FNG Service Configuration Mode Commands

Mode

The FNG Service Configuration Mode is used to configure the properties required for the Femto Network Gateway (FNG) to interface with the Femto Access Points (FAPs) in the network.

Exec > Global Configuration > Context Configuration > FNG Service Configuration

configure > context context_name > fng-service service_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-fng-service)# 

Important

The commands or keywords/variables that are available are dependent on platform type, product version, and installed license(s).


aaa aggregation

Sets the system attributes for A12 aggregation for the FNG service.

Product

FNG

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > FNG Service Configuration

configure > context context_name > fng-service service_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-fng-service)# 

Syntax

aaa aggregation { interface type a12| destination address ipv4_address | a12-group { context name [ aaa-group name ] | aaa-group name [ context name ] } } 
no aaa aggregation interface type a12 
no a12 destination address ipv4_address 
no aaa aggregation a12-group { context name [ aaa-group name ] | aaa-group name [ context name ] } 

aaa aggregation interface type a12

Enables A12 aggregation functionality for the FNG service.

aaa aggregation interface a12 destination address ipv4_address

Adds a destination address for an AN-AAA server for A12 aggregation. A maximum of ten destination addresses can be configured.

aaa aggregation a12-group { context name [ aaa-group name ] | aaa-group [ context name ] }

Defines the AAA context and AAA group to be used for A12 aggregation.

If the context name and AAA group are not specified, the FNG defaults to the FNG service context and the default AAA group in that context. If the AAA group is specified but the context is not specified, the FNG uses the FNG service context and the AAA group in that context. If the AAA group is not specified and the context is specified, the FNG uses the default AAA group in that context.

no aaa aggregation interface type a12

Disables A12 aggregation functionality for the FNG service.

no aaa aggregation a12-destination address ipv4_address

Deletes the specified destination address for an AN-AAA server.

no aaa aggregation a12-group { context name [ aaa-group name ] | aaa-group [ context name ] }

Deletes the specified AAA context and AAA group to be used for A12 aggregation.

Usage Guidelines

Sets the system attributes for AAA aggregation in the FNG service.

Example

The following command enables the A12 functionality for the FNG service:
aggregation interface type a12  

aaa authentication

Specifies the AAA group to use for FAP authentication.

Product

FNG

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > FNG Service Configuration

configure > context context_name > fng-service service_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-fng-service)# 

Syntax

aaa authentication { context-name name aaa-group name | context-name name aaa-group name } 
no aaa authentication 

no aaa authentication

Removes any existing authentication configuration.

context-name name aaa-group name

Specifies the context name and the AAA group name configured in the context for FAP authentication.

context-name name : Specifies the context where the AAA server group is defined as an alphanumeric string of 1 through 79 characters.

aaa-group name : Specifies the name of the AAA group to be used for authentication as an alphanumeric string of 1 through 63 characters.

Usage Guidelines

Use this command to specify that during IPSec session establishment using IKEv2 setup, the FNG will use Radius AAA for FAP authentication.

Example

Use the following to configure device authentication for an AAA group named aaa-10 in the FNG context named fng1 :
aaa authentication context-name fng1 aaa-group aaa-10 

bind

Binds the FNG service IP address to a crypto template and specifies the maximum number of sessions the FNG service supports.

Product

FNG

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > FNG Service Configuration

configure > context context_name > fng-service service_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-fng-service)# 

Syntax

bind address ipv4_address { crypto-template string }[ max-sessions number ] 
no bind 

no bind

Removes a previously configured binding.

address ipv4_address

Specifies the IPv4 address of the FNG service.

crypto-template string

Specifies the name of the crypto template to be bound to the FNG service.

string is any value from 0 - 127 alpha and/or numeric characters.

max-sessions number

Specifies the maximum number of sessions to be supported by the FNG service as an integer from 0 through 1000000. Default: 1000000

If the max-sessions value is changed on an existing system, the new value takes effect immediately if it is higher than the current value. If the new value is lower than the current value, existing sessions remain established, but no new sessions are permitted until usage falls below the newly-configured value.

Usage Guidelines

Binds the IP address used as the connection point for establishing the IKEv2 sessions to a crypto template. It can also define the maximum number of sessions the FNG can support.

Example

The following command binds an FNG service with an IP address of 10.2.3.4 to the crypto template named T1 and sets the maximum number of sessions to 500000 :
bind address 10.2.3.4 crypto-template T1 max-sessions 500000 

default

Sets or restores the default condition for the selected parameter.

