Summary of Contents for Cisco ASR 5000 Series 3G Home NodeB
Page 1
Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide Version 12.1 Last Updated May 31, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883...
Page 2
ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks.
Management System Overview ..................... 32 Bulk Statistics Support ........................33 Threshold Crossing Alerts (TCA) Support ..................34 ANSI T1.276 Compliance ......................35 Features and Functionality - Optional Enhanced Feature Software ............37 Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 4
HNB-GW Service Configuration ......................80 GTP-U Service Configuration ......................81 x.509 Certificate Configuration ......................82 Security Gateway and Crypto map Template Configuration .............. 83 Multiple MSC Selection without Iu-Flex Configuration ............... 84 ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 5
CoA and DM Error-Cause Attribute ..................... 118 Viewing CoA and DM Statistics ....................119 Session Redirection (Hotlining) ......................122 Overview ............................122 License Requirements ......................... 122 Operation ............................122 Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 6
FA Services Configuration to Support IPSec ..................166 Modifying FA service to Support IPSec .................... 166 Verifying the FA Service Configuration with IPSec ................167 HA Service Configuration to Support IPSec ..................168 ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 7
Child SA Rekey Support ........................188 IKEv2 Keep-Alive Messages (Dead Peer Detection) ............... 189 E-UTRAN/EPC Logical Network Interfaces Supporting IPSec Tunnels .......... 189 IPSec Tunnel Termination ........................ 190 Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
About this Guide This document pertains to the features and functionality that run on and/or that are related to the Cisco® ASR 5000 Chassis. This preface includes the following sections: Conventions Used Contacting Customer Support Additional Information Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄...
Required keywords and variables are surrounded by braces. They must be entered as part of the keyword command syntax. variable Optional keywords or variables that may or may not be used are surrounded by brackets. keyword variable ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 11
These variables can be used in conjunction with required or optional keywords or variables. For example: { nonce | timestamp } count number_of_packets size number_of_bytes Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Go to http://www.cisco.com/cisco/web/support/ to submit a service request. A valid Cisco account (username and password) is required to access this site. Please contact your Cisco account representative for additional information. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide...
SNMP MIB Reference Web Element Manager Installation and Administration Guide Product-specific and feature-specific administration guides Release notes that accompany updates and upgrades to StarOS Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03 xiii...
Chapter 1 HNB Gateway in Wireless Network The Cisco® provides 3GPP wireless carriers with a flexible solution that functions as a Home NodeB Gateway (HNB- GW) in HNB Access Network to connect UEs with existing UMTS networks. The Home NodeB Gateway works as a gateway for Home NodeBs (HNBs) to access the core networks. The HNB-GW concentrates connections from a large amount of HNBs through IuH interface and terminates the connection to existing Core Networks (CS or PS) using standard Iu (IuCS or IuPS) interface.
The HNB-GW provides interworking and aggregation of large amount of Femtocell sessions toward standard CN interfaces (IuPS/IuCS). In this approach services and mobility are completely transparent to CN elements (e.g. MSC, xGSN). ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
IuH User-plan Transport Bearer Handling Iu Link Management Functions Important: Some of the features may not be available in this release. Kindly contact your local Cisco representative for more information on supported features. HNB Access Network Elements This section provides the brief description and functionality of various network elements involved in the UMTS Femto access network.
(HMS) Licenses The HNB-GW is a licensed Cisco product. Separate session and feature licenses may be required. Contact your Cisco account representative for detailed information on specific licensing requirements. For information on installing and verifying licenses, refer to the Managing License Keys section of the Software Management Operations chapter in the System Administration Guide.
Product Description ▀ Platform Requirements The HNB-GW service runs on a Cisco® ASR 5x00 chassis running StarOS Rel. 10 or later. The chassis can be configured with a variety of components to meet specific network deployment requirements. For additional information, refer to the Installation Guide for the chassis and/or contact your Cisco account representative.
