Diameter User Guide
Diameter User Guide
Diameter User Guide
August 2016
Oracle Communications Diameter Signaling Router Diameter User's Guide
Copyright © 2011, 2016, Oracle and/or its affiliates. All rights reserved.
This software and related documentation are provided under a license agreement containing restrictions
on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your
license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license,
transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse
engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is
prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free.
If you find any errors, please report them to us in writing.
If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it
on behalf of the U.S. Government, then the following notice is applicable:
U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software,
any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users
are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and
agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation
of the programs, including any operating system, integrated software, any programs installed on the
hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the
programs. No other rights are granted to the U.S. Government.
This software or hardware is developed for general use in a variety of information management applications.
It is not developed or intended for use in any inherently dangerous applications, including applications
that may create a risk of personal injury. If you use this software or hardware in dangerous applications,
then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to
ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by
use of this software or hardware in dangerous applications.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks
of their respective owners.
Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks
are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD,
Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced
Micro Devices. UNIX is a registered trademark of The Open Group.
This software or hardware and documentation may provide access to or information about content, products,
and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly
disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise
set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not
be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content,
products, or services, except as set forth in an applicable agreement between you and Oracle.
Table of Contents
Chapter 8: Mediation.................................................................................319
Table 1: Admonishments................................................................................................................................21
Table 36: Diameter Pending Answer Timer and Transaction Lifetime Selection.................................221
Table 93: Portion of the Answer Message Included as Data Value of the MsgCopyAnswer
AVP.............................................................................................................................................................411
1
Introducing Diameter
Content Organization
This content is organized as follows:
• Introducing Diameter contains general information about the Diameter and Mediation help
documentation, the organization of this manual, and how to get technical assistance.
• User Interface Introduction describes the organization and usage of the user interface. In it you can
find information about how the interface options are organized, how to use widgets and buttons,
and how filtering and other page display options work.
• Configuring Diameter provides information about configuring Diameter resources.
• Diameter Maintenance provides information about how to view the status of Diameter resources,
and how to enable and disable connections and applications.
• Diameter Reports provides information about how to produce Diagnostic Tool reports and MP
Statistics (SCTP) reports.
• Troubleshooting with IDIH provides summary information about the Integrated Diameter Intelligence
(IDIH) feature. See Integrated DIH User's Guide for more information.
• Diameter AVP Dictionary provides information about Attribute-Value Pairs (AVPs) that are used
by the Diameter Routing Function in making decisions for routing messages to and from applications
and for the Diameter Message Copy feature.
• Mediation provides information about working with the Mediation feature.
• Diameter Shared Traffic Throttle Groups provides information about all Traffic Throttle Groups (TTGs)
defined as shared across the diameter routing network.
• Diameter Topology Hiding describes the components that can be configured for Diameter Topology
Hiding.
• Diameter Egress Throttle List describes the components can be configured for Egress Throttle List
from the NOAM.
• Diameter RADIUS provides information about working with the RADIUS feature.
• Diameter Message Copy describes the Diameter Message Copy feature, which is used to send a copy
of a message to a DAS.
• Diameter Capacity and Congestion Controls contains information about the various ways capacity
and congestion can be managed to preserve the availability and Quality of Service (QoS).
Documentation Admonishments
Admonishments are icons and text throughout this manual that alert the reader to assure personal
safety, to minimize possible service interruptions, and to warn of the potential for equipment damage.
Table 1: Admonishments
Icon Description
Danger:
(This icon and text indicate the possibility of
personal injury.)
Warning:
(This icon and text indicate the possibility of
equipment damage.)
Caution:
(This icon and text indicate the possibility of
service interruption.)
Topple:
(This icon and text indicate the possibility of
personal injury and equipment damage.)
Related Publications
For information about additional publications that are related to this document, refer to the Related
Publications Reference document, which is published as a separate document on the Oracle Help Center
site. See Locate Product Documentation on the Oracle Help Center Site for more information.
Customer Training
Oracle University offers training for service providers and enterprises. Visit our web site to view, and
register for, Oracle Communications training:
http://education.oracle.com/communication
To obtain contact phone numbers for countries or regions, visit the Oracle University Education web
site:
www.oracle.com/education/contacts
Call the CAS main number at 1-800-223-1711 (toll-free in the US), or call the Oracle Support hotline
for your local country from the list at http://www.oracle.com/us/support/contact/index.html. When calling,
make the selections in the sequence shown below on the Support telephone menu:
1. Select 2 for New Service Request
2. Select 3 for Hardware, Networking and Solaris Operating System Support
3. Select one of the following options:
• For Technical issues such as creating a new Service Request (SR), Select 1
• For Non-technical issues such as registration or assistance with MOS, Select 2
You will be connected to a live agent who can assist you with MOS registration and opening a support
ticket.
MOS is available 24 hours a day, 7 days a week, 365 days a year.
Emergency Response
In the event of a critical service situation, emergency response is offered by the Customer Access
Support (CAS) main number at 1-800-223-1711 (toll-free in the US), or by calling the Oracle Support
hotline for your local country from the list at http://www.oracle.com/us/support/contact/index.html. The
emergency response provides immediate coverage, automatic escalation, and other features to ensure
that the critical situation is resolved as rapidly as possible.
A critical situation is defined as a problem with the installed equipment that severely affects service,
traffic, or maintenance capabilities, and requires immediate corrective action. Critical situations affect
service and/or system operation resulting in one or several of these situations:
• A total system failure that results in loss of all transaction processing capability
• Significant reduction in system capacity or traffic handling capability
• Loss of the system’s ability to perform automatic system reconfiguration
• Inability to restart a processor or the system
• Corruption of system databases that requires service affecting corrective actions
• Loss of access for maintenance or recovery operations
• Loss of the system ability to provide any required critical or major trouble notification
Any other problem severely affecting service, capacity/traffic, billing, and maintenance capabilities
may be defined as critical by prior discussion and agreement with Oracle.
2
User Interface Introduction
Main Menu Left side of screen, A tree-structured menu of all operations that can be
under banners performed through the user interface. The plus character
(+) indicates a menu item contains subfolders.
• To display submenu items, click the plus character, the
folder, or anywhere on the same line.
• To select a menu item that does not have submenu
items, click on the menu item text or its associated
symbol.
Work Area Right side of panel Consists of three sections: Page Title Area, Page Control
under status Area (optional), and Page Area.
• Page Title Area: Occupies the top of the work area. It
displays the title of the current page being displayed,
date and time, and includes a link to context-sensitive
help.
• Page Control Area: Located below the Page Title Area,
this area shows controls for the Page Area (this area is
optional). When available as an option, filter controls
display in this area. The Page Control Area contains the
optional layout element toolbar, which displays different
elements depending on which GUI page is selected. For
more information, see Optional Layout Element Toolbar.
• Page Area: Occupies the bottom of the work area. This
area is used for all types of operations. It displays all
options, status, data, file, and query screens. Information
Security Log Allows the user to view, export, and generate reports from security log
history.
Status & Manage Allows the user to monitor the individual and collective status of Network
Elements, Servers, HA functions, Databases, KPIs, system Processes, and
Tasks. The user can perform actions required for server maintenance,
database management, data, and ISO file management.
Measurements Allows the user to view and export measurement data.
Transport Manager On the SOAM, allows the user to configure adjacent nodes, configuration
(optional) sets, or transports. A maintenance option allows the user to perform enable,
disable, and block actions on the transport entries.
Communication Agent Allows the user to configure Remote Servers, Connection Groups, and
(optional) Routed Services. The user can perform actions to enable, disable, and block
connections. Also allows the user to monitor the status of Connections,
Routed Services, and HA Services.
SS7/Sigtran (optional) On the SOAM, allows the user to configure various users, groups, remote
signaling points, links, and other items associated with SS7/Sigtran; perform
maintenance and troubleshooting activities; and provides a command line
interface for bulk loading SS7 configuration data.
Diameter Common Allows the user to view or configure:
(optional)
• Dashboard, configure on the NOAM; view on both OAMs
• Network Identifiers on the SOAM - MCC Ranges
• Network Identifiers on the NOAM - MCCMNC and MCCMNC Mapping
• MPs (on the SOAM) - editable Profile parameters and Profile
Assignments
The DSR Bulk Import and Export functions are available on both OAMs
for the data configured on that OAM.
Diameter (optional) Allows the user to configure, modify, and monitor Diameter routing:
• On the NOAMP, Diameter Topology Hiding and Egress Throttle List
configuration
RBAR (Range-Based Allows the user to configure the following Range-Based Address Resolution
Address Resolution) (RBAR) settings:
(optional)
• Applications
• Exceptions
• Destinations
• Address Tables
• Addresses
• Address Resolutions
• System Options
This is accessible from the SOAM only.
FABR (Full Address Allows the user to configure the following Full Address Based Resolution
Based Resolution) (FABR) settings:
(optional)
• Applications
• Exceptions
• Default Destinations
• Address Resolutions
• System Options
This is accessible from the SOAM only.
Policy and Charging On the NOAMP, allows the user to perform configuration tasks, edit options,
(optional) and view elements for:
• General Options
• Access Point Names
• Policy DRA
• PCRF Pools
• PCRF Sub-Pool Selection Rules
• Network-Wide Options
• Online Charging DRA
• OCS Session State
• Realms
• Network-Wide Options
• Alarm Settings
• Congestion Options
Additionally on the NOAMP, users are allowed to perform maintenance
tasks, edit options, and view elements for:
• Maintenance
• SBR Database Status
On the SOAM, allows the user to perform configuration tasks, edit options,
and view elements for:
• General Options
• Access Point Names
• Policy DRA
• PCRFs
• Binding Key Priority
• PCRF Pools
• PCRF Pool to PRT Mapping
• PCRF Sub-Pool Selection Rules
• Policy Clients
• Suspect Binding Removal Rules
• Site Options
• Online Charging DRA
• OCSs
• CTFs
• OCS Session State
• Realms
• Error Codes
• Alarm Settings
• Congestion Options
Gateway Location On the SOAM, allows the user to perform configuration tasks, edit options,
Application (optional) and view elements for:
• Exceptions
• Options
GLA can deploy with Policy DRA (in the same DA-MP or a separate
DA-MP).
IPFE (optional) Allows the user to configure IP Front End (IPFE) options and IP List TSAs.
This is accessible from the SOAM server only.
MAP-Diameter On the SOAM, allows the user to perform configuration tasks, edit options,
Interworking (optional) and view elements for the DM-IWF DSR Application:
• DM-IWF Options
• Diameter Exception
On the NOAMP, allows the user to perform configuration tasks, edit options,
and view elements for the MD-IWF SS7 Application:
RADIUS (optional) Allows the user to perform configuration tasks, edit system options, and
view elements for:
• Network Options
• Message Authenticator Configuration Sets
• Shared Secret Configuration Sets
• Ingress Status Server Configuration Sets
• Message Conversion Configuration Sets
• NAS Node
SBR (optional) Allows the user to perform configuration tasks, edit system options, and
view elements for:
• SBR Databases
• SBR Database Resizing Plans
• SBR Data Migration Plans
Additionally, on the NOAMP, users are allowed to perform maintenance
tasks, edit options, and view elements for:
• Maintenance
• SBR Database Status
• SBR Status
• SBR Database Reconfiguration Status
permissions. For more information about user permissions, see Group Administration in the OAM
section of the online help, or contact your system administrator.
Supported Browsers
This application supports the use of Microsoft® Internet Explorer 8.0, 9.0, or 10.0.
The next time you log in to the user interface, the login message text displays.
After the certificates have been configured, you can log into the DSR GUI on any NOAM or SOAM,
and then access the DSR GUI on other servers (NOAM or other SOAMs) without having to re-enter
your login credentials.
1. In the browser URL field, enter the fully qualified hostname of the NOAM server, for example
https://dsr-no.yourcompany.com.
When using Single Sign-On, you cannot use the IP address of the server.
2. When prompted by the browser, confirm that the server can be trusted.
The System Login page appears.
3. Enter the Username and Password for your account.
The DSR GUI for the NOAM appears.
4. To access the DSR GUI for the SOAM, open another browser window and enter the fully qualified
hostname of the SOAM.
The DSR GUI for the SOAM appears
You can toggle between the DSR GUI on the NOAM and the DSR GUI on the SOAM as you perform
configuration tasks.
Tables
Paginated tables describe the total number of records being displayed at the beginning and end of the
table. They provide optional pagination with First|Prev|Next|Last links at both the beginning and
end of this table type. Paginated tables also contain action links on the beginning and end of each row.
For more information on action links and other page controls, see Page Controls.
Scrollable tables display all of the records on a single page. The scroll bar, located on the right side of
the table, allows you to view all records in the table. Scrollable tables also provide action buttons that
operate on selected rows. For more information on buttons and other page controls, see Page Controls.
Note: Multiple rows can be selected in a scrollable table. Add rows one at a time using CTRL-click.
Add a span of rows using SHIFT-click.
Forms
Forms are pages on which data can be entered. Forms are typically used for configuration. Forms
contain fields and may also contain a combination of pulldown lists, buttons, and links.
Tabbed pages
Tabbed pages provide collections of data in selectable tabs. Click on a tab to see the relevant data on
that tab. Tabbed pages also group Retrieve, Add, Update, and Delete options on one page. Click on
the relevant tab for the task you want to perform and the appropriate fields populate on the page.
Retrieve is always the default for tabbed pages.
Reports
Reports provide a formatted display of information. Reports are generated from data tables by clicking
Report. Reports can be viewed directly on the user interface, or they can be printed. Reports can also
be saved to a text file.
Page Controls
User interface pages contain controls, such as buttons and links, that perform specified functions. The
functions are described by the text of the links and buttons.
Note: Disabled buttons are grayed out. Buttons that are irrelevant to the selection or current system
state, or which represent unauthorized actions as defined in Group Administration, are disabled. For
example, Delete is disabled for users without Global Data Delete permission. Buttons are also disabled
if, for example, multiple servers are selected for an action that can only be performed on a single server
at a time.
Table 5: Example Action Buttons contains examples of Action buttons.
The toolbar displays different elements depending on which GUI page is selected. The elements of
the toolbar that can appear include:
• Filter – Allows you to filter data in a table.
• Errors – Displays errors associated with the work area.
• Info – Displays information messages associated with the work area.
• Status – Displays short status updates associated with the main work area.
Notifications
Some messages require immediate attention, such as errors and status items. When new errors occur,
the Errors element opens automatically with information about the error. Similarly, when new status
items are added, the Status element opens. If you close an automatically opened element, the element
stays closed until a new, unacknowledged item is added.
Note: Viewing and closing an error does not clear the Errors element. If you reopen the Errors element,
previously viewed errors are still in the list.
When new messages are added to Warning or Info, the styling of the element changes to indicate new
messages are available. The styling of the Task element changes when a task changes state (such as,
a task begins or ends).
Filters
Filters are part of the optional layout element toolbar and appear throughout the GUI in the Page
Control Area. For more information about optional layout element toolbar functionality, see Optional
Layout Element Toolbar.
Filters allow you to limit the data presented in a table and can specify multiple filter criteria. By default,
table rows appear unfiltered. Three types of filters are supported, however, not all filtering options
are available on every page. The types of filters supported include:
• Network Element – When enabled, the Network Element filter limits the data viewed to a single
Network Element.
Note: Once enabled, the Network Element filter affect all pages that list or display data relating
to the Network Element.
• Collection Interval – When enabled, the collection interval filter limits the data to entries collected
in a specified time range.
• Display Filter – The display filter limits the data viewed to data matching the specified criteria.
Once a field is selected, it cannot be selected again. All specified criteria must be met in order for a
row to be displayed.
The style or format of filters may vary depending on which GUI pages the filters are displayed.
Regardless of appearance, filters of the same type function the same.
Operator Description
= Displays an exact match.
!= Displays all records that do not match the specified filter parameter value.
> Displays all records with a parameter value that is greater than the specified value.
>= Displays all records with a parameter value that is greater than or equal to the specified
value.
< Displays all records with a parameter value that is less than the specified value.
<= Displays all records with a parameter value that is less than or equal to the specified
value.
Like Enables you to use an asterisk (*) as a wildcard as part of the filter parameter value.
Is Null Displays all records that have a value of Is Null in the specified field.
Note: Not all filterable fields support all operators. Only the supported operators are available for
you to select.
enabled, the global Network Element filter affects all sub-screens that display data related to Network
Elements. This filtering option may not be available on all pages.
1. Click Filter in the optional layout element toolbar.
The filter tool appears.
2. Select a Network Element from the Network Element pulldown menu.
3. Click Go to filter on the selection, or click Reset to clear the selection.
Records are displayed according to the specified criteria.
Pause Updates
Some pages refresh automatically. Updates to these pages can be paused by selecting the Pause updates
checkbox. Uncheck the Pause updates checkbox to resume automatic updates. The Pause updates
checkbox is available only on some pages.
3. Click OK or Apply.
OK saves the change and returns to the previous page.
Apply saves the change and remains on the same page.
3
Configuring Diameter
The Diameter Topology Hiding components are configured in the following order on the NOAM:
1. Trusted Network Lists, which are used in the Protected Networks configuration
2. One or more Configuration Sets, for each Topology Hiding Type that will be used:
• Path Topology Hiding Configuration Sets
• S6a/S6d Topology Hiding Configuration Sets
• MME/SGSN Topology Hiding Configuration Sets
• S9 PCRF Topology Hiding Configuration Sets
• S9 AF/pCSCF Topology Hiding Configuration Sets
3. Protected Networks, which use the Trusted Network Lists and Configuration Sets in their
configuration.
Configured Entries The number of entries for that components that are currently
configured.
% Utilization The percentage of the maximum number of entries for that
component that are currently configured.
Use the Diameter > Configuration > Capacity Summary page when planning, configuring, and
maintaining the Diameter Configuration.
• Diameter and Connection Capacity Validation prevent or do not prevent configuration changes
under the following conditions:
• Diameter will not prevent Connection configuration changes that involve the DA-MPs in
overlapping Target Sets. The complexities of overlapping Target Sets make it difficult to
determine over-configuration conditions when a diameter routing with overlapping Target Sets
is near or at capacity. If there are also non-overlapping Target Sets, prevention of changes
affecting non-overlapping Target Sets is still enforced.
• When only a single non-overlapping Target Set is involved, diameter routing will prevent
Connection configuration changes that cause the Target Set's capacity to be exceeded.
• When there are no Target Sets involved at all - meaning there are no IPFE Connections, only
Fixed Connections - diameter routing prevents Connection configuration changes that could
cause the individual DA-MP hosting the subject Fixed Connection to exceed its capacity.
• The IPFE Connection Reserved Ingress MPS Scaling value (percent) is applied to a DA-MPs total
Engineered Ingress MPS. The IPFE Connection Reserved Ingress MPS Scaling value is effectively
a scaling factor on the total Reserved Ingress MPS that can be configured for a DA-MP, encompassing
the contributions of both IPFE and Fixed Connections.
• When dealing with a non-overlapping Target Set, the configuration capacity of the constituent
DA-MPs can be thought of as pooled. Even though IPFE Connections are typically considered to
be evenly distributed across all the DA-MPs in the Target Set, within a non-overlapping Target Set
capacity from one DA-MP can be borrowed and loaned to another DA-MP, for the purposes of
validating capacity changes. (This has no effect on the actual distribution of IPFE Connections by
the IPFE server.)
This situation can occur if the number of Fixed Connections varies significantly among DA-MPs
in the non-overlapping Target Set. In that case, much of one DA-MP's capacity is taken up by Fixed
Connections, which means there is less room for IPFE Connections. But if another DA-MP in the
non-overlapping Target Set has fewer Fixed Connections, it has more room for IPFE Connections.
The capacity on the DA-MP with fewer Fixed Connections can be used for IPFE Connections. See
Interpreting Apparent DA-MP Over-Configuration with Non-overlapping Target Sets for a concrete
example of how this works.
• Connection Capacity Validation does not take into account unequal weighting of DA-MPs within
an IPFE Target Set.
Weighting is primarily a Connection establishment factor. Weighting does not affect the Connection
capacity of any individual DA-MP, or the total capacity of a Target Set.
Over-Configuration Considerations
Connection Capacity Validation has the following over-configuration considerations:
• Over-configuration of both Connection counts and Reserved Ingress MPS is possible and explicitly
allowed when overlapping Target Sets are present.
• Running a release earlier than 5.0, and is already over-configured in some way, will remain
over-configured after upgrade to 5.0 or later.
• There are no alarms or other active notifications generated by the system to indicate Connection
count or Reserved Ingress MPS over-configurations.
• The Connection Capacity Dashboard page can be viewed to check the state of the current
Connection/DA-MP configuration. This is a passive notification.
• Over-configuration has no direct impact on the behavior of the DA-MP software when establishing
Connections. The Connection Capacity Validation feature is a configuration-only feature; the logic
used by the DA-MPs to determine if any given Connection establishment request can be honored
is unaffected by Connection Capacity Validation Updates.
The ability for a DA-MP to run traffic in excess of the scaled Engineered Ingress MPS value is
unaffected by Connection Capacity Validation Updates.
• Systems having an IPFE Scaling Factor of 50% prior to upgrade will retain the 50% value after
upgrade. In older systems, this IPFE Scaling Factor was not used in configuration validation. It is
possible for an older system to be over-configured immediately after upgrade, with no change in
configuration.
Look at the Diameter > Configuration > Connection Capacity Dashboard GUI page to check if
the Maximum Reserved Ingress MPS (for the capacity) and Connection Reserved Ingress MPS
columns (Fixed and IPFE) show any over-configuration.
For each (Peer Node, Application ID) ordered pair that you want to throttle, define a Traffic Throttle
Point (TTP) and assign it a Maximum ETR value. All of the information required for Peer
Node/Application ETR throttling is stored in a Traffic Throttle Point (TTP). If a Peer Node supports
multiple Application IDs, you must create a separate TTP for each Application for which you want
to enable ETR throttling. When you enable the TTP for service, the routing application begins to
measure the rate of transactions that are routed to the Peer Node and Application ID (this includes
transactions such as priority override and NGN-PS that might be exempt from diversion). This is
referred to as the Offered Traffic Rate (OTR). Divertable OTRs are the transaction rates offered to a
TTP that are candidates for diversion. NGN-PS and priority override transaction are exempt from
TTP ETR throttling diversion. When the TTP OTR begins to exceed its user-defined Maximum ETR,
the routing application will alternate route the excess transactions using all of the existing routing
mechanisms.
Note: A TTP's OTR measurements include all transactions which are associated with an active TTP,
which includes both override priority and NGN-PS transactions that might be exempt from diversion.
Traffic diversion is prioritized based upon the Discard Policy assigned to the DA-MPs. Using the
Discard Policy and message priority and color OTRs measurements, the TTP Rate Shaper algorithm
determines whether a Request message associated with the TTP must be diverted/alternate routed.
TTP rate shaping is applied after a Peer Node or Connection is selected from a Route Group (or after
a Peer Node is selected by Implicit Routing).
• You have assigned a value to the TTP's Override Message Priority Threshold attribute
• The Request message's priority is greater or equal to the TTP Override Message Priority
Threshold attribute
• The TTP's OTR is less than or equal to the TTP Maximum ETR
Note: A TTP's OTR measurements include all transactions which are associated with an
active TTP, which includes both override priority and NGN-PS transactions might be exempt
from diversion.
Traffic reduction requests from Peer Nodes within a Route Group can be aggregated and used for
making decisions about whether Route Groups within a Route List are viable candidates for routing
a transaction. Traffic reduction loss values for a group of Connection or Peer Nodes are aggregated
by the Traffic Throttle Group (TTG) to which you assign a set of TTPs. The local TTG traffic reduction
information is also distributed to other Nodes within the network to assist them in making decisions
about sending traffic they cannot handle to the affected Node.
When a TTG is created and enabled for service, the routing application begins to maintain an aggregated
Current Loss Percentage for the TTG based upon the Maximum ETR assigned to each TTP and the
Current Loss Percentage for each TTP. A TTG can be assigned to a Route Group within a Route List
along with a maximum loss threshold.
When you enable a TTG, the routing application will not select a Route Group from a Route List when
the following criteria are met:
• TTG is assigned to the Route Group within the Route List
• TTG admin state is Enabled
• TTG Current Loss Percentage exceeds the Maximum Loss Percentage Threshold value assigned to
the Route Group within the Route List
Each time the routing server receives an Answer message that can be associated with a PTR, it checks
if a TTP has been stored in the PTR. If not, then the routing server will ignore any DOIC AVPs in the
message. If a TTP is stored in the PTR, then will search for DOIC AVPs in the Answer response if the
following criteria are met:
• TTP is still active (it may have changed between the time the Request was sent and the Answer
was received)
• Diameter Node which initiated the Answer (identified by the Origin-Host AVP) is the same node
associated with the TTP
If any of these validations fail, then the routing server will ignore any DOIC AVPs in the message.
New OLR
The routing application considers an OLR to be a new request when the TTP Validity Duration stored
in the local TTP RT-DB is set to 0. The routing application could be in an overload recovery state for
the previously received OLR. When this occurs, the recovery procedure is abandoned by stopping the
DOIC Overload Recover timer. The new OLR is then processed.
ETS is intended to be used by qualified and authorized users, for example, emergency service personnel,
only during times of emergency situations and network congestion. ETS access:
• Is limited to key personnel and those with leadership
• Is provided end-to-end priority treatment beyond that offered to the general public
• Can include priority call/session set-up, access to additional resources (alternate routing), and
exemption from restrictive network traffic management controls.
Note: If NGN-PS is disabled after being enabled, DSR will not disable NGN-PS, but an alarm alerts
the user that the runtime state and administrative state for NGN-PS are not in synch.
NGN-PS support is comprised of two major functions:
1. Identifying messages which require NGN-PS, which is based on subscription information stored
in databases that is downloaded to entities that perform priority marking of transactions by way
of AVPs.
• The following messages are candidates for NGN-PS treatment:
• Cx/Dx LIR & LIA
• Cx/Dx SAR & SAA
• Dh/Sh UDR & UDA
• Gx CCR-I & CCA-I
• Gx RAR & RAA
• Rx AAR & AAA
provided a higher treatment versus violable message, the existing four priority values of 0 through 3
are reserved for violable messages, and message priority of 4 is reserved for inviolable messages.
A message is considered inviolable if:
• The message priority is greater or equal to the Minimum Inviolable Priority value. See Diameter
System Options elements. NGN-PS messages received from Diameter Peer Nodes are identified and
tagged as inviolable before DSR ingress congestion controls are applied.
• Answer priority is equal to the Maximum of Request Priority and Minimum Answer Priority
value. See Diameter System Options elements.
The Diameter > Configuration > Connection Capacity Dashboard page is view-only and has two
tabs.
The Connections tab contains information about the currently configured Connections for each DAMP
in the NE. Fixed and IPFE Connections are displayed, with IPFE (Floating) Connections grouped by
Target Set.
The Connection Reserved Ingress MPS tab contains the currently configured Reserved Ingress MPS
for each DAMP in the NE. The contribution of both Fixed and IPFE Connections is displayed, with
IPFE Connections grouped by Target Set.
If any configured DAMP does not have an assigned MP Profile, the associated row on each Dashboard
tab displays the MP Server Hostname in the first column, and all other fields in the row contain —.
Note: The Connection Capacity Dashboard does not use field coloring. Usage values at or in excess
of 100% are not flagged by cell coloring.
The following information is displayed for each configured Active DA-MP when the Connections tab
is selected:
MP Server Hostname of the DAMP server.
Hostname
Current The percentage of the total Connection capacity currently used, which is the sum
Connection Usage of Fixed and IPFE Connections allocated to the DAMP, divided by the total
(%) Connection Capacity value shown in the fourth column.
It is theoretically possible for this usage value to exceed 100%; diameter does not
prevent over-configuration in certain scenarios (typically involving overlapping
Target Sets, or a non-overlapping Target Set whose DAMPs have significantly
different numbers of Fixed Connections assigned). For a given DAMP, if the
number of Connections allocated to that DAMP exceeds the DAMP's Maximum
Connections count capacity (from the assigned MP Profile), the Current
Connection Usage (%) value will exceed 100%.
Current Reserved The percentage of scaled Engineered Ingress MPS capacity currently used.
Ingress MPS
This usage value is computed as the sum of Reserved Ingress MPS values for a
Usage (%)
DA-MP's Fixed and IPFE Connections, divided by the Maximum Reserved
Ingress MPS value shown in the fourth column of the Connection Reserved
Ingress MPS tab.
It is theoretically possible for this usage value to exceed 100%; diameter does not
prevent over-configuration in certain scenarios (typically involving overlapping
Target Sets, or a non-overlapping Target Set whose DAMPs have significantly
different numbers of Fixed Connections assigned).
# Fixed The number of Fixed Connections currently configured for the DAMP.
Connections
For a given DAMP, the value displayed in the # Fixed Connections field should:
• Never exceed the Connection Capacity value.
If the NE has Target Sets configured, the following information appears (one column for each Target
Set) up to a maximum of 32 Target Sets:
TSn: # IPFE A configured Target Set, where n is the Target Set number. The numbering of the
Connections Target Sets will be ascending, but might not be sequential.
The value displayed for a given DAMP and Target Set is the evenly-distributed
allocation of IPFE Connections to each DAMP in the Target Set. If the
evenly-distributed allocation value is zero, then the value 0 is displayed in the field.
The evenly-distributed allocation of IPFE Connections will be zero if there are more
DAMPs in the Target Set than IPFE Connections configured for the Target Set. In this
case, to make it clear that the DAMP is part of the Target Set, the value of zero is
displayed (instead of a blank field).
If a DAMP has no IPFE allocation for a defined Target set, the corresponding field is
blank.
The following information appears under the Connection Reserved Ingress MPS tab:
MP Server Hostname of the DAMP server.
Hostname
Current The percentage of the total Connection capacity currently used, which is the sum
Connection of Fixed and IPFE Connections allocated to the DAMP, divided by the total
Usage (%) Connection Capacity value shown in the fourth column on the Connections tab.
It is theoretically possible for this usage value to exceed 100%; diameter does not
prevent over-configuration in certain scenarios (typically involving overlapping
Target Sets, or a non-overlapping Target Set whose DAMPs have significantly
different numbers of Fixed Connections assigned). For a given DAMP, if the
number of Connections allocated to that DAMP exceeds the DA-MP's Maximum
Connections count capacity (from the assigned MP Profile), the Current Connection
Usage (%) value will exceed 100%.
Current The percentage of scaled Engineered Ingress MPS capacity currently used.
Reserved Ingress
This usage value is computed as the sum of Reserved Ingress MPS values for a
MPS Usage (%)
DAMP's Fixed and IPFE Connections, divided by the Maximum Reserved Ingress
MPS value shown in the fourth column of the Connection Reserved Ingress MPS
tab.
It is theoretically possible for this usage value to exceed 100%; diameter does not
prevent over-configuration in certain scenarios (typically involving overlapping
Target Sets, or a non-overlapping Target Set whose DAMPs have significantly
different numbers of Fixed Connections assigned).
If the total Connection Reserved Ingress MPS for Connections allocated to a given
DAMP exceeds the DAMP's scaled Engineered Ingress MPS, the Current Reserved
Ingress MPS Usage (%) will exceed 100%
Maximum The DAMP's Engineered Message Size Allowed value, scaled by the IPFE
Reserved Ingress Connection Reserved Ingress MPS Scaling value (from the Diameter >
MPS Configuration > System Options page.
The DAMP's Engineered Ingress MPS value comes from the MP Profile that has
been assigned to the DAMP.
The IPFE Connection Reserved Ingress MPS Scaling value, from the Diameter >
Configuration > System Options page, is the percent of DAMP Engineered
Message Size Allowed used by each DAMP when validating the Reserved Ingress
MPS for a newly received IPFE Connection. A newly received IPFE Connection
will be rejected if the total Connection Reserved Ingress MPS for Fixed and already
established IPFE Connections would exceed the DAMP's Engineered Ingress
MPS, scaled by this value.
Total Fixed The sum of the Maximum Reserved Ingress MPS values for all Fixed Connections
Connection configured to a DAMP.
Reserved Ingress
For a given DAMP, the value displayed in the Total Fixed Connection Reserved
MPS
Ingress MPS field should not exceed the Maximum Reserved Ingress MPS value.
Note: There is one exception – a system already configured with Fixed Connections
having some non-zero Total Fixed Connection Reserved Ingress MPS value. If
the IPFE Scaling Factor is decreased, thus decreasing the scaled Engineered Ingress
MPS on every DAMP in the system, it is possible the new lowered Maximum
Reserved Ingress MPS will be less than the already-configured Total Fixed
Connection Reserved Ingress MPS.
If a DAMP has no Fixed Connections assigned to it, the corresponding field shows
a value of zero
If a DAMP has one or more Fixed Connections, the value appears as a hyperlink.
The hyperlink opens the Diameter > Configuration > Connections [Filtered]
page, filtered to show only those Fixed Connections assigned to the DAMP.
If the NE has Target Sets configured, the following information appears following the tab columns
(one column for each Target Set) up to a maximum of 32 Target Sets:
TSn: # IPFE A configured Target Set, where n is the Target Set number. The numbering of the
Connections Target Sets will be ascending, but might not be sequential.
Reserved
Note: The IPFE GUI does not require Target Sets to be configured sequentially. For
Ingress MPS
example, you can define Target Sets 4, 11, 12, and 32. The Dashboard page always
shows only the configured Target Sets, from the smallest configured number to the
largest configured number.
The value displayed for a given DAMP and Target Set field is the evenly-distributed
allocation of IPFE Connections' Reserved Ingress MPS to each DAMP in the Target
Set. If the evenly-distributed allocation value is zero, then 0 is displayed in the field.
The evenly-distributed allocation of IPFE Connections is zero if all of the IPFE
Connections configured for the Target Set have Reserved Ingress MPS values of zero.
In this case, to make it clear that the DAMP is part of the Target Set, the value of zero
is displayed (instead of a blank field).
If a DAMP has no IPFE allocation for a defined Target set, the corresponding field is
blank.
If a DA-MP has one or more IPFE Connections allocated to it for a given Target Set,
the value is displayed as a hyperlink. When clicked, the Diameter > Configuration >
Connections [Filtered] page opens, filtered to show only those IPFE Connections
assigned to the Target Set. Because IPFE Connections are not configured to a particular
DAMP, this filtered display cannot show a DAMP allocation; it instead shows all
IPFE Connections in the Target Set.
• Filter the list of Application IDs, to display only the desired Application IDs.
• Click Insert.
The Diameter > Configuration > Application IDs [Insert] page is displayed. You can add a new
Diameter Configuration Application ID and its values. See Adding an Application ID.
If the maximum number of Application IDs (1000) already exists in the system, the Diameter >
Configuration > Application IDs [Insert] page is not displayed, and an error message appears.
• Select an Application ID, and click Edit. The Diameter > Configuration > Application IDs [Edit]
page is displayed. You can edit the selected Application ID. See Editing an Application ID.
• Select an Application ID, and click Delete to delete the selected Application ID. See Deleting an
Application ID.
The Diameter > Configuration > Application IDs page is displayed with a list of configured
Application IDs. The fields are described in Diameter Application IDs elements.
Adding an Application ID
Use this task to configure a new Application ID.
The fields are described in Diameter Application IDs elements.
1. Select Diameter > Configuration > Application IDs.
The Diameter > Configuration > Application IDs page is displayed.
2. Click Insert.
The Diameter > Configuration > Application IDs [Insert] page is displayed.
If the maximum number of Application IDs (1000) is already configured in the system, the
Diameter > Configuration > Application Ids [Insert] page is not displayed, and an error message
appears.
Editing an Application ID
Use this procedure to change the Name for a selected Application ID. (The Application ID Value field
cannot be changed.)
The fields are described in Diameter Application IDs elements.
When the Diameter > Configuration > Application IDs [Edit] page is displayed, the fields are
populated with the currently configured values.
1. Select Diameter > Configuration > Application IDs.
The Diameter > Configuration > Application IDs page is displayed.
Deleting an Application ID
Use the following procedure to delete an Application ID.
Note: You cannot delete an Application ID if it is associated with any of the following Configuration
components:
• CEX Configuration Sets
• Transaction Configuration Sets
• Peer Route Table Rules
• Application Route Table Rules
• Message Priority Configuration Sets
• Applications such as RBAR and FABR
1. Select Diameter > Configuration > Application IDs.
The Diameter > Configuration > Application IDs page is displayed.
4. Click:
• OK to delete the Application ID.
If the Application ID is associated with a CEX Configuration Set, the Application ID is not
deleted and an error message appears.
• Click Cancel to cancel the delete function and return to the Diameter > Configuration >
Application IDs page.
If you click OK and the selected Application ID no longer exists (it was deleted by another user),
an error message appears and the Application IDs view is refreshed.
• See Editing CEX Parameters to edit the CEX Parameters for the selected Application ID.
• See Deleting CEX Parameters to delete the CEX Parameters for the selected Application ID.
Field (* indicates
a required field) Description Data Input Notes
* Application ID Used to identify a specific Diameter Format: pulldown menu
Application.
Range: configured Application IDs
The Application ID value is placed in the
• 0-16777215 for Standard
Application ID AVP.
Application IDs
• 16777216-4294967294 for
Vendor-specific Application IDs
• 4294967295 for Relay
Field (* indicates
a required field) Description Data Input Notes
Vendor ID A Vendor ID value for this Vendor-Specific Format: numeric; maximum 10 digits
Application ID.
Range: 1-4294967295
The Vendor ID is placed in the Vendor ID
AVP.
The Vendor-Specific Application ID check
box must be checked before a value can be
entered in this field.
2. Click Insert.
The Diameter > Configuration > CEX Parameters [Insert] page appears.
4. Change the Application ID Type, Vendor-Specific ID, or Vendor ID for the selected Application
ID.
The Vendor ID must be unique.
5. Click:
• OK to save the changes and return to the Diameter > Configuration > CEX Parameters page.
• Apply to save the changes and remain on this page.
• Cancel to return to the Diameter > Configuration > CEX Parameters page without saving any
changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• The selected Application ID no longer exists; it has been deleted by another user
• Any fields contain values that are out of range
• Any required field is empty (not entered)
• The Application ID, Application ID Type, and Vendor ID combination is not unique
2. Select the Application ID for which you want to delete CEX Parameters.
3. Click Delete.
A popup window appears to confirm the delete.
4. Click:
If OK is clicked and the selected Application ID no longer exists (it was deleted by another user),
an error message is displayed and the CEX Parameters view is refreshed.
already exists in the system, the Diameter > Configuration > Command Codes [Insert] page will
not open, and an error message is displayed.
Field (* indicates a
required field) Description Data Input Notes
* Name Command Code Name Format: case-sensitive; alphanumeric
and underscore (_); cannot start with
a digit and must contain at least one
alpha
Range: 1 - 32 characters
* Command Code Identifies the command or extended Format: Pulldown menu or numeric
command code associated with the
Range: Select from predefined
message
Command Codes or enter a numeric
Note: Only preloaded, predefined value: 0-16777215
ECC values are displayed.
Default: none
2. Click Insert.
The Diameter > Configuration > Command Codes [Insert] page appears.
If the maximum number of Command Codes (1000) has already been configured in the system,
the Diameter > Configuration > Command Codes [Insert] page will not open, and an error message
will appear.
4. Change the Command Code Name for the selected Command Code.
The Name must be unique.
5. Click:
• OK to save the changes and return to the Diameter > Configuration > Command Codes page.
• Apply to save the changes and remain on this page.
• Cancel to return to the Diameter > Configuration > Command Codes page without saving
any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• The selected Command Code no longer exists; it has been deleted by another user
• Any fields contain values that are out of range
• Any required field is empty (not entered)
4. Click:
• OK to delete the Command Code.
If the Command Code is used in a Peer Routing Rule or Application Routing Rule, the Command
Code is not deleted and an error message appears.
• Click Cancel to cancel the delete function and return to the Diameter > Configuration >
Command Codes page.
If OK is clicked and any of the following conditions exist, the selected Command Code no longer
exists (it was deleted by another user), an error message is displayed and the Command Codes is
refreshed.
SCTP, Diameter, and TCP options and then assign it to a connection. The options are described in
Configuration Sets elements. Each connection references a single Connection Configuration Set.
You can perform these tasks on an Active System OAM (SOAM).
The application has a default Connection Configuration Set called Default. The Default Connection
Configuration Set options can be modified, but the Default Connection Configuration Set cannot be
deleted. When you create a new Connection Configuration Set the values of the Default Connection
Configuration Set are automatically populated into the new Connection Configuration Set, allowing
you to easily create a new Connection Configuration Set that needs to have only a few options adjusted.
On the Connection Configuration Sets page, you can perform the following actions:
• Filter the list of Connection Configuration Sets to display only the desired Connection Configuration
Sets.
• Sort the list by column contents in ascending or descending order, by clicking the column heading.
The default order is by Connection Configuration Set Name in ascending ASCII order.
• Click a tab to display the options for the Connection Configuration Set on that tab. The Connection
Configuration Set Name remains on the left of the page when the page is scrolled to the right to
view all of the options.
• Click Insert.
The Connection Configuration Sets [Insert] page appears. You can add a new Connection
Configuration Set and its options. See Adding Configuration Sets.
If the maximum number of Connection Configuration Sets per Network Element (2000) already
exist in the system, the Connection Configuration Sets [Insert] page does not open, and an error
message displays.
• Select a Connection Configuration Set Name in the list, and click Edit.
The Connection Configuration Sets [Edit] page opens. You can edit the selected Connection
Configuration Set. See Editing Configuration Sets.
If at least one connection that uses the Connection Configuration Set is in the Enabled Admin state,
the Connection Configuration Sets [Edit] page will not open.
• Select a Connection Configuration Set Name in the list, and click Delete to remove the selected
Connection Configuration Set.
The Default Connection Configuration Set cannot be deleted. See Deleting Configuration Sets.
Note: You perform these tasks on the following Connection Configuration Sets tabs:
• SCTP Options
• Diameter Options
• TCP Options
• RADIUS Options
Note: You perform these tasks on the following Connection Configuration Sets tabs:
• SCTP Options
• Diameter Options
• TCP Options
• RADIUS Options
Field (* indicates
required field) Description Data Input Notes
* Connection Unique Name of the Connection Configuration Format: case-sensitive
Configuration Set Name Set. string: alphanumeric
and underscore (_);
must contain at least
one alpha and cannot
start with a digit
Range: 1 - 32 characters
SCTP Options
* Retransmit Initial Expected average network round-trip time in Format: numeric;
Timeout (ms) milliseconds. This is used to initialize the milliseconds
round-trip time value when an association is
Range: 10 - 5000
started but the round-trip time has not yet been
measured. The round-trip time is used by SCTP Default: 120
in calculating when to retransmit chunks.
* Retransmit Minimum Minimum amount of time to wait for an Format: numeric;
Timeout (ms) acknowledgment for a message sent. This value milliseconds
prevents the retransmit timeout from becoming
Range: 10 - 5000
too small in networks with a very short round-trip
time. Default: 120
* Retransmit Maximum Maximum amount of time to wait for an INIT to Format: numeric;
Timeout for INIT (ms) be acknowledged. milliseconds
This value overrides the Retransmit Maximum Range: 0, 10 - 10000
Timeout for INITs and is used to bound the initial
Default: 120
setup time.
A value of 0 indicates that the Retransmit
Maximum Timeout will be used for INITs as well.
Field (* indicates
required field) Description Data Input Notes
destination of an SCTP association before marking
the destination as failed.
This value must be less than the Number of
Retransmits Triggering Association Failure value.
* Socket Send Buffer Socket send buffer size for outgoing SCTP Format: numeric;
Size (bytes) messages. number of bytes
The send buffer size must be greater than or equal Range: 8000 - 5000000
to the product of the bandwidth and the round
Default: 2000000
trip delay for the association.
Field (* indicates
required field) Description Data Input Notes
* Socket Receive Buffer Socket receive buffer size for incoming SCTP Format: numeric;
Size (bytes) messages. number of bytes
The receive buffer size must be greater than or Range: 8000 - 5000000
equal to the product of the bandwidth and the
Default: 2000000
round trip delay for the association.
* Maximum Burst Specifies the maximum burst of packets that can Format: numeric
be emitted by this association.
Range: 1 - 4
Default: 4
Datagram Bundling If checked, datagram bundling is enabled for the Format: numeric
Enabled SCTP connection.
Range: checked (YES) or
unchecked (NO)
Default: checked
* Maximum Segment The Maximum Size to put in any outgoing SCTP Format: numeric field,
Size DATA chunk. If a message is larger than this size, setting this value to 0
it is fragmented by SCTP into the specified size. indicates that this is no
maximum is segment
size.
Range: 0, 64 - 1460 bytes
Default: 0
Fragmentation If checked, a message exceeding the size of the Format: check box
PMTU (Path Max Transmission Unit) is
Range: checked (YES) or
fragmented and reassembled by the peer.
unchecked (NO)
Default: checked
Ordered Delivery If checked, Ordered delivery of the SCTP DATA Format: check box
Chunk is performed. Otherwise, unordered
Range: checked (YES) or
delivery of the SCTP DATA Chunk is performed.
unchecked (NO)
Default: checked
Field (* indicates
required field) Description Data Input Notes
Diameter Options
* Connect Timer (sec) Controls the frequency that transport connection Format: numeric;
attempts are done to a Peer where no active seconds
transport connection exists.
Range: 1 - 60
Applicable only for connections that are
Default: 30
configured to initiate a connection with a Peer
Node.
* Watchdog Timer Init Initial value of the application watchdog timer. Format: numeric;
Value (sec) seconds
Range: 1 - 30
Default: 30
* Capabilities Exchange Time to wait on a CER message from a Peer after Format: numeric;
Timer (sec) a connection is initiated by the Peer. Time to wait seconds
on a CEA response from a Peer after sending the
Range: 1 - 10
CER.
Default: 3
Note: For local nodes, CEAs are sent in response
to erroneous CERs.
* Disconnect Timer (sec) After sending a DPA message, time to wait for a Format: numeric;
Peer to disconnect transport. After sending a DPR seconds
message, time to wait for the Peer to send the
Range: 1 - 10
DPA.
Default: 3
If the timer expires, transport will be disconnected
by the application.
Proving Mode Proving mode for the Configuration Set. Format: radio buttons
Range: Suspect, Always,
Never
Default: Suspect
* Proving Timer (msec) The time to wait for a Peer to send a DWA Format: numeric;
message in response to a DWR message during milliseconds
connection proving.
Range: 50 - 30000
Default: 500
* Proving Times The number of consecutive DWR and DWA Format: numeric;
exchanges within Proving Timer time during number of exchanges
connection proving.
Range: 1 - 1000
Default: 3
Field (* indicates
required field) Description Data Input Notes
connection. If the maximum is reached, this Range: 1 - 20000
connection will not be selected for routing until
Default: 1000
the number of Pending Requests falls below this
value.
Note: Because the pending transaction limit is
located in the Connection Configuration Set, it
cannot be edited unless the connection is disabled.
CEX Host IP Validation If checked, Host-IP-Address AVP validation will Format: check box
Enabled be enabled during CEX message exchange.
Range: checked (YES),
unchecked (NO)
Default: checked
TCP Options
Nagle Enabled If checked, the Nagle algorithm is enabled for the Format: check box
TCP connection.
Range: checked (YES),
unchecked (NO)
Default: checked
* Socket Send Buffer Socket send buffer size for outgoing TCP Format: numeric; bytes
Size (bytes) messages. The send buffer size should be greater
Range: 8000 - 5000000
than or equal to the product of the bandwidth and
the round trip delay for the connection. Default: 2000000
* Socket Receive Buffer Socket receive buffer size for incoming TCP Format: numeric; bytes
Size (bytes) messages. The receive buffer size should be
Range: 8000 - 5000000
greater than or equal to the product of the
bandwidth and the round trip delay for the Default: 2000000
connection.
