the gprs slb notify command has been configured.


Note The gprs slb vserver and gprs slb mode global configuration commands are required for GGSN-SLB messaging when the Cisco IOS SLB is functioning in directed server NAT mode.


Examples

The following example adds a GTP server with the IP address 10.10.10.10 to the list of virtual servers to be notified by the GGSN:

gprs slb vserver 10.10.10.10

Related Commands

Command
Description

clear gprs slb statistics

Clears Cisco IOS SLB statistics.

gprs slb mode

Defines the Cisco IOS SLB operation mode.

gprs slb vserver

Enables the GGSN to provide feedback to the Cisco IOS SLB when a certain condition occurs, for example, a Create PDP Create request rejection because of a Call Admission Control failure.

show gprs slb detail

Displays Cisco IOS SLB related information, such as the operation mode, virtual servers addresses, and statistics.

show gprs slb mode

Displays the Cisco IOS SLB mode of operation defined on the GGSN.

show gprs slb statistics

Displays Cisco IOS SLB statistics.

show gprs slb vservers

Displays the list of defined Cisco IOS SLB virtual servers.


gprs throughput interval

To configure the intervals at which the throughput data is collected for APNs, use the gprs throughput interval global configuration command. To return to the default value, use the no form of this command.

gprs throughput interval interval1 interval2

no gprs throughput interval interval1 interval2

Syntax Description

interval

Number of seconds that the GGSN waits before collecting throughput data.


Defaults

No default behavior or values.

Command Modes

Global configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4.(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the gprs throughput interval command to configure the intervals at which the GGSN will collect throughput data for APNs.

Examples

The following example configures the GGSN to collect throughput data every 5 minutes (300 seconds):

gprs throughput interval 300

Related Commands

Command
Description

show gprs access-point throughput statistics

Displays throughput statistics for access points on a GGSN.


gprs umts-qos dscp unmodified

To specify that the subscriber datagram be forwarded through the GPRS tunneling protocol (GTP) path without modifying its differentiated services code point (DSCP), use the gprs umts-qos dscp unmodified command in global configuration mode. To remove this specification and enable the DSCP to be re-marked with the DSCP assigned to the traffic class during the PDP context creation, use the no form of this command.

gprs umts-qos dscp unmodified [up | down | all]

no gprs umts-qos dscp unmodified [up | down | all]

Syntax Description

up

(Optional) Specifies subscriber datagram DSCPs in the uplink GTP path.

down

(Optional) Specifies subscriber datagram DSCPs in the downlink GTP path.

all

(Optional) Specifies subscriber datagram DSCPs in all GTP paths.


Defaults

The DSCP in the subscriber datagram is re-marked with the DSCP assigned to the traffic class during the PDP context creation.

Command Modes

Global configuration

Command History

Release
Modification

12.2(8)YW

This command was introduced.

12.3(2)XB

This command was integrated into Cisco IOS Release 12.3(2)XB.

12.3(8)T

This command was integrated into Cisco IOS Release 12.3(8)XU.

12.3(8)XU

This command was integrated into Cisco IOS Release 12.3(8)T.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the gprs umts-qos dscp unmodified command to configure the GGSN to forward subscriber datagram DSCPs through the GTP path without modifying the DSCP.

Examples

The following example sets subscriber datagrams in the uplink GTP path to retain their DSCPs:

gprs umts-qos dscp unmodified up

Related Commands

Command
Description

gprs qos map umts

Enables UMTS QoS on the GGSN.

gprs umts-qos map traffic-class

Specifies a QoS mapping from the UMTS traffic classes to a differentiated services (DiffServ) per-hop behavior (PHB) group.

gprs umts-qos map diffserv-phb

Assigns a differentiated services code point (DSCP) to a DiffServ PHB group.

show gprs qos status

Displays QoS statistics for the GGSN.

show gprs umts-qos map traffic-class

Displays UMTS QoS mapping information.


gprs umts-qos map diffserv-phb

To assign a differentiated services code point (DSCP) to a DiffServ PHB group, use the gprs umts-qos map diffserv-phb command in global configuration mode. To set the specified DSCP to the default DiffServ PHB group, use the no form of this command.

gprs umts-qos map diffserv-phb diffserv-phb-group [dscp1] [dscp2] [dscp3]

no gprs umts-qos map diffserv-phb

Syntax Description

diffserv-phb-group

Specifies the DiffServ PHB group. The PHB groups are:

signalling-class

ef-class

af1-class

af2-class

af3-class

af4-class

best-effort

dscp1

Required for all classes. Specifies one of 64 DSCP values from 0 to 63. The DSCP value corresponds to drop precedence 1.

dscp2

(Optional for AF classes only) Specifies one of 64 DSCP values from 0 to 63. The DSCP value corresponds to drop precedence 2.

dscp3

(Optional for AF classes only) Specifies one of 64 DSCP values from 0 to 63. The DSCP value corresponds to drop precedence 3.


Defaults

The default DSCP value associated with the PHB class is used.

Command Modes

Global configuration

Command History

Release
Modification

12.2(8)YW

This command was introduced.

12.3(2)XB

This command was integrated into Cisco IOS Release 12.3(2)XB.

12.3(8)T

This command was integrated into Cisco IOS Release 12.3(8)T.

12.3(8)XU

This command was integrated into Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

For the Assured Forwarding (AF) PHB group, you can specify up to three DSCP values for each drop precedence. The signalling, EF, and best-effort classes do not have drop precedence, so only the first DSCP value is used. If you enter a value for the dscp2 or dscp3 arguments for these classes, it is ignored.

Drop precedence indicates the order in which a packet will be dropped when there is congestion on the network.

Table 3 shows the default DSCP values for each PHB group.

Table 3 Default DSCP Values per PHB Group

PHB
DSCP

Signalling

5?

EF

101110 (46)

AF11

001010 (10)

AF12

001100 (12)

AF13

001110 (14)

AF21

010010 (18)

AF22

010100 (20)

AF23

010110 (22)

AF31

011010 (26)

AF32

011100 (28)

AF33

011110 (30)

AF41

100010 (34)

AF42

100100 (36)

AF43

100110 (38)

Best effort

000000 (0)


Examples

The following example assigns a DSCP value of 31 to the EF class and three DSCP values to AF class2 of 51, 52, and 53:

gprs umts-qos map diffserv-phb ef-class 31
gprs umts-qos map diffserv-phb af-class2 51 52 53

Related Commands

Command
Description

gprs qos map umts

Enables UMTS QoS on the GGSN.

gprs umts-qos map traffic-class

Specifies a QoS mapping from the UMTS traffic classes to a differentiated services (DiffServ) per-hop behavior (PHB) group.

gprs umts-qos dscp unmodified

Specifies that the subscriber datagram be forwarded through the GTP path without modifying its DSCP.

show gprs qos status

Displays QoS statistics for the GGSN.

show gprs umts-qos map traffic-class

Displays UMTS QoS mapping information.

class-map

Creates a class map to be used for matching packets to a specified class.

match protocol

Configures the match criteria for a class map on the basis of the specified protocol.


gprs umts-qos map traffic-class

To specify a QoS mapping from the UMTS traffic classes to a differentiated services (DiffServ) per-hop behavior (PHB) group, use the gprs umts-qos map traffic-class global configuration command. To remove a QoS mapping and set the specified traffic class to the default mapping, use the no form of this command.

gprs umts-qos map traffic-class traffic-class diffserv-phb-group

no gprs umts-qos map traffic-class

Syntax Description

traffic-class

Specifies the traffic class. The UMTS traffic classes are:

signalling

conversational

streaming

interactive

background

diffserv-phb-group

Specifies the DiffServ PHB group. The PHB groups are:

signalling-class

ef-class

af1-class

af2-class

af3-class

af4-class

best-effort


Defaults

You must enable UMTS QoS using the gprs qos map umts command before entering this command.


Note Use the gprs umts-qos map traffic-class command only if you want to use mapping values other than the defaults.


The default mapping values for the UMTS traffic classes are as follows:

signalling traffic class to the signalling-class DiffServ PHB group

conversational traffic class to the ef-class DiffServ PHB group

streaming traffic class to the af2-class DiffServ PHB group

interactive traffic class to the af3-class DiffServ PHB group

background traffic class to the best-effort DiffServ PHB group

Command Modes

Global configuration

Command History

Release
Modification

12.2(8)YW

This command was introduced.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.


Usage Guidelines

Use the gprs umts-qos map traffic-class command to specify a mapping between various QoS UMTS traffic categories and the DiffServ PHB groups.

Examples

The following example specifies a QoS mapping from the UMTS traffic class conversational to the DiffServ PHB group af-class1:

gprs umts-qos map traffic-class conversational af1-class

Related Commands

Command
Description

gprs qos map umts

Enables UMTS QoS on the GGSN.

gprs umts-qos map diffserv-phb

Assigns a differentiated services code point (DSCP) to a DiffServ PHB group.

gprs umts-qos dscp unmodified

Specifies that the subscriber datagram be forwarded through the GTP path without modifying its DSCP.

show gprs qos status

Displays QoS statistics for the GGSN.

show gprs umts-qos map traffic-class

Displays UMTS QoS mapping information.


gtp pdp-context single pdp-session

To configure the GGSN to delete the primary PDP context, and any associated secondary PDP contexts, of a hanging PDP session upon receiving a new create request from the same MS that shares the same IP address of the hanging PDP context, use the gtp pdp-context single pdp-session access-point configuration command. To return to the default value, use the no form of this command.

gtp pdp-context single pdp-session [mandatory]

[no] gtp pdp-context single pdp-session [mandatory]

Syntax Description

mandatory

Specifies that the primary PDP context and any associated secondary PDP contexts be deleted regardless of the RADIUS user profile configuration.


Defaults

Create PDP Context requests that share the IP address of an exsiting PDP context for the same MS are rejected.

Command Modes

Access-point configuration

Command History

Release
Modification

12.3(8)XU2

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4.(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the gtp pdp-context single pdp-session command to configure the GGSN to delete the primary PDP context, and any associated secondary PDP contexts, of a hanging PDP session upon receiving a new create request from the same MS that shares the same IP address of the hanging PDP context.

A hanging PDP context is a PDP context on the GGSN whose corresponding PDP context on the SGSN has already been deleted for some reason.

When this condition occurs and the gtp pdp-context single pdp-session command is not configured, if on the same APN, the same MS sends a new Create PDP Context request that has a different NSAPI but has been assigned the same IP address used by the hanging PDP context, the GGSN rejects the new Create PDP Context request.

When the gtp pdp-context single pdp-session is configured on an APN, the single PDP session per MS feature is enabled and applies to all users for whom the "gtp-pdp-session=single-session" Cisco VSA has been defined in their RADIUS user profile. If the command is not configured, the feature is not enabled and does not apply to any user regardless of their RADIUS user profile configuration. If the command is configured with the mandatory keyword option specified, the feature is enabled and applies to all users on that APN regardless of their RADIUS user profile configuration.

Note This feature is supported on the Cisco 7200 series platform.