IuH Interface: This interface is the reference point for the control plane protocol between Home NodeB and HNB-GW. IuH uses SCTP over IPSec IKEv2 tunnel as the transport layer protocol for guaranteed delivery of signaling messages between HNB-GW and Home NodeB. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 21
IKEv2 (Internet Key Exchange v2) and IPsec (IP Security) protocols to authenticate the operator and subscriber and then guarantee the privacy of the data exchanged. One TR-069 interface can be configured per HNB node. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Up to 1,600 accounting, authentication and/or mediation servers are supported per chassis and may be distributed across a maximum of 1,000 nodes. This feature also enables the AAA servers to be distributed across multiple nodes within the same context. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Iu interface towards core network elements could either by IP based or ATM based. To provide ATM based interface support, Cisco HNB-GW provides AAL2 support on system in order to establish a voice bearer with MSC. Access Control List Support Access Control Lists provide a mechanism for controlling (i.e permitting, denying, redirecting, etc.) packets in and out...
Typically, these conditions are temporary (for example, high CPU or memory utilization) and are quickly resolved. However, continuous or large numbers of these conditions within a specific time interval may have an ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
“Emergency”. If UE-registration was due to emergency then RUA-CONNECT must contain “Emergency”. If RUA-CONNECT contains “normal” then HNB-GW rejects it. While rejecting RUA connection or RAB connection the HNB-GW uses following reject cause: RUA - Misc: unspecified Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
HMS and is downloaded to HNB-GW when HNB-REGISTRATION procedure happens. HNB Management Function Support for HNB registration and de-registration in 3G UMTS HNB Access Network accordance with the following standards: ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Ensures geographical redundancy, as a pool can be distributed across sites. Minimizes subscriber impact during service, maintenance, or node additions or replacements. Increases overall capacity via load sharing across the MSCs/SGSNs in a pool. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
These functions enable secure user and device level authentication between the authenticator component of the HNB- GW and a 3GPP HSS/AuC and RADIUS-based AAA interface support. This section describes following features: Authentication and Key Agreement (AKA) ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
HNB-GW for traffic quality management in accordance with following standards: 3GPP TS 25.414 V9.0.0 (2009-12): 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; UTRAN Iu interface data transport and transport signalling (Release 9) Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
IP headers of the traffic such that intermediate IP nodes can provide differentiated QoS treatment to the traffic for an acceptable end-user experience. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
3GPP TS 25.469 V8.1.0 (2009-03): 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; UTRAN Iuh interface Home Node B Application Part (HNBAP) signalling (Release 8) IETF RFC 4960, Stream Control Transmission Protocol, December 2007 Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Can be easily integrated with higher-level network, service, and business layer applications using the Object Management Group's (OMG’s) Interface Definition Language (IDL) The following figure demonstrates these various element management options and how they can be utilized within the wireless carrier network. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
When used in conjunction with the Web Element Manager, the data can be parsed, archived, and graphed. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Typically, these conditions are temporary (i.e high CPU utilization, or packet collisions on a network) and are quickly resolved. However, continuous or large numbers of these error conditions within a specific time interval may be ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Furthermore, the platforms support a variety of authentication methods such as RADIUS and SSH which are dependent on external elements. ANSI T1.276 Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 36
▀ Features and Functionality - Base Software compliance in such cases will be the domain of the external element. ANSI T1.276 guidelines will only be implemented for locally configured operators. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Radius Change of Authorization (CoA) extension. Important: For more information on dynamic RADIUS extensions support, refer CoA, RADIUS, And Session Redirection (Hotlining) in this guide. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
In this mode, the standby packet processing card is made active and the “standby-mode” session manager and AAA manager tasks on the newly activated packet processing card perform session recovery. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
This architecture allows remote clients with Java-enabled web browsers to manage one or more systems via the server component which implements the CORBA interfaces. The server component is fully compatible with the fault-tolerant Sun® Solaris® operating system. The following figure demonstrates various interfaces between the Cisco Web Element Manager and other network components. Figure 4.
