35
EV-DO Rev A End to End QoS Dave Dukinfield Sr . Network Consultant  Augus t 2007

Starent Chicago Ad Hoc

Embed Size (px)

Citation preview

Page 1: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 1/35

EV-DO Rev A End to End QoS

Dave Dukinfield

Sr. Network Consultant

 August 2007

Page 2: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 2/35

Starent Networks Proprietary and Confidential 2

End-to-End view of EVDO-Rev-A MFPA and QoS

GPP3 3

Protocols

Mobi leStation

BSC /PC F PD SNFar-EndTerminal

 Applica tion QoS N egotia tio n (e .g . SIP /S D P)

IP QoS

Radio QoS

Signaling

IP N etwork

 App. Qo S

GPP3 3

Protocols

Packet Data Qo S Signaling (R SVP- like

messages)

 A /A QoS3 3 3

Signaling

Page 3: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 3/35

Starent Networks Proprietary and Confidential 3

PCF-to-PDSN InterfaceChanges

 AAA Server 

 A33

PDSN

Main A11

 Auxiliary

 A s33

RAN/PCF

IP Flows

Link Flows

IP Network

end-to-end IP Flows

MS/ATMS/AT

Page 4: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 4/35

Starent Networks Proprietary and Confidential 4

RSVP TFT

Internet

PDSN

AAA

P-CSCF

Fwd RLP Flow # 0 (BE)

Rev RLP Flow # 0 (BE)

Fwd RLP Flow # 1

Rev RLP Flow # 1

Request QoS

for the bearer   RP Signaling I/S-CSCF

Profile Mgr Profile ID1=VoIP

EV-DO Rev A ServiceMultiflow QoS

• PDSN uses RSVP TFT signaling for flow mapping & packet filter establishment –  A single A11 can signal up to 7 bidirectional auxiliary service connections per session

& up to 10 service flows – May include optional channel treatments (ROHC or VJ header compression)

• Benefits: Enables provisioning of QoS differentiated convergedservices – Permits real-time, delay sensitive services with acceptable call quality on MMD

networks

Page 5: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 5/35

Starent Networks Proprietary and Confidential 5

A11 Requests

•  A10 connection created by A11 request from PCF

•  A11 includes: – Data service option type - represented standard SO codes

 – SR_ID 1 (Main A10)

 – Default flow IDs - 255 forward, 255 reverse

• When PDSN receives A11 request: – PDSN authenticates and retrieves the QoS from AAA

 – PDSN sends back A11 RRP to establish MAIN A10

Page 6: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 6/35

Starent Networks Proprietary and Confidential 6

Rev A Call Setup

MS becomes aware

of a dataflow thatrequires a specific

QoS

3

3

MN RAN  AAAPDSN

3

3

3

3

3

11

33

33

3

3

1. A11 RRQ (establish Main 10)2. Access Request (PDSN request subscriber QoS

profiles)

3. Access Accept (QoS profiles received)

(MS becomes aware of a dataflow that requires a

specific QoS)

4. Main A10 establishment:

a) PDSN sends RRP

b) PPP/LCP/IPCP negotiates

c) PDSN sends A11 Session Update

d) PCF sends A11 Update Ack to PDSN

5. RSVP (MN requests flow with a particular QoS)

6. RAN authorizes access and QoS

7. RAN sends QoS confirmation

8. MN acknowledges confirmation

9. A11 RRQ (establish Aux A10's)

10. A11 RRP (establish aux A10s)

11. MN sends TFT to PDSN

12. PDSN confirms receipt of TFT

Page 7: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 7/35Starent Networks Proprietary and Confidential 7

QoS on the PDSN

• QoS on the PDSN consist of two things: – Rev A QoS Profiles—Subscriber based profiles configured on the AAA

server, which are defined by the provider.

 – Policies—Configured in a Policy Lookup Table on the PDSN using ITC.

PDSN validates the Policies after the Auxiliary A10s are setup over the PCF-PDSN to determine what type of flow treatment (if any) toapply to the application flows sent from the MN.