Examples

The following example configures the GGSN to delete the primary PDP context, and associated secondary PDP contexts, of a hanging PDP context when it receives a new create PDP context request that shares the same IP address:

gtp pdp-context single pdp-session

Related Commands

Command
Description

show gprs access-point

Displays information about access points on the GGSN.

show gprs pdp-context tid

Displays PDP contexts by tunnel ID. This value corresponds to the IMSI plus NSAPI and can be up to 16 numeric digits.


gtp pdp-context timeout idle

To specify the time, in seconds, that a GGSN allows a session to be idle at a particular access point before terminating the session, use the gtp pdp-context timeout idle access-point configuration command. To return to the default value, use the no form of this command.

gtp pdp-context timeout idle interval [uplink]

no gtp pdp-context timeout idle

Syntax Description

interval

Time, in seconds, that the GGSN allows a session to be idle at a particular access point before terminating the session. Specify a value between 30 and 4294967 seconds. The value 0 disables the session timeout feature.

uplink

(Optional) Enables the session idle timer in the uplink direction only. When the uplink keyword option is not specified, the session idle timer is enabled in both directions (uplink and downlink).


Defaults

259200 seconds (72 hours)

Command Modes

Access-point configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(8)XU1

This command was integrated into Cisco IOS Release 12.3(8)XU1 and the uplink keyword option was added.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4.(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

The GGSN supports the RADIUS Idle-Timeout (Attribute 28) field. The GGSN stores the attribute 28 value if it is present in the access request packets sent by the AAA server. When a PDP context is idle for an amount of time that exceeds the session idle timeout duration, the GGSN terminates it.

The duration specified for the session idle timer applies to all PDP contexts of a session, however, a session idle timer is started for each PDP context. Therefore, the session idle timer is per-PDP, but the timer duration is per-session.

On the GGSN, the session idle timer can be configured globally and at the APN. The value configured at the APN level using the gtp pdp-context timeout idle access-point configuration command overrides the value configured globally using the gprs gtp pdp-context timeout idle global configuration command. The value configured in the user profile on the RADIUS server overrides the value configured at the APN.


Note The session idle timer started for a PDP context is reset by TPDU traffic and GTP signaling messages for that PDP context. For example, if an Update PDP Context request is received, the session idle timer is reset for that PDP context.


You can disable the session idle timer for a particular user by configuring 0 as the session idle time duration in the user profile on the RADIUS server. If a user is authenticated by RADIUS, the session idle time cannot be disabled.


Note The session idle timeout (RADIUS Attribute 28) support applies to IP PDPs, PPP PDPs terminated at the GGSN, and PPP regenerated PDPs (not PPP L2TP PDPs). The absolute session timeout (RADIUS Attribute 27) support applies to IP PDPs and PPP PDPs terminated at the GGSN (not PPP Regen or PPP L2TP PDPs).

When configured, a session idle timer is started on every PDP context. An absolute session timer is started on the session.



Note Alternately, you can configure the idle session timer for an access-point using the session idle-time hours access-point configuration command however, the two methods cannot be configured at the same time.


Examples

The following example shows configuring the GGSN to wait 18000 seconds before ending an idle session:

gtp pdp-context timeout idle 18000

Related Commands

Command
Description

gprs gtp pdp-context timeout idle

Specifies the time, in seconds, that a GGSN allows a session to be idle before terminating the session.

gprs gtp pdp-context timeout session

Specifies the time, in seconds, that the GGSN allows a session to be active before terminating the session.

gprs idle-pdp-context purge-timer

Specifies the time, in hours, that the GGSN waits before purging idle mobile sessions.

gtp pdp-context timeout session

Specifies the time, in seconds, that a GGSN allows a session to be active at a particular APN before terminating the session.

session idle-time

Specifies the time, in hours, that the GGSN waits before purging idle mobile sessions for an access point.

show gprs gtp pdp-context

Displays a list of the currently active PDP contexts (mobile sessions).


gtp pdp-context timeout session

To specify the time, in seconds, that a GGSN allows a session to exist at a particular access point before terminating the session, use the gprs gtp pdp-context timeout session access-point configuration command. To return to the default value, use the no form of this command.

gtp pdp-context timeout session seconds

no gtp pdp-context timeout session

Syntax Description

seconds

Time, in seconds, that the GGSN allows a session to exist at a particular access point. Specify a value between 30 and 4294967 seconds.


Defaults

Disabled

Command Modes

Access-point configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4.(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

When enabled using the gprs radius attribute session-timeout command, the GGSN supports the RADIUS Session-Timeout (Attribute 27). The GGSN stores the attribute timeout value received in access-accept packets sent by the AAA server and when the duration of a session exceeds the duration configured as absolute session timer, the GGSN terminates the sessionand all PDP contexts belonging to the session (those with the same IMSI or MS address).


Note The session idle timeout (RADIUS Attribute 28) support applies to IP PDPs, PPP PDPs terminated at the GGSN, and PPP regenerated PDPs (not PPP L2TP PDPs). The absolute session timeout (RADIUS Attribute 27) support applies to IP PDPs and PPP PDPs terminated at the GGSN (not PPP Regen or PPP L2TP PDPs).

When configured, a session idle timer is started on every PDP context. An absolute session timer is started on the session.



Note The active session timeout feature requires that the gprs radius attribute session-timeout command has been enabled.


On the GGSN, the absolute session timer can be configured globally and at the APN. The value configured at the APN level using the gtp pdp-context timeout session access-point configuration command overrides the value configured globally using the gprs gtp pdp-context timeout session global configuration command. The value configured in the user profile on the RADIUS server overrides the value configured at the APN.

Examples

The following example shows configuring the GGSN to wait 86400 seconds before ending a session:

gtp pdp-context timeout session 86400

Related Commands

Command
Description

gprs gtp pdp-context timeout idle

Specifies the time, in seconds, that a GGSN allows a session to be idle at any access point before terminating the session.

gprs gtp pdp-context timeout session

Specifies the time, in seconds, that the GGSN allows a session to be active at any access point before terminating the session.

gprs idle-pdp-context purge-timer

Specifies the time, in hours, that the GGSN waits before purging idle mobile sessions.

gtp pdp-context timeout idle

Specifies the time, in seconds, that a GGSN allows a session to be idle at a particular APN before terminating the session.

session idle-time

Specifies the time, in hours, that the GGSN waits before purging idle mobile sessions for an access point.

show gprs gtp pdp-context

Displays a list of the currently active PDP contexts (mobile sessions).


gtp response-message wait-accounting

To configure the GGSN to wait for a RADIUS accounting response before sending a create PDP context response to the SGSN, for create PDP context requests received at a particular APN, use the gtp response-message wait-accounting access-point configuration command. To configure the GGSN to send a create PDP context response to the SGSN after sending a RADIUS start accounting message to the RADIUS server (without waiting for a response from the RADIUS accounting server), use the no form of this command.

gtp response-message wait-accounting

no gtp response-message wait-accounting

Syntax Description

This command has no arguments or keywords.

Defaults

The GGSN sends a create PDP context response to the SGSN after sending a RADIUS start accounting message to the RADIUS accounting server. The GGSN does not wait for a RADIUS accounting response from the RADIUS accounting server.

Command Modes

Access-point configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was integrated into Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was integrated into Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was integrated into Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was integrated into Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4.(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the gtp response-message wait-accounting command to configure the GGSN to wait for a RADIUS accounting response from the RADIUS accounting server, before sending a create PDP context response to the SGSN.

If the GGSN does not receive a response from the RADIUS accounting server when you have configured the gtp response-message wait-accounting command, then the GGSN rejects the PDP context request.

The GGSN supports configuration of RADIUS response message waiting at both the global and access-point configuration levels. You can minimize your configuration by specifying the configuration that you want to support across most APNs, at the global configuration level. Then, at the access-point configuration level, you can selectively modify the behavior that you want to support at a particular APN. Therefore, at the APN configuration level, you can override the global configuration of RADIUS response message waiting.

To configure the GGSN to wait for a RADIUS accounting response as the default behavior for all APNs, use the gprs gtp response-message wait-accounting global configuration command. To disable this behavior for a particular APN, use the no gtp response-message wait-accounting access-point configuration command.

To verify whether RADIUS response message waiting is enabled or disabled at an APN, you can use the show gprs access-point command and observe the value reported in the wait_accounting output field.

Examples

The following examples show only a partial configuration of the GGSN, to highlight those commands related to implementing RADIUS response message waiting. Additional configuration statements are required to complete a full configuration of the GGSN.

Example 1

The following example configures the GGSN to wait for an accounting response from the RADIUS server before sending a create PDP context response to the SGSN, for PDP context requests at access-point 1:

aaa new-model
!
aaa group server radius foo
 server 10.2.3.4
 server 10.6.7.8
!
aaa authentication ppp foo group foo
aaa authorization network default group radius
aaa accounting exec default start-stop group foo
!
gprs access-point-list gprs
 access-point 1
  access-mode non-transparent
  access-point-name www.pdn1.com
  aaa-group authentication foo
  gtp response-message wait-accounting
!
radius-server host 10.2.3.4 auth-port 1645 acct-port 1646 non-standard
radius-server host 10.6.7.8 auth-port 1645 acct-port 1646 non-standard
radius-server key ggsntel

Example 2

The following example globally configures the GGSN to wait for a RADIUS accounting response from the RADIUS server before sending a create PDP context response to the SGSN. The GGSN waits for a response for PDP context requests received across all access points, except access-point 1. RADIUS response message waiting has been overridden at access-point 1 using the no gtp response-message wait-accounting command:

aaa new-model
!
aaa group server radius foo
 server 10.2.3.4
 server 10.6.7.8
!
aaa authentication ppp foo group foo
aaa authorization network default group radius
aaa accounting exec default start-stop group foo
!
gprs access-point-list gprs
 access-point 1
  access-mode non-transparent
  access-point-name www.pdn1.com
  aaa-group authentication foo
  no gtp response-message wait-accounting
  exit
 access-point 2
  access-mode non-transparent
  access-point-name www.pdn2.com
  aaa-group authentication foo
!
gprs gtp response-message wait-accounting
!
radius-server host 10.2.3.4 auth-port 1645 acct-port 1646 non-standard
radius-server host 10.6.7.8 auth-port 1645 acct-port 1646 non-standard
radius-server key ggsntel

Related Commands

Command
Description

gprs gtp response-message wait-accounting

Configures the GGSN to wait for a RADIUS accounting response before sending an activate PDP context request to the SGSN, for create PDP context requests received across all access points.

show gprs access-point

Displays information about access points on the GGSN.


interface

To specify the logical interface, by name, that the quota server will use to communicate with the Content Services Gateway (CSG), use the interface quota server configuration command. To remove the interface, use the no form of this command

interface interface-name

no interface interface-name

Syntax Description

interface-name

Name of the interface that the quota server will use to communicate with the CSG.


Defaults

No default behavior or values.

Command Modes

Quota server configuration

Command History

Release
Modification

12.3(14)YQ

This command was introduced.

12.4(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the interface quota server configuration mode command to specify the logical interface the quota server will use to communicate with the CSG.

We recommend that a loopback interface be used as the quota server interface.

If the path to the CSG is up, using the no form of this command will bring the path down. Therefore, ensure that you use the command carefully. It must be configured for proper quota server-to-CSG interworking.