This section describes the call flow for HNB provisioning and registration procedure. The following figure and the text that follows describe the message flow for HNB provisioning and registration with HNB-GW procedure. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 41
HNB Location Information: The HNB provides location information via use of one or more of the following mechanisms: detected macro coverage information (e.g. GERAN and/or UMTS cell information) geographical co-ordinates (e.g. via use of GPS, etc) Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
This procedure is applicable for non-CSG UEs or HNBs. The following figure and the text that follows describe the message flow for UE registration procedure of Non-CSG UEs or Non-CSG HNBs: ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 43
1. Upon camping on the HNB, the UE initiates an initial NAS procedure (e.g. LU Procedure) by establishing an RRC connection with the HNB. UE capabilities are reported to the HNB as part of the RRC Connection establishment procedure. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
This procedure is applicable for establishment of IuH and IuPS/IuCS connection between HNB to HNB-GW and HNB- GW to SGSN/MSC in core network. The following figure and the text that follows describe the message flow for an Iu connection establishment procedure. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 45
4. The UE then continue with the authentication and security procedures towards the CN, via HNB and the HNB- 5. The SGSN/MSC performs Direct Transfer procedure with HNB-GW and sends SCCP-DATA-FORM1 REQ to HNB-GW. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
This procedure is applicable for release of IuH and IuPS/IuCS connection between HNB to HNB-GW and HNB-GW to SGSN/MSC in core network. The following figure and the text that follows describe the message flow for an Iu connection release procedure initiated by CN (SGSN/MSC). ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 47
4. On reception of successful RANAP Iu Release Complete command in RUA-DISCONNECT Response message from HNB, the HNB-GW sends RANAP Iu Release Complete command in SCCP-DATA-FORM1 Response message to CN (SGSN/MSC). Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
3. . If the request contains IMSI, HNB-GW finds the list of registered HNBs which have this IMSI in their white- list. If there is no such HNB found, HNB-GW sends Relocation-Request-Reject with appropriate cause. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
HNB-GW Initiated RANAP Reset Procedure This procedure is applicable for HNB-GW-initiated RANAP Reset procedure between HNB, HNB-GW, and SGSN/MSC in core network. The HNB-GW initiates RESET towards CN node in following scenarios: Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 50
If SSN Allowed indication comes after timer expiry, HNB-GW sends RANAP-RESET command message to the CN node. The RANAP-RESET from HNB-GW is sent only if HNB-GW-initiated RANAP-RESET is configured in HNB-GW service. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
3GPP TS 25.469 V9.2.0 (2010-06): 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; UTRAN Iuh interface Home Node B (HNB) Application Part (HNBAP) signalling (Release Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
RFC-1902, Structure of Management Information for Version 2 of the Simple Network Management Protocol (SNMPv2), January 1996 RFC-1903, Textual Conventions for Version 2 of the Simple Network Management Protocol (SNMPv2), January 1996 ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 53
RFC-2572, Message Processing and Dispatching for the Simple Network Management Protocol (SNMP), April 1999 RFC-2573, SNMP Applications, April 1999 RFC-2574, User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3), April 1999 Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
ITU-T Recommendation E.164 - The international public telecommunication numbering plan ITU-T Recommendation E.191 - B-ISDN addressing Object Management Group (OMG) Standards CORBA 2.6 Specification 01-09-35,Object Management Group Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Prior to connecting to the command line interface (CLI) and beginning the system's configuration, there are important things to understand about how the system supports these applications. This chapter provides terminology and background information that must be considered before attempting to configure the system. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Local context: This is the default context on the system used to provide out-of-band management functionality. Logical Interfaces This section describes the logical interface supported on HNB-GW. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 59
RADIUS: This interface is the reference point between a Security Gateway (SeGW) and a 3GPP AAA Server or 3GPP AAA proxy (OCS/CGF/AAA/HSS) over RADIUS protocol for AAA procedures for Femto user. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Radio Network PLMN: The Radio Network PLMN is configured in HNB-GW service is required to associate PLMNs with HNB-GW. The PLMN specific configuration e.g. RNC id and association of CS or PS network shall be configured under this configuration mode. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 61
DNS. Once a UE has established a bearer context with an HNB-GW, the HNBs continue to use the same context as the subscriber anchored to that HNB-GW. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 62
The system determines the configuration used in destination context based on the parameter contained within the information received from HNB and also the configuration in HNB-GW service. The AAA context or AAA configuration in source context uses that context for subscriber authentication. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Access Control List configuration, use of inappropriate port number may result in communication loss. Refer respective feature configuration document carefully before assigning any port number or IP address for communication with internal or external network. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Open or encrypted passwords can be used. administrator password Remote access The type of remote access that will be used to access the system such as telnetd, sshd, and/or ftpd. type(s) ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