Page 8: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 8/35Starent Networks Proprietary and Confidential 8

Intelligent Traffic ControlDifferentiated QoS / DoS Support

• Goals: Facilitate migration of subscribers to Rev A network – Enable Differentiated QoS End to End

 – Define multiple high priority, low latency QoS levels to provide rapid set-uprequired of Multimedia based services

• ITC policy engine requirements – 5 tuple packet filters – static or dynamic policy definitions

 –  Apply DSCP marking from user payload to reverse tunneled MIP headers

 –  Apply DSCP in forward direction to A10 GRE header per Policy-Map

 –  Apply DoS eligibility bit to A10 GRE header in forward direction

Page 9: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 9/35Starent Networks Proprietary and Confidential 9

• ITC is a licensed feature

• Uses flow-based traffic policing

• Enables configuring and enforcing bandwidth limitations per 

subscriber for both uplink and downlink directions

• Supports various policy definitions for:

• QOS

• Bandwidth

•  Access Control

• Policy definitions enforce and manage service level

agreements per subscriber profile

 Differentiated QoS / DoSSupport

Page 10: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 10/35Starent Networks Proprietary and Confidential 10

The Subscriber QoS Profile

• QoS Authorization is based on the per subscriber QoSprofile that is stored in the Home AAA

• The PDSN downloads the profile during PPP/MIP setup andstores the info. The PDSN also forwards the relevant info tothe RNC

• The Sub QoS profile consists of the following : – The Maximum Authorized Aggregate Bandwidth for Best-Effort traffic

 – The Authorized QoS Profile IDs for each direction

 – The maximum per Flow priority

 – Inter-User Priority for best effort traffic

 – Service Option profile

 – The Allowed Number of Persistent TFTs

 – The Allowed Differentiated Services Markings

• If MN performs no PPP/MIP auth, then the PDSN uses a

default QoS profile that is locally provisioned

Page 11: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 11/35

Starent Networks Proprietary and Confidential 11

Traffic Control Templates (TFT)

• Traffic flow templates are sent from the MN after Main and Aux. A10’s are created

• TFT contains: – One or more packet filters

 – Source and destination ports

 – Source and destination addresses

 – Protocol

• TFT are sent to PDSN via RSVP

Page 12: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 12/35

Starent Networks Proprietary and Confidential 12

Dynamic Flow Mapping

• The protocol used for flow mapping: – The protocol used is RSVP (RFC 2205) with some protocol

exceptions.

 – The RESV message is sent directly to the PDSN w/o a PATHmessage.

 – The RESV message is destined for the PDSN and not to any end-host. The Protocol ID is set to 17 and DstPort is set to 3455.

 – The RESV message contains a 3GPP2_Object. The 3GPP2_Objectwas created to carry the TFT (Traffic Flow Template) for flowmapping, HRIP (Header Removal Initialization Parameters, 1x only)and Channel Treatment Info.

 – The 3GPP2_Object has the following IANA assignment: Class Number = 231, Class Name = 3GPP2_OBJECT Class Type or C-Type = 1.

Page 13: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 13/35

Starent Networks Proprietary and Confidential 13

Sample TFT

<srid value="4" so="64" />

<flow_discriminator value="1" />

<specific value="false"/>

<flow_dir value = "forward" />

<opcode value="add_pkt_fltr" />

<pkt_fltr flow_id="155" >

<precedence value="127" />

<dscp value="3e"/>

<req_prof_ids value="67,1915,864,1655,12127" />

<pkt_fltr_content pf_type="0">

<pkt_fltr_component type="">

<port_src_start value="15000" />

</pkt_fltr_component>

<pkt_fltr_component type="">

<port_src_end value="15999" />

</pkt_fltr_component>

</pkt_fltr_content>

</pkt_fltr>

Page 14: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 14/35

Starent Networks Proprietary and Confidential 14

Overview of QoS Signaling

•The HAAA sends the Authorized QoS Profile Ids, Service Option Profileto the PDSN during the PPP/Mobile IP session setup