Examples

The following configuration specifies the logical interface "loopback1" as the interface that the quota server will use to communicate with the CSG:

ggsn quota-server qs1
 interface loopback1

Related Commands 

Command
Description

clear ggsn quota-server statistics

Clears the quota server-related statistics displayed using the show ggsn quota-server statistics command.

csg-group

Associates the quota server to a CSG group that is to be used for quota server-to-CSG communication.

echo-interval

Specifies the number of seconds that the quota server waits before sending an echo-request message to the CSG.

ggsn quota-server

Configures the quota server process that interfaces with the CSG for enhanced service-aware billing.

n3-requests

Specifies the maximum number of times that the quota server attempts to send a signaling request to the CSG.

t3-response

Specifies the initial time that the quota server waits before resending a signaling request message when a response to a request has not been received.

show ggsn quota-server

Displays quota server parameters or statistics about the message and error counts.


.

ip access-group

To control access to an interface, use the ip access-group command in interface configuration mode. To remove the specified access group, use the no form of this command.

ip access-group {access-list-number | access-list-name}{in | out}

no ip access-group {access-list-number | access-list-name}{in | out}

Syntax Description

access-list-number

Number of an access list. This is a decimal number from 1 to 199 or from 1300 to 2699.

access-list-name

Name of an IP access list as specified by an ip access-list command.

in

Filters on inbound packets.

out

Filters on outbound packets.


Defaults

No access list is applied to the interface.

Command Modes

Interface configuration

Command History

Release
Modification

10.0

This command was introduced.

11.2

The access-list-name argument was added.

12.2(33)SRA

This command was integrated into Cisco IOS Release 12.2(33)SRA.


Usage Guidelines

Access lists are applied on either outbound or inbound interfaces. For standard inbound access lists, after receiving a packet, the Cisco IOS software checks the source address of the packet against the access list. For extended access lists, the router also checks the destination access list. If the access list permits the address, the software continues to process the packet. If the access list rejects the address, the software discards the packet and returns an ICMP host unreachable message.

For standard outbound access lists, after receiving and routing a packet to a controlled interface, the software checks the source address of the packet against the access list. For extended access lists, the router also checks the destination access list. If the access list permits the address, the software sends the packet. If the access list rejects the address, the software discards the packet and returns an ICMP host unreachable message.

If the specified access list does not exist, all packets are passed.

When you enable outbound access lists, you automatically disable autonomous switching for that interface. When you enable input access lists on any CBus or CxBus interface, you automatically disable autonomous switching for all interfaces (with one exception—an SSE configured with simple access lists can still switch packets, on output only).

Examples

The following example applies list 101 on packets outbound from Ethernet interface 0:

interface ethernet 0
 ip access-group 101 out

Related Commands

Command
Description

access-list (IP extended)

Defines an extended IP access list.

access-list (IP standard)

Defines a standard IP access list.

ip access-list

Defines an IP access list by name.

show access-lists

Displays the contents of current IP and rate-limit access lists.


ip address-pool

To enable a global default address pooling mechanism used to supply IP addresses to dial-in asynchronous, synchronous, or ISDN point-to-point interfaces, use the ip address-pool command in global configuration mode. To disable IP address pooling globally on all interfaces with the default configuration, use the no form of this command.

ip address-pool {dhcp-pool | dhcp-proxy-client | local}

no ip address-pool

Syntax Description

dhcp-pool

Uses on-demand address pooling as the global default address mechanism. This option supports only remote access PPP sessions using a Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN). IP addresses are obtained from locally configured virtual routing and forwarding (VRF)-associated Dynamic Host Configuration Protocol (DHCP) pools.

dhcp-proxy-client

Uses the router as the proxy client between a third-party DHCP server and peers connecting to the router as the global default address mechanism.

local

Uses the local address pool named default as the global default address mechanism.


Command Default

IP address pooling is disabled globally.

Command Modes

Global configuration

Command History

Release
Modification

11.0

This command was introduced.

12.2(8)T

The dhcp-pool keyword was added.


Usage Guidelines

The global default IP address pooling mechanism applies to all interfaces that have been left in the default setting of the peer default ip address command.

If any peer default ip address command other than peer default ip address pool (the default) is configured, the interface uses that mechanism and not the global default mechanism. Thus all interfaces can be independently configured, or left unconfigured so that the global default configuration applies. This flexibility minimizes the configuration effort on the part of the administrator.

The ip address-pool dhcp-pool command supports only remote access PPP sessions using an MPLS VPN. IP addresses are obtained from locally configured VRF-associated DHCP pools. A VRF VPN instance is a per-VPN routing information repository that defines the VPN membership of a customer site.

Examples

The following example specifies the DHCP on-demand address pooling mechanism as the global default mechanism for assigning peer IP addresses:

ip address-pool dhcp-pool

The following example specifies the DHCP proxy client mechanism as the global default mechanism for assigning peer IP addresses:

ip address-pool dhcp-proxy-client

The following example specifies a local IP address pool named "default" as the global default mechanism for all interfaces that have been left in their default setting:

ip address-pool local

Related Commands

Command
Description

peer default ip address

Specifies an IP address, an address from a specific IP address pool, or an address from the DHCP mechanism to be returned to a remote peer connecting to this interface.


ip probe path

To enable route probe support on an APN, use the ip probe path access-point configuration command. To return to the default, use the no form of this command.

ip probe path ip_address protocol udp [port port ttl ttl]

no ip probe path ip_address protocol udp [port port ttl ttl]

Syntax Description

ip_address

IP address to which the GGSN is to send a probe packet for each PDP context successfully created.

protocol udp

Specifies UDP.

port port

(Optional) UDP destination port.

ttl ttl_value

(Optional) IP time-to-live (TTL) value for outgoing packet.


Defaults

Disabled

Command Modes

Access-point configuration

Command History

Release
Modification

12.3(2)XB1

This command was introduced.

12.3(8)XU

This command was integrated into Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4.(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the ip probe path access-point configuration command to enable the GGSN to send a probe packet to a specific destination for each PDP context that is successfully established.

An example of how to use this feature is when a firewall load balancer (FWLB) is being used in the network. If the ip probe path command is configured, when a PDP context is established, the GGSN sends a probe packet the FWLB. This enables the FWLB to create an entry for the PDP context even if there is no upstream packet from the MS. Once an entry is created, the FWLB can forward any downstream packet from the network for the MS to the appropriate GGSN without depending on the MS to send the packet first.


Note If an APN is mapped to a VRF, the route probe packet will go through the VRF routing table.


limit duration

To specify as a trigger condition in a charging profile, the time duration limit that when exceeded causes the GGSN to collect upstream and downstream traffic byte counts and close and update the G-CDR for a particular PDP context, use the limit duration charging profile configuration command. To return to the default value, use the no form of this command.

limit duration number [reset]

no limit duration number [reset]

Syntax Description

duration-value

A value, in minutes, between 5 and 4294967295 that specifies the time duration limit. The default is 1,048,576 minutes.

reset

(Optional) Keyword to specify that the time trigger be reset if the CDR is closed by any other trigger. If the reset keyword is not specified, the time trigger will not be reset when the volume trigger expires (limit volume command), but it will be reset when any other trigger expires.


Defaults

Disabled

Command Modes

Charging profile configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.4.(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the limit duration charging profile configuration command to specify the time limit, that when exceeded, causes the GGSN to collect upstream and downstream traffic byte counts and close and update the G-CDR for a PDP context.

For the box-level charging profile (profile 0 configured using the charging related global configuration commands), all triggers are reset by the expiration of another trigger. However, for charging profiles 1 through 15, the reset keyword option must be set for the limit duration and limit volume charging profile configuration commands for the expiration of any trigger to reset all other triggers.

If the reset keyword option is not specified when configuring the time trigger, the time trigger will not be reset when the volume trigger expires (limit volume command), but it will be reset when any other trigger expires.

Related Commands

Command
Description

category

Identifies the subscriber category to which a charging profile applies.s

cdr suppression

Specifies that CDRs be suppressed as a charging characteristic in a charging profile.

charging profile

Associates a default charging profile to an access point.

content dcca profile

Defines a DCCA client profile in a GGSN charging profile.

content postpaid time

Specifies as a trigger condition for postpaid users in a charging profile, the time duration limit that when exceeded causes the GGSN to collect upstream and downstream traffic byte counts and close and update the G-CDR for a particular PDP context.

content postpaid validity

Specifies as a trigger condition in a charging profile, the amount of time quota granted to a postpaid user is valid.

content postpaid volume

Specifies as a trigger condition for postpaid users in a charging profile, the maximum number of bytes that the GGSN maintains across all containers for a particular PDP context before closing and updating the G-CDR.

content rulebase

Associates a default rule-base ID with a charging profile.

description

Specifies the name or a brief description of a charging profile.

gprs charging characteristics reject

Specifies that create PDP context requests for which no charging profile can be selected be rejected by the GGSN.

gprs charging container time-trigger

Specifies a global time limit, that when exceeded by a PDP context causes the GGSN to close and update the G-CDR for that particular PDP context.

gprs charging profile

Creates a new charging profile (or modifies an existing one), and enters charging profile configuration mode.

limit sgsn-change

Specifies, as a trigger condition in a charging profile, the maximum number of SGSN changes that can occur before closing and updating the G-CDR for a particular PDP context.

limit volume

Specifies, as a trigger condition in a charging profile, the maximum number of bytes that the GGSN maintains across all containers for a particular PDP context before closing and updating the G-CDR.

tariff-time

Specifies that a charging profile use the tariff changes configured using the gprs charging tariff-time global configuration command.


.

limit sgsn-change

To specify as a trigger condition in a charging profile, the maximum number of SGSN changes that can occur before closing and updating the G-CDR for a particular PDP context, use the limit sgsn-change charging profile configuration command. To return to the default value, use the no form of this command.

limit sgsn-change number

no limit sgsn-change number

Syntax Description

number

Integer from 0 to 15. The default value is disabled.


Defaults

Disabled

Command Modes

Charging profile configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4.(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

A value of 0 means that a G-CDR is closed each time that a new SGSN begins handling the PDP context.

The command specifies the number of changes, not the number of SGSNs to be supported. The number of SGSNs supported is equal to 1 more than the change limit. For example, if the SGSN change limit is 2, the maximum number of SGSNs in the list before the GGSN closes the G-CDR is 3.

When you enable the gprs charging cdr-option no-partial-cdr-generation command, the GGSN creates any subsequent G-CDRs for the same PDP context request with the same fields in all G-CDRs and maintains sequence numbering.

If an SGSN change limit trigger is not configured when gprs charging cdr-option no-partial-cdr-generation command is configured, and a G-CDR is closed due to any other trigger (such as tariff times or QoS changes), the GGSN copies the last SGSN (the current SGSN) in the list in the new G-CDR. However, for charging releases prior to Release 4, by default, when the gprs charging cdr-option no-partial-cdr-generation command is configured and there is an SGSN change limit trigger configured either using the gprs charging container sgsn-change-limit global configuration or the limit sgsn-change charging profile configuration command, the CDR will not contain any SGSN address if it closed because of a non-SGSN-change trigger and there is no SGSN change. Therefore, to ensure that all CDR parameters are copied, including the SGSN list, specify the all keyword option when issuing the gprs charging cdr-option no-partial-cdr-generation.