Maximum Segment Size If checked, TCP probes a connection that has been Format: check box
idle for the amount of time configurable by
Range: checked (YES),
Keep-Alive Idle Time parameter.
unchecked (NO)
Default: No
* Keep-Alive The number of seconds of idle time between Keep Format: numeric field
Alive Probes if Keep-Alive is enabled.
Range: 1 - 7200 seconds
Default: 1
* Keep-Alive Idle Time Specifies the number of seconds of idle time Format: numeric field
between Keep Alive Probes if Keep-Alive is
Range: 1 - 7200 seconds
enabled.
Default: 1
Field (* indicates
required field) Description Data Input Notes
* Keep-Alive Probe If Keep-Alive is enabled, sets the interval between Format: numeric field
Interval Keep Alive Probes in seconds. This value cannot
Range: 1 - 120 seconds
be changed after a connection is established.
Default: 1
* Keep-Alive Maximum If Keep-Alive is enabled, sets the maximum Format: numeric field
Count number of Keep Alive Probes TCP sends without
Range: 1 - 16 seconds
any response from the remote server, before TCP
gives up and aborts the connection. Default: 9
Radius Options
Pending Transactions The maximum number of Pending Requests Format: numeric
Per Connection waiting for Response from Peer on this
Range: 1 - 5000
connection. If maximum Pending Transactions is
reached, then this connection will not be selected Default: 1000
for routing until the Pending transactions are
below this value.
Prevent duplicate This option applies to RADIUS client connections Format: check box
transactions due to only and determines how to handle a Request that
Range: checked,
egress retransmissions is being retransmitted to the same peer as before,
unchecked
but the corresponding transaction record (that
contains the previously used source port, RADIUS Default: checked
ID and Request Authenticator) has expired. If this
option is selected, and if the corresponding
transaction record has expired, the routing
application will not forward the Request to the
same peer with a new RADIUS ID, source port,
and Request Authenticator. An alternate peer can
be selected for routing in this case. If this option
is not selected, and the corresponding transaction
record has expired, DSR shall select a new source
port, RADIUS ID and Request Authenticator,
create a new transaction record and forward the
Request to the peer.
Prevent duplicate This option applies to RADIUS server connections Format: check box
transactions due to only and determines how DSR shall processes
Range: checked,
ingress retransmissions duplicate requests received from a client. A
unchecked
request is considered duplicate if the client
retransmits a request with the same source IP Default: checked
address, source port number, RADIUS ID and
Request Authenticator. If this option is selected,
DSR shall create an ingress transaction record for
the request (with the request's source IP address,
port, RADIUS ID and Request Authenticator)
which shall be used to admit only the first Request
into DSR and prevent admitting of duplicate
requests, if received, till the transaction record is
Field (* indicates
required field) Description Data Input Notes
present. If a Response has been sent previously
to the peer, it shall be saved in the transaction
record and shall be forwarded to the client in
response to duplicate requests. If this option is
not selected, DSR shall not maintain ingress
transaction records and shall admit all Requests
received from the client.
Cached response This option applies to server connections only. Format: numeric
Duration (ms) Applicable only if Prevent duplicate transactions
Range: 3000 - 100000
due to ingress retransmissions = Checked. This
value specifies the duration for which a cached Default: 5000
response shall be held in the ingress transaction
record This value should cover the potential of
loss of response and further retransmissions by
the client.
• At least one connection that is using this Connection Configuration Set is not in the Disabled
Admin State
the new CEX Configuration Set, allowing you to easily create a new CEX Configuration Set that needs
to have only a few options adjusted.
On the CEX Configuration Sets page, you can perform the following actions:
• Filter the list of CEX Configuration Sets to display only the desired CEX Configuration Sets.
• Sort the list in ascending or descending order, by clicking the CEX Configurations Set Name
column heading. The default order is by CEX Configuration Set Name in ascending ASCII order.
• In the CEX Parameters column,
• Click the + sign to the left of the number of Application IDs to expand the list of Application
IDs for a CEX Configuration Set.
• Click the - sign to left of the number of Application IDs to collapse the expanded list of
Application IDs for a CEX Configuration Set.
• Click a blue Application ID in an expanded list to open the Diameter > Configuration > CEX
Parameters [Filtered] page for the selected Application ID only.
• Click Insert.
The CEX Configuration Sets [Insert] page opens. You can add a new CEX Configuration Set and
its values. See Adding a CEX Configuration Set. If the maximum number of CEX Configuration Sets
(2000) already exists in the system, the CEX Configuration Sets [Insert] page will not open, and
an error message is displayed.
• Select a CEX Configuration Set Name in the list, and click Edit.
The CEX Configuration Sets [Edit] page opens. You can edit the selected CEX Configuration Set.
See Editing a CEX Configuration Set. The Default CEX Configuration Set cannot be edited.
• Select a CEX Configuration Set Name in the list, and click Delete to remove the selected CEX
Configuration Set.
The Default CEX Configuration Set cannot be deleted. See Deleting a CEX Configuration Set.
DSR Feature Status If checked, this Vendor specific AVP will be Format: checkbox
AVP sent in CER/CEA messages. It can convey the
Range: NA
status of various features like NGN-PS to Peer
DSR. Default: unchecked
5. Enter the information for the Supported Vendor IDs in the fields.
• To add a Vendor ID to the Selected Supported Vendor IDs list, select the entry in the Available
Supported Vendor IDs list and click Add below the Available Supported Vendor IDs list.
• To remove a Vendor ID from the Selected Supported Vendor IDs list, select the entry in the
Selected Supported Vendor IDs list and click Remove above the Selected Supported Vendor
IDs list.
6. Click:
• OK to save the new CEX Configuration Set and return to the CEX Configuration Sets page.
• Apply to save the new CEX Configuration Set and remain on this page.
• Cancel to return to the CEX Configuration Sets page without saving any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• The Selected CEX Parameters list is empty (an item was not added)
• Any item that was selected to add to a list was deleted by another user during this Insert session
• The maximum number of configured CEX Configuration Sets (2000), Selected CEX Parameters
+ Must Include CEX Parameters for a CEX Configuration Set (10), or Supported Vendor IDs for
a CEX Configuration Set (10) was reached by another user's entries during this Insert session
1. Select Diameter > Configuration > Configuration Sets > CEX Configuration Sets.
The CEX Configuration Sets page appears.
2. Select the CEX Configuration Set that you want to edit.
The Default CEX Configuration Set cannot be changed.
3. Click Edit.
The CEX Configuration Sets [Edit] page appears.
When the page opens, the fields are initially populated with the currently configured values.
5. Click:
• OK to save the changes and return to the CEX Configuration Sets page.
• Apply to save the changes and remain on this page.
• Cancel to return to the CEX Configuration Sets page without saving any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• You attempt to edit an instance whose Dynamic attribute is YES.
• You attempt to delete an instance whose Dynamic attribute is YES. Only the Dynamic Peer
Discovery software is able to delete an instance whose Dynamic attribute is YES.
• You attempt to edit an attribute when it is in the read-only state.
• You attempt to edit a dynamic instance by changing its Dynamic attribute from NO to YES.
• You attempt to edit a static instance by changing its Dynamic attribute from NO to YES.
• The Selected CEX Parameters list is empty (no items were added)
• Any item that was selected to add to a list was deleted by another user during this Insert session
• The selected CEX Configuration Set is being used by a connection or a Local Node
• The selected CEX Configuration Set was deleted by another user during this Edit session
• If you attempt to edit a CEX Configuration Set instance whose dynamic attribute is YES.
• Click Insert.
The Capacity Configuration Sets [Insert] page opens. You can add a new Capacity Configuration
Sets and its values. See Adding a Capacity Configuration Set.
If the Per Connection Ingress MPS Control feature is not enabled, the Capacity Configuration Sets
[Insert] page does not open, and an error message is displayed.
If the maximum number of Capacity Configuration Sets (1000) already exists in the system, the
Capacity Configuration Sets [Insert] page does not open and an error message is displayed.
• Select the Name of a Capacity Configuration Set in the list, and click Edit.
The Capacity Configuration Sets [Edit] page opens. You can edit the selected Capacity
Configuration Set. See Editing a Capacity Configuration Set.
If the Default Capacity Configuration Set is selected and the Per Connection Ingress MPS Control
feature is not enabled, the Capacity Configuration Sets [Edit] page does not open and an error
message is displayed.
• Select the Name of a Capacity Configuration Set in the list, and click Delete to remove the selected
Capacity Configuration Set. See Deleting a Capacity Configuration Set. The Default Capacity
Configuration Set can be edited, but not deleted.
* Reserved Ingress MPS Rate in messages per second for which resources Format: numeric
are explicitly reserved for Diameter connections
Range: 0, 10 - 5000
using this Capacity Configuration Set to process
Ingress messages per
ingress diameter signaling. These resources cannot
second
be used by any other connection, regardless of the
load offered to other connections. Default: 0
The sum of Reserved Ingress MPS for all
connections on an MP server cannot exceed the
maximum capacity of the MP server.
* Maximum Ingress Maximum Ingress messages per second that a Format: numeric
MPS Diameter connection using this Capacity
Range: 0, 10 - 10000
Configuration Set is allowed to process.
Ingress messages per
The Maximum Ingress MPS must be equal to or second
greater than the Reserved Ingress MPS.
Default: 0
Any difference between the Maximum Ingress
MPS and the Reserved Ingress MPS represents
MP server resources that are shared among
connections that have Maximum Ingress MPS
greater than Reserved Ingress MPS.
* Ingress MPS Minor Percentage of Maximum Ingress MPS at which a Format: numeric
Alarm Threshold minor alarm will be raised for connections that
Range: 10 - 99 percent
(Percent) use this Capacity Configuration Set.
Default: 50 percent
After an alarm is raised, it will not be cleared until
the average Ingress MPS falls 5% below this value.
The Ingress MPS Minor Alarm Threshold must
be less than the Ingress MPS Major Alarm
Threshold.
* Ingress Major Alarm Percentage of Maximum Ingress MPS at which a Format: numeric
Threshold (Percent) major alarm will be raised for connections that
Range: 11 - 100 percent
use this Capacity Configuration Set.
Default: 80 percent
After an alarm is raised, it will not be cleared until
the average Ingress MPS falls 5% below this value.
* Reserved Ingress MPS Time (in ms) that a diameter Connection's ingress Format: numeric
Abatement Time message rate must remain less than or equal to
Range: 1000 - 5000 ms
Reserved Ingress MPS, after exceeding Reserved
Ingress MPS, in order to revert the ingress traffic Default: 2000 ms
color from Yellow to Green.
6. Enable any Connections that were Disabled before the Capacity Configuration Set was changed.
See Enabling Connections.
A Capacity Configuration Set cannot be deleted if it is being used by any Connections. Before you
perform this task, you must disable any Connections that use the Capacity Configuration Set and edit
each Connection to no longer use the Capacity Configuration Set. (See Disabling Connections and Editing
a Connection.)
The Default Capacity Configuration Set can be edited, but cannot be deleted.
1. Select Diameter > Configuration > Configuration Sets > Capacity Configuration Sets.
The Capacity Configuration Sets page appears.
2. Select the Capacity Configuration Set you want to delete.
3. Click Delete.
A popup window appears to confirm the delete.
4. Click:
• OK to delete the Capacity Configuration Set and return to the Capacity Configuration Sets
page.
• Cancel to cancel the delete function and return to the Capacity Configuration Sets page.
If OK is clicked and the selected Capacity Configuration Set is referenced by at least one Connection,
an error message appears and the Capacity Configuration Set is not deleted.
If the maximum number of Egress Message Throttling Configuration Sets per Network Element
(50) already exist in the system, the Egress Message Throttling Configuration Sets [Insert] page
will not open, and an error message is displayed.
• Select an Egress Message Throttling Configuration Set Name in the list, and click Edit.
The Egress Message Throttling Configuration Sets [Edit] page opens. You can edit the selected
Egress Message Throttling Configuration Set. See Editing an Egress Message Throttling Configuration
Set.
If at least one connection is in the "Enabled" Admin state that uses the Egress Message Throttling
Configuration Set, the Egress Message Throttling Configuration Sets [Edit] page will not open.
• Select an Egress Message Throttling Configuration Set Name in the list, and click Delete to remove
the selected Egress Message Throttling Configuration Set.
Field (* indicates
required field) Description Data Input Notes
* Egress Message A name that uniquely identifies the Egress Format: Valid characters
Throttling Message Throttling Configuration Set. are alphanumeric and
Configuration Set underscore. Must contain
at least one alpha and
must not start with a digit
Range: A 32-character
string
Default: none
* Max Egress Message A maximum Egress Message Rate (EMR) on a Format: numeric
Rate connection being throttled
Range: 10 - 10000 seconds
Note: The EMR is calculated every 100ms by
Default: none
subtracting the oldest traffic count from the
newest traffic count, and averaging the difference
over the elapsed time between them.
Field (* indicates
required field) Description Data Input Notes
Range: 1 - 99% of Max
EMR
Default: 80%
* Convergence Time The time it will take in milliseconds to converge Format: numeric
(msec) on a per second rate. If the convergence time is
Range (msec):
less than 1000 milliseconds, the rate is *
Convergence Time (msec) extrapolated. If the • 250
convergence time is greater • 250 than 1000 • 500
milliseconds, the rate is averaged. • 1000
The rate convergence time is the amount of time • 2000
it takes for the measured rate to converge on the • 4000
actual rate.
Default: 1000
For example, if the actual rate jumps from 0 MPS
to 1000 MPS and the Rate Convergence Time is 5
seconds, it takes that long for the measured rate
to converge on the actual rate, and the measured
rate will be reported as follows:
• T(0) = 0 MPS
• T(1) = 200 MPS
• T(2) = 400 MPS
• T(3) = 600 MPS
• T(4) = 800 MPS
Field (* indicates
required field) Description Data Input Notes
• T(5) = 1000 MPS
* Abatement Time This value specifies the amount of time that a Format: numeric
(msec) throttled connection's Egress Request Rate must
Range: 200 - 10000 msec
remain below an abatement before allowing it to
abate to a lower CL. Default: 500 msec
For example, if the following is true:
• Max EMR = 1000 messages per second
• Abatement Threshold-3 = 80% * 100=> 800
messages per second)
• Abatement time = 500 milliseconds
• Current Congestion Level = CL3
Then all of the message rate calculations during
a contiguous 500 msec must be less than 800 MPS
in order for the congestion level to be reduced
from CL3 to CL2.
• Cancel to return to the Egress Message Throttling Configuration Sets page without saving
any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• Any required field is empty (no value was entered)
• The value in any field is not valid or is out of range
• The Egress Message Throttling Configuration Set Name is not unique; it already exists in the
system
• Throttle thresholds and abatement thresholds do not follow the rule: TT3 > AT3 > TT2 > AT2
> TT1 > AT1
• The maximum number of Egress Message Throttling Configuration Sets per Network Element
(50) is already configured
Note: An Egress Message Throttling Configuration Set cannot be deleted if it is being used by any
connections. Before you perform this task, you must disable and edit any connections that use the
Egress Message Throttling Configuration Set. (See Disabling Connections and Editing a Connection.)
1. Select Diameter > Configuration > Configuration Sets > Egress Message Throttling Configuration
Sets.
The Egress Message Throttling Configuration Sets page appears.
2. Select the Egress Message Throttling Configuration Set you want to delete.
3. Click Delete.
A popup window appears to confirm the delete.
4. Click:
• OK to delete the Egress Message Throttling Configuration Set.
• Cancel to cancel the delete function and return to the Egress Message Throttling Configuration
Sets page.
If OK is clicked and the selected Egress Message Throttling Configuration Set is referenced by at
least one connection, an error message appears and the Egress Message Throttling Configuration
Set is not deleted.
If OK is clicked and the selected Egress Message Throttling Configuration Set no longer exists (it
was deleted by another user), an error message is displayed and the Egress Message Throttling
Configuration Sets view is refreshed.
If the maximum number of Message Priority Configuration Sets per Network Element (20) already
exist in the system, the Message Priority Configuration Sets [Insert] page will not open, and an
error message is displayed.
• Select an Message Priority Configuration Set Name in the list, and click Edit.
The Message Priority Configuration Sets [Edit] page opens. You can edit the selected Message
Priority Configuration Set. See Editing a Message Priority Configuration Set.
If at least one connection that uses the Message Priority Configuration Set is in the Enabled Admin
state, the Message Priority Configuration Sets [Edit] page will not open.
• Select an Message Priority Configuration Set Name in the list, and click Delete to remove the
selected Message Priority Configuration Set. You cannot delete the Default Message Priority
Configuration Set.
Field (* indicates a
required field) Description Data Input Notes
* Message Priority Unique name of the Message Priority Format: Case-sensitive
Configuration Set Configuration Set. string: alphanumeric and
Name underscore (_); must
contain at least one alpha
and cannot begin with a
digit.
Range: 1 - 32 characters
Field (* indicates a
required field) Description Data Input Notes
Command Code that gives the "true" command
type (for example, CCR-I, CCR-U, and so on).
Note: This pulldown list of configured
Command Codes includes Extended
Command-Codes (ECC) immediately after their
parent Command-Code.
Command Code Name The name of the command associated with the
Command Code
Priority The message priority assigned to incoming Format: pull down list
messages that match the combination of
Range: 0-2
Application ID and Command Code.
• Cancel to cancel the delete function and return to the Message Priority Configuration Sets
page.
If OK is clicked and the selected Message Priority Configuration Set is referenced by at least one
connection, an error message appears and the Message Priority Configuration Set is not deleted.
If OK is clicked and the selected Message Priority Configuration Set no longer exists (it was deleted
by another user), an error message is displayed and the Message Priority Configuration Sets view
is refreshed.
Field (* indicates a
required field) Description Data Input Notes
* Message Copy Unique name of the Message Copy Format: text box
Configuration Set Name Configuration Set.
Case-sensitive string:
alphanumeric and underscore
(_); must contain at least one
alpha and cannot begin with
a digit.
Range: 1 - 32 characters
* Route List of the DAS Route List to be used for copying a Format: pulldown list
Node message to a DAS node.
Range: configured Route Lists.
Default: -Select-.
Message Copy Request Type of Request to be copied to the DAS. Format: radio buttons
Type
Range: Original Ingress
Request, Original Egress
Request
Default: Original Ingress
Request
Ingress Answer Included Indicates whether the Ingress Answer Format: radio buttons
received for the Diameter Message needs
Range: Yes, No
to be included in the copied message.
Default: No
Original Answer Result Result Code/Experimental Result code Format: radio buttons
Code For Message Copy that should match with incoming Answer
Range:
Result Code (whose Request has been
marked for Message Copy), to allow • 2xxx result-code/
copying a Request to DAS. experimental-result-code
• Any result/
experimental-result-code
Default: 2xxx result-code/
experimental-result-code
DAS Answer Result Code Result Code/Experimental Result Code Format: radio buttons
that should match with DAS Message
Range:
Copy Answer Result Code, to terminate
the Message Copy to DAS. • 2xxx result-code/
experimental-result-code
• Any result/
experimental-result-code
Default: 2xxx result-code/
experimental-result-code
Field (* indicates a
required field) Description Data Input Notes
* Max DAS Retransmission Max Retransmission Attempts for Format: text box; numeric
Attempts DAS-Request
Range: 0-4
A value of 0 indicates that there will not
Default: 0
be any re-transmissions after the first
copy attempt.
3. Enter a unique name for the Configuration Set in the Message Copy Configuration Set Name
field.
4. Select or enter the element values.
5. Click:
• OK to save the new Configuration Set and return to the Message Copy Configuration Sets
page.
• Apply to save the new Configuration Set and remain on this page.
• Cancel to return to the Message Copy Configuration Sets page without saving any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• Any required field is empty (no value was entered).
• The value in any field is not valid or is out of range.
• The Message Copy Configuration Set Name is not unique; it already exists in the system.
When the Message Copy Configuration Sets page opens, the fields are populated with the currently
configured values.
The Message Copy Configuration Set Name cannot be edited.
The fields are described in Message Copy Configuration Set elements.
1. Select Diameter > Configuration > Configuration Sets > Message Copy Configuration Sets.
The Message Copy Configuration Sets page appears.
2. Select the Message Copy Configuration Set you want to edit.
3. Click Edit.
The Message Copy Configuration Sets [Edit] page appears.
4. Update the relevant fields.
5. Click:
• OK to save the changes and return to the Message Copy Configuration Sets page.
• Apply to save the changes and remain on this page.
• Cancel to return to the Message Copy Configuration Sets page without saving any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• The selected Message Copy Configuration Set no longer exists; it has been deleted by another
user.
• Any field is empty (no value was entered) .
• The value in any field is not valid or is out of range.
*Maximum Egress Request Rate The maximum allowed Egress Format: text box; numeric
Request Rate shared by
Range: 100-250000
associated members.
Default: 6000
*Onset Threshold Level 1 (%) When Egress Request Rate Format: text box; numeric
exceeds this percentage of
Range: 2-100
maximum Egress Request Rate,
the Congestion Level is set to 1. Default: 60
*Abatement Threshold Level 1 When Egress Request Rate falls Format: text box; numeric
(%) below this percentage of
Range: 1-100
maximum Egress Request Rate,
the Congestion Level is set to 0. Default: 55
Onset Threshold Level 2 (%) When Egress Request Rate Format: text box; numeric
exceeds this percentage of
Range: 4-100
maximum Egress Request Rate,
the Congestion Level is set to 2. Default: NA
Abatement Threshold Level 2 When Egress Request Rate falls Format: text box; numeric
(%) below this percentage of
Range: 3-100
maximum Egress Request Rate,
the Congestion Level is set to 1. Default: NA
Onset Threshold Level 3 (%) When Egress Request Rate Format: text box; numeric
exceeds this percentage of
Range: 5-100
maximum Egress Request Rate,
the Congestion Level is set to 3. Default: NA
Abatement Threshold Level 3 When Egress Request Rate falls Format: text box; numeric
(%) below this percentage of
Range: 5-100
maximum Egress Request Rate,
the Congestion Level is set to 2. Default: NA
*Convergence Time (msec) (%) The time it will take in Format: text box; pull down
milliseconds to converge on a
Range: 250, 500, 1000, 2000, 4000
4. Click:
• OK to delete the Rate Limiting Configuration Set.
• Cancel to cancel the delete function and return to the Rate Limiting Configuration Sets page.
If OK is clicked and the selected Rate Limiting Configuration Set is referenced by any other Diameter
component or any diameter routing application, an error message appears and the Rate Limiting
Configuration Set is not deleted.
• Select a Pending Transaction Limiting Configuration Set Name in the list, and click Delete to
remove the selected Pending Transaction Limiting Configuration Set.
The Default Pending Transaction Limiting Configuration Set can be edited, but cannot be deleted.
See Deleting a Pending Transaction Limiting Configuration Set.
Field (* indicates a
required field) Description Data Input Notes
Pending Transaction Unique name of the Pending Format: text box; alphanumeric and
Limiting Configuration Transaction Limiting Configuration underscore; must contain at least
Set Name Set. one alpha and must not start with
a digit.
Range: 1- 32 characters
Default: NA
*Maximum Egress The maximum allowed Egress Format: text box; numeric
Pending Transactions Pending Transactions for the Peers
Range: 100-1000000
and Connections within a group.
Default: NA
*Onset Threshold Level 1 When Egress Pending Transactions Format: text box; numeric
(%) exceeds this percentage of
Range: 2-100
maximum Egress Pending
Transactions, the Congestion Level Default: 60
is set to 1.
*Abatement Threshold When Egress Pending Transactions Format: text box; numeric
Level 1 (%) falls below this percentage of
Range: 1-100
maximum Egress Pending
Transactions, the Congestion Level Default: 55
is set to 0.
Onset Threshold Level 2 When Egress Pending Transactions Format: text box; numeric
(%) exceeds this percentage of
Range: 4-100
maximum Egress Pending
Transactions, the Congestion Level Default: NA
is set to 2.
Abatement Threshold When Egress Pending Transactions Format: text box; numeric
Level 2 (%) falls below this percentage of
Range: 3-100
maximum Egress Pending
Transactions, the Congestion Level Default: NA
is set to 1.
Field (* indicates a
required field) Description Data Input Notes
Onset Threshold Level 3 When Egress Pending Transactions Format: text box; numeric
(%) exceeds this percentage of
Range: 6-100
maximum Egress Pending
Transactions, the Congestion Level Default: NA
is set to 3.
Abatement Threshold When Egress Pending Transactions Format: text box; numeric
Level 3 (%) falls below this percentage of
Range: 5-100
maximum Egress Pending
Transactions, the Congestion Level Default: NA
is set to 2.
*Abatement Time (msec) The amount of time in milliseconds Format: text box; numeric
that Egress Pending Transactions
Range: 50-10000
must remain below an abatement
threshold before the Congestion Default: 50
Level is lowered.
• Cancel to return to the Pending Transaction Limiting Configuration Sets page without saving
any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• Any required field is empty (no value was entered).
• The value in any field is not valid or is out of range.
• The Pending Transaction Limiting Configuration Set Name is not unique; it already exists in
the system.
The Default Transaction Configuration Set can be edited, but cannot be deleted. See Deleting a
Transaction Configuration Set.
Field (* indicates a
required field) Description Data Input Notes
*Transaction Unique name of the Transaction Format: text box
Configuration Set Name Configuration Set.
Case-sensitive string: alphanumeric
and underscore (_); must contain at
least one alpha and cannot begin
with a digit.
Range: 1 - 32 characters
Transaction Configuration The rules associated with the Format: Expandable or collapsible
Rules Transaction Configuration Set Name list of rules associated with the
selected Transaction Configuration
Set Name
Application ID The Application ID in the Diameter Format: Hyperlink to the listed
message. attribute
Note: See Using Application IDs to Range: NA
Identify Diameter Applications.
Default: NA
Command Code The Command code in the Diameter Format: Hyperlink to the listed
message. attribute
Note: See Diameter Command Codes. Range: NA
Default: NA
Routing Option Set The Routing Options Set associated Format: Hyperlink to the listed
with the Application ID and attribute
Command Code (if specified).
Range: NA
Note: See Diameter Routing Option
Default: NA
Sets.
Field (* indicates a
required field) Description Data Input Notes
Pending Answer Timer The Pending Answer Time Format: Hyperlink to the listed
associated with Application ID and attribute
Command Code (if specified).
Range: NA
Note: See Diameter Pending Answer
Default: NA
Timers.
Application Route Table The Application Route Table Format: Hyperlink to the listed
associated with Application ID and attribute
Command Code (if specified).
Range: NA
Note: See Diameter Application Route
Default: NA
Tables.
Peer Route Table The Peer Route Table associated Format: Hyperlink to the listed
with Application ID and Command attribute
Code (if specified).
Range: NA
Note: See Diameter Peer Route Tables.
Default: NA
If OK is clicked and the selected Transaction Configuration Set is referenced by any peer node, an
error message appears and the Transaction Configuration Set is not deleted.
Field (* indicates a
required field) Description Data Input Notes
* Name A name of the TTP Configuration Set. Format: text box
Field (* indicates a
required field) Description Data Input Notes
Case-sensitive string:
alphanumeric and underscore (_);
must contain at least one alpha
and cannot begin with a digit.
Range: 1 - 32 characters
Default: NA
* Abatement Recovery Defines the rate of reduction in loss that Format: text box
Rate will be applied to a TTP when the loss
Range: 1- 100
time period has expired.
Default:5
Override Message This attribute is only accessed during Format: text box
Priority Threshold routing and changes to its value will not
Range: 1, 2
impact any pending transactions. When
a pending transaction is rerouted or Default: NA
when a new transaction is processed, the
new attribute value will be used.
When this parameter is set, messages
whose priority is greater than or equal
to this value are immune from diversion
if the TTP's OTR is below its Maximum
ETR attribute value.
Note: If the TTP's OTR is greater or
equal to the TTP's Maximum ETR, the
only transaction exempt from diversion
are NGN-PS transactions with priority=4
(and none of the TTP priority override
transactions are exempt from TTP
diversion). If the TTP's OTR is less than
the TTP's Maximum ETR and you have
enabled TTP priority override, then all
TTP priority override transactions are
also exempt from TTP diversion (as well
as NGN-PS transactions).
Default Reduction The default reduction percentage for a Format: text box
Percentage DOIC overload report if the value is not
Range: 0 - 100
specified.
Default: 0
* Default Validity The default validity duration for a DOIC Format: text box
Duration overload report if the value is not
Range: 0 - 86400 seconds
specified.
Default: 30
Field (* indicates a
required field) Description Data Input Notes
* Rate Convergence The time (in ms) to converge on a per Format: pulldown list
Time second rate. If the rate convergence time
Range: [250, 500, 1000, 2000]
is less than 1000 ms, the rate is
extrapolated. If the rate convergence time Default: 250
is greater than 1000 ms, the rate is
averaged.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• If you attempt to delete a TTP Configuration Set that is already in use.
• If you attempt to delete the default TTP Configuration Set.
the handshake procedure after transport level connection is established, but before diameter capabilities
are exchanged with the peers. The Local Node configuration uses imported certificates/keys and
verification mode. If the handshake fails, the connection is not allowed to be established depending
on the verification mode associated with the connection.
Note the following restrictions:
• If an attempt is made to edit a Connection and the specified Transport Protocol is DTLS, if the
DTLS feature is not activated on the SOAM being used to edit the Connection, an error code is
generated and the Connection information is not be updated in the configuration.
• Upon startup, the value of DtlsFeatureEnabled flag defined in DpiOption table is read, and
depending on its value, the application will or will not send AUTH Extensions in SCTP_INIT and
SCTP_INIT_ACK message while establishing SCTP or DTLS connections.
Note: Any edits to DtlsFeatureEnabled flag defined in DpiOption table after startup will not take
effect until the next diameter process restart.
• Client-side or server-side authentication for a TLS/DTLS connection is supported automatically
when this is required by peer server or peer client.
• When TLS/DTLS is selected for a diameter-initiated connection, the TLS/DTLS parameters defined
by the operator in the local node are applied. The application behavior is related to the local node
Verification Mode selection.
• When TLS/DTLS is selected for a connection and TLS/DTLS cannot be established either due to
a failed key exchange or because the peer does not support TLS/DTLS, the connection is not
allowed.
• TLS/DTLS connections initiated by a Diameter peer are responded to. If TLS/DTLS cannot be
established due to a failed key exchange, the connection is not allowed. A valid certificate and
matching key are required, but you can set the Verification Mode to None to override this behavior.
• You cannot change the security mechanism selected for a connection while the connection is active.
On the Diameter > Configuration > Local Nodes page, you can perform the following actions:
• Filter the list of Local Nodes to display only the desired Local Nodes.
• Sort the list by a column in ascending or descending order, by clicking the column heading (except
IP Addresses). The default order is by Local Node Name in ascending ASCII order.
• Click a field entry for a Local Node.
The Diameter > Configuration > {Item Type} [Filtered] page appears for the selected item.
• Click Insert.
The Diameter > Configuration > Local Nodes [Insert] page appears. You can add a new Local
Node.
The Diameter > Configuration > Local Nodes [Insert] page will not open if any of the following
conditions exist:
• The maximum number of Local Nodes (32) has already been configured.
• There is no Signaling VIP Address available in the signaling Network Element (NE) that can
be added to the Local Node.
• Select a Local Node in the list, and click Edit.
The Diameter > Configuration > Local Nodes [Edit] page appears. You can edit the selected Local
Node.
• Select a Local Node in the list, and click Delete. You can delete the selected Local Node.
Field (* indicates
required field) Description Data Input Notes
* Local Node Name Unique name of the Local Node. Format: string, case-sensitive;
alphanumeric and underscore (_);
cannot start with a digit and must
contain at least one alpha
Range: 1 - 32 characters
Default: NA
* Realm Realm of the Local Node; defines the Format: string consisting of a list
administrative domain with which the of labels separated by dots. A label
user maintains an account relationship. can contain letters, digits, dash (-),
and underscore (_). A label must
begin with a letter, digit, or
underscore, and must end with a
letter or digit. Underscore can be
used only as the first character.
Range: Realm - up to 255
characters; label - up to 63
characters
Default: NA
SCTP Listen Port SCTP listen port number for the Local Format: numeric
Node.
Range: 1024 - 49151
This SCTP Listen Port cannot be the same
Default: 3868
as a Local Initiate Port of a Connection.
Field (* indicates
required field) Description Data Input Notes
Initiator port ranges are divided into
user-assigned and DCL-assigned
sub-ranges.
Note: DCL-assigned sub-ranges is
implemented via OAM, and is restricted
to connections only.
DCL (Diameter Transport Layer) is the
software layer of the stack which
implements diameter transport
connections.
TCP Listen Port TCP listen port number for the Local Format: numeric
Node.
Range: 1024 - 49151
This TCP Listen Port cannot be the same
Default: 3868
as a Local Initiate Port of a Connection.
Initiator port ranges are divided into
user-assigned and DCL-assigned
sub-ranges.
Note: DCL-assigned sub-ranges is
implemented via OAM, and is restricted
to connections only.
DCL (Diameter Transport Layer) is the
software layer of the stack which
implements diameter transport
connections.
DTLS/SCTP Listen The DTLS/SCTP listen port number for Format: numeric
Port the Local Node.
Range: 1024 - 49151
Datagram Transport Layer Security allows
Default: 5658
datagram based applications to
communicate in a way that is designed to
prevent eavesdropping, tampering, or
message forgery. The DTLS protocol is
based on the stream-oriented Transport
Layer Security (TLS) protocol.
TLS/TCP Listen Port The TLS/TCP listen port number for the Format: numeric
Local Node.
Range: 1024 - 49151
TLS (Transport Layer Security) is an
Default: 5658
application layer security protocol that
runs over TCP transport.
RADIUS UDP Server UDP Port numbers used by RADIUS Format: numeric
Ports clients when sending RADIUS messages
Range: 1024 - 49151
to the DSR. If no UDP port is specified
Field (* indicates
required field) Description Data Input Notes
here, this Local Node will not receive Default: NA
requests from RADIUS clients.
Enable RADIUS UDP When checked, this Local Node can send Format: checkbox
Client Ports RADIUS request messages to a RADIUS
Range: NA
server using one of the UDP ports
specified in the RADIUS Client UDP Port Default: unchecked
Range.
RADIUS Client UDP The lowest UDP port number that can be Format: numeric
Port Range Start used to send RADIUS request messages
Range: 1024 - 49151
to a remote RADIUS server.
Default: 2000
Note: If this Local Node does not share
any IP address with any other Local Node,
this Local Node can use the default client
port range start of 2000. However, if this
Local Node shares any IP addresses with
one or more other Local Nodes, this Local
Node can only use the default port range
start of 2000 if none of the other Local
Nodes (that share an IP with this Local
Node) overlaps the port range specified
for this Local Node.
RADIUS Client UDP The highest UDP port number that can be Format: numeric
Port Range End used to send RADIUS request messages
Range: 1024 - 49151
to a remote RADIUS server.
Default: 2499
Note: If this Local Node does not share
any IP address with any other Local Node,
this Local Node can use the default client
port range end of 2499. However, if this
Local Node shares any IP addresses with
one or more other Local Nodes, this Local
Node can only use the default port range
end of 2499 if none of the other Local
Nodes (that share an IP with this Local
Node) overlaps the port range specified
for this Local Node.
Verification Mode: The Certificate Verification Mode for the Format: pulldown list
Local Node. If TLS/TCP or DTLS/SCTP
• Verify None Range: NA
Port is configured, this field sets the
• Verify Peer Verification Mode supported by the Local Default: Verify None
• Fail if No Peer Node.
Certificate
• Verify Client Available certificate types for
Once configuration.
Field (* indicates
required field) Description Data Input Notes
Certificate Type Available certificate types for Format: pulldown list
configuration.
Range: NA
Note: Currently, available for TLS only.
Default: NA
Note: This field is required if TLS/TCP
or DTLS/SCTP Ports are being used.
Certificate Name A list of available X509 TLS Security Format: pulldown list
Certificates.
Range: NA
Note: This field is required if TLS/TCP
Default: NA
or DTLS/SCTP Ports are being used.
* Connection Connection Configuration Set for the Local Format: pulldown list
Configuration Set Node.
Range: configured Connection
Configuration Sets, Default
Connection Configuration Set
* CEX Configuration CEX Configuration Set associated with the Format: pulldown list
Set Local Node.
Range: configured CEX
The entries in the CEX Configuration Set Configuration Sets, Default CEX
field create links to the Diameter > Configuration Set.
Configuration > CEX Configuration Sets
[Filtered] page, which shows only the
selected entry.
The CEX Configuration Set field for the
Local Node is used if the CEX
Configuration Set is not associated with
the Connection.
Field (* indicates
required field) Description Data Input Notes
VIPs are present only in 1+1 Default: NA
Active/Standby configurations
• For static IP addresses, the MP Server
Hostname of the DA-MP that owns the
IP address
Static IP addresses are present only in
Multi-Active N+0 configurations
• For TSAs, the name of the Target Set
to which the IP address corresponds,
followed by -p or -s (for example,
TSA#-p for primary and TSA#-s for
secondary IP Addresses where # is the
Target Set number
TSAs can be present in either, but do
not have to be present at all.
If a TSA is selected and Initiator
Connection Support is enabled,
configuration of a listener to reside
within responder port range is
enforced. If a TSA is selected and
Initiator Connection Support is not
enabled and the provided port is out
of range (1024-65535):
• If existing local node [Edit], the
operation is allowed with a warning
• If new local node [Insert], the
operation is denied with an error
Note: See Adding a Connection for more
information.
If a combination of TSAs are selected
(one from a target set that has Initiator
Connection Support enabled, one that
does not), enforce configuration of the
listener to reside within responder port
range is enforced. An error message is
generated if the connection is
configured incorrectly.
Field (* indicates
required field) Description Data Input Notes
the destination port falls. In order to
provide unambiguous destination ports,
diameter routing provides
non-overlapping port ranges. See
Interpreting Apparent DA-MP
Over-Configuration with Non-overlapping
Target Sets.
• If, during the insertion or updating of a Local Node, the Local Node shares an IP address with
another Local Node, OAM detects an overlap between the two Local Nodes' RADIUS UDP
Server Port List.
• If, during the insertion or updating of a Local Node, the Local Node shares an IP address with
another Local Node, OAM detects an overlap between the two Local Nodes' RADIUS Client
UDP Port Ranges.
• If, during the insertion or updating of a Local Node, the Local Node shares an IP address with
another Local Node, OAM detects an overlap between the inserted/edited Local Node's RADIUS
UDP Server Port List and the other Local Node's RADIUS Client UDP Port Range.
• If, during the insertion or updating of a Local Node, the Local Node shares an IP address with
another Local Node, OAM detects an overlap between the inserted/edited Local Node's RADIUS
Client UDP Port Range and the other Local Node's RADIUS UDP Server Port List.
• The maximum number of Local Nodes (32) per Network Element is already defined in the
system.
• Any required field is empty; no value was entered or selected.
• The entry in any field is not valid (wrong data type or out of the valid range).
• The selected pulldown list entry no longer exists (has been deleted by another user).
• The Local Node Name is not unique; it already exists in the system.
• The FQDN is already assigned to a different Local or Peer Node.
• The SCTP Listen Port and IP Address combination is already assigned to a different Local or
Peer Node.
• The TCP Listen Port and IP Address combination is already assigned to a different Local or
Peer Node.
• The SCTP Listen Port or the TCP Listen Port is already used as a Local Initiate Port of a
Connection.
• An invalid entry is set for DTLS/SCTP Listen Port.
• You are not allowed to configure Local Node if configured TCP Listen Port + Ip Address
combination conflicts with an existing TLS/TCP Listen Port + Ip Address combination or
configured TLS/TCP Listen Port + Ip Address combination conflicts with an existing TCP or
TLS/TCP Listen Port + Ip Address combination.
• You are not allowed to configure Local Node if configured SCTP Listen Port + Ip Address
combination conflicts with an existing DTLS/SCTP Listen Port + Ip Address combination or
configured DTLS/SCTP Listen Port + Ip Address combination conflicts with an existing SCTP
or DTLS/SCTP Listen Port + Ip Address combination.
• An invalid entry is set for Certificate Type.
• If TLS/TCP orDTLS/SCTP are configured, you cannot set an empty string for Certificate Type.
• You attempt to delete a Certificate from the active NOAM that is being referenced by a Local
Node.
• You attempt to configure Certificate Name with an invalid certificate name.
• You attempt to configure Certificate Name when replication from an active NOAM to the
SOAM is not functioning.
• You attempt to configure Certificate Name with Certificates that have not been audited.
• You cannot configure a Local Node if it conflicts with existing port configurations.
• If you attempt to configure a Local Node if it conflicts with existing port configurations.
• If you attempt to configure a blacklisted port.
• Any of the selected IP Addresses is duplicated
4. Click:
• OK to save the data and return to the Diameter > Configuration > Local Nodes page.
• Apply to save the data and remain on this page.
• Cancel to return to the Diameter > Configuration > Local Nodes page without saving any
changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• You are not allowed to edit Local Node if edited TCP Listen Port + Ip Address combination
conflicts with an existing TLS/TCP Listen Port + Ip Address combination or edited TLS/TCP
Listen Port + Ip Address combination conflicts with an existing TCP or TLS/TCP Listen Port +
Ip Address combination.
• You are not allowed to edit Local Node if edited SCTP Listen Port + Ip Address combination
conflicts with an existing DTLS/SCTP Listen Port + Ip Address combination or edited
DTLS/SCTP Listen Port + Ip Address combination conflicts with an existing SCTP or DTLS/SCTP
Listen Port + Ip Address combination.
• The selected Local Node no longer exists; it has been deleted by another user
• The selected IP Address or Connection Configuration Set has been deleted by another user
• Any required field is empty; no value was entered or selected
• The entry in any field is not valid (wrong data type or out of the valid range)
• The selected pulldown list entry no longer exists (has been deleted by another user)
• The edited FQDN is already assigned to a different Local or Peer Node
• The edited IP Address and SCTP Listen Port combination is already assigned to a different
Local Node or Peer Node
• The edited IP Address and TCP Listen Port combination is already assigned to a different Local
Node or Peer Node
• The selected SCTP Listen Port or TCP Listen Port is already used as a Local Initiate Port of a
connection
• The Local Node is supported via any front end, but the selected Local Node is referenced by at
least one administratively enabled Discovery Attributes instance.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• The selected Local Node no longer exists (it was deleted by another user), an error message is
displayed and the Local Nodes view is refreshed.
• The Local Node is supported via any front end, but the selected Local Node is referenced by at
least one Discovery Attributes instance.
The Diameter > Configuration > Peer Notes [Edit] page appears. You can edit the selected Peer
Node.
• Select a Peer Node in the list, and click Delete. You can delete the selected Peer Node.
Field (* indicates
required field) Description Data Input Notes
* Peer Node Name Unique name of the Peer Node. Format: string, case-sensitive;
alphanumeric and underscore
(_); cannot start with a digit and
must contain at least one alpha
Range: 1 - 32 characters
Field (* indicates
required field) Description Data Input Notes
AAA Protocol Specifies the AAA protocol for this Peer Format: pulldown list
Node, which defines the Peer Node as
Range: Diameter or RADIUS
Diameter or RADIUS.
Default: NA
* FQDN Unique Fully Qualified Domain Name; Format: string consisting of a list
specifies exact location in the tree of labels separated by dots. A
hierarchy of the DNS. label must contain letters, digits,
dash (-), and underscore (_). A
label must begin with a letter or
underscore, and must end with
a letter or digit. Underscore can
be used only as the first
character.
Range: FQDN - up to 255
characters; label - up to 63
characters
SCTP Listen Port SCTP Listen Port Number for the Peer Format: numeric
Node.
Range: 1024 - 65535
The SCTP Enabled box must be checked
Default: 3868
before a value can be entered in this field.
TCP Listen Port TCP Listen Port Number for the Peer Format: numeric
Node.
Range: 1024 - 65535
The TCP Enabled box must be checked
Default: 3868
before a value can be entered in this field.
DTLS/SCTP Listen Port The DTLS/SCTP listen port number for Format: numeric
the Peer Node.
Range: 1024 - 65535
Datagram Transport Layer Security
Default: 5658
allows datagram based applications to
communicate in a way that is designed to
prevent eavesdropping, tampering, or
message forgery. The DTLS protocol is
Field (* indicates
required field) Description Data Input Notes
based on the stream-oriented Transport
Layer Security (TLS) protocol.
TLS/TCP Listen Port The TLS/TCP listen port number for the Format: numeric
Peer Node.
Range: 1024 - 65535
TLS (Transport Layer Security) is an
Default: 5658
application layer security protocol that
run over TCP transport.
RADIUS UDP Server UDP ports that serve (server port) as a Format: numeric
Ports destination port for messages from
Range: 1024 - 49151
DA-MP to this Peer Node (representing
a RADIUS server). When the Peer Node Default: NA
is representing a RADIUS server, this
represents the UDP ports that can serve
as a destination port for requests
forwarded by DSR to the RADIUS server.
A RADIUS client connection associated
with the Peer Node must select one of
these ports as a destination port during
connection configuration to actually have
DSR forward requests to the RADIUS
server at the selected destination port.
IP Addresses IP address, or addresses, available for Format: numeric
establishing Diameter transport
Range: up to 128 valid IP
connections to the Peer Node.
Addresses
View - Each Peer Node entry displays a
+ sign and the number of IP Addresses
assigned to that Peer Node. Click the +
sign to display the IP Addresses; the +
sign changes to a - sign. Click the - sign
to display the number again.
[Insert] and [Edit] - The field contains an
Add button that can be clicked up to 127
times to create 128 text boxes for IP
Addresses. Each entry is numbered, to
indicate the number of IP Addresses that
have been added.
Dynamic Indicates whether or not the Peer Node Format: checkbox (read-only on
was created dynamically (YES) or the Peer Nodes [Edit] page)
statically (NO). NO is assigned for all Peer
Range: checked (the Peer Node
Node instances, except for those created
was created as a result of
via Dynamic Peer Discovery. If you
Dynamic Peer Discovery),
attempt to edit a Peer Node whose
unchecked
Dynamic attribute is Yes, several of the
Default: unchecked
Field (* indicates
required field) Description Data Input Notes
GUI page attributes will be rendered
read-only.
Note: This element is not displayed on
the Peer Nodes [Insert] page.
Alternate Implicit Route Route List to use for routing messages to Format: pulldown list
this Peer Node if all Peer Routing Rules
Range: configured Route Lists
and implicit Peer Routes are unavailable.
Default: -Select-
Each entry in the Alternate Implicit
Route column on the View page is a link
to the Diameter > Configuration > Route
List [Filtered] page for the selected entry
only.
Replace Dest Realm If checked, the Destination Realm AVP of Format: check box
outgoing messages will be overwritten
Range: checked, unchecked
with this Peer Node Realm.
Default: unchecked
Replace Dest Host If checked, the Destination Host AVP of Format: check box
outgoing messages will be overwritten
Range: checked, unchecked
with this Peer Node FQDN.
Default: unchecked
Topology Hiding Status If Enabled, Diameter Topology Hiding Format: pulldown list
will be applicable to this Peer Node.
Range = Disabled, Enabled
See Diameter Topology Hiding.
Default = Disabled
Field (* indicates
required field) Description Data Input Notes
Alternate Routing On Indicates whether to perform alternate Format: radio buttons
Answer Timeout routing on the same connection or on
Range: Same Peer, Different
alternate connections to the same Peer
Peer, Same Connection
before selecting the next eligible Peer of
a Peer Route Group, when an Answer Default: Different Peer
Timeout occurs.