Product

FNG

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > FNG Service Configuration

configure > context context_name > fng-service service_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-fng-service)# 

Syntax

default { { aaa attribute 3gpp2-service-option } | duplicate-session-detection | ip source-violation { drop-limit | period } | setup-timeout | subscriber name } 

aaa attribute 3gpp2-service-option

Sets or restores the default value of 4095.

duplicate-session-detection

Sets or restores the default option for duplicate session detection to be fapid-based.

ip source-violation ( drop-limit | period }

Sets or restores the IP source violation detection defaults, as follows:

drop-limit : Sets or restores the maximum number of IP source violations within the detection period before dropping the call to the default value of 10.

period : Sets or restores the detection period for IP source violations to the default value of 120 seconds.

setup-timeout

Sets or restores the maximum time allowed for session setup to the default value of 60 seconds.

subscriber name

Sets or restores the name of the default subscriber.

name is a string of 1-127 characters.

username mac-address-stripping

The default behavior is to disable stripping the MAC address from the username.

Usage Guidelines

Configures the default settings for a given parameter.

Example

Use the following command to set the maximum time allowed for session setup to the default value of 60 seconds:
default setup-timeout 

duplicate-session-detection

Configures the FNG to detect duplicate call sessions based on Femtocell Access Point (FAP) ID and to clear old call information.

This feature is disabled by default.

Product

FNG

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > FNG Service Configuration

configure > context context_name > fng-service service_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-fng-service)# 

Syntax

duplicate-session-detection { fapid-based } 
no duplicate-session-detection 
default duplicate-session-detection 

fapid-based

Sets the FNG to detect duplicate call sessions based on the FAP ID.

no duplicate-session-detection

Disables duplicate session detection.

default duplicate-session-detection

Sets or restores the default option for duplicate session detection to be fapid-based.

Usage Guidelines

By default, duplicate session detection is disabled.Use this command to enable this feature. It applies only to calls established after the feature has been enabled.

The following command enables duplicate session detection based on FAP ID:
duplicate-session-detection fapid-based 

end

Exits the current configuration mode and returns to the Exec mode.

Product

All

Privilege

Security Administrator, Administrator

Syntax

end 

Usage Guidelines

Use this command to return to the Exec mode.

exit

Exits the current mode and returns to the parent configuration mode.

Product

All

Privilege

Security Administrator, Administrator

Syntax

exit 

Usage Guidelines

Use this command to return to the parent configuration mode.

ip source-violation

Sets the parameters for IP source validation. Source validation is useful if packet spoofing is suspected or for verifying packet routing and labeling within the network.

Source validation requires the source address of received packets to match the IP address assigned to the subscriber (either statically or dynamically) during the session.

Product

FNG

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > FNG Service Configuration

configure > context context_name > fng-service service_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-fng-service)# 

Syntax

ip source-violation { clear-on-valid-packet | drop-limit num | period secs } 
no ip source-violation clear-on-valid-packet 

clear-on-valid-packet

Configures the service to reset the drop-limit counters upon receipt of a properly addressed packet. Default: disabled

drop-limit num

Sets the maximum number of allowed IP source violations within the detection period before dropping a call as an integer from 1 through 1000000. Default: 10

period secs

Sets the detection period (in seconds) for IP source violations as an integer from 1 through 1000000. Default: 120

Usage Guidelines

This function allows the operator to configure the network to prevent problems such as when a user gets handed back and forth between two gateways a number of times during a handoff scenario.

When a subscriber packet is received with a source IP address violation, the system increments the IP source violation drop-limit counter and starts the timer for the IP source violation period. Every subsequent packet received with a bad source address during the IP source violation period causes the drop-limit counter to increment.

For example, if the drop-limit is set to 10, after 10 source violations, the call is dropped. The detection period timer continues to count throughout this process.

Example

The following command sets the drop limit to 15 and leaves the other values at their default values:
ip source-violation drop-limit 15 

setup-timeout

Specifies the maximum time allowed to set up a session in seconds.

Product

FNG

Privilege

Security-Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > FNG Service Configuration

configure > context context_name > fng-service service_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-fng-service)# 

Syntax

setup-timeout integer 
default setup-timeout 

setup-timeout integer

Sets the session setup timer (in seconds) as an integer from 2 through 300. Default: 60

default

Sets or restores the default session setup timer value to 60 seconds.

Usage Guidelines

The FNG clears both the user session and tunnels if a call does not initiate successfully before the session setup timer expires.

Example

The following command sets the session setup timeout value to the default value of 60 seconds:
default setup-timeout