Related Commands

Command
Description

category

Identifies the subscriber category to which a charging profile applies.s

cdr suppression

Specifies that CDRs be suppressed as a charging characteristic in a charging profile.

charging profile

Associates a default charging profile to an access point.

content dcca profile

Defines a DCCA client profile in a GGSN charging profile.

content postpaid time

Specifies as a trigger condition for postpaid users in a charging profile, the time duration limit that when exceeded causes the GGSN to collect upstream and downstream traffic byte counts and close and update the G-CDR for a particular PDP context.

content postpaid validity

Specifies as a trigger condition in a charging profile, the amount of time quota granted to a postpaid user is valid.

content postpaid volume

Specifies as a trigger condition for postpaid users in a charging profile, the maximum number of bytes that the GGSN maintains across all containers for a particular PDP context before closing and updating the G-CDR.

content rulebase

Associates a default rule-base ID with a charging profile.

description

Specifies the name or a brief description of a charging profile.

gprs charging characteristics reject

Specifies that create PDP context requests for which no charging profile can be selected be rejected by the GGSN.

gprs charging container time-trigger

Specifies a global time limit, that when exceeded by a PDP context causes the GGSN to close and update the G-CDR for that particular PDP context.

gprs charging profile

Creates a new charging profile (or modifies an existing one), and enters charging profile configuration mode.

limit duration

Specifies, as a trigger condition in a charging profile, the time duration limit that when exceeded causes the GGSN to collect upstream and downstream traffic byte counts and close and update the G-CDR for a particular PDP context.

limit volume

Specifies, as a trigger condition in a charging profile, the maximum number of bytes that the GGSN maintains across all containers for a particular PDP context before closing and updating the G-CDR.

tariff-time

Specifies that a charging profile use the tariff changes configured using the gprs charging tariff-time global configuration command.


.

limit volume

To specify as a trigger condition in a charging profile, the maximum number of bytes that the GGSN maintains across all containers for a particular PDP context before closing and updating the G-CDR, use the limit volume charging profile configuration command. To return to the default value, use the no form of this command.

limit volume threshold-value [reset]

no limit volume threshold-value [reset]

Syntax Description

threshold-value

A value between 1 and 4294967295 that specifies the container threshold value, in bytes. The default is 1,048,576 bytes (1 MB).

reset

(Optional) Keyword to specify that the volume trigger be reset if the CDR is closed by any other trigger. If the reset keyword is not specified, the volume trigger will not be reset when the time trigger expires (limit duration command), but it will be reset when any other trigger expires.


Defaults

1,048,576 bytes (1 MB)

Command Modes

Charging profile configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4.(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

While a PDP context (mobile session) is active, charging events are generated based on various actions. One way that users can be charged is based on the amount of data transmitted between the PDN and the mobile station. Data volume is recorded in each of the containers of a G-CDR record. Service providers can use this recorded data volume to bill users by volume usage.

Use the limit volume charging profile configuration command to control the maximum amount of data volume that can be reported in each G-CDR from an active PDP context before the G-CDR is eligible for an update to the charging gateway for subsequent billing. The GGSN opens another partial G-CDR for that PDP context while it remains in session on the GGSN.

For example, consider that a volume threshold setting of 1 MB is configured on the GGSN. The GGSN opens a container in a G-CDR for a new PDP context. A trigger occurs for the PDP context, and at that time the GGSN has registered transmission of 500 KB of data for the PDP context. The trigger causes the GGSN to close the container for the PDP context, which has occurred before the volume limit is reached (500 KB of data transmitted, and 1 MB allowed).

As transmission for the PDP context continues, the GGSN opens a new container in the G-CDR. The GGSN now has up to 500 KB more data that can be processed for that PDP context before reaching the volume threshold limit for the G-CDR. When the volume threshold is reached across all containers for the PDP context (that is, the sum of all of the byte counts across all containers for the PDP context reaches 1 MB), the GGSN closes the G-CDR with a volume limit cause so that the G-CDR can be sent to the charging gateway. The GGSN opens another partial G-CDR for the PDP context while it remains in session.

For the box-level charging profile (profile 0 configured using the charging related global configuration commands), all triggers are reset by the expiration of another trigger. However, for charging profiles 1 through 15, the reset keyword option must be set for the limit duration and limit volume charging profile configuration commands for the expiration of any trigger to reset all other triggers. If the reset keyword is not specified when configuring the volume trigger, the volume trigger will not be reset when the time trigger expires (limit duration command), but it will be reset when any other trigger expires.

Related Commands

Command
Description

category

Identifies the subscriber category to which a charging profile applies.s

cdr suppression

Specifies that CDRs be suppressed as a charging characteristic in a charging profile.

charging profile

Associates a default charging profile to an access point.

content dcca profile

Defines a DCCA client profile in a GGSN charging profile.

content postpaid time

Specifies as a trigger condition for postpaid users in a charging profile, the time duration limit that when exceeded causes the GGSN to collect upstream and downstream traffic byte counts and close and update the G-CDR for a particular PDP context.

content postpaid validity

Specifies as a trigger condition in a charging profile, the amount of time quota granted to a postpaid user is valid.

content postpaid volume

Specifies as a trigger condition for postpaid users in a charging profile, the maximum number of bytes that the GGSN maintains across all containers for a particular PDP context before closing and updating the G-CDR.

content rulebase

Associates a default rule-base ID with a charging profile.

description

Specifies the name or a brief description of a charging profile.

gprs charging characteristics reject

Specifies that create PDP context requests for which no charging profile can be selected be rejected by the GGSN.

gprs charging container time-trigger

Specifies a global time limit, that when exceeded by a PDP context causes the GGSN to close and update the G-CDR for that particular PDP context.

gprs charging profile

Creates a new charging profile (or modifies an existing one), and enters charging profile configuration mode.

limit duration

Specifies, as a trigger condition in a charging profile, the time duration limit that when exceeded causes the GGSN to collect upstream and downstream traffic byte counts and close and update the G-CDR for a particular PDP context.

limit sgsn-change

Specifies, as a trigger condition in a charging profile, the maximum number of SGSN changes that can occur before closing and updating the G-CDR for a particular PDP context.

tariff-time

Specifies that a charging profile use the tariff changes configured using the gprs charging tariff-time global configuration command.


.

maximum delay-class

To define in a Call Admission Control (CAC) maximum QoS policy, the maximum delay class for R97/R98 QoS that can be accepted at an APN, use the maximum delay-class CAC maximum QoS policy configuration command. To return to the default value, use the no form of this command.

maximum delay-class value [reject]

no maximum delay-class value [reject]

Syntax Description

value

Specifies the maximum delay class that can be accepted at an APN. Valid values are 1 to 4.

reject

(Optional) Specifies that if the maximum delay class is higher than the configured value, the create PDP context is rejected. If this keyword is not specified, the delay class is downgraded to the value of the configured delay class. This keyword option is ignored for update PDP context requests.


Defaults

PDP contexts for which the maximum delay-class is higher than the configured value are downgraded to the configured value.

Command Modes

CAC maximum QoS policy configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4.(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the maximum delay-class CAC maximum QoS policy configuration command to specify the maximum delay class that can be accepted at an APN.

By default, PDP contexts for which the maximum delay-class is higher than the configured value are downgraded to the configured value.

If the reject keyword has been specified, if the maximum delay class requested is higher than the configured delay class, the create PDP context is rejected.

If the reject keyword is not specified and the delay class in a create or update PDP context request is greater than the configured value, the requested delay class is downgraded to the configured value.

Examples

The following example defines 3 as the maximum delay class for GPRS QoS that can be accepted at an APN:

maximum delay-class 3

Related Commands

Command
Description

cac-policy

Enables the maximum QoS policy function of the CAC feature and applies a policy to an APN.

gbr traffic-class

Specifies the maximum guaranteed bit rate (GBR) that can be allowed in uplink and downlink directions for real-time classes (conversational and streaming) at an APN.

gprs qos cac-policy

Creates or modifies a CAC maximum QoS policy.

maximum delay-class

Defines the maximum delay class for R97/R98 (GPRS) QoS that can be accepted.

maximum peak-throughput

Defines the maximum peak throughput for R97/R98 (GPRS) QoS that can be accepted.

maximum pdp-context

Specifies the maximum PDP contexts that can be created for a particular APN.

maximum traffic-class

Defines the highest traffic class that can be accepted.

mbr traffic-class

Specifies the maximum bit rate (MBR) that can be allowed for each traffic class in both directions (downlink and uplink).


maximum pdp-context

To specify in a Call Admission Control maximum QoS policy, the maximum number of PDP contexts that can be created for a particular APN, use the maximum pdp-context CAC maximum QoS policy configuration command. To return to the default value, use the no form of this command.

maximum pdp-context number1 [threshold number2]

no maximum pdp-context number1 [threshold number2]

Syntax Description

number1

Specifies the maximum number of PDP contexts that can be created in an APN.

threshold number2

(Optional) Specifies the threshold, that after reached, only PDP contexts with allocation/retention priority 1 are accepted.


Defaults

No default behavior or values.

Command Modes

CAC maximum QoS policy configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4.(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the maximum pdp-context CAC maximum QoS policy configuration command to configure the maximum number of PDP contexts that can be created for a particular APN.

The maximum number of PDP contexts defined for an APN using the maximum pdp-context command cannot exceed the maximum number of PDP contexts defined by the gprs maximum-pdp-context-allowed global configuration command.

When the optional threshold keyword is specified, when the total number of PDP contexts exceeds the configured number, only PDP contexts with Allocation/Retention Priority 1 are accepted. Create PDP contexts with other priorities (2/3) are rejected. If the optional threshold keyword is not specified, when the total number of PDP contexts reaches the configured maximum number, all subsequent create PDP contexts are rejected.

The maximum pdp-context command configuration is checked before all other QoS parameters defined in a policy: maximum bit rate, guaranteed bit rate, highest traffic class, highest traffic handling priority, highest delay class, and highest peak throughput class.

Examples

In the following example, 15000 is specified as the maximum number of PDP contexts that can be created for a particular APN:

maximum pdp-context 15000

Related Commands

Command
Description

cac-policy

Enables the maximum QoS policy function of the CAC feature and applies a policy to an APN.

gbr traffic-class

Specifies the maximum guaranteed bit rate (GBR) that can be allowed in uplink and downlink directions for real-time classes (conversational and streaming) at an APN.

gprs qos cac-policy

Creates or modifies a CAC maximum QoS policy.

maximum delay-class

Defines the maximum delay class for R97/R98 (GPRS) QoS that can be accepted.

maximum peak-throughput

Defines the maximum peak throughput for R97/R98 (GPRS) QoS that can be accepted.

maximum pdp-context

Specifies the maximum PDP contexts that can be created for a particular APN.

maximum traffic-class

Defines the highest traffic class that can be accepted.

mbr traffic-class

Specifies the maximum bit rate (MBR) that can be allowed for each traffic class in both directions (downlink and uplink).


maximum peak-throughput

To define in a Call Admission Control (CAC) maximum QoS policy, the maximum peak throughput for R97/R98 QoS that can be accepted at an APN, use the maximum peak-throughput CAC maximum QoS policy configuration command. To return to the default value, use the no form of this command.

maximum peak-throughput value [reject]

no maximum peak-throughput value [reject]

Syntax Description

value

Specifies the maximum peak throughput that can be accepted at an APN. Valid values are between 1 and 9.

reject

(Optional) Specifies that if the maximum peak throughput is higher than the configured value, the create PDP context is rejected. If this keyword is not specified, the peak throughput is downgraded to the value of the configured peak throughput value. This option is ignored for update PDP context requests.