Transaction A configuration managed object that Format: pulldown
Configuration Set allows independent grouping of
Range: Default, configured
transaction configuration rules for varying
Transaction Configuration Sets
use case needs.
Default: Not Selected
For example, an ingress Peer Node can
optionally use this configuration for
routing and transaction parameters
(ART/PRT/ROS/PAT) selection. Up to
100 of such containers are supported for
grouping transaction configuration rules.
Application Route Table The Application Route Table associated Format: pulldown list
with this Peer Node.
Range: Default, configured
If Application Route Table is set to is Not Application Route Tables
Selected, search Default Transaction
Default: Not Selected
Configuration Set and apply
longest/strongest match. Use ART
associated with best match, if any is
found.
Peer Route Table The Peer Route Table associated with the Format: pulldown list
Peer Node.
Range: Default, configured Peer
If Peer Route Table is set to Not Selected, Route Tables
search Default Transaction Configuration
Default: Not Selected
Set and apply longest/strongest match.
Use PRT associated with best match, if
any is found.
Field (* indicates
required field) Description Data Input Notes
Ingress Routing Option The Routing Option Set associated with Format: pulldown list
Set this ingress Peer Node.
Range: Default, configured
If Ingress Routing Option Set is set to Not Routing Option Sets
Selected, search Default Transaction
Default: Not Selected
Configuration Set and apply
longest/strongest match. Use ROS
associated with best match, if any is
found.
Egress Pending Answer The Pending Answer Timer associated Format: pulldown list
Timer with the egress Peer Node.
Range: Default, configured
If Egress Pending Answer Timer is set to Pending Answer Timers
Not Selected, search Default Transaction
Default: Not Selected
Configuration Set and apply
longest/strongest match. Use PAT
associated with best match, if any is
found.
Message Priority Setting Defines the source of Message Priority for Format: radio buttons
a request message arriving on a
Range: None, Read from
Connection associated with the Peer
Request Message, User
Node.
Configured
The Message Priority setting for the
Default: None
Connection takes precedence over the
Message Priority setting for the Peer
Node.
Possible settings are:
• None - use the Default Message
Priority Configuration Set
• Read from Request Message - read the
Message Priority from the ingress
Request
• User Configured - Apply the
user-configured Message Priority
Configuration Set
Message Priority The Message Priority Configuration set Format: pulldown list
Configuration Set used if User Configured is selected for the
Range: Default, configured
Message Priority Setting
Message Priority Configuration
Sets
Default: -Select-
Peer Node Group Name A group of Peer Nodes that share Format: unique string,
common characteristics and attributes. case-sensitive; alphanumeric
and underscore (_); cannot start
Field (* indicates
required field) Description Data Input Notes
This group is used by IPFE for Peer Node with a digit and must contain at
Group Aware connection distribution. least one alpha
Range: 1 - 32 characters
AVP Removal List The AVP Removal List associated with See Diameter AVP Removal Lists.
this Peer Node
Traffic Throttle Point The number of TTPs. See Diameter Traffic Throttle
Points.
An IP address is optional if a Primary DNS Server IP Address is configured. See Diameter DNS
Options.
To add the first IP Address, enter the IP address in the text box.
To add another IP Address, click Add and enter the IP Address in the new text box. See Table 22:
Peer Node Configuration Elements for limitations on the number of IP addresses you can add.
13. Select a Route List from the Alternate Implicit Route pulldown list
This field is optional. This Route List will be used for routing if a message does not match any of
the configured Peer Routing Rules and implicit routes are exhausted.
14. To overwrite the Destination Realm of outgoing messages to the peer with the Peer Realm, click
the Replace Dest Realm check box (a check mark appears in the box).
15. To overwrite the Destination Host of outgoing messages to the peer with the Peer Node's FQDN,
click the Replace Dest Host check box (a check mark appears in the box).
16. In the Minimum Connection Capacity text box, enter the minimum number of Connections that
must be Available for the Peer to be Available.
17. In the Maximum Alternate Routing Attempts text box, enter the maximum number of times that
a Request can be rerouted to this Peer.
18. Select the Alternate Routing on Connection Failure radio button to indicate whether or not to
perform alternate routing to the same or a different Peer when a Connection failure occurs.
19. Select the Alternate Routing on Answer Timeout radio button to indicate whether or not to perform
alternate routing to the same or a different Peer, or the same Connection, when an Answer Timeout
occurs.
20. Select the Alternate Routing on Answer Result Code radio button to indicate whether or not to
perform alternate routing to the same or a different Peer when a Reroute on Answer Result Code
occurs.
21. Select a Message Priority Setting to indicate the source of message priority for request messages
arriving on Connections associated with the Peer Node.
22. If Message Priority Setting is set to User Configured, specify the Message Priority Configuration
Set that is used to determine message priority.
23. Select a Transaction Configuration Set from the pulldown.
This allows independent grouping of transaction configuration rules for varying use case needs.
24. Select the Application Route Table for this Peer Node. See Selecting Peer Node Application Route
Tables for selection criterion.
25. Select the Peer Route Table to specify which Peer Routing Rules are used when routing messages
from the Peer Node. See Selecting Peer Node Peer Route Tables for selection criterion.
26. Select the Ingress Routing Option Set to specify which options are used for this ingress Peer Node.
See Selecting Peer Node Ingress Routing Option Sets for selection criterion.
27. A Pending Transaction Timer limits the time that DRL will wait for an Answer response after
forwarding a Request message to an upstream Peer Node. When this time-limit is exceeded, DRL
will abandon invoke message rerouting. Select the Egress Pending Answer Timer to specify how
long diameter waits for a response from the Peer Node. When DRL selects a viable Connection for
forwarding a Request message to an upstream Peer Node, it determines which Pending Answer
Timer value to use based on the following precedence selection rules, highest to lowest priority.
See Selecting Peer Node Egress Pending Answer Timers for selection criterion.
• Search Default TCS and apply longest/strongest match. Use PRT associated with best match,
if any is found.
• Default PRT.
A Pending Answer Timer with a value > 10 seconds is considered a Long Timeout Pending Answer
Timer. Long Timeout Pending Answer Timers are intended for Diameter Applications that can
have long transaction times (for example: SLg). Because Requests assigned to Long Timeout Pending
Answer Timers might hold internal resources (for example, PTRs, PDUs) for extended periods,
this traffic uses a separate PTR Pool from standard Diameter traffic. It is expected that a very small
percentage (< 2%) of overall traffic would be assigned to Long Timeout Pending Answer Timers,
and users should configure the smallest timeout value acceptable based on the overall transaction
path.
• OK to save the changes and return to the Diameter > Configuration > Peer Nodes page.
• Apply to save the changes and remain on this page.
• Cancel to return to the Diameter > Configuration > Peer Nodes page without saving any
changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• You are not allowed to configure Peer Node if configured TCP Listen Port + Ip Address
combination conflicts with an existing TLS/TCP Listen Port + Ip Address combination or
configured TLS/TCP Listen Port + Ip Address combination conflicts with an existing TCP or
TLS/TCP Listen Port + Ip Address combination.
• You are not allowed to configure Peer Node if configured SCTP Listen Port + Ip Address
combination conflicts with an existing DTLS/SCTP Listen Port + Ip Address combination or
configured DTLS/SCTP Listen Port + Ip Address combination conflicts with an existing SCTP
or DTLS/SCTP Listen Port + Ip Address combination.
• You are not allowed to configure Peer Node with same port value for TCP and TLS/TCP. Also
same port value shall not be allowed for DTLS/SCTP Port and SCTP port.
• The maximum number of Peer Nodes per Network Element (16000) is already defined in the
system
• Any required field is empty; no value was entered or selected
• The entry in any field is not valid (wrong data type or out of the valid range)
• The selected Alternate Implicit Route (Route List) no longer exists; it was deleted by another
user during this Insert session
• The Peer Node Name is not unique; it already exists in the system
• The FQDN is already assigned to a different Local or Peer Node
• You attempted to delete a Peer Node that is referenced by at least on connection.
• You attempted to configure a previously assigned IP address and SCTP Listen Port combination
(to a Peer or Local Node).
• The SCTP Listen Port and IP Addresses combination is already assigned to a different Local
or Peer Node
• You attempted to configure a previously assigned IP address and TCP Listen Port combination
(to a Peer or Local Node).
• The TCP Listen Port and IP Addresses combination is already assigned to a different Local or
Peer Node
• The SCTP Listen Port or the TCP Listen Port is already used as a Local Initiate Port of a
Connection
• Any of the selected IP Addresses is duplicated
4. Click:
• OK to save the changes and return to the Diameter > Configuration > Peer Nodes page.
• Apply to save the changes and remain on this page.
• Cancel to return to the Diameter > Configuration > Peer Nodes page without saving any
changes.
If you attempt to edit a Peer Node instance whose Dynamic attribute is YES, the following Peer
Nodes attributes are rendered read-only:
• Realm
• FQDN
• Sort the list by a column in ascending or descending order, by clicking the column heading. The
default order is by Peer Node Group Name in ascending ASCII order.
• Click an entry that is shown in blue in a column, to open the Diameter > Configuration >
<Component> [Filtered] page and display that entry only.
• Click Insert.
The Diameter > Configuration > Peer Node Groups [Insert] page appears. You can add a new
Peer Node Group.
The Diameter > Configuration > Peer Node Groups [Insert] will not open if the maximum number
of Peer Node Groups per Network Element (16000) already exist in the system.
• Select a Peer Node Group in the list, and click Edit.
The Diameter > Configuration > Peer Node Groups [Edit] page appears. You can edit the selected
Peer Node Group.
• Select a Peer Node Group in the list, and click Delete. You can delete the selected Peer Node Group.
Field (* indicates
required field) Description Data Input Notes
*Peer Node Group Unique name of the Peer Node Group. Format: string, case-sensitive;
Name alphanumeric and underscore (_);
This is a group of Peer Nodes that share
cannot start with a digit and must
common characteristics and attributes.
contain at least one alpha
This group is used by IPFE for Peer Node
Group Aware connection distribution. Range: 1 - 32 characters
View - Each Peer Node Group entry Default: none
displays a + sign and the number of Peer
Nodes assigned to that Peer Node Group.
Click the + sign to display the Peer Node
names; the + sign changes to a - sign.
Click the - sign to display the number
again.
Peer Node Name A list of Peer Nodes (identified by their Format: pulldown list that includes
IP addresses), used by the IPFE for Peer the names of all Peer Nodes hat
Node Group Aware connection have not been included in a
distribution. different Peer Node Group yet
Connections from IP addresses in this list Range: configured Peer Node
can be distributed across DA-MPs in a names
TSA to avoid having a single point of
Default: -Select-
failure.
Field (* indicates
required field) Description Data Input Notes
Note: Peer Nodes that share an IP The list of Peer Node Names are
address must be in the same Peer Node hyperlinks. Click on a hyperlink to
Group. view more detail on the selected
Peer Node.
[Insert] and [Edit] - The field contains an
Add button that can be clicked to create Note: If the maximum number
text boxes for Peer Node names. Each (2500) of Peer Node Groups has
entry is numbered, to indicate the already been created, and error is
number of Peer Node names that have displayed.
been added.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• The maximum number of Peer Node Groups (2500) is already defined in the system
• Any required field is empty; no value was entered or selected
• The entry in any field is not valid (wrong data type or out of the valid range)
• The Peer Node Group Name is not unique; it already exists in the system
Connections
A connection provides the reliable transport connectivity between Diameter nodes.
You can perform these tasks on an Active System OAM (SOAM).
A connection:
• Can use the SCTP, TCP, TLS/TCP or DTLS/STCP protocol
• Can be configured to initiate or respond to a connection to the Peer Diameter Node
For a given Peer Node, one Connection can be configured for each local IP Address/Transport/Listen
Port combination. For example, if there is a Local Node that supports two IP Addresses then you can
configure two SCTP Connections for the Peer Node - one for each Local Node IP Address and Listen
Port.
On the Diameter > Configuration > Connections page, you can perform the following actions:
• Filter the list of Connections to display only the desired Connections.
• Sort the list by a column in ascending or descending order, by clicking the column heading. The
default order is by Connection Name in ascending ASCII order.
• Click a field that is shown in blue for a Connection. The blue fields are links to the configuration
pages for those types of items.
The Diameter > Configuration > {Item Type} [Filtered] page appears for the selected type of item.
• Click Insert.
The Diameter > Configuration > Connections [Insert] page appears. You can add a new
Connection.
The Diameter > Configuration > Connections [Insert] does not open if any of the following
conditions exist:
• There is no Local Node in the signaling Network Element (NE) to which the Connection can be
assigned.
• There is no Peer Node in the signaling Network Element (NE) to which the Connection can be
assigned.
• Select a Disabled Connection, and click Edit.
The Diameter > Configuration > Connections [Edit] page appears. You can change the
configuration of the selected Connection.
If the selected Connection is not in the Disabled Admin State, the Diameter > Configuration >
Connections [Edit] page will not open.
Note: For information on disabling a Connection, see Disabling Connections.
• Select a Disabled Connection, and click Delete to delete the Connection.
See IPFE Connections and Capacity Validation for more information.
IPFE Connections
IPFE supports the following connection types:
• Initiator only - indicates that Local Node only initiates the connection to the Peer Nodes.
• Responder only - indicates that Local Node only responds to the connection initiated from the Peer
Node.
• Initiator & Responder - indicates that Local Node initiates the connection in addition to responding
to connections initiated from the Peer Node.
Note: Only IPFE Diameter connections are supported at this time.
Fixed connections are configured with a static DA-MP IP address, where the connections are established
through and bound to the DA-MP. For IPFE Initiator connections, the target set address is the source
address. This provides additional flexibility in assigning and using IP address efficiently in your
configuration. The default is Initiator & Responder, which provides additional flexibility. This allows
you to use any port within a configurable range on any DA-MP within a TSA to initiate connections.
IPFE connections are configured with a public TSA IP address and a static listening port, and IPFE
Initiator connections are configured with a static initiator DA-MP and a public TSA IP address and a
user-selected or automatically selected static initiator port. The IPFE Initiator port range division
depends on the connection type (fixed or IPFE) and the selection method (user-configured or
system-selected).
Note: When overall connection counts are calculated, RADIUS connections are treated like fixed
connections.
Port ranges for fixed (DA-MP) initiator connections are as follows:
Range for user-configured connections 16384-24575
Port ranges for IPFE initiator connections are 1024-49151. You cannot configure a port range outside
of this range; the GUI generates a message and corresponding explanation.
Port ranges for IPFE responder connections are 1024-49151.
Note: You cannot select a port value for IPFE responder, as diameter does not initiate these types of
connections.
Port ranges for IPFE initiator and responder connections are1024-49151 and are fully utilizable by
initiator and responder connections. The port range management (port broker) functionality manages
ports, which avoids conflicts across Initiator and Responder connections. Only one initiator and
responder connection per Diameter Peer Node is supported.
Note: Port Number flexibility combines the Responder and Initiator Port Ranges into one large port
range. It also eliminates per DA-MP port ranges and port ranges set aside for user input or DCL.
Field (* indicates
required field) Description Data Input Notes
* Connection Name Name of the Connection. The name must be unique Format: alphanumeric
in the system. and underscore (_).
Cannot start with a digit
and must contain at
least one alpha (A-Z,
a-z). The name is
case-sensitive.
Range: 1 - 32 characters
Transport Protocol Type of Transport Protocol used by this Connection. Format: radio buttons
The selected Transport Protocol must be supported Range: SCTP, TCP,
by both the associated Local Node and Peer Node. TLS/TCP, DTLS/SCTP,
UDP
If AAA Protocol is selected as RADIUS, only UDP is
offered. Default: SCTP
For Floating (IPFE) Connections, the Transport
Protocol selected for this Connection must be
Field (* indicates
required field) Description Data Input Notes
included in the Supported Protocols for the IPFE
Target Set.
• TCP Connections are not allowed when the Target
Set is configured to be SCTP_ONLY
• SCTP Connections are not allowed when the target
set is configured to be TCP_ONLY
• When the Target Set is configured to be
TCP_AND_SCTP, then both TCP and SCTP
Connections are allowed.
Note: Do not enable IPSEC if the Connection is
configured with TLS/TCP or DTLS/SCTP protocol;
enabling both IPSEC and TLS/TCP or DTLS/SCTP
is not recommended as this would have significant
performance impact.
* AAA Protocol The AAA protocol for this Connection, which defines Format: pulldown list
the Connection as Diameter or RADIUS.
Range: Diameter,
RADIUS
Default: NA
* Local Node Local Node associated with the Connection. Format: pulldown list
The Local Node must use the same Transport Protocol Range: all configured
as the Peer Node. The entries in the Local Node field Local Nodes
are links to the Diameter > Configuration > Local
Default: --Select--
Nodes [Filtered] page, which shows only the selected
entry.
If two IP addresses are configured for the Local Node,
it is recommended that a Secondary IP Address be
configured for the Peer Node. The Peer’s Secondary
IP address is used as a fallback for the initiation of
the SCTP Connection establishment if the Peer’s
primary IP address is unreachable, as well as for the
validation of the IP addresses advertised by the peer
in the INIT/INIT_ACK SCTP chunk.
Note: It is recommended that separate Local Nodes
be used for uni-homed and multi-homed SCTP
Connections.
* Connection Mode The Connection can have one of the following Format: pulldown list
Connection Modes:
Range: Diameter:
• Initiator Only - indicates that the Local Node will Initiator Only,
initiate the Connection to the Peer Node.
Field (* indicates
required field) Description Data Input Notes
Note: If a Initiator Only connection is created and Responder Only,
a TSA selected, check if IPFE Initiator Connection Initiator & Responder
support is enabled on the target set.
RADIUS: RADIUS
• If yes, allow IPFE Initiator Connection support. server, RADIUS client
You must select from the DA-MP's port range
Default: Initiator &
if you want to explicitly configure the initiator
Responder
port.
• If no, IPFE Initiator Connection support is not
allowed.
• Responder Only - indicates that the Local Node
will only respond to the Connection initiated from
the Peer Node. The Local Initiate Port field is not
available when the Responder Only is selected
here.
• Initiator & Responder - indicates that the Local
Node will initiate a Connection to the Peer Node
and respond to Connection initiations from the
Peer Node.
When configured with a TSA and as Initiator &
Responder, the DA-MP uses the TSA as the source
IP address for initiating connections and for all
subsequent signaling traffic over that connection.
• RADIUS Server - indicates that the DSR receives
incoming RADIUS requests from a Peer Node that
is a RADIUS client.
• RADIUS Client - indicates that the DSR sends
RADIUS requests to a Peer Node that is a RADIUS
Server.
The Connection Mode must be the same for all
Connections to the same Peer.
For UNI-HOMED Connections,
• If the Connection Mode is Initiator & Responder
and Peer Node Identification is set to IP Address
for any Connections to the Peer, then the following
combination must be unique for each Connection
to the Peer: Peer FQDN (from Peer Nodes
configuration), Peer Realm (from Peer Nodes
configuration), Transport Protocol, Local IP, Local
Listen Port (from Local Nodes configuration),
Must Include Application IDs in the CEX
Configuration Set.
• If the Connection Mode is Initiator & Responder
and Peer Node Identification is Transport FQDN
or Peer Diameter Identity FQDN for at least one
Field (* indicates
required field) Description Data Input Notes
Connection to the Peer, then the following
combination must be unique for each Connection
to the Peer: Peer FQDN (from Peer Nodes
configuration), Peer Realm (from Peer Nodes
configuration), Transport Protocol, Local IP, Local
Listen Port (from Local Nodes configuration),
Must Include Application IDs in the CEX
Configuration Set.
• The Connection Local IP Address and Local
initiate Port combination cannot be the same as
the Local IP Address and Listen Port combination
of one of the Local Nodes or of another
Connection.
For MULTI-HOMED Connections,
• If the Connection Mode is Initiator & Responder
and Peer Node Identification is set to IP Address
for any Connections to the Peer, then the following
combination must be unique for each Connection
to the Peer: Peer FQDN (from Peer Nodes
configuration), Peer Realm (from Peer Nodes
configuration), Transport Protocol, Local IP Pair,
Local Listen Port (from Local Nodes
configuration), Must Include Application IDs in
the CEX Configuration Set.
• If the Connection Mode is Initiator & Responder
and Peer Node Identification is Transport FQDN
or Peer Diameter Identity FQDN for any
Connections to the Peer, then the following
combination must be unique for each Connection
to the Peer: Peer FQDN (from Peer Nodes
configuration), Peer Realm (from Peer Nodes
configuration), Transport Protocol, Local IP Pair,
Local Listen Port (from Local Nodes
configuration), Must Include Application IDs in
the CEX Configuration Set.
• If the Connection Mode is Initiator & Responder
and Transport FQDN is NOT specified in any
Connections to the Peer, then the following
combination must be unique for each Connection
the Peer: Transport FQDN, Peer Realm, Transport
Protocol, Local IP Pair, Remote IP Pair, Local
Listen Port, Must Include Application IDs.
• The Connection Local IP Address pair and Local
Initiate Port combination cannot be the same as
the Local IP Address pair and Listen Port
combination of one of the Local Nodes or of
another Connection.
Field (* indicates
required field) Description Data Input Notes
Dynamic Indicates whether or not the element was created Format: checkbox
dynamically (YES) or statically (NO). NO is assigned (read-only on the
for all element instances, except for those created via element [Edit] page)
Dynamic Peer Discovery.
Range: checked (the
element was created as
a result of Dynamic
Discovery), unchecked
Default: unchecked
Local Initiate Port The IP source port number to be used when the Format: numeric
Connection is an Initiator.
Range: 16384-24575
This field is not available and is set to Blank when (fixed initiator),
the Connection Mode is Responder Only. 24576-49151 (IPFE
Initiator)
Initiator port ranges are divided into automatically
assigned and DCL-assigned sub-ranges. Depending Default: Blank
on the type of initiator connection, fixed or IPFE, there
are two or more user/DCL sub-ranges.
See Interpreting Apparent DA-MP Over-Configuration
with Non-overlapping Target Sets for more information
about non-overlapping target sets.
DCL (Diameter Transport Layer) is the software layer
of the stack which implements diameter transport
connections.
Note: The user- configurable range is 6384-24575 (for
fixed initiator and based on the MP for IPFE Initiator).
However, it is recommended that the port not be
configured, and left for diameter to manage. If a port
is not provided when configuring a connection, the
DCL selects an ephemeral port from the initiator
connection range (24576-49151).
If the connection remains fixed, a warning is
generated if the configured port is out of range for
an Initiator Connection type. If you convert the fixed
initiator connection to an IPFE Initiator Connection,
you must select from the DA-MP's port range if you
want to explicitly configure the initiator port. See
Connection Capacity Dashboard Functions for more
information about fixed and IPFE Initiator
connections.
UDP Port For RADIUS Server connections, this is the UDP port Format: pulldown list
on which the DSR expects to receive incoming
Range: Local (RADIUS
RADIUS requests for this connection. For RADIUS
server connection s) or
Client connections, this is the UDP port at the
Peer Node (RADIUS
Field (* indicates
required field) Description Data Input Notes
destination Peer Node which will receive the RADIUS client connections) UDP
request sent by the DSR. port numbers
Default: NA
IP Owner Identifies the DA-MP which owns this Connection Format: read-only
attribute. Each RCL instance will ignore Connection
Range: IP owner
attributes that are not exclusively assigned to its local
DA-MP. Default: --Select--
* Primary Local IP The IP address to be used as Primary Local Node Format: pulldown list
Address Address for this Connection.
Range: all configured IP
A Local Node must be selected before the pulldown addresses for the
list becomes available, containing the IP Addresses selected Local Node
corresponding to the selected Local Node.
Default: --Select--
When configuring Diameter TCP Connections, only
MP static IP addresses, Primary TSAs and Secondary
TSAs can be selected as the Primary Local IP Address.
If an IPFE Secondary Target Set Address (selected
from the Local Node's IP Address list) is assigned to
the Primary Local IP Address of a Diameter
Connection, then the Secondary Local IP Address
selection is disabled. In this case, a Uni-homed
Connection is configured, but using the Target Set's
Secondary IP address as the only Local IP Address
for the Connection.
Note: Uni-homed and multi-homes are applicable
only to SCT/Diameter connections; they are not
applicable to RADIUS/UDP connections.
When configuring RADIUS connections, only MP
static IP addresses can be selected as Primary Local
IP Address.
Each IP address in the pulldown list has an
identifying tag appended to it, as follows:
• In Active/Standby DA-MP NEs, a DA-MP VIP is
appended with (VIP).
• In Multiple-Active DA-MP NEs, a static IP address
owned by the DA-MP is appended with the Server
Hostname of the DA-MP, for example, (DA-MP1).
• IPFE Target Set Addresses are appended with the
Target Set Name, for example, (TSA1).
• For each IPFE Connection listed on the View
screen, the Primary Local IP Address field
displays (TSA#-p) or (TSA#-s) after the IP address,
where # is the Target Set number, -p is a Primary
TSA, and -s is a Secondary TSA.
Field (* indicates
required field) Description Data Input Notes
Secondary Local IP The IP address to be used as the Secondary Local Format: pulldown list
Address Node Address for this Connection.
Range: all configured IP
A Local Node must be selected and the selected addresses for the
Connection Transport Protocol must be SCTP before selected Local Node
the list becomes available, containing the IP
Note: Primary TSAs,
Addresses of the selected Local Node.
labeled TSA#-p, are not
Note: SCTP can be selected as a protocol only for valid for selection.
Diameter connections.
Default: --Select--
IPFE Target Set Addresses are appended with the
Target Set Name, for example, (TSA1).
If an IPFE Primary Target Set Address (selected from
the Local Node's IP Address list) is assigned to the
Primary Local IP Address of a Diameter Connection,
then the only valid selection for the Secondary Local
IP Address is the corresponding IPFE Secondary
Target Set Address (for example- if TSA1-p is
assigned to Primary Local IP Address of a diameter
Connection, then the only valid selection for the
Secondary Local IP Address will be TSA1-s.)
This address is used only for SCTP Multi-homing; it
must be different from the selected Primary Local IP
Address. An IPFE Primary TSA and a Secondary TSA
cannot be identical.
Each IP address in the pulldown list has an
identifying tag appended to it, as follows:
• In Active/Standby DA-MP NEs, a DA-MP VIP is
appended with (VIP).
• In Multiple-Active DA-MP NEs, a static IP address
owned by the DA-MP is appended with the Server
Hostname of the DA-MP, for example, (DA-MP1).
• IPFE Target Set Addresses are appended with the
Target Set Name, for example, (TSA1).
• For each IPFE Connection listed on the View
screen, the Primary Local IP Address field
displays (TSA#-p) or (TSA#-s) after the IP address,
where # is the Target Set number.
• For each IPFE SCTP Multi-Homed Connection
listed on the View screen, the Secondary Local IP
Address field displays (TSA#-s) after the IP
address, where # is the Target Set number. and -s
is Secondary TSA.
Note: SCTP can be selected as a protocol only for
Diameter connections.
Field (* indicates
required field) Description Data Input Notes
IPFE Initiator DAMP The IPFE Initiator DA-MP for this connection. Format: pulldown list
When the addition of a new IPFE Connection is being Range: available DA-MP
validated, OAM validates that the addition of the IP addresses configured
IPFE Connection does not cause, for each DA-MP in for the TSA selected for
the subject Target Set, the total number of Primary Local IP
Connections allocated to the DA-MP, to exceed the Address
DA-MP's total capacity. If the available capacity on
Default: --Select-- or
one or more DA-MPs in the subject Target Set is less
IPFE Initiator DA-MP
than zero and any DA-MP in the subject Target Set
is included in more than one Target Set, OAM allows
the IPFE Connection to be added, but also issues a
warning message.
If the validation fails and the subject Target Set does
not overlap any other Target Set, OAM computes the
available capacity for the entire subject Target Set (by
computing available capacity for each DA-MP and
summing them). If the Target Set available capacity
is less than zero, the validation fails and an error code
is generated.
* Peer Node Peer Node associated with the Connection. Format: pulldown list
The Peer Node must use the same IP protocol as the Range: all configured
Local Node. The entries in the Peer Node field are Peer Nodes
links to the Diameter > Configuration > Peer Nodes
Default: --Select--
[Filtered] page which shows only the selected entry.
Peer Node Specifies how the peer node's IP address(es) is Format: radio buttons
Identification derived when initiating a connection to the peer, and
Range: None, IP
whether the peer node's IP address(es) is validated
Address
when responding to a connection from the peer.
Default: IP Address
Transport FQDNs use the remote IP address(es)
configured for this Connection when initiating a
connection to the peer, and to validate the peer node's
IP address(es) when responding to a connection from
the peer.
Use the remote IP address(es) configured for this
Connection when initiating a connection to the peer
and to validate the peer node's IP address(es) when
responding to a connection from the peer.
If no IP Address has been selected and no Transport
FQDN has been specified, then the only accepted
choice is Peer Diameter identity FQDN.
Use None for this connection when responding to a
connection from the peer and do not validate the peer
node's IP address(es).
Field (* indicates
required field) Description Data Input Notes
Use the DNS resolved FQDN address configured for
the Peer Node associated with this Connection when
initiating a connection to the peer, and do not validate
the peer node's IP address(es) when responding to a
connection from the peer.
The FQDN configured for the Connection takes
precedence over the Peer's Diameter Identity FQDN.
• If the Peer Node Identification is set to IP Address,
then the Transport FQDN field cannot be changed
and the Peer IP Address pulldown lists are
available.
• If the Peer Node Identification is set to Transport
FQDN, then the Peer IP Address pulldown lists
are not available and the Transport FQDN field
can be changed.
• If the Peer Node Identification is set to Peer
Diameter Identity FQDN, then both the Transport
FQDN field and the Peer IP Address pulldown
lists are not available.
Primary Peer IP The IP Address to be used as the Primary Peer Node Format: pulldown list
Address address for this Connection.
Range: available IP
A Peer Node must be selected before the pulldown addresses
list becomes available, containing the IP Addresses
Default: --Select--
of the selected Peer Node.
Secondary Peer IP The IP Address to be used as the Secondary Peer Format: pulldown list
Address Node address for this Connection.
Range: available IP
A Peer Node must be selected and the selected addresses
Connection Transport Protocol must be SCTP before
Default: --Select--
the pulldown list becomes available, containing the
IP Addresses of the selected Peer Node.
This address is used only for SCTP Multi-homing; it
must be different from the selected Primary Peer IP
Address.
Transport FQDN Fully Qualified Domain Name for this Connection. Format: case-insensitive
string consisting of a list
The Transport FQDN is used for DNS lookup when
of labels separated by
Peer Node Identification is set to Transport FQDN.
dots. A label can contain
If a Responder Only connection is created without a letters, digits, dash (-),
Peer Node IP Address and Transport FQDN is and underscore (_). A
selected, Transport FQDN is required even though label must begin with a
it is not applicable. In this case, an error code is letter, digit, or
generated (when using Transport FQDN with underscore, and must
Initiator connections. end with a letter or
Field (* indicates
required field) Description Data Input Notes
digit. Underscore can be
used only as the first
character.
Range: FQDN - up to
255 characters; label - up
to 63 characters
* Connection Connection Configuration Set associated with the Format: pulldown list
Configuration Set Connection.
Range: all configured
The entries in the Connection Configuration Set field Connection
are links to the Connection Configuration Sets Configuration Sets,
(Filtered) page, which displays the attributes of only Default Connection
the selected entry. Configuration Set.
Default: --Select--
CEX Configuration CEX Configuration Set associated with the Format: pulldown list
Set Connection.
Range: all configured
The entries in the CEX Configuration Set field are CEX Configuration Sets,
links to the CEX Configuration Sets (Filtered) page, "Default" CEX
which shows only the selected entry. Configuration Set.
Default: --Select--
* Capacity Capacity Configuration Set associated with the Format: pulldown list
Configuration Set Connection. The Capacity Configuration Set defines
Range: all configured
reserved and maximum ingress message processing
Capacity Configuration
rates and alarms thresholds for this Connection.
Sets, "Default" Capacity
The entries in the Capacity Configuration Set field Configuration Set
are links to the Capacity Configuration Sets
Default: "Default"
(Filtered) page, which displays only the selected
Capacity Configuration
entry.
Set
The addition of any Connection having non-zero
Reserved Ingress MPS is subject to capacity validation
rules, which are discussed in the Connection Capacity
Validation content.
See the MP Profiles information in Diameter Common
User's Guide.
* Remote Busy Defines which Request messages can be forwarded Format: pulldown list
Usage on this Connection after receiving a
Range: Disabled,
Enabled
Field (* indicates
required field) Description Data Input Notes
DIAMETER_TOO_BUSY response from the Default: Disabled
Connection's Peer.
Disabled The Connection is not considered to be
BUSY after receiving a
DIAMETER_TOO_BUSY response. All
Request messages continue to be
forwarded to (or rerouted to) this
Connection.
Enabled The Connection is considered to be BUSY
after receiving a DIAMETER_TOO_BUSY
response. No Request messages are
forwarded to (or rerouted to) this
Connection until the Remote Busy
Abatement Timeout expires.
Remote Busy If Remote Busy Usage is set to Enabled or Host Format: numeric
Abatement Timeout Override, this defines the length of time in seconds
Range: 3 - 60 seconds
that the Connection will be considered BUSY from
the last time a DIAMETER_TOO_BUSY response was Default: 5 seconds
received.
Message Priority Defines the source of Message Priority for a Request Format: radio buttons
Setting message arriving on the Connection. Possible settings
Range: None, Read from
are:
Request Message, User
• None - use the Default Message Priority Configured
Configuration Set
Default: None
• Read from Request Message - read the message
priority from the ingress Request (--- appears in
the Message Priority Configuration Set column)
• User Configured - Apply the user-configured
Message Priority Configuration Set selected for
the Connection
Message Priority The Message Priority Configuration set used if Format: pulldown list
Configuration Set Message Priority Setting is User Configured
Range: all configured
Message Priority
Configuration Sets
Default: None
Egress Message Egress Message Throttling Configuration Set Format: pulldown list
Throttling associated with the Connection. The Egress Message
Range: all configured
Configuration Set Throttling Configuration Set defines the maximum
Egress Message
Egress Message Rate and thresholds used to set the
Throttling
congestion level for the Connection.
Configuration Sets
The entries in the Egress Message Throttling
Configuration Set field are links to the Egress
Field (* indicates
required field) Description Data Input Notes
Message Throttling Configuration Sets (Filtered) Default: None (--- is
page, which displays only the selected entry. displayed in the
column)
Shared Secret The Shared Secret Configuration Set used for this Format: pulldown list
Configuration Set Connection.
Range: all configured
(RADIUS only)
Shared Secret
Configuration Sets
Default: -Select-
Message The Message Authenticator Configuration Set used Format: pulldown list
Authenticator for this Connection.
Range: all configured
Configuration Set
Message Authenticator
(RADIUS only)
Configuration Sets
Default: -Select-
Ingress Status-Server The Ingress Status-Server Configuration Set used for Format: pulldown list
Configuration Set this Connection.
Range: all configured
(RADIUS only)
Ingress Status-Server
Configuration Sets
Default: -Select-
Suppress If checked, this suppresses the connection attempts Format: check box
Connection on the unavailable connections when a connection
Range: checked (YES) or
Unavailable Alarm attribute is configured and turned ON for the
unchecked (NO)
connection object, then the connection unavailable
alarm on those connections is not raised. Default: unchecked
Suppress If checked, suppresses the connection attempts when Format: check box
Connection a diameter peer nodes status becomes available.
Range: checked (YES) or
Attempts
This attribute is not applicable for responder only unchecked (NO)
connection modes. It is only applicable for initiator
Default: unchecked
only and initiator and responder connection modes.
With any configuration edit action that results in
connection mode to responder only mode, the
attribute value is returned to the default value.
Test Mode If checked, the Connection is in Test Mode. Format: check box
Range: checked (YES),
not checked (NO)
Field (* indicates
required field) Description Data Input Notes
Default: not checked
Viewing Connections
Use this task to view currently configured connections.
Select Diameter > Configuration > Connections.
The Diameter > Configuration > Connections page appears.
Adding a Connection
Use this task to create a new Connection. The fields and configuration considerations are described
in Diameter Connection configuration elements.
1. Select Diameter > Configuration > Connections.
The Diameter > Configuration > Connections page appears.
2. Click Insert.
The Diameter > Configuration > Connections [Insert] page appears.
The Diameter > Configuration > Connections [Insert] will not open if any of the following
conditions exist:
• There is no Local Node in the signaling Network Element (NE) to which the Connection can be
assigned.
• There is no Peer Node in the signaling Network Element (NE) to which the Connection can be
assigned.
3. Enter a unique name for the Connection in the Connection Name field.
4. Select a AAA Protocol.
5. Select the radio button for SCTP, TCP, TLS/TCP, DTLS/SCTP, or UDP in the Transport Protocol
field.
The Transport Protocol that you select for your Connection must match the protocol supported by
both the Local Node and the Peer Node for the Connection.
6. Select a Local Node for the Connection from the pulldown list.
The Local Node must use the same IP protocol as the Peer Node you select. If you do not see the
Local Node you want to use, you might need to create a new Local Node. See Adding a Local Node.
7. Select the Connection Mode for this Connection from the pulldown list. See Diameter Connection
configuration elements.
8. If you set up the Connection Mode for Initiator Only, you can optionally enter a Local Initiate Port
number in the field.
9. Select the Primary Local IP Address of this Connection from the pulldown list.
10. If the Transport Protocol is set to SCTP, select the Secondary Local IP Address of this Connection
from the pulldown list.
11. Select a IPFE Initiator DAMP from the pulldown list.
13. Select the radio button for the type of Peer Node Identification to be used for this Connection.
14. If needed, select the Primary Peer IP Address of this Connection from the Primary Peer IP Address
pulldown list.
15. If needed, select the Secondary Peer IP Address of this Connection from the Secondary Peer IP
Address pulldown list.
16. If needed, enter a Transport FQDN for this Connection.
17. Select a Connection Configuration Set for this Connection from the pulldown list.
18. If one is needed, select a CEX Configuration Set for this Connection from the pulldown list .
19. If the Per Connection Ingress MPS Control feature is active in the system, select a Capacity
Configuration Set for the Connection from the pulldown list.
20. Specify the Transport Congestion Abatement Timeout.
21. Select a Remote Busy Usage setting from the pulldown menu.
22. If you selected Enabled or Host Override for Remote Busy Usage, set the Remote Busy Abatement
Timeout value.
23. Identify the source of Message Priorities for incoming requests by selecting a Message Priority
Setting.
24. If you selected User Configured as the Message Priority Setting, select a Message Priority
Configuration Set from the pulldown menu.
25. Make selections from the Egress Message Throttling Configuration Set, Shared Configuration
Set, Message Authenticator Configuration Set, and Ingress Status-Server Configuration Set
pulldown menus.
26. If you want to suppress the Connection unavailable alarm, click the Suppress Connection
Unavailable Alarm check box (the box is checked).
27. If you want to suppress the Connection attempts to a standby Peer Node, click the Suppress
Connection Attempts check box (the box is checked).
28. If you want this Connection to be a test Connection, click the Test Mode check box (the box is
checked).
29. Click:
• OK to save the data and return to the Diameter > Configuration > Connections page.
Note: This assumes that all validation checks pass.
• Apply to save the data and remain on this page.
• Cancel to return to the Diameter > Configuration > Connections page without saving any
changes.
If OK or Apply is clicked, and any of the following conditions exists (which includes some of the
considerations in the Connection Capacity Validation section Validating Diameter Connection Capacity),
an error message or warning message appears:
• The maximum number of Connections per Network Element already exists in the system. The
maximum number is the lesser of:
• 12,000
• The sum of the Maximum Connections allowed for all DA-MPs. See the MP Profiles
information in Diameter Common User's Guide.
• The maximum number of Connections per Peer Node (64) already exists in the system
• Any required field is empty; no value was entered or selected
• The entry in any field is not valid (wrong data type or out of the valid range)
• The Connection Name is not unique; it already exists in the system
• A selected pulldown list entry no longer exists (has been deleted by another user)
• The selected Transport Protocol is not supported by the selected Local Node or Peer Node
• The Connection Mode is set to Initiator Only or Initiator & Responder, a Peer IP Address is
not selected, and a Primary DNS Server IP Address is not configured. See Diameter DNS Options.
• The Connection Mode is set to Initiator Only or Initiator & Responder, and the selected Local
IP Address (or pair for Multi-homing), Local Initiate Port, and Transport Protocol combination
is the same as the Local IP Address (or pair for Multi-homing), Listen Port, and Transport
Protocol combination of one of the Local Nodes
• The Connection Mode is set to Initiator Only or Initiator & Responder, and the selected Local
IP Address (or pair for Multi-homing), Local Initiate port, and Transport Protocol combination
is the same as the Local IP Address (or pair for Multi-homing) and Local Initiate port
combination of another Connection
• For Uni-homed and Multi-homed Connections with various Connection Mode and Peer Node
Identification combinations, the element combinations that must be unique are not unique (see
the Connection Mode element description in Diameter Connection configuration elements)
• The selected Primary and Secondary Local IP Addresses and the selected Primary and Secondary
Peer IP Addresses are not all of same type
• The Peer Node Identification is set to IP Address and no IP Address has been selected
• The Peer Node Identification is set to Transport FQDN and no Transport FQDN has been
specified
• Two IP addresses that are equal have been configured for either the Local IP Addresses or Peer
IP Addresses.
• The Connection that is being added is a non-IPFE Connection and uses a Capacity Configuration
Set with a non-zero Reserved Ingress MPS value and the addition of the new Connection would
cause the MP server that hosts the Connection to have Reserved Ingress MPS totaling more
than the MP server's Engineered Ingress MPS capacity. See the MP Profiles information in
Diameter Common User's Guide.
• The Connection that is being added is a non-IPFE Connection and its addition would exceed
the maximum number of Connections supported by the MP server that owns the specified Local
IP Address(es). See the MP Profiles information in Diameter Common User's Guide.
• The Connection Mode is set to Initiator & Responder or Responder Only, the Transport
Protocol is set to SCTP, the SCTP Listen Port matches the SCTP Listen Port of a Local Node
used in another Initiator & Responder or Responder Only Connection and the Local IP Address
conflicts with the Local IP Address of that other Connection.
• The maximum number of Test Connections (2) already exists in the system
If OK or Apply is clicked, and the following condition exists, the indicated Warning appears:
• Two IP Addresses have been configured for the Local Node and only one IP Address is
configured for the Peer Node.
It is recommended that a Secondary IP address also be configured for the Peer Node. The Peer's
Secondary IP address is used as a fallback for the initiation of the SCTP Connection establishment
if the Peer's Primary IP address is unreachable, and for the validation of the IP addresses
advertised by the Peer in the INIT/INIT_ACK SCTP chunk.
30. Use the Enabling Connections procedure to enable the new Connection.
The following conditions exist:
• Only Peer Nodes whose Dynamic attribute is NO can be selected for assignment to a Connection.
• Peer Nodes created by the Dynamic Peer Discovery feature cannot be assigned to any
statically-created Connection.
• CEX Configuration Sets created by the Dynamic Peer Discovery feature cannot be assigned to
any statically-created connection.
Editing a Connection
Use this task to edit an existing Connection.
Note: A Connection must be in the Disabled Admin State before it can be changed. See Disabling
Connections. If the Connection is not in the Disabled Admin State, the Diameter > Configuration >
Connections [Edit] page opens in read-only mode and a warning dialog box opens.
1. Verify that the Connection to be edited is in the Disabled Admin State.
a) Select Diameter > Maintenance > Connections
b) If the Admin State is Disabled for the Connection to be edited, continue with Step 2.
c) If the Admin State is Enabled for the Connection to be edited, use the Disabling Connections
procedure to disable the Connection. Then continue with Step 2.
2. Select Diameter > Configuration > Connections.
The Diameter > Configuration > Connections page appears.
3. Select the Connection you want to edit.
4. Click Edit.
The Diameter > Configuration > Connections [Edit] page appears. The page is populated with
the current values for the selected Connection.
The Diameter > Configuration > Connections [Edit] page will not open if any of the following
conditions exist:
• The selected Connection no longer exists (was deleted by another user).
• The Connection is not in the Disabled Admin state.
Selecting the X at the end of a field clears the field, so that a different value can be entered or
selected.
6. Click:
• OK to save the changes and return to the Diameter > Configuration > Connections page. The
Connection remains in the Disabled Admin state.
• Apply to save the changes and stay on this page. The Connection remains in the Disabled Admin
state.
• Cancel to return to the Diameter > Configuration > Connections page without saving the
changes.
The following conditions exist:
• Any request for a list of Connections does not include any dynamically-created Connection
instances.
• Dynamic Peer Discovery can insert a Connection instance whose Dynamic attribute is YES only.
• Dynamic Peer Discovery software can delete a Connection instance whose Dynamic attribute
is YES only.
• If you attempt to edit a Connection whose Dynamic attribute is NO, the Edit page only allows
Peer Nodes and CEX Configuration Sets whose own Dynamic attribute is NO to be assigned
to the Connection.
• If you attempt to edit a Connection whose Dynamic attribute is YES, the Edit page only allows
CEX Configuration Sets whose own Dynamic attribute is NO to be assigned to the Connection.
a Connection whose Dynamic attribute is YES or NO to be assigned to the Connection.
• If you attempt to edit a Connection whose Dynamic attribute is YES, the selection options for
Connection Mode do not include Responder Only.
If OK or Apply is clicked, and a Connection Capacity Validation issue (see Validating Diameter
Connection Capacity) or any of the following conditions exists, an error message or warning message
appears:
• If you attempt is made to update a Connection instance whose Dynamic attribute is YES, and
the value for the Connection Mode attribute is Responder Only.
• If you attempt to update a Connection instance whose Dynamic attribute is NO, if the assigned
CEX Configuration Set has a value of YES for its own Dynamic attribute.
• If you attempt to update a Connection instance whose Dynamic attribute is NO, if the assigned
Peer Node has a value of YES for its own Dynamic attribute.
• If you attempt to add a Connection instance and the Dynamic attribute is YES.
• If you attempt to edit a static Connection instance by changing its Dynamic attribute from NO
to YES or vice versa.
• If you attempt to edit an instance whose Dynamic attribute is YES, the following attributes are
rendered read-only:
• Transport Protocol
• Peer Node
• Peer Node Identification
• Primary Peer IP Address
• Any required field is empty; no value was entered or selected.
• The entry in any field in not valid (wrong data type or out of the valid range).
• The edited Connection no longer exists in the system (it was deleted by another user)
• Any item that was selected to add to a list was deleted by another user during this Insert session
• The selected CEX Configuration Set is being used by a connection or a Local Node
• The selected CEX Configuration Set was deleted by another user during this Edit session
• If you attempt to edit a CEX Configuration Set instance whose dynamic attribute is YES.
Deleting a Connection
Use this task to delete an existing Connection.
Note: You must disable a Connection before you can delete it. See Disabling Connections.
1. Select Diameter > Configuration > Connections.
The Diameter > Configuration > Connections page appears.
2. Select the Connection you want to delete.
3. Click Delete.
A popup window appears to confirm the delete.
4. Perform one of the following actions:
• Click OK to delete the Connection.
• Click Cancel to cancel the delete function and return to the Diameter > Configuration >
Connections page.
If OK is clicked and any of the following conditions exist, an error message appears and the
Connection is not deleted:
• The selected Connection is referenced by at least one Route Group
• The selected Connection is referenced by at least one Egress Throttle Group
• The selected Connection is not in the Disabled Admin State
If OK is clicked and the selected Connection no longer exists (it was deleted by another user), an
error message is displayed and the Connections view is refreshed.
