ECS Administration Guide, StarOS Release 17 Last Updated December 19, 2014 Amer
ECS Administration Guide, StarOS Release 17 Last Updated December 19, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. ECS Administration Guide, StarOS Release 17 © 2014 Cisco Systems, Inc. All rights reserved. ECS Administration Guide, StarOS Release 17 ▄ iii CONTENTS About this Guide ............................................................................................... vii Conventions Used .................................................................................................................................. viii Supported Documents and Resources ....................................................................................................ix Related Common Documentation ....................................................................................................... ix Related Product Documentation ..................................................................................................... ix Obtaining Documentation ................................................................................................................ x Contacting Customer Support ..................................................................................................................xi Enhanced Charging Service Overview ........................................................... 13 Introduction ............................................................................................................................................. 14 Qualified Platforms ............................................................................................................................. 14 License Requirements........................................................................................................................ 14 Basic Features and Functionality ........................................................................................................... 15 Shallow Packet Inspection ................................................................................................................. 15 Deep Packet Inspection ..................................................................................................................... 15 Charging Subsystem .......................................................................................................................... 15 Traffic Analyzers ............................................................................................................................ 15 How ECS Works ............................................................................................................................ 16 ECS Deployment and Architecture ......................................................................................................... 30 Enhanced Features and Functionality .................................................................................................... 32 Session Control in ECS ...................................................................................................................... 32 Service Group QoS Feature ............................................................................................................... 32 Configuration Overview .................................................................................................................. 34 Support for Service-based QoS ..................................................................................................... 35 Hierarchical Enforcement of QoS Parameters............................................................................... 36 Reporting Statistics and Usage to PCRF ....................................................................................... 37 Time and Flow-based Bearer Charging in ECS ................................................................................. 37 Content Filtering Support ................................................................................................................... 38 Content Filtering Server Group Support ........................................................................................ 39 In-line Content Filtering Support .................................................................................................... 39 DNS Snooping .................................................................................................................................... 39 License Requirements ................................................................................................................... 40 Bulkstatistics Support ..................................................................................................................... 40 How it Works .................................................................................................................................. 40 Limitations and Dependencies ....................................................................................................... 44 IP Readdressing ................................................................................................................................. 44 URL-based Re-addressing ................................................................................................................. 45 Next-hop Address Configuration ........................................................................................................ 47 RADIUS Based Dual Factor Authentication For Mobile Private Network .......................................... 47 Post Processing ................................................................................................................................. 48 How the Post-processing Feature Works ...................................................................................... 48 Tethering Detection ............................................................................................................................ 49 License Requirements ................................................................................................................... 49 MUR/MURAL Support for Tethering Detection .............................................................................. 49 Tethering Detection Databases ..................................................................................................... 49 Loading and Upgrading Tethering Detection Databases ............................................................... 50 ▀ Contents ▄ ECS Administration Guide, StarOS Release 17 iv Session Recovery Support............................................................................................................. 50 Time-of-Day Activation/Deactivation of Rules .................................................................................... 50 How the Time-of-Day Activation/Deactivation of Rules Feature Works ........................................ 50 Transactional Rule Matching .............................................................................................................. 51 Fastpath ......................................................................................................................................... 51 Bulkstatistics Support ..................................................................................................................... 54 Limitations and Dependencies ....................................................................................................... 54 Flow Aware Packet Acceleration (FAPA) ........................................................................................... 55 Support for WebSocket Protocol Identification ................................................................................... 56 How it Works .................................................................................................................................. 56 URL Filtering ....................................................................................................................................... 56 Implementation of AES Encryption ..................................................................................................... 57 TCP Proxy .......................................................................................................................................... 58 Flow Admission Control ................................................................................................................. 59 TCP Proxy Behavior and Limitations ............................................................................................. 59 Dynamic Disabling of TCP Proxy ................................................................................................... 62 X-Header Insertion and Encryption .................................................................................................... 63 License Requirements ................................................................................................................... 63 X-Header Insertion ......................................................................................................................... 63 X-Header Encryption ...................................................................................................................... 64 Limitations to the Header Insertion and Encryption Features ........................................................ 65 Supported X-Headers .................................................................................................................... 66 X-Header Enrichment Anti Spoofing .............................................................................................. 67 RAN Bandwidth Optimization ............................................................................................................. 68 Selective TFT Suppression for Default Bearer ................................................................................... 68 Override Control ................................................................................................................................. 68 Accounting and Charging Interfaces ...................................................................................................... 70 GTPP Accounting ............................................................................................................................... 70 RADIUS Accounting and Credit Control ............................................................................................. 70 Diameter Accounting and Credit Control ............................................................................................ 71 Gx Interface Support ...................................................................................................................... 71 Gy Interface Support ...................................................................................................................... 71 Event Detail Records (EDRs)......................................................................................................... 72 Usage Detail Records (UDRs) ....................................................................................................... 74 Charging Methods and Interfaces ...................................................................................................... 74 Prepaid Credit Control .................................................................................................................... 74 Postpaid ......................................................................................................................................... 74 Prepaid Billing in ECS ........................................................................................................................ 75 How ECS Prepaid Billing Works .................................................................................................... 75 Credit Control Application (CCA) in ECS ........................................................................................... 