Defaults

PDP contexts for which the peak throughput is higher than the configured value are downgraded to the configured value.

Command Modes

CAC maximum QoS policy configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4.(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the maximum peak-throughput CAC maximum QoS policy configuration command to specify the maximum peak throughput that can be accepted at an APN.

By default, PDP contexts for which the peak throughput is higher than the configured value are downgraded to the configured value.

If the reject keyword has been specified, if the maximum peak throughput requested is higher than the configured peak throughput, the create PDP context is rejected.

If the reject keyword is not specified and the peak throughput in a create or update PDP context request is greater than the configured value, the requested peak throughput is downgraded to the configured value.

Examples

The following example defines 7 as the maximum peak-throughput GPRS QoS that can be accepted at an APN:

maximum peak-throughput 7

Related Commands

Command
Description

cac-policy

Enables the maximum QoS policy function of the CAC feature and applies a policy to an APN.

gbr traffic-class

Specifies the maximum guaranteed bit rate (GBR) that can be allowed in uplink and downlink directions for real-time classes (conversational and streaming) at an APN.

gprs qos cac-policy

Creates or modifies a CAC maximum QoS policy.

maximum delay-class

Defines the maximum delay class for R97/R98 (GPRS) QoS that can be accepted.

maximum peak-throughput

Defines the maximum peak throughput for R97/R98 (GPRS) QoS that can be accepted.

maximum pdp-context

Specifies the maximum PDP contexts that can be created for a particular APN.

maximum traffic-class

Defines the highest traffic class that can be accepted.

mbr traffic-class

Specifies the maximum bit rate (MBR) that can be allowed for each traffic class in both directions (downlink and uplink).


maximum traffic-class

To define in a Call Admission Control (CAC) maximum QoS policy, the highest traffic class that can be accepted at an APN, use the maximum traffic-class CAC maximum QoS policy configuration command. To return to the default value, use the no form of this command.

maximum traffic-class traffic-class-name [priority value]

no maximum traffic-class traffic-class-name [priority value]

Syntax Description

traffic-class-name

Specifies the highest traffic class that can be accepted at an APN. Valid values are conversational, streaming, interactive, or background.

priority

(Optional) Specifies the highest traffic handling priority for the interactive traffic class.


Defaults

All traffic classes are accepted.

Command Modes

CAC maximum QoS policy configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4.(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the maximum traffic-class CAC maximum QoS policy configuration command to define the highest traffic class that can be accepted at an APN. If the traffic class requested in a create PDP context request is higher than the configured class, the request is rejected.

The GGSN does not downgrade the traffic class of a PDP context unless the highest traffic class configured is changed after a PDP context is created and the GGSN receives an update PDP context request with a traffic class higher than the newly configured value. If this condition occurs, the GGSN downgrades the traffic class to the value of the newly configured maximum traffic class.

By default, all traffic classes are accepted.

Use the optional priority keyword to define the highest traffic handling priority for the interactive traffic class. If the requested traffic handling priority exceeds the highest one, it will be downgraded to the configured one. If the interactive traffic class is configured without the priority keyword option, then PDPs with any traffic handling priority are allowed. If the traffic class is not interactive, the priority keyword is ignored.

Examples

The following example configures streaming as the highest traffic class accepted at an APN:

maximum traffic-class streaming

The following example configures interactive as the highest traffic class accepted at an APN:

maximum traffic-class interactive

The following example configures interactive as the highest traffic class with traffic handling priority 2 accepted at an APN:

maximum traffic-class interactive priority 2

Related Commands

Command
Description

cac-policy

Enables the maximum QoS policy function of the CAC feature and applies a policy to an APN.

gbr traffic-class

Specifies the maximum guaranteed bit rate (GBR) that can be allowed in uplink and downlink directions for real-time classes (conversational and streaming) at an APN.

gprs qos cac-policy

Creates or modifies a CAC maximum QoS policy.

maximum delay-class

Defines the maximum delay class for R97/R98 (GPRS) QoS that can be accepted.

maximum peak-throughput

Defines the maximum peak throughput for R97/R98 (GPRS) QoS that can be accepted.

maximum pdp-context

Specifies the maximum PDP contexts that can be created for a particular APN.

maximum traffic-class

Defines the highest traffic class that can be accepted.

mbr traffic-class

Specifies the maximum bit rate (MBR) that can be allowed for each traffic class in both directions (downlink and uplink).


mbr traffic-class

To define in a Call Admission Control (CAC) maximum QoS policy, the maximum bit rate (MBR) that can be allowed for each traffic class, use the mbr traffic-class CAC maximum QoS policy configuration command. To return to the default value, use the no form of this command.

mbr traffic-class traffic-class-name bitrate {uplink | downlink} [reject]

no mbr traffic-class traffic-class-name bitrate {uplink | downlink} [reject]

Syntax Description

traffic-class-name

Specifies the UMTS traffic class to which the MBR applies. Valid values are Conversational, Streaming, Interactive, or Background.

bitrate

Maximum bit rate (1 to 8640) in kilobits per second.

uplink

Specifies MBR applies to a traffic-class for uplink traffic.

downlink

Specifies MBR applies to a traffic-class for downlink traffic.

reject

(Optional) Specifies that when the MBR exceeds the configured value, the create PDP contexts is rejected. This option is ignored for update PDP context requests.


Defaults

Any MBR is accepted.

Command Modes

CAC maximum QoS policy configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Use the mbr traffic-class CAC maximum QoS policy configuration command to define the highest MBR that can be accepted for real-time traffic on an APN.

When the reject optional keyword is specified, if the requested MBR exceeds the configured value, create PDP contexts are rejected. If the reject keyword is not specified, the MBR is downgraded to the configured value.

If the reject keyword is not specified and the MBR in a create or update PDP context request is greater than the configured value, the requested MBR is downgraded to the configured value.

Examples

The following example defines 1000 kbps as the uplink MBR supported and 2000 kbps as the maximum downlink MBR:

mbr traffic-class interactive 1000 uplink
mbr traffic-class interactive 1000 downlink

Related Commands

Command
Description

cac-policy

Enables the maximum QoS policy function of the CAC feature and applies a policy to an APN.

gbr traffic-class

Specifies the maximum guaranteed bit rate (GBR) that can be allowed in uplink and downlink directions for real-time classes (conversational and streaming) at an APN.

gprs qos cac-policy

Creates or modifies a CAC maximum QoS policy.

maximum delay-class

Defines the maximum delay class for R97/R98 (GPRS) QoS that can be accepted.

maximum peak-throughput

Defines the maximum peak throughput for R97/R98 (GPRS) QoS that can be accepted.

maximum pdp-context

Specifies the maximum PDP contexts that can be created for a particular APN.

maximum traffic-class

Defines the highest traffic class that can be accepted.

mbr traffic-class

Specifies the maximum bit rate (MBR) that can be allowed for each traffic class in both directions (downlink and uplink).


msisdn suppression

To specify that the GGSN overrides the mobile station integrated services digital network (MSISDN) number with a pre-configured value in its authentication requests to a RADIUS server, use the msisdn suppression access point configuration command. To enable the GGSN to send the MSISDN number in authentication requests to a RADIUS server, use the no form of the command.

msisdn suppression [value]

no msisdn suppression [value]

Syntax Description

value

(Optional) String (up to 20 characters long) that the GGSN sends in place of the MSISDN number in authentication requests to a RADIUS server. Valid characters for the string are any of those accepted by the MSISDN encoding specifications, including the integers 0-9, and characters a, b, c, * and #. The default value is that no string is sent.


Defaults

The MSISDN number is suppressed, and no ID string is sent to the RADIUS server in place of the MSISDN number.

Command Modes

Access point configuration

Command History

Release
Modification

12.2(2)

This command was introduced.

12.2(4)MX2

This command was integrated into Cisco IOS Release 12.2(4)MX2.

12.2(8)YD

This command was integrated into Cisco IOS Release 12.2(8)YD.

12.2(8)YW

This command was integrated into Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was integrated into Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was integrated into Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into Cisco IOS Release 12.4(9)T.


Usage Guidelines

Certain countries have privacy laws which prohibit service providers from identifying the MSISDN number of mobile stations in authentication requests. Use the msisdn suppression command to specify a value that the GGSN sends in place of the MSISDN number in its authentication requests to a RADIUS server. If no value is configured, then no number is sent to the RADIUS server.

To use the msisdn suppression command, you must configure a RADIUS server either globally or at the access point and specify non-transparent access mode.

Examples

The following example will override the MSISDN ID sent in the create request and will not send any ID to the RADIUS server:

gprs access-point-list abc
access-point 1
radius-server 192.168.1.1
     access-mode non-transparent
msisdn suppression

Related Commands

Command
Description

access-mode

Specifies whether the GGSN requests user authentication at the access point to a PDN.

aaa-group

Specifies a AAA server group and assigns the type of AAA services to be supported by the server group for a particular access point on the GGSN.

gprs default aaa-group

Specifies a default AAA server group and assigns the type of AAA services to be supported by the server group for all access points on the GGSN.


n3-requests

To specify the maximum number of times that the quota server attempts to send a signaling request to the CSG, use the n3-requests quota server configuration command. To return to the default value, use the no form of this command.

n3-requests number

no n3-requests

Syntax Description

number

Number between 1 and 65535 that specifies the number of times a request is attempted.


Defaults

5 requests.

Command Modes

Quota server configuration

Command History

Release
Modification

12.3(14)YQ

This command was introduced.

12.4(9)T

This command was integrated into 12.4(9)T.


Usage Guidelines

Use the n3-requests command to configure the maximum number of times the quota server will attempt to send a signaling request to the CSG.

Examples

The following example configures the quota server to attempt to send a signaling request no more than 3 times:

ggsn quota-server qs1
 interface loopback1
 echo-interval 90
 n3-requests 3

Related Commands 

Command
Description

csg-group

Associates the quota server to a CSG group that is to be used for quota server-to-CSG communication.

echo-interval

Specifies the number of seconds that the quota server waits before sending an echo-request message to the CSG.

ggsn quota-server

Configures the quota server process that interfaces with the CSG for enhanced service-aware billing.

interface

Specifies the logical interface, by name, that the quota server will use to communicate with the CSG.

t3-response

Specifies the initial time that the quota server waits before resending a signaling request message when a response to a request has not been received.

show ggsn quota-server

Displays quota server parameters or statistics about the quota server message and error counts.


.

nbns primary

To specify a primary (and backup) NBNS to be sent in create packet data protocol (PDP) responses at the access point, use the nbns primary command in access-point configuration mode. To remove the NBNS from the access-point configuration, use the no form of this command

nbns primary ip-address [secondary ip-address]

Syntax Description

ip-address

IP address of the primary NBNS.

secondary ip-address

(Optional) Specifies the IP address of the backup NBNS.