Note: Route Groups created via Dynamic Peer Discovery cannot be assigned to any statically-created
Route List.
On the Diameter > Configuration > Route Groups page, you can perform the following actions:
• Filter the list of Route Groups to display only the desired Route Groups.
• Sort the list by the Route Group Name column in ascending or descending order, by clicking the
column heading. The default order is ascending ASCII order.
• Click an entry that is shown in blue for a Peer Node/Connection.
The Diameter > Configuration > Peer Nodes [Filtered] page appears for the selected Peer Node.
• Click Insert.
The Diameter > Configuration > Route Groups [Insert] page appears. You can add a new Route
Group.
The Diameter > Configuration > Route Groups [Insert] will not open if the maximum number
of Route Groups (6000) already exists in the system.
• Select a Route Group in the list, and click Edit.
The Diameter > Configuration > Route Groups [Edit] page appears. You can edit the selected
Route Group.
If the selected Route Group has been deleted by another user, the Diameter > Configuration >
Route Groups [Edit] page does not open.
• Select a Route Group in the list, and click Delete. You can delete the selected Route Group.
Field (* indicates
required field) Description Data Input Notes
* Route Group Name Unique name of the Route Group. Format: case-sensitive;
alphanumeric and
underscore
Range: 1 - 32 characters;
cannot start with a digit
and must contain at
least one alpha
Field (* indicates
required field) Description Data Input Notes
Dynamic (View) Indicates whether or not the Route Group was Format: text
created dynamically (YES) or statically (NO).
Range: YES, NO
Default: NA
Type A Route Group can be configured with either Peer Format: radio buttons
Nodes (Peer Route Group) or Connections
Range: Peer Route
(Connections Route Group) that have the same
Group, Connection
priority within a Route List.
Route Group
Default: Peer Route
Group
Peer Node/Connection List of Peer Nodes or Connections configured for Each entry displays a +
(View) the Route Group. sign and the number of
Peer Nodes or
Each listed Peer Node or Connection entry is a
Connections assigned to
link to the Diameter > Configuration > {Entry
that Route Group. Click
Type} [Filtered] page for that entry only.
the + sign to display the
Peer Nodes or
Connections; the + sign
changes to a - sign.
Click the - sign to
display the number
again.
* Peer Node, One entry defined for a Route Group. Up to 512 entries can be
Connection, and configured for a
Provisioned Capacity Connection Route
Group.
Click Add to insert
another entry for the
Route Group.
Peer Node A Peer Node associated with the Route Group. Format: pulldown list
Each Route Group can be assigned up to 512 Peer
The Peer Node field is Range: 1- 160
Nodes.
part of the Peer Node, configured Peer Nodes
Connection, and The Peer Node field is available when the Peer
Capacity fields that are Route Group radio button is selected in the Type
combined on the [Insert] field.
and [Edit] pages.
The Peer Node field is required.
Connection A connection associated with the Route Group. Format: pulldown list
Each Route Group can be assigned up to 512
The Connection field is Range: 1-512 configured
connections.
part of the Peer Node, Connections for the
selected Peer Node
Field (* indicates
required field) Description Data Input Notes
Connection, and The Connection field is available when the
Capacity fields that are Connection Route Group radio button is selected
combined on the [Insert] in the Type field and a Peer Node is selected.
and [Edit] pages.
The Connection field is required for Connection
Route Groups.
Provisioned Capacity View page: Provisioned capacity for a Route Format: numeric
Group, which is the sum total of configured
The Provisioned Range: 1 - 65535
capacity of peer nodes or connections within a
Capacity field is
Route Group.
combined with the Peer
Node and Connection [Insert] and [Edit] pages: Provisioned capacity of
fields on the [Insert] and a Peer Node or Connection within a Route Group.
[Edit] pages. The Provisioned Capacity field is required.
Traffic is distributed to available Peer
Nodes/Connections in a Route Group
proportional to the configured capacity for the
Peer Node/Connection. A Peer
Nodes/Connection with a higher capacity will be
assigned more traffic.
7. Click:
• OK to save the changes and return to the Diameter > Configuration > Route Groups page.
• Apply to save the changes and remain on this page.
• Cancel to return to the Diameter > Configuration > Route Groups page without saving any
changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• Any required field is empty; no value was entered or selected
• The entry in any field in not valid (wrong data type or out of the valid range)
• The Route Group Name is not unique; it already exists in the system
• The selected pulldown list entry no longer exists (has been deleted by another user)
• The selected Peer Node is a duplicate within the Route Group
• The selected Connection is a duplicate within the Route Group for the same Peer Node
• The maximum number of Route Groups (6000) already exists in the system
The following conditions exist:
• You can only assign Peer Nodes whose Dynamic attribute is NO to a Route Group of either
type (Peer Node or Connection). Peer Nodes created via Dynamic Peer Discovery cannot be
assigned to any statically-created Route Group.
• Peer Nodes created by the Dynamic Peer Discovery cannot be assigned to any statically-created
Route Group.
• You can only allow Connections whose Dynamic attribute is NO to a Route Group of type
Connection Route Group.
• Connections created by the Dynamic Peer Discovery feature may not be assigned to any
statically-created Connection Route Group.
To delete a Peer Node or a Connection from the Route Group, clear the Peer Node and Provisioned
Capacity field values either by selecting --Select-- in the Peer Node pulldown list or by clicking the
X at the end of the Provisioned Capacity box for the Peer Node.
The Type field can be changed only if the Route Group is not assigned to any Route List.
When the Type field is changed, the Peer Node, Connection, and Provisioned Capacity entries
are reset to one entry with empty values. The Connection pulldown list is not available when Peer
Route Group is selected for the Type field.
• Click an entry that is shown in blue for a Route Group (in the expanded list).
The Diameter > Configuration > Route Groups [Filtered] page appears for the selected Route
Group.
• Click Insert.
The Diameter > Configuration > Route Groups [Insert] page appears. You can add a new Route
List.
The Diameter > Configuration > Route Groups [Insert] page will not open if
• The maximum number of Route Lists (2000) already exists in the system
• There is no available Route Group
• Select a Route List in the list, and click Edit.
The Diameter > Configuration > Route Lists [Edit] page appears. You can edit the selected Route
List.
If the selected Route List has been deleted by another user, the Diameter > Configuration > Route
Lists [Edit] page does not open.
• Select a Route List in the list, and click Delete. You can delete the selected Route List.
Field (* indicates
required field) Description Data Input Notes
* Route List Name Unique name for the Route List Format: case-sensitive;
alphanumeric and
underscore (_); cannot
start with a digit and
must contain at least
one alpha
Range: 1 - 32 characters
Dynamic Indicates whether or not the element was created Format: checkbox
dynamically (YES) or statically (NO). NO is (read-only on the
assigned for all element instances, except for those Element [Edit] page)
created via Dynamic Peer Discovery.
Range: checked (the
element was created as
Field (* indicates
required field) Description Data Input Notes
a result of Dynamic
Discovery), unchecked
Default: unchecked
* Minimum Route The minimum Route Group availability weight Format: numeric
Group Availability for this Route List.
Range: 1 - 1024000
Weight
The minimum weight is used to determine a Route
Group's availability status within a Route List.
* Route Group Route Groups associated with the Route List. Format: pulldown list
Up to three Route Groups can be associated with Range: available Route
a single Route List. Groups
On the View page, each entry displays a + sign
and the number of Route Groups assigned to that
Route List. Click the + sign to display the Route
Groups; the + sign changes to a - sign. Click the -
sign to display the number again.
The Route Group entries in the expanded list are
links to the Diameter > Configuration > Route
Groups [Filtered]> page for the selected Route
Group.
* Priority The priority of the Route Group within the Route Format: numeric
List.
Range: 1, 2, or 3
Priority is set from 1 (highest priority) to 3 (lowest
priority).
* Route Group Route Groups associated with this Route List. Format: pulldown list
Range: 1 - 3 entries
Default: NA
Site Name Site Name whose TTG is to be selected to associate Format: pulldown list
with the Route Group.
Range: Local Site Only
Default: NA
Traffic Throttle Group Traffic Throttle Group configured in the Site Format: pulldown list
selected (all local TTGs if local site is selected and
Range: NA
TTG marked as shared if remote site is selected).
Default: NA
Maximum Loss Percent Maximum Loss Percent Threshold for the Format: pulldown list
Threshold combination of Route List, Route Group and
Range: 0 - 100
Traffic Threshold Group
Default: NA
7. Click:
• OK to save the data and return to the Diameter > Configuration > Route Lists page .
• Apply to save the data and remain on this page.
• Cancel to return to the Diameter > Configuration > Route Lists page without saving any
changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• Any required field is empty; no value was entered or selected
• The entry in any field in not valid (wrong data type or out of the valid range)
• The Route List Name is not unique; it already exists in the system
• The selected pulldown list entry no longer exists (has been deleted by another user)
• A selected Route Group is a duplicate within the Route List
• A Route Group Priority is not unique within the Route List
• The maximum number of Route Lists (2000) already exists in the system
Note: If Dynamic (read-only checkbox) is checked, it means that the route list was created as a result
of Dynamic Peer Discovery.
1. Select Diameter > Configuration > Route Lists.
The Diameter > Configuration > Route Lists page appears.
2. Select the Route List you want to edit.
3. Click Edit.
The Diameter > Configuration > Route Lists [Edit] page appears.
The page is initially populated with the current configured values for the selected Route List.
• The Route List is referenced by any Peer Node as the Alternate Implicit Route
• The Route List is referenced by any Peer Routing Rule
• The Route List is set as the Route List for DAS Node in any Message Copy Configuration Set
1. Select Diameter > Configuration > Route Lists.
The Diameter > Configuration > Route Lists page appears.
2. Select the Route List you want to delete.
3. Click Delete.
A popup window appears to confirm the delete.
4. Click:
• OK to delete the Route List.
• Cancel to cancel the delete function and return to the Diameter > Configuration > Route Lists
page.
If OK is clicked and the selected Route List no longer exists (it was deleted by another user), an
error message is displayed and the Route Lists view is refreshed.
Field (* indicates
required field) Description Data Input Notes
* Peer Route Table Unique name of the Peer Route Table. Format: case-sensitive;
Name alphanumeric and
underscore
Range: 1 - 32 characters;
cannot start with a digit
and must contain at
least one alpha
• The maximum number of Peer Route Tables (100) already exists in the system
After a Peer Route Table is added, Peer Routing Rules can be defined for it. See Peer Routing Rules
configuration. For information about required component configuration order, see Understanding the
Diameter Configuration Sequence.
• Origin-Host
When a Diameter message matches the conditions of a Peer Routing Rule then the action specified for
the rule will occur. If you choose to route the Diameter message to a Peer Node, the message is sent
to a Peer Node in the selected Route List based on the Route Group priority and Peer Node configured
capacity settings. If you choose to Send an Answer, then the message is not routed and the specified
Diameter Answer Code is returned to the sender.
Peer Routing Rules are assigned a priority in relation to other Peer Routing Rules. A message will be
handled based on the highest priority routing rule that it matches. The lower the number a Peer Routing
Rule is assigned the higher priority it will have. (1 is the highest priority and 99 is the lowest priority.)
If a message does not match any of the Peer Routing Rules and the Destination-Host parameter contains
a Fully Qualified Domain Name (FQDN) matching a Peer Node, then the message will be directly
routed to that Peer Node if it has an available Connection.
If there is not an available Connection or all routing attempts (per Peer Node configuration) to the
implicit route are exhausted, the message will be routed using the alternate implicit route configured
for the Peer Node.
A Message Copy Configuration Set can be assigned to a Peer Routing Rule, to provide information
for sending a copy of the message to a DAS.
On the Viewing Rules for Peer Route Table: {Peer Route Table Name} page, you can perform the
following actions:
• Filter the list of Rule Names, to display only the desired Rules.
• Sort the list entries in ascending or descending order by column (except Conditions), by clicking
the column heading.
By default, the list is sorted by Priority in ascending ASCII order. The lowest Priority value indicates
the highest priority. For Rules with the same Priority, the Rule Name is used for sorting.
• Select a blue Route List entry, to open the Diameter > Configuration > Route Lists [Filtered] page
for the selected entry.
• Click Insert.
The Inserting Rule for Peer Route Table: {Peer Route Table Name} page opens. You can add a
new Peer Routing Rule and its values. See Adding a Peer Routing Rule.
If the maximum number of Peer Routing Rules (1000) already exists for the Peer Route Table, the
Inserting Rule for Peer Route Table: {Peer Route Table Name} page will not open, and an error
message is displayed.
• Select the Rule Name of a Peer Routing Rule in the list, and click Edit.
The Editing Rule for Peer Route Table: {Peer Route Table Name} page opens. You can edit the
selected Peer Routing Rule. See Editing a Peer Routing Rule.
If the selected Peer Routing Rule has been deleted by another user, the Editing Rule for Peer Route
Table: {Peer Route Table Name} page will not open.
• Select the Rule Name of a Peer Routing Rule in the list, and click Delete to remove the selected
Peer Routing Rule. See Deleting a Peer Route Rule.
Field (* indicates
required field) Description Data Input Notes
* Rule Name Unique name of the Peer Routing Rule. Format: case-sensitive;
alphanumeric and underscore
(_); cannot start with a digit and
must contain at least one alpha
Range: 1 - 32 characters
* Priority Priority of the Rule in relation to other Rules. Format: text box; numeric
The priority is set from 1 (highest priority) to Range: 1 - 99
99 (lowest priority).
Field (* indicates
required field) Description Data Input Notes
• Command-Code: available
configured Command Codes
• Destination-Realm and
Origin-Realm: Realm is a
case-insensitive string
consisting of a list of labels
separated by dots. A label
may contain letters, digits,
dashes (-), and underscore
(_). A label must begin with
a letter or underscore and
must end with a letter or
digit. An underscore can be
used only as the first
character. A label can be at
most 63 characters long and
a realm can be at most 255
characters long. You can
specify a substring or a
complete string of a valid
Realm.
• Destination-Host and
Origin-Host: FQDN is a
case-insensitive string
consisting of a list of labels
separated by dots. A label
may contain letters, digits,
dashes (-), and underscore
(_). A label must begin with
a letter or underscore and
must end with a letter or
digit. An underscore can be
used only as the first
character. A label can be at
most 63 characters long and
a realm can be at most 255
characters long. You can
specify a substring or a
complete string of a valid
FQDN.
• Command-Code: pulldown
list of configured Command
Codes, including Extended
Command-Code (ECC)
immediately after their
parent Command-Code
Note: An ECC is a
Command Code that also
Field (* indicates
required field) Description Data Input Notes
takes into account the value
of a specific AVP for that
Command Code that gives
the true command type (for
example, CCR-I, CCR-U, and
so on).
Action The action that will happen if the Diameter Format: selection box
message matches the conditions set in the Peer
Range: Route to Peer, Send
Routing Rule:
Answer, Abandon With No
• Route to Peer: routes a message to a Peer Answer
Node using the Route List associated with
Default: Route to Peer
this Rule.
• Send Answer: send and answer response
that contains the Diameter answer
result-code, vendor ID, and error message
associated with this Rule.
• Abandon With No Answer: abandon
message routing without sending an
Answer response to external peer.
Note: The Answer is sent to any
applications that requested an Answer
receive.
Route List Route List associated with this Rule. Format: pulldown list
A Route List is required if the Action is set to Range: configured Route Lists
Route to Peer.
Default: -Select-
The Route List entries on the View page are
links to the Diameter > Configuration > Route
Lists [Filtered] page for the selected entry.
Note: You can only specify Route Lists whose
Dynamic attribute is NO to be selected for
inclusion in a Peer Route Rule. Also, you
cannot include Route Lists created by the
Dynamic Peer Discovery feature cannot be
included by any Peer Route Rule instance.
Message Priority The priority to assign to the message. The Format: pulldown list
message priority is assigned only when Action
Range: No Change, 0, 1, 2. 0 is
is set to Route to Peer.
lowest priority
Default: No Change
Message Copy Message Copy Configuration Set (MCCS) used Format: pulldown list
Configuration Set for copying the messages to the DAS. A valid
Field (* indicates
required field) Description Data Input Notes
MCCS will mark the messages matched by this Range: Default; configured
Peer Route Rule for copy to the DAS. Message Copy Configuration
Sets
Default: -Select-
Answer The answer code associated with this Rule. Format: radio button for
Result-Code Value pulldown list; radio button for
A Diameter answer code is required if the
text box
Action is set to Send Answer.
Range:
• pulldown list: available
Diameter answer codes
• text box: 1000 - 5999
Default: 3002
UNABLE_TO_DELIVER
Vendor ID The Vendor ID to place in the Vendor ID AVP Format: text box; numeric
of the answer message.
Range: 0 - 4294967295
Answer Error Value returned in the Error-Message AVP of Format: text box; alphanumeric,
Message the answer message. underscore (_), period (.)
Range: 0 - 64 characters
Default: Null string
* Peer Route Table The Peer Route Table to which the Peer View-only
Routing Rule belongs
8. If you selected Route to Peer as the Action, select the Route List to associate with this Rule from
the pulldown list.
9. If you selected Route to Peer as the Action, select the Message Priority to assign to the message.
10. If Diameter Message Copy will be used, select the Message Copy Configuration Set to use when
this Rule is selected for PRT-triggered Message Copy.
11. If you selected Send Answer as the Action, select the desired Answer Result-Code Value selection
box:
• Select the pulldown list radio button to use an existing Answer Result-Code; then select an
Answer Result-Code in the list.
• Select the text box radio button, and enter your own Answer Result-Code value.
12. If you selected Send Answer as the Action, enter the desired Vendor ID AVP in the Vendor ID
field.
13. If you selected Send Answer as the Action, enter the desired Error-Message AVP in the Answer
Error Message field.
14. Click:
• OK to save the changes and return to the Viewing Rules for Peer Route Table: {Peer Route
Table Name} page.
• Apply to save the changes and remain on this page.
• Cancel to return to the Viewing Rules for Peer Route Table: {Peer Route Table Name} page
without saving any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• If you attempt to insert or update a Peer Route Rule instance and the specified Route List whose
Dynamic attribute value is YES.
• Any required field is empty (no entry was made)
• Any field is not valid or is out of range
• The Rule Name is not unique; it already exists in the system
• The selected Route List no longer exists (has been deleted by another user)
• The Rule is similar to an already existing Rule (the same attributes except for Rule Name and
Priority)
• The maximum number of Peer Routing Rules are already configured for the Peer Route Table.
Egress Throttle Group functions are described in detail in Egress Throttle Groups. Egress Throttle Groups
control the following functions.
An Egress Throttle Group can be standalone, or it can be associated with an Egress Throttle List that
spans multiple signaling routers. An Egress Throttle Group can be associated with only one Egress
Throttle List. See Diameter Egress Throttle List.
• Egress Throttle Group Rate Limiting controls the total egress Request traffic that is routed to a
configured group of Peers or Connections.
• Egress Throttle Group Pending Transaction Limiting controls the number of pending transactions
that are allowed for a configured group of Peers or Connections.
• The Egress Throttle Group Rate Limiting and Egress Throttle Group Pending Transaction Limiting
provide egress throttling capability that enables:
• A group of Peers and Connections to be associated with an Egress Throttle Group
• The maximum egress Request rate of Egress Throttle Groups to be set
• The maximum pending transaction limit of Egress Throttle Groups to be set
• The Egress Throttling Control Scope.
On the Diameter > Configuration > Egress Throttle Groups page, the following actions can be
performed:
• Filter the list of Egress Throttle Groups to display only the desired Egress Throttle Groups.
• Sort the list by a column in ascending or descending order, by clicking the column heading.
The default order is by Egress Throttle Groups Name in ascending ASCII order.
• Click Insert.
The Diameter > Configuration > Egress Throttle Groups [Insert] page opens. You can add new
Egress Throttle Groups.
The Diameter > Configuration > Egress Throttle Groups [Insert] page will not open if the
maximum number of Egress Throttle Groups (128 per NE) already exists in the system.
• Select an Egress Throttle Group in the list, and click Edit.
The Diameter > Configuration > Egress Throttle Groups [Edit] page opens. You can edit the
selected Egress Throttle Group.
If the selected Egress Throttle Group has been deleted by another user, the Diameter >
Configuration > Egress Throttle Groups [Edit] page will not open.
• Select an Egress Throttle Group in the list, and click Delete to delete the selected Egress Throttle
Group.
Field (* indicates a
required field) Description Data Input Notes
*Egress Throttle A name that uniquely identifies the Egress Format: text box;
Group Name Throttle Group. alphanumeric and
underscore; must contain at
least one alpha and must not
start with a digit.
Range: 1- 32 characters
Default: NA
Rate Limiting Available Rate Limiting configuration sets for Format: Pulldown list
configuration set this ETG.
Range: NA
Default: NA
Egress Throttling The control scope used to determine if the ETG's Format: two radio buttons;
Control Scope aggregated data or the ETL's aggregated data one must be checked.
is used for routing decisions.
Range: ETL or ETG
Note: The Egress Throttling Control Scope can
Default: ETG checked
be set to ETL only when the ETG has been
added to an Egress Throttle List through the
NOAM GUI. See Diameter Egress Throttle List.
Peer Node Peers associated with this Egress Throttle Format: Pulldown list
Group.
Range: 0 - 128
Note: Click Add to add Peer Nodes.
Default: NA
Connection Connection associated with this Egress Throttle Format: Pulldown list
Group.
Range: 0 - 128
Note: Click Add to add Connections.
Default: NA
• An Egress Throttle Group is configured with a Connection which is associated with a Peer
configured as a member in any Egress Throttle Group. (Implicit association of Connection with
another Egress Throttle Group)
• An Egress Throttle Group is configured with a Connection and a Peer associated with each
other.
4. Click:
• OK to save the changes and return to the Diameter > Configuration > Egress Throttle Groups
page.
• Apply to save the changes and remain on this page.
• Cancel to return to the Diameter > Configuration > Egress Throttle Groups page without
saving any changes.
The following conditions exist:
• You can only edit Peer Nodes or Connections whose Dynamic attribute is NO for inclusion in
an Egress Throttle Group.
• Peer Nodes or Connections created by the Dynamic Peer Discovery feature cannot be included
by any Egress Throttle Group instance.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• An attempt is made to remove the Rate Limiting Egress Throttling by removing the check from
the corresponding Egress Throttlings check box for an Egress Throttle Group for which the
Rate Limiting Admin State is set to Enabled.
• An attempt is made to remove Pending Transaction Egress Throttling by removing the check
from the corresponding Egress Throttlings check box for an Egress Throttle Group for which
the Pending Transaction Limiting Admin State is set to Enabled.
The Diameter > Configuration > Reroute on Answer [Insert] will not open if the maximum
number of Reroute on Answer entries (1000) already exists in the system.
• Select a Reroute on Answer entry, and click Delete to delete the selected entry.
Field (* indicates
required field) Description Data Input Notes
* Answer Result-Code Value in the result-code AVP of the Answer Format: numeric
AVP Value message.
Range: 0 - 4294967295
3. Enter the desired Result-Code AVP in the Answer Result-Code AVP Value field.
4. Perform one of the following actions for Application ID:
• Select ALL to apply the Reroute On Answer entry to all Application IDs.
• Select the second radio button, and select the appropriate Application ID from the pulldown
list.
5. Click:
• OK to save the changes and return to the Diameter > Configuration > Reroute on Answer
page.
• Apply to save the changes and remain on this page.
• Cancel to return to the Diameter > Configuration > Reroute on Answer page without saving
any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• A field is empty; a value was not entered
• A value is not valid
• The Answer Result-Code AVP Value and Application ID combination is not unique; it already
exists in the system
• Adding the new Reroute on Answer entry would cause the maximum number of Reroute on
Answer entries (1000) to be exceeded
Users can assign Application Route Table (ART) to Diameter messages based on Application ID and
(Extended) Command Codes by configuring Transaction Configuration Rule (TCR) with Application
ID plus (E)CC as a key in Transaction Configuration Sets.
On the Diameter > Configuration > Application Route Tables page, you can perform the following
actions:
• Filter the list of Application Route Tables to display only the desired Application Route Tables.
• Sort the list in ascending or descending order by clicking a column heading. The default order is
by Application Route Table Name in ascending ASCII order.
• Click Insert.
The Diameter > Configuration > Application Route Tables [Insert] page appears. You can add
a new Application Route Table.
The Diameter > Configuration > Application Route Tables [Insert] page will not open if the
maximum number of Application Route Tables (100) already exists in the system.
• Select an Application Route Table in the list, and click Delete. You can delete the selected
Application Route Table.
• Select an Application Route Table in the list, and click View/Edit Rules.
The Diameter > Configuration > Application Route Tables [View/Edit Rules] page appears. You
can edit the selected Application Route Table Rules.
If the selected Application Route Table has been deleted by another user, the Diameter >
Configuration > Application Route Tables [View/Edit Rules] page will not open.
Field (* indicates
required field) Description Data Input Notes
* Application Route Unique name of the Format: text box; alphanumeric and
Table Name Application Route Table. underscore (_); cannot start with a digit and
must contain at least one alpha
Range: 1 - 32 characters
3. Click Delete.
A popup window appears to confirm the delete.
4. Click:
• OK to delete the Application Route Table.
• Cancel to cancel the delete function and return to the Diameter > Configuration > Application
Route Tables page.
If OK is clicked and the selected Application Route Table no longer exists (it was deleted by
another user), an error message is displayed.
If OK is clicked and the selected Application Route Table is currently referenced by the DM-IWF
Options configuration, the request is rejected and an error message is displayed.
The Inserting Rule for Application Route Table: {Application Route Table Name} page opens.
You can add a new Application Routing Rule and its values. See Adding an Application Routing Rule.
If the maximum number of Application Routing Rules (1000) already exists in the system, the
Inserting Rule for Application Route Table: {Application Route Table Name} page will not open,
and an error message is displayed.
• Select the Rule Name of an Application Routing Rule in the list, and click Edit.
The Editing Rule for Application Route Table: {Application Route Table Name} page opens. You
can edit the selected Application Routing Rule. See Editing an Application Routing Rule.
• Select the Rule Name of an Application Routing Rule in the list, and click Delete to remove the
selected Application Routing Rule. See Deleting an Application Routing Rule
Field (* indicates
required field) Description Data Input Notes
* Rule Name Name of the Application Routing Rule. Format: text box; case-sensitive;
The Name must be unique. alphanumeric and underscore (_);
cannot start with a digit and must
contain at least one alpha (A-Z, a-z)
Range: 1 - 32 characters
Field (* indicates
required field) Description Data Input Notes
Parameter: Format: Operator and Value for each
Parameter
• Destination-Realm
• Destination-Host
• Application-ID
• Command-Code
• Origin-Realm
• Origin-Host
Field (* indicates
required field) Description Data Input Notes
including Extended
Command-Code (ECC)
immediately after their parent
Command-Code
Note: An ECC is a Command
Code that also takes into account
the value of a specific AVP for that
Command Code that gives the true
command type (for example,
CCR-I, CCR-U, and so on).
Action The action that will happen if the Format: selection box
Diameter message matches the conditions
Range: Route to Application, Forward
set in the Application Routing Rule:
to Egress Routing, Send Answer, and
• Route to Application: routes a Abandon With No Answer
message to an Application associated
Default: Route to Application
with this Rule.
• Forward To Egress Routing: forward
the message to PRT to route to Peer
• Send Answer: send and answer
response containing the required
Result-Code and optional Vendor ID
and Answer Error Message associated
with the application routing rule
• Abandon With No Answer: abandon
message routing without sending an
Answer response to external peer.
Answer The value to be placed in the Result-Code Format: selection box radio button for
Result-Code Value AVP of the Answer message. pulldown list; radio button for text
box
A Diameter answer code is required if
the Action is set to Send Answer. Range: 1000 - 5999
Default: none
Vendor ID The value to be placed in the Vendor ID Format: text box; digits only
AVP
Range: 0 - 4294967295
Default: none
Field (* indicates
required field) Description Data Input Notes
Answer Error String to be placed in the Error-Message Format: text box; case-sensitive;
Message AVP of the Answer message alphanumeric and underscore (_);
cannot start with a digit and must
contain at least one alpha (A-Z, a-z)
Range: 0 - 64
Default: null, no Error-Message AVP
in Answer message
The Viewing Rules for Application Route Table: {Application Route Table Name} page opens,
with a list of the Rules that are currently configured in the selected Application Route Table.
4. Click Insert.
The Inserting Rule for Application Route Table: {Application Route Table Name} page appears.
If the maximum number of Application Routing Rules (1000) already exists in the system, the
Diameter > Configuration > Application Routing Rules [Insert] page will not open.
5. Enter a unique name for the Rule in the Rule Name field.
6. Set a Priority for this Rule in relation to other Rules, by entering a number between 1 and 99 in the
Priority field.
7. Set the Application Routing Rule Conditions:
a) Locate the Parameter you want to set.
b) Select the relevant operator from the Operator pulldown list.
See Application Routing Rule operators for a description of operators available for each Parameter.
c) Enter the appropriate value for the Parameter in the corresponding Value field.
The Value text box is disabled for some Operators that do not require a value.
d) Repeat this step for each Parameter. For any Parameter that does not need to be evaluated, set
the Operator to Always True.
8. From the pulldown list, select the Application Name associated with this Rule.
9. Click:
• OK to save the Rule and return to the Diameter > Configuration > Application Routing Rules
page.
• Apply to save the Rule and remain on this page.
• Cancel to return to the Viewing Rules for Application Route Table: {Application Route Table
Name} page without saving any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• Any required field is empty (no entry was made)
• Any field is not valid or is out of range
• The Rule Name is not unique
• The Rule is similar to an already existing Rule (the same attributes except for Rule Name and
Priority)
• Adding the Application Routing Rule would cause the maximum number of Application Routing
Rules (1000) allowed in the system to be exceeded
For Application Route Tables that are associated with Application IDs, a warning appears for an
attempt to add an Application Routing Rule with an Application-ID that does not match the
Application ID with which the Application Route Table is associated.
• Click Insert.
The Diameter > Configuration > Route Option Sets [Insert] page appears. You can add a new
Routing Option Set.
The Diameter > Configuration > Route Option Sets [Insert] page will not open if the maximum
number of Routing Option Sets (20) already exists in the system
• Select a Routing Option Set in the list, and click Edit.
The Diameter > Configuration > Route Option Sets [Edit] page appears. You can edit the selected
Routing Option Set.
If the selected Routing Option Set has been deleted by another user, the Diameter > Configuration >
Route Option Sets [Edit] page will not open.
• Select a Routing Options Set in the list, and click Delete. You can delete the selected Routing Option
Set. The Default Routing Option Set cannot be deleted.
Field (* indicates
required field) Description Data Input Notes
* Routing Options Set Unique name of the Routing Option Set. Format: text box;
Name case-sensitive;
alphanumeric and
underscore
Range: 1 - 32 characters;
cannot start with a digit
and must contain at
least one alpha
Transaction Lifetime The total time diameter allows to forward a Format: text box;
Request, including initial and all subsequent numeric
routing attempts.
Range: 100 - 540000 ms
Default: 1000 ms
Pending Answer Timer Pending Answer Timer of this Routing Option Format: pulldown list
Set
Field (* indicates
required field) Description Data Input Notes
If the Pending Answer Timer value is Not Range: Default,
Selected, the egress Peer Node's associated configured Pending
Pending Answer Timer, if it is defined, will be Answer Timers
used when processing transactions.
Default: Not Selected.
A Pending Answer Timer cannot be assigned to
the Default Routing Option Set.
* Resource Exhausted Action taken when a Request cannot be processed Format: pulldown list
Action due to an internal resource being exhausted
Range: Abandon with
no Answer; Send
Answer
Default: Abandon with
no Answer
Resource Exhausted Value to be placed in the Result-Code AVP of the Format: radio button for
Result-Code Answer message. An Answer Result-Code value pulldown list, radio
is required if Resource Exhausted Action is Send button for text box
Answer.
Range: 1000 - 5999
Select the code from the
pulldown list or enter
the code in the text box.
Default: NA
Resource Exhausted String to be placed in the Error-Message AVP of Format: text box;
Answer Error-Message the Answer message for Resource Exhaustion alphanumeric
Range: 0 - 64 characters
Default: Null string, no
Error-Message AVP in
Answer message
Resource Exhausted Resource Exhausted Vendor-ID Value. When Format: text box;
Vendor-ID specified, the Answer generated will be an numeric
Experimental-Result-Code grouped AVP with the
Range: 1 - 4294967295
specified Vendor-ID value placed in the
Vendor-ID AVP. Default: NA
* No Peer Response Action taken when the routing of a Request is Format: pulldown list
Action abandoned due to an Answer timeout or
Range: Abandon with
Transaction Lifetime timeout.
no Answer; Send
Answer
Default: Send Answer
Field (* indicates
required field) Description Data Input Notes
No Peer Response Value to be placed in the Result-Code AVP of the Format: radio button for
Result-Code Answer message. pulldown list, radio
button for text box
This Result-Code value is required if the No Peer
Response Action is Send Answer. Range: 1000 - 5999
Select the code from the
pulldown list or enter
the code in the text box.
Default: NA
No Peer Response String to be placed in the Error-Message AVP of Format: text box;
Error-Message the Answer message for No Peer Response alphanumeric
Range: 0 - 64 characters
Default: Null string, no
Error-Message AVP in
Answer message
Connection Failure Value to be placed in the Result-Code AVP of the Format: radio button for
Result-Code Answer message. An Answer Result-Code value pulldown list, radio
is required if the action is Send Answer. button for text box
Range: 1000 - 5999
Select the code from the
pulldown list or enter
the code in the text box.
Default: NA
Connection Failure String to be placed in the Error-Message AVP of Format: text box;
Answer Error-Message the Answer message for Connection Failure. alphanumeric
Range: 0 - 64 characters
Default: Null string, no
Error-Message AVP in
Answer message
Field (* indicates
required field) Description Data Input Notes
Connection Failure Vendor ID value returned in an Answer message Format: text box;
Vendor-ID when a message is not successfully routed due to numeric
connection failure. When specified, the Answer
Range: 1 - 4294967295
generated will be an Experimental-Result-Code
grouped AVP with the specified Vendor-ID value Default: NA
placed in the Vendor-ID AVP.
* Connection Action taken when the routing of a Request is Format: pulldown list
Congestion Action abandoned because the last connection evaluated
Range: Abandon with
is congested
no Answer; Send
Answer
Default: Send Answer
Connection Congestion Value to be placed in the Result-Code AVP of the Format: radio button for
Result-Code Answer message when a message is not pulldown list, radio
successfully routed due to Connection congestion. button for text box
This is required if the action is Send Answer. Range: 1000 - 5999
Select the code from the
pulldown list or enter
the code in the text box.
Default: NA
Peer Node Reported Value to be placed in the Result-Code AVP of the Format: pulldown list
Congestion Result-Code Answer message. Answer Result-Code Value is
Range: 1000 - 5999
required if action is Send Answer.
Field (* indicates
required field) Description Data Input Notes
Default: NA
Peer Node Reported String to be placed in the Error-Message AVP of Format: numeric
Congestion Answer the Answer message for Peer Node Reported
Range: 1 - 64 characters
Error-Message Congestion
Default: null string, no
Error-Message AVP in
Answer message
Peer Node Reported Peer Node Reported Congestion Vendor-ID Value. Format: numeric
Congestion Vendor-ID When specified, Answer generated will be
Range: 1 - 4294967295
Experimental-Result-Code grouped AVP with
Vendor-ID value specified placed in Vendor-ID Default: NA
AVP.
* Destination-Realm Not Action when routing of a Request is abandoned Format: pulldown list
Served Action due to Destination-Realm Implicit Routing failure
Range: Send Answer,
to find a (Realm/Application-Id) match in the
Abandon with no
Realm Route Table for routing the transaction.
Answer
Default: Send Answer
Destination-Realm Not Value to be placed in the Result-Code AVP of the Format: radio button for
Served Result-Code Answer message. Answer Result-Code Value is pulldown list, radio
required if action is Send Answer. button for text box
Range: 1000 - 5999
Default: 3003
REALM_NOT_SERVED
5. Click:
• OK to save the changes and return to the Diameter > Configuration > Routing Option Sets
page.
• Apply to save the changes and remain on this page.
• Cancel to return to the Diameter > Configuration > Routing Option Sets page without saving
any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• Any required field is empty; no value was entered or selected
• The entry in any field in not valid (wrong data type or out of the valid range)
• The selected Routing Option Set no longer exists (has been deleted by another user)
• The Pending Answer Timer value is greater than the Routing Option Set Transaction Lifetime
value.
• A Pending Answer Timer is assigned to the Routing Option Set when the Routing Option Set
has been assigned to an Application ID.
In many cases, the Pending Answer Timer used by diameter is based on Diameter client response time
requirements. Different Diameter clients for a single Application-ID and (Extended) Command Code
can have differing response time requirements. The diameter Pending Answer Timer can be controlled
based on Ingress Peer Node.
Users can assign a Pending Answer Timer (PAT) to Diameter messages based on Application ID and
(Extended) Command Codes by configuring Transaction Configuration Rule (TCR) with Application
ID plus (E)CC as a key in Transaction Configuration Sets.
A Pending Answer Timer can be associated with:
• The Peer Node from which the request was received through Routing Option Set.
• The Peer Node that the Request is sent to
• The Transaction Configuration Set
Select the Pending Answer Timer using the following precedence selection criterion, highest to lowest
priority:
• If Transaction Configuration Set is selected on ingress Peer Node from which the Diameter Request
was received, use Transaction Configuration Set and apply longest/strongest match search criteria
for Diameter Request message parameters comparison and if a match is found, apply PAT assigned
to Transaction Configuration Rule defined under this Transaction Configuration Set, if it exists.
• The Pending Answer Timer assigned to the Routing Option Set for the Ingress Peer, if it exists.
• The Pending Answer Timer assigned to the egress Peer Node to which the Request message will
be forwarded, if it exists.
• Search Default TCS and apply longest/strongest match. Use PAT associated with best match, if
any is found.
• Default Pending Answer Timer.
The Diameter Routing Option Set provides an optional Pending Answer Timer element. If a configured
Pending Answer Timer is specified in a Routing Option Set:
• Routing Option Set Maximum per Message Forwarding Allowed must be > 1.
• Routing Option Set Transaction Lifetime must be greater than or equal to the value of the Pending
Answer Timer specified for the Routing Option Set.
The Routing Option Set Transaction Lifetime value controls the total time that Diameter will attempt
to process a transaction, including re-routing attempts. Although the Routing Option Set can be
associated with an Ingress Peer Node, Diameter evaluates the Routing Option Set Transaction Lifetime
for expiration only at re-routing attempts, which means:
• Routing Option Set Maximum per Message Forwarding Allowed must be > 1
• Routing Option Set Transaction Lifetime must be greater than or equal to the value of the Pending
Answer Timer specified for the Routing Option Set
The Routing Option Set Transaction Lifetime value controls the total time that Diameter will attempt
to process a transaction, including re-routing attempts. Although the Routing Option Set can be
associated with an Ingress Peer Node, Diameter evaluates the Routing Option Set Transaction Lifetime
for expiration only at re-routing attempts, which means:
• Transaction Lifetime is not applicable or configurable if the Routing Option Set has re-routing
disabled (Maximum per Message Forwarding Allowed value is set to 1)
• Transaction Lifetime may be extended by as much as 1 Pending Answer Timer interval in some
cases.
A Routing Option Set referenced by a Transaction Configuration Set Rule in Transaction Configuration
Set cannot have a Pending Answer Timer configured, because each Transaction Configuration Rule
always has an associated Pending Answer Timer.
Diameter selection of the Pending Answer Timer and Transaction Lifetime values to be used when
routing Requests upstream will operate as indicated in Table 36: Diameter Pending Answer Timer and
Transaction Lifetime Selection.
Table 36: Diameter Pending Answer Timer and Transaction Lifetime Selection
Transaction
Configuration
Set entry exists Default
for Appl-ID and Transaction
(Extended) Configuration
Command Code Set entry exists
in Request Egress for Appl-ID
being processed Pending Answer Pending and (Extended)
and is Timer specified Answer Timer Command
associated with in Ingress Peer specified in Code in
Ingress Peer Node Routing Egress Peer Request being Resultant Pending Answer
Node Option Set? Node? processed? Timer value used
Yes Yes Yes Yes Pending Answer Timer from
Transaction Configuration
Set for Request's Appl-ID
and (E)CC after applying
longest/strongest search
criteria.
Yes No Yes No Pending Answer Timer from
Transaction Configuration
Set for Request's Appl-ID
and (E)CC after applying
longest/strongest search
criteria.
Yes Yes No No Pending Answer Timer from
Transaction Configuration
Set for Request's Appl-ID
and (E)CC after applying
longest/strongest search
criteria.
Yes Yes Yes No Pending Answer Timer from
Transaction Configuration
Set for Request's Appl-ID
and (E)CC after applying
longest/strongest search
criteria.
Yes Yes No Yes Pending Answer Timer from
Transaction Configuration
Set for Request's Appl-ID
Transaction
Configuration
Set entry exists Default
for Appl-ID and Transaction
(Extended) Configuration
Command Code Set entry exists
in Request Egress for Appl-ID
being processed Pending Answer Pending and (Extended)
and is Timer specified Answer Timer Command
associated with in Ingress Peer specified in Code in
Ingress Peer Node Routing Egress Peer Request being Resultant Pending Answer
Node Option Set? Node? processed? Timer value used
and (E)CC after applying
longest/strongest search
criteria.
Yes No Yes No Pending Answer Timer from
Transaction Configuration
Set for Request's Appl-ID
and (E)CC after applying
longest/strongest search
criteria.
Yes No No Yes Pending Answer Timer from
Transaction Configuration
Set for Request's Appl-ID
and (E)CC after applying
longest/strongest search
criteria.
Yes No Yes Yes Pending Answer Timer from
Transaction Configuration
Set for Request's Appl-ID
and (E)CC after applying
longest/strongest search
criteria.
No Yes Yes No Pending Answer Timer in
Ingress Peer Node Routing
Option Set.
No Yes No Yes Pending Answer Timer in
Ingress Peer Node Routing
Option Set.
No Yes No No Pending Answer Timer in
Ingress Peer Node Routing
Option Set.
No Yes Yes Yes Pending Answer Timer in
Ingress Peer Node Routing
Option Set.
Transaction
Configuration
Set entry exists Default
for Appl-ID and Transaction
(Extended) Configuration
Command Code Set entry exists
in Request Egress for Appl-ID
being processed Pending Answer Pending and (Extended)
and is Timer specified Answer Timer Command
associated with in Ingress Peer specified in Code in
Ingress Peer Node Routing Egress Peer Request being Resultant Pending Answer
Node Option Set? Node? processed? Timer value used
No No Yes Yes Egress Pending Answer
Timer in Egress Peer Node.
No No Yes No Egress Pending Answer
Timer in Egress Peer Node.
No No No Yes Pending Answer Timer from
Default Transaction
Configuration Set for
Request's Appl-ID and (E)CC
after applying
longest/strongest search
criteria if match occur
otherwise System Default
Pending Answer Timer.
No No No No System Default Pending
Answer Timer.
• Select a Pending Answer Timer in the list, and click Delete. You can delete the selected Pending
Answer Timer. You cannot delete the Default Pending Answer Timer.
Field (* indicates
required field) Description Data Input Notes
* Pending Answer Unique name of the Pending Format: case-sensitive; alphanumeric and
Timer Name Answer Timer. underscore
Range: 1 - 32 characters; cannot start with
a digit and must contain at least one alpha
• Cancel to return to the Diameter > Configuration > Pending Answer Timers page without
saving any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• Any required field is empty; no value was entered or selected
• The entry in any field in not valid (wrong data type or out of the valid range)
• The Pending Answer Timer Name is not unique; it already exists in the system
• Adding the Pending Answer Timer would cause the maximum number of Pending Answer
Timers (16) allowed in the system to be exceeded
Note: A Pending Answer Timer cannot be deleted if it is referenced by either a Peer Node or a Routing
Option Set is referenced by Protected Networks. It also cannot be deleted if it is associated with any
Routing Option Set.
1. Select Diameter > Configuration > Pending Answer Timers.
The Diameter > Configuration > Pending Answer Timers page appears.
2. Select the Pending Answer Timer you want to delete.
3. Click Delete.
A popup window appears to confirm the delete.
4. Click:
• OK to delete the Pending Answer Timer.
• Cancel to cancel the delete function and return to the Diameter > Configuration > Pending
Answer Timers page.
If OK is clicked and the selected Pending Answer Timer no longer exists (it was deleted by another
user), an error message is displayed and the Pending Answer Timers view is refreshed.
Information collected at the TTP level for DOIC throttling can be used to improve routing decisions.
You can perform these tasks on an Active System OAM (SOAM).
You can perform the following actions for Traffic Throttle Points:
• Filter the list of Traffic Throttle Points to display only the desired Traffic Throttle Points.
• Sort the list by column contents in ascending or descending order, by clicking the column heading.
The default order is by Traffic Throttle Points Name in ascending ASCII order.
• Click Insert.
The Traffic Throttle Points [Insert] page appears. You can add a new Traffic Throttle Point. See
Adding Traffic Throttle Points.
If the maximum number of Traffic Throttle Points already exists in the system, an error message
is displayed.
• Select a Traffic Throttle Point Name in the list. Click Edit to display the Traffic Throttle Points
[Edit] page and edit the selected Traffic Throttle Point.
See Editing Traffic Throttle Points.
If no Name is selected, Edit is disabled.
• Select a Traffic Throttle Point Name in the list, and click Delete to remove the selected Traffic
Throttle Point.
See Deleting Traffic Throttle Points.
Field (* indicates a
required field) Description Data Input Notes
* Name The name of the Traffic Throttle Point. Format: case-sensitive;
alphanumeric and underscore
Range: 1 - 32 characters; cannot
start with a digit and must
contain at least one alpha
Default: NA
* Peer Node The Egress Peer associated with this Format: pulldown list
Diameter Application ID and Traffic
Range: 1 - 32 characters; cannot
Throttle Point.
start with a digit and must
contain at least one alpha
Default: NA
Field (* indicates a
required field) Description Data Input Notes
* Application Id The Diameter Application ID associated Format: pulldown list
with this Traffic Throttle Point.
Range: 1 - 32 characters; cannot
start with a digit and must
contain at least one alpha
Default: NA
TTP Configuration Set The Traffic Throttle Point Configuration Format: pulldown list
Set that is associated with this Traffic
Range: 1 - 32 characters; cannot
Throttle Point.
start with a digit and must
contain at least one alpha
Default: NA
* Max Loss Percent The rate loss threshold where if the Format: text box
Threshold current percent loss is greater than or
Range: 1 - 100
equal to this value, requests should not
route to this Traffic Throttle Point and Default: 100%
should be diverted or discarded instead.
Alternate Implicit Optional Route List to use for routing Format: pulldown list
Route messages to this Peer when implicit
Range: 1 - 100
routing is invoked and the primary route
to the Peer is unavailable. Default: 100%
Field (* indicates a
required field) Description Data Input Notes
* Name A name of the Traffic Throttle Format: text box
Group
1 - 32 characters; cannot start with a digit
and must contain at least one alpha
Default: NA
Field (* indicates a
required field) Description Data Input Notes
* Name A name of the AVP Removal List Format: text box
Range: 1 - 32 characters; cannot
start with a digit and must
contain at least one alpha
Default: NA
* Direction Defines whether the AVP removal occurs Format: pulldown list
when the message is received from the
Range: Ingress Only, Egress Only,
peer node or whether the AVP removal
Egress & Ingress
occurs when the message, or both, is sent
to the peer node Default: Ingress Only
* Message Type Defines the type of message that AVP Format: pulldown list
removal will be applied to
Range: Request Only, Answer
Only, Answer & Request
Default: Request Only
AVP Removal List A list of one or more AVPs to be Format: multiple fields
removed from messages
Range: A list of one or more
AVPs to be removed from
requests.