• The PDSN sends the Authorized QoS Profile Ids, Service OptionProfile to the RAN/RNC via IOS signaling at the time of the packet datasession establishment (simple/mobile IP) and may update the QoSprofile later if necessary

• The QoS_BLOB is exchanged between the MS and the RAN/RNC viaover the air signaling

• Establish service instances/RLP flows via over the Air signaling

• The RAN/RNC performs QoS authorization and admission control and

sends the granted QoS to the MS• The RAN/RNC also sends the granted QoS to the PDSN for accounting

purpose via IOS Signaling

• RSVP-like messages exchanged between the MS and the PDSN for packet filter setup for flow mapping and flow based accounting

Page 15: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 15/35

Starent Networks Proprietary and Confidential 15

Rev A with Policy ValidationCall Setup

1. A11 RRQ (establish Main 10)

2. Access Request (PDSN request subscriber QoS profiles)

3. Access Accept (QoS profiles received)

(MS becomes aware of a dataflow that requires a specific QoS)

4. Main A10 establishment:

a) PDSN sends RRP

b) PPP/LCP/IPCP negotiates

c) PDSN sends A11 Session Update

d) PCF sends A11 Update Ack to PDSN

5. RSVP (MN requests flow with a particular QoS)

6. RAN authorizes access and QoS

7. RAN sends QoS confirmation

8. MN acknowledges confirmation

9. A11 RRQ (establish Aux A10's)10.A11 RRP (establish Aux A10s)

11.MN sends TFT to PDSN

12.PDSN confirms receipt of TFT

13.PDSN Validates Policy by comparing info from TFT (step 11) and

PFC A11 (step 4).

14.Policy map is applied to flow and call is forwarded with proper flow

treatment

MS becomes aware

of a dataflow that

requires a specific

QoS

3

3

MN RAN AAAPDSN

3

3

3

3

3

11

33

33

3

3

33

33

Page 16: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 16/35

Starent Networks Proprietary and Confidential 16

Policy Validation Failure

1. A11 RRQ (establish Main 10)

2. Access Request (PDSN request subscriber QoS profiles)

3. Access Accept (QoS profiles received)

(MS becomes aware of a dataflow that requires a specific QoS)

4. Main A10 establishment:

a) PDSN sends RRP

b) PPP/LCP/IPCP negotiates

c) PDSN sends A11 Session Update

d) PCF sends A11 Update Ack to PDSN

5. RSVP (MN requests flow with a particular QoS)

6. RAN authorizes access and QoS

7. RAN sends QoS confirmation

8. MN acknowledges confirmation

9. A11 RRQ (establish Aux A10's)10. A11 RRP (establish Aux A10s)

11. MN sends TFT to PDSN

12. PDSN confirms receipt of TFT

13. Policy Validation Failure.

14. All flows are mapped over Main A10 with a flow treatment of Best

Effort

MS becomes awareof a dataflow thatrequires a specific

QoS

3

3

MN RAN AAAPDSN

3

3

3

3

3

11

33

33

3

3

33

(Main A , BE)33 33

Page 17: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 17/35

Starent Networks Proprietary and Confidential 17

Flow-based Traffic Policing

• Policy modules interact with the system through a set of welldefined entry points

• Provides access to a stream of system events

•Permit the defined policies to implement:

•  Access Control decisions

• QOS decisions

•  Accounting decisions

• Generally defined as:• Policy class map, policy map, and policy group

• Condition source/destination address or source/destination port etc.

• Action Flow classification, QOS processing, and DSCP marking

Page 18: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 18/35

Starent Networks Proprietary and Confidential 18

How Policy Validation Works

In making these determinations, the PDSN must use information from three sources:

1.TFT sent by the MN in step 11 (flow ID and filters).

2.A11 RRQ sent by the PCF in step 9 (QoS Profiles, SR_ID, and flow ID).

3.Policies configured with ITC (Profile ID and filters).