A peer server id configuration may contain: Routing context for peer server to use Self point code in SS7 type address Operational Mode Peer Server Process (PSP) instance Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 66
HNB-GW is to be connected to only one MSC with in a CS network or as default MSC for all HNBs connected through specific HNB-CS network instance. Packet Switched Network Configuration ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
17/1 identifies connector number 1 on the card in slot 17. A single physical port can facilitate multiple interfaces. Gateway IP address Used when configuring static IP routes from the management interface(s) to a specific network. Iuh Interface Configuration (To/from Home-NodeB) Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 68
RTP IP address to session manager instances over Iuh towards HNB. It is to be associated with HNB-GW service. Radio Network PLMN Configuration ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Required Destination Context Configuration Information The following table lists the information that is required to configure the destination context. Table 4. Required Information for Destination Context Configuration Required Description Information Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 70
RTP IP address to session amanager instances over IuCS towards CS core networks. It is to be associated with PS network configuration. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Use the following example to create the IPv4 address RTP pool for RTP address allocation over IuCS interface towards CS core network. configure context <dest_ctxt_name> ip pool <cs_ip_pool_name> <ip_address/mask> Notes: Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Each PSC2 card requires 16 RTP pools to be configured. Setting different priorities on individual pools can cause addresses in some pools to be used more frequently. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Configure CS network parameters by applying the example configuration in the HNB-CS Network Configuration section. Step 12 Configure PS network parameters by applying the example configuration in the HNB-PS Network Configuration section. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
If this option is not chosen, system uses IP Source Address, IP Destination Address, IP Protocol and Source Boxer Internal Address as inputs to the hashing algorithm for ECMP-LAG distribution. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Peer Server Id Configuration for PS Core Network Use the following example to configure the Peer Server Id in SS7 routing domain for PS core network on system: configure ss7-routing-domain <ss7rd_id> variant <v_type> ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
SCCP network instance. HNB-PS Network Configuration Use the following example to configure the packet switched network parameters to be associated with HNB-GW service on system: configure ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
> is name of the IP pool configured in destination context named < > to cs_ip_pool_name dest_ctxt_name allocate RTP end point address in this CS network over IuCS interface. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Notes: < > is name of the destination context in which GTP-U service configured to provide GTP-U dest_ctxt_name tunnel over IuPS interface towards core network. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
<ca_root_cert_name> payload <crypto_payload_name> match childsa [match {ipv4 | ipv6}] ip-address-alloc dynamic ipsec transform-setlist <ipsec_trans_set> configure context <vpn_ctxt_name> subscriber default ip context-name <vpn_ctxt_name> ip address pool name <ip_pool_name> ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Use the following example to configure the Open Access Mode for open HNBs in an HNB-GW service instance. It also includes the paging optimization configuration for open HNBs. configure context <vpn_ctxt_name> hnbgw-service <hnbgw_svc_name> -noconfirm ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Verify configuration errors of your HNB-GW services by entering the following command in Exec Mode: show configuration errors section hnbgw-service} The output of this command displays current configuration errors and warning information for the target configuration file as specified for HNB-GW service Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Configuring Linkset Id and ATM Parameters To configure the linkset id and ATM parameters you need to modify existing SS7 Routing domain configuration by applying the following example: ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Associating ALCAP Service with HNB-CS Network Service To associate a pre-configured ALCAP service with HNB-CS Network Service for IuCS-over-ATM function, apply the following example configuration: configure cs-network <cs_network_name> ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 89
< > is name of the ALCAP service configured in destination context named alcap_svc_name < > to provide IuCS over ATM support through this CS network. alcap_ctxt_name Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
HNB-GW node. Important: Offload check is only for the primary point code and NOT for the backup point code. This command can be used for planned maintenance as well. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Flex functionality on HNB-GW node. Important: Offload check is only for the primary point code and NOT for the backup point code. This command can be used for planned maintenance as well. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Refer System Administration Guide for more information on logging facility configuration. Displaying Logging Facility This section shows the logging facility event logs for logging facilities enabled on HNB-GW node. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 93