Default: NA
AVP Code The 32-bit AVP Code, combined with the Format: text box
Vendor-ID field, identifies the attribute
Range: 32-bit Unsigned Integer
uniquely
Default: NA
AVP Name User-defined name associated with the Format: text box
AVP Code
Setting a value on this field is
option; informational only.
Vendor ID Vendors are allowed to add AVPs to the Format: text box
Diameter specification. Vendor-specific
Range: 32-bit Unsigned Integer
AVPs contains a Vendor-ID field
Default: 0
Field (* indicates a
required field) Description Data Input Notes
Vendor Name User-defined name associated with the Format: text box
Vendor-ID value
Setting a value on this field is
option; informational only.
• Radius (Remote Authentication Dial In User Service) Connection Layer (RCL) UDP Options
• Client and server socket settings
• Maximum RADIUS UDP Sockets per DAMP
• Socket retry timer
• Priority Options
• Peer Discovery Options
• Realm expiration alarm times
• Priority Service Options
• NGN-PS Admin state
• Message priority for various message types
• AVP value identification
To open the Diameter > Configuration > System Options page, select Diameter > Configuration >
System Options.
On the Diameter > Configuration > System Options page, you can:
• Modify current System Options values, and click Apply to save the changes.
• Click Cancel to remove and not save any changes you have made.
• Click the General Options, Alarm Threshold Options, or Message Copy Options tab to access
those options.
• Work with Radius UDP Options.
• Work with Priority Options.
If Apply is clicked and the following condition exists, an error message is displayed:
• Any field has no value entered or has an entry that is not valid
Redirect Application Application Route Table instance used to process Format: pull down list
Route Table a Redirected Request.
Range: NA
Note: If not configured, ART processing is
Default: NA
skipped, and if configured, the ART is searched
with the content of the Redirect Request message,
similar to an ingress request.
Redirect Peer Route Peer Route Table instance used to process a Format: pull down list
Table Redirected Request.
Range: NA
Note: If not configured, the PRT selection
Default: NA
process is identical to the ingress request.
Fixed Connection Major Major threshold for aggregated Fixed Connection Format: numeric
Aggregation Alarm alarms per DA-MP. The Available Alarm Budget
Range: 1 to Available
Threshold is decremented by this value multiplied by the
Alarm Budget
number of configured DA-MPs.
Default: 100
IPFE Connection Major Major threshold for aggregated IPFE Connection Format: numeric
Aggregation Alarm alarms per NE. The Available Alarm Budget is
Range: 1 to Available
Threshold decrement by this value.
Alarm Budget
Default: 100
Peer Node Failure Critical threshold for aggregated Peer Node Format: numeric
Critical Aggregation Failure alarms per NE. The Available Alarm
Range: 1 to Available
Alarm Threshold Budgets decremented by this value
Alarm Budget
Default: 600
Route List Failure Critical threshold for aggregated Route List Format: numeric
Critical Aggregation Failure alarms per NE. The Available Alarm
Range: 1 to Available
Alarm Threshold Budget is decremented by this value
Alarm Budget
Default: 600
MP Congestion Level The MP congestion at or above which the Format: radio button
Message Copy function is disabled.
Range: CL1, CL2
Default: CL1
Client Socket Receive The socket receive buffer size for incoming UDP Format: numeric
Buffer Size messages received from RADIUS servers.
Range: 8000 - 5000000
bytes
Default: 126000
Server Socket Send The socket send buffer size for outgoing UDP Format: numeric
Buffer Size messages sent to RADIUS clients.
Range: 8000 - 5000000
bytes
Default: 1000000
Server Socket Receive The socket receive buffer size for incoming UDP Format: numeric
Buffer Size messages received from RADIUS clients.
Range: 8000 - 5000000
bytes
Default: 1000000
Maximum Open Maximum number of UDP Sockets that can be Format: numeric
RADIUS UDP Sockets opened on a DA-MP for sending messages to
Range: NA
per DA-MP RADIUS Connections.
Default: 2000
Server socket retry timer The time internal used to retry opening a UDP Format: numeric
socket which could not be opened.
Range: NA
Default: 10000 ms
Redirect Application Application Route Table instance used to process Format: pull down list
Route Table a Redirected Request.
Range: NA
Note: If not configured, ART processing is
Default: NA
skipped, and if configured, the ART is searched
with the content of the Redirect Request message,
similar to an ingress request.
Encode FQDN In Lower Determines whether or not FQDNs should be Format: radio button
Case encoded as configured or in all lower-case.
Range: Yes, No
Default: Yes
Fixed Connection Major Major threshold for aggregated Fixed Connection Format: numeric
Aggregation Alarm alarms per DA-MP. The Available Alarm Budget
Range: 1 to Available
Threshold is decremented by this value multiplied by the
Alarm Budget
number of configured DA-MPs.
Default: 100
IPFE Connection Major Major threshold for aggregated IPFE Connection Format: numeric
Aggregation Alarm alarms per NE. The Available Alarm Budget is
Range: 1 to Available
Threshold decrement by this value.
Alarm Budget
Default: 100
Peer Node Failure Critical threshold for aggregated Peer Node Format: numeric
Critical Aggregation Failure alarms per NE. The Available Alarm
Range: 1 to Available
Alarm Threshold Budgets decremented by this value
Alarm Budget
Default: 600
Route List Failure Critical threshold for aggregated Route List Format: numeric
Critical Aggregation Failure alarms per NE. The Available Alarm
Alarm Threshold Budget is decremented by this value
MP Congestion Level The MP congestion at or above which the Format: radio button
Message Copy function is disabled.
Range: CL1, CL2
Default: CL1
Client Socket Receive The socket receive buffer size for incoming UDP Format: numeric
Buffer Size messages received from RADIUS servers.
Range: 8000 - 5000000
bytes
Default: 126000
Server Socket Send The socket send buffer size for outgoing UDP Format: numeric
Buffer Size messages sent to RADIUS clients.
Range: 8000 - 5000000
bytes
Default: 1000000
Server Socket Receive The socket receive buffer size for incoming UDP Format: numeric
Buffer Size messages received from RADIUS clients.
Range: 8000 - 5000000
bytes
Default: 1000000
Maximum Open Maximum number of UDP Sockets that can be Format: numeric
RADIUS UDP Sockets opened on a DA-MP for sending messages to
Range: NA
per DA-MP RADIUS Connections.
Default: 2000
Server socket retry timer The time internal used to retry opening a UDP Format: numeric
socket which could not be opened.
Range: NA
Default: 10000 ms
Minimum Answer Defines the minimum priority assigned to ingress Format: pulldown list
Priority Answer messages. The priority is assigned based
Range: P1 - P4
on the maximum value for this attribute and the
priority of the original Request message. Default: P3
Note: This attribute is not user-configurable.
Minimum Inviolable Defines the minimum priority considered to be Format: pulldown list
Priority inviolable from a message priority treatment
Range: P3, P4
perspective.
Default: P3
A message with a priority greater than or equal
to this attribute value is not subject to congestion
controls.
Note: This attribute is not user-configurable.
Each DA-MP sets this value at start-up based
upon the setting of the NGN-PS Admin State
attribute value as follows:
• NGN-PS Admin State = Enabled: 4
• NGN-PS Admin State = Disabled: 3
NGN-PS Maximum Defines the maximum ingress NGN-PS message Format: textbox
Message Rate Percent that is supported (a percentage of the DA-MP
Range: 1 - 15%
message rate). NGN-PS traffic in excess of this
rate, is not considered to be inviolable. Default: 3%
NGN-PS Gx
NGN-PS Gx ARP Sets the priority level contained in Gx Messages Format: text box
in ARP AVP that can be treated as NGN-PS
Range: 1-5
messages.
Default: NA
Note: You can configure a maximum of 5
priority levels.
NGN-PS Gx Advance Determines the Access Network priority Format: radio button
Priority Type provided to an NGN-PS Subscribed UE. This
Range: None, Advance
affects the tagging of Gx CCR messages for
Priority SPR, and
NGN-PS treatment.
Advance Priority HSS
Default: NA
NGN-PS Rx
NGN-PS Rx Admin Defines whether the NGN-PS feature is enabled Format: radio button
State or not for Rx messages. When this attribute is set
Range: Enabled. Disabled
to Disabled, DSR does not provide NGN-PS
treatment to Rx messages. Default: Disabled
Note: This attribute is superseded by the
NGN-PS Admin State attribute. If NGN-PS
Admin State is set to Disabled, no Rx messages
are provided NGN-PS treatment regardless of
the setting of this attribute.
NGN-PS Rx MPS AVP A Rx AAR message is considered a NGN-PS Format: text box
Value message candidate if it contains a MPS-Identifier
Range: NA
AVP whose value is identical to this string.
Default: NA
NGN-PS Cx/Dx
NGN-PS Cx/Dx Admin Defines whether the NGN-PS feature is enabled Format: radio button
State or not for Cx/Dx messages. When this attribute
Range: Enabled. Disabled
is set to Disabled, DSR does not provide
NGN-PS treatment to Cx/Dx messages. Default: Disabled
Note: This attribute is superseded by the
NGN-PS Admin State attribute. If NGN-PS
Admin State is set to Disabled, no Cx/Dx
NGN-PS Dh/Sh
NGN-PS Dh/Sh Admin Defines whether the NGN-PS feature is enabled Format: radio button
State or not for Dh/Sh messages. When this attribute
Range: Enabled. Disabled
is set to Disabled, DSR does not provide
NGN-PS treatment to Dh/Sh messages. Default: Disabled
Note: This attribute is superseded by the
NGN-PS Admin State attribute. If NGN-PS
Admin State is set to Disabled, no Dh/Sh
messages are provided NGN-PS treatment
regardless of the setting of this attribute.
Note: You can suppress the Realm Expiration alarm by supplying a value of zero. So, if the
Minor value greater than the Major value only applies if both values are non-zero.
• The selected Traffic Throttle Point Configuration Set no longer exists; it has been deleted by
another user.
• Any field is empty (no value was entered).
• The value in any field is not valid or is out of range.
Field (* indicates
required field) Description Data Input Notes
Primary DNS Server IP IP address of the primary DNS server. Format: valid IP address
Address
Field (* indicates
required field) Description Data Input Notes
Secondary DNS Server IP address of the secondary DNS server. Format: valid IP address
IP Address
* DNS Query Duration The amount of time the application waits for Format: numeric
Timer queries to the DNS servers (in seconds).
Range: 1 - 4
Default: 2
• Peer Node
• CEXCfgSet
• Connection
• Route Group
• Route List
Note: This order is not guaranteed; in some configurations, variations associated with a particular
Application ID could alter this order.
For a Diameter router to route messages properly, target entity information is required. This includes
the network entity IP address, the transport protocol and ports that it uses to communicate, and what
Diameter application it supports. This information about a remote host is managed by the Peer Node
configuration. See Diameter Peer Nodes.
After a Peer Node is defined, one or more IP connections must be defined so that packets can be routed
between the diameter router and the Peer Node. Connections identify the parameters that define an
IP connection, and the CEX Configuration Set defines the Diameter Application IDs that the diameter
router is authorized to send and receive over the connection. When the diameter signalling router and
a diameter peer initially establish an IP connection between themselves, they negotiate the diameter
services that can be carried on that IP connection. That negotiation involves the exchange of supported
Diameter Application IDs.
For load balancing and redundancy purposes, multiple Peer Nodes that share certain characteristics
can be grouped together into Route Groups. The diameter router uses the routing algorithms of the
configured Route Groups and Route Lists when determining on which Connection to send a particular
Diameter message.
Peer Discovery allows you to work with:
• Realms (see Realms)
• DNS Sets (see DNS Sets)
• Discovery Attributes (see Discovery Attributes)
Realms
The Diameter > Configuration > Peer Discovery > Realms page displays the Realms GUI page.
See Realms Overview for more information.
On the Diameter > Configuration > Peer Discovery > Realms page, you can perform the following
actions:
• Filter the list of Realms to display only the desired Realms.
• Sort the list by a column, in ascending or descending order, by clicking the column heading. The
default order is by Realm Name in ascending ASCII order.
• Click Insert.
The Realms [Insert] page appears. You can add a new Realm. See Adding Realms.
If the maximum number of Realms already exists in the system, an error message is displayed.
• Select a Realm Name in the list, and click Edit to display the Realms[Edit] page and edit the selected
Realm. See Editing Realms.
• Select a Realm Name and click Delete to remove the selected Realm Name. See Deleting Realms.
Realms Overview
A realm is an internet domain whose Fully-Qualified Domain Names (FQDNs) typically all share a
domain designation. For example, example.com could be a Realm name, and the addressable hosts
in the Realm would have names like host1.example.com, host2.subdomain1.example.com, and so on.
In the diameter signaling space, an operator creates a realm name, then assigns FQDNs to all of the
computers that will transact diameter traffic. The number of computers in the Diameter Realm depends
on the number and type of diameter services the operator intends to support, as well as the expected
volume of diameter traffic. Typically, load-sharing and redundancy are major factors governing the
internal organization of a Diameter Realm.
The dynamic discovery of remote hosts is always undertaken within a single realm. Many realms can
be discovered dynamically, but the discovery of one realm is a process independent of that for all
other realms that are to be discovered.
The routing application discovers the Realm by sending questions (DNS requests) to the Realm's DNS
server or servers. Depending on the answers, the routing application dynamically updates the
configuration. These answers are in the form of DNS Resource Records (RRs).
DPD relies on three DNS Resource Record types to obtain the information needed to dynamically
configure a Realm. The three types are, in the hierarchical order in which they are requested:
• Name Authority Pointer (NAPTR) Record - is a general-purpose DNS record that has uses beyond
Diameter
• Service Locator (SRV) Record - is another general-purpose DNS record that is used well beyond
Diameter signaling
• Address (A or AAAA) Record - is a DNS containing an IP address that can be used to reach the
host
Supported Protocols
Realm discovery depends on information from remote hosts within the Realm. The routing application
must discover what protocols can be used while communication with the host. Also important is the
list of locally-supported protocols, which are protocols that are supported by the routing application,
and thus could use when communicating with a remote host.
The full set of transport protocols that can be used when establishing Diameter connections is:
• TCP
• SCTP
• TLS
• DTLS
DNS Discovery
Realm discovery has two phases:
• DNS information for the Realm is retrieved and processed
• A NAPTR record is selected
• A single Diameter S-NAPTR record is selected for attempted resolution
• If a Realm's DNS information does not include any NAPTR records, the DSR may still be able
to learn something useful about the realm through the direct SRV query fallback mechanism.
• The routing application adds the needed configuration objects, based on the prioritized list of
remote hosts, to enable proper routing of Diameter traffic to the remote hosts in the Realm. This
only occurs after the routing application concludes that sufficient DNS information exists to route
Diameter traffic to at least one remote host within the Realm. Converting discovered DNS
information into a routing configuration can be a complex undertaking, and it depends entirely
on the discovered remote hosts, how many IP addresses each host exposes, the protocol(s) each
host supports, and the Application ID(s) each host supports. See Discovery Attributes, Diameter Route
Lists, and Diameter Route Groups.
Realm Expiration
DNS is designed such that every piece of DNS information has a defined lifetime. After this time
duration passes, the information is considered expired. In many cases, a particular piece of DNS
information might not change at all over very long periods of time, but in some cases, the information
can change, and users of that information are responsible for retrieving and acting on the updated
values.
There are potentially dozens of individual DNS resource records that are processed when discovering
a Realm, and each of those RRs has its own TTL value. The routing application distills those TTLs
down to a single Realm Expiration date/time, by taking the nearest-term TTL value from all of the
DNS RRs it processes during the Realm's discovery. From the routing application perspective, a Realm
expires after enough time passes that the first relevant DNS record expires. After one piece of
information becomes old, the entire Realm's discovered data is considered old. You can set or suppress
the pending expiration alarms.
DPD implements a couple of user-configurable pending expiration alarms, in order to notify users
that a Realm is approaching is expiration. The user configures each of these two alarms. The Realm
Expiration Minor Alarm Set Time, in hours, indicates how many hours before Realm expiration a
minor alarm should be raised. This value can be as large as 168 hours (one week) prior to Realm
expiration. The Realm Expiration Major Alarm Set Time, also in hours, indicates how many hours
before Realm expiration a major alarm should be raised. This value can be as large as 167 hours, and
must always be at least one hour shorter than the Minor Alarm Set Time, if the Minor Alarm Set Time
exists.
Description A description of the realm Format: Text box; description of the realm.
Viewing Realms
Use this task to view a Peer Discovery Realm.
To view all Realms, select Diameter > Configuration > Peer Discovery > Realms.
The Diameter > Configuration > Peer Discovery > Realms page appears showing a list of configured
Realms. The fields are described in Peer Discovery Realms elements.
Adding Realms
Use this task to create a new Peer Discovery Realm.
The fields are described in Peer Discovery Realms elements.
1. Select Diameter > Configuration > Peer Discovery > Realms.
The Realms page appears.
2. Click Insert.
The Realms [Insert] page appears.
3. Enter a unique name in the Realm Name field.
4. Select or enter the element values.
5. Click:
• OK to save the new Realm Name and return to the Realms page.
• Apply to save the new Realm name and remain on this page.
• Cancel to return to the Realms page without saving any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• Any required field is empty (no value was entered).
• The value in any field is not valid or is out of range.
• The Realm Name is not unique; it already exists in the system.
Editing Realms
Use this task to edit an existing Peer Discovery Realm.
When the Realms page opens, the fields are populated with the currently configured values.
The Realm Name cannot be edited.
The fields are described in Peer Discovery Realms elements.
1. Select Diameter > Configuration > Peer Discovery > Realms.
The Realms page appears.
2. Select the Realm Name to edit.
3. Click Edit.
Deleting Realms
Use this task to delete Peer Discovery Realms.
1. Select Diameter > Configuration > Peer Discovery > Realms.
The Realms page appears.
2. Select the Realm Name you want to delete.
3. Click Delete.
A popup window appears to confirm the delete.
4. Click:
• OK to delete the Realm Name.
• Cancel to cancel the delete function and return to the Realms page.
DNS Sets
The Diameter > Configuration > Peer Discovery > DNS Sets page displays the DNS Sets GUI page.
You can perform these tasks on an Active System OAM (SOAM).
On the Diameter > Configuration > Peer Discovery > DNS Sets page, you can perform the following
actions:
• Filter the list of DNS Sets to display only the desired DNS Sets.
• Sort the list by a column, in ascending or descending order, by clicking the column heading. The
default order is by DNS Sets Name in ascending ASCII order.
• Click Insert.
The DNS Sets [Insert] page appears. You can add a new DNS Sets. See Adding DNS Sets.
If the maximum number of DNS Sets already exists in the system, an error message is displayed.
• Select a DNS Sets Name in the list, and click Edit to display the DNS Sets[Edit] page and edit the
selected Realm. See Editing DNS Sets.
• Select a DNS Sets Name and click Delete to remove the selected DNS Sets Name. See Deleting
DNS Sets.
Primary DNS IP address of the primary DNS server. Format: valid IP address
Server IP
Range: 39 characters (The longest IPv6
Address
address that can be formed is 8 octets
of 4 characters (=32) plus seven colon
delimiters (=7), for a total of 39
characters.
Secondary DNS IP address of the secondary DNS server. Format: valid IP address
Server IP
Range: 39 characters (The longest IPv6
Address
address that can be formed is 8 octets
of 4 characters (=32) plus seven colon
delimiters (=7), for a total of 39
characters.
DNS Query Specifies how long the application waits for Format: numeric value
Timeout (sec) a response from the DNS server.
Range: 1 - 4 seconds
Default: 2
Number of Specifies how many times the application Format: numeric value
Retries retires if the DNA query times out.
Range: 1 - 3 seconds
Default: 2
The Diameter > Configuration > Peer Discovery > DNS Sets page appears showing a list of configured
DNS Sets. The fields are described in Peer Discovery DNS Sets elements.
If Edit is clicked and the selected DNS Set is not associated with one or more Discovery Attributes
instances, the DNS Sets [Edit] page is displayed.
If Edit is clicked and the selected DNS Set is associated with one or more administratively enabled
Discovery Attributes instances, an error code is displayed.
4. Click:
• OK to delete the DNS Set.
• Cancel to cancel the delete function and return to the DNS Sets page.
If OK or Apply is clicked and the following condition exists, an error message appears:
• The selected DNS Set is referenced by one or more Discovery Attributes, the DNS Set is not
deleted.
Discovery Attributes
The Diameter > Configuration > Peer Discovery > Discovery Attributes page displays the Discovery
Attributes GUI page.
You can perform these tasks on an Active System OAM (SOAM).
On the Diameter > Configuration > Peer Discovery > Discovery Attributes page, you can perform
the following actions:
• Filter the list of Discovery Attributes.
Note: You can filter up to four columns simultaneously by using the compound filter widget.
• Sort by a column, in ascending or descending order, by clicking the column heading.
• Click Insert.
The Discovery Attributes > [Insert] page appears. You can add a new Discovery Attribute.
If the maximum number of Discovery Attributes already exists in the system, an error message is
displayed.
• Select an attribute in the list, and click Edit to display the Discovery Attributes[Edit] page and
edit the selected attribute. See Editing Discovery Attributes.
• Select an attribute and click Delete to remove the selected item. See Deleting Discovery Attributes.
DNS Set DNS server set used for Peer Discovery. Format: pulldown list
Default: -Select-
Local Node Local Node used to connect to all Peers Format: pulldown list
discovered within the Realm.
Range: NA
Connection Specifies the connection mode used for Peer Format: pulldown list
Mode discovery.
Range:
• Initiator Only indicates that all
connections to discovered Peers are
Initiator Only; the application
attempts to initiate connection to
these Peers.
• Initiator & Responder indicates that
all connections to discovered Peers
are of the type Initiator &
Responder; the application
attempts to initiate connection to
the discovered Peers as well as
listen for connection attempts from
these Peers.
Default: Initiator & Responder
Local Protocol If checked, this indicates that the local Format: checkbox
Preference protocol preferences specified for each
Range: checked, unchecked
Override Application ID take precedence over the
protocol preferences discovered for each Default: Unchecked
Peer in the Realm.
Applications List of applications used for peer discovery.
CEX CEX parameters to be CEX Format: pulldown list
Parameters searched. You can specify up Parameters Range: Configured CEX
to ten parameters. . parameters
If no Vendor IDs are Default: -Select-
associated with the selected
CEX parameter, Additional
Supported Vendor IDs is
empty.
Note: Because each Realm can
have one to ten CEX
parameters, you must use the
plus (+) symbol to expand the
list. Sorting by any of the fields
associated with the CEX
parameter is not supported on
the view page.
IPFE Initiator Specifies the DA-MP that initiates the Format: pulldown list
DAMP dynamic connections.
Range:
Note: This is mandatory if the Local IP
Default:
Address is a Target Set address; otherwise
it is not applicable.
Realm Prefix Specifies the Realm prefix to be used as the Format: text box; case sensitive;
first portion of the name of all configuration alphanumeric and underscore
objects that are dynamically created by the
Range: 1 - 12 characters, cannot start
application as a function of Realm
with a digit and must contain at least
discovery.
one alpha
Range: NA
Default: Default
2. Click Insert.
The Discovery Attributes [Insert] page appears.
3. Specify a unique name in the Realm Name field.
4. Select or enter the element values.
5. Click:
• OK to save the new Discovery Attributes and return to the Discovery Attributes page.
Note: This assumes that all validation checks pass.
• Apply to save the new Discovery Attributes and remain on this page.
Note: This assumes that all validation checks pass.
• Cancel to return to the Discovery Attributes page without saving any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• The Connection Mode for a Realm being discovered is Initiator & Responder, and the Local
Node assigned to the Discovery Attributes instance does not have a Listen Port assigned to at
least one protocol.
Note: In order for any dynamically-created Connection to act in the role of Responder, a Listen
Port must be assigned for one or more protocols. If the Realm's Connection Mode is Initiator,
then Listen Ports do not have to be supplied.
• The Local Protocol Preference Override value is Yes, and the preference value for all protocols
associated with any configured Application Id is zero or is missing.
• Any validation checks fail.
• Any required field is empty (no value was entered).
• The value in any field is not valid or is out of range.
• Any required information is not unique; it already exists in the system.
• The maximum number of any of the discovery attributes already exists in the system.
• Cancel to return to the Discovery Attributes page without saving any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• The selected element no longer exists; it has been deleted by another user.
• The selected element is referenced by one or more administratively enabled Discovery Attributes.
Note: You can edit an administratively disabled Discovery Attribute, because changing the
DNS Set attributes has no impact on active Realm discovery.
• Any validation checks fail.
• Any required field is empty (no value was entered).
• The value in any field is not valid or is out of range.
• The Realm Name is not unique; it already exists in the system.
• The Connection Mode for a Realm being discovered is Initiator & Responder, and the Local
Node assigned to the Discovery Attributes instance does not have a Listen Port assigned to at
least one protocol.
Note: In order for any dynamically-created Connection to act in the role of Responder, a Listen
Port must be assigned for one or more protocols. If the Realm's Connection Mode is Initiator,
then Listen Ports do not have to be supplied.
• The Local Protocol Preference Override value is Yes, and the preference value for all protocols
associated with any configured Application Id is zero or is missing.
• The maximum number of a selected element already exists in the system.
4. Click:
• OK to delete the selected row.
• Cancel to cancel the delete function and return to the Discovery Attributes page.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• The selected Discovery Set instance is administratively enabled or the discovery state is Extend
or Rediscover.
4
Diameter Maintenance
Field Description
Route List Name Name of the Route List.
Minimum Route Group Minimum Route Group availability weight for this Route List.
Availability Weight
Route Group Route Groups assigned to the Route List.
Field Description
MP Server Hostname Hostname of the Message Processor Server from which status is reported.
• For a Multiple Active DA-MP configuration, the MP Leader always
reports the Route List status
• For an Active/Standby DA-MP configuration, the Active DA-MP
reports the Route List status
Dynamic Indicates whether or not the element was created dynamically (YES) or
statically (NO). NO is assigned for all element instances, except for those
created via Dynamic Peer Discovery.
Priority Priority of each Route Group in the Route List.
Provisioned Capacity Capacity assignment for each Route Group in the Route List.
Current Capacity Current capacity available for each Route Group in the Route List.
Active/Standby A Route Group can be:
• Active: this is the Route Group that Diameter messages are actively
being routed to
• Standby: messages are not currently being routed to this Route Group,
unless the Active Route Group is unavailable and Route Across Route
Groups is enabled on the Route List
• Unk: information on this Route Group is not present in the database
Time of Last Update Time stamp that shows the last time the status information was updated.
Field Description
Route Group Name Name of the Route Group.
Peer Number and names of Peer Nodes or Connections in the Route Group.
Node/Connection
MP Server Hostname of MP server from which status is reported.
Hostname
• For a Multiple Active DA-MP configuration, the MP Leader always reports
the Route Group status
• For an Active/Standby DA-MP configuration, the Active DA-MP reports
the Route Group status
Dynamic Indicates whether or not the element was created dynamically (YES) or statically
(NO). NO is assigned for all element instances, except for those created via
Dynamic Peer Discovery.
Provisioned • For a Peer Route Group, the sum total of the Provisioned Capacity of all the
Capacity Peer Nodes in the Route Group.
• For a Connection Route Group, the sum total of the Provisioned Capacity
of all the Connections in the Route Group.
Provisioned Percent The percentage of capacity assigned to each Peer Node/Connection compared
to all Peer Nodes/Connections in the Route Group.
Available Capacity • For a Peer Route Group, the sum total of the Available Capacity of all the
Peer Nodes in the Route Group.
• For a Connection Route Group, the sum total of Available Capacity of all
the Connections in the Route Group.
Field Description
Available Percent The percentage of capacity the Peer Node/Connection currently has compared
to the total Available Capacity of all Peer Nodes/Connections in the Route
Group.
Peer Peer Node/Connection Status can be:
Node/Connection
• Available: the Available Capacity is greater than the minimum capacity
Status
• Degraded: the Available Capacity is greater than zero, but less than the
Provisioned Capacity
• Unavailable: the Available Capacity is zero
• Unk: status information is not available in the database
Time of Last Time stamp that shows the last time the status information was updated.
Update
Field Description
Peer Node Name Name of the Peer Node.
MP Server Hostname Hostname of MP server from which status is reported.
For the Peer Node status:
• For a Multiple Active DA-MP configuration, the MP Leader always
reports the Peer Node status
• For an Active/Standby DA-MP configuration, the Active DA-MP reports
the Peer Node status
For Connection status (when the Connection field is expanded):
• Fixed (non-IPFE) Connections are always reported by the DA-MP that
hosts the Fixed Connection
• Owned IPFE Connections are always reported by the DA-MP that hosts
the established IPFE Connection
• Unowned IPFE Connections (ones that have been configured, but are
currently not assigned to a DA-MP by IPFE) are reported by the MP
Leader
Dynamic Indicates whether or not the element was created dynamically (YES) or
statically (NO). NO is assigned for all element instances, except for those
created via Dynamic Peer Discovery.
Operational Status Peer Node Operational Status can be:
• Available: at least one Peer Node connection is available for routing
• Degraded: the Peer Node connection is not unavailable but it is not
operating as expected. The Operational Reason field provides additional
information on this status.
• Unavailable: all connections for a Peer Node are unavailable. The
Operational Reason field provides additional information on this status.
Operational Reason Reason for the Peer Node Operational Status. Information is also available
for each connection.
Connection Number and names of connections associated with the Peer Node.
Time of Last Update Time stamp that shows the last time the status information was updated.
Peer Node Group A group of Peer Nodes that share common characteristics and attributes.
Name This group is used by IPFE for Peer Node Group Aware connection
distribution.
Transaction Unique name of the Transaction Configuration Set.
Configuration Set
Name
Field Description
Connection Name Name of the Connection
MP Server Hostname Hostname of the MP server from which status is reported:
• Fixed (non-IPFE) Connections are always reported by the DA-MP that
hosts the Fixed Connection
• Established IPFE Connections are always reported by the DA-MP that
hosts the established IPFE Connection
Field Description
• Non-Established IPFE Connections (ones that have been configured, but
are currently not assigned to a DA-MP by IPFE) are reported by the MP
Leader
Dynamic Indicates whether or not the element was created dynamically (YES) or
statically (NO). NO is assigned for all element instances, except for those
created via Dynamic Peer Discovery.
Admin State A Connection's administrative state can be:
• Enabled: the Connection is Enabled
• Disabled: the Connection is Disabled
• Unk: unknown; the state of the Connection is not available in the database
RADIUS Server Indicates that RCL can only receive RADIUS Request
messages and send RADIUS Response messages of the
Connection.
RADIUS Client Indicates that RCL can only send RADIUS Request
messages and receives RADIUS Response messages of
the Connection.
CPL The Connection Priority Level is the maximum of the following values:
• Operational Status (0=available; 3=degraded; 99=unavailable)
• Remote Busy Congestion Level (0-3)
• Egress Transport Congestion Level (0-4)
• Egress Message Rate Congestion Level (0-3)
Field Description
Operational Reason Reason for the Operational Status. The following reasons can occur:
• Disabled
• Connecting
• Listening
• Abnormal
• Disconnecting
• Proving
• Watchdog
• Remote Busy Congestion
• Egress Transport Congestion
• Egress Message Rate Congestion
• Normal
• Peer with reduced IP set
IPFE Initiator DAMP The IPFE Initiator DA-MP for this connection.
Peer Node Peer Node associated with the Connection
Remote IP Addresses The IP address(es) of the Peer Node associated with the Connection
Remote Port The Listen Port of the Peer Node associated with the Connection
Local Initiate Port The Local Initiate Port associated with the Connection
Ingress Msgs Per A 30-second running average of the Ingress messages processed by the
Second Connection
Common Application A comma-separated list of Application IDs received in a Diameter CEA
IDs message, or a list of Application Names. The first 10 Application IDs received
in the CEA are listed.
Note: For local nodes, CEAs are sent in response to erroneous CERs.
Transport Congestion The amount of time spent at Egress Transport Congestion Levels 3, 2, and
Abatement Timeout 1 during Egress Transport Congestion Abatement
Remote Busy Usage Indicates which Request messages can be forwarded on this Connection
after receiving a DIAMETER_TOO_BUSY response from the Connection's
Peer.
Disabled The Connection is not considered to be BUSY after receiving
a DIAMETER_TOO_BUSY response. All Request messages
continue to be forwarded to (or rerouted to) this Connection.
Enabled The Connection is considered to be BUSY after receiving a
DIAMETER_TOO_BUSY response. No Request messages are
forwarded to (or rerouted to) this Connection until the
Remote Busy Abatement Timeout expires.
Field Description
Host The Connection is considered to be BUSY after receiving a
Override DIAMETER_TOO_BUSY response. Only Request messages
whose Destination-Host AVP value is the same as the
Connection's Peer FQDN can be forwarded to (or rerouted
to) this Connection until the Remote Busy Abatement
Timeout expires.
Remote Busy If Remote Busy Usage is Enabled or Host Override, this is the time period
Abatement Timeout in seconds that the Connection will be considered BUSY from the last time
a DIAMETER_TOO_BUSY response was received.
Message Priority Indicates the source of Message Priority for a Request message arriving on
Setting the Connection. Possible settings are:
• None - use the Default Message Priority Configuration Set
• Read from Request Message - read the Message Priority from the ingress
Request
• User Configured - Apply the user configured Message Priority
Configuration Set
Message Priority The Message Priority Configuration Set associated with the Connection
Configuration Set
Egress Message The Egress Message Throttling Configuration Set associated with the
Throttling Connection
Configuration Set
Egress Msgs Per The most recent Egress Message Rate on the Connection
Second
Test Mode Indicates if this is a Test Connection
PDUs to Diagnose For a test Connection currently undergoing diagnosis, this shows the number
of PDUs yet to be diagnosed.
Time of Last Update Time stamp that shows the last time the status information was updated
Enabling Connections
Use the following steps to enable one or more connections.
1. Select Diameter > Maintenance > Connections.
The Diameter > Maintenance > Connections page appears.
2. Select 1 - 20 connections to enable.
To select multiple connections, press the CTRL key when selecting each connection. To select
multiple contiguous connections, click the first connection you want, then press the SHIFT key and
select the last connection you want. All the connections between are also selected.
3. Click Enable.
A confirmation box appears.
4. Click OK.
The selected connections are enabled.
If any of the selected connections no longer exist (they have been deleted by another user), an error
message is displayed, but any selected connections that do exist are enabled.
Disabling Connections
Use the following steps to disable one or more connections.
1. Select Diameter > Maintenance > Connections.
The Diameter > Maintenance > Connections page appears.
2. Select 1 - 20 connections to disable.
To select multiple connections, press the CTRL key when selecting each connection. To select
multiple contiguous connections, click the first connection you want, then press the SHIFT key and
select the last connection you want. All the connections between are also selected.
3. Click Disable.
A confirmation box appears.
4. Click OK.
The selected connections are disabled.
If any of the selected connections no longer exist (they have been deleted by another user), an error
message is displayed, but any selected connections that do exist are disabled.
Field Description
Duplicate TSNs Received A duplicate TSNs received counter on a per SCTP connection basis.
Gap Acknowledgement Block An acknowledgment blocks received counter on a per SCTP
Received connection basis.
Retransmit Data Chunks Sent A retransmit data chunks sent counter on a per SCTP connection
basis.
Total Data Chunks Sent A total data chunks sent counter on a per SCTP connection basis.
IP Address The Peer Remote IP Address associated with the path
State Indicates whether the path is active or inactive
Congestion Window (cwnd) The maximum amount of data, in bytes, that can be sent before an
acknowledgment must be received
Smoothened Round Trip Time The round-trip time, in milliseconds, associated with the path,
(srtt) (ms) adjusted to remove sample-to-sample fluctuations
Retr. Timeout (rto) (ms) Retransmission timeout; the amount of time, in milliseconds, to
wait for an acknowledgment before declaring a transmission error
Path MTU (pmtu) Maximum transmission unit; the maximum data unit size, in bytes,
that can be sent on the path without fragmentation
The selected test connection is under diagnosis. The PDUs to Diagnose value is set to the maximum
diagnose PDU count.
If the selected connection no longer exists (it was deleted by another user), an error message is
displayed and the Diameter > Maintenance > Connections page is refreshed.
Each function has an individual Administration State (Enable/Disable) and Operational Status, as
shown in Table 52: Egress Throttle Groups Admin States.
The Egress Throttle Group maintenance status is displayed on the Diameter > Maintenance > Egress
Throttle Groups GUI page. Egress Throttle Groups use the Leader sourcing method for reporting of
maintenance status. The Leader sourcing method is used because each DA-MP will have identical
status data; only the DA-MP Leader will report the maintenance status to the GUI. Table 53: ETG
Operational Status shows the ETG operational status.
ETG Operational
Status Description
Available ETG monitoring is active and Request throttling is not occurring for this ETG.
Degraded ETG monitoring is active and Request throttling is occurring for this ETG.
Some Requests may be getting throttled based on their Priority
Inactive ETG monitoring is inactive and Request Throttling is not occurring for this ETG.
The Operational Reason indicates why this ETG is Inactive.
When Operational Reason is Disabled the ETG is Inactive due to maintenance
actions.
When the Operational Reason is SMS Service Degraded or No DA-MP Leader
the ETG is Inactive due to a fault condition.
If either Rate Limiting or Pending Transaction Limiting Operational Status is Degraded, then the
Diameter Routing Function will throttle the Request messages according to highest severity. For
example, if Rate Limiting Operational Status is Congestion Level 1 and Pending Transaction Limiting
Operational Status is Congestion Level 2 , then the Diameter Routing Function will throttle Request
messages according to Congestion Level 2 (all Request messages with Priority 0 or 1 will be throttled).
As shown in Table 54: ETG Operational Reason.
No DA-MP Leader ETG Monitoring is Inactive due to HA reporting No DA-MP Leader condition
to the Diameter Routing Function.
The Diameter > Maintenance > Egress Throttle Groups page provides the Operational Status of the
Egress Throttle Groups Rate Limiting and Pending Transactions Limiting functions, including an
Operational Reason for the status.
Egress Throttle Groups maintenance fields are described in Diameter Egress Throttle Groups maintenance
elements
If the column data is not present in the database, the columns for the Egress Throttle Group Name are
displayed as Unk.
On the Diameter > Maintenance > Egress Throttle Groups page, you can perform the following
actions:
• Filter the list of Egress Throttle Groups to display only the Egress Throttle Groups.
• Sort the list by a column, in ascending or descending order, by clicking the column heading. The
default order is by Egress Throttle Groups in ascending ASCII order.
• Select one or more (up to 20) Egress Throttle Groups records at a time.
• Enable Rate Limiting for up to 20 selected Egress Throttle Groups.
• Disable Rate Limiting for up to 20 selected Egress Throttle Groups.
• Enable Pending Transaction Limiting for up to 20 selected Egress Throttle Groups.
• Disable Pending Transactions Limiting for up to 20 selected Egress Throttle Groups.
• Prevent the page from automatically refreshing every 10 seconds, by clicking the Pause updates
check box.
Field Description
Egress Throttle Group Name Name of the Egress Throttle Group.
Egress Throttle List Name Name of optional Egress Throttle List that includes this Egress
Throttle Group.
Egress Throttle Control Scope Type of Egress Throttle Control Scope, either ETL for NOAM
managed egress throttling or ETG for SOAM managed egress
throttling
Rate Limiting Admin State Rate Limiting Admin State can be Enabled or Disabled.
Rate Limiting Operational Status Rate Limiting Operational Status can be:
• Available: at least one Egress Throttle Groups peer or connection
is available.
• Degraded: the Egress Throttle Groups peer or connection is not
unavailable but it is not operating as expected. The Rate Limiting
Operational Reason field provides additional information on
this status.
• Inactive: all connections for an Egress Throttle Group are
unavailable. The Rate Limiting Operational Reason field
provides additional information on this status.
• Unk: data is not available in the database.
Rate Limiting Operational Rate Limiting Operational Reason as corresponding to the Rate
Reason Limiting Operational Status:
• Available - Normal
• Degraded - Congestion Level 1, Congestion Level 2, Congestion
Level 3
• Inactive - SMS Service Degraded, No DA-MP Leader, Disabled
• Unk - Unk
The cell background color associated with value of Pending
Transaction Limiting Operational Reason is as follows:
• Disabled - normal/no special coloring
• Normal - normal/no special coloring
• SMS Service Degraded - red
• No DA-MP Leader - red
• Unk - red
• Congestion Level 1 - yellow
• Congestion Level 2 - yellow
• Congestion Level 3 - yellow
ETG Egress Request Rate The egress request rate to the Peers and Connections that are
members of the Egress Throttle Group.
ETL Egress Request Rate The egress request rate to the Peers and Connections that are
members of the ETL's component ETGs.
Field Description
Pending Transaction Limiting Pending Transaction Limiting Admin State can be Enabled or
Admin State Disabled.
Pending Transaction Limiting Pending Transaction Limiting Operational Status can be:
Operational Status
• Available: at least one Egress Throttle Groups peer or connection
is available.
• Degraded: the Egress Throttle Groups peer or connection is not
unavailable but it is not operating as expected. The Pending
Transaction Limiting Operational Reason field provides
additional information on this status.
• Inactive: all connections for an Egress Throttle Group are
unavailable. The Pending Transaction Limiting Operational
Reason field provides additional information on this status.
• Unk: data is not available in the database.
Number of ETG Pending The combined number of ETG Pending Transactions for the Peers
Transactions and Connections of an ETG.
Number of ETL Pending The combined number of Pending Transactions for the Peers and
Transactions Connections of the ETL's ETGs.
Number of Active SMS The number of active SMS connections between the signaling
Connections/Number of routers with ETGs in the ETL/The number of required SMS
Required SDS Connections connections between diameter signaling routers with ETGs in the
ETL.
Time of Last Update Displayed as yyyy-month name-date hr:min:sec UTC.
a) A confirmation box appears if between 1 and 20 Egress Throttle Groups are selected.
Click OK in the confirmation box to Disable the selected Egress Throttle Groups.
Click Cancel in the confirmation box to cancel the Disable action. The Admin State of the selected
Egress Throttle Groups remains unchanged.
If OK is clicked and any of the following conditions exist, an error message appears:
• Any of the selected Egress Throttle Groups do not exist in the database.
• Any of the selected Egress Throttle Groups do not have the Egress Throttling Groups Rate
Limiting configured.
b) An Alert Box is displayed if more than 20 Egress Throttle Groups are selected.
Group to be selected, then press the SHIFT key and select the last Egress Throttle Group to be
selected. All Egress Throttle Groups between are also selected.
3. Click Disable Pending Transaction Limiting.
a) A confirmation box appears if between 1 and 20 Egress Throttle Groups are selected.
Click OK in the confirmation box to Disable the selected Egress Throttle Groups.
Click Cancel in the confirmation box to cancel the Disable action. The Admin State of the selected
Egress Throttle Groups remains unchanged.
If OK is clicked and any of the following conditions exist, an error message appears:
• Any of the selected Egress Throttle Groups do not exist in the database.
• Any of the selected Egress Throttle Groups do not have the Egress Throttling Pending
Transaction Limiting configured.
b) An Alert Box is displayed if more than 20 Egress Throttle Groups are selected.
Field Description
Application Name Name of the application
MP Server Hostname Hostname of the Message Processorserver from which status is reported
Admin State Admin State of the application (Enabled, Disabled). The Admin State persists
over application restart and server reboot.
Operational Status Operational Status of the application (Unavailable, Available, or Degraded)
Operational Reason Operational Reason that is filled in by the application and extracted from
the database
Congestion Level Congestion Level of the application (Normal, CL1, CL2, CL3)
Time of Last Update Time stamp that shows when the application changed to the status shown
in Operational State
If the run-time data for Operational Status, Operational Reason, Congestion Level, and Time of Last
Status change is not present in the database, the data is displayed as Unknown.
Enabling Applications
Use this task to enable one or more applications.
Applications are enabled only on the MP server shown in the rows you select.
1. Select Diameter > Maintenance > Applications.
The Diameter > Maintenance > Applications page appears.
2. Select one or more applications to enable.
To select multiple applications, press the CTRL key when selecting each application. To select
multiple contiguous applications, click the first application you want, then press the SHIFT key
and select the last application you want. All the applications between are also selected.
3. Click Enable.
A popup window appears.
4. Click
• OK to enable the selected applications and bring the applications to the Available Operational
State.
• Cancel to return to the Diameter > Maintenance > Applications page without enabling the
applications.
If OK is clicked and an application no longer exists in the system (it was deleted by another user),
an error message is displayed and the Diameter > Maintenance > Applications page is refreshed.
Disabling Applications
Use this task to disable one or more applications.
Applications are disabled only on the MP servers shown in the rows you select.
1. Select Diameter > Maintenance > Applications.
The Diameter > Maintenance > Applications page appears.
2. Select one or more applications to disable.
To select multiple applications, press the CTRL key when selecting each application. To select
multiple contiguous applications, click the first application you want, then press the SHIFT key
and select the last application you want. All the applications between are also selected.
3. Click Disable.
A confirmation box appears.
4. Click
• OK to disable the selected applications and bring the applications to the Unavailable Operational
State.
• Cancel to return to the Diameter > Maintenance > Applications page without disabling the
applications.
If OK is clicked and an application no longer exists in the system (it was deleted by another user),
an error message is displayed and the Diameter > Maintenance > Applications page is refreshed.
Field Description
Peer DA-MP Status Tab
MP ID The numeric identifier of the reporting DA-MP server
MP Server Hostname The hostname of the reporting DA-MP server
# Peer MPs Available The number of peer DA-MPs whose status is available
# Peer MPs Degraded The number of peer DA-MPs whose status is degraded
# Peer MPs Unavailable The number of peer DA-MPs whose status is unavailable
MP Leader Indicates whether a DA-MP reports itself as MP Leader. The MP Leader
provides status information to the OAM for Route Lists, Route Groups,
and Peer Nodes, which are resources whose scope is beyond a single
DA-MP.
Note: If a configured DA-MP is not alive, the above fields will display Unk
Field Description
MP ID The numeric identifier of the peer DA-MP
MP Server Hostname The hostname of the peer DA-MP server
Status Peer DA-MP status. Possible settings are:
• Available - CPL=0
• Degraded - CPL=1,2,3
• Unavailable - CPL = 99
CPL Connection Priority Level (0,1, 2, 3, 99) of the configured peer DA-MP. This
overall value takes into account the following status:
• Operational Status of the ComAgent connection between the reporting
DA-MP and the peer DA-MP
• Congestion level of the peer DA-MP
• Status of the process running on the peer DA-MP
• Sort the list by column, in ascending or descending order, by clicking the column heading. The
default order is by Realm Name in ascending ASCII order.
• Prevent the page from automatically refreshing by clicking the Pause updates check box.
• Enable and disable Peer Discovery.
• Refresh and Extend Peer Discovery.
• Refresh the GUI page.
Field Description
Realm Name Name of the Realm assigned to the Discovery Attribute instance.
Note: Any given Realm can only be configured for a single Mode (Initiator
Only or Initiator & Responder), so each configured Realm name should
appear just once in the list on the Peer Discovery Maintenance screen.
Mode The connection mode used for each Discovery Attribute instance.