76 How Credit Control Application (CCA) Works for Prepaid Billing .................................................. 76 Postpaid Billing in ECS ....................................................................................................................... 77 How ECS Postpaid Billing Works ................................................................................................... 78 External Storage System ........................................................................................................................ 81 System Resource Allocation ................................................................................................................... 82 Redundancy Support in ECS .................................................................................................................. 83 Intra-chassis Session Recovery Interoperability ................................................................................ 83 Recovery from Task Failure ........................................................................................................... 83 Recovery from CPU or Packet Processing Card Failure ............................................................... 83 Inter-chassis Session Recovery Interoperability ................................................................................ 83 Inter-chassis Session Recovery Architecture ................................................................................ 84 Session Recovery Improvements .................................................................................................. 84 Impact on xDR File Naming ............................................................................................................... 84 Impact on xDR File Content ............................................................................................................... 85 Contents ▀ ECS Administration Guide, StarOS Release 17 ▄ v Enhanced Charging Service Configuration ................................................... 87 Initial Configuration ................................................................................................................................. 88 Creating the ECS Administrative User Account ................................................................................. 88 Installing the ECS License ................................................................................................................. 89 Enabling Enhanced Charging Service ............................................................................................... 89 Configuring the Enhanced Charging Service ......................................................................................... 90 Creating the Enhanced Charging Service .......................................................................................... 90 Configuring Rule Definitions ............................................................................................................... 91 Verifying your Configuration........................................................................................................... 91 Configuring Group of Ruledefs ........................................................................................................... 91 Verifying your Configuration........................................................................................................... 92 Configuring Charging Actions ............................................................................................................ 92 Verifying your Configuration........................................................................................................... 92 Configuring IP Readdressing ......................................................................................................... 92 Configuring Next Hop Address ...................................................................................................... 93 Configuring Rulebase ......................................................................................................................... 93 Verifying your Configuration........................................................................................................... 94 Configuring Rulebase Lists ................................................................................................................ 94 Configuring a Rulebase List in an APN ......................................................................................... 94 Verifying your configuration ........................................................................................................... 95 Setting EDR Formats ......................................................................................................................... 95 Verifying your Configuration........................................................................................................... 96 Setting UDR Formats ......................................................................................................................... 96 Verifying your Configuration........................................................................................................... 96 Enabling Charging Record Retrieval .................................................................................................. 96 Optional Configurations ...................................................................................................................... 97 Configuring a Rulebase for a Subscriber ....................................................................................... 97 Configuring a Rulebase within an APN .......................................................................................... 98 Configuring Charging Rule Optimization ....................................................................................... 98 Configuring Enhanced Features ............................................................................................................. 99 Configuring Prepaid Credit Control Application (CCA) ...................................................................... 99 Configuring Prepaid CCA for Diameter or RADIUS ..................................................................... 100 Configuring Diameter Prepaid Credit Control Application (DCCA) .............................................. 102 Configuring RADIUS Prepaid Credit Control Application ............................................................ 105 Configuring Redirection of Subscriber Traffic to ECS ...................................................................... 106 Creating an ECS ACL .................................................................................................................. 106 Applying an ACL to an Individual Subscriber............................................................................... 107 Applying an ACL to the Subscriber Named default ..................................................................... 107 Applying the ACL to an APN ........................................................................................................ 107 Configuring GTPP Accounting ......................................................................................................... 108 Configuring DNS Snooping Feature ................................................................................................. 108 Configuring EDR/UDR Parameters .................................................................................................. 108 Verifying your Configurations ....................................................................................................... 109 Pushing EDR/UDR Files Manually .............................................................................................. 109 Retrieving EDR and UDR Files .................................................................................................... 110 Configuring RADIUS Analyzer ......................................................................................................... 110 Sample Radius Analyzer Configuration ....................................................................................... 111 Sample Dual Factor Authentication Configuration ....................................................................... 111 Configuring Post Processing Feature .............................................................................................. 112 Configuring Service Group QoS Feature ......................................................................................... 112 Configuring TCP Proxy..................................................................................................................... 113 Configuring Flow Admission Control ............................................................................................ 113 Verifying your Configuration......................................................................................................... 114 Configuring Tethering Detection Feature ......................................................................................... 114 ▀ Contents ▄ ECS Administration Guide, StarOS Release 17 vi Upgrading Tethering Detection Databases .................................................................................. 115 Sample Tethering Detection Feature Configurations ................................................................... 115 Configuring Time-of-Day Activation/Deactivation of Rules Feature ................................................. 120 Verifying your Configuration ......................................................................................................... 121 Configuring Transactional Rule Matching Feature ........................................................................... 121 Configuring Flow Aware Packet Acceleration Feature ..................................................................... 121 Configuring Retransmissions Under Rulebase or Service Level CLI ............................................... 122 Configuring Websockets................................................................................................................... 122 Configuring URL Filtering Feature .................................................................................................... 122 Verifying your Configuration ......................................................................................................... 123 Configuring URL-based Re-addressing ........................................................................................... 124 Configuring Override Control Feature .............................................................................................. 124 Verifying your Configuration ......................................................................................................... 125 Configuring AES Encryption ............................................................................................................. 125 Configuring X-Header Insertion and Encryption Feature ................................................................. 125 Configuring X-Header Insertion.................................................................................................... 125 Configuring X-Header Encryption ................................................................................................ 127 ECS Administration Guide, StarOS Release 17 ▄ vii About this Guide This preface describes the Enhanced Charging Services Administration Guide, how it is organized and its document conventions. Enhanced Charging Services (ECS) is a StarOS™ in-line service application that runs on Cisco® ASR 5x00 and virtualized platforms. About this Guide ▀ Conventions Used ▄ ECS Administration Guide, StarOS uploads/s1/ ecs-administration-guide.pdf
Documents similaires










-
32
-
0
-
0
Licence et utilisation
Gratuit pour un usage personnel Attribution requise- Détails
- Publié le Jan 27, 2022
- Catégorie Administration
- Langue French
- Taille du fichier 2.1488MB