MN

Policy

class-map (name = TFT)

src-port range -33333333

 polcy map (name = TFT)

class-map TFT

type dynamic three-gpp Rev-A prof ile -ID range x - x f low-ID any1 1111111111

policy group (PGroup- )3

policy map TFT

TFTSRC Port =3333

Filter ID = 3Qos Profiles

(from AAA)

PCFPDSN

Page 19: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 19/35

Starent Networks Proprietary and Confidential 19

How Policy Validation Works(continued)

MN

Policy

class-map (name = TFT)

src-port range -33333333

 polcy map (name = TFT)

class-map TFT

type dynamic three-gpp Rev-A prof ile- ID range x - x f low- ID any1 1111111111

policy group (PGroup- )3

policy map TFT

TFTSRC Port =3333

Filter ID = 3Qos Profiles

(from AAA)

PCFPDSN

1. TFT is sent via RSVP message to be validated by the Policy group applied to the subscriber profile.

2. TFT is checked against class map found in the policy map defined in the policy group (PGroup1)

3. If TFT is matched successfully , the policy map is applied to the flow (no updates sent to PCF)

and the call is forwarded with the proper flow treatment.

If TFT is not matched successfully , the policy map cannot be applied to the flow (updates are sent to the PCF) and the call is

forwarded with a best effort across the Main A10 connection.

Page 20: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 20/35

Starent Networks Proprietary and Confidential 20

Differentiated QoS End to End QoS Overview Same DSCP marking through network 

Main A10

Profile ID 261 SRID2

flow ID 1/2 FWD/REV

DSCP

0x2E

PCF PDSN/FA HA

BEBE

In-Net

Server 

MIP Tunnel

0x2E 0x2E

Internet

BE

Page 21: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 21/35

Starent Networks Proprietary and Confidential 21

ITC Dynamic Policy for Differentiated QoS PDSN/FA- Forward Direction

PCF PDSN/FA HA

SRID 2; Flow ID 1 FWD (Profile ID 261) TFT a

1.Main A10 and Aux A10/Flows established,

TFT created on PDSN 

SRID 2; Flow ID 2 REV (Profile ID 261) TFT b

SRID 2; Flow ID 1 FWD (Profile ID 261)

Policy-261-out marked DSCP 0x2E /DOS

Main A10 0xBE

Traffic matched TFT a

MIP Tunnel

Traffic matched TFT c

BE Traffic

2. Upon successful session/flows setup, dynamic policy

facility in ITC can be used to provide the QoS treatment

(such as DSCP marking & DOS) by matching the TFT

dynamically established with the flows. Based on the different

flow criteria (profile ID & TFT), different dynamic policy will

get applied to the flows–

Class-Map class261-out (matching TFT a)

  ….

Policy-Map policy-261-out

class-map class261-out

3gpp2 data-over-signaling marking

qos encaps-header dscp 0x2E

Policy-Group Differentiated QoS_policy

policy-261-out precedence 1

  ….

Page 22: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 22/35

Starent Networks Proprietary and Confidential 22

ITC Dynamic Policy for Differentiated QoS PDSN/FA- Reverse Direction

PCF PDSN/FA HA

SRID 2; Flow ID 1 FWD (Profile ID 261) TFT a

1.Main A10 and Aux A10/Flows established,

TFT created on PDSN 

2. Upon successful session/flows setup, dynamic

policy facility in ITC can be used to provide the QoStreatment (such as DSCP marking) by matching the

TFT dynamically established with the flows. Based on

the different flow criteria (profile ID & TFT), different

dynamic policy will get applied to the flows –

Class-Map class261-in (matching TFT b)

….

Policy-Map policy-261-in 0x2E

….

Policy-Group Differentiated QoS_policypolicy-261-in precedence 3

….

SRID 2; Flow ID 2 REV (Profile ID 261) TFT b

SRID 2; Flow ID 1 FWD (Profile ID 261)

PCF marked DSCP 0x2E

Main A10 0xBE

Traffic matched TFT b

Policy-261-in marked MIP tunnel header 0x2E

MIP Tunnel

BE Traffic

Page 23: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 23/35

Starent Networks Proprietary and Confidential 23

ITC Static Policy for Differentiated QoS HA- Forward Direction

PDSN/FA

HAHA could use static policy facility in ITC to provide thesession QoS service such as DSCP marking. The

subscriber traffic will be matched using the pre-defined

filters in the classmap –

Class-Map class-261-out src_port 2000

Policy-Map policy-261-out (static) 0x2E

….