Expires The date and time (in the locally-configured time zone) at which the Realm
discovery expires, for any Realm whose Operational Status is Discovered
or Expired; or the string "---" for any Realm whose Operational Status is
anything other than Discovered or Expired.
Admin State The current administrative state for each configured Discovery Attributes
instance.
Operational Status The current operational status for each configured Discovery Attributes
instance.
Operational Reason The current operational reason string for each configured Discovery
Attributes instance
Configured Peers The current number of Peer Nodes that are part of the DSR configuration
due to the dynamic peer discovery for the Realm.
Configured Connections The current number of Connections that are part of the DSR configuration
due to the dynamic peer discovery for the Realm.
Application Id The number of Application IDs, from the Discovery Attributes instance
configuration, for which at least one Peer Node has been successfully
identified.
Route List Displays a ~ in the field corresponding to the parent Realm row.
Note: For every Application ID for which at least one Peer Node is
configured, a single Route List will be listed. But the same Route List can
be associated with more than one Application ID, if the same set of Peer
Nodes supports multiple Application IDs.
Field Description
Name A name of the Traffic Throttle Point.
Throttling Admin State The static throttling administrative state.
Dynamic Throttling Admin State The dynamic throttling administrative state from the associated
Peer Node.
Operational Status Operational status for TTP ETR throttling.
Operational Reason Operational reason for each TTP. This provides additional
information for each Operational Status regarding the condition
is preventing the Operational Status from being available.
Abatement Algorithm Abatement algorithm that is currently being applied as a result
of receiving an OLR associated with the TTP (TTP's Operational
Reason = Peer Overload).
Current Loss Percentage (%) Loss rate (Reduction Percentage) currently being applied to the
traffic routed to a TTP based upon an OLR received from a DOIC
node. This value will be non-zero during TTP Overload
Recovery.
This field is updated when a new OLR is processed, when a
modify OLR changes this value and each time the DOIC
Overload Recovery timer expires.
Validity Duration DOIC Validity Duration value (in seconds) if an OLR is received
from a DOIC node.
Offered Transactions per Second The rate of transactions which are being routed to the TTP before
diversion is applied.
Max Egress Transactions per The maximum number of egress transactions allowed per second.
Second Allowed
Percent of Actions Diverted (%) The percentage of transactions which are being routed to the
TTP which are being diverted or abandoned.
Field Description
Target Egress Transactions per The target number of egress transactions which are allowed per
Second Allowed second.
Time until Loss=0 (sec) The time of day when the Current Loss Percent will be restored
to 0%.
Time of Last Update Time of most recent update.
Field Description
Name The internal identifier for the TTG attribute that this TTG Status
record is associated with.
Administrative Status The administrative status of the Traffic Throttle Group.
Note: This column displays a tilde character (~) for rows associated
with Remote TTGs.
Site Name Name of the site to which this TTG is owned and controlled.
Current Loss Percentage A weighted value for the TTPs assigned to the TTG.
Field Description
This field is updated when a new OLR is processed by a TTP
assigned to the TTG, and each time an OLR expires for a TTP
assigned to the TTG.
Note: This calculation is only made for TTGs assigned to the local
DSR Node. This value is shared with other DSR Nodes.
server groups that are referred to by one or more Route Lists configured at the local SOAM. If a filter
is applied, then all TTGs that meet the filter requirements and that are currently disabled will be
enabled. If no filter is applied, then all currently disabled TTGs will be enabled.
Note: When a TTG's Administrative State is Disabled, the TTG's Current Loss Percent value is ignored
when making routing decisions.
To enable and disable individual and multiple TTGs, shared TTGs must be included.
Note: Shared TTGs cannot be enabled or disabled on another DSR (the GUI page buttons are inactive
for prohibited actions).
If you select one or more rows that are associated with remote TTGs, Enable and Disable are greyed
out. Enable and Disable are active only when the selected row or rows are associated with
locally-defined TTGs.
Note: Enable All and DisableAll are active regardless of the selected row state. If you select Enable
All or DisableAll, a window prompts you to enable or disable all locally configured TTGs, and a
message indicates that TTGs configured at other sites will not be enabled or disabled.
1. Select Diameter > Maintenance > Traffic Throttle Groups. The Administrative State defines
whether the TTG is active and can be applied to routing.
The Diameter > Maintenance > Traffic Throttle Groups page appears.
2. Optionally, click Filter and add up to four filters to limit the number of TTGs displayed. Click Go
to apply the filter.
3. Click Enable All.
A confirmation box appears to prompt you to enable or disable all locally configured TTGs, and a
note is displayed to indicate that TTGs configured at other sites will not be enabled/disabled.
4. Click OK.
The TTGs are enabled.
If any of the selected TTGs no longer exist (they have been deleted by another user), an error
message is displayed, but any selected TTGs that do exist are enabled.
If the user chooses "enable all" or "disable all", a popup will prompt the user to
3. Click Disable. Disable is greyed out for TTGs associated with remote TTGs. You must deselect all
shared TTGs in order to enable the locally configured TTGs.
A confirmation box appears.
4. Click OK.
The selected (eligible) TTGs are disabled.
If any of the selected TTGs no longer exist (they have been deleted by another user), an error
message is displayed, but any selected TTGs that do exist are disabled.
5
Diameter Reports
Overview
The Diameter Reports GUI pages provide access to the following reports:
• Diagnostics Tool reports
The Diagnostics Tool provides the capability to test Mediation Rule Templates that are in Test or
Active state before they are subjected to live traffic in the network. A test message is injected into
the system on a connection that is in Test Mode (see Diameter Maintenance Connections). At various
tracepoints, the Diagnostics Tool logs the Rules that are applied, actions taken, and other diagnostic
information on a test message that is injected into the system. The Diagnostics Tool Reports can be
used to view the logged information for each test.
• MP Statistics (SCTP) reports
The MP Statistics (SCTP) Reports page displays the Message Processor (MP) SCTP statistics per
MP, for all MPs or for a selected set of MPs. Each row shows the statistics for one MP.
3. Click Report.
The Diameter > Reports > Diagnostics Tool [Report] page appears and displays the generated
report. You can save and print the report.
PDU ID 4
2011-May-16 10:46:10 UTC Tracepoint0 :Message Received
2011-May-16 10:49:51 UTC Tracepoint1 :Message Sent to DRL
................................................................................
PDU ID 5
2011-May-18 04:18:25 UTC Tracepoint0 : Message Received
................................................................................
3. In the box on the right, list the MPs to be included in the report.
• To add a specific MP to the list on the right, so that its statistics will be shown in the report,
select the MP in the box on the left, and click Add.
Repeat this action for each specific MP that is to be listed in the report.
• To add all of the available MPs to the list on the right, click AddAll.
• To remove a specific MP from the report, select the MP in the box on the right, and click Remove.
The selected MP moves to the box on the left.
• To remove all of the listed MPs from the box on the right (to prepare to create a new list), click
RemoveAll. All of the MPs from the box on the right move to the box on the left.
4. When the list in the box on the right contains the MPs for the report, click Go.
The selected MPs and their statistics are listed in the columns of the report.
5. Click Update to display the current statistics for the listed MPs.
Report Columns
Field Description
MP Hostname of the MP server from which status is reported
Current Established Current number of SCTP associations established
Established (Local Number of locally-initiated SCTP associations established
Initiated)
Established (Peer Number of peer-initiated SCTP associations established
Initiated)
Packets Rcvd Number of IP packets received. Each IP packet contains one or more SCTP
chunks.
Packets Sent Number of IP packets sent. Each IP packet contains one or more SCTP
chunks.
DATA chunks Rcvd Number of SCTP DATA Chunks received not including duplicates
(excluding Duplicates)
DATA chunk Sent Number of SCTP DATA Chunks sent not including duplicates
(excluding Duplicates)
Fast Retransmits Number of SCTP DATA Chunks retransmitted due to fast transmit rule
Retransmits Number of SCTP DATA Chunks retransmitted due to acknowledgment
timeout
CTRL chunk Sent Number of SCTP Control Chunks sent. A control chunk is one of: INIT,
INIT ACK, COOKIE ECHO, COOKIE ACK, SACK
CTRL chunks Rcvd Number of SCTP Control Chunks received. A control chunk is one of: INIT,
INIT ACK, COOKIE ECHO, COOKIE ACK, SACK
Fragmented User Number of SCTP User messages fragmented because message length
Messages exceeds path MTU
Reassembled User Number of SCTP User messages reassembled due to fragmentation
Messages
Aborted Number of ABORT messages received
Shutdown Number of SHUTDOWN messages received
Out of Blue Chunks Number of Out of the Blue messages received from an unknown peer
Rcvd
Checksum Error Number of SCTP Checksum Errors detected
6
Troubleshooting with IDIH
7
Diameter AVP Dictionary
AVP Flags
Table 62: AVP Flags Definitions describes the AVP flags on the AVP GUI pages.
Base Dictionary
The Diameter > AVP Dictionary > Base Dictionary page allows you to view or clone the AVPs that
are familiar to the system (defined in the Base Diameter Standard and in Diameter Applications, such
as Diameter Credit Control Application and S6a interface). The cloning function allows you to edit
the base AVP and puts the modified AVP in Custom Dictionary. The AVPs in Custom Dictionary shall
supersede Base Dictionary AVPs.
The AVP Attribute Name, AVP Code, AVP Flag settings, Vendor ID, Data Type, and Protocol are
included in the AVP definition.
If the Data Type is Enumerated, the name of the Enumerated Type is also included.
If the Data Type is Grouped, the list of Grouped AVPs appears in the dictionary. A grouped AVP's
Data field is specified as a sequence of AVPs. Each of those AVPs can, in turn have the Data field
specified as a sequence of AVPs. This pattern of embedding AVPs inside AVPs can occur multiple
times.
Proprietary and additional standard AVP definitions can be added in the Custom Dictionary. See
Custom Dictionary.
Note: Custom Dictionary entries are not displayed on the Base Dictionary View page.
The AVP definitions in the Base Dictionary can be changed (overwritten) only by specifying them in
the Custom Dictionary with a different definition. The AVP Code, Vendor ID, and Attribute Name
must remain the same in the changed definition.
Note: AVP depth refers to the position of an AVP inside the Diameter message. All AVPs following
the header of the Diameter message are called Base AVPs, and the Base AVP position is counted as 1.
An AVP embedded immediately inside the Base AVP has a depth of 2. An AVP embedded immediately
inside an AVP with a depth of 2 has a depth of 3 and so on. See Diameter Mediation User's Guide.
AVP names that are defined in the dictionary can be used in creating Rule Templates and in provisioning
Rule Sets.
On the Diameter > AVP Dictionary > Base Dictionary page, you can perform the following actions:
• Filter the list to display only the desired entries. The Flags cannot be filtered.
• Sort the list entries in ascending or descending order in a column, by clicking the column heading.
The default order is by Attribute Name in alphabetical order. The Flags cannot be sorted.
• Select an AVP definition in the list, and click Clone AVP. The Diameter > AVP Dictionary >
Custom Dictionary [Insert] page appears. The detailed definition for the selected AVP is displayed.
Update the fields as needed. Click OK or Apply to save the custom AVP definition.
• Select an AVP definition in the list, and click View.
The Diameter > AVP Dictionary > Base Dictionary [View] page appears. The detailed definition
for the selected AVP is displayed. The fields are described in Diameter Base Dictionary elements.
Include AVP in the Include an AVP into the Grouped AVP Format: pulldown list,
group Add AVP and Delete
This field is active when the selected Data Type
AVP buttons
is Grouped.
Range: all available
AVPs from the Base
Dictionary and the
Custom Dictionary. If a
Base Dictionary entry
has been overwritten in
the Custom Dictionary,
only the Custom
Dictionary entry
appears in the list.
Custom Dictionary
The Diameter > AVP Dictionary > Custom Dictionary page displays all proprietary AVPs defined
by the operator in the system. Base Dictionary AVPs are not displayed in the Custom Dictionary list.
AVP names that are defined in the dictionary can be used in creating Rule Templates and in provisioning
Rule Sets.
The Attribute Name, AVP Code, AVP Flag settings, Vendor ID, Data Type, and Protocol must be
specified in the AVP definition.
If the Data Type is Enumerated, the name of the Enumerated Type is also included.
If the Data Type is Grouped, the list of Grouped AVPs appears in the dictionary.
The values for AVP definitions are described in Diameter Custom Dictionary elements.
The Diameter > AVP Dictionary > Custom Dictionary page allows the operator to:
• Add new proprietary AVPs and additional standard AVPs familiar to the system
• Overwrite AVP definitions in the Base Dictionary, by specifying them in the Custom Dictionary
with a different definition. The AVP Code, Vendor ID, and Attribute Name must remain the same
in the changed definition.
If the Attribute Name of an AVP appears in both the Base and Custom Dictionaries, the Custom
Dictionary definition is used when the AVP is selected in Rule Template Actions and Conditions.
• Clone AVPs.
On the Diameter > AVP Dictionary > Custom Dictionary page, you can perform the following actions:
• Filter the list to display only the desired entries. All column headings are supported in the filters
except the Flags.
• Sort the list entries in ascending or descending order in a column (except for Flags), by clicking the
column heading. By default, the AVPs are sorted by Attribute Name in alphabetical order.
• Click Insert.
The Diameter > AVP Dictionary > Custom Dictionary [Insert] page opens. You can add a new
AVP and its values.
If the maximum number of AVPs (1024) already exist in the system, the Diameter > AVP
Dictionary > Custom Dictionary [Insert] page will not open, and an error message is displayed.
• Select an AVP definition in the list, and click Edit.
The Diameter > AVP Dictionary > Custom Dictionary [Edit] page appears. The detailed definition
for the selected AVP is displayed. You can change the AVP definition except for the AVP Code,
Vendor ID, and Attribute Name.
• Select an AVP definition in the list, and click Delete to remove the selected AVP definition from
the dictionary.
• Select an AVP definition in the list, and click Clone AVP to clone the selected AVP definition.
Flags AVP Flags V, M, P, r3, r4, r5, r6, r7 Format: 3 buttons for each
flag
When the operator tries to modify the AVP flags
in the message, setting and clearing of the flag Range: Must, Must Not,
depends on the value defined in the dictionary. May for each flag
If the flag has a value Must be set or Must Not be
set, modifying of the flag is restricted accordingly.
Include AVP in the Include an AVP into the Grouped AVP Format: pulldown list,
group (insert and edit Add AVP and Delete AVP
This field is active when the selected Data Type
pages only) buttons
is Grouped.
Range: all available AVPs
To include another AVP in the Grouped AVP,
from the Base Dictionary
click Add AVP. A new row for AVP selection
and the Custom
appears.
Dictionary. If a Base
To remove an AVP from the Grouped AVP, click Dictionary entry has been
Delete AVP. overwritten in the Custom
Dictionary, only the
Custom Dictionary entry
appears in the list.
2. Click Insert.
The Diameter > AVP Dictionary > Custom Dictionary [Insert] page opens.
3. Enter the attribute values for the new AVP, or customize a Base Dictionary AVP by changing fields
except the Attribute Name, AVP Code, and Vendor-ID.
4. Click:
• OK to save the changes and return to the Diameter > AVP Dictionary > Custom Dictionary
page.
• Apply to save the changes and remain on the Diameter > AVP Dictionary > Custom Dictionary
[Insert] page.
• Cancel to return to the Diameter > AVP Dictionary > Custom Dictionary page without saving
any changes.
If OK or Apply is clicked and if a Base Dictionary entry is overwritten and the original entry is
used by any Rule Templates, the original entry is used until the application is restarted.
4. Click:
• OK to save the changes and return to the Diameter > AVP Dictionary > Custom Dictionary
page.
• Apply to save the changes and remain on the Diameter > AVP Dictionary > Custom Dictionary
[Edit] page.
Cancel to return to the Diameter > AVP Dictionary > Custom Dictionary page without saving
any changes.
If the old version of the AVP is referred to by any Rule Template, the application must be restarted
to begin use of the changed AVP. The old version will be used until the restart is done.
The Diameter > AVP Dictionary > Custom Dictionary page appears.
4. Click:
• OK to delete the AVP and return to the Diameter > AVP Dictionary > Custom Dictionary
page.
• Cancel to return to theDiameter > AVP Dictionary > Custom Dictionary page without deleting
the AVP.
When OK is clicked and any configured Rule Template or Rule Set refers to the AVP that is being
deleted, the AVP is not deleted and an error message appears.
All-AVP Dictionary
The Diameter > AVP Dictionary > All-AVP Dictionary page allows the operator to view all AVP
entries that are in the Base and Custom Dictionaries. The Base Dictionary entries are black and the
Custom Dictionary entries are blue. (The term AVP Dictionary refers to the combined contents of the
Base and Custom Dictionaries.)
Note: If a Base Dictionary AVP has been overwritten in the Custom Dictionary, only the Custom
Dictionary entry is shown in the All-AVP Dictionary list.
The list and the entries cannot be changed from this page.
Proprietary and additional standard AVP definitions can be added in the Custom Dictionary. See
Custom Dictionary.
The AVP definitions in the Base Dictionary can be changed (overwritten) by specifying them in the
Custom Dictionary with a different definition. The code, Vendor ID, and attribute name must remain
the same in the changed definition. See Base Dictionary and Custom Dictionary.
On the Diameter > AVP Dictionary > All-AVP Dictionary page, you can perform the following
actions:
• Filter the list to display only the desired entries.
• Sort the list entries in ascending or descending order in a column, by clicking the column heading
(except the flag headings).
• Select an AVP definition in the list, and click View.
The Diameter > AVP Dictionary > All-AVP Dictionary [View] page appears. The detailed
definition for the selected AVP is displayed (the definition cannot be changed on this page). The
definition elements are described in Diameter All-AVP Dictionary elements.
• Clone AVPs.
Flags AVP Flags V, M, P, r3, r4, r5, r6, r7 Format: 3 buttons for each
flag
Note: Flags V, M, and P are supported; r3, r4,
r5, r6 and r7 are reserved for future use. Range: Must, Must Not,
May for each flag
See AVP Flags for flag definitions.
Include AVP in the Include an AVP into the Grouped AVP Format: pulldown list, Add
group (view page AVP and Delete AVP
This field is active when the selected Data Type
only) buttons
is Grouped.
Range: all available AVPs
from the Base Dictionary
and the Custom Dictionary.
If a Base Dictionary entry
has been overwritten in the
Custom Dictionary, only
the Custom Dictionary
entry appears in the list.
To clone an existing AVP from the Diameter > AVP Dictionary > Base Dictionary, Diameter > AVP
Dictionary > Custom Dictionary, or Diameter > AVP Dictionary > All-AVP Dictionary page:
1. Select an AVP entry from the list.
2. Click Clone AVP.
The Diameter > AVP Dictionary > Custom Dictionary [Insert] page displays the attributes that
are configured for the selected AVP dictionary entry.
3. Make changes to the AVP elements and click OK to implement the changes and return to the
previous page, or click Apply to implement the changes and remain on the current page.
The cloned AVP is inserted into the AVP Dictionary list.
Vendors
The Diameter > AVP Dictionary > Vendors page lists the Names and IDs of all Vendors made known
to the system.
Vendors are used in defining new Vendor-specific AVPs in the Custom Dictionary. See Custom
Dictionary.
On the Diameter > AVP Dictionary > Vendors page, you can perform the following actions:
• Filter the list of Vendors to display only the desired Vendors.
• Sort the displayed Vendors by ascending or descending Vendor ID or Vendor Name, by clicking
the column heading.
• Click Insert.
The Diameter > AVP Dictionary > Vendors [Insert] page opens. You can add a new Vendor. See
Adding a Vendor.
If the maximum number of Vendors (128) already exist in the system, the Diameter > AVP
Dictionary > Vendors [Insert] page will not open, and an error message is displayed.
• Select a Vendor row in the list, and click Edit.
The Diameter > AVP Dictionary > Vendors [Edit] page opens. You can edit the Vendor Name
for the selected Vendor. See Editing a Vendor Name.
The Diameter > AVP Dictionary > Vendors [Edit] page will not open if the selected Vendor is
used in any of the AVP definitions in the dictionary.
• Select a Vendor row in the list, and click Delete to remove the selected Vendor. See Deleting a
Vendor.
A Vendor cannot be deleted if it is used in any AVP definitions in the AVP Dictionary.
Viewing Vendors
The use of Mediation Vendors is described in Vendors.
To view all configured Vendors, select Diameter > AVP Dictionary > Vendors.
The Diameter > AVP Dictionary > Vendors page appears with a list of configured Vendors. The
fields are described in Diameter Vendors elements.
Adding a Vendor
The following procedure can be used to configure a new Vendor.
The fields are described in Diameter Vendors elements.
1. Select Diameter > AVP Dictionary > Vendors.
The Diameter > AVP Dictionary > Vendors page appears.
2. Click Insert.
The Diameter > AVP Dictionary > Vendors [Insert] page appears.
If the maximum number of Vendors (128) has already been configured in the system, the Diameter >
AVP Dictionary > Vendors [Insert] page will not open, and an error message will appear.
3. Enter a unique Vendor Name for the Vendor that is being added.
4. Enter a Vendor ID for the Vendor.
5. Click:
• OK to save the changes and return to the Diameter > AVP Dictionary > Vendors page.
• Apply to save the changes and remain on the Diameter > AVP Dictionary > Vendors [Insert]
page.
• Cancel to return to the Diameter > AVP Dictionary > Vendors [Insert] page without saving
any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• The Vendor Name or Vendor ID contains any characters that are not valid or are out of the
allowed range
Deleting a Vendor
Use the following procedure to delete a Vendor.
A Vendor cannot be deleted if the Vendor is used in any AVP definitions in the dictionary.
1. Select Diameter > AVP Dictionary > Vendors.
The Diameter > AVP Dictionary > Vendors page appears.
4. Click:
• OK to delete the Vendor.
• Cancel to cancel the delete function and return to the Diameter > AVP Dictionary > Vendors
page.
If the Vendor is used in any AVP definitions in the dictionary, the Vendor is not deleted and an
error message appears.
8
Mediation
9
Diameter Shared Traffic Throttle Groups
The Diameter > Configuration > Traffic Throttle Groups page appears. Use this page to work with
shared throttle groups. The fields are described in Editing Traffic Throttle Groups.
10
Diameter Topology Hiding
The need to replace a Pseudo Hostname with an Actual Hostname in subsequent Untrusted-to-Protected
Network transactions is required for routing purposes, and is required when the destination host in
the Protected Network requires that messages sent to it contain its Actual Hostname.
Diameter Edge Agent (DEA) Topology Hiding procedures are always invoked on the interface closest
to an Untrusted Network, as illustrated in Figure 13: Diameter Topology Hiding Boundary.
For the purposes of Diameter Routing Function transaction processing, the Trigger Point for evaluating
whether topology-related information should be hidden is called Request Topology Hiding (RTH).
When the Diameter Edge Agent (DEA) receives an Answer message associated with a
Protected-to-Untrusted Diameter transaction, it must consider whether the Answer message contains
any hidden topology-related information that must be restored to its original value. This Trigger Point
is called Answer Topology Restoral (ATR).
The high level logical locations of the RTH and ATR TH Trigger Points for Protected-to-Untrusted
Network Diameter transactions are shown in Figure 14: Diameter Topology Hiding Trigger Points:
Protected-to-Untrusted Transactions.
All Diameter Topology Hiding Trigger Points are adjacent to the existing Diameter Mediation Trigger
Points. The following Topology Hiding-Mediation relationship rules apply:
• Information hiding Trigger Points - immediately prior to Mediation
• Information restoral Trigger Points: immediately after Mediation
The Diameter Routing Function has the ability to edit messages just prior to forwarding them to Peer
Nodes. Any Diameter Routing Function message editing must be performed prior to any TH treatment.
For example, an application, when forwarding a Request message to the Diameter Routing Function,
can ask the Diameter Routing Function to replace the Origin-Realm and Origin-Host AVP values with
the Realm and FQDN values assigned to the Local Node associated with the egress Diameter Connection
just prior to forwarding the message to the Diameter Transport Function. This
Origin-Realm/Origin-Host AVP replacement function must be performed before the TH Trigger Point.
Table 68: Topology Information Hiding and Restoral Procedures summaries the topology information hiding
and restoral procedures that are supported at each TH Trigger Point.
For the sake of discussion, assume that all of the networks are Protected Networks and the Protected
Networks and Trusted Network Lists shown in Table 69: Example Protected Networks Configuration and
Table 70: Example Trusted Network Lists Configuration are configured:
Protected Network Name Protected Network Realm Name Trusted Network List Name
N1 n1.com Trusted Networks-1
N2 n2.com Trusted Networks-2
N3 n3.com Trusted Networks-3
N4 n4.com Trusted Networks-4
Based on the example Protected Networks and Trusted Network Lists, the trust relationship matrix
among the four networks in this example configuration is shown in Table 71: Network Trust Relationship
Matrix.
Based on the Network Trust Relationship Matrix, the Peer Node element settings for the network
shown in Table 72: Example Topology Hiding Status Settings would be used:
With the information in Table 72: Example Topology Hiding Status Settings, the TH type-independent
criteria for determining whether a message is a potential candidate for Topology Hiding/Restoral are
defined in Table 73: General Criteria for Determining Whether a Message is a TH Candidate.
TH
Trigger Message Message Path General Topology Hiding/Restoral Candidate Criteria
RTH Request Protected-to-Untrusted Egress Peer Node Topology Hiding Status is Enabled, AND
Origin-Realm is a Protected Network X, AND
Destination-Realm is an Untrusted Network to Protected
Network X
RTR Request Untrusted-to-Protected Ingress Peer Node Topology Hiding Status is Enabled, AND
Destination-Realm is a Protected Network X, AND
Origin-Realm is an Untrusted Network to Protected Network
X
ATH Answer Protected-to-Untrusted Egress Peer Node Topology Hiding Status is Enabled, AND
Origin-Realm is a Protected Network X, AND
TH
Trigger Message Message Path General Topology Hiding/Restoral Candidate Criteria
Realm of the Diameter Node that originated the transaction
is an Untrusted Network to Protected Network X
TH Trigger point ATH occurs after the Diameter Routing
Function deallocates the PTR for the transaction. Therefore,
the Origin-Realm value that was received in the Request
message must be stored in the Application-Data stack event
just prior to deallocating the PTR in order for the Diameter
Routing Function to make an evaluation at ATH of whether
the Answer response is being sent to an Untrusted Network.
ATR Answer Untrusted-to-Protected PTR contains one or more indications that topology
information restoral is required
For Untrusted-to-Protected Answer messages, any information
that was hidden in the egress Request is a candidate for
restoral regardless of which Network sends the Answer
message response. Topology information restoral at ATR is
always performed regardless of the egress Peer Node's
Topology Hiding Status if Topology Hiding was performed
on the egress Request message for this Diameter transaction.
If the TH Trigger Point criteria defined in Table 73: General Criteria for Determining Whether a Message
is a TH Candidate are met, then the Diameter Routing Function must determine which TH types are
enabled for the associated Protected Network. Each TH type might have additional criteria that must
be met in order to determine whether topology-related information hiding or restoral is required.
The Protected Networks configuration component defines which TH types are enabled for the Protected
Network. If a Configuration Set for the TH type is assigned to the Protected Network, then that TH
type is enabled for that Protected Network and the rules for that TH type are applied. The Path,
S6a/S6d HSS, MME/SGSN, S0 PCRF, and S9 AF/pCSCF TH types are supported. An example Protected
Network component for the use case network defined in this section could look like the configuration
in Table 74: Protected Network Configuration Example:
Protected
Protected Network Trusted S9
Network Realm Network S6a/S6d MME/SGSN AF/pCSCF
Name Name List Name Path TH HSS TH TH S9 PCRF TH TH
N1 n1.com Trusted Path S6a/S6d MME/SGSN NULL NULL
Networks-1 Config HSS Config
Set-1 Config Set-1
Set-1
N2 n2.com Trusted Path S6a/S6d MME/SGSN NULL NULL
Networks-2 Config HSS Config
Set-2 Config Set-1
Set-1
Protected
Protected Network Trusted S9
Network Realm Network S6a/S6d MME/SGSN AF/pCSCF
Name Name List Name Path TH HSS TH TH S9 PCRF TH TH
N3 n3.com Trusted Path NULL NULL S9 PCRF S9
Networks-3 Config Config Set-1 AF/pCSCF
Set-3 onfig Set-1
N4 n4.com Trusted Path NULL NULL S9 PCRF S9
Networks-4 Config Config Set-2 AF/pCSCF
Set-4 onfig Set-2
In the example, if a message associated with Protected Network N3 is a candidate for topology
hiding/restoral, then the Diameter Routing Function will invoke only the Path Topology Hiding
Configuration Set rules for that message.
The TH type-specific Hiding/Restoral rules are defined in Topology Hiding Types.
Supported AVPs
Table 75: Topology Hiding AVPs and Hiding Methods shows the AVPs that are supported by Topology
Hiding. The following information hiding methods are supported:
• Pseudo Hostname Replacement: Actual Hostnames are replaced with Pseudo Hostnames.
• Encryption: AVP value is encrypted
Encryption
Any encryption required by Topology Hiding uses Advanced Encryption Standard (AES), which is
a specification for the encryption of electronic data established by the U.S. National Institute of
Standards and Technology (NIST) in 2001. AES has been adopted by the U.S. government and is now
used worldwide. It supersedes the Data Encryption Standard (DES) that was published in 1977.
AES is an iterative, symmetric-key block cipher that can use keys of 128, 192, and 256 bits (with 256
being the hardest to crack), and encrypts and decrypts data in blocks of 128 bits (16 bytes). Unlike
public-key ciphers that use a pair of keys, symmetric-key ciphers use the same key to encrypt and
decrypt data. Encrypted data returned by block ciphers have the same number of bits that the input
data had. Iterative ciphers use a loop structure that repeatedly performs permutations and substitutions
of the input data. All three key lengths are sufficient to protect classified information up to the SECRET
level.
AES must be used in conjunction with a FIPS (Federal Information Processing Standard) approved or
NIST recommended mode of operation. The mode specifies how data will be encrypted
(cryptographically protected) and decrypted (returned to original form). Diameter Topology Hiding
supports AES-Cipher BlockChaining (CBC) mode and a 128-bit key size.
Note: If assistance is needed in troubleshooting encrypted Error-Reporting-Host AVPs, it is
recommended that you contact your My Oracle Support (MOS). You will need the Encryption Key that
is configured in the Diameter > Configuration > Topology > Path Topology Configuration Set GUI
page.
Assumptions
Diameter Topology Hiding has the following assumptions:
• In order to detect message looping for Request messages containing a Route-Record Pseudo
Hostname, all Diameter Edge Agents in the service provider's network must have the same Topology
Hiding configuration.
• A message loop for Request messages containing a Route-Record Pseudo Hostname may not be
detected for messages returned to any Diameter Edge Agent from any network that is trusted by
the Protected Network that initiated the Diameter transaction.
For the sake of discussion, assume that all of the networks are Protected Networks and the Protected
Networks and Trusted Network Lists shown in Table 76: Example Protected Networks Configuration and
Table 77: Example Trusted Network Lists Configuration are configured:
Protected Network Name Protected Network Realm Name Trusted Network List Name
N1 n1.com Trusted Networks-1
N2 n2.com Trusted Networks-2
N3 n3.com Trusted Networks-3
N4 n4.com Trusted Networks-4
Based on the example Protected Networks and Trusted Network Lists, the trust relationship matrix
among the four networks in this example configuration is shown in Table 78: Network Trust Relationship
Matrix.
Based on the Network Trust Relationship Matrix, the Peer Node element settings for the network
shown in Table 79: Example Topology Hiding Status Settings would be used:
With the information in Table 72: Example Topology Hiding Status Settings, the TH type-independent
criteria for determining whether a message is a potential candidate for Topology Hiding/Restoral are
defined in Table 80: General Criteria for Determining Whether a Message is a TH Candidate.
TH
Trigger Message Message Path General Topology Hiding/Restoral Candidate Criteria
RTH Request Protected-to-Untrusted Egress Peer Node Topology Hiding Status is Enabled, AND
Origin-Realm is a Protected Network X, AND
Destination-Realm is an Untrusted Network to Protected
Network X
RTR Request Untrusted-to-Protected Ingress Peer Node Topology Hiding Status is Enabled,
AND
Destination-Realm is a Protected Network X, AND
Origin-Realm is an Untrusted Network to Protected
Network X
ATH Answer Protected-to-Untrusted Egress Peer Node Topology Hiding Status is Enabled, AND
TH
Trigger Message Message Path General Topology Hiding/Restoral Candidate Criteria
Origin-Realm is a Protected Network X, AND
Realm of the Diameter Node that originated the transaction
is an Untrusted Network to Protected Network X
TH Trigger point ATH occurs after the Diameter Routing
Function deallocates the PTR for the transaction. Therefore,
the Origin-Realm value that was received in the Request
message must be stored in the Application-Data stack event
just prior to deallocating the PTR in order for the Diameter
Routing Function to make an evaluation at ATH of whether
the Answer response is being sent to an Untrusted
Network.
ATR Answer Untrusted-to-Protected PTR contains one or more indications that topology
information restoral is required
For Untrusted-to-Protected Answer messages, any
information that was hidden in the egress Request is a
candidate for restoral regardless of which "Network" sends
the Answer message response. Topology information
restoral at ATR is always performed regardless of the
egress Peer Node's Topology Hiding Status if Topology
Hiding was performed on the egress Request message for
this Diameter transaction.
If the TH Trigger Point criteria defined in Table 80: General Criteria for Determining Whether a Message
is a TH Candidate are met, then the Diameter Routing Function must determine which TH types are
enabled for the associated Protected Network. Each TH type might have additional criteria that must
be met in order to determine whether topology-related information hiding or restoral is required.
The Protected Networks configuration component defines which TH types are enabled for the Protected
Network. If a Configuration Set for the TH type is assigned to the Protected Network, then that TH
type is enabled for that Protected Network and the rules for that TH type are applied. The Path,
S6a/S6d HSS, MME/SGSN, S0 PCRF, and S9 AF/pCSCF TH types are supported. An example Protected
Network component for the use case network defined in this section could look like the configuration
in Table 81: Protected Network Configuration Example:
Protected
Protected Network Trusted
Network Realm Network S6a/S6d MME/ S9 PCRF S9 AF/
Name Name List Name Path TH HSS TH SGSN TH TH pCSCF TH
N1 n1.com Trusted Path S6a/S6d MME/ NULL NULL
Networks-1 Config HSS SGSN
Set-1 Config Config
Set-1 Set-1
Protected
Protected Network Trusted
Network Realm Network S6a/S6d MME/ S9 PCRF S9 AF/
Name Name List Name Path TH HSS TH SGSN TH TH pCSCF TH
N2 n2.com Trusted Path S6a/S6d MME/ NULL NULL
Networks-2 Config HSS SGSN
Set-2 Config Config
Set-1 Set-1
N3 n3.com Trusted Path NULL NULL S9 PCRF S9 AF/
Networks-3 Config Config pCSCF
Set-3 Set-1 onfig Set-1
N4 n4.com Trusted Path NULL NULL S9 PCRF S9 AF/
Networks-4 Config Config pCSCF
Set-4 Set-2 onfig Set-2
In the example, if a message associated with Protected Network N3 is a candidate for topology
hiding/restoral, then the Diameter Routing Function will invoke only the Path Topology Hiding
Configuration Set rules for that message.
The TH type-specific Hiding/Restoral rules are defined in Topology Hiding Types.
Encryption
Any encryption required by Topology Hiding uses Advanced Encryption Standard (AES), which is
a specification for the encryption of electronic data established by the U.S. National Institute of
Standards and Technology (NIST) in 2001. AES has been adopted by the U.S. government and is now
used worldwide. It supersedes the Data Encryption Standard (DES) that was published in 1977.
AES is an iterative, symmetric-key block cipher that can use keys of 128, 192, and 256 bits (with 256
being the hardest to crack), and encrypts and decrypts data in blocks of 128 bits (16 bytes). Unlike
public-key ciphers that use a pair of keys, symmetric-key ciphers use the same key to encrypt and
decrypt data. Encrypted data returned by block ciphers have the same number of bits that the input
data had. Iterative ciphers use a loop structure that repeatedly performs permutations and substitutions
of the input data. All three key lengths are sufficient to protect classified information up to the SECRET
level.
AES must be used in conjunction with a FIPS (Federal Information Processing Standard) approved or
NIST recommended mode of operation. The mode specifies how data will be encrypted
(cryptographically protected) and decrypted (returned to original form). Diameter Topology Hiding
supports AES-Cipher BlockChaining (CBC) mode and a 128-bit key size.
Note: If assistance is needed in troubleshooting encrypted Error-Reporting-Host AVPs, it is
recommended that you contact your My Oracle Support (MOS). You will need the Encryption Key that
is configured in the Diameter > Configuration > Topology > Path Topology Configuration Set GUI
page.
S6a/S6d HSS Topology Hiding is concerned with hiding the identity(s) of a Protected Network's
HSS when it exchanges messages with Untrusted Networks. An HSS's Hostname is embedded
in the Origin-Host and Session-Id AVPs sent in Request messages and in the Origin-Host AVP
sent in Answer messages.
S6a/S6d HSS Topology Hiding determines which entity (HSS or MME/SGSN) initiated a
message, based on the Command Code in the message.
S6a/S6d HSS Topology Hiding can be enabled for each Protected Network, by assigning an
S6a/S6d HSS Topology Hiding Configuration Set to the configured Protected Network.
• MME/SGSN Topology Hiding
MME/SGSN Topology Hiding is concerned with hiding the identity of a Protected Home
Network's MME/SGSNs, as well as the number of MME/SGSNs in the network, when it
exchanges messages with Untrusted Networks. A MME/SGSN's identity is embedded in the
Origin-Host and Session-Id AVPs sent in Request messages and in the Origin-Host AVP sent
in Answer messages.
MME/SGSN Topology Hiding determines which entity (HSS or MME/SGSN) initiated an
S6a/S6d message, based on the Command Code in the message.
MME/SGSN Topology Hiding can be enabled for each Protected Network, by assigning an
MME/SGSN Topology Hiding Configuration Set to the configured Protected Network.
The Path Topology Hiding Configuration Set assigned to the Protected Network has the following
elements that are used for Route-Record Topology Hiding:
• Hostname Suffixes - A list of Protected Network Hostname Suffixes that are used to specify which
Hostnames to hide when messages are forwarded to Untrusted Networks. Any Route-Record AVPs
containing a Hostname not matching an entry in this Hostname Suffixes list will not be hidden.
• Route-Record Pseudo Hostname - The Pseudo Hostname to be used when replacing all of the
Route-Record AVPs that contain a Hostname that meets the Route-Record AVP hiding criteria.
Route-Record AVP Hostname hiding is performed by replacing all of the Route-Record AVPs that
meet the Route-Record AVP hiding criteria with a single Route-Record AVP that contains a single
configured Pseudo Hostname. Route-Record AVP Hostname hiding occurs after the Diameter Routing
Function appends any Route-Record AVPs to the Request message.
It is possible but highly unlikely (as in an invalid inter-network relationship) that a Request message
that leaves the Protected Network addressed to an Untrusted Network will loop back to the Protected
Network through a Trusted Network, as shown in Figure 21: Unsupported Pseudo-Host Route-Record
Loop Detection. This type of message loop detection is NOT supported.
Inter-network ingress message loop detection occurs when all of the following criteria are met:
• Message is a candidate for Topology Hiding as defined by TH Trigger Point RTR in Table 73: General
Criteria for Determining Whether a Message is a TH Candidate
• Path Topology Hiding is enabled for the Protected Network (a Path Topology Hiding Configuration
Set is assigned to the configured Protected Network)
• A Route-Record AVP contains the Protected Network's Pseudo Hostname used for Route-Record
AVP Host Name hiding
The Path Topology Hiding Configuration Set assigned to the Protected Network has the following
elements that are used for Proxy-Host AVP Hiding:
• Hostname Suffixes - A list of Protected Network Hostname Suffixes that are used to specify which
Hostnames to hide when messages are forwarded to Untrusted Networks. Any Proxy-Host AVPs
with a Hostname not matching an entry in this Hostname Suffixes list will not be hidden.
• Proxy-Host Pseudo Hostname Suffix - In order to hide the number of Proxy Agents in the Protected
Network, a random Proxy-Host pseudo-host name of the format <prefix><suffix> will be used,
where the prefix is a random 3-digit value created each time Proxy-Host name substitution is
performed and suffix is a fixed-length string defined by this configured element. All of the
Proxy-Host pseudo-host names inserted into any Request message must be unique.
Proxy-Host AVP Hiding is performed only on Request messages that meet the following criteria:
• Message is a candidate for Topology Hiding as defined by TH Trigger Point RTH in Table 73: General
Criteria for Determining Whether a Message is a TH Candidate
• At least one of the Proxy-Host AVPs contains a Protected Network's Hostname
• Path Topology Hiding is enabled for the Protected Network (a Path Topology Hiding Configuration
Set is assigned to the Protected Network)
An example of Proxy-Host AVP Hiding for a Request message initiated by a Protected Network to an
Untrusted Network is shown in Figure 22: Proxy-Host Hiding.
Because the Proxy-Info AVP is used by stateless agents to store local transaction state information into
a Request message and retrieve that information from the Answer response, it is important that the
DEA restore the original Proxy-Host AVP values (received in the original Request message) when it
forwards the Answer response message. Thus, any Proxy-Host AVP value that is replaced at TH
Trigger Point RTH must be saved in its respective Diameter Routing Function PTR.
Proxy-Host AVP Restoral is performed only on Answer messages that meet the following criterion:
• At TH Trigger Point ATR, the Restore Proxy-Host AVPs flag in the PTR associated with the Answer
message is set to Enabled.
When the criterion is met, Proxy-Host AVP Restoral will be performed. The Diameter Routing Function
will replace every Proxy-Host AVP value that matches a Proxy-Host Pseudo Hostname (stored in the
PTR) with the original Hostname (also stored in the PTR).
The Path Topology Hiding Configuration Set assigned to the Protected Network has the following
elements that are used for Error-Reporting-Host Topology Hiding:
• Hostname Suffixes - A list of Protected Network Hostname Suffixes that are used to specify which
host names to hide when messages are forwarded to Untrusted Networks. Any Error-Reporting-Host
AVPs with a Hostname not matching an entry in this Hostname Suffixes list will not be hidden.
• Error-Reporting-Host Encryption Key - User-configured encryption key that must be used for
encrypting the Error-Reporting-Host AVP value. A user-configured encryption key allows the
Error-Reporting-Host AVP value to be decrypted in troubleshooting, if required.
S6a/S6d HSS Topology Hiding determines which entity (HSS or MME/SGSN) initiated a message
based on the Command Code in the message.
HSS identities are hidden by replacing the Hostname portion of the Origin-Host and Session-Id AVPs
(Session-Id format: <host name><implementation portion>) with an operator-defined HSS Pseudo
Hostname that is assigned to the Protected Network in the S6a/S6d HSS Topology Hiding Configuration
Set.
If a single S6a/S6d pseudo-hostname per S6a/S6d HSS TH Configuration Set is used, then that
pseudo-hostname is used for hiding actual S6a/S6d host name. If multiple pseudo-names per actual
host-name are used, then contents of User-Name AVP are used to select pseudo-host. In S6a/S6d,
subscriber's IMSI is carried in the User-Name AVP. The content of the User-Name AVP content may
be one of the following forms:
• IMSI
• IMSI@realm
It is not necessary to extract the IMSI portion from the User-Name AVP value. The User-Name AVP
value content will be the same in all transactions associated with subscriber. Therefore, the algorithm
for mapping actual S6a/S6d HSS host name to one of the pseudo-names assigned to the S6a/S6d HSS
will be as follows:
• Pseudo-Host Name Selected = Function (User-Name AVP Content) MODULO (Number of
Pseudo-Host Names assigned to this S6a/S6d HSS Host Name)
An example of a Protected-HSS to Untrusted-MME/SGSN Diameter transaction is shown in Figure
24: S6a/S6d HSS TH Protected-HSS to Untrusted-MME/SGSN Diameter Transaction.
• The S6a/S6d HSS-initiated Answer response will contain an actual S6a/S6d HSS host name in the
Origin-Host AVP. This must be hidden with the S6a/S6d HSS pseudo-host name assigned to the
Protected Network at TH trigger point ATH.
For Untrusted-MME/SGSN to Protected-HSS transactions, S6a/S6d HSS topology information hiding
is required only on Answer messages that meet the following criteria:
• Message was a candidate for Topology Hiding as defined by topology Trigger Point ATH in Table
73: General Criteria for Determining Whether a Message is a TH Candidate
• S6a/S6d HSS Topology Hiding is enabled for the Protected Network (an S6a/S6d HSS Topology
Hiding Configuration Set is assigned to the Protected Network)
• The Answer message is a member of the S6a/S6d message set and was initiated by an HSS as
determined from the Command Code in the message
Restoral of a Protected-HSS's actual-host name in the Untrusted-MME/SGSN to Protected-HSS Request
message is not performed by topology hiding if a single pseudo-name is used in S6a/S6d HSS TH
Configuration Set assigned to a protected network. Instead, this replacement function is required of
a HSS Address Resolution application such as FABR or RBAR applications.
HSS
An example of an Untrusted-MME/SGSN to Protected-HSS Diameter transaction is shown in Figure
25: S6a/S6d HSS TH Untrusted-MME/SGSN to Protected-HSS Transaction and when pseudo-name per
S6a/S6d HSS host name in S6a/S6d HSS TH Configuration Set.
• S6a/S6d HSS TH is enabled for the Protected Network (S6a/S6d HSS TH Configuration Set is
assigned to the Protected Network)
• The Request message is a member of the S6a/S6d message set and was initiated by an MME/SGSN
• The Destination-Host AVP contains an S6a/S6d HSS pseudo-host name that is assigned to the
Protected Network as determined from the internal S6a/S6d HSS TH Pseudo-Host Name
Note: Although the Origin-Host and Session-ID AVPs both have MME/SGSN Actual Hostnames,
the names could be different. Because the HSS associates the MME/SGSN's location based on the
Origin-Host AVP content, it is the MME/SGSN Actual Hostname in the Origin-Host AVP that
must be used for selecting a MME/SGSN Pseudo Hostname. This MME/SGSN Pseudo Hostname
can be used to replace both of the Hostname fields in the forwarded Request message.
• The HSS sends an Answer response to the transaction with the Session-ID received in the Request
and containing an MME/SGSN Pseudo Hostname. Because the Session-ID value returned in the
Answer must match the value in the Request, the MME/SGSN Pseudo Hostname in the Session-ID
AVP must be replaced with its corresponding value received in the Request message. The value
is restored at TH Trigger Point ATR, with the Hostname portion of the Session-ID AVP value that
is stored in the PTR.
This Hostname restoral procedure is not required for Answers initiated by diameter internal nodes
(the Diameter Routing Function and applications) as these Answer responses are based upon the
original Request message content.
In S6a/S6d, the subscriber's IMSI is carried in the User-Name AVP. The content of the User-Name
AVP content can be one of the following forms:
• IMSI
• IMSI@realm
It is not necessary to extract the IMSI portion from the User-Name AVP value. The User-Name AVP
value content will be the same in all transactions associated with subscriber.
For Protected-MME/SGSN to Untrusted-HSS transactions, S6a/S6d HSS Topology Hiding is required
only on Request messages that meet the following criteria:
• Message was a candidate for Topology Hiding as defined by topology Trigger Point RTH in Table
73: General Criteria for Determining Whether a Message is a TH Candidate
• MME/SGSN Topology Hiding is enabled for the Protected Network (an MME/SGSN TH
Configuration Set is assigned to the Protected Network)
• The Request message is a member of the S6a/S6d message set and was initiated by an MME/SGSN
as determined from the Command Code in the message
• The Origin-Host and/or Session-ID AVPs in the Request contain an MME/SGSN Actual Hostname
assigned to the Protected Network in its MME/SGSN Topology Hiding Configuration Set.