Defaults

No default behavior or values.

Command Modes

Access-point configuration

Command History

Release
Modification

12.3(2)XB

This command was introduced.

12.3(8)T

This command was integrated into Cisco IOS Release 12.3(8)T.

12.3(8)XU

This command was integrated into Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the nbns primary command to specify the primary (and backup) NBNS at the access point level.

This feature is benefits address allocation schemes where there is no mechanism to obtain these address. Also, for a RADIUS-based allocation scheme, it prevents the operator from having to configure a NBNS and DNS under each user profile.

The NBNS address can come from three possible sources: DHCP server, RADIUS server, or local APN configuration. The criterion for selecting the NBNS address depends on the IP address allocation scheme configured under the APN. Depending on the configuration, the criterion for selecting the DNS and NBNS addresses is as follows:

1. DHCP-based IP address allocation scheme (local and external)—NBNS address returned from the DHCP server is sent to the MS. If the DHCP server does not return an NBNS address, the local APN configuration is used.

2. RADIUS-based IP address allocation scheme—NBNS address returned from the RADIUS server (in Access-Accept responses) is used. If the RADIUS server does not return an NBNS address, the local APN configuration is used.

3. Local IP Address Pool-based IP address allocation scheme—Local APN configuration is used.

4. Static IP Addresses—Local APN configuration is used.


Note The GGSN sends DNS addresses in the create PDP response only if the MS is requesting the DNS address in the PCO IE.


Examples

The following example specifies a primary and secondary NBNS at the access point level:

 access-point 2
  access-point-name xyz.com
  nbns primary 10.60.0.1 secondary 10.60.0.2
  exit

Related Commands

Command
Description

ip-address-pool

Specifies a dynamic address allocation method using IP address pools for the current access point.

dns primary

Specifies a primary (and backup) DNS at the access point level.


network-behind-mobile

To enable an access point to support routing behind the mobile station (MS), use the network-behind-mobile access-point configuration command. To disable support for routing behind the MS, use the no form of this command.

network-behind-mobile

no network-behind-mobile

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

Access-point configuration

Command History

Release
Modification

12.3(8)T

This command was introduced.

12.3(8)XU

This command was integrated into Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.


12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into 12.4(9)T.


Usage Guidelines

Use the network-behind-mobile access-point configuration command to enable an access point to support routing behind the MS. The routing behind the MS feature enables the routing of packets to IP addresses that do not belong to the PDP context (the MS), but exist behind it. The network address of the destination can be different than the MS address.

Before enabling routing behind the MS, the following requirements must be met:

The MS must use RADIUS for authentication and authorization.

At minimum, one Framed-Route, attribute 22 as defined in Internet Engineering Task Force (IETF) standard RFC 2865, must be configured in the RADIUS server for each MS that wants to use this feature.

When configured, the Framed-Route attribute is automatically downloaded to the GGSN during the authentication and authorization phase of the PDP context creation. If routing behind the MS is not enabled, the GGSN ignores the Framed-Route attribute. If multiple Framed-Route attributes have been configured for an MS, the GGSN uses the first attribute configured. When the MS session is no longer active, the route is deleted.

For PDP Regen or PPP with L2TP sessions, the Framed-Route attribute must be configure in the RADIUS server of the LNS.

For PPP Regen sessions, if the security verify source command is configure, the Framed-Route attribute must also be configured in the user profile in the GGSN RADIUS server.Packets routed behind the MS share the same 3GPP QoS settings of the MS.

Examples

The following example shows how to enable support for routing behind the MS at access point 200:

gprs access-point-list abc
access-point 200
network-behind-mobile

Related Commands

Command
Description

security verify

Specifies the verification of source and/or destination addresses.

show gprs gtp pdp-context

Displays a list of the currently active PDP contexts (mobile sessions).

show gprs gtp statistics

Displays the current GTP statistics for the GGSN.

show ip route

Displays the current state of the routing table.

show pdp

Displays a list of the currently active PDP contexts (mobile sessions).


network-request-activation

To enable an access point to support network-initiated PDP requests, use the network-request-activation access-point configuration command. To disable support for network-initiated PDP requests at an access point, use the no form of this command.

network-request-activation

no network-request-activation

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

Access-point configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

In addition to configuring the network-request-activation command, you must configure the following other commands to support network-initiated PDP requests on the GGSN:

gprs ni-pdp ip-imsi single

gprs default map-converting-gsn

Examples

The following example shows how to enable support for network-initiated PDP requests at access point 200:

gprs access-point-list abc
access-point 200
network-request-activation

Related Commands

Command
Description

gprs ni-pdp ip-imsi single

Specifies a static IP address to IMSI mapping for a single MS for network-initiated PDP requests from a particular APN.

gprs default map-converting-gsn

Specifies the address or host name of the SGSN that sends Mobile Application Protocol (MAP) messages to and from the home location register (HLR).


port

To configure the port number on which the CSG listens for quota server traffic, use the port CSG group configuration command. To deconfigure the port, use the no form of this command

port port-number

no port

Syntax Description

port-number

Number of the port on which the CSG listens for quota server traffic.


Defaults

3386

Command Modes

CSG group configuration

Command History

Release
Modification

12.3(14)YQ

This command was introduced.

12.4(9)T

This command was integrated into 12.4(9)T.


Usage Guidelines

Use the port command to configure the port number on which the CSG listens for quota server traffic.

The CSG always sends traffic to the quota server on port 3386. By default, it also listens for traffic from the quota server on port 3386, however, it can be configured to listen to a different port using the port CSG group configuration command.

Examples

The following configuration example configures the CSG to listen for traffic from a quota server on port 4444:

ggsn csg-group csg1
  virtual-address 5.5.5.14
  port 4444

Related Commands 

Command
Description

ggsn csg-group

Configures a CSG group on the GGSN for quota server-to-CSG communication.

real-address

Configures the IP address of a real CSG for source checking on inbound messages from a CSG.

show ggsn csg

Displays the parameters used by the CSG group or the number of path and quota management messages sent and received by the quota server.

virtual-address

Configures a virtual IP address to which the quota server will send all requests.


ppp-regeneration

To enable an access point to support PPP regeneration, use the ppp-regeneration access-point configuration command. To disable support for PPP regeneration at an access point, use the no form of this command.

ppp-regeneration [max-session number] [setup-time seconds] [verify-domain] [fix-domain]

no ppp-regeneration [max-session number] [setup-time seconds] [verify-domain] [fix-domain]

Syntax Description

max-session number

Maximum number of PPP regenerated sessions allowed at the access point. The default value 65535.

setup-time seconds

Maximum amount of time (between 1 and 65535 seconds) within which a PPP regenerated session must be established. The default value is 60 seconds.

verify-domain

Configures the GGSN to verify that the domain name from APN IE and PCO IE are the same before creating an L2TP tunnel to the user.

fix-domain

Configures the GGSN to use the access point name as the domain name with which it initiates an L2TP tunnel to the user.


Defaults

The default max-session value is 65535.

The default setup-time is 60 seconds.

The default for the verify-domain option is to create an L2TP tunnel to the user to the domain specified in the PCO IE without verifying against the APN.

Command Modes

Access-point configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD and the default value changed from being device dependent to 65535.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ and the fix-domain keyword option was added.


Usage Guidelines

Use the ppp-regeneration command to enable an access point to support PPP regeneration and to specify parameters for PPP regeneration sessions on the GGSN.


Note PPP regeneration support at an access point requires CEF to be enabled on the RP using the ip cef command.


The maximum setup-time value should allow for the total amount of time required to create the PPP virtual access (VA) and to establish a PPP session. If the setup-time is reached before the PPP IP Control Protocol (IPCP) is up, the GGSN tears down the L2TP session, PPP VA, and PDP context.

The method of PPP configured to forward packets beyond the terminal equipment and mobile termination affects the maximum number of PDP contexts supported on the GGSN. For more information, see the "Configuring PPP Support on the GGSN" chapter of the Cisco IOS Mobile Wireless Configuration Guide.

When PPP-regeneration is being used, use the ppp-regeneration verify-domain access-point configuration command to configure the GGSN to verify the domain sent in the PCO IE in a create PDP context request against the domain in the APN IE sent out by the user before selecting an L2TP tunnel to the user. If there is a mismatch between the user-supplied domain name and the APN, the create PDP request is rejected with the cause value "Service not supported."


Note The ppp-regeneration fix-domain and ppp-regeneration verify-domain configurations are mutually exclusive. When ppp-regeneration fix-domain is configured, domain verification cannot be performed.


Examples

The following example shows a partial GGSN configuration for PPP regeneration, where PPP regeneration is enabled at access point 1. It specifies a maximum of 100 PPP regeneration sessions, with a limit of 30 seconds to create the PPP VA and establish a PPP session:

gprs access-point-list abc
 access-point 1
  access-point-name gprs.corporate.com
  ppp-regeneration max-session 100 setup-time 30
  ppp-regeneration verify domain
  exit

Related Commands

Command
Description

gprs gtp ppp-regeneration

Associates the virtual template interface that is configured for PPP encapsulation with support for regenerated PPP sessions on the GGSN.

interface virtual-template

Creates a virtual template interface that can be configured and applied dynamically in creating virtual access interfaces.


radius attribute nas-id

To specify that the GGSN include the NAS-Identifier (attribute 32) in access requests at an APN, use the following access-point configuration command. To disable this configuration, use the no form of this command.

radius attribute nas-id word

no radius attribute nas-id

Syntax Description

word

Text string sent in attribute 32 that identifies the NAS originating in the access-request packets.


Defaults

The default is to not send the NAS-Identifier in access requests.

Command Modes

Access point configuration

Command History

Release
Modification

12.3(2)XB

This command was introduced.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the radius attribute nas-id command to include the NAS-Identifier in access requests at an APN.

This command overrides the configuration of the radius-server attribute 32 include-in-access-req format global configuration command.

Examples

The following example configures the GGSN to send the NAS-Identifier in access requests at the APN:

gprs access-point-list abc
access-point 1
radius attribute nas-id GGSNGATEWAY1

Related Commands

Command
Description

access-mode

Specifies whether the GGSN requests user authentication at the access point to a PDN.

aaa-group

Specifies a AAA server group and assigns the type of AAA services to be supported by the server group for a particular access point on the GGSN.

gprs default aaa-group

Specifies a default AAA server group and assigns the type of AAA services to be supported by the server group for all access points on the GGSN.

show gprs access-point

Displays information about access points on the GGSN.


radius attribute suppress imsi

To specify that the GGSN suppress the Third Generation Partnership Project (3GPP) vendor-specific attribute (VSA) 3GGP-IMSI number in its authentication and accounting requests to a RADIUS server, use the radius attribute suppress imsi access point configuration command. To enable the GGSN to send the 3GPP VSA 3GPP-IMSI number in authentication and accounting requests to a RADIUS server, use the no form of the command.

radius attribute suppress imsi

no radius attribute suppress imsi

Syntax Description

This command has no arguments or keywords.

Defaults

The default is to send the 3GPP VSA 3GPP-IMSI number in authentication and accounting requests to a RADIUS server.