Policy-Group Differentiated QoS_policy

policy-261-out precedence 1 

src_port 2000 match policy-261-out

HA marked DSCP 0x2E

MIP Tunnel

0xBE

network

src_port 2000

Server marked DSCP 0x2E

QoS

required

Service

0xBE

Page 24: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 24/35

Starent Networks Proprietary and Confidential 24

ITC Static Policy for Differentiated QoSHA- Reverse Direction

PCF PDSN/FAHA

HA could use static policy facility in ITC to

provide the session QoS service such as DSCPmarking. The subscriber traffic will be matched

using the pre-defined filters in the classmap –

Class-Map class-261-in dst_port 2000

Policy-Map policy-261-in (static) 0x2E

Policy-Group Differentiated QoS_policy

policy-261-in precedence 3 

dst_port 2000FA marked DSCP 0x2E

MIP Tunnel

0xBE

network

Policy-261-in matched dst_port 2000

HA marked DSCP 0x2E

0xBE

QoS

required

Service

Page 25: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 25/35

Starent Networks Proprietary and Confidential 25

1xEV-DO Rev A Multi-flow QoSAdditional Features

• QoS profile retrieval from H-AAA. Includes – Maximum Authorized Aggregate Bandwidth for Best-Effort traffic

 –  Authorized QoS Profile IDs for each direction

 – Maximum per Flow priority

 – Maximum inter-user priority

 –  Allowed Differentiated Services Markings

• Intra-chassis PDSN session recovery

• Flow-based accounting – Per-A10 accounting is the default system behavior 

 – Per-flow accounting or both per-flow and per-A10 accounting are possible

 – MEID support in primary & auxiliary service connections

• Policy lookup table – L4 shallow packet inspection for initial TFT authorization & mid-session lookup

 – Includes static traffic filters per application

 – Per-flow traffic policing based on granted ProfileID

 – Push-to-Talk (PTT) DSCP markings and DOS indication

Page 26: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 26/35

Starent Networks Proprietary and Confidential 26

Roaming Issues

• FlowProfileIDs – Roaming partners must agree upon which FlowProfileIDs will be

requested and supported

• Need to produce starter set (Voice, PTT, etc.) t of agreed uponstandard FlowProfileIDs

• DSCP markings – Need roaming partners agree upon markings

 – CRX support of markings

• Subscriber-based QoS

 – Prioritization of user profiles (home vs. roamers)

Page 27: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 27/35

Starent Networks Proprietary and Confidential 27

Thank You

For further information visit:

www.starentnetworks.com

Be advised that the information contained in Starent's product roadmaps do not constitute a promise or obligation of delivery of any functionality. Starent, at its sole

discretion, and without notice to Customer, reserves the right to alter the design, specifications, and forecasted time to market of all of its products on any roadmap, at any time, as part of its continuing program of product development.

This presentation is proprietary information of Starent Networks Corporation. The information contained may not be used to create or change any contractual obligation

between Starent Networks Corporation and you or your firm. Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon this

 presentation by persons or entities other than the intended recipients is prohibited. This presentation is for planning and information purposes only. The specificationscontained herein are subject to change without notice.

Page 28: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 28/35

Starent Networks Proprietary and Confidential 28

Configuration

For further information visit:

www.starentnetworks.com

Be advised that the information contained in Starent's product roadmaps do not constitute a promise or obligation of delivery of any functionality. Starent, at its sole

discretion, and without notice to Customer, reserves the right to alter the design, specifications, and forecasted time to market of all of its products on any roadmap, at any time, as part of its continuing program of product development.