For Protected-MME/SGSN to Untrusted-HSS transactions, MME/SGSN topology information restoral
is performed only on Answer messages that meet the following criterion:
• At TH Trigger Point ATR, the MME/SGSN TH ATR flag in the PTR associated with the Answer
message is set to Enabled.
• The hPCRF will send an Answer response to the transaction with the Session-ID received in the
Request (also containing a PCRF pseudo-host name). Because the Session-ID value returned in the
Answer must match the Request, the PCRF pseudo-host name in the Session-ID AVP must be
replaced with its corresponding value received in the Request message. This value is restored at
TH trigger point ATR. This will require saving the host name portion of the Session-ID AVP value
in the PTR. This host name restoral procedure is not required for Answers initiated by internal
nodes as these Answer responses are based upon the original Request message content
An example of a Protected-vPCRF to Untrusted-hPCRF Diameter transaction is shown in Figure 29:
Protected-vPCRF to Untrusted-hPCRF Transaction.
To ensure all S9/Rx messages for the same session are modified using the same pseudo-name, the
Session-ID AVP can be used as a key to select a Pseudo Host Name for an Actual Host Name.
• The Request message is a member of the S9 message and was initiated by a PCRF or
• The Request message is a member of the Rx message set and was initiated by a PCRF and S9
AF/pCSCF TH is not enabled and
• The Origin-Host and/or Session-ID AVPs in the Request contain an actual PCRF host name assigned
to the Protected Network via the S9 PCRF Configuration Set.
For Protected-vPCRF to Untrusted-hPCRF transactions, PCRF topology information restoral is only
performed on Answer messages which meet the following criteria:
• At topology trigger point ATR, the PCRF TH ATR flag in the PTR associated with the Answer
message is set to Enabled.
When an Untrusted-hPCRF initiates a transaction to a Protected-vPCRF, it will most likely be addressed
to one of the vPCRF pseduo-host names that the hPCRF saved in a previous vPCRF-to-hPCRF
transaction for which S9 PCRF TH was applied. For Untrusted-hPCRF to Protected-vPCRF Diameter
transactions (RAR, ASR, and so on), S9 PCRF TG is concerned with the following topology information
hiding and restoral issues:
• The Destination-Host AVP contains a vPCRF pseudo-host name. This pseudo-host name must be
replaced with the vPCRF's actual-host name at TH trigger point RTR. Pseudo-to-actual host name
mapping is performed using the internal TH Host Names. It's perfectly acceptable that an
Untrusted-hPCRF to Protected-vPCRF Request message does not contain a PCRF pseudo-host
name. If the Destination-Host AVP value does not match an entry in the TH Pseudo-Host Name,
then no host name conversion is required and the Request message will be routed as normal.
Destination-Host name conversion is performed to prevent the following problems:
• Certain vPCRFs will not accept messages that do not contain its actual host name
• Diameter routing problems associated with pseudo-host names. For example, DRL Implicit
Routing currently only works with actual host names (for example, the FQDN assigned to the
Peer Node and used for the Capabilities Exchange procedure [CER/CEA]).
• The host portion of Session-ID AVP containing a PCRF pseudo-host name must be replaced back
with vPCRF's actual host name at TH trigger point RTR. Pseudo-to-actual host name mapping is
performed using the internal TH Host Names.
• An Origin-Host AVP containing a vPCRF's actual-host name in the Answer response from the
Protected-vPCRF must be hidden with one of the pseudo-host names assigned to that PCRF. This
procedure is done at TH trigger point ATH.
• Session-ID AVP containing a vPCRF's actual-host name in the Answer response from the
Protected-vPCRF must be hidden with one of the pseudo-host names assigned to that PCRF. This
is done at TH trigger point ATH.
An example of an Untrusted-hPCRF to Protected-vPCRF Diameter transaction is shown in Figure 30:
Untrusted-hPCRF to Protected-vPCRF Diameter Transaction.
To ensure all S9/Rx messages for same session are modified using same pseudo-name , Session-ID
AVP can be used as key to select a Pseudo Host Name for an Actual Host Name.
For Protected-hPCRF to Untrusted-vPCRF S9/Rx transactions, PCRF topology hiding is only required
on Request messages which meet the following criteria:
• The message was a candidate for topology hiding as defined by topology trigger point RTH and
• S9 PCRF TH is enabled for the Protected Network (S9 PCRF TH Configuration Set is assigned to
the Protected Network) and
• The Request message is a member of the S9/Rx message set and was initiated by a PCRF and
• The Origin-Host AVP in the Request contain an actual PCRF host name assigned to the Protected
Network via the S9 PCRF TH Configuration Set
For Untrusted-vPCRF to Protected-hPCRF transactions, S9 PCRF HSS topology hiding is only invoked
on Request messages at topology trigger point RTR which meet the following criteria:
• Message was a candidate for topology hiding as defined by topology trigger point RTR and
• S9 PCRF TH is enabled for the Protected Network (S9 PCRF TH Configuration Set is assigned to
the Protected Network) and
• The Request message is a member of the S9 message set and was initiated by a PCRF as determined
and
• The Request message is a member of Rx message set and was initiated by a PCRF and S9 AF/pCSCF
TH is not enabled and
• The Destination-Host AVP contains a PCRF pseudo-host name that is assigned to the Protected
Network as determined from the internal Pseudo-Host Name
For Untrusted-vPCRF to Protected-hPCRF transactions, S9 PCRF HSS topology hiding is only invoked
on Answer messages at topology trigger point ATH which meet the following criteria:
• Message was a candidate for topology hiding as defined by topology trigger point ATH
• S9 PCRF TH is enabled for the Protected Network (S9 PCRF TH Configuration Set is assigned to
the Protected Network)
• The Answer message is a member of the S9 message set and was initiated by a PCRF
• The Origin-Host AVP contains an actual PCRF host name that is assigned to the Protected Network
via the S9 PCRF TH Configuration Set
• The hPCRF will send an Answer response to the transaction with the Session-ID received in the
Request (containing an AF/pCSCF pseudo-host name). Because the Session-ID value returned in
the Answer must match the Request, the AF/pCSCF pseudo-host name in the Session-ID AVP
must be replaced with its corresponding value received in the Request message. This value is
restored at TH trigger point ATR. This will require saving the host name portion of the Session-ID
AVP value in the PTR. This host name restoral procedure is not required for Answers initiated by
internal nodes as these Answer responses are based upon the original Request message content.
An example of a Protected-vAF/pCSCF to Untrusted-hPCRF Diameter transaction is shown in Figure
33: Protected vAF/pCSCF to Untrusted-hPCRF Transaction.
To ensure all Rx messages for the same session are modified using the same pseudo-name, Session-ID
AVP can be used as a key to select a Pseudo Host Name for an Actual Host Name.
For Protected-vAF/pCSCF to Untrusted-hPCRF Rx transactions, S9 Af/pCSCF topology hiding is
only required on Request messages at topology hiding point RTH which meet the following criteria:
• The message was a candidate for topology hiding as defined by topology trigger point RTH and
• S9 AF/pCSCF TH is enabled for the Protected Network (S9 PCRF TH Configuration Set is assigned
to the Protected Network) and
• The Request message is a member of the Rx message set and was initiated by an AF/pCSCF and
• The Origin-Host and/or Session-ID AVPs in the Request contain an actual AF/pCSCF host name
assigned to the Protected Network via the S9 AF/pCSCF TH Configuration Set.
For Protected-vAF/pCSCF to Untrusted-hPCRF transactions, AF/pCSCF topology information restoral
is only performed on Answer messages which meet the following criterion:
• At TH Trigger Point ATR, the AF/pCSCF TH ATR flag in the PTR associated with the Answer
message is set to Enabled.
• Select a Trusted Networks List Name in the list, and click Edit.
The Diameter > Configuration > Topology Hiding > Trusted Networks Lists page opens. You
can edit the selected Trusted Networks List. See Editing a Trusted Network List.
• Select a Trusted Networks List Name in the list, and click Delete to remove the selected Trusted
Networks List. See Deleting a Trusted Network List.
Field (* indicates a
required field) Description Data Input Notes
* Trusted Network A name that uniquely identifies Format: case-sensitive; alphanumeric and
List Name the Trusted Network List. underscore (_); cannot start with a digit and
must contain at least one alpha
Range: 1 - 32 characters
* Trusted Network Trusted Network Realms for this Format: Test box; case-insensitive string
Realms Trusted Network List. For consisting of a list of labels separated by
Trusted Network Realms the dots, where a label may contain letters,
Topology Hiding Feature will not digits, dashes ('-') and underscore ('_'). A
be applied. label must start with a letter, digit or
underscore and must end with a letter or
Click Add to enter another Realm.
digit. Underscores can be used only as the
Click the X next to a Realm to first character. A label can be at most 63
delete the entry. characters long and a Realm can be at most
255 characters long.
Range: 1-100 entries
The Diameter > Configuration > Topology Hiding > Trusted Networks Lists page appears.
2. Click Insert.
The Diameter > Configuration > Topology Hiding > Trusted Networks Lists [Insert] page
appears.
3. Enter a unique name for the Trusted Network List in the Trusted Network List Name field.
4. Enter one or more, up to 100, Trusted Network Realms.
5. Click:
• OK to save the data and return to the Diameter > Configuration > Topology Hiding > Trusted
Networks Lists page.
• Apply to save the data and remain on this page.
• Cancel to return to the Diameter > Configuration > Topology Hiding > Trusted Networks
Lists page without saving any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• Any required field is empty; no value was entered or selected
• The entry in any field in not valid (wrong data type or out of the valid range)
• The Trusted Network List Name is not unique; it already exists in the system
• The maximum number of Trusted Network Lists (100) would be exceeded in the system
• Click the + sign to the left of the number of Hostname Suffixes to expand the list of Hostname
Suffixes for the Configuration Set.
• Click the - sign to the left of the number of Hostname Suffixes to collapse the list of Hostname
Suffixes for the Configuration Set.
• Click Insert.
The Diameter > Configuration > Topology Hiding > Path Topology Hiding Configuration Sets
[Insert] page appears. You can add a new Path Topology Hiding Configuration Set and its elements.
See Adding a Path Topology Hiding Configuration Set.
If the maximum number of Path Topology Hiding Configuration Sets per Network Element (500)
already exist in the system, the Diameter > Configuration > Topology Hiding > Path Topology
Hiding Configuration Sets [Insert] page will not open, and an error message is displayed.
• Select a Path Topology Hiding Configuration Set Name in the list, and click Edit.
The Diameter > Configuration > Topology Hiding > Path Topology Hiding Configuration Sets
[Edit] page opens. You can edit the selected Path Topology Hiding Configuration Set. See Editing
a Path Topology Hiding Configuration Set.
If at least one Protected Network references the Path Topology Hiding Configuration Set the
Diameter > Configuration > Topology Hiding > Path Topology Hiding Configuration Sets
[Edit] page will not open.
• Select a Path Topology Hiding Configuration Set Name in the list, and click Delete to remove the
selected Path Topology Hiding Configuration Set. See Deleting a Path Topology Hiding Configuration
Set.
If at least one Protected Network references the selected Path Topology Hiding Configuration Set,
the Configuration Set will not be deleted.
Field (* indicates
required field) Description Data Input Notes
* Path Topology Hiding A name that uniquely identifies the Format: case-sensitive string;
Configuration Set Name Path Topology Hiding Configuration alphanumeric and underscore (_);
Set. must contain at least one alpha
and cannot start with a digit.
Range: 1 - 32 characters
* Hostname Suffixes List of Hostname Suffixes that are used Format: case-insensitive string
to identify the Protected Network's host consisting of a list of labels
name that must be hidden in separated by dots, where a label
Route-Record, Proxy-Host, and may contain letters, digits, dashes
Error-Reporting-Host AVPs. (-), and underscore (_). A label
Field (* indicates
required field) Description Data Input Notes
Up to 10 Hostname Suffixes can be must start with a letter, digit, or
configured for each Path Topology underscore and must end with a
Hiding Configuration Set. letter or digit. Underscores can be
used only as the first character.
Label - up to 63 characters;
Hostname Suffix - up to 255
characters.
* Proxy Host Pseudo A pseudo-host name that is used in Format: case-insensitive string
Hostname replacing the host name in the consisting of a list of labels
Proxy-Host AVP. separated by dots, where a label
may contain letters, digits, dashes
(-), and underscore (_). A label
must start with a letter, digit, or
underscore and must end with a
letter or digit. Underscores can be
used only as the first character.
Label - up to 63 characters; Proxy
Host Pseudo Hostname - up to 255
characters.
3. Enter a unique name for the Configuration Set in the Path Topology Hiding Configuration Set
Name field.
4. Enter a suffix for the Hostname in the Hostname Suffix field.
5. Enter a value to be used when replacing the Route-Record headers in the Route-Record Pseudo
Hostname field.
6. Enter a value to be used when replacing the host name in the Proxy-Host AVP in the Proxy-Host
Pseudo Hostname field.
7. Enter an encryption key value in the Encryption Key field.
8. Click:
• OK to save the new Configuration Set and return to the Path Topology Hiding Configuration
Sets page.
• Apply to save the changes and remain on this page.
• Cancel to return to the Path Topology Hiding Configuration Sets page without saving any
changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• Any required field is empty (no value was entered).
• The value in any field is not valid or is out of range.
• The Path Topology Hiding Configuration Set Name is not unique; it already exists in the
system.
2. Select the Path Topology Hiding Configuration Set you want to edit.
3. Click Edit.
The Path Topology Hiding Configuration Sets [Edit] page appears.
4. Update the relevant fields.
For information about each field, see Diameter Topology Hiding Path Topology Hiding Configuration
Set elements.
5. Click:
• OK to save the changes and return to the Path Topology Hiding Configuration Sets page.
• Apply to save the changes and remain on this page.
• Cancel to return to the Path Topology Hiding Configuration Sets page without saving any
changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• The selected Path Topology Hiding Configuration Set no longer exists; it has been deleted by
another user.
• Any required field is empty (no value was entered).
• The value in any field is not valid or is out of range.
• S6a/S6d HSS Topology Hiding Configuration Set Name - Unique name for this Configuration Set.
• Use S6a/S6d Single HSS Pseudo Hostname - If checked, Single HSS Pseudo Hostname will be used
for all HSS actual hostnames.
Note: When the Use S6a/S6d Single HSS Pseudo Host NameHSS field is configured, all HSS TH
Configuration Set fields associated with multiple pseudo-host names must not be configured
• S6a/S6d Single HSS Pseudo Hostname - S6a/S6d HSS Pseudo Hostname
• Pseudo Hostname Generation - Attributes to control the format and generation of Pseudo Hostnames
corresponding to an Actual Hostname.
Note: In order to support multiple pseudo hostnames for each HSS real hostname, each S6a/S6d
TH Configuration set includes the following attributes:
• Count - The maximum number of Pseudo Hostnames associated with an Actual Hostname.
• Randomize Count - Allows random number of Pseudo Hostnames between 1 and Count to be
associated with an Actual Hostname.
• Auto Generate - Allows Pseudo Hostnames to be automatically generated corresponding to an
Actual Hostname.
• Prefix - Prefix for the auto-generated Pseudo Hostname.
• Suffix - Suffix for the auto-generated Pseudo Hostname.
• Length - Length of the random number used in the auto-generated Pseudo Hostname.
• Hostnames - List of Actual Hostnames and their Pseudo Hostnames in this S6a/S6d HSS Topology
Hiding Configuration Set.
• S6a/S6d HSS Actual Hostname Not Found Action - Action to be performed when the Orig-Host
in the Diameter message is not configured as Actual Hostname in this S6a/S6d HSS Topology
Hiding Configuration Set.
• S6a/S6d HSS Actual Hostname Not Found Answer Result-Code Value - Value to be placed in the
Result-Code AVP of the Answer message.
• S6a/S6d HSS Actual Hostname Not Found Vendor ID - Vendor ID will be placed in Vendor ID
AVP.
• S6a/S6d HSS Actual Hostname Not Found Answer Error Message - String to be placed in the
Error-Message AVP of the Answer message.
On the Diameter > Configuration > Topology Hiding > S6a/S6d HSS Topology Hiding Configuration
SetsHSS page, you can perform the following actions:
• Filter the list of S6a/S6d HSS Topology Hiding Configuration Sets to display only the desired
S6a/S6d HSS Topology Hiding Configuration Sets.
• Sort the list by column contents in ascending or descending order (except Hostname Suffixes), by
clicking the column heading. The default order is by S6a/S6d HSS Topology Hiding Configuration
Set NameHSS in ascending ASCII order.
• Click Insert.
The Diameter > Configuration > Topology Hiding > S6a/S6d HSS Topology Hiding
Configuration Sets [Insert]HSS page appears. You can add a new S6a/S6d HSS Topology Hiding
Configuration Set and its elements. See Adding an S6a/S6d HSS Topology Hiding Configuration Set.
If the maximum number of S6a/S6d HSS Topology Hiding Configuration Sets (500) already exists
in the system, the Diameter > Configuration > Topology Hiding > S6a/S6d HSS Topology Hiding
Configuration Sets [Insert] page will not open, and an error message is displayed.
• Select a S6a/S6d HSS Topology Hiding Configuration Set Name in the list, and click Edit.
The Diameter > Configuration > Topology Hiding > S6a/S6d HSS Topology Hiding
Configuration Sets [Edit]HSS page opens. You can edit the selected S6a/S6d HSS Configuration
Set. See Editing an S6a/S6d HSS Topology Hiding Configuration Set.
• Select a S6a/S6d HSS Topology Hiding Configuration Set Name in the list, and click Delete to
remove the selected S6a/S6d HSS Topology Hiding Configuration Set. See Deleting an S6a/S6d HSS
Topology Hiding Configuration Set.
If the selected S6a/S6d HSS Topology Hiding Configuration Set is used in a Protected Network,
the Configuration Set will not be deleted.
Field (* indicates
required field) Description Data Input Notes
* S6a/S6d HSS A name that uniquely identifies the S6a/S6d Format: case-sensitive string;
Topology Hiding HSS Topology Hiding Configuration Set. alphanumeric and underscore
Configuration Set (_); must contain at least one
Name alpha and cannot start with a
digit
Range: 1 - 32 characters
Use S6a/S6d Single If checked, Single HSS Pseudo Hostname Default: Checked
HSS Pseudo Hostname will be used for all HSS actual hostnames.
Range: n/a
Note: When the Use S6a/S6d Single HSS
Pseudo Host NameHSS field is configured,
all HSS TH Configuration Set fields
associated with multiple pseudo-host names
must not be configured
* S6a/S6d HSS Pseudo The name to be used in replacing the HSS Format: case-insensitive string
Hostname Hostname. consisting of a list of labels
separated by dots, where a
label may contain letters, digits,
dashes (-), and underscore (_).
A label must start with a letter,
digit, or underscore and must
end with a letter or digit.
Underscores can be used only
as the first character.
Label - up to 63 characters;
S6a/S6d HSS Pseudo
Field (* indicates
required field) Description Data Input Notes
Hostname - up to 255
characters.
* Hostnames List of Actual Hostnames and their Pseudo Format: case-insensitive string
Hostnames in this S6a/S6d HSS Topology consisting of a list of labels
Hiding Configuration Set. separated by dots, where a
Field (* indicates
required field) Description Data Input Notes
label may contain letters, digits,
dashes (-), and underscore (_).
A label must start with a letter,
digit, or underscore and must
end with a letter or digit.
Underscores can be used only
as the first character.
Label - up to 63 characters;
S6a/S6d HSS Pseudo
Hostname - up to 255
characters.
S6a/S6d HSS Actual Action to be performed when the Orig-Host Default: Send Answer
Hostname Not Found in the Diameter message is not configured
Range: n/a
Action as Actual Hostname in this S6a/S6d HSS
Topology Hiding Configuration Set.
S6a/S6d HSS Actual Value to be placed in the Result-Code AVP Default: 3002
Hostname Not Found of the Answer message. S6a/S6d HSS Actual
Range: 1000-5999
Answer Result-Code Hostname Not Found Answer Result-Code
Value Value is required if action is Send Answer.
S6a/S6d HSS Actual Vendor ID will be placed in Vendor ID AVP Default: n/a
Hostname Not Found
Range: 1-4294967295
Vendor ID
S6a/S6d HSS Actual String to be placed in the Error-Message Default: null string, no
Hostname Not Found AVP of the Answer message Error-Message AVP in Answer
Answer Error Message message
Range: 0-64 characters
2. Click Insert.
The S6a/S6d HSS Topology Hiding Configuration Sets [Insert] page appears.
3. Enter a unique name for the Configuration Set in the S6a/S6d HSS Topology Hiding Configuration
Set Name field.
4. Check or uncheck the box for the Use S6a/S6d Single HSS Pseudo Hostname field to indicate
whether or not a Single HSS Pseudo Hostname will be used for all HSS actual hostnames.
5. Enter a unique name to be used when replacing the S6a/S6d HSS Hostname in the S6a/S6d Single
HSS Pseudo Hostname field.
6. Set the Count, Randomize Count, Auto Generate, Prefix, Suffix, and Length attributes associated
with Pseudo Hostname Generation.
7. Add Hostnames to serve as Actual Hostnames and their Pseudo Hostnames in the S6a/S6d HSS
Topology Hiding Configuration Set.
8. Select an S6a/S6d HSS Actual Hostname Not Found Action to be performed when the Orig-Host
in the Diameter message is not configured as Actual Hostname in this S6a/S6d HSS Topology
Hiding Configuration Set in the field.
9. Enter an S6a/S6d HSS Actual Hostname Not Found Answer Result-Code Value to be placed in
the Result-Code AVP of the Answer message.
10. Enter an S6a/S6d HSS Actual Hostname Not Found Vendor ID to be placed in Vendor Id AVP.
11. Enter an S6a/S6d HSS Actual Hostname Not Found Answer Error Message to be placed in the
Error-Message AVP of the Answer message.
12. Click:
• OK to save the changes and return to the S6a/S6d HSS Topology Hiding Configuration Sets
page.
• Apply to save the changes and remain on this page.
• Cancel to return to the S6a/S6d HSS Topology Hiding Configuration Sets page without saving
any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• Any required field is empty (no value was entered).
• The value in any field is not valid or is out of range.
• The S6a/S6d HSS Topology Hiding Configuration Set Name is not unique; it already exists
in the system.
1. Select Diameter > Configuration > Topology Hiding > S6a/S6d HSS Topology Hiding
Configuration Sets.
The S6a/S6d HSS Topology Hiding Configuration Sets page appears.
2. Select the S6a/S6d HSS Topology Hiding Configuration Set you want to edit.
3. Click Edit.
The S6a/S6d HSS Topology Hiding Configuration Sets [Edit]HSS page appears.
4. Update the relevant fields.
For information about each field, see Diameter S6a/S6d HSS Topology Hiding Configuration Set elements.
5. Click:
• OK to save the data and return to the S6a/S6d HSS Topology Hiding Configuration Sets page.
• Apply to save the data and remain on this page.
• Cancel to return to the S6a/S6d HSS Topology Hiding Configuration Sets page without saving
any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• The selected S6a/S6d HSS Topology Hiding Configuration Set no longer exists; it has been
deleted by another user.
• Any field is empty (no value was entered).
• The value in any field is not valid or is out of range.
The fields are described in Diameter MME/SGSN Topology Hiding Configuration Set elements.
Each MME/SGSN Topology Hiding Configuration Set contains the following information:
• MME/SGSN Topology Hiding Configuration Set Name - Unique name for this Configuration Set.
• Pseudo Hostname Generation - Attributes to control the format and generation of Pseudo Hostnames
corresponding to an Actual Hostname.
• Count - The maximum number of Pseudo Hostnames associated with an Actual Hostname.
• Randomize Count - Allows random number of Pseudo Hostnames between 1 and Count to be
associated with an Actual Hostname.
• Auto Generate - Allows Pseudo Hostnames to be automatically generated corresponding to an
Actual Hostname.
• Prefix - Prefix for the auto-generated Pseudo Hostname.
• Suffix - Suffix for the auto-generated Pseudo Hostname.
• Length - Length of the random number used in the auto-generated Pseudo Hostname.
• Hostnames - List of Actual Hostnames and their Pseudo Hostnames in this MME/SGSN Topology
Hiding Configuration Set.
• MME/SGSN Actual Hostname Not Found Action - Action to be taken when the Orig-Host in the
Diameter message is not configured as Actual Hostname.
• MME/SGSN Actual Hostname Not Found Answer Result-Code Value - Value to be placed in the
Result-Code AVP of the Answer message.
• MME/SGSN Actual Hostname Not Found Vendor Id - Value to be placed in the Vendor ID AVP.
• MME/SGSN Actual Hostname Not Found Answer Error Message - String to be placed in the
Error-Message AVP of the Answer message.
On the Diameter > Configuration > Topology Hiding > MME/SGSN Topology Hiding Configuration
Sets page, you can perform the following actions:
• Filter the list of MME/SGSN Topology Hiding Configuration Sets to display only the desired
MME/SGSN Topology Hiding Configuration Sets.
• Sort the list by column contents in ascending or descending order (except Hostname Suffixes), by
clicking the column heading. The default order is by MME/SGSN Topology Hiding Configuration
Set Name in ascending ASCII order.
• Click Insert.
The Diameter > Configuration [Insert] > Topology Hiding > MME/SGSN Topology Hiding
Configuration Sets page appears. You can add a new MME/SGSN Topology Hiding Configuration
Set and its elements. See Adding an MME/SGSN Topology Hiding Configuration Set.
If the maximum number of MME/SGSN Topology Hiding Configuration Sets (500) already exist
in the system, the Diameter > Configuration > Topology Hiding > MME/SGSN Topology Hiding
Configuration Sets [Insert] page will not open, and an error message is displayed.
• Select a MME/SGSN Topology Hiding Configuration Set Name in the list, and click Edit.
The Diameter > Configuration > Topology Hiding > MME/SGSN Topology Hiding Configuration
Sets [Edit] page opens. You can edit the selected Configuration Set. See Editing an MME/SGSN
Topology Hiding Configuration Set.
• Select an MME/SGSN Topology Hiding Configuration Set Name in the list, and click Delete to
remove the selected MME/SGSN Topology Hiding Configuration Set. See Deleting an MME/SGSN
Topology Hiding Configuration Set.
If at least one Protected Network references the selected MME/SGSN Topology Hiding
Configuration Set, the Configuration Set will not be deleted.
Field (* indicates
required field) Description Data Input Notes
* MME/SGSN A name that uniquely identifies the Format: case-sensitive string;
Topology Hiding MME/SGSN Topology Hiding Configuration alphanumeric and
Configuration Set Name Set. underscore (_); must contain
at least one alpha and
cannot start with a digit
Range: 1 - 32 characters
Field (* indicates
required field) Description Data Input Notes
Suffix - Suffix for the auto generated Pseudo Format: case-insensitive
Hostname. string consisting of a list of
labels separated by dots,
where a label may contain
letters, digits, dashes (-), and
underscore (_). A label must
start with a letter, digit, or
underscore and must end
with a letter or digit.
Underscores can be used
only as the first character.
Range: up to 63 characters
* Hostnames List of Actual Hostnames and their Pseudo Format: Each Actual and
Hostnames in this MME/SGSN Topology Pseudo Hostname is a
Hiding Configuration Set. case-insensitive string
consisting of a list of labels
• Text boxes for Actual Hostname and
separated by dots, where a
Pseudo Hostnames
label may contain letters,
• Click Add to open up to 300 entries. digits, dashes (-), and
• Click the X at the end of an entry to delete underscore (_). A label must
the Actual Hostname entry and its start with a letter, digit, or
corresponding Pseudo Hostnames. underscore and must end
with a letter or digit.
Underscores can be used
only as the first character.
Label - up to 63 characters;
Actual or Pseudo Hostname
- up to 255 characters.
Range: Actual Hostname - 1
- 300 entries. Pseudo
Hostname - 1 - 3 entries per
actual Hostname.
MME/SGSN Actual Action to be performed when the Orig-Host Format: radio button group
Hostname Not Found in the Diameter message is not configured as
Range:
Action Actual Hostname in this MME/SGSN
Topology Hiding Configuration Set. • Send Answer
• Abandon
• Forward
Default: Send Answer
Field (* indicates
required field) Description Data Input Notes
MME/SGSN Actual Value to be placed in the Result-Code AVP Format: radio button group
Hostname Not Found of the Answer message. with values as a text box and
Answer Result-Code a pull-down list.
This value is required if the MME/SGSN
Value
Actual Hostname Not Found Action is Send Range: 1000 - 5999
Answer.
Default: 3002
3. Enter a unique name for the Configuration Set in the MME/SGSN Topology Hiding Configuration
Set Name field.
4. Enter values for the Actual Hostname and associated Pseudo Hostnames in the appropriate fields.
5. Complete the optional fields as desired.
6. Click:
• OK to save the changes and return to the MME/SGSN Topology Hiding Configuration Sets
page.
• Apply to save the changes and remain on this page.
• Cancel to return to the MME/SGSN Topology Hiding Configuration Sets page without saving
any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• Any required field is empty (no value was entered).
• The value in any field is not valid or is out of range.
• The MME/SGSN Topology Hiding Configuration Set Name is not unique; it already exists in
the system.
An MME/SGSN Topology Hiding Configuration Set that is being used by a Protected Network cannot
be deleted.
1. Select Diameter > Configuration > Toplogy Hiding > MME/SGSN Toplogy Hiding Configuration
Sets.
The MME/SGSN Toplogy Hiding Configuration Sets page appears.
2. Select the MME/SGSN Topology Hiding Configuration Set you want to delete.
3. Click Delete.
A popup window appears to confirm the delete.
4. Click:
• OK to delete the MME/SGSN Topology Hiding Configuration Set.
• Cancel to cancel the delete function and return to the MME/SGSN Toplogy Hiding
Configuration Sets page.
• S9 PCRF Actual Hostname Not Found Answer Error Message - String to be placed in the
Error-Message AVP of the Answer message.
On the Diameter > Configuration > Topology Hiding > S9 PCRF Topology Hiding Configuration
Sets page, you can perform the following actions:
• Filter the list of S9 PCRF Topology Hiding Configuration Sets to display only the desired S9 PCRF
Topology Hiding Configuration Sets.
• Sort the list by column contents in ascending or descending order (except Hostname Suffixes), by
clicking the column heading. The default order is by S9 PCRF Topology Hiding Configuration
Set Name in ascending ASCII order.
• Click Insert.
The Diameter > Configuration > Topology Hiding > S9 PCRF Topology Hiding Configuration
Sets [Insert] page appears. You can add a new S9 PCRF Topology Hiding Configuration Set and
its elements. See Adding an S9 PCRF Topology Hiding Configuration Set.
If the maximum number of S9 PCRF Topology Hiding Configuration Sets (500) already exists in
the system, the Diameter > Configuration > Topology Hiding > S9 PCRF Topology Hiding
Configuration Sets [Insert] page will not open, and an error message is displayed.
• Select a S9 PCRF Topology Hiding Configuration Set Name in the list, and click Edit.
The Diameter > Configuration > Topology Hiding > S9 PCRF Topology Hiding Configuration
Sets [Edit] page opens. You can edit the selected S9 PCRF Configuration Set. See Editing an S9
PCRF Topology Hiding Configuration Set.
• Select a S9 PCRF Topology Hiding Configuration Set Name in the list, and click Delete to remove
the selected S9 PCRF Topology Hiding Configuration Set. See Deleting an S9 PCRF Topology Hiding
Configuration Set.
If the selected S9 PCRF Topology Hiding Configuration Set is used in a Protected Network, the
Configuration Set will not be deleted.
Field (* indicates
required field) Description Data Input Notes
* S9 PCRF Topology A name that uniquely identifies the S9 PCRF Format: case-sensitive string;
Hiding Configuration Topology Hiding Configuration Set. alphanumeric and
Set Name underscore (_); must contain
at least one alpha and
cannot start with a digit
Range: 1 - 32 characters
Field (* indicates
required field) Description Data Input Notes
Pseudo Hostname Attributes to control the format and Count:
Generation generation of Pseudo Hostnames
• Default = 3
corresponding to an Actual Hostname.
• Range = 1-3
• Count - The maximum number of Pseudo
Hostnames associated with an Actual Randomize Count:
Hostname. • Default = Checked
• Randomize Count - If checked, random • Range = n/a
number of Pseudo Hostnames between 1
and Count are associated with an Actual Auto Generate:
Hostname. • Default = Checked
• Auto Generate - If checked, Pseudo • Range = n/a
Hostnames are automatically generated
corresponding to an Actual Hostname. Prefix:
• Prefix - Prefix for the auto generated • Default = n/a
Pseudo Hostname. Prefix is a • Range = A valid Prefix
case-insensitive string consisting of a list
Suffix:
of labels separated by dots, where a label
may contain letters, digits, dashes (-) and • Default = n/a
underscore (_). A label must start with a • Range = A valid Suffix
letter, digit or underscore and must end
with a letter or digit. Underscores may be Length:
used only as the first character. Prefix must • Default = 4
be at most 63 characters long. • Range = 4 - 5
• Suffix - Suffix for the auto generated
Pseudo Hostname. Suffix is
case-insensitive string consisting of a list
of labels separated by dots, where a label
may contain letters, digits, dashes (-) and
underscore (_). A label must start with a
letter, digit or underscore and must end
with a letter or digit. Underscores may be
used only as the first character. Suffix must
be at most 63 characters long.
• Length - Length of the random number
used in the auto generated Pseudo
Hostname.
Field (* indicates
required field) Description Data Input Notes
Underscores can be used
only as the first character.
Label - up to 63 characters;
S9 PCRF Pseudo Hostname
- up to 255 characters.
S9 PCRF Actual Action to be performed when the Orig-Host Default: Send Answer
Hostname Not Found in the Diameter message is not configured as
Range: n/a
Action Actual Hostname in this S9 PCRF Topology
Hiding Configuration Set.
S9 PCRF Actual Value to be placed in the Result-Code AVP Default: 3002
Hostname Not Found of the Answer message. S9 PCRF Actual
Range: 1000-5999
Answer Result-Code Hostname Not Found Answer Result-Code
Value Value is required if action is Send Answer.
S9 PCRF Actual Vendor ID will be placed in Vendor ID AVP Default: n/a
Hostname Not Found
Range: 1-4294967295
Vendor ID
S9 PCRF Actual String to be placed in the Error-Message AVP Default: null string, no
Hostname Not Found of the Answer message Error-Message AVP in
Answer Error Message Answer message
Range: 0-64 characters
2. Click Insert.
The S9 PCRF Topology Hiding Configuration Sets [Insert] page appears.
3. Enter a unique name for the Configuration Set in the S9 PCRF Topology Hiding Configuration
Set Name field.
4. Select/Enter desired values for the Pseudo Hostname Generation field.
5. Select a unique name to be used when replacing the S9 PCRF Hostname in the Hostnames field.
6. In the S9 PCRF Actual Hostname Not Found Action field, select the action to be taken if the Actual
Hostname is not found.
7. In the S9 PCRF Actual Hostname Not Found Answer Result-Code Value field, enter a value to
be placed in the Result-Code AVP of the Answer message.
8. In the S9 PCRF Actual Hostname Not Found Vendor Id field, enter a Vender Id to be place in the
Vendor id AVP.
9. In the S9 PCRF Actual Hostname Not Found Answer Error Message field, enter a string to be
placed in the Error-Message AVP of the Answer message.
10. Click:
• OK to save the changes and return to the S9 PCRF Topology Hiding Configuration Sets page.
• Apply to save the changes and remain on this page.
• Cancel to return to the S9 PCRF Topology Hiding Configuration Sets page without saving
any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• Any required field is empty (no value was entered).
• The value in any field is not valid or is out of range.
• The S9 PCRF Topology Hiding Configuration Set Name is not unique; it already exists in the
system.
2. Click Edit.
The S9 PCRF Topology Hiding Configuration Sets [Edit] page appears.
3. Enter a unique name for the Configuration Set in the S9 PCRF Topology Hiding Configuration
Set Name field.
4. Select/Enter desired values for the Pseudo Hostname Generation field.
5. Select a unique name to be used when replacing the S9 PCRF Hostname in the Hostnames field.
6. In the S9 PCRF Actual Hostname Not Found Action field, select the action to be taken if the Actual
Hostname is not found.
7. In the S9 PCRF Actual Hostname Not Found Answer Result-Code Value field, enter a value to
be placed in the Result-Code AVP of the Answer message.
8. In the S9 PCRF Actual Hostname Not Found Vendor Id field, enter a Vender Id to be place in the
Vendor id AVP.
9. In the S9 PCRF Actual Hostname Not Found Answer Error Message field, enter a string to be
placed in the Error-Message AVP of the Answer message.
10. Click:
• OK to save the changes and return to the S9 PCRF Topology Hiding Configuration Sets page.
• Apply to save the changes and remain on this page.
• Cancel to return to the S9 PCRF Topology Hiding Configuration Sets page without saving
any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• Any required field is empty (no value was entered).
• The value in any field is not valid or is out of range.
• The S9 PCRF Topology Hiding Configuration Set Name is not unique; it already exists in the
system.
Each S9 AF/pCSCF Topology Hiding Configuration Set contains the following information:
• S9 AF/pCSCF Topology Hiding Configuration Set Name - Unique name for this Configuration
Set.
• Pseudo Hostname Generation - Attributes to control the format and generation of Pseudo Hostnames
corresponding to an Actual Hostname.
• Count - The maximum number of Pseudo Hostnames associated with an Actual Hostname.
• Randomize Count - Allows random number of Pseudo Hostnames between 1 and Count to be
associated with an Actual Hostname.
• Auto Generate - Allows Pseudo Hostnames to be automatically generated corresponding to an
Actual Hostname.
• Prefix - Prefix for the auto-generated Pseudo Hostname.
• Suffix - Suffix for the auto-generated Pseudo Hostname.
• Length - Length of the random number used in the auto-generated Pseudo Hostname.
• Hostnames - List of Actual Hostnames and their Pseudo Hostnames in this S9 PCRF Topology
Hiding Configuration Set.
• S9 AF/pCSCF Actual Hostname Not Found Action - Action to be performed when the Orig-Host
in the Diameter message is not configured as Actual Hostname in this S9 AF/pCSCF Topology
Hiding Configuration Set.
• S9 AF/pCSCF Actual Hostname Not Found Answer Result-Code Value - Value to be placed in the
Result-Code AVP of the Answer message.
• S9 AF/pCSCF Actual Hostname Not Found Vendor ID - Vendor ID will be placed in Vendor ID
AVP.
• S9 AF/pCSCF Actual Hostname Not Found Answer Error Message - String to be placed in the
Error-Message AVP of the Answer message.
On the Diameter > Configuration > Topology Hiding > S9 AF/pCSCF Topology Hiding
Configuration Sets page, you can perform the following actions:
• Filter the list of S9 AF/pCSCF Topology Hiding Configuration Sets to display only the desired S9
AF/pCSCF Topology Hiding Configuration Sets.
• Sort the list by column contents in ascending or descending order (except Hostname Suffixes), by
clicking the column heading. The default order is by S9 AF/pCSCF Topology Hiding Configuration
Set Name in ascending ASCII order.
• Click Insert.
The Diameter > Configuration > Topology Hiding > S9 AF/pCSCF Topology Hiding
Configuration Sets [Insert] page appears. You can add a new S9 AF/pCSCF Topology Hiding
Configuration Set and its elements. See Adding an S9 AF/pCSCF Topology Hiding Configuration Set.
If the maximum number of S9 AF/pCSCF Topology Hiding Configuration Sets (500) already exists
in the system, the Diameter > Configuration > Topology Hiding > S9 AF/pCSCF Topology
Hiding Configuration Sets [Insert] page will not open, and an error message is displayed.
• Select a S9 AF/pCSCF Topology Hiding Configuration Set Name in the list, and click Edit.
The Diameter > Configuration > Topology Hiding > S9 AF/pCSCF Topology Hiding
Configuration Sets [Edit] page opens. You can edit the selected S9 AF/pCSCF Configuration Set.
See Editing an S9 AF/pCSCF Topology Hiding Configuration Set.
• Select a S9 AF/pCSCF Topology Hiding Configuration Set Name in the list, and click Delete to
remove the selected S9 AF/pCSCF Topology Hiding Configuration Set. See Deleting an S9 AF/pCSCF
Topology Hiding Configuration Set.
If the selected S9 AF/pCSCF Topology Hiding Configuration Set is used in a Protected Network,
the Configuration Set will not be deleted.
Field (* indicates
required field) Description Data Input Notes
* S9 AF/pCSCF A name that uniquely identifies the S9 AF/pCSCF Format: case-sensitive
Topology Hiding Topology Hiding Configuration Set. string; alphanumeric and
Configuration Set underscore (_); must
Name contain at least one alpha
and cannot start with a
digit
Range: 1 - 32 characters
Field (* indicates
required field) Description Data Input Notes
• Suffix - Suffix for the auto generated Pseudo • Default = 4
Hostname. Suffix is case-insensitive string • Range = 4 - 5
consisting of a list of labels separated by dots,
where a label may contain letters, digits,
dashes (-) and underscore (_). A label must
start with a letter, digit or underscore and must
end with a letter or digit. Underscores may be
used only as the first character. Suffix must be
at most 63 characters long.
• Length - Length of the random number used
in the auto generated Pseudo Hostname.
S9 AF/pCSCF Actual Action to be performed when the Orig-Host in Default: Send Answer
Hostname Not Found the Diameter message is not configured as Actual
Range: n/a
Action Hostname in this S9 AF/pCSCF Topology Hiding
Configuration Set.
S9 Af/pCSCF Actual Value to be placed in the Result-Code AVP of the Default: 3002
Hostname Not Found Answer message.
Range: 1000-5999
Answer Result-Code
S9 AF/pCSCF Actual Hostname Not Found
Value
Answer Result-Code Value is required if action
is Send Answer.
Field (* indicates
required field) Description Data Input Notes
Range: 0-64 characters
2. Click Insert.
The S9 AF/pCSCF Topology Hiding Configuration Sets [Insert] page appears.
3. Enter a unique name for the Configuration Set in the S9 AF/pCSCF Topology Hiding Configuration
Set Name field.
4. Enter a unique name to be used when replacing the S9 AF/pCSCF Hostname in the S9 AF/pCSCF
Pseudo Hostname field.
5. Click:
• OK to save the changes and return to the S9 AF/pCSCF Topology Hiding Configuration Sets
page.
• Apply to save the changes and remain on this page.
• Cancel to return to the S9 AF/pCSCF Topology Hiding Configuration Sets page without saving
any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• Any required field is empty (no value was entered).
• The value in any field is not valid or is out of range.
• The S9 AF/pCSCF Topology Hiding Configuration Set Name is not unique; it already exists
in the system.
Protected Networks
A Protected Network component contains Topology Hiding (TH) configuration data that is used when
messages to and from that network are to be protected using Topology Hiding. The following fields
are described in Diameter Protected Network configuration elements:
• Protected Network Realm - Realm of a network that is to be protected.
• Trusted Network List - A Trusted Network List of networks that are trusted by this Protected
Network. If a Trusted Network List is not assigned to the Protected Network, then no networks
are trusted for the Protected Network.
• Path Topology Hiding Configuration Set - The set of Path TH elements for this Protected Network.
If a Path TH Configuration Set is not assigned to the Protected Network, then Path TH is disabled
for the Protected Network.
• S9 PCRF Topology Hiding Configuration Set - S9 PCRF Topology Hiding Configuration Set name
for this Protected Network
• MME/SGSN Topology Hiding Configuration Set - The set of MME/SGSN TH elements for this
Protected Network. If a MME/SGSN TH Configuration Set is not assigned to the Protected Network,
then MME/SGSN TH is disabled for the Protected Network.
• S6a/S6d HSS Topology Hiding Configuration Set - The set of S6a/S6d HSS TH elements for this
Protected Network. If a S6a/S6d HSS TH Configuration Set is not assigned to the Protected Network,
then S6a/S6d HSS TH is disabled for the Protected Network.
• S9 AF/pCSCF Topology Hiding Configuration Set - S9 AF/pCSCF Topology Hiding Configuration
Set name for this Protected Network
On the Diameter > Configuration > Topology Hiding > Protected Networks page, you can perform
the following actions:
• Filter the list of Protected Networks, to display only the desired Protected Networks.
• Sort the list by a column in ascending or descending order, by clicking the column heading. The
default order is by Protected Network Realm in ascending ASCII order.
• Click an entry that is shown in blue for a Trusted Network List or a Configuration Set, to open the
Diameter > Configuration > Topology Hiding [Filtered] view page for that entry only.
• Click Insert.
The Diameter > Configuration > Topology Hiding > Protected Networks [Insert] page appears.
You can add a new Protected Network.
The Diameter > Configuration > Topology Hiding > Protected Networks [Insert] will not open
if the maximum number of Protected Networks per Network Element (500) already exists in the
system.
• Select a Protected Network in the list, and click Edit.
The Diameter > Configuration > Topology Hiding > Protected Networks [Edit] page appears.
You can edit the selected Protected Network
• Select a Protected Network in the list, and click Delete. You can delete the selected Protected
Network.
Field (* indicates
required field) Description Data Input Notes
* Protected Network Protected Network Realm that Format: case-insensitive string
Realm uniquely identifies the Protected consisting of a list of labels separated
Network. by dots, where a label may contain
letters, digits, dashes (-), and
underscore (_). A label must start with
a letter, digit, or underscore and must
end with a letter or digit. Underscores
can be used only as the first character.
Range: Label - up to 63 characters;
Protected Network Realm - up to 255
characters.
Trusted Network List Trusted Network List name for this Format: Pulldown list
Protected Network.
Range: -Disabled-; configured Trusted
Network Lists
Default: Disabled
Field (* indicates
required field) Description Data Input Notes
S9 PCRF Topology S9 PCRF Topology Hiding Format: Pulldown list
Hiding Configuration Configuration Set name for this
Range: -Disabled-; configured S9
Set Protected Network
PCRF Topology Configuration Sets
Default: Disabled
6. Click:
• OK to save the changes and return to the Diameter > Configuration > Topology Hiding >
Protected Networks page .
• Apply to save the changes and remain on this page.
• Cancel to return to the Diameter > Configuration > Topology Hiding > Protected Networks
page without saving any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• Any required field is empty; no value was entered or selected
• The entry in any field in not valid (wrong data type or out of the valid range)
• The Protected Network Realm is not unique; it already exists in the system
• Adding this Protected Network would exceed the maximum number of Protected Networks
(500) allowed in the system
• Cancel to cancel the delete function and return to the Diameter > Configuration > Topology
Hiding > Protected Networks page.
If OK is clicked and the selected Protected Network no longer exists (it was deleted by another
user), an error message is displayed and the Protected Networks view is refreshed.
11
Diameter Egress Throttle List
connect with the other, it will use 5,000 messages per second for the maximum EMR for the ETL, and
it will use 6,000 transactions as the maximum EPT. The rate and pending transaction onset and
abatement thresholds will be calculated from these reduced maximums for as long as the diameter
signaling router is not able to connect to the other diameter signaling router.
Pending Transaction Limiting Configuration Sets are inserted and edited on the NOAM via the Main
Menu: Diameter > Configuration > Egress Throttle List > Pending Transaction Limiting
Configuration Sets page.