Verify the logging facilities configured on HNB-GW system node by entering the following command in Exec Mode: show logging [ active | verbose] The output of this command provides the display of event logs for configured logging facilities. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Configuring Service Congestion Policies To create a congestion control policy, apply the following example configuration: configure congestion-control policy hnbgw-service action { drop | none | reject } Notes: ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
[all | name <hnbgw_svc_name>] reject Notes: For HNB-GW service sessions is the default action for all new calls coming on a specific or all HNB- reject GW service instance. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Command Line Interface Reference for more information. For more information on SNMP Traps, refer System SNMP-MIB Reference. Repeat this configuration as needed for additional traps. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
1157 starALCAPPathReset starentTraps 1158 starALCAPBlock starentTraps 1159 starALCAPUnBlock starentTraps 1160 Important: For more information on SNMP trap configuration and supported object ids, refer System SNMP- MIB Reference. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
In addition to the CLI, the system supports the sending of Simple Network Management Protocol (SNMP) traps that indicate status and alarm conditions. Refer to the SNMP MIB Reference Guide for a detailed listing of these traps. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
HNBAP RANAP SCCP ALCAP AAL2 GTP-U View Subscriber Information Display Session Resource Status View session resource status show resources session ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 101
View ALCAP service facility statistics show logs facility alcapmgr View ALCAP Manager facility statistics View HNB-GW Manager facility statistics show logs facility hnb-gw show logs facility hnbmgr View HNB Manager facility statistics Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 102
View HNB-GW service statistics filtered by an HNB id show hnbgw statistics hnbid hnb_identifier View GTP-U Service Statistics show gtpu statistics peer-address ip_address View GTP-U peer information View GTP-U Service information show gtpu statistics gtpu-service gtpu_svc_name ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
(AAL2, ALCAP, HNB, HNB-GW, GTP-U, etc.). Statistics and counters can be cleared using the CLI command. Refer to Command Line Interface Reference for clear detailed information on using this command. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Chapter 5 Troubleshooting the Service This chapter provides information and instructions for using the system command line interface (CLI) for troubleshooting issues that may arise during service operation. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
SGSNs which can be useful troubleshooting and/or monitoring. The test is performed by the system sending GTPv0 echo request messages to the specified SGSN(s) and waiting for a response. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
The IP address of destination node of IPsec tunnel. src_ip_address The IP address of source node of IPsec tunnel. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Configure the number of IPC messages to aggregate before flushing. : Enter the integer 1 (to disable aggregation) or an integer from 2 to 164 to define number_msgs the number of messages. Default is 10. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
This section provides engineering rules or guidelines that must be considered prior to configuring the system for your network deployment. This appendix describes following engineering rules for HNB-GW service: DHCP Service Engineering Rules HNB-GW Engineering Rules Service Engineering Rules Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
The following engineering rule applies to the DHCP Service: Up to 8 DHCP servers may be configured per DHCP service. A maximum of 3 DHCP server can be tried for a call. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
A maximum of 4 PLMN ids can be configured in an HNB-GW service. A maximum of 1 SeGW IP address can be associated with an HNB-GW service. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
PS Network services must be configured within the egress context. Multiple SGSNs (maximum 25) can be configured through IuPS interfaces within the HNB-GW service instance. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
(i.e. resulting from such things as system handoffs). Therefore, it is recommended that a large number of services only be configured if your application absolutely requires it. Please contact your local service representative for more information. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Administration Guide, before using the procedures in this chapter. Important: Not all commands and keywords/variables are available or supported. This depends on the platform type and the installed license(s). Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Commands used in the configuration examples in this section provide base functionality to the extent that the most common or likely commands and/or keyword options are presented. In many cases, ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Framed-IP-Address: The values should exactly match the framed IP address of the session. Calling-station-id: The value should match the Mobile Station ID. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