This presentation is proprietary information of Starent Networks Corporation. The information contained may not be used to create or change any contractual obligation

between Starent Networks Corporation and you or your firm. Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon this

 presentation by persons or entities other than the intended recipients is prohibited. This presentation is for planning and information purposes only. The specificationscontained herein are subject to change without notice.

Page 29: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 29/35

Starent Networks Proprietary and Confidential 29

ST16/40 Rev-A Related Commandswhat’s new in the cli?

class-map name tft-voice match-any

match dst-port-range 2223 to 3333

policy-map name tft-voice

class-map tft-voice

type dynamic three-gpp2 rev-A profile-id range 0x100 to 0x110 flow-id any

access-control allow

qos encaps-header dscp-marking 0x2e

qos user-datagram dscp-marking 0x2e

policy-group name policyGroup-1

policy tft-voice precedence 3

subscriber default

authorized-flow-profile-id 256 direction bidirectional

policy-group policyGroup-1 direction in

policy-group policyGroup-1 direction out

show subscribers summary – verify summary rev-A flow and filter info

show subscribers all – verify access technology

show subscribers full – verify subscriber policy

show subscribers access-flows – verify summary of flow-mapping, Qos profile,

and flow-based policy info

show subscribers access-flows full - verify details of flow-mapping

show subscribers tft – verify details of installed traffic flow template info

Show rp full – verify Session Update Send Reason

show rp full all – verify GRE Key associated with A10 instance

monitor protocol A10, A11, User L3, (level 3 with hex and ascii) – verify signaland data between the PDSN and PCF, and between the PDSN and mobile

logging filter active facility sessmgr level debug – verify policy is applied, A10 is

added, flow is added, tft is validated, etc.

Show rsvp – verify RSVP related statistics/counters

Show subscriber access-tunnels – verify A10 connections at sessmgr level

Page 30: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 30/35

Starent Networks Proprietary and Confidential 30

Class Map

• Configured on a per-subscriber basis either locally on thesystem or on a remote RADIUS server 

• Class Map:

• Match packet based on:

• Source/destination ip address

• IP TOS field

• Protocol

• Source/destination port number or range of port numbers

• Packet size

• Created in the egress context

• 32 Class Maps per egress context can be configured

• Set to match all or any of the classification rules

Page 31: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 31/35

Starent Networks Proprietary and Confidential 31

Class Map Example

class map name vpn-map match any

match src-port-range 1716

match dst-port-range 1716

match src-port-range 5001

match dst-port-range 5000

match src-ip-address 216.69.162.0/24

match dst-ip-address 216.69.162.0/24 

Page 32: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 32/35

Starent Networks Proprietary and Confidential 32

Policy Map

• Policy Maps:• Access control (allow or discard)

• Qos traffic policing (cdr, pdr, cbs, with exceed and violate actions)

• Qos encapsulation header DSCP Marking (0x00 – 0x3f)

• Type (static or dynamic)

• Static type (the traffic flow classification and treatment is pre-

defined with classification rules in the class map)

• Dynamic type (is based on Rev. A flows)

• Class Maps are assigned to Policy Maps

• Created in the egress context

• 32 Policy Maps per egress context can be configured

Page 33: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 33/35

Starent Networks Proprietary and Confidential 33

Policy Map Example

policy-map name gold-vpnclass-map vpn-map

type static

access-control allow

qos traffic-police committed 0 peak 300000 burst-size112500

exceed-action lower-ip-precedence violate-action drop

Page 34: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 34/35

Starent Networks Proprietary and Confidential 34

Policy Group

• Policy Groups:• Direction (in or out)

• Precedence (if a session flow matches multiple policies this key word will

resolve them. A range from 1 to 16 can be assigned)

• Policy Maps are assigned to Policy Groups• Created in the egress context

• 16 Policy Maps per Policy Group can be configured

Page 35: Starent Chicago Ad Hoc

8/4/2019 Starent Chicago Ad Hoc

http://slidepdf.com/reader/full/starent-chicago-ad-hoc 35/35

Policy Group Example

policy-group name goldpolicy gold-vpn precedence 2

policy gold-p2p precedence 3