Command Modes

Access point configuration

Command History

Release
Modification

12.2(8)YD

This command was introduced.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the radius attribute suppress imsi command to have GGSN suppress the 3GPP VSA 3GPP-IMSI number in its authentication and accounting requests to a RADIUS server.

Examples

The following example will not send the 3GPP VSA 3GPP-IMSI to the RADIUS server:

gprs access-point-list abc
access-point 1
radius attribute suppress imsi

Related Commands

Command
Description

access-mode

Specifies whether the GGSN requests user authentication at the access point to a PDN.

aaa-group

Specifies a AAA server group and assigns the type of AAA services to be supported by the server group for a particular access point on the GGSN.

gprs default aaa-group

Specifies a default AAA server group and assigns the type of AAA services to be supported by the server group for all access points on the GGSN.

show gprs access-point

Displays information about access points on the GGSN.


radius attribute suppress qos

To specify that the GGSN suppress the 3GPP VSA 3GPP-GPRS-QoS-Profile in its authentication and accounting requests to a RADIUS server, use the radius attribute suppress qos access point configuration command. To enable the GGSN to send the 3GPP VSA 3GPP-GPRS-QoS-Profile in authentication and accounting requests to a RADIUS server, use the no form of the command.

radius attribute suppress qos

no radius attribute suppress qos

Syntax Description

This command has no arguments or keywords.

Defaults

The default is to send the 3GPP VSA 3GPP-GPRS-QoS-Profile in authentication and accounting requests to a RADIUS server.

Command Modes

Access point configuration

Command History

Release
Modification

12.2(8)B

This command was introduced.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the radius attribute suppress qos command to have GGSN suppress the 3GPP VSA 3GPP-GPRS-QoS-Profile in its authentication and accounting requests to a RADIUS server.

Examples

The following example will not send the 3GPP VSA 3GPP-GPRS-QoS-Profile to the RADIUS server:

gprs access-point-list abc
access-point 1
radius attribute suppress qos

Related Commands

Command
Description

access-mode

Specifies whether the GGSN requests user authentication at the access point to a PDN.

aaa-group

Specifies a AAA server group and assigns the type of AAA services to be supported by the server group for a particular access point on the GGSN.

gprs default aaa-group

Specifies a default AAA server group and assigns the type of AAA services to be supported by the server group for all access points on the GGSN.

show gprs access-point

Displays information about access points on the GGSN.


radius attribute suppress sgsn-address

To specify that the GGSN suppress the 3GPP VSA 3GPP-SGSN-Address in its authentication and accounting requests to a RADIUS server, use the radius attribute suppress sgsn-address access point configuration command. To enable the GGSN to send the 3GPP VSA 3GPP-SGSN-Address in authentication and accounting requests to a RADIUS server, use the no form of the command.

radius attribute suppress sgsn-address

no radius attribute suppress sgsn-address

Syntax Description

This command has no arguments or keywords.

Defaults

The default is to send the 3GPP VSA 3GPP-SGSN-Address in authentication and accounting requests to a RADIUS server.

Command Modes

Access point configuration

Command History

Release
Modification

12.2(8)B

This command was introduced.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the radius attribute suppress sgsn-address command to have GGSN suppress the 3GPP VSA 3GPP-SGSN-Address in its authentication and accounting requests to a RADIUS server.

Examples

The following example will not send the 3GPP VSA 3GPP-SGSN-Address to the RADIUS server:

gprs access-point-list abc
access-point 1
radius attribute suppress sgsn-address

Related Commands

Command
Description

access-mode

Specifies whether the GGSN requests user authentication at the access point to a PDN.

aaa-group

Specifies a AAA server group and assigns the type of AAA services to be supported by the server group for a particular access point on the GGSN.

gprs default aaa-group

Specifies a default AAA server group and assigns the type of AAA services to be supported by the server group for all access points on the GGSN.

show gprs access-point

Displays information about access points on the GGSN.


radius attribute user-name msisdn

To specify that the GGSN include the MSISDN in the User-Name (attribute 1) in access requests at an APN, use the radius attribute user-name msisdn access-point configuration command. To disable this configuration, use the no form of this command.

radius attribute user-name msisdn

no radius attribute user-name msisdn

Syntax Description

This command has no arguments or keywords.

Defaults

The default is to send the user name in the attribute 1.

Command Modes

Access point configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into 12.4(9)T.


Usage Guidelines

Use the radius attribute user-name msisdn command to have GGSN send the MSISDN in the User-Name (attribute 1) instead of the user name in authentication and accounting requests to a RADIUS server.

Examples

The following example will send the MSISDN in access requests to the RADIUS server:

gprs access-point-list abc
access-point 1
radius attribute user-name msisdn

Related Commands

Command
Description

access-mode

Specifies whether the GGSN requests user authentication at the access point to a PDN.

aaa-group

Specifies a AAA server group and assigns the type of AAA services to be supported by the server group for a particular access point on the GGSN.

gprs default aaa-group

Specifies a default AAA server group and assigns the type of AAA services to be supported by the server group for all access points on the GGSN.

show gprs access-point

Displays information about access points on the GGSN.


real-address

To configure the IP address of a real Content Services Gateway (CSG) for source checking on inbound messages from a CSG, use the real-address CSG group configuration command. To deconfigure the IP address of a real CSG, use the no form of this command

real-address ip-address

no real-address

Syntax Description

ip-address

IP address of a real CSG.


Defaults

No default behavior or values.

Command Modes

CSG group configuration

Command History

Release
Modification

12.3(14)YQ

This command was introduced.

12.4(9)T

This command was integrated into 12.4(9)T.


Usage Guidelines

Use the real-address CSG group configuration command to configure the IP address of a real CSG.

Configuring the IP address of a real CSG provides an additional security check against the source of messages. When configured, source address checking is performed on inbound message from the CSG.

For redundancy, you can configure up to two real IP addresses of CSGs in a CSG server group.

Using the no form of this command will remove the IP address from the list of IP addresses of a CSG server group.

Examples

The following configuration example configures two real IP addresses in CSG group csg1:

ggsn csg-group csg1
  virtual-address 5.5.5.14
  port 4444
  real-address 5.1.1.1
  real-address 5.1.1.2

Related Commands

Command
Description

ggsn csg-group

Configures a CSG group on the GGSN for quota server-to-CSG communication.

port

Configures the port number on which the CSG listens for quota server traffic.

show ggsn csg

Displays the parameters used by the CSG group or the number of path and quota management messages sent and received by the quota server.

virtual-address

Configures a virtual IP address to which the quota server will send all requests.


redirect all ip

To redirect all traffic to an external device, use the redirect all  ip access-point configuration command. To disable the redirection of all traffic, use the no form of this command.

redirect all ip ip-address

no redirect all ip ip-address

Syntax Description

ip-address

IP address of the external device to which you want to redirect traffic.


Defaults

Disabled

Command Modes

Access-point configuration

Command History

Release
Modification

12.3(2)XB2

This command was introduced.

12.3(8)XU

This command was integrated into Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into 12.4(9)T.


Usage Guidelines

Use the redirect all ip access-point command to redirect all traffic to an external device (such as an external firewall) for verification.

Using the Redirect All Traffic feature, you can:

Redirect all packets to a specified destination regardless of whether the destination address belongs to a mobile station (MS) on the same GGSN or not.

If redirecting traffic using the Mobile-to-Mobile Redirect feature, only packets for which the destination address belongs to an MS that is active on the same GGSN can be redirected. If the receiving MS has no PDP context in the GGSN where the sending MS PDP context is created, the packets are dropped.

Redirect all traffic to a specific destination when aggregate routes are configured.


Note On the Catalyst 6500 series switch / Cisco 7600 series platform, the traffic redirection feature requires that policy based routing (PBR) is configured on the MSFC2 and incoming VLAN interface from the Cisco MWAM, and that the next hop to route the packets is set using the set ip next-hop command.


Examples

The following example redirects all traffic to 5.5.5.13:

redirect all ip 5.5.5.13

Related Commands

Command
Description

security verify

Specifies the verification of source and/or destination addresses.


redirect intermobile ip

To redirect mobile-to-mobile traffic to an external device, use the redirect intermobile  ip access-point configuration command. To disable the redirection of mobile-to-mobile traffic, use the no form of this command.

redirect intermobile ip ip-address

no redirect intermobile ip ip-address

Syntax Description

ip-address

IP address of the external device to which you want to redirect mobile-to-mobile traffic.


Defaults

Disabled

Command Modes

Access-point configuration

Command History

Release
Modification

12.2(8)B

This command was introduced.

12.2(8)YW

This command was integrated into Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was integrated into Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was integrated into Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into 12.4(9)T.


Usage Guidelines

Use the redirect intermobile ip access-point command to redirect mobile-to-mobile traffic to an external device (such as an external firewall) for verification.

Redirection of intermobile traffic does not occur on an ingress APN unless the TPDUs are exiting the same APN. In addition, redirection of TPDUs tunneled by L2TP from the ingress APN to the LNS of the PDN does not occur.

On the Catalyst 6500 series switch / Cisco 7600 series internet router platform, the mobile-to-mobile redirection feature requires that policy based routing (PBR) is configured on the MSFC2 and incoming VLAN interface from the Cisco MWAM, and that the next hop to route the packets that match the criteria is set using the set ip next-hop command.

Examples

The following example redirects mobile-to-mobile traffic to 5.5.5.13:

redirect intermobile ip 5.5.5.13

Related Commands

Command
Description

gprs plmn ip address

Specifies the IP address range of a PLMN.

security verify

Specifies the verification of source and/or destination addresses.


security verify

To enable the GGSN to verify the IP verification of IP addresses in TPDUs, use the security verify access-point configuration command. To disable the verification of IP addresses, use the no form of this command.

security verify {source | destination}

no security verify {source | destination}

Syntax Description

source

Specifies that the source IP address of an upstream TPDU be verified against the address previously assigned an MS.

destination

Specifies that the destination address of upstream TPDU received off a GTP tunnel be verified against the global list of PLMN addresses specified by the gprs plmn ip address global configuration command.


Defaults

Disabled

Command Modes

Access-point configuration

Command History

Release
Modification

12.2(8)B

This command was introduced.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.

12.2(8)YW

This command was incorporated in Cisco IOS Release 12.2(8)YW.

12.3(2)XB

This command was incorporated in Cisco IOS Release 12.3(2)XB.

12.3(8)XU

This command was incorporated in Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was incorporated in Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was incorporated in Cisco IOS Release 12.3(14)YQ.


Usage Guidelines

Use the security verify source access point configuration command to configure the GGSN to verify the source IP address of an upstream TPDU against the address previously assigned to an MS.

When the security verify source command is configured on an APN, the GGSN verifies the source address of a TPDU before GTP will accept and forward it. If the GGSN determines that the address differs from that previously assigned to the MS, it drops the TPDU and accounts it as an illegal packet in its PDP context and APN. Configuring the security verify source access point configuration command protects the GGSN from faked user identities.

Use the security verify destination access point configuration command to have the GGSN verify the destination addresses of upstream TPDUs against global lists of PLMN addresses specified using the gprs plmn ip address command. If the GGSN determines that a destination address of a TPDU is within the range of a list of addresses, it drops the TPDU. If it determines that the TPDU contains a destination address that does not fall within the range of a list, it forwards the TPDU to its final destination.