0 Total acct keepalive timeout 0 Total acct keepalive purged 0 Total aaa acct cancelled 426 Total radius acct requests 0 Current radius acct requests 0 Total radius acct requests retried Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 120
0 Total prepaid online success 0 Current prepaid online failure 0 Total prepaid online retried 0 Total prepaid online cancelled 0 Current prepaid online purged 0 Total aaamgr purged requests ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 121
RADIUS Change of Authorization and Disconnect Message ▀ 0 SGSN: Total db records 0 SGSN: Total sub db records 0 SGSN: Total mm records 0 SGSN: Total pdp records 0 SGSN: Total auth records Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Changing ACL and rulebase together in a single CoA is not supported. For this, two separate CoA requests can be sent through AAA server requesting for one attribute change per request. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
The following command displays debug information for a subscriber with the MSID 0000012345: show subscribers debug-info msid 0000012345 The following is a sample output of this command: username: user1 callid: 01ca11b1 msid: 0000100003 Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 124
IPv4 Reassembly Statistics: Success: 0 In Progress: 0 Failure (timeout): 0 Failure (no buffers): 0 Failure (other reasons): 0 Redirected Session Entries: Allowed: 2000 Current: 0 Added: 0 Deleted: 0 ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 125
Redundancy Status: Original Session Checkpoints Attempts Success Last-Attempt Last-Success Full: 27 26 15700ms 15700ms Micro: 76 76 4200ms 4200ms Current state: SMGR_STATE_CONNECTED FSM Event trace: State Event SMGR_STATE_OPEN SMGR_EVT_NEWCALL SMGR_STATE_NEWCALL_ARRIVED SMGR_EVT_ANSWER_CALL Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 126
Peer callline: Redundancy Status: Original Session Checkpoints Attempts Success Last-Attempt Last-Success Full: 0 0 0ms 0ms Micro: 0 0 0ms 0ms Current state: SMGR_STATE_CONNECTED FSM Event trace: State Event ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 127
Failure (timeout): 0 Failure (no buffers): 0 Failure (other reasons): 0 Redirected Session Entries: Allowed: 2000 Current: 0 Added: 0 Deleted: 0 Revoked for use by different subscriber: 0 Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Administration Guide, before using the procedures in this chapter. Important: The IP Security is a licensed Cisco feature. A separate feature license may be required. Contact your Cisco account representative for detailed information on specific licensing requirements. For information on installing and verifying licenses, refer to the Managing License Keys section of the Software Management Operations chapter in the System Administration Guide.
Page 130
IP Security ▀ Session Redirection (Hotlining) APN Template Configuration to Support L2TP IPSec for LTE/SAE Networks ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
IPSec is supported for the new subscriber sessions. Data for existing Mobile IP sessions is unaffected. L2TP: L2TP-encapsulated packets are routed from the system to an LNS/secure gateway over an IPSec tunnel. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
LAC Service Configuration to Support IPSec Subscriber Attributes for L2TP Application IPSec Support PDSN Service Configuration for L2TP Support Redundant IPSec Tunnel Fail-Over Dead Peer Detection (DPD) Configuration ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 133
RADIUS Attributes for IPSec-based Mobile IP Applications LAC Service Configuration to Support IPSec Redundant IPSec Tunnel Fail-Over Dead Peer Detection (DPD) Configuration TAPN Template Configuration to Support L2TP Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 134
RADIUS Attributes for IPSec-based Mobile IP Applications LAC Service Configuration to Support IPSec Subscriber Attributes for L2TP Application IPSec Support Redundant IPSec Tunnel Fail-Over Dead Peer Detection (DPD) Configuration ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Crypto Maps define the tunnel policies that determine how IPSec is implemented for subscriber data packets. There are three types of crypto maps supported by the system. They are: Manual crypto maps Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
The system determines when to implement IPSec for Mobile IP based on RADIUS attribute values as well as the configurations of the FA and HA service(s). ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Transform Set Configuration section of this chapter. Step 3 Configure one or more ISAKMP policies according to the instructions located in the ISAKMP Policy Configuration section of this chapter. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 139
Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode command . For additional information on how to verify and save configuration files, refer to the save configuration System Administration Guide and the Command Line Interface Reference. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Configuring IPSec Support for Mobile IP How the IPSec-based Mobile IP Configuration Works The following figure and the text that follows describe how Mobile IP sessions using IPSec are processed by the system. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Policy(ies) Crypto Map Service Services Service Destination MIP Dest. Source Ctx. Ctx. Source Ctx. Ctx. Local Ctx. Local Ctx. Table 10. IPSec-based Mobile IP Session Processing Step Description Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 142
3GPP2-S indicating the “S” secret used to generate the HA’s response to the D-H exchange 3GPP2-S-Lifetime indicating the length of time that the “S” secret is valid 3GPP2-Security-Level set to 3 for IPSec tunnels and registration messages (optional) ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Configure an ipsec-isakmp crypto map or the FA system according to the instructions located in the Dynamic Crypto Map Configuration section of this chapter. The crypto map(s) must be configured in the same context as the FA service. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 144
Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode command . For additional information on how to verify and save configuration files, refer to the save configuration System Administration Guide and the Command Line Interface Reference. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Configuring GGSN Support for L2TP Tunneling with IPSec How IPSec is Used for Attribute-based L2TP Configurations The following figure and the text that follows describe how IPSec-encrypted attribute-based L2TP sessions are processed by the system. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 146
L2TP. In addition, attributes specifying a crypto map name and ISAKMP secret are also supplied indicating that IP security is also required. The system determines that the crypto map name supplied matches a configured crypto map. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode command . For additional information on how to verify and save configuration files, refer to the save configuration System Administration Guide and the Command Line Interface Reference. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
The LAC service dictates the peer LNS to use and also specifies the following parameters indicating that IP security is also required: Crypto map name ISAKMP secret The system determines that the crypto map name supplied matches a configured crypto map. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode command . For additional information on how to verify and save configuration files, refer to the save configuration System Administration Guide and the Command Line Interface Reference. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Whether perfect forward secrecy (PFS) should be enabled for the IPSec SA and if so, what group should be used IPSec SA lifetime parameters The name of one or more configured transform set defining the IPSec SA ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode command . For additional information on how to verify and save configuration files, refer to the save configuration System Administration Guide and the Command Line Interface Reference. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
For more information on parameters, refer to the IPSec Transform Configuration Mode Commands chapter in the Command Line Interface Reference. Verifying the Crypto Transform Set Configuration These instructions are used to verify the crypto transform set(s) was/were configured. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 153
This command produces an output similar to that displayed below using the configuration of a transform set named test1. Transform-Set test1 : AH : none ESP :hmac md5-96, 3des-cbc Encaps Mode: TUNNEL Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
> dictates the order in which the ISAKMP policies are proposed when negotiating IKE SAs. priority For more information on parameters, refer to the ISAKMP Configuration Mode Commands chapter in the Command Line Interface Reference. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Refer to the clear crypto security-association command located in the Exec Mode Commands chapter of the Command Line Interface Reference for more information. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
<group_name> { primary | secondary } Notes: < > is the system context in which you wish to create and configure the ISAKMP crypto maps. ctxt_name ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Perfect Forward Secrecy : Group2 Hard Lifetime : 28800 seconds 4608000 kilobytes Number of Transforms: 1 Transform : test1 AH : none ESP: md5 3des-cbc Encaps mode: TUNNEL Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 158
Refer to the clear crypto security-association command located in the Exec Mode Commands chapter of the Command Line Interface Reference for more information. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
For more information on parameters, refer to the Crypto Map Dynamic Configuration Mode Commands chapter in the Command Line Interface Reference. Verifying the Dynamic Crypto Map Configuration These instructions are used to verify the dynamic crypto map configuration. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 160
Refer to the clear crypto security-association command located in the Exec Mode Commands chapter of the Command Line Interface Reference for more information. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
| esp <esp_spi> [ encrypted ] cipher <encryption_key> [ encrypted ] authenticator <auth_key> } Notes: < > is the system context in which you wish to create and configure the manual crypto maps. ctxt_name Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Page 163
Refer to the clear crypto security-association command located in the Exec Mode Commands chapter of the Command Line Interface Reference for more information. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
> is name of the preconfigured ISAKMP or a manual crypto map. map_name Verifying the Interface Configuration with Crypto Map These instructions are used to verify the interface configuration with crypto map. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 165
The interface configuration aspect of the display should look similar to that shown below. In this example an interface named 20/6 was configured with a crypto map called isakmp_map1. interface 20/6 ip address 192.168.4.10 255.255.255.0 crypto-map isakmp_map1 Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
IPSec SAs to all HAs. Note that once an IPSec tunnel is established between the FA and HA for a particular subscriber, all new Mobile IP sessions using the same FA and HA are passed over the ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
{ name service_name | all } The output of this command is a concise listing of FA service parameter settings configured on the system. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