An ETL is always associated with an Pending Transaction Limiting Configuration Set that provides
the following data for performing Pending Transaction Throttling based on pending transactions:
• Maximum pending transactions
• Onset and Abatement Thresholds:
• Percentages of the maximums
• Used with Message Priority to determine which requests to throttle
• Abatement time
You must change the Egress Throttling Control Scope of the Egress Throttle Group to ETL and enable
Pending Transaction Limiting on the Egress Throttle Group before Egress Pending Transaction Limiting
can be started on Egress Throttle Lists.
The Pending Transaction Limiting Configuration Sets fields are described in Pending Transaction
Limiting Configuration Sets elements.
On the Pending Transaction Limiting Configuration Sets page, you can perform the following actions:
• Filter the list of Pending Transaction Limiting Configuration Sets to display only the desired Pending
Transaction Limiting Configuration Sets.
• Sort the list by column contents in ascending or descending order, by clicking the column heading.
The default order is by Pending Transaction Limiting Configuration Sets in ascending ASCII
order.
• Click Insert.
The Pending Transaction Limiting Configuration Sets [Insert] page appears. You can add a new
Pending Transaction Limiting Configuration Sets. See Adding a Pending Transaction Limiting
Configuration Set.
If the maximum number of Pending Transaction Limiting Configuration Sets already exists in the
system, an error message is displayed.
• Select a Pending Transaction Limiting Configuration Set Name in the list, and click Edit.
The Pending Transaction Limiting Configuration Sets [Edit] page opens. You can edit the selected
Pending Transaction Limiting Configuration Set. See Editing a Pending Transaction Limiting
Configuration Set.
If no row is selected, or if more than one row is selected, the Edit button is disabled.
• Select a Pending Transaction Limiting Configuration Set Name in the list, and click Delete to
remove the selected Pending Transaction Limiting Configuration Set.
The Default Pending Transaction Limiting Configuration Set can be edited, but cannot be deleted.
See Deleting a Pending Transaction Limiting Configuration Set.
Field (* indicates a
required field) Description Data Input Notes
*Egress Throttle List A name that uniquely identifies the Egress Format: text box;
Name Throttle List. alphanumeric and
underscore; must
contain at least one
alpha and must not start
with a digit.
Range: 1- 32 characters
Default: NA
Site Name The Site Name to associate to the Egress Throttle Format: Pulldown list.
List Name.
Default: NA
Egress Throttle Group The Egress Throttle Group to associate to the Format: Pulldown list.
Egress Throttle List Name.
Range: NA
Default: NA
Connection Failure The Connection Failure Percent Reduction to Format: Pulldown list.
Percent Reduction associate to the Egress Throttle List Name.
Range: NA
Range: Percent
reduction for maximum
rate and pending
Field (* indicates a
required field) Description Data Input Notes
transactions per
connectivity failure to
other sites with ETGs in
the ETL. 0%-50%
Default: 100
Rate Limiting List of all of the Rate Limiting Configuration Sets. Format: Pulldown list.
Configuration Set
Range: NA
Default: NA
Pending Transaction List of all of the available Pending Transaction Format: Pulldown list.
Limiting Configuration Limiting Configuration Sets.
Range: NA
Set
Default: NA
• Cancel to return to the Diameter > Configuration > Egress Throttle List > Egress Throttle
Lists page without saving any changes.
If OK or Apply is clicked and any of the following conditions exist, an error message appears:
• The maximum number of Egress Throttle Lists have already been created.
• There is no Egress Throttle Group in the network element corresponding to the Egress Throttle
List to be added.
• Any required fields are left empty.
• An Egress Throttle List is configured with duplicate Peers or Connections.
• An Egress Throttle List is configured with a Egress Throttle Group already configured as a
member in any Egress Throttle List.
4. Click:
• OK to save the changes and return to the Diameter > Configuration > Egress Throttle List >
Egress Throttle Lists page.
• Apply to save the changes and remain on this page.
• Cancel to return to the Diameter > Configuration > Egress Throttle List > Egress Throttle
Lists page without saving any changes.
The Diameter > Configuration > Egress Throttle List > Egress Throttle Lists page appears.
2. Select the Egress Throttle List to be deleted.
3. Click Delete.
A popup window appears to confirm the delete.
4. Click:
• OK to delete the Egress Throttle List.
• Cancel to cancel the delete function and return to the Diameter > Configuration > Egress
Throttle List > Egress Throttle Lists page.
If OK is clicked and the following condition exists, an error message appears:
• If the ETL contains one or more ETGs that have their Egress Throttling Control Scope set to
ETL. To delete the ETL, the Egress Throttling Control Scope for all of the ETGs in that ETL must
be set to ETG.
12
Diameter RADIUS
RADIUS overview
RADIUS (Remote Authentication Dial In User Service) connection layer is an Authentication,
Authorization, and Accounting (AAA) protocol that is a predecessor to Diameter. From a Diameter
Plug-In perspective, it is another connection layer function which appears identical to DCL to a DRL
from a signaling perspective. RADIUS shares some similarities with Diameter, but is different in many
ways. In particular, the transport/connection layer where UDP is most commonly used by RADIUS.
In that regard, RADIUS is primarily supported on the diameter router by a new connection layer,
while using the existing routing services (with minor enhancements) and the existing Diameter-based
message interface to/from DRL.
The RADIUS Connection Layer (RCL) allows DSR to interface with RADIUS clients and servers.
RADIUS clients initiate transactions, RADIUS servers route/process transactions received from clients
and send responses. The RADIUS protocol primarily uses UDP, a connectionless datagram transport
service, as a transport layer between peer nodes. The concept of a RADIUS connection is introduced
by RCL, which allows reuse of most of the existing connection-oriented features and infrastructure
with minimal change. Due to the RADIUS client-server model and how RADIUS connections are
defined, a RADIUS connection is unidirectional; for example, DSR can either send or receive RADIUS
transactions on a RADIUS connection, but it cannot do both. In this regard, RADIUS connections are
configured as either client or server as follows:
• RADIUS Client Connection
• RADIUS Server Connection
See the following for RADIUS configuration information:
• Diameter Local Nodes
• Diameter Peer Nodes
• Connections
The key differences between the RADIUS and diameter protocols and RADIUS functionality details
are explained in RADIUS User's Guide. That document also contains information about RADIUS
message processing, Diameter message processing, RADIUS transaction processing, RADIUS connection
management, Shared Secret Encryption, and DRL message processing.
See Operations, Administration, and Maintenance (OAM) for more information about OAM, the GUI
pages nested under the Administration, Configuration, Alarms & Events, Security Log, Status &
Manage, and Measurements menu options. OAM Help explains how to use these GUI pages to view
and manage the basic operation, administration, and maintenance for the application.
13
Diameter Message Copy
Possible use cases for Diameter Message Copy include the following cases:
• Use Case 1: A copy of all Requests that match certain basic criteria are sent to a DAS. For example,
an incoming ULR over the S6a interface. In this case, the operator may wish to send a welcome
SMS based on the success of the ULR. (It is assumed that the DAS has additional intelligence to
distinguish an initial registration from a re-registration)
• Use Case 2: A copy of all Requests that match some advanced criteria (like the presence of an
application level AVP or if its value equals a pre-configured value) are sent to a DAS. For example,
a Lawful Intercept server maybe in interested in the registration of a specific IMSI.
• Use Case 3: A diameter application determines the Requests to be copied to a DAS.
• A Message Copy trigger can be initiated from the Diameter Peer Routing Rules. Peer Routing Rules
determine the Route List based on the characteristics of the egress Request message. The criteria
configured in the Peer Routing Rules can also be used for triggering a message copy, by specifying
a Message Copy Configuration Set in a Peer Routing Rule.
• The Diameter Mediation feature can trigger a Message Copy, by specifying a Message Copy
Configuration Set in a Rule Template Action. See Diameter Mediation User's Guide for information
about rule templates.
Message processing
While Message Copy Trigger Points tag the messages to be copied, Diameter Message Copy in the
Diameter Routing Function encodes and copies the messages to the DAS based on the details specified
in the Message Copy Configuration Sets.
As a Diameter Request message is passed from the ingress side to the egress side, the message can go
through modifications before being routed out to the upstream Peer. During diameter processing, the
Diameter Message header and data portions can get modified; a function like Mediation, a local
diameter application, and the Diameter Routing function could change the message as part of its
processing. Thus, the two points of interest in the message processing are: 1) before the Diameter
message is modified, and 2) after all the modifications are made and the Diameter message is sent out
to the upstream Peer.
Some customers need the Answer messages received for the original Diameter Request messages from
the upstream Peer to be copied along with the Request message, because the Answer message contains
critical information that will be useful at the DAS while processing the copied data. Diameter Message
Copy supports copying the Ingress Answer messages along with the Request messages (Ingress or
Egress); the Answer message alone cannot be copied to a DAS. Diameter Message Copy copies to the
DAS the ingress Answer received to original Request Message, as described in Ingress Answer Message
Encoding.
When the Diameter Request message that is marked for copying is sent out, the message is stored as
a normal Diameter Pending Transaction. When the Answer message arrives, it has been matched to
the Request message, and the message is checked for rerouting. After all required rerouting, the
terminating message is checked for copy eligibility. If eligible, the Answer is further qualified as
containing the desired Result Code; then the message is copied and routed to a DAS Peer.
Diameter Message Copy can be treated as another form of rerouting. The copy of the original Request
and Answer are combined into one single message that is encoded as a copied message, processed as
a new Diameter transaction, and passed to Peer Routing for Connection selection and transmission.
The new Diameter/copy transaction is processed as any other Diameter Request, requiring a new
Answer from the DAS Peer with a qualifying Result Code (separate from the original transaction) to
complete the copy transaction. However, with Message Copy, the Answer message from the DAS
Peer is released by the Diameter Routing Function and not forwarded on, because the Diameter Routing
Function on the local DA-MP was the originator of the transaction. (Message Copy is not performed
if diameter generates the Answer, or if the original Request times out.)
After a message is selected for copying, a DAS is selected for routing and the normal existing Diameter
routing and congestion handling is applied. Copied Messages are assigned a Message Priority of 2,
and are processed in the same way as any Priority 2 message.
Each successfully copied Diameter Request is treated as a new transaction. When a received Diameter
Request is copied it becomes two transactions - one for the original and one for the Message Copy.
Thus, a copied Request/Answer transaction deducts two MPS from the net MPS rating. No additional
flow control or congestion mechanism specific to Message Copy is required. The additional MPS for
Message Copy also accounts for copying the original Answer messages to the DAS.
The value of the MsgCopyAnswer AVP has the AVP portion of the received Ingress Answer message.
The Diameter header is removed from the original Ingress Answer message, and the remaining portion
of the message that contains all the AVPs is included as the value of the MsgCopyAnswer AVP. This
is shown in Table 93: Portion of the Answer Message Included as Data Value of the MsgCopyAnswer AVP.
Table 93: Portion of the Answer Message Included as Data Value of the MsgCopyAnswer AVP
the one specified in the Message Copy Configuration Set. This is not influenced by the Reroute on
Answer configured for the Application-ID. The maximum number of attempts to resend the Copied
Message is limited by the Max DAS Retransmission Attempts value specified in the Message Copy
Configuration Set. These attempts are not influenced by the maximum reroutes specified in the Routing
Option Sets, Application-ID, or Peer configuration. The total transaction life time of a message is
controlled by the settings on the ingress Peer node. In the case of a Copied Message, the Local Node
is the ingress Peer. Therefore, there is no specific Transaction Lifetime for the Copied Messages. The
maximum number of retry attempts and the Pending Answer Timer configured for the Peers will limit
the Total Transaction Lifetime of the Copied Message.
Up to 100 Message Copy Configuration Sets are supported. The following elements can be configured
for each Message Copy Configuration Set; the fields are described in Message Copy Configuration Set
elements:
Message Copy Each Message Copy Configuration Set is assigned a unique name. A default
Configuration Message Copy Configuration Set named Default is always provided and can be
Set Name edited, but not deleted.
Route List of the The required Route List of the DAS Node element of the MCCS specifies the Route
DAS Node List to use for copying the message. This Route List consists of a Peer Route Group
or Connection Route Group. The DAS Peers are treated like any other Diameter
Peers with respect to Connection establishment and management. The CEx
messages are exchanged upon establishing a Connection, and the DWx/DPx
messages are exchanged as needed. Requests matching the advertised
Application-ID inly are copied to the DAS. If a message has been marked for
Message Copy to a certain DAS Route List and all the available Connections to
the Peers in the Route List do not support the Application-ID present in the copied
message, the copy is not performed, an Event is raised, and the copy action is
ignored.
The Route List must exist before the MCCS can select it. Route Groups must be
configured before Route Lists can be configured in Diameter Configuration.
The DASs are expected to be direct Peers. Message Copy is not supported to DASs
connected through other diameter applications, relays, and proxy servers.
Message Copy The original Request significantly altered as it traverses the routing network.
Request Type Depending on the function provided by the DAS, the DAS might be interested in
seeing the Request prior to or after the modifications made. The DAS can receive
a copy of the Original Ingress Request or the Original Egress Request. The Original
Ingress Request is the Request as received prior to any manipulation. The Original
Egress Request is the Request as sent to the upstream Peer. The default is Original
Ingress Request.
Ingress Answer In some cases, DAS must query the contents of the original Answer received for
Included the Request message in order to accomplish the function. When the Ingress Answer
Included element is set to YES, Diameter Message Copy copies the ingress Answer
that is received for the original Request Message to the DAS, as described in Ingress
Answer Message Encoding. The default is NO, Answer not included.
Original Answer The Result Code of the Answer messages corresponding to the Original Requests
Result Code for might influence the Message Copy action. For example, a DAS might not be
Message Copy interested in receiving a copy of the Request if the Original Transaction ended
with an Answer that contained a non-2xxx Result Code/Experimental Result
Code. The DAS can receive a copy of the message based on the outcome of the
Original Transaction. If 2xxx is selected, Diameter Message Copy is performed
only if the value of the Result Code/Experimental Result Code AVP in the Original
Answer is a 2xxx. If Any Result Code is selected, the Message Copy is performed
regardless of the Result Code/Experimental Result Code AVP value as long as
the diameter routing function receives an Answer from the upstream Peer. The
default is to copy on 2xxx only.
The Diameter Message Copy is not performed if the Answer is generated or if the
original Request times out.
Alternate routing is not attempted on a given Request, but in such cases the
Diameter Message Copy is attempted just once regardless of the number of
alternate routing attempts. Message Copy is evaluated based on the value of the
Result Code/Experimental Result Code AVP in the Original terminating Answer.
DAS Answer DASs are expected to respond with a 2xxx Result Code or an error Result
Result Code Code/Experimental Result Code upon the receipt of the copied message. If an
appropriate Answer is not received, the copied message is transmitted again for
the configured maximum number of times until the appropriate response is
received. The DAS Message Copy Answer Result Code can be configured with
one of the following choices:
• 2xxx Result Code/Experimental Result Code in the DAS Answer
• Any Result Code/Experimental Result Code in the DAS Answer
Max DAS This value determines the maximum number of times a copied message is
Retransmission transmitted again using the specified Route List, until the DAS Answer containing
Attempts the specified Result Code is received.
In the event that an appropriate Answer is not received, the copied message is
transmitted again for the configured number of times until the appropriate
response is received. The default is 0 and the range is 0-4. If the value is 0, there
are no retransmission attempts.
14
Diameter Capacity and Congestion Controls
Introduction
Note: RADIUS design dictates that most of the per-connection and per-MP features apply in a similar
way to both RADIUS and Diameter connections.
The diameter routing function provides the following features and functions for capacity and congestion
control:
• DA-MP Overload Control
• Per-Connection Ingress MPS Control
• User Configurable Message Priority (not supported for RADIUS)
• Remote BUSY Congestion (not supported for RADIUS)
• Egress Transport Congestion
• Per-Connection Egress Message Throttling
• User-Configurable Connection Pending Transaction Limiting
• Egress Throttle Groups
• Functions associated with Message Priority and Connection Congestion:
• Egress Request routing incorporates Request Message Priority and Connection Congestion
Level in its Connection selection criteria.
• The Routing Option Set associated with the ingress Request specifies what action is taken by
diameter when routing of a Request is abandoned and the last Connection evaluated was
congested.
• The maintenance status for a congested Connection indicates whether the congestion is due to
Remote BUSY Congestion (not supported for RADIUS), Egress Transport Congestion (not
supported for RADIUS), or Egress Message Throttling.
The Diameter Transport Function services its per-Connection ingress sockets with per-Connection
MPS controls that ensure fairness in reading ingress messages for all established Connections.
The Diameter Transport Function services its per-Connection egress queues with controls that ensure
fairness in forwarding egress messages to Peers for all established Connections.
Egress Throttle Groups monitor Egress Message Rate, Pending Transactions, or both, for logical groups
of Diameter/RADIUS Connections or Peers, or both, across multiple DA-MPs on a Network Element.
and based on the specified discard policy, traffic from over-utilized Connections is considered for
discard before traffic from under-utilized Connections. Traffic discarded by PCIMC due to capacity
exhaustion (per-Connection or shared) is marked red and is not considered for any subsequent
processing.
The following DA-MP Congestion Controls are associated with reducing the traffic processing load
on the DA-MP when congestion is detected:
• Internal Resource Monitoring and Control
The availability of key traffic-sensitive internal software resources (stack queues and buffer pools)
is monitored in real-time against their static maximum capacity.
When resource availability drops below engineered thresholds, alarms are generated. When resource
availability is exhausted, controls are invoked to prevent over-utilization. Resource utilization KPIs
and measurements provide real-time and long-term information for making decisions about system
capacity and growth.
• DA-MP Overload Control
Traffic loads, if allowed to exceed the DA-MP's engineered capacity, will degrade the effective
performance of the DA-MP, increase message latency, and can result in message loss. DA-MP
Overload Control is responsible for reducing the traffic processing load to insure that the MP meets
its performance specifications. MP Processing Overload Control monitors the Diameter Process
CPU utilization of the Diameter Process.
Limitations
• DA-MP Overload Control is limited to local MP congestion management and does not address
remote Diameter node congestion management.
• Automatic recovery from persistent MP or egress Connection congestion is not supported. Manual
intervention is required.
• Congestion Level 3 Discard Percentage - The percent below the DA-MP Engineered Ingress
MPS that DA-MP Overload Control will police the total DA-MP ingress MPS to when the DA-MP
is in Congestion Level 3.
• Congestion Discard Policy - The order of Message Priority and Color-based traffic segments to
consider when determining discard candidates for the application of treatment during DA-MP
Congestion processing. The following order is considered: Color within Priority, Priority within
Color, and Priority Only.
• Danger of Congestion Discard Percentage - The percent of total DA-MP ingress MPS above the
DA-MP Engineered Ingress MPS that DA-MP Overload Control will discard when the DA-MP
is in danger of congestion,
• Danger of Congestion Discard Policy - The order of Message Priority and Color-based traffic
segments to consider when determining discard candidates for the application of treatment
during DA-MP Danger of Congestion (DOC) processing. The following order is considered:
Color within Priority, Priority within Color, and Priority Only.
• Routing Option Sets
A Routing Option Set is a set of user-configurable routing options assigned to an ingress Diameter
transaction. A Routing Option Set can be assigned to Peer Nodes and Diameter Application IDs.
DA-MP Overload Control uses the following options:
• Resource Exhausted Action
• Resource Exhausted Result-Code Value
• Resource Exhausted Vendor-ID Value
• Resource Exhausted Error-Message Value
The DA MP monitors its MPS rate and limits the rate to an MP Engineered Ingress MPS value. If the
MP Engineered Ingress MPS rate is exceeded, overload can occur and ingress messages are discarded
(due to MP Ingress MPS Limiting and MP Congestion Controls).
The Maximum Ingress MPS must be greater than or equal to the Reserved Ingress MPS. Any
difference between the Maximum Ingress MPS and the Reserved Ingress MPS represents MP server
resources that are shared among Connections that are using the same Capacity Configuration Set.
The configured Maximum Ingress MPS of a Connection cannot exceed the Engineered Ingress MPS
of the Connection (the ingress MPS that a Connection can process at a sustained rate without errors).
If the Connection has Reserved Ingress MPS, the configured Maximum Ingress MPS must be greater
than or equal to the Reserved Ingress MPS. All Connections must have a non-zero configured
Maximum Ingress MPS; otherwise they would not be allowed to process traffic at all. (The Maximum
Ingress MPS value in the Default Capacity Configuration Set is non-zero.)
The sum of the Maximum Ingress MPS configured for all Connections on the MP server can exceed
the MP Engineered Ingress MPS - the highest MPS rate at which the MP server can process ingress
Diameter messages.
• Ingress MPS Minor Alarm Threshold - Defines the percent of the Connection's Maximum Ingress
MPS at which a Minor alarm is triggered
The Ingress MPS Minor Alarm Threshold value must be less than the Ingress MPS Major Alarm
Threshold value
• Ingress MPS Major Alarm Threshold - Defines the percent of the Connection's Maximum Ingress
MPS at which a Minor alarm is triggered
The Ingress MPS Minor Alarm Threshold value must be less than the Ingress MPS Major Alarm
Threshold value
Defines the percent of the Connection's Maximum Ingress MPS at which a Major alarm is triggered.
The Ingress MPS Major Alarm Threshold must be greater than the Ingress MPS Minor Alarm
Threshold.
• Reserved Ingress MPS Abatement Time - Defines the minimum time (in ms) that a Connection's
ingress message rate must remain less than or equal to Reserved Ingress MPS, after exceeding
Reserved Ingress MPS, in order to revert the ingress traffic color from Yellow to Green.
A Default Capacity Configuration Set is provided; additional Capacity Configuration Sets can be
configured. The Default Capacity Configuration Set is used for a Connection if no other Capacity
Configuration Set is assigned to the Connection. The elements of the Default Capacity Configuration
Set have the following default values:
• Reserved Ingress MPS - Zero MPS
• Maximum Ingress MPS - Value equal to the Engineered Ingress MPS for the Connection
• Ingress MPS Minor Alarm Threshold - 50% of the configured Maximum Ingress MPS
• Ingress MPS Major Alarm Threshold - 80% of the configured Maximum Ingress MPS
• Reserved Ingress MPS Abatement Time - 2000 ms
• Diameter > Configuration > Connections specifies which Capacity Configuration Set the
Connection uses.
• The Diameter > Configuration > Configuration Sets > Capacity Configuration Sets pages provide
elements for configuring Capacity Configuration Sets.
• Diameter > Maintenance > Connections reports KPI 10500 for average ingress MPS for each
Diameter Connection (Ingress Msgs Per Second).
For each Connection, the MP server maintains the average number of ingress Diameter messages
per second read from the socket. This is the rate at which ingress Diameter messages are read from
the socket, not the rate at which ingress Diameter messages arrive at the socket. There is no efficient
means to know the rate at which messages actually arrive.
The average ingress message rate is a running average (approximately 30 seconds). This provides
a information about the level of ingress messages being read by each Connection while avoiding
erratic readings caused by short duration spikes in the rate.
Connection Alarm
The Per-Connection Ingress MPS Control feature provides a Connection alarm with two severities to
alert the network operator when the average ingress MPS rate goes above the configured thresholds
for percentage of the configured maximum ingress MPS for the Connection.
The Connection Ingress MPS Alarm is a Per-Connection alarm that can be configured in a Connection's
Capacity Configuration Set to trigger at a Minor and Major capacity threshold.
The Minor alarm is asserted when the 30-second average MPS rate exceeds the configured Ingress
MPS Minor Alarm Threshold value for the Connection. The Minor alarm is cleared when the 30-second
average MPS rate falls 5% below the Ingress MPS Minor Alarm Threshold value configured for the
Connection.
The Major alarm is asserted when the 30-second average MPS rate exceeds the Ingress MPS Major
Alarm Threshold value configured for the Connection. The Major alarm is converted to a Minor alarm
when the 30-second average MPS rate falls 5% below the Ingress MPS Major Alarm Threshold value
configured for the Connection.
An alarm cannot be abated until an abatement time delay has expired. For example, if a Minor alarm
is asserted, the alarm cannot be cleared until the abatement time delay has expired and the average
ingress MPS for the Connection is 5% below the Minor alarm assert percentage. The abatement time
delay is 15 seconds.
The alarm abatement time delay affects only clearing of alarms, not asserting of alarms. Therefore, it
is possible to transition rapidly from a Minor alarm to a Major alarm.
Limitations
• PCIMC relies on a configured relationship between a Connection and the MP server that will host
the Connection.
• PCIMC does not prevent the total Reserved Ingress MPS of all Connections hosted by a DA MP
from exceeding the MP Maximum Reserved MPS capacity when the MP Maximum Reserved MPS
capacity is reduced after Connections are already configured with non-zero Reserved Ingress MPS.
Up to five Congestion Levels (CL-0 to CL-4) are supported, with CL-0 indicating no congestion to
CL-4 indicating that the Connection is blocked. The intermediate Congestion Levels CL-1, CL-2, and
CL-3 indicate the increasing severity of congestion.
Each feature has a Congestion Level range, as follows:
• Remote BUSY Congestion Levels: CL-0. CL-1, CL-2, and CL-3
• Egress Transport Congestion Levels: CL-0. CL-1, CL-2, CL03, and CL-4
• Per Connection Egress Message Throttling Congestion Levels: CL-0. CL-1, CL-2, and CL-3
The CPL value for a Connection (CONN-CPL) is based on the maximum Congestion Level of the
features.
Egress Request routing and Answer forwarding functions use the Connection Congestion Level in
conjunction with the Message Priority to determine how Requests and Answers must be handled over
an egress Connection. Message Priority and Connection Congestion Level in the Connection selection
criteria are used to avoid sending messages of Priority x and lower to Connections currently at
Congestion Level x+1.
All Answers are assigned a Message Priority of 3, while Requests can be assigned Message Priorities
0 through 2. Messages with a Priority greater than or equal to the Congestion Level are allowed, while
messages with lower Priorities are not delivered on this Connection. This arrangement ensures that
Answers have the highest Priority and are always routed unless a Connection becomes blocked, and
depending upon the level of congestion some or all of the Requests may be allowed. Table 94: CLs,
CPLs, and Message Treatment summarizes this behavior.
Congestion Levels can be set by multiple features. For example, a particular Connection may have
received a DIAMETER_TOO_BUSY for a Priority 1 Request (resulting in CL-2 congestion), and while
abating may have experienced transport congestion (CL-4). Therefore, the concept of Connection
Priority Level (CPL) is used to consider the Congestion Levels reported by all the features while making
routing decisions.
The CPL value is a function of Operational Status and the Congestion Levels reported by the Remote
BUSY Congestion, Egress Transport Congestion, and Per Connection Egress Message Throttling
features. Table 95: Mapping Congestion Levels to CPL Values summarizes this behavior.
• The CPL Value for a Connection is based on the worst-case (highest) value:
CPL Value of a Connection = Max (X1, X2, X3, X4)
• This composite CPL value is then used by the Diameter Routing Function as shown in Table 94:
CLs, CPLs, and Message Treatment.
message with a lower Priority. Having a higher Priority does not guarantee that a messages will never
be dropped as a result of shedding of messages due to congestion or resource exhaustion. The arrival
pattern of the Requests has an impact on which messages are shed.
Message Priority can be assigned to ingress messages upon entrance based on the following:
• The Connection on which a message arrives
• The Peer Node from which a message is sent
• A Peer Routing Rule
A configured Message Priority Configuration Set can be assigned to a Connection or to a Peer Node
A Message Priority Configuration Set is configured with one or more Message Priority Rules that
specify Application IDs, Command Codes, and the Message Priority that is assigned to Request
messages that enter on a Connection that has been assigned the Message Priority Configuration Set.
Message Priority is assigned to ingress Request messages based on message content using the strongest
matching entry in the Configuration Set:
• Application-ID + Command-Code combination
• Application-ID
• All Request messages (Application ID and Command Code values are *)
In a network where Diameter messages traverse multiple diameter routes, Request Message Priority
might need to be assigned on one diameter signaling router and used by any and all diameter signaling
routers in the routing path.
Diameter embeds Priority in all Requests that it handles. The method used for embedding Priority in
egress Requests is transparent to non-Diameter nodes.
Egress Request routing and Answer forwarding will use Message Priority and Connection Congestion
Level in its Connection selection criteria to avoid sending Priority x messages to Connections currently
at Congestion-Level x+1.
The Application ID and Command Code must be configured in Diameter Configuration before they
can be used to configure a Message Priority Rule.
A Default Message Priority Configuration Set is provided that contains one Message Priority Rule;
the Message Priority Rule is set to accept all Application IDs and all Command Codes (values are *)
and has Message Priority set to 0 . The Default Message Priority Configuration Set can be assigned
and used if no other Message Priority Configuration Set is assigned to the Connection or the Peer
Node (it can be edited if needed).
A total of 20 Message Priority Configuration Sets can be configured per NE. Each Message Priority
Configuration Set supports up to 50 Message Priority Rules.
A Connection or Peer can be configured with either a MPCS or to get Message Priority from the ingress
Request. If it is configured to get Message Priority from the ingress Request, then it is not possible to
configure a MPCS for the Connection or Peer.
In Peer Routing Rules, Message Priority valid values are No Change, 0, 1 and 2. 0 is the lowest priority.
The Message Priority value is applied to the message only when the Peer Routing Rule Action value
is set to Route to Peer.
The following Message Priority treatment configuration options can be selected:
• None (default)
• Apply a MPCS (by selecting from a list of configured MPCSs)
• Read from message - Used to indicate that the Priority should be taken from the ingress message.
This is used for router-to- router Connections as a way of conveying Message Priority
This option does not apply to Peer Routing Rules, which have the options None (default) and
Apply an MPCS.
Table 97: Message Priority Treatment Methods indicates which method is used. If the Request does not
match a rule in the selected Message Priority Configuration Set, then the Request is assigned a Priority
value of zero (0).
The Remote BUSY Congestion feature can be used per Connection to reduce the amount of message
traffic sent to a Diameter Connection when an adjacent Diameter Peer Node is unable to process
messages as fast as they are sent to it on the Connection.
Note: The User Configured Message Priority feature is a prerequisite for the Remote BUSY Congestion
feature.
A Connection is considered congested or BUSY if the following conditions exist:
• An Answer message containing Diameter_TOO_BUSY Result Code is received on the Connection
• The Answer message was originated by the Peer Node (the Origin-Host of the Answer message is
the same as the Connections Peer FQDN.
The status is set to BUSY only for the Connection of a Peer on which DIAMETER TOO BUSY is received.
The other Connections between the diameter signaling router and the Peer might or might not be
BUSY.
Remote BUSY Congestion applies only to adjacent nodes. If the node which initiated the
DIAMETER_TOO_BUSY, as determined by the Origin-Host AVP value, is not a Peer Node, then the
DIAMETER_TOO_BUSY will be ignored.
Message traffic reduction is managed through the use of 4 Remote BUSY Congestion Levels: CL-0.
CL-1, CL-2, and CL-3, where CL-0 indicates no congestion and CL-3 is the highest level of congestion.
A Remote BUSY Congestion Level for a Connection is determined from the Priority of the egress
transactions rejected by a DIAMETER_TOO_BUSY response. When a transaction of Priority X is
rejected by a DIAMETER_TOO_BUSY on a Connection whose Remote BUSY Congestion Level is X
or smaller, then the Remote BUSY Congestion of the Connection is set to a value that prevents the
Diameter Routing Function from sending subsequent transactions of the same or lower Priority than
the rejected transaction (in this case, the Remote BUSY Congestion Level is set to X+1). For example,
if a DIAMETER_TOO_BUSY response is received for a Priority 1 transaction, then the Remote BUSY
Congestion Level will be set to CL-2 to prevent subsequent transactions of Priority 1 and lower from
being forwarded on the Connection.
Whenever the Remote BUSY Congestion Level is increased, Remote BUSY Congestion abatement is
re-started, using the configured Remote Busy Abatement Timeout value. When the Remote Busy
Abatement Timeout expires, the Congestion Level is decremented by 1, allowing transactions with
the next lower Priority to be forwarded on the Connection; the Remote Busy Abatement Timeout is
restarted. This process continues until the Congestion Level of the Connection drops back to CL-0.
Whenever the Remote BUSY Congestion Level is increased, Remote BUSY Congestion abatement is
re-started, by starting the Remote BUSY Congestion Abatement Timer. When the Remote Busy
Abatement Timeout expires, the Congestion Level is decremented by 1, thus allowing transactions
with the next lower Priority to be forwarded on the Connection; and the Remote Busy Abatement
Timeout is restarted. This process continues until the transactions of the Connection drop back to
CL-0.
Because Remote BUSY Congestion is detected by inspecting the Result-Code AVP embedded in an
Answer response, detection is performed by the Diameter Routing Function.
Except for Remote BUSY Congestion detection, the Diameter Transport Function is responsible for
handling all of the tasks associated with Remote BUSY Congestion, such as:
• Managing the Remote BUSY Congestion Level
• Managing Remote BUSY abatement
• Updating the Connection Priority Level (CPL) for the Connection
• Keeping OAM informed of the Remote BUSY Congestion status
When the Diameter Routing Function determines that the Remote BUSY Congestion Level needs to
be increased, it notifies the Diameter Transport Function instance that is currently controlling the
Diameter Connection.
Because multiple Diameter Routing Function instances can be simultaneously forwarding transactions
to the same Diameter Connection and detecting Remote BUSY Congestion, an internal procedure
minimizes the number of simultaneous the Diameter Routing Function-to-Diameter Transport Function
detection notifications that are associated with any single Diameter Connection.
The Connection Congestion Levels CL-0, CL-1, CL-2, CL-3 and CL-4 are mapped to Connection Priority
Level (CPL) values 0, 1, 2, 3, 4 respectively.
Diameter messages initiated by the Diameter Transport Function are not impacted by Egress Transport
Congestion Levels CL-0, CL-1, CL-2 or CL-3. This includes Peer-to-Peer messages such as DPR/DPA,
DWR/DWA and any non-Peer-to-Peer messages such as Diameter Transport Function-initiated Answer
responses associated with DA-MP Overload.
The Diameter Transport Function suppresses the creation and attempt to forward any Diameter
messages to a Diameter Peer Node when the Egress Transport Congestion Level is CL-4. This includes
Peer-to-Peer messages such as DPR/DPA, DWR/DWA and any non- Peer-to-Peer messages such as
Diameter Transport Function-initiated Answer responses associated with DA-MP Overload.
The Egress Transport Congestion feature behaves as follows:
• Messages that are already committed to the Connection by the Diameter Routing Function when
a Connection initially becomes transport congested will be discarded.
• When a Diameter Connection socket becomes blocked (such as when a TCP or SCTP socket becomes
full), the Diameter Transport Function sets the Egress Transport Congestion Level to CL-4 to prevent
the Diameter Routing Function from forwarding any further Request or Answer messages to the
Connection.
Any messages received while the Egress Transport Congestion Level is set to CL-4 are automatically
discarded by the Diameter Transport Function. This would normally occur for messages that the
Diameter Routing Function has already forwarded to the Diameter Transport Function before
receiving notification that the Connection Priority Level (CPL) was changed to a value of 4.
• When the Diameter Transport Function is notified that the socket is no longer blocked, the Diameter
Transport Function sets the Egress Transport Congestion Level to CL-3, and starts Egress Transport
Congestion abatement.
The Transport Congestion Abatement Timeout that is configured for each Diameter Connection
defines the time spent abating each Congestion Level during abatement. For example, if the
Transport Congestion Abatement Timeout value is set to 5 seconds when the Egress Transport
Congestion Level enters CL-3, it will remain in CL-3 for the full 5 seconds before the Egress Transport
Congestion Level can be reduced to CL-2.
If the TCP or SCTP socket becomes full while the Diameter Transport Function is in Egress Transport
Congestion abatement, the entire abatement procedure is restarted.
• A throttled event with Egress Transport Congestion as the reason for the event is logged every
time the Connection Priority Level (CPL) changes due to Egress Transport Congestion.
• When the Diameter Transport Function successfully establishes an IPFE TCP or SCTP connection,
it sets the Egress Transport Congestion Level for the Diameter Connection to CL-0.
When Egress Transport Congestion occurs, the Connection degraded alarm is raised, indicating Egress
Transport Congestion and the CL.
Note: The Connection degraded alarm can be raised by for other reasons, and will not be raised for
Egress Transport Congestion if it is already asserted.
When the Connection CL is 0 upon decrementing (the Egress Transport Congestion condition and all
other conditions that could raise the alarm are mitigated), abatement is complete and the Connection
degraded alarm is cleared.
Interaction with the Alternate Routing Across Route Groups in a route List Feature
PCEMT can be used in conjunction with the Alternate Routing Across Route Groups feature to route
all throttled Requests using non-preferred Route Groups when all Connections in the preferred Route
Group are congested. Eligible Peers or Connections from the other priority Route Groups of the Route
List can be used to deliver a Request after all the Peers or Connections in the current Route Group are
exhausted. Alternate Routing Across Route Groups is attempted only if the Maximum Per Message
Forwarding Allowed (configured in the Diameter Configuration Routing Option Sets) is not exceeded.
For example, a Route List is configured with two Route Groups. The Preferred Route Group contains
two HSSs, HSS-1 and HSS-2 each with one Connection and the Non-Preferred Route Group contains
HSS-3 and HSS-4, each with one Connection. If the Connection(s) to both HSS-1 and HSS-2 exceed
Throttle Threshold X, Requests with Priority below X are routed to HSS-3 and HSS-4, while Requests
with Priorities equal to or greater than X continue to be routed to HSS-1& HSS-2. If both, HSS-3 and
HSS-4 exceed Throttle Threshold X, Requests with Priority less than X are discarded.
• Convergence Time - The rate convergence time is the amount of time it takes for the measured rate
to converge on the actual rate.
For example, if the actual rate jumps from 0 MPS to 1000 MPS and the Rate Convergence Time is
5 seconds, it takes that long for the measured rate to converge on the actual rate, and the that long
for the measured measured rate will be reported as follows:
• T(0) = 0 MPS
• T(1) = 200 MPS
• T(2) = 400 MPS
• T(3) = 600 MPS
• T(4) = 800 MPS
• T(5) = 1000 MPS
The EMR is calculated every 100ms by subtracting the oldest traffic count from the newest traffic
count, and averaging the difference over the elapsed time between them.
• Abatement Time - amount of time that a throttled Connection's adjusted EMR must remain below
an abatement level before allowing it to abate to a lower Congestion Level.
To enable Egress Message Throttling on a Connection,
• A configured Egress Message Throttling Configuration Set must be configured.
• The configured Egress Message Throttling Configuration Set must be assigned to the Peer Connection
that is to be throttled using the settings in that Egress Message Throttling Configuration Set.
• The Per Connection Egress Message Throttling Enabled option must be checked on the Diameter >
Configuration > System Options GUI page.
Disabling Egress Message Throttling will have the same effect as un-assigning the Egress Message
Throttling Configuration Set for all the Connections that have been previously associated with an
Egress Message Throttling Configuration Set.
All Egress Message Throttling Configuration Set parameters can be modified, but the Configuration
Set cannot be deleted, while the associated Connections are in service.
Limitations
Given that the Per Connection Egress Message Throttling feature works per Connection and does not
consider the throttling status on all the Connections to a Peer, it is possible that certain Connections
to a Peer can experience Egress Message Throttling and discard messages while other Connections to
the same Peer are not congested, thereby underutilizing the capacity of the Peer.
Because EMR is calculated every 90 milliseconds, EMR abatement can only occur on an integer-multiple
of 90 milliseconds. For example, if the user defines an EMR Abatement Time of 500 milliseconds, then
the actual abatement period would be 540 milliseconds (6 * 90 milliseconds).
Pending Transaction Records on the DA-MP, which could result in limited Pending Transaction Record
availability for the remaining Connections.
An Egress Throttle Group is independent of a Route Group (Connection Route Group or Peer Route
Group). The members of an Egress Throttle Group may or may not be same as defined in a Route
Group; there is no defined relationship between Egress Throttle Groups and Route Groups.
The Egress Message Rate throttling is controlled by the configured maximum Egress Message Rate
(EMR) on an aggregated basis and the Egress Throttle Group - Rate Limiting Congestion Level (ETG-R
CL-) (range: CL-0- CL-3) for the ETG.
The Egress Pending Transaction Limiting throttling is controlled by the configured maximum Egress
Pending Transactions (EPT) on an aggregated basis and the Egress Throttle Group - Pending Transaction
Limiting Congestion Level (ETG-PCL) (range: CL-0- CL-3) for the ETG.
An Egress Throttle Group can contain the following configuration data:
• Up to 128 Peers, Connections, or Peers and Connections
• Maximum Egress Message Rate (EMR), used for calculation of Onset and Abatement Thresholds
• Onset and Abatement Thresholds, as percentages of the Maximum EMR, to use with Message
Priority to determine which Requests to throttle
• Convergence Time to control responsiveness of egress Request rate control
• Abatement Time
• Maximum Egress Pending Transactions(EPT), used for calculation of Onset and Abatement
Thresholds
• Onset and Abatement Thresholds, as percentages of the Maximum EPT, to use with Message
Priority to determine which Requests to throttle
• Abatement Time
A maximum of 5 congestion levels (CL-0 to CL-4) is supported, which indicate the Congestion Level
of a resource. CL0 indicates that the resource has no congestion, and CL-4 indicates that the resource
is completely blocked. CL-1, CL-2, and CL-3 indicate increasing levels of congestion.
Egress Throttle Groups (ETG) can be configured in Diameter Configuration; each Egress Throttle
Group will have its own Congestion Level states based on its configuration.
1. As an Egress Throttle Group's egress Request message traffic rate increases and exceeds the Egress
Throttle Group Rate Limiting onset thresholds configured in the Egress Throttle Group, the Egress
Throttle Group's Congestion Level also increases.
2. As the Egress Throttle Group's total number of Pending Transactions increases and exceeds the
Egress Throttle Group Pending Transaction Limiting onset thresholds configured in the Egress
Throttle Group , the Egress Throttle Group's Congestion Level also increases.
As the Egress Throttle Group's Congestion Level increases, Message Priority becomes a factor in
determining if a message can be routed to a member of the Egress Throttle Group, or will be throttled.
Requests with Message Priority less than Congestion Level will not be routed to any member of the
Egress Throttle Group.
Diameter Request messages are assigned a Message Priority 0, 1, or 2; Answers always have Priority
3. The Priority of the Request message controls when an ETG performs throttling is shown in Table
100: Message Priority and ETG Congestion Level.
When the EMR for an Egress Throttle Group reaches the Egress Throttle Group Maximum Egress
Request Rate or the Egress Throttle Group's Pending Transactions reaches the Egress Throttle Group's
Maximum Egress Pending Requests, no Requests will be routed to any members of the Egress Throttle
Group.
In an Egress Throttling Group, if Maximum Egress Request Rate is configured, then OT-1 and AT-1
thresholds must be configured. OT-2, AT-2, OT-3 and AT-3 are optional but must be configured in
pairs; for example, if OT-2 is configured, AT-2 must also be configured. Finally, AT-3 must be configured
if OT-3 is expected to be configured.
In addition to the thresholds, the Convergence Time and the Abatement Time provide a high degree
of user control over the characteristics of transitions between Congestion Levels due to throttling.
• Convergence Time - The rate convergence time is the amount of time it takes for the measured rate
to converge on the actual rate.
For example, if the actual rate jumps from 0 MPS to 1000 MPS and the Rate Convergence Time is
5 seconds, it takes that long for the measured rate to converge on the actual rate, and the that long
for the measured measured rate will be reported as follows:
• T(0) = 0 MPS
• T(1) = 200 MPS
• T(2) = 400 MPS
• T(3) = 600 MPS
• T(4) = 800 MPS
• T(5) = 1000 MPS
The EMR is calculated every 100ms by subtracting the oldest traffic count from the newest traffic
count, and averaging the difference over the elapsed time between them.
• EMR Abatement Time - Amount of time that a throttled connection's adjusted EMR must remain
below an abatement level before allowing it to abate to a lower Congestion Level.
EMR onset requires only one EMR sample to exceed an onset threshold to advance the ETG-RCL.
Multi-step throttling is supported. For example, the EMR Congestion Level can be increased from
CL-0 to CL-1, CL-2, or CL-3 after one EMR sample period. This allows for a rapid response to traffic
load increases while taking a more conservative approach to traffic load decreases.
Only single step abatement is supported. For example CL-3-> CL-2 abatement is supported but not
CL-3-> CL-1.
Rate Limiting must be enabled on the Diameter > Maintenance > Egress Throttle Groups GUI page
before Egress Message Rate throttling can be started for Egress Throttle Groups. If Rate Limiting is
enabled, then any routable Request message sent to a Peer or Connection on any DA-MP on that NE
contained in the ETG will be used for rate calculation purposes. (Diameter management messages
such as CER/CEA, DWR/DWA, and DPR/DPA are not counted in the egress message rate.)
Note: For local nodes, CEAs are sent in response to erroneous CERs.
In an Egress Throttling Group, if Maximum Egress Pending Transactions is configured, then OT-1
and AT-1 thresholds must be configured. OT-2, AT-2, OT-3 and AT-3 are optional but must be
configured in pairs; for example, if OT-2 is configured, AT-2 must also be configured. Finally, AT-3
must be configured if OT-3 is expected to be configured.
The local sample of number of pending Transactions to an ETG is periodically collected and sent to
the DA-MP Leader for aggregation. The aggregated value is then sent back to each DA-MP for threshold
and abatement calculation. No adjustment is applied to EPT, and aggregated values are sent back to
each DA-MP.
The EPT Abatement Time is the amount of time that egress Pending Transactions must remain below
an abatement level before allowing it to abate to a lower Congestion Level. No adjustment is applied
to EPT abatement.
Pending Transaction Limiting must be enabled Maintenance GUI before Egress Pending Transaction
Limiting can be started for Egress Throttle Groups. If Egress Pending Transaction Limiting is enabled,
then any pending Request sent to a Peer or Connection on any DA-MP on that NE contained in the
Egress Throttle Group will be used for Pending Transaction Limiting calculation.
CEA Capability-Exchange-Answer
The Diameter response that the
prepaid rating engine sends to the
Mobile Originated application
during capability exchanges.
CER Capabilities-Exchange-Request
A Diameter message that the
Mobile Originated application
sends to a prepaid rating engine to
perform a capability exchange. The
CER (indicated by the
Command-Code set to 257 and the
Command Flags' 'R' bit set) is sent
to exchange local capabilities.The
prepaid rating engine responds
with a
Capability-Exchange-Answer
(CEA) message.
DPA Disconnect-Peer-Answer
A message used by a Diameter
node to answer the
Disconnect-Peer-Request (DPR).
DPR Disconnect-Peer-Request
A message used by a Diameter
node to inform its peer of its intent
to disconnect the transport layer.
Upon receipt of a DPR, the
Disconnect-Peer-Answer (DPA) is
returned.
DWA Device-Watchdog-Answer
A Diameter message used with the
Device-Watchdog-Request (DWR)
DWR Device-Watchdog-Request
A Diameter message used with the
Device-Watchdog-Answer (DWA)
message to proactively detect
connection failures. If no traffic is
detected on a connection between
the Mobile Originated application
and the Diameter server within the
configured timeout period, a DWR
message is sent to the Diameter
Server. If the Diameter server fails
to respond within the required
time, the connection is closed with
the Diameter server and initiates
failover procedures. All new and
pending requests are then sent to
the secondary Diameter server.
OC Overload Conveyance
RG Report Generator
RR Resource Record
An entry into the DNS database.
Depending on their type (for
example, A, SRV, and so on), RRs
provide a different set of
parameters that characterize a
certain DNS name.
RTR Router
Routes all types of SMS traffic.
TH Topology Hiding