Examples

The following example enables the verification of source IP addresses received in upstream TPDUs:

security verify source

Related Commands

Command
Description

redirect intermobile ip

Specifies the redirection of mobile-to-mobile traffic.

gprs plmn ip address

Specifies the IP address range of a PLMN.

show gprs access-point

Displays information about access points on the GGSN.


service-aware

To enable service-aware billing for a particular access point, use the service-aware access-point configuration command. To disable the support on an access point, use the no form of this command.

service-aware

no service-aware

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled.

Command Modes

Access-point configuration

Command History

Release
Modification

12.3(14)YQ

This command was introduced.

12.4(9)T

This command was integrated into 12.4(9)T.


Usage Guidelines

Use the service-aware command to enable service-aware billing for a particular access point.

When service-aware billing is enabled for an APN, using the gprs gtp response-message wait-accounting global configuration command, the GGSN must be configured to wait for a RADIUS accounting response before sending a create PDP context response to an SGSN for a create PDP context request.

Examples

The following configuration example enables service-aware billing for access-point 1:

interface virtual-template 1
 gprs access-point-list abc
!
gprs access-point-list abc
 access-point 1
  service-aware

Related Commands

Command
Description

gprs service-aware

Enables service-aware billing on the GGSN.


service gprs ggsn

To configure a router for gateway GPRS support node functions, use the service gprs ggsn command. To disable GGSN functionality, use the no form of this command.

service gprs ggsn

no service gprs ggsn

Syntax Description

This command has no keywords or arguments.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release
Modification

12.1(1)GA

This command was introduced.

12.1(5)T

This command was integrated in Cisco IOS Release 12.1(5)T.

12.2(4)MX

This command was incorporated in Cisco IOS Release 12.2(4)MX, and the sgsn-datacom option was removed.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

Use the service gprs ggsn command to configure the router as a gateway GPRS support node.

Examples

The following example configures the router as a GGSN:

service gprs ggsn

service-mode

To configure the service-mode state of an APN, use the service-mode access-point configuration command. To return to the default value, use the no form of this command.

service-mode {operational | maintenance}

Syntax Description

operational

Specifies that the service-mode state of the APN is operational.

maintenance

Specifies that the service-mode state of the APN is maintenance.


Defaults

Operational

Command Modes

Access-point configuration

Command History

Release
Modification

12.3(8)XU

This command was introduced.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into 12.4(9)T.


Usage Guidelines

Use the service-mode access-point configuration command to perform APN-related tasks (such as adding a new APN or modifying an existing APN) without affecting sessions for other APNs in the GGSN.

When an APN is in maintenance mode, it does not accept Create PDP Context requests. Once active PDP contexts are released (or manually cleared using the clear gprs gtp pdp-context access-point command), all APN-related parameters can be configured or modified and the APN set to operational mode.

Additionally, once you have added and configured an APN, you can verify the configuration using the gprs service-mode test imsi global configuration command to set up a test user (one per GGSN) and performing a PDP context creation.


Note The GGSN must be in operational mode (gprs service-mode operational command) to test a PDP context creation from a test user using the gprs service-mode test imsi command.



Note When the GGSN is in global maintenance mode (gprs service-mode maintenance command), all APNs are in maintenance mode as well.


To delete an APN, change the APN service-mode state to maintenance, wait for all existing PDPs to be released, and then remove the APN using the no access-point-name command.

Examples

The following example changes the service-mode state of an APN to maintenance mode:

service-mode maintenance

Related Commands

Command
Description

gprs service-mode

Configures the service-mode state of a GGSN.

gprs service-mode test imsi

Configures a test user for which you can create PDP contexts to test an APN configuration.

show gprs access-point

Displays information about access points on the GGSN.

show gprs service-mode

Displays the current global service mode state of the GGSN and the last time it was changed.


service-policy

To attach a service policy to an APN, to be used as the service policy for PDP flows of that APN, use the service-policy access-point configuration command. To remove a service policy, use the no form of this command.

service-policy input policy-map-name

no service-policy input policy-map-name

Syntax Description

input

Applies the specified policy map to incoming T-PDUs.

policy-map-name

The name of a service policy map (created using the policy-map command) to be attached. The name can be a maximum of 40 alphanumeric characters.


Defaults

No service policy is attached to an APN.

Command Modes

Access-point configuration

Command History

Release
Modification

12.0(5)T

This command was introduced.

12.3(8)XU

This command was integrated into Cisco IOS Release 12.3(8)XU.

12.3(11)YJ

This command was integrated into Cisco IOS Release 12.3(11)YJ.

12.3(14)YQ

This command was integrated into Cisco IOS Release 12.3(14)YQ.

12.4(9)T

This command was integrated into 12.4(9)T.


Usage Guidelines

Use the service-policy access-point configuration command to attach a policy map to an APN when configuring the Per-PDP policing feature on the GGSN. Before attaching a policy map to an APN, the policy map must be configured using the policy-map command.


Note The Per-PDP policing feature requires that UMTS QoS has been configured.



Note Do not use flow-based policing with multiple DSCP-based classifications if trust DSCP is configured.



Note If you are using trust DSCP policy map configuration, ensure that you configure only one class map with match flow pdp in the policy map. Simultaneous multiple flows for policing, with different DSCPs for a PDP, are not supported.


Service policies cannot be attached to or removed from an APN when there are active PDP contexts on that APN. To modify a service policy, you must first disassociate it from the APN using the no service-policy access point configuration command.


Caution If you remove the global policy map configuration (using the no policy-map global configuration command), service policies associated with APNs will also be removed without any warning.

To configure the Per-PDP policing feature on a GGSN, you must complete the following tasks:

1. Create a class for PDP flows using the class-map command.

GGSN(config)# Class-map class-pdp
GGSN(config-cmap)# Match flow pdp
GGSN(config-cmap)# exit

2. Create a policy map using the policy-map command and assign a class to the map using the class command.

GGSN(config)# Policy-map policy-gprs
GGSN(config-pmap)# Class class-pdp

3. In the policy map, configure the Traffic Policing feature using the police rate policy map class configuration command.

GGSN(config-pmap-c)# police rate pdp [burst bytes] [peak-rate pdp [peak-burst bytes]] conform-action action exceed-action action [violate-action action]
GGSN(config-pmap-c)# exit
GGSN(config-pmap)# exit

4. Attach a service policy to an APN using the service-policy access-point configuration command.

GGSN(config)# Access-point 1
GGSN(access-point-config) Service-policy in policy-gprs

Examples

The following example attaches service policy "policy-gprs" to access-point 1:

access-point 1
 service-policy in policy-gprs

Related Commands

Command
Description

match flow pdp

Specifies PDP flows as the match criterion in a class map.

police rate

Configures traffic policing using the police rate.



session-failover

To enable sessions to failover over to an alternate Diameter server (via Credit Control Session Failover [CCSF] AVP support) when a credit control answer (CCA) message from the DCCA server does not contain a value for the CCSF AVP, use the session-failover DCCA client profile configuration command. To return to the default value, use the no form of this command

session-failover

no session-failover

Syntax Description

This command has no arguments or keywords.

Defaults

Session failover is not supported.

Command Modes

DCCA client profile configuration

Command History

Release
Modification

12.3(14)YQ

This command was introduced.

12.4(9)T

This command was integrated into 12.4(9)T.


Usage Guidelines

Use the session-failover command to configure session failover support locally by enabling the CCSF AVP. The CCSF AVP indicates whether a Diameter session should be failed over to an alternate Diameter server or not.

A value returned by a Diameter server in a CCA overrides the default configured locally.

When session failover is disabled, the Credit Control (CC) session will not be moved to an alternate DCCA server if a failure should occur. If support of the CCSF AVP is enabled, the CC session will be moved to an alternate destination if a failover should occur.

Examples

The following configuration example enables the CCSF AVP in CCRs for a DCCA client:

gprs dcca profile dcca-profile1
  authorization dcca-method
  tx-timeout 12
  ccfh continue
  session-failover

Related Commands 

Command
Description

authorization

Defines a method of authorization (AAA method list), in the DCCA client profile, that specifies the Diameter server groups.

ccfh

Configures the Credit Control Failure Handling (CCFH) AVP locally to use for a credit-control session when the Credit Control Answer (CCA) sent by the DCCA server does not contain CCFH value.

content dcca profile

Defines the DCCA client profile in a GGSN charging profile.

destination-realm

Configures the destination realm to be sent in CCR initial requests to a DCCA server.

gprs dcca profile

Defines a DCCA client profile on the GGSN and enters DCCA client profile configuration mode.

trigger

Specifies that SGSN and QoS changes will trigger a DCCA client to request quota-reauthorization

tx-timeout

Configures a TX timeout value used by the DCCA client to monitor the communication of Credit Control Requests (CCRs) with a Diameter server.


session idle-time

To specify the time that the GGSN waits before purging idle mobile sessions for the current access point, use the session idle-time access-point configuration command. To disable the idle timer at the access point, use the no form of this command.

session idle-time number

no session idle-time number

Syntax Description

number

Number of hours between 1 and 168.


Defaults

No session idle timer is configured on the access point.

Command Modes

Access-point configuration

Command History

Release
Modification

12.2(4)MX

This command was introduced.

12.2(8)YD

This command was incorporated in Cisco IOS Release 12.2(8)YD.

12.2(8)B

This command was incorporated in Cisco IOS Release 12.2(8)B.

12.3(4)T

This command was incorporated in Cisco IOS Release 12.3(4)T.

12.3(8)T

This command was incorporated in Cisco IOS Release 12.3(8)T.


Usage Guidelines

The GGSN implements the idle timer in 3 ways. These implementations are listed in the order in which the GGSN processes them.

Radius server—If the access-point is configured for non-transparent access mode and the Radius server returns a session timeout attribute, then the GGSN uses the session idle timeout value from the Radius server.

Access-point—If the access-point is configured for transparent access mode, or is in non-transparent access mode and the Radius server does not return a session idle timeout value, the GGSN uses the value that you specified for the session idle-time command.

Global timer—If the GGSN does not get a session idle timeout value from the Radius server or the access-point, it uses the value that you specified in the gprs idle-pdp-context purge-timer command.

The session idle-time command value overrides the value configured in the gprs idle-pdp-context purge-timer command for that access-point.

When the session reaches the timeout value, the PDP context is deleted.

Use the show gprs gtp pdp-context tid command to view the session idle-time value. The value is shown in the "gtp pdp idle time" field.

Examples

The following example specifies that the GGSN waits for 5 hours before purging idle time sessions for access-point 1. The GGSN waits for 60 hours before purging idle time sessions for all access points except access-point 1:

gprs access-point-list abc
 access-point 1
  access-point-name gprs.pdn1.com
  session idle-time 5

gprs idle-pdp-context purge-timer 60

Related Commands

Command
Description

gprs idle-pdp-context purge-timer

Specifies the time that the GGSN waits before purging idle mobile sessions.

show gprs gtp pdp-context

Displays a list of the currently active PDP contexts (mobile sessions).



hometocprevnextglossaryfeedbacksearchhelp

Posted: Tue May 15 10:41:22 PDT 2007
All contents are Copyright © 1992--2007 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.