> name of the context through which the HA service accesses the HAAA server to fetch the aaa_ctxt_name IKE S Key and S Lifetime parameters. < > is name of the preconfigured ISAKMP or a manual crypot map. map_name ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
{ name service_name | all } The output of this command is a concise listing of HA service parameter settings configured on the system. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
'S' secret parameter used to make the IKE January 1, 1970 00:00 pre-shared secret. UTC. Note that this is equivalent to the Unix operating system expression of time. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
<aaa_ctxt_name> isakmp peer-fa <fa_address> crypto-map <map_name> [ secret <preshared_secret> ] Notes: < > is the destination context where the LAC service is configured to support IPSec. ctxt_name Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Verify that your LAC service is configured properly with IPSec by entering the following command in Exec Mode in specific context: show lac-service nameservice_name The output of this command is a concise listing of LAC service parameter settings configured on the system. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
D-H secret. It can be tagged, in which case it is exchange to negotiate an IKE treated as part of a tunnel group. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Use the following example to modify an existing PDSN service to support attribute-based L2TP tunneling on your system: configure context <ctxt_name> pdsn-service <pdsn_svc_name> ppp tunnel-context <lac_ctxt_name> Notes: < > is the destination context where the PDSN service is configured. ctxt_name ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Verify that your PDSN service is configured properly with L2TP by entering the following command in Exec Mode in specific context: show pdsn-service name service_name The output of this command is a concise listing of PDSN service parameter settings configured on the system. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Support for the following standards and requests for comments (RFCs) has been added with the Redundant IPSec Tunnel Fail-over functionality: RFC 3706, A Traffic-Based Method of Detecting Dead Internet Key Exchange (IKE) Peers, February 2004 ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Use the following example to configure a crypto group on your system for redundant IPSec tunnel fail-over support: configure context <ctxt_name> ikev1 keepalive dpd interval <dur> timeout <dur> num-retry <retries> Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
> is name of the preconfigured ISAKMP crypto map to match with crypto group as secondary. map_name2 Verifying the Crypto Group Configuration These instructions are used to verify the crypto group configuration. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 179
[ summary | name group_name ] The output of this command is a concise listing of crypto group parameter settings configured on the system. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
<ctxt_name> ikev1 keepalive dpd interval <dur> timeout <dur> num-retry <retries> Notes: < > is the destination context where the Crypto Group is to be configured. ctxt_name ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Mode in specific context: sshow crypto group [ summary | name group_name ] The output of this command is a concise listing of crypto group parameter settings configured on the system. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
> is the local IP address of the GGSN in which this APN template is configured. agw_ip_address < > is the preconfigured crypto map (ISAKMP or manual) which is to use for L2TP. map_name ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Verify that your APN is configured properly with L2TP by entering the following command in Exec Mode in specific context: show apn { all | name apn_name } The output of this command is a concise listing of FA service parameter settings configured on the system. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
▀ IPSec for LTE/SAE Networks IPSec for LTE/SAE Networks The Cisco MME (Mobility Management Entity), S-GW (Serving Gateway), and P-GW (Packet Data Network Gateway) support IPSec and IKEv2 encryption using IPv4 and IPv6 addressing in LTE/SAE (Long Term Evolution/System Architecture Evolution) networks. IPSec and IKEv2 encryption enables network domain security for all IP packet- switched networks, providing confidentiality, integrity, authentication, and anti-replay protection via secure IPSec tunnels.
Database (SPD), the subsystem must protect the packet via IPSec tunneling. Traffic selectors enable an IPSec subsystem to accomplish this by allowing two endpoints to share information from their SPDs. Traffic selector payloads contain Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
CA certificates can be bound to one crypto template. For configuration instructions for X.509 certificate-based peer authentication, see the configuration chapter in the administration guides for the MME, S-GW, and P-GW. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
Page 187
CA certificate that is in the trust chain of the peer certificate. At this point in the negotiation, the IKE_SA_INIT exchange is complete and all but the headers of all the messages that follow are encrypted and integrity-protected. Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide ▄ OL-25069-03...
Child SA are processed by the IPSec node and not dropped. Child SA rekeying is disabled by default, and rekey requests are ignored. This feature gets enabled in the Crypto Configuration Payload Mode of the system’s CLI. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...
E-UTRAN Handover Handling: Any IPSec tunnel that becomes unusable due to an E-UTRAN network handover gets terminated, while the network node to which the session is handed initiates a new IPSec tunnel for the session. ▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide OL-25069-03...